BCIS Final
Question 11: The combination of hardware architecture and software design that allows applications to run on your computer is referred to as the
computing platform
Question 22 Chapter 5 explains that for professional publications, desktop publishing software is preferred over word processing software because of its advanced _____ capabilities.
control of text flow around objects
Question 3: Data travels between the components on the motherboard to the CPU and memory over wires called
data buses
Question 23: In Chapter 3, what reason is given for why OLED may replace LCD in the screens of mobile devices?
doesn't require backlighting, making it more energy efficient
Question 21 Chapter 7 lists several reasons why a DoS attack may be launched, including all of the following except
draw attention to cause, embarras company/gov, make demands of company.
Question 8: These are the small programs the OS uses to communicate with devices connected to the computer.
drivers
Question 12: When you use a touch-enabled device, your finger or stylus transmits a(n) _____ signal that is sent to the device's touch processor for interpretation.
electrical signal
Question 24 Macro viruses are viruses that are
embedded in document
Question 11 In a database table, columns are called _____ and rows are called _____.
fields, records
Question 38: Solid state drives (SSDs) use _____ to store information.
flash memory
Question 7: A CPU's clock speed is usually measured in
gigahertz
Question 16 Chapter 4 mentions that Mac computers have been popular with _____ because of their hardware design.
graphic artists
Question 20 Software programs for creating, editing, and manipulating drawings, photos, clip art, and scanned images are called _____ software.
graphics software
Question 3 White hats and black hats are types of
hackers
Question 35 Twitter users use _____ as keywords that can be searched.
hashtags
Question 32 The goal of Google's Android@Home project is to control _____ via an Android device.
household objects
Question 39 When shopping or otherwise doing business online, look for _____ in front of the URL to be sure that the site is secure.
https
Question 13 Apple devices contain three personal information management applications. Which of the following is not one of them?
iCal, Contacts, Mail
Question 29 What is the name of Apple's cloud based operating system?
iCloud
Question 26 Apple devices are packaged with the _____ suite of multimedia applications.
iLife
Question 25 What is the name of Apple's mobile operating system?
iOS
Question 3 What is the name of Apple's productivity suite?
iWork
Question 6: What is the name for the process in which a CPU retrieves, decodes, executes, and stores an instruction?
instruction cycle
Question 26: Which of these devices acts as both an input device and an output device?
interactive whiteboard
Question 31 Chapter 6 explains that blogs are basically _____ posted on a website with the most recent entry at the top of the page.
journals
Question 5: This part of the OS is loaded into RAM when the computer starts and stays there until the computer is powered off.
kernel
Question 37 This type of spyware is sometimes promoted to businesses as a security tool and to parents as a way to monitor their children's online activities.
keystroke loggers
Question 19 ERP software is used for
large scale organizations
Question 17: Debit and credit cards are read by
magnetic strip readers
Question 22 The general term for software that is designed to damage, disable, or steal data is
malware
Question 2: The main circuit board in a computer is called the
motherboard
Question 24: In the discussion of ubiquitous computing in Chapter 1, doctors can track a patient's healing progress via devices fitted with
motion sensors
Question 11: The touchpad on a notebook is used in place of the
mouse
Question 5: What is required for a computer to do parallel processing?
multiple CPUs or multiple cores
Question 37: On Windows computers, hard disk drives are assigned a drive letter; on a Mac computer, they are assigned a
name
Question 28: The device used to connect a computer to a network is called a
network adapter
Question 31 Chrome OS is designed for people who spend most of their computing time
on the web
Question 10 Database management software
organizes and keeps track or large amounts of data
Question 20 In a DoS attack, a network or web server is
overwhelmed with traffic
Question 1: Hardware used for input, output, connectivity, or storage that you plug in or connect to your computer wirelessly is called a _____ device.
peripheral device
Question 32 _____ is similar to phishing except that the individual is tricked into typing in personal information at a phony website.
