BCIS Final

¡Supera tus tareas y exámenes ahora con Quizwiz!

Question 11: The combination of hardware architecture and software design that allows applications to run on your computer is referred to as the

computing platform

Question 22 Chapter 5 explains that for professional publications, desktop publishing software is preferred over word processing software because of its advanced _____ capabilities.

control of text flow around objects

Question 3: Data travels between the components on the motherboard to the CPU and memory over wires called

data buses

Question 23: In Chapter 3, what reason is given for why OLED may replace LCD in the screens of mobile devices?

doesn't require backlighting, making it more energy efficient

Question 21 Chapter 7 lists several reasons why a DoS attack may be launched, including all of the following except

draw attention to cause, embarras company/gov, make demands of company.

Question 8: These are the small programs the OS uses to communicate with devices connected to the computer.

drivers

Question 12: When you use a touch-enabled device, your finger or stylus transmits a(n) _____ signal that is sent to the device's touch processor for interpretation.

electrical signal

Question 24 Macro viruses are viruses that are

embedded in document

Question 11 In a database table, columns are called _____ and rows are called _____.

fields, records

Question 38: Solid state drives (SSDs) use _____ to store information.

flash memory

Question 7: A CPU's clock speed is usually measured in

gigahertz

Question 16 Chapter 4 mentions that Mac computers have been popular with _____ because of their hardware design.

graphic artists

Question 20 Software programs for creating, editing, and manipulating drawings, photos, clip art, and scanned images are called _____ software.

graphics software

Question 3 White hats and black hats are types of

hackers

Question 35 Twitter users use _____ as keywords that can be searched.

hashtags

Question 32 The goal of Google's Android@Home project is to control _____ via an Android device.

household objects

Question 39 When shopping or otherwise doing business online, look for _____ in front of the URL to be sure that the site is secure.

https

Question 13 Apple devices contain three personal information management applications. Which of the following is not one of them?

iCal, Contacts, Mail

Question 29 What is the name of Apple's cloud based operating system?

iCloud

Question 26 Apple devices are packaged with the _____ suite of multimedia applications.

iLife

Question 25 What is the name of Apple's mobile operating system?

iOS

Question 3 What is the name of Apple's productivity suite?

iWork

Question 6: What is the name for the process in which a CPU retrieves, decodes, executes, and stores an instruction?

instruction cycle

Question 26: Which of these devices acts as both an input device and an output device?

interactive whiteboard

Question 31 Chapter 6 explains that blogs are basically _____ posted on a website with the most recent entry at the top of the page.

journals

Question 5: This part of the OS is loaded into RAM when the computer starts and stays there until the computer is powered off.

kernel

Question 37 This type of spyware is sometimes promoted to businesses as a security tool and to parents as a way to monitor their children's online activities.

keystroke loggers

Question 19 ERP software is used for

large scale organizations

Question 17: Debit and credit cards are read by

magnetic strip readers

Question 22 The general term for software that is designed to damage, disable, or steal data is

malware

Question 2: The main circuit board in a computer is called the

motherboard

Question 24: In the discussion of ubiquitous computing in Chapter 1, doctors can track a patient's healing progress via devices fitted with

motion sensors

Question 11: The touchpad on a notebook is used in place of the

mouse

Question 5: What is required for a computer to do parallel processing?

multiple CPUs or multiple cores

Question 37: On Windows computers, hard disk drives are assigned a drive letter; on a Mac computer, they are assigned a

name

Question 28: The device used to connect a computer to a network is called a

network adapter

Question 31 Chrome OS is designed for people who spend most of their computing time

on the web

Question 10 Database management software

organizes and keeps track or large amounts of data

Question 20 In a DoS attack, a network or web server is

overwhelmed with traffic

Question 1: Hardware used for input, output, connectivity, or storage that you plug in or connect to your computer wirelessly is called a _____ device.

peripheral device

Question 32 _____ is similar to phishing except that the individual is tricked into typing in personal information at a phony website.

