CIS 120 7/23 #7

¡Supera tus tareas y exámenes ahora con Quizwiz!

hibernate

saves your work, then turns off your computer

Copy command is?

allows you to make copies of essential files

TV tuner card

an adapter card that receives a TV signal and displays TV on the computer screen

subfolders

folders in side a folder used to further organize files into smaller groups

command buttons

let you issue instructions to modify program objects

Solid-state storage devices are different than hard disks in that they:

have no moving parts.

Architects and engineers can use a(n) ______________ to print large drawings and designs.

plotter or multi-function device

Peripherals connect through a ________.

port

Peripherals connect through a ___________________.

port

PMP

portable media player

In most cases, the word "software" is interchangeable with the word

program

In most cases, the word "software" is interchangeable with the word _______.

program

Which of the following is a set of instructions written for a computer?

program

Freemium

provides free use of a stripped-down or basic version of the product but requires payment for upgraded features

Which of the following statements is incorrect?

Printer speed is measured in the number of words printed per minute.

Which of the following statements is incorrect?

Printer speed is measured in the number of words ringed per minute.

cloud printers

Printers connected to the Internet that provide printing services to others on the Internet are called ________.

accuracy

Privacy concern that relates to the responsibility to ensure correct data collection.

help and support

Provides: assistance with windows features step by step instructions for performing an operation help troubleshooting computer problems definitions of windows terms opened by clicking the start button, then clicking help and support

RAM (random access memory)?

RAM (random access memory) is a temporary holding area for data, application program instructions, and the operating system Higher RAM capacity adds to the expense of a device

motherboard

RAM comes on cards that fit into slots located on the __________________.

Computer Fraud

Refers specifically to the use of computers or networks to commit a fraudulent act

Remote storage is?

Remote storage is housed on an external device that can be accessed from a network

These organize commonly used commands into a set of tabs. Select one: a. Buttons b. Galleries c. Ribbons d. Contextual tabs

Ribbons

A __ enables the computer to drive the speaker system

Sound card

Graphical User Interface (GUI)

Special screen that allows software commands to be issued through the use of graphic symbos (icons) or pull-down menus.

Which would be the most appropriate type of application to create, analyze and forecast budgets? Select one: a. DBMS b. Word processor c. Spreadsheet d. Presentation graphics

Spreadsheet

Storage means?

Storage is a term used for the components of a digital device designed to hold data permanently

Folder

Storage location for a collection of files

system unit

The case that encloses and protects the power supply, motherboard, CPU, and memory of a computer.

column-oriented data model

The column-oriented data model stores data in columns, rather than in rows, so it works well in situations where the focus is on analysis of chunks of data

Palm

The first company to introduce personal digital assistants.

Table

The list of records in a database. Tables make up the basic structure of a database. Their columns display field data and their rows display recods.

arithmetic logic unit (ALU)

The part of a processor that performs arithmetic (addition and subtraction) and logic (AND, OR, and NOT) calculations.

hardware

The physical components of a computer.

planning phase

The planning phase for an information system project includes: Assembling the project team Justifying the project Choosing a development methodology Developing a project schedule Producing a project development plan

Web authoring programs are used to create sophisticated commercial websites. Select one: True False

True

Address bar

Which of the following File Explorer items contains the path to the current location?

Linux

Which of the following platforms is free?

Micro-B connector

a USB connector that has five pins and has a smaller height than the Mini-B connector; it is used on digital cameras, cell phones, and other small electronic devices

USB 3.0 B-Male connector

a USB connector used by SuperSpeed USB 3.0 devices such as printers or scanners

SMS messages are limited to a maximum of ________ characters

160

LCD projector

a projector that passes light through a prism, which divides the light into three beams- red, green and blue which are then passed through this screen

A byte is formed by a group of _______.

8 bits

USB hub

A device used to connect multiple USB devices to a single USB port.

Laptops and tablets use ____ that are typically located outside the system unit.

AC adapters

PictBridge

An industry standard that allows a camera to connect directly to a printer, usually by a USB connection or special dock.

speakers

An output device that converts digital signals from a computer or media player into sound.

headphones

An output device that converts digital signals into sound. They come in several different sizes and styles, ranging from tiny earbuds that fit inside your ear to full-size headphones that completely cover your outer ear.

Which of the following is NOT a mobile device?

Base transceiver station

The standard for high definition optical discs is:

Blu-ray

Which of the following holds the largest amount of data?

Blu-ray disc

Two wireless standards are WiFi and ________________.

Bluetooth

The Web was introduced in 1991 at _______.

Center for European Nuclear Research (CERN)

Character Effect

Change appearance of font characters by using bold, italic, shadow, and colors.

narrowband

Channels slower than 2 Mbps are classified as narrowband

Length check

Checks that *data is of correct length* (data validation).

This allows you to upload and store documents on the Internet.

Cloud storage

Multifunction Printer

Combines output options such as printing, scanning, copying, and faxing.

Access to these databases is offered to the public or selected outside individuals, for a fee.

Commercial Databases

Antivirus Software

Computer programs that scan inputs for malware and viruslike coding, identify malware already lodged in computer systems, clean infected systems, or perform some combination of these activities

VPN

Connection that creates a secure virtual connection to a company LAN across the internet.

The hard disk's disk surface is scratched and some or all of the data is destroyed when there is a _______.

Head crash

Audio Input

Is the process of inputting sound into the computer. A microphone is the most common audio input device.

The most common type of video memory is a modern video card is

GDDR5

Which programming language is used within HTML documents to trigger interactive features?

JavaScript

A field that uniquely identifies each record.

Key field/primary keys

The Form 1 3D printer founders used the crowdfunding site ________ to ask for $100,000 in pledges

Kickstarter

Which of the following is TRUE about monitors?

LCD panels have virtually replaced CRT display screens

This commercial database offers news and information on legal, public records, and business issues.

LexisNexis

This social networking site is used for professional, business-oriented networking.

LinkedIn

An example of an open source OS is

Linux

Menu

List of commands.

Spell check

Looks up words in dictionary/array to check if *data is spelt correctly* (data validation).

Which of the following is not a popular cloud suite or online office suite?

Lotus Symphony

This reading device is used in banks to read the numbers on the bottom of checks and deposit slips.

MICR

All of the following are examples of network operating systems EXCEPT

MS-DOS

tracks sectors

Magnetic and optical media are divided into circular tracks and then further divided into pie-shaped sectors

Magnetic storage represents

Magnetic storage represents data by magnetizing microscopic particles on a disk or tape surface

search services

Maintain huge databases relating to information provided on the web and the internet

help desk

Many organizations establish a help desk to handle end-user problems; it is staffed by technical support specialists

User Interface

Means by which users interact with application programs and hardware. A window is displayed with information for the user to enter or choose, and that is how users communicate with the program.

These screens can be touched with more than one finger, which allows for interactions such as rotating graphical objects on the screen with your hand or zooming in and out by pinching and stretching your fingers.

Multitouch

MAC address

NICs contain a MAC address (media access control address) used to identify devices on LANs

desktop

acts as your work area

To add ports to your computer, what do you need? a. a digital media card reader b. an external hard drive c. an expansion hub d. a flash memory card

c. an expansion hub

This type of e-commerce often resembles the electronic version of the classified ads or an auction

c2c

Frequently-accessed information is held in _______.

cache memory

The ____ of a secondary storage device indicates how much data the storage medium can hold

capacity

OMR, OCR, and MICR are all types of _______.

character and mark recognition devices

To decide if your current system is still useful for you

check each subsystem to see how it is performing during your work day.

Tiny circuit-boards etched onto squares of sand-like material, called silicon, are called _______.

chips

close button

closes a window

On the motherboard, the connection points for chips are referred to as _______. Select one: a. slots b. sockets c. ports d. lines

b. sockets

The crisis of a growing digital divide is being addressed by a. Ushahidi. b. the Next Einstein Initiative project. c. the Freecycle program. d. building faster computers.

b. the Next Einstein Initiative project.

Each cell in a cellular network is a geographic area centered on ______ station, which is a large communications tower.

base transceiver

For a higher level of security, __________________ can be used to match unique characteristics to the user.

bio-metric devices

the _ icon on the toolbar displays a list of help topics organized by subject

browse help

Managers

determine organizational goals and plan how to achieve those goals; managers use the following methods

Each device attached to your computer comes with a special program called ___ enables the device and operating system to communicate with each other

device driver

MPEG-4

digital video file format

DVI stands for __________

digital video interface

A graphics tablet is also known as a(n) ________.

digitizing tablet

If all the data in a database is not physically located in one place, it would be a(n) _______ database.

distributed

faskbar

horizontal bar at the bottom of the screen

The difference between remote controls that use infrared light and those that use radio waves is that ___________________.

infrared light requires the user to point the remote control directly at the appliance

Optomechanical Mouse

is the same as a mechanical mouse, but uses optical sensors to detect motion of the ball.

If you place a document from your C; drive in the recycle bin in windows

it remains on your hard drive until you empty the recycle bin

application programs

let you create documents, view web pages, and send and receive email

All of the following are applications software packages except

linxux office is not one.

LCD stands for __________________ display.

liquid crystal

menu

list of related commands

quick access toolbar

located in the upper left corner of the window lets you quickly perform common actions such as saving a file

some programs have __, words you click to show lists of commands.

menus

System units are typically composed of metal because ____________________

metal protects the storage media from magnetic fields.

Smartwatches

multifunctional devices that include a camera, thermometer, compass, calculator, cell phone, GPS, media player, and fitness tracker

Google ___ is an online store delivering software for mobile devices.

play

Programs that automatically start and operate as a part of your browser are called

plug-ins

The ____ is an area on the right side of a window that shows you what a selected file looks like without opening it.

preview pane

During which phase is data, programs, and commands stored in RAM?

primary storage

The process of accessing information from secondary storage devices is referred to as ________.

reading

Correcting image distortion

reconstructing perspective with photoediting

Windows 7 places folders and files you delete from your hard drive in the ____

recycle bin

Ribbon

replace menus and toolbars by organizing commonly used commands into a

On a hard disk each track is divided into invisible wedge-shaped sections called:

sectors

When a new version or edition of a software product is released it is referred to as a ?

software upgrade

Discontinuation of service

some cloud storage providers have closed down their services with little warning

menus

some command buttons reveal menus

Display

sometimes called a monitor or screen, is the visual output for your computer. It shows the computer's interface, graphics, and programs.

The most widely used audio-output devices.

speakers and headphones

file management

strategy and tasks that you use to organize and maintain the folders and files on a disk you need to develop a strategy that enables you to quickly fins the files you need windows provides a variety of file management tools to assist you in these tasks

Which of the following is not a type of scanning device?

stylus

If your computer can't store all the required OS data in RAM, it can use a temporary file on the hard drive to store data. This is known as a _________ file.

swap

This type of software works with end users, application software, and computer hardware to handle the majority of technical details

system

A microcomputer that is smaller, lighter, and less powerful than a notebook, and which has a touch sensitive screen, is called a _______.

tablet

projector

used to shine a light that projects a transparent image onto a large screen and is often used in classrooms or with other large groups

For each user, Windows 7 can reserve a special area called a ____ where each user can keep his or her own files.

user account

The ___ of the operating system enables users to communicate with the computer system

user interface

This type of image is made up of geometric shapes or objects

vector

A customer service department using automated voice response system is an example of __________________.

voice commands/voice synthesizers

RAM is an example of ____ storage

volatile

report template

A report template contains the outline or general specifications for a report

variable-length field

A variable-length field is like an accordion—it expands to fit the data you enter

Vector Graphics Basics

A vector graphic consists of a set of instructions for creating a picture Vector graphics include standard shapes such as circles and rectangles

Computers run three main types of software:

Application software System software Development tools

Google Docs (Google Drive)

Applications that are available online, so you can use them anywhere.

System restore points can only be created by Windows automatically on a regular schedule

False

System software can be described as end-user software and is used to accomplish a variety of tasks. Select one: True False

False

The first step of the boot process is the power on self test

False

True or False. A rogue attack uses software to try thousands of common words in an attempt to gain unauthorized access to a user's account.

False

Virtual memory is stored on a RAM chip. Select one: True False

False

executive dashboard

Decision makers can access analytical databases using an executive dashboard, provided by software such as iDashboards, which uses tools for visually displaying query results

compressed air

Dust can be removed from fans and cooling fins by using _______________

Organizations use the following to allow suppliers and others limited access to their networks.

Extranets

Operational planning

covers activities that make day-to-day operations run smoothly

Wordprocessor

create text-based documents and one of the most flexible and widely used

A computer can become infected with viruses in all the following ways, except by _______.

creating a new folder on your computer

The term ________refers to the use of a single unifying device that handles media, Internet, entertainment, and telephone needs.

digital convergence

Parents can use this type of program to block access to selected Websites

filter

Desktop

fits on a desk and runs on power from a wall outlet; keyboard is typically separate from the monitor; popular in offices and schools

Most RAM is volatile -

meaning it needs electrical power to hold data

Gigahertz (GHz) ?

means a billion cycles per second

right click

point to an icon and click the right mouse button to display a shortcut menu

drag

point to an icon press and hold down the left mouse button, move the mouse to drag the icon and then release the left mouse button to move the icon

e-mail

Transmission of electronic messages over the Internet

64-bit-word computer can access 8 bytes at a time. Select one: True False

True

A bus is a pathway for bits representing data and instructions. Select one: True False

True

Moving text, graphics, or interactive features on a web page are called _______. Select one: a. WYSIWYGs b. flash c. animations d. HTML

animations

active window

the window in front

The mouse is able to move in different directions through use of

the x and y coordinate system

A hard disk drive contains?

A hard disk drive contains one or more platters and their associated read-write heads A hard disk platter is a flat, rigid disk made of aluminum or glass and coated with magnetic iron oxide particles A read-write head mechanism in the disk drive magnetizes particles to write data, and senses the particles' polarities to read data

keyword

A keyword, or command, is a word with a predefined meaning Keywords differ depending on the programming language; there is a basic vocabulary that covers most necessary tasks

EIDE (enhanced integrated drive electronics)

A legacy drive interface found on the motherboard of older personal computers.

CRT monitor

A legacy technology that uses a cathode ray tube to excite phosphor particles coating a glass screen to light up the pixels.

logic error

A logic error is a type of runtime error in the logic or design of the program

lookup routine

A lookup routine validates a field entry by checking data in an in-house or third-party database

loyalty programs

A major source of data for CRM is produced by loyalty programs, or a rewards program, which is a marketing effort that provides customers with incentives for making purchases

near field communication (NFC)

A method that enables devices to share data with each other by touching them together or bringing them within a few centimeters of each other.

pipelining

A method used by a single processor to process multiple instructions simultaneously. As soon as the first instruction has moved from the fetch to the decode stage, the processor fetches the next instruction.

A microprocessor is?

A microprocessor is an integrated circuit designed to process instructions It is the most important, and usually the most expensive, component of a digital device Intel Corporation is the world's largest chipmaker and supplies a sizeable percentage of the microprocessors that power desktops and laptops

multicore processor?

A microprocessor that contains circuitry for more than one processing unit is called a multicore processor

OLED (organic light-emitting diode)

A monitor composed of extremely thin panels of organic molecules sandwiched between two electrodes.

packet switching

A more efficient alterative to this process is packet switching technology, which divides a message into several packets that can be routed independently to their destination

multi-level sort

A multi-level sort arranges information by more than one field

multidimensional database

A multidimensional database organizes relationships over three or more dimensions; in the context of databases, a dimension is a layer based on a data element, such as a product, place, or customer, that can be used to categorize data

A multiple-user license is?

A multiple-user license is priced per copy and allows the allocated number of copies to be used simultaneously

Ethical Hacker

A network and computer expert who purposefully attacks a secured system to help its owners find any vulnerabilities that could be exploited by a malicious hacker; aka - intrusion testing or penetration testing

solid-state storage

A non-mechanical form of storage that uses flash memory to store data on a chip.

ROM (read-only memory)

A nonvolatile form of memory that doesn't need power to keep its data.

Home Software

A single program providing functionality of a collection of programs but not as extensive as a specialized program like Microsoft Word. Popular with home users who are willing to sacrifice some advanced features for lower cost and simplicity.

Integrated Package

A single program providing functionality of a collection of programs but not as extensive as a specialized program like Microsoft Word. Popular with home users who are willing to sacrifice some advanced teatures for lower cost and simplicity.

single-level sort

A single-level sort uses only one field to arrange records

A site license is?

A site license is generally priced at a flat rate and allows software to be used on all computers at a specific location

Keypad

A small alternative keyboard that has a limited set of keys.

solid-state drive (SSD

A small drive often used in small electronic devices, such as media players and cell phones, as well as in notebooks and netbooks.

Cookie

A small text file that stores information about your browsing habits and interests, as well as other information that you may supply by logging onto the site

flash drive

A small, portable, solid-state drive that can hold up to 128 GB of information. Also called key drives, thumb drives, pen drives, or jump drives.

Button

A special area you can click to make links that "navigate" through a presentation.

stylus

A special pen-like input tool that enables you to write directly on a touchscreen.

Master Slide

A special slide that does not appear in a presentation but controls all the formats and placement of all slides in a presentaion. The design template can be changed for an entire presentaion using a master slide.

webcam

A specialized video camera that provides visual input for online communication, such as web conferencing or chatting.

structured file

A structured file uses a uniform format to store data for each person or thing in the file

summary report

A summary report combines, groups, or totals data

supply chain

A supply chain is the sequence of organizations, people, activities, information, and resources involved in moving a product or service from supplier to customer

syntax error

A syntax error occurs when an instruction does not follow the syntax rules of the programming language

RFID tag

A tag that can be read by a scanner. It contains a tiny antenna for receiving and sending a radio frequency signal.

RFID tag

A tag that can be read by an scanner. It contains a tiny antenna for receiving and sending a radio frequency signal.

text editor

A text editor is any word processor that can be used for basic text editing tasks, such as writing email, creating documents, and coding computer programs

A transaction processing system

A transaction processing system (TPS) provides a way to collect, process, store, display, modify, or cancel transactions

QR (Quick Response) code

A two-dimensional bar code found in ads and on merchandise tags that can be scanned using an app on a mobile device to learn more about the item.

IM

A type of communication that allows two or more people to contact each other via direct, live communication.

Monitor

A video output device that works by lighting up pixels on a screen. Each pixel contains three colors: red, green, and blue (RGB)-and all colors can be created by varying the intensities of the three colors.

projector

A video output device typically used when making a presentation or sharing media with a group in such places as classrooms, businesses, and home theaters because they can produce larger output than a monitor.

A virtual machine (VM)

A virtual machine (VM) allows one computer to simulate the hardware and software of another Each VM has its own simulated processor, RAM, video card, input and output ports, and OS Popular VM software such as VMware and Parallels Desktop can run on most computers with Intel microprocessors, including Intel Macs, PCs, and generic Linux computers

Boot-Sector Virus

A virus that hides in the boot sectors of a disk, where the operating system accesses them every time it accesses the disk itself

CMOS (complementary metal oxide semiconductor)

A volatile form of memory that uses a small battery to provide it with power to keep the data in memory even when the computer is turned off. It stores settings that are used by the BIOS.

command line interface

A way of interacting with the operating system using the keyboard.

Relational Database

A widely used database structure in which data is organized into related tables. Each table is made up of rows called records and columns called fields. Each record contains fields of data about a specific item.

UNIX was developed by Ken Thompson and Dennis Richie, who worked at

AT and Ts Bell Labs

Which of the following measures the amount of time required by the storage device to retrieve data and programs?

Access speed

Hard disk drive specifications include:

Access time - the average time it takes a computer to locate data on the storage medium and read it Data transfer rate - the amount of data a storage device can move per second from the storage medium to RAM

analytical database

An analytical database is used to collect data that will be used for spotting trends that offer insights for tactical and strategic business decisions

data flow

An arrow symbolizes a data flow and indicates how data travels

ecommerce application

An ecommerce application is the software that handles ecommerce transactions

Find and Replace

An editing tool that finds a selected word or phrase and replaces it with another.

plagiarism

An ethical issue relating to using another person's work and ideas as your own without giving credit to the original source.

exception report

An exception report contains information that is outside of normal or acceptable ranges

An executable file -

An executable file contains a computer program that is carried out step-by-step within the microprocessor Software can contain viruses and other malware, so consumers should download new applications only from trusted sources Software developers usually have a Web site for distributing software; well-established developers tend to offer trustworthy products

executive information system (EIS)

An executive information system (EIS) is a type of decision support system designed to provide senior managers with information relevant to strategic management activities

video card

An expansion card that provides the data signal and connection for a monitor or projector. It may also include input ports to connect a TV tuner or another video device to the system.

expert system

An expert system, sometimes referred to as a knowledge-based system, is a computer system designed to analyze data and produce a recommendation, diagnosis, or decision based on a set of facts and rules

external entity

An external entity is a person, organization, or device used outside the information system that originates or receives data

cardinality

An important aspect of the relationship between record types is cardinality, which refers to the number of associations that can exist between two record types

An information system

An information system collects, stores, and processes data to provide useful, accurate, and timely information, typically within the context of an organization

An ink jet printer has

An ink jet printer has a nozzle-like print head that sprays ink onto paper to form characters and graphics

joystick

An input device mounted on a base that consists of a stick, buttons, and sometimes a trigger.

touch screen

An input device that can accept input from a finger or stylus.

Scanner

An input device that can change images into codes for input to the computer.

scanner

An input device that can increase the speed and accuracy of data entry and convert information into a digital format that can be saved, copied, and manipulated.

touchpad

An input device typically found on a notebook computer. Motion is detected by moving your finger across the touch-sensitive surface.

office suite is

An office suite is a collection of programs that typically include word processing, spreadsheet, and presentation modules In the context of office suites, the term module refers to a component, such as a word processing module

What is iOS?

An operating system for mobile devices

user interface

An operating system gives your digital device a personality; it controls key elements of the user interface, which includes the visual experience as well as the keyboard, mouse, microphone, or touchscreen that collects user commands Behind the scenes, the OS is busy supervising critical operations that take place within a device

operational database

An operational database is used to collect, modify, and maintain data on a daily basis

organization

An organization is a group of people working together to accomplish a goal

mission; its mission statement

An organization's goal or plan is referred to as its mission; its mission statement describes not only an organization's goals, but also the way in which those goals will be accomplished

When using a cell phone, a(n) _______ converter chip changes your voice's sound waves into digital signals.

Analog-to-digital and analog to digital

Analog signals are different than discrete signals because

Analogs waves are continuous

Which of the following is not a popular desktop operating system?

