Computer Science 100 quizzes 1-10 review -- New Perspectives on Computer Science 2016

¡Supera tus tareas y exámenes ahora con Quizwiz!

​ A(n) __________ is a device or software that is designed to block unauthorized access while allowing authorized communications.

firewall

​In a spreadsheet worksheet, a(n) ___________ works behind the scenes to tell the microprocessor how to use the contents of cells in calculations.

formula

In 1969, computer scientists began to develop high-level languages, called ________-generation languages, which more closely= resembled human languages.​

fourth

A(n) __________ is a section of code that is part of a program, but is not included in the main sequential execution path.​

function

Payment processing is based on an online payment __________ that authorizes credit and debit cards, PayPal, and Apple Pay transactions.​

gateway

Web pages are connected by __________ links.​

hypertext

What is the term that is used to describe a computer system that could store literary documents, link them according to logical relationships, and allow readers to comment and annotate what they read?​

hypertext

When a program begins, the memory address of the first instruction is placed in a part of the microprocessor's control unit called a(n) __________.​

instruction pointer

Microprocessors are hard-wired to perform a limited, preprogrammed set of activities called a(n) ___________.​

instruction set

As an alternative to a compiler, a(n) ________ converts and executes one statement at a time while the program is running.​

interpreter

Once loaded into RAM, the __________ provides essential operating system services, such as memory management and file access.​

kernel

A cryptographic ________ is a word, number, or phrase that must be known to encrypt or decrypt data.​

key

​Passwords used as encryption ________ help to make hijacked data unusable.

keys

When 4:3 videos are displayed in a widescreen player, they are bordered by the black bars of a(n) _______.​

letterbox

​A software ________ is a legal contract that defines the ways in which a computer program may be used.

license

The most popular battery type used in today's electronic devices is __________.​

lithium ion

The part of the data bus that runs between the microprocessor and RAM is called the _______ bus.​

local

The structure of files and folders displayed by File Explorer is called a ________ storage model because it helps you create a mental picture of the way files are organized in a hierarchy of folders.​

logical

Microprocessors can't directly understand programming languages, so programs have to be converted into _____________ that corresponds to the microprocessor's instruction set.​

machine language

Regarding OO programming, which of the following terms best matches with the term "method"?​

main()

A large, closet-sized computer capable of simultaneously processing data for hundreds or thousands of users is most likely a __________ computer.​

mainframe

A set of commands called HTTP ________ help your browser communicate with Web servers.​

methods

In a processor, the timing device that sets the pace for executing instructions is called the ___________.​

microprocessor clock

A ___________ app is designed for a handheld device, such as a smartphone, tablet computer, or enhanced media player.​

mobile

The circuitry that enables a device to access a LAN is called a(n) ________.​

network interface controller

Any device in a network is called a(n) __________.​

node

​Many employment contracts contain a(n) ______________ designed to prevent employees from divulging proprietary information to competitors or opening competing businesses.

non-compete clause

A(n) _____________ is a collection of programs that typically include word processing, spreadsheet, presentation, and database modules.​

office suite

The phrase programming _____________ refers to a way of conceptualizing and structuring the tasks a computer performs.​

paradigm

If you feel more secure with a totally random and unique password for each of your logins, then a(n) _______________ is an excellent option.

password manager

​If you feel more secure with a totally random and unique password for each of your logins, then a(n) _______________ is an excellent option.

password manager

​The core function of a password manager is to store user IDs with their corresponding ________.

passwords

A computer file's location is defined by a file ______.​

path

On a network, file sharing allows users to open, view, edit, copy, and delete files from a remote device, providing that they have the proper ___________ .​

permission

Cookies that are stored on a device after a session ends are referred to as ________ cookies.​

persistent

Speech recognition software analyzes the sounds of your voice and converts each word into groups of ________.​

phonemes

A communication ______ is a virtual end point for data entering and leaving a digital device.​

port

In Prolog, the __________ describes the relationship between the arguments.​

predicate

Popular ___________ software products include Microsoft PowerPoint, iWork Keynote, LibreOffice Impress, and Google Docs Slides.​

presentation

The downside of the _____________ paradigm is that it does not fit gracefully with certain types of problems—those that are unstructured or those with very complex algorithms.​

procedural

​With respect to organizations, confidentiality means protecting __________ information about company finances, procedures, products, and research that competitors would find valuable.

