Cmpt Final

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Each of the following is a navigation tool available in a typical web browser

-home button -text link -favorites list NOT status code

You can identify a secure web site if you visit the web site and your browser displays any of the following

-the color green -a lock icon -https:// NOT an ActiveX control

When a broken link points to a nonexistent HTML doc, your browser typically produces a ____ Page not four error

404

______ determines how fast data travels to your computer from the internet

Bandwidth

____ is a peer-to-peer file sharing protocol that distributes the role of file servers across many computers

BitTorrent

The database that keeps track of the names that correspond to IP addresses is called the ____ Name System

Domain

_____ is the leading technology for wired networks; it is also included in some printers and other peripheral devices

Ethernet

___ is the original markup language that specifies how a web doc should appear when printed or displayed on a computer screen

HTML

Which of the following certification exams covers basic computing knowledge and skills?

IC2

A(n) ____ address is a series of numbers used to identify a network device in virtually every type of computer network

IP

The term ___ industry is used to refers to the companies that develop, produce, sell or

IT

The ____ browsing feature in Internet Explorer keeps the browser from storing any data

InPrivate

A _____ address is a physical address, a unique number assigned to a computer when it is manufactured

MAC

_____ specifies a standard way to store music data for synthesizers, electronic instruments, and computers

MIDI

_____ is malicious code designed to disrupt a computer's normal operation

Malware

When creating a Boolean search, the minus sign can be used in some search engines instead of the word _____

NOT

Which of the following file formats would not be good choice for your resume

NOT GOOD: XLSX good: DOCX RTF PDF

From a geographic perspective, networks can be classified as LAN, _____, NAN, MAN, or WAN

PAN

A password uses a combination of letters and numbers, but a ____ uses numbers only

PIN

Which of the following devices is never used to capture digital video

SCANNER

_____ allow webpages to become more interactive and to incorporate activities that would otherwise require a computer program, such as to enable e-commerce sites to verify credit card infomation

Scripts

A ___ is a device that provides a continuous supply of power failure and prevents spikes and surges from reaching your comp

UPS

___ over IP refers to technology that uses an internet connection to place telephone calls instead of regular phone system

Voice

Audio can be ______ , digital or synthesized

analog

AAC, AIF, MP3, Wave, and WMA are formats for which type of files?

audio

A method of personal identification called _____ , bases identification on a physical trait.

biometrics

A(n) ____ graphic is resoultion dependent, which means that the quality of the image relies on its resolution

bitmap

Virus experts use _____ threat to describe threats that combine more than one type of malicious program

blended

____ is a short-range wireless network technology that is designed to make its own connections between electronic devices, without wires, cables,or any direct action from a user

bluetooth

A ______ is removable storage medium containing the files needed to start your computer without accessing the hard drive

boot disk

A web ___ is software program that runs on your computer that helps you access Web pages

browser

A digital ___ is specially coded electronic attachment to a file that verifies the identity of the files source

certificate

A ____ exam verifies your knowledge level about a particular technology or subject

certification

A ____ compresses a video stream when a video is stored and decompresses the file when the video is played

codec

The top level domain ___ is primarily for use by businesses

com

Certification falls into two broad categories: certificates of ____ and certification exams

completion

You can receive a certificate of ____ when you successfully complete one or more courses on a specific topic

completion

File _____ software is utility program that allows you to manually reduce the size of files

compression

_____ focuses on computer hardware and peripheral device design often at the chip level

computer engineering

A _____ typically works with servers, mainframes, and supercomputers to monitor computer performance

computer operator

The job description for a _____ includes designing coding and testing software; as well as modifying software to meet new requirements or eliminate bugs

computer programmer

____ workers are not official employees of a company

contract

A ____ is a message containing information about the user sent from a Web servers and stored on the hard drive

cookie

Online classified advertisements such as those you might find on _____ are helpful when looking for a job

craigslist.org

A _____ analyzes a companys information to determine the best way to collect and store it

database administrator

A ___ attack floods network servers with useless traffic

denial of service

Color ____ refers to the number of colors available for use in a bitmap graphic

depth

To show that you can take advantage of technology you should format your resume for ___

different computer platforms printed output web site posting or email delivery

DSL (________) is a high speed, alway on internet access technology that uses standard phone lines to transport data

digital subscriber line

You can transfer images from a digital camera to a computer using...

