Computer Final
The _________________________ is the component of the processor that performs arithmetic, comparison, and logical operations. (three words or acronym) Blank 1
ALU
The Internet has its roots in a networking project started by the Pentagon's _________________________, an agency of the U.S. Department of Defense. (4 words or acronym) Blank 1
ARPA
A(n) _________________________ is a multisession CD onto which users can record their own items such as text, graphics, and audio only one time. (three words or acronym) Blank 1
CDR
A(n) _________________________ is a type of optical disc that uses laser technology to store data, instructions, and information. (five words or acronym) Blank 1
CDROM
The _________________________ interprets and carries out the basic instructions that operate a computer. (three words or acronym) Blank 1
CPU
A(n) _________________________ monitor is a desktop monitor similar to a standard television picture tube. (three words or acronym) Blank 1
CRT
Users may have _________________________ if they have sore, tired, burning, itching or dry eyes; blurred or double vision; or difficulty focusing on a screen image. (three words or acromyn) Blank 1
CVS
A more devastating type of DoS attack is the ________ attack, in which multiple unsuspecting computers are used to attack multiple computer networks. (two words or acronym)
DDos
_________________________ transmits at fast speeds on existing standard copper telephone wiring, but requires that the user's location and the telephone company's modem be located within a certain distance of each other. (three words or acronym)
DSL
To read a DVD-ROM, users must have a(n) _________________________ or DVD player. (two words) Blank 1
DVD drive
_____ is an applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace.
Ergonomics
_________________________ is an Internet standard that permits file uploading and downloading with other computers on the Internet. (three words or acrynom) Blank 1
FTP
A user name can be the same as other user names in the same domain. True False
False
According to netiquette, Internet users should assume all material is accurate and up-to-date. True False
False
Application software serves as the interface between the user, the system software, and the computer's hardware. True False
False
Businesses seldom provide goods or services to other business, so little e-commerce takes place between businesses. True False
False
Compact Disk (CD-ROM) music, DVD video and computers are examples of analog data representation. True False
False
Dial-up access is a difficult and expensive way for users to connect to the Internet. True False
False
Due to slowly changing technology, the distinction among categories of computers is always clear-cut. True False
False
Even as the Internet grows, it remains a private, uncooperative, dependent network. True False
False
Few computers today can communicate with other computers. True False
False
Few homes and no businesses or schools network their computers together. True False
False
Hosts typically use low-speed communications to transfer data and messages over a network. True False
False
Industry experts typically classify computers into three categories: desktop computers, notebook computers, and mobile devices. True False
False
Information is a collection of raw, unprocessed facts, figures, and symbols. True False
False
MB is the abbreviation of Megabyte, 1MB equals to 100KB. True False
False
Mainframes store only small amounts of data, instructions, and information. True False
False
Midrange servers typically support only one computer at a time. True False
False
Mobile devices usually have disk drives. True False
False
Most memory keeps data and instructions permanently, although some forms of memory are temporary. True False
False
Notebook computers generally are less expensive than desktop computers with equal capabilities. True False
False
Obtaining timely and useful information from a computer requires only hardware and software. True False
False
On a typical notebook computer, the monitor is on top of the system unit and the keyboard attaches to the system unit with hinges. True False
False
The digit one (1) represents off (or low voltage) and the digit zero (0) represents on (or higher voltage). True False
False
The electronic components in modern computers are undependable because they have a high failure rate. True False
False
With weights that exceed 100 tons, desktop computers can store more than 16,000 times the data and information than an average supercomputer. True False
False
With ______ , pages are created and formatted with tags that specify how elements display in browser. (three words or acrynom) Blank 1
HTML
_________________________ is a set of standards for transmission of data over standard copper telephone lines, and it also can produce very clear voice conversations. (four words or acronym)
ISDN
Similar to those in watches and calculators, a(n) _________________________ uses a liquid compound to present information on a screen. (three words or acronym) Blank 1
LCD
A(n) _________________________ converts MICR characters into a form the computer can process. (two words) Blank 1
MICR scanner
With dial-up Internet access, the telephone number dialed connects a user to an access point on the Internet, called a(n) _________________________. (three words or acronym) Blank 1
POP
The location in a retail or grocery store where a consumer pays for goods or services is the _________________________. (three words or acronym) Blank 1
POS
____________ is an open, nonproprietary protocol proposed as a standard to the W3C (World Wide Web Consortium). (three words or acrynom) Blank 1
SSL
_________________________ is a network technology (protocol) that manages the transmission of data by dividing it up into packets. (five words or acronym) Blank 1
TCPIP
A computer keyboard contains keys users press to enter data into the computer. True False
True
A personal computer contains a processor, memory, and one or more input, output, and storage devices. True False
True
According to netiquette, in e-mail, newsgroups, and chat rooms users should avoid sending flames, which are abusive or insulting messages, and not participate in flame wars, which are exchanges of flames. True False
True
An information system combines hardware, software, data, people, and procedures to produce timely and useful information. True False
True
Computers perform the information processing cycle operations (input, process, output, and storage) with amazing speed, reliability, consistency, and accuracy. True False
True
Computers provides a means of communications for all types of people. True False
True
E-commerce virtually eliminates the barriers of time and distance that slow traditional transactions. True False
True
In 1986, the National Science Foundation (NSF) connected its huge network of five computer centers, called NSFnet, to ARPANET. True False
True
In many networks, one or more computers act as a server. True False
True
Input and output devices allow the computer to communicate with the user and the outside world. True False
True
Mainframes can act as a server on a network environment. True False
True
Most operating systems include several utility programs for managing disk drives, printers, and other devices. True False
True
No single person, company, institution, or government agency controls or owns the Internet. True False
True
Programmers use a programming language or program development tool to create computer programs. True False
True
The American Standard Code for Information Exchange, or ASCII (pronounced ASK-ee), is the most common coding system used on personal computers today. True False
True
The Web contains billions of documents called Web pages. True False
True
The focus of Internet2 is to improve on the inefficiencies of the Internet, such as relieving bottlenecks in the current architecture. True False
True
The newer PNG format improves upon the GIF format and thus is expected eventually to replace the GIF format. True False
True
The two categories of software are system software and application software. True False
True
The user interface controls how data and instructions are entered and how information displays on the screen. True False
True
The world's biggest network is the Internet. True False
True
Two main components on the motherboard are the processor and memory. True False
True
With current storage devices, the computer can transfer data quickly from storage to memory, process it, and then store it again for future use. True False
True
A(n) _________________________ is a device that contains surge protection circuits and one or more batteries that can provide power during a temporary or permanent loss of power. (three words or acronym) Blank 1
UPS
A(n) _________________________ port is an interface that can connect up to 127 different peripherals together with a single connector type. (three words or acronym) Blank 1
USB
A(n) _________________________ is a flash memory storage device that plugs into a USB port on a computer or portable device. (three words) Blank 1
USB flash drive
A Web site is _____. a. a collection of related Web pages b. the location from which a Web page originates c. an author of a Web page d. the source of a Web page
a
A _____ is a network that connects computers and devices in a limited geographical area, such as a home, school computer laboratory, or office building. a. local area network (LAN) b. metropolitan area network (MAN) c. variable area network (VAN) d. wide area network (WAN)
a
A _____ is a network that covers a large geographical area, such as a country or the world, using a communications channel that combines many types of media. a. wide area network (WAN) b. metropolitan area network (MAN) c. variable area network (VAN) d. local area network (LAN)
a
A momentary overvoltage, called a _____, occurs when the increase in power lasts for less than one millisecond (one thousandth of a second). a. spike b. Joule c. macro d. hash
a
A print server is a dedicated server that _____. a. manages printers and print jobs b. manages network traffic (activity) c. stores and manages files d. stores and provides access to a database
a
A type of communications device that connects a communications channel to a sending or receiving device is a _____. a. modem b. server c. PDA d. all of the above
a
A(n) _____, which is comparable in size to a credit card or ATM card, stores personal data on a thin microprocessor embedded in the card. a. smart card b. adapter card c. video card d. digital card
a
Although a stand-alone touchpad can be attached to any computer, touchpads are found most often on _____. a. notebook computers b. PDAs c. mainframe computers d. desktop computers
a
