CMSC 110
A(n) ________ address is the address that external entities use when communicating with your network. 1. WAP 2. MAC 3. IP 4. ALU
IP
The processor market for desktop and laptop computers is dominated by ________.
Intel
Select the best way to determine your RAM allocation. 1. List all programs you would run simultaneously and the amount of RAM each needs and add together. 2. Count the number of available slots on the motherboard. 3. Monitor RAM usage in performance monitor and calculate an average of RAM used over 10 random periods. 4. Divide the number of used memory slots by the number of total memory slots.
List all programs you would run simultaneously and the amount of RAM each needs and add together.
______ automatically duplicates your data and saves it on two identical drives.
Raid 1
The Windows _________ utility returns your computer to the state it was in when it came from the factory.
Refresh
________ mode puts the computer in low power usage, but keeps programs in RAM.
Sleep
_______ is the set of computer programs that allows the hardware to perform different tasks.
Software
___________ provides the instructions that tell a computer what to do 1. Hardware 2. Spam 3. Software 4. Data mining
Software
________ is the set of instructions that programmers have written in a higher-level language. 1. Compiled code 2. Executable code 3. Base code 4. Source code
Source code
________ software is used to perform calculations and numerical analyses.
Spreadsheet
Which of the following is not true about earbuds? 1. They can damage your ears if you turn the volume up too loud. 2. They can be wired or wireless. 3. They are always designed to fit over your ears. 4. They often connect in the same jack where external speakers connect.
They are always designed to fit over your ears.
Which statement does NOT describe fifth-generation languages? 1. Problems are presented as a series of facts or constraints rather than as a specific algorithm. 2. They are the most "natural" of languages. 3. The system of facts can be queried. 4. They use a set of short, English-based commands (such as SUB) that speak directly to the CPU.
They use a set of short, English-based commands (such as SUB) that speak directly to the CPU.
________ is the actual speed of data transfer that is achieved and is always less than or equal to the data transfer rate. 1. Broadband 2. Benchmark 3. LAN speed 4. Throughput
Throughput
TF: 3D sound is different from surround-sound.
True
TF: A database schema (dictionary) defines the name, data type, and length of each field in the database.
True
TF: A printer connected to a wireless network is a node on that network.
True
TF: A table in Microsoft Word or a spreadsheet in Microsoft Excel, can be used as a flat database.
True
TF: Bus networks use a passive topology.
True
TF: Computer vision is the ability for a computer to interpret visual data as human do.
True
TF: Deontology focuses on adherence to moral duties and morals and should apply to everyone equally.
True
TF: FTP enables files to be downloaded or uploaded between computers.
True
TF: In an Access database, a filter is limited to extracting data from a single table.
True
TF: Most word processing programs come with a find-and-replace tool that enables you to locate and replace specific text.
True
TF: Network attached storage devices can be set up to automatically backup data on a computer and save it on the network attacked storage device.
True
TF: P2P networks are most commonly used in home networks.
True
TF: Real-time processing means that transactions are updated when they occur.
True
TF: Rules-based AI systems are expert systems which use preprogrammed algorithms to make human-like decisions.
True
TF: Sharing files is a benefit of using a network.
True
TF: Since data transmissions can pass through fiber-optic cable in only one direction, at least two fibers are required to enable transmission of data in both directions.
True
TF: Software as a Service (SaaS) hosts web-based applications
True
TF: Solid state hybrid drives are a combination of a mechanical hard drive and an SSD drive.
True
TF: The program specifications is a clear statement of the goals and objectives of the project.
True
TF: To create a secure password, you should use a mixture of uppercase letters, lowercase letters, numbers, and symbols.
