cgs1060c
___ printers are unique in that they can create a physical object made of various materials, such as a plastic toy.
3D
Which of the following is NOT one of the specifications of Wi-Fi technology?
802.11x
The seeds of the internet were planted in 1969 with ___, which connected computers at four universities in the western United States.
ARPANET
A wireless ___ is the device that all nodes connect to in order communicate wirelessly.
Access point
Which types of computers have all of the hardware integrated with the monitor?
All-in-one
Although Google owns ___ and manages the Google Play Store for apps, they allow any manufacturer to use and modify this operating system for their devices.
Android
"16:9" describes the ___ of a monitor
Aspect Ratio
Software companies will often release a(n) ___ version to a limited audience that will test it on their systems. Programmers can then collect information from these users about any errors that were encountered.
Beta
Which of the following is NOT a web browser?
Bing
Which of the following optical discs can store the MOST data?
Blu-Ray
The term ___ is used to describe any digital data connection that can transmit information faster than standard dial-up by using a wider band of frequencies.
Broadband
As the main processor of a computer, the ___ is responsible for organizing and carrying out instructions in order to produce a desired output.
CPU
Suppose you are shopping for a computer and the description lists the following: Intel i7 3630QM3. Which component is being described here?
CPU
With the ___ operating system, you will be fully immersed in Google's ecosystem of apps and services.
Chrome
Which of the following technologies allows you to store your files and use various applications in an online account?
Cloud Computing
Computers that have the same operating system are said to be ___ with each other because they can support the same software.
Compatible
The set of instructions that directs the computer to perform a variety of tasks is known as a(n)
Computer Program
___ are small data files that are created by websites in order to remember users and their preferences the next time they visit the site.
Cookies
One of the newest additions to the Windows operating system is ___, a virtual assistant that offers users a variety of services.
Cortana
__ is a form of electronic money that is decentralized and whose transactions are encrypted, processed, and recorded via peer-to-peer networks.
Cryptocurrency
A ___ attack allows hackers to shut down or block access to websites and other network resources by overwhelming them with requests.
DDoS
The image quality (or print resolution) for printers is measured in:
DPI
Many individuals are using TV tuners as ___ to record television shows for future playback.
DVRs
___ consist of individual facts or pieces of information.
Data
Large organizations use ___ systems because they bring together many types of business functions into one software solution.
ERP
__ is the process of scrambling your data or storage devices to make them unreadable by anyone who doesn't have the proper key.
Encryption
___ keyboards, which are designed to be comfortable and tailored for the human body, have keys which are angled and a palm rest at the base in order to keep your wrists straight.
Ergonomic
Which of the following is an example of spreadsheet software?
Excel
A browser ___ is a separate program that adds a variety of useful features to the web browser, such as sending instant messages or playing mobile-style games.
Extension
A ___ cable consists of a thin strand of glass that transmits pulsating beams of light rather than electric current.
FIBER-OPTIC
In general, ergonomics refers to the cost-benefit analysis performed by companies when deciding which hardware components to purchase for an upcoming systems refresh.
False
Integration with Facebook and Instagram allows users to add their favorite photos to these social networks with one tap
False
A software-based ___ is dedicated to examining and blocking Internet traffic.
Firewall
Modern operating systems have a ___, allowing users to communicate via graphical elements on the screen.
GUI
One of the newest connectors for displays is ___, which carries both digital video and sound.
HDMI
The ___ protocol is used to deliver requested web pages to a computer.
HTTP
The communication of vibration, motion or physical resistance to a user is called:
Haptics
The physical devices that make up a computer system are called
Hardware
Which of the following is a popular tablet computer?
IPad
___ is the act of having an online, text-based conversation with one or more individuals that occurs in real time.
Instant messaging
Which of the following is NOT a virtual assistant that uses speech recognition to help users with a variety of tasks?
Intel's Alexis
Which of the following terms refers to normal objects with the ability to connect to wireless networks and the internet?
Internet of things
In which of the following social networking sites are you most likely to find professionals who seek to make business-related connections?
__ is an open source operating system with hundreds of distributions that are available commercially or as a free download.
Linux
Which of the following is a feature on your mobile device that allows the Yelp app to provide a list of restaurants that are close to you?
Location Based Services
Each device with a NIC contains a unique identifier, known as a(n) ___ address, which distinguishes it from any other network-connected device in the world.
MAC
What is the name of the technology that can translate a scanned document image into text that can be edited and formatted?
OCR
The most popular method for file transfer today is known as ___ file sharing, which uses a distributed network of individual users instead of a central server.
P2P
___services allow users to live-stream a variety of channels that are typically offered by cable TV subscriptions.
P2P (pay to play)
In the model known as ___, advertisers pay for their ads only when a website visitor clicks on the ad.
PAY-PER-CLICK
Which category of computer is generally meant to be used by only one person at a time?
Personal Computers
Which of the following Adobe products would be the best choice for editing bitmap images?
Photoshop
Which of the following is an example of accounting software for businesses?
Quickbooks
Whenever you actively work on something using your computer, that work is temporarily stored in:
RAM
___ tags, such as those present in many automated toll collection systems, can be scanned from longer distances and at higher speeds than barcodes.
RFID
Ultraportable computers will often use ___ technology exclusively, even though their storage capacity is lower than that of a traditional hard drive.
SSD
Which types of TVs allow you to connect to a variety of online services such as Netflix, Amazon, and Pandora?
Smart
The tiny memory cards used by digital cameras and mobile devices are an example of ___ storage.
Solid State (ssd)
Which of the following is NOT a mobile payment service that allows you to send money to other individuals?
Strava
__ media refers to music and movies that are delivered on demand from an online source.
Streaming
NASA uses ___ to conduct complex modeling and simulations for upcoming missions.
