Info 160 Exam – Flashcards
Unlock all answers in this set
Unlock answersquestion
The connectivity port that uses a standard phone line connection is the modem port.
answer
True
question
Computer systems run at speeds measured in gigahertz.
answer
True
question
Processing is manipulating, calculating, or organizing data into information.
answer
True
question
The central processing unit controls all the functions performed by the computer's other components and processes all the commands issued to it by software instructions.
answer
True
question
________ is the applied science concerned with designing and arranging machines and furniture so that the people using them aren't subjected to an uncomfortable or unsafe experience.
answer
Ergonomics
question
A(n) ________ is a specially designed computer that can perform complex calculations extremely fast.
answer
supercomputer
question
Mainframes are used in situations where complex models requiring intensive mathematical calculations are needed.
answer
False
question
All of the following are names for a flash drive, EXCEPT ________. USB Drive Jump Drive Hard Drive Thumb Drive
answer
Hard Drive
question
RAM is a ________ storage location.
answer
volatile
question
Inkjet printers and laser printers are examples of ________ printers.
answer
nonimpact
question
New technologies pushing the boundaries of printing include ________.
answer
Inkless Printing
question
________ are shortcut keys that you press to perform special tasks; each software application has its own set of tasks assigned to these keys.
answer
Function Keys
question
Data and information are terms that can be used interchangeably
answer
False
question
The four functions of the computer include input, process, output, and ________.
answer
Storage
question
________ computers are specially designed computer chips that reside inside other devices such as your car or the electronic thermostat in your home.
answer
Embedded
question
Which of the following is the largest unit of measure for the size of a computer file?
answer
Petabyte
question
A(n) ________ is an input device that looks like a pen.
answer
Stylus
question
Modern printers feature Bluetooth connectivity technology.
answer
true
question
Podcasts enable you to ________.
answer
deliver audio/video files via RSS.
question
________ use(s) continuous audio and video feeds.
answer
Webcasts
question
The concept of the Internet was developed in response to the ________ War.
answer
Cold
question
Software that enables you to display and interact with text and other media on the Web is a ________.
answer
web browser
question
Wikipedia is a good source for a research paper.
answer
False
question
In the URL http://www.pearsonhighered.com/techinaction, the portion labeled ".com" is the ________.
answer
top-level domain
question
The Internet is the largest computer network in the world.
answer
True
question
All of the following are a type of e-commerce business, EXCEPT ________. C2B B2C C2C B2B
answer
C2B
question
Web 2.0 is classified as the ________.
answer
Social Web
question
When evaluating a Web site, testing the relevancy of a site means checking to see whether the information in the site is current.
answer
True
question
There are virtually no privacy risks in using today's newest social networking sites.
answer
False
question
A ________ is a personal journal posted on the Web.
answer
blog
question
A list of pages within a Web site that you have visited and that usually appears at the top of a page is referred to as a(n) ________.
answer
breadcrumb trail
question
In the URL http://www.pearsonhighered.com/techinaction, the portion labeled "http" is the ________.
answer
protocol
question
E-mails are completely private.
answer
False
question
Multimedia software includes all of the following, EXCEPT ________.
answer
Utility Software
question
The type of software that is best used to create a simple budget is ________.
answer
spreadsheet software
question
A(n) ________ software installation enables you to decide which features you want to install on the hard drive.
answer
custom
question
System software does all of the following, EXCEPT ________. -coordinate instructions between application software and the computer's hardware devices -add graphics and pictures to files -help run the computer -help manage system resources
answer
Add graphics and pictures to files
question
QuickBooks and Peachtree are examples of ________ software.
answer
accounting
question
Another way to obtain software is through ________, where a vendor hosts the software online over the Internet and you do not have to install it on your computer.
answer
open source as a service
question
Moodle and Blackboard are examples of ________.
answer
course management software
question
______ software is the software that helps run the computer and coordinate instructions between the computer and the hardware devices.
answer
System
question
The type of software that is free and available with few licensing and copyright restrictions is known as ________ software.
answer
open source
question
In a spreadsheet, equations that use addition, subtraction, multiplication, and division operators, as well as values and cell references are called ________.
answer
...
question
The appropriate software to use for creating research papers is ________.
answer
word processing software
question
The general software you use to do tasks at home, school, or work is known as ________ software.
answer
application
question
Adobe Photoshop and Corel PaintShop Photo Pro are examples of ________ software.
answer
image-editing
question
All of the following are examples of software suites, EXCEPT ________. -Microsoft Office 2010 -Apple iWork -Apache OpenOffice -Microsoft OneNote
answer
Microsoft OneNote
question
Web-based application software is software that ________.
answer
is stored completely on a Web server instead of your hard drive
question
In databases, information is organized in ________.
answer
tables, records, and fields
question
Software as a Service (SaaS) is a Web-based application.
answer
True
question
A wizard is a systematic guide that walks you through the steps necessary to complete a complicated task.
answer
True
question
The most common compressed digital format is MP3.
answer
True
question
OpenOffice.org is an example of open source software.
answer
True
question
Desktop publishing software enables you to create newsletters and annual reports.
answer
True
question
One of the new capabilities of PowerPoint 2010 enables you to trim video clips without a separate video-editing program.
answer
True
question
Application software helps run the computer and coordinates instructions.
answer
False
question
Microsoft's spreadsheet software is called Calc.
