Computer systems

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Which of the following is NOT true about DSSs? A DSS uses data only from internal sources. Some DSSs include their own query language. Some DSSs are available to everyone on the web. DSS stands for decision support system.

A DSS uses data only from internal sources.

All of the following are examples of desktop operating systems EXCEPT ______. Linux Android UNIX Chrome OS

Android

Which of the following is NOT true about hard disks? They use magnetic particles to store data, instructions, and information. The alignment of the magnetic particles represents the data. They contain one of more inflexible circular platters. A desktop hard disk is much smaller than that of a laptop.

A desktop hard disk is much smaller than that of a laptop.

Which manufacturer uses the term AirPods to refer to headphones that fit in your ear and connect wirelessly to devices? Samsung Blackberry Apple Nokia

Apple

What is an audit trail? A list of passwords and user names on a network. A file that records access attempts. A record of hacking attempts. A log of financial transactions.

A file that records access attempts.

Client/server and P2P are two types of network ______. functions resources operating systems architecture

Architecture

In a multitasking operating system, ______ programs are running but not in use. background idle inactive unopened

Background

______ is a measure of the capability of a network to send and receive data. Streaming Broadband Bandwidth Net worth

Bandwidth

Why would a field that contains numbers have a text data type? In order to keep the number of data types to a minimum. Because the numbers represent letters. Because the values will not be used in calculations. It shouldn't -- this is a mistake that should be fixed.

Because the values will not be used in calculations.

Which of the following best describes a hot spot? A wireless network that provides Internet connections to mobile computers and devices. Another term for the deep web, an unsearchable area of the Internet known for illegal activity. A zone in which it is unsafe to use your computer or network without additional security. An area on a webpage that provides the most important, up-to-date content.

A wireless network that provides Internet connections to mobile computers and devices.

The ______ is the component of the processor that performs arithmetic and comparison operations. calculator CPU ALU control unit

ALU

The ______ network became functional in 1969, linking scientific and academic researchers across the United States. NETAMERICA INTRANET AMERINET ARPANET

ARPANET

______ information is available when the decision maker needs it. Verifiable Accessible Timely Organized

Accessible

Which of the following is NOT true about PCs? Acer, Dell, and HP are examples of companies that sell computers that use the Mac operating system. PC stands for personal computer. A PC is intended to be used by one person at a time. PC sometimes is used to describe a computer that runs a Windows operating system.

Acer, Dell, and HP are examples of companies that sell computers that use the Mac operating system.

In the video, Time Machine backs up (check all that apply): photos applications folders documents music

All

According to the display video, the following are applications for stereoscopic displays: PC games Minimally invasive surgery and diagnosis using 3D CT and MRI data Molecular modeling for chemists Stereo mammography Oil and gas exploration All of the above

All of the above

Mobile devices can be infected with a virus by the following vector(s): Direct MMS message Download All of the above

All of the above

A Yes/No data type also is called ______. choice optional Boolean either/or

Boolean

Which virus type targets a computer's start-up files? boot sector stealth kickstarter macro

Boot Sector

You want to ensure your wireless network is secure. Which of the following should you NOT do? Choose a secure location for your wireless router. Retain the default administrative password. Enable an encryption method such as WPA2. Broadcast the SSID.

Broadcast the SSID.

______ is the number of bytes (characters) a storage medium can hold. Capacity Disk dimension File size Capability

Capacity

Your boss, Molly, asks you to create a spreadsheet for sales data for the store at which you both work. In a spreadsheet, B4 represents a(n) ______. formula cell table worksheet

Cell

Gantt and PERT are types of ______ used to plan and schedule time relationships among project activities. deliverables apps documents charts

Charts

______ is a Linux-based operating system designed to work primarily with web apps. Chrome OS iOS Windows Web UNIX

Chrome OS

Two types of operating system user interfaces are graphical and ______. text-based command-line 3D navigational

Command-line

Which of the following is responsible for installing hardware and servers and troubleshooting hardware problems? Help desk technician Technical project manager Computer technician Network engineer

Computer technician

During which phase of web publishing would you use a text editor to enter codes that instruct the browser how to display webpage content? Host Create Plan Design

Create

Which type of system's primary function is to store and manage a company's documents in a central library? TPS CMS MIS DMS

DMS

______ is a collection of unprocessed items, including text, numbers, images, audio, and video. Information A byte Output Data

Data

Which of the following is NOT true about servers? Dedicated servers typically do not require a fast processor, and use little memory. Form factors for servers include rack, blade, and tower. In many cases, a server accesses data, information, and programs on another server. Services provided by servers include storing content and controlling access to network resources.

