Chapter 2: "TECHNOLOGY ESSENTIALS"

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

The Internet is currently using IPv4. What is the next version that will be employed? a) IPv6 b) IPv4.1 c) IPv5 d) None of the above

Answer: a

__________ is a communications service that allows users to communicate in real time over the Internet. a) Instant Messaging b) Blackberry Messaging c) Skype d) WebEx

Answer: a

___________________ is ensuring that data is available to those who need it, when they need it. a) Availability b) Integrity c) Confidentiality d) Disaster recovery e) None of the above

Answer: a

____ contains instructions and data that only special devices can alter. a) ROM b) RAM c) KB d) GB e) None of the above

Answer: a Difficulty: Difficult

_____ is the primary language for creating web pages. a) HTML b) JavaScript c) Ajax d) C+

Answer: a Difficulty: Difficult

A _____ connects, translates, and then directs data that cross between two networks. a) Router b) Hub c) Repeater d) Bridge

Answer: a Difficulty: Easy

Software tools that help individuals and teams keep up with their scheduled meetings, monitor projects, and share work files are known as: a) Groupware b) Microsoft Groove c) SharePoint d) Blackboard

Answer: a Difficulty: Easy

____ is a method of publishing audio programs via the Internet that allows users of just about any digital audio device to download broadcasts or to subscribe to a feed of new files (usually MP3s). a) Podcasting b) Blogging c) Vlogging d) Broadcasting

Answer: a Difficulty: Easy

_____ move around from site to site reading meta tags, and then report the data back to their database for storage. a) Spiders b) Metasearch engines c) Crabs d) Web browsers

Answer: a Difficulty: Easy

Another term for Crawlers is: a) Spiders b) Metasearch c) Crabs d) Queries

Answer: a Difficulty: Medium

HTTP lives at the ____ layer of networks. a) Application b) Presentation c) Network d) Data Link e) None of the above

Answer: a Difficulty: Medium

Who is known as the inventor of the World Wide Web? a) Tim Berners-Lee b) Bill Gates c) Steve Jobs d) Thomas L. Friedman e) None of the above

Answer: a Difficulty: Medium

_____ software provides additional tools that you can use to maintain and service your system a) Utility b) Driver c) Operating System d) Application e) None of the above

Answer: a Difficulty: Medium

Servers are often assigned a specific task, such as handling Web traffic. What is this type of server called? a) Web server b) Application server c) Gateway server d) Firewall server

Answer: a Difficulty: Difficult

Network connection hardware includes all of the following components except: a) Phone lines b) NIC c) Modems d) Cable modems e) Wireless cards

Answer: a Difficulty: Easy

The use of malicious code as part of a subversive, organized scheme is called: a) Malware b) Scareware c) Virus d) Worm

Answer: a Difficulty: Medium

A ____ is also known as a concentrator: a) Router b) Hub c) Repeater d) Bridge

Answer: b

Computer monitors, printers, speakers, and MP3 players are examples of: a) Input devices b) Output devices c) Processing devices d) Storage devices e) None of the above

Answer: b Difficulty: Easy

Examples of _____ include the computer hard drive, CDs, DVDs, USB flash memory, and external hard drives a) Input devices b) Output devices c) Processing devices d) Storage devices e) None of the above

Answer: b Difficulty: Easy

ISP stands for: a) Internet supply provider b) Internet service provider c) Internet server provider d) Internet support provider

Answer: b Difficulty: Easy

Microsoft Excel is an example of: a) Document preparation software b) Electronic spreadsheet software c) Presentation graphics software d) Database management system e) None of the above

Answer: b Difficulty: Easy

Unsolicited and undesired emails are called: a) Junk b) Spam c) DoS d) Phishing

Answer: b Difficulty: Easy

__________ temporarily locates data and instructions before processing. a) Processing b) Memory c) Input d) Output e) Storage

Answer: b Difficulty: Easy

A computer network consists of _____ that represent computer hardware: a) Communications b) Nodes c) Ports d) None of the above

