CIS 105
HTTPS (Hypertext Transfer Protocol Secure)
An encrypted version of HTTP. It uses port 443.
Sound Card
An expansion card that attaches to the motherboard inside the system unit and that enables the computer to produce sounds by providing a connection for the speakers and microphone.
How many Kilobytes are in a Megabyte?
1,024
What was the storage capacity of a floppy disk?
1.44 Mg
what was the storage capacity of a floppy disk?
1.44 mg
How many Kilobytes are in a Megabyte?
1024
When was the Energy Star founded?
1992
when was the energy star founded?
1992
How many of EPEAT's criteria are required for certification consideration?
23
8 Bits, 1 Byte
256 possibilities
How many of EPEAT's criteria are optional?
28
What is the current version of HTML?
5
How many total criteria in EPEAT?
51
how many total criteria in EPEAT?
51
How many bits in a byte?
8
how many bits in a byte?
8
What policy promotes efficient energy use in PSUs?
80 Plus
what policy promotes efficient energy use in PSUs?
80 Plus
CD-RW
A CD that allows data to be erased and written again several times.
Ethernet Card
A board inside a computer to which a network cable can be attached.
database functions
Analyze data for selected records in a database table
cell range
A cell range is identified by two or more cells within a table.
expansion card
A circuit board inserted into a slot on the motherboard to enhance the capability of the computer.
ISP (Internet Service Provider)
A company that provides customers access to the Internet.
Disable System Restore
A computer has been infected with multiple viruses and spyware. Which of the following tasks should be performed before removing this malware?
peer-to-peer (P2P)
A computer network that relies on the computing power and bandwidth of the participants in the network rather than a centralized server
logic bomb
A computer program or part of a program that lies dormant until it is triggered by a specific logical event.
Adjust the power settings
A customer calls to report that when she walks away from her laptop for an extended period of time, she has to reconnect to wireless upon her return. Which of the following will most likely correct this issue?
The parent folder has explicit Deny rights set for the third-party user
A customer reports to you that a file shared on her computer for another user is not accessible to that third party. The customer says that the third party was given Allow rights for Read and Write access to the file. Which of the following could be a reason as to why the third party cannot access the file?
This is an invalid IP address
A customer reports to you that he cannot access the company FTP site. He says that he is using the IP address given to him: 86200.43.118. What is most likely the problem?
Ignore
A customer tells you that it takes a long time to load the Windows desktop after logon. Which tool can help with this problem?
relational database
A database that represents data as a collection of tables in which all data relationships are represented by common values in related tables
network navigation devices
A device on a network such as a router, hub, and switch that moves data signals around the network.
input device
A device used to enter information into a computer.
Which is not word processing software?
Apple Word Press Pro
Primary Key
A field (or group of fields) that uniquely identifies a given entity in a table
When data is no longer needed on a daily basis, how is it backed up?
Archived
Internet
A global network connecting millions of computers, making it possible to exchange information.
column
A horizontal stack of cells in a table or worksheet.
Which of the following is not a feature of word processing software?
Array document protocols
The document is owned by the first user
At one of your customer's locations, two users share the same Windows 7 computer. The first user creates a document intended to be used by both users and then logs off the computer. The second user logs on and types the name of the document in the Start menu but the document cannot be found. Which of the following statements describes the problem?
What plays an important role when learning IT?
Attitude
client/server network
A network that uses centrally administered computers, known as servers, to enable resource sharing for and to facilitate communication between the other computers on the network.
After a computer gets power, it searches for what?
BIOS
after a computer gets power, it searches for what?
BIOS
Foreign Key
A primary key of one table that appears as an attribute in another table and acts to provide a logical relationship between the two tables
Where was WordPerfect originally developed?
BYU
A read/write head on a spinning disk is like what?
A record player arm
BIOS
Basic Input/Output System
what does the acronym BIOS mean?
Basic input/ output system
What does the acronym BIOS mean?
Basic input/output system
Referential Integrity
A set of rules that Access uses to ensure that the data between related tables is valid.
Virus (computer)
A small program attached to another program or data file. It replicates itself by attaching itself to other programs.
if-then-else statement
A statement used to select between the execution of two mutually exclusive behaviors.
Solid State Drive (SSD)
A storage device that uses the same kind of memory that flash drives use but that can reach data in only a tenth of the time a flash drive requires.
WWW (World Wide Web)
A system of interlinked hypertext documents contained on the Internet
GUI (Graphical User Interface)
A type of interface that allows users to interact with electronic devices through graphical icons and visual indicators such as secondary notation, as opposed to text-based interfaces, typed command labels or text navigation.
cache memory
A type of memory used to temporarily store frequently used data or programs for quick access; similar to RAM but faster.
Restart the Print Spooler service
A user can no longer print from his computer to the default printer. While troubleshooting this issue, you learn that you can print a test page from the printer, and the printer's queue shows that the job is ready to print. Which of the following tasks should be performed next to resolve the situation?