Android

Which of the following is not a character encoding standard?

Answer: CISC From options: Unicode CISC ASC11 EBCDIC

project development plan

The goal of these activities is to create a project development plan; this planning document includes: A short description of the project including its scope An estimate of the project costs and potential financial benefits A list of project team participants A schedule for the project, including an outline of its phases

The small circuit boards and integrated circuits you see when you open up a digital device are the essence of digital electronics

Digital electronics represent data bits as electrical signals that travel over circuits in much the same way that electricity flows over a wire when you turn on a light switch

Specialized devices with a large display connected to a computer projector and are widely used in classrooms and corporate boardrooms.

Digital or interactive whiteboards

The windows troubleshooting utility that identifies and eliminates nonessential files is called _______.

Disk Cleanup

Chart

Displaying numerical data in a worksheet as a pie chart or a bar chart, making it easier to understand.

Taskbar

Displays open and favorite applications

Domain name servers

Domain name servers are scattered around the world and maintain lists of all domain names and their corresponding IP addresses

Record

Each row of information in a database is a record. Each record contains fields of data about some specific item, like employee name, address, phone and so forth. A record represents a collection of attributes describing an entity.

table

Each table is a sequence of records, similar to a flat file

An MICR device senses the presence or absence of a mark, such as a pencil mark.

False

Biometric scanning devices are used to scan employee identification cards. true or false/

False

Cloud suites are stored on your hard drive and are available anywhere you can access the Internet. Select one: True False

False

Donating your computer will not necessarily put you at risk for identity theft

False

Each table in a database is made up of rows, called fields. Select one: True False

False

Firewire ports are used to connect keyboards, mice, printers, and storage devices. Select one: True False

False

Functions, formulas, charts and what-if analysis are common features of database management systems. Select one: True False

False

Graphics cards connect the system board to secondary storage. Select one: True False

False

Illustration programs are specialized graphics programs for editing bitmap or raster images. Select one: True False

False

Image editors are used to create and edit vector images. Select one: True False

False

In a peer-to-peer network, only the central host computer supplies the resources, the other computers request resources from this host.

False

Microsoft Word cannot be used to create personalized web pages. Select one: True False

False

Parallel processing requires a computer to perform one complete task before beginning the next task.

False

T/F: A search engine that searches other search engines is called a SuperSearch engine.

False

T/F: A yellow shaded address bar on a Web site indicates that the Web site is secure.

False

T/F: In the Web address www.facebook.com, facebook is the top-level domain.

False

T/F: Projects like Virtual Choir show that technology has forced us into increased isolation.

False

T/F: System software is another term for application software.

False

T/F: The first step of the boot process is the Power-on self-test (POST).

False

T/F: The hard drive is an example of a volatile storage device.

False

T/F: When you buy software, you then own it and can do anything you'd like with it, including giving it to a friend to install on their machine.

False

The ALU tells the rest of the computer system how to carry out a program's instructions. Select one: True False

False

The aspect ratio of an HD television is more square than that of a standard definition TV

False

The last worksheet in a workbook is often a summary of the preceding worksheets. Select one: True False

False

The number of bits that can travel simultaneously down a bus is known as the word size. Select one: True False

False

True or False. A magnetic card reader does not require the card to actually make contact with the reader.

False

True or False. A prototype is a set of communication rules for the exchange of information.

False

True or False. CD-ROMs are often used to archive data and to record music downloaded from the Internet.

False

True or False. Cloud printers provide printing services to users without access to the Internet.

False

True or False. Optical scanners recognize individual letters or images.

False

True or False. The ALU tells the rest of the computer system how to carry out a program's instructions.

False

True or False. The process of saving information to a secondary storage device is referred to as embedding.

False

Recent

File Explorer will display the latest files that you have opened and/or edited under the ________ files.

Which utility removes redundancies in a file to reduce the file size?

File compression

Before sending a large file over the Internet, you might want to use one of these programs.

File compression program

properties

File information such as type, size, and date are called file ________.

Parents can use this type of program to block access to selected Websites.

Filter

The ________ in Mac OS X is used to locate and arrange files, folders, and applications.

Finder

Microprocessors

Finding the microprocessor that's best for you depends on your budget and the type of work and play you plan to do If you know the make and model of a digital device, you can generally find processor specifications by searching online

These types of ports typically provide connections to specialized devices such as camcorders and storage devices.

FireWire

Which of the following is true about an internal hard disk?

Fixed amount of storage

When you reboot your system, the computer follows start-up instructions stored in this type of memory.

Flash

When you reboot your system, the computer follows startup instructions stored in this type of memory.

Flash

Which of the following offers a combination of features of RAM and ROM?

Flash Memory

Which of the following offers a combination of the features of RAM and ROM?

Flash Memory

Smartphones use which of these storage technologies?

Flash memory card

parallel processing

For multicore processors to be used effectively, computers must understand how to divide tasks into parts that can be distributed across each core—an operation called ________.

Analytical Graph

Form of graphics used to put numeric data into objects that are easier to analyze, such as bar charts, line graphs, and pie charts.

This law gives you the right to look at your personal records held by government agencies.

Freedom of Information Act

Thumb drive

Generally the size of a key chain, thumb drives plug into any USB port. USB thumb drives have replaced Compact Disks as the most commonly used mobile storage device. Thumb drives can be used repeatedly many times before they need to be replaced. Thumb drives cost less than $1 per gigabyte of storage.

Specialized Suite

Programs that focus on specialized applications such as graphics suites or financial planning suites.

browsers

Programs that provide access to web resources

PIECES framework

Project team members can identify problems and opportunities using a variety of techniques, such as interviews and data analysis The PIECES framework helps classify problems in an information system; each letter of PIECES stands for a potential problem

Proprietary software has restrictions?

Proprietary software has restrictions on its use that are delineated by copyright, patents, or license agreements

adaptive technology

Software and hardware used by individuals with disabilities to interact with technology. Also called assistive technology.

Software for PCs contains

Software for PCs contains a setup program that guides you through the installation process During the installation process, the setup program usually performs the following activities:

Application Software

Software that can perform useful work, such as word processing, cost estimating, or accounting tasks. The user primarily interacts with application software.

ARPANET

The ARPANET, created in 1969, connected computers at UCLA, the Stanford Research Institute, the University of Utah, and UC California at Santa Barbara

Xerox

The Alto computer, built by ____________, was the first to use a graphical user interface (GUI).

Which of the following is the first step in the boot process?

The BIOS is activated by turning on the computer

Which of the following is true?

The CPU contains the ALU.

analysis phase

The goal of the analysis phase is to produce a list of requirements for a new or revised information system; tasks for this phase include: Studying the current system Determining system requirements Writing a requirements report

System Software

"Background" software tha enables the application software to interact with the computer. System software consistes of the operating system, utilities, device drivers, and language translators. It works with application software to handle the majority of technical details.

XML

(eXtensible Markup Language) is a popular tool used to format document databases

FTTH

(fiber-to-the-home) is the use of high-capacity fiber-optic cables, rather than coaxial cables, to connect homes to broader municipal networks

4G

(fourth generation) technologies, such as WiMAX and LTE, rolled out in 2011

Database

A collection of related information, like employee names, addresses, and phone numbers. It is organized so that a computer program can quickly select the desired pieces of information and display them for you.

data

A collection of unprocessed facts and figures, such as student names and Social Security numbers, is known as __________________-

Bluetooth is?

A common wireless technology for connecting peripherals is Bluetooth Bluetooth is a low-power technology, so it is ideal for mobile devices that don't have big batteries Bluetooth is used to connect wireless headsets to smartphones and is built into many smartphones, tablets, laptops, and desktops

A communication port

A communication port (usually referred to simply as a port) is a virtual end point for data entering and leaving a digital device Communication ports are not a physical circuit, but rather an abstract concept of a doorway, an opening, or a portal through which data flows

drive controller

A component located on the motherboard, that provides a drive interface, which connects disk drives to the processor.

peripheral device

A component that expands the input, output, and storage functions of a computer system.

computed field

A computed field is a calculation that a DBMS performs, similar to the way a spreadsheet computes a formula

Display Devices

A computer display device that simply displays text and images is classified as an output device Touchscreens, however, can be classified as both input and output devices because they accept input and also display output

administrator

A computer user with ________ rights can add multiple local user accounts and restrict what account holders have access to.

A device driver is

A device driver is software that helps a peripheral device establish communication with its host device For example, the device driver for an HP printer sets up data streams from RAM to the printer and makes sure that the data is formatted in a way that the printer can work

disaster recovery plan

A disaster recovery plan is a step-by-step description of the methods used to secure data against disaster and a set of guidelines for how an organization will recover lost data and resume operations if and when a disaster occurs

document-oriented

A document-oriented database stores unstructured data, such as the text of a speech

top-level domain

A domain name ends with an extension that indicates its top-level domain, such as .edu or .org

PCI express (PCIe)

A faster version of PCI that's typically used to connect a video card.

field format

A field format is a template that adds the correct formatting as data is entered

field validation

A field validation rule is a specification that the database designer sets up to filter data entered into a particular field

LCD ( liquid crystal display)

A flat-panel display type found on most desktop and notebook computers. Consists of two layers of glass that are glued together with a layer of liquid crystals between them. When electricity is passed through the individual crystals, it causes them to pass or block light to create an image.

optical disc

A form of removable storage where data is stored by using a laser to either melt the disc material or change the color of embedded dye. A laser can read the variations as binary data.

Cybercrime

A general term that refers to any criminal activity that involves computers or networks; aka - e-crime or computer crime

graph database

A graph database offers an alternative way to track relationships; its structure resembles sociograms with their interlinked nodes

Which of the following is true about open source software? a. The program code is confidential. b. The program can be changed and freely distributed. c. The program can be freely distributed as long as the program code is not changed. d. The program code is subject to copyright protection.

b. The program can be changed and freely distributed.

This character encoding scheme allows non-English characters and special characters to be represented. Select one: a. ASCII b. Unicode c. EBCDIC d. ANSIC

b. Unicode

Which ethical philosophy states that morals are internal? a. Deontology b. Virtue ethics c. Relativism d. Divine command theory

b. Virtue ethics

Software that is available on-demand via the Internet is called a. proprietary software. b. Web-based software. c. productivity software. d. Internet software.

b. Web-based software.

Term used to describe the number of bits that a CPU can access at one time. Select one: a. Bitrate b. Word c. Pulse width d. Character

b. Word

Which of the following allows retailers to respond to consumer buying patterns? a. outsourcing b. data mining c. smart labels d. Bluetooth technology

b. data mining

The location of a file on a drive such as C:\Documents\CIS110\Homework\Termpaper.docx is known as the a. document location b. file path c. file position d. file address

b. file path

Modern operating systems such as Windows and OS X use a _____________ interface. a. command-driven b. graphical user c. menu-driven d. text-based

b. graphical user

The system board is also known as the _______. Select one: a. expansion slot b. motherboard c. expansion card d. bus

b. motherboard

Image, video, and audio editing software belong in the category of what kind of software? a. gaming software b. multimedia software c. photo enhancing software d. production software

b. multimedia software

What is a terabyte? a. one million bytes b. one trillion bytes c. one billion bits d. one trillion bits

b. one trillion bytes

In _______, transactions are collected over time and then processed all at once.

batch processing

Image editors edit images consisting of thousands of pixels that form this type of image.

bitmap

Pathways that support communication among the various electronic components on the system board are called ____.

bus lines

Pathways that support communication among the various electronic components on the system board are called _______.

bus lines

start button

button that opens the all programs menu.

A 32-bit-word computer can access _______. Select one: a. 2 bytes at a time b. 16 bytes at a time c. 4 bytes at a time d. 8 bytes at a time

c. 4 bytes at a time

Which of the following is NOT a characteristic of a blog? a. Blogs are used to express opinions. b. Blogs are generally written by a single author. c. Blogs are private and require password access. d. Blogs are arranged as a listing of entries.

c. Blogs are private and require password access.

Which of the following actions would not help to identify your personal ethics? a. Describe yourself. b. Identify the influences of your work environment. c. Conduct a genealogic study of your extended family. d. Prepare a list of values that are most important to you.

c. Conduct a genealogic study of your extended family.

These specialty processors are designed to improve specific computing operations such as displaying 3-D images and encrypting data. Select one: a. Smartcards b. CPUs c. Coprocessors d. NIC cards

c. Coprocessors

Which is not necessary to do before installing beta software: a. Create a restore point b. Back up your system c. Defrag the hard drive d. Ensure your virus protection software is updated

c. Defrag the hard drive

The _________ utility is used for detecting lost files and fragments of files on your hard drive. a. Disk Cleanup b. Disk Defragmenter c. Error checking d. System Refresh

c. Error checking

Which is NOT true about the Internet? a. It is the largest computer network in the world. b. It was created to establish a secure form of military communications. c. It was developed as an additional means of commerce. d. It was designed as a means for all computers to communicate with each other.

c. It was developed as an additional means of commerce.

cable Internet service

The gold standard of fixed Internet access is cable Internet service, which is offered by the same companies that supply cable television CATV stands for community antenna television With cables branching out from a central location, the topology of a CATV system works well as the infrastructure for a digital data network

Hard drives

The hard drive on your computer stores your information. The hard drive holds data permanently, or until you delete it. Unlike RAM, when you turn on your computer all data and programs stored on the hard drive are still there. On phones or tablets the hard drive may just be referred to as storage.

online identity

The information that people voluntarily post in social networking sites, blogs, and photo- and video-sharing sites is used to create their:

code

The instructions that make up a computer program are referred to as code because program instructions for first-generation computers were entered in binary codes

What is a computer program?

The instructions that tell a digital device how to carry out processing tasks are referred to as a computer program, or simply a program

know information

The know information in a problem statement is the information that is supplied to the computer to help it solve a problem After identifying the known information, a programmer must specify how to determine when the problem has been solved

Blu- ray

The large capacity, high-definition optical discs designed to store hi-def video and video games are ________.

maintenance phase

The maintenance phase of the SDLC involves the day-to-day operation of the system, making modifications to improve performance, and correcting problems

AGP (accelerated graphics port)

The standard analog video port on computers manufactured before 2009.

CMYK

The standard ink colors used by printers: cyan, magenta, yellow, and key (black).

SATA (Serial Advanced Technology Attachment)

The standard internal drive interface.

DVI (digital visual interface) port

The standard video port found on video cards.

logical storage model

The structure of files and folders displayed by File Explorer is called a logical storage model because it helps you create a mental picture of the way files are organized in a hierarchy of folders

system board is?

The system board houses all essential chips and provides connecting circuitry between them

application specifications

The team's systems analysts will create a set of application specifications that describe the way information system's software should interact with users, store data, process data, and format reports

DBMS

The term DBMS (database management system) refers to software that manages data stored in a database

NoSQL

The term NoSQL is used to refer to a group of technologies for managing databases that do not adhere to the relational model and standard SQL query language NoSQL technologies are effective for building and managing non-relational databases containing big data that may be unstructured and may be distributed across multiple servers

The term instruction cycle ?

The term instruction cycle refers to the process in which a computer executes a single instruction

management information system

The term management information system refers to any computer system that processes data and provides information within a business setting

quality of service

The term quality of service (QoS) refers to the level of performance a computer system provides

The term service pack?

The term service pack, which usually applies to operating system updates, refers to a set of updates Updates and service packs are designed to correct problems and address security vulnerabilities

stored program is?

The term stored program means that a series of instructions for computing a task can be loaded into a computer's memory

An integrated circuit (IC) is a set of microscopic electronic circuits etched onto a thin slide of semiconducting material

The terms computer chip, microchip, and chip are commonly used to refer to integrated circuits

portable computer

The type of computer most vulnerable to theft is a ____________________.

B2C

The type of electronic commerce in which a business sells a product to the general public.

Internet Infrastructure

The way networks fit together is referred to as the Internet Infrastructure

What is the most common user error when double-clicking the mouse?

There is too much time between the first and second click.

Traceroute

To determine whether or not your slow Internet connection is caused by your ISP or your computer you can use a Traceroute, a network diagnostic tool that lists each router and server

currency

To evaluate the accuracy of information you find on the Web, you should consider the sites' authority, accuracy, objectivity, and:

Database Management System (DBMS)

To organize, manage, and retrieve data. DBMS programs have five subsystems: DBMS engine, data definition, data manipulation, applications generation, and data administration. An example of a database management system is Microsoft Access.

DRM

To prevent copyright violations, corporations often use:

Sort

Tool that rearranges a table's records numerically or alphabetically according to a selected field.

Touch-screen

Touch-screens are becoming more common and allow fast access to your device. Smart phones, tablets, and many computers feature touch-screens where you can use your finer or a stylus to navigate and select items.

online processing

Transaction processing systems, such as banking, use online processing—a real-time method in which each transaction is processed as it is entered; this system software is often referred to as an OLTP (online transaction processing) system

3-D HDTV requires special viewing glasses in order to achieve a three-dimensional viewing experience.

True

Application software includes general-purpose applications, specialized applications, and mobile apps. Select one: True False

True

Each device attached to your computer needs a device driver to communicate with the OS

True

In a Ribbon GUI, a gallery displays the alternative choices. Select one: True False

True

In a Ribbon GUI, tabs are used to divide the ribbon into major activity areas. Select one: True False

True

In a database, primary keys are often used to link tables. Select one: True False

True

Many apps are written for a particular type of mobile device and will not run on other types. Select one: True False

True

Microsoft Word can identify incomplete sentences, awkward wording, and incorrect punctuation. Select one: True False

True

Mini DP ports are audio-visual ports typically used to connect large monitors.

True

MiniDP ports are an audiovisual port typically used to connect large monitors. Select one: True False

True

Multitouch screens allow for interaction such as rotating graphical objects on the screen with your hand.

True

Network adapters installed internally in a device are called NICs

True

Plug and Play has become a generic term that is associated with the ability to plug any device into a computer and have it play or work immediately. Select one: True False

True

Presentation graphics software is an excellent tool to communicate a message and to persuade people. Select one: True False

True

QR codes are graphics that typically appear as black and white boxes that automatically link mobile devices to a variety of different content including games, text, videos, and websites. Select one: True False

True

RAID 0 cuts the time it takes to write a file to disk in half

True

RAM is considered temporary, or volatile, storage. Select one: True False

True

Read-only memory (ROM) chips have information stored in them by the manufacturer. Select one: True False

True

Resolution for a printer is a measure of the clarity of images produced, measured in dpi (dots per inch).

True

SSD startup drives will reduce the amount of time to boot up

True

T/F: Deleted e-mails can be recovered—they don't really vanish.

True

T/F: The clock speed of the CPU is not the only measure of a processor's expected performance.

True

The system unit, also known as the system chassis, is a container that houses most of the electronic components that make up a computer system. Select one: True False

True

True of False. It is highly likely that each one of us has an electronic profile created by information resellers.

True

True or False. 64-bit-word computer can access 8 bytes at a time.

True

True or False. A firewall is a specialized technology designed to protect an organization's network against external threats.

True

True or False. A network gateway can be used to connect the LAN of one office group to the LAN of another office group.

True

True or False. Digital or interactive whiteboards display a computer's desktop and can be controlled using a special pen or a finger.

True

True or False. Discarded CRTs are a serious threat to the environment, given their high content levels of lead and other hazardous materials.

True

True or False. File servers are appropriate devices to use in an enterprise storage system.

True

True or False. Function keys provide shortcuts for specific tasks.

True

True or False. The most common protocol for website encryption is https (Hyper Text Transfer Protocol Secure).

True

USB ports are used to connect keyboards, mice, printers, storage devices, and a variety of specialty devices. Select one: True False

True

first-party

Type of cookie that provides information to a single site

web-based

Type of e-mail account that does not require an e-mail program to be installed on a user's computer is:

Virtual

Type of keyboard that uses a touch screen as the input device.

1394b

a data transmission standard used by computers and peripherals (for example, a video camera) that transmits at 800 Mbps; also called FireWire 800

stylus

a device that is included with a graphics tablet and works like a pencil on the tablet

UDF (Universal Disk Format) file system

a file system for optical media used by all DVD discs and some CD-R and CD-RW discs

Touch Pad

a pointing device with a specialized surface that can convert the motion and position of your fingers to a relative position on screen.

RGB port

a port used by television or by a video card that is designed to send output to a TV; the port is round and has only a single pin in the center of the port; also called composite video port

What might be used to predict earthquake or volcanic eruptions?

a probe/RFID/an adaptive computer device

MIDI (musical instrument digital interface)

a set of standards that are used to represent music in digital form; the port is a 5-pin DIN port that looks like a keyboard port, only larger

USB 3.0 Micro-B connector

a small USB connector used by SuperSpeed USB 3.0 devices; the connectors are not compatible with regular Micro-B connectors

icon

a small image that represents an item such as the recycle bin

mini-HDMI connector

a smaller type of connector that transmits both digital video and audio used for connecting some devices such as a smartphone to a computer; also known as a HDMI mini connector

HDMI mini connector

a smaller type of connector that transmits both digital video and audio used for connecting some devices such as a smartphone to a computer; also known as a mini-HDMI connector

A data storage system has two main components

a storage medium and a storage device Storage medium - the disk, tape, CD, or DVD that contains data Storage device - the mechanical apparatus that records and retrieves data from a storage medium

ribbon

a strip that contains tabs, which are pages that contain buttons that you click to perform actions. Found just bellow the title bar

KVM (Keyboard, Mouse, Video) switch

a switch that allows you to use one keyboard, mouse, and monitor for multiple computers; some also include sound ports so that speakers and a microphone can be shared among multiple computers

LED (light-emitting diode)

a technology used in an LCD monitor that uses less mercury than earlier technologies

xD-Picture card

a type of flash memory device that has a compact design and currently holds up to 8 GB of data

RFID is most associated with _____.

automobiles moving through tollways

RFID is most associated with ___________________.

automobiles moving through tollways/ oxygen senors in exhaust pipes of automobiles/ grocery store bar codes

Which computer first stored its operating system in ROM? a. Apple I b. Apple II c. Lisa d. Macintosh

b. Apple II

Who are the founders of Apple? a. Paul Allen and Bill Gates b. Steve Jobs and Steve Wozniak c. Steve Jobs and Bill Gates d. Bill Gates and Steve Wozniak

b. Steve Jobs and Steve Wozniak

This type of computer is a thin slab that is almost all monitor with the system unit located behind the monitor. Select one: a. Laptop b. Tablet c. Desktop d. Smartphone

b. Tablet

menus

words you click to show lists of commands

You can run multiple monitors on your system only if

you have a video card that supports more than one monitor

For what is the UNIVAC Computer best known? a. It was the first computer used to tabulate U.S. census data. b. It was the first computer to use the binary system. c. It was the first computer to incorporate a magnetic tape system. d. It was the first computer used as a mechanical calculator.

c. It was the first computer to incorporate a magnetic tape system.

