CGS1060C (Final Exam)
Which of the following is NOT one of the specifications of wifi technology?
802.11z
Most desktop operating system include a(n) ___ utility that is dedicated to examine and blocking internet traffic.
Firewall
___provide automatically updating information without the need o open an app.
Widgets
___is a set of instructions that directs the computer to perform a variety of asks.
A computer program
Brining your thumb and index together in a pinching motion (for zooming in and out) is an example of :
A gesture
Many trace the internet's history to _____,a network connecting computers at four universities in 1969.
ARPANET
All nodes connect to a wireless___in order to ommunicate wirelessly>
Access point
A(n)____is a series of steps that describes exactly what each portion of a computer program is supposed to do.
Algorithm
All of the cloud applications below would allow you to share and collaborate on documents and lists EXEPT:
Amazon Cloud
The ratio of monitors width to its height is known as the:
Aspect ratio
Devices that add computer-generated information on top of the real world that a user sees offer a(n)_____experience.
Augmented reality
Making copies of important files to the cloud or to an external storage device is known as:
Backing up
Typically measured in Mbps or GBPs,____is the amount of data that can be transmitted over a give amount of time.
Bandwidth
It is common to use____when sending email to large group of people especially if you want to protect the privacy f the recipients' email address.
Bcc
Why are many computers, especially ultraportable ones, using SSDs instead of traditional magnetic hard drives?
Because SSDs are faster and consume less power
Which term refers to the large volumes or data that are constantly being generated by out devices and digital transactions?
Big data
A(n)____input device authenticates you based on patterns or characteristic found in the human body.
Biometric
Which of the following units I represented as an on (1) or off (0) value?
Bit
Adobe Photoshop excels in editing____graphics such as JPGs.
Bitmap
___ servers are typically arranged in a space-saving manner in an enclosure alongside other servers.
Blade
A page or website that contains chronological posts and comments from individuals or organizations is known as a(n):
Blog
With capacities starting at 25 GB, the ______ is the optical media with the most storage.
Blu-Ray disc
Using a short-range wireless technology known as ___, users can make hands-free calls in some cars.
Bluetooth
Which if the following refers to large networks of compromised computers that can be used by a hacker to spread malware, send spam, and conduct carefully orchestrated network attacks?
Botnets
Comunicación speeds between you and your ISP are measured in:
Bps
A(n)______is an error in a computer program.
Bug
which type of software aids architects,engineers,and many others who need to create a digital model of an object?
CAD
Most computers provide a sound subsystem directly on the motherboard and do not require a separate sound ____ for audio output.
Card
With the____ operating system,you will be fully immersed in google's ecosystem.
Chrome
Which of the following types of computers are generally the most affordable, partly because they use google's operating system and they contain very little storage?
Chromebook
___allows you to store your files and use various applications in an online account.
Cloud computing
_____websites,such as kickstart, allows any organization or individual on the general public in exchange for future good or service.
Crowdfunding
Bitcoin is an example of:
Cryptocurrency
The _____ appears on the screen as a blinking vertical line, a small box, or some other symbol to show your place in a document or command line.
Cursor
The____command removes the selected object (or objects) from their current location and places them into the clipboard.
Cut
A popular type of network attack, know as a(n)____ attack, allows hackers to shut down or block access to websites and other network resources by overwhelming them with requests.
DDos
The internet is ____,meaning no single person or group controls it.
Decentralizedq
Which of the following connection types is generally the SLOWEST?
Dial-up
In some operating systems, folders may be referred to as:
Directories
Which part of a URL uniquely identifies a site and a brand on the web?
Domain name
Which type of printer is mst likely to be used by a business that uses carbon-copy forms?
Dot matrix
___can clog cooling system such as fans,which in turn may cause hardware to overheat.
Dust
A(n)_____utility an scramble your data or storage devices to make them unreadable by anyone who doesn't have the proper key.
Encryption
Which keyboards are designed to be comfortable and tailored for the human body?
Ergonomic
_____is a standard for LANs that uses a star topology with twisted-pair cables that plug into the RI45 port located on many devices.
