Computer Concepts Practice Exam

¡Supera tus tareas y exámenes ahora con Quizwiz!

___ are individuals with a large number of followers on social media sites who are often paid to promote products.

Influencers

A(n) ___ is a set of software tools that enables managers to gather, organize, and evaluate information.

MIS Management information system

What is the name of the backup utility in macOS?

Time machine

___ cable normally consists of four pairs of wires that are twisted around each other.

Twisted-pair

___ players refer to applications that allow you to listen to music and play videos.

media

___ printers combine either inkjet or laser printing capabilities with scanning, photocopying, and faxing capabilities.

multifunction

The ability to run multiple programs at the same time is known as:

multitasking

___ occurs when an organization transfers some aspect of their business to a third party.

outsourcing

In the model known as ___, advertisers pay for their ads only when a website visitor clicks on the ad.

pay per click

A monitor's screen is divided up into millions of tiny dots, called:

pixels

Browser ___ are separate programs that allow your web browser to display specialized content or certain types of multimedia.

plug ins

A ___ is a fully-contained program that self-replicates and spreads through computers and networks.

worm

___ is a feature that requires two forms of identification, such as a password and possession of your phone, to log into an account.

2FA

Which of the following is NOT an example of an office suite?

??? Adobe???

Although Google owns ___ and manages the Google Play Store for apps, they allow any manufacturer to use and modify this operating system for their devices.

Android

As the main processor of a computer, the ___ is responsible for organizing and carrying out instructions in order to produce a desired output.

CPU

___ is a form of electronic money that is decentralized and whose transactions are encrypted, processed, and recorded via peer-to-peer networks.

Cryptocurrency

___ software is used to create and manage databases.

DBMS

Software is sometimes illegally modified in order to disable ___ technologies such as copy protection and authenticity checks.

DRM

A(n) ___, which is a special application that collects and reports certain types of data, can help managers make better decisions.

DSS decision support system

Most of today's PC software and standard definition movies are sold as:

DVDs

___ is the process of scrambling your data or storage devices to make them unreadable by anyone who doesn't have the proper key.

Encryption

Laws such as the Patriot Act and ___ give the U.S. government broad surveillance powers.

FISA

Ultraportable computers will often use ___ technology exclusively, even though their storage capacity is lower than that of a traditional hard drive.

SSD

___ is unsolicited email that is sent in bulk.

Spam

Web pages have a standard addressing system known as a(n) ___, which allows them to be located on the internet.

URL

Instead of calling a taxi company or hailing a cab on the street, apps such as ___ connect drivers who have some free time and individuals who need transportation.

Uber

Because it increases the security of a network connection, a ___ is often required for users who wish to access a company's private network over an Internet connection.

VPN

___ refers to a new way to use the World Wide Web, whereby any user can create and share content, as well as provide opinions on existing content.

Web 2.0

Which of the following is NOT a popular computer programming language?

Xero

When it comes to social video, no service is as large or popular as:

YouTube

The series of steps that describe exactly what each portion of a program is supposed to do is known as a(n):

algorithm

Some licenses require that the user provide ___, or credit, to the author wherever the work is used.

attribution

___ are small data files that are created by websites in order to remember users and their preferences the next time they visit the site.

cookies

Google ___ is a tool that allows users to view and control all their data.

dashboard

Many mobile users purchase a monthly ___ that allows them to connect to the internet using a cellular network.

data plan

Simply put, a computer ___ is an organized method for storing and retrieving information such as customers, employees, inventory, and sales records.

database

Operating systems typically contain a disk ___ or optimization utility, which will reorganize files and fragments to place related ones nearer to each other.

defragmentation

___ is a browser feature that attempts to stop websites from automatically sharing details about your visit with other companies.

do not track

A ___, such as apple.com and whitehouse.gov, uniquely identifies a site and a brand on the web.

domain name

___ printers create output by striking an inked ribbon against paper using metal pins, making them useful for printing on pressure-sensitive forms.

dot matrix

Operating systems communicate with most hardware components using:

drivers

___ printers are often used to create lab-quality photos, as well as the images found on plastic ID cards.

dye-sub

Human ___ describes the various ways in which technology can be integrated with biological systems to repair or improve human functions.

enhancement

A(n) ___ examines and blocks Internet traffic in order to protect your private network.

firewall

The instructions that handle a computer's basic functions when it is powered on are referred to as:

firmware

A USB ___ drive is the small storage stick that plugs into a USB port.

flash

While storms could be a cause, power ___ are more likely to be caused by disturbances from high-demand equipment in a home or building.

fluctuations

Digital ___ are effectively a trail of your data, activities, and even locations visited while carrying a smartphone.

footprints

Which of the following is NOT one of the four colors used in the ink nozzles of inkjet printers?

green

Today's web browsers include a feature that will delete all of your browsing ___ with a single click.

history

___ robots are those that are created to imitate the appearance or capabilities of humans.

humanoid

A type of spyware known as ___ can record the individual keystrokes of a user.

keyloggers

It is through ___ that a copyright holder can grant usage or distribution rights to others.

licensing

Certain types of systems are called ___ because they must run without failure or with nearly instant recovery from failure.

mission critical

Search ___, such as quotes and the minus sign, can narrow down the results provided by search engines.

modifiers

___ occurs when computers or machines can perform the work that was once done by a human.

automation

A(n) ___ is just another name for an error in a program.

bug

Many users choose to ___ several files into one ZIP file for the sake of easy transport, especially when attaching them to an email message

compress

A web ___ is a website that provides a variety of useful information and services to visitors, making them popular as browser home pages.

portal

Operating systems use ___ utilities to place computers and devices in low-power states when they are not being used.

power management

Computers that communicate over a network must follow certain ___ to ensure that the transmission is sent properly and understood.

protocols

A(n) ___ computer can represent data in states beyond the two bits (0's and 1's) of today.

quantum

Users with broadband connections are typically equipped with a(n) ___ that connects their home's network to the internet.

residential gateway

The scam known as ___ typically comes in form of an alert message that claims to be from the FBI or your security software.

scareware

The ___ economy is an expression that refers to the way in which the internet has facilitated our ability to share (usually for a price) our goods or services with other individuals.

sharing

To keep using ___ after the trial period, you must purchase a full version or a code that can be entered into the software.

sharware

In a(n) ___ topology, all nodes are connected to a hub or switch and communicate through it.

star

All newer web browsers use a(n) ___ browsing interface, which allows you to have multiple web pages open in one browser window.

tabbed

When using a discussion forum, placing your message in the correct ___ will maximize your chances of getting a reply.

thread

A(n) ___ is a pointing device that works like an upside-down mouse, with users moving the pointer around the screen by rolling a ball with their finger.

trackball

Programs that are based on ___ graphics rely on mathematics to generate and manipulate a variety of shapes.

vector

Businesses often use more sophisticated versions of webcams to engage in ___, where multiple individuals hold meetings and converse using internal networks or the internet.

videoconferencing


Conjuntos de estudio relacionados

Electricity & Magnetism, Chapter 2, Section 1: Electric Charge & Static Electricity

View Set

Chapter 14: Exploring Social Media and e-Business

View Set

5.Sınıf 1.Ünite Hello 13.Ders Ülke, Milliyet, Dil

View Set

Factoring Polynomials: Sum and Difference of Cubes Assignment

View Set

Unit 3 CW/HW: What kind of Statistic is it?

View Set

TTU Principles of Economics Quiz 1 ECO-2305

View Set

Economics for Managers- Strategies for Assessing and Increasing Demand

View Set

Arthropod Vectors and Vector-Borne Disease

View Set