True
Which of the following ports is NOT considered to be exclusively a video port? 1. Display port 2. HDMI 3. USB 4. DVI
USB
The network architecture that spans the largest physical distance is called a ________. 1. PAN 2. HAN 3. WAN 4. LAN
WAN
You can block logical ports from invaders and make your computer invisible to others on the Internet by installing ________. 1. a firewall 2. a packet sniffer 3. a packet filter 4. antivirus software
a firewall
In public-key encryption, the two keys, one for coding and one for decoding, are known as ________. 1. a key pair 2. linked keys 3. code keys 4. key tags
a key pair
The process that converts program code into machine language is called _________. 1. compilation 2. documentation 3. execution 4. variable declaration
compilation
The keywords used in programming languages that use decisions to redirect the flow of a program are called ________. 1. control structures 2. pseudocode 3. flowcharts 4. operators
control structure
A(n) __________ software installation installs all the most commonly used files to your computer's hard drive.
full
During the process of ________, the antivirus software records key attributes about the files on your computer and keeps these statistics in a safe place on your hard drive.
inoculation
A typical ________ is made up of one or more network switches to which ISPs connect to each other.
internet exchange point (IXP)
The IPv4 protocol is beginning to be replaced by the ________ protocol.
internet protocol version 6 (IPv6)
In an Ethernet network, the signal that is sent to indicate a signal collision is called a ________ signal. 1. hit 2. jam 3. crash 4. stop
jam
A(n) ________ system provides intelligence that supplements the user's own intellect.
knowledge based
Audio clips, video clips, pictures, and extremely large documents are known as binary ________ objects.
large
An SD card is an example of a(n) ________ card.
memory
Data staging consists of all of the following steps, except ________. 1. storing the data in a warehouse 2. transforming the data 3. mining the data 4. extracting the data
mining the data
In a relational database, a(n) ________ relationship indicates that a record that appears only one time in a table, may appear multiple times in a related table.
one to many
Apple's macOS and Microsoft Windows are examples of ________ software.
operating system
Understanding your _________ will make it easier to handle situation which require ethical action.
personal ethics
With regard to computer protection, quarantining is defined as ________. 1. placing a found virus in a secure area on the hard drive 2. updating your antivirus software 3. deleting an infected file 4. repairing an infected file
placing a found virus in a secure area on the hard drive
Individual Internet users connect to ISPs through a(n) ________. 1. User Datagram Protocol (UDP) 2. point of presence (POP) 3. T line 4. optical carrier (OC) line
point of presence (POP)
Identification badges and smart keys are examples of ________ objects that users carry to identify themselves and that allow them access to a computer system or computer facility.
possessed
________ design is a systematic approach that is used to break down a problem into a series of high-level tasks.
top-down
RAM is a ________ storage location. 1. nonvolatile 2. volatile 3. permanent 4. peripheral
volatile
Microsoft Office Online is an example of a(n) _________ productivity suite.
web-based
Apple Pages is an example of ________ software which is used to create documents such as résumés, letters and research papers.
word processing
The ________ is a consortium of organizations that develops web protocols and sets standards.
world wide web consortium (W3C)
How do optical discs store data?
A laser burns tiny pits onto disc.
Which type of virus was the famous Michelangelo virus? 1. An e-mail virus 2. A time bomb 3. A worm 4. A script virus
A time bomb
I. data II. processing III. information IV. software V. hardware A. represents a fact, figure, or idea B. data organized in a meaningful way C. physical components of a computer D. turning data into information E. computer programs
A, D, B, E, C
I.switch II.firewall III.router IV.bridge V.packet A .data broken into a small segment with an address to which it is sent B. makes decisions as to where data are to be sent and rebroadcasts them to the appropriate node C. software or hardware that prevents unauthorized entry to a network D. sends data between different collision domains on a single network E. device that sends information between two networks
B, C, E, D, A
I. HAN II. MAN III. LAN IV. PAN V. WAN A. confined to a small geographic location beyond the home B. services a residence C. used to communicate among devices near an individual D. covers a city E. a network that covers the greatest distance
B, D, A, C, E
I. worm II. computer virus III. encryption virus IV. polymorphic virus V. logic bomb A. virus that is triggered when a file is opened or a program is started a certain number of times B. attempts to travel between systems through network connections to spread an infection C. virus that changes its own code to avoid detection D. program that attaches itself to another program and attempts to spread itself to other computers through the exchange of files E. a program that renders your computer files unusable by compressing them
B, D, E, C, A
__________ is a wireless transmission standard that lets you connect mobile computing devices to peripheral devices over short distances.
