Computer Concepts Final Review – Flashcards

Unlock all answers in this set

Unlock answers
question
Computer literacy, also known as digital literacy, involves having a current knowledge and understanding of _____.
answer
computers and their uses
question
_____ is/are a collection of unprocessed items, which can include text, numbers, images, audio, and video.
answer
Data
question
A _____ is a specific type of social networking web site that allows users to create an online photo album and store and share their digital photos.
answer
photo sharing community
question
A _____ is recorded audio stored on a web site that can be downloaded to a computer or portable media player.
answer
Podcast
question
_____ consists of the programs that control or maintain the operations of the computer and its devices.
answer
system software
question
A(n) _____ message is a real-time internet communication, where you exchange messages with other connected users.
answer
Instant
question
Many large companies use the word(s), _____ to refer to the huge network of computers that meets their diverse computing needs.
answer
enterprise computing
question
____ is a system that attempts to initiate the behavior of the human brain.
answer
a neutral network
question
_____ offers high-speed internet connections to devices with built-in compatible technology or computers with wireless modems.
answer
A cellular radio network
question
As with an IP address, the components of a domain name are separated by _____.
answer
Periods
question
_____ combines text-based links with graphics, audio, and video links.
answer
Hypermedia
question
All of the following techniques can be used to improve web searches except _____.
answer
put the most important terms last
question
A _____ is a website that allows users to post short text updates, usually between 100 and 200 characters.
answer
Microblog
question
A(n) _____ is a small version of a larger graphic.
answer
Thumbnail
question
_____ is the process of transferring documents, graphics, and other objects from your computer to a server on the internet.
answer
Uploading
question
_____ is the code of acceptable behaviors users should follow while on the internet.
answer
Netiquette
question
_____ is mass-produced, copyrighted retail software that meets the needs of a wide variety of users, not just a single user or company.
answer
packaged software
question
_____ is a collection of individual programs available together as a unit.
answer
a software suite
question
_____ allows a user to plan, schedule, track, and analyze the events, resources, and costs of a project.
answer
project management software
question
_____ software provides a means for sharing, distributing, and searching through documents by converting them into a format that can be viewed by any user.
answer
document management
question
_____ helps home and small business users create newsletters, brochures, advertisements, postcards, greeting cards, letterhead, business cards, banners, calendars, logos, and web pages.
answer
personal DTP software
question
With _____, you can view, organize, sort, catalog, print, and share digital photos.
answer
photo management software
question
A(n) _____ is an online area where users have written discussions.
answer
newsgroup/message board
question
_____ is the electronic equivalent of a user manual.
answer
online help
question
The processor also is called the _____.
answer
central processing unit (CPU)
question
The _____ is the component of the processor that directs and coordinates most of the operations in the computer.
answer
control unit
question
A processor contains small, high-speed storage locations, called _____, that temporarily hold data and instructions.
answer
Registers
question
Supercomputers use _____ for applications such as artificial intelligence and weather forecasting.
answer
massive parallel processing
question
ROM chips, called _____, contain permanently written data, instructions, or information.
answer
Firmware
question
A(n) _____ is an external device that provides connections to peripherals through ports built into the device.
answer
port replicator
question
A(n) _____, which is an external device that attaches to a mobile computer or device, contains a power connection and provides connection to peripherals; it usually also includes slots for memory cards, optical disc drives, and other devices.
answer
docking station
question
A(n) _____ is a part of the mother-board and connects the processor to main memory.
answer
front side bus
question
A(n) _____ has a design that reduces the change of wrist and hang injuries.
answer
ergonomic keyboard
question
Some phones use _____, where you press one key on the keypad for each letter in a word and software on the phone predicts the word you want.
answer
predictive text input
question
Touch screens that recognize multiple points of contact at the same time are known as _____.
answer
multi-touch
question
Architects, mapmakers, designers, artists, and home users create drawings and sketches on a _____.
answer
graphics tablet
question
_____ is the computer's capability of distinguishing spoken words.
answer
voice recognition
question
_____ allows users to record, compose, mix, and edit music and sounds.
answer
music production software
question
RFID is a technology that uses _____ to communicate with a tag placed in or attached to an object, an animal, or a person.
answer
radio signals
question
With _____, the computer will detect human motions.
answer
gesture recognition
question
Examples of output that primarily contain text-based documents are _____.
answer
letters, reports, and e-mail messages
question
_____ uses organic molecules that produce an even brighter, easier-to-read display than standard TFT displays.
answer
OLED
question
The _____ is an alternative to DVI that also supports HDMI.
answer
display port
question
A CRT monitor's viewable size is the _____ measurement of the actual viewing area provided by the screen in the monitor.
answer
Diagonal
question
Ink-jet printer resolution is measured by the number of _____ a printer can print.
answer
dots per inch (dpi)
question
The primary disadvantage of multifunctional peripherals is that _____.
answer
if the multifunctional peripheral breaks down, all functions are lost
question
A(n) _____ is a touch-sensitive device, resembling a dry-erase board, that displays the image on a connected computer screen.
answer
interactive whiteboard
question
_____ is a technology that sends resistance to a device in response to actions of the users.
answer
force feedback
question
_____ is the speed with which data, instructions, and information transfer to and from a device.
answer
transfer rate
question
Traditionally, hard disks stored data using _____, which aligned the magnetic particles horizontally around the surface of the disk.
answer
longitudinal recording
question
A group of two or more integrated hard disks is called a _____.
answer
RAID
question
Users subscribe to a cloud storage service to _____.
answer
save time by storing large files instantaneously, allow others to access their files, and store offsite backups of data
question
A(n) _____ is a type of storage media that consist of a flat, round, portable disc made of metal, plastic, and lacquer that is written and read by a laser.