Answer: b Difficulty: Medium

A type of malware designed to trick victims into purchasing and downloading useless and potentially dangerous software is called: a) Malware b) Scareware c) Virus d) Worm

Answer: b Difficulty: Medium

A(n) ____ application is an example of utility software that helps guard your computer against unauthorized access when connected to a network. a) Driver b) Firewall c) Anti-virus d) Malware

Answer: b Difficulty: Medium

Clock speed on a computer is measured most recently in: a) Megahertz (MHz) b) Gigahertz (GHz) c) Megabytes (MB) d) Gigabytes (GB) e) None of the above

Answer: b Difficulty: Medium

Modem speed is measured in: a) PPM b) BPS c) RPM d) None of the above

Answer: b Difficulty: Medium

A(n) ____ is a set of services for distributing private information throughout an organization using a collection of private computer networks brought together to form an organization-wide, private network. a) Internet b) Extranet c) Intranet d) None of the above

Answer: c Difficulty: Difficult

A ____________ operates over a large geographic area, and shares data, information, and resources among units of an organization distant from one another. a) PAN b) MAN c) WAN d) LAN e) None of the above

Answer: c Difficulty: Easy

Benefits of using a GDT are all but one of the following: a) People can work from any place and at any time. b) Organizations can recruit the best people regardless of their physical location. c) Travel and sometimes facilities expenses are increased. d) There is greater flexibility for workers.

Answer: c Difficulty: Easy

You can think about _____ as information that specifies how a hardware device should work with other data, information, and knowledge: a) Instructions b) Operating systems c) Software d) Drivers

Answer: c Difficulty: Easy

_____ software is software that can be used, modified, improved, and redistributed. a) Utility software b) Middleware c) Open source d) Drivers

Answer: c Difficulty: Easy

A ______ is a standard set of rules that allows the communication of data between nodes on a network. a) Moral b) Code c) Protocol d) Ethic

Answer: c Difficulty: Medium

A program that is able to copy itself and infect a computer is called: a) Malware b) Scareware c) Virus d) Worm

Answer: c Difficulty: Medium

A ____ is a group of people who work across geographic distance. a) Dispersed team b) Localized team c) Dedicated team d) Virtual team

Answer: d Difficulty: Medium

A ___________________ allows an organization to resume operations after a major event that interrupts normal business processes. a) Availability b) Integrity c) Confidentiality d) Disaster recovery plan e) None of the above

Answer: d Difficulty: Medium

A business _____________ plan addresses other aspects of resuming business operations, including loss and personnel recovery. a) Availability b) Integrity c) Confidentiality d) Continuity e) None of the above

Answer: d Difficulty: Medium

The Internet uses: a) TCP/IP suite of packet switching protocols b) Number of routers connecting points throughout the world c) Proprietary set of rules d) A and B e) B and C

Answer: d Difficulty: Medium

Which of the following is the most commonly known type of cloud computing? a) PaaS b) PAS c) ASP d) SaaS e) None of the above

Answer: d Difficulty: Medium

A computer network requires four primary components. Which of the following is NOT one of them? a) Data that computers share on the network b) Special hardware c) Software that allows computers to communicate d) Communication media to link the computers together e) None of the above

Answer: e Difficulty: Medium

An example of a Personal Information Management system is: a) Microsoft Word b) Microsoft Excel c) Microsoft PowerPoint d) Microsoft Access e) None of the above

Answer: e Difficulty: Medium

The Internet is sometimes known as a ____area network: a) Personal b) Local c) Wide d) Municipal e) None of the above

Answer: e Difficulty: Medium

A plotter is: a) A printer b) A scanner c) Special architectural hardware d) None of the above

Answer: a Difficulty: Easy

Computers have long-term memory called: a) ROM b) RAM c) KB d) GB e) None of the above

Answer: a Difficulty: Easy

Higher clock speeds usually mean ________ performance. a) Faster b) Slower c) Worse d) Better

