CGS 1060C Mid-Term Study Guide
___ printers are unique in that they can create a physical object made of various materials, such as a plastic toy.
3D
Which of the following is NOT one of the specifications of Wi-Fi technology?
802.11x
The seeds of the Internet were planted in 1969 with ___, which connected computers at four universities in the western United States.
ARPANET
Although Google owns ___ and manages the Google Play Store for apps, they allow any manufacturer to use and modify this operating system for their devices.
Android
We use the term ___ to refer to large volumes of data that are constantly being generated by our devices and digital transactions.
Big data
Which of the following is NOT a web browser?
Bing
___ refers to the measurement of patterns or characteristics found in the human body.
Biometrics
___ is an application of biology that uses living organisms to manufacture new products or improve existing ones.
Biotechnology
Which of the following optical discs can store the MOST data?
Blu-ray
Which of the following is a short-range wireless technology that can connect your smartphone with a wireless headset worn on the ear or the hands-free systems in some cars?
Bluetooth
As the main processor of a computer, the ___ is responsible for organizing and carrying out instructions in order to produce a desired output.
CPU
Suppose you are shopping for a computer and the description lists the following: Intel i7 3630QM3. Which component is being described here?
CPU
With the ___ operating system, you will be fully immersed in Google's ecosystem of apps and services.
Chrome
___ are small data files that are created by websites in order to remember users and their preferences the next time they visit the site.
Cookies
One of the newest additions to the Windows operating system is ___, an intelligent assistant that offers users a variety of services.
Cortana
___ is a form of electronic money that is decentralized and whose transactions are encrypted, processed, and recorded via peer-to-peer networks.
Cryptocurrency
The image quality (or print resolution) for printers is measured in:
DPI
Many individuals are using TV tuners as ___ to record television shows for future playback.
DVRs
___ consist of individual facts or pieces of information.
Data
Large organizations use ___ systems because they bring together many types of business functions into one software solution.
ERP
___ is the process of scrambling your data or storage devices to make them unreadable by anyone who doesn't have the proper key.
Encryption
___ keyboards, which are designed to be comfortable and tailored for the human body, have keys which are angled and a palm rest at the base in order to keep your wrists straight.
Ergonomic
Which of the following is an example of spreadsheet software?
Excel
Modern operating systems have a ___, allowing users to communicate via graphical elements on the screen.
GUI
One of the newest connectors for displays is ___, which carries both digital video and sound.
HDMI
The ___ protocol is used to deliver requested web pages to a computer.
HTTP
The communication of vibration, motion or physical resistance to a user is called:
Haptics
___ is the act of having an online, text-based conversation with one or more individuals that occurs in real time.
Instant messaging
Which of the following is NOT a virtual assistant that uses speech recognition to help users with a variety of tasks?
Intel's Alexis
In which of the following social networking sites are you most likely to find professionals who seek to make business-related connections?
___ is an open source operating system with hundreds of distributions that are available commercially or as a free download.
Linux
What is the name of the technology that can translate a scanned document image into text that can be edited and formatted?
OCR
The most popular method for file transfer today is known as ___ file sharing, which uses a distributed network of individual users instead of a central server.
P2P
Which of the following Adobe products would be the best choice for editing bitmap images?
Photoshop
Which of the following is an example of accounting software for businesses?
QuickBooks
Whenever you actively work on something using your computer, that work is temporarily stored in:
RAM
___ tags, such as those present in many automated toll collection systems, can be scanned from longer distances and at higher speeds than barcodes.
RFID
Social news sites, such as ___, encourage users to share links to news and other interesting content they find on the Web.
Ultraportable computers will often use ___ technology exclusively, even though their storage capacity is lower than that of a traditional hard drive offers.
SSD
___ are sophisticated services that store the URL of millions of web pages and most of the content on those pages.
Search engines
Which of the following storage units is the LARGEST?
Terabyte
Which technology has become the primary way in which we interact with our tablets and smartphones?
