CIT Chapters 9-3

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

The development rights of a software program specify the allowable use of the program.

False

To create presentation graphics, database software is used.

False

Typically, objects in p ainting programs can be layered so, if you place one object on top of another, you can later separate the two images if desired. _________________________

False

Uninstall utilities are designed to delete temporary files (such as deleted files still in the Recycle Bin, temporary Internet files, temporary installation files, and so forth) in order to free up disk space. _________________________

False

A musician who posts his music video on YouTube is an example of a(n) ____ .

Internet content provider

The proprietary operating system for Mac computers made by Apple Corporation was ____.

Mac OS

A ____ typically rests on the desk or other flat surface close to the user's computer, and it is moved across the surface with the user's hand in the appropriate direction to point to and select objects on the screen.

Mouse

Janet is studying operating systems as part of her Understanding Computers 101 class. After learning about the different types of operating systems, she realizes that she uses a number of them in her daily life. Janet recently purchased a new Apple computer. The operating system of that computer is ____.

OS X

____ cookies are cookies placed on your hard drive by a company other than the one associated with the Web page that you are viewing—typically a Web advertising company.

Third-party

Font face refers to a named collection of text characters that share a common design, such as Calibri or Times New Roman.

True

GPS receivers are commonly used by individuals to determine their geographic location while hiking and to obtain driving directions while traveling.

True

In general, the operating system serves as an intermediary between the user and the computer. _________________________

True

In spreadsheet programs, when absolute cell references are used, formulas are copied exactly as they are written.

True

Physicians can use telemedicine to perform remote diagnosis of patients.

True

Remote storage services accessed via the Internet are often referred to as cloud storage or online storage. These services can be provided either as a stand-alone service or as part of a cloud computing service. _________________________

True

Since retrieving data from memory is much faster than from a magnetic hard disk, disk caching can speed up performance.

True

Some monitoring systems in use today use the RFID tags and RFID readers to monitor the status of objects (such as shipping boxes, livestock, or expensive equipment) to which the RFID tags are attached.

True

Some new personal computers come with two partitions: a C drive partition ready to use for programs and data and a D drive partition set up as a recovery partition.

True

Technically, the Internet is the physical network, and the Web is the collection of Web pages accessible over the Internet.

True

The most common security protocol used with secure Web pages is Transport Layer Security (TLS). _________________________

True

A ____ limits the search to a particular search characteristic, such as the page title, URL, page text, top-level domain, or Web site.

field search

You must have the necessary hardware to support t o use multiple monitors, such as the appropriate ____.

monitor ports

One type of mobile phone that is not commonly used is the ____.

satellite phone

Web-based software must be installed on the device being used before it is run. _________________________

False

Digital video cameras include digital camcorders and small digital video cameras used in conjunction with computers and other devices.

True

Electronic medical monitors take the vital signs of an individual (such as weight, blood-sugar readings, or blood pressure) or prompt an individual to answer questions. _________________________

True

____ includes all the programs that allow you to perform specific tasks on your computer, such as writing a letter.

Application software

Windows ____ was released in 2012.

8

One objective of the ____ project was to create a computer network that would allow researchers located in different places to communicate with each other.

ARPANET

____ is a Linux-based operating system developed by the Open Handset Alliance.

Android

____ are designed to be used with everyday objects, such as home appliances, gaming consoles, digital cameras, e-readers, digital photo frames, ATMs, toys, watches, GPS systems, home medical devices, voting terminals, and cars.

Embedded operating systems

"Tracking up data" refers to creating a second copy of important files.

False

A coaxial cable is a networking cable consisting of wire strands twisted in sets of two and bound into a cable.

False

An external flash memory card reader that connects via an RJ14 port can be used when the destination device doesn't have a built-in reader .

False

Application software runs in the background at all times, making it possible for you to use your computer. _________________________

False

Conventional telephone systems use digital signals.