Answer: a Difficulty: Easy

Keyboards, pointing devices (such as a Wii, mouse, or touchpad), scanners, and digital cameras are examples of: a) Input devices b) Output devices c) Processing devices d) Storage devices e) None of the above

Answer: a Difficulty: Easy

Microsoft Word is an example of: a) Document preparation software b) Electronic spreadsheet software c) Presentation graphics software d) Database management system e) None of the above

Answer: a Difficulty: Easy

Static web page file will typically hold a combination of text content and ____ commands. a) HTML b) JavaScript c) Ajax d) C+

Answer: a Difficulty: Easy

The digital signals going out from your computer into an analog signal appropriate for the connection medium used is called: a) Modulation b) Demodulation c) Conversion d) None of the above

Answer: a Difficulty: Easy

Today, the fastest-growing network is arguably our global computer network, known as the: a) Internet b) Extranet c) Intranet d) None of the above

Answer: a Difficulty: Easy

___ is the popular name for 802.11 standards for wireless network access. a) Wi-Fi b) VoIP c) Cloud d) TCP/IP

Answer: a Difficulty: Easy

_____ temporarily locates data and instructions before processing. a) Memory b) The CPU c) The keyboard d) The mouse e) None of the above

Answer: a Difficulty: Easy

A ____ sends out a search query to other search engines, and then returns the list to you. a) Metasearch engine b) Spiders c) SQL d) Crawlers

Answer: a Difficulty: Medium

A ________________ covers a very small space that ranges from the size of a human body to a small office . a) PAN b) MAN c) WAN d) LAN e) None of the above

Answer: a Difficulty: Medium

A chalk mark on the side of a building put there by a hacker indicating an open network is available inside is called: a) Warchalking b) Chalktagging c) Chalking d) Chalkmarking

Answer: a Difficulty: Medium

A(n) _______________________ performs processor- intensive computations using parallel processing. a) Supercomputer b) Mainframe c) Server farm d) Embedded processor e) None of the above

Answer: a Difficulty: Medium

A ____ serves as a central connection point for cables from the devices on the network. a) Router b) Hub c) Repeater d) Bridge

Answer: b Difficulty: Difficult

_____ is/are software that is more common in enterprises. Its purpose is to link applications that use dissimilar software or hardware platform. a) Utility software b) Middleware c) Open source software d) Drivers

Answer: b Difficulty: Difficult

A ____ area network is within the immediate location or building. a) Personal b) Local c) Wide d) Municipal e) None of the above

Answer: b Difficulty: Easy

A _____ is a software application that allows you to easily navigate the Web and view the content you find there. a) Web Server b) Web browser c) Search engine d) None of the above

Answer: b Difficulty: Easy

Servers are often assigned a specific task, such as running programs. What is this type of server called? a) Web server b) Application server c) Gateway server d) Firewall server

Answer: b Difficulty: Easy

The Internet and the World Wide Web use which protocol to transmit messages? a) HTTP b) TCPIP c) HTML d) URL e) None of the above

Answer: b Difficulty: Easy

The _____ software coordinates and handles the details of working with the computer hardware. a) Instruction b) Operating system c) Driver d) Utility

Answer: b Difficulty: Easy

Converting an analog signal back into a digital signal that your computer can recognize is called: a) Modulation b) Demodulation c) Conversion d) None of the above

Answer: b Difficulty: Medium

Processing, memory, and storage are three components of: a) Information technology b) Basic hardware c) Networking components d) None of the above e) All of the above

Answer: b Difficulty: Medium

Which of the following carries out many of the organizational processing needs using high-speed processing chips and large amounts of memory? a) Supercomputer b) Mainframe c) Server farm d) Embedded processor e) None of the above

Answer: b Difficulty: Medium

Which of the following operates within the immediate location or building, and shares files, resources, servers, and other hardware among the members of an organization? a) PAN b) MAN c) WAN d) LAN e) None of the above

