COSC 100 – Flashcard

Unlock all answers in this set

Unlock answers
question
________ is the semiconductor material used to make transistors.
answer
Silicon
question
The ________ is the box that contains the central electronic components of the computer.
answer
system unit
question
Which type of software lets you dictate letters, e-mails, and voice commands?
answer
speech recognition software
question
CD ripping refers to ________.
answer
encoding CDs to MP3 format
question
Multimedia software includes all of the following EXCEPT:
answer
utility software.
question
GPS software allows users to ________.
answer
locate restaurants, airports, and points of interest
question
Which type of software helps managers with tasks such as scheduling charts?
answer
project management software
question
Software that does "back office" operations and processing functions such as billing, production, inventory management, and human resources management is called ________.
answer
enterprise resource planning software
question
The special memory storage areas built into the CPU are called ________.
answer
registers
question
Which of the following is an example of discounted software?
answer
educational versions of software
question
Angel and Blackboard are examples of ________.
answer
course management software
question
The ASCII code can represent ________ unique characters.
answer
256
question
In a spreadsheet, the columns and rows form individual boxes called _______.
answer
cells
question
Which type of software stores client information in one central database for use by sales professionals?
answer
customer relationship management software
question
Software designed for a specific industry is known as ________ software.
answer
vertical market
question
The CPU processing cycle has how many steps?
answer
4
question
Unicode uses ________ bits to code character data.
answer
16
question
Microsoft ________ is software that allows students who have Tablet PCs to write their notes directly onto the tablet, using it as an electronic notebook.
answer
OneNote
question
Software you can use to create a budget is called ________.
answer
spreadsheet software
question
Every software program has a set of ________ that specify the minimum recommended standards for the operating system, processor, RAM, and hard drive capacity.
answer
system requirements
question
Custom software, developed to address the needs of a specific company, is known as ________ software.
answer
proprietary
question
Which of the following sequences lists the speed of memory from the fastest to the slowest?
answer
registers, Level 1 cache, Level 2 cache, RAM
question
QuarkXPress and Adobe InDesign are examples of ________ software.
answer
desktop publishing
question
Presentation software includes all of the following features EXCEPT:
answer
formulas.
question
In a spreadsheet, equations you build yourself using values and cell references are called ________.
answer
formulas
question
Microsoft Office and Corel WordPerfect Office are examples of ________.
answer
software suites
question
All of the commands in an instruction set are written in ________ language, which is easier for humans to work with than binary.
answer
assembly
question
An example of software that includes electronic checkbook registers and automatic bill payment tools is ________.
answer
Intuit Quicken
question
Which Microsoft program is used to create technical drawings, map basic block diagrams, and more?
answer
Visio
question
Predesigned forms that provide the basic structure for a particular kind of document are known as ________.
answer
templates
question
The cell address F7 indicates that the cell ________.
answer
is at column F, row 7 of the worksheet
question
Computer-aided design software is used primarily by ________.
answer
engineers to create models
question
The main purpose of the decode stage is for the CPU's ________ to translate program instructions into commands the CPU can understand.
answer
control unit
question
Which type of software is used at colleges to keep track of student records?
answer
database software
question
A(n) ________ software installation allows you to decide which features you want to install on the hard drive.
answer
custom
question
The ________ number system uses the digits 0-9 and the symbols A-F.
answer
hexadecimal
question
QuickBooks and Peachtree are examples of ________.
answer
accounting software
question
Illegally copying an application onto another computer is called ________.
answer
software piracy
question
Microsoft Word and OpenOffice.org Writer are examples of ________.
answer
word processing software
question
The primary benefit of a spreadsheet program is ________.
answer
its ability to automatically recalculate formulas and functions
question
System software does all of the following EXCEPT ________.
answer
add graphics and pictures to files
question
Web-based application software is software that ________.
answer
is stored completely on a Web server instead of your hard drive
question
Software refers to a set of instructions that tells the computer what to do. These instruction sets are called ________.
answer
programs
question
When available, the best way to remove an unwanted software application is to ________.
answer
use the application's uninstall program
question
Software that lets you do tasks at home, school, and work is called ________.
answer
application software
question
Which type of software is used to keep track of appointments, to-do lists, and telephone numbers?
answer
personal information manager (PIM) software
question
Adobe Dreamweaver is an example of ________.
answer
Web page authoring software
question
The collection of commands that a specific CPU executes is called its ________
answer
instruction
question
Which type of software is used to make a slide show?
answer
presentation software
question
Adobe Premiere Pro and Microsoft Live Movie Maker are examples of ________ software.
answer
digital video editing
question
Which file format enables users to share, view, and print any file as long as they have the appropriate program installed?
answer
PDF
question
The organization responsible for rating computer games is the ________.
answer
Entertainment Software Rating Board
question
Software that is distributed for free, but often with the condition that you pay for it if you like and intend to use it, is called ________.
answer
shareware
question
What type of memory stores frequently used instructions or data needed by the CPU?
answer
cache
question
A byte is composed of ________ bits.
answer
8
question
In the URL http://www.prenhall.com, the portion labeled .com is the ________.
answer
top-level domain
question
All of the following are ways to communicate on the Internet EXCEPT:
answer
hyperlinks.
question
The "s" in https stands for ________.
answer
secure socket layer
question
Podcasts enable you to ________.
answer
broadcast over the Internet using compressed audio and video files such as MP3s and MP4s
question
One way to mark a Web site so that you can return to it later without typing the address is to ________.
answer
use Favorites or Bookmarks
question
Which of the following is the desktop search feature in Mac OS X Snow Leopard?
answer
Spotlight
question
If you wanted to keep a written online journal, you would use ________.
answer
a weblog
question
The Internet backbone refers to ________.
answer
the main pathway of high-speed communications lines through which all Internet traffic flows
question
________ is a social networking service that enables you to exchange short text messages with your friends or "followers."
answer
Twitter
question
E-commerce that involves businesses buying and selling goods and services to other businesses is called ________.
answer
B2B
question
Which of the following is similar to the Windows System Properties dialog box and displays hardware and software information on a Mac?
answer
System Profiler
question
Adobe Reader, Flash Player, and QuickTime Player are all examples of special software programs called ________.