Which of the following ports is used for connecting musical instruments to a sound card? Select one: a. MiniDP b. S/PDIF c. MIDI d. eSATA

c. MIDI

Which of the following allows a computer to run two or more operations simultaneously? Select one: a. Coprocessors b. Multiplexing c. Multicore chip d. Binary system

c. Multicore chip

Which is NOT an advantage of using a software suite? a. The cost is cheaper than buying programs individually. b. The programs provide for better integration. c. The programs integrate easily with programs from other software suites. d. The programs share common features such as toolbars.

c. The programs integrate easily with programs from other software suites.

With this type of memory, large programs are divided into parts and the parts are stored on a secondary device, usually a hard disk. Select one: a. Flash b. Cache c. Virtual d. Extended

c. Virtual

The processing speed of a microprocessor is typically represented by its _______. Select one: a. bus line b. control unit c. clock speed d. ALU

c. clock speed

Which is NOT important to consider when buying a monitor? a. screen resolution b. viewing angle c. color depth d. aspect ratio

c. color depth

Cognitive surplus means that we now find many people with a. more money than free time. b. limited access to the Internet. c. excess time and free tools for collaboration. d. mobile devices.

c. excess time and free tools for collaboration.

Unethical behavior a. is the same as illegal behavior. b. is based on civil disobedience. c. is different from illegal behavior d. is governed by specific laws passed by legislative bodies.

c. is different from illegal behavior

In most personal computer systems, the CPU is contained on a single chip called the _______. Select one: a. semiconductor b. ALU c. microprocessor d. control unit

c. microprocessor

For multicore processors to be used effectively, computers must understand how to divide tasks into parts that can be distributed across each core—an operation called _______. Select one: a. arithmetic-logic processing b. multiplexer processing c. parallel processing d. graphics coprocessing

c. parallel processing

What type of software enables you to create dynamic slide shows? a. word processing b. spreadsheet c. presentation d. database

c. presentation

Which is NOT a component of a search engine? a. spider b. indexer program c. subject directory d. search engine software

c. subject directory

If your computer can't store all the required operating system data in RAM, it can use a temporary file on the hard drive to store data. This is known as a _________ file. a. Linux b. non-volatile c. swap d. thrash

c. swap

A CD-RW disc _______.

can be erased and rewritten

drive D

cd drive

The Web was introduced in 1991 at

center for european nuclear research cern

client/server

central computer provides information and resources to other computers

Integrated circuits must be mounted on _______, which are then plugged into the motherboard.

chip carriers

Tiny circuit-boards etched onto squares of sand-like material, called silicon, are called____.

chips

Printers connected to the Internet that provide printing services to others on the Internet are called _______.

cloud printers

Which of the following is not an input device? a. touch-screen monitor b. optical mouse c. keyboard d. laser printer

d. laser printer

All of the following are key attributes of an operating system EXCEPT a. manages memory and storage b. provides a user interface c. manages the CPU d. tracks connections to external networks

d. tracks connections to external networks

Artists interface with technology often, but cannot yet a. use computers to generate images that respond to the environment. b. use computers to create a virtual storefront. c. use software to suggest plot endings. d. use software to create and enhance virtual performances.

d. use software to create and enhance virtual performances.

Ebook readers

designed for displaying the content of digital publications; NOOK and Kindle are eBook readers

Programs that allow you to mix text and graphics and focus on flexible page design and layout.

desktop publishing

Directory assistance

devices that disabled people use to command wheel chairs and other objects that make them more mobile

Which pointing device action should you use for moving objects, such as icons on the desktop?

dragging

Which of the following is a permanent storage device?

hard drive usb flash drive

The equipment that processes data in order to create information is called the

hardware

The equipment that processes data in order to create information is called the _______.

hardware

Mechanical Mouse

has a ball located on the bottom that rolls around on a flat surface as the mouse is moved. Sensors inside the mouse determine the direction and distance of the movement.

The hard disk''s disk surface is scratched and some or all of the data is destroyed when there is a:

head crash

web page typically contains _______, which contains the formatting instructions for displaying the web page.

hypertext markup language html

shortcuts

icons on desktop background that can be double clicked to access programs, files, folders, even devices that you use frequently

folder name

identifies the type of files you store in the folder and the purpose of the folder

any document created with a program is temporarily stored in RAM

if the poser fails, then everything in RAM is lost

windows 7 places files and folders you delete in a recycle bin

if you delete a folder, windows 7 removes the folder as well as all files and subfolders stored in it.

Windows 7 lets you work with more than one program at a time

if you open two or more programs a window opens for each one

These programs are used to create and edit vector images

illustration programs

Systems analysis and design

is a discipline that focuses on developing information systems according to the phases of an SDLC The scope of systems analysis and design encompasses the people, procedures, computers, communications networks, and software involved with handling information in an organization

DSL (digital subscriber line)

is a high-speed, digital, always-on, Internet access technology that runs over standard phone lines; it's offered by AT&T's U-verse service

A solid state drive (SSD) is?

is a package of flash memory that can be used as a substitute for a hard disk drive

A digital camera's resolution

is measured in MP

Latency

is the elapsed time for data to make a round-trip from point A to point B and back to point A

Ping

is utility software designed to measure responsiveness

A ____ gathers files and folders from different locations on your computer and displays them in one location

library

LCD stands for ________ display.

liquid crystal

switch user

locks your user account and displays the welcome screen so that another user can log on their account

if your computer is set up for more than one user, you might need to __, or select your user account name when the computer starts

log in

To determine what devices are connected to your router, you should

log into an account associated with your router's IP address.

file hierarchy

logic and layout of the folder structure on a disk

The process the CPU performs for each program instruction is called the

machine cycle

twisted pair

made up of copper wires

fiber-optic

made up of plastic or glass and transmits data at extremely fast speeds

The primary input devices for smartphones are ________

microphone and touch pad

In most personal computer systems, the CPU is contained on a single chip called the _______.

microprocessor

Which of the following computers is also referred to as a server and is used to support end users for things such as retrieving data from a database or providing access to application software?

midrange

Add-on programs for a variety of mobile devices including smartphones and tablets.

mobile apps

Smartphones

mobile devices with features similar to a tablet computer; provide telecommunications capabilities over cell phone networks

Output examples

monitor smart screen monitor speakers

Activity trackers

monitors your steps and heart rate

When you ____ a file, the file is transferred to the new location and no longer exists in its original location

move

Google

offers Google Drive for storage, file sharing, and collaborative editing.

Which of the following is true about an internal hard disk?

often stores the operating system

Laser Virtual Keyboards

packaged in a case smaller than a soda can, a laser beam is used to generate a full size laser keyboard. Generally used for smart phones and such.

Which company was on eof the first to introduce personal digiatal assistance?

palm

Desktop, laptop, and tablet computers, and mobile devices are classified as _______.

personal computers

Desktop, laptop, and tablet computers, and mobile devices are classified as_______.

personal computers.

Text messaging is also called ________.

short message service (SMS)

Gantt charts

shows the duration of development tasks as they occur over time

Horizontal market

software is designed for common elements of many businesses

A Web application (or Web app) is?

software that is accessed with a Web browser Web apps are an example of cloud computing Some popular Web apps include: Gmail, Google Docs, and Turnitin Most Web apps require no installation at all on your local computer or handheld device

The most widely used audio-output devices.

speakers and headsets

ISDN

stands for Integrated Services Digital Network; it divides a telephone line into two channels, one for data and one for voice, by using packet switching

DCE

stands for data communication equipment; these devices control the speed of data over networks, convert signals from cables to wireless, check for corrupted data, and route data to its destination

RW. Rewritable

technology uses phase change technology to alter a crystal structure on the disc surface; altering this structure creates patterns of light and dark spots resembling pits and lands

System testing

testing ensures that all the hardware and software components work together

A CD-RW is a compact disc __________________.

that is rewritable

The speed of a level of cache memory is impacted by

the chip's proximity to the CPU

One-time purchase

the software remains basically the same as when it was purchased

All of the following are examples of a platform except

windows vista/microsoft

Which of the following is not one of the three basic components of cloud computing?

wireless connectivity

To create documents that consist primarily of text, you need this software

word processor

ACL

Audit Control Language; Software used by forensic accountants for auditing tasks

CPU cache is?

CPU cache (pronounced "cash") is a special high-speed memory that allows a microprocessor to access data more rapidly

The amount of time your current CPU is working is called

CPU usage

A glass picture tube is known as a _______________.

CRT

A monitor that was designed to act as an input device is known as a(n) ______________________ monitor.

touch screen

clipcoard

when you use the copy command, windows 7 places a duplicate copy of the file on the clipboard

True or False. Biometric scanning devices are used to scan employee identification cards.

False

communication device

A device that serves as both an input and output device and enables you to connect to other devices on a network or to the Internet.

How a BitTorrent works

A BitTorrent network server breaks a movie file into pieces and begins to download those pieces to the first computer that requested the movie As more computers request the file, they become part of a "swarm" that uses peer-to-peer technology to exchange movie segments with each other After the server has downloaded all the segments to the swarm, its job is complete and it can service other requests

Wireless scanners

A Bluetooth barcode scanner uses Bluetooth wireless technology to scan data, such as from a hospital bracelet, and transmit it to a computer

nonvolatile

A form of storage that does not need power to keep its data.

Font

Also known as typeface, is a set of characters with a specific design.

Computer programming

Computer programming encompasses a broad set of activities that include planning, coding, testing, and documenting

Tracks

Concentric circle on the hard drive

Windows and MacOS

Examples of GUI

A collection of related fields such as a person's name, address, and age.

Record?

Memory

Temporary storage that's used by a computer to hold instructions and data.

Every smartphone contains a GPS chip

True

NOR

Which of the following is NOT a Boolean operator?

Administrative Privileges

You need this in order to install software.

bandwidth cap

Your bandwidth cap is the top speed allowed by your plan

DOS and Unix

Examples of a CLI.

Dumpster Diving

Stealing personal information from garbage cans

contrast ratio

the contrast between true black and true white on a screen

The distance between each pixel.

Dot pitch

C2C

Electronic commerce involving individuals selling to individuals

Which of the following is NOT an example of a smartphone OS?

Linux

Impact printers

Printers that use mechanism. Strikes the paper

Twitter

The most popular microblogging site:

access

The three primary privacy issues are accuracy, property, and:

overclock

To run a processor at speeds higher than it was designed to perform.

A byte is formed by a group of _______. Select one: a. 4 bits b. 8 bits c. 12 bits d. 16 bits

b. 8 bits

Software Suite

Individual application programs that are sold together as a group.

Which of the following is not a type of scanning device?

Stylus

Input examples

Stylus touchscreen keyboard and mouse

Top level of privilege in an operating system

administrator

Which of these is not a mass storage device?

optical disc

are the most important part of any information system.

people

point

to move the mouse pointer over an icon

peer-to-peer

each node can communicate directly with every other node on the network

The Internet is the largest _______ in the world

network

start button

the launching point when you want to communicate with your computer

Noise reduction

"noise" refers to spots, dust, and scratches left on old photos after they are scanned

backup

A copy of a file that is stored externally in case something happens to the original file

data breach

A data breach is an incident in which personal data is viewed, accessed, or retrieved without authorization Data breaches can be caused by the following: Malware attacks Employee negligence Insider theft

data center

A data center is a specialized facility designed to hold and protect computer systems and data

heat sink

A part of the cooling system of a computer, mounted above the CPU and composed of metal or ceramic to draw heat away from the processor.

sound card

An expansion card that provides audio connections for both input devices and output devices.

screen saver

An image that usually moves around on a monitor that appears after a given period of keyboard or mouse disuse; used to prevent image burn on monitors

Document

Any kind of text material.

This type of software can be described as end user software and is sued to accomplish a variety of tasks.

Application

System software includes all of the following except:

Browsers

Consistency check

Checks that *data in fields corresponds*, e.g. if Title = 'Mr' then Gender = 'M' (data validation).

Format check

Checks that *data is in specified format* (data validation).

Which of the following ports is used for connecting musical instruments to a sound card?

Choices MIDI S/PDIF MiniDP eSATA Correct answer: MIDI

This type of network strategy uses central servers to coordinate and supply services to other nodes on the network.

Client/server

processor

Clock speed measures the speed of the ________________

This allows you to upload and store documents on the Internet.

Cloud Storage

groups

Communities of individuals who share a common interest typically create Facebook ____

The combined information presented on this type of database can be used to change the whole merchandising strategy of a store.

Company

UNIVAC

Completed in 1951, the first commercially successful electronic digital computer was the ___________.

CSI

Computer Security Institute; An organization that conducts an annual survey to help determine the scope of cybercrime in the United States

SSID

Create an SSID (service set identifier); this will be the name of your wireless network

Field

Each column of information within a record is called a field. A field contains related information on a specific item like employee names within a company department.

Most digital cameras use ________ for storage.

FLASH MEMORY

A WiFi network is always faster than a 4G network

False

ASCII supports Chinese and Japanese. Select one: True False

False

Graphics cards connect the system board to secondary storage

False

T/F: Criminal investigators may find evidence on a computer, but that evidence cannot be used in court.

False

T/F: Inkjet printers are considered legacy technology.

False

T/F: QR codes let companies track your past purchases and customize offers for you.

False

The amount of RAM storage is measured in

GB

To speed up the display of graphics, a __ is installed on some video cards

GPU

_____ is a feature of a CPU that allows it to begin to fetch the next instruction before it has finished executing the current one.

Hyperthreading

Recalculation

If you change one or more numbers in your spreadsheet, all related formulas will automatically recalculate and charts will be recreated.

CD-ROM

If you purchase software in a box, it is likely distributed on which type of storage media?

These programs are used to create and edit vector images.

Illustration Programs

Text Entry

In a worksheet or spreadsheet, a text entry is typically used to identify or label information entered into a cell as opposed to numbers and formulas. Also known as labels.

transaction

In an information system context, a transaction is an exchange between two parties that is recorded and stored in a computer system

microprocessor

In most personal computer systems, the CPU is contained on a single chip called the ___________________.

actors

In object-oriented jargon, the people who use the system are called actors; any task an actor performs is called a use case

form factor is?

In the computer industry the term form factor refers to the size and dimensions of a device or components, such as circuit boards and system units

resource

In the context of digital devices, the term resource refers to any component that is required to perform work

Graphical User Interface

Includes screen elements such as dialog boxes, windows, toolbars, icons, and menus.

information brokers

Individuals who collect and sell personal data.

hackers

Individuals who gain unauthorized access to your computer or computers that contain information about others.

Formula

Instructions for calculations in a spreadsheet. It is an equation that performs calculations on the data contained within the cells in a worksheet or spreadsheet.

Internet governance

Internet governance is simply a set of shared protocols, procedures, and technologies that evolve through common agreement among network providers

Twitter is an example of what type of site?

Microblog

Which of the following are two important components of the system unit?

Microprocessor and memory

Smart appliances

Modern refrigerators, washing machines, and other appliances are controlled by integrated circuits called microcontrollers that combine sensors with processing circuitry

Niche Devices

Niche devices all have one thing in common: They contain a microprocessor

Expansion Slot

Opening on the motherboard where an expansion board, also called an adapter card, can be inserted.

Two categories of laser printers are:

Personal and shared

Sector

Pie-shaped wedge on the hard drive

The dark spots are called?

Pits

Optical discs use these to represent data.

Pits and lands

Optical discs use these to represent data.

Pits and lands?

Portable software is

Portable software is designed for PCs and it runs from removable storage, such as a USB flash drive There are a limited number of portable apps, but the available selection covers most essential tasks Portable software is so simple to install that it is sometimes referred to as install-free software

Programs that combine a variety of visual objects to create attractive, visually interesting presentations are called:

Presentation Graphics

The process of accessing information from secondary storage devices is referred to as _______.

Reading

R. Recordable

Recordable technology uses a laser to change the color in a dye laser sandwiched beneath the clear plastic disc surface; the laser creates dark spots that are read as pits

Database Manager

Software package used to set up, or structure a database such as an inventory list of supplies. It also provides tools to edit, enter, and retrieve data from the database.

firewall

Special hardware and software used to control access to a corporation's private network is known as:

System requirements specify ?

System requirements specify the operating system and minimum hardware capacities necessary for a software product to work correctly

- make up the basic structure of a relational database with columns containing field data and rows containing record information.

Tables

Dot pitch (dp)

The LED's that form an image on the screen are spaced in a grid; dp is the distance in millimeters between like-colored LEDs

file system

The OS uses a file system to keep track of the names and locations of files that reside on a storage medium, such as a hard disk

Internet

The basic components of cloud computing are clients, service providers, and the _______.

What does the term hot-swappable mean?

The computer can remain powered on while a device is plugged in or removed.

data flow diagram

The core documentation tool for project teams using structured methodology is the data flow diagram (DFD), which graphically illustrates how data moves through an information system

default application

The software application associated with a specific file type is called a default application

Add-on Gadgets

There are lots of options available for gadgets that accompany your digital devices

There are ___ levels of cache memory

Three

Mass storage devices are specialized high-capacity secondary storage devices designed to store large amounts of data for an organization.

True

Microsoft Access is an example of general-purpose application software. Select one: True False

True

SuperFetch is a memory-management technique that pulls info from your hard drive into RAM

True

T/F: Audio files can include music you have downloaded or installed, audio book files, or podcast files.

True

T/F: Data and information are not interchangeable terms.

True

T/F: You can terminate non-responsive programs with Task Manager.

True

True of False. The ATM works on the principle of real-time processing.

True

True or False. Thermal printers use heat elements to produce images on heat-sensitive paper and are used at ATMs and gasoline pumps.

True

Bluetooth

Two wireless standards are WIFI and ________.

This operating system is widely used by servers on the web, mainframe computers, and very powerful personal computers.

UNIX

Many mobile devices include a micro ________ port

USB

downloading

Using file transfer utility software, you can copy files to your, you can copy files to your computer from specially configured servers on the Internet. This is called:

Specialized and powerful programs, called - are typically used to create specialized commercial sites.

Web Authoring Programs

BASIC

What programming language transformed the software industry because beginning students could learn it easily?

The first computers were "programmed" to perform a specific task by connecting wire circuitry in a certain way

When a computer "runs" software, it performs the instructions to carry out a task

symmetric connection

When upload and download speeds are the same, you have a symmetric connection

Which of the following is not a well-known Web browser?

Windows Explorer

B Male connector

a USB connector that connects a USB 1.x or 2.0 device such as a printer

Which of the following is NOT an Internet protocol? a. ARPANET b. HTTP c. FTP d. BitTorrent

a. ARPANET

Which of the following ports provide high-speed connections for external hard disk drives, optical disks, and other large secondary storage devices?

eSATA

____ is the process of making changes to a document.

editing

Limitations to iOS:

iOS limits your selection of apps to those provided by the online Apple App Store, unless you make unauthorized modifications to "jailbreak" the phone Background processes, such as music, voice calls, and notifications, provide very limited multitasking capabilities

Digital Camera

A camera that takes and stores photographs as digital files. digital cash Allows so

class diagram

A class diagram provides the name of each object, a list of each object's attributes, a list of methods, and an indication of the associations between objects

Network Adapter

A communication device used to establish a connection with a network. The adapter may be onboard, an expansion card, or a USB device and may be wired or wireless. Also called a network interface card.

data store

A data store is a medium that holds data

Ps/2 port

A legacy port used to connect a keyboard and mouse.

A memory card is a?

A memory card is a flat, solid state storage medium commonly used to transfer files from digital cameras and media players to computers

homegroup

A named set of computers that share information

predictive methodology

A predictive methodology requires extensive planning and documentation up front; it's used to construct buildings and assemble cars—tasks that are well defined and predictable

Multi-core Processor

A processor that consists of two or more processors integrated on a single chip.

quality-of-service metric

A quality-of-service metric is a technique used for measuring a specific QoS characteristic

Query

A question or request for specific data contained in a database. Used to analyze data.

sort key

A sort key is the column of data that is used as the basis for rearranging the data

Laptops and tablets use _______ that are typically located outside the system unit.

AC adapters

Data *persistence*

Ability of a program to *save data* and *return to it and reload it* when it is run.

Bluetooth Smart, ZigBee, and Z-Wave

Additional low-power short-range technologies developed specifically for IoT networks include Bluetooth Smart, ZigBee, and Z-Wave

agile methodology

An agile methodology focuses on flexible development and specifications that evolve as the project progresses

Blu-ray disc (BD)

An optical disc with about five times the capacity of a DVD. The single-layer disc capacity is 25 GB, and the double-layer disc capacity is 50 GB.

Optical Mouse

An optical mouse uses a laser to detect the mouse's movement. Optical mice have no mechanical moving parts.

web log

Another name for a blog is _________

These discs have a capacity of 50 gigabytes on one side.

Blu-Ray

This indicates the monitor's ability to display colors by comparing the light intensity of the brightest white to the darkest black.

Contrast ratio

These specialty processors are designed to improve specific computing operations such as displaying 3-D images and encrypting data.

Coprocessors

What is the function of a file extension?

Correct A file extension is the second part of a file name that is assigned by the program used to create the file.

Which of the following are not a primary function of the operating system

Determining how a peripheral functions

Android

Developed in 2007, Android is a mobile operating system that is a popular platform for tablet computers, smartphones, and ebook readers Android devices have a screen-based home button rather than a physical button In addition to touchscreen input, the Android OS supports voice input for Google searching, voice dialing, navigation, and other applications

All of the following are commonly used units of measurement to describe memory capacity, except _______.

Nanobyte

What is output?

Output is the result produced by a computer

Which of the following is an example of a locally administered network?

P2P network

For multicore processors to be used effectively, computers must understand how to divide tasks into parts that can be distributed across each core--an operation called _______.

Parallel Processing

For multicore processors to be used effectively, computers must understand how to divid tasks into parts that can be distributed across each core- an operation called:

Parallel processing

______ are the most important part of any information system.

People

microblog

Publishes short sentences that only take a few seconds to write.

Data Diddling

Refers to changing data before, during or after they are entered into a computer system; the change can delete, alter, or add important system data

Worm

Replicate themselves repeatedly like a virus, and they can consume internal memory, disk space, and Internet bandwidth

megapixels

Resolution of photographs is measured in ________.

