Microcomputer Applications

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

One kilobyte equals _____ bytes.

1,024

The average speed for 4G devices is often advertised as _____ times faster than 3G.

10

USB 3.0 is approximately _____ times faster than USB 2.0.

10

In what year was the first Mac OS released?

1984

The generation of web pages that allowed people to collaborate and share information with the website are known collectively as Web

2.0

Firefox was originally released in

2004

When was Google+ launched?

2011

What is the storage capacity of a single-layer Blu-ray disc?

25 GB

According to McAfee Threats Reports for early 2012, _____ computers worldwide were infected by botnets.

4 to 5 million

Chapter 5 mentions that in the area of entertainment software, World of Warcraft (WoW) has more than _____ subscribers.

7,000,000

As of June 2012, Facebook reported that it had _____ active users.

955 million

This common plug-in is used to view PDF documents.

Adobe Reader

Chapter 6 shows how this company maintains a customer service support page on Facebook.

Amazon

This mobile operating system has the biggest market share for mobile devices.

Android

Which of the following is a free, open source audio recording and edition software application?

Audacity

As you type, these two Word features help you fix common typing errors and format common characters.

AutoCorrect and AutoFormat

The _____ feature automatically scales the font size and adjusts spacing between points to fit text within a placeholder.

AutoFit

The company Research in Motion (RIM) developed which of the following mobile operating systems?

Blackberry OS

On a Windows system, the hard disk drive is usually assigned the drive letter

C

Google+ has four default circles. Which of the following is not one of them?

Celebrities

What is the name of Google's entry in the web browser market?

Chrome

How do you display the Numbering Library?

Click the Numbering button arrow.

You can use buttons in the _____ group of the SMARTART TOOLS DESIGN tab to add shapes or change the direction of the layout, and move shapes up or down the layout.

Create Graphic

To change a presentation's theme after the presentation has been created, begin by clicking the _____ tab.

DESIGN

In its discussion of _____, Chapter 6 describes an import utility that will import bookmarks you have saved in your browser.

Delicious

In a Windows operating system, which utility would you use to delete temporary Internet files and files moved to the Recycle Bin?

Disk Cleanup

Which of the following is discussed in Chapter 5 as an example of a document management system?

Dokmee

_____ a cell to open it for editing in the worksheet area.

Double-click

Google _____ is the SaaS formerly known as Google Docs.

Drive

You can delete the contents of the active cell by clicking the Clear button in the _____ group of the _____ tab.

Editing; HOME

What does EULA stand for?

End User License Agreement

_____ involves the design of equipment and workspace to promote safe and comfortable operation by the individual.

Ergonomics

A network interface card (NIC) is often referred to in computer advertisements as a(n) _____ port.

Ethernet

This financial function calculates the future value of a series of regular payments that earn a constant interest rate.

FV

The file management utility in Windows 8 is called

File Explorer.

In Mac OS X, file management tasks are handled through the _____ utility.

Finder

In which tab will you find the New Slide button?

HOME

The markup language used to create web pages is known by these initials.

HTML

In Google+, you can conduct video chats with this feature.

Hangout

The nonprofit organization in charge of keeping track of the Internet addresses and names all over the world is known by the initials:

ICANN

To add the copyright symbol to your document, begin by clicking the Symbol button on the _____ tab.

INSERT

Which acronym describes a company that provides access to the Internet's infrastructure for a fee?

ISP

You can add a chart to a slide using the Insert Chart button in the _____ group of the _____ tab.

Illustrations; INSERT

Two popular desktop publishing software programs are Adobe's _____ and Microsoft's _____.

InDesign; Publisher

Ultrabooks were originally named by _____ to differentiate them from older, bigger notebooks.

Intel

When a computing device is connected to the Internet, it is assigned a unique address called a(n) _____ address.

Internet Protocol (IP)

How does LinkedIn differ from Facebook and Google+?

It is more business-related.