Ensure the user is not utilizing a proxy server
A user is reporting that his web browser is not going to the site he is trying to
Cable is connected to the modem's line RJ11 port
A user tries to connect to the Internet using a dial-up modem and receives a message that says "no dial tone detected." Which of the following should be checked first?
Enabling contact synchronization by setting up the e-mail account on the phone
A user wishes to access contacts from an Android phone. Which of the following solutions will provide the most up-to-date contact information on the user's phone on a daily basis?
Acquiring technology when it is first introduced is called what?
Being a leader
What was the Internet's original name?
ARPANET
What was the internets original name?
ARPANET
What coding scheme do most microcomputers use?
ASCII
What coding scheme is used by most microcomputers?
ASCII
What company makes Acrobat?
Adobe
which is not a major OS in business?
Borland System Platform
Which is not a major OS in business?
Borland system platform
Processor Management
Breaks down the work into manageable chunks and prioritizes them
Where was WordPerfect originally developed?
Brigham Young University
What is bigger than a Yottabyte?
Brontobyte
What are the pathways inside a computer unit called?
Bus lines
Inheritance
By default, a file or folder will receive its NTFS permissions from the parent
Who is in charge of all computer assets for an organization?
CIO
Which memory helps decrease the time it takes to access memory?
CPU Cache
Which memory helps decrease the time it takes to access memory?
CPU cache
what are stored copies of previously viewed web pages?
Cache
What is it called when a row and column intersect in a spreadsheet?
Cell
absolute cell reference
Cell reference that does not adjust to the new cell location when copied or moved
CPU
Central Processing Unit refers to the micro-processor on the
What is JavaScript?
Client-side Programming Language
A microprocessor's speed is measured in what?
Clock rate
powering up a computer for the first time is called what?
Cold Boot
Modem
Communications hardware device that facilitates the transmission of data.
CD-R
Compact disc on which you can write only once and thereafter is read-only.
What is meant by the variety of ways a computer can save data and information?
Computer Storage
time bomb
Computer virus that does not cause its damage until a certain date or until the system has been booted a certain number of times.
system software
Consists of the programs that control or maintain the operations of the computer and its devices.
What EPEAT criteria require manufacturers to adopt sound corporate environmental policies?
Corporate performance
What determines a monitor's resolution?
DPI
What program unclutters a hard drive?
Defragmentation
Network Components
Device, Media, Network Adapter, Network Operating System, and Protocol.
what does the acronym DSL mean?
Digital Subscriber Line
What plan is for a future business catastrophes?
Disaster Recovery Plan
two types of RAM
Dynamic RAM (DRAM) and Static RAM (SRAM)
What coding scheme do mainframe computers use?
EBCDIC
what coding scheme do mainframe computers use?
EBCDIC
Who funded EPEAT?
EPA
Where are EPEAT criteria listed online?
EPEAT.net
what is the most important thing system software does?
Enables the operating system
Which EPEAT criteria require adoption of Energy Star specification?
Energy Conservation
The table of contents of a hard drive is called what?
FAT
What is the table of contents for a disk drive?
FAT
What is the table of contents to a hard drive?
FAT
Which uses more space between Fat Clients or Thin Clients?
Fat
in a DBMS, what is a column called?
Field
What does the acronym FAT mean?
File Allocation Table
what does the acronym FAT mean?
File Allocation Table
The programming on ROM chips is sometimes called what?
Firmware
the programming on ROM chips is sometimes called what?
Firmware
Who manages EPEAT?
GEC
who manages EPEAT?
GEC
What are the most common graphic files on the WWW?
GIFs and JPEGs
what are the most common graphic files on the WWW?
GIFs and JPEGs
Who sold IBM MS-DOS?
Gates and Allen
What is EPEAT's highest designation?
Gold star
How is information represented on a monitor?
Graphical User Interface
what does the acronym GUI mean?
Graphical User Interface
What document is based on the idea that business can become environmentally friendly?
Green Business Plan
Which is not a common plug-in for Gaming Websites?
HTML
which is not a common plug-in for gaming websites?
HTML
which type of memory is secondary storage?
Hard Drive
Which type of memory is secondary system?
Hard drive
Secondary storage
Hard drive, more permanent, does not
the tangible and physical aspects of a computer are called what?
Hardware
What is the central location of a network?
Hub
what differentiates system software from application software?
Human intervention
What does the acronym HTML mean?
Hypertext Markup Language
what does the acronym HTTP mean?
Hypertext Transfer Protocol
Setting encryption
In a SOHO wireless network, which of the following prevents unauthorized users from accessing confidential data?
What does the Materials Selection criteria do?
Informs consumers of percentage of renewable / bio-based plastic content
data and information that enters a computer is called what?
Input
4 Major Computer Functions
Input, Process, Output, Storage
What is the worlds largest network?
