Computer systems
Which of the following is NOT true about DSSs? A DSS uses data only from internal sources. Some DSSs include their own query language. Some DSSs are available to everyone on the web. DSS stands for decision support system.
A DSS uses data only from internal sources.
All of the following are examples of desktop operating systems EXCEPT ______. Linux Android UNIX Chrome OS
Android
Which of the following is NOT true about hard disks? They use magnetic particles to store data, instructions, and information. The alignment of the magnetic particles represents the data. They contain one of more inflexible circular platters. A desktop hard disk is much smaller than that of a laptop.
A desktop hard disk is much smaller than that of a laptop.
Which manufacturer uses the term AirPods to refer to headphones that fit in your ear and connect wirelessly to devices? Samsung Blackberry Apple Nokia
Apple
What is an audit trail? A list of passwords and user names on a network. A file that records access attempts. A record of hacking attempts. A log of financial transactions.
A file that records access attempts.
Client/server and P2P are two types of network ______. functions resources operating systems architecture
Architecture
In a multitasking operating system, ______ programs are running but not in use. background idle inactive unopened
Background
______ is a measure of the capability of a network to send and receive data. Streaming Broadband Bandwidth Net worth
Bandwidth
Why would a field that contains numbers have a text data type? In order to keep the number of data types to a minimum. Because the numbers represent letters. Because the values will not be used in calculations. It shouldn't -- this is a mistake that should be fixed.
Because the values will not be used in calculations.
Which of the following best describes a hot spot? A wireless network that provides Internet connections to mobile computers and devices. Another term for the deep web, an unsearchable area of the Internet known for illegal activity. A zone in which it is unsafe to use your computer or network without additional security. An area on a webpage that provides the most important, up-to-date content.
A wireless network that provides Internet connections to mobile computers and devices.
The ______ is the component of the processor that performs arithmetic and comparison operations. calculator CPU ALU control unit
ALU
The ______ network became functional in 1969, linking scientific and academic researchers across the United States. NETAMERICA INTRANET AMERINET ARPANET
ARPANET
______ information is available when the decision maker needs it. Verifiable Accessible Timely Organized
Accessible
Which of the following is NOT true about PCs? Acer, Dell, and HP are examples of companies that sell computers that use the Mac operating system. PC stands for personal computer. A PC is intended to be used by one person at a time. PC sometimes is used to describe a computer that runs a Windows operating system.
Acer, Dell, and HP are examples of companies that sell computers that use the Mac operating system.
In the video, Time Machine backs up (check all that apply): photos applications folders documents music
All
According to the display video, the following are applications for stereoscopic displays: PC games Minimally invasive surgery and diagnosis using 3D CT and MRI data Molecular modeling for chemists Stereo mammography Oil and gas exploration All of the above
All of the above
Mobile devices can be infected with a virus by the following vector(s): Direct MMS message Download All of the above
All of the above
A Yes/No data type also is called ______. choice optional Boolean either/or
Boolean
Which virus type targets a computer's start-up files? boot sector stealth kickstarter macro
Boot Sector
You want to ensure your wireless network is secure. Which of the following should you NOT do? Choose a secure location for your wireless router. Retain the default administrative password. Enable an encryption method such as WPA2. Broadcast the SSID.
Broadcast the SSID.
______ is the number of bytes (characters) a storage medium can hold. Capacity Disk dimension File size Capability
Capacity
Your boss, Molly, asks you to create a spreadsheet for sales data for the store at which you both work. In a spreadsheet, B4 represents a(n) ______. formula cell table worksheet
Cell
Gantt and PERT are types of ______ used to plan and schedule time relationships among project activities. deliverables apps documents charts
Charts
______ is a Linux-based operating system designed to work primarily with web apps. Chrome OS iOS Windows Web UNIX
Chrome OS
Two types of operating system user interfaces are graphical and ______. text-based command-line 3D navigational
Command-line
Which of the following is responsible for installing hardware and servers and troubleshooting hardware problems? Help desk technician Technical project manager Computer technician Network engineer
Computer technician
During which phase of web publishing would you use a text editor to enter codes that instruct the browser how to display webpage content? Host Create Plan Design
Create
Which type of system's primary function is to store and manage a company's documents in a central library? TPS CMS MIS DMS
DMS
______ is a collection of unprocessed items, including text, numbers, images, audio, and video. Information A byte Output Data
Data
Which of the following is NOT true about servers? Dedicated servers typically do not require a fast processor, and use little memory. Form factors for servers include rack, blade, and tower. In many cases, a server accesses data, information, and programs on another server. Services provided by servers include storing content and controlling access to network resources.
