Computer Concepts Final Review
Diagonal
A CRT monitor's viewable size is the _____ measurement of the actual viewing area provided by the screen in the monitor.
PERT chart
A _____ analyzes the time required to complete a task and identifies the minimum time required for an entire project.
magnetic stripe
A _____ card is a credit card, entertainment card, bank card, or other similar card, with a stripe that contains information identifying you and the card.
Gadget
A _____ is a mini-program with minimal functionality that connects to another program or provides information.
Rootkit
A _____ is a program that hides in a computer and allows someone from a remote location to take full control of the computer.
photo sharing community
A _____ is a specific type of social networking web site that allows users to create an online photo album and store and share their digital photos.
mashup
A _____ is a web application that combines services from two or more sources, creating a new application.
Microblog
A _____ is a website that allows users to post short text updates, usually between 100 and 200 characters.
denial of service attack
A _____ is an assault whose purpose is to disrupt computer access to an internet service such as the web or e-mail.
Podcast
A _____ is recorded audio stored on a web site that can be downloaded to a computer or portable media player.
reduces cost of maintenance and increases
A centralized approach to information systems usually _____ manageability.
provides for storage and management of a company's documents
A document management system _____.
RAID
A group of two or more integrated hard disks is called a _____.
Registers
A processor contains small, high-speed storage locations, called _____, that temporarily hold data and instructions.
determines whether a number is within a specified range
A range check _____.
selective backup
A(n) _____ allows a user to choose specific files to backup, regardless of whether or not the files have changed.
ergonomic keyboard
A(n) _____ has a design that reduces the change of wrist and hang injuries.
front side bus
A(n) _____ is a part of the mother-board and connects the processor to main memory.
phishing filter
A(n) _____ is a program that warns or blocks you from potentially fraudulent or suspicious web sites.
encryption key
A(n) _____ is a programmed formula that the originator of the data uses to encrypt the plaintext and the recipient of the data uses to decrypt the ciphertext.
Thumbnail
A(n) _____ is a small version of a larger graphic.
interactive whiteboard
A(n) _____ is a touch-sensitive device, resembling a dry-erase board, that displays the image on a connected computer screen.
optical disk
A(n) _____ is a type of storage media that consist of a flat, round, portable disc made of metal, plastic, and lacquer that is written and read by a laser.
port replicator
A(n) _____ is an external device that provides connections to peripherals through ports built into the device.
legacy system
A(n) _____ is an information system that has existed within the organization for an extended length of time and is relied upon heavily.
newsgroup/message board
A(n) _____ is an online area where users have written discussions.
decision table
A(n) _____ lists a variety of conditions and the actions that correspond to each condition.
Instant
A(n) _____ message is a real-time internet communication, where you exchange messages with other connected users.
Acceptance
A(n) _____ test is performed by end-users and checks the new system to ensure that it works with actual data.
docking station
A(n) _____, which is an external device that attaches to a mobile computer or device, contains a power connection and provides connection to peripherals; it usually also includes slots for memory cards, optical disc drives, and other devices.
less complexity
All of the following are strengths of the database, except _____.
put the most important terms last
All of the following techniques can be used to improve web searches except _____.
graphics tablet
Architects, mapmakers, designers, artists, and home users create drawings and sketches on a _____.
social engineering
As related to the use of computers, _____ is defined as gaining unauthorized access or obtaining confidential information by taking advantage of the trusting human nature of some victims and the naivety of others.
Periods
As with an IP address, the components of a domain name are separated by _____.
data dictionary
Because the _____ contains details about data, some call it metadata (meta means more comprehensive).
computers and their uses
Computer literacy, also known as digital literacy, involves having a current knowledge and understanding of _____.
contiguous sectors, which speeds
Defragmenting reorganizes the files on a disk so that they are located in _____ access time.
mandated by management or some other governing body
During the planning phase the projects that receive the highest priority are those _____.
fibre channel
Enterprises often use _____ technology to connect ot storage systems at data rates up to Gbps.
letters, reports, and e-mail messages
Examples of output that primarily contain text-based documents are _____.
project request
In larger organizations, users write a formal request for a new or modified information system, which is called a _____.
composite key
In some tables, the primary key consists of multiple fields, called a _____.
dots per inch (dpi)
Ink-jet printer resolution is measured by the number of _____ a printer can print.
rootkits, worms, and back doors
Malware is a term that can be used to describe _____.
enterprise computing
Many large companies use the word(s), _____ to refer to the huge network of computers that meets their diverse computing needs.
principle of least privilege
Many organizations adopt the _____ policy, where users access privileges are limited to the lowest level necessary to perform required tasks.
tape library
On larger computers, tape cartridges are mounted in a separate cabinet called a(n) _____.
hardware theft
Physical access controls, such as locked doors and windows, usually are adequate to protect against _____.
radio signals
RFID is a technology that uses _____ to communicate with a tag placed in or attached to an object, an animal, or a person.
