Into to computers 5-8

¡Supera tus tareas y exámenes ahora con Quizwiz!

The dotcom bubble occurred between the years 2008 and 2010

false

. ​________ computers, such as UNIVAC, can be characterized by their use of vacuum tubes to store individual bits of data.

first-generation

​Which of the following descriptions best matches that of computer science degree?

focuses on computer architecture and how to program computers to make them work effectively and efficiently

This dividing process is referred to as ___________.

formatting

​Most computer historians agree that computers have evolved through _______ distinct generations.

four

A proprietary model called the __________ represents the position of a product during its life cycle of publicity

gartner hype cycle

In economics, _________ are things that can be used or consumed, whereas _________ are intangible actions performed for a consumer.

goods, services

The success of an underwater telegraph cable depended on the discovery of __________, a rubber-like substance.

gutta-percha

SMTP (Simple Mail Transfer Protocol)

handles outgoing mail

Antivirus software can use techniques called__________ to detect malware by analyzing the characteristics and behavior of suspicious files.

heuristic analysis

​The ____________ was designed to tabulate the 1890 census and used cards with designated areas representing data fields.

hollerith tabulating machine

Owners with ___________ devices must ___________ the device to obtain apps from third-party sources.

iOS, jailbrake

​_______________ are two of the world's largest exporters of ICT services.

india and ireland

They are typically downloaded and ________________ from an app store or Web sites.

installed

All of the creations that materialize from the mind or intellect are considered

intellectual property

Synchronous communication

interchanges happen in real time while all parties are online; these communications have the advantage of immediacy

​1996 was the year that cable _______ service made its debut.

internet

Which of the following job descriptions best matches that of a systems analyst?

investigates the requirements of a business or an organization, its employees, and its customers in order to plan and implement new or improved computer services

Copyright

is a form of legal protection that grants the author of an original work an exclusive right to copy, distribute, and sell

VoIP

is a technology that uses a broadband Internet connection instead of PSTN land lines to place voice and video calls

trademark

is any word, name, symbol, or design used in commerce to identify and distinguish the goods of one company from those of another

copyleft

is designed to make a work freely available for distribution and modification under the condition that all derivative works use the same license

Geotagging

is the process of adding location data to photos, Web sites, HTML documents, audio files, blog posts, and text messages

The operating system _______________ remains in RAM while a device is in operation and manages the device's resources.

kernel

When an operating system fails to correctly track the allocation of RAM space to applications, a memory _____________ may produce "program not responding" error messages.

leak

A(n) ____________ calculator is a device that assists in the process of numeric calculations but requires the human operator to keep track of the algorithm.

manual

An abacus is an example of a(n) _________ calculator.

manual

Asynchronous communication

messages are held until the recipient is ready to view them; it offers convenience because information can be gathered whenever you want it

derivative work

modifies a copyrighted work but does not substantially change its content or purpose; translations and adaptations are examples of derivative work

___________ states that every two years the number of transistors in an integrated circuit will double without raising its cost.

moore's law

Transmitting data in a telegraph system used the _______ alphabet, a binary encoding system based on dots and dashes.

morse code

___________________ supports a division of labor among several processing units.

multiprocessing

Most operating systems have ___________ capabilities that allow two or more processes to run simultaneously.

multitasking

__________________ capabilities allow an operating system to run multiple simultaneous operations for a single program.

multithreading

​Which of the following options offer selfstudy training to careerminded individuals who might not have the time or means to complete a traditional degree program?

nanodegree

A(n) ____________ administrator plans, installs, and maintains one or more local area networks and may also manage cloud resources.

network

​Many employment contracts contain a(n) ______________ designed to prevent employees from divulging proprietary information to competitors or opening competing businesses.

non-complete clause

​____________ reduces the cost of goods and services by using workers and manufacturing facilities in countries with inexpensive labor.

offshoring

A person's presence on a social media service is referred to as an

online identity

Social media

online services that facilitate communication and interaction among people who want to share information about their lives

Social networking can be traced back to

online services, such as CompuServe, Prodigy, and America Online (AOL), that were not part of the Internet

