FINAL EXAM INTRO TO COMPUTING

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

sequence series of steps done in order selection decides which path to take in a program algorithms series of steps to complete a task binary has 2 digits that make up all numbers decimal has 10 digits that make up all numbers loops repeat instructions over and over programming structures sequence, selection, loops bits 1 and 0 software tells hardware what to do and how to do it a programming language C++

.

Which of the following is an example of output?

3D graphics

What is the storage capacity of a DVD?

4.7 GB

Which statement is true? All legal actions are ethical actions. All ethical actions are legal actions. Computer ethics only apply to professional users. All computer users make ethical choice

All computer users make ethical choices

Which hacktivist group was responsible for hijacking major Ku Klux Klan (KKK) Twitter accounts and knocking several KKK websites offline?

Anonymous

Which of these conventional AI methodologies allowed military systems to quickly and accurately determine the origin and mission of identified aircraft?

Bayesian networks

Which computer component has the greatest impact on system performance and cost?

CPU

Comcast, the largest U.S. ISP, provides which type of connection to the majority of its customers?

Cable

Why are children under 13 not allowed to join Facebook and other online services without parental consent?

Children are legally prohibited from joining without parental consent

Which statement regarding computers and other types of digital technology is true?

Computers have created new ethical dilemmas and new tools to solve them.

Gold is a necessary component in the manufacture of digital devices, but much of the electronics industry's supply has been mined in regions where active armed conflicts are occurring. Which of these locations is a conflict zone where gold ore has been extracted?

Congo

__________ operating systems are designed to perform a limited number of specific tasks.

Embedded

Which organization is responsible for creating and enforcing net neutrality policies?

FCC

Select whether the statement is true or false. A command line interface (CLI) uses a keyboard and mouse to manipulate graphics on a display.

False

Select whether the statement is true or false. Basic programming techniques are leveraged to make conventional AI software more human-like.

False

Select whether the statement is true or false. Fuzzy logic creates competition between various potential solutions in order to select the best one.

False

Select whether the statement is true or false. Insufficient processing power is the primary reason autonomous vehicles are not widely available.

False

Select whether the statement is true or false. The software development life cycle is sometimes referred to as Agile software development.

False

Select whether the statement is true or false. ​ All input to a digital device is the result of processing.

False

Select whether the statement is true or false. Almost 50 percent of U.S. citizens own a smartphone.

False

Select whether the statement is true or false. Client computers typically run 24 hours per day to provide users with services such as email, file sharing, and web content.

False

Select whether the statement is true or false. RFID tags consist of a low-power processor, an antenna, and a flexible battery.

False

Select whether the statement is true or false. Research shows that a texting driver is twice as likely to crash as a non-texting driver.

False

Select whether the statement is true or false.Digital etiquette is essentially identical to etiquette as it existed before the proliferation of digital technology.

False

Select whether the statement is true or false.The Bluetooth specification was developed by the Personal Area Networking Consortium (PANC).

False

Select whether the statement is true or false.The majority of data traffic routed between continents is transmitted between satellites using TCP/IP.

False

elect whether the statement is true or false. AI applications are confined to the domain of research science.

False

_______ allegedly inspired multiple acts of real-world violence, including the Newtown, Connecticut school massacre.

Grand Theft Auto

______ allow(s) for the creation of transistors smaller than is possible with silicon semiconductor technology.

High-k materials

Which organization manages domain names and IP addresses?

ICANN

Devices connected to the Internet must have a unique ________ in order to successfully communicate with other devices.

IP address

What single factor creates the most risk to drivers who choose to use mobile devices on the road?

Reading a screen means taking their eyes off the road

________ photos allows people in those photos to be easily identified and associated with events they may have assumed were intended to remain private.

Tagging

Select whether the statement is true or false Facial features, voice patterns, and location can be used to identify users.

True

Select whether the statement is true or false. A collection of variables is known as an array.

True

Select whether the statement is true or false. An advantage of communication applications is that users who wish to communicate with each other may use any combination of communication apps.

True

Select whether the statement is true or false. Apple, Google, Microsoft, and Facebook restrict access to their development tools to limit the opportunities for users to develop software for their platforms.

True

Select whether the statement is true or false. Human experts train expert systems to understand and make accurate decisions about a specific subject of knowledge

True

Select whether the statement is true or false. Siri, the personal digital assistant created by Apple for the iPhone, was the first mature personal digital assistant for mainstream smartphones, providing a more natural, accessible interface.

True

Select whether the statement is true or false. System software includes utilities like DVD burning software.

True

Select whether the statement is true or false. Voice recognition enables a computer to accept voice commands from a user without requiring a keyboard or pointing device.

True

Select whether the statement is true or false. ​ Game controllers are an example of general-purpose input devices.

True

Select whether the statement is true or false. ​ The first programmable electronic digital computer was developed by British codebreakers.

True

Select whether the statement is true or false. ​ The processor cannot function without system storage.