pharming

Question 31 A message that appears to be from a bank directs the user to click a link and enter his or her account information, which is then used fraudulently. This is known as

phishing

Question 28 Flickr is a popular _____ sharing website.

photo

Question 5 Connecting to someone else's wireless network without their consent is called

piggybacking

Question 24: Resolution refers to the number of picture elements, or _____, that make up the image.

pixels

Question 9: This feature automatically searches for and loads the appropriate driver when a new device is attached to the computer.

plug and play

Question 25: In terms of video display, what does RGB stand for?

red green blue

Question 29 Suppose someone sneaks into your house and unlocks the back door so other criminals can enter and steal your possessions. This is similar to what a _____ does.

rootkit

Question 13: A _____ is a device that uses optical technology to analyze text and/or images and convert them into data that can be used by the computer.

scanner

Question 38 Unsolicited emails sent to a large number of people at the same time is known as

spam

Question 18: Programs like Dragon NaturallySpeaking convert _____ into _____.

speech/input into text and commands

Question 33 Phishing and pharming scams use _____ techniques where a sender's email or IP address is altered to appear to be a trusted source.

spoofing

Question 36 This type of software tracks your online activity without your knowledge.

spyware

Question 28 OneNote allows you to enter hand-written notes on a touch-enabled device via the use of

stylus

Question 17 In social bookmarking, bookmarks are created by _____ a website.

tagging

Question 35 A cookie is a small _____ placed on your computer by a web server.

text file

Question 27: Most receipts you receive from retail stores are printed with a _____ printer.

thermal

Question 22: What is the advantage of a plasma display over an LCD display?

truer color representation

Question 40 What advice is given in Chapter 7 regarding the use of Bluetooth in a crowded public place?

turn off bluetooth

Question 4 When cyber criminals are engaged in war driving, what are they looking for?

unsecured wireless network

Question 9: What is the most common type of port found on today's computers?

usb

Question 30: A USB wireless adapter is sometimes referred to as a

usb dongle

Question 6: The operating system provides a _____, which is the means with which you interact with the computer.

user interface

Question 27 Video clips that spread quickly through forwarded or shared links or through word-of-mouth are referred to as _____ videos.

viral

Question 7: When the OS uses a portion of the hard disk to store data that will not fit into RAM, it is using _____ memory.

virtual memory

Question 18 UNIX is often used for

web servers

Question 19: A _____ is a video camera built into a computer or plugged in as a peripheral.

webcam

Question 15: QR codes are usually used to direct the reading device to a

website

Question 36 A _____ is a website that allows anyone to create and edit content at the website.

wiki

Question 29 Most personal finance software applications allow you to download activity from _____ into the program.

your banking account

Question 4: The instructions for booting a computer are stored

BIOS

Question 26 The company Research in Motion (RIM) developed which of the following mobile operating systems?

Blackberry OS

Question 33 Which of the following blogging sites is owned by Google?

Blogger

Question 22 In Pinterest, you organize a collection of related pictures into a(n)

Board

Question 12 How does LinkedIn differ from Facebook and Google+?

Business/Professional

Question 1: In Chapter 4 you are asked to think of the operating system as

Conductor of a symphony

Question 40 To uninstall a program from your Windows system, you would begin by clicking Programs in

Control Panel

Question 1 The illegal activities involving computers discussed in Chapter 7 are collectively known as

Cybercrime

Question 24 In its discussion of _____, Chapter 6 describes an import utility that will import bookmarks you have saved in your browser.

Delicious

Question 19 In terms of the topics discussed in Chapter 7, DoS stands for

Denial of Service

Question 35 In a Windows operating system, which utility would you use to delete temporary Internet files and files moved to the Recycle Bin?

Disk Cleanup

Question 17 Which of the following is discussed in Chapter 5 as an example of a document management system?

Dokmee

Question 30 How are rootkits different from other kinds of malware?

Don't spread, just control PC

Question 25 Which of the following Adobe applications is a web authoring program?