Ripping

Ripping is a slang term that refers to the process of importing tracks from a CD or DVD to your computer's hard disk The technical term for ripping music tracks is digital audio extraction

________ are used extensively in manufacturing environments.

Robots

The operating system is a type of

Software program

Audio Plugins

Software that works in conjunction with your computer's browser to manage and play audio from a Web page

EnCase

Software used by forensic accountants for file copying, custody documentation, and other forensic activities

Only the ___ button does not activate a program that exists in the operating system

Start

Which of the following can be used to add additional ports to your network?

Switch

This type of computer is a thin slab that is almost all monitor with the system unit located behind the monitor.

Tablet

Font Size

The height of a character measured in points, with each point being 1/72 inch.

the x and y coordinate systems

The mouse is able to move in different directions through use of ________.

Screen resolution

The number of horizontal and vertical pixels that a device displays on the screen

hard drive

The primary mass-storage device in a computer that stores data magnetically on metal platters. Also called hard disk or hard disk drive.

set-up exe or start-up exe

The program names that you search for if the installation program doesn't start automatically when you insert the CD.

What is a system unit?

The term system unit is tech speak for the part of a digital device that holds the system board

software piracy

The unauthorized copying and distribution of software is called:

What is the primary reason that Macintosh computers can now run Microsoft Windows as well as the Apple OS?

They are now using Intel processors.

integrated circuits

Third-generation computers are characterized by the use of ________________

Paste

To transfer files/folders from the Clipboard to a new location, from the Clipboard group, click the ________ command.

802.11ac is the current wireless Ethernet standard

True

HDMI ports make it possible to use a computer as a video jukebox or an HD video recorder. Select one: True False

True

True or False. Does RAID give fast access speed?

True

True or False. The ATM works on the principle of real-time processing

True

The type of image is made up of geometric shapes or objects.

Vector

This type of e-mail account is more widely used because it frees the user from installing and maintaining an e-mail client on every computer used to access e-mail.

Web-based

Access speed

Which of the following measures the amount of time required by the storage device to retrieve data and programs?

eSATA

Which of the following ports provide high-speed connections for external hard-disk drives, optical discs, and other large secondary storage devices?

internal hard drive

Which of the following types of storage has a relatively low price per GB, fast transfer speed, and is secure inside a system unit?

processing insurance claims.

Which of the following uses would be most appropriate for a mainframe computer?

Internal hard drive

Which of the following would NOT be a recommended place to back up or copy computer files?

Multithreading

allows multiple commands, or threads to run simultaneously

history file

browsers store the locations of sites visited in a:

A CD-RW disc:

can be erased and rewritten.

Running the disk cleanup utility is a quick way to

clear out unnecessary files

The processing speed of a microprocessor is typically represented by its _______.

clock speed

Subscription

consumers pay an annual fee to use software; updates and upgrades are usually included in the pricing

A use case diagram

documents the users of an information system and the functions they perform

file extension

found at the end of the filename you provide. program you are using will add the file extension

When a file is broken up into small parts that are stored wherever space is available, the hard disk is said to become _______.

fragmented

windows search

help you quickly find any file, folder, or program

Database software

helps you enter, find, organize, update, and report information stored in a database Database software stores data as a series of records, which are composed of fields that hold data

A record

holds data for a single entity—a person, place, thing, or event

A USB flash drive is ?

is a portable storage device that plugs directly into a computer's system unit using a built-in USB connector 45 cents per gb

A software update (sometimes called a software patch)?

is a small section of program code that replaces part of the software currently installed

Acceptance testing

is designed to verify that the new information system works as required

Bandwidth

is the transmission capacity of a communication channel

start button

launching point when you want to communicate with your computer

What is the brightness of a projector rated in?

lumens

Storage that retains its data after the power is turned off is referred to as:

nonvolatile storage.

resolution

number of data points used to capture and image

The two major types of system software programs are utility programs and the

operating system

iOS and Android are _____ for tablets and smartphones.

operating systems

gadgets

optional programs that present helpful or entertaining information on your desktop

program

set on instructions written for a computer

desktop background

shaded area behind your desktop objects

minimize button

shrinks a window to a button on the taskbar

coaxial cable

single copper wire surrounded by layers of plastic

mouse pointer

small arrow or other symbol that moves on the screen

The most widely used handheld computers are

smartphones

The most widely used handheld computers are _______.

smartphones

On the motherboard, the connection points for chips are referred to as ____.

sockets

On the motherboard, the connection points for chips are referred to as _______.

sockets

Vertical market

software is designed for a specific industry or enterprise; the software that controls touchscreen order entry at fast food restaurants is an example of software designed for vertical markets

drag and drop

technique in which you sue your pointing device to drag a file or folder into a different folder and the drop it or let go of the mouse button

MMS

technology that allows the sending of text, sound, images, and video clips

SMS

text messaging

Screen size

the measurement in inches from one corner of the screen diagonally across to the opposite corner

Security and privacy risks?

the more places your data is stored and the more networks on which it tavels, the more susceptible it becomes to hackers and spying agencies

resolution

the number of pixels on a monitor screen that are addressable by software (example: 1024 x 768 pixels)

All components are controlled by _____ which depends on drivers.

the processor

search criteria

the search text you type

desktop background

the shaded area behind your desktop objects

dialog box

type of window in which you specify how to complete an operation some menu commands automatically display a dialog box

Real

used for fields that contain numbers with decimal places

Bluetooth

uses radio wave to transmit data

Input and output components are ________________.

visible to the user

The GPL (General Public License)

was developed for a free operating system called GNU; it's slightly more restrictive than the BSD license because it requires derivative works to be licensed

Service outages

when a cloud storage site has an outage, all the data stored there become temporarily inaccessible

In the URL "http://www.simnetonline.com", what is the domain name?

www.simnetonline.com

decision model

A decision model is a numerical representation of a realistic situation, such as a cash-flow model of a business that shows how income adds to cash accounts

decision query

A decision query is a question or a set of instructions describing data that must be gathered to make a decision

decision support system (DSS)

A decision support system (DSS) helps people make decisions by directly manipulating data, accessing data from external sources, generating statistical projections, and creating data models of various scenarios

volatile

A form of storage that requires power to preserve stored information.

Malware

A term for many types of malicious or damaging software, such as viruses, worms, and Trojan horses

operating system

A type of software program that determines how the processor interacts with the user and system components. Also known as OS.

ISP

The most common way to access the Internet is through a(n)

Property

Privacy concern related to who owns data

a password is a set of instructions written for a computer

false

a(n) __ is a collection of stored information, such as a letter, video, or program

file

The windows app used for file management is

file explorer

When you click a Folder in the Navigation pane, you see its contents in the ____.

file list

CDFS (Compact Disc File System)

the 32-bit file system for CD discs and some CD-R and CD-RW discs

Open source software makes

uncompiled program instructions—the source code—available to programmers who want to modify and improve the software; Linux is an example of open source software Two of the most common open source and free software licenses are BSD and GPL

What was the name of the first Web browser? a. Mosaic b. Internet Explorer c. Netscape d. Firefox

a. Mosaic

With this type of memory, large programs are divided into parts and the parts are stored on secondary device, usually a hard disk.

Virtual

to move a window, you must drag its border

false

maximize button

expands the window to fill the entire desktop

database index

A database index contains a list of keys, and each key provides a pointer to the data that contains the rest of the fields related to that key

game controller

A type of input device that's used to interact with video games.

Inkjet printer

A type of printer that uses a nonimpact process. Ink is squirted from nozzles as they pass over the media.

biometric

A type of scanning device such as fingerprint and iris (eye) scanner.

operating system

A type of software program that determines how the processor interacts with the user and system components

Web bug

A type of spyware that uses invisible images or HTML code hidden within a web page or an e-mail message.

Flash memory card

Smartphones use which of these storage technologies?

detailed design phase

The goal of the detailed design phase is to create very detailed specifications for the complete information system

Mac OS X includes a backup utility called

Time machine

Seek time

Time required for the read/write head to move to the correct track

special characters

% and * are examples of these.

Which of the following extensions is associated with a video file?

.wmv

A disk partition is

A disk partition is a section of a hard disk drive that is treated as a separate storage unit; most hard drives are configured with a single partition that contains the OS, programs, and data

Row

A horizontal block of cells one cell high all the way across the worksheet.

end-user license agreement (EULA

A license to permit use of software that you install

Window

A rectangular area containing a document or message.

USB (universal serial bus)

A standard port type that's used to connect many kinds of devices, including printers, mice, keyboards, digital cameras, cell phones, and external drives. Up to 127 devices can share a single USB port.

Memory Card

A storage medium that uses flash memory to store data.

DHCP

Activate DHCP (assigns addresses to each device that joins your network)

unit testing

As each application module is completed, it undergoes unit testing to ensure that it operates reliably and correctly

What is a computer?

At its core, a computer is a multipurpose device that accepts input, processes data, stores data, and produces output, all according to a series of stored instructions

Toolbar

Bar located typically below the menu bar containing icons or graphical representations for commonly used commands.

underscore characters

Commonly used to give the appearance of spaces.

This type of e-commerce often resembles the electronic version of the classified ads or an auction.

C2C

Computer Trainer

Computer professional who provides classes to instruct users.

Spreadsheet

Computer-produced spreadsheet based on the traditional accounting worksheet that has rows and columns used to present and analyze data.

The following activities can get you started on choosing the right digital device:

Consider how you plan to use your device Choose the type of device Decide on a budget and stick to it Select a platform Check out the device's specifications

A service that uses existing phone lines to provide high-speed connections is called _______.

DSL

In most current systems, ____ is the type of RAM used

DDR3

What are development tools?

Development tools are used for creating software applications, Web sites, operating systems, and utilities

RFID and NFC

Existing wireless technologies such as RFID and NFC offer potential solutions

Most microcomputers allow users to expand their systems by providing these on the system board.

Expansion slots

Most personal computers allow users to expand their systems by providing these on the system board.

Expansion slots

Icons

Graphic objects on the desktop used to represent programs and other files.

Most applications us a(n) - that displays graphical elements called icons to represent familiar objects.

Graphical User Interface

Every computer on the Internet has a unique numeric address called a(n) _______.

IP Addess

IPv4

Internet Protocol version 4); is the Internet address standard; uses 32-bit addresses to identify Internet connected devices

Which among the following is a fraudulent or deceptive act designed to trick individuals on the Internet into spending time or money for little or no return?

Internet Scam

static addresses

Many devices on the Internet have permanently assigned IP addresses called static addresses

This version of Mac OS X has better power management and enhanced workflow options for multiple monitor setups.

Mavericks

The system board is also known as the _______.

Motherboard

Computer Abuse

Occurs when someone, who does not have permission, uses or accesses someone else's computer or causes damage without intention to harm

Presentation software supplies

Presentation software supplies the tools for combining text, photos, clip art, graphs, animations, and sound into a series of electronic slides that can be shown on a screen or projector Popular prsentation software products include Microsoft PowerPoint, iWork Keynote, and Google Docs Slides

Encryption

Protects transmitted data that might be intercepted enroute and also stored data, which are rendered useless to a hacker even if he or she manages to gain access to files that are protected by other means

Dialog Box

Provides additional information and request user input.

central processing unit (CPU)

The brain of a computer; housed inside the system unit on the motherboard. It consists of two parts the arithmetic logic unit and the control unit.

network interface controller

The circuitry that enables a device to access a LAN is called a network interface controller (NIC)

hierarchy

The type of folder structure created by Windows is known as a ________.

chat

Two popular instant messaging services are Google Talk and Facebook

DB-15

a 15-pin female port that transmits analog video

MiniDin-6 connector

a 6-pin variation of the S-Video port and looks like a PS/2 connector used by a keyboard or a mouse

FireWire 400

a data transmission standard used by computers and peripherals (for example, a video camera) that transmits at 400 Mbps; also called 1394a

1394a

a data transmission standard used by computers and peripherals (for example, a video camera) that transmits at 400 Mbps; also called FireWire 400

composite video port

a port used by television or by a video card that is designed to send output to a TV; the port is round and has only a single pin in the center of the port; also called a RGB port

Tablets

a tablet computer is a portable computing device featuring a touch-sensitive screen used for input and output; uses a specialized OS

DVD (digital versatile disc or digital video disc)

a technology used by optical discs that uses a red laser beam and can hold up to 17 GB of data

eBay and Craigslist are examples of what kind of electronic commerce? a. C2C b. B2B c. B2C d. C2B

a. C2C

Which of the following is not considered an accessibility utility? a. System Restore b. Magnifier c. Narrator d. Speech Recognition

a. System Restore

A computer's performance

affected by the speed of the pro- cessor, the amount of RAM, hard disk size and speed, capability of monitor, and disk organization.

A(n) ________ is a procedure that you would use to solve a problem.

algorithm

Laptop

also referred to as a notebook computer; small and lightweight with a clamshell design and keyboard at the base

The most common way to access the Internet is through _______.

an Internet service provider (ISP)

UNIX

an OS conceived in 1969 by Ken Thompson and Dennis Ritchie of AT&T's Bell Labs. In 1974, this code was rewritten in the standard programming language C.

Peripheral devices

are connected to the computer through serial, parallel, and Universal Serial Bus (USB) ports. USB is a newer standard expected to replace serial and parallel ports.

SCSI, IrDA, and Bluetooth

are special-purpose ports.

System requirements

are the criteria for successfully solving problems identified in an information system

What is the name for a list of links you've visited within a Web site? a. Favorites b. breadcrumb trail c. Bookmarks d. history

b. breadcrumb trail

Frequently-accessed information is held in _______. Select one: a. hard drive b. cache memory c. flash memory d. read only memory

b. cache memory

Which port enables your computer to communicate with networks and other computers? a. USB b. connectivity c. DVI d. VGA

b. connectivity

if you no longer need a folder or file, you can delete it from the storage device

by regularly deleting files and folders you no longer need an emptying the recycle bin, you free up valuable storage space on your computer

Which of the following is not a character encoding standard? Select one: a. EBCDIC b. ASCII c. CISC d. Unicode

c. CISC

A type of specialty processor devoted exclusively to protecting your privacy. Select one: a. Data cards b. Micro cards c. Cryptoprocessor d. Embedded cards

c. Cryptoprocessor

Which of the following is true about plug-ins? a. Plug-ins rarely require updating. b. Plug-ins track the Web sites you've visited. c. Plug-ins are necessary for viewing most Web graphics. d. Plug-ins cannot present security risks.

c. Plug-ins are necessary for viewing most Web graphics.

The type of computer that you might find in your automobile is a. a mainframe computer. b. a supercomputer. c. an embedded computer. d. none of the above.

c. an embedded computer.

Aspect ratio

compares the width of the display to the height of the display as a ratio. Many older screens have an aspect ratio of 4:3. Most new ones have a 16:9 aspect ratio to accomodate wider screens.

shut down

completely shuts down a computer

Some popular form factors include:

component, clamshell, and slate

a slate tablet

configuration has a narrow frame screen that lacks a physical keyboard; Apple iPad is a slate tablet

A dial-up

connection is a fixed Internet connection that uses a voiceband modem and the telephone company's circuit-switched network to transport data between your computer and your ISP

toolbars

contain program buttons

Which system of ethics is most widely agreed upon to be the best system? a. Utilitarianism b. Relativism c. Virtue ethics d. There is no universally agreed-upon best system.

d. There is no universally agreed-upon best system.

What was the first spreadsheet application? a. Lotus 1-2-3 b. Excel c. WordStar d. VisiCalc

d. VisiCalc

An Internet connectivity plan is also known as a ________ plan.

data

which pointing device action should you use for opening programs, folders, or files represented by desktop icons?

double clicking

the ___ utility is used for detecting lost files and fragments of files on your hard drive

error checking

Parallel processing?

executes more than one instruction at a time and works well with today's multicore microprocessors

A password is a set of instructions written for a computer.

false

All devices must run the same version of an operating system to connect to a home network

false

Once you name a folder, you cannot rename it.

false

The QuickLook Pane is an area on the right side of a window that shows you what a selected file looks like without opening it.

false

Ping rate

indicates how quickly data can reach a server and bounce back to you

icons

small images that represent items such as the recycle bin on your computer

You can search Help and Support by typing one or more descriptive ____.

keywords

you can search help and support by typing on or more descriptive __.

keywords

you can search help and support by typing on or more destructive __.

keywords

the lighter, non-pitted surface areas of the disc are called?

lands

External hard drive

offer as much space as a typical hard drive. They are designed to move easily between computers. Hard drives are faster and offer more space than other storage devices.

The process of accessing information from secondary storage devices is referred to as:

reading.

Window

recTangular area ThaT can conTain a documenT, program, or message.

Inpainting

reconstructing lost or unwanted areas in a photo

Ecommerce

refers to business transactions that are conducted electronically over a computer network

The quality and level of detail on a screen is determined by the ___________________.

resolution

Windows creates "restore points" so that you can

return your system to the way it was before you installed new software.

shut down windows and your computer

save and close any open documents and files close any open programs and windows shut down windows

Systems programmers

specialize in developing system software such as operating systems, device drivers, security modules, and communications software

Criteria for selecting a printer

speed, print quality, cost, usage

These special programs continually look for new information and update the databases used by search services.

spiders

a _ is a box with up and down arrows; click arrows or type to increase or decrease the value

spin box

Which would be the most appropriate type of application to create, analyze and forecast budgets?

spreadsheet

Wide range of programs that secretly record and report an individual's activities on the internet

spyware

taskbar

the horizontal bar at the bottom of the desktop

the arrow

the most common pointing device

search criteria can be a filename, part of a filename, or any other characters you choose

to search your entire computer including its attached drives you can use the search box on the start menu

Laser printers require _______________ to produce printed documents.

toner powder

One way to improve the storage capacity of a hard disk is to ________.

use file compression

copy

when you copy a file you original file stays in its current location and you have a duplicate copy of the same file in another location.

you can move one of more files or folders when you move a file, the file is transferred to the new location and no longer exists in its original location

you can move a file using the the cut and past commands you can rename files to make the names more descriptive or accurate

send to

you can use the send to command to quickly copy a file, a group of files, a folder, or a group of files from one disk drive to another

expert system shell

An expert system shell is a software tool containing an inference engine and a user interface that developers use to enter facts and rules for a knowledge base

system development life cycle

An information system progresses through several phases as it is developed, used, and retired; these phases encompass as system development life cycle, or SDLC

Microphone

An input device that converts sound into digital signals and is used to chat in real time or as part of voice-recognition applications used in video games and for dictating text.

Mouse

An input device that may include one or more buttons and a scroll wheel and works by moving across a smooth surface to signal movement of the pointer.

keyboard

An input device that translates keystrokes into a signal a computer understands, and the primary input device for entering text into a computer.

expansion slot

An interface on a motherboard that expansion cards plug in to.

port

An interface to which a peripheral device attaches to or communicates with the system unit.

object database

An object database, also called an object-oriented database, stores data as objects, which can be grouped into classes and defined by attributes and methods

Symbian

An operating system that was created for cell phones.

DVD (digital video disc/digital versatile disc)

An optical disc that can hold about 4.7 GB of information (single-layer [SL]). Double-layer (DL) DVDs have a second layer to store data and can hold about 8.5 GB.

organizational chart

An organizational chart depicts the hierarchy of employees in an organization

executable files

Antivirus or firewall programs may block the download or operation of these.

enterprise

Any organization that seeks profit by providing goods and services is called a business or an enterprise

Motherboard

A circuit board that contains all of the computer system's main components.

A communication network

A communication network (or communication system) links together devices to data and information can be shared among them

port

A connection point that is used to attach a peripheral device to a motherboard.

data type

A data type specifies the way data is represented on physical storage media and RAM

input device

A device used to enter data into the computer system so it can be processed.

RAM (random access memory)

A form of volatile memory that holds the operating systems, programs, and data the computer is currently using.

resolution

A form of volatile memory that holds the operating systems, programs, and data the computer is currently using.

Snipping Tool program

A full or partial screen shot of a window can be done with the _________________

(GPU)

A graphics card contains a graphics processing unit (GPU) and a special video memory, which stores screen images as they are processed but before they are displayed

router

A router is a device that controls the flow of data within a network and also acts as a gateway to pass data from one network to another

runtime error

A runtime error occurs when a program runs instructions that the computer can't execute

3-D Graphics

3-D Graphics are based on vectors stored as a set of instructions describing the coordinates for lines and shapes in a three-dimensional space Vectors form a wireframe that works like the framework for a tent The process of covering the wireframe surface with color and texture is called rendering The technique for adding light and shadows to a 3-D image is called ray tracing

data bus

A wire on the motherboard over which information flows between the components of the computer.

Wireless Mouse

A wireless mouse is a battery-powered device that relies on infrared or radio waves to communicate with the computer.

compressed

A(n) ________ file is smaller in size than the original file, takes up less storage space, and can be transferred to other computers quickly.

byte

A(n) __________ is 8 bits.

Cellular services use _______ to provide wireless connectivity to the Internet.

3G and 4G cellular networks

A 32-bit-word computer can access _______.

4 bytes at a time

When using 7.1 surround sound there are a total of

8 speakers

Launched in 1969 as a U.S. funded project that developed a national computer network, the Internet was initially called _______.

ARPANET

mobile apps

Add-on programs for a variety of mobile devices including smartphones and tablets

To play digital music files you can use

All of the above

Which of the following might cause interference or poor connectivity between nodes on a wireless network?

All of the above

shut

All open programs and files will close, network connections will close, and your hard disk drive will stop when you ________ down your computer.

*Textual user interface* (TUI)

Allows user to *interact* with software applications through *command-line interfaces*.

*Graphical user interface* (GUI)

Allows user to *interact* with software applications through *graphical icons*.

Worksheet

Also known as a spreadsheet, or sheet; a rectangular grid of rows and columns used in programs like Excel.

The proportional relationship between a display's width and height.

Aspect ratio

ACFE

Association of Certified Fraud Examiners; An international professional organization committed to detecting, deterring, and preventing fraud and white-collar crime; conducts a biannual survey and publishes the results in its Report to the Nation on Occupational Fraud and Abuse

A 32-bit-word computer can access

4 bytes at a time

____ is the process of making changes to a document.

Editing

T/F: Only productivity software is offered bundled as a software suite.

False

A library of electronic images is called a(n) _______. Select one: a. database b. vector library c. bitmap gallery d. image gallery

Image gallery

This operating system is designed to run only with Apple computers.

Mac OS

processor

See CPU.

instruction cycle

The steps a CPU uses to process data: fetch, decode, execute, store. Also known as the fetch-and-execute cycle or the machine cycle.