Dedicated servers typically do not require a fast processor, and use little memory.
During which phase of system development would you acquire any necessary hardware and software? Implementation Analysis Planning Design
Design
A data ______ contains data about each file in the database and each field in those files. guide dictionary encyclopedia reference
Dictionary
The name of the computer museum in the video was: DigiFarm Digital Heritage Computers Galore DigiBarn
DigiBarn
In the acronym ADA, the D stands for ______. disabilities device data distance
Disabilities
______ pitch is the distance in millimeters between pixels on a display. Dot Resolution Candela Nit
Dot
A(n) ______ is a small program that tells the operating system how to communicate with a specific device. spooler driver app interpreter
Driver
Two commons types of RAM are ______ RAM and ______ RAM. dynamic, static temporary, permanent storage, memory volatile, nonvolatile
Dynamic, Static
Which of the following is NOT true about databases? You can create forms and reports using data in a database. A database consists of a collection of tables. Each column contains data about a given item in the database, such as a person or product. Much of the information you access on the web is stored in databases.
Each column contains data about a given item in the database, such as a person or product.
Which of the following is NOT an advantage of the database approach? Improved data integrity Reduced development time Eliminates redundant data Easier access
Eliminates redundant data
Ticket machines, ATMs, digital cameras, and robotics all use ______ operating systems. mobile virtual multiuser embedded
Embedded
Sales, marketing, and manufacturing are all types of software typically used by a(n) ______. enterprise individual power user small business
Enterprise
Which of the following is NOT a recommendation when deciding what to upload to the cloud? Back up only the files you are sure you will need again in the future. Upload financial and insurance documents. Review your files and remove those you no longer need. Even if you have access to installation media, back up your programs and apps.
Even if you have access to installation media, back up your programs and apps.
QBE stands for query by ______. edit email Entry example
Example
Which of the following MIS reports identifies data outside of a normal condition? General Exception Detailed Summary
Exception
A cold boot generally is faster than a warm boot. True False
False
A database analyst collects and analyzes evidence found on computers, networks, mobile devices, and databases. True False
False
A mail server stores and manages email lists. True False
False
A point-and-shoot camera is a high-end digital camera that has interchangeable lenses. True False
False
A query language consists of complex, abbreviated statements that allow users to specify data they want to display, print, store, update, or delete. True False
False
According to the video editing video, you should first save to a low resolution file. True False
False
An ATM asks you to enter a numeric password, called a PIN, which stands for Private Identity Name. True False
False
An ink-jet printer is a type of impact printer. True False
False
Bluetooth devices need to be within the same line of sight. True False
False
By itself, a bit is extremely informative. True False
False
Chrome is a Microsoft browser included with the Windows operating system. True False
False
Coaxial cable is capable of carrying significantly more signals than fiber-optic cables. True False
False
Continuous backup is inexpensive because the data is constantly being backed up. True False
False
Continuous data protection is widely used by home and small business users. True False
False
Contributors to a wiki typically do not need to register before they can edit or comment. True False
False
Dial-up access is a type of broadband digital Internet connection. True False
False
Eight bytes grouped together form a bit. True False
False
Files on an intranet generally are also accessible from the Internet. True False
False
Flash memory has many moving parts, making it less durable and shock resistant than other types of media. True or False
False
Gaming consoles are more portable than handheld gaming devices. True or False
False
In an optical disc, the absence of light is read as binary digit 1. True False
False
Keyboards for mobile devices contain the same number of keys as desktop keyboards. True or False
False
Mobile computers and devices typically have a separate physical display device. True or False
False
Most browsers require you to enter the protocol and host name in a web address. True False
False
Most computers and electronic devices are analog, which uses only two discrete states: on and off. True False
False
Most information gains value with time. True False
False
Passphrases are less secure than passwords. True False
False
Peripheral devices normally occupy space inside of the system unit. True False
False
Sending and receiving text email messages uses a similar amount of data as talking with others using VoIP with video. True False
False
Software registration typically is required. True False
False
The Internet is a service of the World Wide Web. True False
False
The higher the number, the faster the response time. True False
False
The term, PC, sometimes is used to describe a computer that runs on a Mac operating system. True False
False
To protect files on your device's hard drive from hackers, turn on file and printer sharing. True False
False
When purchasing a digital camera, you do not need to worry about the memory card because all cameras use the same memory cards. True False
False
With Bluetooth printing, the computer and printer need to be aligned with each other. True False
False
With an all-in-one computer the display device is separate from the tower. True or False
False
With the media converter solution demonstrated in the video, multiple formats can be converted in one session. True False
False
Without a built-in card slot, you cannot transfer stored items from a memory card to a computer or printer. True or False
False
You should use a humorous name for your account profiles to ensure that you stand out to potential employers. True False
False
A(n) ______ is the smallest unit of data a user accesses. file symbol field record
Field
ROM chips called ______ contain permanently written instructions, or information, such as start-up instructions. firmware SROM boot memory hard drives
Firmware
______ consists of ROM chips or flash memory chips that store permanent instructions. Dataware Firmware Chipware Memware
Firmware
Which of the following is NOT true about NFC? It is based on RFID. For successful communications, the devices must not touch or come within 6 inches of each other. You can purchase blank NFC tags at a reasonable cost. It stands for near field communications.