answer
plug-ins
question
Which of the following are personal video journal entries posted on the Web?
answer
vlogs
question
Which of the following is a free Web authoring suite?
answer
SeaMonkey
question
The Internet2 is a project ________.
answer
to develop new Internet technologies
question
You can keep track of IM contacts by using a ________.
answer
buddy list
question
The name of the free Internet browser from Mozilla is ________.
answer
Firefox
question
Facebook and MySpace are considered to be ________.
answer
social networking Web sites
question
What protocol allows files to be transferred from a Web server so that you can view them on your computer using a browser?
answer
HTTP
question
Web 2.0 describes ________.
answer
a trend of new Web applications that combine the functionality of multiple applications
question
A(n) ________ is a keyword or term that is assigned to a piece of information such as a Web page, digital image, or video and describes the site so that it can be found again by browsing or searching.
answer
tag
question
A set of programs that searches the Web to find information is called a ________.
answer
search engine
question
Which of the following is most likely to be a popular choice for a broadband Internet connection in a rural area?
answer
satellite
question
The large scale networking (LSN) project is ________.
answer
a U.S. government Internet research project
question
Which of the following is NOT a type of broadband Internet connection?
answer
dial-up
question
Which of the following is an open source operating system?
answer
Linux
question
A Web site that allows anyone to add or edit content is called a ________.
answer
wiki
question
Search engines have which three parts?
answer
a spider, an indexer, and search engine software
question
When building your own computer, which of the following is NOT required?
answer
a router
question
RSS stands for ________.
answer
Really Simple Syndication
question
Instant messaging (IM) services are programs that enable you to ________.
answer
communicate in real time with others who are online
question
The Internet is ________.
answer
a large network of networks
question
The text version of a Web site's Internet address is called the ________.
answer
Uniform Resource Locator (URL)
question
Which of the following is free software to create or edit digital art?
answer
GIMP
question
The World Wide Web was invented by ________.
answer
Tim Berners-Lee at CERN
question
OpenOffice 3 includes all of the following components EXCEPT:
answer
Word.
question
Podcasts use which of the following technologies?
answer
RSS
question
A webcast is ________.
answer
the broadcast of audio or video content over the Internet
question
A list of pages within a Web site that you have visited and that usually appears at the top of a page is referred to as a(n) ________.
answer
breadcrumb trail
question
The concept of the Internet developed from ________.
answer
the Cold War crisis
question
All of the following are examples of multimedia EXCEPT:
answer
text.
question
In the URL http://www.prenhall.com, the portion labeled http is the ________.
answer
protocol
question
Which of the following provides the highest speed Internet connection?
answer
cable
question
The default file format for saving a spreadsheet in Calc is ________.
answer
.ods
question
The advantage of a dial-up Internet connection is ________.
answer
low cost
question
HTTP is the abbreviation for ________.
answer
hypertext transfer protocol
question
All of the following are parts of a URL EXCEPT:
answer
hyperlinks.
question
Webcasts differ from podcasts in that webcasts ________.
answer
are not updated automatically
question
The agency that first began funding the Internet was called the ________.
answer
Advanced Research Projects Agency Network
question
________ microphones pick up sound from only one direction.
answer
Unidirectional
question
Computers gather data, which means that they allow users to ________ data.
answer
input
question
In binary language, each letter of the alphabet, each number, and each special character is made up of a unique combination of
answer
eight bits.
question
Inkjet printers and laser printers are examples of ________ printers.
answer
nonimpact
question
________ is the theory that holds that there is no universal moral truth and that instead there are only beliefs, perspectives, and values.
answer
Relativism
question
After a picture has been taken with a digital camera and processed appropriately, the actual print of the picture is considered ________.
answer
output
question
A ________ is approximately 1 million bytes
answer
megabyte
question
________ computers are specially designed computer chips that reside inside other devices such as your car or the electronic thermostat in your home.
answer
Embedded
question
________ ports are now the most common ports for connecting input and output devices to the computer.
answer
Universal serial bus (USB)
question
________ is a form of permanent memory that holds all the instructions the computer needs to start up.
answer
ROM
question
________ printers have tiny hammer-like keys that strike the paper through an inked ribbon.
answer
Impact
question
Computers process data into information by working exclusively with ________.
answer
numbers
question
The type of monitor that looks like a traditional television set is called a ________ monitor.
answer
cathode-ray tube (CRT)
question
Which of the following is NOT one of the four major data processing functions of a computer?
answer
analyzing the data or information
question
________ is the applied science concerned with designing and arranging things that people use so that the people and things interact most efficiently and safely.
answer
Ergonomics
question
Devices such as monitors and printers that are connected to the computer are called ________.
answer
peripheral devices
question
The ________ contains the central electronic components of the computer.
answer
motherboard
question
________ is a power mode that allows the computer to save an image of the desktop to the hard drive and enter a state of reduced power consumption to save energy.
answer
Hibernate
question
Which of the following is an example of an input device?
answer
a scanner
question
________ software is the set of programs that enables the computer's hardware devices and application software to work together.
answer
System
question
Large, expensive computers that support hundreds of users simultaneously are called ________.
answer
mainframes
question
A(n) ________ enables you to enter data (text, images, and sound) and instructions (user responses and commands) into the computer.
answer
input device
question
All of the following are types of cyberbullying EXCEPT:
answer
calling a co-worker to schedule a meeting
question
________ plug into slots on the motherboard and provide additional functionality for your computer.
answer
Expansion cards
question
Restarting a computer when it is already powered on is called ________.
answer
a warm boot
question
________ are large printers used to produce oversize pictures that require precise continuous lines, such as maps and architectural plans.
answer
Plotters
question
Which of the following ethical philosophies states that decision making should be based on the particular circumstances and not on fixed laws?
answer
situational ethics
question
A ________ is approximately 1 billion bytes.
answer
gigabyte
question
A(n) ________ uses an internal sensor or laser to detect the mouse's movement.
answer
optical mouse
question
The ________ language consists of just two digits: 0 and 1.
answer
binary
question
The hard disk drive is a ________ storage device, meaning that it stores data permanently.
answer
nonvolatile
question
The small, touch-sensitive area at the base of the keyboard on a notebook computer is known as a ________.
