CSCI

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Microsoft Windows 1.0 was introduced in 1986 and cost about _____ USD. $50,000 $99 $1,000,000 $10

$99

Microsoft Word can be used to create and edit formatted text. That formatted text is normally saved in which kind of file to enable subsequent editing of that formatted text by Microsoft Word? .doc or .docx .pdf or .pdfx .fmt .com

.doc or .docx

Suppose a song is 200 seconds, that a digital recording sampled the audio 50,000 times per second, and each sample is stored in 1 byte. How many bytes are needed to digitally store a song? 50,000 50,200 250 10,000,000

10,000,000

In 2012, the social data value of a user on Facebook was about _____ (in USD). 30 cents 100 dollars 10,000 dollars 1,000,000 dollars

100 dollars

Early forms of email appeared in the _____ . 1900s 1960s 1980s 2000s

1960s

Given the following uncompressed text, which is a more reasonable LZ dictionary? "Mark Smith, 100 Main St., Smithville" 1: Ma, 2: Smith 1: Mark, 2: Smith 1: M, 2: Sm 1: a: 2: 100

1: Ma, 2: Smith

Video consists of a series of still pictures (frames) that should be shown at a rate of at least _____ frames per second so that humans don't notice the individual pictures and instead see smooth video. 2.5 25 250 2,500

25

"Knowledge" workers spend nearly _____ of their time writing and reading emails. 90% 5% 30% 75%

30%

A text message containing characters from alphabets such as Chinese, Arabic, or Cyrillic is limited to _____ characters. 5000 500 2000 70

70

A high-level concept that protects information from unauthorized users through methods like password protection and secure communication channels. The use of an algorithm to transform plaintext into ciphertext or ciphertext into plaintext. A high-level concept that protects information from unauthorized users through methods like password protection and secure communication channels. A communication protocol, meaning the rules for transferring information among computers. A unit that measures the strength of an encryption method.

A high-level concept that protects information from unauthorized users through methods like password protection and secure communication channels.

Facebook revenues are mostly from _____ . user subscriptions advertisements performing background checks for corporate and government employees annual contribution drives, asking users to donate to the company

Advertisements

Which of the following could be used to infer more about a user than what the user intentionally posts online? GPS data embedded in a tweet An email that transmits the sender's IP along with the message Purchasing items with a credit card All of the above

All of the above

An audio recording app stores audio in a file consisting of _____. Analog audio Analog audio converted to digital values (numbers) Formatted text Rows of data consisting of various fields, each row known as a record

Analog audio converted to digital values (numbers)

Which of the following statements is true? The only information available about a user is what the user intentionally posts online. Users cannot share information online. Apps must prompt users to approve any embedded data before collecting or posting the data. Apps may embed hidden data such as time and location data in a photo.

Apps may embed hidden data such as time and location data in a photo.

What does an email filter do? Performs a search of the user's email, and returns emails that correspond to the search criteria Alerts the user of a new email Automatically takes a user-specified action, such as applying a category label Slows the delivery of email so that a user is distracted less frequently

Automatically takes a user-specified action, such as applying a category label

Which of the following social-media activities is most likely to POSITIVELY impact a hiring decision for a potential employee of a job for a college-graduate? Background information supporting candidate's professional qualifications Harsh criticisms of previous employers because they were unfair Sharing of the person's personal confidential information Numerous photographs of extensive partying

Background information supporting candidate's professional qualifications

_____ started Microsoft in 1975 to develop the BASIC programming language for a particular type of PC. Bill Gates and Paul Allen Steve Jobs and Steve Wozniak Michael Eisner and Randy Newman Masters Stevenson and Dr. Omar Said

Bill Gates and Paul Allen

_____ may collect and sell user information Free apps Paid apps Both free and paid apps No apps

Both free and paid apps

A spreadsheet's columns and rows are labeled with letters and numbers. Which represents the cell 5 rows down and 3 columns to the right? 53 35 15 C5

C5

For what are wiki-based platforms typically used? Hosting multiple websites Collaborative development of content by multiple users Fundraising Finding highly-paid professionals to develop professional looking content for websites

Collaborative development of content by multiple users

Which of the following is NOT a good strategy to protect a user's personal identity? Create multiple accounts so the user's information cannot be linked to a single individual. Before providing information in a form, consider what that information is needed for. Treat online activity as public. Use privacy tools to limit a website's ability to track user activities

Create multiple accounts so the user's information cannot be linked to a single individual.