When you want to change margins, headers, and footers you can use __________ layout tools.

page

To change the spacing between lines or the alignment of text, you can use tools to adjust ___________ style.

paragraph

​If you feel more secure with a totally random and unique password for each of your logins, then a(n) _______________ is an excellent option.

password manager

A file's location is defined by a file ____________ , which includes the storage device, folder(s), file name, and extension.

path

Computer systems such as the Mark8 and the MITS Altair are examples of early ______ computers.​

personal

The way that data is actually stored is referred to as the ____________ storage model.

physical

PC software that can be carried on a USB flash drive and used without installation is called ________________ software.

portable

____________ software supplies tools for creating a series of electronic slides that can be shown on a computer screen or projector.

presentation

Which of the following options is a useful format for your resume?

print, email and HTML

Word ___________________ software assists you with composing, editing, designing, printing, and electronically publishing documents.

processing

From the perspective of a business that creates and sells a technology product, the ____________maps the expected profitability of a product from its inception to its demise.

product life cycle

In the context of economics, ___________ is a measurement of the amount of output that is produced per unit of input.

productivity

Office suites are sometimes referred to as ___________ software because they offer features that really help get work done.

productivity

A computer _________ is any person whose primary occupation involves the design, configuration, analysis, development, modification, testing, or security of computer hardware or software.

professional

A computer ________ designs, codes, and tests computer programs. In addition, they may modify existing programs to meet new requirements or eliminate bugs.

programmer

With respect to organizations, confidentiality means protecting __________ information about company finances, procedures, products, and research that competitors would find valuable.

proprietary

The U.S. Department of Homeland Security identifies six national security functions supplied by the ICT sector. Which one of the following is not one of them?

provide disruptive technologies

Geosocial networking

provides a platform for users to carry out interactions based on their current locations

Social Media Honeycomb

provides a visual model for classifying and comparing various social media services

Which of the following would not be considered a common carrier?

radio

​Guglielmo Marconi is credited as the person who invented the ___________, a device that sends and receives sound as electromagnetic waves.

radio

​The years between 1920 and 1960 are considered the Golden Age of ________.

radio

Public domain

refers to the status of works with expired copyrights or whose creators have forfeited their copyright; the works of Shakespeare are in the public domain

When two sets of records are _____________ , database software allows you to access data from both tables at the same time.

related

transformative work

repackages a copyrighted work to add new meaning or produce a work that is used for a purpose different from the original work; parodies are considered transformative

These rules typically do not allow you to use certain characters or ___________ words in a file name.

reserved

A social networking service

revolves around personal profiles and interconnections among subscribers who want to share information about themselves

The top-level list of a device is referred to as the ____________ directory, which can be subdivided into several smaller lists called subdirectories that are depicted as ____________.

root, folders

Highlevel programming languages were available for use on ________generation computers

second

After a disk is divided into tracks it is further divided into ____________.

sectors

With the proliferation of computer viruses and worms, computer __________ has become a hot niche for IT workers

security

RSS reader or blog aggregator

sets up a "feed" that monitors your favorite blogs, collects the latest posts, and displays them

Local applications for PC's are installed using a(n) ______________ program that copies files, checks resources, and updates the Windows ________________.

setup, Registry

An emerging subset of geosocial networking called

social discovery, uses geolocation to meet with people who are nearby and have similar interests

Trojans depend on ________ to spread.

social engineering

The lines connecting nodes are referred to as

sociogram edges

The circles in these diagrams are referred to as

sociogram nodes

sociologists use social network diagrams called

sociograms to depict connections between people

Most economists regard goods and services as a continuum, with intangible goods, such as __________, in the middle of the continuum.

software

Open _____________ software may be sold or distributed free of charge, but the distribution must include the source code.

source

​Participants in open _________ community projects get experience and make connections with other professionals that can be valuable resources during a job hunt

source

________________ software is like a smart piece of paper that automatically adds up the columns of numbers you write on it.

spreadsheet

Software pricing models include one-time purchase,___________________, trial, and freemium.

subscription

An operating system uses a file _______________ to track the physical location of files.

system

Both _________software and application software are essential for accomplishing tasks with a digital device.