answer
touch pad
question
A ________ is a portable computer that features a touch-sensitive screen and handwriting recognition software.
answer
Tablet PC
question
________ is the place in a computer where the programs and data the computer is currently using are stored.
answer
RAM
question
Any computer parts that you can actually touch are considered to be ________.
answer
hardware
question
USB ports are fast replacing traditional ________ ports because of their ability to transfer data quickly.
answer
parallel and serial
question
Intellectual property (such as music, writing, and software) is protected through ________ law.
answer
copyright
question
The ________ port resembles a standard phone jack.
answer
modem
question
A person who does not conform to a set of approved standards of social or professional behavior ________.
answer
commits unethical behavio
question
________ are a form of permanent storage that can be seen and accessed from outside the system unit and are typically used for CD and DVD drives.
answer
External drive bays
question
A ________ enables your computer to connect to other computers or to the Internet.
answer
network interface card (NIC)
question
The ________ is used in combination with other keys to perform shortcuts and special tasks.
answer
Control (Ctrl) key
question
Correct ________ is data that has been organized or presented in a meaningful fashion.
answer
Information
question
Social media sites are about sharing information. The use of this information can raise questions regarding ________.
answer
personal privacy
question
The term "bit" is short for ________.
answer
binary digit
question
The S-video and the ________ ports on a computer facilitate connecting the computer to multimedia devices such as TVs and DVD players.
answer
DVI
question
A(n) ________ is a device that looks like a skinny pen but has no ink.
answer
stylus
question
________ binary digits (or bits) combine to create one byte.
answer
Eight
question
Flash drives plug into a(n) ________.
answer
USB port
question
Monitor screen grids are made up of millions of pixels, with each pixel containing ________ subpixels of colors.
answer
three
question
The term ________ describes computing devices or peripherals that use techniques, parts, and methods from an earlier time that are no longer popular.
answer
legacy technology
question
A(n) ________ is where a peripheral device can attach to a computer so that data can be exchanged between it and the operating system.
answer
port
question
Google restricting its search engine services in China by not allowing search results for sites considered objectionable by the Chinese government is an example of ________.
answer
censorship
question
________ is the set of computer programs that enables the hardware to perform different tasks.
answer
Software
question
RAM is considered volatile storage, which means it is ________.
answer
temporary
question
The ________, housed inside the system unit, regulates the wall voltage to the voltages required by the computer chips.
answer
power supply
question
All the following are examples of input devices EXCEPT a ________.
answer
printer
question
The ________ requires companies to provide mechanisms for employees and third parties to anonymously report complaints, including ethics violations.
answer
Sarbanes—Oxley Act
question
Which personal computer was chosen as "machine of the year" by Time magazine?
answer
IBM PC
question
A ________ is a special device that is installed in your computer and allows it to communicate with other devices on the network.
answer
network adapter
question
Unwanted e-mail is called ________.
answer
spam
question
Which of the following is NOT necessarily part of being computer literate?
answer
being able to build a computer
question
________ is a type of wireless communication that transmits data through radio waves.
answer
Bluetooth technology
question
What was the first word processing application to be used on personal computers?
answer
WordStar
question
Technology no longer protected by copyright, available to everyone, is considered to be ________.
answer
in the public domain
question
The ________ computer had switches on the front of it, which were used to enter data using 0s and 1s.
answer
Altair
question
Many online courses are designed to use management software like ________ so that students can communicate outside of class, take quizzes online, and find their class materials easily.
answer
Blackboard or Moodle
question
The ________, weighing 24.5 pounds, was the industry's first portable computer.
answer
Osborne
question
The goal of ________ is to provide solutions to physical problems, such as providing sight to the blind.
answer
biomedical chip research
question
The ability to recover and read deleted or damaged files from a criminal's computer is an example of a law enforcement specialty called ________.
answer
computer forensics
question
________ is the study of molecules and structures whose sizes range from 1 to 100 nanometers.
answer
Nanoscience
question
Children who do not have access to ________ and ________ won't be prepared for future employment.
answer
the Internet, computers
question
What programming language revolutionized the software industry because beginning students could learn it easily?
answer
BASIC
question
By studying the data produced by ________, scientists hope to improve the prediction of weather phenomena.
answer
simulations
question
The graphical user interface was developed by ________.
answer
Xerox
question
________ tags are small versions of the roadway electronic toll system used in many states to automate paying tolls as motorists pass through the toll station.
answer
RFID
question
Many people believe Grace Hopper's greatest contribution to computing was ________.
answer
the compiler
question
To set up a(n) ________, you must have an appropriate computer and digital devices connected to a home network.
answer
digital home
question
Being ________ means being familiar enough with computers that you understand their capabilities and limitations.
answer
computer literate
question
A ________ is a small device that enables users to carry digital information.
answer
Smartphone
question
________ is a field of study focused on information handling and retrieval of information automatically.
answer
Information technology
question
A ________ is a specially designed scannable sticker that resembles an inkblot and contains all the important information about a UPS package.
answer
MaxiCode
question
________ is the application of computer systems and techniques to gather potential legal evidence.
answer
Computer forensics
question
The Microsoft Authorized Refurbisher program supports refurbishers by allowing ________ to be installed for free on refurbished systems.
answer
certain Microsoft operating systems and Office software
question
Which of the following do today's educators NOT need to be familiar with to create constructive computerized lessons and to interact with students?
answer
Web authoring software
question
Medical students can train on ________ and experience firsthand how a human would react to a particular treatment.
answer
patient simulators
question
One of the reasons the Apple II computer was popular was that ________.
answer
the operating system instructions were stored in ROM
question
________ computing relates to emotion or deliberately tries to influence emotion.
answer
Affective
question
The prefix nano stands for ________.
answer
one-billionth
question
The ________ is a global effort in which bioengineers are creating realistic computer simulations of all systems and features of the human anatomy.
answer
Physiome Project
question
Surgeons use ________ to perform delicate operations by manipulating devices through computers instead of manually.
answer
robotics
question
All of the following are examples of real security and privacy risks EXCEPT:
answer
spam.
question
While engineers work to create computers that can understand us emotionally, ________ are also evolving toward a more human appearance.
answer
computer systems
question
When a job is sent to other countries, as many programming jobs have been, it is said to have been ________.
