Term 1 of 455
Which of the following is not a standard for wireless Ethernet networks?
Cluster
802.11zx
Copyright
All enhancements and additions to copyleft software will cost the user an update or
upgrade fee.
Term 2 of 455
You can block logical ports from invaders and make your computer virtually invisible to others
on the Internet by installing ________.
Programming
Malware fraud
A firewall
White-hat
Term 3 of 455
You can find out which network adapters are installed in your system by using the Windows
________ Manager utility.
False
Device
Navigtion
Device Driver
,Term 4 of 455
Which of the following is not true about locally installed software?
You need the Internet to run the program.
Unix
Application programming interface (API)
Network
Term 5 of 455
Which type of hackers break into systems for the thrill or to show off their skills.
Pseudocode
Gray-hat
Social Browsing
False
Term 6 of 455
All popular social networking sites have privacy policies, but you still need to follow certain
precautions when using their sites.
True
False
Term 7 of 455
Which of the following has the extension associated with a Microsoft Excel file?
Programming
inventory.xlsx
Networking Systems
Pay with a debit card, not a credit card.
,Term 8 of 455
When programmers need to create several different examples of a class, each is known as an
object.
True
False
Term 9 of 455
________ is installed on your computer, and when the program is opened, your e-mail downloads
to your computer.
Ergonomics
Intellectual
Personal information manager
E-mail client software
Term 10 of 455
Service packs are also known as software updates.
True
False
Term 11 of 455
A home network server does not require any special software.
True
False
, Term 12 of 455
Configuring a firewall to ignore all incoming packets that request access to a specific port is
known as ________.
Utility Software
Network Adapter
Logical port blocking
Problem statement
Term 13 of 455
Before its final commercial release, a(n) ________ version of software may be offered to certain
test sites or to interested users free or at a reduced cost.
False
Augmented
Beta
True
Term 14 of 455
With a client-based e-mail account, you can view your e-mail only from the computer on
which the client program is installed.
True
False
Term 15 of 455
When using a spreadsheet, SUM in the expression =SUM(B10:B16), is called a(n) ________.
File Compression
Offshoring
Cloud Computing
Function
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller selftest. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $9.00. You're not tied to anything after your purchase.