For successful communications, the devices must not touch or come within 6 inches of each other.
A(n) ______ key is a special key programmed to issue commands to a computer. function control command toggle
Function
Your boss, Molly, asks you to create a spreadsheet for sales data for the store at which you both work. You want to add the numbers in a row or column. You use the SUM ______. operator adder calculator function
Function
Mapping, monitoring speed, and determining altitude all are uses of ______. microwaves GPS infrared NFC
GPS
Which of the following is responsible for answering technology-related questions? Help desk technician Computer technician Network engineer Technical project manager
Help Desk Technician
What does HTML stand for? Hyperlinks and Text Markup Language Hypertext Markup Language Hypertext Mathematics Language
Hypertext Markup Language
A(n) ______ is a sequence of numbers that uniquely identifies the location of each computer or device connected to the Internet or any other network. IP address fixed location top-level domain URL
IP Address
Which of the following best describes the term, redundancy, as it pertains to enterprise businesses? When employees unknowingly duplicate data entry in a database The use of external consultants who provide the same tasks as internal employees When hardware or software becomes obsolete and is replaced with newer models If one hardware component fails or malfunctions, another can assume its tasks
If one hardware component fails or malfunctions, another can assume its tasks
Which of the following is NOT true about QR codes? QR codes can be read with a QR bar code reader or a QR code reader app on a smartphone. QR codes store information in both a vertical and horizontal direction. If the QR code directs you to a website displaying a form, enter your personal information to ensure your safety. Most QR code reader apps show the address of the website that will be displayed.
If the QR code directs you to a website displaying a form, enter your personal information to ensure your safety.
Search tools typically use a(n) ______, which stores a variety of information about a file. Index header signature directory
Index
While working as an assistant in an IT department, you have been taking classes in information and systems security. You meet with a career counselor to discuss potential jobs. One of the jobs available at your current company is for a digital forensics analyst. What skill will you need to have to apply for the job? Inspect electronic data to recover documents and files Convert system design into an application development language Configure routers and firewalls SEO
Inspect electronic data to recover documents and files
_____ data is stored in separate files in different departments. Exiled Isolated Divorced Detached
Isolated
Which cache level is on the motherboard and is separate from the processor chip? L2 L4 L1 L3
L3
A home or school likely uses a(n) ______. MAN WAN LAN PAN
LAN
Which of the following is NOT a recommended practice for gaming safety? Check the developer of any software or apps to be certain it is legitimate. Use a firewall when using multiplayer online games. Look for games that use ActiveX or JavaScript, as these are always safe. Avoid games requiring passwords to be saved to an online account on a smartphone.
Look for games that use ActiveX or JavaScript, as these are always safe.