answer
offshored
question
________ tags, when placed on an animal, can be used to record and track in a database all of the animal's movements.
answer
RFID
question
One type of chip already being implanted in humans as a means of verifying a person's identity is called a(n) ________.
answer
VeriChip
question
One potential application of ________ is to provide sight to the blind
answer
biomedical chip implants
question
A ________ allows you to transfer media from your computer to other media devices (such as a plasma TV).
answer
digital media adapter
question
Which of the following allowed users to interact with the computer more easily?
answer
the graphical user interface
question
The difference between people with access to computers and the Internet and those without this access is known as the ________.
answer
digital divide
question
The first commercial Internet Web browser was developed by ________ in 1995.
answer
Netscape
question
A nanometer is ________.
answer
one-billionth of a meter
question
The emotional-social prosthesis (ESP) device, developed by a group at the MIT Media Lab, is targeted at helping people who have ________.
answer
autism
question
________ is the science revolving around building devices on an extremely small scale.
answer
Nanotechnology
question
________ is the nerve center of any digital home, allowing you to interface with the different digital devices connected to the network.
answer
A computer
question
The process of searching huge amounts of data with the hope of finding a pattern is called ________.
answer
data mining
question
In a Windows folder, to display files and folders as icons in list form, use ________ view.
answer
Tiles
question
The ________ is responsible for managing the processor and all other components of the computer system, and is an essential part of the operating system.
answer
kernel
question
In Windows, a file path starts with a ________.
answer
drive letter
question
In the Windows operating system, the hard drive is represented as the ________.
answer
C Drive
question
The version of Windows 7 that is most appropriate for high-end PC users, gamers, and multimedia professionals is _______.
answer
Windows 7 Ultimate
question
Which of the following would be a name of a Microsoft Access document.
answer
inventory.accdb
question
During the virtual memory process, the operating system moves data to a temporary storage area on the hard drive called the ________ file.
answer
swap
question
A(n) ________ builds Web pages to deploy the materials that the content creators develop.
answer
Web publisher
question
Which of the following is a single-user, multitask operating system?
answer
Mac OS
question
When a U.S. company hires a company outside of the United States, they are using a technique called ________.
answer
offshoring
question
XO-1 is the name of the computer being provided by the ________ project.
answer
One Laptop per Child
question
C:DocumentsSpring 2012CIS 101Term PaperComputer Technology is an example of a ________.
answer
file path
question
All of the following are terms related to part of the boot process EXCEPT:
answer
USB.
question
Microsoft Windows and Mac OS use a ________ interface.
answer
graphical user
question
The process of replacing repeated patterns of letters in a file with a shorter placeholder is called ________.
answer
file compression
question
The ________ of the operating system allows the user to communicate with the computer system.
answer
user interface
question
f you want to automatically defragment your hard drive every week, you can set a predetermined time using the ________.
answer
Task Scheduler
question
Which of the following is the first step in the boot process?
answer
The BIOS is activated by powering on the CPU.
question
The OS allows you to organize the contents of your computer in a hierarchical structure of ________.
answer
directories
question
Which of the following is NOT a function of the operating system?
answer
It manages the removal of spyware.
question
You can use the Windows ________ to check on a nonresponsive program.
answer
Task Manager
question
Some video games require a ________ operating system.
answer
real-time
question
The basic input/output system is stored on a ________ chip.
answer
ROM
question
________ are easy-to-use mini desktop programs that give you information at a glance or quick access to frequently used tools including weather information, calendar items, or games.
answer
Gadgets
question
Which of the following does NOT occur during the power-on self-test?
answer
The OS is moved into RAM.
question
Which of the following is a file compression utility?
answer
WinZip
question
Which of the following is NOT a step in the boot process?
answer
The antivirus program checks all files for viruses.
question
The most essential software in your computer system is the ________.
answer
operating system software
question
Which of the following was the first widely used operating system installed in personal computers?
answer
MS-DOS
question
In Windows, you can create ________ to reset your system in the case of a malfunction.
answer
restore points
question
When an operating system receives an interrupt from the printer and pauses the CPU, it is performing which of the following functions?
answer
processor management
question
The ________ is a program that manages the data between the operating system and all input and output devices attached to the system.
answer
BIOS
question
Which of the following operating systems is used primarily with mainframes as a network operating system?
answer
UNIX
question
Which of the following statements about a graphical user interface is FALSE?
answer
A GUI is a command-driven interface.
question
With Windows Explorer, you can perform all of the following file management actions EXCEPT:
answer
editing files.
question
________ staff the phones, respond to Internet live chat, or respond to e-mail and solve problems for customers or employees, either remotely or in person.
answer
Helpdesk analysts
question
The location of a file is specified by its ________.
answer
file path
question
The ________ contains all of the different configurations used by the OS and by other applications.
answer
registry
question
The combination of operating system and processor in a computer is referred to as a computer's ________.
answer
platform
question
Programmers, systems analysts, project managers, and technical writers are generally considered part of a(n) ________ team.
answer
systems development
question
Before upgrading your OS, you should back up your ________.
answer
data files
question
When a U.S. business hires a third party within the United States to provide services they offer to their customers, it is called ________.
answer
outsourcing
question
The ________ manages the flow of data and information through the computer system by coordinating the hardware, software, user interface, processor, and system memory.
answer
operating system
question
An IT professional working a(n) ________-based job reports for work to the same location each day and interacts with the same people on a regular basis.
answer
office
question
If Microsoft Word 2010 is used to create a file, which file extension is added automatically?
answer
.docx
question
When your computer is in Safe mode, you can use the ________ to view and change the properties of all devices attached to the computer.
answer
Device Manager
question
Real-time operating systems can be found in ________.
answer
scientific instruments
question
Which of the following types of programs help manage system resources such as the hard drive?
answer
utility programs
question
Which of the following statements concerning the Windows Recycle Bin is TRUE?
answer
You can restore files that have been moved to the Recycle Bin.
question
Which of the following Windows utility programs arranges files on your hard drive in sequential order
answer
Disk Defragmenter
question
Mac OS X Snow Leopard includes a backup utility called ________.
answer
Time Machine
question
Which of the following is NOT a degree that prepares students for IT careers?
