CIT 15 (Final Study Guide)
network adapter
For the nodes on a network to communicate with each other and access the network, each node needs a ________.
A laser burns tiny pits onto a disc.
How do optical discs store data?
field
In a database, the term ________ is synonymous with a category of information.
bits
In binary language, each letter of the alphabet, each number, and each special symbol is made up of a unique combination of eight ________.
firewall
In computing, a ________ is named after a housing construction feature that slows the spread of fires from house to house.
inheritance
In object-oriented programming, ________ allows a new class to automatically use all the data and methods of an existing class.
open source
LibreOffice is an example of a(n) ________ productivity software package.
Google and Apple
Most smartphones use operating systems developed by ________.
classes
Object-oriented ________ are defined by the information (data) and the actions (methods) associated with them.
Accounting
QuickBooks is an example of ________ software.
Keep a master password that is the same for all of your accounts.
Rules for creating passwords include all of the following EXCEPT ________.
clear out unnecessary files
Running the Disk Cleanup utility is a quick way to ________.
engineering
Social ________ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information.
browser
Software that enables you to display and interact with text and other media on the web is a web ________.
enterprise resource planning
Software that manages "back office" functions such as billing, production, inventory management, and human resources management is called ________ software.
inside the CPU, itself
Some of the cache memory of a CPU is ________.
network administrators
Some of the responsibilities of ________ are installing new hardware and software on the network and monitoring performance.
FBI and National White Collar Crime Center
The Internet Crime Complaint Center (IC3) is a partnership between the ________.
motherboard
The ________ contains the central electronic components of the computer.
gigabytes
The amount of RAM storage is measured in ________.
control structures
The keywords used in programming languages that use decisions to redirect the flow of a program are called ________.
file path
The location of a file is specified by its ________.
MAC (Media Access Control)
The physical address assigned each network adapter is called its ________.
mining
The process of searching huge amounts of data seeking a pattern, is called data ________.
compilation
The process that converts program code into machine language is called ________.
Intel
The processor market for desktop and laptop computers is dominated by ________.
algorithm
The set of specific, sequential steps that describe exactly what a computer program must do to complete the work is called a(n) ________.
digital convergence
The term ________ refers to the use of a single unifying device that handles media, Internet, entertainment, and telephone needs.
operating system
The two major types of system software programs are utility programs and the ________.
MAC
The unique number assigned to a network adapter by the manufacturer is referred to as the ________ address.
Copyright
To protect a movie, what category of intellectual property would be used?
GPU (graphics processing unit)
To speed up the display of graphics, a(n) ________ is integrated into some video cards.
coding
Translating an algorithm into a programming language is called ________.
bloatware
Unwanted or unneeded software included by manufacturers on new computers is called ________.
mobile
Using applications on smartphones and tablets to buy and sell products is known as ________ commerce.
crowdfunding
Using the Internet to get small donations from many people to start a business is called ________.
Data represents a fact. Information is data that has been organized.
What is the difference between data and information?
a network adapter
When setting up a home network, make sure each node has ________.
Function
When using a spreadsheet, SUM in the expression =SUM(B10:B16), is called a(n) ________.
Formula
When using a spreadsheet, the expression =D8-D17 is called a ________.
jpeg
Which of the following digital image formats compresses the image file?
Cybercrime
Which of the following is formally defined as any criminal action perpetrated primarily through the use of a computer?
MP3
Which of the following is the most common audio compression format?
OneDrive
Which of the following is the online storage system affiliated with a Microsoft account?
Flowchart
Which of the following provides a visual representation of the patterns of an algorithm?
Adobe Illustrator
Which of the following software programs can best be used to help create digital art?
Cookies obtain your personal information by searching your hard drive.
Which of the following statements about cookies is NOT true?
.edu
Which of the following top-level domains identifies a degree-granting institution?
Fiber-optic cable
Which transmission medium transmits data the fastest?
a firewall
You can block logical ports from invaders and make your computer invisible to others on the Internet by installing ________.
