Computer Input, Computer Storage, Computer Output, Computer Security, Hardware, Networking and Connecting to the Internet, Buying a Computer
The art and science of creating output that provides information in the most useful manner is called _____.
Ergonomics
Hardware or software used to keep a computer secure from outside threats such as hackers and viruses by allowing or blocking Internet traffic is called a _____.
Firewall
A person who gains unauthorized access to networks in order to steal and corrupt information and data is called a _____.
Hacker
Firewall software used to block a user's access to specific Internet content is called a(n) _____ filter.
Internet
Which of these browsers was developed by Microsoft?
Internet Explorer
The ___ cache is located directly on the processor itself.
L1
The 2 most common audio file formats are WAV and ____.
MP4
Broadband is measured in
Mbps
A commonly-used short range wireless technology used for data transfer and electronic payments is called
NFC (near field communication)
What manages hardware and software, supports the computer's basic functions, and runs programs?
Operating system
Using reflective material to store data that can be read using a laser is called _____ media storage.
Optical
An input, output, or storage device connected to a computer is known as a(n) ____.
Peripheral
The smallest controllable element of an image is called a(n) _____.
Pixel
Which type of touchscreen uses a single metallic-coated panel and uses electricity to calculate touch points?
Projective capacitive
____ is actually storage since it retains data and information when the power has been turned off.
ROM (read only memory)
RFID stands for which of the following.
Radio Frequency Identification
In general, the _____ the access time, the faster the hard drive.
Shorter
Increased data transfer will be less likely to have errors if you use a _____ USB cord.
Shorter
An unsolicited email message is called ____.
Spam
What group determines the standards for the World Wide Web?
The World Wide Web Consortium (W3C)
A kilobyte is equal to approximately one ____ bytes.
Thousand
The World Wide Web was created through a collaboration led by
Tim Berners-Lee
Laser printers are popular in offices because they use relatively inexpensive _____.
Toner
A terabyte equals approximately one _____ bytes.
Trillion
What type of port do most digital devices use to attach peripherals?
USB port
URL stands for ____ Resource Locator.
Uniform
Persistent cookies store information about _____.
User preferences
Software that infects a computer and is created using computer code is called a computer _____.
Virus
The original wireless network privacy and protection standard for WiFi was known as
WEP
Non-malicious computer security experts that test the security measures of an organization's information systems to ensure they are protected against malicious intrusions are called ____.
White Hat Hackers
The protocol for wireless networks is called ___
WiFi
Many cellular ISPs offer modem/router combination devices that can create a ____ wherever there's adequate cell service.
WiFi hotspot
WWW stands for
World Wide Web
A destructive program that replicates itself throughout a single computer or across a network is called a _____.
Worm
A computer controlled by a hacker is called a ____.
Zombie
Smartphone cameras work by focusing incoming light onto what type of array that captures images?
active pixel scanner
When discussing digital cameras or smartphone cameras with APS CMOS, APS stands for
active pixel sensor
What 3 items are needed to install a home WiFi network?
an Internet signal, a modem, a router
The volume of data that can be carried on an Internet transmission media in an amount of time is called
bandwidth
Represented as either a 0 or 1, a ____ is the smallest unit of data a computer can process.
bit
An Internet signal that has enough bandwidth to allow multiple computers to be connected to the same router is called a ____ signal.
broadband
Software applications that allow users to access and surf the World Wide Web are called
browsers
The two major factors that impact processor speed are clock speed and _____ .
bus width
Data flows between different parts of the computer via _____ .
buses
Which might be a choice for Internet service in your area?
cable Internet
In addition to the RAM, modern processors temporarily keep frequently accessed data in a _____.
cache
Magnetic Ink Recognition (MICR) is a technology that is most commonly seen on
checks
Screensize is measured by the ___ across the monitor
diagonal
Screen size is measured by the ___.
diagonal distance between the upper right and lower left of the screen
A ____ name identifies a server site on the Internet.
domain
Routers that can send Internet signals over 2 distinct frequencies are called ____ routers.