Answer: b Difficulty: Medium

_____ uses the Internet's foundation technologies of packet switching and TCP/IP to carry voice instead of data. a) Wi-Fi b) VoIP c) Cloud d) TCP/IP

Answer: b Difficulty: Medium

_____________ is ensuring that data is not changed and represents the original secure data. a) Availability b) Integrity c) Confidentiality d) Disaster recovery e) None of the above

Answer: b Difficulty: Medium

____ stores data only until they are no longer needed, or until you shut down the computer. a) ROM b) RAM c) KB d) GB e) None of the above

Answer: b Difficulty: Easy

A(n) _______________________ allows multiple servers to handle network processing activities. a) Supercomputer b) Mainframe c) Server farm d) Embedded processor e) None of the above

Answer: c Difficulty: Difficult

Network traffic hardware includes all of the following except: a) Routers b) Bridges c) Hard drives d) Repeaters e) Hubs

Answer: c Difficulty: Difficult

____ computing simply means computing over the Internet. a) Wi-Fi b) VoIP c) Cloud d) TCP/IP

Answer: c Difficulty: Difficult

A flash memory stick is an example of: a) Input b) Output c) Storage d) Network e) Scanner

Answer: c Difficulty: Easy

An attempt to make a website unavailable to its users by sending the target so many communication requests that its server eventually goes down is called: a) Junk b) Spam c) DoS d) Phishing

Answer: c Difficulty: Easy

PDA stands for: a) Professional digital assistant b) Programming digital assistant c) Personal digital assistant d) Portable digital assistant

Answer: c Difficulty: Easy

ROM stands for: a) Read only management b) Random only management c) Read only memory d) Random only memory

Answer: c Difficulty: Easy

The _____ you type into your browser can also be called a Web address: a) HTTP b) HTML c) URL d) XML e) None of the above

Answer: c Difficulty: Easy

The hardware location that temporarily stores data and instructions is: a) USB key b) ROM c) RAM d) Hard drive

Answer: c Difficulty: Easy

A ______ is sometimes needed to strengthen or amplify signals that are sent along a long transmission route. a) Router b) Hub c) Repeater d) Bridge

Answer: c Difficulty: Medium

BPS stands for: a) Bytes per second b) Blips per second c) Bits per second d) Beeps per second

Answer: c Difficulty: Medium

POTS stands for: a) plain original telephone system b) plain original telecom system c) plain old telephone system d) plain old telecom system

Answer: c Difficulty: Medium

Software can be defined as: a) Something that is controlled by the hardware b) Something that comes with the computer itself c) A collection of instructions that in IT device executes d) Games and productive programs

Answer: c Difficulty: Medium

The ____ comprises the set of rules for exchanging messages on the World Wide Web. a) FTP b) XML c) HTTP d) TCP/IP

Answer: c Difficulty: Medium

Wi-Fi is the popular name for the _______ standards for wireless network access. a) 802.1 b) 802.1a c) 802.11 d) 802.11a

Answer: c Difficulty: Medium

__________ is an online technology company that develops and delivers software tools on the Internet. Payment for the service is often based on fees or subscriptions. a) PaaS b) PAS c) ASP d) SaaS e) None of the above

Answer: c Difficulty: Medium

___________________ is the ability to hide information from unauthorized viewing. a) Availability b) Integrity c) Confidentiality d) Disaster recovery e) None of the above

Answer: c Difficulty: Medium

Which of the following is a true statement about the Internet? a) A wireless device cannot be used to connect to the Internet. b) The Internet and the World Wide Web are interchangeable terms. c) The Internet was discovered by Al Gore. d) Home users require an ISP to connect to the Internet. e) Dial-up and broadband provide faster access to the Internet.

