VT Chapter 1, VT Quiz 12, VT Quiz 11, VT Quiz 10, VT Quiz 9, VT Quiz 8, VT Quiz 7, VT Quiz 6, VT Chapter 4, VT Chapter 3, VT Chapter 2, VT Chapter 5
Which is not a modern source of installing software? Floppy drive Web Flash drive CD/DVD
Floppy drive
________ printers create an image by heating specially coated heat-sensitive paper that changes color where the heat is applied. Thermal Inkjet Laser Dye-sublimation
Thermal
________ is the most popular video-sharing service on the Internet. YouTube Apple iMovie Windows Movie Maker iTunes
YouTube
Files saved to a hard disk are stored in ________. areas one long track platters clusters
clusters
Eight bits equal ________ byte(s). 1 32 256 16
1
Which printer creates a model by building layers of a material such as resin or metal? Laser Dye-sublimation Thermal 3D
3D
What is not a part of Project management software? A timeline Team-planning capability Portfolio manager A database of customer contacts
A database of customer contacts
________ is a small, portable, solid-state drive. CompactFlash An optical disc A hard drive A flash drive
A flash drive
When you buy a textbook online from Amazon.com, you are participating in ________ e-commerce. C2A A2C B2B B2C
B2C
What is the oldest optical disc still in use today? CD Blu-ray DVD SSD
CD
Which of the following is not a valid character in a file name? Colon (:) Hyphen (-) Underscore (_) Semicolon (;)
Colon (:)
________ raises money from multiple small investors rather than a few large ones. Crowdsourcing Crowdfunding Crowdresourcing Crowdborrowing
Crowdfunding
The ________ enables users to enter a friendly name like google.com instead of an address like 74.125.224.72. IP ISP DNS TLD
DNS
Windows ________ helps to protect a computer from viruses and spyware. Disk Cleanup Protector Defender Check Disk
Defender
________ computing refers to the efficient and eco-friendly use of computers. Green Grid Ubiquitous Distributed
Green
74.125.224.72 is an example of a(n) ________. domain name protocol DNS IP address
IP address
What is not true about multitasking? It switches between tasks quickly. Each application is assigned its own area in memory. It allows the processor to actually do more than one task at a time. All modern operating systems support this technology.
It allows the processor to actually do more than one task at a time.
What is not true about hyper-threading? It is not dependent on those who write software. It enables one CPU to appear as two logical processors. It is a technology implemented by Intel. It is a virtual form of parallel processing.
It is not dependent on those who write software.
The Android operating system is the embedded version of ________. Windows UNIX macOS Linux
Linux
MP3 stands for ________. Megapixel Audio3 MPEG-3 Audio Layer 1 MPEG-3 MPEG-1 Audio Layer 3
MPEG-1 Audio Layer 3
What is not true about the BIOS? It is a program. It is stored on a chip on the motherboard. It is used to start up the computer. Older computers used Unified Extensible Firmware Interface instead.
Older computers used Unified Extensible Firmware Interface instead.
Which is the correct order of the phases in the SDLC? Planning, requirements, design, implementation, testing Planning, analysis, design, implementation and testing, maintenance Requirements, analysis, design, implementation and testing, maintenance Requirements, planning, design, implementation, testing
Planning, analysis, design, implementation and testing, maintenance
What is not true about Twitter? Posts are called Tweets. Twitter users have followers. Hashtags allow your posts to be searchable. Posts can be as long as you want.
Posts can be as long as you want.