Dedicated servers typically do not require a fast processor, and use little memory.

During which phase of system development would you acquire any necessary hardware and software? Implementation Analysis Planning Design

Design

A data ______ contains data about each file in the database and each field in those files. guide dictionary encyclopedia reference

Dictionary

The name of the computer museum in the video was: DigiFarm Digital Heritage Computers Galore DigiBarn

DigiBarn

In the acronym ADA, the D stands for ______. disabilities device data distance

Disabilities

______ pitch is the distance in millimeters between pixels on a display. Dot Resolution Candela Nit

Dot

A(n) ______ is a small program that tells the operating system how to communicate with a specific device. spooler driver app interpreter

Driver

Two commons types of RAM are ______ RAM and ______ RAM. dynamic, static temporary, permanent storage, memory volatile, nonvolatile

Dynamic, Static

Which of the following is NOT true about databases? You can create forms and reports using data in a database. A database consists of a collection of tables. Each column contains data about a given item in the database, such as a person or product. Much of the information you access on the web is stored in databases.

Each column contains data about a given item in the database, such as a person or product.

Which of the following is NOT an advantage of the database approach? Improved data integrity Reduced development time Eliminates redundant data Easier access

Eliminates redundant data

Ticket machines, ATMs, digital cameras, and robotics all use ______ operating systems. mobile virtual multiuser embedded

Embedded

Sales, marketing, and manufacturing are all types of software typically used by a(n) ______. enterprise individual power user small business

Enterprise

Which of the following is NOT a recommendation when deciding what to upload to the cloud? Back up only the files you are sure you will need again in the future. Upload financial and insurance documents. Review your files and remove those you no longer need. Even if you have access to installation media, back up your programs and apps.

Even if you have access to installation media, back up your programs and apps.

QBE stands for query by ______. edit email Entry example

Example

Which of the following MIS reports identifies data outside of a normal condition? General Exception Detailed Summary

Exception

A cold boot generally is faster than a warm boot. True False

False

A database analyst collects and analyzes evidence found on computers, networks, mobile devices, and databases. True False

False

A mail server stores and manages email lists. True False

False

A point-and-shoot camera is a high-end digital camera that has interchangeable lenses. True False

False

A query language consists of complex, abbreviated statements that allow users to specify data they want to display, print, store, update, or delete. True False

False

According to the video editing video, you should first save to a low resolution file. True False

False

An ATM asks you to enter a numeric password, called a PIN, which stands for Private Identity Name. True False

False

An ink-jet printer is a type of impact printer. True False

False

Bluetooth devices need to be within the same line of sight. True False

False

By itself, a bit is extremely informative. True False

False

Chrome is a Microsoft browser included with the Windows operating system. True False

False

Coaxial cable is capable of carrying significantly more signals than fiber-optic cables. True False

False

Continuous backup is inexpensive because the data is constantly being backed up. True False

False

Continuous data protection is widely used by home and small business users. True False

False

Contributors to a wiki typically do not need to register before they can edit or comment. True False

False

Dial-up access is a type of broadband digital Internet connection. True False

False

Eight bytes grouped together form a bit. True False

False

Files on an intranet generally are also accessible from the Internet. True False

False

Flash memory has many moving parts, making it less durable and shock resistant than other types of media. True or False

False

Gaming consoles are more portable than handheld gaming devices. True or False

False

In an optical disc, the absence of light is read as binary digit 1. True False

False

Keyboards for mobile devices contain the same number of keys as desktop keyboards. True or False

False

Mobile computers and devices typically have a separate physical display device. True or False

False

Most browsers require you to enter the protocol and host name in a web address. True False

False

Most computers and electronic devices are analog, which uses only two discrete states: on and off. True False

False

Most information gains value with time. True False

False

Passphrases are less secure than passwords. True False

False

Peripheral devices normally occupy space inside of the system unit. True False

False

Sending and receiving text email messages uses a similar amount of data as talking with others using VoIP with video. True False

False

Software registration typically is required. True False

False

The Internet is a service of the World Wide Web. True False

False

The higher the number, the faster the response time. True False

False

The term, PC, sometimes is used to describe a computer that runs on a Mac operating system. True False

False

To protect files on your device's hard drive from hackers, turn on file and printer sharing. True False