Ethernet
A(n)____ system is a type of information system that perform analytical task traditional done by a human, typically by using i formation contained in a knowledge base.
Expert
Which type of cable consist of a thin strand of glass that transmits pulsating beams of light rather than electric current?
Fiber-optic
A(n) ____is a short, unique sequence of characters located after the file's name that indicate the files type.
File extension
FAT and NTFS are two popular types of:
File system
Many thieves use the temptation of free (illegal) software on ____services to lure individuals into Downloading malware.
File-sharing
The file management tool on a Mac is called:
Finder
Preparing a storage device for use by an operating system is known as:
Formatting
____are discussion boards where individuals can ask questions and reply to each other.
Forums
Today's processor have reached the____mark,capable of processing billions of instructions per second.
GHz
A(n) ____ interface allows users to communicate with their computer via graphical elements on the screen.
GUI
Although____owns androids and manages the stores for apps, it allows manufacture to use and modify this operating for their devices.
Which symbol,which is used to mark keywords or topics in a message,was popularized by Twitter?
Hashtag
Your brower's ____keeps the name and URL of every site you have visited and allows browsers to autocomplete the URL when you type the first few characters.
History
If you smartphone is set up as mobile____.it can offer Wi-Fi access to devices near it.
Hotspot
Which of the following is NOT an example of a "music locker" service?
IHeartRadio
192,168.1.101 is an example of a(n):
IP address
Which software tittle allows users to create works that require complex layouts,such as magazines and newspapers?
InDesign
___ has become one of the most popular mobile apps because they make it easy to add cool effects/filters to photos, and then share those photos and short videos with your friends and followers.
Unlike an email, which can be read by the recipient at anytime,______engage individuals in a live conversation.
Instant messengers
Which of the following choices is NOT a speech recognition programs/assistant?
Intel's Eris
The term ___ refers to "smart" devices that have the ability to connect to wireless networks and the internet.
IoT
Which of the following units is the smallest?
Kilobyte
_____technology changes they way LCD monitors are illuminated.
LED
____is a social network that is designed with a strictly business oriented focus.
Which of the following is an open-source operating system has distribution for both desktops and servers?
Linux
To Protect the data on your mobile devices, set a password,pin, or other security measure on your:
Lock Screen
Which of the following is NOT of the advantages of owing a Mac sited by the author?
Low cost
A(n)___uniquely identifies every network connected device in the world.
MAC address
A(n) ____is a set of software tools that enables managers to gather organize and evaluate information.
MIS
A(n)_____is a huge online course offered for free by a variety of universities, including prestigious ones such as Princeton,Harvard, and MIT.
MOOC
As the largest circuit board in a personal computer, the______ contains a variety of slots, connectors, and plugs for hooking up all the other parts of a computer.
Motherboard
Android pay and Apple Pay rely on ___ to make the smartphone payments in stores.
NFC
Which streaming service often accounts for over 30 percent of all internet traffic in North America?
Netflix
As the largest ___ in the world, the internet connects billions of people and organization.
Network
Which of the following examples for bedded systems was NOT given by the author?
Network servers
___ allow us to communicate and share information between computers.
Networks
___allow users to communicate and share information between computers and various devices.
Networks
Networks use media to carry data from one____,or connection point,to another.
Node
One of the most famous_____licenses is the GNU general public licenses(GPL),which ensure that a particular program and any of its derivatives email free to distribute.
Open source
The purpose of a(n)_____is to manage the flow data between hardware components and allow the user to communicate with the computer.
Operating system
Which software tittle would an employee most likely use to send email, manage contacts, create appointment and set up meetings?
Outlook
The processed results that a computer sends out to you are known as:
Output
____is a model whereby advertisers pay for their ads only when a website visitors clicks on the ad.
Pay-per-click
____is an example of an online payment service that allows you to pay for goods online and transfer fee money to other individuals.
PayPal
Which of the following "new social challenges" was NOT mentioned by the author?
Performing in-class search with a smartphone
___computers are those meant to be used by only one person at a time.
Personal
Which strategy involves luring individuals into entering personal information Aton into a website that is controlled by hackers?