Which is not an example of a smartphone operating system? a. iOS b. BlackBerry c. Android d. Linux

d. Linux

Strategic planning

emphasis on long-range and future goals

Cloning

employs algorithms pulling pixels from one area and moving them to another

The series of dots that form the image on a monitor are called _______.

pixels

Borrowing hard drive space to optimize RAM storage is known as

virtual memory.

border

window's edge used to resize a window

serial processing?

With serial processing, the processor must complete all steps in the instruction cycle before it begins to execute the next instruction

Pointer

Within a network database, pointers a additional connections between parent nodes and child nodes. Thus, a node may be reached through more than one path and can be traced down through different branches.

Term used to describe the number of bits that a CPU can access at one time.

Word

To create documents that consist primarily of text, you need this software.

Word Processor

A financial budget would be created in what type of data file?

Worksheet

Which of the following is NOT a reason to connect your digital entertainment device to your home network?

Your stored entertainment files are more secure when connected to a home network.

QuickTime

________ is the default program for displaying .mov files.

text box

a box in which you can type text or a setting

dxdiag.exe

a command used to display information about hardware and diagnose problems with DirectX

A Male Connector

a common type of USB connector that is flat and wide and connects a matching hub on a computer or USB hub

HDMI connector

a connector that transmits both digital video and audio and is used on most computers and televisions

tabs

a dialog box may have one or more tabs for organizing related settings together on a single sheet

HDMI (High-Definition Multimedia Interface)

a digital port that can transmit both audio and video signals.

CompactFlash (CF) card

a flash memory device that allows for sizes up to 137 GB, although current sizes range up to 32 GB

Portable media players

a handheld device that can store and play music; iPod touch is a portable media player

Mainframes

a large and expensive computer capable of simultaneously processing data for hundreds or thousands of users; looks like a closet sized cabinet; used to provide centralized storage, processing and management for large amounts of data

library

a library gathers files and folders form different locations on your computer and displays them in one location a library is not a folder that stores files, but rather a way of viewing similar types of documents that you have stored in multiple locations on your computer

Product activation is ?

a means of protecting software from illegal copying by requiring users to enter a product key or an activation code

LCD (liquid crystal display) monitor

a monitor that uses liquid crystal display technology; produces an image using a liquid crystal made of large, easily polarized molecules; flatter than CRT monitors and take up less desk space; also called a flat panel monitor

flat panel monitor

a monitor that uses liquid crystal display technology; produces an image using a liquid crystal made of large, easily polarized molecules; flatter than CRT monitors and take up less desk space; also called an LCD monitor

Pointing stick

a pressure-sensitive device that looks like a pencil eraser.

option button

a small circle you click to select an option (you can only select one option button in the group)

Applet

a small program stored in a web page file and designed to run by web browser software

pixel

a small spot on a fine horizontal scan line; illuminated to create an image on the monitor

spin box

a text box with up and down arrows; you can type a setting or you can click the arrows to increase or decrease a setting

CRT (cathode-ray tube) monitor

a type of monitor first used in older television sets

plasma monitor

a type of monitor that provides high contrast with better colors than LCD monitors; they work by discharging xenon and neon plasma on flat glass, and don't contain mercury

OLED (Organic Light-Emitting Diode) monitor

a type of monitor that uses a thin LED layer or film between two grids of electrodes and does not use backlighting

A hash value is

a unique number derived from encoding one or more data sets, such as names, serial numbers, and validation codes

Laptops and tablets use _______ that are typically located outside the system unit. Select one: a. AC adapters b. batteries c. power supply units d. MiniDc

a. AC adapters

Which of the following types of character recognition systems is used for standardized multiple-choice testing?

OMR

The Apple iPhone uses a version of Apple's _____ as its operating system.

OS X

Which of the following is an operating system available for mainframe or organizational computers

OS/390

sockets

On the motherboard, the connection points for chips are referred to as ___________________

non-volatile, meaning?

Once the data is stored it is non-volatile, meaning the circuits retain data without an external power source

Which of the following characteristics about RAID is incorrect?

One high-capacity hard disk drive

flat file

One of the simplest models for storing data is a flat file that consists of a single, two-dimensional table of data elements

This system software is responsible for managing your computer's resources including memory, processing, and storage.

Operating system

Microsoft WIndows

Operating systems that includes Windows XP, Windows Vista, and Windows 7. It also includes operating systems for network servers and for portable devices. Legacy Windows OSs include Windows 3.1, NT, 95, 98, Me, and 2000.

This type of mouse emits and senses light to detect mouse movement.

Optical

Which of these is not a mass storage device?

Optical disc

Output

Output is data that has been processed into a useful format. Printed text, spoken words, music, pictures, video, graphics are all examples

Permissions

Permissions specify how shared files can be used Read and write permission - (full control) allows access for opening, viewing, modifying, and deleting files Read permission - allows authorized people to open a file and view it, but not modify or delete it Write-only permission - works like drop box, allowing people to put files in one of your folders, but not open, copy, or change any files you have stored there

Bar code readers use _______ embedded in them to read bar codes.

Photoelectric cells

profiles

Photos, lists of personal interests, contact information, and other personal information displayed on Facebook.

Which view of data deals with how the data is actually formatted and located?

Physical view

The series of dots that form the image on a monitor are called:

Pixels

VOIP is a service that lets you

Place phone calls using the internet as the network

Programs that combine a variety of visual objects to create attractive, visually interesting presentations are called: Select one: a. graphs b. presentation graphics c. diagrams d. charts

Presentation graphics

The ____ is an area on the right side of a window that shows you what a selected file looks like without opening it.

Preview Pane

Nonimpact Printers

Printers that forms images without touching tha paper.

encryption

Process of coding information to make it unreadable except to those who have a key.

system restore

Process of reinstating a previous set of operating system settings

Processors based on ARM technology ?

Processors based on ARM technology dominate tablet computers and smartphones ARM technology was originally designed by ARM Holdings, a British technology company founded by Acorn Computers, Apple Inc., and VLSI Technology ARM processors are energy efficient - an important characteristic for battery powered devices ARM processors are found in iPads, iPhones, and Surface tablets

Public domain software is not -

Public domain software is not protected by copyright because the copyright has expired or the author has placed the program in the public domain, making it available without restriction

Graphics that typically appear as black and white boxes that automatically link mobile devices to a variety of different content including games, text, videos, and websites. Select one: a. QR code reader b. QR codes c. Bar codes d. ISBN numbers

QR codes

Which of the following is not an example of secondary storage?

RAM

Which of the following will not retain data after the computer is turned off?

RAM

Which one of the following is not considered a form of secondary storage?

RAM

The operating system of a cell phone is stored in ________

ROM

ROM (read-only memory) is?

ROM (read-only memory) is a type of memory circuitry that is housed in a single integrated circuit on the system board ROM contains a small set of instructions and data called the boot loader which tell a digital device how to start

Having several instances of the same data is called data _______.

Redundancy

This type of database is organized into many tables with common data items (key fields) linking the tables to one another.

Relational

schema

Relational databases are organized according to a schema, which is a blueprint for its structure; rows, columns, and tables of a database are part of its schema

Altaire

Released in 1975, the ____________ computer was the first personal computer.

cloud storage is?

Remote storage can also be available as an Internet service, in which case it is called cloud storage Cloud storage is provided to individuals by services such as Apple iCloud, Microsoft OneDrive, Google Drive, and Dropbox

There are several reasons why you might want to change the contents of ROM and boot loader instructions, including:

Repair User modification Forensics Updates

This GUI includes tabs, groups and galleries. Select one: a. Character-based b. Ribbon c. Contextual d. Dialog

Ribbon

This GUI includes tabs, groups, and galleries.

Ribbon

These organize commonly used commands into sets of tabs.

Ribbons

___________________ are used extensively in manufacturing environments.

Robots

This type of Wi-Fi hotspot operates close to a legitimate Wi-Fi hotspot and steals information such as usernames and passwords.

Rogue

Platters

Round, thin plate of mental that makes up a hard drive

Sandra is creating a flyer for her boss in Word. She is saving the file with a name that contains a question mark (?). What will be the outcome if Sandra tries to save the file on a Windows PC?

Sandra's file name will not be saved because the question mark is not permitted.

Phishing

Scams that use email or websites that claim to be legitimate but that ask you to provide or update your personal information such as account number, credit card number, or password

Which of the following is not a system software program type?

Sectors

network interface card

See network adapter.

Which is NOT true about self-publishing?

Self-publishing means your work will have a limited reach to readers.

USB flash drive

Small, portable storage media

The size, or _______, is measured by the diagonal length of a monitor's viewing area.

active display area

The size, or ________, is measured by the diagonal length of a monitor's viewing area.

active display area

after you open a folder, the area near the top of the screen is the ____, which shows the name of the item you have opened.

address bar

Selective color change

algorithms are used to colorize black and white photos

File History is?

allows for automated data backup and file synchronization to make copies of files from your Documents, Music, Picture, etc

Box and Dropbox

allows free file storage and sharing up to GB

digitizing tablet

an input device that can use a stylus to hand draw; it works like a pencil on the tablet and uses a USB port; also known as a graphics tablet or digitizer

digitizer

an input device that can use a stylus to hand draw; it works like a pencil on the tablet and uses a USB port; also known as a graphics tablet or digitizing tablet

Touch-Sensitive Pad

an input device that enables users to scroll through and play music, view pictures, and etc on a portable media player

biometric device

an input device that inputs biological data about a person; the data can identify a person's fingerprints, handprints, face, voice, eye, and handwriting

touch screen

an input device that uses a monitor or LCD panel as a backdrop for user options; can be embedded in a monitor or LCD panel or installed as an add-on device over the monitor screen

SCM

Supply chains are complex, so businesses use SCM (supply chain management) to maximize efficiency and profitability

jumpers

Switches on hard drives are also known as ___________

This type of software works with end users, application software, and computer hardware to handle the majority of technical details.

System

This type of software works with end users, application software, and computer hardware to handle the majority of technical details. Select one: a. Communications b. Application c. Utility d. System

System

There are four components of digital devices that require maintenance:

System unit Keyboard Screen Battery

This type of computer is a thin slab that is all monitor with the system unit located behind the monitor.

Tablet

*Operating system*

The *software that controls all of the computer's hardware*. Acts as *interface* between user and hardware and between applications and hardware.

moving text, graphics, or interactive features on a web page are called

animations

OS X is the operating system developed by

apple

This type of software can be described as end user software and is used to accomplish a variety of tasks.

application

accessories

application programs that come with with windows 7

Workers

are the people who directly carry out the organization's mission

The CPU is composed of the control unit and the ___ unit

arithmetic logic

Launched in 1969 as a U.S. funded project that developed a national computer network, the Internet was initially called

arpanet

refresh rate

as applied to monitors, the number of times in one second the monitor can fill the screen with lines from top to bottom; also called vertical scan rate

The BSD license originated

as the Berkeley Software Distribution license for a server operating system

The width of a monitor divided by the height of the monitor calculates the:

aspect ratio

Digital compositing

assembling more than one image into one by using clipping paths and alpha bending

Word Processor

The computer and the program allow you to create, edit, save, and print documents composed of text.

UML

The current standard for object-oriented documentation is referred to as UML (Unified Modeling Language) Three of the most frequently used UML tools include use case diagrams, sequence diagrams, and class diagrams

formatting

The formatting process creates the equivalent of electronic storage bins

*User interface* (UI)

The means by which a *user can control* a software application or hardware device.

domain name system (DNS)

The mechanism for tracking domain names and their corresponding IP addresses is called the domain name system (DNS)

connection speed

The most common measurement of connection speed is the amount of data that can be transmitted in a specified time; technically, it is a measure of capacity

PCI (peripheral component interconnect)

The most common type of expansion slot on a motherboard.

communicating

The most popular internet activity

LinkedIN

The most widely used business oriented social networking site.

Internet

The network that connects computers all over the world.

255

The number of characters that Windows allows in file names.

iOS

The operating system for Apple mobile devices that is a closed and proprietary architecture.

GUI (Graphical-User Interface)

The opposite of a text-based operating system.

A utility program that makes a copy of all files or selected files that are in the libraries, contacts, and favorites on the desktop.

Backup and Restore

a public IP address

Because a private IP address cannot be routed over the Internet a local router connects instead The local router has a public IP address that is routable over the Internet

Which programming language revolutionized the software industry? a. ALGOL b. BASIC c. COBOL d. FORTRAN

b. BASIC

Which of the following is a function of the control unit? Select one: a. It provides pathways that support communication among the various electronic components. b. It directs the movement of electronic signals between memory and the arithmetic-logic unit. C c. It performs fundamental math operations like addition, subtraction, and so on. d. It uses the logic to compare two pieces of data.

b. It directs the movement of electronic signals between memory and the arithmetic-logic unit.

Which is NOT a technology that has been used to deliver assistance during times of crisis? a. Ushahidi b. QR codes c. Social networking d. e-mail

b. QR codes

This method of file transfer distributes file transfers across many different computers.

BitTorrent

Image editors edit images consisting of thousands of pixels that form this type of image.

Bitmap

Image editors edit images consisting of thousands of pixels that form this type of image. Select one: a. Vector b. Bitmap c. Object d. Electronic

Bitmap

The field of psychology that theorizes that happiness results from ethical living is known as a. principled psychology. b. positive psychology. c. moral psychology. d. affirmative psychology.

b. positive psychology.

Windows 8 Metro apps a. run on the desktop b. run full screen c. can't be closed down once started d. use a large amount of RAM

b. run full screen

When using the Internet for research, you a. can assume that everything you find is accurate and appropriate. b. should evaluate sites for bias and relevance. c. can assume the author is an authority on the subject matter. d. can assume that the links provided on the site are the only additional sources of information.

b. should evaluate sites for bias and relevance.

The minimum set of recommended standards for a program is known as the a. operating system. b. system requirements. c. setup guide. d. installation specs.

b. system requirements.

Megabit per second is usually used to measure

both a and b

The Windows app used for file management is a. Disk Manager b. Task Manager c. File Explorer d. Library Explorer

c. File Explorer

Which of the following offers a combination of the features of RAM and ROM? Select one: a. DRAM b. DDR c. Flash Memory d. Cache Memory

c. Flash Memory

What should you do if you spot unethical behavior at your workplace? a. Nothing as long as the behavior is legal. b. Report it to the police. c. Follow company procedures for reporting unethical behavior. d. Start looking for a new job.

c. Follow company procedures for reporting unethical behavior.

Which components are characteristic of third-generation computers? a. Transistors b. Vacuum tubes c. Integrated circuits d. Microprocessor chips

c. Integrated circuits

Frequently-accessed information is held in ____

cache memory

Integrated circuits must be mounted on ____, which are then plugged into the motherboard.

chip carriers

log off

closes all windows, programs, and documents, logs off your user account, and displays the welcome screen

Database

collection of related data

file

collection of stored information

Supercomputers:

considered the fastest computers in the world at the time of construction; can tackle complex tasks other computers cannot; typical use includes breaking codes, modeling weather systems, and simulating nuclear explosions

Trial

consumers use a software product during a free trial period

folder

container that helps you organize your files

all programs menu

contains a list of all the application programs on your computer

fixed-length field

contains a predetermined number of characters (bytes)

Recovery drive (system repair disc)

contains parts of the OS necessary to boot your computer and diagnose system problems

A field

contains the smallest unit of meaningful information; it is the basic building block for a structured file or database

analog

continuous sound or light waves

pointing device

control the movement of the mouse pointer on your computer screen

Small data files deposited on your hard disk from websites you have visited

cookies

Application programmers

create productivity applications such as Microsoft Office

Ergonomics is an important consideration a. only for desktop computers b. only for notebook computers c. only for notebook and desktop computers, but never for mobile devices d. for all computing devices

d. for all computing devices

Which of these are NOT located on the motherboard? a. CPU b. ROM c. RAM d. hard drive

d. hard drive

IT is the abbreviation for a. information training. b. Internet training. c. Internet technology. d. information technology.

d. information technology.

If your computer freezes, pressing a combination of Ctrl, Alt, and ________ should bring up a dialog box that enables you to close the unresponsive program.

delete

Data dependence

dependence is a term that refers to data and program modules being so tightly interrelated that they become difficult to modify

System documentation

describes a system's features, hardware architecture, and programming

User documentation

describes how to interact with the system to accomplish specific tasks

data plan

determines the cost and amount of data transfer for mobile devices

A list of connected devices can be viewed in the ________ window.

device manager

Game consoles

devices for playing computer games such as Sony's Play Station and Nintendo's Wii

_______ provide additional information and request user input.

dialog boxes

MP3

digital music file format

Three ways to improve the performance of a hard disk include ________.

disk caching, RAID, and file compression

Three ways to improve the performance of a hard disk include:

disk caching, RAID, and file compression.

Which of the following Send to menu commands copies the file to the Documents library?

documents

The process of pressing and releasing the left mouse button two times in rapid succession is known as ______________.

double-clicking

which pointing device action should you use for moving objects such as icons on the desktop?

dragging

drive E

dvd drive

This method of file transfer has been used for decades and is frequently used for uploading changes to a Website hosted by an Internet service provider

ftp

_ are optional programs that present helpful or entertaining information on your desktop

gadgets

__ are optional programs that present helpful or entertaining information on your desktop

gadgets

___ are optional programs that present helpful or entertaining information on your desktop

gadgets

Most applications use a(n) _______ that displays graphical elements called icons to represent familiar objects.

graphical user interface gui

What is the most common use for Bluetooth?

hands-free handsets for cell phones

These are specialized graphics programs for editing or modifying digital photographs.

image editors

library of electronic images is called a

image gallery

Image enhancemennt

improves brightness, color saturation, and focus

You are most likely to find a real-time operating system (RTOS)

in your automobile.

Smartglasses

include Google Glass; controlled by voice commands or a touchpad on the rim; has a camera and display device that essentially beams an image toward the wearer's eye

A local application is

installed on a computer's hard disk Office suites, games, and professional software tools are common examples of local applications for desktop and laptop computers

lock

locks your user account, then displays the welcome screen (same as lock button)

Malicious programs that damage or disrupt a computer system

malware

resizing buttons

maximize button restore down button minimize button

Jitter

measures the variability of packet latency caused when network traffic and interference can delay packets and create erratic data flow

Resolution of photographs is measured in ________________.

megapixels

A ____ is a list of related commands

menu

The most widely used audio-input device is the _______.

microphone

The most widely used audio-input device is the ________.

microphone

In most personal computer system, the CPU is contained on a single chip called the:

microprocessor

smart sensors are?

The utopian vision for the Internet of Things (IoT) is a busy hive of smart sensors that work behind the scenes to collect data and use it to improve just about anything

Apple

Their platforms are well known for the strength of their graphics and audio features.

Denial of Service Attack

These attacks can take multiple forms and often involve malware; a single virus or worm program enlists the aid of innocent "zombie computers" which then send email messages to or request services from, the target system. The barrage of incoming mail or service requests then overwhelms the target system, typically requiring its owners to disable it

plug-ins

These programs are automatically started and operate as a part of your browser

computer monitoring software

These programs record every activity and keystroke made on a computer.

Trojan Horse Programs

These programs reside in the disk space occupied by legitimate copies of computer programs

FireWire

These types of ports typically provide high-speed connections to specialized devices such as camcorders and storage devices.

success factors

They also serve as an evaluation checklist at the end of a project, so they are sometimes referred to as success factors

All of the following are true of DVD-ROM drives except:

They are also known as erasable optical discs.

Which statement about vaccuum tubes is not accurate?

They seldom need to be replaced.

Computer Fraud and Abuse Act of 1986

This act defines cybercrime as any illegal act for which knowledge of computer technology is essential for its perpetration, investigation, or prosecution; currently being evaluated for revision because much of its language was developed before the Internet boom

system unit

This hardware houses most of the electronic components that make up a computer system.

platform

This is made up of the operating system combined with the processor.

digital cash

This is the Internet's equivalent to traditional cash

ARPANET

This project launched the Internet

cloud

This type of computing frees users from owning, maintaining, and storing software and data

Keyboards that are widely used on various smartphones and other small portable devices, and which are designed primarily for communicating via texting and connecting to the Web.

Thumb

the Internet backbone

Tier 1 networks, such as AT&T, represent the top of the Internet hierarchy and form the Internet backbone, a system of high-capacity routers and fiber-optic communication links providing the main routes for data speeding across the Internet

optical storage is?

CD, DVD, and Blu-ray (BD) technologies are classified as optical storage, which represents data as microscopic light and dark spots on the disc surface

Which of the following is not a character encoding standard?

CISC

Check digit

Checking if the *last one or two digits of the code are correct* (data validation).

Proofreading data

Checking the *data entered against the original document* (data verification).

Program verification

Checking whether you are *building the program correctly*.

Lookup table

Checks for *acceptable values* in a table or array (data validation).

Batch totals check

Checks for *missing records* (data validation).

Presence check

Checks if *data has been entered into a field* (data validation).

Latency

Time needed for correct sector to spin to the read/write head

Small data files that are deposited on a user's hard disk when they visit a website are called _______.

Cookies

Finder

To change the program that opens a file in Mac OS X, which of the following would be used?

Ctrl

To copy selected files using a keyboard shortcut, hold down the ________ key as you drag the files to another folder.

file shredder softwar

To delete data from a disk in such a way that no one can ever read it, you can use a special file shredder software that overwrites supposedly empty sectors with random 1s and 0s; this is handy if you want to sell or donate your computer and want to make sure your personal data is no longer on the hard disk

All of the following are methods to protect a computer from theft EXCEPT ________.

Correct Answer: placing identification tags on the system unit and monitor Incorrect options below: securing the computer to the desk or table with cables and locks controlling access to computer labs carefully safeguarding a portable computer when traveling

Which of the following is true about flash memory?

Correct answer: It can be plugged into a USB port. Options It can be plugged into a USB port. It is faster than RAM. It has multiple moving parts. It requires constant power to store data.

The difference between remote controls that use infrared light and those that use radio waves is that ________.

Correct infrared light requires the user to point the remote control directly at the appliance

The arrangement of keys on a keyboard, QWERTY reflects the keyboard layout by ________.

Correct taking the letters of the first six alphabetic characters found on the top row of keys

wireless encryption key

Create a wireless encryption key (a network security key or password

electronic profiles

Created by databases to provide highly detailed and personalized descriptions of individuals.

True or False. The system unit, also known as the system chassis, is a container that houses most of the electronic components that make up a computer system.

