CMSC 110

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

A(n) ________ address is the address that external entities use when communicating with your network. 1. WAP 2. MAC 3. IP 4. ALU

IP

The processor market for desktop and laptop computers is dominated by ________.

Intel

Select the best way to determine your RAM allocation. 1. List all programs you would run simultaneously and the amount of RAM each needs and add together. 2. Count the number of available slots on the motherboard. 3. Monitor RAM usage in performance monitor and calculate an average of RAM used over 10 random periods. 4. Divide the number of used memory slots by the number of total memory slots.

List all programs you would run simultaneously and the amount of RAM each needs and add together.

______ automatically duplicates your data and saves it on two identical drives.

Raid 1

The Windows _________ utility returns your computer to the state it was in when it came from the factory.

Refresh

________ mode puts the computer in low power usage, but keeps programs in RAM.

Sleep

_______ is the set of computer programs that allows the hardware to perform different tasks.

Software

___________ provides the instructions that tell a computer what to do 1. Hardware 2. Spam 3. Software 4. Data mining

Software

________ is the set of instructions that programmers have written in a higher-level language. 1. Compiled code 2. Executable code 3. Base code 4. Source code

Source code

________ software is used to perform calculations and numerical analyses.

Spreadsheet

Which of the following is not true about earbuds? 1. They can damage your ears if you turn the volume up too loud. 2. They can be wired or wireless. 3. They are always designed to fit over your ears. 4. They often connect in the same jack where external speakers connect.

They are always designed to fit over your ears.

Which statement does NOT describe fifth-generation languages? 1. Problems are presented as a series of facts or constraints rather than as a specific algorithm. 2. They are the most "natural" of languages. 3. The system of facts can be queried. 4. They use a set of short, English-based commands (such as SUB) that speak directly to the CPU.

They use a set of short, English-based commands (such as SUB) that speak directly to the CPU.

________ is the actual speed of data transfer that is achieved and is always less than or equal to the data transfer rate. 1. Broadband 2. Benchmark 3. LAN speed 4. Throughput

Throughput

TF: 3D sound is different from surround-sound.

True

TF: A database schema (dictionary) defines the name, data type, and length of each field in the database.

True

TF: A printer connected to a wireless network is a node on that network.

True

TF: A table in Microsoft Word or a spreadsheet in Microsoft Excel, can be used as a flat database.

True

TF: Bus networks use a passive topology.

True

TF: Computer vision is the ability for a computer to interpret visual data as human do.

True

TF: Deontology focuses on adherence to moral duties and morals and should apply to everyone equally.

True

TF: FTP enables files to be downloaded or uploaded between computers.

True

TF: In an Access database, a filter is limited to extracting data from a single table.

True

TF: Most word processing programs come with a find-and-replace tool that enables you to locate and replace specific text.

True

TF: Network attached storage devices can be set up to automatically backup data on a computer and save it on the network attacked storage device.

True

TF: P2P networks are most commonly used in home networks.

True

TF: Real-time processing means that transactions are updated when they occur.

True

TF: Rules-based AI systems are expert systems which use preprogrammed algorithms to make human-like decisions.

True

TF: Sharing files is a benefit of using a network.

True

TF: Since data transmissions can pass through fiber-optic cable in only one direction, at least two fibers are required to enable transmission of data in both directions.

True

TF: Software as a Service (SaaS) hosts web-based applications

True

TF: Solid state hybrid drives are a combination of a mechanical hard drive and an SSD drive.

True

TF: The program specifications is a clear statement of the goals and objectives of the project.

True

TF: To create a secure password, you should use a mixture of uppercase letters, lowercase letters, numbers, and symbols.