False

When purchasing a digital camera, you do not need to worry about the memory card because all cameras use the same memory cards. True False

False

With Bluetooth printing, the computer and printer need to be aligned with each other. True False

False

With an all-in-one computer the display device is separate from the tower. True or False

False

With the media converter solution demonstrated in the video, multiple formats can be converted in one session. True False

False

Without a built-in card slot, you cannot transfer stored items from a memory card to a computer or printer. True or False

False

You should use a humorous name for your account profiles to ensure that you stand out to potential employers. True False

False

A(n) ______ is the smallest unit of data a user accesses. file symbol field record

Field

ROM chips called ______ contain permanently written instructions, or information, such as start-up instructions. firmware SROM boot memory hard drives

Firmware

______ consists of ROM chips or flash memory chips that store permanent instructions. Dataware Firmware Chipware Memware

Firmware

Which of the following is NOT true about NFC? It is based on RFID. For successful communications, the devices must not touch or come within 6 inches of each other. You can purchase blank NFC tags at a reasonable cost. It stands for near field communications.

For successful communications, the devices must not touch or come within 6 inches of each other.

A(n) ______ key is a special key programmed to issue commands to a computer. function control command toggle

Function

Your boss, Molly, asks you to create a spreadsheet for sales data for the store at which you both work. You want to add the numbers in a row or column. You use the SUM ______. operator adder calculator function

Function

Mapping, monitoring speed, and determining altitude all are uses of ______. microwaves GPS infrared NFC

GPS

Which of the following is responsible for answering technology-related questions? Help desk technician Computer technician Network engineer Technical project manager

Help Desk Technician

What does HTML stand for? Hyperlinks and Text Markup Language Hypertext Markup Language Hypertext Mathematics Language

Hypertext Markup Language

A(n) ______ is a sequence of numbers that uniquely identifies the location of each computer or device connected to the Internet or any other network. IP address fixed location top-level domain URL

IP Address

Which of the following best describes the term, redundancy, as it pertains to enterprise businesses? When employees unknowingly duplicate data entry in a database The use of external consultants who provide the same tasks as internal employees When hardware or software becomes obsolete and is replaced with newer models If one hardware component fails or malfunctions, another can assume its tasks

If one hardware component fails or malfunctions, another can assume its tasks

Which of the following is NOT true about QR codes? QR codes can be read with a QR bar code reader or a QR code reader app on a smartphone. QR codes store information in both a vertical and horizontal direction. If the QR code directs you to a website displaying a form, enter your personal information to ensure your safety. Most QR code reader apps show the address of the website that will be displayed.

If the QR code directs you to a website displaying a form, enter your personal information to ensure your safety.

Search tools typically use a(n) ______, which stores a variety of information about a file. Index header signature directory

Index

While working as an assistant in an IT department, you have been taking classes in information and systems security. You meet with a career counselor to discuss potential jobs. One of the jobs available at your current company is for a digital forensics analyst. What skill will you need to have to apply for the job? Inspect electronic data to recover documents and files Convert system design into an application development language Configure routers and firewalls SEO

Inspect electronic data to recover documents and files

_____ data is stored in separate files in different departments. Exiled Isolated Divorced Detached

Isolated

Which cache level is on the motherboard and is separate from the processor chip? L2 L4 L1 L3

L3

A home or school likely uses a(n) ______. MAN WAN LAN PAN

LAN

Which of the following is NOT a recommended practice for gaming safety? Check the developer of any software or apps to be certain it is legitimate. Use a firewall when using multiplayer online games. Look for games that use ActiveX or JavaScript, as these are always safe. Avoid games requiring passwords to be saved to an online account on a smartphone.

Look for games that use ActiveX or JavaScript, as these are always safe.

The banking industry almost exclusively uses ______ for check processing. OCR magnetic stripes QR codes MICR

MICR

Which of the following adapter cards connects to musical instruments? tuner modem MIDI sound

MIDI

In M2M communication, such as with the Internet of Things trend, the M stands for ______. media machine mobile manufacturer

Machine

File ______ refers to the procedures that keep data current. administration integrity validation maintenance

Maintenance

Trojan horses and zombies are examples of ______. hackers search engines cloud apps malware

Malware

A File ______ performs functions related to displaying and organizing files. Organizer Folder Displayer Manager