True

Select whether the statement is true or false. A driver who takes six seconds to reply to a text message can travel approximately 500 feet down the road while distracted.

True

Select whether the statement is true or false. The most obvious innovation provided by the World Wide Web was a graphical user interface for the Internet.

True

Select whether the statement is true or false.The 802.11 standards that define Wi-Fi were developed by the Institute of Electrical and Electronic Engineers.

True

Select whether the statement is true or false.The Internet of Things allows everyday objects to interact with users and their environment.

True

Select whether the statement is true or false.Video games have begun to explore increasingly violent themes over time

True

Source data automation involves automating data entry where it originates to reduce input errors.

True

Which international character encoding scheme has replaced ASCII for many applications?

Unicode

What is a named storage for specific types of data?

Variable

In addition to winning Jeopardy!, IBM's Watson also does this.

What is drive the OLLI pedestrian shuttle in National Harbor, Maryland?

Electronic computing initially developed in response to the need for significant processing power during _______.

World War II

Which is an accurate description of a Bayesian network?

a graphical network of variable relationships and dependencies

What is a programming object?

a reusable group of code and data

The Internet was originally designed to support communication between __________ groups and organizations.

academic and government

Next-generation web technologies use ________ to tackle information overload.

artificial intelligence

This function of computers replaces repetitive tasks previously performed by humans

automation

What is widely agreed to be the best way to avoid computer-related health issues?

balance computer time with time away from screens

Which number system(s) are used directly in hardware by computers?

binary

Cable television providers install _____ cable to provide their customers with television and Internet access

coaxial

What is a disadvantage of ubiquitous computing?

constant tracking of online and offline activities

Which CPU component decodes program instructions retrieved from primary storage?

control unit

What is the primary function of integrated circuits?

data processing

Who is responsible for making information and communications technology accessible?

differs from country to country

A fundamental difference between nations with strong economies and those that have significant economic difficulties is _____.

digital literacy

Accessible computing is intended to allow which group of users to operate computers?

disabled

Github is an example of a(n) __________________.

distributed revision control system

What advantage will 5G networks have over current 4G networks?

higher data speeds

A government must protect its nation's ______ from foreign governments and cyber terrorism.

infrastructure

What distinguishes supercomputers from powerful servers and desktop computers?

massively parallel processing

The primary concern of computer-based violence is the risk of ________ harm to players.

mental

What is an outdated term for a server?

minicomputer

A ________ is an example of a pointing device.

mouse

Additional devices attached to computers to expand their functionality are ___________.

peripherals

Where are geotags most often found?

photographs

What distinguishes personal computers from servers and supercomputers?

power requirements

Which of these is a consideration of professional computer ethics that most directly affects customers?

privacy

Word processing software is an example of ______________.

productivity apps

What is a common limitation of current dictation software?

punctuation must be spoken

A device that amplifies a weak signal on a wired network is called a _______.

repeater

What is the process of converting abstract descriptions of a program into a complete list of the inputs, outputs, and behavior of finished software?

requirements analysis

Thirteen ______ DNS servers around the world form the foundation of the Domain Name System.

root

Packets travel across the Internet by moving from ______ to ______ between their source and destination.

router, router

Which wearable devices add further functionality to smart bands, such as larger displays and smartphone integration, while retaining a similar form-factor?

smartwatches

What are the instructions that provide the CPU with well-formatted steps for processing?

software

What is a shared description of a process for encoding data consistently?

standard

Which digital devices are most often used to simulate complex real-world phenomena and render detailed 3D environments

supercomputers

What is a mobile device with a large multi-touch display and no attached keyboard?

tablet

Prior to the adoption of LTE 4G standards, most cellular phones using CDMA were located in _______.

the United States

When users exceed their data quota for a month, most cellular carriers will __________ their data connections.

throttle

Which of these represents an accessible computing technology?

voice recognition

How does Google extend Internet access to isolated communities with its Project Loon?

weather balloons

Which video game console manufacturer introduced computer vision to homes with their Kinect controller, allowing players to interact with games in a more natural, intuitive way?

Microsoft

How can software be changed to contribute to green computing?

More efficient software uses less power to complete the same tasks.

_____ readers are special-purpose input devices used to input answers from standardized examination forms.

OMR

Facebook requires developers to use the _____ scripting language with its API.

PHP

What is a unit of data sent between hosts across the Internet, using TCP/IP?

Packet

What is the difference between pervasive and ubiquitous computing?

Pervasive means available everywhere; ubiquitous means integrated into the environment.


Kaugnay na mga set ng pag-aaral

Chapter 29: Alterations in Integumentary Function

View Set

AWHONN PEOP Perinatal Final Review 2022

View Set

Chapter 11: Childhood and Neurodevelopmental Disorders

View Set

Matematicas. Unidad 2. Fracciones

View Set

Section 3-2: Properties of Parallel Lines

View Set

Math- rational and irrational numbers

View Set

Quantitative - 3 - Correlation, Linear Regression

View Set