True

VGA and DVI ports provide connections to monitors. Select one: True False

True

What-if analysis is a very powerful and simple tool to test the effects of different assumptions in a spreadsheet. Select one: True False

True

You can terminate nonresponsive programs with Task Manager

True

eSATA ports provide high-speed connections for external hard disk drives, optical disks, and other large secondary storage devices. Select one: True False

True

capitalization and spaces

Two things you must use in your password in order to log on to an operating system.

Which of the follow ports is NOT used to connect a video card?

USB

Which type of port was developed to reduce the number of different types of ports on a computer?

USB

Which of the following is NOT a cloud storage product?

USB flash drive

spam

Unwanted and unsolicited e-mail

You can send messages that include photos and videos between mobile devices using ________ technology

multimedia message service (MMS)

Most operating systems support the ability to switch between different applications. This is called _______.

multitasking

homegroup

named set of computers that can share information if your computer is in a homegroup with other computers you can share libraries and printers with those commuters

The Internet is the largest _______ in the world.

network

Legacy Technology

old technology that's still used alongside its more modern replacement, typically because it still works and is cost-effective

documents folder

on the hard disk drive where you create folders and subfolders for your files

scroll bar

on the right side and or bottom of the window click scroll bar elements to show parts of your document that are hidden below the bottom edge or off to the right side of the screen

edit

once you have created a file and saved it with a name in a folder on a storage device, you can easily open it and edit it

Which of the following characteristics about RAID is incorrect?

one high-capacity hard disk drive

Device drivers are written for a specific combination of ____________ and devices.

operating systems

The type of media that uses laser technology to store data and programs is _______.

optical disc

The type of media that uses laser technology to store data and programs is

optical disk

The ____ icon on the Help toolbar lets you print, browse, search, set Help text size, and adjust settings.

options

the _ icon on the help toolbar lets you print, brows, search, set help text size, and adjust settings.

options

A software license

or license agreement, is a legal contract that defines the ways in which a computer program may be used These licenses are sometimes referred to as EULAs (End User License Agreements)

Hard disks store and organize files using all the following, except:

paths

The fax machine

performs both input and output functions through a telephone line.

Two categories of laser printers are _______.

personal and shared

Two categories of laser printers are ________.

personal and shared

Desktop, laptop, and tablet computers, and mobile devices are classified as

personal computers

Bar code readers use _______ embedded in them to read bar codes.

photoelectric cells

The Internet is a(n) _______ made up of wires, cables, satellites, and rules for exchanging information between computers connected to the network.

physical network

The operating system is often referred to as the software environment or software _______.

platform

_______ do not use streaming technology and are used to download media files to your computer.

podcasts

click

point to an icon and then click once with the left mouse button to select the icon

double click

point to an icon click twice quickly with the left mouse button to open the object

Programs that combine a variety of visual objects to create attractive, visually interesting presentations are called:

presentation graphics

Device Manager

primary Windows 7/Vista/XP tool for managing hardware

LCD Panels

produce an image by manipulating light within a layer of liquid crystal cells

Highly detailed and personalized descriptions of individuals are electronic:

profiles

Security

program specifications are formulated to so programmers remain aware of security throughout the software development life cycle

Performance

programmers need to carry out real-world tests to ensure that programs don't take too long to load

Usability

programs should be easy to learn and use and be efficient

Demonware is?

proprietary software made available as a trial version; it's distributed for free and often comes preinstalled on new devices

Dialog box

provide additional information and request user input

log in

provide your user account name and password to verify that you are authorized to use the computer security feature fro protecting your computer

Multitasking

provides process and memory management services that allow two or more tasks, jobs, or programs to run simultaneously

These apps allow mobile devices to use their digital cameras to scan special codes.

qr code reader

Packet loss

refers to data that never reaches its destination or gets discarded because it arrives too late

Cloud computing

refers to software and services that are offered strictly online rather than purchased in a box and installed.

Big data

refers to the huge collections of data that are difficult to process, analyze, and manage using conventional database tools An example of big data is the 1 million transactions generated by Walmart sales registers every hour Big data is a relatively new phenomenon that businesses are just beginning to deal with

color depth

refers to the number of colors the monitor displays. Today's monitors can display 16.8 million colors (referred to as "true" color.)

System conversion

refers to the process of deactivating an old information system and activating a new one; it is also referred to as a "cutover" or "to go live

An optical mouse uses _________________.

reflected beams of light

restore down button

restores the window to its previous size and position (only available after maximizing a window)

These organize commonly used commands into a set of tabs.

ribbons

Apps specifically designed for windows 8

run full screen

sleep

saves your work, turns off the monitor, then reduces power usage to all hardware so your computer appears off (same as power button)

A main difference between the tablet and the smartphone is the _______

screen size

The search text that you type is called your ____.

search criteria

to find Help information you can

search using one or more descriptive key words brows help topics by subject, such as programs, tools, and games ask, which describes other ways to get help

to search within a particular folder, you can use the search box in a windows explorer window

searching on criterion me

windows aero

set of special effects for selected versions of window 7 that gives windows transparent backgrounds and subtle animations upon minimizing, maximizing, and moving When you arrange windows using aero, the windows can appear in a 3-D stack that you can quickly view without having to sue the taskbar computers hardware must support windows aero to view and work these features

Tactical planning

setting incremental goals that can be achieved in a year or less

To securely erase data, the U.S Department of Defense suggests that the data be overwritten ____ times.

seven

To select a group of items that are next to each other, click the first item in the group, press and hold ____, then click the last item in the group.

shift

restart

shuts down your computer and then restart it

DTE

stands for data terminal equipment and can be any device that stores or generates data

Date

stores dates in a format that allows them to be manipulated

Interframe compression

stores only the pixels that change color from one frame to the next

In Dolby Digital 7.1, the 1 indicates a ___ speaker

subwoofer

Which of the following is NOT considered an accessibility utility?

system restore

"Background" software that helps the computer manage resources is called

system software

"Background" software that helps the computer manage resources is called _______.

system software

Which of the following is a collection of programs rather than a single program?

system software

What are the two major software types?

system software and application software

Identify the four basic categories of hardware in a microcomputer system.

system unit input/output secondary storage communication

Which of the following phases of the systems life cycle is considered to be an ongoing activity?

systems maintenance

A microcomputer that is smaller, lighter, and less powerful than a notebook, and which has a touch sensitive screen, is called a

tablet

groups

tabs are divided into groups of command buttons

The arrangement of keys on a keyboard, QWERTY reflects the keyboard layout by _______.

taking the letters of the first six alphabetic characters found on the top row of keys

The arrangement of keys on a keyboard, QWERTY reflects the keyboard layout by _______.

taking the letters of the first six alphabetic characters found on the top row of the keyboard

Which of the following Send to menu commands copies the file to your computer's DVD drive?

DVD RW Drive (D:)

This subsystem defines the logical structure of the database by using a data dictionary or schema.

Data definition subsystem

Personal computers can be classified as: Desktop

Desktop Portable Mobile devices A personal computer is designed to meet the computing needs of an individual The term personal computer can be abbreviated as PC

Which of these is not an example of solid state storage?

Digital versatile disc

This process improves system performance by acting as a temporary high-speed holding area between a secondary storage device and the CPU.

Disk caching

Which of the following Windows utility programs arranges pieces of files on your hard drive to allow for faster access?

Disk defragmenter

Which of the following printer features enables you to print on both sides of a sheet of paper?

Duplex

bandwidth throttling

During peak times, ISPs can place further limits on speed, a process called bandwidth throttling

kernel

During the boot process, the OS kernel is loaded into RAM; a kernel provides essential operating system services, such as memory management and file access

implementation phase

During the implementation phase of the SDLC, the project team supervises the tasks necessary to construct the new information system

A dedicated mobile device for storing and displaying ebooks and other electronic media including electronic newspapers and magazines.

E-book reader

A dedicated, mobile device for storing and displaying e-books and other electronic media including electronic newspapers and magazines.

E-book reader

Foldable Keyboards

Easlily transported keyboards. Primarily used with PDA, and pocket R-P-C devices. Soft to the touch, and are water resistant.

Form

Electronic forms reflecting the contents of one record or table. Primarily used to enter new records or make changes to existing records.

dual boot

Enables a computer to select which operating system you want to use.

The process of coding information to make it unreadable except to those who have a special piece of information known as a key.

Encryption

The study of human factors related to things people use.

Ergonomics

objectivity

Evaluate the accuracy of information on the Web by considering authority, accuracy, currency and _________

Social Engineering

Examples include: posing as a bona fide employee and convincing network administrators to give them new passwords over the phone; posing as a new, helpless employee who appears desperate and "borrows" a password from a fellow worker in order to accommodate a fictitious "emergency"

All of the following are advantages of VoIP EXCEPT _______

Excellent reliability during Internet or power outages

Microsoft Office uses an interface with traditional menus and toolbars. Select one: True False

False

Parallel processing requires a computer to perform one complete task before beginning the next task. Select one: True False

False

T/F: System restore points can only be automatically created by Windows on a regular schedule.

False

cache memory

Fast memory that stores frequently accessed information close to the processor.

Word Wrap

Feature of word processing that automatically moves the cursor from the end of one line to the beginning of the next.

Format

Features that change the appearance of a document like font, font sizes, character effects, alignment, and bulleted and numbered lists.

Editing

Features that modify a document such as using a thesaurus, find and replace, or spell check.

Which physical connection is the fastest?

Fiber-optic cable

Text file

File *structured as a sequence of lines*. Each line is a sequence of characters and is terminated by an *end-of-line character*.

First popularized by apple computer, this type of operating systems uses icons, menus, and a mouse.

GUI

Audio Software

General-purpose software and apps used for recording, playing, and modifying audio files, such as iTunes

In a virtualized environment, this operating system runs on the physical machine.

Host

A web page typically contains _______, which contains the formatting instructions for displaying the web page.

Hypertext Markup Language (HTML)

___ provides high-speed information processing by enabling a new set of instructions to start before the previous set is finished

Hyperthreading

Internet exchange points

ISPs exchange data at Internet exchange points (IXPs)

Ethernet adapter

If you want a wired network connection but your computer has no Ethernet port, you can purchase and install an Ethernet adapter (also called an Ethernet card)

These programs are used to create and edit vector images. Select one: a. Illustration programs b. Photo editors c. Presentation graphics d. Image galleries

Illustration programs

These are specialized graphics programs for editing or modifying digital photographs. Select one: a. Image editors b. Desktop publishing c. Presentation graphics d. Illustrations

Image editors

view

In File Explorer, to change how files in the file list display, click the ________ tab.

capacitors are?

In RAM, microscopic electronic parts called capacitors hold the bits that represent data

LCD (liquid crystal display)

technology produces an image by filtering light through a layer of liquid crystal cells

ROM. Read-only

technology stores data permanently on a disc, which cannot be later added to or changed; can potentially store data for 100 years

Plug-and-play

technology that allows a hardware compo- nent to be attached to a computer so that it is automatically configured by the operating system, without user intervention.

backups

the ability to copy folders and files allows you to create backups of important folders and files in case you lose the original folders and files if you lose your original folder or file, you can copy it from your backup

hot-swappable

the ability to plug or unplug devices without first powering down the system; USB devices are an example of this

native resolution

the actual (and fixed) number of pixels built into an LCD monitor; for the clearest display, always set the resolution to the native resolution

Default program associations determine ________.

the application that will open when you double-click the file name in File Explorer

pixel pitch

the distance between adjacent pixels on a screen; the smaller the number, the better

save as dialog box file save as

the first time you save a document, this menu option or button displays so that you can select the drive and folder where you want to save the file and so that you can enter a filename if you open a previously saved document make changes tot he document and then save it again, these options replace the previous version of the document and save the document in the same folder under the same filename. this menu option always displays a save and dialog box so that you can select the drive and folder where you want to save the file and so that you can enter a filename you can use this menu option to save a previously saved file on a different disk in a different folder under a different filename some combination of these three options

Biometrics

the identification of a user based on a physical characteristic, such as a fingerprint, iris, face, voice, or handwriting . It is information technology.

Moore's law refers to

the number of transistors inside a CPU chip

file system

the overall structure that an OS uses to name, store, and organize files on a disk; examples are NTFS and FAT32

Control devices/ robots

the study, designed and use of robot system for manufacturing. Does testing, product inspection, painting, and packaging

Response rate

the time it takes for one pixel to change from black to white then back to black

3G

third generation) service was available in the U.S. beginning in 2001; common protocols include CDMA and GSM ED

A keyboard key, like Caps Lock, that turns a feature on or off is called a _______ key.

toggle

In the URL "http://www.simnetonline.com", ".com" is the

top level domain tld

In the URL "http://www.simnetonline.com", ".com" is the _______.

top-level domain (TLD)

A monitor that was designed to act as an input device is known as a(n) ________ monitor.

touch screen

Wired channels

transport data through wires and cables transport data from one device to another without the use of cable or wires

Object-oriented methodology

treats an information system as a collection of objects that interact to accomplish tasks

Home network servers are used for file management tasks on a home network

true

command buttons let you issue instructions to modify program objects

true

check box

turns on an option (when checked) or turns off an option (when unchecked)

save

you must save your document to a disk, either before you exit the program or periodically while you use the program when you save a document, it is recorded in a file on a disk

You would not want to consider overclocking if

you want to keep the warranty on your system

zombies

Infected computers that can be remotely controlled

_____ is any data or instructions that are used by a computer.

Input

_______ is any data or instructions that are used by a computer.

Input

If Mr. Smith's bike has been sent to his new address, but the bill to his old one, it can most likely be attributed to a lack of data _______.

Integrity

IP

Internet Addresses are controlled by IP (Internet Protocol), which is part of the Internet protocol suite

instruction pointer?

Machine language instructions for programs are held in memory; when the program begins, the memory address of the first instruction is placed in a part of the microprocessor's control unit called an instruction pointer

oleophobic coating is?

Many touchscreens are made from Gorilla Glass, which is designed to resist scratching and cracking, and oleophobic coating, designed to repel oils from fingertips

The latest version of the Mac OS X is

Mavericks

OneDrive

Microsoft's cloud storage option that is built into Windows 8.

This type of embedded operating system is used by smartphones.

Mobile

Add-on programs for a variety of mobile devices including smartphones and tablets.

Mobile Apps

Add-on programs for a variety of mobile devices including smartphones and tablets. Select one: a. Clouds b. Utilities c. QR codes d. Mobile apps

Mobile apps

data independence

Modern database tools support data independence, which entails separating data from the programs that manipulate it

The ____ on the left side of a window shows the folder structure on your computer.

Navigation pane

broadband

Network channels that are capable of moving at least two megabits of data per second (2 Mbps) are classified as broadband

Network discovery

Network discovery is a setting that affects whether your computer can see other devices on a network, and whether your computer can be seen by others; it works in different ways on different devices Mobile devices - the OS may not offer a way to see other devices on a network Macs - OS X devices have no user-modifiable network discovery settings; offers file sharing instead Windows - Some OSs offer network discovery that allows users to turn it off or on

Internet service providers (ISPs)

Networks that form the Internet are maintained by Internet service providers (ISPs)

Ribbons

New feature of Microsoft Office 2003 that replaces menus and toolbars by organizing commonly used commands into a set of tabs.

Galleries

New feature of Microsoft Office 2003 that simplifies the process of making selections form a list of alternatives by replacing dialog boxes with visual presentations of results.

schema-less databases,

NoSQL tools create schema-less databases, allowing data structures such as fields to be added

decision support worksheet,

Using a decision support worksheet, the project team can assign scores to each criterion, weigh them, and compare totals for all solutions

This type of image is made up of geometric shapes or objects. Select one: a. Raster b. Bitmap c. Vector d. Pixel

Vector

Type of keyboard that uses a touch screen as the input device.

Virtual

With this type of memory, large programs are divided into parts and the parts are stored on a secondary device, usually a hard disk.

Virtual

Using hard disk space to temporarily store data or instructions from RAM is referred to as

Virtual memory

When a single physical computer runs this type of software, it operates as though it were two or more separate and independent computers.

Virtualization

cloud computing

What is it called when servers on the Internet supply applications as a service, rather than a product?

identity theft

What is the illegal assumption of someone's identity for the purposes of economic gain called?

asymmetric connection

When Internet upload speed differs from download speed, you have an asymmetric connection

integration testing

When all modules have been completed and tested, integration testing is performed to ensure that the modules operate together correctly

CTRL

When using Windows, to select all the folders in a window you simultaneously press the ________ and A keys.

library

When using a Windows PC, you can use a ________ to organize similar files that are located in different locations.

device letter

When working with Windows, storage devices—where files can be saved—can also be identified by a device letter

Flash Drive

Which of the following is NOT a cloud storage service?

System software

Which of the following is a collection of programs rather than a single program?

flash memory

Which of these types of memory has no moving parts and is often used to transfer data between digital cameras and personal computers?

Which of the following is a website specially designed to allow visitors to use their browser to add, edit, or delete the site's content?

Wiki

Plug-and-play is a part of the ________________ operating system.

Windows

defender

Windows ________ is built into Windows 10 to help prevent viruses, spyware, and malware from being installed on your computer without your knowledge.

System image is

Windows includes a disk image option called System image; a bit-for-bit copy of the data from all sectors of a hard disk

index

Windows maintains a(n) ________ on your system that contains information about files on your computers and helps to speed up searches.

What device would be useful to amplify a wireless signal?

Wireless range extender

What do you need to get wireless internet access at home?

Wireless router

physical sort order

A table's physical sort order is the order in which data are arranged on storage devices

Programs that allow you to mix text and graphics and focus on flexible page design and layout.

Desktop Publishing

8.3 convention

The early DOS file naming convention.

Sheet

A rectangular grid of rows and columns.

IEEE 1394

See FireWire.

Lossless

ZIP files use what type of compression?

CD (compact disc)

an optical disc technology that uses a red laser beam and can hold up to 700 MB of data

The electronic equivalent of a file cabinet is a

database

WiFi stands for ___________________.

wireless fidelity

DLP (digital light-processing) projector

A projector that uses hundreds of thousands of tiny swiveling mirrors to create an image.

T/F: Each device attached to your computer needs a device driver to communicate with the operating system.

True

T/F: The move toward access versus ownership is a sign of collaborative consumption.

True

Telephony is also known as Internet telephony, IP telephony, and Voice over IP (VoIP).

True

The control unit directs the movement of electronic signals between the memory and the ALU

True

The control unit directs the movement of electronic signals between the memory and the ALU. Select one: True False

True

This social networking site is used for professional, business-oriented networking

linkedin

The system unit, also known as the system chassis, is a container that houses most of the electronic components that make up a computer system.

True

True or False. A stylus uses pressure to draw images on a screen.

True

Double entry

*Entering data twice* and checking by *comparing* the two copies (data verification).

True or False. Cutting and pasting material from a website directly into your own report or paper without giving proper credit to the original source is unethical.

True

True or False. If you have used Google Docs to create a word processing document, you have used cloud computing.

True

True or False. Media are the actual physical material that holds the data and programs.

True

Streaming music services allow you to

Subscribe monthly and have access to millions of songs

Servers:

"serves" data to computers in a network; Google search results are provided by servers; about the size of a desk draw and mounted in racks of multiple servers

IPv6

(Internet Protocol version 6); uses 128 bits for each address; produces billions and billions of unique Internet addresses

PERT

(Program Evaluation and Review Technique) - used for analyzing the time needed to complete each project task

UDP

(User Datagram Protocol) is an alternative transport protocol which is faster than a TCP but does not perform error checking and cannot reorder packets

Operating System

(computer science) software that controls the execution of computer programs and may provide various services

Solid state storage is?

(sometimes called flash memory) stores data in erasable, rewritable circuitry, rather than on spinning disks or streaming tape

WBS

(work breakdown structure) - breaks a complete task into a series of subtasks

Data validation

*Automatic computer check* to ensure that the *data entered is sensible and reasonable*.

in a windows explorer window, you can navigate through your computer contents using the File list Address bar Navigation pane

...

Safe Mode

A mode of booting software which loads only the most essential parts of the operating system and does not load many of the utilities

modem

A modem contains circuitry that converts the data-carrying signals from a digital device to signals that can travel over various communications channels

This is a website that provides access to specific mobile apps that can be downloaded either for a nominal fee or free of charge.

App Store

Application Software is?

Application Software is a set of computer programs that helps a person carry out a task

True or False. Plug and Play has become a generic term that is associated with the ability to plug any device into a computer and have it play or work immediately.

True

True or False. The most common standard in LANs is called Ethernet.

True

Commercial software is?

Commercial software is usually sold in retail stores or on Web sites

In a computer network, this node that requests and uses resources available from other nodes.

Client

What is it called when servers on the Internet supply applications as a service, rather than a product?

Cloud computing

Which technology allows users to shift their desktop computing activities to computers on the Internet?

Cloud computing

Printers connect to the Internet that provide printing services to others on the Internet are called:

Cloud printers

Stylus

Is a pen-like writing instrument. It is used for touch screens.

Thumb

Keyboards that are widely used on various smartphones and other small portable devices, and that are designed primarily for communicating via texting and connecting to the Web.

Which of the following is TRUE about monitors?

LCD panels have virtually replaced CRT display screens.

Computer Language

Languages by which a user commands and a computer to work on the algorithm which a user has written to get an output.

serial and parallel ports

Legacy ports used to connect peripheral devices to a computer.

This version of UNIX is an open source operating system that is an alternative to Windows.

Linux

report generator

Most DBMSs include a report generator, which is a software tool for specifying the content and format for a database report

32-bit or 64bit

Most PCs today have processors that use ____________ words.

lithium ion is?

Most of today's battery-powered digital devices contain a lithium ion (Li-ion) battery Li-ion batteries can overheat and in the worst case, they can explode Smart consumers don't operate devices that are hot to the touch

tethering

Most of today's smartphones include a tethering feature that connects wirelessly with other digital devices Setting up tethering to create a mobile hotspot is easy, just remember though that data sent over the connection accumulates toward your monthly data usage total

password

Most operating systems require you to change this regularly.

The system board is also known as the:

Motherboard

Which of the following is not an example of a document file created by a word processor?

Spreadsheet

Which would be the most appropriate type of application to create, analyze, and forecast budgets?

Spreadsheet

What-if Analysis

Spreadsheet feature in which chnaging one or more numbers results in the automatic recalculation of all related formulas.

Universal Serial Bus

Standard for computer ports that support data transfer rates of up to 12 million bits per second.

Only the _____ button does not activate a program that exist in the operating system

Start

Osborne

The ______________was the first portable computer

path

The sequence of folders to a file or a folder is known as its ________.

Bulleted List

The sequence of topics arranged on a page and organized by bullets.