Internet
What does IP mean?
Internet Protocol Address
what does the acronym ISP mean?
Internet Service Provider
What does JavaScript need to work on a website?
Java-enabled browser
Who developed the earliest Mac OS?
Jobs and Wozniak
Input device examples
Keyboard, mouse, speaker, touchscreen, storage device, scanner, microphone
Which network is the smallest?
LAN
Which operating system is open-source?
LINUX
Who started Linux?
Linus Torvalds
What operating system is open-source?
Linux
Which operating system is free of cost?
Linux
What does Apple call a motherboard?
Logic Board
What does Apple call the motherboard?
Logic board
What software did Excel replace as the most popular spreadsheet?
Lotus 123
What is the only real language a computer understands?
Machine code
What storage device is read sequentially?
Magnetic Tape
What storage device is considered the slowest?
Magnetic tape
Worm (Computers)
Malware computer program that replicates itself in order to spread to other computers.
What is considered the "brains" of the computer?
Microprocessor
What does IBM MS-DOS stand for?
Microsoft Disk Operating System
What does MS-DOS stand for?
Microsoft Disk Operating System
What is the leading presentation software?
Microsoft PowerPoint
What is the most popular word processor in the world?
Microsoft Word
Which is the leading presentation software?
Microsoft powerpoint
What is the most popular word processor in the world?
Microsoft word
What shows the last time a computer file was saved or created?
Modification date
Output device examples
Monitor, printer, storage device, speakers, projector
What law predicts that Google Earth will become Google Live?
Moore's Law
How is a computer different from other machines?
Multipurpose tool, versatile, can do many tasks well
Running more than one application at a time is called what?
Multitasking
Which is not a peripheral device?
NIC Card
What device allows a computer to connect to a network?
NIC card
Which is not a peripheral device?
NIC card
what device allows a computer to connect to a network?
NIC card
Software that controls an entire network is called what?
NOS
What is the newer version of FAT?
NTFS
what is the newer version of FAT?
NTFS
Can an embedded operating system be modified?
No
Does the average businessperson need to be an expert in IT?
No
Image and text scanners use a technology called what?
OCR
What method of sharing data is dynamic?
Object Linking
Moving the file to a new location on the same volume
Of the following ways to manipulate a file, which can retain the file's NTFS permissions?
Read
One of your co-workers is attempting to access a file on a share located on a remote computer. The file's share permissions are set to allow the user full control; however, the NTFS permissions allow the user to have read access. Which of the following will be the user's resulting access level for the file?
Restart the smartphone
One of your customers has not received any e-mails on his smartphone in the past few days. However, he's able to access the Internet. Which of the following should be your first troubleshooting step?
Use strong passwords. Assign security rights based on job roles
One of your customers has set up a perimeter firewall and has implemented up-to-date AV software. She asks you what else she can do to improve security. Which of the following will have the greatest impact on her network security? (Select the two best answers.)
What part of the computer coordinates memory?
Operating system
Ports
Places on the outside of the computer that connect to the motherboard and allows hardware to work
A common name for an operating system is what?
Platform
what is another name for an OS?
Platform
Which software visually communicates a point?
Presentation
In computing what is best described as where the user works?
Primary storage
Any task a computer performs is called what?
Process
What is it called when a computer performs a task?
Process
Which EPEAT criteria ask manufacturers to make their products last longer?
Product longevity/ life cycle extension
Which EPEAT criteria ask manufacturers to design products that can be upgraded with common tools?
Product longevity/life cycle extension
Which storage device is a series of stacked platters?
RAID
Name a primary storage with no physical movement that can be accessed in any order
RAM
Name a primary storage with no physical movement that can be accessed in any order.
RAM
Which type of memory is primary storage?
RAM
what type of memory is primary storage?
RAM
Primary storage
RAM (random access memory), temporary, requires constant electricity to hold data and programs, smaller generally 2 to 8 GB, faster than secondary, where programs and data
What tag can transmit through radio waves
RFID
What tag can transmit through radio waves?
RFID
Many chips encased in one chip working together is what?
RISC
RAM
Random Access Memory
ROM
Read Only Memory
Downloading
Receiving data, such as a music or video file, from a server or another computer system
in a DBMS, what is a row called?
Record
Which memory quickens the implementation of computer programs?
Registers
what is SEO?
Search Engine Optimization
In computing, what is best described as where the user stores their work?
Secondary Storage
How is a computer designed so it can do many different tasks?
Separation of hardware and software
What is the most important aspect of a productivity suite?
Sharing data
Who invented the first web browser?
Sir Tim Berners Lee
Who developed HTML?
Sir Tim Berners-Lee
who invented the first web browser?
Sir Tim Berners-Lee
who invented the world wide web?
Sir Tim Berners-Lee
A computer program that accomplishes a specific task is called what?
Software
Software sold as a collection are called what?