Dreamweaver

Question 28 What type of operating systems will you find on devices such as ATMs and GPS units?

Embedded OS

Question 10 _____ scrambles communications between devices so that the data is not readable.

Encryption

Question 39 What does EULA stand for?

End User License Agreement

Question 7 What is the name of Microsoft's spreadsheet application?

Excel

Question 6 Can you send private messages on Facebook? If so, how?

Facebook Message tool

Question 33 The file management utility in Windows 8 is called

File Explorer

Question 34 In Mac OS X, file management tasks are handled through the _____ utility.

Finder

Question 8 A _____ is hardware, software, or a combination of hardware and software that blocks unwanted access to your network.

Firewall

Question 17 Chapter 7 lists three things you can do to prevent your computer from becoming a zombie, including 1) using antivirus software, 2) updating the OS regularly, and 3)

Firewall active at all times

Question 37 When files are stored on a disk in groups called clusters, which are sometimes not adjacent to one another on the disk, this is known as

Fragmentation

Question 14 All of the popular social networking sites discussed in Chapter 6 have _____ for use on your smartphone.

Free Mobile Apps

Question 10: What are the two types of user interfaces discussed in Chapter 4?

GUI and command line

Question 26 YouTube is owned by

Google

Question 11 In Google+, you can conduct video chats with this feature.

Hangout

Question 23 Two popular desktop publishing software programs are Adobe's _____ and Microsoft's _____.

InDesign / Publisher

Question 2 Productivity software suites usually include all of the following applications except

Include Word, Excel, Powerpoint, Access.

Question 9 What do firewalls monitor?

Incoming and Outgoing traffic

Question 30 This free photo sharing mobile app allows you add special effects filters.

Instagram

Question 9 What is the name of Apple's presentation software?

Keynote

Question 20: Newer monitors for desktop PCs are usually _____ flatscreens.

LCD

Question 21: This alternative to LCD displays is more expensive but consumes less energy.

LED

Question 19 Which of the following operating systems is open source?

LINUX

Question 29 Scrobbler is the app from this music sharing website.

Last.FM

Question 20 Who created the Linux operating system?

Linus Torvalds

Question 23 The Android mobile OS is based on

Linux

Question 3 Chapter 6 discusses three social networking sites, including all of the following except

Lists Facebook, Google+, LinkedIn

Question 35 Chapter 5 discusses three web-based productivity application suites. Which of the following is not one of them?

Lists Google Drive, Microsoft Web Apps, and Zoho

Question 7 Which of the following physical characteristics is not among those listed in Chapter 7's discussion of how biometric devices can authenticate a user?

Lists: Fingerprint, iris scan, voice recognition.

Question 37 The open source OpenOffice productivity suite has been modified and repackaged under the name

Lotus Symphony

Question 27 Chapter 7 mentions that this type of computer was once considered safe from viruses but is now the focus of new malware.

Macs

Question 27 What is the name of Microsoft's note-taking software?

OneNote

Question 9 Google+ has four default circles. Which of the following is not one of them?

Only Family, Friends, Acquaintances, and Following.

Question 36 Which Microsoft Office application is not available on Microsoft Web Apps?

Only Word, Excel, PowerPoint, and OneNote

Question 19 Three social bookmarking sites are discussed in Chapter 6. Which of the following is not one of them?

Only: Pinterest, StumbleUpon, Delicious.

Question 14 What category of productivity software does Lotus Notes fall into?

PIM

Question 38 When you go to the store and buy a copy of Microsoft Office off the shelf, you have participated in this software distribution model.

Packaged Software

Question 12 Microsoft Outlook is an example of this type of productivity software.

Personal Information Management (PIM)

Question 8 Which type of productivity software is based on the concept of a slide show?

Presentation

Question 16 Which type of productivity software makes heavy use of Gantt charts to display data?

Project Management

Question 30 Which of the following is a popular program used for managing personal finances?

