CIS Chap 1
Match each source on the left to its source type on the right.
-A catalog of all the mayor's speeches and news articles about them?: Tertiary Source The transcript of a speech by the mayor?: Primary Source -A news article about the mayor's speech?: Secondary Source
Match each term on the left to its definition on the right.
-A service or software application that relies on shared resources over the internet: Cloud computing. -A software application that accesses web applications and websites: Browser. -A company that provides access to the internet: Internet Service Provider. -An interconnected global public computer network: Internet. -An information system that connects documents to each other by hypertext links: World Wide Web.
Put the following events from computer history in the order they happened:
-Herman Hollerith develops electronic tabulating machine. -International Business Machines, or IBM, is formed. -Scientists at Bell Labs. invent the transitor. -Jack Kilby invests the microchip. -The Apple II is released for home consumers. -The World Wide Web becomes available to the public. -Apple releases the iPhone.
Arrange the following from smallest to largest.
-Kilobyte -Megabyte -Gigabyte -Terabyte
Match each ethical principle on the left to its definition on the right.
-Recognizing and respecting the legal claims of others to online data, creative works, and other digital assets: Digital Property Rights. -Protecting data and information we're not authorized to share: Confidentiality. -Respecting and honoring the inherent worth and right to privacy of other people: Human Dignity. -Observing rules of "netiquette" that promote courtesy and respect in online settings: Civility.
Which of the following is the correct binary representation of the number 2?
10
How many bits are in a single byte?
8
In Microsoft Edge and Internet Explorer, a "favorite" is another name for:
A URL bookmark
Which of the following is the best definition of a bit?
A single 1 or 0 in a digital signal.
What kind of file would he hurt most by a lossy compression algorithm?
A text document
Which of the following is most likely to have peer-reviewed material written by an expert in the field?
Academic journal
Files that you send along with an email message are called ______.
Attachments
Match each feature to whether it influences audio or video quality.
Audio: bit depth & sampling rate Video: frame rate, color depth and resolution
The process of proving to the computer that you are who you say you are is called ______.
Authentication
Web browsers save website information in their ____, which helps the site load faster on future visits.
Cache
In the United States, who has power to create intellectual property laws?
Congress
Small files that a website saves on your computer to remember your preferences are called ___________.
Cookies
Why is it better to use a credit card than a debit card for online purchases?
Credit cards have better fraud protection.
Which digital communication medium consists of top-level posts with threads of response posts?
Discussion board
Which legal doctrine allows the use of copyrighted works for purposes that benefit the public, such as teaching and news reporting?
Fair use
Which of the following would best prevent an unauthorized person from remotely accessing your computer?
Firewall
Which option should you chose to send an email you've received to a new person?
Forward
Which internet protocol is used to transmit encrypted data?
HTTPS
Clickable text or images that take you to different sites on the World Wide Web are call _____.
Hyperlinks
Which of the following does NOT rely on cloud technologies?
Microsoft paint
Which of the following is NOT an example of a web browser?
Microsoft word
What are the two main types of firewall?
Network Firewall & Host-based Firewall
What is the term for software that anyone can use or modify for free?
Open-source software
Which kind of online attack involves pretending to be a legitimate company to get sensitive information?
Phishing
Which of the following is NOT a good response to cyberbullying?
Post the bully's physical address on social media.
What is the term for software that is exclusively controlled by a company, and cannot be used or modified without permission?
Proprietary software
What is the collective name for creations that are not the intellectual property of anybody?
Public domain
Which method should be used to search for an exact phrase?
Put the search terms in "quotes"
Which type of digital picture is made by storing individual pixel values?
Raster
Which option should you use to respond to the sender of an email, but not all the recipients?
Reply
Which option should you use to respond to every single person included on an email?
Reply all
Which of the following rights is NOT guaranteed by copyright?
Right to avoid criticism
Which of the following digital communication media does NOT require a connection to the internet?
SMS
Which service would be most useful when looking for information about your favorite TV show?
Search engine
Which of the following is NOT a drawback of social media?
Social media makes it difficult to keep in touch with friends and family.
Unwanted, unsolicited emails containing advertisements, political rhetoric, hoaxes, or scams are collectively known as _______.
Spam
Which of the following are primary sources?
The U.S constitution & Jane Austen's "Pride and Prejudice"
What is junk email?
Unwanted, unsolicited email
Which type of digital picture can be scaled to any size without losing quality?
Vector
When might it be most helpful to clear your browser's cache of temporary internet files?
When a website is not functioning as it should
Which software is Microsoft's anti-malware product that is preinstalled on most new computers?
Windows defender
Which of the following lines will initiate an Internet search from the Address bar of a web browser?
microsoft.gov
A pop-up blocker is a web browser feature that
prevents unwanted advertisements
Which of the following is a valid email address?
When composing an email message, why might you want to use the Bcc field?
to copy the email confidentially.