Exam 2: Computer Terminology and History

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Discuss the original purpose behind the development of the Internet.

(Essay)
4.8/5
(40)

Worms refers to a code that causes damage to computer systems.

(True/False)
4.7/5
(43)

Who is hired by companies who want to test their security system by way of violations?

(Multiple Choice)
5.0/5
(41)

Which of the following interprets program instructions and processes data in the computer?

(Multiple Choice)
4.8/5
(39)

Discuss how computers evolved.

(Essay)
4.9/5
(28)

Operating systems may be either single-user or multiple-user.

(True/False)
4.9/5
(42)

The ________ is the heart of the UNIX operating system.

(Short Answer)
4.7/5
(39)

Originally, the Internet was funded in large part by ________ and was not available for commercial usage.

(Short Answer)
4.7/5
(40)

A tangled code is also known as ________ code.

(Short Answer)
4.8/5
(38)

________ is a term used to designate "good" hackers.

(Short Answer)
4.9/5
(42)
Match the hacking terminology with its meaning.
Time bomb
a term used to refer to humans operating computers (as opposed to hardware and software)
Bit bucket
a term traditionally used to refer to the method of cracking passwords by manually entering all possible key combinations
Sneaker
an individual hired by a company to test its security systems by attempting to violate them
Correct Answer:
Verified
Premises:
Responses:
Time bomb
a term used to refer to humans operating computers (as opposed to hardware and software)
Bit bucket
a term traditionally used to refer to the method of cracking passwords by manually entering all possible key combinations
Sneaker
an individual hired by a company to test its security systems by attempting to violate them
Wetware
the final destination of discarded, lost, or destroyed data
Brute force
a subspecies of logic bomb that is triggered by reaching some predetermined time or is set to go off in the event that a programmen is fired and not available to suppress action
(Matching)
4.9/5
(34)

________ were unsophisticated instruments used in ancient times exclusively for mathematical computations.

(Short Answer)
4.7/5
(31)

A ________ is a device that combines the functionality of a personal digital assistant (PDA) and the mobility of a cellular phone.

(Short Answer)
4.9/5
(39)

What does the term wetware refer to?

(Multiple Choice)
4.9/5
(35)

Intranets are small local networks connecting computers within one organization, controlled by a common system administrator.

(True/False)
4.9/5
(35)

What is the most important component of a computer?

(Multiple Choice)
4.8/5
(45)

What is the purpose of random access memory in the computer system?

(Multiple Choice)
4.9/5
(46)

Chat rooms are a popular medium of instant communication via the Internet.Explain why users should be careful in communicating through chat rooms.

(Essay)
4.8/5
(34)

For what purpose did British scientists build Colossus I?

(Multiple Choice)
4.8/5
(37)

Which of the following computer components had its origin in the cathode ray tube?

(Multiple Choice)
4.9/5
(30)
Showing 21 - 40 of 62
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)