Firmware
ROM chips, called _____, contain permanently written data, instructions, or information.
power usage effectiveness (PUE)
Some organizations continually review their _____, which is a ratio that measures how much power enters the computer facility, or data center, against the amount of power required to run the computers.
predictive text input
Some phones use _____, where you press one key on the keypad for each letter in a word and software on the phone predicts the word you want.
massive parallel processing
Supercomputers use _____ for applications such as artificial intelligence and weather forecasting.
CMOS
The ____ chip, which uses battery power, stores configuration information about the computer.
display port
The _____ is an alternative to DVI that also supports HDMI.
control unit
The _____ is the component of the processor that directs and coordinates most of the operations in the computer.
decides on the proper placement of fields
The database analyst (DA) _____.
if the multifunctional peripheral breaks down, all functions are lost
The primary disadvantage of multifunctional peripherals is that _____.
central processing unit (CPU)
The processor also is called the _____.
system proposal
The purpose of the _____ is to access the feasibility of each alternative solution and then recommend the most feasible solution for the project.
VPN tunnel
The secure connection created between user's computer and a company's network is called a(n) _____.
multi-touch
Touch screens that recognize multiple points of contact at the same time are known as _____.
longitudinal recording
Traditionally, hard disks stored data using _____, which aligned the magnetic particles horizontally around the surface of the disk.
save time by storing large files instantaneously, allow others to access their files, and store offsite backups of data
Users subscribe to a cloud storage service to _____.
quality control software
Using statistical analysis, _____ can identify and predict product defects and problems with the company's processes.
a web conference
When an online meeting takes place on the web, it is called _____.
Index
When you enter search criteria, instead of looking through every file and folder on the storage medium, the search utility looks through the _____ first to find a match.
windows readyboost
Windows users can increase the size of memory through _____, which can allocate available storage space on removable flash memory devices as additional memory cache.
gesture recognition
With _____, the computer will detect human motions.
visual voicemail
With _____, users can view message details such as the length of calls and, in some cases, read message contents instead of listening to them.
photo management software
With _____, you can view, organize, sort, catalog, print, and share digital photos.
a neutral network
____ is a system that attempts to initiate the behavior of the human brain.
project management software
_____ allows a user to plan, schedule, track, and analyze the events, resources, and costs of a project.
music production software
_____ allows users to record, compose, mix, and edit music and sounds.
hubs and switches
_____ are devices that provide a common central connection point for nodes on the network.
SMBs
_____ are smaller in size than enterprises and typically do not have an international presence.
Hypermedia
_____ combines text-based links with graphics, audio, and video links.
coaxial cable
_____ consist of a single copper wire surrounded by at least three layers.
system software
_____ consists of the programs that control or maintain the operations of the computer and its devices.
personal DTP software
_____ helps home and small business users create newsletters, brochures, advertisements, postcards, greeting cards, letterhead, business cards, banners, calendars, logos, and web pages.
business intelligence
_____ includes several types of applications and technologies for acquiring, storing, analyzing, and providing access to information to help users make more sound business decisions.
Timely
_____ information has an age suited to its use.
digital forensics
_____ involves the examination of computer media, programs, data, and log files on computers, serves, and networks.
a software suite
_____ is a collection of individual programs available together as a unit.
Adware
_____ is a program that displays an online advertisement in a banner or pop-up window on webpages, email, or other internet services.
mobile TV
_____ is a service that provides television programs over the cellular network.
RFID
_____ is a standard, specifically a protocol, that defines how a network uses radio signals to communicate with a tag placed in or attached to an object, an animal, or a person.
extreme project management
_____ is a team-driven project management approach, in which a project leader is more of a participant and facilitator than a manager during the project.
force feedback
_____ is a technology that sends resistance to a device in response to actions of the users.
windows firewall
_____ is a utility that detects and protects a personal computer from unauthorized intrusions.
packaged software
_____ is mass-produced, copyrighted retail software that meets the needs of a wide variety of users, not just a single user or company.
Netiquette
_____ is the code of acceptable behaviors users should follow while on the internet.
voice recognition
_____ is the computer's capability of distinguishing spoken words.
online help
_____ is the electronic equivalent of a user manual.
Uploading
_____ is the process of transferring documents, graphics, and other objects from your computer to a server on the internet.
transfer rate
_____ is the speed with which data, instructions, and information transfer to and from a device.
Data
_____ is/are a collection of unprocessed items, which can include text, numbers, images, audio, and video.
A cellular radio network
_____ offers high-speed internet connections to devices with built-in compatible technology or computers with wireless modems.
file maintenance
_____ procedures include adding records to, modifying records in, and deleting records from a file.
document management
_____ software provides a means for sharing, distributing, and searching through documents by converting them into a format that can be viewed by any user.
computer-aided software engineering (CASE)
_____ tools are designed to support one or more activities of system development.
OLED
_____ uses organic molecules that produce an even brighter, easier-to-read display than standard TFT displays.
Lightscribe
_____, technology works with specially coated optical discs to etch labels directly on the disc.