Quicken

Question 36 What is the Mac OS X equivalent of the Windows Disk Cleanup utility?

Repair Disk

Question 14: Server rooms are specially designed and maintained to avoid all of the following except

Rooms maintained to avoid heat, humidity, and dust.

Question 34 When you are using software that is not installed on your computing device, you are using a(n) _____ application.

SAAS

Question 22: In the example discussed in Chapter 1, what aspect of ubiquitous computing is being used in the manufacturing sector?

Selected Answer: a. 3-D printing

Question 22: What is the name of Google's entry in the web browser market?

Selected Answer: a. Chrome

Question 37: Google _____ is the SaaS formerly known as Google Docs.

Selected Answer: a. Drive

Question 10: Which acronym describes a company that provides access to the Internet's infrastructure for a fee?

Selected Answer: a. ISP

Question 11: What company is behind the web browser known as Internet Explorer (IE)?

Selected Answer: a. Microsoft

Question 24: Text messages on mobile devices are sent using a service abbreviated as

Selected Answer: a. SMS.

Question 39: Some web pages contain media content that requires a plug-in, which is also referred to as a(n) _____ or a(n) _____.

Selected Answer: a. add-on; player

Question 30: Think of the CPU as the _____ of the computer.

Selected Answer: a. brain

Question 34: In Chapter 1, Dropbox and Flickr are cited as examples of

Selected Answer: a. cloud storage.

Question 20: A cable modem connects to your cable network using a _____ cable, and from the cable modem to your computer or wireless router using a _____ cable.

Selected Answer: a. coaxial; twisted pair

Question 8: In the URL http://www.census.gov, the top level domain is

Selected Answer: a. gov.

Question 28: Any device used to enter raw data or communicate instructions to the computer is referred to as a(n) _____ device.

Selected Answer: a. input

Question 32: Which of the following is not an example of an output device?

Selected Answer: a. keyboard

Question 12: A _____ is a computer with hardware and software that allows it to link together other computers in order to provide services and share resources.

Selected Answer: a. server

Question 17: The most powerful of all computers is a

Selected Answer: a. supercomputer.

Question 6: Apple's iPad is an example of a(n)

Selected Answer: a. tablet PC.

Question 12: The average speed for 4G devices is often advertised as _____ times faster than 3G.

Selected Answer: b. 10

Question 1: The generation of web pages that allowed people to collaborate and share information with the website are known collectively as Web

Selected Answer: b. 2.0.

Question 16: What is a thin client?

Selected Answer: b. A computer connected to a network that does not store data or software on the local PC.

Question 25: This common plug-in is used to view PDF documents.

Selected Answer: b. Adobe Reader

Question 40: _____ involves the design of equipment and workspace to promote safe and comfortable operation by the individual.

Selected Answer: b. Ergonomics

Question 5: The markup language used to create web pages is known by these initials.

Selected Answer: b. HTML

Question 9: The nonprofit organization in charge of keeping track of the Internet addresses and names all over the world is known by the initials:

Selected Answer: b. ICANN.

Question 14: Which popular plug-in come from Apple?

Selected Answer: b. QuickTime

Question 32: Which web browser is most closely associated with Apple computers and mobile devices?

Selected Answer: b. Safari

Question 18: A supercomputer named _____ at the Lawrence Livermore National Laboratory was named the top supercomputer in the Top 500 list of most powerful computers.

Selected Answer: b. Sequoia

Question 26: Which of the following is not required to connect your PC to the Internet and browse the Web?

Selected Answer: b. a wireless interface card

Question 33: What is a hotspot?

Selected Answer: b. an area where a Wi-Fi network is within range

Question 19: A search phrase enclosed in quotations will return pages where the keywords

Selected Answer: b. are in the same sequence.

Question 38: A software program used to view web pages is referred to as a web

Selected Answer: b. browser.

Question 38: How do smart power strips reduce energy consumption?