Phishing
A browser___is a separate program that allows your web browser to play several types of multimedia content.
Plug-in
Which type o software enables users to create electronic slideshows that contains a combination of text, images, charts, videos, and other elements?
Presentation
Machines that communicate over a network must follow certain rules or ___, to ensure that the packets are sent, received, and interpreted properly.
Protocols
A(n)___code, which appears as a square filled with dots and lines, is often used to direct a smartphone to open a specific web address.
QR
Which software title would help a business manage all aspects of their company's finances?
QuickBooks
Which type of memory temporarily holds the programs and files that you are actively working on ?
RAM
A(n) ____scanner uses radio frequencies to read the data stored in special tags.
RFID
____is a social news site that encourages users to share links to news and other interesting content they find on the web. It is also famous for hosting AMA sessions.
The wireless access points that are used in homes contain integrated ____,as do the devices that ISPs typically provide for internet connectivity.
Routers
Which of the following is NOT a popular programming language?
SDLC
____system can be incrementally expanded to provide increasing amount of computing power, storage, and/or software when the need arises.
Scalable
The scam referred to as ___typically comes in from of an alert message that claims to be the FBI or your security software.
Scareware
When users type specific keyword into a ____, they will receive an organized list of matching sites, images, and news articles that contains those keywords.
Search engine
Which of these mobile apps/technologies would you use if you wanted to have a live video conversation with another person?
Skype
Services such as ___and microstructure teams includes many real-time communication tools, along with a variety of apps and services, to make it easier for teams to work on projects together.
Slack
The android wear operating system is most commonly found on:
SmartWatches
Apple transformed the ____ market with the release of its revolutionary iPhone in 2007.
Smartphone
Which mobile app became famous for allowing messages and photos to disappear a few seconds after your friend received them?
Snapchat
____is a form of hacking that focuses on deceiving individuals into giving away the information that the thief needs.
Social engineering
One or more computer programs that are packaged together for a unified purpose are known as:
Software
Which type of software is used for entering, calculating,and analyzing sets of numbers?
Spreadsheet
Which type of malware is designed to report activity on your computer to another party?
Spyware
___ are small, affordable devices that can add many "smart" features to almost any TV.
Streaming media players
One of its most powerful features of google maps is___, which shows you almost any part of the map as if you were driving through that street.
Street view
What is the name of he pen-like tool that allows you to tap or write notes on many touchscreen interfaces ?
Stylus
____, used by large organizations such as NASA, are the largest and most powerful computers in the world.
Supercomputers
Which network device roadies multiple ports for connecting node and is aware of the exact address or identity of all the modes attached to it?
Switch
which category of software is created for the operation, maintenance, and security of computer?
System
The main component of a desktop computer is the____, which is the case that house the computer's critical parts, such as the processing and storage devices.
System unit
Many individuals are using _____to turn their computers into DVRs, which allow you to record television shows for future playback.
TV tuners
Which browser feature allows you to have multiple web pages open in one browser window?
Tab browsing
____are often used to back up or archive large of information.
Tape drives
Which of the following statement regarding autonomous vehicles is TRUE?
The ability to park on its own is a feature of many autonomous vehicles
Suppose that a laptop identifies its processor as follows: AMD's A8-4500M. What does the AMD represent ?
The manufacturer
Which of the following is NOT one of the ways freeware developers can make money off their creations?
Trial period
Which type of malware disguises itself as an interesting useful or desirable program in order to gain access to your system?
Trojan horse
Both YouTube and ____have allowed many individuals to earn significant amounts of money for their videos and streams.
Twitch
Apple's MacBook Air is a type of ___ computer.
Ultraportable
Which type of software allows humans to experience realistic environment that are simulated by computers?
Virtual reality
Which type of malware is attached to a hot file has ability to replicate, or copy, itself?
Virus
______translate analog void=ce signals into digital data and uses the internet to transport the data.
VoIP
Which license allows companies to install software on multiple machines?
Volume
A(n)____is the connection of two or more center computers or local area networks,generally across a wide geographical area.