False

For an even higher level of security than a scheduled backup, presence backup can be used. _________________________

False

Hardware theft can take many forms, including individuals making illegal copies of programs to give to friends and businesses installing software on more computers than permitted in the program's end-user license agreement.

False

LCD displays use layers of organic material, which emit a visible light when electric current is applied. _________________________

False

Most application programs that allow text editing have a(n) editing spot that looks like a blinking vertical line on the screen and shows where the next change will be made to the document currently displayed on the screen. _________________________

False

Most application systems today look for and recognize new devices each time the computer boots. _________________________

False

Most operating systems today use a text-based user interface.

False

Optical character recognition (OCR) is a technology used primarily by the banking industry to facilitate check processing.

False

Performance-based exams cannot be administered and taken online.

False

Repeated threats or other malicious behavior that poses a credible threat of harm carried out online is referred to as phishing.

False

With a DVD, the storage medium and the storage device are permanently sealed together to form one piece of hardware called a fixed-media storage system.

False

Most operating systems include security features, such as an integrated ____, to protect against unauthorized access via the Internet.

Firewall

____ programs can protect against someone accessing your computer via the Internet or a wireless connection.

Firewall

____ allow the user to issue commands by selecting icons, buttons, menu items, and other objects—typically with a mouse, pen, or finger.

Graphical user interfaces

____ means that data can be retrieved directly from any location on the storage medium, in any order.

Random access

____ are designed to withstand much more physical abuse than conventional devices.

Ruggedized devices

The ____ is designed to placeshift multimedia content; that is, to allow individuals to view their multimedia content at a more convenient location.

Slingbox

____ refers to the complete malfunction of a computer system.

System failure

____ consists of the operating system and utility programs that control your computer and allow you to use it.

System software

Case 3-1 Dan is a small business owner who depends on his computer to keep track of customer and sales data. He is investigating storage options because it is critical for him to ensure that his data is safe in the event of a computer failure. A friend of Dan suggests to him that he can use an external hard drive for his data storage and backup needs. To use an external hard drive, Dan should make sure that his computer has an available USB or ____ port.

Thunderbolt

A personal area network (PAN) is a small network of two or more personal devices for one individual, such as a personal computer, smartphone, headset, tablet, portable speaker, smart watch, and/or printer.

True

Although Linux originally used a command line interface, most recent versions of Linux programs use a graphical user interface.

True

As you work on your computer, the operating system continuously manages your computer's resources and makes them available to devices and programs when they are needed.

True

Cloud software is delivered on demand via the Web to wherever the user is at the moment, provided he or she has an Internet connection. _________________________

True

Conventional RAM is volatile. _________________________

True

Windows Vista replaced Windows XP.

True

____ is one of the most widely-used versions of Linux.

Ubuntu

____ is the use of video cameras to monitor activities of individuals, typically for work-related or crime-prevention purposes.

Video surveillance

____ memory allows you to use more memory than is physically available on your computer.

Virtual

Today, the standard term for placing telephone calls over the Internet or any other type of data network is ____.

VoIP

____ generally refers to applications and services that use the Web as a platform to deliver rich applications that enable people to collaborate, socialize, and share information online.

Web 2.0

A single spreadsheet document is often called a ____.

Worksheet

LCD panels used with computer monitors typically include a light, usually at the rear of the display device—a technique referred to as ____ .

backlighting

Most computer tapes today are in the form of ____ tapes.

cartridge

A ____ is a software program that is designed to cause damage to a computer or perform some other malicious act.

computer virus

Many Web pages today use ____—small text files that are stored on your hard drive by a Web server—to identify return visitors and their preferences.

cookies

Some mobile apps are designed to be compatible with popular ____ such as Microsoft Office.

desktop software

To speed up magnetic hard drive performance, ____ is often used.

disk caching

Dean has been using computers for some time now, but he is unfamiliar with a number of utility programs. In order to better maintain his computer, he decides to ask his coworker Andrea for advice on basic utility programs. Andrea tells Dean that he should periodically perform ____ on his computer to optimize the hard drive so that it works more efficiently. This process works by rearranging the data on the hard drive so all files are stored in contiguous locations.

