INFO160 – Flashcards
Unlock all answers in this set
Unlock answersquestion
data
answer
represents a fact, figure, or idea
question
processing
answer
turning data into information
question
information
answer
data organized in a meaningful way
question
software
answer
computer programs
question
hardware
answer
physical components a computer
question
pixel
answer
tiny dot that creates an image on the computer monitor
question
hertz
answer
unit of measure for processor speed
question
bit
answer
0 or 1
question
ppm
answer
measurement of printing speed
question
dpi
answer
measurement of printer resolution
question
web-based
answer
software that is hosted on a website
question
open-source
answer
software code that is freely available
question
project management
answer
software used to track tasks and coordinate resources
question
personal information manager
answer
software used to keep track of appointments
question
proprietary
answer
software which must be purchased
question
kernel
answer
operating system supervisor program
question
spooler
answer
coordinates print jobs
question
paging
answer
the process of swapping data between RAM and a swap file
question
swap file
answer
temporary storage area on the hard drive
question
virtual memory
answer
process of optimizing RAM storage by using hard drive space
question
.pdf
answer
portable document format
question
.jdp
answer
image
question
.html
answer
web page
question
.accdb
answer
microsoft access
question
.zip
answer
compressed files
question
operating system
answer
The two major types of software programs are utility programs and the
question
Desktop
answer
Which of the following are NOT a Window's utility program
question
True
answer
File Explorer is Window's 8 main program to manage files
question
True
answer
Installing a device driver can sometime cause system instability
question
Time Machine
answer
Mac OS X includes a backup utility called
question
in a robotic camera
answer
You are most likely to find an RTOS
question
The location of a file is specified by its
answer
file path
question
Which of the following is the name of a Microsoft Excel file?
answer
?
question
Linux
answer
An example of an open source OS is
question
File names in Windows are case-sensitive
answer
False
question
Internet Explorer
answer
Which of the following is NOT considered to be a utility program?
question
Different versions of the Linux are known as "distros"
answer
True
question
When using a Windows 8 File Explorer, which view provides the most information at a glance?
answer
?
question
Which of the following operating systems are used on most tablets?
answer
Android and IOS
question
OS X is the operating system developed by
answer
Apple
question
The BIOS is activated by turning on the computer
answer
Which of the following is the first step in the boot process
question
worm
answer
attempts to travel between systems through network connections to spread an infection
question
computer virus
answer
program that attaches itself to another program and attempts to spread itself to other computers through the exchange of files.
question
logic bomb
answer
virus that is triggered when a file is opened or program is started a certain number of virus times
question
encryption virus
answer
a program that renders your computer files unusable by compressing them
question
polymorphic virus
answer
virus that changes its own code to avoid detection
question
trojan horse
answer
program that appears to be something useful or desirable
question
pretexting
answer
creating a scenario that sounds legitimate enough that someone will trust you
question
cookie
answer
text file for storing personal preferences pertaining to websites
question
botnet
answer
programs that run on a large number of zombie computers
question
time bomb
answer
virus that is triggered by the passage of time or on a certain date
question
packet filtering
answer
method for selectively allowing certain requests to access ports
question
IP address
answer
a computer's identity on the Internet
question
Firewall
answer
hardware or software for protecting computers from hackers
question
CAPTCHA
answer
program that generates distorted text and require that it be typed into a box
question
geotag
answer
data attached to a photo that indicates when/where the photo was taken
question
Which of the following is the most common audio compression format
answer
MP3
question
Blackboard is an example of ________ software
answer
coures management
question
The intersection of a row and a column in a spreadsheet program is known as a
answer
cell
question
______ software helps you manage e-mail, contacts, calendars, and tasks in the same application
answer
personal information manager
question
Which of the following is true about open source software?
answer
The program can be changed and freely distributed
question
Software that is available on demand via the Internet is called
answer
Softwares as a Service (SaaS)
question
In databases, a category of data is called a
answer
field
question
What is often distributed prior to a final release of software?
