Computer Class Midterm
When were the original HTML specifications developed by Tim Berners-Lee?
1990
Which type of mobile broadband service has maximum download rates of 300 Mbps and upload rates of 75 Mbps?
4G
ASCII requires __________ bits for each character.
7
As with other popular mobile operating systems, Android is designed for___________processors.
ARM
Which of the following is a function of the browser cache?
Any elements that it stores do not have to be downloaded again.
Two of the most common open source and free software licenses are ___________.
BSD and GPL
________ is the number of bits that is processed during a specific unit of time, usually during one second.
Bit Rate
__________ are the most commonly used database clients.
Browsers
Computers that operate in essentially the same way and use the same software are said to be
Compatible
Bit rate can be scaled down by reducing the resolution and applying_________ techniques.
Compression
A(n)_______ is a multipurpose device that accepts input, processes data, stores data, and produces output, all according to a series of stored instructions.
Computer
Which of the following is NOT a format that is used for digital audio?
DOC
The main circuits on the system board that carry data are called the _________.
Data bus
_________ is the amount of data a storage device can move per second from the storage medium to RAM.
Data transfer rate
Your_________browser is automatically used when opening a Web page or clicking on a Web link.
Default
__________ is music, speech, and other sounds represented in binary format for use in digital devices.
Digital Audio
The relationship between record types can be depicted graphically with a(n) _________.
ERD
A laser printer has a nozzle-like print head that sprays ink onto paper to form characters and graphics.
False
Access to databases is usually open to anyone within an organization or business.
False
Both scanners and digital cameras produce vector graphics.
False
Data independence is a term that refers to data and program modules being so tightly interrelated that they become difficult to modify.
False
HTTP uses port 20 for communications between a client device and a server.
False
In today's Web, most Web pages have bidirectional links.
False
MIDI files are less compact than digital audio files.
False
Memory cards are typically volatile.
False
Most Web apps require installation on your local computer or handheld device.
False
Ted Nelson developed the specifications for URLs, HTML, and HTTP.
False
The binary number system has only two digits: 1 and 2.
False
The organization that supervises Internet addressing is ARPANET.
False
Your search history is the same as your browser history.
False
Which of the following is a file management utility?
Finder and File explorer
To ensure that personal data such as credit card information is sent securely to a Web site, which of the following should appear in the address bar of your browser?
HTTPs
Which of the following is NOT a drawback of using cloud storage?
High price of storage
the browser______page is the first page displayed when the browser starts.
Home
What organization is the top-level authority for supervising domain name requests?
ICANN
__________is an Internet protocol that uses 128-bit addresses to uniquely identify devices connected to the Internet.
IPv6
Networks that form the Internet are maintained by _____________.
ISPs
Data becomes ____ when it is presented in a format that people can understand and use.
Information
Microprocessors are hard-wired to perform a limited, preprogrammed set of activities called a(n)
Instruction set
The______connects active sensors and passive tags to communication networks.
Iot
_______ are designed to provide connectivity for devices within a limited area, typically within the premises of a home, office building, business, or school.
LANs
The structure of files and folders displayed by File Explorer is called a ___________storage model because it helps you create a mental picture of the way files are organized in a hierarchy of folders.
Logical
A(n) _______________ is used to uniquely identify devices on LANs.
Mac Address
Which of the following operating systems is found on Macintosh desktop and laptop computers?
MacOS
Smart appliances are controlled by integrated circuits called
Microcontrollers
In 1971, Intel introduced the world's first called the Intel 4004.
Microprocessor
Most of today's popular operating systems offer___________services that allow two or more tasks, jobs, or programs to run simultaneously.
Multitasking
In a(n) __________ database, processing logic for the query is performed on the device that holds each database shard and if necessary, results are consolidated by the DBMS.
NoSQL
Which of the following is a common use of server-side scripting?
Online shopping websites
The term________ device is used for equipment such as printers, display devices, storage devices, mice, and headsets that are connected to the system unit of a computer.
Peripheral
On a network, file sharing allows users to open, view, edit, copy, and delete files from a remote device, provided that they have the proper
Permissions
such as write-only, specify how shared files can be used.
Permissions
Cookies that are stored on a device after a session ends are referred to as________cookies.
Persistent
Originally called microcomputers, _________ are designed to meet the computing needs of individuals.
Personal computers
An undesirable jagged appearance is referred to as
Pixelation
Which type of network topology connects a peripheral device to a host device?
Point to point
In the context of networks, a communication _________ refers to a set of rules for efficiently transmitting data from one network node to another.
Protocol
Today's color display devices represent color using the ______ color model.
RGB
The process of covering a wireframe with surface color and texture is called
Rendering
Which SQL keyword is used to search for records?
SELECT
Which of the following is NOT an HTTP method?
SEND
Word processing software is likely to include which of the following features?