Selected Answer: b. by controlling the flow of power to peripheral devices when the main device is not active

Question 23: The discussion of ubiquitous computing in Chapter 1 includes the example of how law enforcement is using iPhone and iPod apps to

Selected Answer: b. collect fingerprints.

Question 6: It is suggested in Chapter 2 that when evaluating content you encounter on the Web, the first thing you should consider is the

Selected Answer: b. domain name in the web address.

Question 40: Buying or selling over the Internet is known by this term.

Selected Answer: b. e-commerce

Question 7: IPv6 uses _____ groups of characters separated by _____.

Selected Answer: b. eight; colons

Question 10: Digital cameras, game consoles, and electronic thermostats are examples of devices that include

Selected Answer: b. embedded computers.

Question 2: All the physical components and devices comprising a computer are referred to as

Selected Answer: b. hardware.

Question 27: The first step in the Information Processing Cycle involves the _____ of data.

Selected Answer: b. input

Question 27: Broadband connectivity speed is usually expressed as

Selected Answer: b. megabits per second (Mbps).

Question 34: To exclude a keyword from the search results, type a(n) _____ in front of it.

Selected Answer: b. minus symbol (-)

Question 36: What does SaaS stand for?

Selected Answer: b. software as a service

Question 9: In Chapter 1, Google's Project Glass eyeglasses are discussed as an example of a(n)

Selected Answer: b. wearable computer.

Question 2: The web pages and resources needed for a website are stored on computers known as

Selected Answer: b. web servers.

Question 39: Computer-related tendonitis usually affects the

Selected Answer: b. wrist.

Question 28: According to Hitwise, the two leading search engines used in June 2012 were

Selected Answer: c. Google and Bing.

Question 31: When a computing device is connected to the Internet, it is assigned a unique address called a(n) _____ address.

Selected Answer: c. Internet Protocol (IP)

Question 19: _____ computing refers to the fact that computing technology is everywhere and is used all the time.

Selected Answer: c. Ubiquitous

Question 13: The computers that connect to a server are called

Selected Answer: c. clients.

Question 25: Technological _____ is the term used to describe the merging of several technologies into a single device.

Selected Answer: c. convergence

Question 3: Which of the following is not considered a mobile computer?

Selected Answer: c. desktop computer

Question 15: Which of the following shows the correct order (fastest average speed to slowest) of the various type of Internet connectivity?

Selected Answer: c. fiber-optic, cable, DSL, satellite

Question 3: Where is satellite Internet access used?

Selected Answer: c. in rural areas where cable or DSL is not available

Question 37: Spiders and crawlers are used by search engines to generate

Selected Answer: c. index entries.

Question 15: Midrange servers used to be known as

Selected Answer: c. mainframes.

Question 21: In the example given in the discussion of ubiquitous computing, a restaurant in California is using a sophisticated computer system to

Selected Answer: c. manage sound levels.

Question 31: The CPU is a silicon chip referred to as the

Selected Answer: c. microprocessor.

Question 26: Characters that are typed or otherwise entered into a computer are called

Selected Answer: c. raw data.

Question 1: A personal computer (PC) is a computer in which the input, processing, and storage are

Selected Answer: c. self-contained.

Question 29: Who provides digital subscriber lines (DSL)?

Selected Answer: c. telephone companies

Question 13: A _____ is a collection of related web pages for one organization or individual.

Selected Answer: c. website

Question 16: The price you pay your ISP for Internet access likely depends on

Selected Answer: c. your connection speed.

Question 21: Which of the following is an example of a metasearch search engine?

Selected Answer: d. Dogpile

Question 23: A network interface card (NIC) is often referred to in computer advertisements as a(n) _____ port.

Selected Answer: d. Ethernet

Question 5: Ultrabooks were originally named by _____ to differentiate them from older, bigger notebooks.

Selected Answer: d. Intel

Question 33: While processing, instructions and data are temporarily stored in

Selected Answer: d. RAM.

Question 18: The function of a Domain Name Server (DNS) is to translate

Selected Answer: d. a URL into an IP address.