answer
optical disk
question
_____, technology works with specially coated optical discs to etch labels directly on the disc.
answer
Lightscribe
question
On larger computers, tape cartridges are mounted in a separate cabinet called a(n) _____.
answer
tape library
question
A _____ card is a credit card, entertainment card, bank card, or other similar card, with a stripe that contains information identifying you and the card.
answer
magnetic stripe
question
The ____ chip, which uses battery power, stores configuration information about the computer.
answer
CMOS
question
Windows users can increase the size of memory through _____, which can allocate available storage space on removable flash memory devices as additional memory cache.
answer
windows readyboost
question
A _____ is a mini-program with minimal functionality that connects to another program or provides information.
answer
Gadget
question
When you enter search criteria, instead of looking through every file and folder on the storage medium, the search utility looks through the _____ first to find a match.
answer
Index
question
Defragmenting reorganizes the files on a disk so that they are located in _____ access time.
answer
contiguous sectors, which speeds
question
_____ is a utility that detects and protects a personal computer from unauthorized intrusions.
answer
windows firewall
question
_____ is a program that displays an online advertisement in a banner or pop-up window on webpages, email, or other internet services.
answer
Adware
question
A(n) _____ is a program that warns or blocks you from potentially fraudulent or suspicious web sites.
answer
phishing filter
question
With _____, users can view message details such as the length of calls and, in some cases, read message contents instead of listening to them.
answer
visual voicemail
question
When an online meeting takes place on the web, it is called _____.
answer
a web conference
question
A document management system _____.
answer
provides for storage and management of a company's documents
question
A _____ is a web application that combines services from two or more sources, creating a new application.
answer
mashup
question
_____ are devices that provide a common central connection point for nodes on the network.
answer
hubs and switches
question
_____ is a standard, specifically a protocol, that defines how a network uses radio signals to communicate with a tag placed in or attached to an object, an animal, or a person.
answer
RFID
question
_____ consist of a single copper wire surrounded by at least three layers.
answer
coaxial cable
question
_____ is a service that provides television programs over the cellular network.
answer
mobile TV
question
_____ information has an age suited to its use.
answer
Timely
question
In some tables, the primary key consists of multiple fields, called a _____.
answer
composite key
question
_____ procedures include adding records to, modifying records in, and deleting records from a file.
answer
file maintenance
question
A range check _____.
answer
determines whether a number is within a specified range
question
All of the following are strengths of the database, except _____.
answer
less complexity
question
Because the _____ contains details about data, some call it metadata (meta means more comprehensive).
answer
data dictionary
question
Many organizations adopt the _____ policy, where users access privileges are limited to the lowest level necessary to perform required tasks.
answer
principle of least privilege
question
The database analyst (DA) _____.
answer
decides on the proper placement of fields
question
A _____ is a program that hides in a computer and allows someone from a remote location to take full control of the computer.
answer
Rootkit
question
Malware is a term that can be used to describe _____.
answer
rootkits, worms, and back doors
question
A _____ is an assault whose purpose is to disrupt computer access to an internet service such as the web or e-mail.
answer
denial of service attack
question
_____ involves the examination of computer media, programs, data, and log files on computers, serves, and networks.
answer
digital forensics
question
Physical access controls, such as locked doors and windows, usually are adequate to protect against _____.
answer
hardware theft
question
A(n) _____ is a programmed formula that the originator of the data uses to encrypt the plaintext and the recipient of the data uses to decrypt the ciphertext.
answer
encryption key
question
Some organizations continually review their _____, which is a ratio that measures how much power enters the computer facility, or data center, against the amount of power required to run the computers.
answer
power usage effectiveness (PUE)
question
As related to the use of computers, _____ is defined as gaining unauthorized access or obtaining confidential information by taking advantage of the trusting human nature of some victims and the naivety of others.
answer
social engineering
question
_____ is a team-driven project management approach, in which a project leader is more of a participant and facilitator than a manager during the project.
answer
extreme project management
question
A _____ analyzes the time required to complete a task and identifies the minimum time required for an entire project.
answer
PERT chart
question
In larger organizations, users write a formal request for a new or modified information system, which is called a _____.
answer
project request
question
During the planning phase the projects that receive the highest priority are those _____.
answer
mandated by management or some other governing body
question
A(n) _____ lists a variety of conditions and the actions that correspond to each condition.
answer
decision table
question
The purpose of the _____ is to access the feasibility of each alternative solution and then recommend the most feasible solution for the project.
answer
system proposal
question
_____ tools are designed to support one or more activities of system development.
answer
computer-aided software engineering (CASE)
question
A(n) _____ test is performed by end-users and checks the new system to ensure that it works with actual data.
answer
Acceptance
question
_____ are smaller in size than enterprises and typically do not have an international presence.
answer
SMBs
question
A centralized approach to information systems usually _____ manageability.
answer
reduces cost of maintenance and increases
question
_____ includes several types of applications and technologies for acquiring, storing, analyzing, and providing access to information to help users make more sound business decisions.
answer
business intelligence
question
Using statistical analysis, _____ can identify and predict product defects and problems with the company's processes.
answer
quality control software
question
The secure connection created between user's computer and a company's network is called a(n) _____.
answer
VPN tunnel
question
A(n) _____ is an information system that has existed within the organization for an extended length of time and is relied upon heavily.
answer
legacy system
question
Enterprises often use _____ technology to connect ot storage systems at data rates up to Gbps.
answer
fibre channel
question
A(n) _____ allows a user to choose specific files to backup, regardless of whether or not the files have changed.
answer
selective backup
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New