Computer Concepts Final Review – Flashcards
104 test answers
Unlock all answers in this set
Unlock answers 104question
_____ consists of the programs that control or maintain the operations of the computer and its devices.
answer
system software
Unlock the answer
question
A(n) _____ message is a real-time internet communication, where you exchange messages with other connected users.
answer
Instant
Unlock the answer
question
Many large companies use the word(s), _____ to refer to the huge network of computers that meets their diverse computing needs.
answer
enterprise computing
Unlock the answer
question
____ is a system that attempts to initiate the behavior of the human brain.
answer
a neutral network
Unlock the answer
question
_____ offers high-speed internet connections to devices with built-in compatible technology or computers with wireless modems.
answer
A cellular radio network
Unlock the answer
question
As with an IP address, the components of a domain name are separated by _____.
answer
Periods
Unlock the answer
question
_____ combines text-based links with graphics, audio, and video links.
answer
Hypermedia
Unlock the answer
question
All of the following techniques can be used to improve web searches except _____.
answer
put the most important terms last
Unlock the answer
question
A _____ is a website that allows users to post short text updates, usually between 100 and 200 characters.
answer
Microblog
Unlock the answer
question
A(n) _____ is a small version of a larger graphic.
answer
Thumbnail
Unlock the answer
question
_____ is the process of transferring documents, graphics, and other objects from your computer to a server on the internet.
answer
Uploading
Unlock the answer
question
_____ is the code of acceptable behaviors users should follow while on the internet.
answer
Netiquette
Unlock the answer
question
_____ is mass-produced, copyrighted retail software that meets the needs of a wide variety of users, not just a single user or company.
answer
packaged software
Unlock the answer
question
_____ is a collection of individual programs available together as a unit.
answer
a software suite
Unlock the answer
question
_____ allows a user to plan, schedule, track, and analyze the events, resources, and costs of a project.
answer
project management software
Unlock the answer
question
_____ software provides a means for sharing, distributing, and searching through documents by converting them into a format that can be viewed by any user.
answer
document management
Unlock the answer
question
_____ helps home and small business users create newsletters, brochures, advertisements, postcards, greeting cards, letterhead, business cards, banners, calendars, logos, and web pages.
answer
personal DTP software
Unlock the answer
question
With _____, you can view, organize, sort, catalog, print, and share digital photos.
answer
photo management software
Unlock the answer
question
A(n) _____ is an online area where users have written discussions.
answer
newsgroup/message board
Unlock the answer
question
_____ is the electronic equivalent of a user manual.
answer
online help
Unlock the answer
question
The processor also is called the _____.
answer
central processing unit (CPU)
Unlock the answer
question
The _____ is the component of the processor that directs and coordinates most of the operations in the computer.
answer
control unit
Unlock the answer
question
A processor contains small, high-speed storage locations, called _____, that temporarily hold data and instructions.
answer
Registers
Unlock the answer
question
Supercomputers use _____ for applications such as artificial intelligence and weather forecasting.
answer
massive parallel processing
Unlock the answer
question
ROM chips, called _____, contain permanently written data, instructions, or information.
answer
Firmware
Unlock the answer
question
A(n) _____ is an external device that provides connections to peripherals through ports built into the device.
answer
port replicator
Unlock the answer
question
A(n) _____, which is an external device that attaches to a mobile computer or device, contains a power connection and provides connection to peripherals; it usually also includes slots for memory cards, optical disc drives, and other devices.
answer
docking station
Unlock the answer
question
A(n) _____ is a part of the mother-board and connects the processor to main memory.
answer
front side bus
Unlock the answer
question
A(n) _____ has a design that reduces the change of wrist and hang injuries.
answer
ergonomic keyboard
Unlock the answer
question
Some phones use _____, where you press one key on the keypad for each letter in a word and software on the phone predicts the word you want.
answer
predictive text input
Unlock the answer
question
Touch screens that recognize multiple points of contact at the same time are known as _____.
answer
multi-touch
Unlock the answer
question
Architects, mapmakers, designers, artists, and home users create drawings and sketches on a _____.
answer
graphics tablet
Unlock the answer
question
_____ is the computer's capability of distinguishing spoken words.
answer
voice recognition
Unlock the answer
question
_____ allows users to record, compose, mix, and edit music and sounds.
answer
music production software
Unlock the answer
question
RFID is a technology that uses _____ to communicate with a tag placed in or attached to an object, an animal, or a person.