An ATM (automated teller machine) asks users to enter a password, called a _____, which verifies that the user is the holder of the bankcard. a. personal identification number (PIN) b. digital signal processor (DSP) c. private origin signal (POS) d. universal product code (UPC)
a
An _________ is a written guideline that helps determine whether a specific computer action is ethical or unethical. a. IT code of conduct b. Surveillance of Citizens c. Electronic Communications Privacy Act d. Computer Matching
a
Computers process _____. a. data into information b. information into data c. data into instructions d. instructions into data
a
DSL is much _____ data transfer rates. a. easier to install than ISDN and provides much faster b. harder to install than ISDN and provides much slower c. easier to install than ISDN but provides much slower d. harder to install than ISDN but provides much faster
a
Database software can take the results of a query and present it in a window on the screen, called a _____, or send it as a report to the printer. a. form b. cell c. record d. field
a
Each tick of the system clock equates to a _____. a. clock cycle b. clock spring c. clock rhythm d. clock shot
a
Employee monitoring including all of the following except _____ . a. Files copied b. Web sites visited c. Communications such as e-mail messages d. Keyboard activity (used to measure productivity)
a
In _____, people can communicate with multiple users at the same time — much like a group discussion. a. a chat room b. instant messaging c. file transfer d. e-mail
a
Like _____, hard disks store data magnetically. a. floppy disks and Zip disks b. CDs and microfilm c. tape and DVDs d. all of the above
a
Most computers operate using _____ data modes. a. digital b. analog
a
Of the graphics formats that exist on the Web, the three more common are _____ formats because of their smaller file sizes. a. JPEG , GIF and PNG b. TIFF, BMP and JPEG c. TIFF, PCX and GIF d. BMP, PCX and TIFF
a
Some input devices eliminate manual data entry by capturing data from a _____, which is the original form of data. a. source document b. reviewed document c. summary document d. turnaround document
a
The camera in a(n) _____ uses technology to read patterns in the eye. a. iris recognition system b. signature verification system c. face recognition system d. voice verification system
a
The primary input device for a _____ is a digital pen, which allows users to write on the device's screen. a. Tablet PC b. c. digital camera d. desktop computer
a
To _____ a document means to make changes to its existing content. a. edit b. save c. format d. create
a
To cut involves removing a portion of a document and storing it in a temporary storage location, sometimes called a _____. a. clipboard b. dialog box c. submenu d. template
a
Today, _____ is the most popular LAN technology because it is relatively inexpensive and easy to install and maintain. a. Ethernet b. TCP/IP c. token ring d. 802.11
a
Two commonly used types of impact printers are _____. a. dot-matrix and daisy wheel printers b. photo printers and large-format printers c. ink-jet printers and laser printers d. mobile printers and thermal printers
a
Two types of display devices are _____ displays. a. CRT and flat-panel b. label and postage c. impact and nonimpact d. ink-jet and laser
a
When users purchase software, a single-user license agreement permits users to do any of the following except _____. a. rent or lease the software b. make one copy of the software as backup c. give or sell the software to another individual if the software is removed from the user's computer first d. install the software on only one computer
a
With ISDN, the same telephone line that could carry only one computer signal now can carry three or more signals at once through the same line, using a technique called _____. a. multiplexing b. routing c. modulating d. packet switching
a
_____ are two of the more widely accessed Internet services. a. The World Wide Web and e-mail b. Instant messaging and newsgroups c. FTP and message boards d. Mailing lists and chat rooms
a
_____ includes programs such as word processing, spreadsheet, database, presentation graphics, personal information manager, PDA software, software suite, project management, and accounting. a. Business software b. Software for home, personal, and educational use c. Communications software d. Graphics and multimedia software
a
_____ is the most widely used coding scheme used to represent data. a. American Standard Code for Information Interchange (ASCII) b. Multicode c. Unicode d. Extended Binary Coded Decimal Interchange Code (EBCDIC)
a
_____ occurs when one consumer sells directly to another consumer, such as in an online auction. a. Consumer-to-consumer (C2C) e-commerce b. Business-to-consumer (B2C) e-commerce c. Consumer-to-business (C2B) e-commerce d. Business-to-business (B2B) e-commerce
a
_____ provides standard contracts and documents associated with buying, selling, and renting property; estate planning; marriage and divorce; and preparing a will or living trust. a. Legal software b. Accounting software c. Entertainment software d. Reverence software
a
is data that is organized, meaningful and useful to a particular user or group of users. a. Information b. Documentation c. Storage d. Instruction
a
n an Internet e-mail address, a(n) _____ symbol separates the user name from the domain name. a. @ (at) b. & (ampersand) c. * (asterisk) d. ~ (tilde)
a
A(n) _________________________ protects a computer against viruses by identifying and removing any computer viruses found in memory, on storage media, or on incoming files. (two words) Blank 1
antivirus software
_________________________ includes music, speech, or any other sound. (one word)
audio
_________________________ includes music, speech, or any other sound. (one word) Blank 1
audio
A FireWire port, previously called an IEEE 1394 port, is _____. a. a special high-speed parallel port that allows users to attach peripherals such as disk drives and printers b. similar to a USB port in that it can connect multiple types of devices that require faster data transmission speeds c. a special type of serial port that connects the system unit to a musical instrument d. an alternative to IrDA that uses radio waves to transmit data between two devices
b
A _____ is a large, sealed glass tube on the front of which is a screen coated with phosphor material. a. gas plasma tube (GPT) b. cathode-ray tube (CRT) c. digital video tube (DVT) d. high-definition tube (HDT)
b
A _____ is a list of commonly used commands for completing a task related to the current activity or selected item. a. submenu b. shortcut menu c. command box d. dialog box
b
A _____ is a program that copies itself repeatedly in memory or on a network, using up resources and possibly shutting down the computer or network. a. computer virus b. worm c. Trojan horse d. all of the above
b
A _____ is equal to exactly 1,024 bytes, but computer users often round it down to 1,000 bytes to simplify memory and storage definitions. a. terabyte (TB) b. kilobyte (KB or K) c. gigabyte (GB) d. megabyte (MB)
b
A cross-platform program is one that runs _____. a. differently on one operating system b. the same on multiple operating systems c. only on one operating system d. differently on every operating system
b
A database server is a dedicated server that _____. a. manages printers and print jobs b. stores and provides access to a database c. stores and manages files d. manages network traffic (activity)
b
A hard disk spins much _____. a. slower than a floppy disk but usually spins constantly b. faster than a floppy disk and usually spins constantly c. faster than a floppy disk but usually starts spinning only when it receives a read or write command d. slower than a floppy disk and usually starts spinning only when it receives a read or write command
b
All computer keyboards, such as that in the accompanying figure, have _____ that includes letters of the alphabet, numbers, punctuation marks, and other basic keys. a. arrow keys b. a typing area c. Internet controls d. a numeric keypad
b
All of the following are widely used input devices except the _____. a. digital camera and PC video camera b. printer and monitor c. microphone and scanner d. keyboard and mouse
b
An expensive, powerful desktop computer is the _____, which is geared for work that requires intense calculations and graphics capabilities. a. mainframe b. workstation c. PDA d. Tablet PC
b
An internet _____ is a small text file that a web server puts on your computer hard drive. a. Plug in b. Cookie c. Player d. Spam
b
As computers become more a part of daily living, many people believe that _____ is/are vital to success. a. computer programming b. computer literacy c. computer repair d. all of the above
b
Businesses are the primary users of _____ because this technology provides a means for departments to communicate with each other, suppliers, vendors, and with clients. a. short message services b. Web services c. global positioning systems d. groupware
b
Commonly used nonimpact printers include all of the following except _____. a. mobile printers and label and postage printers b. shuttle-matrix printers and dot-matrix printers c. ink-jet printers and photo printers d. laser printers and thermal printers
b
Data enters the computer through the input Device, and then processing occurs at the processing unit. The processing unit is the _____. a. memory b. microprocessor chip c. printer d. keyboard
b
Devices that capture data directly from a source document include all of the following except _____. a. optical scanners and optical readers b. portable keyboards c. magnetic-ink character recognition readers d. bar code readers
b
Each time a user starts a computer, the operating system is _____ (copied) from the computer's hard disk into memory. a. printed b. loaded c. saved d. scrolled
b
Examples of biometric devices and systems include all of the following except _____. a. fingerprint scanners and hand geometry systems b. personal identification numbers and password systems c. face recognition systems and voice recognition systems d. signature verification systems and iris recognition systems
b
Fiber-optic cables have all of the following advantages over cables that use wire except _____. a. better security for signals during transmission b. lower costs and easier installation and modification c. less susceptible to noise from other devices d. faster data transmission and smaller size
b
For users that have limited desk space, the trackball is a good alternative to a mouse because the device _____. a. does not pick up oils from fingers b. is stationary c. does not pick up dust from the environment d. all of the above
b