Which of the following is not a SQL relational keyword? SELECT FROM WHERE QUIT
QUIT
File Explorer includes ________ access items on the Navigation pane to help you work more easily. Program Shortcut Easy Quick
Quick
Which type of memory is very fast and is located close to the processor? Cache DIMM RAM ROM
ROM
Using social media sites to sell services is called ________. Secure Sockets Layer (SSL) Social media marketing (SMM) Short Message Service (SMS) Really Simple Syndication (RSS)
Social media marketing (SMM)
________ involves the delivery of applications — web apps — over the Internet. Information-as-a-Service (IaaS) Software-as-a-Service (SaaS) Programming-as-a-Service (PaaS) Business-as-a-Service (BaaS)
Software-as-a-Service (SaaS)
________ are very expensive, complex computer systems used in weather forecasting and medical research. Supercomputers Enterprise computers Minicomputers Mainframe computers
Supercomputers
What computing device falls between a smartphone and a notebook computer? Portable media player MP3 player iPod Tablet
Tablet
________ consists of these four components: input, processing, storage, and output. Bioinformatics The information processing cycle The Turing test Unicode
The information processing cycle
Employees who are travelling can connect securely to their office network through the Internet when a ________ has been established. PAN LAN WLAN VPN
VPN
What type of high-speed network is normally set up in a person's home? Hotspot Municipal Wi-Fi Satellite Wi-Fi
Wi-Fi
To protect your computer from adware, you would purchase ________ software. anti-spam firewall antivirus antispyware
antispyware
The ________ allows a program to request a service such as printing from the operating system. client-server connection graphical user interface (GUI) Plug and Play (PnP) feature application programming interface (API)
application programming interface (API)
The Subscriber Identity Module (SIM card) stores all the following information on a mobile device, EXCEPT ________. cellular carrier apps account information phone identification
apps
The pre-release version of a program that is provided to some users and developers to preview and test before the final version is released, is called a(n) ________ version. beta delta out-house in-house
beta
Most larger businesses use a ________ type of network. client-server business-to-business workgroup peer-to-peer
client-server
An email claiming that you have won a lottery might be an example of ________. cyber-harassment cyberbullying cyber-stalking computer fraud
computer fraud
The part of the web that is unindexed is known as the ________. deep web clear web dark web closed web
deep web
The least expensive form of Internet connection is ________. DSL FTTH cable dial-up
dial-up
Linux ________ include the OS, various utilities, software applications, and an office suite. drivers clients distros APIs
distros
In the URL http://www.irs.gov, irs is the ________. TLD subdomain domain name protocol
domain name
In a transaction-processing system, ________ insures that transactions, once completed, cannot be undone. atomicity consistency isolation durability
durability
Knowledge engineers develop ________, which are programmed to make decisions in real-life situations. clones fuzzy logic expert systems knowledge bases
expert systems
A ________ can be set by an employer to prevent you from accessing eBay. firewall switch router wireless access point
firewall
In blockchain, each block has a unique ________ that converts the data into an encrypted output of a fixed length. chain hash block code
hash
In the Windows operating system, the Documents, Music, Pictures, and Videos folders are known as ________. file extensions libraries collections root directories
libraries
Forcing a processor to run at speeds higher than it was designed to perform is known as ________. overclocking supercharging turbocharging throttling
overclocking
Which would be the strongest password? p@ssw*rd p22w0r6 customer p@55W0?d
p@55W0?d
In the ________ phase of the SDLC, the project team is assembled and the feasibility studies are completed. planning analysis maintenance implementation
planning
The rules for communication between network devices are called ________. domains firewalls packets protocols
protocols
To print data or display it in an easy-to-read format, a ________ can be used. record form table report
report
One disadvantage to e-ink technology is that it ________. has a short battery life requires an external light for night reading causes eye strain cannot be read in bright light
requires an external light for night reading
The s in https stands for ________. system sponsored service secure
secure
A(n) ________ is a larger, planned update that addresses multiple problems or adds multiple features. upgrade patch hotfix service pack
service pack
Podcasts allow time ________, so you can listen on your own schedule. lagging delay shifting warping
shifting
All of the following are examples of malware, EXCEPT ________. spyware worms viruses spam
spam
To secure your wireless network at home, you should ________. back up the computers on the network use wireless encryption with a difficult passphrase password-protect important document files set the SSID to CLOSED
use wireless encryption with a difficult passphrase
Which of the following extensions is associated with a video file? .rtf .pdf .wmv .pptx
.wmv
Which of the following is a server-side programming technology? ASP Java applets JavaScript ActiveX controls
ASP
An end user license agreement represents which of the following? Agreement between the user and the software publisher Agreement between the user and the store where the software was purchased System requirements needed for downloading the software Hardware specifications for the computer
Agreement between the user and the software publisher
Which of the following is not an example of speech recognition software? Amazon Respond Cortana Google Now Siri
Amazon Respond
When sending one email to everyone in your address book, you should use the ________ field to keep their addresses private. Bcc To Subject Cc
Bcc
________ is the application of information technology to the field of biology. Bioengineering Bioinformatics Biocenosis Biofeedback
Bioinformatics
________ hackers hack into systems to steal or vandalize. Red-hat Black-hat White-hat Gray-hat
Black-hat
To connect peripherals at short ranges, you would use the ________ wireless technology. Ultraviolet RFID Infrared Bluetooth
Bluetooth
The ________ was the first working, digital, general-purpose computer. Z1 UNIVAC Colossus ENIAC
ENIAC
________ is an example of asynchronous communication. VoIP Chat Email Skype
________ computers are present in such diverse applications as gasoline pumps, home appliances, and traffic lights. Embedded Grid Convertible Distributed
Embedded
________ is the study of the relationship between workers and their workspaces. Biometrics Workplace safety Ergonomics Genomics
Ergonomics
Default programs are associated with which of the following? File types File folders Paths Devices
File types
Which of the following is not a common LAN topology? Bus Hierarchical Star Ring
Hierarchical
Which statement about a logic bomb is false? It can be triggered on a specific date. It can lay dormant until specific conditions are met. It can spread to other machines. It is often planted by a disgruntled IT worker.