answer
radio signals
Unlock the answer
question
With _____, the computer will detect human motions.
answer
gesture recognition
Unlock the answer
question
Examples of output that primarily contain text-based documents are _____.
answer
letters, reports, and e-mail messages
Unlock the answer
question
_____ uses organic molecules that produce an even brighter, easier-to-read display than standard TFT displays.
answer
OLED
Unlock the answer
question
The _____ is an alternative to DVI that also supports HDMI.
answer
display port
Unlock the answer
question
A CRT monitor's viewable size is the _____ measurement of the actual viewing area provided by the screen in the monitor.
answer
Diagonal
Unlock the answer
question
Ink-jet printer resolution is measured by the number of _____ a printer can print.
answer
dots per inch (dpi)
Unlock the answer
question
The primary disadvantage of multifunctional peripherals is that _____.
answer
if the multifunctional peripheral breaks down, all functions are lost
Unlock the answer
question
A(n) _____ is a touch-sensitive device, resembling a dry-erase board, that displays the image on a connected computer screen.
answer
interactive whiteboard
Unlock the answer
question
_____ is a technology that sends resistance to a device in response to actions of the users.
answer
force feedback
Unlock the answer
question
_____ is the speed with which data, instructions, and information transfer to and from a device.
answer
transfer rate
Unlock the answer
question
Traditionally, hard disks stored data using _____, which aligned the magnetic particles horizontally around the surface of the disk.
answer
longitudinal recording
Unlock the answer
question
A group of two or more integrated hard disks is called a _____.
answer
RAID
Unlock the answer
question
Users subscribe to a cloud storage service to _____.
answer
save time by storing large files instantaneously, allow others to access their files, and store offsite backups of data
Unlock the answer
question
A(n) _____ is a type of storage media that consist of a flat, round, portable disc made of metal, plastic, and lacquer that is written and read by a laser.
answer
optical disk
Unlock the answer
question
_____, technology works with specially coated optical discs to etch labels directly on the disc.
answer
Lightscribe
Unlock the answer
question
On larger computers, tape cartridges are mounted in a separate cabinet called a(n) _____.
answer
tape library
Unlock the answer
question
A _____ card is a credit card, entertainment card, bank card, or other similar card, with a stripe that contains information identifying you and the card.
answer
magnetic stripe
Unlock the answer
question
The ____ chip, which uses battery power, stores configuration information about the computer.
answer
CMOS
Unlock the answer
question
Windows users can increase the size of memory through _____, which can allocate available storage space on removable flash memory devices as additional memory cache.
answer
windows readyboost
Unlock the answer
question
A _____ is a mini-program with minimal functionality that connects to another program or provides information.
answer
Gadget
Unlock the answer
question
When you enter search criteria, instead of looking through every file and folder on the storage medium, the search utility looks through the _____ first to find a match.
answer
Index
Unlock the answer
question
Defragmenting reorganizes the files on a disk so that they are located in _____ access time.
answer
contiguous sectors, which speeds
Unlock the answer
question
_____ is a utility that detects and protects a personal computer from unauthorized intrusions.
answer
windows firewall
Unlock the answer
question
_____ is a program that displays an online advertisement in a banner or pop-up window on webpages, email, or other internet services.
answer
Adware
Unlock the answer
question
A(n) _____ is a program that warns or blocks you from potentially fraudulent or suspicious web sites.
answer
phishing filter
Unlock the answer
question
With _____, users can view message details such as the length of calls and, in some cases, read message contents instead of listening to them.
answer
visual voicemail
Unlock the answer
question
When an online meeting takes place on the web, it is called _____.
answer
a web conference
Unlock the answer
question
A document management system _____.
answer
provides for storage and management of a company's documents
Unlock the answer
question
A _____ is a web application that combines services from two or more sources, creating a new application.
answer
mashup
Unlock the answer
question
_____ are devices that provide a common central connection point for nodes on the network.
answer
hubs and switches
Unlock the answer
question
_____ is a standard, specifically a protocol, that defines how a network uses radio signals to communicate with a tag placed in or attached to an object, an animal, or a person.