This alternative to LCD displays is more expensive but consumes less energy.

LED

Scrobbler is the app from this music sharing website.

Last.fm

The Android mobile OS is based on

Linux

Which of the following operating systems is open source?

Linux

The open source OpenOffice productivity suite has been modified and repackaged under the name

Lotus Symphony.

Chapter 7 mentions that this type of computer was once considered safe from viruses but is now the focus of new malware.

Macs

Chapter 6 discusses three social networking sites, including all of the following except

MySpace

The _____ displays the active cell address or the name assigned to the active cell.

Name box

Apple devices contain three personal information management applications. Which of the following is not one of them?

Notes

What is the name of Microsoft's note-taking software?

OneNote

Buttons in the _____ tab are used to edit an image inserted into a document.

PICTURE TOOLS FORMAT

Once a picture has been inserted in a presentation, it can be resized using tool on the _____ tab.

PICTURE TOOLS FORMAT

_____ is similar to phishing except that the individual is tricked into typing in personal information at a phony website.

Pharming

You can add a border to an inserted picture with options in the _____ group of the PICTURE TOOLS LAYOUT tab.

Picture Styles

This feature automatically searches for and loads the appropriate driver when a new device is attached to the computer.

Plug and Play

Which popular plug-in come from Apple?

QuickTime

Which of the following is a popular program used for managing personal finances?

Quicken

What is the Mac OS X equivalent of the Windows Disk Cleanup utility?

Repair Disk

Text messages on mobile devices are sent using a service abbreviated as

SMS

When you are using software that is not installed on your computing device, you are using a(n) _____ application.

SaaS

The first time you save a document, clicking the Save button on the Quick Access Toolbar will cause the _____ to appear.

Save As Backstage view

A supercomputer named _____ at the Lawrence Livermore National Laboratory was named the top supercomputer in the Top 500 list of most powerful computers.

Sequoia

In Normal view, this pane displays at the left side of the screen.

Slide Thumbnail pane

_____ is a PowerPoint feature that uses graphics to visually communicate relationships in lists, processes, cycles, and hierarchies.

SmartArt

The decline of these two mobile operating systems is cited in Chapter 4 as an example of how the mobile market can change.

Symbian and Blackberry

The _____ feature is common to both PowerPoint and Word and allows you to organize text in columns and rows.

Table

How are rootkits different from other kinds of malware?

Their objective is not to spread to other computers.

In Mac OS X, the utility used to back up and restore files is called

Time Machine.

What type of malware disguises itself as a useful program?

Trojan horse

Three social bookmarking sites are discussed in Chapter 6. Which of the following is not one of them?

Tumblr

In Chapter 6, these two sites are categorized as microblogging services.

Twitter and Tumblr

_____ was designed as a server operating system.

UNIX

_____ computing refers to the fact that computing technology is everywhere and is used all the time.

Ubiquitous

Chapter 5 discusses three web-based productivity application suites. Which of the following is not one of them?

Ubuntu

_____ are a collection of different style and color schemes included in a theme family.

Variants

Which of the following is the latest security standard for wireless routers?

WPA2

What is the name of Quicken's legal software application?

WillMaker

Which of the following operating systems is the most popular?

Windows

What is the latest version of Microsoft's operating system?

Windows 8

Microsoft's earlier mobile OS, Windows Mobile, was replaced by

Windows Phone.

Font and paragraph formatting options in PowerPoint are the same as those in _____.

Word and Excel

Which of the following is the International Standards Organization (ISO) date format used by many global businesses?

YYYY-MM-DD

Can you send private messages on Facebook? If so, how?

Yes, with the Message tool.

What is the mathematical operator for exponentiation?