Software suite
Operating System (OS)
Software used to control the computer and its peripheral equipment.
What software models financial information?
Spreadsheets
Secondary Storage
Storage that is remote to the CPU and permanently holds data, even when the PC is turned off, such as a hard drive.
What are the set of rules to move data from one computer to another?
TCP/IP
What is the best protocol for transferring a large database file through a network?
TCP/IP
processing
Takes place on the CPU chip,
what is a misnomer when referring to the internet?
That you visit websites
User Interface (UI)
The "User Interface" or UI of an app refers to how a person (user) interacts with the computer or app.
Primary Storage
The computer's main memory, which consists of the random access memory (RAM), cache memory, and the read-only memory (ROM) that is directly accessible to the CPU
CPU (Central Processing Unit)
The internal operating unit or "brain" of a computer.
machine language
The language made up of binary-coded instructions that is used directly by the computer
HDD (Hard Disk Drive)
The most common type of hard drive in computers. It includes spinning platters and read/write heads.
network operating system (NOS)
The operating system that runs a network, steering information between computers and managing security and users
clock speed
The speed, or frequency, expressed in MHz, that controls activity on the motherboard and is generated by a crystal or oscillator located somewhere on the motherboard.
data transmission
The transfer of data between computers or other electronic devices through a network.
Which costs less to display between Fat Clients or Thin Clients?
Thin
Which has better distribution between Fat Clients or Thin Clients?
Thin
disks have concentric bands called what?
Tracks
Where was the university that produced the Internet?
UCLA
where was the university that produced the internet?
UCLA
What is the best protocol for transferring video through a network?
UDP
What protocol does YouTube.com use?
UDP
what is the best protocol for transferring video through a network?
UDP
What coding scheme is used for Japanese and Chinese computers?
Unicode
bits per second
Unit for measuring the speed of data transfer over a network connection.
What is the most inexpensive way to make a professional website?
WDPs
what is the most inexpensive way to make a professional website?
WDPs
is HTML considered a strong or weak language?
Weak
what is kept in cache?
Web Browsing History
Settings > Wi-Fi > SSID Name > IP Address
What is the correct path to determine the IP address of an iOS device?
Allows a peripheral to be contacted by the mobile device
When dealing with Bluetooth, which of the following statements best describes the purpose of discovery mode?
Calendar Address book
When setting up a Microsoft Exchange mail account to synchronize with an iPhone, which of the following items can be configured to synchronize besides e-mail? (Select the two best answers.)
Programs and Features
Which CP utility is best used to remove a Windows application?
Task kill
Which Windows command can stop a single process from the command line?
Task Manager
Which Windows utility can be used to see which users are currently logged on?
CHKNTFS
Which command in Windows can initiate CHKDSK at boot time?
DIR
Which command would display the contents of C:\Windows\System32\?
Windows 8.1 Pro 64-bit Windows 7 Home Premium x64
Which of the following OSes supports full usage of 8 GB of RAM? (Select the two best answers.)"
GSM
Which of the following allows you to make phone calls and transfer data from
Disk Cleanup
Which of the following applications can be scheduled to delete unwanted, Compressed, older files?
RSA tokens Privacy filters
Which of the following are examples of physical security? (Select the two best
Security alerts Windows Update failures Renamed system files
Which of the following are possible symptoms of malware? (Select all that apply.)
BOOTREC /FIXMBR
Which of the following commands might need to be run after a virus removal if a computer won't boot?
Authentication
Which of the following enables a user to reset his password with a series of
Using the virtual machine for patch testing before rollout
Which of the following identifies the best utilization for a virtual machine running locally on a PC?
Invalid boot disk
Which of the following is a common symptom of a problem that can occur while starting up the Windows operating system?
Drilling
Which of the following is a way to remove data from a hard drive through
Shredding Drilling
Which of the following is a way to remove data from a hard drive through
iCloud
Which of the following is an Apple smartphone feature that enables data to be
It reduces the amount of physical hardware required
Which of the following is an advantage of a PC-hosted virtual machine?
The technician notes the date, time, and who was given the computer.
Which of the following is the best example of the use of chain of custody?
NTFS
Which of the following is the most commonly used file system in Windows?
Complex password
Which of the following options is the best way to secure a Windows workstation?
Disable the ports in the firmware
Which of the following statements best describes how to secure only physically unused network ports on a switch?
Avoid distractions. Avoid being judgmental. Meet expectations that the customer sets for you
Which of the following statements describe how to demonstrate professionalism when dealing with a customer? (Select the three best answers.)
Squat and lift from the legs
Which of the following statements describes the proper lifting technique?
Squat and lift from the legs.
Which of the following statements describes the proper lifting technique?
ITunes
Which of the following terms best describes the Apple utility used with iOS
iTunes
Which of the following terms best describes the Apple utility used with iOS
Vacuum
Which of the following tools are commonly used to remove dust from the inside
Compressed air Vacuum
Which of the following tools are commonly used to remove dust from the inside of a computer? (Select the two best answers.)