dual band
Using a stylus and touchpad to map the signature and also measure pressure, pen angle, pen up/down, speed, etc, is known as what type of signature recognition?
dynamic
The machine cycle consists of which four steps?
fetch, decode, execute, store
Software that limits the material that a browser fetches or that a search engine displays are called
filters
Typical SSD capacities for tablet computers or smartphones are measured in ____ .
gigabytes
The visual image output that a computer creates is known as ____ .
graphics
What is equal to one cycle per second?
hertz
The cost of an SSD is ____ than the cost of a traditional hard drive.
higher
When determining how much cell phone data you need it is important to consider
how much data you currently use
A television remote usually uses ___ waves.
infrared(IR)
These facilitate getting data and information into your computer.
input devices
The word modem stands for
modulator-demodulator
In photography, there are 2 ways to focus on distant objects, digital zoom and ____ zoom.
optical
With optical zoom, resolution ____ when focusing on distant objects.
remains the same
The number of pixels in an image is called the image's
resolution
A processor comprised of one control unit and one ALU is called a ____ .
single-core processor
Contact your ISP if your actual Internet speed is ____ than advertised.
slower
The average tablet computer has a ____ hard drive than the average desktop computer.
smaller
A combination input and output device that allows users to interact with large computer displays that is sometimes found in classrooms is called an interactive whiteboard or a
smartboard
The component of a computer that allows data to be retained after power is turned off is referred to as the _____.
storage
Because they're inexpensive and reliable ___ have become extremely popular storage devices.
thumbdrives (USB or flash drives)
Many computers today use _____ which is a coding scheme using at least 16 bits to represent a character.
unicode
If you buy a new computer game that emphasizes graphics, or new photo/video editing software for your desktop computer, you may want to purchase a new ___ card.
video
A camera that takes photos or streams video into a computer or over the Internet is called a
webcam
The maximum number of bits per instruction that a CPU can process during 1 machine cycle is called ___ .
word size
Select the domain name.
www.cnet.com
"Full HD" resolution is expressed as:
1920x1080
Most new laptop computers come with how much storage?
256 GB to 1 TB
FireWire connectors were developed for ___ computers.
Apple
One character of information, for example, a letter or a number, consists of one _____ of storage.
Byte
DVDs store data using _____: A. A magnetic coating that is sensed by a read/write head B. Electronic circuits C. A reflective coating that has pits and lands D.A blue spectrum laser beam
C
Emailing a file to yourself is an example of using ______ storage.
Cloud
A crime in which a computer is the object of the crime or is used to commit a crime or offense is called a _____.
Cybercrime
Which of the following might contain a traditional (magnetic) hard drive?
Dell desktop computer
Personal computer CPU clock speeds range between _______ .
2 to 4 gigahertz
SAGE was developed by the US Department of
Defense
What does DDoS stand for?
Distributed Denial of Service
A protocol commonly used to transfer large files from one server to another on the Internet is the
File Transfer Protocol
The ___ is a computer within your computer that creates images.
GPU
A separate processor (computer) in your computer that enhances your video is called the ___ .
Graphic processor (GPU)
Lower range tones generally require _____ speakers.
Larger
A million bytes of data equals approximately one ____.
Megabyte
The technology that uses the reflection of a laser of the graphite left by a #2 pencil to determine if a bubble has been filled in is called
OMR
Many manufacturers have made _____ optional equipment when purchasing a new laptop computer.
Optical drives
The standard for wireless network privacy and protection is known as
WPA2
The technology that allows any text, even handwritten scrawls, to be digitized is known as optical ____ recognition.
character
Devices with a separate system unit and a relatively large footprint are called _____ computers.
desktop
Memory is ___ and has no moving parts.
electronic (solid state)
Which transmission media has the largest bandwidth?
fiber optic
The actual number of pixels in a monitor is called ___ resolution.
native
Devices that allow for the retention of data when your computer has been shut down are called ___ devices.
storage
A security system separating 2 networks or even computers on the same network is called a
switch
Select the smartphone input device.
touchscreen or keyboard
The technology that uses cameras, microphones, displays, speakers and software to allow users to both see and hear each other is called
video conferencing
Most smartphones and tablets produced today use a ____ keyboard.
virtual
Blu-rays provide approximately ____ of storage space.