Manager

OneDrive is a cloud server from ______. Apple Microsoft Firefox Google

Microsoft

Which of the following search texts will display pizza or sandwich places in New Orleans? New Orleans (pizza or sandwich) *New Orleans + pizza_sandwich pizza + sandwich (New Orleans) "New Orleans + pizza_or_sandwich"

New Orleans (pizza or sandwich)

To connect devices within your workspace, use a ______. WAN MAN LAN PAN

PAN

On networks that use TCP/IP, ______ software can detect problems, such as why traffic is flowing slowly. information routing speed monitoring packet sniffing data tracking

Packt Sniffing

The operating system sometimes is called the ______. background app ground floor platform underlying hardware

Platform

A mouse is an example of a(n) ______ device. processing output display pointing

Pointing

Lighting, HDMI, and Thunderbolt are all types of ______. ports ISP gaming consoles networks

Ports

The animals pictured in the computer museum video were: Small cows Pot bellied pigs Llamas Goats

Pot bellied pigs

Which of the following is NOT true about presentation software? Presentations are visual aids to communicate information to a group. Presentations are viewed as clip shows. Presentation software typically provides a variety of layouts for each slide. When building a presentation, users can set the timing and add special effects.

Presentations are viewed as clip shows.

The ______ interprets and carries out the basic instructions that operate a computer. processor transistor circuit board motherboard

Processor

Which of the following is NOT a basic function of a computer? Accept data Store information Produce input Process data

Produce Input

Productivity suites typically include, at minimum, all of the following EXCEPT ______. presentation Project management spreadsheet word processing

Project Management

Which of the following best describes open source software? Provided for use, modification, and redistribution. You Answered Copyrighted software provided at no cost. Distributed at no cost for a trial period. Donated for public use and has no copyright restrictions.

Provided for use, modification, and redistribution.

A(n) ______ is a request for specific data from a database. function query filter retrieval

Query

A group of two or more integrated hard drives is called a(n) ______. RAID duplicate drive multidisk SSD

RAID

______ consists of one or more chips on the motherboard that hold items such as data and instructions while the processor interprets and executes them. Storage ROM The motherboard RAM

RAM

A(n) ______ database stores data in tables that consist of rows and columns. distributed relational data warehouse multidimensional

Relational

Which of the following best describes disk defragmentation? Installing partitions on the hard disk in order to run separate operating systems on the same computer. Removing unnecessary files. Reorganizing the hard disk so that files are stored in contiguous sectors. Compressing backup and other files to increase disk storage.

Reorganizing the hard disk so that files are stored in contiguous sectors.

The term hard drive refers collectively to hard disks and ______. USB flash drives optical discs SSDs memory cards

SSDs

A SAN is a high-speed network with the sole purpose of providing storage to other attached ______. servers storage devices smart devices security systems

Servers

Many software makers provide free downloadable updates, sometimes called a(n) ______ to users who have registered and/or activated their software. secure deliverable debugger service pack enhancement

Service Pack

Which of the following best describes how you can use Facebook? Share professional interests, education, and employment history. Follow people, companies, and organizations in which you have an interest. Share messages, interests, activities, events, photos, and other personal information with family and friends. Create an online journal of short messages broadcast to your followers.

Share messages, interests, activities, events, photos, and other personal information with family and friends.

The field ______ defines the maximum number of characters a field can contain. capacity size length width

Size

What does a disk's form factor describe? capacity speed operating system size

Size

A collection of related instructions organized for a common purpose is referred to as ______. data hardware software scripts

Software

Original forms of data, such as time cards or order forms, are known as ______ documents. information input source scannable

Source

Microsoft Office ______ is the certification that tests a user's skills of Microsoft Office programs. Specialist Expert Professional Administrator

Specialist

The ______ process sends documents to be printed into a buffer instead of sending them immediately to the printer. aligning delaying spooling thrashing

Spooling

Tape storage requires ______ access, which refers to reading or writing data consecutively. continuous Successive sequential normal

Successive

Some smartphones support a(n) ______ keyboard app, on which users enter words by tracing a path on an on-screen keyboard. swipe touch finger virtual

Swipe

In some database programs, a data file is referred to as a(n) ______. record unit sheet table

Table

You have been chosen to be a teaching assistant at your school. A student comes to you with questions about storage devices. The student asks you to explain speed of storage devices and memory. You tell her that all of the following are true, EXCEPT: Some manufacturers state a storage device's transfer rate because it affects access time. Optical discs are good options to store movies and music. Transfer rates for storage are stated in KBps, MBps, and GBps. The access time of memory is slow compared with that of storage devices.