In a _____, a user types commands or presses special keys on the keyboard (such as function keys or key combinations) to enter data and instructions. a. performance-monitor interface b. command-line interface c. menu-driven interface d. graphical user interface (GUI)
b
In a database, each row, called a _____, contains data about a given person, product, object, or event. a. form b. record c. field d. cell
b
Internet transmissions commonly use _____. a. token ring b. TCP/IP c. 802.11 d. Ethernet
b
Most computers have four types of hardware components: input, processor, ______ and output. a. memory b. storage (auxiliary storage) c. motherboard d. data into information
b
Most e-commerce actually takes place between businesses, which is called _____. a. consumer-to-business (C2B) e-commerce b. business-to-business (B2B) e-commerce c. consumer-to-consumer (C2C) e-commerce d. business-to-consumer (B2C) e-commerce
b
Symptoms of a user with computer addiction include all of the following except _____. a. unable to stop computer activity b. irritable when at the computer c. craves computer time d. neglects family and friends
b
Techniques to ease eyestrain includes the following except ________. a. Adjust the lighting b. Use smaller fronts c. Blink your eyes every five seconds d. If you wear glasses, ask your doctor about computer glasses
b
The 1986 _____ provides the same protection that covers mail and telephone communications to electronic communications such as voice mail. a. Fair Credit Reporting Act b. Electronic Communications Privacy Act (ECPA) c. Computer Fraud and Abuse Act d. Computer Matching and Privacy Protection Act
b
The ISA bus (Industry Standard Architecture bus) is _____. a. a bus designed by Intel to improve the speed with which 3-D graphics and video transmit b. the most common and slowest expansion bus c. a high-speed expansion bus that connects higher speed devices such as hard disks d. a bus that eliminates the need to install cards into expansion slots
b
The _____ defines a popular video compression standard. a. National Science Foundation (NSF) b. Moving Pictures Experts Group (MPEG) c. Advanced Research Projects Agency (ARPA) d. Digital Subscriber Line (DSL)
b
The binary number system has just two distinct digits, _____ , called bits. a. 1 and 2 b. 0 and 1 c. 9 and 0 d. 1 and 9
b
The computer that a hacker uses to execute the DoS or DDoS attack, known as a _______ , is completely unaware that it is being used to attack other systems. a. trapdoor b. zombie c. cracker d. spam
b
The intent of Internet2 is not to _____. a. relieve bottlenecks in the current architecture b. replace the current Internet c. enhance tomorrow's Internet with advanced technologies and capabilities d. all of the above
b
To help reduce the chance of _____, physical controls such as locked doors and cables usually are adequate to protect equipment. a. system failure b. hardware theft c. unauthorized access d. software piracy
b
Two types of _____ are desktop computers and notebook computers. a. mobile computers b. personal computers c. mainframes d. midrange servers
b
Using the _____ =SUM(B10:B14) totals the contents of cells B10 through B14 in a worksheet. a. formula b. function c. label d. value
b
When computer users _____ a document, the computer sends a copy of the document to a medium such as paper. a. create b. print c. format d. edit
b
When computer users _____ a document, the computer transfers the document from memory to a storage medium. a. format b. save c. print d. edit
b
_ allows users to share documents with others in real time. a. Internet telephony b. An online meeting c. Internet printing d. Voice mail
b
____ are installed in internal bays. a. Floppy disk drives b. Hard disk drives c. CD drives d. Zip drives
b
_____ is a communications technology used by some outgoing mail servers. a. ARPA (advanced rural postal addresses) b. SMTP (simple mail transfer protocol) c. POP (post office protocol) d. HTML (hypertext mail link)
b
_____ is the most common type of volatile memory. a. Flash memory b. RAM c. CMOS d. ROM
b
_____ is the number of times per second a screen is redrawn and is expressed in hertz (Hz). a. Resolution b. Refresh rate c. Pixel pitch d. Dot pitch
b
_______ generates HTML tags for web publishing. a. Word Processing Software b. Web authoring software c. Database software d. Graphics software
b
______is combinations of values and constants that define the relationship among spreadsheet cells. a. Function b. Formula c. Edit line d. Cell pointer
b
A(n) _________________________ is an identification code that consists of a set of vertical lines and spaces of different widths. (two words) Blank 1
bar code
A(n) _________________________ is an optical reader that uses laser beams to read bar codes. (three words) Blank 1
bar code scanner
The ______________ system has just two distinct digits, 0 and 1, called bits. (one word)
binary
A(an) ____________ is a contraction for a binary digit and is the smallest unit of data that the computer can represent. (one word) Blank 1
bit
_________________________ is the process of starting or restarting a computer. (one word) Blank 1
booting
A(n) _________________________ network is a network topology that consists of a single central cable, to which all computers and other devices connect. (one word) Blank 1
bus
A(n) _________________________ is a graphical element, usually rectangular or square in shape, that a user activates to cause a specific action to take place. (one word) Blank 1
button
A bit by itself does not represent much data. However, if eight bits are grouped together they become a ______________. (one word) Blank 1
byte
A SCSI port is _____. a. a special type of serial port that connects the system unit to a musical instrument b. an alternative to IrDA that uses radio waves to transmit data between two devices c. a special high-speed parallel port that allows users to attach peripherals such as disk drives and printers d. similar to a USB port in that it can connect multiple types of devices that require faster data transmission speeds
c
A _____ is a device that provides a central point for cables in a network. a. packet b. node c. hub d. router
c
A _____ is a malicious-logic program that hides within or looks like a legitimate program and usually is triggered by a certain condition or action. a. computer virus b. worm c. Trojan horse d. all of the above
c
A _____ requires the existing processor chip to be removed and replaced with a new one. a. piggyback upgrade b. daughterboard upgrade c. chip-for-chip upgrade d. zero-insertion force upgrade
c
A _____, such as that in the accompanying figure, displays bars of various lengths to show the relationship of data. a. pie chart b. scatter chart c. column chart d. line chart
c
A feature of word processing software called _____ allows users to type words in a paragraph continually without pressing the ENTER key at the end of each line. a. replace b. search c. wordwrap d. collaboration
c
A floppy disk drive _____. a. cannot read from a floppy disk whether the write-protect notch is open or closed b. can read from a floppy disk only if the write-protect notch is closed c. can read from a floppy disk whether the write-protect notch is open or closed d. can read from a floppy disk only if the write-protect notch is open
c
A(n) _____ is more powerful than a workstation, but less powerful than a mainframe. a. tower computer b. supercomputer c. midrange server d. Tablet PC
c
Although it is an easy and inexpensive way for users to connect to the Internet, _____ is slow-speed technology. a. DSL b. a cable modem c. a dial-up connection d. ISDN
c
Basic thermal printers are _____ over time. a. expensive, but the print quality is high although the messages tend to fade b. expensive, but the print quality is low although the messages tend to last c. inexpensive, but the print quality is low and the messages tend to fade d. inexpensive, but the print quality is high and the messages tend to last
c
CDs and DVDs commonly store items in _____. a. random locations anywhere between the center of the disc and the edge of the disc b. multiple pie-shaped sections that break a track into arcs c. a single track that spirals from the center of the disc to the edge of the disc d. multiple concentric tracks from the center of the disc to the edge of the disc
c
Card readers/writers usually connect to any of the following ports on the system unit except the _____. a. FireWire port b. parallel port c. serial port d. USB port
c
Companies called _____ provide storage for Web pages for a reasonable monthly fee. a. Web browsers b. Web communities c. Web hosting services d. Web consortiums
c
Each character added to a password significantly _____ it might take for someone or for a hacker's computer to guess the password. a. increases the number of combinations but reduces the length of time b. reduces the number of combinations and the length of time c. increases the number of combinations and the length of time d. reduces the number of combinations but increases the length of time
c
Examples of stand-alone operating systems include all of the following except _____. a. DOS and Windows XP b. UNIX and Linux c. NetWare and Solaris d. Mac OS X
c
For data transmission to occur, _____ of a standard telephone line must have a dial-up modem. a. only the sending end b. only the receiving end c. both the sending and receiving ends d. neither the sending nor receiving end
c
Groupware is a component of a broad concept called _____, which includes network hardware and software that enables group members to communicate, manage projects, schedule meetings, and make decisions. a. Web services b. public Internet access c. workgroup computing d. short message service
c
In a grocery store, a(n) _____ is a combination of an electronic cash register, bar code reader, and printer. a. flatbed scanner b. smart display c. point of sale (POS) terminal d. automated teller machine (ATM)
c
In the accompanying figure showing common ways to access the Internet, a(n) _____ usually provides Internet access to a specific geographic area. a. national ISP b. wireless Internet service provider (WISP c. regional ISP d. online service provider (OSP)
c
Manufacturers often use _____ to represent a digital camera's resolution. a. points per screen (PPS) b. points per inch (PPI) c. pixels per inch (PPI) d. pixels per screen (PPS)
c
Miniature storage media are much smaller, lighter in weight, and _____. a. more portable than other storage media such as hard disks, and much less expensive b. less portable than other storage media such as hard disks, and much more expensive c. more portable than other storage media such as hard disks, but much more expensive d. less portable than other storage media such as hard disks, but much more expensive