disk defragmentation

Rearranging the data on the hard drive so all files are stored in contiguous locations is called ____.

disk defragmentation

A(n) ____ is a collection of an individual's work accessible through a Web site.

e-portfolio

A marketing activity that can be considered a privacy risk is ____.

electronic profiling

In ____, data can travel in either direction, but only in one direction at a time.

half-duplex transmission

Lisa is a student who regularly uses the computers at her local Internet café to listen to music, talk to her friends and family through the Internet, and play computer games. The Internet café has recently enacted a new policy that says that all users must use the ____ attached to their computers when carrying out activities on the computer that will provide sound, so as to not disturb the other users.

headphones

A ____ transmits all data received to all network devices connected to it, regardless of which device the data is being sent to.

hub

Stacey is the office manager for a small business and is looking for a new printer and scanner for her office. After doing some research into printers, Stacey decides to buy a(n) ____ printer, since they are the standard for business documents and are typically faster and have better quality output than other types of printers.

laser

A(n) ____ uses charged liquid crystals located between two sheets of clear material to light up the appropriate pixels to form the image on the screen.

liquid crystal display (LCD)

Anthony is passionate about politics and enjoys sharing and discussing his views with others over the Internet.

message boards

A network adapter, also called a ____ when it is in the form of an expansion card, is used to connect a computer to a network.

network interface card (NIC)

Common online investing services include the ability to set up a(n) ____ that displays the status of the stocks you specify.

online portfolio

The ____ boots the computer, launches application software, and ensures that all actions requested by a user are valid and processed in an orderly fashion.

operating system

Stacey is the office manager for a small business and is looking for a new printer and scanner for her office. When buying a scanner, Stacey needs to make sure that the scanner has a high enough ____, usually measured in the number of dots per inch (dpi ), for the business needs of the office.

optical resolution

The number of bits used to store color information about each pixel is called ____.

pages per minute (ppm)

Presentation slides can be advanced at predetermined intervals, by clicking or tapping on the screen, or by ____.

pressing the spacebar

Most businesses and Web sites that collect personal information have a(n) ____ that discloses how the personal information you provide will be used.

privacy policy

Samuel loves to shop online because it allows him to easily compare prices at different retailers and read reviews from other buyers before buying a product. However, Samuel is also concerned about protecting his personal information.

privacy policy

When a software program is purchased, the buyer is acquiring a(n) ____ that permits him or her to use the software.

software license

A storage medium is inserted into its corresponding ____ in order to be read from or written to.

storage device

Dean has been using computers for some time now, but he is unfamiliar with a number of utility programs. In order to better maintain his computer, he decides to ask his coworker Andrea for advice on basic utility programs. Andrea advises Dean to remove unnecessary programs from his computer by using a(n) ____ utility.

uninstall

Semirugged devices are designed to withstand drops onto concrete, extreme temperature variations, and use while being bounced around over rough terrain in a vehicle.

False

The Cut command in Windows can be replaced by the keyboard shortcut [Ctrl]+[C].

False

One advantage of using personal computers for Internet access is that they have relatively large screens for viewing Internet content and keyboards for easier data entry. _________________________

True

One of the early Ethernet protocols (called 10BASE-T) supports transmission rates of 10 Mbps.

True

One of the most obvious types of hardware loss is hardware theft. _________________________

True

Keyboards can be built into a device, attached by inserting the keyboard's wired cable or ____ into a USB port, or connected via a wireless networking connection such as Bluetooth.

wireless receiver


Kaugnay na mga set ng pag-aaral

Accounting, Finance & Valuation (Chapter 2)

View Set

Topic Review Guide: Gene Regulation

View Set

Chapter 1: What is multimedia? - Quiz 1

View Set

Chapter 21 Assignment Question Set Eco 252

View Set