Computer Concepts
A bit can represent how many different values?
2
A byte is _________ bit(s).
8
Cell A7 (words) likely contains
A label
Digital video cameras are used for _______
All of the above
The central processing unit________.
All of the above
Which of the following is considered a benefit of using simulation programs?
All of the above
Which program can you use to take notes in class?
All of the above
All of the statements below are true about the Digital Divide, except:
Allows the use of all minds on the planet to solve problems.
The OS with the largest market share on tablet devices is
Android
All of the following are browsers EXCEPT:
Bing
The smallest unit of storage in the computer is a
Bit
A benefit of using a hard disk as secondary storage is that it has_______.
Both faster transfer than a DVD and more capacity than a DVD are correct
A large group of software programs used to launch coordinated DoS attacks is known as a __________.
Botnet
Small text files that some websites automatically store on your computer's hard drive are known as
Cookies
Which of the following is NOT necessary to do before installing beta software?
Defragging the hard drive.
An attacker that renders a computer unable to respond to legitimate users because it is being bombarded with data requests is known as a ____________ attack
Denial-of-service
To be processed by a computer, data must be converted to
Digital form
Gordon Moore, the Chairman of Intel, predicted in 1965 that the speed of a silicon chip of the same price would
Double about every 18 months for at least two decades
A set of choices that appears, in the manner of a window shade, from the top of a screen is called a
Drop-down or pull-down menu
Making changes to a word processing document to fix errors or improve its content is called
Editing
The science of creating work environments that are safe and efficient for workers is known as:
Ergonomics
A gigabyte is approximately 1,000 kilobytes
False
A potential risk of today's technology is the increased efficiency of business operations.
False
A search engine that searches other search engines is called a super search engine.
False
Each device attached to your computer needs an interrupt file to communicate with the OS.
False
First-generation computers were characterized by the transistor.
False
Hackers that break into systems for no malicious reasons, such as to test security systems are known as black-hat hackers.
False
Sending e-mails to lure people into revealing personal information is a technique known as pharming.
False
System software is another term for application software.
False
The physical parts of the computer system are referred to as software.
False
Using a surge protector will even protect your computer from massive surges such as a lightning strike.
False
When you buy software, you then own it and can do anything you'd like with it, including giving it to friends to install on their machines.
False
When you need help with software, you should use the program's help features or manufacturer FAQs, not online help like podcasts or Youtube videos.
False
The __________ utility automatically backs up files from your libraries.
File History
The location of a file on a drive such as C:\Documents\CSC1113\Homework\Termpaper.docx is known as the
File path
The action of finding and changing each instance of a repeated item is called
Find and replace
Augusta Ada King, Countess of Lovelace is often called the
First computer programmer
What should you do if you spot unethical behavior at your work place?
Follow company procedures for reporting unethical behavior.
The appearance of a document is called its
Format
Modern operating systems such as Windows and OS X use a
Graphical user
Connectivity for a new computer means:
Having a modem and/or network connection to communicate with other computers
When purchasing a new printer the most important factor to consider is
How it is going to be used.
Hard disks for personal computers typically have this amount of storage.
Hundreds of gigabytes.
When a hacker steals personal information with the intent of impersonating another individual to commit fraud, it is known as
Identity theft
A backup of all your files on your computer, which is essentially a snap shot of exactly how your computer looks at a particular point in time, is known as a(n)
Image backup
Which software is best use if you want to change the looks of your digital pictures?
Image-editing program
Which one of the following statements is NOT true about e-mail?
It is private.
All of the following are key attributes of an operating system EXCEPT
It tracks connections to external networks
Which of the following is ranked from smallest to largest?
KB, MB, GB, TB
Firewalls work by closing _________ in your computer.
Logical porta
The current active cell is
Look in the box on the right
The circuit board on which the processor and other chips are placed is called the
Motherboard
You are most likely to find a Linux OS
On a desktop
Windows is a(n):
Operating system
A social engineering technique in which you send people an e-mail for the purpose of inducing them into revealing sensitive information is known as
Phishing
The sockets on the outside of a computer's system unit where cables are connected to it are called
Ports
In the URL http://www.hindscc.edu, the portion labeled http is the:
Protocol
RAM stands for:
Random Access Memory
In a relational database, another name for a record is a
Row
Apps not specifically designed for Windows 8 (such as Word 2010)
Run on the desktop
When using the Internet for research, you
Should evaluate sites for bias and relevance.
Facebook, MySpace, and Twitter are considered:
Social networking Web sites.
Software that is available on demand via the Internet is called
Software as a Service (SaaS).
A technique that uses illegally obtained information about individuals to perform targeted attacks in the hopes of getting them to reveal sensitive information is known as
Spear phishing
Which of the following is considered an accessibility utility?
Speech Recognition
A program that checks for the correct word spelling is the
Spelling checker
Another name for a worksheet is a
Spreadsheet
Software that transmits information about you, such as your Internet surfing habits, back to a third party is known as
Spyware
The minimum set of recommended standards for a program is known as the
System requirements
The Windows app used for closing unresponsive apps is
Task Manager
Which of the following is true about open source software?
The program can be changed and freely distributed.
Which is NOT an advantage of using a software suite?
The programs integrate easily with programs from other software suites.
When shopping online, which of the following does NOT indicate that you have a secure connection displays?
The word "secure" in the title bar.
From the title (ID) bar, we can tell that
This is a Microsoft Excel workbook named Acme Sales.xlsx
Viruses that activate on certain dates or with the passage of time are known as
Time bombs
A tall, upright system unit with relatively more expansion slots and bays is known as a (n):
Tower
A person can truly be addicted to the internet.
True
A primary benefit if a jump or flash drive is portability.
True
A wizard is a software tool that offers a step-by-step guide through complicated tasks.
True
Adware and spyware are both types of malware.
True
Cybercrime is any crime that is carried out with the aide if a computer.
True
Fourth-generation computers were characterized by the microprocessor.
True
In the URL www.hindscc.edu the top level domain is edu.
True
Input, in computer terminology, is known as data.
True
Machines with built-in computers use real-time operating systems.
True
Many household appliances contain embedded computers.
True
Mauchly and Eckert developed the ENIAC.
True
Multimedia is a common application of computers.
True
System restore points can be created manually by a user at any time.
True
The main purpose of File Explorer is to help you organize and find files on your computer.
True
The second step of the boot process is the power-on self-test (POST).
True
There is no universally agreed-on best system of ethics.
True
To delete an unwanted program from Windows 8, right-click the program tile from the Start screen and select Unistall.
True
You can share your favorite sites with others through social bookmarking
True
A 2.0 GHz personal computer has a processor capable of handling how many clock (machine) cycles per second?
Two billion
Which is NOT an example of a tablet OS?
UNIX
Which of the following statements is false?
Unethical behavior is always illegal.
Which of the following is an uncompressed audio file format?
WAV
Software that is available on-demand via the Internet is called:
Web-based software.
Which of the following companies developed the very first GUI?
Xerox