The access time of memory is slow compared with that of storage devices.

Which of the following is NOT true about system units? On most laptops, the keyboard and pointing device often are on top of the case. The case on a smartphone often is in front of the display. Desktops that house the display and system unit in the same case are called all-in-one. The case on wearable devices typically consumes the entire device.

The case on a smartphone often is in front of the display.

Which of the following is NOT true about network security? Permissions define who can access resources and when they can access the resources. The operating system on a network does not record unsuccessful sign-in attempts. A user account enables a user to sign in to a network or computer. Some operating systems allow the network administrator to assign passwords to files and commands.

The operating system on a network does not record unsuccessful sign-in attempts.

What is meant by the term Plug and Play? A gaming system optimized for multiplayer games A device that must be connected to the network in order to access its operating system A portable battery and wireless network device that is used by mobile devices The operating system that automatically configures new devices as you install or connect them

The operating system that automatically configures new devices as you install or connect them

Which of the following is NOT true about motherboards? Manufacturers package chips so that they can be attached to a motherboard. The circuitry for the processor, memory, and other components reside on computer chips. An integrated circuit contains microscopic pathways capable of carrying electrical current. The processor and memory are built into the motherboard.

The processor and memory are built into the motherboard.

What occurs during a head crash? The top platter collapses. A hard disk attempts to store data into a flawed sector. The rpm of the hard disks platters is too high, causing friction. The read/write head touches the surface of a platter.

The read/write head touches the surface of a platter.

For what purpose would a company use an extranet? To connect employees' mobile devices To allow customers or suppliers to access part of its intranet As a backup to the company's website To provide network access to employees in different countries

To allow customers or suppliers to access part of its intranet

Which of the following best describes the purpose of an ISP? To register domain names for websites To monitor Internet activity for fraud or illegal activity To provide access to the Internet for free or for a fee To create guidelines for web design

To provide access to the Internet for free or for a fee

Which of the following is NOT true about PDFs? Productivity applications often integrate the ability to save a project as a PDF. Adobe Reader is downloadable for free. To read a PDF, you need the software that created the original document. PDF is an image file format.

To read a PDF, you need the software that created the original document.

For what purpose is keylogging software used? To determine if a computer's primary input device has been compromised To store every keystroke in a file for later retrieval To secure the device's keyboard from entering input in case of theft To automatically translate input to another language as the user enters data

To store every keystroke in a file for later retrieval

Which of the following best describes the function of a primary key? Another term for file name To provide decryption of data To uniquely identify each record in a file The first record in a data file

To uniquely identify each record in a file

Which of the following is most likely to be used by a LAN? IrDA NFC Bluetooth Token ring

Token Ring

A(n) ______ can act as an electronic switch that opens or closes the circuits for electrical charges. processor operator conductor transistor

Transistor

A 2.1 speaker system contains two speakers and one subwoofer. True False

True

A WAN can be one large network or can consist of multiple LANs. True False

True

A cloud app makes use of software and data that are not stored on your computer or mobile device. True False

True

A digital pen is an input device that captures and converts a user's handwriting or drawings into a digital format. True False

True

A headset contains both a microphone and a speaker. True or False

True

A keyboard, mouse, and microphone all are examples of peripheral devices. True False

True

A performance monitor is a program that assesses and reports information about various computer resources and devices. True False

True

A port is the point at which a peripheral device attaches to or communicates with a computer or mobile device. True False

True

A program is another term for software. True or False

True

A shopping cart allows a customer to collect items to purchase on an e-retail website. True False

True

A smartphone is an Internet-capable phone that usually also includes a calendar, an address book, a calculator, a notepad, games, browser, and numerous other apps. True False

True

A storage appliance has its own IP address. True False

True

A supercomputer is the fastest, most powerful computer--and the most expensive. True False

True

Antivirus vendors say that the number one reason people infect their own mobile device is that they need to make a phone call so they say yes, and they accept the virus onto their system just so they have access to the outside world. True False

True

As the resolution increases, some items on the screen appear smaller. True False

True

Blu-ray players are backwards compatible with DVD and CD formats. True False

True

Bluetooth technology is standardized globally, so it can be used to connect devices that are not of the same make or model. True False

True

Both earbuds and headphones usually include noise-cancelling technology that enable you to reduce the volume level needed. True or False

True

By subscribing to an ISP, you can connect to the Internet through your computers and mobile devices. True or False