Question 17: High-speed Internet access is referred to as

Selected Answer: d. broadband.

Question 29: What does CPU stand for?

Selected Answer: d. central processing unit

Question 35: Accessing software and computing services entirely on the Internet is referred to as _____ computing.

Selected Answer: d. cloud

Question 30: Which part of the URL https:\\www.paypal.com represents the protocol for the page?

Selected Answer: d. https

Question 36: A(n) _____ is two or more computers or other devices that are linked together to share resources and communicate with each other.

Selected Answer: d. network

Question 4: Laptop computers are also referred to as

Selected Answer: d. notebooks.

Question 8: All of the following are examples of mobile devices except

Selected Answer: d. ultrabooks.

Question 4: What is another name for Web 3.0?

Semantic Web

Question 10 In contrast to Facebook, Google+ lets you more easily

Share with certain groups

Question 15 A category of social networking that provides tools with which you can organize, store, and share content with others is known as social

Social Bookmarking

Question 5 The primary uses of this type of application are to organize, calculate, and build charts from numbers.

Spreadsheet App

Question 23 When you join _____, you choose categories for topics that interest you. Then web pages matching those interests are found for you.

StumbleUpon

Question 22 The decline of these two mobile operating systems is cited in Chapter 4 as an example of how the mobile market can change.

Symbian/Nokia & Blackberry/RIM

Question 40 This Windows utility allows you to undo recent changes that may have caused problems in your computer.

System Restore

Question 38 In Mac OS X, the utility used to back up and restore files is called

Time Machine

Question 28 What type of malware disguises itself as a useful program?

Trojan Horse

Question 34 In Chapter 6, these two sites are categorized as microblogging services.

Twitter and Tumblr

Question 17 _____ was designed as a server operating system.

UNIX

Question 2 Using a computer, network, or other resource without permission is generally referred to as

Unauthorized Access

Question 20 Pinterest describes itself as a

Virtual Pinboard.

Question 23 A _____ is a form of malware that once installed on a host computer, can replicate itself and spread to other computers.

Virus

Question 11 Which of the following is the latest security standard for wireless routers?

WPA2

Question 11: Which type of device discussed in Chapter 1 receives inputs from voice commands, hand movements, joysticks, buttons, or touch?

Wearable Computer

Question 38 _____ is a wiki described in Chapter 6; it contains over 140,000 how-to articles.

WikiHow

Question 39 This wiki website provides free images, photographs, and videos.

Wikimedia Commons

Question 37 The area in Wikipedia where users can post a test edit is called the

Wikipedia Sandbox

Question 33 What is the name of Quicken's legal software application?

WillMaker, MyAttorney, Family Lawyer

Question 12: Which of the following operating systems is the most popular?

Windows

Question 13: What is the latest version of Microsoft's operating system?

Windows 8

Question 27 Microsoft's earlier mobile OS, Windows Mobile, was replaced by

Windows Phone

Question 4 Microsoft's and Apple's productivity suites contain word processing applications; Microsoft's is called _____, while Apple's is called _____.

Word, Pages

Question 25 This type of malware is a self-replicating program that requires no action on the part of the user to copy itself to another computer.

Worm

Question 13 An Internet-connected computer that is controlled by a hacker or other cybercriminal without the owner's knowledge is called a _____ computer.

Zombie

Question 5 When you send a friend request in Facebook, the person receiving the request can choose to _____ or _____ it.

accept or ignore

Question 15: Apple uses _____ to designate versions of its Mac OS X family of operating systems.

animal names

Question 1 Updating your family budget or writing a report for school are tasks you would accomplish with the _____ on your computer.

apps/application software

Question 16 Social bookmarking is similar to using the Favorites list in your browser except that the links

are called bookmarkis and saved in social network for access from anywhere and share w/ others

Question 18 Computer-aided design and computer-aided manufacturing programs are most likely to be used by _____ firms.

automotive, construction, manufacturing, and engineering.