proprietary

When a router connects to and communicates over the Internet, it has a ________ IP address that is routable over the Internet.​

public

Video compression can be expressed as a compression ______.​

ratio

Which of the following is the technique for adding light and shadows to a 3-D image?​

ray tracing​

A(n) _____________ contains parts of the operating system necessary to boot your computer and diagnose system problems after a hard drive failure or software malfunction.​

recovery drive

In a(n) _________ database, a table is a sequence of records, similar to a flat file.​

relational

The process of covering a wireframe with surface color and texture is called _________.​

rendering

Data __________ refers to the form in which data is stored, processed, and transmitted.​

representation

The number of horizontal and vertical pixels that a device displays on the screen is referred to as screen ________.​

resolution

​Any code that is designed to hide the existence of processes and privileges is referred to as a(n) _______.

rootkit

With just facts and goals, Prolog would be nothing more than a database, but the addition of _________ gives programmers a set of tools to manipulate the facts.​

rules

​One method of heuristic analysis allows the suspicious file to run in a guarded environment called a(n) ___________

sandbox

An integrated circuit is a set of microscopic electronic circuits etched onto a thin slice of ___________ material such as silicon.​

semiconducting

Processors that execute one instruction at a time are considered to be ________ processors​

serial

A computer that is primarily used to serve data to other computers on a network is called a(n) ______________.​

server

​A virus __________ is a section of program code that contains a unique series of instructions known to be part of a malware exploit.

signature

A(n) _________ sort uses one field, to arrange records. A(n) _________ sort arranges information by more than one field.​

single-level, multi-level

Unicode uses________ bits and provides codes for 65,000 characters.​

sixteen

In a general sense, ____________ refers to all the non-hardware components of a digital device.​

software

The collection of programs on a computer is referred to as _______________.​

software

Unauthorized changes to the DNS are called DNS ________.​

spoofing

Within the agile development framework, the process of developing each iteration of a program is called a(n) _________.​

sprint

​Any software that secretly gathers personal information without the victim's knowledge is classified as __________.

spyware

Networks use more than one protocol, and the collection of protocols for a network is referred to as a protocol ________.​

stack

HTTP is considered to be a(n) ___________ protocol.​

stateless

​A(n) _______ password is difficult to hack.

strong

Computers run three main types of software: application software, development tools, and _______ software.​

system

The primary purpose of ________ software is to help the computer system monitor itself in order to function efficiently.​

system

The ________ houses all essential chips and provides connecting circuitry between them.​

system board

The term ________ refers to the part of a digital device that holds the system board.​

system unit

There are three core elements in a relational database: fields, ________, and relationships.​

tables

​An information _________ degree programs focus on computer equipment and software used by businesses.

technology

In the context of communication networks, the term __________ refers to the structure and layout of network components​

topology

In a wireless network, RF signals are sent and received by a ______________.​

transceiver

​A(n) __________ is a computer program that seems to perform one function while actually doing something else.

trojan

A new version or edition of a software product is referred to as a software ___________.​

upgrade

A(n) _________ represents a value that can change.​

variable

​A computer _________ is a set of self-replicating program instructions that surreptitiously attaches itself to a legitimate executable file on a host device.

virus

​____________ is the disclosure by an employee of confidential information that relates to some danger, fraud, or other illegal or unethical conduct connected with the workplace, be it of the employer or of fellow employees.

whistleblowing

A feature called ___________ determines how your text flows from line to line by automatically moving words down to the next line as you reach the right margin.​

word wrap

​A computer _______ is a self-replicating, self-distributing program designed to carry out unauthorized activity on a victim's device.

worm

​Stuxnet is a notorious computer _______.

worm

​Which of the following would not be considered a disruptive technology?