answer
beta version
question
When using a spreadsheet the expression =D8-D17 is called a ______
answer
formula
question
________ software helps run the computer and coordinates instructions between other software and the hardware devices
answer
system
question
What is the navigation aid that shows users the path they have taken to get to a web page is located within a website
answer
breadcrumb trail
question
In the URL http://www.microsoft.com/surface, the portion labeled "http" is the_________
answer
protocol
question
When shopping on the web, it is better to pay for your purchase with a debit card rather than a credit card.
answer
False
question
A(n) ________ is installed on your computer, and when the program is opened, your e-mail is downloaded to your computer.
answer
? not e-mail host
question
A ________ allows visitors to add, remove, or edit its content
answer
wiki
question
What web browser feature would be particularly useful when using public computers?
answer
privacy browsing
question
A computer connected to the Internet that asks for data is a ________.
answer
client
question
AND, OR, and NOT are examples of ________ operators.
answer
Boolean
question
All of the following are types of e-commerce business EXCEPT ________.
answer
C2B
question
The web is based on the ________ Protocol.
answer
? not hypertext transmit
question
Which of the following are personal video journal entries posted on the web?
answer
Vlogs
question
Country codes are what part of a URL?
answer
top level domain
question
Podcasts enable you to
answer
deliver audio/video files via RSS
question
A metasearch engine searches other search engines.
answer
True
question
What do you need if you want to read, send, and organize e-mail from any computer connected to the Internet?
answer
a web based e-mail account
question
________ is a professional, business-oriented social networking site.
answer
LinkedIn
question
Which of the following describes an IP address?
answer
All of the above
question
Software that enables you to display and interact with text and other media on the web is a web ________.
answer
browser
question
The internet is ______
answer
a large network of networks
question
Wikipedia is a good reference for a research paper
answer
false
question
The unique address for a particular website is the
answer
URL
question
An attack that renders a computer unable to respond to legitimate users because it is being bombarded with data requests is known as a ______________ attack.
answer
denial-of-service
question
Small text files that some websites automatically store on your computer's hard drive are known as
answer
cookies
question
Software that pretends your computer is infected with a virus to entice you into spending money on a solution is known as
answer
scareware
question
Which tool do hackers use to gain access to and take control of your computer?
answer
the backdoor programs
question
Viruses that compress files and then demand money to restore them are known as
answer
encryption viruses
question
When a hacker steals personal information with the intent of impersonating another individual to commit fraud, it is known as
answer
identity theft
question
A social engineering technique in which you send people an e-mail for the purpose of inducing them into revealing sensitive information is known as
answer
phishing
question
A backup of only the files on your computing device that have been created (or changed) since the last backup is known as a(n)
answer
incremental backup
question
http
answer
protocol that allows files to be transferred from a web server
question
C2C
answer
transactions between two individuals
question
FTP
answer
protocol that allows files to be transferred over the internet
question
B2C
answer
transactions between a company and its customers
question
URL
answer
website address
question
______computers are specifically designed computer chips that reside inside other devices such as a car
answer
embedded
question
Dropbox is an example of _______
answer
cloud storage
question
Computers use _____ language consisting of 0s and 1s
answer
binary
question
Which of these is an example of optical storage media?
answer
DVD
question
Monitor screens are made up of millions of tiny dots known as
answer
pixels
question
The number of pixels displayed on the screen is known as ________.
answer
screen resolution
question
Apple's OS X and Microsoft Windows are examples of ________ software.
answer
operating system
question
All of the following are names for a flash drive EXCEPT ________ drive.
answer
hard drive
question
The ________ contains the central electronic components of the computer.
answer
the motherboard
question
The operating system is a type of application software.
answer
False
question
Which of the following is not an input device?
answer
a laser printer
question
A ________ enables your computer to connect to other computers or to the Internet.
answer
network interface card (NIC)
question
________ is the abbreviation for the place in the computer where the programs and data the computer is currently using are temporarily stored.
answer
RAM
question
Today's CPUs run at speeds measured in kilohertz.
answer
False
question
Which power control option stores data on the hard drive?
answer
Hibernate
question
________ is concerned with the design and arrangement of machines and furniture to avoid uncomfortable or unsafe experiences.
answer
Ergonomics
question
A(n) ________ is where a peripheral device can attach to a computer so that data can be exchanged between it and the operating system.
answer
port
question
Flash drives plug into a(n) ________.