WPS
Which of the following usually incorporates an 8-digit code that can be found on the bottom of a SOHO router?
Disk Management
Which operating system feature will show a hard drive's status?
Non-water-based fire extinguishers
Which type of fire extinguishing technology should be used during an electrical fire?
Bluetooth
Which type of technology is used when pairing devices such as headsets to a
Bluetooth
Which type of technology is used when pairing devices such as headsets to a smartphone?
Guest
Which type of user account should be disabled to adhere to security best practices?
What is the dominant OS in the operating system market?
Windows
what is the dominant OS in the operating system market?
Windows
WIMP
Windows, Icons, Menus, Pointers
What was the first web browser called?
WorldWideWeb
what was the first web browser called?
WorldWideWeb
Is it important to know how the inside of a computer works?
Yes
Will Google Earth become Google Live?
Yes
DHCP MAC filtering
You are configuring a SOHO wireless network for a customer. The customer wants only five authorized computers to connect to the network within a defined IP range. Which of the following should be configured on the router? (Select the two best answers.)
Server and domain
You are configuring a friend's iPad. He needs to access his work e-mail. To do this, you require information from his IT department. Which information should you ask for?
Establish a theory of probable cause
You are helping a customer with an Internet connectivity problem. The customer tells you that the computer cannot connect to her favorite website. After quickly analyzing the computer, you note that it cannot connect to any websites. Which of the following tasks should be performed next?
Select the load driver
You are installing Windows to a PC with a RAID card. All cables are connected
C:\Program Files (x86)
You are installing a 32-bit program on a 64-bit version of Windows 8. Where Does the program get installed to?
gpedit.msc
You are required to remove the ability for standard users to shut down or restart a hared computer. Which command should be used to accomplish this task?
Remove your watch and jewelry
You are required to replace a desktop power supply. Which of the following tasks should be performed first?
Report your findings through proper channels
You are servicing a computer and notice a lot of icons linking to inappropriate websites. Which of the following statements describes your first course of action?
Rejoin the computer to the domain
You are working on a client computer and receive a message that says the trust Rel58ationship to the domain has been broken. Which of the following steps should be taken to resolve this problem from the client computer?
The VM can be shut down with no harm to the host PC
You are working with a virtual machine (VM) when you discover that it has been infected with malware. Which of the following will apply?
Install the application in compatibility mode
You attempt to install a legacy application on a computer running Windows 8. You receive an error that says the application cannot be installed because the OS is not supported. Which of the following describes the first step you should take to continue installing the application?
Report the incident to management
You come across prohibited materials on a computer located in a common area. Which of the following statements describes what you should do first?
Install grounding bars
You have been asked to set up a new networking closet and you notice that the humidity level in the room is very low. Which of the following tasks should be done before rack-mounting any networking equipment?
Local Security Policy
You have been tasked with limiting computer access to certain users. Which of the following should be configured?
Shred the documents
You have been testing a financial software program by printing several test documents. Which of the following statements describes how to handle the confidential test documents when you are finished testing?
VER
You need to find out which Windows OS is running on a computer. Which command should be used?
Disconnect the network cable from the computer
Your customer has a computer (named comp112) that has been infected by a Worm. The worm has propagated to at least 30 other computers on the network. Which of the following tasks should be performed before attempting to Remove the worm from the comp112 computer?
Domain
Your organization's network consists of 25 computers. Your boss is interested
Domain
Your organization's network consists of 25 computers. Your boss is interested in employing a file server with network shares and a print server. Which of the following Windows network setups should you recommend?
expansion bus
a bus on the motherboard used to connect peripheral devices
Byte
a byte contains 8 bits, a bit is the smallest unit of storage, stored as 1's and 0's, all programs and data are stored and processed in binary
buses
a collection of wires through which data is transmitted from one part of a computer too another
system unit
a computer case that contains the CPU, power supply, memory, and storage
DVDs
a computer disk that stores multimedia messages in a digital format
Intranet
a local or restricted communications network, especially a private network created using World Wide Web software.
Video Card
a printed circuit board controlling output to a display screen.
DBMS (Database Management System)
a product used for the storage and organization of data that typically has defined formats and structures
A read/write head on a spinning disk is like what?
a record player arm
flash drive
a small electronic device containing flash memory that is used for storing data or transferring it to or from a computer, digital camera, etc.
row
a vertical group of cells in a worksheet identified by numbers
Trojan horses
a virus that does something different from what is expected to do.
What is the window a user is currently using?
active window
what is the window a user is currently using?
active window
What company makes Acrobat?
adobe
functioning properly?
afrustrated customer calls you about a PC that is not functioning properly. Which of the following questions should you ask of the user?
output device
allows the user to view or listen to the data a computer processes such as a monitor, printer, headphones, or speakers
Microprocessor
an integrated circuit that contains all the functions of a central processing unit of a computer.