Which is NOT a common use of spreadsheets? Displaying a table of data, like a table showing recent home sales Drawing a chart, like a chart showing stock prices over the past year Creating formatted text, like a resume that nicely shows a person's education/experience Performing calculations, like adding a restaurant's daily sales into a month's total sales

Creating formatted text, like a resume that nicely shows a person's education/experience

Which is a general approach that uses a community of users via the Internet to perform a particular task, such as developing articles for an online encyclopedia? Fundraising Nupedia Community grouping Crowdsourcing

Crowdsourcing

Which of the following is a technique that strives to analyze language usage, faces, locations, and other items to match information to a unique individual? Data mining EXIF Ghostery IP

Data Mining

A user wishes to keep a record of all employees that work at a company, and to quickly be able to get answers to questions like "Which employees earn over $50,000?" or "How many employees live in California?". Which application is best suited? Word processor app Spreadsheet app Presentation app Database app

Database app

Which of the following is NOT a good strategy to contain personal information on the Internet? Delete old posts that are no longer relevant to a user's changing interests. Before posting, first consider how the information will be interpreted by others who may not be the intended target audience. Before sharing information about others online, consider if the person would be comfortable becoming famous for the shared content. Limit sharing by updating app privacy settings to "opt out".

Delete old posts that are no longer relevant to a user's changing interests.

Which of the following is NOT a task likely to be carried out by an operating system? Interfaces directly with the keyboard and other hardware. Keeps track of file locations on a drive. Switches between multiple applications. Edits video and audio files.

Edits video and audio files.

Which of the following statements is most true? Checking emails frequently improves a user's focus by reminding the user to complete tasks on time. Email has no impact on a user's productivity or focus. Knowledge workers commonly receive and reply to more than 10,000 emails per day, which slows a user's productivity. Email interruptions cause loss of focus, requiring 10-15 minutes after each interruption for a user to regain focus.

Email interruptions cause loss of focus, requiring 10-15 minutes after each interruption for a user to regain focus.

_____ scrambles plaintext into a cyphertext so that a packet transmitted through the network is not readable along the route. Encryption Decryption Cryptokey PGP

Encryption

What is metadata? Extra information, such as the location of an image. A common image format. The practice of inferring more about a user from the user's online posts. A record of a user's online activities.

Extra information, such as the location of an image.

A word processor is primarily intended for enabling a user to create _____. plain text formatted text tweets device drivers

Formatted Text

Windows is a _____ OS developed by Microsoft in the mid-to-late 1980s. text-based touch-based command line graphical

Graphical

Modern operating systems use a _____ interface which allow pointing devices like a mouse. line-oriented text-based windows-based graphical user

Graphical user

Which of the following is a web-based communication protocol involving encryption? HTTPS WIFI Phishing Cyphertext

HTTPS

_____ is a common protocol for retrieving email messages via the Internet. IMAP SMTP WIFI Gmail

IMAP

Which of the following is NOT a common kind of text formatting? bold image italic underline

Image

What happens to information once information is shared online? Users are able to control who has access to the shared information Users can permanently delete information the user no longer wants to share Information can be manipulated or taken out of context Information is by default kept private unless a user provides explicit permission.

Information can be manipulated or taken out of context

Starting as a DVD rent-by-mail company, _____ is currently the largest movie and TV show streaming company in the world. iTunes Hulu Plus Amazon Instant Video Netflix

Netflix

Which of the following is a browser mode that keeps a user fully anonymous on the Internet? Incognito Rapleaf Windowed No such mode. Information such as browser settings and app requests may still be transmitted by the web browser.

No such mode. Information such as browser settings and app requests may still be transmitted by the web browser.

PDF stands for _____ Document Format. Processor Printable Portable Private

Portable

An operating system is a _____ that carries out detailed interactions with hardware on behalf of applications, such as reading data from a keyboard or displaying data on the screen. program USB device memory device driver

Program

A user runs a command to find all entries in a database whose "year" field is 2016. Such a command is called a _____. DBMS Query field cell

Query

A user's laptop is running unusually slowly. After not finding any obvious reasons like a runaway application, the most reasonable next attempted fix by the user would be _____ . take the laptop to a computer store for repair call a computer repair company for assistance restart the laptop reinstall the operating system

Restart the laptop

Being a good OS user does NOT include which of the following? Running apps for long periods so the memory leaks and the memory's contents are refreshed Occasionally removing unneeded files, folders, and apps Backing up important files by making copies of the files to save in another location Taking the time to quit unused apps

Running apps for long periods so the memory leaks and the memory's contents are refreshed

A(n) _____ is responsible for storing and delivering text messages. SMS (short message service) SMSC (short message service center) MMS (multimedia messaging service) cell tower

SMSC (short message service center)

_____ is a common protocol for sending email messages via the Internet. bcc SMTP spam IMAP

SMTP

_____ searching is a technique that infers the context of a term from other items in a search to better understand the user's intended query. Heavy Decrypted Semantic Anonymous

Semantic

Which are the two key benefits of compressing an image file? Smaller files, faster opening Smaller files, faster transfers Faster transfers, faster resolutions Faster transfers, smaller resolutions

Smaller files, faster transfers

_____ refers to playing videos or music directly from the Internet in a web browser or other app. Streaming Downloading Roku WiFi

Streaming

A good two-step troubleshooting process starts with predicting a problem, then testing to confirm or deny the prediction (repeating as needed). A smartphone user wearing a headset doesn't hear a youtube video's audio. Which is a prediction of the problem? Turning up the volume on the smartphone The headset may not be plugged in all the way Playing a different video Trying a different headset

