CIT 15 (Final Study Guide)

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

network adapter

For the nodes on a network to communicate with each other and access the network, each node needs a ________.

A laser burns tiny pits onto a disc.

How do optical discs store data?

field

In a database, the term ________ is synonymous with a category of information.

bits

In binary language, each letter of the alphabet, each number, and each special symbol is made up of a unique combination of eight ________.

firewall

In computing, a ________ is named after a housing construction feature that slows the spread of fires from house to house.

inheritance

In object-oriented programming, ________ allows a new class to automatically use all the data and methods of an existing class.

open source

LibreOffice is an example of a(n) ________ productivity software package.

Google and Apple

Most smartphones use operating systems developed by ________.

classes

Object-oriented ________ are defined by the information (data) and the actions (methods) associated with them.

Accounting

QuickBooks is an example of ________ software.

Keep a master password that is the same for all of your accounts.

Rules for creating passwords include all of the following EXCEPT ________.

clear out unnecessary files

Running the Disk Cleanup utility is a quick way to ________.

engineering

Social ________ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information.

browser

Software that enables you to display and interact with text and other media on the web is a web ________.

enterprise resource planning

Software that manages "back office" functions such as billing, production, inventory management, and human resources management is called ________ software.

inside the CPU, itself

Some of the cache memory of a CPU is ________.

network administrators

Some of the responsibilities of ________ are installing new hardware and software on the network and monitoring performance.

FBI and National White Collar Crime Center

The Internet Crime Complaint Center (IC3) is a partnership between the ________.

motherboard

The ________ contains the central electronic components of the computer.

gigabytes

The amount of RAM storage is measured in ________.

control structures

The keywords used in programming languages that use decisions to redirect the flow of a program are called ________.

file path

The location of a file is specified by its ________.

MAC (Media Access Control)

The physical address assigned each network adapter is called its ________.

mining

The process of searching huge amounts of data seeking a pattern, is called data ________.

compilation

The process that converts program code into machine language is called ________.

Intel

The processor market for desktop and laptop computers is dominated by ________.

algorithm

The set of specific, sequential steps that describe exactly what a computer program must do to complete the work is called a(n) ________.

digital convergence

The term ________ refers to the use of a single unifying device that handles media, Internet, entertainment, and telephone needs.

operating system

The two major types of system software programs are utility programs and the ________.

MAC

The unique number assigned to a network adapter by the manufacturer is referred to as the ________ address.

Copyright

To protect a movie, what category of intellectual property would be used?

GPU (graphics processing unit)

To speed up the display of graphics, a(n) ________ is integrated into some video cards.

coding

Translating an algorithm into a programming language is called ________.

bloatware

Unwanted or unneeded software included by manufacturers on new computers is called ________.

mobile

Using applications on smartphones and tablets to buy and sell products is known as ________ commerce.

crowdfunding

Using the Internet to get small donations from many people to start a business is called ________.

Data represents a fact. Information is data that has been organized.

What is the difference between data and information?

a network adapter

When setting up a home network, make sure each node has ________.

Function

When using a spreadsheet, SUM in the expression =SUM(B10:B16), is called a(n) ________.

Formula

When using a spreadsheet, the expression =D8-D17 is called a ________.

jpeg

Which of the following digital image formats compresses the image file?

Cybercrime

Which of the following is formally defined as any criminal action perpetrated primarily through the use of a computer?

MP3

Which of the following is the most common audio compression format?

OneDrive

Which of the following is the online storage system affiliated with a Microsoft account?

Flowchart

Which of the following provides a visual representation of the patterns of an algorithm?

Adobe Illustrator

Which of the following software programs can best be used to help create digital art?

Cookies obtain your personal information by searching your hard drive.

Which of the following statements about cookies is NOT true?

.edu

Which of the following top-level domains identifies a degree-granting institution?

Fiber-optic cable

Which transmission medium transmits data the fastest?

a firewall

You can block logical ports from invaders and make your computer invisible to others on the Internet by installing ________.

Device

You can find out which network adapters are installed in your system by using the Windows ________ Manager utility.