answer
ACM
question
All of the following can be considered to be network operating systems EXCEPT
answer
Symbian OS.
question
If you want to save a file that will be opened by people who use a wide variety of software, any of the following formats would be safe EXCEPT ________.
answer
.docx
question
In Windows, which character is used as a path separator?
answer
backslash ()
question
Network, database, and Web server administrators are generally considered part of the ________ department.
answer
information systems
question
Each device attached to your computer comes with a special program called a ________ that facilitates communication between the device and the OS
answer
device driver
question
All of the following can be used in a Windows file name EXCEPT:
answer
*.
question
Windows 7 introduces the concept of ________, which are folders that gather files from different locations and display the files as if they were all saved in a single folder.
answer
libraries
question
All of the following are forms of RAM EXCEPT:
answer
XRAM.
question
Which statement pertaining to system reliability is FALSE?
answer
An accumulation of temporary Internet files has no effect on your computer's overall performance.
question
Notebooks are often equipped with a(n) ________ slot that allows you to read flash memory cards such as CompactFlash, Memory Sticks, and Secure Digital cards.
answer
ExpressCard
question
Kernel memory is ________.
answer
RAM memory used by the operating system
question
Moore's Law is a rule that predicts ________.
answer
the pace at which CPUs improve
question
The CPU is connected to the system memory by the ________.
answer
front side bus
question
Windows 7 incorporates ________, which enables you to migrate files and settings from a Windows Vista system to a Windows 7 system via a network connection.
answer
Windows Easy Transfer
question
CPU speed, also called clock speed, is measured in ________.
answer
gigahertz
question
Which of the following statements is true about optical media?
answer
A Blu-ray burner will most likely burn both CDs and DVDs.
question
To make sure your computer performs reliably, you can do all of the following EXCEPT:
answer
increase the front side bus speed.
question
________ provides high-speed information processing by enabling a new set of instructions to start before the previous set has been finished.
answer
Hyperthreading
question
Front side bus speed is measured in ________.
answer
megahertz
question
The control unit is one component of the ________.
answer
CPU
question
The amount of RAM recommended for most systems today is measured in ________.
answer
GB
question
When referring to hard drives, seek time and latency are the two factors that make up ________.
answer
access time
question
A video card is an expansion card installed inside your ________.
answer
system unit
question
The small circuit boards that hold a series of RAM chips are called ________.
answer
memory modules
question
A ________ performs the same kind of computational work that a CPU performs but is specialized to handle 3-D graphics and image and video processing.
answer
GPU
question
Running the Disk Defragmenter utility will ________.
answer
make the hard drive work more efficiently.
question
The CPU consists of which two parts?
answer
the control unit and the arithmetic logic unit
question
On a Windows system, you can determine the amount of RAM by looking in the ________ window.
answer
System Properties
question
Cache memory levels are determined by ________.
answer
the chip's proximity to the CPU
question
The percentage of time your CPU is working is referred to as CPU ________.
answer
usage
question
Each of the following is a computer subsystem EXCEPT the:
answer
data subsystem.
question
Which of the following activities is carried out by the ALU?
answer
completion of all arithmetic calculations
question
Running the Disk Cleanup utility is a quick way to ________.
answer
clear out unnecessary files
question
The amount of RAM that is actually on the memory modules in your computer is the ________ memory.
answer
physical
question
An expansion card that translates binary data into images is a(n) ________.
answer
video card
question
Two types of video memory are ________.
answer
GDDR3 and GDDR5
question
When referring to hard drives, access time is measured in ________.
answer
milliseconds
question
Which is the fastest type of optical drive on the market?
answer
Blu-ray drives
question
Which of the following is NOT a main characteristic associated with desktop computers as compared to notebooks?
answer
A desktop computer is more expensive.
question
All of the following are advantages of notebook computers EXCEPT:
answer
you get more speed for a lower price.
question
Which of the following devices translates electronic data into radio waves?
answer
a transceiver
question
The ________ is the maximum speed at which data can be transmitted between two nodes on a network.
answer
data transfer rate
question
A wireless network uses which of the following as its transmission medium?
answer
radio waves
question
Which of the following UTP cable types is the cheapest and often used in home networks?
answer
Cat 5E
question
Sophisticated networks generally use which of the following hardware devices to ease the flow of data packets throughout the network?
answer
routers and switches
question
Throughput, the actual speed of data transfer that is achieved in a network, is usually ________.
answer
less than or equal to the data transfer rate
question
When setting up a network, you should set up any computers running the Microsoft Windows 7 operating system ________.
answer
first
question
WPA stands for ________.
answer
WiFi Protected Access
question
A(n) ________ allows sharing of a broadband Internet connection.
answer
router
question
Normal telephone wire is ________.
answer
twisted-pair cable
question
Due to the expansion of media files on home computers, ________ options are now being marketed; however, they are not as full featured as their business-world counterparts.
answer
home network server
question
Which of the following devices is needed to share an Internet connection on a wireless network?
answer
a wireless router
question
One way to increase security on a network is by installing a ________.
answer
firewall
question
Most ________ allow you to connect wireless and wired computers to the same network.
answer
wireless routers
question
A ________ is a network located in your home that is used to connect all of your digital devices.
answer
HAN
question
A network that has 10 or more nodes is usually configured as a ________.
answer
client/server network
question
Client/server networks are controlled by a central server that runs a specialized piece of software called ________.
answer
a network operating system (NOS)
question
A(n) ________ keeps track of data packets and, in conjunction with network interface cards, helps the data packets find their destination without running into each other on an Ethernet network.
answer
switch
question
Which of the following is necessary if you want your Ethernet network to connect to the Internet through a DSL or cable modem?
answer
a DSL/cable router
question
Which transmission medium is able to transmit data the fastest?
answer
fiber-optic cable
question
Network adapters ________.
answer
enable nodes in a network to communicate with each other
question
The most common type of home network is ________.
answer
a peer-to-peer (P2P) network
question
Network architectures are classified according to ________.
answer
the way they are controlled and the distance between their nodes
question
The most popular transmission media option for wired Ethernet networks is ________.
answer
The unique number assigned to a network adapter by the manufacturer is referred to as the ________ address.
question
Which of the following is NOT an example of a network node?