The headset may not be plugged in all the way

A user decides against posting an embarrassing photo of a friend on their personal webpage. Which of the following strategies did the user employ to minimize negative consequences of online behavior? Think before posting Get the facts Communicate about preferences Check app settings

Think before posting

_____ is a text-based operating system developed in the late 1960's. Unix iOS Windows Android

Unix

Which of the following social-media activities is most likely to NEGATIVELY impact a hiring decision for a potential employee? Unprofessional screen name Creativity Wide range of interests Interacting with the company's social media

Unprofessional screen name

Which is NOT a key item that a presentation app helps a user create, for display on slides? Formatted text Video Simple drawings Animations

Video

Most video sharing sites earn revenues through _____. user subscriptions advertisements selling videos and related merchandise to users annual contribution drives, asking users to donate to the company

advertisements

An encrypted message can be viewed by _____ . anyone who has a computer no one an authorized user users along the packet's delivery route

an authorized user

Email is a type of _____ that a user runs to carry out a particular task, such as sending or receiving messages. application (or app) operating system file device driver

application (or app)

In 2015, more than 200 _____ emails were sent and received worldwide each day. (Select the closest value) thousand million billion trillion

billion

WordPress.com and Tumblr.com are popular websites that provide services to users to create and share _____. blogs backups of files and folders emails plugins

blogs

A given Huffman dictionary is 01: a, 001: b, and 000: c. What do these bits represent (decoding from left to right)? 00000000101 cccbb ccba cba ccab

ccba

A zip file can group multiple files into one file, and commonly may also include _____ of those files. formatting reversing compressing translating

compressing

Moving files to the trash or recycle bin _____. deletes the file from the drive creates a backup of important files doesn't actually delete files from the drive speeds up applications that are currently running

doesn't actually delete files from the drive

The term _____ refers to organizing items on a hard drive or other storage device. folder management file administration file management folder administration

file management

Which is most likely a presentation file? filename.txt filename.pptx filename.pdf filename.doc

filename.pptx

A(n) _____ is a group of files or folders that help a user to organize items. file word processor folder OS

folder

On a drive, a _____ is a container used to store files. document platter domain folder

folder

The amount of information on the internet is _____ . growing shrinking stagnating limited by the date the content was posted

growing

_____ is a graphical operating system developed by Apple in 2007 for Apple smartphones and tables. Unix iOS Windows Android

iOS

Web browsers make local copies of a web page's _____ to speed loading for subsequent visits. html images visitors links

images

Finder and Windows Explorer are examples of applications that provide a way for users to _____. manage multiple applications that run simultaneously move, delete, and create file/folder/app items on a drive view formatted text and images on multiple platforms edit movies

move, delete, and create file/folder/app items on a drive

A device driver is typically part of the computer's _____ . hardware operating system scheduler apps

operating system

Quitting unused apps on a smartphone or tablet can _____. reduce CPU usage improve battery life free up memory reduce CPU usage, improve battery life, and free up memory

reduce CPU usage, improve battery life, and free up memory

A _____ site connects people via the Internet with other users who share common interests and backgrounds. Users are able to add connections to other users, post information, share photos, and more. hashtag mailing list twitter social networking

social networking

A device driver is _____. the computer's disk, which stores a user's files and apps a service that drives around a user's file system to recover lost or corrupt files a virus that corrupts the computer hardware software that interfaces with hardware devices, such as a screen, keyboard, or printer

software that interfaces with hardware devices, such as a screen, keyboard, or printer

A device driver for a printer might send print commands that are _____. specific to a particular printer used across all printers, regardless of manufacturer or model are specific to all printers made by one manufacturer, such as HP read by the user and then typed by the user for processing by the printer

specific to a particular printer

Video files could be huge, so compression is used. The main idea of video compression is _____ . storing only the difference between one frame and the next storing each frame as an individual digitized picture recording as many frames per second as possible recording video as a series of dots

storing only the difference between one frame and the next

What types of items can a search engine extract data from? plain text plain and formatted text text and static images text, images, video, audio

text, images, video, audio

Typically, a user's post on Facebook are published for _____ to view. the user's friends/connections the world possible employers an individual

the user's friends/connections

Users can apply _____ , which contain predefined color palettes and text formatting to provide blogs with a consistent look and feel. filters themes plugins a post

themes

YouTube is a widely-used _____ sharing website. homework solution application advertisement video

video


Ensembles d'études connexes

How the Earth Was Made: the Ring of Fire

View Set

Chapter 15.4 - Countries of Central America

View Set

Marketing Research Chapters 1-5 Exam

View Set

Chapter 6: The acquisition of memories and the working-memory system

View Set

Security Operations and Monitoring

View Set

Chapter 9 Planning for Community Change

View Set

Restorative Exam 3 (with dental casting alloys cards)

View Set

PSYCH FINAL EXAM STUDY GUIDE CHAP 3

View Set

GIS: GEOCODING AND DYNAMIC SEGMENTATION chp 16

View Set