​Computers that run OS X replacing computers that run Windows 8.

__________ is music, speech, and other sounds represented in binary format for use in digital devices.​

​Digital audio

​To establish a(n) ________, hackers set up an unsecured Wi-Fi hotspot complete with an Internet connection.

​Evil Twin

Which of the following is NOT used to create or edit HTML documents?​

​Filezilla FTP client

Industry standard tools for scheduling and project management include PERT, WBS, and ________.​

​Gantt charts

​Which of the following is not a characteristic for a good problem statement?

​It contains detailed descriptions of the processes and tools that need to be developed.

Which type of network topology connects a peripheral device to a host device?​

​Point-to-point

__________ refers to a branch of data mining that analyzes current and historical data to predict future trends.​

​Predictive analytics

A(n) ____________ is a company that provides space on a server to house Web pages.​

​Web hosting service

​Which of the following is not an example of an authentication protocol?

​all of the above

In a browser, __________ link to pages that you use frequently.​

​both A and B

​A(n) __________ is a device that uses a low-power radio transmitter to carry out two-way voice communications.

​cellular telephone

​A(n) _________ is a set of guidelines designed to help professionals thread their way through a sometimes tangled web of ethical on-the-job decisions.

​code of ethics

The main circuits on the system board that carry data are called the _________.​

​data bus

Which type of cables are used for high-capacity trunk lines that provide main routes for telephone, cable, and Internet communications?​

​fiber-optic cables

What is the term used for when a link leads to a Web page that no longer exists?​

​link rot

​Many employment contracts contain a(n) ______________ designed to prevent employees from divulging proprietary information to competitors or opening competing businesses.

​non-compete clause

​If you feel more secure with a totally random and unique password for each of your logins, then a(n) _______________ is an excellent option.

​password manager

A(n) _______________ is a field that contains data unique to a record.​

​primary key

​Chrome OS is an example of a _________ because it depends substantially on processing and storage provided by cloud-based servers.

​thin client

Software for Macs is usually stored in a single executable file with an __________ extension.​

.app

When were the original HTML specifications developed by Tim Berners-Lee?​

1990

Which type of mobile broadband service has maximum download rates of 300 Mbps and upload rates of 75 Mbps?​

4G

Wireless connections use unlicensed frequencies that are available for public use, including 2.4 GHz and _____ GHz. which is subject to less interference from other devices, but it has a more limited range.​

5

The __________ chip family set the standard for processors used in today's desktop and laptop computers, as well as servers.​

8086 OR x86 (both answers work)

As with other popular mobile operating systems, Android is designed for _______ processors.​

ARM

Which of the following is a markup language?​

All of the above

Which of the following would not be considered an operating system resource?​

All of the above

​Which from the following list are an example of productivity software?

All of the above

_____________ programmers create productivity applications such as Microsoft Office, as well as enterprise applications such as CRM and ERP.​

Application

What type of Internet connection do you have when upload speed differs from download speed?​

Asymmetric

Two of the most common open source and free software licenses are ___________.​

BSD and GPL

Which file sharing protocol distributes the role of a file server across a collection of dispersed computers?​

BitTorrent

__________ are the most commonly used database clients.​​

Browsers

​_________ workers are not official employees of a company.

Contract

Which type of security measure reduces the effect of an attack by using data backups, disaster recovery plans, and the availability of redundant hardware devices?​

Corrective procedures

The acronym ____________ refers to software that manages data stored in a database.​​

DBMS

Which of the following is NOT a format that is used for digital audio?​

DOC

_______ is a high-speed, digital, always-on, Internet access technology that runs over standard phone lines.​

DSL

_________ is the amount of data a storage device can move per second from the storage medium to RAM.​

Data transfer rate

____________ is distributed for free and often comes preinstalled on new devices, but it is limited in some way until you pay for it.​

Demoware

Which category of software would programming languages fall into?​

Development Software

​_________ technology displaces an existing business process, market, industry, or product.

