MIS Exam one.
The seeds of the Internet were planted in 1969 with _________, which connected computers at four universities in the western United States.
ARPANET
_________ software, which is made for the user, allows individuals to complete a variety of work and school-related tasks.
Application
A _________ is a copy of one or more files (or entire storage devices) that is made in case the originals become lost or damaged.
Backup
Software companies will often release a(n) _________ version to a limited audience that will test it on their systems. Programmers can then collect information from these users about any errors that were encountered.
Beta
_________ refers to the measurement of patterns or characteristics found in the human body.
Biometrics
In order to save space, some large, multi-user environments use thin units called _________ servers which can slide in and out of a rack that holds many of its companion servers.
Blade
Which of the following is a short-range wireless technology that can connect your smartphone with a wireless headset worn on the ear or the hands-free systems in some cars?
Bluetooth
As the main processor of a computer, the _________ is responsible for organizing and carrying out instructions in order to produce a desired output.
CPU
Suppose you are shopping for a computer and the description lists the following: Intel i7 3630QM3. Which component is being described here?
CPU
_________ refers to a form of high-speed memory that stores a small, frequently-used set of instructions and data. It is located inside modern CPUs.
Cache
With _________ storage services, your files can be stored online and accessed from any Internet-connected device.
Cloud
Which of the following technologies allows you to store your files and use various applications in an online account?
Cloud computing
Many users choose to _________ several files into one ZIP file for the sake of easy transport, especially when attaching them to an email message.
Compress
In the simplest terms, a(n) _________ is a device that accepts input, processes data, and can output or store the result of its actions.
Computer
Federal _________ law gives software creators a variety of rights and privileges over their creative work.
Copyright
_________ is the gathering of information from a large group of people.
Crowdsourcing
A _________ attack allows hackers to shut down or block access to websites and other network resources by overwhelming them with requests.
DDoS
The image quality (or print resolution) for printers is measured in:
DPI
Simply put, a computer _________ is an organized method for storing and retrieving information such as customers, employees, inventory, and sales records.
Database
Operating systems communicate with most hardware components using:
Device drivers
_________ means doing business online, such as when a consumer buys a product over the Web instead of going to a store to buy it.
E-commerce
Large organizations use _________ systems because they bring together many types of business functions into one software solution.
ERP
_________ are limited computers because they are placed inside devices which require specific computing functions.
Embedded systems
_________ is the process of scrambling your data or storage devices to make them unreadable by anyone who doesn't have the proper key.
Encryption
_________ keyboards, which are designed to be comfortable and tailored for the human body, have keys which are angled and a palm rest at the base in order to keep your wrists straight.
Ergonomic
A software-based _________ is dedicated to examining and blocking Internet traffic.
Firewall
_________ is software that is completely free to use without any specified time restrictions.
Freeware
The _________ is a video card's microprocessor.
GPU
Many new devices support the use of various _________, or finger movements, to accomplish various tasks.
Gestures
Which of the following refers to special eyeglasses from Google that provide the user with visual information directly in front of their right eye?
Glass
The newest connector for displays is _________, which carries both digital video and sound.
HDMI
The _________ language, which was used in the first web page ever created, is still in use today.
HTML
The _________ protocol is used to deliver requested web pages to a computer.
HTTP
The communication of vibration, motion, or physical resistance to a user is called
Haptics
The _________ is the primary storage device of a personal computer
Hard drive
The largest network in the world is known as the _________, which connects billions of people and organizations throughout the world.
Internet
A(n) _________ monitor contains a light source and a screen of special crystals that shift when electricity is applied to them.
LCD
A software _________ is a contract from the software creator that specifies the rules for using this software.
License
_________ is an open source operating system with hundreds of distributions that are available commercially or as a free download.
Linux
ollectively, all malicious programs are referred to as:
Malware
The ability to run multiple programs at the same time is known as:
Multiasking
Using a wireless technology known as _________, many smartphones can now be tapped on special payment devices to complete your purchase at select stores.
NFC
What is the name of the technology that can translate a scanned document image into text that can be edited and formatted?
OCR
_________, such as Windows or Mac OS, exist primarily to help the computer run and manage its resources.
Operating systems
Which of the following refers to the processed results that a computer sends out to you?
Output
Printer speed is measured in:
PPM
Data moves through networks in structures known as _________, which are pieces of a message broken down into small units by the sending device and reassembled by the receiving device.
Packets
A monitor's screen is divided up into millions of tiny dots, called:
Pixels
Which of the following refers to the ability of a computer to perform a variety of actions based on instructions from the user or a program?