c
Mobile computers, such as notebook computers and Tablet PCs, and mobile devices, such as PDAs and smart phones, often have _____ screens. a. HDTV b. MICR c. LCD d. CRT
c
One of the first storage media used with mainframe computers was _____. a. optical disks b. microfilm c. tape d. Zip disks
c
One of the more common causes of _____ is an electrical power variation. a. hardware vandalism b. unauthorized access c. system failure d. software theft
c
Physical transmission media used in communications include all of the following except _____. a. twisted-pair cable b. fiber-optic cable c. broadcast radio cable d. coaxial cable
c
Sharing resources on a network _____. a. wastes time and money b. wastes time but saves money c. saves time and money d. saves time but wastes money
c
Software piracy continues for all of the following reasons except _____. a. software piracy is a fairly simple crime to commit b. in some countries, legal protection for software does not exist c. software piracy drives down the price of software for all users d. many buyers believe they have the right to copy software they have paid for
c
Some viruses are hidden in _____, which are instructions saved in an application such as a word processing or spreadsheet program. a. spikes b. logs c. macros d. cookies
c
The _____ executes programs ("software") which tell the computer what to do a. output devices b. storage c. CPU (central processing unit) d. input devices
c
The accompanying figure illustrates a spreadsheet feature called _____, which depicts data in graphical form. a. scrolling b. querying c. charting d. recalculating
c
The difference in size among Type I, Type II, and Type III PC Cards is their _____. a. diameter b. circumference c. thickness d. all of the above
c
The large capacity Zip disks hold about _____ times more than a standard floppy disk. a. 400 b. 200 c. 500 d. 300
c
The most popular type of mobile computer is the _____. a. supercomputer b. handheld computer c. notebook computer d. desktop computer
c
The print head mechanism on a dot-matrix printer contains _____ pins, depending on the manufacturer and the printer model. a. 12 to 32 b. 3 to 8 c. 9 to 24 d. 6 to 16
c
The speed of an ink-jet printer is measured by the number of _____ it can print. a. characters per minute (cpm) b. pages per second (pps) c. pages per minute (ppm) d. characters per second (cps)
c
The storage capacity of a DVD-ROM is _____ that of a CD-ROM because images are stored at higher resolutions. a. less than a CD-ROM, but a DVD-ROM's quality far surpasses b. less than a CD-ROM, and a DVD-ROM's quality is far less than c. greater than a CD-ROM, and a DVD-ROM's quality far surpasses d. greater than a CD-ROM, but a DVD-ROM's quality is far less than
c
To prevent repetitive strain injury, take all of the following precautions except _____. a. minimize the number of switches between the mouse and the keyboard b. place the mouse at least six inches from the edge of the desk c. use the heel of the hand as a pivot point while typing or using the mouse d. place a wrist rest between the keyboard and the edge of the desk
c
Today, the standard floppy disk is _____-inches wide and has a rigid plastic outer cover. a. 4.75 b. 5.25 c. 3.5 d. 8
c
Two types of _____ data projectors are LCD projectors and DLP projectors. a. larger, lower-cost b. larger, higher-cost c. smaller, lower-cost d. smaller, higher-cost
c
Two types of system software are _____. a. application software and utility programs b. operating systems and Web browsers c. operating systems and utility programs d. Web browsers and application software
c
Types of wired home networks include all of the following except _____. a. powerline cable b. Ethernet c. Wi-Fi d. phoneline
c
Utility programs included with most operating systems provide all of the following functions except _____. a. managing files and viewing graphics files b. backing up files and defragmenting disks c. removing viruses and compressing files d. uninstalling programs and diagnosing problems
c
When computer users _____ a document, they change its appearance. a. edit b. save c. format d. create
c
When users purchase software, a single-user license agreement does not permit users to do any of the following except _____. a. export the software b. install the software on a network c. make one copy of the software as backup d. give copies to friends and colleagues
c
____ is used almost exclusively by the banking industry for check processing. a. OCR b. MIDI c. MICR d. OCM
c
_____ enables users to write and print checks, track checking account activity, and update and reconcile balances on demand. a. Legal software b. Entertainment software c. Accounting software d. Reference software
c
_____ is the process of arranging text and graphics in a document on a page-by-page basis. a. Page turning b. Page processing c. Page layout d. Page outline
c
_________ is a web protocol that encrypts and decrypts transmitted data. a. WWW b. HTTP c. HTTPS (Secure Hypertext Transfer Protocol) d. URL
c
A(n) _________________________ is a digital modem that sends and receives digital data over the cable television (CATV) network. (two words) Blank 1
cable modem
A(n) _________________________ provides high-speed Internet connections through the cable television network. (two words) Blank 1
cable modem
With a(n) _________________________, a user connects to a computer only after the computer calls the user back at a previously established telephone number. (two words) Blank 1
callback system
A(n) _________________________ is a device that reads data, instructions, and information stored on PC Cards or memory cards. (two words) Blank 1
card reader
A(n) _________________________ is the intersection of a column and row in a worksheet. (one word) Blank 1
cell
A computer _________________________ is a small piece of semi-conducting material, usually silicon, on which integrated circuits are etched. (one word) Blank 1
chip
The other computers on a network, such as that pictured in the accompanying figure, are called a(n) _________________________ or workstation and request resources from the server. (one word) Blank 1
client
_________________________ is a collection of drawings, diagrams, maps, and photographs that can be inserted into documents. (two words) Blank 1
clip art
A(n) _________________________ is a written guideline that helps determine whether a specific computer action is ethical or unethical. (three words) Blank 1
code of conduct
Many software products provide a means to _________________________, or work online, with other users connected to a server. (one word) Blank 1
collaborate
A(n) _________________________ is an electronic device, operating under the control of instructions stored in its own memory, that can accept data, manipulate the data according to specified rules, produce results, and store the results for future use. (one word)
computer
When you type the Web address of a Web site in your brower window, the browser program searches your hard disk for a _____ associated with the Web site. (one word) Blank 1
cookie
A(n) _________________________ gives authors and artists exclusive rights to duplicate, publish, and sell their materials. (one word) Blank 1
copyright
A _____ is a special window that provides information, presents available options, or requests a response. a. submenu b. shortcut menu c. command box d. dialog box
d
A _____ is an icon on the desktop that provides a user with immediate access to a program or file. a. spooler b. kernel c. buffer d. shortcut
d
A _____, such as that in the accompanying figure, shows a trend during a period of time, as indicated by a rising or falling line. a. scatter chart b. pie chart c. column chart d. line chart
d
A computer's _____ determine the category it best fits. a. size and speed b. processing power c. price d. all of the above
d
A file server is a dedicated server that _____. a. manages printers and print jobs b. manages network traffic (activity) c. stores and provides access to a database d. stores and manages files
d
A voice mailbox is a(n) _____ in a voice mail system. a. input device b. output device c. processor d. storage location on a hard disk
d
All of the following are rules of netiquette except _____. a. be polite and avoid offensive language b. keep messages brief and use proper grammar and spelling c. be careful when using sarcasm and humor d. use all capital letters
d
Although _____ are not a type of standard telephone line, they are a very popular type of dedicated line that allows a home user to connect to the Internet. a. T-carrier lines b. DSL c. ISDN lines d. cable television (CATV) lines
d
An advantage of external hard disks and removable hard disks is that users can _____. a. transport a large number of files b. add storage space to a notebook computer c. share a drive with multiple computers d. all of the above
d
Applications software is used to _____. a. facilitate communications b. assist with graphics and multimedia projects c. support home, personal, and educational activities d. all of the above
d
Common types of miniature mobile storage media include _____. a. CompactFlash (CD) and Smart Media b. Secure Digital (SD) and Memory Stick c. Microdrive and USBDrive d. all of the above
d
Computer viruses, worms, and Trojan horses deliver their payload on a computer when a user _____. a. opens an infected file b. runs an infected program c. boots the computer with an infected disk in a disk drive d. all of the above
d
Each of the following is a commonly used output device except _____. a. speakers b. a printer c. a monitor d. a scanner
d
Each of the following is a popular type of mobile device except _____. a. PDAs b. handheld computers c. smart phones d. midrange servers
d
In Windows XP, the _____ contains a list of programs that open automatically when users boot the computer. a. Backup folder b. Swap folder c. Restore folder d. Startup folder
d
In addition to the motherboard, processor, memory, sound card, PC Card slot, and drive bay, the system units of mobile computers and devices also house _____. a. the keyboard b. a pointing device c. speakers and display d. all of the above
d
In its simplest form, a(n) _____ is a programmed formula that the recipient of encrypted data uses to decrypt the ciphertext. a. digital certificate b. virus signature c. session cookie d. encryption key
d
In sequence, the five major steps to Web publishing are: _____. a. analyze and design a Web site, create a Web site, deploy a Web site, maintain a Web site, plan a Web site b. deploy a Web site, maintain a Web site, plan a Web site, analyze and design a Web site, create a Web site c. create a Web site, deploy a Web site, maintain a Web site, plan a Web site, analyze and design a Web site d. plan a Web site, analyze and design a Web site, create a Web site, deploy a Web site, maintain a Web site
