• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/62

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

62 Cards in this Set

  • Front
  • Back
What are small files stored on your computer by the sites you visit called?
A) Brownies B) Cookies C) Cakes D) Icecream
B) Cookies
Worm – is a type of a virus that:

1. Sits harmlessly on a computer until a preordained set of circumstances activates it.
2. Can spread over an entire computer network.
3. Infect data files such as those stored in Word and spread through them when shared with others
4. Installs itself in the beginning tracks of a hard drive
2. Can spread over an entire computer network.
All of the following are image formats except:

1. GIF
2. MP3
3. JPEG
4. BMP
2. MP3
True or False: When you purchase a CD you legally own it and its copy right.
False
An Ad Network can collect each of the following from you except:

a. your purchase history

b. your phone number

c. your favorite color

d. your full name
c. your favorite color
True or False: The majority of viruses are spread via email attachment.
True
What is the act of searching for unsecured Wi-Fi signals by a person or persons in a moving vehicle?

A. Salami Shaving B. Data Diddling C. Wardriving D. Phishing
C. Wardriving
8. True or False? Copyrights are generally enforced by the holder in a civil law court.
True
All of the following are types of computer viruses except:

1. Boot Sector
2. HIV
3. Macro
4. Time/Logic Bomb
2. HIV
According to Google, Internet freedom is:

* Increasing
* At a stand-still
* Declining
Declining
What is the term for an ID number generated by a hardware component or program?
A. Cookie
B. Copyright
C. Global Unique Identifier (GUID)
D. Spyware
C. Global Unique Identifier (GUID)
GPA stands for general purpose applications and consists of Personal Productivity Programs, Multimedia & Graphics Software,Internet Programs and Home & Educational Programs. True or False
True
Give an example of an Image Editor.
Photoworks or Photoshop
What is the most popular type of GPA?
A. Multimedia & Graphics Software
B. Internet Programs
C. Personal Productivity Programs
D. Home & Educational Programs
C. Personal Productivity Programs
True or False: Opening e-mail attatchments from people you don't know is okay.
False
What is an application?
Anything that refers to all of the programs that enable you to use the computer for your work.
Which of the following is NOT an example of an application?

a.) itunes

b.) word perfect

c.) power point

d.) Windows
d.) Windows
What is the correct term for compression/decompression algorithms?

a.) Codecs

b.) Cola

c.) Computer

d.) Cables
a.) Codecs
19. Which of the following is an example of multimedia and graphics software:

a. Itunes
b. Paint
c. Movie Maker
d. All of the above
d. All of the above
True or False: It is the exclusive right of the copyright holder to perform or display their work publicly
True
What does DRM stand for?
Digital Rights Management
Which association sent 400 letters to 13 U.S. Universities advising of potential copyright infringement lawsuits against students who use their computer networks to swap songs they haven't paid for? A)PETA B)CIA C)NCAA D)RIAA
D)RIAA
Which of the following is not an example of an internet program?

A.) e-mail

B.) instant messaging

C.) windows movie maker

D.) Web Browsers
C.) windows movie maker
What kind of images is JPEG best suited for?

a. Complex images

b. Big images

c. Pretty Images

d. all of the above
a. Complex images
True or false: Twitter is a microblogging site.
True
What is NOT one way to protect yourself online?
A) Disable cookies or use cookie management software

B) Use a throw-away email for public spaces

C) Don’t fill out registration forms without viewing a privacy policy statement

D) Answering truthfully to age/sex/location questions in chatrooms
D) Answering truthfully to age/sex/location questions in chatrooms
Which of the following image formats uses "loseless" codecs?
a. GIF b. JPEG c. ADA d. MPEEG
a. GIF
27. Which of the following is not an example of fair use?

a. listening to a cd that you purchased in your room.

b. playing a cd at a party at your house.

c. singing the lyrics in public

d. making mass copies and selling them at a lower price
d. making mass copies and selling them at a lower price
What is a beta?
A preliminary version of a program in its final stages of its development.
Give an example of an application:
Word, Powerpoint, iTunes, etc.
A JPEG uses what kind of codecs?

a. lossless
b. lossy
c. glossy
d. bossy
b. lossy
Which of the following criteria is important to look for in terms of reliability of a website?

a. Domain
b. Content
c. Authority
d. Design
e. All of the above
e. All of the above
how many times is a reliable website updated?

a)never b) once c) twice d)regularly
d)regularly
Ad Network can collect your:
a) Phone number
b) Full Name
C) Mailing Address
d) all of the above
d) all of the above
What are the examples of DRM (Digital Rights Management)?
Sony Records, iTunes store
What is not a type of audio format?

a) AAC b)TIF c)MP3 d)WAV e) OGG
b)TIF
Small files stored on your computer by the sites you visit are cookies- true or false?
true
True or False : When you purchase a CD, you legally own the CD and its copyright.
false
What is a cybercrime?
(a crime commited using the internet)
Which of the following is not one of the 4 GPAs we talked about in class?
A. Multimedia and graphics software
B. Antivirus programs
C. Internet programs
D.Multimedia and graphics software
B. Antivirus programs
Which of these is a correct symbol for "Copyright":

1. © (a circle with a "c" inside it)

2. *C* (a "c" in the middle of two stars)

3. (c)

4. (C)

5. #1,#3, #4 are all correct symbols
5. #1,#3, #4 are all correct symbols
True/False. Applications are exclusive to the iPhone and iPod, and no other systems.
False
What does MGS stand for and what is it?
Multimedia & Graphic software- any software that involves two or more media(audio, graphics, or video).
True or False: If the copyright symbol is not present on a work, it is okay to take it and call it your own.
False
True or False: If you are taken to court over downloading from a source such as Limewire, pleading the "sharing is caring" case will result in the charges being dropped.
False
What is the most common image format?
JPEG
Which of the following are exclusive rights of the copyright holder?

a. to import or export work

b. to create derivative works

c. to perform or display work publicly

d. all of the above
d. all of the above
Would it be recommended to convert an MP3file to AAC?

a. Yes, this would improve the quality.

b. No, an MP3 already lost some of its quality and compressing it further would degrade it.

c. It doesn't matter.
b. No, an MP3 already lost some of its quality and compressing it further would degrade it.
48. Which is the most reliable domain name?

A) COM

B) GOV

C) ORG
B) GOV
What are examples of GUIDs?

A. Intel B. Windows C. Active X D. All of the above
D. All of the above
True or False: You can commit a cybercrime without committing a computer crime.
False
When referring to computers a patch is,
A) a piece of cloth that is used to cover holes on the hardware.
B) a minor change updating the program.
C) a major change updating the program.
D) a plot of land for growing food.
E) a transdermal system of drug delivery.
B) a minor change updating the program.
The copy right symbol must be present on a file, object, etc. for it to be copyrighted? True or False
False
What is Shareware?
A.) Free to share with anyone
B.) same as freeware
C.) a free trial period
D.) doesn’t exist
C.) a free trial period
Lossless or Lossy :The original file can be compressed and completely restored without loss of data.
Lossless
True or False: The copyright holder receives royalties when you download music without paying for it.
False
True or False: most viruses are called file infectors b/c they attach themselves to program files.
True
List four things to look for on a website to determine its veracity.
Domain Name
Design
Authority
Content
True or False: You do not have to have a valid license for all the software on your computer.
False
Psychologists have theorized that people use Facebook to produce an idealized version of themselves, called a what?
avatar
What is a hidden code that may damage or destroy infected files?
a) Codecs
b) virus
c) wardriving
d) GUIDs
b) virus
συναγωγή, ἡ
synagogue