It can spread to other machines.
What is not true about analytics? It comes standard in Project Management software. It detects patterns in data. It can raise profits. It can help a business make decisions.
It comes standard in Project Management software.
Which of the following is not true about Joint Application Development? It resolves usability problems, but it adds to the development time. It results in shorter development times. It is more collaborative than System Development Life Cycle. It resolves usability problems early in the process.
It resolves usability problems, but it adds to the development time.
Which of the following is not true of computational photography? It improves the quality of images. It uses optical processes. It allows for specialized images. It happens instantly inside the camera.
It uses optical processes.
________ Law predicted that the number of transistors placed on an integrated circuit would double approximately every two years. Turing's Babbage's Lovelace's Moore's
Moore's
Which of the following is not a Boolean operator? OR NOT NOR AND
NOR
The free online storage provided by Microsoft is called ________. LiveDrive CloudDrive OneDrive iCloud
OneDrive
________ software can be copied, modified, and redistributed without paying a fee. Open source Retail Trialware Shareware
Open source
What is not true about pop-up blockers? They prevent webpages from opening a new window. They can be configured for different sites. They are triggered by cookies. They can serve useful purposes.
They are triggered by cookies.
A system that simulates human thinking by emulating the biological connections of the brain is called ________. an expert system biofeedback a neural network fuzzy logic
a neural network
Procedural programming involves ________. writing executable pseudocode defining objects and the actions that can be performed on them a step-by-step list of instructions drawing flowcharts to ensure that procedures are followed
a step-by-step list of instructions
You would install a(n) ________ if you wanted to enable new capabilities in your web browser. plug-in add-on taskbar toolbar
add-on
In a transaction-processing system, ________ insures that transactions are either completed or not begun. consistency atomicity durability isolation
atomicity
All the information someone can find out about you by searching the web is called your ________. folksonomy tagged information avatar digital footprint
digital footprint
A ________ is a network composed of a group of clients and servers under the control of one central security database. homegroup domain client workgroup
domain
Hacking to make a political statement is called ________. cracking politicking sneaking hacktivism
hacktivism
The # symbol used by Twitter is called a(n) ________. hashtag forum digital footprint avatar
hashtag
P2P networks are normally found in ________. universities libraries homes corporations
homes
Wireless access points that are available in public spaces are called ________. Network Access Points hotspots hyperlinks Internet protocols
hotspots
________ allows you to sync your photos between your iPhone and your Mac. Flickr iCloud Photobucket Picasa
iCloud
Camera shake can be reduced by using a camera that provides ________. burst mode an optical zoom image stabilization a digital zoom
image stabilization
Windows maintains a(n) ________ on your system that helps to speed up searches. index algorithm default file property
index
A(n) ________ is a set of rules that are used to apply a knowledge base to each situation. difference engine cognitive computing system inference engine decision support system
inference engine
When using a Windows PC, you can use a ________ to organize similar files that are located in different locations. folder library path directory
library
A ________ error is an error in programming design that results in an unexpected outcome. logic syntax grammatical runtime
logic
To ensure that a person does not misspell Wednesday in a field, a(n) ________ list can be used. master Find feature inference lookup
lookup
The total zoom available on a camera is determined by digital zoom ________ optical zoom. multiplied by divided by added to subtracted from
multiplied by
Web apps which will run on any device with a supported browser and Internet access are called platform-________. apps neutral dependent specific
neutral
In a one-to-one relationship, both tables use the same ________ to link two records. primary key foreign key form query
primary key
Bidding by an accomplice to drive up the price of an auction is known as ________. fake bidding shill bidding bait-and-switch bidding false bidding
shill bidding
In addition to performing calculations, ________ organize data that can be sorted and filtered, making the data functional for lists and schedules. documents graphics pie charts spreadsheets
spreadsheets
You should use a(n) ________ account for everyday computing on a computer running Windows. guest administrator standard visitor
standard
A ________ is a device that connects multiple devices on a LAN. bus repeater router switch
switch
The rules that ensure the correct construction of commands in a programming language is called the ________. logic syntax grammatical semantic
syntax
The ________ houses the power supply, memory, and drive bays of the computer. ALU control unit CPU system unit
system unit
In a database, a ________ stores data in rows and columns. field table cell matrix
table
The difference between a virus and a worm is a ________. worm is a threat to your computer, but a virus is not virus is a threat to your computer, but a worm is not virus replicates itself, but a worm cannot self-replicate virus needs a host file, but a worm does not
virus needs a host file, but a worm does not