The banking industry almost exclusively uses ______ for check processing. OCR magnetic stripes QR codes MICR
MICR
Which of the following adapter cards connects to musical instruments? tuner modem MIDI sound
MIDI
In M2M communication, such as with the Internet of Things trend, the M stands for ______. media machine mobile manufacturer
Machine
File ______ refers to the procedures that keep data current. administration integrity validation maintenance
Maintenance
Trojan horses and zombies are examples of ______. hackers search engines cloud apps malware
Malware
A File ______ performs functions related to displaying and organizing files. Organizer Folder Displayer Manager
Manager
OneDrive is a cloud server from ______. Apple Microsoft Firefox Google
Microsoft
Which of the following search texts will display pizza or sandwich places in New Orleans? New Orleans (pizza or sandwich) *New Orleans + pizza_sandwich pizza + sandwich (New Orleans) "New Orleans + pizza_or_sandwich"
New Orleans (pizza or sandwich)
To connect devices within your workspace, use a ______. WAN MAN LAN PAN
PAN
On networks that use TCP/IP, ______ software can detect problems, such as why traffic is flowing slowly. information routing speed monitoring packet sniffing data tracking
Packt Sniffing
The operating system sometimes is called the ______. background app ground floor platform underlying hardware
Platform
A mouse is an example of a(n) ______ device. processing output display pointing
Pointing
Lighting, HDMI, and Thunderbolt are all types of ______. ports ISP gaming consoles networks
Ports
The animals pictured in the computer museum video were: Small cows Pot bellied pigs Llamas Goats
Pot bellied pigs
Which of the following is NOT true about presentation software? Presentations are visual aids to communicate information to a group. Presentations are viewed as clip shows. Presentation software typically provides a variety of layouts for each slide. When building a presentation, users can set the timing and add special effects.
Presentations are viewed as clip shows.
The ______ interprets and carries out the basic instructions that operate a computer. processor transistor circuit board motherboard
Processor
Which of the following is NOT a basic function of a computer? Accept data Store information Produce input Process data
Produce Input
Productivity suites typically include, at minimum, all of the following EXCEPT ______. presentation Project management spreadsheet word processing
Project Management
Which of the following best describes open source software? Provided for use, modification, and redistribution. You Answered Copyrighted software provided at no cost. Distributed at no cost for a trial period. Donated for public use and has no copyright restrictions.
Provided for use, modification, and redistribution.
A(n) ______ is a request for specific data from a database. function query filter retrieval
Query
A group of two or more integrated hard drives is called a(n) ______. RAID duplicate drive multidisk SSD
RAID
______ consists of one or more chips on the motherboard that hold items such as data and instructions while the processor interprets and executes them. Storage ROM The motherboard RAM
RAM
A(n) ______ database stores data in tables that consist of rows and columns. distributed relational data warehouse multidimensional
Relational
Which of the following best describes disk defragmentation? Installing partitions on the hard disk in order to run separate operating systems on the same computer. Removing unnecessary files. Reorganizing the hard disk so that files are stored in contiguous sectors. Compressing backup and other files to increase disk storage.
Reorganizing the hard disk so that files are stored in contiguous sectors.
The term hard drive refers collectively to hard disks and ______. USB flash drives optical discs SSDs memory cards
SSDs
A SAN is a high-speed network with the sole purpose of providing storage to other attached ______. servers storage devices smart devices security systems
Servers
Many software makers provide free downloadable updates, sometimes called a(n) ______ to users who have registered and/or activated their software. secure deliverable debugger service pack enhancement
Service Pack
Which of the following best describes how you can use Facebook? Share professional interests, education, and employment history. Follow people, companies, and organizations in which you have an interest. Share messages, interests, activities, events, photos, and other personal information with family and friends. Create an online journal of short messages broadcast to your followers.
Share messages, interests, activities, events, photos, and other personal information with family and friends.
The field ______ defines the maximum number of characters a field can contain. capacity size length width
Size
What does a disk's form factor describe? capacity speed operating system size
Size
A collection of related instructions organized for a common purpose is referred to as ______. data hardware software scripts
Software
Original forms of data, such as time cards or order forms, are known as ______ documents. information input source scannable
Source
Microsoft Office ______ is the certification that tests a user's skills of Microsoft Office programs. Specialist Expert Professional Administrator
Specialist
The ______ process sends documents to be printed into a buffer instead of sending them immediately to the printer. aligning delaying spooling thrashing
Spooling
Tape storage requires ______ access, which refers to reading or writing data consecutively. continuous Successive sequential normal
Successive
Some smartphones support a(n) ______ keyboard app, on which users enter words by tracing a path on an on-screen keyboard. swipe touch finger virtual
Swipe
In some database programs, a data file is referred to as a(n) ______. record unit sheet table
Table
You have been chosen to be a teaching assistant at your school. A student comes to you with questions about storage devices. The student asks you to explain speed of storage devices and memory. You tell her that all of the following are true, EXCEPT: Some manufacturers state a storage device's transfer rate because it affects access time. Optical discs are good options to store movies and music. Transfer rates for storage are stated in KBps, MBps, and GBps. The access time of memory is slow compared with that of storage devices.
