BCCC CISC110 Final
Which of the following would NOT be a recommended place to back up or copy computer files?
***Internal hard drive DVD External Drive Flash Drive
Which is NOT a file extension used by Microsoft Office programs?
.rtf ***.pff .docx .pptx
A binary code using eight bits has ________ different possible combinations.
256
Which operator is used to return results that includes two specific words?
AND
program stored on a chip on the motherboard that starts up the computer
BIOS
chip that stores settings for computer start-up
CMOS
________ computers offer the most speed, power, and upgradability for the lowest cost.
Desktop
Which operating system is specialized and can run on simple hardware?
Embedded
________ computers are present in such diverse applications as gasoline pumps, home appliances, and traffic lights.
Embedded
The backbone of the Internet is composed of numerous Internet ________ Points around the world.
Exchange
transfers files between computers
FTP
256 bits equal one byte T/F
False
A DBMS will define a data type for you by evaluating the data currently entered into the fields. T/F
False
A decision support system is made up of a knowledge base and an inference engine. T/F
False
Cloud backup is generally more limited than cloud storage. T/F
False
Mainframes are computer systems that perform complex mathematical calculations, such as those used in weather forecasting. T/F
False
NIC stands for network input card T/F
False
Pixels store the colors red, green, and black. T/F
False
The information processing cycle consists of five stages: input, processing, retrieval, storage, and output. T/F
False
The speed at which the processor executes the cycles is known as a CPU's clock cycle T/F
False
Today's processor speeds are measured in ________.
GHz
________ contains the tasks and dates for a project and shows the schedule and progress of the project in a graphic.
Gantt Chart
________ is the authoring language that defines the structure of a webpage
HTML
language used to display information on the web
HTML
What project was coordinated by the U.S. Department of Energy and the National Institutes of Health.
Human Genome Project
Wi-Fi networks used in homes and public hotspots use the ________
IEEE 802.11 standards
Which is NOT an advantage of using a cloud storage service?
It keeps your backups at a different location. It is faster than other backup options. It can be set to backup files automatically. It is easy to set up.
MP3 stands for ________.
MPEG-1 Audio Layer 3
Fourth-generation computers used ________
Microprocessors
predicts the growth of integrated circuitry
Moore's Law
The smallest type of notebook computer is a ________, which is designed primarily for accessing the Internet.
Netbook
When the Internet backbone was privatized, five large ________ Access Points made up the new backbone.
Network
________ provides the user with an interface to communicate with the computer's hardware.
Operating system software
network that does not require a network operating system
P2P
allows easy addition of new hardware to a computer system
PnP
To share files with other users of the same computer using macOS, you would place them in the ________ folder.
Public
volatile memory
RAM
non-volatile memory
ROM
sends email
SMTP
________ involves the delivery of applications - web apps - over the Internet.
SaaS
ensures that all packets are transmitted reliably
TCP
.com is an example of a ________.
TLD
Which statement about vacuum tubes is NOT accurate?
They are similar to light bulbs. They were used in first-generation computers. They generate a lot of heat when operating. ***They seldom need to be replaced.
Which of the following statements about P2P networks is FALSE?
They can share a printer. All computers are considered equals. ***The services and security are centralized. They can only support a small number of devices
Adding a browser ________ gives you quick access to the features of the application that installed it.
Toolbar
A static HTML page is the simplest form of a webpage. T/F
True
Computers use a base 2 number system and binary codes to carry out commands. T/F
True
Distributed computing that uses a group of computers in one location is called grid computing.
True
Information flows between the components of a computer over wires on the motherboard called data buses T/F
True
It is illegal to remove DRM from a protected file T/F
True
MP3 files use lossy compression to reduce the size of an audio file. T/F
True
Rootkits are very difficult to detect T/F
True
Web mail is an example of SaaS. T/F
True
To protect your computer from adware, you would purchase ________ software.
antispyware
The ________ allows programs to run on computers with different hardware configurations
application programming interface
The ________ allows a program to request a service such as printing from the operating system.
application programming interface (API)
Network speeds are measured in ________ per second.
bits
Businesses should use a ________ network to share resources
client-server
A data ________ defines the fields in a database and the type of data that each field contains.
dictionary
Linux ________ include the OS, various utilities, software applications, and an office suite
distros
An Excel spreadsheet is an example of a(n) ________ database
flat
sets up a file system of a disk
high-level formatting
The fetch-and-execute cycle is also called the ________ cycle
instruction
Third-generation computers are characterized by the use of ________.
integrated circuits
When using a Windows PC, you can use a ________ to organize similar files that are located in different locations.
library
sets up clusters on a disk
low-level formatting
Hard drives store data ________.
magnetically
Clickjacking results in ________
malware posting unwanted links on your Facebook page
Data in a(n) ________ database are stored in data cubes
multidimensional
Wi-Fi that is made available in some cities and towns is known as ________ Wi-Fi.
municipal
When you decide to use your neighbor's open wireless network without permission, you are ________.
piggybacking
Which device uses one or more pens to draw an image on a roll of paper?
plotter
One disadvantage to e-ink technology is that it ________.
requires an external light for night reading
If you want to connect your home network to the Internet, you will need a ________ in addition to a modem.
router
_______ technology is used for sending email messages
store-and-forward
Most home routers also include a built-in ________
switch
The ________ is the logical model of a new system.
system specification report
C++ is an example of a ________-generation language
third
represents the type of website that is visited
top level domain
The ________ is a complex circuit that enables it to act as the brain of the computer.
transistor IC chip vacuum tube ***microprocessor
Second-generation computers used ________
transistors
The difference between a virus and a worm is a ______
virus needs a host file, but a worm does not