25 GB
According to YouTube, approximately how much video is uploaded to its site every minute?
300 hours
Sometimes used to create prototype models for casting, ___ printing is also known as additive printing.
3D
When you buy a new laptop, how much RAM should it come with?
4-8 GB
CDs provide approximately ______ of storage space.
700 MB
All of the following are common ports that are included with laptop computers except: A. MIDI ports B. Ethernet ports C. HDMI ports D. USB ports
A
Blu-ray stores data using: A. Pits and lands that are read by a blue spectrum laser beam B. A metal platter with a reflective coating C. A magnetic coating that is sensed by a read/write head D. Electronic circuits
A
One type of storage device is a: A. USB drive B. RAM C. Microphone D. CPU
A
Which of the following is a strength of the Android platform? A. Most widely used OS for smartphones and tablets B. Used on most iPhones C. Most widely used OS for desktops and laptops D. Owned by Microsoft corporation
A
Which of the following might be risky to uninstall from a Windows PC laptop? A. Microsoft Works 6-9 Converter B. Cisco WebEx Meetings C. Angry Birds D. Apple Software Update
A
Which of the following represents the highest amount of storage? A. Terabyte B. Kilobyte C. Megabyte D. Gigabyte
A
Which of the following represents the least amount of storage: A. kilobyte B. megabyte C. gigahertz D. gigabyte
A
Software that collects the user's web browsing history and uses the data collected to create unsolicited targeted pop-up advertisements is called ____.
Adware
The mouse was developed by which company?
Apple
One disadvantage of cloud storage is that: A. When a DVD gets scratched, data can be irretrievably lost B. Data is only available when you're online C. Over time, data stored on the cloud deteriorates D. Because of their small size, thumb drives can be easily lost
B
Solid state drives store data using _____: A. Laser markings B. Electronic circuits C. Reflective coatings D. Magnetically charged particles
B
Inkjet printers are often sold _____ their production cost.
Below
A gigabyte equals approximately one ____ bytes.
Billion
The smallest unit of data storage is a _____.
Bit
This technology provides short-distance wireless communication between electronic devices using extremely low power radio signals.
Bluetooth
A group of compromised computers controlled by a hacker is called a ____.
Botnet
One of the largest data requirements of the future will likely be _____: A. Retinal scans B. Storing fingerprints C. Mapping patients' genomes D. Facial recognition data
C
Which is true regarding the length of a USB cord? A. Cord length has nothing to do with data transmission amounts B. In general, the more data being transmitted, the longer the cord should be C. In general, the more data being transmitted, the shorter the cord should be D. A USB 1.0 cord has more bandwidth than a USB 2.0 cord
C
Which of the following would be considered a cybercrime? A. Spam B. Adware C. Data manipulation D. Third-party cookies
C
Which optical drive media stores approximately 700 MBs of data?
CD
Because it allows their files to be accessed from any device on the Internet, many users like to back-up their files using ____ storage.
Cloud
The fact that data on servers is nearly always backed up onto other servers gives ____ storage a major advantage over other storage methods.
Cloud
Sage was developed during the ____ war.
Cold
The number of bits of data describing each pixel in a display is referred to as ____.
Color depth
A digital device that accepts input, processes and stores the input, and provides output is a _____.
Computer
A description of the difference in the luminescence of a display's black and white pixels is called ____.
Contrast ratio
A site on the Windows operating system where you can uninstall programs, adjust settings, and manage tasks is the ______.
Control panel
A small text file of information created by websites you visit that your web browser stores on your hard disk is called a(n) _____.
Cookie
What was the major question that ARPAnet wanted to solve?
Could a network be built that would continue to work even if multiple parts collapsed?
The first commercially available computer with a graphical user interface was NeXT's ____ computer.
Cube
The malicious use of a computer code to modify the normal operations of a computer or network is called a _____.