Disruptive

A(n) _____ system can provide such benefits as improved overall performance by standardizing business processes based on best practices or improved access to information from a single database to an enterprise.​

ERP

_________________ refers to the process of hiding the internal details of objects and their methods.​

Encapsulation

________ is a wired network technology that is defined by IEEE 802.3 standards.​

Ethernet

__________ LANs are usually arranged in a star topology with computers wired to central switching circuitry that is incorporated in modern routers.​

Ethernet

A private IP address can be used to send data over the Internet.​

FALSE

ARM-based processors are not especially energy efficient.​

FALSE

Agile methodologies tend to be used for large software development projects involving more than ten developers, geographically dispersed development teams, and life-critical applications.​

FALSE

Because it is so easy to experiment with different numbers, word processing software is particularly useful for what-if analysis.​

FALSE

Cookies can be stored on desktop and laptop computers but not smartphones or tablet computers.​

FALSE

Detailed application specifications can be developed before or after selecting the hardware and software for an information system.​

FALSE

During an instruction cycle, all parts of the instruction are performed by the microprocessor's control unit.​

FALSE

In DFD terminology, a data store is a process that changes data by performing a calculation, updating information, or sorting a list.​

FALSE

LGAs have two rows of pins that connect the chip to a circuit board.​

FALSE

Microsoft Windows is used exclusively on desktop systems.​

FALSE

Most wireless LANs use licensed frequencies that require applying to the FCC for permission.​

FALSE

SQL keywords must be entered in all uppercase letters because they are case-sensitive.​

FALSE

Spreadsheet software offers database capabilities for establishing relationships between different record types.​

FALSE

The Head section of an HTML document contains text and links to images.​

FALSE

The Web is synonymous with the Internet.

FALSE

The entire Internet contains about a zettabyte of data.​

FALSE

The use of several databases is one of ERP's major advantages.​

FALSE

There is a universal standard for categorizing software and various categorization schemes have few similarities.​

FALSE

Third-generation languages added a level of abstraction to machine languages by substituting abbreviated command words for the strings of 1s and 0s used in machine languages.​

FALSE

Your search history is the same as your browser history.​

FALSE

programmers who work within the declarative paradigm envision a program as data objects that essentially network with each other to exchange data​

FALSE

​A manual calculator implements algorithms autonomously.

FALSE

​If you are traveling and expect to access files on a computer that you've left at home, make sure the remote access utilities is turned off.

FALSE

​Most ISPs and email services do not use filtering techniques to block spam.

FALSE

​Once you have installed antivirus software, you don't typically need to keep it running full time in the background

FALSE

​Similar to a worm, a trojan is not designed to spread itself to other devices.

FALSE

​The Atanasoff-Berry Computer was the first computing device to use transistors instead of vacuum tubes as processing circuitry.

FALSE

​Two-way radio technology went portable during World War I.

FALSE

8-bit color depth is also called True Color.​

False

All remote storage is considered to be cloud storage.​

False

An DIP is a square chip package, typically used for microprocessors, with pins arranged in concentric squares.​

False

Application programmers specialize in developing system software such as operating systems, device drivers, security modules, and communications software.​

False

Athlon and A-series processors manufactured by AMD are NOT x86 compatible.​

False

Component systems are currently the most popular form factor for digital devices.​

False

Data cannot flow over multiple networks that have different topologies.​

False

File sharing poses no real security risks.​

False

Memory cards are typically volatile.​

False

Modern processors follow Intel's original numbering sequence.​

False

Most Web apps require installation on your local computer or handheld device.​

False

Network discovery works in the exact same way on all devices.​

False

ROM is temporary and volatile, RAM is more permanent and non-volatile.​

False

Session cookies are stored on a disk or other permanent storage medium.​

False

The labels and values on a spreadsheet worksheet cannot be formatted in similar way as you would format text in a word processing document.​

False

The operating systems for smartphones are radically different to those used for tablet computers.​

False

The organization that supervises Internet addressing is ARPANET.​

False

To conserve space, applications that require high-quality sound use low sampling rates.​

False

Web crawlers gather material from the invisible Web.​

False

When high-level languages were originally conceived in the 1950s, they were dubbed second-generation languages because they seemed a major improvement over machine and assembly languages.​

False

​An original message or file that has not yet been encrypted is referred to as ciphertext.