answer
a mouse
question
Which of the following is NOT an example of a WAN?
answer
LANs connected in a single building
question
A computer network is defined as two or more computers connected with ________ so that they can communicate with each other.
answer
software and hardware
question
Which of the following network adapters is most likely to be preinstalled in a typical notebook computer today?
answer
both a wireless and wired network adapter
question
Text prediction ________ provide a list of popular words and save typing time when using text messaging.
answer
algorithms
question
Images are a representation of light waves called ________ or continuous waves.
answer
analog
question
Opera Mobile is an example of ________.
answer
a microbrowser
question
SMS delivers messages to the appropriate mobile device using ________ technology.
answer
store-and-forward
question
Which of the following uses radio waves to transmit data signals over short distances and does not need a direct line of sight?
answer
Bluetooth
question
Which of the following statements is NOT true about the JPEG file format?
answer
JPEGs are larger than raw files.
question
A(n) ________ is included in a cell phone to handle the compression of data for it to be quickly transmitted to another phone.
answer
digital signal processor
question
The operating system of a cell phone is stored in ________.
answer
ROM
question
Which of the following describes the number of times an analog wave is measured each second during an analog-to-digital conversion?
answer
sampling rate
question
Web content specially designed for viewing via a cell phone or smartphone is written in a format called ________.
answer
WML (Wireless Markup Language)
question
________ is the use of equipment to provide voice communications over a distance.
answer
Telephony
question
A ________ runs a full-featured operating system and weighs less than two pounds
answer
netbook
question
Which of the following allows you to download and play music with restrictions enforced about its use?
answer
tethered downloads
question
_______ is a form of voice-based Internet communication that turns a standard Internet connection into a means to place phone calls, including long-distance calls.
answer
VoIP
question
________ is a special copyleft license used for software.
answer
GNU
question
Digital formats are descriptions of signals as ________.
answer
a long string of numbers
question
An analog-to-digital converter chip ________.
answer
converts the sound waves from a voice into digital signals
question
The most full-featured and powerful cell phones are put in the category of ________.
answer
smartphones
question
To transfer files from your computer to a portable media player (PMP), most newer PMPs use a ________ port or a FireWire port.
answer
USB 2.0
question
The Apple iPhone uses a version of ________ as an operating system.
answer
Mac OS X
question
________ is a single cable that carries all audio and video information from devices connected to a TV to the TV itself.
answer
HDMI
question
An iPod is an example of a ________.
answer
portable media player (PMP).
question
The newest cell/smartphone displays are ________, which allow bright, sharp imaging and draw less power.
answer
OLED
question
Text messaging is also called ________.
answer
short message service (SMS)
question
Flash memory, used by most MP3 players, is a type of ________.
answer
nonvolatile memory
question
What is Symbian?
answer
An operating system for cell/smartphones.
question
Broadcasting your video to a live audience over the Web is referred to as ________.
answer
webcasting
question
A portable media player can play files with all of the following file extensions EXCEPT ________.
answer
.doc
question
A base transceiver station receives a request for cellular service and passes that request to a central location called a ________.
answer
mobile switching center
question
LogMeIn is an example of a ________.
answer
remote access service for mobile devices
question
Ensuring that two devices, for example, a PC and a cell phone or smartphone, have the same files is the process of ________.
answer
synchronizing
question
Which of the following is the process of sharing files between two or more computers?
answer
peer-to-peer (P2P) sharing
question
Which of the following is specialized software made to display Web pages on a cell phone?
answer
microbrowser
question
MPEG-4, H.264, and DivX are all examples of ________.
answer
codecs
question
All of the following are advantages of VoIP EXCEPT:
answer
reliability.
question
________ floods a computer with requests until it shuts down and refuses to answer any requests for information.
answer
A DDoS attack
question
Which of the following classifications of viruses can change its own code to avoid detection?
answer
polymorphic
question
A(n) ________ virus runs a program that searches for common data files, compresses them, and makes them unusable.
answer
encryption
question
________ is an unwanted piggyback program that usually downloads with software you are installing from the Internet.
answer
Spyware
question
A(n) ________ is the portion of virus code that is unique to a particular computer virus.
answer
virus signature
question
A cyberspace ________ is an attempt to make someone believe something that is untrue.
answer
hoax
question
Which of the following statements about cookies is NOT true?
answer
Cookies obtain your personal information by searching your hard drive.
question
The most likely method a hacker would use to access a computer is ________.
answer
entering through its Internet connection
question
All of the following approaches can be taken to protect your notebook computer from theft EXCEPT:
answer
installing an external hard drive.
question
Which of the following is formally defined as any criminal action perpetrated primarily through the use of a computer?
answer
cybercrime
question
A ________ is a virus that is attached to documents such as Word or Excel files.
answer
macro virus
question
Which of the statements about protecting against power surges is FALSE?
answer
Printers do not require power surge protection.
question
________ is doing non-work-related activities with a computer while you are being paid to do your job.
answer
Cyberloafing
question
A(n) ________ virus temporarily erases its code from the files where it resides and then hides in the computer's active memory.
answer
stealth
question
A ________ works independently of host file execution and is much more active in spreading itself than a virus is.
answer
worm
question
Which of the following is a program that appears to be something useful or desirable but does something malicious in the background?
answer
a Trojan horse
question
A packet sniffer is a program that can enable a hacker to do all of the following EXCEPT:
answer
launch a denial of service (DoS) attack on your computer.
question
Which type of virus was the famous Michelangelo virus?
answer
a time bomb
question
A ________ is a virus that is triggered when certain conditions are met, such as a file opening or starting a program a certain number of times.
answer
logic bomb
question
The purpose of network address translation (NAT) is to ________.
answer
hide user IP addresses from the Internet
question
All of the following can be used for backing up data files EXCEPT:
answer
RAM.
question
Devices that use a unique personal characteristic, such as a fingerprint, in place of a password are called ________ authentication devices.
answer
biometric
question
During the process of ________ the antivirus software records key attributes about the files on your computer and keeps these statistics in a safe place on your hard drive.
answer
inoculation
question
_______ occurs when a hacker takes control of a Bluetooth-enabled device to make phone calls, read phonebook entries, send and receive text messages, and more.
