ITEC Final Exam

¡Supera tus tareas y exámenes ahora con Quizwiz!

Quantum

A _______ computer can represent data in states beyond the two bits (0's and 1's) of today.

Modem

A _________ is a device that can convert digital information from a computer into analog sound waves that can be transmitted over the phone lines.

Worm

A _________ is a fully-contained program that self-replicates and spreads through computers and networks.

Trojan Horse

A _________ is a program that disguises itself as an interesting, useful, or desirable program in order to gain access to your system.

Volume

A _________ license allows companies to install the software on multiple (or all) the machines that they own.

Router

A _________ looks at each packet's header to determine where the packet should go and then determines the best route for the packet to take toward its destination.

Server

A network _________ is a powerful computer with special software and equipment that enables it to function as the primary computer in a network.

License

A software _________ is a contract from the software creator that specifies the rules for using this software

Firewall

A software-based _________ is dedicated to examining and blocking Internet traffic.

Access Point

A wireless _________ is the device that all nodes connect to in order communicate wirelessly.

Node

A(n) _________ is a connection point in a network.

MIS

A(n) _________ is a set of software tools that enables managers to gather, organize, and evaluate information.

Virtual Machine

A(n) _________ is a special environment that allows you to run an operating system on top of another operating system.

Bug

A(n) _________ is just another name for an error in a program.

Widget

A(n) _________ on Android provides automatically-updating information without the need to open an app.

CPU

As the main processor of a computer, the _________ is responsible for organizing and carrying out instructions in order to produce a desired output.

VPN

Because it increases the security of a network connection, a _________ is often required for users who wish to access a company's private network over an Internet connection.

Plug-Ins

Browser ________, such as Adobe Flash Player, are separate programs that allow your web browser to play several types of multimedia content.

Collaboration

Cloud _________ services allow individuals to view, edit, and share documents, even seeing each other's changes in real time.

Malware

Collectively, all malicious programs are referred to as:

Packets

Data moves though networks in structures known as ________, which are pieces of a message broken down into small units by the sending device and reassembled by the receiving device.

ISP

Every type of Internet service requires a connection and monthly payment to a(n):

Bandwidth

For modern networks, _________ is measured in either megabits per second (Mbps) or gigabits per second (Gbps).

Cleanup

If you want to clear an operating system's temporary files for storage, performance, or privacy reasons, you should run a disk _________ utility.

Computer

In the simplest terms, a(n) _________ is a device that accepts input, processes data, and can output or store the result of its actions.

Piracy

In the world of computing, _______ means acquiring or exchanging copies of protected digital creations without payment or permission from their creator.

DVR's

Many individuals are using TV tuners as _________ to record television shows for future playback.

Accelerometer

Many mobile devices contain a(n) _________ and gyroscope that can sense even the smallest movements.

Compress

Many users choose to _________ several files into one ZIP file for the sake of easy transport, especially when attaching them to an email message

Cyberterrosim

No form of hacking is as dangerous as ________, which is an attack against a country that seeks to create large-scale chaos and damage to a country's infrastructure.

Suite

Often times, several office programs are bundled as a unit known as an office:

Device Drivers

Operating systems communicate with most hardware components using:

Defragmentation

Operating systems typically contain a disk _________ or optimization utility, which will reorganize files and fragments to place related ones nearer to each other.

Formatting

Preparing a storage device for use by an operating system is known as:

Bitmap

Programs that are based on _________ graphics record your images on a pixel by pixel basis and will typically save files in formats such as JPG, GIF, and PNG.

Vector

Programs that are based on _________ graphics rely on mathematics to generate and manipulate a variety of shapes.

Beta

Software companies will often release a(n) _________ version to a limited audience that will test it on their systems. Programmers can then collect information from these users about any errors that were encountered.

CRM

Some ERP systems integrate _________ capabilities that allow sales departments to manage call centers, support customers, and keep track of sales commissions.

GPU

The _________ is a video card's microprocessor.

Duplexing

The ability to automatically print to both sides of a piece of paper is known as:

Hands-free Computing

The ability to communicate with a device without using your hands is known as _________ computing.

Desktop

The computer that has been traditionally found on the desks in many offices and homes is the _________ computer.

Backbones

The connections that carry most of the Internet's traffic are referred to as:

P2P

The most popular method for file transfer today is known as _________ file sharing, which uses a distributed network of individual users instead of a central server.

World Wide Web

The pages in the _________ can contain a seemingly unlimited variety of information, from news and sports to updates from your family and social circle.

Computer Program

The set of instructions that directs the computer to perform a variety of tasks is known as a(n):

Broadband

The term _________ is used to describe any digital data connection that can transmit information faster than standard dial-up by using a wider band of frequencies.

