The connectivity port that uses a standard phone line connection is the modem port.
Computer systems run at speeds measured in gigahertz.
Processing is manipulating, calculating, or organizing data into information.
The central processing unit controls all the functions performed by the computer’s other components and processes all the commands issued to it by software instructions.
________ is the applied science concerned with designing and arranging machines and furniture so that the people using them aren’t subjected to an uncomfortable or unsafe experience.
A(n) ________ is a specially designed computer that can perform complex calculations extremely fast.
Mainframes are used in situations where complex models requiring intensive mathematical calculations are needed.
All of the following are names for a flash drive, EXCEPT ________.
RAM is a ________ storage location.
Inkjet printers and laser printers are examples of ________ printers.
New technologies pushing the boundaries of printing include ________.
________ are shortcut keys that you press to perform special tasks; each software application has its own set of tasks assigned to these keys.
Data and information are terms that can be used interchangeably
The four functions of the computer include input, process, output, and ________.
________ computers are specially designed computer chips that reside inside other devices such as your car or the electronic thermostat in your home.
Which of the following is the largest unit of measure for the size of a computer file?
A(n) ________ is an input device that looks like a pen.
Modern printers feature Bluetooth connectivity technology.
Podcasts enable you to ________.
deliver audio/video files via RSS.
________ use(s) continuous audio and video feeds.
The concept of the Internet was developed in response to the ________ War.
Software that enables you to display and interact with text and other media on the Web is a ________.
Wikipedia is a good source for a research paper.
In the URL http://www.pearsonhighered.com/techinaction, the portion labeled “.com” is the ________.
The Internet is the largest computer network in the world.
All of the following are a type of e-commerce business, EXCEPT ________.
Web 2.0 is classified as the ________.
When evaluating a Web site, testing the relevancy of a site means checking to see whether the information in the site is current.
There are virtually no privacy risks in using today’s newest social networking sites.
A ________ is a personal journal posted on the Web.
A list of pages within a Web site that you have visited and that usually appears at the top of a page is referred to as a(n) ________.
In the URL http://www.pearsonhighered.com/techinaction, the portion labeled “http” is the ________.
E-mails are completely private.
Multimedia software includes all of the following, EXCEPT ________.
The type of software that is best used to create a simple budget is ________.
A(n) ________ software installation enables you to decide which features you want to install on the hard drive.
System software does all of the following, EXCEPT ________.
-coordinate instructions between application software and the computer’s hardware devices
-add graphics and pictures to files
-help run the computer
-help manage system resources
Add graphics and pictures to files
QuickBooks and Peachtree are examples of ________ software.
Another way to obtain software is through ________, where a vendor hosts the software online over the Internet and you do not have to install it on your computer.
open source as a service
Moodle and Blackboard are examples of ________.
course management software
______ software is the software that helps run the computer and coordinate instructions between the computer and the hardware devices.
The type of software that is free and available with few licensing and copyright restrictions is known as ________ software.
In a spreadsheet, equations that use addition, subtraction, multiplication, and division operators, as well as values and cell references are called ________.
The appropriate software to use for creating research papers is ________.
word processing software
The general software you use to do tasks at home, school, or work is known as ________ software.
Adobe Photoshop and Corel PaintShop Photo Pro are examples of ________ software.
All of the following are examples of software suites, EXCEPT ________.
-Microsoft Office 2010
Web-based application software is software that ________.
is stored completely on a Web server instead of your hard drive
In databases, information is organized in ________.
tables, records, and fields
Software as a Service (SaaS) is a Web-based application.
A wizard is a systematic guide that walks you through the steps necessary to complete a complicated task.
The most common compressed digital format is MP3.
OpenOffice.org is an example of open source software.
Desktop publishing software enables you to create newsletters and annual reports.
One of the new capabilities of PowerPoint 2010 enables you to trim video clips without a separate video-editing program.
Application software helps run the computer and coordinates instructions.
Microsoft’s spreadsheet software is called Calc.
The location of a file is specified by its ________.
