Cmpt Final
Each of the following is a navigation tool available in a typical web browser
-home button -text link -favorites list NOT status code
You can identify a secure web site if you visit the web site and your browser displays any of the following
-the color green -a lock icon -https:// NOT an ActiveX control
When a broken link points to a nonexistent HTML doc, your browser typically produces a ____ Page not four error
404
______ determines how fast data travels to your computer from the internet
Bandwidth
____ is a peer-to-peer file sharing protocol that distributes the role of file servers across many computers
BitTorrent
The database that keeps track of the names that correspond to IP addresses is called the ____ Name System
Domain
_____ is the leading technology for wired networks; it is also included in some printers and other peripheral devices
Ethernet
___ is the original markup language that specifies how a web doc should appear when printed or displayed on a computer screen
HTML
Which of the following certification exams covers basic computing knowledge and skills?
IC2
A(n) ____ address is a series of numbers used to identify a network device in virtually every type of computer network
IP
The term ___ industry is used to refers to the companies that develop, produce, sell or
IT
The ____ browsing feature in Internet Explorer keeps the browser from storing any data
InPrivate
A _____ address is a physical address, a unique number assigned to a computer when it is manufactured
MAC
_____ specifies a standard way to store music data for synthesizers, electronic instruments, and computers
MIDI
_____ is malicious code designed to disrupt a computer's normal operation
Malware
When creating a Boolean search, the minus sign can be used in some search engines instead of the word _____
NOT
Which of the following file formats would not be good choice for your resume
NOT GOOD: XLSX good: DOCX RTF PDF
From a geographic perspective, networks can be classified as LAN, _____, NAN, MAN, or WAN
PAN
A password uses a combination of letters and numbers, but a ____ uses numbers only
PIN
Which of the following devices is never used to capture digital video
SCANNER
_____ allow webpages to become more interactive and to incorporate activities that would otherwise require a computer program, such as to enable e-commerce sites to verify credit card infomation
Scripts
A ___ is a device that provides a continuous supply of power failure and prevents spikes and surges from reaching your comp
UPS
___ over IP refers to technology that uses an internet connection to place telephone calls instead of regular phone system
Voice
Audio can be ______ , digital or synthesized
analog
AAC, AIF, MP3, Wave, and WMA are formats for which type of files?
audio
A method of personal identification called _____ , bases identification on a physical trait.
biometrics
A(n) ____ graphic is resoultion dependent, which means that the quality of the image relies on its resolution
bitmap
Virus experts use _____ threat to describe threats that combine more than one type of malicious program
blended
____ is a short-range wireless network technology that is designed to make its own connections between electronic devices, without wires, cables,or any direct action from a user
bluetooth
A ______ is removable storage medium containing the files needed to start your computer without accessing the hard drive
boot disk
A web ___ is software program that runs on your computer that helps you access Web pages
browser
A digital ___ is specially coded electronic attachment to a file that verifies the identity of the files source
certificate
A ____ exam verifies your knowledge level about a particular technology or subject
certification
A ____ compresses a video stream when a video is stored and decompresses the file when the video is played
codec
The top level domain ___ is primarily for use by businesses
com
Certification falls into two broad categories: certificates of ____ and certification exams
completion
You can receive a certificate of ____ when you successfully complete one or more courses on a specific topic
completion
File _____ software is utility program that allows you to manually reduce the size of files
compression
_____ focuses on computer hardware and peripheral device design often at the chip level
computer engineering
A _____ typically works with servers, mainframes, and supercomputers to monitor computer performance
computer operator
The job description for a _____ includes designing coding and testing software; as well as modifying software to meet new requirements or eliminate bugs
computer programmer
____ workers are not official employees of a company
contract
A ____ is a message containing information about the user sent from a Web servers and stored on the hard drive
cookie
Online classified advertisements such as those you might find on _____ are helpful when looking for a job
craigslist.org
A _____ analyzes a companys information to determine the best way to collect and store it
database administrator
A ___ attack floods network servers with useless traffic
denial of service
Color ____ refers to the number of colors available for use in a bitmap graphic
depth
To show that you can take advantage of technology you should format your resume for ___
different computer platforms printed output web site posting or email delivery
DSL (________) is a high speed, alway on internet access technology that uses standard phone lines to transport data
digital subscriber line
You can transfer images from a digital camera to a computer using...