Software

The term _________ refers to one or more computer programs that are packaged together for a unified purpose.

Shareware

To keep using _________ after the trial period, you must purchase a full version or a code that can be entered into the software.

NFC

Using a wireless technology known as ________, many smartphones can now be tapped on special payment devices to complete your purchase at select stores.

1,000 megabytes

What is the approximate value of a Gigabyte?

Offshoring

When companies outsource functions to another country it is referred to as:

Byte

When it comes to describing a computer's storage or memory we commonly use the unit known as the _________, which is simply a collection of eight bits.

UPS

When the power fails completely, the battery in a(n) _________ contains enough power to run a computer system for a given amount of time

Ports

When you look at the back of your system unit, you will likely find a variety of plugs known as _________.

RAM

Whenever you actively work on something using your computer, that work is temporarily stored in:

Personal Computer

Which category of computer is generally meant to be used by only one person at a time?

Roku

Which of the following is a streaming player for your TV that can use your home's wireless network to connect with online services such as Netflix and Pandora?

Adobe InDesign

Which of the following is an example of desktop publishing software?

Glass

Which of the following refers to special eyeglasses from Google that provide the user with visual information directly in front of their right eye?

Processing

Which of the following refers to the ability of a computer to perform a variety of actions based on instructions from the user or a program?

Cloud Computing

Which of the following technologies allows you to store your files and use various applications in an online account?

Smart

Which types of TVs allow you to connect to a variety of online services such as Netflix, Amazon, and Pandora?

All-In-One Computers

Which types of computers have all of the hardware integrated with the monitor?

Footprints

You and your devices usually leave digital ______, which is a trail of your data, activity, and even the locations where devices are used.

Hyperlinks

You will often find _________ on a web document that, when clicked, act as connectors to another document on the World Wide Web.

Intellectual Property

______, which are products of the mind, can be quite valuable even though they may not always take on a physical form.

Whistleblowing

_______ is the act of alerting the public about harmful activities that are being hidden by an organization.

Thermal

________ printers, which are often used to create receipts and labels, apply heat to special paper in order to turn select areas black.

Unix

________, which dates back to 1969, runs many of the world's most powerful servers.

Virtual Reality

_________ allows humans to experience immersive, realistic environments that are simulated by computers, usually with the aid of special headsets.

Email

_________ allows messages to be sent to electronic mailboxes in an instant.

Chromebooks

_________ are lightweight laptops that run Google's Chrome operating system.

Embedded Systems

_________ are limited computers because they are placed inside devices which require specific computing functions.

Search Engine

_________ are sophisticated services that store the URL of millions of web pages and most of the content on those pages.

Twisted Pair

_________ cable normally consists of four pairs of wires that are twisted around each other.

Ultraportable

_________ computers are thin, lightweight laptops that possess strong processing power.

Mobile

_________ devices are lightweight, handheld computers that offer a variety of software and communication services for mobile users.

Phishing

_________ involves luring individuals into entering personal information into a website controlled by the hacker.

Social Engineering

_________ is a form of hacking that focuses on deceiving individuals into giving away the information that the thief needs.

Pretexting

_________ is gaining someone's trust by pretending you are someone else.

Interoperability

_________ is the ability of each organization's information system to work with the other, sharing both data and services.

Scalability

_________ is the capacity to provide increasing amounts of computing power, storage, and/or software.

Crowdsourcing

_________ is the gathering of information from a large group of people.

Dot Matrix

_________ printers create output by striking an inked ribbon against paper using metal pins, making them useful for printing on pressure-sensitive forms.

CAD

_________ software aids architects, engineers, and many others who need to create a digital model of an object.

ERP

_________ software aids architects, engineers, and many others who need to create a digital model of an object.

Project Management

_________ software allows managers to create and track a sophisticated plan in order to achieve a variety of goals.

Vertical Market

_________ software is created for a specific industry such as health care or insurance.

System

_________ software refers to any software that is created for the operation, maintenance, and security of a computer.

RFID

_________ tags, such as those present in many automated toll collection systems, can be scanned from longer distances and at higher speeds than barcodes.


Conjuntos de estudio relacionados

FIN 357 final ch. 16 Financial Leverage & Capital Structure

View Set

Chapter 8 - Understanding System Software

View Set

Ch, 31 Infectious Respiratory Problems

View Set

Custom: Custom: Practice 7(Mental Health)

View Set

ATI Standard Quiz- Medical surgical gastrointestinal

View Set

Ch. 5 Anatomy Test Questions: True and False and MC

View Set