Touchscreen
The service known as ___ contains original content in the form of live or recorded streams showing individuals playing video games.
Twitch
Web pages have a standard addressing system known as a(n) ___, which allows them to be located on the Internet.
URLURL
The most popular plug on a computer is the small, rectangular ___ port, which is used to connect almost all of today's external devices.
USB
___, which can connect to the telephone network, translates analog voice signals into digital data and uses the Internet to transport the data.
VoIP
___ is not always considered to be a reliable site because you cannot be certain that the information you are reading comes from a credible source.
Wikipedia
The ___ is a global system of linked, hypertext documents.
World Wide Web
Which of the following is NOT a popular computer programming language?
Xero
"16:9" describes the ___ of a monitor
aspect ratio
If you want to include a file with your email message, it should be placed it in the __ area.
attachments
A ___ is a copy of one or more files (or entire storage devices) that is made in case the originals become lost or damaged.
backup
Any email address placed in the ___ will be invisible to the recipients of your message.
bcc
Software companies will often release a(n) ___ version to a limited audience that will test it on their systems. Programmers can then collect information from these users about any errors that were encountered.
beta
The most fundamental unit of computing is the ___, which is typically represented as a 1 or 0 value.
bit
A(n) ___ is a web page or small website that contains a series of chronological posts and comments.
blog
If you visit a website or page that you would like to remember for the future, you can add it to your browser's ___ or favorites.
bookmarks
The term ___ is used to describe any digital data connection that can transmit information faster than standard dial-up by using a wider band of frequencies.
broadband
A(n) ___ is just another name for an error in a program.
bug
The process of recording to a blank optical disc is known as:
burning
Computers that have the same operating system are said to be ___ with each other because they can support the same software.
compatible
The ___ is a program that translates a specific programming language into a machine language that can be processed by the CPU.
compiler
Many users choose to ___ several files into one ZIP file for the sake of easy transport, especially when attaching them to an email message.
compress
Federal ___ law gives software creators a variety of rights and privileges over their creative work.
copyright
Kickstarter is known as a(n) ___ website because it allows the general public to provide financial support to organizations and individuals that are working on a new product.
crowdfunding
Operating systems communicate with most hardware components using:
device drivers
A ___, such as apple.com and whitehouse.gov, uniquely identifies a site and a brand on the Web.
domain name
A browser ___ is a separate program that adds a variety of useful features to the web browser, such as sending instant messages or playing mobile-style games.
extension
A CPU's clock rate, or speed, is measured in MB or GB.
false
Although a MOOC allows any individual to register for online classes at Harvard and MIT, their high registration cost has limited their popularity.
false
DSL technology is currently faster than cable or fiber-optics.
false
Since the NTFS file system enjoys more widespread compatibility with other operating systems, it is often used on removable devices such SD cards and USB flash drives.
false
The Internet is managed centrally by the United States government, as it was primarily developed in this country.
false
The macOS operating system has the largest market share for personal computers.
false
The newest display technology, known as CRT, uses a grid of tiny electronic lights to illuminate the screen.
false
The process of converting algorithms into an actual computer program is known as flowcharting.
false
When it comes to the best possible security for your wireless router, be sure to use WEP encryption to ensure that your transmissions are unreadable by hackers.
false
A software-based ___ is dedicated to examining and blocking Internet traffic.
firewall
The instructions that handle a computer's basic functions when it is powered on are referred to as:
firmware
Many companies and specialty websites offer ___, or discussion boards, where individuals can ask questions and reply to each other.
forums
The ___ is the primary storage device of a personal computer.
hard drive
The physical devices that make up a computer system are called:
hardware
Twitter popularized a system that uses the ___ symbol to mark keywords or topics in a message.
hashtag
Which of the following operating systems is NOT likely to be running on a server?
iOS
Because of their sharp quality text output and fast printing speeds, ___ printers are often preferred by businesses.