system

Data is stored in ___________, which form records.

tables

Based on existing laws governing international conflict, the ______________ sets out rules for conducting and responding to cyberwarfare.

tallinn manual

An information _________ degree programs focus on computer equipment and software used by businesses.

technology

A(n) _______________ uses available technology to work from home or an offsite location

telecommuter

__________ refers to transmitting text or symbolic information over long distances without the use of a living carrier, such as a courier.

telegraphy

A(n) ___________ is a device that transmits human voices over a distance using cables or airborne signals

telephone

​The 1930s can be characterized as a phase of innovation for ________, a technology designed to send moving images over a distance.

television

​Which of the following is not an example of an Information Technology Law?

the espionage act of 1917

Geocoding

the process of determining the coordinates of a specific place, such as the street address or the longitude and latitude of a location

social media profile

the set of information provided to friends, contacts, and the public

. ​It was not until the ______generation of computers that portable operating systems, such as CP/M and UNIX, provided programmers with similar operating system commands across hardware platforms.

third

_______generation computers became possible by the development of integrated circuits

third

Before a computer stores data on a disk, CD, or DVD, it creates the equivalent of electronic storage bins by dividing the disk into _____________.

tracks

A key feature of the Apple Lisa was its use of _______________.​

transistors

Secondgeneration computers used ________ instead of vacuum tubes.​

transistors

To remove software that has been installed on a PC, Windows supplies a(n) _________________ utility.

uninstalled

A software_________ or patch is a small section of program code designed to correct problems and address security vulnerabilities.

update

New versions of software are called__________ and are indicated by version numbers such as 1.0 and 2.0.

upgrades

The AtanasoffBerry Computer was the first computing device to use ________ instead of mechanical switches as processing circuitry.

vacuum tubes

A single device can run more than one operating system as a(n) ____________ machine.

virtual

A computer _________ is a set of self-replicating program instructions that surreptitiously attaches itself to a legitimate executable file on a host device.

virus

​A key characteristic of ___________ is their ability to lurk in a device for days or months, quietly replicating themselves.

viruses

​Early computers that held both programs and data in memory became known as ________ architecture.

von Neumann

____________ is the disclosure by an employee of confidential information that relates to some danger, fraud, or other illegal or unethical conduct connected with the workplace, be it of the employer or of fellow employees.

whistleblowing

Spam accounts for approximately ______ of all email.

​70%

The current method of encrypting communication between a client and a server depends on a security protocol called _______.

​TLS

​A social engineering scam called ___________ is when a victim is promised a large sum of money in exchange for a bank account number from which a small advance fee is withdrawn.

​advance fee fraud

​A cryptographic __________ is a procedure for encryption or decryption.

​algorithm

A(n) __________ is a device or software that is designed to block unauthorized access while allowing authorized communications.

​firewall

​A virus __________ usually arrives as an email message that contains warnings about a supposedly new virus.

​hoax

​A(n) ________________ takes place when an unauthorized person gains access to a digital device by using an Internet connection and exploiting vulnerabilities in hardware or software.

​online intrusion

​A(n) __________ pings a packet of data to a port in order to see if that port is open or not.

​port scan

​​A ______________ exploit usually begins with a virus warning and an offer to disinfect the infected device.

​rogue antivirus

Executable files for Macs have a(n)_______ extension.

.app

The executable file for PC software has a(n)________ extension.

.exe

​​A(n) ______________ attack exploits previously unknown vulnerabilities in software applications, hardware, and operating system program code.

.zero-day​

The first telephone was invented and patented by Alexander Graham Bell in ________.

1876

​Telegraphy remained the major technology for intercontinental communication well into the ________.

1950s

​Companies such as IBM and Sperry Rand launched the computer industry when they brought the first mainframes to market in the ________.

1960s

Apple released the first Apple Macintosh computer in what year? ___________

1984

The Motorola DynaTAC 8000X was brought to market in what year? ___________

1984

Worldwide, the ICT industry directly employs about _____ of the total workforce in jobs such as computer manufacturing, programming, and data security.

4%

What generation of cell phone technology was the first to offer true mobile broadband?

