CGS Exam 1
This method of file transfer distributes file transfers across many different computers.
BitTorrent
Image editors edit images consisting of thousands of pixels that form this type of image.
Bitmap
This method of file transfer has been used for decades and is frequently used for uploading changes to a website hosted by an Internet service provider.
FTP
________ use(s) rigid metallic platters to store programs and very large data files.
Hard disks
The continuing development of the Internet that allows everyday objects embedded with electronic devices to send and receive data over the Internet.
IoT
Which of the following is not a popular cloud suite or online office suite?
Lotus Symphony
Twitter is an example of what type of site?
Microblog
Add-on programs for a variety of mobile devices, including cell phones and tablets.
Mobile apps
Which part of an information system consists of the rules or guidelines for people to follow?
Procedures
Which of the following will not retain data after the computer is turned off?
RAM
These special programs continually look for new information and update the databases used by search services.
Spiders
Which of the following is a collection of programs rather than a single program?
System software
This hardware houses most of the electronic components that make up a computer system.
System unit
________ make up the basic structure of a relational database with columns containing field data and rows containing record information.
Tables
This type of image is made up of geometric shapes or objects.
Vector
Which of the following programs would be used to create a website?
Web authoring
The most common way to access the Internet is through ________.
an Internet service provider (ISP)
A ________ is a collection of related data—the electronic equivalent of a file cabinet.
database
All information found on the web through search tools can be considered as factual.
false
Antivirus software is a Windows utility that is unnecessary as long as you are careful browsing the Internet.
false
Application software is "background" software which helps the computer manage its own internal resources.
false
Functions, formulas, charts and what-if analysis are common features of database management systems.
false
Illustration programs are specialized graphics programs for editing bitmap or raster images.
false
Image editors are used to create and edit vector images.
false
Solid-state storage uses rigid metallic platters to store data using the magnetic charges on the disk's surface.
false
The Internet and the Web are the same.
false
Uploading is the process of copying a file from a website to your computer.
false
The equipment that processes data in order to create information is called the ________.
hardware
The Internet is a(n) ________ made up of wires, cables, satellites, and rules for exchanging information between computers connected to the network.
physical network
Programs that combine a variety of visual objects to create attractive, visually interesting presentations are called
presentation software
In an information system, the rules or guidelines for people to follow are called ________.
procedures
Software is another name for ________.
programs
An Internet ________ is a collection of utility programs designed to maintain your security and privacy while you are on the web.
security suite
A database is a collection of related data.
true
Highly structured and organized data is stored in database files.
true
In a Ribbon GUI, a gallery displays the additional options.
true
In addition to an Internet connection, users need browser software to easily display web resources.
true
JavaScript is a language often used within HTML documents to trigger interactive features.
true
Many apps are written for a particular type of mobile device and will not run on other types.
true
System software is a collection of programs.
true
The Apple Health application is a Web 3.0 application.
true
To be an effective and efficient computer user, you need to recognize the role of information technology in your personal and professional life.
true
What-if analysis is a very powerful and simple tool to test the effects of different assumptions in a spreadsheet.
true
For browsers to connect to resources on the Internet, the location of the resources must be specified through addresses called ________.
uniform resource locators (URLs)
Increased use of mobile or wireless communication devices and cloud computing has been termed "the ________ revolution."
wireless