Cyberattack
Harming or harassing a person or group of people via information technology and networks in a repeated and deliberate manner is called _____.
Cyberbullying
A person who uses computers and the Internet to launch attacks against computer systems for political or ideological reasons is called a ____.
Cyberterrorist
CDs store data using: A. Electronic circuits (transistors and capacitors) that store data B. A blue spectrum laser beam C. A magnetic coating that is sensed by a read/write head D. A reflective coating that has pits and lands
D
Which of the following is a strength of the Linux platform? A. Less susceptible to viruses than Mac OS B. Most widely used OS in smartphones and tablets C. Most widely used OS in desktops and laptops D. Free to download and use
D
An attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests is called a ____ attack.
DDoS
Though it could theoretically hold terabytes of data for thousands of years in microscopic space, _____ storage, using genetic material, is a distant storage option.
DNA
The Internet service that tends to provide the most consistent speeds is
DSL
An application that navigates all of the files and folders in your Mac is the _____.
Finder
The number of times per second a frame in a video is advanced is the definition of ______.
Frame rate
Relatively rugged, water-resistant video cameras that allow users to film high-definition video under harsh conditions, such as on ski mountains, in the ocean, or at high altitudes are called extreme-action video cameras or simply a
GoPro
Letting computer users drag images and documents across their computers' monitors made the ____ User Interface very popular.
Graphical
A port that allows the transfer of high quality video and audio signals is called a(n) _____ port.
HDMI
The standard port for video and audio input into televisions today is the ___ port.
HDMI
The act of hacking or breaking into a computer system for a politically or socially motivated purposes is called _____.
Hacktivism
To allow hard disk drive platters to spin more smoothly and cooler, some manufacturers seal the platters in ____ instead of air.
Helium
A refracted laser beam striking a photoreceptor from many different angles allows _____ storage to retain many bits of data in the same location.
Holographic
Using refracted laser light to store data on a photoreceptive substrate is essentially how ____ storage works. Theoretically this could store gigabytes of data within a cubic millimeter.
Holographic
For ____ it may be less expensive to add an existing cell phone data plan and to use the phone as a hotspot than to add wired Internet service.
Individual users
The largest chip designing and manufacturing company in the world is ____
Intel
Although it sounds ironic, searching the ____ in your area is an efficient way to search for an ISP.
Internet
ISP stands for:
Internet Service Provider
A form of spyware that records all actions typed on a keyboard is called a _____ logger.
Keystroke
A mobile hinged computer with an integrated keyboard that uses a full operating system is called a notebook or a ______ computer.
Laptop
A switch distinguishes between various devices within a network by their ____ addresses.
MAC
The technology (chips) that allow cell phone microphones and hearing aids to be so small is the ____ chip.
MEMS
The abbreviation for megahertz is ___ .
MHz
Connecting digital musical devices to computers is accomplished by using ___ ports.
MIDI
This technology allows musicians to create written sheet music simply by playing an instrument.
MIDI
What is the name of a virus written in a macro language and placed within a document or spreadsheet?
Macro virus
An electronic element that stores data by changing its resistance based on the current that has passed through it (similar to RRAM) is called a(n) _______.
Memristor
Windows OS is owned and maintained by _____.
Microsoft
A megabyte equals approximately one ____ bytes.
Million
Though currently expensive, curved and paper-thin displays are possible using ____ display technology.
OLED
A storage device that uses lasers to read CDs, DVDs, or Blu-ray discs is referred to as a(n) _______.
Optical drive
Printer speed is described using what acronym?
PPM
Cookies stored on a computer's hard drive and used to collect and store information about user preferences, password and username information, IP addresses, and/or data or web surfing behavior are called ______ cookies.
Persistent
A type of phishing that seeks to obtain personal information through malicious software that is inserted on a victim's computer is called _____.
Pharming
Using cells of ionized gas to create images, _____ displays are actually becoming less popular.
Plasma
A type of printer that is used to print large graphic images such as architectural drawings by mechanically moving a pen over a large sheet of paper is known as a _____.