False

​Android devices automatically encrypt data stored on the device when a user activates the login password.

False

​Blacklist and header filtering is usually performed by email clients and Webmail services.

False

​Certification alone is sufficient to qualify for a job in the IT industry.

False

​In addition to replicating itself, a virus self-distributing.

False

​Pharming attacks carried out by DNS spoofing can be detected by antivirus software or spyware removal software.

False

​The objective of a MITM attack is for a third party to block communications between two entities.

False

​Viruses spread themselves from one device to another.

False

DSL is an example of what type of Internet access?​

Fixed

The World Wide Web is a collection of HTML documents, images, videos, and sound files that can be linked to each other and accessed over the Internet using a protocol called _____.​

HTTP

If you are sending personal data such as credit card information to a Web site, which of the following should you see in the address bar of your browser?​

HTTPS

Which of the following is NOT drawback of using cloud storage?​

High price of storage.

_______________, such as BASIC, Python, Java, Prolog, and C++, make the programming process easier by replacing unintelligible strings of 1s and 0s or cryptic assembly commands with understandable commands, such as PRINT and WRITE.​

High-level languages

Which DCE would you use if you wanted to extend a wired network by adding more ports?​

Hub

The organization that supervises Internet addressing is ___________.​

ICANN

What organization is the top-level authority for supervising domain name requests?​

ICANN

The __________ is made up of businesses that focus on digital equipment, software, communications technologies, and related services.​

ICT industry

___________ is the fraudulent use of someone's personal information to carry out transactions.​

Identity theft

​_______________ are two of the world's largest exporters of ICT services.

India and Ireland

​1996 was the year that cable _______ service made its debut.

Internet

Which programming language is an interpreted language most commonly used for client-side Web scripting, such as animating page elements and validating input on HTML forms?​

Javascript

DHCP assigns an IP address to a device and links it to the device's _______ address.​

MAC

​ ________ refers to any computer program designed to surreptitiously enter a digital device.

Malware

Which type of network topology allows for redundant paths between devices that can be used to bypass failed devices?​

Mesh

Which OS is installed on more than 80% of the World's personal computers?​

Microsoft Word

Which type of broadband Internet access involves using cellular data networks? ​

Mobile

​A network utility called ______________ produces a detailed list of open ports on a device.

Netstat

​Which type of software must include the source code, which allows programmers to modify and improve the software?

Open source

​What is the term used to describe unwanted software that installs along with the application software that you originally downloaded and installed?

PUP

________ is utility software designed to measure responsiveness of an Internet connection.​

Ping

In a browser, _________ services can automatically complete your search requests based on previous searches.

Predictive

_________ software supplies the tools for combining text, photos, clip art, graphs, animations, and sound into a series of electronic slides that can be shown on a screen or projector​

Presentation

____________ paradigms are used to conceptualize the solution to a problem as a sequence of steps.​

Procedural

_________ is a temporary holding area for data and programs.​

RAM

​A ___________ is malware that arrives in a trojan disguised as legitimate software and sets up a secret communication link to a hacker.

RAT

Which of the following is not a SQL keyword?​

REMOVE

A(n) ___________ is a collection of language-specific programming tools that enables a programmer to develop applications for a specific computer platform.​

SDK

Word processing software is likely to include which the following features?​

Search and Replace, readability formula

​Which type of device is the top target for ransomware?