docking station infrared port cable not: codec

The web is a collection of ___ that can related by links

documents

The typical way to get a plug-in application, such s the adobe reader, is to ____

download it for free

______ is the broad term used to describe all shopping for goods and serves over the internet

e-commerece

A spam filter will help you avoid unwanted ___

email

An online job bank is database of thousands of job openings posted by

employers

A popular technology for wireless networks to wi fi, which stands for wireless ____

fidelity

A ______ is software or hardware designed to filter out suspicious data attempting to enter or leave a computer

firewall

A plug-in such as ____ is a program that lets a browser display a particular file format

flash player

A ____ backup contains a copy of every program, data, and system file on computer

full

A ____ is a smooth blending of shades from one color to another or from light to dark

gradient

RAW, gif, tif, jpeg, and bmp are formats of which type of files?

graphics

Web pages that provide a secure connection start with ____

https://

An enhanced ____ version of your resume is called an portfolio

hypertext

Which of the following computer degrees focuses on _____ applying computers to business problems ?

information systems

An ____ is software that can automate a task when given a command

intelligent agent

A _____ search agent is a program that automatically searches databases and notifies you when it finds any jobs that match your requirements

job

Most search engines work with queries in which you enter one or more words, called search terms or ____

keywords

Drive _____ assigns a drive letter to a computer, storage device, or folder located on a network computer

mapping

A ____ engine is a software program that searches web across more than one job database at a time and supplies a list of links to applicable job posting

metasearch

Some search sites us _____ to employ a series of others engines and compile the search results

metasearch engines

A ____ is a device that makes it possible to send and receive data over telephone lines

modem

A ____ is the combination of hardware, software, and connecting links that transport data

network

A color ____ holds the selection of available colors and allows you to select a group of colors to use for a bitmap graphic

palette

A ____ is a series of characters that a user creates to verify his/her user ID

password

Networks that use the ___ structure do not have a server

peer-to-peer (P2)

_____ is an email-based or IM scam designed to persuade you to reveal confidential information

phishing

A broken link icon looks like ___ and occurs when a web page link cannot find the file, url or graphic file referenced in the link

pink, blue shape

Each ____ in a picture is assigned a color, which is stored as a binary number in a file

pixel

A _____ is an audio file that is distributed through downloads or use of a feed

podcast

A ____ contains multiple outlets but cannot filter out power spikes and surges

powerstrip

A wireless network uses ____ waves, not cables to send data from one node to another

radio

____ is expressed as the number of horizontal and vertical pixels that the grid of bitmap graphic contains

resolution

_____ rate refers to the number of times per second that a sound is collected or measured during the recording process, and its expressed hertz (Hz)

sampling

A ___ digitizes printed images

scanner

An HTML _____ is a series of program instructions that can be embedded directly into the text of an html document

script

A network ____ is a computer that provides services and distributes resources to other computers on the network

server

A virus ___ is a section of program code used to identify a known malicious program

signature

Each host computer has an easy-to-remember domain that translate directly to the computers ___ IP address

static

A web servers response to a browsers request includes a (n) ____ code that indicates whether or not the browsers request can be fulfilled

status

___ video plays the video while continuing to receive it

streaming

Power ____ can damage sensitive computer parts

surges

Speech ____ is the process by which computers produce sound that resembles spoken words

synthesis

A ____ analyzed the needs of a business, its employees and its customers in order to plan and bold new or improved computer services

systems analyst

Ray ____ is the process of adjusting the colors in a rendered image to coincide with the highlights and shadows that would be produced by a light source

tracing

A ____ graphic contains the instructions that a computer needs to create the shape, size, position, and color for the graphic

vector

A computer ____ is a program that reproduces and attaches itself to a file so it can spread from file to file

virus

A _____ creates, test, posts, and modifies Web pages

web site designer

A public ____ network is a wireless LAN that provides open internet access to the public in places such as bookstores, coffee shops, airports, hotels and airports

wi fi

Data travels faster on ____ networks than on wireless networks

wired

A computer controlled by a bad bot is called a _____

zombie


Kaugnay na mga set ng pag-aaral

Steps for Simplifying a Complex Fraction

View Set

CSP- Digital Information, Internet and Algorithms

View Set

Chapter 3 Malicious attacks, threats and Vulnerabilities.

View Set

CHAPTER 18 Newborn at Risk: Conditions Present at Birth

View Set

Chapter 6 - Lab: Overview of the Skeleton

View Set

Your Rights: Personal Privacy QUIZ

View Set

CYBR1-Domain 5.0 Review MC-Format (N10-008) (101)

View Set

Hinkle Chapter 28: Management of Patients with Structural, Infectious and Inflammatory Cardiac Disorders

View Set

Lesson 1 - French Wars of Religion Unit 6

View Set