pharming
Question 31 A message that appears to be from a bank directs the user to click a link and enter his or her account information, which is then used fraudulently. This is known as
phishing
Question 28 Flickr is a popular _____ sharing website.
photo
Question 5 Connecting to someone else's wireless network without their consent is called
piggybacking
Question 24: Resolution refers to the number of picture elements, or _____, that make up the image.
pixels
Question 9: This feature automatically searches for and loads the appropriate driver when a new device is attached to the computer.
plug and play
Question 25: In terms of video display, what does RGB stand for?
red green blue
Question 29 Suppose someone sneaks into your house and unlocks the back door so other criminals can enter and steal your possessions. This is similar to what a _____ does.
rootkit
Question 13: A _____ is a device that uses optical technology to analyze text and/or images and convert them into data that can be used by the computer.
scanner
Question 38 Unsolicited emails sent to a large number of people at the same time is known as
spam
Question 18: Programs like Dragon NaturallySpeaking convert _____ into _____.
speech/input into text and commands
Question 33 Phishing and pharming scams use _____ techniques where a sender's email or IP address is altered to appear to be a trusted source.
spoofing
Question 36 This type of software tracks your online activity without your knowledge.
spyware
Question 28 OneNote allows you to enter hand-written notes on a touch-enabled device via the use of
stylus
Question 17 In social bookmarking, bookmarks are created by _____ a website.
tagging
Question 35 A cookie is a small _____ placed on your computer by a web server.
text file
Question 27: Most receipts you receive from retail stores are printed with a _____ printer.
thermal
Question 22: What is the advantage of a plasma display over an LCD display?
truer color representation
Question 40 What advice is given in Chapter 7 regarding the use of Bluetooth in a crowded public place?
turn off bluetooth
Question 4 When cyber criminals are engaged in war driving, what are they looking for?
unsecured wireless network
Question 9: What is the most common type of port found on today's computers?
usb
Question 30: A USB wireless adapter is sometimes referred to as a
usb dongle
Question 6: The operating system provides a _____, which is the means with which you interact with the computer.
user interface
Question 27 Video clips that spread quickly through forwarded or shared links or through word-of-mouth are referred to as _____ videos.
viral
Question 7: When the OS uses a portion of the hard disk to store data that will not fit into RAM, it is using _____ memory.
virtual memory
Question 18 UNIX is often used for
web servers
Question 19: A _____ is a video camera built into a computer or plugged in as a peripheral.
webcam
Question 15: QR codes are usually used to direct the reading device to a
website
Question 36 A _____ is a website that allows anyone to create and edit content at the website.
wiki
Question 29 Most personal finance software applications allow you to download activity from _____ into the program.
your banking account
Question 4: The instructions for booting a computer are stored
BIOS
Question 26 The company Research in Motion (RIM) developed which of the following mobile operating systems?
Blackberry OS
Question 33 Which of the following blogging sites is owned by Google?
Blogger
Question 22 In Pinterest, you organize a collection of related pictures into a(n)
Board
Question 12 How does LinkedIn differ from Facebook and Google+?
Business/Professional
Question 1: In Chapter 4 you are asked to think of the operating system as
Conductor of a symphony
Question 40 To uninstall a program from your Windows system, you would begin by clicking Programs in
Control Panel
Question 1 The illegal activities involving computers discussed in Chapter 7 are collectively known as
Cybercrime
Question 24 In its discussion of _____, Chapter 6 describes an import utility that will import bookmarks you have saved in your browser.
Delicious
Question 19 In terms of the topics discussed in Chapter 7, DoS stands for
Denial of Service
Question 35 In a Windows operating system, which utility would you use to delete temporary Internet files and files moved to the Recycle Bin?
Disk Cleanup
Question 17 Which of the following is discussed in Chapter 5 as an example of a document management system?
Dokmee
Question 30 How are rootkits different from other kinds of malware?