Fiber Optic

________ cable is NOT subject to electromagnetic interference or radio frequency

Embedded

________ computers are specially designed computer chips that reside inside other devices, such as a car.

A DDoS attack

________ floods a computer with requests until it shuts down and refuses to answer any requests for information.

Information technology

________ is a field of study focused on the management, processing, and automatic retrieval of information.

LinkedIn

________ is a professional, business-oriented social networking site.

Ergonomics

________ is concerned with the design and arrangement of machines and furniture to avoid uncomfortable or unsafe experiences.

Ethernet

________ is digital textual information that can be stored, manipulated, and transmitted by electronic devices.

E-mail client software

________ is installed on your computer, and when the program is opened, your e-mail downloads to your computer

Augmentive reality

________ is our normal sense of the world around us enhanced with digital information.

Artificial Intelligence

________ is the branch of computer science that attempts to create computers that think like humans.

Ethernet

________ is the standard communications protocol used on most client/server networks.

Laser

________ printers use static electricity and toner and heat set the image on the page very quickly.

Crowdsourcing

________ solicits online input such as product ratings from consumers.

analog-to-digital converter

A(n) ________ chip converts sound waves from a voice into a digital signal.

NAS

A(n) ________ device facilitates file sharing and data backup.

breadcrumb trail

A(n) ________ is a navigation aid that shows the path you have taken to get to a web page or where the page is located within the website.

authentication

A(n) ________ server tracks who is logging on to the network as well as which services on the network are available to each user.

machine language

An example of a first-generation language is ________.

collection of tools that helps programmers write and test their programs

An integrated development environment (IDE) is a ________.

forensics

Analyzing computer systems to gather potential legal evidence is computer ________.

beta

Before its final commercial release, a ________ version of software may be offered to certain test sites or to interested users free or at a reduced cost.

data warehouse

Big data analytics is usually associated with ________ services.

network operating system (NOS)

Client/server networks are controlled by a central server that runs specialized software called a(n) ________.

binary

Computers use a ________ language consisting of 0's and 1's.

brute force attack

Configuring an account to disable itself after a set number of login attempts using invalid passwords is a method of countering a ________.

computer viruses

Creating and distributing ________ is one of the most widespread types of cybercrimes.

irrevocable

Creative Commons licenses are ________.

integrity

Data ________ means that the data contained in a database is accurate and reliable.

mining the data

Data staging consists of all of the following steps, EXCEPT ________.

cloud storage

Dropbox is an example of ________.

device driver

Each device attached to your computer has a special program called a ________ that enables the device and operating system to communicate with each other.

HDMI

A(n) ________ cable carries all audio and video information from devices to a connected TV.

completeness

A(n) ________ check determines whether a required field such as LastName was filled in.

Network Interface Card (NIC)

A ________ enables your computer to connect to other computers or to the Internet.

database

A ________ is a collection of related data that can be stored, sorted, organized, and queried.

blog

A ________ is a personal journal posted on the web.

macro virus

A ________ is a virus that is attached to documents such as Word or Excel files.

firewall

A ________ keeps your computer safe by determining who is trying to access it.

client/server

A ________ network can contain servers as well as individual computers.

ICANN (Internet Corporation for Assigned Names and Numbers)

A company that manages domain name registration by allocating domain name registration to select, private companies. What organization is the top level coordinator of how the unique identifiers (names and numbers) of the Internet work? What organization is the top level coordinator of domain names? What organization is the top level coordinator of IP addresses and AS numbers?

network

A computer ________ is two or more computers connected using software and hardware so that they can communicate with each other.

input

A keyboard and touch screen are the most common of ________ devices.

MAN

A large network designed to provide access to a specific geographic area, such as a large city, is a ________.

Java applet

A small Java-based program is called a ________.

infringement

A violation of the holder's rights is known as copyright ________.


Kaugnay na mga set ng pag-aaral

Pediatrics Capstone Pre-Assessment Quiz

View Set

Questions missed last time 12/9/2015

View Set

The production process and costs

View Set

Chapters 7 and 8 Multiple Choice

View Set

Prep U: Ch 24: Structure and Function of the Kidney

View Set