Plotter
An output device that uses light to display video or image output on a surface is called a _____.
Projector
Because of their capability of storing data in multiple hard drives, data warehouses use _____ technology to ensure redundant data storage.
RAID
The place in a digital device where the data and programs that device is currently using are accessible by the processor is called the ___ .
RAM
The instructions needed to boot-up a computer, such as the BIOS, are typically stored in ___ .
ROM
When referring to digital storage, RAID stands for what?
Redundant Array of Independent Discs
The term that describes how fast each pixel in a display is updated is _____.
Refresh rate
The number of pixels in a display is called the display's _____.
Resolution
Most tablets and phones use _____ as their main storage device.
SSD
Because they have no mechanically moving parts, _____ provide extremely fast, efficient storage.
SSDs
A signal transmitted every few seconds by a wireless router so that users' computers can find the WiFi hotspot is called
SSID
Because they're both Apple products, the browser that works smoothest with Macintosh OS X is
Safari
The accuracy of a digital recording is determined by the device's ____ rate.
Sampling
Specialized hardware or software that capture packets transmitted over a network are called packet _____.
Sniffers
To improve the sound quality of their smartphones, many users purchase large external ____ to listen to music.
Speakers
Select the sites that offer Internet speed test services.
Speedtest.net, TestMy.net
A computer that is highly mobile, has a smaller OS, and uses a touchscreen as the primary input method is called a ____.
Tablet
A thousand gigabytes equals one ____.
Terabyte
To create an image with a laser printer, _____ is/are drawn to the drum.
Toner
The highest level in the domain name hierarchy is known as the
Top Level Domain
Used in a variety of devices including ATMs and point-of-sale terminals, ____ allow for the input of data with the use of a stylus or finger.
Touchscreens
This type of connector is the most common for connecting peripherals (printers, monitors, storage devices, etc.) to a [Windows] computer.
USB
The wireless network privacy standard that was introduced in 2003 but was quickly replaced (due to numerous vulnerabilities) was known as
WPA
In addition to activating ____ protection, it's a good idea to disable your router's SSID transmission once all your devices are connected.
WPA2
Combining the power of a desktop with a neat, clean, look ____ computers are popular with businesses. Their lack of expandability make them less popular with serious gamers though.
all-in-one
The capacity of a particular transmission medium is called its
bandwidth
A short-range wireless transmission protocol is known as _____ .
bluetooth
Because its radio waves pass through walls or desktops, ___ - capable devices are becoming very popular.
bluetooth
Most touchpads use ____ to sense when a finger has moved across the pad.
capacitance
The number of instructions the CPU can process per second is dictated by the ___ speed of the processor.
clock
Clockspeed, also referred to as _________, is the speed at which the processor performs the operations required to run a digital device and instructions executed by the digital device.
clock rate
The amount of data that defines each color in a pixel is called ____ .
color depth
The two main components of a processor are the arithmetic logic unit (ALU) and the _____ unit.
control
A URL identifies a particular ____ address on the World Wide Web.
file
Because of their compact size, touchpads are most often used with ____ computers.
laptop
Megahertz is equal to one _____ cycles (or instructions) per second
million
Fiber optic cable is ____ expensive than coaxial cable to install.
more
Running the processor faster than recommended by the manufacturer is called _____ . This can increase performance and speed, but will also void the manufacturer warranty.
overclocking
Paul Baran developed a technology called ____ switching that made the Internet possible and reliable.
packet
The BitTorrent protocol is often called ____ file sharing.
peer-to-peer
A request for an electronic "echo" or response from another computer or server is called a
ping
the smallest element of an image is called a(n) ___ .
pixel
Software that can be added to a browser to increase its functionality are called
plug-ins
A point (a hole or slot) in a computer, designed to accept a specific connector, is called a ___ .
port
The device that connects 2 networks is a
router
Your ____ can provide hardware firewall protection for your home network where it connects to the ISP's network, just as ISP networks have firewalls where they connect to the Internet.
router
With ____ recognition technologies, frequency, pitch, speech rhythms and other characteristics are charted and compared to existing records.
voice