Don't spread, just control PC
Question 25 Which of the following Adobe applications is a web authoring program?
Dreamweaver
Question 28 What type of operating systems will you find on devices such as ATMs and GPS units?
Embedded OS
Question 10 _____ scrambles communications between devices so that the data is not readable.
Encryption
Question 39 What does EULA stand for?
End User License Agreement
Question 7 What is the name of Microsoft's spreadsheet application?
Excel
Question 6 Can you send private messages on Facebook? If so, how?
Facebook Message tool
Question 33 The file management utility in Windows 8 is called
File Explorer
Question 34 In Mac OS X, file management tasks are handled through the _____ utility.
Finder
Question 8 A _____ is hardware, software, or a combination of hardware and software that blocks unwanted access to your network.
Firewall
Question 17 Chapter 7 lists three things you can do to prevent your computer from becoming a zombie, including 1) using antivirus software, 2) updating the OS regularly, and 3)
Firewall active at all times
Question 37 When files are stored on a disk in groups called clusters, which are sometimes not adjacent to one another on the disk, this is known as
Fragmentation
Question 14 All of the popular social networking sites discussed in Chapter 6 have _____ for use on your smartphone.
Free Mobile Apps
Question 10: What are the two types of user interfaces discussed in Chapter 4?
GUI and command line
Question 26 YouTube is owned by
Question 11 In Google+, you can conduct video chats with this feature.
Hangout
Question 23 Two popular desktop publishing software programs are Adobe's _____ and Microsoft's _____.
InDesign / Publisher
Question 2 Productivity software suites usually include all of the following applications except
Include Word, Excel, Powerpoint, Access.
Question 9 What do firewalls monitor?
Incoming and Outgoing traffic
Question 30 This free photo sharing mobile app allows you add special effects filters.
Question 9 What is the name of Apple's presentation software?
Keynote
Question 20: Newer monitors for desktop PCs are usually _____ flatscreens.
LCD
Question 21: This alternative to LCD displays is more expensive but consumes less energy.
LED
Question 19 Which of the following operating systems is open source?
LINUX
Question 29 Scrobbler is the app from this music sharing website.
Last.FM
Question 20 Who created the Linux operating system?
Linus Torvalds
Question 23 The Android mobile OS is based on
Linux
Question 3 Chapter 6 discusses three social networking sites, including all of the following except
Lists Facebook, Google+, LinkedIn
Question 35 Chapter 5 discusses three web-based productivity application suites. Which of the following is not one of them?
Lists Google Drive, Microsoft Web Apps, and Zoho
Question 7 Which of the following physical characteristics is not among those listed in Chapter 7's discussion of how biometric devices can authenticate a user?
Lists: Fingerprint, iris scan, voice recognition.
Question 37 The open source OpenOffice productivity suite has been modified and repackaged under the name
Lotus Symphony
Question 27 Chapter 7 mentions that this type of computer was once considered safe from viruses but is now the focus of new malware.
Macs
Question 27 What is the name of Microsoft's note-taking software?
OneNote
Question 9 Google+ has four default circles. Which of the following is not one of them?
Only Family, Friends, Acquaintances, and Following.
Question 36 Which Microsoft Office application is not available on Microsoft Web Apps?
Only Word, Excel, PowerPoint, and OneNote
Question 19 Three social bookmarking sites are discussed in Chapter 6. Which of the following is not one of them?
Only: Pinterest, StumbleUpon, Delicious.
Question 14 What category of productivity software does Lotus Notes fall into?
PIM
Question 38 When you go to the store and buy a copy of Microsoft Office off the shelf, you have participated in this software distribution model.
Packaged Software
Question 12 Microsoft Outlook is an example of this type of productivity software.
Personal Information Management (PIM)
Question 8 Which type of productivity software is based on the concept of a slide show?
Presentation
Question 16 Which type of productivity software makes heavy use of Gantt charts to display data?
Project Management
Question 30 Which of the following is a popular program used for managing personal finances?