Smartphones

Which database tool is best for simple flat files that involve calculations?​

Spreadsheet software​

Suppose you wanted to run a Web server or FTP server from your home. What type of IP address would you want?​

Static

__________ methodology focuses on the processes that take place within an information system.​

Structured

On a network, which protocol is responsible for dividing files into chunks, adding headers containing information for reassembling packets in their original order, and error checking?​

TCP

Which business practice is a technique initiated by top management that involves all employees and all departments, and focuses on quality assurance in every product and service offered to customers?​

TQM

A 404 status code indicates that the resource that your browser requested does not exist.​

TRUE

A document called a system requirements report that describes the objectives for the information system.​

TRUE

A local application is installed on a computer's hard disk.​

TRUE

A slate tablet configuration is basically a screen in a narrow frame that lacks a physical keyboard.​

TRUE

An API is a set of application or operating system functions that programmers can add to the programs they create.​

TRUE

As a general rule, declarative programming languages are most suitable for problems that pertain to words and concepts rather than to numbers.​

TRUE

Connection speed is technically a measure of capacity.​

TRUE

Dedicated enterprise database applications may allow cosmetic changes, but they do not encourage modifications of core data structures.​

TRUE

Dropbox is an example of a file hosting service.​

TRUE

Files can remain in the Web cache for days or weeks​

TRUE

In a display device, response rate is the time it takes for one pixel to change from black to white then back to black.​

TRUE

In a key-value database, each data item has a key that is a unique identifier similar to a relational database key​

TRUE

Information systems designed for a specific industry or enterprise may use vertical market software.​

TRUE

Iterative SDLCs are often referred to as "agile methods" because they allow flexibility as development progresses.​

TRUE

Many Web apps allow several people to collaborate on projects because the project files are stored on the Web and can be easily shared.​

TRUE

Most spreadsheet software also includes basic data management features.​

TRUE

One of the major functions of an information system is to help people make decisions in response to problems.​

TRUE

Paragraph style includes the alignment of text within the margins and the space between each line of text.​

TRUE

Prolog programming is all about facts and rules.​

TRUE

Search engines will keep a record of your search history.​

TRUE

Some database software provides tools to work with more than one collection of records, as long as the records are somehow related to each other.​

TRUE

Structured English is a subset of the English language with a limited selection of sentence structures that reflect processing activities.​

TRUE

Technically, a supply chain stretches from raw materials and parts all the way to customer delivery.​

TRUE

Ten terabytes offer enough storage capacity to hold the printed collection of the Library of Congress.​

TRUE

The Internet is the world's largest WAN.​

TRUE

The first telephones were connected by point-to-point networks, similar to those used by the telegraph system.​

TRUE

The goto command is rarely used by skilled programmers because it can lead to programs that are difficult to understand and maintain.​

TRUE

The growth of the ICT industry has a generally upward trend.​

TRUE

The term 'stored program' means that a series of instructions for a computing task can be loaded into a computer's memory.​

TRUE

The term service pack usually applies to operating system updates.​

TRUE

Whistleblowing is risky under any circumstances.​

TRUE

You can set up Wi-Fi to use wireless mesh topology OR star topology.​

TRUE

x86 processors use a different instruction set than ARM processors.​

TRUE

​Heuristics may produce false positives that mistakenly identify a legitimate file as malware.

TRUE

​OS X devices include a utility that automatically encrypts data stored locally.

TRUE

​Spam sent by scammers often uses spoofed email addresses.

TRUE

​The 2002 Sarbanes-Oxley Act is meant to offer protection to whistleblowers.

TRUE

​The goal of normalization is to minimize data redundancy.

TRUE

​The most common types of PUPs and PUAs are toolbars and alternative browsers.

TRUE

​UDP is faster than TCP but does not perform error checking.

TRUE

​Based on existing laws governing international conflict, the ______________ sets out rules for conducting and responding to cyberwarfare.

Tallinn Manual

​Which of the following is not an example of an Information Technology Law?