d
In the accompanying figure showing common ways to access the Internet, a(n) _____ is a company that provides access to users with Web-enabled mobile devices. a. online service provider (OSP b. national ISP c. regional ISP d. wireless Internet service provider (WISP)
d
In the machine cycle steps illustrated in the accompanying figure, _____ is the process of obtaining a program instruction or data item from memory. a. storing b. executing c. decoding d. fetching
d
LCD monitors and LCD screens produce color using either _____ technology. a. impact or nonimpact b. CRT or gas plasma c. ink-jet or dot-matrix d. passive matrix or active matrix
d
LCD monitors have a much smaller _____ than do CRT monitors; that is, they take up less desk space. a. fingerprint b. microprint c. handprint d. footprint
d
Many Web pages use _____, which is the appearance of motion created by displaying a series of still images in sequence. a. graphics b. audio c. virtual reality d. animation
d
Memory stores _____. a. the operating system and other system software b. application programs that carry out a specific task c. the data being processed and the resulting information d. all of the above
d
On a network, the major difference between the server and client computers is that the server ordinarily has _____. a. less power, less storage space, and is less reliable b. more power, more storage space, and is more reliable c. less power, less storage space, but is more reliable d. more power, more storage space, and is more reliable
d
PDAs ship with a basic _____, which is the primary input device. a. trackball b. keyboard c. touch screen d. stylus
d
People around the world use the Internet to _____. a. communicate with and meet other people b. shop for goods and services c. access sources of information and leisure d. all of the above
d
Software today has a _____, like that shown in the accompanying figure. a. menu-driven interface b. coded-row interface c. command-line interface d. graphical user interface
d
Storage holds _____ for future use. a. data b. computer literacy c. information d. all of the above
d
The Accelerated Graphics Port (AGP) is _____. a. a high-speed expansion bus that connects higher speed devices such as hard disks b. the most common and slowest expansion bus c. a bus that eliminates the need to install cards into expansion slots d. a bus designed to improve the speed with which 3-D graphics and video transmit
d
The Internet has its roots in _____, a network that became functional in 1969, linking scientific and academic researchers across the United States. a. LISTSERV b. NSFnet c. MPEG d. ARPANET
d
The _____ is a small symbol displayed on the screen that moves as a user moves the mouse. a. menu b. button c. icon d. pointer
d
The entire collection of Internet newsgroups is called _____, which contains thousands of newsgroups on a multitude of topics. a. ARPANET b. NSFnet c. Dragnet d. Usenet
d
The most widely used biometric device today is a _____. a. face recognition system b. hand geometry system c. retinal scanner d. fingerprint scanner
d
The programs within a software suite (for personal use) use a _____. a. different interface and have completely different features b. different interface but share some common features c. similar interface but have completely different features d. similar interface and share some common features
d
The wider the bus, the _____ the transfer of data. a. greater the number of transfer steps required and the slower b. greater the number of transfer steps required and the faster c. fewer the number of transfer steps required and the slower d. fewer the number of transfer steps required and the faster
d
Today, _____ is a primary communications method for both personal and business users. a. e-commerce b. FTP c. chat room d. e-mail
d
Two of the more commonly used _____ are Microsoft Office 2003 and Sun StarOffice. a. personal information managers b. application service providers c. clip art/image galleries d. software suites
d
Users store data and information on an Internet hard drive to _____. a. save time by storing large files instantaneously b. allow others to access files c. store offsite backups of data d. all of the above
d
When a user specifies a domain name, a _____ translates the domain name into its associated IP address so data can route to the correct computer. a. URL server b. DNS client c. URL client d. DNS server
d
When compared to flat panel monitors, gas plasma displays offer _____ expensive. a. larger screen sizes and higher display quality and are much less b. smaller screen sizes and lower display quality and are much less c. smaller screen sizes and lower display quality but are much more d. larger screen sizes and higher display quality but are much more
d
When computer users _____ a document, they enter text or numbers, insert graphical images, and perform other tasks using an input device. a. print b. format c. save d. create
d
____ comprise an information processing system. a. Hardware and software b. Data and people c. Procedures d. All of the above
d
____ is/are the steps that tell the computer how to perform a particular task. a. Documentation b. Information c. Data d. Instructions
d
_____ are used in specialized fields such as engineering and drafting and usually are very costly. a. Postage printers b. Thermal printers c. Photo printers d. Plotters
d
_____ can serve as sending and receiving devices in a communications system. a. Mainframe computers and servers b. Desktop computers and notebook computers c. Tablet PCs and PDAs d. All of the above
d
_____ enables users to listen to music as it downloads to their computers. a. Streaming video b. Flowing video c. Flowing audio d. Streaming audio
d
________ is a compressed format that supports multiple colors and resolutions and was developed by W3C Consortium(patent free). a. BMP b. TIFF c. JEPG d. PNG
d
consists of the sale of goods and services by a company to the general public. a. Business-to-business (B2B) e-commerce b. Consumer-to-business (C2B) e-commerce c. Consumer-to-consumer (C2C) e-commerce d. Business-to-consumer (B2C) e-commerce
d
__________ is a collection of raw, unprocessed facts, figures, and symbols. (one word) Blank 1
data
A ________ is a centralized and organized collection of data on a given subject that is organized for searching and/or statistical analysis. (two words) Blank 1
data bank
A(n) _________________________ is a collection of data organized in a manner that allows access, retrieval, and use of that data. (one word) Blank 1
database
_________________________ is application software that allows users to create, access, and manage a database. (two words) Blank 1
database software
A(n) _________________________ is a type of always-on connection that is established between two communications devices. (two words) Blank 1
dedicated connection
A(n) _________________________ computer is a type of personal computer designed so the system unit, input devices, and any other devices fit entirely on or under a desk or table. (one word) Blank 1
desktop
In both the Windows XP and the Mac OS X operating systems, the _________________________ is an on-screen work area that has a graphical user interface.(one word) Blank 1
desktop
_________________________ access takes place when the modem in a computer uses a standard telephone line to connect to the Internet. (one word) Blank 1
dial up
A(n) _________________________ is a temporary connection that uses one or more analog telephone lines for communications. (three words) Blank 1
dial up connection
A(n) _________________________ is an impact printer that produces printed images when tiny wire pins on a print head mechanism strike an inked ribbon. (three words) Blank 1
dot matrix printer
_________________________ is a business transaction that occurs over an electronic network such as the Internet. (two words) Blank 1
e-commerce
_________________________ is the transmission of messages and files via a computer network. (two words or short form) Blank 1
A(n) _________________________ is a combination of user name and domain name that identifies a user so he or she can receive Internet e-mail. (two words) Blank 1
email address
__________ involves the use of computers to observe, record, and review an employee's use of a computer, including communications such as e-mail messages, keyboarding activity, and Web sites visited. (two words)
employee monitoring
_________________________ is the process of converting readable data into unreadable characters to prevent unauthorized access. (one word) Blank 1
encryption
To reduce the amount of electricity used by monitors and other computer components, the United States Department of Energy (DOE) and the Unites States Environmental Protection Agency (EPA) developed the _________________________ program. (two words) Blank 1
energy star
A(n) _________________________ is a socket on the motherboard that can hold an adapter card. (two words) Blank 1
expansion slot
Sometimes a company uses a(n) _________________________, which allows customers or suppliers to access part of its intranet. (one word) Blank 1
extranet
A dial-up connection is permanent. True False
false
A digital light processing (DLP) projector, which uses liquid crystal display technology, attaches directly to a computer, and uses its own light source to display the information shown on the computer on the screen. True False
false
A digital pen typically provides less functionality than a stylus. True False
false
A digital signal consists of a continuous electrical wave. True False
false
A pointing stick requires additional desk space. True False
false
According to netiquette, in e-mail, newsgroups, and chat rooms users should conceal a spoiler, which is a message that asks a question about a game or the ending to a movie or program. True False
false
All of a worksheet's columns and rows are displayed on the screen at one time. True False
false
All sizes of computers typically use the same operating system. True False
false
Although eyestrain associated with CVS (computer vision syndrome) is not thought to be disruptive or unpleasant, it has serious long-term consequences. True False
false
An LCD monitor uses more than three times the power consumed by a CRT monitor, produces more heat, and produces electromagnetic radiation. True False
false
An analog signal consists of individual electrical pulses that represent bits grouped together into bytes. True False
false
As a user receives an e-mail message, an incoming mail server — operated by the user's Internet access provider — sends the messages directly to the user's computer. True False
false