Quicken
Question 36 What is the Mac OS X equivalent of the Windows Disk Cleanup utility?
Repair Disk
Question 14: Server rooms are specially designed and maintained to avoid all of the following except
Rooms maintained to avoid heat, humidity, and dust.
Question 34 When you are using software that is not installed on your computing device, you are using a(n) _____ application.
SAAS
Question 22: In the example discussed in Chapter 1, what aspect of ubiquitous computing is being used in the manufacturing sector?
Selected Answer: a. 3-D printing
Question 22: What is the name of Google's entry in the web browser market?
Selected Answer: a. Chrome
Question 37: Google _____ is the SaaS formerly known as Google Docs.
Selected Answer: a. Drive
Question 10: Which acronym describes a company that provides access to the Internet's infrastructure for a fee?
Selected Answer: a. ISP
Question 11: What company is behind the web browser known as Internet Explorer (IE)?
Selected Answer: a. Microsoft
Question 24: Text messages on mobile devices are sent using a service abbreviated as
Selected Answer: a. SMS.
Question 39: Some web pages contain media content that requires a plug-in, which is also referred to as a(n) _____ or a(n) _____.
Selected Answer: a. add-on; player
Question 30: Think of the CPU as the _____ of the computer.
Selected Answer: a. brain
Question 34: In Chapter 1, Dropbox and Flickr are cited as examples of
Selected Answer: a. cloud storage.
Question 20: A cable modem connects to your cable network using a _____ cable, and from the cable modem to your computer or wireless router using a _____ cable.
Selected Answer: a. coaxial; twisted pair
Question 8: In the URL http://www.census.gov, the top level domain is
Selected Answer: a. gov.
Question 28: Any device used to enter raw data or communicate instructions to the computer is referred to as a(n) _____ device.
Selected Answer: a. input
Question 32: Which of the following is not an example of an output device?
Selected Answer: a. keyboard
Question 12: A _____ is a computer with hardware and software that allows it to link together other computers in order to provide services and share resources.
Selected Answer: a. server
Question 17: The most powerful of all computers is a
Selected Answer: a. supercomputer.
Question 6: Apple's iPad is an example of a(n)
Selected Answer: a. tablet PC.
Question 12: The average speed for 4G devices is often advertised as _____ times faster than 3G.
Selected Answer: b. 10
Question 1: The generation of web pages that allowed people to collaborate and share information with the website are known collectively as Web
Selected Answer: b. 2.0.
Question 16: What is a thin client?
Selected Answer: b. A computer connected to a network that does not store data or software on the local PC.
Question 25: This common plug-in is used to view PDF documents.
Selected Answer: b. Adobe Reader
Question 40: _____ involves the design of equipment and workspace to promote safe and comfortable operation by the individual.
Selected Answer: b. Ergonomics
Question 5: The markup language used to create web pages is known by these initials.
Selected Answer: b. HTML
Question 9: The nonprofit organization in charge of keeping track of the Internet addresses and names all over the world is known by the initials:
Selected Answer: b. ICANN.
Question 14: Which popular plug-in come from Apple?
Selected Answer: b. QuickTime
Question 32: Which web browser is most closely associated with Apple computers and mobile devices?
Selected Answer: b. Safari
Question 18: A supercomputer named _____ at the Lawrence Livermore National Laboratory was named the top supercomputer in the Top 500 list of most powerful computers.
Selected Answer: b. Sequoia
Question 26: Which of the following is not required to connect your PC to the Internet and browse the Web?
Selected Answer: b. a wireless interface card
Question 33: What is a hotspot?
Selected Answer: b. an area where a Wi-Fi network is within range
Question 19: A search phrase enclosed in quotations will return pages where the keywords
Selected Answer: b. are in the same sequence.
Question 38: A software program used to view web pages is referred to as a web
Selected Answer: b. browser.
Question 38: How do smart power strips reduce energy consumption?