laser
Collectively, all malicious programs are referred to as:
malware
Higher ___ cameras can capture more detail, but they will produce a larger image file on your storage media.
megapixel
Tumblr and Twitter and both examples of ___ services, where users share brief thoughts, links, and multimedia.
microblogging
Many apps encourage users to make small, yet frequent purchases of in-game (or virtual) cash via a process known as a(n):
microtransaction
One of the most famous ___ licenses is GPL, which ensures that a particular program remains free to distribute and allows its code to be examined and modified by anyone.
open source
In the model known as ___, advertisers pay for their ads only when a website visitor clicks on the ad.
pay-per-click
The ___ of a monitor refers to the number of pixels that it can display on the screen.
resolution
The ___ economy is an expression that refers to the way in which the Internet has facilitated our ability to share (usually for a price) our goods or services with other individuals.
sharing
The tiny memory cards used by digital cameras and mobile devices are an example of ___ storage.
solid state
Often times, several office programs are bundled as a unit known as an office:
suite
A ___ provides multiple ports for connecting nodes and is aware of the exact address or identity of all the nodes attached to it.
switch
The ___ is a stationary, rectangular pointing surface that is typically found on laptop computers.
touchpad
"192.168.1.101" is an example of an IPv4 address.
true
3G, 4G, and LTE are all terms that refer to mobile Internet connectivity.
true
An EULA usually takes the form of an electronic notification that appears when installing software. The user then has a choice to accept or decline the terms of this agreement.
true
Having a higher quantity of RAM will allow you to have more open programs and quickly switch between them.
true
Many employees use Microsoft Outlook as their PIM software, which allows them to manage their contacts, create appointments, and send email.
true
Medium to large businesses, or those with large data-storage needs, are more likely to use Microsoft SQL Server or Oracle as their DBMS.
true
PayPal is an example of an online payment service that allows you to pay for goods online and transfer money to other individuals.
true
The CTRL, ALT, and WINDOWS keys are commonly used for keyboard shortcuts, which are keystrokes that can quickly perform an operation within software.
true
The motherboard is the largest circuit board in a personal computer.
true
The purpose of an operating system is to manage the flow of data between hardware components and allow the user to communicate with the computer.
true
Individuals who require better speed and performance for graphics-intensive applications (e.g., video editing, gaming, etc.) prefer the faster processors and built-in memory included with ___.
video cards
A(n) ___ is a special environment that allows you to run an operating system on top of another operating system.
virtual machine
A ___ is a type of malware that is attached to a host file and has the ability to replicate, or copy, itself.
virus
A ___ license allows companies to install the software on multiple (or all) the machines that they own.
volume
A ___ is a fully-contained program that self-replicates and spreads through computers and networks.
worm
__ systems can include anything from sophisticated programs that answer questions to futuristic robots that can think and act like humans.
AI
A(n) ___ is a document containing an organization's policies for the ethical, secure, and appropriate use of computing resources.
AUP
Which of the following alternatives to piracy will allow you to listen to your favorite songs for free?
Ad-supported streaming
Which types of computers have all of the hardware integrated with the monitor?
All-in-one computers
___ occurs when computers or machines can perform the work that was once done by a human.
Automation
___, which are large networks of compromised computers, can be used by a hacker to spread malware, send spam, and conduct carefully orchestrated network attacks.
Botnets
Which of the following technologies allows you to store your files and use various applications in an online account?
Cloud computing
Which laptops allow users to swivel or detach the touchscreen monitor?
Convertible
A ___ attack allows hackers to shut down or block access to websites and other network resources by overwhelming them with requests.
DDoS
Software is sometimes illegally modified in order to disable ___ technologies such as copy protection and authenticity checks.
DRM
___ refers to the technology gap that exists between different social and economic classes.
Digital divide
Which low-cost devices feature crisp text that is capable of being read in even the brightest outdoor conditions?