True

Which of the following ports is NOT considered to be exclusively a video port? 1. Display port 2. HDMI 3. USB 4. DVI

USB

The network architecture that spans the largest physical distance is called a ________. 1. PAN 2. HAN 3. WAN 4. LAN

WAN

You can block logical ports from invaders and make your computer invisible to others on the Internet by installing ________. 1. a firewall 2. a packet sniffer 3. a packet filter 4. antivirus software

a firewall

In public-key encryption, the two keys, one for coding and one for decoding, are known as ________. 1. a key pair 2. linked keys 3. code keys 4. key tags

a key pair

The process that converts program code into machine language is called _________. 1. compilation 2. documentation 3. execution 4. variable declaration

compilation

The keywords used in programming languages that use decisions to redirect the flow of a program are called ________. 1. control structures 2. pseudocode 3. flowcharts 4. operators

control structure

A(n) __________ software installation installs all the most commonly used files to your computer's hard drive.

full

During the process of ________, the antivirus software records key attributes about the files on your computer and keeps these statistics in a safe place on your hard drive.

inoculation

A typical ________ is made up of one or more network switches to which ISPs connect to each other.

internet exchange point (IXP)

The IPv4 protocol is beginning to be replaced by the ________ protocol.

internet protocol version 6 (IPv6)

In an Ethernet network, the signal that is sent to indicate a signal collision is called a ________ signal. 1. hit 2. jam 3. crash 4. stop

jam

A(n) ________ system provides intelligence that supplements the user's own intellect.

knowledge based

Audio clips, video clips, pictures, and extremely large documents are known as binary ________ objects.

large

An SD card is an example of a(n) ________ card.

memory

Data staging consists of all of the following steps, except ________. 1. storing the data in a warehouse 2. transforming the data 3. mining the data 4. extracting the data

mining the data

In a relational database, a(n) ________ relationship indicates that a record that appears only one time in a table, may appear multiple times in a related table.

one to many

Apple's macOS and Microsoft Windows are examples of ________ software.

operating system

Understanding your _________ will make it easier to handle situation which require ethical action.

personal ethics

With regard to computer protection, quarantining is defined as ________. 1. placing a found virus in a secure area on the hard drive 2. updating your antivirus software 3. deleting an infected file 4. repairing an infected file

placing a found virus in a secure area on the hard drive

Individual Internet users connect to ISPs through a(n) ________. 1. User Datagram Protocol (UDP) 2. point of presence (POP) 3. T line 4. optical carrier (OC) line

point of presence (POP)

Identification badges and smart keys are examples of ________ objects that users carry to identify themselves and that allow them access to a computer system or computer facility.

possessed

________ design is a systematic approach that is used to break down a problem into a series of high-level tasks.

top-down

RAM is a ________ storage location. 1. nonvolatile 2. volatile 3. permanent 4. peripheral

volatile

Microsoft Office Online is an example of a(n) _________ productivity suite.

web-based

Apple Pages is an example of ________ software which is used to create documents such as résumés, letters and research papers.

word processing

The ________ is a consortium of organizations that develops web protocols and sets standards.

world wide web consortium (W3C)

How do optical discs store data?

A laser burns tiny pits onto disc.

Which type of virus was the famous Michelangelo virus? 1. An e-mail virus 2. A time bomb 3. A worm 4. A script virus

A time bomb

I. data II. processing III. information IV. software V. hardware A. represents a fact, figure, or idea B. data organized in a meaningful way C. physical components of a computer D. turning data into information E. computer programs

A, D, B, E, C

I.switch II.firewall III.router IV.bridge V.packet A .data broken into a small segment with an address to which it is sent B. makes decisions as to where data are to be sent and rebroadcasts them to the appropriate node C. software or hardware that prevents unauthorized entry to a network D. sends data between different collision domains on a single network E. device that sends information between two networks

B, C, E, D, A

I. HAN II. MAN III. LAN IV. PAN V. WAN A. confined to a small geographic location beyond the home B. services a residence C. used to communicate among devices near an individual D. covers a city E. a network that covers the greatest distance

B, D, A, C, E

I. worm II. computer virus III. encryption virus IV. polymorphic virus V. logic bomb A. virus that is triggered when a file is opened or a program is started a certain number of times B. attempts to travel between systems through network connections to spread an infection C. virus that changes its own code to avoid detection D. program that attaches itself to another program and attempts to spread itself to other computers through the exchange of files E. a program that renders your computer files unusable by compressing them

B, D, E, C, A

__________ is a wireless transmission standard that lets you connect mobile computing devices to peripheral devices over short distances.