Question 26 Worms typically try to

backlog network traffic

Question 8: What does BIOS stand for?

basic input output system

Question 14: _____ scanners are used to read fingerprints, irises, or voice patterns.

biometric scanners

Question 32: The smallest unit of digital data in the binary system is called a

bit

Question 33: A group of eight _____ is called a _____.

bits/byte

Question 32 The collection of all the blogs on the Web is referred to as the

blogosphere

Question 29: This technology gets its name from a 10th century king who united warring countries in Europe.

bluetooth

Question 18 The site icons that allow you to instantly bookmark a page in your social bookmarking tool are called

bookmarklets

Question 2: Starting a computer is called

booting

Question 14 A collection of zombie computers used to conduct an attack on another network is called a

botnet

Question 36: On a Windows system, the hard disk drive is usually assigned the drive letter

c

Question 8 In Google+, the people you interact with are organized into categories called

circles

Question 34 In this technique a button, graphic, or link on a web page appears to be real, but when clicked, causes malicious software to run.

clickjacking

Question 15 Chapter 7 lists three common ways a computer can become infected with software that turns it into a zombie. Which of the following is not one of them?

clicks link, downloads something, visits website.

Question 6 How is data organized in a spreadsheet application?

col/rows/worksheets

Question 3: You are doing a _____ boot if you are turning on a computer that has been shut off.

cold

Question 10: USB 3.0 is approximately _____ times faster than USB 2.0.

10

Question 31 Chapter 5 mentions that in the area of entertainment software, World of Warcraft (WoW) has more that _____ subscribers.

10 million

Question 35: One kilobyte equals _____ bytes.

1000

Question 14: In what year was the first Mac OS released?

1984

Question 1 Social media is a large part of what is meant by Web

2

Question 31: How many possible values are there for the smallest unit of data in a binary system?

2

Question 13 Chapter 6 reports that as of June 2012, individuals are joining LinkedIn at a rate of

2 per second

Question 35: Firefox was originally released in

2004

Question 30 When was the Chrome OS first released?

2009

Question 7 When was Google+ launched?

2011

Question 40: What is the storage capacity of a single-layer Blu-ray disc?

25gb

Question 16: Typically, RFID technology is used to read tags up to _____ feet away.

300

Question 21 According to Experian Hitwise's 2012 report, where does Pinterest rank in the United States in terms of the number of site visits?

3rd behind Facebook and Twitter

Question 16 According to McAfee Threats Reports for early 2012, _____ computers worldwide were infected by botnets.

4-5 million

Question 4 As of June 2012, Facebook reported that it had _____ active users.

955 million

Question 12 Which acronym stands for a written policy describing what users are permitted to do on computing equipment and networks?

Acceptable Use Policy

Question 15 QuickBooks is a popular _____ application used by many small businesses.

Accounting

Question 39 Chapter 4 suggests that for users of Windows 7 and Windows 8, a good place to start when troubleshooting a problem is the

Action Center

Question 21 Which of the following is a popular photo editing software application?

Adobe Photoshop

Question 40 Chapter 6 shows how this company maintains a customer service support page on Facebook.

Amazon

Question 24 This mobile operating system has the biggest market share for mobile devices.

Android

Question 32 This popular game, developed by Rovio, has been downloaded over 1 billion times.

Angry Birds

Question 20: Moore's Law predicts a trend involving

# of transistors in a circuit.

Question 24 Which of the following is a free, open source audio recording and edition software application?

Audacity

Question 25 Chapter 6 categorizes websites such as YouTube, Flickr, and Last.fm as _____ sites.

Media Sharing Sites

Question 7: Handheld computing devices smaller than notebooks are referred to by the general term

Mobile Devices


Conjuntos de estudio relacionados

Analyze the effect of colonial rule on Native American societies in TWO areas of the region.

View Set

Economics Final Exam Defintion Quizlet

View Set

Section 1: Delaware Real Estate Orientation

View Set

RETIREMENT PLANNING: Ch5. Profit Sharing Plans

View Set