Public

To share files with other users of the same computer using Apple OS X, you would place them in the ________ folder.

cluster

To speed up the process of storing and retrieving data, a disk drive usually works with a group of sectors called a cluster or a block

A keyboard key, like Caps Lock, that turns a feature on or off is called a _______ key.

Toggle

Instead of using a mouse, you can use this pointing device to control the pointer by rotating a ball with your thumb.

Trackball

The essential features of this include identifying, sending, and receiving devices and breaking information into small parts for transmission across the Internet.

Transmission control protocol/Internet protocol

Free computer games and free screen saver programs are typical carriers of _______.

Trojan horses

A database is a collection of related data. Select one: True False

True

A window is a rectangular area that can contain a document, a program, or a message. Select one: True False

True

Computers require direct current (DC) to power their electronic components and to represent data and instructions. Select one: True False

True

Desktop publishing programs focus on page design and layout and provide greater flexibility for this than word processors. Select one: True False

True

Digital video can be stored in an /mpg, file, a.mpeg file or a mp4 file

True

There is only one way to start Windows Explorer

false

There is only one way to start Windows Explorer.

false

When you use the Move command, Windows 7 places a duplicate of the file on the clipboard.

false

You must double-click a folder or subfolder in the Address bar to show its contents.

false

You view your computer contents by opening a dialog box.

false

menus are windows with controls that let you tell windows what you want

false

on the scroll bar, you use the scroll arrows to scroll up or down by one screen

false

A ____ is a three- or four-letter sequence, preceded by a period, that identifies the file type.

file extension

A ____ is a system that arranges files and folders in different levels

file hierarchy

Secure Digital (SD) card

flash memory cards that follow the SD Association standards

folders

for storing and organizing files provide a location for storing your important files folders organize files into smaller groups of related files for ease of access and use when you create a folder, you give each folder a unique folder name

Image compression

frames of a video are compressed using lossy and lossless compression

The most common way to access the Internet is through

internet service provider isp

BitTorrent

is a file sharing protocol that distributes the role of a file server across a collection of dispersed computers A BitTorrent network is designed to reduce the bandwidth bottleneck that occurs when many people attempt to download the same very large file, such as a feature-length film, or interactive 3-D computer game

Satellite Internet service

is a means of distributing broadband asymmetric Internet access by broadcasting signals to a satellite In many rural areas, satellite Internet service is the only alternative to a slow dial-up connection

A packet

is a parcel of data that is sent across a computer network; when packets reach their destination, they are reassembled into the original message according to their sequence numbers

Identity theft

is the fraudulent use of someone's personal information to carry out transactions, such as applying for loans, making purchases, collecting tax refunds, or obtaining false identity documents

A communication channel

is the medium used to transport information from one network device to another

Software customization

is the process of modifying a commercial application to reflect an organization's needs

Application testing

is the process of trying out various sequences of input values and checking the results to verify that the application works as it was designed

A cell phone is cellular because

it uses a network made up of cells or base transceiver stations

Which of the following is true about the System clock?

it works similar to a wrist watch

You should give folders ____ names that help you easily identify them.

unique

Human Computer interface

uses eyecontrol to move pointer and make selections

GPS

uses satellites to locate a device

hits

using a keyword, a search engine returns a list of related sites known as:

An external hard disk:

usually connects to a USB or FireWire port.

An external hard disk __________-

usually connects to a USB or Thunderbolt port

file extension

A set of characters at the end of a filename used to identify the file type

pixel

A single point on a display screen. Short for picture element.

OpenOffice

An alternative application suite to Microsoft Office is ___________________.

In many application programs, this feature is used to provide information or request input.

Dialog boxes

_______ provide additional information and request user input. Select one: a. Dialog boxes b. Windows c. Toolbars d. Ribbons

Dialog boxes

privileges

Different ones are given to different groups by the Administrator.

Corporations often use this to prevent copyright violations.

Digital Rights Management (DRM)

file extension is a three or four letter sequence, preceded by a period

...

sequence diagram

A sequence diagram depicts the detailed sequence of interactions that take place for a use case

CASE tool

A CASE tool (computer-aided software engineering tool) is a software application designed for documenting system requirements, diagramming current and proposed information systems, scheduling development tasks, and developing computer programs

CD/DVD

A CD typically holds up to 650 MB of data. A DVD can hold up to 4.7 GB. It's good for backing up movies, video games, and copmuter software that requires a lot of space. You can use these to make many copies economically. This is the slowest method to save data.

Slide

A PowerPoint presentation is made up of many slides shown in different views and presentation styles.

A RISC is?

A RISC (reduced instruction set computer) processor performs instructions faster than a CISC (complex instruction set computer) processor

Wi-Fi - IEEE 802.11

A Wi-Fi device transmits data as radio waves and is compatible with Ethernet, so you can use the two technologies in a single network You can set up Wi-Fi in two ways Wireless mesh topology - devices broadcast directly to each other Star topology - a centralized broadcasting device, a wireless access point, coordinates communication among network devices

Backup

A backup is a copy of one or more files that is made in case the originals become damaged or lost Figuring out what to backup is important; backing up everything isn't always practical When deciding on what to back up, know what's important and ensure that current versions exist on more than one storage device

Function

A built-in formula in a spreadsheet that performs calculations automatically.

expansion card

A card that plugs directly into a slot on a motherboard and enables you to connect additional peripheral devices to a computer. Also called an adapter card.

adapter card

A card that plugs directly into an expansion slot on a motherboard and enables you to connect additional peripheral devices to a computer. Also called an expansion card.

physical storage model

A physical storage model describes what actually happens on the disks and in the circuits

Computer Peripheral

A piece of hardware that is used for both that feeds data into the computer and receiving information from it.

Trackball

A pointing device that works like a mouse turned upside down; the ball is on top of the device.

Thunderbolt

A port, that carries both PCI Express and DisplayPort video signals on the same cable, so it can be used to connect many different types of peripherals to a computer. It combines two 10 Gbps channels, and can daisy-chain up to six devices using one connection.

ribbon

A power cable and a(n) __________________ cable connect an optical drive to the motherboard.

photo printer

A printer designed to print high-quality photos on special photo paper.Can be inkjet printers that use special ink cartridges or dye-sublimation printers.

Multifunction device

A printer device with a built-in scanner and sometimes fax capabilities. Also known as an all-in-one printer.

three-dimensional (3D) printer

A printer that can create objects such as prototypes and models.

thermal printer

A printer that creates an image by heating specially coated heat-sensitive paper, which changes color where the heat is applied.

Laser Printer

A printer that produces images using the same technology as copier machines.

inkjet printer

A printer that sprays droplets of ink onto paper.

Laser printer

A printer that uses a laser beam to draw an image on a drum. The image is electrostatically charged and attracts a dry ink called toner. The drum is then rolled over paper, and the toner is deposited on the paper. Finally, the paper is heated, bonding the ink to it.

dye-sublimation printer

A printer that uses heat to turn solid dye into a gas that is then transferred to special paper.

private IP address

A private IP address can be allocated by any network without supervision from ICANN - but it cannot be used to send data over the Internet; it's not routable

procedure handbook

A procedure handbook is a type of user documentation that contains step-by-step instructions for performing tasks

normalization

A process called normalization helps database designers create a database structure that minimizes storage space and increases processing efficiency

process

A process is a routine that changes data by performing a calculation

GPU (graphics processing unit)

A processor found on a video card that can contain multiple cores.

microprocessor clock?

A processor specification, such as 3.4 GHz, indicates the speed of the microprocessor clock - a timing device that sets the pace for executing instructions

program editor

A program editor is a type of text editor specially designed for entering code for computer programs

Graphical User Interface (GUI

A program interface that includes screen elements such as dialog boxes, windows, toolbars, and menus that the user controls with a mouse or keyboard

BIOS (Basic Input Output System):

A program stored on a chip on the motherboard that's used to start up the computer.

Device Driver

A program stored on the hard drive that tells the computer how to communicate with a hardware device such as a printer or modem.

application program

A program such as a word processor, a spreadsheet, or a photo-editing program that uses the programs in the operating system

Utility Suite

A program that combines several utilities in one package to improve system performance. McAfee Office and Norton System Works are examples.

software engineering

A related activity, software engineering, is a development process that uses mathematical, engineering, and management techniques to reduce the cost and complexity of a computer program while increasing its reliability and modifiability

relational database

A relational database stores data in a collection of related tables

Smishing

A scam similar to phishing that uses text messages on cell phones

biometric scanner

A scanner that measures human characteristics such as fingerprints and eye retinas.

dedicated graphics, is?

A second option, called dedicated graphics, is graphics circuitry mounted on a small circuit board called a graphics card (or video card)

Forensic Accountants

Accountants who have the required technical and legal experience to research a given concern, follow leads, establish audit trails of questionable transactions, document their findings, organize evidence for external review and law enforcement bodies, and (if necessary) testify in court

computer Fraud and Abuse

Act that makes it a crime for unauthorized persons even to view- let alone copy or damage- data using any computer across state lines.

wireless encryption

Activate wireless encryption to scramble and unscramble data

The size, or _______, is measured by the diagonal length of a monitor's viewing area.

Active display area

A(n) ________ displays the organizational path to the active file, folder, or window.

Address bar

Portable Document Format

Adobe Acrobat and Adobe Reader are associated with which type of file?

Firewire

Also known as IEEE 1394 and IEEE 1394b. The IEEE 1394 bus standard supports data transfer rates of up to 400 Mbps and can connect up to 63 external devices; IEEE 1394b provides speeds up to 3200 Mbps.

Productivity Suite

Also known as business suites; contain professional-grade applicatoin programs, including word processing, spreadsheets, and more. A good example is Microsoft Office.

Flash card

Also known as memory cards, flash cards are as thin as credit card and are commonly used in portable devices like digital cameras.

Home Suite

Also known as personal suites. Contain personal software applications or programs intended for home use like Microsoft Works Suite.

Business Suite

Also known as productivity suuites; contain professional-grade application programs, including word processing, spreadsheets, and more. A good example is Microsoft Office.

DNS spoofing

Altering DNS records can change the destination of email, browser connections, and download requests Unauthorized changes to the DNS are called DNS spoofing

Which statement pertaining to system reliability is FALSE?

An accumulation of temporary internet files has no effect on your computer's overall performance

Identity Theft

An act in which someone wrongfully obtains and uses another person's personal data for fraud or deception

Which of the following is true about sharing software?

Answers: a. When a desktop computer uses software from a server, the software files remain permanently in RAM of the desktop computer. b. If the server where the software is installed is not functioning, the other desktop computers can still use the software. c.: Even if software is installed on a server, portions of it must also be installed on the desktop computers. d. Software only has to be installed and updated on one computer. Correct Software only has to be installed and updated on one computer.

This is a website that provides access to specific mobile apps that can be downloaded either for a nominal fee or free of charge. Select one: a. QR store b. Cloud c. App store d. Mobile store

App store

This type of software can be described as end user software and is used to accomplish a variety of tasks. Select one: a. Communications b. Application c. Utility d. System

Application

Which of the following is NOT a user interface?

Application programming interface (API)

Basic Application

Applications used for doing common tasks, such as browsers and word processors, spreadsheets, databases, management systems, and presentation graphics. Also known as productivity applications.

a jailbreak?

Apps are available from other sources, but using them requires an unauthorized change to the device's software called a jailbreak After downloading and installing the jailbreak software, your device will be able to install apps from a variety of sources other than the iTunes App Store The process of making unauthorized modifications to any mobile device is called rooting

plotter

Architects and engineers can use a(n) ________ to print large drawings and designs.

_____-input devices convert sounds into a form that can be processed by the system unit.

Audio

_______-input devices convert sounds into a form that can be processed by the system unit.

Audio

Online banking is an example of what type of e-commerce?

B2C

The capacity of a communication channel is measured in _______.

Bandwidth

Which of the following is not a character encoding standard? a. CISC b. EBCDIC c. Unicode d. ASCII

CISC

Which of the following are files inserted into an HTML document that control the appearance of Web pages including layout, colors, and fonts?

CSS

Report

Can be lists of fields in a table or selected fields based on a query. Typical database reports include sales summaries, phone lists, and mailing labels.

OMR, OCR, and MICR are all types of _______.

Character and mark recognition devices

Data verification

Checking data for *accuracy* and *inconsistencies*.

Program validation

Checking whether you are *building the correct program*.

Range check

Checks that a *value is within a specified range* (data validation).

Cardinality check

Checks that the *record has a valid number of related records* (data validation).

thin client

Chrome OS is an example of a thin client because it depends substantially on processing and storage provided by a remote computer—in this case, cloud-based servers Unlike iPads, Chromebooks support multiple users, but provide limited storage space Chromebooks boot very quickly to a simple desktop where apps are displayed in the Chrome browser

Workbook File

Contains one or more related worksheets or spreadsheets.

Virus

Code that attaches itself to other innocent files or programs and replicates itself; at some point, the code activates and destroys computer files, disrupts operating system activities, damages software, or initiates denial of service attacks

circuit switching

Communication networks use a technology called circuit switching, which establishes a private link between one telephone and another for the duration of a call

modem

Communications hardware device that facilitates the transmission of data.

crackers

Computer criminals who create and distribute malicious programs.

compatible means?

Computers that operate essentially the same way and use the same software are said to be compatible or having the same "platform You can assess whether two computers are compatible by checking their operating systems

Guest Network

Configure the Guest Network (a second network on your LAN's router)

Adobe

Creative Cloud allows you to have access to the latest applications for a monthly fee.

A type of specialty processor devoted exclusively to protecting your privacy.

Cryptoprocessor

- provide additional information and request user input.

Dialog Boxes

Information collected by an organization from a variety of external and internal databases is stored in this special type of database.

Data warehouse

Employee records, including names, social security numbers, and related information, would typically be stored in what type of data file?

Database

The electronic equivalent of a file cabinet is a -

Database

The electronic equivalent of a file cabinet is a _______. Select one: a. database b. word processor c. spreadsheet d. query

Database

File Types

Default programs are associated with which of the following?

If your computer freezes, pressing a combination of Ctrl, Alt, and _____________ should bring up a dialogue box that enables you to close the unresponsive program.

Delete

This type of attack has the only goal of clogging computers and networks by making servers think a huge number of users are attempting to access to it.

Denial-of-service attack

Which of the following is NOT a windows utility program?

Desktop

Programs that allow you to mix text and graphics and focus on flexible page design and layout. Select one: a. Databases b. Desktop publishing c. Word processors d. Image galleries

Desktop publishing

With these systems, input and output devices are located outside the system unit.

Desktop systems

A list of connected devices can be viewed in the ____________________ window.

Device Manager

This type of program allows communication between a peripheral device, such as a mouse or printer, and the rest of the computer system.

Device driver

operating systems

Device drivers are written for a specific combination of ________ and devices.

*Interactive device*

Device with an *input and output process*.

Pointing Device

Device, such as a mouse or trackball, that allows the user to select objects on the screen.

____ is a technique in which you use your pointing device to drag a file or folder into a different folder and then let go of the mouse button to place it in that folder.

Drag and drop

Small programs known as___are used to coordinate communication between the computer and peripheral devices

Drivers

You can save and share documents on the cloud using the following FREE services:

Dropbox Google Drive OneDrive

file hosting services

Dropbox and similar file hosting services store files in the cloud

If you have two different operating systems a ______ allows you the option of determining which operating system you want when you turn the computer on.

Dual boot

The category of operating system used for handheld devices.

Embedded

Disaster recovery plans should:

Ensure the safety of people on the premises Continue critical business operations Minimize disruptions to operations Minimize immediate damage and prevent additional loss Establish a management chain Facilitate effective recovery tasks coordination

This method of file transfer has been used for decades and is frequently used for uploading changes to a Website hosted by an Internet service provider.

FTP

FTP

FTP (File Transfer Protocol) provides a way to transfer files from one computer to another over any TCP/IP network, such as a LAN or the Internet You can access FTP servers with FTP client software, such as FileZilla, or with a browser

file transfer

FTP, Web-based, and BitTorrent are popular types of

The content of a website is broken down into a series of related pieces of information which is represented in a _______. Select one: a. graphical site map b. blog c. hyperlink d. microblog

Graphical site map

Most applications use a(n) _______ that displays graphical elements called icons to represent familiar objects. Select one: a. integrated package b. dialog box c. graphical user interface d. menu button

Graphical user interface

Presentaion Graphics

Graphics used to combine a variety of visual objects to create attractive and interesting presentations.

An audio MIDI interface box lets you connect your computer to

Guitars and microphones

Which of the following is NOT an operating system for a smartphone?

HTC

paths

Hard disks store and organize files using all of the following, except ________.

Solid-state storage devices are different than hard disks in that they _______.

Has no moving parts

Administrators

Have the most control of system settings.

redundancy

Having several instances of the same data is called data _____

What kind of specialized monitor is especially useful for graphic artists, designers, and publishers?

High-definition television (HDTV)

When you enter a keyword or phrase into a search engine the results display as a list of these.

Hits

A wireless access point that provides Internet access in a public place such as a coffee shop, library, bookstore, or university.

Hotspot

virus

Program that migrates through networks and operating systems, typically attaching themselves to different programs and databases.

Activities that take place during the design phase:

Identify potential solutions Evaluate solutions and select the best one Select hardware and software Develop application specifications Obtain approval

These are specialized graphics programs for editing or modifying digital photographs.

Image Editors

TRue

In a database, primary keys are often used to link tables. True or False?

assumption

In a problem statement, an assumption is something you accept as true in order to proceed with program planning

Numeric Entry

In a worksheet or spreadsheet; typically used to identify numbers or formulas.

relationship

In database jargon, a relationship is an association between data that's sorted in different record types

communication protocol

In the context of networks, a communication protocol refers to a set of rules for efficiently transmitting data from one network node to another This process is called handshaking Networks use more than one protocol, and the collection of protocols for a network is referred to as a protocol stack

Spelling Checker

Program used with a word processor to check the spelling of typed text against an electronic dictionary.

problem statement

In the context of programming, a problem statement defines certain elements that must be manipulated to achieve a result or goal A good problem statement for a computer program has three characteristics: It specifies any assumptions that define the scope of the problem It clearly specifies the known information It specifies when the problem has been solved

design phase

In the design phase of the SDLC, the project team must figure out how the new system will fulfill the requirements specified in the system requirements report

Grammar Checker

In word processing, a tool that identifies poorly worded sentences and incorrect grammar.

Removable storage

Include : external drive a CD DVD flashcard thumb drive

What is input?

Input is whatever is typed, submitted, or transmitted to a computer

ICASS

Integrated Computer-Assisted Surveillance System ; Used by the New York Stock Exchange to search for insider trading activities

dynamic addresses

Internet addresses that are temporarily assigned to a device are called dynamic addresses

CLI (Command-Line Interface)

Is a text-based operating system.

What is software?

Programs form the software that sets up a computer to do a specific task

Specialized Application

Programs that are narrowly focused on specific disciplines and occupations. Some of the best known are multimedia, Web authoring, graphics, virtual reality, and artificial intelligence.

Which of the following is a function of the control unit?

It directs the movement of electronic signals between memory and the arithmetic-logic unit.

an exabyte

It is estimated that the Internet handles more than an exabyte of data every day; an exabyte is 1.074 billion gigabytes - a nearly unimaginable amount of data!

domain name

It's hard to remember the string of numbers in an IP address; most Internet destinations also have an easy-to-remember domain name, such as nike.com

Which of the following is not a popular cloud suite or online office suite? Select one: a. Google Docs b. Zoho c. Microsoft Office Web Apps d. Lotus Symphony

Lotus Symphony

MIDI

MIDI (Musical Instrument Digital Interface) specifies a standard way to store music data for synthesizers, electronic MIDI instruments, and computers MIDI messages are instructions that specify the pitch of a note, the point at which the note begins, the volume of the note, etc. An MIDI message may look like this: Music composition software with MIDI support makes it easy to place notes on a screen-based music staff then play back the composition on a MIDI keyboard or through the speakers of a digital device

Running the disk defragmenter utility will _____.

Make the hard dive work more efficiently

character

Programs that can recognize the image of a character and convert it to its ASCII or Unicode number are called optical ________ recognition programs.

Trojan horses

Programs that come into a computer system disguised as something else are called:

Process

Many activities—called processes—compete for the attention of a device's microprocessor To manage all these competing processes, an operating system must ensure that each process receives its share of attention from the microprocessor

expansion ports are?

Many digital devices have ports in the system unit for connecting cables and various add-ons; these ports are called expansion ports because they expand the options for input, output, and storage When you plug in a USB flash drive or insert a memory card, you are using an expansion port

The ____ has the largest capacity of any storage device

Mechanical hard drive

Menu Bar

Menus are displayed in a menu bar at the top of the screen.

instruction set

Microprocessor technology is fascinating in its ability to perform an astounding variety of tasks based on a set of really simple instructions These instructions are referred to as an instruction set An instruction set contains a collection of instructions for actions that the circuitry in a microprocessor can perform

Expansion slots

Most personal computers allow users to expand their systems by providing these on the system board.

Which of the following is not a popular mobile operating system?

Mountain Lion

Which of the following allows a computer to run two or more operations simultaneously?

Multicore chip

This screens can be touched with more than one finger which allows for interactions such as rotating graphical objects on the screen with your hand or zooming in and out by

Multitouch

Contextual Tab

New feature of Microsoft Office 2003 that appears automatically when needed.

productivity software

Office suites, such as Microsoft Office, are sometimes referred to as productivity software

WPA2

One of the best-known wireless encryption protocols is:

TCP

One of the core Internet protocols, TCP (Transmission Control Protocol) is responsible for dividing files into chunks, adding headers containing information for reassembling packets in their original order, and verifying that the data was not corrupted while in transit (a process called error checking)

search criteria

One or more pieces of information that helps Windows 7 locate the file you want

as integrated graphics, is?

One type of graphics circuitry, referred to as integrated graphics, is built into a computer's system board

cloud

OneDrive is Microsoft's ________ storage product.

Identify the program that coordinates computer resources, provides an interface between users and the computer, and runs applications.

Operating system

The type of mouse emits and senses light to detect mouse movement.

Optical

What is the difference between PC-dos and Ms-dos

PC-dos was created for IBM personal computers

payment gateway

Payment processing is based on an online payment gateway that authorizes credit and debit cards, PayPal, and Apple Pay transactions

pirated software?

People who circumvent copyright law and illegally copy, distribute, or modify software are sometimes called software pirates, and their illegal copies are referred to as pirated software

Windows

Plug-and-play is a part of the ________ operating system.

Mice

Pointing device, Mice accomplish pointing, clicking, and dragging.

