CS 101 study guide test 1 (first 35) – Flashcards

Unlock all answers in this set

Unlock answers
question
1)Being ________ means being familiar enough with computers that you understand their capabilities and limitations. A)computer competent B)computer literate C)computer savvy D)technology literate
answer
B)computer literate
question
2)Unwanted e-mail is called ________. A)adware B)spam C)software D)spyware
answer
B)spam
question
3)Which of the following is NOT necessarily part of being computer literate? A)protecting your privacy B)being able to build a computer C)avoiding hackers and viruses D)using the Internet wisely
answer
B)being able to build a computer
question
4)________ is a field of study focused on information handling and retrieval of information automatically. A)RFID B)Database mining C)Computer forensics D)Information technology
answer
D)Information technology
question
5)The process of searching huge amounts of data with the hope of finding a pattern is called ________. A)data searching B)data retrieval C)data mining D)data warehousing
answer
C)data mining
question
6)________ is a wearable device that hangs around your neck consisting of a camera, a projector, and a mirror that can communicate with the Internet over wireless Bluetooth technology. A)FastSCAN B)ESP C)Data mining D)SixthSense
answer
D)SixthSense
question
7)When a job is sent to other countries, as many programming jobs have been, it is said to have been ________. A)offshored B)resourced C)imported D)exported
answer
A)offshored
question
8)Many online courses are designed to use management software like ________ so that students can communicate outside of class, take quizzes online, and find their class materials easily. A)Blackboard or Moodle B)CAD or Visio C)Adobe Photoshop D)Microsoft Access
answer
A)Blackboard or Moodle
question
9)The ability to recover and read deleted or damaged files from a criminal's computer is an example of a law enforcement specialty called ________. A)RFID simulation B)robotics C)HALO animation D)computer forensics
answer
D)computer forensics
question
10)________ tags, when placed on a car, can be used to record and track in a database all of the vehicle's movements. A)POS B)RFID C)PPS D)GPS
answer
B)RFID
question
11)The goal of ________ is to provide solutions to physical problems, such as providing sight to the blind. A)3D animations B)biomedical chip research C)computer forensics D)RFID technology
answer
B)biomedical chip research
question
12)One potential application of ________ is to provide sight to the blind. A)VeriChips B)RFID tags C)patient simulators D)biomedical chip implants
answer
D)biomedical chip implants
question
13)By studying the data produced by ________, scientists hope to improve the prediction of weather phenomena. A)simulations B)VeriChips C)PSSs D)GPS
answer
A)simulations
question
14)________ computing relates to emotion or deliberately tries to influence emotion. A)Affective B)Emotional C)Personal D)Psychological
answer
A)Affective
question
15)As engineers work to create computers that can understand us emotionally, ________ are also evolving toward a more human appearance. A)affecting computing techniques B)computer systems C)RFIDs D)ESP systems
answer
B)computer systems
question
16)The emotional-social prosthesis (ESP) device, developed by a group at the MIT Media Lab, is targeted at helping people who have ________. A)paralysis B)diabetes C)brain damage D)autism
answer
D)autism
question
17)The difference between people with access to computers and the Internet and those without this access is known as the ________. A)digital divide B)broadband divide C)Web divide D)Internet divide
answer
A)digital divide
question
18)The Microsoft Authorized Refurbisher program supports refurbishers by allowing ________ to be installed for free on refurbished systems. A)certain gaming software packages B)certain Microsoft operating systems and Office software C)antivirus software D)specific operating system utilities
answer
B)certain Microsoft operating systems and Office software
question
19)Children who do not have access to ________ and ________ won't be prepared for future employment. A)television, video games B)information, data C)databases, data mining D)the Internet, computers
answer
D)the Internet, computers
question
20)________ is the gathering together of groups of people using online tools to connect and exchange ideas. A)Information technology B)Social networking C)Affective computing D)Collaborative consumption
answer
B)Social networking
question
21)A crisis mapping tool such as ________ can collect information to make instantly and publicly available for use in emergencies. A)The Witness Project B)Data mining C)Ushahidi D)Google Earth
answer
C)Ushahidi
question
22)The Witness Project uses the power of video and a grassroots movement to advocate for ________. A)human rights B)computer literacy C)social networking D)responsible citizenship
answer
A)human rights
question
23)The ________ is a strategic plan to focus on the young, talented, mathematical minds of Africa. A)Childhood Walk B)National Research Council C)Next Einstein Initiative D)Future Civic Media
answer
C)Next Einstein Initiative
question
24)One proposed answer to close the digital divide is to promote ________ as a means for low-income families to access the Internet. A)mobile devices B)Nintendo Wii C)social networking D)affective computing
answer
A)mobile devices
question
25)________ is described as the ability of the world's populace to volunteer and collaborate on large projects. A)Collaborative consumption B)Creative surplus C)Social networking D)Affective computing
answer
B)Creative surplus
question
26)The ________ lets information be created, distributed, and filtered by users themselves in real time. A)Virtual Choir B)Childhood Walk C)Mobile bridge D)DYTHR project
answer
D)DYTHR project
question
27)A technology named ________ lets any piece of print in the real world host a live link to online information and video content. A)crowdsourcing consumer checking B)quick response codes C)ShopSavvy scanning barcodes D)marketing response codes
answer
B)quick response codes
question
28)Joining together as a group to use a specific product more efficiently is called ________. A)social networking B)creative surplus C)affective computing D)collaborative consumption
answer
D)collaborative consumption
question
29)People who are ________ make the Internet a powerful tool and know how to find the information that they want effectively. A)computer efficient B)computer productive C)computer literate D)technologically informed
answer
C)computer literate
question
30)Being computer savvy means you ________. A)are able to maintain, upgrade, and troubleshoot your computer B)use the Internet and Web wisely C)avoid hackers and viruses D)do all of the above
answer
D)do all of the above
question
31)________ displays use organic compounds that produce light when exposed to an electric current. A)CRT B)LCD C)OLED D)LED
answer
C)OLED
question
32)Which of the following is NOT one of the four major data processing functions of a computer? A)gathering data B)processing data into information C)storing the data or information D)analyzing the data or information
answer
D)analyzing the data or information
question
33)________ is data that has been organized or presented in a meaningful fashion. A)A symbol B)A number C)Information D)A character
answer
C)Information
question
34)Computers gather data, which means that they allow users to ________ data. A)store B)present C)output D)input
answer
D)input
question
35)The ________ language consists of just two digits: 0 and 1. A)binary B)application C)base 10 D)data processing
answer
A)binary
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New