Selected Answer: b. by controlling the flow of power to peripheral devices when the main device is not active
Question 23: The discussion of ubiquitous computing in Chapter 1 includes the example of how law enforcement is using iPhone and iPod apps to
Selected Answer: b. collect fingerprints.
Question 6: It is suggested in Chapter 2 that when evaluating content you encounter on the Web, the first thing you should consider is the
Selected Answer: b. domain name in the web address.
Question 40: Buying or selling over the Internet is known by this term.
Selected Answer: b. e-commerce
Question 7: IPv6 uses _____ groups of characters separated by _____.
Selected Answer: b. eight; colons
Question 10: Digital cameras, game consoles, and electronic thermostats are examples of devices that include
Selected Answer: b. embedded computers.
Question 2: All the physical components and devices comprising a computer are referred to as
Selected Answer: b. hardware.
Question 27: The first step in the Information Processing Cycle involves the _____ of data.
Selected Answer: b. input
Question 27: Broadband connectivity speed is usually expressed as
Selected Answer: b. megabits per second (Mbps).
Question 34: To exclude a keyword from the search results, type a(n) _____ in front of it.
Selected Answer: b. minus symbol (-)
Question 36: What does SaaS stand for?
Selected Answer: b. software as a service
Question 9: In Chapter 1, Google's Project Glass eyeglasses are discussed as an example of a(n)
Selected Answer: b. wearable computer.
Question 2: The web pages and resources needed for a website are stored on computers known as
Selected Answer: b. web servers.
Question 39: Computer-related tendonitis usually affects the
Selected Answer: b. wrist.
Question 28: According to Hitwise, the two leading search engines used in June 2012 were
Selected Answer: c. Google and Bing.
Question 31: When a computing device is connected to the Internet, it is assigned a unique address called a(n) _____ address.
Selected Answer: c. Internet Protocol (IP)
Question 19: _____ computing refers to the fact that computing technology is everywhere and is used all the time.
Selected Answer: c. Ubiquitous
Question 13: The computers that connect to a server are called
Selected Answer: c. clients.
Question 25: Technological _____ is the term used to describe the merging of several technologies into a single device.
Selected Answer: c. convergence
Question 3: Which of the following is not considered a mobile computer?
Selected Answer: c. desktop computer
Question 15: Which of the following shows the correct order (fastest average speed to slowest) of the various type of Internet connectivity?
Selected Answer: c. fiber-optic, cable, DSL, satellite
Question 3: Where is satellite Internet access used?
Selected Answer: c. in rural areas where cable or DSL is not available
Question 37: Spiders and crawlers are used by search engines to generate
Selected Answer: c. index entries.
Question 15: Midrange servers used to be known as
Selected Answer: c. mainframes.
Question 21: In the example given in the discussion of ubiquitous computing, a restaurant in California is using a sophisticated computer system to
Selected Answer: c. manage sound levels.
Question 31: The CPU is a silicon chip referred to as the
Selected Answer: c. microprocessor.
Question 26: Characters that are typed or otherwise entered into a computer are called
Selected Answer: c. raw data.
Question 1: A personal computer (PC) is a computer in which the input, processing, and storage are
Selected Answer: c. self-contained.
Question 29: Who provides digital subscriber lines (DSL)?
Selected Answer: c. telephone companies
Question 13: A _____ is a collection of related web pages for one organization or individual.
Selected Answer: c. website
Question 16: The price you pay your ISP for Internet access likely depends on
Selected Answer: c. your connection speed.
Question 21: Which of the following is an example of a metasearch search engine?
Selected Answer: d. Dogpile
Question 23: A network interface card (NIC) is often referred to in computer advertisements as a(n) _____ port.
Selected Answer: d. Ethernet
Question 5: Ultrabooks were originally named by _____ to differentiate them from older, bigger notebooks.