Buying a collection of programs in a software suite usually costs significantly more than purchasing them individually. True False
false
CDs and DVDs are magnetic media. True False
false
Cable television (CATV) wiring often uses twisted-pair cable because it can be cabled over longer distances than coaxial cable. True False
false
Callback systems work best for users who regularly work at different random locations. True False
false
Carpal tunnel syndrome (CTS) is inflammation of a tendon due to some repeated motion or stress on that tendon. True False
false
Command-line interfaces are easy to use because they do not require exact spelling, grammar, or punctuation. True False
false
Common editing tasks include changing the font, font size, or font style of text. True False
false
Computer users never should update their antivirus program's virus signature files. True False
false
Few PDAs and Tablet PCs have touch screens, and no notebook computers have touch screens. True False
false
Few Web page authoring software packages provide basic Web site management tools, preventing users from adding or modifying pages within the Web site. True False
false
Few label printers also print bar codes. True False
false
For a right-handed user, the left button usually is the secondary mouse button and the right mouse button is the primary mouse button. True False
false
If the digital code in a computer matches the personal code translated by a biometric device, the computer denies access to the individual. True False
false
In a worksheet, one or more letters identify each row, and a number identifies each column. True False
false
In a worksheet, the intersection of column B and row 6 is referred to as cell 6B. True False
false
In the encryption process, the unencrypted, readable data is called ciphertext. True False
false
Iris recognition systems are very inexpensive and are used by school cafeterias. True False
false
JPEG is a format that expands graphics to increase their file size, which means the file takes up less storage space. True False
false
Like a virus or worm, a Trojan horse replicates itself to other computers. True False
false
Methods that guarantee a computer or network is safe from computer viruses, worms, and Trojan horses exist. True False
false
Most mobile computers and devices separate the display and other components into a different physical case. True False
false
Multimedia decreases the types of information available on the Web, limits the Web's potential uses, and makes the Internet a less entertaining place to explore. True False
false
Newer DVD-ROM drives cannot read audio CDs, CD-ROMs, CD-Rs, or CD-RWs. True False
false
No personal computer today includes any type of CD or DVD drive installed in a drive bay. True False
false
On a CD or DVD, a land absorbs light, which is read as binary digit 0, and pits cause light to reflect, which is read as binary digit 1. True False
false
On a floppy disk, if the write-protect notch is open, the drive can write on the floppy disk. True False
false
On notebook and many handheld computers, the keyboard is separate from the system unit. True False
false
Presentation graphics software incorporates none of the features found in word processing software, such as spelling, formatting, and recognizing voice input. True False
false
Registers are part of memory or a storage device, not part of the processor. True False
false
Replacing a motherboard is a fairly simple process, whereas replacing a processor is much more complicated. True False
false
Serial ports usually connect devices that require fast data transmission, such as a printer. True False
false
Smaller file sizes result in slower downloading of Web pages because small files transmit slower than large files. True False
false
Some people refer to flash memory cards as intelligent smart cards to differentiate them from a smart card, which has only storage capabilities. True False
false
Spreadsheet software is a rarely used type of application software. True False
false
Spreadsheet software's inability to recalculate data makes it a worthless budgeting, forecasting, and decision making tool. True False
false
Standards, such as those defined by ASCII and EBCDIC, make it impossible for components within computers to communicate with each other successfully. True False
false
Tendonitis is inflammation of the nerve that connects the forearm to the palm of the wrist. True False
false
The BMP, PCX, and TIFF formats have smaller files sizes, never require special viewer software, and thus are used on the Web more frequently than JPEG and GIF. True False
false
The GIF format works best for images that have many indistinct colors, such as colorful paintings, multi-color borders, and complex designs. True False
false
The Internet is the world's smallest LAN. True False
false
The arrowhead symbol at the right edge of some menu commands indicates that the command is unavailable. True False
false
The electronic components and circuitry of the system unit, such as the processor and memory, usually are part of or are connected to a circuit board called the fatherboard. True False
false
The four categories of software are mutually exclusive; that is, software listed in one category may not be used in other categories. True False
false
The higher the resolution and speed, the less expensive the laser printer. True False
false
The quality and consistency of the connection on a dedicated line is worse than a dial-up line because dedicated lines provide a temporary connection. True False
false
The spelling checker included with word processing software compares words in a document with an electronic dictionary that is part of the operating system. True False
false
To click a button on the screen requires moving the pointer to the button and then moving the mouse up and down. True False
false
To develop a Web page, it is necessary to be a computer programmer. True False
false
To display a shortcut menu in Windows applications, click the left mouse button. True False
false
To receive e-mail messages, it is not necessary to have an e-mail address. True False
false
Today, only large computers have communications capabilities. True False
false
Undervoltages can cause equipment damage, but generally do not cause data loss. True False
false
Unlike CD-R or CD-RW drives, users record, or write, their own data on standard CD-ROM drives. True False
false
Using a dial-up line to connect computers costs more than making a regular telephone call. True False
false
Voice verification systems use speaker-independent voice recognition software. True False
false
Web services require a specific programming language, operating system, and Web browser. True False
false
Web sites that provide an Internet hard drive offer no other services. True False
false
When storage devices write data on storage media, they are creating input. True False
false
When users connect a device to a USB port, they need to install an adapter cord in the computer. True False
false
While laser printers usually cost less than ink-jet printers, they also are much slower. True False
false
With a personal information manager's address book, users can schedule activities for a particular day and time. True False
false
A(n) _________________________ computer is a computer that continues to operate when one of its components fails, ensuring that no data is lost. (two words) Blank 1
fault tolerant
A(n) _________________________ is a portable, inexpensive storage medium that consists of a thin, circular, flexible plastic Mylar film with a magnetic coating enclosed in a square-shaped plastic shell. (two words) Blank 1
floppy disk
A(n) _________________________, such as bold, italic, and underline in the accompanying figure, adds emphasis to a font. (two words) Blank 1
font style
A(n) _________________________ performs calculations on the data in a worksheet and displays the resulting value in a cell. (one word) Blank 1
formula
A(n) _________________________ is a predefined formula that performs common calculations such as adding the values in a group of cells. (one word) Blank 1
function
GB is the abbreviation of _____________. (one word) Blank 1
gigabyte
A(n) _________________________ is a navigation system that consists of one or more earth-based receivers that accept and analyze signals sent by satellites in order to determine the receiver's geographic location. (three words or acroynm) Blank 1
gps
A(n) _________________________ is a digital representation of nontext information such as a drawing, chart, or photograph. (one word) Blank 1
graphic
_________________________ is a software application that helps groups of people work together on projects and share information over a network. (one word) Blank 1
groupware
_________________________ is the use of a computer or network without permission. (two words) Blank 1
hacking
A(n) _________________________ is a storage device that contains one or more inflexible, circular platters that store data, instructions, and information. (two words) Blank 1
hard drive
A computer contains many electric, electronic, and mechanical components known as _________________________. (one word) Blank 1
hardware
A feature of PC Cards and other flash memory cards, called _________________________, allows users to insert and remove the cards while the computer is running. (two words) Blank 1
hot plugging
A(n) _________________________ is a small image displayed on the screen that represents a program, a document, or some other object. (one word) Blank 1
icon
A(n) _________________________ forms characters and graphics on a piece of paper by striking a mechanism against an inked ribbon that physically contacts the paper. (two words)
impact printer
A(n) _________________________ is a type of nonimpact printer that forms characters and graphics by spraying tiny drops of liquid ink onto a piece of paper. (three words) Blank 1
ink jet printer
_________________________ is any data or instruction entered into the memory of a computer. (one word) Blank 1
input
A(n) _________________________ is any hardware component that allows users to enter data or instructions into a computer. (two words) Blank 1
input device
_________________________ are the rights to which creators are entitled for their work. (three words) Blank 1
intellectual property
The _________________________ is a worldwide collection of networks that connects millions of businesses, government agencies, educational institutions, and individuals
internet
Instead of printing to a local printer, with _________________________ users print to a Web address that is associated to a particular printer. (two words) Blank 1
internet printing
_________________________ is a not-for-profit Internet-related research and development project whose purpose is to improve on the inefficiencies of the Internet. (one word)
internet2
