ITSC 1301 Introduction to Computers

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Which of the following is an idea, invention, or process that derives from the work of the mind or intellect.

Intellectual Property

_________________ is an open source operating system.

Linux

This operating system is most popular with graphic designers and those who work in multimedia.

Mac OS

__________________requires two or more processors.

Multiprocessing

Which of the following software would allow you to edit the text of a scanned document?

OCR

SmartArt permits you to create all of the following types of diagram EXCEPT ____.

Observational

Controlling the Word spelling and grammar check settings is done in the backstage _____________ .

Options

Information about a person that can be used to uniquely establish that person's identify is called _____________?

PII

Which of the following is not part of the Information Security Triad?

Passwords

The term memory when referring to computers usually means _____.

RAM

_______ view displays all the slides in a presentation as thumbnails to provide you with a visual overview of the presentation.

Slide Sorter

Which of the following operating system was designed for phones?

Symbian

Special high-speed lines used by large corporations to support digital communications are known as

T1 and T3 lines

If you enter an integer that is longer than the current cell size, you see only some of the numbers in the cell.

false

In Excel, relative references have a $ before each column and row designation.

false

Moving an item to a higher level in an outline is called demoting the item.

false

PowerPoint's main use is used to present documents.

false

W84me! would be a strong password.

false

You can animate individual bullets, but not bulleted lists.

false

You can enter records in both Datasheet view and Design view.

false

A property describes one characteristic of a _______.

field

Copying, moving, and renaming files and folders are all functions of _____________.

file management

"GUI" stands for

graphical user interface

In a multiple-page document, which of the following is the extra blank margin space given to pages to allow for binding.

gutter

Which of the following protocols lets the user know the web page is encrypted (secure)?

https://

What does an Intrusion Detection System (IDS) do for a business?

identifies network attacks

A scanner is an example of a(n)

input device

When a text box is active, its border ____.

is a dotted line

In Slide Master view, you can tell which thumbnail is the slide master that is associated with the current theme by its ____.

larger size

You can apply a different theme to a form in _______ view.

layout

The chart ____ identifies each of the data series in a chart.

legend

What is an advantage of using ERP software?

less mistakes with a single database

What is a limitation of a thin client?

little or no local storage

The first portion of the IF function is _______.

logical_test

The information system component that controls and manipulates data in order to produce information is called the

microprocessor

The main circuit board of the computer where the CPU is installed.

motherboard

The transmission medium that carries the message is referred to as the

networking media

What is an advantage of a SSD over a traditional hard drive?

no moving parts

1,000,000,000 bytes equals _________________?

one gigbyte

In a one-to-many relationship, the primary table is the _______ table, and the related table is the _________ table.

one, many

How do the packets travel when packet switching protocols are used?

packets may follow different routes

To change the order of operations, you can enclose parts of a formula within _______.

parentheses

Which of the following terms describes accessing someone else's WiFi without authorization?

piggybacking

A _______ is a region of a slide reserved for inserting text or graphics.

placeholder

Companies collecting personal information and buying habits of individuals is called _____________.

profiling

The rules for exchanging data between computers are called

protocols

Access is a(n) _______ database.

relational

A ____ is a part of a document that can have its own page-level formatting and properties.

section

The small squares on the corners and sides of a selection box are called ____.

sizing handles

The most powerful type of computer,

super computing clusters

Software that allows your computer to interact with the user, applications, and hardware is called

system software

Bandwidth can also be thought of as _____________.

throughput

To make an animation go faster, decrease the ____.

time in the Duration box

Which of the following is classified as MRP?

tracking inventory

"What-if" analysis lets you examine how changing values entered directly in a worksheet affect the calculated values.

true

A column in an Access table is referred to as a field of information.

true

A query is a question about the data stored in a database.

true

All formulas in Excel should start with an = sign in the cell.

true

An authorized Virtual Private Network (VPN) user can actually bypass some of the firewall restrictions.

true

In the US, a patent lasts twenty years.

true

The ISO 9000 certifications focus on quality management.

true

Which of the following would allow your computer to stay on in case of a power outage?

ups

The Internet is one portion of the World Wide Web.

False

Web 2.0 applications only allow experienced programmers to update web content.

False

Which of the following laws singles out data records related to health care?

HIPPA

Information processing converts ___________________.

data into information

The bottom portion of the Query window contains the _______.

design grid

You can edit cell contents directly in a cell by ____

double-clicking the cell

Which of the following allows a proxy server to work?

external communication ports closed

IPv6 has a limitation that will not allow as many web addresses as IPv4.

false

A floating graphic is located in a specific position in a line of text in a document; when the text is edited the graphic moves (or "floats") along with it.

False

Clicking a link in a phishing e-mail message can install a __________ program.

(Spyware, virus, stealthware) all of the above

Non-obvious relationship awareness can collect data from which of the following?

(social networks, cell phone data, credit reports) all of the above

The _______ wildcard character matches any number of characters.

*

What is the top top level domain in this web address? http://www.sydney.com.au/

.au/

How much does a 16 GB SD card hold?

16,000,000,000 bytes

Bluetooth Wireless USB is a type of radio wave information transmission system that has a range of up to ________

300 feet

A field name can have up to _______ characters.

64

On which of the monitor resolutions below would a 320X240 picture appear largest?

640 x 480

Digital data representation uses bytes of information. A byte is represented by ____ bits.

8

The latest WiFi technology being used is___________.

802.11ac

_____ is the science of identifying individuals based on measurable biological characteristics.

Biometrics

Kerning refers to the space that appears directly above and below a paragraph.

False

The key or key combination for moving to the right one word at a time is _______.

Ctrl+Right Arrow

Which of the following can be considered a disadvantage to having a code of ethics for IT?

Every member may not agree to the code.

The ¶ character is an example of a nonprinting character.

True

Word will allow you to export a Word document as a .PDF file.

True

This operating system was originally designed to run on minicomputers used in a network environment.

UNIX

A (n) ____________ allows for a secure path over the Internet that provides authorized users access to a private network

VPN

When you present online in PowerPoint 2013, you send the presentation to ____.

a Microsoft server

information System ethics describes ___________________ for IT professionals.

acceptable behavior

Which of the following is NOT a Word tab stop type?

aligned

Which of the following is an expansion bus?

all of the above (VGA , USB,FireWire )

______________ software needs to be updated regularly since new malware is introduced at all times.

antivirus

_______ can extend a series of numbers, patterned text, and dates into an adjacent cell or range.

autofill

Which of the following is a computer controlled by a hacker or computer criminal?

bot

The key to success with an ERP for business is ______________.

centralized database

What does the author try to convey with the term "cloud computing?"

computer resources accessed through the Internet

To copy rather than move a sheet, press and hold the ____ key as you drag and drop the sheet

ctrl


Kaugnay na mga set ng pag-aaral

ACSM's Introduction to Exercise Science, Chapter 11

View Set

General Statistics Section 2-2: Histograms, Frequency Polygons, and Ogives

View Set

Nutrition in Health: Chapter 6: Lipids, Triglycerides, Phospholipids, and Sterols

View Set

Sports Finance Exam 2 Study Guide

View Set

ch 58, 59, 60, 72 lehne & porth ch 33 nurs 223 test 3

View Set

Forensic Science Death and Decomposition

View Set