CMIS 108 Final Exam – Flashcards

Unlock all answers in this set

Unlock answers
question
A basic example of _____ is the use of graphs and charts to illustrate numeric data.
answer
visualization
question
The Kindle is an example of a(n) _____ device.
answer
eReader
question
Digital video _____ involves analyzing each frame of the video and storing only the pixels that change from frame to frame.
answer
compression
question
One thing to consider when choosing a mobile device is _____.
answer
battery life
question
Personal music videos that combine user-generated photos with audio music are a good example of _____.
answer
digital convergence
question
Typical _____ computing providers deliver common software online that is accessed from another web service or browser.
answer
cloud
question
Online newspapers can be delivered through _____ to news readers.
answer
RSS
question
Computer _____ capture(s) the essence of today's business expectations for knowledge workers within their organizations.
answer
fluency
question
A popular term used to identify devices such as the iPad is _____.
answer
tablet PC
question
Apple, Amazon, and Google provide services that let users store their music _____, making it accessible to the owner from any Internet-connected device.
answer
in the cloud
question
A Kindle eBook reader is an example of a(n) _____ computer.
answer
special-purpose
question
A game console relies on a fast _____ to handle the lively animations in a video game.
answer
microprocessor
question
Which of the following is a social network with photo album capabilities?
answer
Facebook
question
Which of the following is a popular satellite radio service in the United States?
answer
SiriusXM
question
Cloud computing is not possible without _____.
answer
an Internet connection
question
A computer relies on the combination of _____ and _____ to turn input into output.
answer
hardware, software
question
Digital photography captures, stores, and manipulates photographs digitally as a series of _____.
answer
1s and 0s
question
Using analog-to-_____ conversion, we are able to digitize the things we see and hear.
answer
Digital
question
The prefix Giga represents approximately one _____ units of information
answer
billion
question
ASCII is the encoding standard used to represent _____ in digital form.
answer
keyboard characters
question
A _____ can represent a digit, a letter, or a color.
answer
byte
question
The _____ system, which uses only two digits, 1 and 0, is commonly used for representing values in computers.
answer
binary number
question
Which of the following is an example of digital media?
answer
Blu-ray movies
question
_____ software allows you to improve the look of your captured image.
answer
Photo-editing
question
Users can interact in a virtual reality environment through the use of _____.
answer
avatars
question
Each programming language has a particular ____— rules that guide how programming statements are constructed.
answer
syntax
question
The iPad and other tablets take advantage of _____, allowing the user to use more than one finger to manipulate a display
answer
multitouch displays
question
When you combine a system's hardware configuration and operating system, it is sometimes called the computer's ____.
answer
platform
question
_____ was invented to standardize computer interfaces around one type of connection.
answer
The USB port
question
Through the use of _____, pilots can simulate flights without ever leaving the ground.
answer
virtual reality
question
The specifications of a computer usually include the speed of the _____ bus.
answer
front side
question
Output that you can feel is called _____ output
answer
haptic
question
Windows cleaners maintain the ____ for more effective system operation.
answer
registry
question
Google Docs is classified as ____ software, which allows users to share and edit a document in real time on the web.
answer
collaborative
question
Read-only memory differs from random access memory due to its ability to _____ store instructions.
answer
permanently
question
With _____ memory, data is stored permanently with no moving parts or the need for electricity.
answer
flash
question
Many businesses rely on ____ software to keep a competitive edge in today's marketplace.
answer
custom-designed
question
ROM is used for important programs like _____, which come(s) from the manufacturer.
answer
firmware
question
It is the job of the ____ to oversee the removal of software programs on a computer.
answer
operating system
question
An integrated circuit may hold thousands, millions, or even billions of _____.
answer
transistors
question
Programmers create ____ and compilers turn it/them into ____.
answer
source code, object code
question
One advantage of _____ printers is their ability to output realistic objects.
answer
3D
question
____ software allows the user to copy, modify, and redistribute source code.
answer
Open-source
question
An advantage of ____ software is its ability to run more than one operating system on a computer.
answer
virtual machine (VM)
question
A ____ software package usually includes document production, numerical analysis, information management, and graphics.
answer
productivity
question
The purpose of the ____ is to store the boot process instructions for the computer to start up.
answer
BIOS
question
A(n) ____ license can be used anywhere on a college campus.
answer
site
question
Moore's Law states that the number of transistors on a chip will double about every _____ months.
answer
24
question
The _____ plays an important role in transforming data into useful information.
answer
processor
question
With the help of ____, less experienced programmers can develop applications for mobile devices such as the iPhone.
answer
SDKs
question
A _____ payment system delivers mcommerce services to small devices through the use of short-range wireless data communications.
answer
proximity
question
A unique feature of the semantic web is its ability to ____.
