CIS Chap 1

¡Supera tus tareas y exámenes ahora con Quizwiz!

Match each source on the left to its source type on the right.

-A catalog of all the mayor's speeches and news articles about them?: Tertiary Source The transcript of a speech by the mayor?: Primary Source -A news article about the mayor's speech?: Secondary Source

Match each term on the left to its definition on the right.

-A service or software application that relies on shared resources over the internet: Cloud computing. -A software application that accesses web applications and websites: Browser. -A company that provides access to the internet: Internet Service Provider. -An interconnected global public computer network: Internet. -An information system that connects documents to each other by hypertext links: World Wide Web.

Put the following events from computer history in the order they happened:

-Herman Hollerith develops electronic tabulating machine. -International Business Machines, or IBM, is formed. -Scientists at Bell Labs. invent the transitor. -Jack Kilby invests the microchip. -The Apple II is released for home consumers. -The World Wide Web becomes available to the public. -Apple releases the iPhone.

Arrange the following from smallest to largest.

-Kilobyte -Megabyte -Gigabyte -Terabyte

Match each ethical principle on the left to its definition on the right.

-Recognizing and respecting the legal claims of others to online data, creative works, and other digital assets: Digital Property Rights. -Protecting data and information we're not authorized to share: Confidentiality. -Respecting and honoring the inherent worth and right to privacy of other people: Human Dignity. -Observing rules of "netiquette" that promote courtesy and respect in online settings: Civility.

Which of the following is the correct binary representation of the number 2?

10

How many bits are in a single byte?

8

In Microsoft Edge and Internet Explorer, a "favorite" is another name for:

A URL bookmark

Which of the following is the best definition of a bit?

A single 1 or 0 in a digital signal.

What kind of file would he hurt most by a lossy compression algorithm?

A text document

Which of the following is most likely to have peer-reviewed material written by an expert in the field?

Academic journal

Files that you send along with an email message are called ______.

Attachments

Match each feature to whether it influences audio or video quality.

Audio: bit depth & sampling rate Video: frame rate, color depth and resolution

The process of proving to the computer that you are who you say you are is called ______.

Authentication

Web browsers save website information in their ____, which helps the site load faster on future visits.

Cache

In the United States, who has power to create intellectual property laws?

Congress

Small files that a website saves on your computer to remember your preferences are called ___________.

Cookies

Why is it better to use a credit card than a debit card for online purchases?

Credit cards have better fraud protection.

Which digital communication medium consists of top-level posts with threads of response posts?

Discussion board

Which legal doctrine allows the use of copyrighted works for purposes that benefit the public, such as teaching and news reporting?

Fair use

Which of the following would best prevent an unauthorized person from remotely accessing your computer?

Firewall

Which option should you chose to send an email you've received to a new person?

Forward

Which internet protocol is used to transmit encrypted data?

HTTPS

Clickable text or images that take you to different sites on the World Wide Web are call _____.

Hyperlinks

Which of the following does NOT rely on cloud technologies?

Microsoft paint

Which of the following is NOT an example of a web browser?

Microsoft word

What are the two main types of firewall?

Network Firewall & Host-based Firewall

What is the term for software that anyone can use or modify for free?

Open-source software

Which kind of online attack involves pretending to be a legitimate company to get sensitive information?

Phishing

Which of the following is NOT a good response to cyberbullying?

Post the bully's physical address on social media.

What is the term for software that is exclusively controlled by a company, and cannot be used or modified without permission?

Proprietary software

What is the collective name for creations that are not the intellectual property of anybody?

Public domain

Which method should be used to search for an exact phrase?

Put the search terms in "quotes"

Which type of digital picture is made by storing individual pixel values?

Raster

Which option should you use to respond to the sender of an email, but not all the recipients?

Reply

Which option should you use to respond to every single person included on an email?

Reply all

Which of the following rights is NOT guaranteed by copyright?

Right to avoid criticism

Which of the following digital communication media does NOT require a connection to the internet?

SMS

Which service would be most useful when looking for information about your favorite TV show?

Search engine

Which of the following is NOT a drawback of social media?

Social media makes it difficult to keep in touch with friends and family.

Unwanted, unsolicited emails containing advertisements, political rhetoric, hoaxes, or scams are collectively known as _______.

Spam

Which of the following are primary sources?

The U.S constitution & Jane Austen's "Pride and Prejudice"

What is junk email?

Unwanted, unsolicited email

Which type of digital picture can be scaled to any size without losing quality?

Vector

When might it be most helpful to clear your browser's cache of temporary internet files?

When a website is not functioning as it should

Which software is Microsoft's anti-malware product that is preinstalled on most new computers?

Windows defender

Which of the following lines will initiate an Internet search from the Address bar of a web browser?

microsoft.gov

A pop-up blocker is a web browser feature that

prevents unwanted advertisements

Which of the following is a valid email address?

[email protected]

When composing an email message, why might you want to use the Bcc field?

to copy the email confidentially.


Conjuntos de estudio relacionados

TX Govt CH.4 The Executive Department

View Set

Anatomy and Physiology ( Skeletal System)

View Set

Social Problems 13th Movie: Final

View Set

Practice Questions for Last Five Weeks of Material

View Set

Orga_MCQ_Ch9_Competences, and Technology

View Set