WAN
Which of the following applications for home automation wa NOT given by the author?
Water Purification
There are three general strategies used to authenticate individuals. Which of the following is NOT one of them?
Who you know
A(n)____is a collaboration information site that encourages people with subject knowledge to contribute at their convenience, adding to or fixing pages where information is missing or incorrect.
Wiki
Although many of the articles in_____are written and edited by experts you cannot be 100 percent certain that the specific information you need comes from a credible source.
Wikipedia
Which of the following is global system of linked,hypertext documents?
World Wide Web
Which type of malware consist of a fully-contained program that self-replicates and spreads through computers and networks?
Worm
Which of the following is NOT a web browser?
Yahoo
Someone who possesses _________ has a broad understanding of computer technology and is able to use it well.
digital literacy
System known as ____ are able to continue their operation even when problem are present.
fault-tolerant
Higher_____ cameras can capture more detail, but they will produce a larger image file on your storage media.
megapixel
Which device can guard connected equipment against large power spikes or surges that may infrequently occurs?
surge protector
The_____port us used to connect almost all of todays external devices.
USB
Which of the following is NOT an example of solid state storage?
BD-XL
The____,or microprocessor,is the main processor of a computer.
CPU
____utilities use a variety of techniques that can "squeeze" one or more files into a smaller file,such as zip.
Compression
The small data files knows as ____ are used by websites to remember users and their preferences.
Cookies
A___is any step you take to ward off a threat.
Countermeasure
FitBit is an examples of a:
Fitness device worn on the wrist
____technology can translate a scanned image into text that can be edited and formatted.
OCR
Which type of memory contains device-specific information and handles a computer's basic function when it is powered on?
ROM
A modern monitor might have a(n) ____ of 920x1080 pixels.
Resolution
A popular way for both individuals and businesses to increase the security of a network connection (via tunneling) is by using a(n):
VPN
You should run a(n)____if you want to run one operating system on top of another operating system.
Virtual machine
Which type of software provides tools for creating and editing all kids of text-based documents?
Word processing
Which of the following examples was NOT given by the author with respect to the way technology is used today?
Landscaping
Many navigation and traffic apps reply on _____ to determine which roads have accidents/construction and which gas station have the lowest prices.
Crowdsourcing
Data____ is the discovery of new sterns or relationships between data.
Mining
A(n)___ connector carries both digital video and sound.
HDMI
Today, the term____generally refers to an individual who uses a computer and/or network commit a variety of crimes.
Hacker
____file sharing uses a diatribe network of individual users instead of central server to transfer files.
P2P
The speed of a printer is measured in:
PPM
___are pieces of a message broken down into small unit by the sending device and reassembled by the receiving device.
Packets
A(n)____contains a rechargeable battery,allowing it to run a computer system for given amount of time if the power fails.
UPS
Which of the following is NOT a cloud storage or synchronization service?
Solid State Drive
Which microblogging service famously restricts posts to 280 characters?
____technology produces output in the form of vibration,motion or physical resistance.
Haptic
The magnetic _____ often serves as the primary storage device of a personal computer.
Hard Drive
____is generally any part of the computer you can touch.
Hardware
The____part of an email contains any file(s) included with the message.
Attachments
A designation of ____ means that a blank optical disc can be recorded to only once.
-R
What is the latest version of windows?
10
Which type of printer is most likely to be used by an engineer who needs to create a small, plastic model?
3D
New we operating system are ___, which means they are more powerful and capable of supporting more than 4 GB of RAM.
64-bit
A(n)_____ is another name for the full address that is used to locate a web page on the internet.
URL
Which type large-business software can handle tasks as diverse as manufacturing and quality control to accounting and Human Resources?
ERP
_____specializes in TV shows, offering episodes that can be seen as early as the day after they air.
Hulu
Apple's mobile devices are powered by the____operating system>
IOS
A mobile device that generally ranges from 7 to 10 inches in size is refere to as a(n):
Tablet
The___of a network is the logical layout of the cables and devices that connect the nodes of the network.
Topology
Which rectangular, stationary pointing surface is found on almost all laptop computers?
Touchpad