answer
USB port
question
Which of the four major functions of a computer is responsible for manipulating, calculating, and organizing data into information?
answer
processing
question
Data and information are NOT interchangeable terms.
answer
True
question
task manager
answer
lists all the programs being used and indicates their status
question
system restore
answer
brings system back to a previously stable state
question
disk cleanup
answer
removes unnecessary files from the hard drive
question
disk defragmenter
answer
regroups related pieces of files on the hard disk
question
error-checking
answer
checks the hard drive for damaged files
question
Firewalls work by closing ________ in your computer
answer
logical ports
question
A technique that uses illegally obtained about individuals to perform targeted attacks in the hopes of getting then to reveal sensitive information is known
answer
spear phishing
question
Sending emails to lure people into revealing personal information is a technique known as pharming
answer
False
question
Software designed to close logical ports in your computer is known as a
answer
Firewall
question
Ergonomics is an important consideration
answer
for all computing devices
question
The area that holds all of the instructions the computer needs to start up is the RAM
answer
False
question
Today's CPUs run at speeds measured in kilohertz
answer
False
question
Keyboards that display on screen when input of text is required are known as virtual keyboards
answer
true
question
A unidirectional microphone picks up sounds equally well from all directions
answer
False
question
system software
answer
runs the computer
question
application software
answer
used to do tasks
question
commercial software
answer
designed for a specific industry
question
vertical market software
answer
another term for proprietary software
question
software suite
answer
bundled group of software programs
question
RAM
answer
stores programs and data the computer is currently using
question
ROM
answer
holds state up instructions needed when the computer is powered on
question
CPU
answer
processes commands issued by software instructions
question
motherboard
answer
main circuit board containing the central electronic components of a computer
question
system unit
answer
case that houses the electronic components, power source, and storage devices of a desktop computer
question
Which of the following is NOT a common file name extension
answer
.zipped
question
All of the following are terms related to part of the boot process EXCEPT
answer
USB
question
The OS can optimize RAM storage by using
answer
virtual memory
question
Every computer has an operating
answer
True
question
Each device attached to your computer comes with a special program called a(n) ___________ that enables the device and operating system to communicate with each other
answer
device driver
question
Which utility removes redundancies in a file to reduce the file size?
answer
File Compression
question
The __________ of the operating system enables users to communicate with the computer system
answer
user interface
question
You can use the Windows _______ to check on a non responsive program
answer
Task Manager
question
Gaming Consoles, such as Xbox One and Playstation4, do not need an operating system
answer
False
question
zombie
answer
a computer controlled by a hacker
question
rootkit
answer
programs that allow hackers to gain access to your computer without your knowledge
question
spyware
answer
transmits information about you , such as you internet-surfing habits
question
spear phishing
answer
sending e-mails to people to be customers of a company in an effort to get individuals to reveal sensitive data
question
Software that manages "back office" functions such as billing, production, inventory management, and human resources management is called ________ software.
answer
enterprise resource planning
question
Unwanted or unneeded software included by manufacturers on new computers is called ________.
answer
bloatware
question
When using a spreadsheet, SUM in the expression =SUM(B10:B16), is called a(n) ________.
answer
function
question
When you buy software, you then own it and can do anything you'd like with it, including giving it to friends to install on their machines.
answer
False
question
A(n) ________ software installation installs all the most commonly used files to your computer's hard drive.
answer
full
question
Software that enables you to display and interact with text and other media on the web is a web ________.
answer
browser
question
The Internet was created to provide:
answer
both A and B (a secure form of communications/a common communications means for all computers)
question
When shopping on the web, it is better to pay for your purchase with a debit card rather than a credit card.
answer
False
question
Silverlight, Flash Player, and QuickTime Player are examples of software programs called ________.
answer
Plug-Ins
question
Which is NOT an event associated with the beginning of the Internet?
answer
Amazon.com was one of the first websites on the internet
question
Podcasts enable you to ________.
answer
deliver audio/video files via RSS
question
When using the Internet for research, you
answer
should evaluate sites for bias and relevance
question
The "s" in HTTPS stands for secure and indicates that the secure sockets layer protocol has been applied to the website.
answer
true
question
The "s" in "https" stands for ________ socket layer.
answer
secure