Supercomputers
Which of the following storage units is the LARGEST?
Terabyte
The ___ is a stationary, rectangular pointing surface that is typically found on laptop computers.
Touchpad
Which technology has become the primary way in which we interact with our tablets and smartphones?
Touchscreen
An EULA usually takes the form of an electronic notification that appears when installing software. The user then has a choice to accept or decline the terms of this agreement.
True
Having a higher quantity of RAM will allow you to have more open programs and quickly switch between them.
True
Many employees use Microsoft Outlook as their PIM software, which allows them to manage their contacts, create appointments, and send email.
True
Medium to large businesses, or those with large data-storage needs, are more likely to use Microsoft SQL Server or Oracle as their database.
True
The purpose of an operating system is to manage the flow of data between hardware components and allow the user to communicate with the computer.
True
When the power fails completely, the battery in a(n) ___ contains enough power to run a computer system for a given amount of time.
UPS
Web pages have a standard addressing system known as a(n) ___, which allows them to be located on the internet.
URL
Individuals who require better speed and performance for graphics-intensive applications (e.g., video editing, gaming, etc.) prefer the faster processors and built-in memory included with ___.
VIDEO CARDS
Because it increases the security of a network connection, a ___ is often required for users who wish to access a company's private network over an Internet connection.
VPN
A(n) ___ assistant is an artificially intelligent, voice-activated assistant that is intended to offer some of the services that a personal (human) assistant would normally provide.
Virtual
A(n) ___ is a special environment that allows you to run an operating system on top of another operating system.
Virtual Machine
__, which can connect to the telephone network, translates analog voice signals into digital data and uses the internet to transport the data.
VoIP
A ___ license allows companies to install the software on multiple (or all) the machines that they own.
Volume
If a company had its corporate headquarters in one city but its manufacturing plant in another, it would likely set up a(n) ___ to connect the systems in these two locations.
WAN
___ is the security standard for wireless communication between devices and a router.
WPA2
Which of the following is NOT one of the three general strategies that are used to authenticate individuals?
Who you know
The ___ is a global system of linked, hypertext documents.
World Wide Web
In ___ reality, the real-world is supplemented with computer-generated information.
augmented
We are currently seeing an increase in home ___, where many household activities are being automated or controlled from a distance.
automation
A(n) ___ vehicle is a car, truck, or other mode of transportation that is capable of performing a variety of driving maneuvers without human intervention.
autonomous
A ___ is a copy of one or more files (or entire storage devices) that is made in case the originals become lost or damaged.
backup
For modern networks, ___ is measured in either megabits per second (Mbps) or gigabits per second (Gbps).
bandwidth
Any email address placed in the ___ will be invisible to the recipients of your message.
bcc
We use the term ___ to refer to large volumes of data that are constantly being generated by our devices and digital transactions.
big data
___ refers to the measurement of patterns or characteristics found in the human body.
biometrics
The most fundamental unit of computing is the ___, which is typically represented as a 1 or 0 value.
bit
__, which are large networks of compromised computers, can be used by a hacker to spread malware, send spam, and conduct carefully orchestrated network attacks.
botnets
A(n) ___ is just another name for an error in a program.
bug
With ___ storage services, your files can be stored online and accessed from any internet-connected device.
cloud
The ___ is a program that translates a specific programming language into a machine language that can be processed by the CPU.
complier
Many users choose to ___ several files into one ZIP file for the sake of easy transport, especially when attaching them to an email message.
compress
Which laptops allow users to swivel or detach the touchscreen monitor?
convertible
Federal ___ law gives software creators a variety of rights and privileges over their creative work.
copyright
In the field known as ___, experts use modeling software and statistics to extract knowledge from large volumes of data.
data analytics
Operating systems communicate with most hardware components using:
device drivers
A ___, such as apple.com and whitehouse.gov, uniquely identifies a site and a brand on the web.
domain name
___ are limited computers because they are placed inside devices which require specific computing functions.
embedded systems
Most network installations use a(n) ___ star topology with twisted-pair cables that plug into the RJ45 port located on many devices.
ethernet
The instructions that handle a computer's basic functions when it is powered on are referred to as:
firmware
The ___ economy describes the explosion of freelance workers that now perform the work that may otherwise be performed by full-time workers.
gig
The ___ is the primary storage device of a personal computer.
hard drive
Which of the following operating systems is NOT likely to be running on a server?
iOS
Which of the following personal safety features of mobile devices was NOT described in the textbook?
iOS and Android devices can send you warning message if you enter a dangerous area such as a quarantine zone
Because of their sharp quality text output and fast printing speeds, ___ printers are often preferred by businesses.
laser
Collectively, all malicious programs are referred to as:
malware
Higher ___ cameras can capture more detail, but they will produce a larger image file on your storage media.
megapixel
Many apps encourage users to make small, yet frequent purchases of in-game (or virtual) cash via a process known as a(n):
microtransaction
One of the most famous ___ licenses is GPL, which ensures that a particular program remains free to distribute and allows its code to be examined and modified by anyone.
open source
___ involves luring individuals into entering personal information into a website controlled by the hacker.
phishing
Mobile devices allow us to access ___ information such as current traffic conditions for our city and live radar images on a weather app.
real time
The ___ of a monitor refers to the number of pixels that it can display on the screen.
resolution
The scam known as ___ typically comes in form of an alert message that claims to be from the FBI or your security software.
scareware
__ is a type of malware which is designed to report activity on your computer to another party.
spyware
A ___ is an inexpensive product that guards connected equipment against large power spikes or surges that may infrequently occur.
surge protector
A ___ is a fully-contained program that self-replicates and spreads through computers and networks.
worm
Which of the following is NOT a popular computer programming language?
xero