4G

​There are various encryption methods, but __________ is the encryption standard currently used worldwide.

AES

​__________ changes an originating address or a destination address to redirect the flow of data between two parties.

Address spoofing

​_____________ software shields certain applications against behaviors commonly exhibited by intrusions.

Anti-exploit

​__________ is the process of modifying an executable file or data stream by adding additional commands

Code injection

_____________ software is usually sold in retail stores or at Web sites and may have options for site licenses as well as single user licenses.

Commercial

Software for Macs is distributed as _____________ packages that are dragged to the Applications folder to complete the installation.

DMG

__________________ is also available free of charge, but is limited in some way until you pay for it.

Demoware

_________________ operating systems--such as Windows, Chrome OS and OS, X-- accommodate one user at a time, are capable of multitasking, and include a graphical user interface designed for keyboard and mouse input.

Desktop

​________ was designed to calculate trajectory tables for the U.S. Army.

ENIAC

Software licenses, referred to by the acronym __________, can be divided into two main categories: public __________ and proprietary.

EULA, domain

To establish a(n) ________, hackers set up an unsecured Wi-Fi hotspot complete with an Internet connection.

Evil Twin

Windows File Explorer and the OS X ____________ are examples of file management utilities provided by operating systems.

Finder

_________ is the monetary value of all the goods and services produced by a nation's workforce on an annual basis.

GDP

Which of the following would be considered a thirdgeneration computer?

IBM 360

______ certification, offered by Certiport, covers basic computing knowledge and skills.

IC3

The __________ is made up of businesses that focus on digital equipment, software, communications technologies, and related services.​

ICT industry

__________ operating systems, such as iOS and Android, are designed for smartphones and tablet computers.

Mobile

Doppelgangers

Online doppelgangers are two or more online personas with the same name or username; the personas of doppelgangers are sometimes mistaken for each other, and their reputations may become intertwined

​What is the term used to describe unwanted software that installs along with the application software that you originally downloaded and installed?

PUP

Operating systems manage resources by monitoring processor cycles, allocating ______________ space to programs, tracking stored files, and supervising data exchanges with peripheral devices.

RAM

​A ___________ is malware that arrives in a trojan disguised as legitimate software and sets up a secret communication link to a hacker.

RAT

​__________ is the term that describes devices that automate many industrial tasks by receiving digital commands and converting them into real-world actions such as shutting down a power grid or opening a valve in a fuel pipeline

SCADA

____________ is a service offered by Google that checks URLs against a list of suspicious Web site URLs.

Safe Browsing

Which of the following i would be considered a mechanical calculator?

Schikard's calculator, pascaline, de colmar's arithmometer

_________ operating systems, such as UNIX and Linux, are designed for hosting distributed networks.

Server

________________ is also distributed free of charge but uses the honor system to collect payment.

Shareware

​What is the process called when an app from a source other than an official app store is installed on a device?

Side-loading

Unit Contents

Social Networking Content Communities Blogs and More Online Communication Social Media Values

​______________ is a deceptive practice that exploits human psychology by inducing victims to interact with a digital device in a way that is not in their best interest.

Social engineering

​If you use a password manager, what do you as the user need to remember?

The master password.

​Similar to a worm, a _________ is not designed to spread itself to other devices.

Trojan

​_____ was the first commercially successful computer.

UNIVAC

When the PC version of the spreadsheet program __________ became available, the IBM PC quickly became the topselling personal computer.​

VisiCalc

___________ apps run in a browser and require no installation.

Web

Because it is so easy to experiment with different numbers, this type of software is particularly useful for __________ analysis.

What-if

wiki

a collaborative Web application that provides tools that enable contributors to post, read, and modify content

binary adjacency matrix

a set of cells containing a 0 if there is no connection between two people and a 1 if there is a connection

When antivirus software detects malware, which of the following would not be a course of action you could take?

a. ​Conduct a heuristic analysis.