answer
Bluebugging
question
Adware and spyware are referred to collectively as ________.
answer
grayware
question
With regard to computer protection, quarantining is defined as ________.
answer
placing a found virus in a secure area on the hard drive
question
Configuring a firewall to ignore all incoming packets that request access to a specific port is known as ________.
answer
logical port blocking
question
Which of these statements about physically protecting your computer is FALSE?
answer
Power surges can be blocked by using a computer surround.
question
Drive-by downloads occur when ________.
answer
a Web site downloads harmful software onto your computer
question
A computer virus normally attaches itself to another computer program known as a ________.
answer
host program
question
Using a ________, hackers can access and delete all files on your computer, send e-mail, run programs, and do just about anything else you can do with your computer.
answer
backdoor program
question
________ makes broadband users more vulnerable to attacks.
answer
Static addressing
question
Rules for creating passwords include all of the following EXCEPT:
answer
keep your password written down and stored in any easy-to-remember location.
question
Social ________ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information.
answer
engineering
question
Many ________ sold for home use are also configured as firewalls and are capable of performing network address translation (NAT).
answer
routers
question
________ encourages Internet users to reveal sensitive information that could lead to identity theft by sending e-mails that look like they are from legitimate companies but are, in fact, fake.
answer
Phishing
question
Spyware programs that monitor keystrokes with the intent of stealing passwords, login IDs, or credit card information are referred to as ________.
answer
keystroke loggers
question
For complete protection when backing up your files, you should use a program that creates a(n) ________ of your entire system.
answer
image backup
question
A ________ is a secure Internet pathway that large corporations use to protect sensitive data.
answer
VPN
question
You can block logical ports to invaders and make your computer invisible to others on the Internet by installing ________.
answer
a firewall
question
Small Java-based programs are called ________.
answer
Java applets
question
Violations of the strict, precise set of rules that define a programming language are called ________.
answer
syntax errors
question
An alternative approach to systems development, called ________, makes use of a prototype at the beginning of the project.
answer
rapid application development (RAD)
question
Which of the following statements about pseudocode is TRUE?
answer
It is a text-based approach to documenting an algorithm.
question
What is the first step of the system development life cycle?
answer
problem and opportunity identification
question
Which of the following statements about Java is FALSE?
answer
Java can run only on a Windows operating system.
question
To develop Web-based multimedia, Adobe Flash includes a programming language named ________, which is similar to JavaScript in its keywords, operators, and classes.
answer
ActionScript
question
The two main types of decision points are the binary decision and the ________.
answer
loop
question
Translating an algorithm into a programming language is called ________.
answer
coding
question
Which statement does NOT describe fifth-generation languages?
answer
They use a set of short, English-based commands (such as SUB) that speak directly to the CPU.
question
Which phase of the system development life cycle explores the problem in depth and develops program specifications?
answer
analysis
question
Structured Query Language (SQL) is an example of a ________.
answer
ourth-generation language
question
The loop decision point consists of three features: an initial value, a set of actions to be performed, and a(n) ________.
answer
test condition
question
Which phase of the system development life cycle generates a detailed plan for programmers to follow?
answer
design
question
Who is responsible for writing internal documentation for software programs?
answer
technical writers
question
Which language do programmers use if the problem requires a lot of number crunching?
answer
C++
question
________ is the process of translating a task into a series of commands that a computer will use to perform that task.
answer
Programming
question
________ is a text-based approach to documenting an algorithm.
answer
Pseudocode
question
The language that the CPU understands, consisting of a sequence of bits, is called
answer
machine language.
question
Which statement about selecting the right programming language for a project is FALSE?
answer
Programming languages require the same amount of time to execute.
question
Which of the following development environments enables Web sites to talk to each other easily by introducing a standard way for software to interact through Web services?
answer
the .NET framework
question
________ is the instructions programmers have written in a higher-level language.
answer
________ is the instructions programmers have written in a higher-level language.
question
In a ________ system, each step is dependent on the previous step being completed first
answer
waterfall
question
Keywords in a programming language that allow the programmer to redirect the flow of the program based on a decision are called ________.
answer
control structures
question
The process by which program code is converted into machine language is called ________.
answer
compilation
question
What is the final step of the system development life cycle?
answer
maintenance and evaluation
question
A ________ is a visual diagram of a process, including the decisions that need to be made along the way.
answer
flowchart
question
With object-oriented analysis, programmers identify all the categories of input that are part of the problem into
answer
classes.
question
A variable declaration tells the operating system to allocate storage space ________.
answer
in RAM
question
Which language is used for applications that need to collect information from networked computers?
answer
Java
question
Most integrated development environments (IDEs) include a debugger that ________.
answer
helps programmers find logical errors
question
BASIC, FORTRAN, COBOL, C++, and Java are all ________-generation languages.
answer
third
question
Which of the following is taught as the beginning computer language at many colleges and universities?
answer
Java
question
________ enables users to define their own tags and facilitates exchange of information between Web sites.
answer
XML
question
During which phase of the system development life cycle are flowcharts and data-flow diagrams developed?
answer
design
question
Which of the following would NOT be used to build Web sites with interactive capabilities?
answer
Java
question
Which of the following is/are NOT part of a program's problem statement?
answer
pseudocode, or the text-based approach to documenting the algorithm
question
A(n) ________ is a set of specific, sequential steps that describe in natural language exactly what the computer must do to complete its task.
answer
algorithm
question
Which of the following is the first stage of the program development life cycle (PDLC)?
answer
describing the problem
question
The method of algorithm creation used when a programmer breaks down a problem into a series of high-level tasks and continues to break each task into successively more detailed subtasks is called:
answer
top-down design.
question
Decision points consist of binary decisions and ________.
answer
repeating loops
question
Some programmers include scroll bars, title bars, buttons, and menus in a program simply by adding them to a layout through a process called ________ programming.
answer
visual
question
How many steps are there in the system development life cycle?
answer
6
question
In object-oriented programming, ________ allows a new class to automatically pick up all the data and methods of an existing class.
answer
inheritance
question
In object-oriented programming, each object from a given class is described by its ________.
answer
data and methods
question
A(n) ________ error is caught when the program executes.