E-book readers
___ are limited computers because they are placed inside devices which require specific computing functions.
Embedded systems
Most network installations use a(n) ___ star topology with twisted-pair cables that plug into the RJ45 port located on many devices.
Ethernet
Which of the following apps would you use if you wanted to create and share a grocery list with your family?
Evernote
Many websites have a(n) ___ area that should be checked for common questions and their responses.
FAQ
Which of the following statements about Google Photos is FALSE?
Integration with Facebook and Instagram allows users to add their favorite photos to these social networks with one tap
Which of the following terms refers to normal objects with the ability to connect to wireless networks and the Internet?
Internet of Things
Which of the following is a feature on your mobile device that allows the Yelp app to provide a list of restaurants that are close to you?
Location-based services
___ are files that record activities and events on a computer.
Logs
Each device with a NIC contains a unique identifier, known as a(n) ___ address, which distinguishes it from any other network-connected device in the world.
MAC
Using a wireless technology known as ___, many smartphones can now be tapped on special payment devices to complete your purchase at select stores.
NFC
Many government agencies, such as the ___, monitor the Internet and mobile activities of individuals all over the world.
NSA
___ involves the creation or manipulation of matter at the smallest possible scale.
Nanotechnology
___ aim(s) to revolutionize AI by asking computers to process data and learn in a manner inspired by the human brain.
Neural networks
___ occurs when an organization transfers some aspect of their business to a third party.
Outsourcing
Which category of computer is generally meant to be used by only one person at a time?
Personal computer
___ involves luring individuals into entering personal information into a website controlled by the hacker.
Phishing
___ is a feature of all modern browsers that will delete your history, cache, and cookies the moment you close the private window.
Private browsing
Which of the following refers to the ability of a computer to perform a variety of actions based on instructions from the user or a program?
Processing
Which of the following words is NOT part of the green computing model?
Repair
Which types of TVs allow you to connect to a variety of online services such as Netflix, Amazon, and Pandora?
Smart
___ is a type of malware which is designed to report activity on your computer to another party.
Spyware
___ media refers to music and movies that are delivered on demand from an online source.
Streaming
___ passwords are long and generally use a mix of upper and lower case letters, numbers, and at least one symbol such as a dash or period.
Strong
___ is the process of working for a company without being physically present at the company's office.
Telecommuting
A ___ is a program that disguises itself as an interesting, useful, or desirable program in order to gain access to your system.
Trojan horse
___ is the act of being annoying and antagonistic in online social interactions.
Trolling
___ is a feature that requires two forms of identification, such as a password and possession of your phone, to log into an account.
Two-factor authentication
When the power fails completely, the battery in a(n) ___ contains enough power to run a computer system for a given amount of time.
UPS
Because it increases the security of a network connection, a ___ is often required for users who wish to access a company's private network over an Internet connection.
VPN
If a company had its corporate headquarters in one city but its manufacturing plant in another, it would likely set up a(n) ___ to connect the systems in these two locations.
WAN
___ displays a form of artificial intelligence with its astounding capability to understand complex questions and quickly find the answers using large databases of information.
Watson
___ is the act of alerting the public about harmful activities that are being hidden by an organization.
Whistleblowing
Which of the following is NOT one of the three general strategies that are used to authenticate individuals?
Who you know
A wireless ___ is the device that all nodes connect to in order communicate wirelessly.
access point
In ___ reality, the real-world is supplemented with computer-generated information.
augmented
We are currently seeing an increase in home ___, where many household activities are being automated or controlled from a distance.
automation
A(n) ___ vehicle is a car, truck, or other mode of transportation that is capable of performing a variety of driving maneuvers without human intervention.
autonomous
Very few countermeasures are as effective as ___, which can help you recover data that was lost to almost any type of threat.
backups
For modern networks, ___ is measured in either megabits per second (Mbps) or gigabits per second (Gbps).
bandwidth
With ___ storage services, your files can be stored online and accessed from any Internet-connected device.