The Espionage Act of 1917

​If you use a password manager, what do you as the user need to remember?

The master password.

_____________ is a network diagnostic tool that shows you each router and server that your data encounters as it travels over the Internet.​

Traceroute

A Web site cannot be accessed by its domain name until the name is added to the domain name server lists.​

True

A bitmap graphic is composed of a grid of tiny rectangular cells.​

True

A hard disk drive is an example of magnetic storage.​

True

A multicore processor that executes more than one instruction at a time is referred to as a parallel processor.​

True

A vector graphic consists of a set of instructions for creating a picture.

True

An example of system software is a computer operating system.​

True

Data refers to the symbols that represent people, events, things, and ideas.

True

Domain name servers maintain lists of all domain names and their corresponding IP addresses.​

True

HTML tags are instructions for a browser.​

True

In a spreadsheet worksheet, each cell in a grid can contain a value, label, or formula.​

True

LANs use many of the same network technologies as the Internet.​

True

Lossy compression throws away some of the original data during the compression process.​

True

Macs do not use drive letters, and the main hard disk is called Macintosh HD.​

True

Microprocessors only understand machine language, so there has to be some way to convert assembly language instructions into 1s and 0s.​

True

Mobile broadband can be used to access the Internet from a laptop or desktop computer.​

True

Networks can be classified according to their size and geographic scope.​

True

One of the main disadvantages of MIDI is that it cannot produce vocals.

True

Packet loss of less than 2% is required for acceptable streaming, gaming, Skype, and voice calls.​

True

Portable software does not require installation.​

True

Some software engineering activities overlap with the systems analysis and design activities​

True

The ability to switch between programs makes computers multipurpose devices.​

True

The term instruction cycle refers to the process in which a computer executes a single instruction.​

True

Web apps are examples of cloud computing.​

True

When interference affects a wireless signal, data must be re-transmitted.​

True

When setting up a Wi-Fi network, the router you select should support the fastest device you'll want to use on the network.​

True

You won't find a desktop with application windows on an iOS device.​

True

​A botnet has a server that is controlled by hackers.

True

​Applications include menu options for opening and saving files calling on the operating system's file management routines to get the job done.

True

​Colossus used binary arithmetic.

True

​Most trojans are not designed to replicate themselves.

True

​Social engineering attacks prey on human vulnerabilities.

True

​The first cellular phones to access the Internet and the Web were available in 1996.

True

​The single most effective security measure for digital devices is to password protect access to them.

True

Which type of problem requires human intuition as the basis for finding a solution.​

Unstructured

When the PC version of the spreadsheet program __________ became available, the IBM PC quickly became the top-selling personal computer.​

VisiCalc

1024 Zettabytes = 1 _______.​

Yottabyte

3-D graphics are based on vectors stored as a set of instructions describing the coordinates for lines and shapes in a three-dimensional space. What do these vectors form?​

a wireframe

A low-level language has a low level of ___________ because it includes commands specific to a particular CPU or microprocessor family.​

abstraction

A Web crawler uses a search _______ to traverse the Web.​

algorithm

​A calculation is based on a(n) ___________—the step-by-step process by which numbers are manipulated.

algorithm

​A cryptographic __________ is a procedure for encryption or decryption.

algorithm

Which is a component of a search engine?​

all of the above

Which of the following is an advantage of wired connection?​

all of the above

Which of the following is an example of a DCE?​

all of the above

​Which of the following can be used to block unauthorized access while allowing authorized communications on a device or network?

all of the above

A(n) _________ database is used to collect data that will be used for spotting trends that offer insights for tactical and strategic business decisions.​

analytical

An ecommerce ____________ is the software that handles ecommerce transactions.​

application

In Prolog programming, a(n) __________ represents one of the main subjects that a fact describes.​

argument

The ____________ is the part of the microprocessor that performs arithmetic operations, such as addition and subtraction.​

arithmetic logic unit

Today's widescreen devices, such as laptops and smartphones, are designed for the 16:9 __________.​

aspect ratio

In the context of database security, database ______ identifies sensitive data and database vulnerabilities in order to secure them.​

assessment

In a problem statement, you can limit complexity by making ____________.​

assumptions

​In spreadsheet software, the________________ feature ensures that the results in every cell are accurate for the information currently entered in the worksheet.