The access time of memory is slow compared with that of storage devices.
Which of the following is NOT true about system units? On most laptops, the keyboard and pointing device often are on top of the case. The case on a smartphone often is in front of the display. Desktops that house the display and system unit in the same case are called all-in-one. The case on wearable devices typically consumes the entire device.
The case on a smartphone often is in front of the display.
Which of the following is NOT true about network security? Permissions define who can access resources and when they can access the resources. The operating system on a network does not record unsuccessful sign-in attempts. A user account enables a user to sign in to a network or computer. Some operating systems allow the network administrator to assign passwords to files and commands.
The operating system on a network does not record unsuccessful sign-in attempts.
What is meant by the term Plug and Play? A gaming system optimized for multiplayer games A device that must be connected to the network in order to access its operating system A portable battery and wireless network device that is used by mobile devices The operating system that automatically configures new devices as you install or connect them
The operating system that automatically configures new devices as you install or connect them
Which of the following is NOT true about motherboards? Manufacturers package chips so that they can be attached to a motherboard. The circuitry for the processor, memory, and other components reside on computer chips. An integrated circuit contains microscopic pathways capable of carrying electrical current. The processor and memory are built into the motherboard.
The processor and memory are built into the motherboard.
What occurs during a head crash? The top platter collapses. A hard disk attempts to store data into a flawed sector. The rpm of the hard disks platters is too high, causing friction. The read/write head touches the surface of a platter.
The read/write head touches the surface of a platter.
For what purpose would a company use an extranet? To connect employees' mobile devices To allow customers or suppliers to access part of its intranet As a backup to the company's website To provide network access to employees in different countries
To allow customers or suppliers to access part of its intranet
Which of the following best describes the purpose of an ISP? To register domain names for websites To monitor Internet activity for fraud or illegal activity To provide access to the Internet for free or for a fee To create guidelines for web design
To provide access to the Internet for free or for a fee
Which of the following is NOT true about PDFs? Productivity applications often integrate the ability to save a project as a PDF. Adobe Reader is downloadable for free. To read a PDF, you need the software that created the original document. PDF is an image file format.
To read a PDF, you need the software that created the original document.
For what purpose is keylogging software used? To determine if a computer's primary input device has been compromised To store every keystroke in a file for later retrieval To secure the device's keyboard from entering input in case of theft To automatically translate input to another language as the user enters data
To store every keystroke in a file for later retrieval
Which of the following best describes the function of a primary key? Another term for file name To provide decryption of data To uniquely identify each record in a file The first record in a data file
To uniquely identify each record in a file
Which of the following is most likely to be used by a LAN? IrDA NFC Bluetooth Token ring
Token Ring
A(n) ______ can act as an electronic switch that opens or closes the circuits for electrical charges. processor operator conductor transistor
Transistor
A 2.1 speaker system contains two speakers and one subwoofer. True False
True
A WAN can be one large network or can consist of multiple LANs. True False
True
A cloud app makes use of software and data that are not stored on your computer or mobile device. True False
True
A digital pen is an input device that captures and converts a user's handwriting or drawings into a digital format. True False
True
A headset contains both a microphone and a speaker. True or False
True
A keyboard, mouse, and microphone all are examples of peripheral devices. True False
True
A performance monitor is a program that assesses and reports information about various computer resources and devices. True False
True
A port is the point at which a peripheral device attaches to or communicates with a computer or mobile device. True False
True
A program is another term for software. True or False
True
A shopping cart allows a customer to collect items to purchase on an e-retail website. True False
True
A smartphone is an Internet-capable phone that usually also includes a calendar, an address book, a calculator, a notepad, games, browser, and numerous other apps. True False
True
A storage appliance has its own IP address. True False
True
A supercomputer is the fastest, most powerful computer--and the most expensive. True False
True
Antivirus vendors say that the number one reason people infect their own mobile device is that they need to make a phone call so they say yes, and they accept the virus onto their system just so they have access to the outside world. True False
True
As the resolution increases, some items on the screen appear smaller. True False
True
Blu-ray players are backwards compatible with DVD and CD formats. True False
True
Bluetooth technology is standardized globally, so it can be used to connect devices that are not of the same make or model. True False
True
Both earbuds and headphones usually include noise-cancelling technology that enable you to reduce the volume level needed. True or False
True
By subscribing to an ISP, you can connect to the Internet through your computers and mobile devices. True or False
True
C++ and JavaScript are examples of programming languages. True or false