True

C++ and JavaScript are examples of programming languages. True or false

True

CISSP is an example of a security certification. True False

True

Cambria and Calibri are examples of font styles. True False

True

Catfishing is when someone creates a fake online social network or online dating profile and forms relationships with unsuspecting users. True False

True

Chassis is another term for system unit. True False

True

Choose a processor that exceeds the minimum system requirements of the programs and apps you wish to run, but it is not always necessary to purchase the most expensive computer with the fastest processor. True False

True

Dice and Monster are examples of career planning websites and apps. True False

True

Encryption is one safeguard against information theft. True False

True

Expert systems are a component of artificial intelligence. True False

True

GPS stands for global positioning system. True False

True

Google is an example of a search engine. True or False

True

HDTV is the most advanced form of digital television. True False

True

HTML is a programming language. True False

True

Hard disks are read/write storage media. True False

True

Higher contrast ratios represent colors better. True False

True

In addition to the ball, a trackball usually has one or more buttons that work like mouse buttons. True False

True

Individuals suffering from technology overload feel distressed when deprived of computers and mobile devices. True or False

True

Information systems support daily, short-term, and long-range information requirements of users in a company. True False

True

Many email applications include calendar and contact management features. True False

True

Many handheld computers are industry-specific, such as for parcel delivery people. True False

True

Many routers also can function as a hardware firewall. True False

True

Many smartphones and mobile devices have software that shows the approximate location of devices and computers. True False

True

Media players often allow you to burn audio CDs. True False

True

Mobile web apps are actually websites that provide a user experience similar to native apps. True False

True

Monitoring system performance is a part of the support and security phase. True False

True

Most e-book reader models have a touch screen, and some are Internet capable. True or False

True

NFC is a technology that uses close-range radio signals to transmit data between devices or a device and a tag. True False

True

OEM stands for original equipment manufacturer. True False

True

Open source software has no restrictions from the copyright holder regarding modification of the software's internal instructions. True False

True

Output is data that has been processed into a useful form. True False

True

Outsourcing is when an enterprise offloads storage management to an outside organization or cloud storage provider. True False

True

Piracy is the most common form of software theft. True False

True

Search text generally is not case sensitive. True False

True

Smartphones and other mobile devices often can function as a portable media player. True False

True

Some DSL installations include a dial tone, providing users with both voice and data communications. True False

True

Some smartphones can also function as a wireless modem. True False

True

Sometimes communications devices are preprogrammed to accomplish communications tasks. True False

True

The Internet has its roots in a networking project started by an agency of the U.S. Department of Defense. True False

True

The Safari browser comes preinstalled on Apple computers and devices. True False

True

The computer may run slower while it uses virtual memory. True False

True

The goal of project management is to deliver an acceptable system to the user in an agreed-upon time frame, while maintaining costs. True False

True

The operating system serves as the interface between the user, applications, and hardware. True False

True

The process in which two or more computers or devices transfer data, instructions, and information is known as digital communications. True False

True

The program specification package identifies required programs and the relationship among each program, as well as the input, output, and database specifications. True False

True

The transfer rate of external hard drives usually is slower than that of internal hard drives. True False

True

Unusually high drive activity or a slower than normal Internet activity are signs that your computer or mobile device may be a zombie. True False

True

User IDs are also called user names, log on names, or sign in names. True False

True

Uses of RFID include tracking times of runners in a marathon and checking out library books. True False

True

When a user runs an application, its instructions transfer from a storage device to memory. True False

True

When a user runs an application, its instructions transfer from a storage device to memory. True False

True

When you purchase a computer or mobile device, it usually has an operating system and other tools installed. True False

True

With streaming media, you access the media content while it downloads. True or False

True

Without a data plan, you must use Wi-Fi or a wired connection to access the Internet. True False

True

You can use LinkedIn to follow companies to stay informed of their job opportunities. True False

True

You can use legal software to prepare a will. True False

True

You should not remove a portable flash memory storage while it is in use because the operating system may still be accessing the device. True False

True

You should use a database rather than a spreadsheet if you want to collect, reorganize and filter data, and/or create reports from the data. True False

True

Thumb drive is another term for a(n) ______. memory card USB flash drive SSD memory stick

USB flash drive

Which of the following is NOT true about caring for computers and mobile devices? Defragment your computer's hard drive if you notice a decline in performance. If the air vent is dirty, contact a trained professional to have it cleaned. Use compressed air to free the keyboard from dust and debris. Use a special screen cleaner; water is not sufficient.