answer
RFID
Unlock the answer
question
_____ consist of a single copper wire surrounded by at least three layers.
answer
coaxial cable
Unlock the answer
question
_____ is a service that provides television programs over the cellular network.
answer
mobile TV
Unlock the answer
question
_____ information has an age suited to its use.
answer
Timely
Unlock the answer
question
In some tables, the primary key consists of multiple fields, called a _____.
answer
composite key
Unlock the answer
question
_____ procedures include adding records to, modifying records in, and deleting records from a file.
answer
file maintenance
Unlock the answer
question
A range check _____.
answer
determines whether a number is within a specified range
Unlock the answer
question
All of the following are strengths of the database, except _____.
answer
less complexity
Unlock the answer
question
Because the _____ contains details about data, some call it metadata (meta means more comprehensive).
answer
data dictionary
Unlock the answer
question
Many organizations adopt the _____ policy, where users access privileges are limited to the lowest level necessary to perform required tasks.
answer
principle of least privilege
Unlock the answer
question
The database analyst (DA) _____.
answer
decides on the proper placement of fields
Unlock the answer
question
A _____ is a program that hides in a computer and allows someone from a remote location to take full control of the computer.
answer
Rootkit
Unlock the answer
question
Malware is a term that can be used to describe _____.
answer
rootkits, worms, and back doors
Unlock the answer
question
A _____ is an assault whose purpose is to disrupt computer access to an internet service such as the web or e-mail.
answer
denial of service attack
Unlock the answer
question
_____ involves the examination of computer media, programs, data, and log files on computers, serves, and networks.
answer
digital forensics
Unlock the answer
question
Physical access controls, such as locked doors and windows, usually are adequate to protect against _____.
answer
hardware theft
Unlock the answer
question
A(n) _____ is a programmed formula that the originator of the data uses to encrypt the plaintext and the recipient of the data uses to decrypt the ciphertext.
answer
encryption key
Unlock the answer
question
Some organizations continually review their _____, which is a ratio that measures how much power enters the computer facility, or data center, against the amount of power required to run the computers.
answer
power usage effectiveness (PUE)
Unlock the answer
question
As related to the use of computers, _____ is defined as gaining unauthorized access or obtaining confidential information by taking advantage of the trusting human nature of some victims and the naivety of others.
answer
social engineering
Unlock the answer
question
_____ is a team-driven project management approach, in which a project leader is more of a participant and facilitator than a manager during the project.
answer
extreme project management
Unlock the answer
question
A _____ analyzes the time required to complete a task and identifies the minimum time required for an entire project.
answer
PERT chart
Unlock the answer
question
In larger organizations, users write a formal request for a new or modified information system, which is called a _____.
answer
project request
Unlock the answer
question
During the planning phase the projects that receive the highest priority are those _____.
answer
mandated by management or some other governing body
Unlock the answer
question
A(n) _____ lists a variety of conditions and the actions that correspond to each condition.
answer
decision table
Unlock the answer
question
The purpose of the _____ is to access the feasibility of each alternative solution and then recommend the most feasible solution for the project.
answer
system proposal
Unlock the answer
question
_____ tools are designed to support one or more activities of system development.
answer
computer-aided software engineering (CASE)
Unlock the answer
question
A(n) _____ test is performed by end-users and checks the new system to ensure that it works with actual data.
answer
Acceptance
Unlock the answer
question
_____ are smaller in size than enterprises and typically do not have an international presence.
answer
SMBs
Unlock the answer
question
A centralized approach to information systems usually _____ manageability.
answer
reduces cost of maintenance and increases
Unlock the answer
question
_____ includes several types of applications and technologies for acquiring, storing, analyzing, and providing access to information to help users make more sound business decisions.
answer
business intelligence
Unlock the answer
question
Using statistical analysis, _____ can identify and predict product defects and problems with the company's processes.
answer
quality control software
Unlock the answer
question
The secure connection created between user's computer and a company's network is called a(n) _____.
answer
VPN tunnel
Unlock the answer
question
A(n) _____ is an information system that has existed within the organization for an extended length of time and is relied upon heavily.
answer
legacy system
Unlock the answer
question
Enterprises often use _____ technology to connect ot storage systems at data rates up to Gbps.
answer
fibre channel
Unlock the answer
question
A(n) _____ allows a user to choose specific files to backup, regardless of whether or not the files have changed.
answer
selective backup
Unlock the answer