​A calculation is based on a(n) ___________—the stepbystep process by which numbers are manipulated.

algorithm

Fair use

allows for the limited use of copyrighted material without obtaining permission from the copyright holder

Babbage's __________ was an allpurpose computing device

analytical engine

The best defense against malware is _____________.

antivirus software

sockpuppets

any online identity created and used for purposes of deception—is widespread

Thomas de Colmar's _________ became the first massproduced mechanical calculator

arithmometer

If you are hired as an entry level programmer, your job title would be a(n) ___________ programmer.

associate

A type of attack that uses password-cracking software to generate every possible combination of letters, numerals, and symbols.

brute force

​A stock market _________ refers to a sharp rise in stock values that is later followed by a sudden decline.

bubble

Operating systems also manage ____________ that collect and hold data from peripheral devices until a device is ready to accept it.

buffers

Public communications

can be accessed by individuals unknown to the person who created a message; the word posting is associated with this type of communication because it is similar to posting a billboard, sign, or poster

The protocols POP3 (Post Office Protocol version 3) and IMAP

can be used to manage incoming mail

​__________ goods are raw materials, tools, and machinery used by businesses to make consumer good

capital

A(n) __________ is a device that uses a lowpower radio transmitter to carry out twoway voice communications.

cellular telephone

__________ are awarded based on successful completion of an exam that verifies your level of knowledge about a particular technology or subject.

certificates

Chrome OS is considered a thin ____________ because it depends substantially on processing supplied by a remote computer.

client

Many computers work with a group of sectors, called a(n) ______________, to increase the efficiency of file storage operations.

cluster

. ​A(n) _________ is a set of guidelines designed to help professionals thread their way through a sometimes tangled web of ethical on-the-job decisions.

code of ethics

In Windows, storage devices are identified by a drive letter, followed by a(n) _______________.

colon

​________ was an electronic device designed to decode messages that were being sent between the german high command and their field commanders in WWII

colossus

A(n) ___________ is any person or company that transports goods, passengers, or electronic signals over regular routes at set rates.

common carrier

Private communications

communications for which you specify one or more recipients; text messaging is a popular type of private communication

. ​___________ is the obligation not to disclose willingly any information that should be kept private.

confidentiality

the message header

contains the sender and recipient addresses, date, and subject line

The information industry has three major facets: _________, computers, and telecommunications.​

content

The rules that specify valid file names are called file-naming _________________.

conventions

When individuals contribute computer time, expertise, opinions, or money to a defined project, they are participating in

crowdsourcing

The Stuxnet virus that disabled Iranian nuclear centrifuges is an example of _____________

cyberwarfare

​_____________ is the use of ICT technology to carry out politically motivated attacks designed to infiltrate, sabotage, or damage an opponent's information systems and defensive capabilities.

cyberwarfare

A(n) ________ administrator analyzes a company's data to determine the most effective way to collect and store it.

database

__________ software helps you store, find, organize, update, and report information located in one or more tables.

database

The Harvard Mark I was digital but used _________ rather than binary representation

decimal

Impersonation

deliberately using the name or avatar of another person without his or her consent and with the intent to harm, defraud, or intimidate is called impersonation

Which of the following information technology laws makes it illegal to circumvent copyprotection technologies, such as those used to prevent unauthorized copying of software CDs, music CDs, and movie DVDs?

digital millennium copyright act

Every storage device has a(n) _________ containing a list of files stored on the device.

directory

________ technology displaces an existing business process, market, industry, or product.

disruptive

At the heart of a typical email system is an

email server— a computer that essentially acts as a central post office for a group of people

The computers and software that provide email services form an

email system

The term professional _______ refers to onthejob choices and actions that reflect a person's values.

ethics

​Telephone networks are based on a hierarchy of interconnected stars. At the center of the star is a telephone ___________ that manages connections between callers.

exchange

One-way edges

exist when a relationship is not reciprocal, such as a Twitter follower who does not follow back

Two-way edges

exist when two people consider each other to be friends


Conjuntos de estudio relacionados

Differential and Integral Calculus Terms and Elements - ME Boards Exam

View Set

Midterm Exam for Abnormal Psychology

View Set

Types of Life Insurance Policies QUIZ

View Set

Digital Media IA Review Certification Exam CP

View Set

Klasa 6 - unit 3 - Can you bring me my phone?

View Set