docking station infrared port cable not: codec
The web is a collection of ___ that can related by links
documents
The typical way to get a plug-in application, such s the adobe reader, is to ____
download it for free
______ is the broad term used to describe all shopping for goods and serves over the internet
e-commerece
A spam filter will help you avoid unwanted ___
An online job bank is database of thousands of job openings posted by
employers
A popular technology for wireless networks to wi fi, which stands for wireless ____
fidelity
A ______ is software or hardware designed to filter out suspicious data attempting to enter or leave a computer
firewall
A plug-in such as ____ is a program that lets a browser display a particular file format
flash player
A ____ backup contains a copy of every program, data, and system file on computer
full
A ____ is a smooth blending of shades from one color to another or from light to dark
gradient
RAW, gif, tif, jpeg, and bmp are formats of which type of files?
graphics
Web pages that provide a secure connection start with ____
https://
An enhanced ____ version of your resume is called an portfolio
hypertext
Which of the following computer degrees focuses on _____ applying computers to business problems ?
information systems
An ____ is software that can automate a task when given a command
intelligent agent
A _____ search agent is a program that automatically searches databases and notifies you when it finds any jobs that match your requirements
job
Most search engines work with queries in which you enter one or more words, called search terms or ____
keywords
Drive _____ assigns a drive letter to a computer, storage device, or folder located on a network computer
mapping
A ____ engine is a software program that searches web across more than one job database at a time and supplies a list of links to applicable job posting
metasearch
Some search sites us _____ to employ a series of others engines and compile the search results
metasearch engines
A ____ is a device that makes it possible to send and receive data over telephone lines
modem
A ____ is the combination of hardware, software, and connecting links that transport data
network
A color ____ holds the selection of available colors and allows you to select a group of colors to use for a bitmap graphic
palette
A ____ is a series of characters that a user creates to verify his/her user ID
password
Networks that use the ___ structure do not have a server
peer-to-peer (P2)
_____ is an email-based or IM scam designed to persuade you to reveal confidential information
phishing
A broken link icon looks like ___ and occurs when a web page link cannot find the file, url or graphic file referenced in the link
pink, blue shape
Each ____ in a picture is assigned a color, which is stored as a binary number in a file
pixel
A _____ is an audio file that is distributed through downloads or use of a feed
podcast
A ____ contains multiple outlets but cannot filter out power spikes and surges
powerstrip
A wireless network uses ____ waves, not cables to send data from one node to another
radio
____ is expressed as the number of horizontal and vertical pixels that the grid of bitmap graphic contains
resolution
_____ rate refers to the number of times per second that a sound is collected or measured during the recording process, and its expressed hertz (Hz)
sampling
A ___ digitizes printed images
scanner
An HTML _____ is a series of program instructions that can be embedded directly into the text of an html document
script
A network ____ is a computer that provides services and distributes resources to other computers on the network
server
A virus ___ is a section of program code used to identify a known malicious program
signature
Each host computer has an easy-to-remember domain that translate directly to the computers ___ IP address
static
A web servers response to a browsers request includes a (n) ____ code that indicates whether or not the browsers request can be fulfilled
status
___ video plays the video while continuing to receive it
streaming
Power ____ can damage sensitive computer parts
surges
Speech ____ is the process by which computers produce sound that resembles spoken words
synthesis
A ____ analyzed the needs of a business, its employees and its customers in order to plan and bold new or improved computer services
systems analyst
Ray ____ is the process of adjusting the colors in a rendered image to coincide with the highlights and shadows that would be produced by a light source
tracing
A ____ graphic contains the instructions that a computer needs to create the shape, size, position, and color for the graphic
vector
A computer ____ is a program that reproduces and attaches itself to a file so it can spread from file to file
virus
A _____ creates, test, posts, and modifies Web pages
web site designer
A public ____ network is a wireless LAN that provides open internet access to the public in places such as bookstores, coffee shops, airports, hotels and airports
wi fi
Data travels faster on ____ networks than on wireless networks
wired
A computer controlled by a bad bot is called a _____
zombie