(Solved): CIS 105 25063 Quiz Using the Internet and networks...
Score for this attempt: 100 out of 100
Submitted Feb 16 at 9:53 am
This attempt took 54 minutes.
Question 1
The three basic type of search tools are search engines, subject directories, and meta search tools.
- True
- FaIse
Question 2
Spiders are considered to be software programs to create web documents.
- True
- False
Question 3
A Boolean search is:
- Controls spiders from being used in a search.
- A common general search with no parameters.
- Searches the web through adding + and - symbols to get closer results to search criteria.
- Using a search engine using and - symbols.
Question 4
Your best friend's boyfriend introduced her to the deep, dark, web. She approaches you to try it out because it is so "cool" She said she did not get a virus or anything on her computer and did not meet any criminals. Go ahead give it a try. You respond with:
- I already use it and it is no big deal
- You are the third person who told me this. I think I will just try it and see what comes up.
- The Deep (dark) web is not to be used. It is a dangerous place whether even though you think everything is okay. Even one time going to the dark web can lead to unknowingly becoming part of the dark web, maximizing personal security breaches, and can destroy a person's image.
- Okay. What security software did you use so I can make sure I do not get a virus?
Question 5
Adware and spyware are common malware invasions
- True
- False
Question 6
Black-hat hackers primary motivation to "hack" computers is usually:
- Financial and annoy others
- Adware and personal
- Spyware and financial
- Personal and financial
Question 7
White hat hackers:
- Use their powers to be paid employees or contractors working for companies as security specialists that do not have permission to find security holes via hacking.
- Want to save the world from evil and do it for companies regardless if employees or contract
- Use their powers to be paid employees or contractors working for companies as security specialists with permissions to find security holes via hacking.
- Are all converted black-hat hackers who have special permission to to work on security issues.
Question 8
A virus is classified as a self-replicating piece of malicious code that travels by inserting itself into files or programs.
- True
- False
Question 9
Social media are web-based communication methods people use to interact with each other.
- True
- False
Question 10
Social networking and social media are the same thing.
- True
- False
Question 11
Worldwide, ___________ is the top social networking site.
Question 12
Based on research, the strongest addiction is _________
- Social media
- Alcohol
- e-cigs
- Cigarettes
Question 13
_________________ is often used for professional networking.
- Flickr
- Tumblr
Question 14
What is considered to be the Ephemeral App?
- Snapchat
- Flickr
- Youtube
Question 15
A Snapchat story stays online for:
- 60 seconds
- 90 seconds
- 30 seconds
- 24 hours
Question 16
One drive is an example of ____________ technology.
- Cloud
- LAN
- WAN
- LAN
Question 17
_______________________ is the largest Wide Area network (WAN)
- cloud
- Locate
- Search
- Internet
Question 18
AWS stands for Amazon Wide Services
- True
- False
Question 19
Client-server networks are more common in homes and peer-to-peer networks more common in business.
- True
- False
Question 20
The cloud in the computer world sends, receives, and stores data throughout many networks.
- True
- False
Expert Answer
Buy This Answer $15
-- OR --
Subscribe $20 / Month