digital competency

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

the most common computer port is the __ port

USB

moore's law refers to the

pace at which CPU's improve

SMTP is the set of rules used to

send e-mail along the Internet to its destination

when is a flat database sufficient to use when organizing data

when the data is simple and can be organized in one table

An IDE is a tool that has support for

Editing and debugging

ginny downloads and modifies an open source software program, then uploads the program with a different name. Which type of software license is she most likely to be working under

GNU General Public License

An example of an open source OS is

Linux

which of the following is a sensor found in certain smartphones

accelerometer

computer viruses can be spread by

all of the above

intellectual property

all of the above

it is important to maintain your online reputation

all of the above

Which is NOT a key component of a typical client/server network?

bastion host

ensuring that website content is not slanted in its point of view is checking for

bias

authentication techniques that rely on personal biological traits are called

biometrics

data captured as users navigate through a website is called

clickstream data

all of the following are current focuses of AI research EXCEPT

cognitive surplus

digital audio software can be used to

compose songs or soundtracks with virtual instruments

Unnecessary duplication of data in a database is referred to as

data redundancy

the combination of media, internet, entertainment, and phone services into a single device illustrates the principle of

digital convergence

when analog data is measured and converted to a stream of numerical values, this is referred to as __ the data

digitizing

which type of broadband internet offers connections nearing the speed of light

fiber-optic**check

Ergonomics is an important consideration

for all computing devices

which of the following is not one of the factors used in multi-factor authentication

identity

when someone uses your personal information to pose as you, this is

identity theft

which of the following is not a category of intellectual property

imprint

Sophisticated modeling software is helping international researchers

increase the pace of research in finding and producing vaccines

Antivirus software prevents infection by recording key attributes about your files and checking to see if they change over time in a process called

inoculation

The collection of large national and international network providers used to establish the Internet is called the

internet backbone

LibreOffice is an example of which type of software

open source software

When an OS processes tasks in a priority order, it is known as

preemptive multitasking

the most common output device for hard output is a

printer

What web browser feature would be particularly useful when using public computers?

privacy browsing

what is the first step of the system development life cycle (SDLC)

problem identification

data can be retrieved fastest from

registers

Windows creates "restore points" so that you can

return your system to the way it was before you installed new software.

which of the following devices would use a real-time operating system

roomba vacuum

the C: drive on Windows PC is like a large filing cabinet, and is referred to as the

root directory

on client/server networks, more users can be added without affecting the performance of other nodes. This is known as network

scalability

which of the following would not be a benefit of networking computers

sharing software licenses

Which statement is not true about the web

the web is based on the WWW protocol

a GUI user interface is special because

there is a set of icons that represent the OS tasks

when designing a program, the developer selects a design approach like

top down or object oriented

which of the following is a good precaution to take when making online purchases

use a private browser when purchasing items from a public computer

RAM is

volatile memory

is a set of strategies for using more than one drive in a system

RAID

Which of the following statements is false?

Unethical behavior is always illegal

the type of network that would be necessary to connect the networks of two college campuses would be

WAN

How the program should behave if the input data is invalid is part of

error handling

Using copyrighted works without permission of the copyright holder

is possible under the "fair use" doctrine

which of the following should you not do to secure a wireless network

keep the default network name and router password

which of the following would not impact the digital divide

less sharing of the work we produce

Ordering a mocha latte and paying for it from the Starbucks smartphone app is using what type of Internet commerce?

mobile commerce

What two devices are often combined into one device in a small network to connect the home network to the Internet and to share the connection between devices on the network?

modem and router

Firewalls use a process of _____________ to assign IP addresses to the devices internal to the network so hackers will not know what they are.

network address translation (NAT)

a process to ensure that data in a database is organized most efficiently is called

normalization

which of the following functions of a computer is mostly responsible for turning data into information

processing

which of the following is used to create a subset of data that matches certain criteria and that can be saved for future reference or use

query

Image-editing software allows you to

remove red eye

software that is hosted by the vendor and accessed online is called

software as a service (SaaS)

which of the following are common to all programming languages

syntax, keywords, and operators


Ensembles d'études connexes

Critical Care of Nursing Chapter 19

View Set

Chapter 18 Types of Construction & Construction Terms

View Set

McKinney Maternal Test Bank Chap 1-30 to study

View Set

Genetics Exam 2-Ch11 DNA Replication

View Set

Physical Assessment: CH 22 Abdomen

View Set

Ch 18 GEOG-111G-D03 DACC Fall 2016

View Set

Understanding Business Chapter 9 (77 terms)

View Set