answer
runtime
question
________, building a small program model, is a form of rapid application development (RAD).
answer
Prototyping
question
PROLOG (PROgramming LOGic) is an example of a ________-generation language.
answer
fifth
question
The binary sequence that instructs the CPU to run the programming code is called a(n) ________.
answer
xecutable program
question
Which of the following statements describes dynamic decision making?
answer
It is the ability of a Web page to decide how to display itself based on choices the reader makes.
question
A ________ is a program that a Web site uses to make information available to other Web sites.
answer
Web service
question
Which of the following is the final stage of the program development life cycle (PDLC)?
answer
implementing the project
question
________ is a powerful programming language used to build a wide range of Windows applications.
answer
Microsoft Visual Basic
question
Creating programs with higher-level programming languages that can be easily moved from one type of computer to another provides ________.
answer
portability
question
Special symbols called tags are used in which of the following languages?
answer
HTML/XHTML
question
In a database, a record is a ________.
answer
group of related fields
question
In a database, a video clip would be stored in a(n) ________ field.
answer
object
question
Which type of database excels in the storage of structured (analytical) data?
answer
relational
question
Nontraditional data such as audio clips, video clips, pictures, and very large documents are called ________.
answer
unstructured data
question
When creating a database with a DBMS, you must create a description of the data called the ________.
answer
data dictionary.
question
In a database, a text field capable of holding complete paragraphs is referred to as a ________ field.
answer
memo
question
Microsoft ________ is a database management system.
answer
Access
question
In a database, a field is a ________.
answer
category of information
question
A data dictionary is also called a ________.
answer
database schema
question
An example of ________ would be customer demographic data purchased from third parties or statistics compiled by the federal government.
answer
external data
question
In a transaction-processing system (TPS), if the TPS database is queried and updated while the transaction is taking place, this is called ________.
answer
real-time processing
question
________ is reordering records in a database.
answer
Sorting
question
Management information systems provide reports that show conditions that are unusual or need attention from users of the system. These reports are called ________.
answer
exception reports
question
A ________ displays a subset of data from a table (or tables) based on the criteria specified.
answer
select query
question
In a database table that stores name and address information, "State" would be an example of a(n) ________.
answer
field name
question
Customer Relationship Management (CRM) software contains sophisticated databases that are designed to ________ and track all interactions with customers.
answer
manage
question
Which of the following is NOT a likely primary key?
answer
street address
question
What does the acronym DBMS stand for?
answer
database management system
question
________ means that for each value in the foreign key of one table, there is a corresponding value in the primary key of another table.
answer
Referential integrity
question
If a college's database maintains a student's major and GPA information in only one place, this is an example of ________.
answer
data centralization
question
A(n) ________ is designed to improve communications and assist employees in accomplishing their daily tasks.
answer
office support system
question
________ is the process of reducing data redundancy by recording data only once.
answer
Normalization
question
A ________ check ensures that the data entered into the database is within a certain range of numbers.
answer
range
question
A ________ check ensures that the data entered into the database is within a certain range of numbers.
answer
range
question
The type of information system that uses model management systems is a(n) ________.
answer
decision support system
question
The ________ indicates what type of data can be stored in a field.
answer
data type
question
A spreadsheet you create in Microsoft Excel that contains the supplies needed to start the semester is an example of a(n) ________.
answer
list
question
Which of the following is NOT a database component?
answer
list
question
In a transaction-processing system, if transaction data is accumulated until a certain point and then many transactions are processed all at once, this is called ________.
answer
batch processing
question
The speech-recognition feature of Microsoft Windows is an example of a ________.
answer
natural language processing (NLP) system
question
When you want to extract data from two or more tables, you use a(n) ________ query.
answer
join
question
To store a Web address, use a(n) ________ field in a database.
answer
hyperlink
question
A ________ relationship indicates that for each record in a table, there is only one corresponding record in a related table.
answer
one-to-one
question
________ helps to ensure data integrity by maintaining information in only one place.
answer
Data centralization
question
Data ________ means that the data contained in a database is accurate and reliable.
answer
integrity
question
If a college keeps two lists, one for registration and one for overdue library books, both containing name and address information, this is an example of data ________.
answer
redundancy
question
A data ________ is a large-scale electronic repository of data that contains and organizes all of an organization's data in one place.
answer
warehouse
question
An individual trained in the design and building of databases is called a database ________.
answer
administrator
question
An expert system and a natural language processing system are both ________.
answer
knowledge-based systems
question
If a numeric field has a size of 7, which is the highest number it can hold?
answer
9999999
question
________ defines the maximum number of characters or numbers that a particular field can hold.
answer
Field size
question
The most commonly used type of database in the market today is the ________ database.
answer
relational
question
In Access, the Simple Query Wizard uses ________ to create a query.
answer
SQL
question
Exception reports and summary reports are part of a(n) ________.
answer
management information system
question
________ is the branch of computer science that deals with the attempt to create computers that think like humans.
answer
Artificial intelligence
question
In a data warehouse, data gathered from sales, billing, and inventory departments are examples of ________ sources.
answer
internal data
question
Which of the following is a reason for creating a list instead of creating a database?
answer
to organize data for simple tasks
question
Unstructured data such as video clips and pictures are known as ________ because of the way they are encoded.
answer
binary large objects (BLOBs)
question
Computational fields are a type of database field used to store ________.
answer
formulas
question
Oracle Database 11g is an example of which type of database?
answer
multidimensional database
question
Classification, affinity grouping, and estimation are ________ methods used by managers to make their data more meaningful.
answer
data mining
question
The ________ is the value that the database uses for the field unless the user enters another value.
answer
default value
question
________ databases can easily be customized to provide information to a variety of users (based on their need) and can process data much faster than pure relational databases
answer
Multidimensional
question
Data in a multidimensional database is organized in a ________ format.
answer
cube
question
A database ________ instructs a database to search for particular pieces of data.
answer
query
question
In a database, ________ fields store numbers used to perform calculations.
answer
numeric
question
Which of the following statements about object-oriented databases is FALSE?
answer
They store data in table format.
question
SQL uses ________ to extract records from a database by using English-like expressions that have variables and operations.
answer
relational algebra
question
A ________ relationship indicates that for a record in one table, there can be many related records in another table.
answer
one-to-many
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New