answer
False
question
The location of a file is specified by its ________.
answer
file path
question
C:DocumentsSpring 2012CIS 101Term PaperComputer Technology is an example of a ________.
answer
file path
question
Each device attached to your computer comes with a special program called a ________ that facilitates communication between the device and the OS.
answer
device driver
question
Which utility takes out redundancies in a file to reduce the file size?
answer
File Compression
question
The process of optimizing RAM storage by borrowing hard drive space is called ________.
answer
virtual memory
question
Mac OS X includes a backup utility called ________.
answer
Time Machine
question
Windows 8 is the operating system developed by ________.
answer
Microsoft
question
A(n) ________ is a small program that performs general housekeeping tasks for your computer.
answer
utility program
question
Which of the following was the first widely used operating system installed in personal computers?
answer
MS-DOS
question
The most essential software in your computer system is the ________.
answer
operating system
question
Which of the following is an open source operating system for personal computers?
answer
Linux
question
The ________ is(are) the group of programs that controls how your computer functions.
answer
user interface
question
Errors in computer software are called ________.
answer
bugs
question
If Microsoft Word 2010 is used to create a file, which file extension is added automatically?
answer
.docx
question
The OS enables you to organize the contents of your computer in a hierarchical structure of ________.
answer
...
question
You can use the Windows ________ to check on a nonresponsive program.
answer
Task Manager
question
Match the following terms to their meanings: 1.Task Manager 2.System Restore 3.Disk Cleanup 4.Disk Defragmenter 5.Error-Checking
answer
1.lists all the programs being used and indicated their status. 2.brings system back to a previously stable state. 3.removes unnecessary files from the hard drive. 4.regroups related pieces of files on the hard disk. 5.checks the hard drive for damaged files.
question
Match the following terms to their meanings: 1.open source 2.source code 3.Mac OS 4.platform 5.Windows 8
answer
1.a program that is freely available for developers. 2.lines of instructional computer code 3.Apple operating system 4.combination of processor and operating system. 5.the newest Microsoft OS
question
A ________ is a virus that is triggered on a certain date.
answer
time bomb
question
With regard to computer protection, quarantining is defined as ________.
answer
placing a found virus in a secure area on the hard drive
question
Rules for creating passwords include all of the following, EXCEPT ________. -keep your password a secret -create a hard-to-guess password, with a combination of letters, numbers, and symbols -keep your password written down and stored in any easy-to-remember location -change your password frequently
answer
keep your password written down and stored in any easy-to-remember location
question
Adware and spyware are referred to collectively as ________.
answer
grayware
question
________ floods a computer with requests until it shuts down and refuses to answer any requests for information.
answer
DDoS attack
question
A(n) ________ is the portion of virus code that is unique to a particular computer virus.
answer
Virus signature
question
Which of the following statements about cookies is NOT true? -Some companies sell the personal information found in cookies to other companies. -Cookies are text files. -Cookies help companies determine the traffic flow through their Web site. -Cookies obtain your personal information by searching your hard drive.
answer
Cookies obtain your personal information by searching your hard drive.
question
All of the following are the main functions of antivirus software, EXCEPT ________. -inoculating key files -looking for virus signatures -quarantining viruses -assassinating all viruses
answer
assassinating all viruses
question
________ hackers break into systems for non-malicious reasons such as to test system security vulnerabilities.
answer
White-hat
question
A ________ is a virus that is attached to documents such as Word or Excel files.
answer
macro virus
question
Antivirus software will stop all viruses.
answer
False
question
A worm infects a host file and waits for that file to be executed on another computer to replicate.
answer
False
question
A denial-of-service attack can be used to deny hackers access to a computer system.
answer
False
question
The terms "virus" and "worm" actually mean the same thing.
answer
False
question
Identity theft does NOT cause financial harm to individuals.
answer
False
question
A virus signature is a portion of virus code that is unique to a particular computer virus.
answer
True
question
A time bomb is a virus that is triggered when certain conditions are met such as opening a file.
answer
False
question
Match the following terms to their meaning: 1.CPU 2.RAM 3.ROM 4.LCD 5.QWERTY
answer
1. processes all commands issued by software instructions 2. stores programs and data the computer is currently using 3. holds instructions needed to start up when the computer is powered on 4. type of technology used on flat-screen monitors 5. standard keyboard layout
question
Match the following terms to their definition: 1.WWW 2.browser 3.e-mail 4.Internet 5.search engine
answer
1. the means of accessing information over the Internet 2. an application program used to view the Web 3. electronic communication 4. a large network of networks 5. a tool used to locate information on the Web
question
Match the following terms to their definitions: 1. worm 2. computer virus 3. encryption virus 4. polymorphic virus
answer
1. Attempts to travel between systems through network connections to spread an infection 2. A program that renders your computer files unusable by compressing them 3. A program that attaches itself to another program and attempts to spread itself to other computers through the exchange of files 4. A virus that changes its own code to avoid detection
question
Match the following terms to their definitions: 1.grey-hat hacker 2.black-hat hacker 3.phishing 4.social engineering 5.white-hat hacker
answer
1. flaunts expertise to the administrator of a system 2. An unethical hacker 3. sending an e-mail containing false information to obtain personal information 4. techniques used to manipulate people into performing actions or divulging confidential information 5. an "ethical" hacker
question
What is the free antivirus software available to all VCU students?
answer
Sophos