True
CISSP is an example of a security certification. True False
True
Cambria and Calibri are examples of font styles. True False
True
Catfishing is when someone creates a fake online social network or online dating profile and forms relationships with unsuspecting users. True False
True
Chassis is another term for system unit. True False
True
Choose a processor that exceeds the minimum system requirements of the programs and apps you wish to run, but it is not always necessary to purchase the most expensive computer with the fastest processor. True False
True
Dice and Monster are examples of career planning websites and apps. True False
True
Encryption is one safeguard against information theft. True False
True
Expert systems are a component of artificial intelligence. True False
True
GPS stands for global positioning system. True False
True
Google is an example of a search engine. True or False
True
HDTV is the most advanced form of digital television. True False
True
HTML is a programming language. True False
True
Hard disks are read/write storage media. True False
True
Higher contrast ratios represent colors better. True False
True
In addition to the ball, a trackball usually has one or more buttons that work like mouse buttons. True False
True
Individuals suffering from technology overload feel distressed when deprived of computers and mobile devices. True or False
True
Information systems support daily, short-term, and long-range information requirements of users in a company. True False
True
Many email applications include calendar and contact management features. True False
True
Many handheld computers are industry-specific, such as for parcel delivery people. True False
True
Many routers also can function as a hardware firewall. True False
True
Many smartphones and mobile devices have software that shows the approximate location of devices and computers. True False
True
Media players often allow you to burn audio CDs. True False
True
Mobile web apps are actually websites that provide a user experience similar to native apps. True False
True
Monitoring system performance is a part of the support and security phase. True False
True
Most e-book reader models have a touch screen, and some are Internet capable. True or False
True
NFC is a technology that uses close-range radio signals to transmit data between devices or a device and a tag. True False
True
OEM stands for original equipment manufacturer. True False
True
Open source software has no restrictions from the copyright holder regarding modification of the software's internal instructions. True False
True
Output is data that has been processed into a useful form. True False
True
Outsourcing is when an enterprise offloads storage management to an outside organization or cloud storage provider. True False
True
Piracy is the most common form of software theft. True False
True
Search text generally is not case sensitive. True False
True
Smartphones and other mobile devices often can function as a portable media player. True False
True
Some DSL installations include a dial tone, providing users with both voice and data communications. True False
True
Some smartphones can also function as a wireless modem. True False
True
Sometimes communications devices are preprogrammed to accomplish communications tasks. True False
True
The Internet has its roots in a networking project started by an agency of the U.S. Department of Defense. True False
True
The Safari browser comes preinstalled on Apple computers and devices. True False
True
The computer may run slower while it uses virtual memory. True False
True
The goal of project management is to deliver an acceptable system to the user in an agreed-upon time frame, while maintaining costs. True False
True
The operating system serves as the interface between the user, applications, and hardware. True False
True
The process in which two or more computers or devices transfer data, instructions, and information is known as digital communications. True False
True
The program specification package identifies required programs and the relationship among each program, as well as the input, output, and database specifications. True False
True
The transfer rate of external hard drives usually is slower than that of internal hard drives. True False
True
Unusually high drive activity or a slower than normal Internet activity are signs that your computer or mobile device may be a zombie. True False
True
User IDs are also called user names, log on names, or sign in names. True False
True
Uses of RFID include tracking times of runners in a marathon and checking out library books. True False
True
When a user runs an application, its instructions transfer from a storage device to memory. True False
True
When a user runs an application, its instructions transfer from a storage device to memory. True False
True
When you purchase a computer or mobile device, it usually has an operating system and other tools installed. True False
True
With streaming media, you access the media content while it downloads. True or False
True
Without a data plan, you must use Wi-Fi or a wired connection to access the Internet. True False
True
You can use LinkedIn to follow companies to stay informed of their job opportunities. True False
True
You can use legal software to prepare a will. True False
True
You should not remove a portable flash memory storage while it is in use because the operating system may still be accessing the device. True False
True
You should use a database rather than a spreadsheet if you want to collect, reorganize and filter data, and/or create reports from the data. True False
True
Thumb drive is another term for a(n) ______. memory card USB flash drive SSD memory stick
USB flash drive
Which of the following is NOT true about caring for computers and mobile devices? Defragment your computer's hard drive if you notice a decline in performance. If the air vent is dirty, contact a trained professional to have it cleaned. Use compressed air to free the keyboard from dust and debris. Use a special screen cleaner; water is not sufficient.