cloud
The set of instructions that directs the computer to perform a variety of tasks is known as a(n):
computer program
Any step you take to ward off a threat is called a:
countermeasure
In the field known as ___, experts use modeling software and statistics to extract knowledge from large volumes of data.
data analytics
Copyright law contains an exception known as ___, which provides for a limited set of circumstances where others can use portions of copyrighted material without first obtaining permission.
fair use
Although high quality movies can easily be streamed in homes, the slower speed of mobile networks creates a poor viewing experience for streamed movies.
false
Copyright protection lasts 20 years after the date of publication or release.
false
For watching TV episodes right after they are broadcast, Netflix is a better choice than Hulu.
false
Google transformed the smartphone market with the release of their revolutionary Nexus in 2007.
false
In the United States, there are laws to prevent VPN providers from keeping logs on your activity, so it is safe to assume that you have complete anonymity when browsing websites with a VPN.
false
Most experts recommend that companies monitor their employees secretly in order to prevent workers from circumventing the technologies used to track them.
false
Social engineering is a form of hacking that has a social or political agenda behind it.
false
The sleep mode on a computer generally saves more electricity than hibernate mode.
false
A ___ cable consists of a thin strand of glass that transmits pulsating beams of light rather than electric current.
fiber-optic
Digital ___ are effectively a trail of your data, activities, and even locations visited while carrying a smartphone.
footprints
Today, a ___ generally refers to an individual who uses a computer and/or network to commit a variety of crimes.
hacker
Which of the following is a popular tablet computer?
iPad
It is through ___ that a copyright holder can grant usage or distribution rights to others.
licensing
Wireless ___ networks, where nodes connect directly to each other, may be used in large homes or businesses to easily cover the entire area.
mesh
The term ___ refers to the set of online behaviors that are considered polite and proper.
netiquette
A(n) ___ allows users to communicate and share information between computers.
network
Data moves through networks in structures known as ___, which are pieces of a message broken down into small units by the sending device and reassembled by the receiving device.
packets
In the world of computing, ___ means acquiring or exchanging copies of protected digital creations without payment or permission from their creator.
piracy
Online companies typically have a(n) ___ on their websites that clearly state what information is collected from users and what is done with that information.
privacy policy
Mobile devices allow us to access ___ information such as current traffic conditions for our city and live radar images on a weather app.
real-time
The scam known as ___ typically comes in form of an alert message that claims to be from the FBI or your security software.
scareware
A network ___ is a powerful computer with special software and equipment that enables it to function as the primary computer in a network.
server
NASA uses ___ to conduct complex modeling and simulations for upcoming missions.
supercomputers
A ___ is an inexpensive product that guards connected equipment against large power spikes or surges that may infrequently occur.
surge protector
Creative works such as books, songs, and photographs are protected by copyright law.
true
Dust can clog cooling systems such as fans, which in turn may cause hardware to overheat
true
Ethics involves a rational analysis of the voluntary, moral choices that individuals make.
true
For those who have lost a limb, engineers have developed robotic prosthetics that can perform a variety of movements by simply projecting a thought to them.
true
Many thieves use the temptation of free (illegal) software to lure individuals into downloading malware on file-sharing services.
true
Most Creative Commons licenses require, at a minimum, that the user provide attribution to the author wherever the work is used.
true
Some watches can display useful alerts and incoming messages from your smartphone.
true
The Amazon Echo is an example of a smart speaker.
true
The wireless access points that are used in homes contain integrated routers, as do the devices that ISPs typically provide for Internet connectivity.
true
Today's gaming consoles are complete entertainment systems, offering Internet connectivity, movie rentals, photo storage, and many other services in addition to video games.
true
Wi-Fi is the current standard for wireless networks and Internet connectivity.
true
Your public, online activity may not only affect your ability to be hired, but it could also place you at risk of losing your job if you make your company look negative or careless.
true