Design Template

Provides professionally selected combinations of color schemes, slide layouts, and special effects for presentation graphics.

Security Keyboards

Provides security features such as metric finger print reader, magnetic stripe, smart card readers.

Label

Provides structure to a worksheet by describing the contents of the rows and columns.

Which of the following is not a function of the operating system?

Providing Internet access

All communications between a company's internal networks and the outside world pass through this server.

Proxy

These apps allow mobile devices to use their digital cameras to scan special codes. Select one: a. QR code reader b. Code scanner c. Optical reader d. QR scanner

QR code reader

This computer component holds the program and data that is currently being processed.

RAM

Microwave communication uses high-frequency _______.

Radio waves

To remove all the changes made to your system, the Windows __ utility returns your computer to the state it was in when it came from the factory.

Refresh

________ is a very well-known free VoIP provider

Skype

drives

Small programs that are used to coordinate communication between the computer and peripheral devices.

Audio Players

Small standalone software application or mobile app that offers tools for listening to digital audio and managing playlists, typically included with your computer's OS (operating system)

Analysis tools that support viewing all or selected parts of data, querying the database, and generating reports include query-by-example as well as specialized programming language called _______.

SQL

The GPS device in an automobile uses which communication channel?

Satellite

Which type of Internet connection requires hardware to be installed outside your home?

Satellite

Semiconductors are?

Semiconductors, such as silicon and germanium, are substances with properties between those of a conductor (like copper) and an insulator (like wood)

Numbered List

Sequence of steps or topics on a page organized by numbers.

In a network operating system, this computer coordinates all communication between computers.

Server

Control Panel

Set of options that set default values of the Windows operating system

Which of the following would NOT be a benefit of networking computers?

Sharing software licenses

Which of the following mobile devices is the lightest?

Smartphone

Types of "Big" computers are:

Supercomputers Mainframes Servers

system requirements report

System requirements are incorporated into a document called a system requirements report that describes the objectives for the information system

This hardware houses most of the electronic components that make up a computer system.

System unit

You can use the Windows ___ to check on a nonresponsive program

Task manager

Windows Media Player

The .mp3 file extension refers to it being a(n) ________ file.

Operational units of the microprocessor are:

The ALU (arithmetic logic unit) is part of the microprocessor that performs arithmetic operations, such as addition and subtraction The ALU uses registers to hold data that is being processed The microprocessor's control unit fetches each instruction

Microsoft Windows is installed on more than 80% of the world's personal computers

The Windows OS got its name from the rectangular work areas displayed on its screen-based desktop Windows evolved from a Microsoft OS called DOS (Disk Operating System) that was designed to run on early PCs with Intel or Intel-compatible microprocessors The most recent versions of Windows are Windows 7, Windows 8, and Windows 10

homegroup

The Windows OS provides a tool for setting up a LAN called a homegroup; this makes it easy to share files among local computers, but does not provide Internet access

ENIAC

The ______ was the first working, digital, general-purpose computer.

CPU

The ____________ consists of integrated circuits and serves as the heart of the computer.

Speech Recognition

The ability to accept voice input to select menu options, and to dictate text.

CRM

The acronym CRM stands for customer relationship management

ERP

The acronym ERP stands for enterprise resource planning; it is a suite of software modules that integrate major business activities; it is sometimes described as "the central nervous system of an enterprise"

0s and 1s

The binary numbering system uses _________________

Web pages

The browser interprets the HTML instructions and displays _____

privacy

The browser mode that ensures your browsing activity is not recorded.

Why can a colon NOT be used in a file name?

The colon is exclusively used to indicate a drive on the computer. An example is C: drive.

The data fork is

The data fork is similar to files in other operating systems; it contains data, such as the commands for a program and graphics for a photo

Monitor

The display device on a computer

Dot pitch

The distance between each pixel.

knowledge base

The facts and rules are incorporated into a knowledge base which is stored in a computer file and can be manipulated by software called an inference engine

Web 1.0

The first generation of the Web is known as Web 1.0 and focused on linking existing information.

OneDrive

The free online storage provided by Microsoft is called ________.

data redundancy

The goal of normalization is to minimize data redundancy—the amount of data that is duplicated in a database

clock speed

The speed at which the processor executes the instruction cycle.

ICANN,

The organization that supervises internet addressing is ICANN, the Internet Corporation for Assigned Names and Numbers

control unit

The part of the processor that manages the movement of data through the CPU.

GUI (Graphical User InTerFace)

The portion oF The applicaton ThaT allows you To conTrol and To inTeracT wiTh T

file extension

The portion of a file name after the period within the file name; most often three characters; used to associate a file to an application program but not required by all operating systems

Prices for digital devices can vary and depend on screen size, microprocessor size, and memory:

The price tag for a smartphone is $200-$500 Tablet computer prices range from $200 - $1,200 Desktop and Laptop computers usually cost a little more, with price points roughly grouped into three categories: Above $1,200 $500 - $1,200 Under $500

The primary purpose of system software is?

The primary purpose of system software is to help the computer system monitor itself in order to function efficiently (an example of system software is a computer operating system or OS)

knowledge engineering

The process of designing, entering, and testing the rules in an expert system is referred to as knowledge engineering

booting

The process of loading the operating system when starting up a computer.

Aspect ratio

The proportional relationship between a display's width and height.

entity-relationship diagram

The relationship between record types can be depicted graphically with an entity-relationship diagram (sometimes called an ER diagram or ERD)

The resource fork

The resource fork is a companion file that stores information about the data in the data fork, such as the file type and the application that created it

protocols

The rules for exchanging data between computers.

The screen

The screen is part of the monitor. It includes the housing for its electrical componetnts. Screen out put is called soft copy because it is temporary.

syntax

The set of rules that specify the sequence of keywords, parameters, and punctuation in a program instruction is referred to as syntax

key-value data model;

The simplest structure for storing data in a NoSQL database is the key-value data model; each data item has a key that is a unique identifier similar to a relational database key such as CustomerID

dedicated applications

The simplest tools for managing data are dedicated applications for specific data management tasks, such as keeping track of appointments or maintaining an address book To use one of these tools, simply enter your data; the software includes menus that allow you to manipulate your data once it is entered Dedicated applications are easy to use, however they generally don't allow users to add fields or change field names

Cell

The space created by the intersection of a veritcal column and a horizontal row within a worksheet in a program like Microsoft Excel. A cell can contain text or numeric entries.

colocation center

These centers may be dedicated to information systems for a single company, or they may be a colocation center in which several corporations lease space and equipment

tracking

These cookies record your activities across different sites

Image scanners

These devices convert images into an electronic form that can be stored in a computer's memory. The image can then be manipulated.

Magnetic scanners

These devices read encoded information on the back of credit cards. The magnetic strip on the back of the cards contains the user's encoded account number.

Firewall

These limit external access to company computers

Logic Bomb

These programs are similar to Trojan horse programs, except that they remain dormant until the computer system encounters a specific condition

spiders

These programs continually look for new information and update search services' database programs.

browsers

These programs use a URL to provide access to web resources

Coprocessors

These specialty chips are designed to improve specific computing operations such as displaying 3D images and encrypting data.

fuzzy logic

These systems are designed to deal with data that is imprecise or problematic; using a technique called fuzzy logic, an expert system can deal with this type of data by working with confidence levels

Output devices

They display information. Monitors and printers are the most common output device.

AutoContent Wizard

This Microsoft wizard steps you through the process of creating a PowerPoint presentation.

worm

This special type of virus fills a computer system with self-replicating information, clogging the system so that its operations are slowed or stopped.

denial of service

This type of attack attempts to slow down or stop a computer system or network by flooding it with requests for information and data.

dictionary

This type of attack uses software to try thousands of common words sequentially in an attempt to gain unauthorized access to a user's account.

Bar code scanners

This type of scanner reads bar lines that are printed on products (for example, in a grocery store or department store).

internet security

This type of suite can be used to maintain your security and privacy while you are on the web:

Which of the following can be used to connect several devices to the system unit and are widely used to connect keyboards, mice, printers, storage devices, and a variety of specialty devices?

USB Port

This character encoding scheme allows non-English characters and special characters to be represented.

Unicode

USB stands for _____________________.

Universal Serial Bus

phishing

Used by scammers to trick Internet users with official-looking websites.

gigahertz (GHz)

Used to measure the speed at which a processor executes the information cycle. is equal to one billion cycles per second.

Column

Using Microsoft Excel, for example, a vertical block of cells one cell wide all the way down the worksheet.

Antivirus programs protect your computer system from viruses or malicious programs. This is an example of which type of software?

Utilities

- are used to edit videos to enhance quality and appearance.

Video Editors

FireWire 800

a data transmission standard used by computers and peripherals (for example, a video camera) that transmits at 800 Mbps; also called 1394b

Web cam

Videoconferencing is accomplished through the use of a ________.

This type of keyboard used a touch screen as the input device.

Virtual

Remote users can connect to an organization's network through this type of secure private connection.

Virtual Private Network (VPN)

Which of the following allows the transmission of telephone calls over computer networks?

Voice over IP

WEP

WEP (wired equivalent privacy) is the oldest and weakest wireless encryption protocol

WPA

WPA (Wi-Fi Protected Access) and its cousins, WPA2 and PSK, offer more security

Web authoring programs that allow you to build a page without interacting directly with HTML code are known as -.

WYSIWYG editors

This type of boot occurs when the computer is already on and you restart it without turning off the power.

Warm boot

General-purpose applications include all of the following except: - Database Management Systems - Web Authoring - Word Processors - Spreadsheets

Web Authoring

Which of the following programs would be used to create a website?

Web Authoring

General-purpose applications include all of the following except: Select one: a. web authoring b. word processors c. spreadsheets d. database management systems

Web authoring

Which of the following programs would be used to create a website? Select one: a. Image editor b. Illustration c. Desktop publishing d. Web authoring

Web authoring

computer

Web based e-mail account do not require an e-mail program to be installed on your ________

wiki

Web site designed to allow visitors to use their browsers to add, edit, or delete the site's Content

_______ typically broadcast live events and use streaming technology in which audio and video files are continuously downloaded to your computer while you are listening to and/or viewing the content.

Webcasts

The operating system

What enables application software to work with specific types of hardware?

There is too much time between the first and second click.

What is the most common user error when double-clicking the mouse?

pipeline processing?

When a processor begins to execute an instruction before it completes the previous instruction, it is using pipeline processing

View Tab

When using File Explorer, you would use the ________ to change the way objects in a file list are displayed.

memory leak

When you want to run more than one application at a time, the OS has to allocate specific areas of memory for each; sometimes application requests memory but never releases it—a condition called a memory leak Memory "leaks" away into this application reserved area, eventually preventing other applications from accessing enough memory to function properly

:

Which of the following characters CANNOT be used in a file name?

images

Which of the following is NOT a default Windows library?

central processing unit

Which of the following is NOT a peripheral device?

accesss

Which of the three privacy issues relates to the responsibility of those who have data to control who is able to use that data

Procedures

Which part of an information system consists of the rules or guidelines for people to follow?

The most widely used personal computer operating system.

Windows

The Cloud

With online storage, an Internet-based service allows you to upload files to one of their secure online servers. Online storage sites such as Google Drive and One Drive provide free places to save and share files.

To create documents that consist primarily of text, you need this software. Select one: a. Presentation graphics b. Word processor c. Spreadsheet d. Database management

Word processor

Word size is?

Word size refers to the number of bits that a microprocessor can manipulate at one time; it limits the amount of memory that the processor can access

printers

You can use several different ones if you have more than one installed or are connected to a network.

Which of the following is false?

Your phone can only be connected to the Internet if there is a WiFi network available

input

________ is any data or instructions that are used by a computer.

Audio

________-input devices convert sounds into a form that can be processed by the system unit.

supercomputers

_____________ are most often associated with modeling using finite element analysis.

People

_________________ are the most important part of any information system.

DVI-A

a DVI (Digital Visual Interface) video port that only transmits analog data

DVI-I

a DVI (Digital Visual Interface) video port that supports both analog and digital monitors

DVI-D

a DVI (Digital Visual Interface) video port that works only with digital monitors

DirectX

a Microsoft software development tool that software developers can use to write multimedia applications such as games, video-editing software, and computer-aided design software

Mini-B connector

a USB connector that has five pins and is often used to connect small electronic devices, such as a digital camera, to a computer

Micro-A connector

a USB connector that has five pins and is smaller than the Mini-B connector; it is used on digital cameras, cell phones, and other small electronic devices

list box

a box that displays a list of options from which you can select (you man need to adjust your view to see additional settings in the list box)

command button

a button that completes or completes an operation

Multiprocessing

a capability that supports a division of labor among all the processing units

WiFi

a communication medium that allows computers, smartphones, or other devices to connect to the Internet or communicate with one another wirelessly within a particular area

With these systems, input and output devices are located outside the system unit. Select one: a. Desktop systems b. Personal digital assistants c. Smartphones d. Laptop computers

a. Desktop systems

Most personal computers allow users to expand their systems by providing these on the system board. Select one: a. Expansion slots b. Ports c. Sound cards d. Network cards

a. Expansion slots

These types of ports typically provide connections to specialized devices such as camcorders and storage devices. Select one: a. FireWire b. Serial c. Parallel d. AGP

a. FireWire

Which software is best to use if you want to change the looks of your digital pictures? a. Image editing program b. Video editing program c. Media management software d. All of the above.

a. Image editing program

Which theory states that there is no universal moral truth? a. Relativism b. Divine command theory c. Utilitarianism d. Virtue ethics

a. Relativism

Which is TRUE about supercomputers? a. They perform complex calculations rapidly. b. They support hundreds of users simultaneously. c. They execute many programs at the same time. d. They are specially designed computing devices that reside in other devices.

a. They perform complex calculations rapidly.

Which of the following can be used to connect several devices to the system unit and are widely used to connect keyboards, mice, printers, storage devices, and a variety of specialty devices? Select one: a. USB port b. SATA c. Parallel port d. Firewire bus

a. USB port

The ethical theory that states individual happiness is not important is known as a. Utilitarianism. b. Virtue ethics. c. Deontology. d. Divine command theory.

a. Utilitarianism.

People who do not read emotion easily in others hope for new progress in the field of a. affective computing. b. data mining. c. bioprinting. d. forensic science.

a. affective computing.

Pathways that support communication among the various electronic components on the system board are called _______. Select one: a. bus lines b. network lines c. logic paths d. gate ways

a. bus lines

Which is NOT an example of a Web 2.0 technology? a. e-mail b. social networking c. blogging d. wiki

a. e-mail

Which of the following ports provide high-speed connections for external hard disk drives, optical disks, and other large secondary storage devices? Select one: a. eSATA b. S/PDIF c. HDMI d. MiniDP

a. eSATA

Which of these is not an optical storage device? a. flash drive b. CD drive c. DVD drive d. Blu-ray drive

a. flash drive

You are most likely to find a real-time operating system (RTOS) a. in your automobile b. on a laptop c. on a smartphone d. on an iPad

a. in your automobile

Social networking tools a. played a part in the revolution in Egypt. b. are limited to social dating. c. have encouraged increased censorship in the United States. d. include software like Microsoft Office and Adobe Illustrator.

a. played a part in the revolution in Egypt.

Which invention enabled computers to be made smaller and lighter? a. the integrated circuit b. RAM c. ROM d. magnetic tape

a. the integrated circuit

video capture card

an adapter card that captures video input and saves it to a file on the hard drive

sound card

an expansion card with sound ports

graphics tablet

an input device that can use a stylus to hand draw; it works like a pencil on the tablet and uses a USB port; also known as a digitizer or digitizing tablet

Blu-Ray Disc (BD)

an optical disk technology that uses the UDF version 2.5 file system and a blue laser beam, which is shorter than any red beam used by DVD or CD discs; the shorter blue laser beam allows the discs to store more data than a DVD

Infared (IR)

an outdated wireless technology that has been mostly replaced by Bluetooth to connect personal computing devices

notification area

at right side of the taskbar contains icons that represent informational messages and programs

voiceband modem

converts digital signals from a computer into audible analog signals that can travel over telephone lines

Shareware is

copyrighted software marketed under a try-before-you-buy policy; it was conceived as a low-cost marketing and distribution channel for independent programmers

Freeware is?

copyrighted software that—as you might expect—is available for free; it's fully functional and requires no payment for its use

A glass picture tube is known as a ________.

crt

To select a group of items that are not next to each other, click the first item in the group, press and hold ____, then click the last item in the group.

ctrl

The use of the Internet, cell phones, or other devices to send or post content intended to hurt or embarrass another person is called:

cyberbullying

Which is considered a benefit of using simulation software: a. They allow users to experience potentially dangerous situations without risk b. They help to prevent costly errors c. They allow users to train on software that is not installed on their systems d. All of the above

d. All of the above

Ethical decisions in business affect which of the following? a. The employees b. The business's clients and customers c. The suppliers and financial lenders d. All stakeholders

d. All stakeholders

When you reboot your system, the computer follows startup instructions stored in this type of memory. Select one: a. DRAM b. SDRAM c. Cache d. Flash

d. Flash

What was the importance of the Turing machine to today's computers? a. It described a system that was a precursor to today's notebook computer. b. It was the first electronic calculator and a precursor to the computer. c. It was the first computer to have a monitor. d. It described a process to read, write, and erase symbols on a tape and was the precursor to today's RAM.

d. It described a process to read, write, and erase symbols on a tape and was the precursor to today's RAM.

Which of the following statements is true? a. Individuals who apply ethics inconsistently exhibit illegal behavior. b. Ethical decisions are rarely influenced by personal ethics. c. Unethical behavior is always illegal. d. Life experience affects an individual's personal ethics.

d. Life experience affects an individual's personal ethics.

All of the following are commonly used units of measurement to describe memory capacity, except _______. Select one: a. Megabyte (MB) b. Gigabyte (GB) c. Terabyte (TB) d. Nanobyte (NB)

d. Nanobyte (NB)

Which computer was touted as the first portable computer? a. Altair b. Commodore PET c. Lisa d. Osborne

d. Osborne

What do you need if you want to read, send, and organize e-mail from any computer connected to the Internet? a. an e-mail client program b. an e-mail server c. an e-mail aggregator d. a Web-based e-mail account

d. a Web-based e-mail account

Which program can you use to take notes in class? a. SoundNote b. Evernote c. OneNote d. all of the above

d. all of the above

Integrated circuits must be mounted on _______, which are then plugged into the motherboard. Select one: a. slots b. pins c. ports d. chip carriers

d. chip carriers

Tiny circuit-boards etched onto squares of sand-like material, called silicon, are called _______. Select one: a. buses b. slots c. sockets d. chips

d. chips

Computer forensics uses computer systems and technology to a. simulate a person's anatomical system. b. train law enforcement officers to be more effective. c. create a crisis map. d. gather potential legal evidence.

d. gather potential legal evidence.

Collaborative consumption is when people get together to a. find the best prices on products. b. exchange reviews on services and goods they have purchased. c. fight diseases of the respiratory tract. d. increase the use of a single product by sharing access to it.

d. increase the use of a single product by sharing access to it.

Client-based e-mail accounts require this special program to be installed in your computer

e-mail client

if you later discover that you need a deleted foe or folder, you can restore it to its original location, but only if you have not yet emptied the recycle bin

emptying the recycle bin permanently removes the deleted folders and files from your computer files and folders you delete from a removable storage drive do not go to the recycle bin; they are immediately and permanently deleted and cannot be restored

Input devices

enable you to input data and commands into the computer. The most common input devices are the keyboard and mouse.

you can perform advanced searches by using different search criteria such as

file extension first, last, or firs and last name of the files creator date of file creation document title person's name to find his or her e-mail address

type of file

file extension identifies the type of file, for example a document file, a video file, or a music file

the restart command locks your user account and displays the welcome screen so another user can log on.

flase

Portable computers such as laptops require a _____________ monitor.

flat screen/cathode ray tube/liquid crystal display

Information engineering methodology

focuses on the data an information system collects before working out ways to process that data

Structured methodology

focuses on the processes that take place within an information system

subfolder

folder contained within another folder

Voice input devices

for visually impaired, blind, and physically challenged people.

The content of a website is broken down into a series of related pieces of information which is represented in a

graphical site map

What is the most common use for Bluetooth?

hands-free headsets for cell phones

drive C

hard disk drive

Programs that automatically start and operate as a part of your browser are called _______.

plug-ins

formatting

preparing a hard drive volume, logical drive, or USB flash drive for use by placing tracks and sectors on its surface to store information (for example, FORMAT D:)

Which part of an information system consists of the rules or guidelines for people to follow?

procedures

operating system

program that lets you run your computer Windows 7 is an operating system

This GUI includes tabs, groups and galleries

ribbon

just below the title bar, at the top of the paint window, is the __, a strip that contains tabs

ribbon

Portable

runs on battery power; its components are contained in a single case for easy transportation

The global positioning system is a network of 21 ________ plus 3 working spares

satellites

Special Input devices

trackball, joystick, wheel, pointing stick, graphics tablet, touch display screen, stylus, voice recognition devices, touchpad, scanner, digital camera, video input, and biometric input.

For browsers to connect to resources on the Internet, the location of the resources must be specified through addresses called

uniform resource locator url

For browsers to connect to resources on the Internet, the location of the resources must be specified through addresses called _______.

uniform resource locators (URLs)

drive F

usb flash drive

One way to improve the storage capacity of a hard disk is to:

use file compression.

Integer

used for fields that contain whole numbers

barcode reader

used to scan barcodes on products at the points of sale or when taking inventory

This version of the web evolved to support more dynamic content creation and social interaction.

web 2.0

General-purpose applications include all of the following except

web authoring

Which of the following programs would be used to create a website

web authoring

program window

what opens when you start an application program. it shows the tools you need to use the program

exiting windows 7

when you finish working on your computer, you must shut it down properly shutting down the computer properly prevents loss of data and damage to windows

aero peek

when you point to a taskbar button, aero displays a small preview of the file, a feature called aero peek.

recycle bin

where you place the files and folders that you don't need anymore and want to delete

inactive window

window behind the active window

most programs austomatically assume you want to save and open files in the documents folder

windows 7 provides other folders for other types of files, such as Music Pictures Videos


Conjuntos de estudio relacionados

Hyperbole, Understatement, and Litotes

View Set

Unit 5 All Quiz Fiscal Policy / Loanable Funds Quiz

View Set

Equations of Parallel and Perpendicular Lines

View Set

Exam 2 Clicker Questions Compilation

View Set

BSA 13 Office of Foreign Asset Control OFAC

View Set

Intermediate Spanish I Chapter 1

View Set