Use a special screen cleaner; water is not sufficient.

Which of the following is NOT true about memory? Manufacturers state the size of memory by the number of bytes available for storage. Volatile memory is temporary. Users typically are referring to ROM when discussing memory. CMOS is an example of nonvolatile memory.

Users typically are referring to ROM when discussing memory.

VLOG stands for: Virtual Log Visual Log Video Blog Virtual Blog

Video Blog

With ______ voice mail, users can view message details, and in some cases read message contents without listening to them. visual text interpreted virtual

Visual

Skype is an example of ______ software. server plug-in browser VoIP

VoIP

What kind of software do you need to use an Internet phone? chat VoIP FTP Internet messaging

VoIP

Which Internet communication service can you use to speak to other users over the Internet? VoIP Email IM FTP

VoIP

The Internet is the world's largest ______. PAN LAN WAN MAN

WAN

On devices running Windows (Mobile Edition), the ______ app provides a centralized location for coupons, credit cards, loyalty cards, and memberships. Pay Store Wallet Credit

Wallet

Activity trackers and smartwatches are two types of ______ devices. GPS wearable streaming media plug-and-play

Wearable

You have taken a new job as a network administrator. Although you have been an IT professional within your organization for a number of years, this particular responsibility is a new one for you, so you have been studying network standards and protocols. You learn that all of the following are true about TCP/IP EXCEPT: When a computer sends data over the Internet, the data is grouped into a single packet. It defines how messages are routed from one end of a network to the other. It is short for Transmission Control Protocol/Internet Protocol. TCP/IP is the network standard for Internet communications.

When a computer sends data over the Internet, the data is grouped into a single packet.

Which of the following best defines throttling? When a network reduces upload and download speeds of high-data users at peak times When transmission media cannot connect to the network When an ISP cuts off Internet usage after a certain amount of data is used When a bottleneck occurs in a network's resources

When a network reduces upload and download speeds of high-data users at peak times

______ size is the number of bits the processor can interpret and execute at a given time. Power Byte Bus Word

Word

Compressed files sometimes are called ______ files. abridged packed concentrated zipped

Zipped

A byte's ______ is a unique number that identifies the location of a byte in memory. ID tag address position

address

Google Play is an example of a(n) ______. app store mobile operating system gaming device media player

app store

VoIP is a type of ______ output. audio video graphic text

audio

A gigabyte is approximately 1 ______ bytes. trillion million billion thousand

billion

A(n) ______ is the smallest unit of data a computer can process. bit character digit 0

bit

You work part-time at a computer equipment store in the optical disc section. A customer asks about DVD formats. You tell her that a(n) ______ is a more expensive DVD format that has higher capacity and better quality. DVD-RW DVD-ROM HD-DVD Blu-ray

blu-ray

A(n) ______ demands payment to stop an attack. script kiddie cracker hacker cyberextortionist

cyberextortionist

A(n) ______ database is a huge database used to analyze transactions. data warehouse relational distributed object-oriented

data warehouse

A(n) ______ backup copies only the files that have changed since the last full backup. incremental partial selective differential

differential

A graphics tablet also is called a(n) ______. digitizer illustrator illustration pad art input device

digitizer

You want to remove red-eye from photos you took with your digital camera. You should use photo ______ software. image editing management illustration

editing

Social ______ is defined as gaining unauthorized access to or obtaining confidential information by taking advantage of another person. hacking misdirection engineering manipulation

engineering

Which of the following is most likely to require use of a server, desktop, and industry-specific handheld computer, and is most likely to use spreadsheets, databases, and accounting software? mobile user home user power user enterprise user

enterprise user

A(n) ______ keyboard has a design that reduces the chance of RSIs. ergonomic expandable full-service compact

ergonomic

You have been studying processors. Your instructor has asked you to help prepare a lecture for introductory students learning about processors. You explain that when the ALU performs calculations on data, it is part of the ______ process in the machine cycle. executing fetching storing decoding

executing

A(n) ______ system captures and stores human knowledge and then imitates human reasoning and decision making. expert analytical decision anthropomorphic

expert

An iris recognition system uses technology to read patterns in the user's ______. eye fingerprints signature face

eye

You recently purchased a new laptop for home. You want to ensure that you are safe from malware. You should install a personal ______, a program that protects your computer from unauthorized access by blocking certain types of communications. shield back door firewall blocker

firewall

Most current displays are a type of ______ display. translucent fixed width large screen flat-panel