Bluetooth
________ uses a dedicated connection between two points with the connection remaining active for the duration of the transmission. 1. Circuit switching 2. A closed circuit 3. An open circuit 4. Packet switching
Circuit switching
I. server II. client III. network IV. piggybacking V. node A. two or more computers connected together so they can communicate B. a computer, peripheral, or communication device on a network C. computer on which users accomplish specific tasks and make specific requests D. provides information and resources to other computers on a network E. unauthorized connection to a wireless network
D, C, A, E, B
I. source code II. syntax III. compiler IV. interpreter V. operator A. program that translates code into binary 0s and 1s and ignores comments B. agreed-on set of rules defining how the language must be structured C. translates source code line by line into an intermediate form D. coding symbol that represents a fundamental action of a language E. programmers' instructions written in a higher-level language
E, B, A, C, D
TF: A stealth virus is designed to infect multiple file types to fool the antivirus software.
False
TF: An international company like Microsoft would use a MAN to connect all of its computers.
False
TF: Crowdfunding is asking for large donations from a few people.
False
TF: Employees' last name would usually make an appropriate primary key field.
False
TF: Inkjet printers use the CMOK printing process
False
TF: JavaScript uses the Device Object Model to organize the objects and page elements.
False
TF: When using multiple monitors, you must have multiple video cards.
False
TF: Your personal ethics are not influenced by your culture and religion.
False
QuickBooks is an example of ________ software.
accounting
The intersection of a row and column in a spreadsheet program is known as a _________.
cell
________ is a method of communication in which a dedicated connection is formed between two points and the connection remains active during the transmission.
circuit switching
A(n) ________ server tracks who is logging on to the network as well as which services on the network are available to each user. 1. application 2. authentication 3. dedicated 4. file
authentication
The capability of current devices to use earlier standards, in addition to the current standard, is known as ________.
backward compatibility
Computers use a ________ language consisting of 0s and 1s.
binary
Retinal scanning is an example of ________ authentication.
biometric
Automated programs which retweet news stories and quotes are known as _________ accounts.
bot
A mobile Internet connectivity plan is known as a(n) ________ plan.
data
The flowchart shape for a binary decision is a(n) ________.
diamond
The gap in access to the Internet and technical tools among people around the world is known as the ____________.
digital divide
A group of related records is called a(n) ________.
file
A(n) ________ server is a server that stores and manages files for network users. 1. file 2. e-mail 3. print 4. authentication
file
A ________ is named after a housing construction feature that slows the spread of fires from house to house. 1. fire extinguisher 2. firehouse 3. firebreak 4. firewall
firewall
All of the following activities may infect your computer with a virus EXCEPT ________. 1. downloading or running an e-mail attachment file 2. downloading video files from peer-to-peer sites 3. sharing flash drives 4. printing a document
printing a document
iWork is the __________ suite made especially for Apple customers.
productivity
When a company shows you an items for sale that you might want, but did not know existed, that company is using a(n) _____________ engine type of artificial intelligence system.
recommendation
The flowchart shape for a process is a(n) ________. 1. rectangle 2. oval 3. diamond 4. parallelogram
rectangle
A _________ uses electronic memory and has no motors or moving parts.
solid-state drive
Microsoft Excel is a(n) _________ software program.
spreadsheet
SDLC stands for _________.
systems development life cycle
<i> is an example of an HTML ________.
tag
All of the following were top cybercrimes reported to the IC3 EXCEPT ________. 1. non-auction services 2. theft of services 3. advance fee fraud 4. identity theft
theft of services