Selected Answer: d. Intel
Question 33: While processing, instructions and data are temporarily stored in
Selected Answer: d. RAM.
Question 18: The function of a Domain Name Server (DNS) is to translate
Selected Answer: d. a URL into an IP address.
Question 17: High-speed Internet access is referred to as
Selected Answer: d. broadband.
Question 29: What does CPU stand for?
Selected Answer: d. central processing unit
Question 35: Accessing software and computing services entirely on the Internet is referred to as _____ computing.
Selected Answer: d. cloud
Question 30: Which part of the URL https:\\www.paypal.com represents the protocol for the page?
Selected Answer: d. https
Question 36: A(n) _____ is two or more computers or other devices that are linked together to share resources and communicate with each other.
Selected Answer: d. network
Question 4: Laptop computers are also referred to as
Selected Answer: d. notebooks.
Question 8: All of the following are examples of mobile devices except
Selected Answer: d. ultrabooks.
Question 4: What is another name for Web 3.0?
Semantic Web
Question 10 In contrast to Facebook, Google+ lets you more easily
Share with certain groups
Question 15 A category of social networking that provides tools with which you can organize, store, and share content with others is known as social
Social Bookmarking
Question 5 The primary uses of this type of application are to organize, calculate, and build charts from numbers.
Spreadsheet App
Question 23 When you join _____, you choose categories for topics that interest you. Then web pages matching those interests are found for you.
StumbleUpon
Question 22 The decline of these two mobile operating systems is cited in Chapter 4 as an example of how the mobile market can change.
Symbian/Nokia & Blackberry/RIM
Question 40 This Windows utility allows you to undo recent changes that may have caused problems in your computer.
System Restore
Question 38 In Mac OS X, the utility used to back up and restore files is called
Time Machine
Question 28 What type of malware disguises itself as a useful program?
Trojan Horse
Question 34 In Chapter 6, these two sites are categorized as microblogging services.
Twitter and Tumblr
Question 17 _____ was designed as a server operating system.
UNIX
Question 2 Using a computer, network, or other resource without permission is generally referred to as
Unauthorized Access
Question 20 Pinterest describes itself as a
Virtual Pinboard.
Question 23 A _____ is a form of malware that once installed on a host computer, can replicate itself and spread to other computers.
Virus
Question 11 Which of the following is the latest security standard for wireless routers?
WPA2
Question 11: Which type of device discussed in Chapter 1 receives inputs from voice commands, hand movements, joysticks, buttons, or touch?
Wearable Computer
Question 38 _____ is a wiki described in Chapter 6; it contains over 140,000 how-to articles.
WikiHow
Question 39 This wiki website provides free images, photographs, and videos.
Wikimedia Commons
Question 37 The area in Wikipedia where users can post a test edit is called the
Wikipedia Sandbox
Question 33 What is the name of Quicken's legal software application?
WillMaker, MyAttorney, Family Lawyer
Question 12: Which of the following operating systems is the most popular?
Windows
Question 13: What is the latest version of Microsoft's operating system?
Windows 8
Question 27 Microsoft's earlier mobile OS, Windows Mobile, was replaced by
Windows Phone
Question 4 Microsoft's and Apple's productivity suites contain word processing applications; Microsoft's is called _____, while Apple's is called _____.
Word, Pages
Question 25 This type of malware is a self-replicating program that requires no action on the part of the user to copy itself to another computer.
Worm
Question 13 An Internet-connected computer that is controlled by a hacker or other cybercriminal without the owner's knowledge is called a _____ computer.
Zombie
Question 5 When you send a friend request in Facebook, the person receiving the request can choose to _____ or _____ it.
accept or ignore
Question 15: Apple uses _____ to designate versions of its Mac OS X family of operating systems.
animal names
Question 1 Updating your family budget or writing a report for school are tasks you would accomplish with the _____ on your computer.
apps/application software
Question 16 Social bookmarking is similar to using the Favorites list in your browser except that the links
are called bookmarkis and saved in social network for access from anywhere and share w/ others
Question 18 Computer-aided design and computer-aided manufacturing programs are most likely to be used by _____ firms.
automotive, construction, manufacturing, and engineering.