Device
You can find out which network adapters are installed in your system by using the Windows ________ Manager utility.
Fiber Optic
________ cable is NOT subject to electromagnetic interference or radio frequency
Embedded
________ computers are specially designed computer chips that reside inside other devices, such as a car.
A DDoS attack
________ floods a computer with requests until it shuts down and refuses to answer any requests for information.
Information technology
________ is a field of study focused on the management, processing, and automatic retrieval of information.
________ is a professional, business-oriented social networking site.
Ergonomics
________ is concerned with the design and arrangement of machines and furniture to avoid uncomfortable or unsafe experiences.
Ethernet
________ is digital textual information that can be stored, manipulated, and transmitted by electronic devices.
E-mail client software
________ is installed on your computer, and when the program is opened, your e-mail downloads to your computer
Augmentive reality
________ is our normal sense of the world around us enhanced with digital information.
Artificial Intelligence
________ is the branch of computer science that attempts to create computers that think like humans.
Ethernet
________ is the standard communications protocol used on most client/server networks.
Laser
________ printers use static electricity and toner and heat set the image on the page very quickly.
Crowdsourcing
________ solicits online input such as product ratings from consumers.
analog-to-digital converter
A(n) ________ chip converts sound waves from a voice into a digital signal.
NAS
A(n) ________ device facilitates file sharing and data backup.
breadcrumb trail
A(n) ________ is a navigation aid that shows the path you have taken to get to a web page or where the page is located within the website.
authentication
A(n) ________ server tracks who is logging on to the network as well as which services on the network are available to each user.
machine language
An example of a first-generation language is ________.
collection of tools that helps programmers write and test their programs
An integrated development environment (IDE) is a ________.
forensics
Analyzing computer systems to gather potential legal evidence is computer ________.
beta
Before its final commercial release, a ________ version of software may be offered to certain test sites or to interested users free or at a reduced cost.
data warehouse
Big data analytics is usually associated with ________ services.
network operating system (NOS)
Client/server networks are controlled by a central server that runs specialized software called a(n) ________.
binary
Computers use a ________ language consisting of 0's and 1's.
brute force attack
Configuring an account to disable itself after a set number of login attempts using invalid passwords is a method of countering a ________.
computer viruses
Creating and distributing ________ is one of the most widespread types of cybercrimes.
irrevocable
Creative Commons licenses are ________.
integrity
Data ________ means that the data contained in a database is accurate and reliable.
mining the data
Data staging consists of all of the following steps, EXCEPT ________.
cloud storage
Dropbox is an example of ________.
device driver
Each device attached to your computer has a special program called a ________ that enables the device and operating system to communicate with each other.
HDMI
A(n) ________ cable carries all audio and video information from devices to a connected TV.
completeness
A(n) ________ check determines whether a required field such as LastName was filled in.
Network Interface Card (NIC)
A ________ enables your computer to connect to other computers or to the Internet.
database
A ________ is a collection of related data that can be stored, sorted, organized, and queried.
blog
A ________ is a personal journal posted on the web.
macro virus
A ________ is a virus that is attached to documents such as Word or Excel files.
firewall
A ________ keeps your computer safe by determining who is trying to access it.
client/server
A ________ network can contain servers as well as individual computers.
ICANN (Internet Corporation for Assigned Names and Numbers)
A company that manages domain name registration by allocating domain name registration to select, private companies. What organization is the top level coordinator of how the unique identifiers (names and numbers) of the Internet work? What organization is the top level coordinator of domain names? What organization is the top level coordinator of IP addresses and AS numbers?
network
A computer ________ is two or more computers connected using software and hardware so that they can communicate with each other.
input
A keyboard and touch screen are the most common of ________ devices.
MAN
A large network designed to provide access to a specific geographic area, such as a large city, is a ________.
Java applet
A small Java-based program is called a ________.
infringement
A violation of the holder's rights is known as copyright ________.