Who can modify Linux?
anyone
Which is not word processing software?
apple word press pro
When data is no longer needed on a daily basis, how is it backed up?
archived
which of the following is not a feature of word processing software
array document protocols
What plays an import role when learning IT?
attitude
What does logging in do for a network user?
authenticates them
what does logging in do for a network user?
authenticates them
Waiting to acquire technology until it is proven is called what?
being a follower
Acquiring technology when it is first introduced is called what?
being a leader
Loading a platform into a computer's memory is called what?
booting
loading a platform into a computers memory is called what?
booting
What application software provides an interface that displays the WWW?
browser
what application software provides an interface that displays the WWW?
browser
Which software displays web pages?
browser software
what software displays web pages?
browser software
What topology is also called a linear bus?
bus
What are the pathways inside a computer until called?
bus lines
What technology has made presentation software more popular?
business intelligence
what technology has made presentation software more popular?
business intelligence
With Web Development Platforms, who designs the website?
business owners
properly
but the install DVD does not detect any hard drives. Which of the following tasks should be performed next?
What are stored copies of previously viewed web pages?
cache
What does the acronym CAN mean?
campus area network
Hardware
can run/execute different Software
What measures a human's impact on the environment?
carbon foot print
what measures a human's impact on the environment?
carbon footprint
What is it called when a row and column intersect in a spreadsheet?
cell
relative cell reference
cell reference that adjusts to a new location when copied or moved
Physically, what is a motherboard?
circuit board
A computer connected to a server is called what?
client
What is the computer used to browse the Web called?
client
what is the computer used to browse the web called?
client
What is JavaScript?
client-side programming language
What kind of network model is the Internet?
client/server
what kind of network model is the internet?
client/server
a microprocessor's speed is measured in what?
clock rate
Powering up a computer for the first time is called what?
cold boot
bootrec /fixmbr
command ran after a virus removal if a computer won't boot
What kind of website is to sell goods and services?
commerce websites
What kind of websites is to sell goods and services?
commerce websites
What does the extension, ".com" mean?
commercial
what does the extension ".com" mean?
commercial
CD-ROM
compact disc-read-only memory
Application Software
computer software created to allow the user to perform a specific job or task
What is meant by the variety of ways a computer can save data and information?
computer storage
What is it called when one computer can connect to another?
connectivity
what is it called when one computer can connect to another?
connectivity
What is meant by C2C?
consumer-to-consumer
what is meant by C2C?
consumer-to-consumer
ROM (Read-Only Memory)
contains programs to start computer, programs are stored when electricity is off (like secondary storage)
What is the most important aspect of a website?
content
what is the most important aspect of a website?
content
What are text files used for tracking a WWW user?
cookies
what are text files used for tracking a WWW user?
cookies
What is the easiest and most basic way to share data?
copy (or cut) and paste
What is the easiest and most basic way to share data?
copy and paste
Which EPEAT criteria require manufacturers to adopt sound corporate environmental policies?
corporate performance
What program organizes a disk?
defragmentation
What program unclutters a hard drive?
defragmentation
what program organizes a disk?
defragmentation
What is the background display on a monitor called?
desktop
what is the background display on a monitor called?
desktop
Another term for acceptance of an acknowledged problem is what?
diffusion
What does the acronym DSL mean?
digital subscriber line
A PSU converts Alternating Current to what?
direct current
A PSU converts alternating current to what?
direct current
What plan is for a future business catastrophes?
disaster recovery plan
What are tags called in HTML?
elements
What kind of operating system does an iPhone use?
embedded
What is the most important thing system software does?
enables the operating system
Which EPEAT criteria ask manufacturers to take their products back when they are no longer useful?
end of life management
Which EPEAT criteria require adoption of Energy Star specification?
energy conservation
What is the problem with NCAR's climate models?
extremely unreliable
Which is more powerful between Fat Clients or Thin Clients?
fat
Which is more powerful between fat clients or thin clients?
fat
What is another name for a bookmark?
favorite
what is another name for a bookmark?
favorite
In a DBMS, what is a column called?
field
What function stores and organize a user's work in computer files?
file manager
Operating systems have their file management systems modeled after what?
filing cabinets
operating systems have their file management systems modeled after what?
filing cabinets
What is a common name for a hierarchy of directories?
folder
What contains groups of computer files?
folders
units of storage
fundamental storage - byte (takes one byte to store a keystroke)
Who sold IBM MS-DOS?
gates and allen
How is information represented on a monitor?
graphical user interface
What does the acronym GUI mean?
graphical user interface
Environmentally friendly computer systems are called what?
green PCs
environmentally friendly computer systems are called what?
green PCs
What document(s) is based on the idea that business can become environmentally friendly?
green business plan
The practice of using computing resources efficiently and reducing waste is called what?