^

When you select a layout in the center pane of the Choose a SmartArt Graphic dialog box, what displays in the right pane?

a description of the layout and suggestions for its use

What displays when you click the WordArt button?

a drop-down list of WordArt styles

When a column's width has been made too narrow to show all of the characters, _____ displays instead.

a series of pound symbols (#####)

OneNote allows you to enter hand-written notes on a touch-enabled device via the use of

a stylus

The mixed addresses referred to in Chapter 9 are called mixed because they have both _____.

absolute and relative references

QuickBooks is a popular _____ application used by many small businesses.

accounting software

Apple uses _____ to designate versions of its Mac OS X family of operating systems.

animal names

Updating your family budget or writing a report for school are tasks you would accomplish with the _____ on your computer.

application software

A search phrase enclosed in quotations will return pages where the keywords

are in the same sequence

Social bookmarking is similar to using the Favorites list in your browser except that the links

are stored online on your social network

The inputs you supply for a function are referred to as parameters or _____.

arguments

A header is text that appears _____.

at the top of each page

The smallest unit of digital data in the binary system is called a

bit

A group of eight _____ is called a _____.

bits; byte

In Pinterest, you organize a collection of related pictures into a(n)

board

A category of social networking that provides tools with which you can organize, store, and share content with others is known as social

bookmarking

Starting a computer is called

booting

A collection of zombie computers used to conduct an attack on another network is called a

botnet

High-speed Internet access is referred to as

broadband

A software program used to view web pages is referred to as a web

browser

How do smart power strips reduce energy consumption?

by controlling the flow of power to peripheral devices when the main device is not active

In a table, the box that is the intersection of a row and a column is called a table _____.

cell

In Google+, the people you interact with are organized into categories called

circles

In this technique a button, graphic, or link on a web page appears to be real, but when clicked, causes malicious software to run.

clickjacking

In Chapter 1, Dropbox and Flickr are cited as examples of

cloud storage.

A cable modem connects to your cable network using a _____ cable, and from the cable modem to your computer or wireless router using a _____ cable.

coaxial; twisted pair

The combination of hardware architecture and software design that allows applications to run on your computer is referred to as the

computing platform

Technological _____ is the term used to describe the merging of several technologies into a single device.

convergence

The illegal activities involving computers discussed in Chapter 7 are collectively known as

cybercrime

In terms of the topics discussed in Chapter 7, DoS stands for

denial of service

Which of the following is not considered a mobile computer?

desktop computer

A USB wireless adapter is sometimes referred to as a

dongle

Server rooms are specially designed and maintained to avoid all of the following except

drafts.

These are the small programs the OS uses to communicate with devices connected to the computer.

drivers

Buying or selling over the Internet is known by this term.

e-commerce

IPv6 uses _____ groups of characters separated by _____.

eight; colons

From the Word Start screen, you can do any of the following except _____.

email a document to another user

Digital cameras, game consoles, and electronic thermostats are examples of devices that include

embedded computers.

Macro viruses are viruses that are

embedded in a document.

What type of operating systems will you find on devices such as ATMs and GPS units?

embedded operating systems

ERP software is used for

enterprise resource planning.

In a database table, columns are called _____ and rows are called _____.

fields; records

A _____ is hardware, software, or a combination of hardware and software that blocks unwanted access to your network.

firewall

Solid state drives (SSDs) use _____ to store information.

flash memory

All of the popular social networking sites discussed in Chapter 6 have _____ for use on your smartphone.

free mobile apps

A CPU's clock speed is usually measured in

gigahertz (GHz)

In the URL http://www.census.gov, the top level domain is

gov.

Chapter 4 mentions that Mac computers have been popular with _____ because of their hardware design.

graphic artists

Software programs for creating, editing, and manipulating drawings, photos, clip art, and scanned images are called _____ software.

graphics

In a worksheet, the active cell displays with a _____ border around it.

green

The alignment guides that help you position an inserted picture display as _____ horizontal and vertical lines.

green

All the physical components and devices comprising a computer are referred to as

hardware.

Chapter 7 lists three things you can do to prevent your computer from becoming a zombie, including 1) using antivirus software, 2) updating the OS regularly, and 3)

having an active firewall.

