TIA Final
The distance between two near field communication (NFC) devices is` limited to about ________.
1.5 inches
________ floods a computer with requests until it shuts down and refuses to answer any requests for information.
A DDos attack
Which of the following statements about a graphical user interface is FALSE?
A GUI is a command-driven interface.
UNIX was developed by Ken Thompson and Dennis Richie who worked at ________.
AT&T's Bell Labs
Which of the following is NOT one of the four major data processing functions of a computer?
Analyzing the data or information
________ reality is the addition of digital information directly into our reality, either to add more detail or to remove unwanted visual effects.
Augmentative
Computers use the ________ language consisting of 0s and 1s.
Binary
The term "bit" is short for ________.
Binary digit
A denial-of-service attack can be used to deny hackers access to a computer system.
False
When uninstalling software, it is best simply to open the Explorer window and delete the folder containing the software.
False
Zipcar is an example of ownership.
False
A(n) ________ cable carries all audio and video information from devices to a connected TV.
HDMI
The Witness Project hopes to stop ________ abuses throughout the world.
Human rights
________ is a field of study focused on the management, processing and automatic retrieval of information.
Information Technology
Which of the following is an open source operating system for personal computers?
LInux
Which of the following Operating Systems was designed to be a Unix-like OS that would run on a standard PC, and eventually was published under Open Source licensing?
Linux
Which of the following was the first widely used operating system installed in personal computers?
MS-DOS
All of the following are examples of software suites, EXCEPT ________.
Microsoft OneNote
The top three operating systems for personal computers are ________.
Microsoft Windows, Mac OS X, and Linux
The ________ Initiative is rallying the support of the world to identify mathematical genius.
Next Newton
The Apple iPhone uses iOS, a version of Apple's ________ as its operating system.
OSX
All of the following are examples of database software, EXCEPT ________.
OneNote
________ software helps you manage e-mail, contacts, calendars, and tasks in one place.
Personal information manager
Which of these statements about physically protecting your computer is FALSE?
Power surges can be blocked by using a computer surround.
Scanning a product's ________ code with a smartphone can take you to a website, a video, or a Facebook page for more information about the product.
QR quick response
All of the following are examples of permanent storage, EXCEPT ________.
RAM
Another way to obtain software is through ________, where a vendor hosts the software online over the Internet and you do not have to install it on your computer.
Software as a Service
The four functions of the computer include input, process, output, and ________.
Storage
Which of the following is the largest unit of measure for the size of a computer file?
Terabyte
A zombie is another person's computer controlled by a hacker.
True
OpenOffice.org is an example of open source software.
True
The central processing unit controls all the functions performed by the computer's other components and processes all the commands issued to it by software instructions.
True
Wizards are step-by-step guides for performing complicated tasks in application software.
True
Which of the following operating systems is used primarily with servers in a data center as opposed to being a user OS for a desktop or mobile computer?
UNIX
The unique address for a particular Web site is the ________.
URL
RAM is a ________ storage location.
Volatile
Software that enables you to display and interact with text and other media on the Web is a ________.
Web browser
When using a cell phone, a(n) ________ converter chip changes your voice's sound waves into digital signals.
analog-to-digital
The general software you use to do tasks at home, school, or work is known as ________ software.
application
All of the following are the main functions of antivirus software, EXCEPT ________.
assassinating all viruses
The goal of ________ technology research is to provide solutions to physical and health-related problems.
biomedical
Which of the following uses radio waves to transmit data signals over short distances?
bluetooth
Sharing products rather than owning them individually is known as ________.
collaborative consumption
Intellectual property (such as music, writing, and software) is protected through ________ law.
copyright
Adobe InDesign is an example of ________ software.
desktop publishing
Each device attached to your computer comes with a special program called a ________ that facilitates communication between the device and the OS.
device driver
The OS enables you to organize the contents of your computer in a hierarchical structure of ________.
directories
Social ________ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information.
engineering
Computers gather data, which means that they allow users to ________ data.
enter
All Web-based software is free.
false
Identity theft does NOT cause financial harm to individuals.
false
Social media directors need to understand HTML, Perl, and JavaScript.
false
Theft of a tablet is considered cybercrime.
false
There are more virus attacks on cell phone and smartphones than there are on PCs.
false
With Skype software installed on your phone, you can call any phone number for free.
false
The conversion rate is the number of times per second that the analog signal is measured and converted into a digital value.
false - sampling rate
C:\Documents\Spring 2012\CIS 101\Term Paper\Computer Technology is an example of a ________.
file path
Any part of the computer that you can touch is called ________.
hardware
The Web is based on the ________ Protocol.
hypertext Transfer
Rules for creating passwords include all of the following, EXCEPT ________.
keep your password written down and stored in any easy-to-remember location
The Internet is ________.
large group of networks
A ________ is approximately 1 million bytes.
megabyte
All of the following are considered cybercrimes, EXCEPT ________.
non-delivery of merchandise purchased online
The type of software license that is often free and includes the human-readable programming code is known as ________ software.
open source
The ________ is(are) the group of programs that controls how your computer functions.
operating system
When a business hires a third-party firm to provide services it once offered itself, it is called ________.
outsourcing
In the URL http://www.pearsonhighered.com/techinaction, the portion labeled "http" is the ________.
protocol
The "s" in "https" stands for ________.
secure socket layer
Every software program has a set of ________ that specify the minimum recommended standards for the operating system, processor, RAM, and hard drive capacity.
system requirements
In the URL http://www.pearsonhighered.com/techinaction, the portion labeled ".com" is the ________.
top-level domain
An Atlanta business that once used in-house employees but now contracts with a San Francisco company to provide customer support is engaging in outsourcing.
true
ComputerJobs.Com and ComputerWork.com are websites that can be used to search for IT jobs.
true
Every new cell/smartphone has to include a GPS chip.
true
Facebook allows you to determine the extent to which your information can be shared.
true
MS-DOS first used a command-line interface.
true
The Institute of Electrical and Electronics Engineers (IEEE) is an organization that provides leadership and determines engineering standards for network computing devices and protocols.
true
The Internet is the largest computer network in the world.
true
A(n) ________ is a small program that performs general housekeeping tasks for your computer.
utility program
Multimedia software includes all of the following, EXCEPT ________.
utility software
A(n) ________ is the portion of virus code that is unique to a particular computer virus.
virus signature