flat-panel

A result from a search engine search is called a(n) ______. smack tag pick hit

hit

A(n) ______ system is a set of hardware, software, data, people, and procedures that work together. information business proficiency communications

information

Data that a computer accepts and processes is called ______. digital facts information input bytes

input

A(n) ______ translates and executes one instruction at a time and converts it to machine language. executor compiler interpreter translator

interpreter

A(n) ______ is a handheld vertical lever, mounted to a base, that you move to control the actions in a game. joystick drive shaft control wand gamepad

joystick

You recently started working part-time in a retail store, and are learning about the reading devices your store uses. Your store uses a bar code reader to process items during checkout. What type of technology does the bar code reader use? light sources sonar radio frequency laser beams

laser beams

Malware is short for ______ software. malady malignant malevolent malicious

malicious

You are about to finish your degree in technology and are beginning your career search. You want to narrow down the fields in which you will look for a job. If you decide you want be involved in planning, research, development, evaluation, and integration of technology, you should look for jobs within the ______ area. operations strategy technical support management

management

CAM and MRP are examples of information systems used in ______. engineering sales manufacturing human resources

manufacturing

Net ______ is the concept of open Internet, accessible to all users, without interference from ISPs or other third-parties. expansion neutrality freedom fairness

neutrality

Each computer or device on a network is called a(n) ______. node transmitter module receiver

node

PIN stands for personal identification ______. network note name number

number

You are about to finish your degree in technology and are beginning your career search. You want to narrow down the fields in which you will look for a job. If you decide you want to administer a network, you should look for jobs within the ______ area. strategy management operations technical support

operations

Optical discs store items by using microscopic ______ (indentations) and ______ (flat areas). pits/lands holes/levels bumps/smooths dents/mesas

pits/lands

A(n) ______ is a program that extends the capability of a browser. aggregator magnifier plug-in power-up

plug-in

Badges, cards, smart cards, and keys are examples of _____ objects. wearable pocket carried possessed

possessed

CPU stands for central ______ unit. protection plasma packet processing

processing

An organization creates a disaster recovery plan. Which part would include return procedures (who can enter the facility, and what actions they are to perform)? recovery plan restoration plan emergency plan building plan

restoration plan

You use a POS terminal at work. Which of the following is the type of business at which you likely work? retail library research laboratory financial

retail

You are curious about cloud data privacy, so you do some research on the potential risks, as well as protection methods and regulations. FERPA regulates the confidentiality of ______. students' educational records criminal records user names and passwords financial transactions

students' educational records

Which of the following MIS reports usually includes tables and graphs? Summary Detailed General Exception

summary

Which of the following would not fit on a desk or your hand? game console supercomputer mobile computer PC

supercomputer

The motherboard is sometimes called a(n) ______ board. security system unit processor

system

Which of the following is responsible for designing and developing information systems? Systems programmer Program developer Systems analyst Cloud architect

systems analyst

A(n) ______ is a thin, lighter-weight mobile computer that has a touch screen. desktop notebook tablet PC

tablet

A(n) ______ drive is comparable to a cassette recorder. NAS tape SAM magnetic stripe

tape

You work in a medical lab that requires high-quality dye-sublimation printers. What type of printer do you use? laser plotter thermal impact

thermal

An RFID reader is also called a(n) ______. transponder transceiver receiver responder

transceiver

Transmission from an earth-based station to a satellite is a(n) ______. uplink signal path download satlink

uplink

______ information has meaning to the person who receives it. Verifiable Accurate Organized Useful

useful

A(n) ______ is a type of collaborative website that allows users to create, add, modify, or delete website content. bookmarking site macroblog portal wiki

wiki

Power users may work with a high-end desktop, sometimes called a(n) ______, designed to handle intense calculations and sophisticated graphics. workstation magnapower ultrabook supercomputer

workstation

What part of http://www.nps.gov/history/preserve-places.html is the host name? history preserve-places.html www.nps.gov http://

www.nps.gov


Kaugnay na mga set ng pag-aaral

Logistics Test 3: Network Design

View Set

Quiz #3: Topic #9 - Managing the Product

View Set

Chapter 22 - Respiratory Physiology

View Set

Financial - Insurance Regulation 28%

View Set

life and health; life insurance policies

View Set

PSY 207: Chapter 4 - Physical Development in Infancy

View Set

Chapter 5: Make vs. Buy Decision

View Set

M100 Community Association Management

View Set