The Show/Hide button turns on or off the display of _____.

hidden formatting symbols

You can select cells using the keyboard by _____.

holding down the Shift key while you press an arrow key

The goal of Google's Android@Home project is to control _____ via an Android device.

household objects like a dishwasher or a heating system

What is the name of Apple's cloud based operating system?

iCloud

What is the name of Apple's mobile operating system?

iOS

Spiders and crawlers are used by search engines to generate

index entries.

Any device used to enter raw data or communicate instructions to the computer is referred to as a(n) _____ device.

input

Chapter 7 lists three common ways a computer can become infected with software that turns it into a zombie. Which of the following is not one of them?

installing an infected piece of hardware

What is the name for the process in which a CPU retrieves, decodes, executes, and stores an instruction?

instruction cycle

The PMT function cannot be used to estimate loan payments where the _____.

interest rate is variable

In Chapter 3, what reason is given for why OLED may replace LCD in the screens of mobile devices?

it consumes far less power

In a pie chart, each pie slice is sized to show _____.

its proportion to the total

Chapter 6 explains that blogs are basically _____ posted on a website with the most recent entry at the top of the page.

journals

Database management software

keeps track of large amounts of data

Each cell in a worksheet is identified with a _____ for the column and a _____ for the row.

letter, number

Pressing Shift + Enter inserts a _____, which moves the insertion point to the next line without creating a new paragraph.

line break

Debit and credit cards are read by

magnetic strip readers.

In the example given in the discussion of ubiquitous computing, a restaurant in California is using a sophisticated computer system to

manage sound levels.

Chapter 6 categorizes websites such as YouTube, Flickr, and Last.fm as _____ sites.

media sharing

Broadband connectivity speed is usually expressed as

megabits per second (Mbps)

Midrange servers used to be known as

minicomputers.

Handheld computing devices smaller than notebooks are referred to by the general term

mobile devices.

The main circuit board in a computer is called the

motherboard

On Windows computers, hard disk drives are assigned a drive letter; on a Mac computer, they are assigned a

name

A(n) _____ is two or more computers or other devices that are linked together to share resources and communicate with each other.

network

The device used to connect a computer to a network is called a

network adapter

The SmartArt List layout would be best used for _____.

non-sequential tasks or processes

Laptop computers are also referred to as

notebooks.

The COUNT function returns the _____ from the specified range.

number of cells that have values

What does Word do automatically when you use the Insert Caption feature?

numbers the pictures

Dates typed into a cell are stored as _____ values.

numerical

Chrome OS is designed for people who spend most of their computing time

on the Web

Resize an image in your slide by clicking and dragging _____.

one of the corner selection handles

In a DoS attack, a network or web server is

overwhelmed with network traffic

Chapter 5 explains that for professional publications, desktop publishing software is preferred over word processing software because of its advanced _____ capabilities.

page layout

Microsoft Outlook is an example of this type of productivity software.

personal information management

A message that appears to be from a bank directs the user to click a link and enter his or her account information, which is then used fraudulently. This is known as

phishing

Flickr is a popular _____ sharing website.

photo

Productivity software suites usually include all of the following applications except

photo editing

Connecting to someone else's wireless network without their consent is called

piggybacking

Resolution refers to the number of picture elements, or _____, that make up the image.

pixels

If you create a range with the name PricePerPound, which of the following would be recognized by Excel as the same name?

priceperpound

Which type of productivity software makes heavy use of Gantt charts to display data?

project management software

A rectangular-shaped group of cells is referred to as a _____.

range

Characters that are typed or otherwise entered into a computer are called

raw data.

