Show Home Subjects Expert solutions Create Log in Sign up Upgrade to remove ads Only A$47.99/year
Terms in this set (52)________ allows only limited use of media that has been legally purchased. digital rights management When does copyright protection begin? When a work is created and fixed into a digital or physical form. When the application for the copyright has been approved. When a work is begun. When the application for the copyright has been submitted. when a work is created and fixed into a digital or physical form Pictures you find on the Google image search are considered in the public domain. false Which of the following is NOT an example of a digital music file format? .wma .accdb The Apple logo would be considered a(n) ________. Copyright trademark A(n) ________ cable carries all audio and video information from devices to a connected TV. HDMI Many cameras support wireless connections so you can transfer images without connecting cables. true Which of the following is NOT true about e-books? You can annotate them with your own notes. you can borrow them from the library YouTube is the entity legally responsible for its content, rather than the person who uploaded the content. false Which is NOT a reason someone might risk violating a copyright? It is hard to prove the copyright in court. I am just one person. Everyone else is doing it. The risk of being caught is very low. its hard to prove the copyright in court A copyright holder cannot loan, rent, or give away the work. false Which of the following digital image formats compresses the image file? .raw .jpeg DRM-free music can legally be moved from system to system true RAW files are larger in size than JPEG files. true Intangible personal property has no value. true To protect a movie, what category of intellectual property would be used? copyright Configuring a firewall to ignore all incoming packets that request access to a specific port is known as ________. logical port blocking A denial-of-service attack can be used to deny hackers access to a computer system. false A macro virus is a virus that is attached to a file such as a Word document or Excel workbook. true A(n) ________ is the portion of virus code that is unique to a particular computer virus. virus signature Viruses, adware and spyware are referred to collectively as ________. grayware A time bomb virus can be triggered on a certain date. true Creating and distributing ________ is one of the most widespread types of cybercrimes. computer viruses The terms virus and worm mean the same thing. true A stealth virus is designed to infect multiple file types to fool the antivirus software. false An encryption virus replicates itself onto a hard drive's master boot record. false Social ________ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information. engineering Currently, there are no antivirus programs for mobile devices. false A packet analyzer is a program that can enable a hacker to do all of the following EXCEPT ________. launch a DOS attack on your computer Virtual private networks (VPNs) are secure networks that are established without using the public Internet infrastructure. false A worm does NOT require human interaction to spread to other computers. true A(n) ________ takes advantage of file transport methods, such as e-mail, to spread on its own. worm Regarding computer protection, quarantining is defined as ________. placing a found virus in a secure area on the hard drive Ethical hackers are also known as white-hat hackers. false ________ floods a computer with requests until it shuts down and refuses to answer any requests for information. DDoS attack A ________ allows a hacker to gain access to your computer and take almost complete control of it without your knowledge. rootkit Using your computer for non-work activities while you are being paid to work is known as ________. cyberloafing When malicious code is planted on your computer and alters your browser's ability to find web addresses, it is known as ________. pharming A Windows application which demands a lot of raw processing power to execute repetitive complex calculations is a good candidate for the object-oriented programming language C/C++. true Which of the following provides a visual representation of the patterns of an algorithm? flowchart A data-flow diagram provides a visual representation of an algorithm. false A popular programming language which is known for having a large number of free libraries is ________. python ________ enables users to define their own data-based tags and facilitates the exchange of information between websites. XML The keywords used in programming languages that use decisions to redirect the flow of a program are called ________. control structures Prolog is an example of a fourth-generation programming language. true Before its final commercial release, a(n) ________ version of software may be offered to certain test sites or to interested users free or at a reduced cost. beta Bottom-up design is a systematic approach in which a problem is broken into a series of high-level tasks. false When programmers need to create several different examples of a class, each is known as an object. true Second-generation languages are also known as assembly languages. true Which of the following would NOT be used to build websites with interactive capabilities? fortran Syntax errors are caught only when a program executes. false Which is NOT a key factor a programmer uses in selecting the language for a project? number of inputs required Sets with similar termsChapter 9 Practice Multiple Choice30 terms isabelladavis1 ITM Chapter 934 terms Kenz36twin Chapter 946 terms ashleeg95 Chapter 925 terms elizabeth_mott6 Sets found in the same folderChapter 9 tia46 terms khaight15 Chapter 8 Questions30 terms bawinz DN-INTERNET TECH SPRING 201698 terms kilipit CIM 1 Ch. 4 Quiz32 terms HailFire_Aj Other sets by this creatorCIS231 Final Exam Review65 terms jennaevandusen Med Term Final58 terms jennaevandusen CIS 150106 terms jennaevandusen DAN 200 Midterm44 terms jennaevandusen Verified questionsSOCIOLOGY What are your beliefs on capital punishment? Defend your viewpoint. Verified answer
SOCIOLOGY Expressed powers are those that are? A) Specifically granted in the Constitution. B) Held by both the federal government and the states. C) Considered the basis for the “necessary and proper” clause. D) Inferior compared to powers directly given by Congress. Verified answer
SOCIOLOGY Sociologists define three types of family structures. List and describe those structures. Verified answer
SOCIOLOGY Which of the following describes what is meant by differential association? a. Crime is more likely to occur among individuals who have been treated differently b. People may become criminals through close association with criminals c. Crime is not transmitted culturally d. crime comes from conflict between two cultures Verified answer
Other Quizlet setsCS6 Quiz 236 terms aalco005 Nado CSI Chapter 17 homework27 terms Dennis_Yandow3 Ch. 1-476 terms Riley_Garrison6 MIS Quiz Questions62 terms meganpeterson1234 Related questionsQUESTION Which JavaScript defense restricts a JavaScript downloaded from Site A from accessing data that came from Site B? 6 answers QUESTION Messages from the Internet, related to Windows File Sharing, use which conceptual doorway? 15 answers QUESTION This requires that enterprises must guard protected health information and implement policies and procedures to safeguard it. 2 answers
QUESTION The reliability of cloud services can be a problem if an organization 's cloud vendor has a service disruption 5 answers What happens after 180 days to eWhat happens after 180 days to e-books rented through VitalSource? they disappear from your device.
Which is a disadvantage of eOne disadvantage of e-books is that if you make a mistake when highlighting, there is no way to undo it. What should you read first when previewing a reading assignment?
What happens after 180 days to eWhat happens after 180 days to e-books rented through VitalSource? They disappear from your device.
Which of the following digital formats compresses an image file?JPEG, which stands for Joint Photographic Experts Groups is a “lossy” format meaning that the image is compressed to make a smaller file.
|