Question 26 Worms typically try to
backlog network traffic
Question 8: What does BIOS stand for?
basic input output system
Question 14: _____ scanners are used to read fingerprints, irises, or voice patterns.
biometric scanners
Question 32: The smallest unit of digital data in the binary system is called a
bit
Question 33: A group of eight _____ is called a _____.
bits/byte
Question 32 The collection of all the blogs on the Web is referred to as the
blogosphere
Question 29: This technology gets its name from a 10th century king who united warring countries in Europe.
bluetooth
Question 18 The site icons that allow you to instantly bookmark a page in your social bookmarking tool are called
bookmarklets
Question 2: Starting a computer is called
booting
Question 14 A collection of zombie computers used to conduct an attack on another network is called a
botnet
Question 36: On a Windows system, the hard disk drive is usually assigned the drive letter
c
Question 8 In Google+, the people you interact with are organized into categories called
circles
Question 34 In this technique a button, graphic, or link on a web page appears to be real, but when clicked, causes malicious software to run.
clickjacking
Question 15 Chapter 7 lists three common ways a computer can become infected with software that turns it into a zombie. Which of the following is not one of them?
clicks link, downloads something, visits website.
Question 6 How is data organized in a spreadsheet application?
col/rows/worksheets
Question 3: You are doing a _____ boot if you are turning on a computer that has been shut off.
cold
Question 10: USB 3.0 is approximately _____ times faster than USB 2.0.
10
Question 31 Chapter 5 mentions that in the area of entertainment software, World of Warcraft (WoW) has more that _____ subscribers.
10 million
Question 35: One kilobyte equals _____ bytes.
1000
Question 14: In what year was the first Mac OS released?
1984
Question 1 Social media is a large part of what is meant by Web
2
Question 31: How many possible values are there for the smallest unit of data in a binary system?
2
Question 13 Chapter 6 reports that as of June 2012, individuals are joining LinkedIn at a rate of
2 per second
Question 35: Firefox was originally released in
2004
Question 30 When was the Chrome OS first released?
2009
Question 7 When was Google+ launched?
2011
Question 40: What is the storage capacity of a single-layer Blu-ray disc?
25gb
Question 16: Typically, RFID technology is used to read tags up to _____ feet away.
300
Question 21 According to Experian Hitwise's 2012 report, where does Pinterest rank in the United States in terms of the number of site visits?
3rd behind Facebook and Twitter
Question 16 According to McAfee Threats Reports for early 2012, _____ computers worldwide were infected by botnets.
4-5 million
Question 4 As of June 2012, Facebook reported that it had _____ active users.
955 million
Question 12 Which acronym stands for a written policy describing what users are permitted to do on computing equipment and networks?
Acceptable Use Policy
Question 15 QuickBooks is a popular _____ application used by many small businesses.
Accounting
Question 39 Chapter 4 suggests that for users of Windows 7 and Windows 8, a good place to start when troubleshooting a problem is the
Action Center
Question 21 Which of the following is a popular photo editing software application?
Adobe Photoshop
Question 40 Chapter 6 shows how this company maintains a customer service support page on Facebook.
Amazon
Question 24 This mobile operating system has the biggest market share for mobile devices.
Android
Question 32 This popular game, developed by Rovio, has been downloaded over 1 billion times.
Angry Birds
Question 20: Moore's Law predicts a trend involving
# of transistors in a circuit.
Question 24 Which of the following is a free, open source audio recording and edition software application?
Audacity
Question 25 Chapter 6 categorizes websites such as YouTube, Flickr, and Last.fm as _____ sites.
Media Sharing Sites
Question 7: Handheld computing devices smaller than notebooks are referred to by the general term
Mobile Devices