A(n) _________________________ is an internal network that uses Internet technologies. (one word) Blank 1
intranet
The _________________________ is the core of an operating system that manages memory and devices, maintains the computer's clock, starts applications, and assigns the computer's resources, such as devices, programs, data, and information. (one word) Blank 1
kernel
A(n) _________________________ is an input device that contains keys users press to enter data into a computer. (one word) Blank 1
keyboard
The text, or _________________________, entered into a cell identifies the worksheet data and helps organize the worksheet. (one word) Blank 1
label
A(n) _________________________ computer is a portable, personal computer small enough to fit on the lap. (one word) Blank 1
laptop
Together, four operations (fetching, decoding, executing, and storing) comprise a(n) _________________________. (two words) Blank 1
machine cycle
A(n) _________________________ is a large, expensive, very powerful computer that can handle hundreds or thousands of connected users simultaneously and store tremendous amounts of data, instructions, and information (one word). Blank 1
mainframe
A(n) _________________________ contains a series of commands from which a user makes selections. (one word) Blank 1
menu
A(n) _________________________ computer is more powerful and larger than a workstation computer and typically supports couple hundred connected computers at the same time. (one word)
midrange
A(n) _________________________ computer is a personal computer that users can carry from place to place. (one word) Blank 1
mobile
A(n) _________________________ is a plastic or metal case that houses a display device as a separate peripheral. (one word) Blank 1
monitor
The _________________________ is the main circuit board of the system unit. (one word) Blank 1
motherboard
_________________________ refers to any application that combines text with graphics, animation, audio, video, and/or virtual reality. (one word) Blank 1
multimedia
_________________________, which is short for Internet etiquette, is the code of acceptable behaviors users should follow while on the Internet; that is, it is the conduct expected of individuals while online. (one word)
netiquette
A(n) _________________________, such as that pictured in the accompanying figure, is a collection of computers and devices connected together via communications devices and transmission media. (one word)
network
In many public locations, people connect wirelessly to the Internet through a(n) _________________________ using their mobile computers or devices. (three words) Blank 1
network access point
When a computer connects to a network such as that pictured in the accompanying figure, the computer is _________________________. (one word)
online
A(n) _________________________ is a set of programs containing instructions that coordinate all the activities among computer hardware resources. (two words or acroynm)
operating system
_________________________ serves as the interface between the user, the application software, and the computer's hardware. (two words)
operating system
A(n) _________________________ is a device that uses a light source to read characters, marks, and codes and then converts them into digital data that a computer can process. (two words)
optical scanner
A(n) _________________________ is a light-sensing input device that reads printed text and graphics and then translates the results into a form the computer can process. (two words)
optical scanner
A(n) _________________________ is any hardware component that conveys information to one or more people. (two words) Blank 1
output device
A(n) _________________________ occurs when the incoming electrical power increases significantly above the normal 120 volts. (two words) Blank 1
overvoltage
Many Web sites, like that in the accompanying figure, require a user to enter a(n) _________________________, which is a private combination of characters associated with a user name that allows access to certain computer resources. (one word) Blank 1
password
A(n) _________________________ is a thin, credit card-sized device that adds memory, storage, sound, fax/modem, communications, and other capabilities to mobile computers. (two words)
pc card
Notebook and other mobile computers have at least one _________________________, which is a special type of expansion slot that holds PC Cards. (three words) Blank 1
pc card slot
A(n) _________________________ network is a simple, inexpensive network that typically connects less than 10 computers. (three words) Blank 1
peer to peer
A(n) _________________________, such as a keyboard or printer, is a device that connects to the system unit and is controlled by the processor in the computer. (one word)
peripheral
A(n) _________________________ computer is a computer that can perform all of its input, processing, output, and storage activities by itself. (one word) Blank 1
personal
At a(n) _________________________, users can create an online photo album and store their electronic photographs for free. (4 words) Blank 1 Blank 2 Blank 3 Blank 4
photo community web site
A(n) _________________________ is a program that extends the capability of a browser. (one word) Blank 1
plugin
Anyone can create a Web page and then make it available, or _________________________ it, on the Internet for others to see. (one word) Blank 1
post
_________________________ is application software that allows users to create visual aids for presentations to communicate ideas, messages, and other information to a group (three words)
presentation software
The _________________________ is the electronic component that interprets and carries out the basic instructions that operate the computer. (one word) Blank 1
processor
A(n) _________________________ is a request for specific data from a database. (one word) Blank 1
query
A(n) _________________________ is an injury or disorder of the muscles, nerves, tendons, ligaments, and joints caused by repeated motion. (three words or acronym) Blank 1
repetitive strain injury
_________________________ describes the sharpness and clearness of an image. (one word) Blank 1
resolution
A(n) _________________________ network is a network topology in which a cable forms a closed loop (ring), with all computers and devices arranged along the ring. (one word)
ring
A(n) _________________________ is a communications device that connects multiple computers together and transmits data to its correct destination on the network. (one word)
router
A(n) _________________________ is a device that initiates an instruction to transmit data, instructions, or information. (two words)
sending device
In a network such as that pictured in the accompanying figure, the _________________________ controls access to the resources on the network. (one word) Blank 1
server
On a client/server network, such as that illustrated in the accompanying figure, a(n) _________________________ controls access to the hardware, software, and other resources on the network and provides a centralized storage area for programs, data, and information. (one word) Blank 1
server
The _________________________ allows the customer visiting an electronic storefront to collect purchases. (two words) Blank 1
shopping cart
A presentation can be viewed as slides, sometimes called a(n) _________________________, that displays on a large monitor or on a projection screen. (two words) Blank 1
slide show
Word processing software includes a(n) _________________________, which reviews the spelling of individual words, sections of a document, or the entire document. (two words)
spell check
_________________________ is software that allows users to organize data in rows and columns and perform calculations on the data. (two words) Blank 1
spreadsheet software
A computer keeps permanent data, instructions, and information on _________________________ such as floppy disks, hard disks, CDs, and DVDs. (one word) Blank 1
storage
_________________________ is a general term for devices that hold data, instructions, and information for future use. (one word) Blank 1
storage
A(n) _________________________ is the physical material on which a computer keeps data, instructions, and information. Hard drives and CD-ROM are examples. (two words) Blank 1
storage medium
_________________________ is the process of transferring data in a continuous and even flow, which allows users to access and use a file while it is transmitting. (one word)
streaming
A(n) _________________________ is a menu that is displayed when a user points to a command on a previous menu. (one word) Blank 1
submenu
A(n) _________________________ is the fastest, most powerful, computer — and the most expensive. (one word) Blank 1
supercomputer
A(n) _________________________ is the prolonged malfunction of a computer. (two words) Blank 1
system failure
_________________________, such as operating systems and utility programs, consists of the programs that control or maintain the operations of a computer and its devices. (two words
system software
The _________________________ is a box-like case that contains electronic components of the computer used to process data. (two words) Blank 1
system unit
The _________________________ is a case that contains electronic components of the computer used to process data. (two words) Blank 1
system unit
_________________________ is a magnetically coated ribbon of plastic capable of storing large amounts of data and information at a low cost. (one word) Blank 1
tape
A(n) _________________________ generates images by pushing electrically heated pins against heat-sensitive paper. (two words) Blank 1
thermal printer
A(n) _________________________ is a touch-sensitive display device that users interact with by touching the screen with a finger. (two words) Blank 1
touch screen
A(n) _________________________ is a small, flat, rectangular pointing device that is sensitive to pressure and motion. (one word) Blank 1
touchpad
Similar to a mechanical mouse that has a ball on the bottom, a(n) _________________________ is a stationary pointing device with a ball on its top. (one word) Blank 1
trackball
_________ is data collected when a transaction occurs in which the customer must identify himself or herself. (two words) Blank 1
transaction data
A P2P network sometimes is called a file sharing network because users with compatible software and an Internet connection copy files from someone else's hard disk to their hard disk. True False
true
A license agreement provides specific conditions for use of software, which a user must accept before using the software. True False
true