Use a special screen cleaner; water is not sufficient.
Which of the following is NOT true about memory? Manufacturers state the size of memory by the number of bytes available for storage. Volatile memory is temporary. Users typically are referring to ROM when discussing memory. CMOS is an example of nonvolatile memory.
Users typically are referring to ROM when discussing memory.
VLOG stands for: Virtual Log Visual Log Video Blog Virtual Blog
Video Blog
With ______ voice mail, users can view message details, and in some cases read message contents without listening to them. visual text interpreted virtual
Visual
Skype is an example of ______ software. server plug-in browser VoIP
VoIP
What kind of software do you need to use an Internet phone? chat VoIP FTP Internet messaging
VoIP
Which Internet communication service can you use to speak to other users over the Internet? VoIP Email IM FTP
VoIP
The Internet is the world's largest ______. PAN LAN WAN MAN
WAN
On devices running Windows (Mobile Edition), the ______ app provides a centralized location for coupons, credit cards, loyalty cards, and memberships. Pay Store Wallet Credit
Wallet
Activity trackers and smartwatches are two types of ______ devices. GPS wearable streaming media plug-and-play
Wearable
You have taken a new job as a network administrator. Although you have been an IT professional within your organization for a number of years, this particular responsibility is a new one for you, so you have been studying network standards and protocols. You learn that all of the following are true about TCP/IP EXCEPT: When a computer sends data over the Internet, the data is grouped into a single packet. It defines how messages are routed from one end of a network to the other. It is short for Transmission Control Protocol/Internet Protocol. TCP/IP is the network standard for Internet communications.
When a computer sends data over the Internet, the data is grouped into a single packet.
Which of the following best defines throttling? When a network reduces upload and download speeds of high-data users at peak times When transmission media cannot connect to the network When an ISP cuts off Internet usage after a certain amount of data is used When a bottleneck occurs in a network's resources
When a network reduces upload and download speeds of high-data users at peak times
______ size is the number of bits the processor can interpret and execute at a given time. Power Byte Bus Word
Word
Compressed files sometimes are called ______ files. abridged packed concentrated zipped
Zipped
A byte's ______ is a unique number that identifies the location of a byte in memory. ID tag address position
address
Google Play is an example of a(n) ______. app store mobile operating system gaming device media player
app store
VoIP is a type of ______ output. audio video graphic text
audio
A gigabyte is approximately 1 ______ bytes. trillion million billion thousand
billion
A(n) ______ is the smallest unit of data a computer can process. bit character digit 0
bit
You work part-time at a computer equipment store in the optical disc section. A customer asks about DVD formats. You tell her that a(n) ______ is a more expensive DVD format that has higher capacity and better quality. DVD-RW DVD-ROM HD-DVD Blu-ray
blu-ray
A(n) ______ demands payment to stop an attack. script kiddie cracker hacker cyberextortionist
cyberextortionist
A(n) ______ database is a huge database used to analyze transactions. data warehouse relational distributed object-oriented
data warehouse
A(n) ______ backup copies only the files that have changed since the last full backup. incremental partial selective differential
differential
A graphics tablet also is called a(n) ______. digitizer illustrator illustration pad art input device
digitizer
You want to remove red-eye from photos you took with your digital camera. You should use photo ______ software. image editing management illustration
editing
Social ______ is defined as gaining unauthorized access to or obtaining confidential information by taking advantage of another person. hacking misdirection engineering manipulation
engineering
Which of the following is most likely to require use of a server, desktop, and industry-specific handheld computer, and is most likely to use spreadsheets, databases, and accounting software? mobile user home user power user enterprise user
enterprise user
A(n) ______ keyboard has a design that reduces the chance of RSIs. ergonomic expandable full-service compact
ergonomic
You have been studying processors. Your instructor has asked you to help prepare a lecture for introductory students learning about processors. You explain that when the ALU performs calculations on data, it is part of the ______ process in the machine cycle. executing fetching storing decoding
executing
A(n) ______ system captures and stores human knowledge and then imitates human reasoning and decision making. expert analytical decision anthropomorphic
expert
An iris recognition system uses technology to read patterns in the user's ______. eye fingerprints signature face
eye
You recently purchased a new laptop for home. You want to ensure that you are safe from malware. You should install a personal ______, a program that protects your computer from unauthorized access by blocking certain types of communications. shield back door firewall blocker