Processing
Whenever you actively work on something using your computer, that work is temporarily stored in:
RAM
_________ are sophisticated services that store the URL of millions of web pages and most of the content on those pages.
Search engines
A network _________ is a powerful computer with special software and equipment that enables it to function as the primary computer in a network.
Server
_________ is a form of hacking that focuses on deceiving individuals into giving away the information that the thief needs.
Social engineering
_________ is the ability of a computer to hold or remember the information it processes.
Storage
_________ software refers to any software that is created for the operation, maintenance, and security of a computer.
System
The protocols that are at the heart of Internet communication are known as:
TCP/IP
Web pages have a standard addressing system known as a(n) _________, which allows them to be located on the Internet.
URL
The most popular plug on a computer is the small, rectangular _________ port, which is used to connect almost all of today's external devices.
USB
Because it increases the security of a network connection, a _________ is often required for users who wish to access a company's private network over an Internet connection.
VPN
A(n) _________ is a special environment that allows you to run an operating system on top of another operating system.
Virtual machine
_________ allows humans to experience immersive, realistic environments that are simulated by computers, usually with the aid of special headsets.
Virtual reality
_________, which can connect to the telephone network, translates analog voice signals into digital data and uses the Internet to transport the data.
VolP
A _________ license allows companies to install the software on multiple (or all) the machines that they own.
Volume
_________ technology refers to computing devices that are worn on various parts of the body.
Wearable
Many mobile devices contain a(n) _________ and gyroscope that can sense even the smallest movements.
accelerometer
A wireless _________ is the device that all nodes connect to in order communicate wirelessly.
access point
Mobile apps known as news _________ collect articles from a variety of sources and present them to you in a magazine-style format.
aggregators
In _________ reality, the real-world is supplemented with computer-generated information.
augmented
The security principle known as _________ requires that individuals must confirm their identity.
authentication
The connections that carry most of the Internet's traffic are referred to as:
backbones
Any email address placed in the _________ will be invisible to the recipients of your message.
bcc
The most fundamental unit of computing is the _________, which is typically represented as a 1 or 0 value.
bit
A(n) _________ is just another name for an error in a program.
bug
The browser _________, or temporary Internet files, contains every single page, image, and video for all the web pages you have recently retrieved.
cache
the set of instructions that directs the computer to perform a variety of tasks is known as a(n):
computer program
The _________ of a monitor measures how close the monitor can get to the brightest white and the darkest black.
contrast ratio
_________ are small data files that are created by websites in order to remember users and their preferences the next time they visit the site.
cookies
_________ is the discovery of new patterns or relationships between data.
data mining
_________ is the process of safeguarding against erroneous or duplicate data by checking what is entered and, in some cases, placing restrictions on how the data is entered.
data validation
A _________, such as apple.com and whitehouse.gov, uniquely identifies a site and a brand on the Web.
domain name
The ability to automatically print to both sides of a piece of paper is known as:
duplexing
A _________ cable consists of a thin strand of glass that transmits pulsating beams of light rather than electric current.
fiber-optic
A(n) _________ examines and blocks Internet traffic in order to protect your private network.
firewall
Many companies and specialty websites offer _________, or discussion boards, where individuals can ask questions and reply to each other.
forums
Twitter popularized a system that uses the _________ symbol to mark keywords or topics in a message.
hashtag
Web browsers keep a list of every website you have visited in an area known as the:
history
_________ is the ability of each organization's information system to work with the other, sharing both data and services.
interoperability
Tumblr and Twitter and both examples of _________ services, where users share brief thoughts, links, and multimedia
microblogging
A(n) _________ allows users to communicate and share information between computers.
network
In the model known as _________, advertisers pay for their ads only when a website visitor clicks on the ad.
pay-per-click
_________ involves luring individuals into entering personal information into a website controlled by the hacker.
phishing
Facial _________ is a biometric technology that looks for unique measurements in an individual's face.
recognition
The _________ of a monitor refers to the number of pixels that it can display on the screen.
resolution
A _________ looks at each packet's header to determine where the packet should go and then determines the best route for the packet to take toward its destination.
router
A _________ is a type of malware that is attached to a host file and has the ability to replicate, or copy, itself.
virus
A(n) _________ is a collaborative information site that relies on the Internet community to both create and edit content.
wiki
A _________ is a fully-contained program that self-replicates and spreads through computers and networks.
worm
_________ printers are unique in that they can create a physical object made of various materials, such as a plastic toy.
3D
_________ tags, such as those present in many automated toll collection systems, can be scanned from longer distances and at higher speeds than barcodes.
?