A major advantage of using word processing software is that users easily can change what they have written. True False
true
A popular use of Zip disks is to back up important data and information. True False
true
A recent Ethernet standard, called Fast Ethernet, has a data transfer rate of 100 Mbps, ten times faster than the original standard. True False
true
A surge protector absorbs small overvoltages — generally without damage to the computer or equipment. True False
true
A typical floppy disk can store up to 500 double-spaced pages of text, several digital photographs, or a small audio file. True False
true
A user can display a scanned object on the screen, store it on a storage medium, print it, fax it, attach it to an e-mail message, include it in another document, or post it to a Web site or photo community for everyone to see. True False
true
Animation can make Web pages more visually interesting or draw attention to important information or links. True False
true
Any illegal act involving a computer generally is referred to as a computer crime. True False
true
Arithmetic operations include basic calculations such as addition, subtraction, multiplication, and division. True False
true
Because of their small size and versatility, some consumer electronics products such as digital cameras and automobiles use PC Cards. True False
true
Computers, monitors, and other equipment contain toxic materials and potentially dangerous elements including lead, mercury, and flame retardants. True False
true
Dedicated lines can be either analog or digital. True False
true
Defining the size of the paper on which to print and specifying the margins — that is, the portion of the page outside the main body of text — is an example of a capability of word processing software. True False
true
During an online meeting, participants have the ability to open a separate window and type messages to one another. True False
true
During the scan of a document, an OCR device determines the shapes of characters by detecting patterns of light and dark. True False
true
E-mail was one of the original services on the Internet, enabling scientists and researchers working on government-sponsored projects to communicate with colleagues at other locations. True False
true
Each integrated circuit on a computer chip can contain millions of elements such as resistors, capacitors, and transistors. True False
true
Fiber-optic cables have the capability of carrying significantly more signals than wire cables. True False
true
ISDN and DSL modems usually are external devices, in which one end connects to the telephone line and the other end connects to a port on the system unit. True False
true
In a database, each column, called a field, contains a specific category of data within a record. True False
true
Instead of external fingerprint scanners, to save on desk space some newer keyboards and notebook computers have a fingerprint scanner built into them. True False
true
Manufacturers often identify cables by their connector types to assist users with purchasing a cable to connect to a peripheral. True False
true
Many current word processing packages include Web page authoring features so users can create basic Web pages that contain text and graphics. True False
true
Many mobile and consumer devices, such as PDAs, digital cameras, digital music players, and cellular telephones use flash memory cards. True False
true
Monochrome means information displays in one color on a different color background. True False
true
Nonimpact printers are much quieter than impact printers because nonimpact printers do not strike the paper. True False
true
On a peer-to-peer network, each computer, called a peer, has equal responsibilities and capabilities, sharing hardware, data, or information with other computers on the network. True False
true
One of the more powerful features of spreadsheet software is its capability of recalculating the rest of the worksheet when data in a worksheet changes. True False
true
Overvoltages can cause immediate and permanent damage to hardware. True False
true
Parallel ports originally were developed as an alternative to the slower speed serial ports. True False
true
People use sending and receiving devices for many types of communications. True False
true
Planning a personal Web site involves thinking about issues that could affect the design of the Web site. True False
true
Presentation graphics software provides a variety of layouts for each individual slide. True False
true
Regardless of the size of the computer, most operating systems provide similar functions. True False
true
Some parts of the operating system are nonresident, that is, these instructions remain on the hard disk until they are needed. True False
true
System software serves as the interface between the user, the application software, and the computer's hardware. True False
true
The find or search feature of word processing software allows users to locate all occurrences of a certain character, word, or phrase. True False
true
The information in an electronic profile includes personal details such as age, address, telephone number, spending habits, marital status, number of dependants, ages of dependants, and so on. True False
true
The output from a POS terminal serves as input to other computers to maintain sales records, update inventory, verify credit, and perform other activities associated with the sales transactions that are critical to running a business. True False
true
The quality of a CRT monitor depends largely on its resolution, dot pitch, and refresh rate. True False
true
The search feature in combination with the replace feature allows users of word processing software to substitute existing characters or words with new ones. True False
true
The system clock is one of the major factors that influences a computer's speed. True False
true
The system unit on most desktop and notebook computers contains at least one hard disk. True False
true
To start a program, users can click the program name on a menu or submenu. True False
true
To use application software, a computer must be running system software, specifically, an operating system. True False
true
Today, the most common way computers become infected with viruses, worms, and Trojan horses is through users opening infected e-mail attachments. True False
true
Two categories of printers are impact and nonimpact. True False
true
USB supports hot plugging and Plug and Play, which means users can attach peripherals while the computer is running. True False
true
Web addresses of pages that use SSL (Secure Sockets Layer) typically begin with https, instead of http. True False
true
When a computer is turned on, the charge of electricity causes the processor chip to reset itself and find the ROM chip(s) that contains the BIOS. True False
true
When a program needs data, instructions, or information, the processor checks the disk cache. True False
true
When a user sends an e-mail message, an outgoing mail server that is operated by the user's Internet access provider determines how to route the message through the Internet and then sends the message. True False
true
When colors are used for characters in a word processing document, they will print as black or gray unless users have a color printer. True False
true
When purchasing application software, users must ensure that it works with the operating system installed on their computer. True False
true
When the Start button is clicked, the Start menu is displayed on the Windows XP desktop. True False
true
While working with a computer, a user encounters four basic categories of output: text, graphics, audio, and video. True False
true
With TCP/IP, each packet contains data as well as the recipient (destination), origin (sender), and the sequence information used to reassemble the data at the destination. True False
true
With a computerized database, the computer stores the data in an electronic format on a storage medium such as a floppy disk or hard disk. True False
true
With a mouse, users control the movement of the pointer, often called a mouse pointer. True False
true
With most popular personal computer database software programs, a database consists of a collection of tables, organized in rows and columns. True False
true
With the necessary software, a printer with Internet printing capability can receive print instructions from desktop computers, mobile computers, or mobile devices. True False
true
In order for the pages to be viewed by others, they must be _____ to a web server. (one word) Blank 1
uploaded
A(n) _________________________ is a unique combination of characters, such as letters of the alphabet and/or numbers, that identifies a specific user. (two words) Blank 1
user name
Many worksheet cells contain a number that can be used in a calculation, called a(n) _________________________. (one word) Blank 1
value
_________________________ consists of full-motion images that are played back at various speeds. (one word) Blank 1
video
With _________________________, the operating system allocates a portion of a storage medium, usually the hard disk, to function as additional RAM. (two words) Blank 1
virtual memory
_________________________ is the use of computers to simulate a real or imagined environment that appears as three-dimensional (3-D) space. (two words or acronym) Blank 1
virtual reality
A computer _________________________ is a potentially damaging computer program that infects a computer and negatively affects the way the computer works without the user's knowledge or permission. (one word) Blank 1
virus
_________________________ available for purchase allow users to speak into their existing application software. (three words) Blank 1
voice recognition software
The _________________________, short for World Wide Web, is one of the more popular services on the Internet. (one word) Blank 1
web
Creating a Web site, sometimes called _________________________, involves working on the computer to compose the Web site. (two words) Blank 1
web authoring
_________________________ is the development and maintenance of Web pages. (two words) Blank 1
web publishing
_________________________ is software that allows users to create and manipulate documents containing mostly text and sometimes graphics. (three words) Blank 1
word processing software
When using spreadsheet software, the rows and columns collectively are called a(n) _________________________. (one word) Blank 1
worksheet
_________________________ is the process of transferring data, instructions, and information from memory to a storage medium. (one word) Blank 1
writing
A(n) _________________________ is a type of portable magnetic media that uses disk technology to store from 100 MB to 750 MB of data. (two words) Blank 1
zip drive