automatic recalculation

An example of _________ data is the 1 million transactions generated by Walmart sales registers every hour.​

big

​Hackers who gain control over several computers can organize them into a client-server network known as a(n) _______.

botnet

A Web _________ is client software that displays Web page elements and handles links between those pages.

browser

An operating system ensures that input and output proceed in an orderly manner, using ___________ to collect and hold data while the device is busy with other tasks.​

buffers

A group of eight bits is called a _______.​

byte

A(n) ____________ is special high-speed memory that allows a microprocessor to access data more rapidly than from memory located elsewhere on the system board.​

cache

Your browser _________ serves as temporary storage for Web documents.

cache

In the context of bitmap graphics editing, what technique employs algorithms that pull pixels from one area of an image and then apply them to another area?​

cloning

Remote storage that is available as an Internet service is called ______ storage.​

cloud

A(n) _______ is the software that compresses a video stream when a video is stored, and decompresses the file when the video is played.​

codec

Computers that operate in essentially the same way and use the same software are said to be ______.​

compatible

Bit rate can be scaled down by reducing the resolution and applying ____________ techniques.​

compression

Video files are stored in ________ formats that hold the compressed video stream and an audio stream.​

container

The information industry has three major facets: _________, computers, and telecommunications.​

content

In the context of a VDE, a(n) ___________ is a screen-based object whose behavior can be defined by a programmer.​

control

Decision makers can access analytical databases using an executive __________.​

dashboard

Using a ________ support worksheet, the project team can assign scores to each criterion, weight them, and compare totals for all solutions​

decision

In the context of Prolog programming, a(n) ________________ is a tabular method for visualizing and specifying rules based on multiple factors.​​

decision table

The _______________ paradigm describes aspects of a problem that lead to a solution.​​

declarative

Your ________ browser is automatically used when opening a web page or clicking on a web link.​

default

The process of converting information, such as text, numbers, photos, or music, into digital data that can be manipulated by electronic devices is called ___________.​

digitization

The mechanism for tracking domain names and their corresponding IP addresses is called the ________.​

domain name system

Internet addresses that are temporarily assigned are called ________ addresses.​

dynamic

​Conventional wisdom tells us that strong passwords are at least _____ characters in length and include one or more uppercase letters, numbers, and symbols.

eight

Password managers store passwords in a(n) _________ file​

encrypted

​Which of the following terms would best match this definition: Transforms a message or data file in such a way that its contents are hidden from unauthorized readers.

encryption

​Password _________ is a measure in bits of a password's unpredictability.

entropy

​The term professional _______ refers to on-the-job choices and actions that reflect a person's values.

ethics

Ports that expand the options for input, output, and storage, they are commonly called ____________ ports.​

expansion

A file with a .css file extension indicates that it is a(n) ________ CSS.​

external


Conjuntos de estudio relacionados

CoursePoint+ Chapter 9: Pain Management

View Set

MGT 291- Oakenfull Exam 1 Quiz Questions

View Set

Advantages and Disadvantages of Franchising

View Set

Physics - learning catalytics midterm 2

View Set

Chapter 38 and 39 PrepU Questions

View Set

Psychology: Statistical Significance

View Set

Chapter 4 HW, MGT 4350- Chp 3, MGT Chap 2, MGT 461 Chapter 7&8 TEST 2, Compensation Chapter 1, Chapter 2 - Strategy of Compensation Plans, MGT 461 Exam 2 - Ch. 5-8, Compensation Chapter 3, MGT386 Exam 1

View Set

Ch. 34: Management of Patients With Hematologic Neoplasms

View Set