In terms of video display, what does RGB stand for?

red, green, and blue

In a(n) _____ formula containing two addresses, both addresses will update if the formula is copied to a new location.

relative

Suppose someone sneaks into your house and unlocks the back door so other criminals can enter and steal your possessions. This is similar to what a _____ does.

rootkit

One of the things you can edit in an inserted photo is the purity of the colors, which is a characteristic referred to as _____.

saturation

A _____ is a device that uses optical technology to analyze text and/or images and convert them into data that can be used by the computer.

scanner

A personal computer (PC) is a computer in which the input, processing, and storage are

self-contained

A _____ is a computer with hardware and software that allows it to link together other computers in order to provide services and share resources.

server

When you add color behind text, it is called _____.

shading

In contrast to Facebook, Google+ lets you more easily

share information with a targeted group of people in your network.

When inserting a new slide, the _____ you choose determines the number, position, and type of content placeholders.

slide layout

When positioning an image in your slide, you can precisely align the image relative to adjacent text placeholders and margins with PowerPoint's horizontal and vertical _____.

smart guides

The AutoFormat feature converts straight apostrophes and quotation marks to _____.

smart quotes

What does SaaS stand for?

software as a service

Programs like Dragon NaturallySpeaking convert _____ into _____.

speech; text

Phishing and pharming scams use _____ techniques where a sender's email or IP address is altered to appear to be a trusted source.

spoofing

This type of software tracks your online activity without your knowledge.

spyware

Apple's iPad is an example of a(n)

tablet PC

In social bookmarking, bookmarks are created by _____ a website.

tagging

The Convert to SmartArt button converts existing _____ to a SmartArt graphic.

text

A cookie is a small _____ placed on your computer by a web server.

text file

To uninstall a program from your Windows system, you would begin by clicking Programs in

the Control Panel.

Several features new to Word 2013 are mentioned in Chapter 7. Which of the following is not one of them?

the ability to add clip art from Office.com

Moore's Law predicts a trend involving

the number of transistors that could be placed on a circuit.

At the Caption dialog box, what do you enter in the Caption text box?

the text that will appear as the caption

Most receipts you receive from retail stores are printed with a _____ printer.

thermal

According to Experian Hitwise's 2012 report, where does Pinterest rank in the United States in terms of the number of site visits?

third

The first slide in a presentation is a _____.

title slide

Chapter 7 lists several reasons why a DoS attack may be launched, including all of the following except

to steal personal information.

How many possible values are there for the smallest unit of data in a binary system?

two

Chapter 6 reports that as of June 2012, individuals are joining LinkedIn at a rate of

two new members per second.

Pinterest describes itself as a

virtual pinboard.

A _____ is a form of malware that once installed on a host computer, can replicate itself and spread to other computers.

virus

In Chapter 1, Google's Project Glass eyeglasses are discussed as an example of a(n)

wearable computer.

The web pages and resources needed for a website are stored on computers known as

web servers.

A _____ is a video camera built into a computer or plugged in as a peripheral.

webcam

A _____ is a collection of related web pages for one organization or individual.

website

QR codes are usually used to direct the reading device to a

website

_____ is a wiki described in Chapter 6; it contains over 140,000 how-to articles.

wikiHow

Microsoft Word is best described as a _____ application.

word processing

Files that you save in Excel are called _____.

workbooks

This type of malware is a self-replicating program that requires no action on the part of the user to copy itself to another computer.

worm

Computer-related tendonitis usually affects the

wrist.

Use the Pictures button to insert into your document pictures from _____.

your PC

Most personal finance software applications allow you to download activity from _____ into the program.

your banking account

The price you pay your ISP for Internet access likely depends on

your connection speed.

Table 7.1 lists several signs that your computer may be a zombie, including all of the following except

your login password no longer works

An Internet-connected computer that is controlled by a hacker or other cybercriminal without the owner's knowledge is called a _____ computer.

zombie


Kaugnay na mga set ng pag-aaral

Anatomy Unit 2: Support and Motion

View Set

Earth Science Chapter 14 (Hurley)

View Set

Anatomy Chapter 12 Summary Questions

View Set