Answer: c Difficulty: Medium

One purpose, now commonplace, is the use of _______________ to make calls anywhere in the world and bypass traditional switched telephone networks. a) VoIT b) ViOT c) ViOp d) VoIP e) None of the above

Answer: d Difficulty: Difficult

To ensure that your password is and remains as strong as possible, you should follow all of these guidelines EXCEPT: a) Use at least eight characters. b) Include digits, punctuation, and non-printing characters. c) Use both upper- and lowercase characters. d) Use the same passwords on different accounts. e) Change your password regularly and don't reuse passwords or make minor variations such as incrementing a digit

Answer: d Difficulty: Difficult

Microsoft Access is an example of: a) Document preparation software b) Electronic spreadsheet software c) Presentation graphics software d) Database management system e) None of the above

Answer: d Difficulty: Easy

The Internet uses the ______ suite of packet switching protocols. a) HTML b) XML c) VoiP d) TCP/IP

Answer: d Difficulty: Easy

There are several benefits to cloud computing. Which of the following isn't one of them? a) Reduced cost b) Scalability c) Accessibility d) Limited

Answer: d Difficulty: Easy

46) An example of a DBMS would be: a) Microsoft Word b) Microsoft Excel c) Microsoft Outlook d) Microsoft Access e) None of the above

Answer: d Difficulty: Medium

An attempt to gain personal and confidential information for fraudulent purposes such as identity theft is called: a) Junk b) Spam c) DoS d) Phishing

Answer: d Difficulty: Medium

CPU stands for: a) Central Packet Unit b) Controller Processing Unit c) Controller Packet Unit d) Central Processing Unit e) None of the above

Answer: d Difficulty: Medium

In a computer, the _____ holds the instructions used to control the start-up processes. a) CPU b) LCU c) RAM d) ROM e) None of the above

Answer: d Difficulty: Medium

Once started on a computer (by clicking an email attachment), it automatically sends out infected emails to everybody in the user's address book. This type of risk is called: a) Malware b) Scareware c) Virus d) Worm

Answer: d Difficulty: Medium

Which of the following provides low-scale processing and/or identification; embedded in appliances and products? a) Supercomputer b) Mainframe c) Server farm d) Embedded processor e) None of the above

Answer: d Difficulty: Medium

Who owns the Internets? a) Internet Engineering Task Force (IETF) b) The Internet Architecture Board (IAB) c) The World Wide Web Consortium (W3C) d) None of the above

Answer: d Difficulty: Medium

_____ software is a complete, self-contained program or set of programs for performing a specific job. a) Utility b) Driver c) Operating System d) Application e) None of the above

Answer: d Difficulty: Medium

_______, both wired and wireless, allow you to connect to a remote network over a telecommunications line, such as the telephone or cable TV service. a) Routers b) Bridges c) Switches d) Hubs e) Modems

Answer: e Difficulty: Difficult

HTTP stands for: a) hypertext traded protocol b) hybrid transfer protocol c) hypertext transfer principle d) hybrid traded protocol e) none of the above

Answer: e Difficulty: Easy

Microsoft Outlook is an example of: a) Document preparation software b) Electronic spreadsheet software c) Presentation graphics software d) Database management system e) None of the above

Answer: e Difficulty: Easy

Which of the following is not considered part of a computer network? a) Nodes b) Software c) Users d) Links e) An electronic document

Answer: e Difficulty: Easy

Which of the following types of software controls the primary functions of a computer system? a) Utility b) Drivers c) Application d) Network e) Operating system

Answer: e Difficulty: Easy

__________ stores data information and instructions for the long term. a) Processing b) Memory c) Input d) Output e) Storage

Answer: e Difficulty: Easy


Ensembles d'études connexes

Human Relations (Ch. 5, Ch. 6, Ch. 7)

View Set

AP Statistics Vocabulary - Chapter 6

View Set

Vocabulary Workshop Level H: Unit 13

View Set

Chapter 18: Ungraded Practice (No Points)

View Set

Systems of Linear Equations in Three Variables

View Set

Ch 69: Management of Patients With Neurologic Infections, Autoimmune Disorders, and Neuropathies

View Set