Search and Replace, readability formula
A Web _________ is an Internet-based computer that stores Web site content and accepts requests from browsers.
Server
A computer that is primarily used to distribute data to other computers on a network is called a(n)
Server
Software for PCs contains a(n) _________ program that guides you through the installation process.
Setup
A(n) _________ sort uses one field to arrange records. A(n) _________ sort arranges information by more than one field.
Single leveled, multi leveled
_______________ is the process by which machines produce sound that resembles spoken words.
Speech Synthesis
What are the main software categories?
System, development, and application
A solid state drive can be used as a substitute for a hard disk drive.
True
Connection speed is technically a measure of capacity.
True
Digital photographs are stored as bitmap files.
True
Digital video uses bits to store color and brightness data for each video frame.
True
File-sharing protocols such as BitTorrent are designed to distribute the role of file server across a collection of dispersed computers.
True
In a display device, response rate is the time it takes for one pixel to change from black to white then back to black.
True
In digital video, a lower resolution reduces the bit rate.
True
Mobile broadband tethering can be used to access the Internet from a laptop or desktop computer.
True
RAM is volatile.
True
The operating system kernel stays in RAM the entire time your computer is on.
True
Unlike a sort order, an index has no bearing on the physical sequence of records on a storage device.
True
You can create HTML documents with simple text editors such as Notepad or TextEdit.
True
You can set up Wi-Fi to use wireless mesh topology OR star topology.
True
From a technical perspective, a data ________specifies the way data is represented on physical storage media and in RAM.
Type
When you change the size of a(n) __________ graphic, the objects change proportionally and maintain their smooth edges.
Vector
Which type of network covers a large geographical area and usually consists of several smaller networks, which might use different computer platforms and network technologies.
WAN
A(n) ____________ is a company that provides space on a server to house Web pages.
Website hosting service
Spreadsheet software can be used to create an on-screen__________that is based on a grid of columns and rows.
Worksheet
The ____________ is a collection of HTML documents, images, videos, and sound files that can be linked to each other and accessed over the Internet using a protocol called HTTP.
World Wide web
A Web crawler uses a search_________to methodically traverse the Web.
algorithm
The difference between a web app and a mobile app is that the program code for Web apps _________, whereas mobile apps are stored on the handheld device, so they have to be ___________.
arrives only when you use the app, downloaded and installed
A(n)__________is a copy of one or more files that are made in case the originals become damaged.
backup
An example of _______ data is the 1 million transactions generated by Walmart sales registers every hour.
big
A group of eight bits is called a _______.
byte
Information that identifies the source of a quotation or excerpted work is called a
citation
Image__________refers to any technique that recodes the data in an image file so that it contains fewer bits.
compression
A(n)___________ grants the author of a software product an exclusive right to copy, distribute, sell, and modify that work.
copyright
If you want to add a feature to your browser, such as an ad-blocker, you would need to install a browser
extension
The entire Internet contains about a zettabyte of data.
false
When saving a file, you must provide a valid file name that adheres to specific rules, referred to as _______________.
file-naming conventions
A Wi-Fi________ is a wireless local area network that provides Internet access to the public.
hotspot
Exploits that use malicious SQL statements to gain unauthorized access to a database are called SQL __________
injection
In SQL terminology, creating a relationship between tables is referred to as ________ tables.
joining
The most popular battery type used in today's electronic devices is __________.
lithium ion
The underlying structure of a database is referred to as a database
model
In the context of office suites, the term____________ refers to a component, such as a word processing program.
module
The simplest structure for storing data in a(n) _________database is the key-value data model.
noSQL
A(n) _________ database is used to collect, modify, and maintain data on a daily basis.
operational
A search________is a word or symbol used to narrow or broaden the scope of a search.
operator
A vector graphic can be converted into a bitmap graphic through a process called
rasterizing
In a database, a(n)__________holds data for a single entity.
record
There are three core elements in a relational database: fields, tables and _____________
relationships.
System_____________specify the operating system and minimum hardware capacities necessary for a software product to work correctly.
requirements
A DBMS feature known as __________ ensures that transactions accessed simultaneously by multiple users are updated in an orderly manner by establishing update rules.
serializability
To delete data from a disk in such a way that no one can ever read it, you can use special file_____________software that overwrites supposedly empty sectors with random 1s and 0s.
shredder
A(n) __________ is the column of data in a database that is used as the basis for rearranging the data.
sort key
The electronic components of most digital devices are mounted on a circuit board called a ______________.
system board, motherboard, main board
The term ________ refers to the part of a digital device that holds the system board.
system unit
Chrome OS is an example of a(n) _________ because it depends substantially on processing and storage provided by cloud-based servers.
thin client
In wireless network devices, RF signals are sent and received by a
transceiver
Modifications to the contents of a database field are made by using the SQL _________ command.
update