green computing
the practice of using computer resources efficiently and reducing waste is called what?
green computing
What is it called when heat cannot escape into space?
greenhouse effect
the tangible and physical aspects of a computer are called?
hardware
Firewalls
hardware, software, or both designed to prevent unauthorized persons from accessing electronic information
What differentiates system software from application software?
human intervention
What is a clickable navigation element?
hyperlink
what is a clickable navigation element?
hyperlink
What allows web users to navigate to different parts of the web?
hyperlinks
what allows web users to navigate to different parts of the web?
hyperlinks
What does the acronym HTML mean?
hypertext markup language
What does the acronym HTTP mean?
hypertext transfer protocol
What is a small pictogram that launches an application?
icon
what is the small pictogram that launches an application?
icon
Pivot Table
in most spreadsheet software it is the name of the tool used to create summary tables.
WPS (Wi-Fi Protected Setup)
incorporates an 8-digit code that can be found on the bottom of a SoHo router
What does the Materials Selection criteria do?
informs consumers of percentage of renewable/bio-based plastic content
Boot Sequence
initial sett of operations that the computer performs when it is switched on
Data and information that enters a computer is called what?
input
Four functions of a computer
input, output, processing, storage
What is the world's largest network?
internet
What does IP mean?
internet protocol address
What does the acronym ISP mean?
internet service provider
What does JavaScript need to work on a website?
java-enabled browser
input
keyboard, mouse, graphics tablet, scanner, etc
What does a user type in to a search engine?
keywords
what does a user type in to a search engine
keywords
Who started Linux?
linus torvalds
Which operating system is free of cost?
linux
What does the acronym LAN mean?
local area network
A business computer authenticates a user based on what?
login
a business computer authenticates a user based on what?
login
What is the only real language a computer understands?
machine code
What storage device is considered the slowest?
magnetic tape
What storage device is read sequentially?
magnetic tape
What storage device is reel-to-reel?
magnetic tape
Magnetic tape is still used extensively for what type of computer?
mainframe computers
What are the largest and most powerful business computers?
mainframes
what are the largest and most powerful business computers?
mainframes
What is software designed to damage a computing system?
malware
What is the software designed to damage a computing system?
malware
What button expands a window?
maximize
what button expands a window?
maximize
How does a search engine match keywords to a web user?
meta words
Where does a search engine get a description of a website?
meta-description tag
how does a search engine match keywords to a web user?
meta-words
What kind of website returns many search engine results?
metasearch engine
what kind of website returns many search engine results?
metasearch engine
What does the acronym MAN mean?
metropolitan area network
Desktop computers are considered what type of computer?
microcomputers
what is considered the "brains" of a computer?
microprocessor
What computers process large amounts of data for a mid-sized business?
midrange computers
what shows the last time a computer file was saved and created?
modification date
output
monitor, printer
What is the main component of a system unit?
motherboard
what is the main component of a system unit?
motherboard
Running more than one application at a time is called what?
multitasking
What is it called when a computer runs more than one process at a time?
multitasking
Connecting two or more computers is called what?
network
Who is the person responsible for a network's smooth operation?
network administrator
Can an embedded operating system be modified?
no
Does the average businessperson need to be an expert in IT?
no
Any device connected to a network is called what?
node
The integrated system video chip is failing
ntested video drivers were installed, You have been tasked with diagnosing a laptop that is experiencing heavy artifact corruption along with random loss of video during operation. Which of the following are the most likely causes to the problem? (Select the two best answers.)
Which method of sharing data is dynamic?
object linking
Where does the microprocessor reside?
on the motherboard
Linking the customer and transaction tables is called what?
one-to-many relationship
linking the customer and transaction tables is called what?
one-to-many relationship
Disk Management
operating feature that will show a hard drive's status
Starting a computer loads system software to provide what?
operating system
What part of a computer is responsible for reading and writing data?
operating system
What part of the computer coordinates memory?
operating system
starting a computer loads system software to provide what?
operating system
Data and information that leaves a computer is called what?
output
data and information that leaves a computer is called what?
output
24 Bits, 3 Bytes
over 16 million possibilities
32 Bits, 4 Bytes
over 4 billion possibilities
16 Bits, 2 Bytes
over 65,000 possibilities
TCP/IP and UDP break large files into what?
packets
TCP/IP breaks file into what?
packets
Smaller files that represent larger files are called what?
pages
smaller files that represent larger files are called what?
pages
What does the acronym P2P mean?
peer-to-peer network
What is the most important part of an information system?
people
A printer or scanner connected to a network is called what?
peripheral device
privacy filters
physical security
A common name for an operating system is what?
platform
What is another name for an OS?
platform
What is a separate window that opens a browser without user interaction?
popup
what is a separate window that opens a browser without user interaction?
popup
Which software visually communicates a point?
presentation
What software is designed to display on-screen?
presentation software
storage
primary and secondary
In computing, what is best described as where the user works?
primary storage
Any task a computer performs is called what?
process
Which EPEAT criteria ask manufacturers to make their products last longer?
product longevity/ life cycle extension
What represents a user's specific preferences?
profile
what represents a users specific preferences?
profile
What are "rules" called when referring to a network?
protocols
In a DBMS, what is a row called?
record
Visual Basic for Applications (VBA)
refers to a programming language you can use to create macros. It is a descendant of the BASIC programming language that is used in all Office products, as well as some other types of software.