Bluetooth

________ uses a dedicated connection between two points with the connection remaining active for the duration of the transmission. 1. Circuit switching 2. A closed circuit 3. An open circuit 4. Packet switching

Circuit switching

I. server II. client III. network IV. piggybacking V. node A. two or more computers connected together so they can communicate B. a computer, peripheral, or communication device on a network C. computer on which users accomplish specific tasks and make specific requests D. provides information and resources to other computers on a network E. unauthorized connection to a wireless network

D, C, A, E, B

I. source code II. syntax III. compiler IV. interpreter V. operator A. program that translates code into binary 0s and 1s and ignores comments B. agreed-on set of rules defining how the language must be structured C. translates source code line by line into an intermediate form D. coding symbol that represents a fundamental action of a language E. programmers' instructions written in a higher-level language

E, B, A, C, D

TF: A stealth virus is designed to infect multiple file types to fool the antivirus software.

False

TF: An international company like Microsoft would use a MAN to connect all of its computers.

False

TF: Crowdfunding is asking for large donations from a few people.

False

TF: Employees' last name would usually make an appropriate primary key field.

False

TF: Inkjet printers use the CMOK printing process

False

TF: JavaScript uses the Device Object Model to organize the objects and page elements.

False

TF: When using multiple monitors, you must have multiple video cards.

False

TF: Your personal ethics are not influenced by your culture and religion.

False

QuickBooks is an example of ________ software.

accounting

The intersection of a row and column in a spreadsheet program is known as a _________.

cell

________ is a method of communication in which a dedicated connection is formed between two points and the connection remains active during the transmission.

circuit switching

A(n) ________ server tracks who is logging on to the network as well as which services on the network are available to each user. 1. application 2. authentication 3. dedicated 4. file

authentication

The capability of current devices to use earlier standards, in addition to the current standard, is known as ________.

backward compatibility

Computers use a ________ language consisting of 0s and 1s.

binary

Retinal scanning is an example of ________ authentication.

biometric

Automated programs which retweet news stories and quotes are known as _________ accounts.

bot

A mobile Internet connectivity plan is known as a(n) ________ plan.

data

The flowchart shape for a binary decision is a(n) ________.

diamond

The gap in access to the Internet and technical tools among people around the world is known as the ____________.

digital divide

A group of related records is called a(n) ________.

file

A(n) ________ server is a server that stores and manages files for network users. 1. file 2. e-mail 3. print 4. authentication

file

A ________ is named after a housing construction feature that slows the spread of fires from house to house. 1. fire extinguisher 2. firehouse 3. firebreak 4. firewall

firewall

All of the following activities may infect your computer with a virus EXCEPT ________. 1. downloading or running an e-mail attachment file 2. downloading video files from peer-to-peer sites 3. sharing flash drives 4. printing a document

printing a document

iWork is the __________ suite made especially for Apple customers.

productivity

When a company shows you an items for sale that you might want, but did not know existed, that company is using a(n) _____________ engine type of artificial intelligence system.

recommendation

The flowchart shape for a process is a(n) ________. 1. rectangle 2. oval 3. diamond 4. parallelogram

rectangle

A _________ uses electronic memory and has no motors or moving parts.

solid-state drive

Microsoft Excel is a(n) _________ software program.

spreadsheet

SDLC stands for _________.

systems development life cycle

<i> is an example of an HTML ________.

tag

All of the following were top cybercrimes reported to the IC3 EXCEPT ________. 1. non-auction services 2. theft of services 3. advance fee fraud 4. identity theft

theft of services


Kaugnay na mga set ng pag-aaral

BIO 111 Unit 3: Genetic Biology - Cell Division (8) and DNA Structure and Replication (9)

View Set

Chapter 36: Calculation of Medication Dosage and Medication Administration

View Set

informational/explanatory writing and coherence/ transitions test 12/2/16

View Set

CIS 263 5.7.5 Practice Questions

View Set

Fahmy French - English - Comment parler en public

View Set