firewall
Most current displays are a type of ______ display. translucent fixed width large screen flat-panel
flat-panel
A result from a search engine search is called a(n) ______. smack tag pick hit
hit
A(n) ______ system is a set of hardware, software, data, people, and procedures that work together. information business proficiency communications
information
Data that a computer accepts and processes is called ______. digital facts information input bytes
input
A(n) ______ translates and executes one instruction at a time and converts it to machine language. executor compiler interpreter translator
interpreter
A(n) ______ is a handheld vertical lever, mounted to a base, that you move to control the actions in a game. joystick drive shaft control wand gamepad
joystick
You recently started working part-time in a retail store, and are learning about the reading devices your store uses. Your store uses a bar code reader to process items during checkout. What type of technology does the bar code reader use? light sources sonar radio frequency laser beams
laser beams
Malware is short for ______ software. malady malignant malevolent malicious
malicious
You are about to finish your degree in technology and are beginning your career search. You want to narrow down the fields in which you will look for a job. If you decide you want be involved in planning, research, development, evaluation, and integration of technology, you should look for jobs within the ______ area. operations strategy technical support management
management
CAM and MRP are examples of information systems used in ______. engineering sales manufacturing human resources
manufacturing
Net ______ is the concept of open Internet, accessible to all users, without interference from ISPs or other third-parties. expansion neutrality freedom fairness
neutrality
Each computer or device on a network is called a(n) ______. node transmitter module receiver
node
PIN stands for personal identification ______. network note name number
number
You are about to finish your degree in technology and are beginning your career search. You want to narrow down the fields in which you will look for a job. If you decide you want to administer a network, you should look for jobs within the ______ area. strategy management operations technical support
operations
Optical discs store items by using microscopic ______ (indentations) and ______ (flat areas). pits/lands holes/levels bumps/smooths dents/mesas
pits/lands
A(n) ______ is a program that extends the capability of a browser. aggregator magnifier plug-in power-up
plug-in
Badges, cards, smart cards, and keys are examples of _____ objects. wearable pocket carried possessed
possessed
CPU stands for central ______ unit. protection plasma packet processing
processing
An organization creates a disaster recovery plan. Which part would include return procedures (who can enter the facility, and what actions they are to perform)? recovery plan restoration plan emergency plan building plan
restoration plan
You use a POS terminal at work. Which of the following is the type of business at which you likely work? retail library research laboratory financial
retail
You are curious about cloud data privacy, so you do some research on the potential risks, as well as protection methods and regulations. FERPA regulates the confidentiality of ______. students' educational records criminal records user names and passwords financial transactions
students' educational records
Which of the following MIS reports usually includes tables and graphs? Summary Detailed General Exception
summary
Which of the following would not fit on a desk or your hand? game console supercomputer mobile computer PC
supercomputer
The motherboard is sometimes called a(n) ______ board. security system unit processor
system
Which of the following is responsible for designing and developing information systems? Systems programmer Program developer Systems analyst Cloud architect
systems analyst
A(n) ______ is a thin, lighter-weight mobile computer that has a touch screen. desktop notebook tablet PC
tablet
A(n) ______ drive is comparable to a cassette recorder. NAS tape SAM magnetic stripe
tape
You work in a medical lab that requires high-quality dye-sublimation printers. What type of printer do you use? laser plotter thermal impact
thermal
An RFID reader is also called a(n) ______. transponder transceiver receiver responder
transceiver
Transmission from an earth-based station to a satellite is a(n) ______. uplink signal path download satlink
uplink
______ information has meaning to the person who receives it. Verifiable Accurate Organized Useful
useful
A(n) ______ is a type of collaborative website that allows users to create, add, modify, or delete website content. bookmarking site macroblog portal wiki
wiki
Power users may work with a high-end desktop, sometimes called a(n) ______, designed to handle intense calculations and sophisticated graphics. workstation magnapower ultrabook supercomputer
workstation
What part of http://www.nps.gov/history/preserve-places.html is the host name? history preserve-places.html www.nps.gov http://
www.nps.gov