C:DocumentsSpring 2012CIS 101Term PaperComputer Technology is an example of a ________.
Each device attached to your computer comes with a special program called a ________ that facilitates communication between the device and the OS.
Which utility takes out redundancies in a file to reduce the file size?
The process of optimizing RAM storage by borrowing hard drive space is called ________.
Mac OS X includes a backup utility called ________.
Windows 8 is the operating system developed by ________.
A(n) ________ is a small program that performs general housekeeping tasks for your computer.
Which of the following was the first widely used operating system installed in personal computers?
The most essential software in your computer system is the ________.
Which of the following is an open source operating system for personal computers?
The ________ is(are) the group of programs that controls how your computer functions.
Errors in computer software are called ________.
If Microsoft Word 2010 is used to create a file, which file extension is added automatically?
The OS enables you to organize the contents of your computer in a hierarchical structure of ________.
You can use the Windows ________ to check on a nonresponsive program.
Match the following terms to their meanings:
1.lists all the programs being used and indicated their status.
2.brings system back to a previously stable state.
3.removes unnecessary files from the hard drive.
4.regroups related pieces of files on the hard disk.
5.checks the hard drive for damaged files.
Match the following terms to their meanings:
1.a program that is freely available for developers.
2.lines of instructional computer code
3.Apple operating system
4.combination of processor and operating system.
5.the newest Microsoft OS
A ________ is a virus that is triggered on a certain date.
With regard to computer protection, quarantining is defined as ________.
placing a found virus in a secure area on the hard drive
Rules for creating passwords include all of the following, EXCEPT ________.
-keep your password a secret
-create a hard-to-guess password, with a combination of letters, numbers, and symbols
-keep your password written down and stored in any easy-to-remember location
-change your password frequently
keep your password written down and stored in any easy-to-remember location
Adware and spyware are referred to collectively as ________.
________ floods a computer with requests until it shuts down and refuses to answer any requests for information.
A(n) ________ is the portion of virus code that is unique to a particular computer virus.
Which of the following statements about cookies is NOT true?
-Some companies sell the personal information found in cookies to other companies.
-Cookies are text files.
-Cookies help companies determine the traffic flow through their Web site.
-Cookies obtain your personal information by searching your hard drive.
Cookies obtain your personal information by searching your hard drive.
All of the following are the main functions of antivirus software, EXCEPT ________.
-inoculating key files
-looking for virus signatures
-assassinating all viruses
assassinating all viruses
________ hackers break into systems for non-malicious reasons such as to test system security vulnerabilities.
A ________ is a virus that is attached to documents such as Word or Excel files.
Antivirus software will stop all viruses.
A worm infects a host file and waits for that file to be executed on another computer to replicate.
A denial-of-service attack can be used to deny hackers access to a computer system.
The terms “virus” and “worm” actually mean the same thing.
Identity theft does NOT cause financial harm to individuals.
A virus signature is a portion of virus code that is unique to a particular computer virus.
A time bomb is a virus that is triggered when certain conditions are met such as opening a file.
Match the following terms to their meaning:
1. processes all commands issued by software instructions
2. stores programs and data the computer is currently using
3. holds instructions needed to start up when the computer is powered on
4. type of technology used on flat-screen monitors
5. standard keyboard layout
Match the following terms to their definition:
1. the means of accessing information over the Internet
2. an application program used to view the Web
3. electronic communication
4. a large network of networks
5. a tool used to locate information on the Web
Match the following terms to their definitions:
2. computer virus
3. encryption virus
4. polymorphic virus
1. Attempts to travel between systems through network connections to spread an infection
2. A program that renders your computer files unusable by compressing them
3. A program that attaches itself to another program and attempts to spread itself to other computers through the exchange of files
4. A virus that changes its own code to avoid detection
Match the following terms to their definitions:
1. flaunts expertise to the administrator of a system
2. An unethical hacker
3. sending an e-mail containing false information to obtain personal information
4. techniques used to manipulate people into performing actions or divulging confidential information
5. an “ethical” hacker
What is the free antivirus software available to all VCU students?