answer
figure out what the user is looking for
question
_____ can be defined as systems that support electronically executed business transactions.
answer
Ecommerce
question
By combining geolocation, the image through your camera, and advanced ____ applications, you can review information in real time about businesses that surround you.
answer
augmented reality
question
____ defines how information travels across the Internet.
answer
TCP/IP
question
Individual consumers use the _____ form of ecommerce to sell to other individuals on the web.
answer
C2C
question
One of the biggest roadblocks to ecash and ewallet technologies is _____.
answer
fear
question
Which of the following agencies played an important role in the birth of the Internet?
answer
Department of Defense
question
The online retailer ____ is one of the largest suppliers of cloud services.
answer
Amazon.com
question
Google Wallet software utilizes Android phones with near field communication technology, such as _____, to allow shoppers to swipe their phone at checkout to pay for items.
answer
RFID
question
Downloading apps, games, and media to your smartphone is an example of _____.
answer
mcommerce
question
The new Internet Protocol that was recently implemented to identify the large amount of Internet users is called ____.
answer
IPv6
question
A good example of an ecommerce site is _____.
answer
Amazon
question
A(n) _____ is a website that allows visitors to browse through a wide variety of products from varying etailers.
answer
cybermall
question
Government agencies have not supported cloud computing due to the lack of ____.
answer
Data Security
question
In a(n) ____ relationship, multiple users are provided with access to a server at the same time.
answer
client/server
question
In the _____ form of ecommerce, transactions between businesses across private networks, the Internet, and the web are supported.
answer
B2B
question
Downloaded music may include ____ technology that prevents or limits the user's ability to make copies.
answer
DRM
question
Using the web as a primary user interface to access such applications as Google Docs is an example of ____.
answer
Cloud computing
question
Electronic communication that occurs in real time is called ____ communication.
answer
synchronous
question
Our e-textbook, Emerge with Computers, is an example of ____.
answer
online education
question
The popularity of ____ has encouraged everyday users to share events of the day.
answer
social media
question
In the _____ form of ecommerce, the web is used to connect individual consumers directly with retailers to purchase products.
answer
B2B
question
With the help of ____, four academic research institutions were connected to each other for the first time through ARPA's computer network.
answer
Arpanet
question
In the URL http://www.cengage.com/index.html, cengage.com is the ____.
answer
domain name
question
The https:// protocol in a URL indicates the use of a(n) ____ by the website.
answer
SSL Connection
question
The component of artificial intelligence that demonstrates the ability to learn from experience and continuously improve performance is called __________.
answer
machine learning
question
AI applications are ways in which AI methodologies are applied to ____ and provide services.
answer
Solve Problems
question
____ proposed a test to determine whether a computer can be said to "think."
answer
Alan Turning
question
To protect your wireless devices and the information they hold, you should set up encryption such as ____.
answer
WPA2
question
Medical robots are built with ____ capabilities to perform sophisticated surgeries.
answer
high-precision
question
Receiving a fraudulent email that closely resembles a legitimate website, such as one from your bank, is known as a(n) ____ attack.
answer
phishing
question
When using a public Wi-Fi network, when is it safe to send private information over the network?
answer
never
question
An individual who illegally downloads copyright-protected software is referred to as a ____.
answer
pirate
question
Communication and language are key elements in the ____.
answer
Turning Test
question
Software companies rely on ____ to "fix" problems in their programs related to bugs and flaws.
answer
updates
question
A common form of authentication is a ____.
answer
password
question
Speech recognition, handwriting recognition, and face recognition all fall under the AI category of ____ recognition.
answer
pattern
question
A strong advocate of the Singularity concept is ____.
answer
Ray Kurzweil
question
A ____ may be used to filter data that may be undesirable.
answer
firewall
question
Robots are used to perform jobs that involve the three Ds. Which of the following is NOT one of the three Ds?
answer
disasters
question
The art and science of creating computer systems that simulate human thought and behavior are referred to as ____.
answer
artificial intelligence
question
Criminals collect items such as credit card numbers without the user's knowledge through the use of ____.
answer
spyware
question
An expert system relies on ____ to provide subject-specific knowledge.
answer
human experts
question
The concept of the Singularity predicts that computers will be ____.
answer
super intelligent
question
Searching the Web for the best deal on an airline flight is a good example of ____ at work
answer
An intelligent agent
question
An Internet-based crime is referred to as a(n) ____ crime.
answer
cyber
question
You can protect yourself from identity theft by using ____ when transmitting information over network connections.
answer
encryption
question
Facial recognition is used as a(n) ____ process in the Australian SmartGate system.
answer
authentication
question
____ artificial intelligence is very popular in the programming of robots.
answer
behavior based
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New