Network transmission media
refers to the various types of media used to carry the signal between computers
Which memory quickens the implementation of computer programs?
registers
This contains settings like screen savers, appearance, and personalization.
registry
this contains settings like screen savers, appearance, and personalization
registry
Overwriting writes 1s and 0s to the drive
replacing the data; formatting only clears the reference to the data and only overwrites as space is used, When it comes to sanitizing drives, which of the following statements best describes the difference between overwriting a drive and formatting a drive?
Microsoft replaced menus with what?
ribbons
microsoft replaced menus with what?
ribbons
What is the least used topology?
ring
What topology is in a circle?
ring
What kind of website uses keywords to locate content?
search engine
what kind of websites uses keywords to locate content?
search engine
What is SEO?
search engine optimization
In computing, what is best described as where the user stores their work?
secondary storage
Tracks are separated into wedges called what?
sectors
tracks are separated into wedges called what?
sectors
Uploading
sending data, such as a music or video file, from a local computer system to another computer system or server
The central computer in a network is called what?
server
What is the most important aspect of a productivity suite?
sharing data
A computer program that accomplishes a specific task is called what?
software
Software sold as a collection are called what?
software suite
Spyware
software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.
What application software features a "what-if" analysis?
spreadsheets
What software models financial information?
spreadsheets
Which PC mode uses the least amount of power?
standby mode
What is the most common topology?
star
booting your computer
startup sequence that starts the operating system of a computer when its is turned on
What is a pen-like device that can "write" on a screen?
stylus
Operating System
supports and provides services to applications in RAM
Files exchanged in and out of RAM are called what?
swap files
files exchanged in and out of RAM are called what?
swap files
Is an OS system software or application software?
system
What kind of software requires no human interaction?
system software
What is the main body of a computer called?
system unit
What is the main body of a computer?
system unit
What compensates for operating system inadequacies?
system updates
Physical items like desks, computers, and tractors constitute what in business?
tangible property
physical items like desks, computers, and tractors constitute what in business?
tangible property
What is the work arrangement that allows an employee to work from home?
telecommuting
What is a misnomer when referring to the Internet?
that you visit websites
What is the chassis commonly referred as?
the "box"
What is the chassis commonly referred as?
the "box'
Software
the instructions (programs) that tell the computer how to do something, can easily and quickly be changed
motheboard
the main circuit board of a computer housing the microprocessor and providing the means of connecting all the components that makes up the computer.
HTTP (Hypertext Transfer Protocol)
the protocol used for transmitting web pages over the Internet
Bits
the smallest unit of data in a computer
Code Window
the window in Visual Basic Editor (VBE) that displays the Visual Basic code (commands) for a macro
Which costs less to display between Fat Clients or Thin Clients?
thin
Which has better distribution between Fat Clients or Thin Clients?
thin
What does the "M" mean in CPM?
thousands
The technician notes the date
time, and who was given the computer, Which of the following is the best example of the use of chain of custody?
What is the mapping of a physical network called?
topology
Disks have concentric bands called what?
tracks
What are the most common types of cables in a network?
twisted pair
Internal Buses
type of buses that connect all the internal computer components to the CPU and main memory
What coding scheme is used for Japanese and Chinese computers?
unicode
What does the acronym URL mean?
uniform resource locator
what does the acronym URL mean?
uniform resource locator
What is the capacity of Cloud Storage?
unlimited
What is the capacity of cloud storage?
unlimited
Bytes
used to measure computer memory and storage
Which memory coordinates, tracks, allocates other memory?
virtual
This is actually a technique of breaking up files.
virtual memory
this is actually a technique of breaking up files
virtual memory
Restarting a computer is called what?
warm boot
restarting a computer is called what?
warm boot
Is HTML considered a strong or weak language?
weak
What is kept in cache?
web browsing history
Internet servers that serve content are called what?
web hosts
internet servers that serve content are called what?
web hosts
What were blogs originally called?
web logs
what were blogs originally called?
web logs
Disk Cleanup
which of the following applications can be scheduled to delete unwanted, compressed, older files?
What does the acronym WAN mean?
wide area network
How are bus lines measured?
width
A GUI unto its own is called what?
window
Which software can provide a table of contents?
word processor
What does platform neutral mean in context of a PDF?
works on any operating system
Is it important to know how the inside of a computer works?
yes
Will Google Earth become Google Live?
yes