Computer Concepts Exam
Which of the following examples is most likely to be in the public domain?
A photo on NASA's website
Created in 1981, ___ brought together researchers in the field of computer science.
CSNET
One of the newest additions to the Windows operating system is ___, avirtual assistant that offers users a variety of services.
Cortana
___ software is used to create and manage databases.
DBMS
Most of today's PC software and standard definition movies are sold as:
DVDs
Large organizations use ___ systems because they bring together many types of business functions into one software solution.
ERP
___ is the philosophical study of morality.
Ethics
Many programmers today use a(n) ___, which is software that helps them build their computer programs.
IDE Integrated Development Environment
Which of the following is NOT a type of memory card technology?
Mega SD
Which of the following is NOT a travel service that helps you book flights and hotels?
Monster
___ aim(s) to revolutionize AI by asking computers to process data and learn in a manner inspired by the human brain.
Neural networks
What is the name of the technology that can translate a scanned document image into text that can be edited and formatted?
OCR Optical Character Recognition
___services allow users to live-stream a variety of channels that are typically offered by cable TV subscriptions.
OTT Over The Top
___ are individuals who broadcast themselves doing an activity, such as playing video games.
Professional streamers
Social news sites, such as ___, encourage users to share links to news and other interesting content they find on the web.
Ultraportable computers will often use ___ technology exclusively, even though their storage capacity is lower than that of a traditional hard drive.
SSD
___ is the process of working for a company without being physically present at the company's office.
Telecommuting
___ allows humans to experience immersive, realistic environments that are simulated by computers, usually with the aid of special headsets.
Virtual reality
___ is the security standard for wireless communication between devices and a router.
WPA2
___ is not always considered to be a reliable site because you cannot be certain that the information you are reading comes from a credible source.
Wikipedia
A(n) ___ is a document containing an organization's policies for the ethical, secure, and appropriate use of computing resources.
acceptable use policy
Some licenses require that the user provide ___, or credit, to the author wherever the work is used.
attribution
The security principle known as ___ requires that individuals must confirm their identity.
authentication
We use the term ___ to refer to large volumes of data that are constantly being generated by our devices and digital transactions.
big data
Several ___ serve as traffic directors for all data flowing through a motherboard.
chipsets
If you want to clear an operating system's temporary files for storage, performance, or privacy reasons, you should run a disk ___ utility.
cleanup
Hacking on the largest possible scale, often referred to as ___, is conducted by countries, terrorist organizations, and large independent hacking groups.
cyberwarfare
Google ___ is a tool that allows users to view and control all their data.
dashboard
In the field known as ___, experts use modeling software and statistics to extract knowledge from large volumes of data.
data analytics
Once a computer program is compiled, the IDE will produce a(n) ___ file that can be run by the operating system on a user's computer.
executable
Copyright law contains an exception known as ___, which provides for a limited set of circumstances where others can use portions of copyrighted material without first obtaining permission.
fair use
A ___ cable consists of a thin strand of glass that transmits pulsating beams of light rather than electric current.
fiber optic
A process known as ___ allows users to install system updates from their computer's manufacturer or even install a customized operating system on Android mobile devices.
flashing
Digital ___ are effectively a trail of your data, activities, and even locations visited while carrying a smartphone.
footprints
If you wish to pass on or re-send an email message to other individuals, you should use the ___ option.
forward
Today, a ___ generally refers to an individual who uses a computer and/or network to commit a variety of crimes.
hacker
Web browsers keep a list of every website you have visited in an area known as the:
history
A ___ provides multiple ports for connecting nodes.
hub
It is through ___ that a copyright holder can grant usage or distribution rights to others.
licensing
A(n) ___ is a device that can convert digital information from a computer into analog sound waves that can be transmitted over the phone lines.
modem
The ability to run multiple programs at the same time is known as:
multitasking
A(n) ___ is a connection point in a network.
node
In the model known as ___, advertisers pay for their ads only when a website visitor clicks on the ad.
pay-per-click
When you look at the back of your system unit, you will likely find a variety of plugs known as ___.
ports
Users with broadband connections are typically equipped with a(n) ___ that connects their home's network to the internet.
residential gateway
To keep using ___ after the trial period, you must purchase a full version or a code that can be entered into the software.
shareware
The ___ economy is an expression that refers to the way in which the internet has facilitated our ability to share (usually for a price) our goods or services with other individuals.
sharing
A ___ is responsible for the development of computer software.
software engineer
The ___ feature of many smartphones allows them to act as a wireless access point for nearby devices.
tethering
When using a discussion forum, placing your message in the correct ___ will maximize your chances of getting a reply.
thread