Final review
___ includes all the programs that allow you to perform specific tasks on your computer, such as writing a letter
Application software
Storage media are volatile
False
The external hardware components are located inside the main box or system unit of the computer
False
The lack of feedback is one disadvantage of Web-based training and distance learning
False
The main circuit board inside the system unit is called the megaboard
False
The primary function of employee monitoring is to track employee productivity
False
The process of representing data in a form that can be understood by a digital computer is called decimal byte representation
False
The use of cookies provides no benefits to consumers
False
To create presentation graphics, database software is used
False
Using virtual memory is faster than just using RAM
False
When you issue the command for your computer to store a document on your hard drive, the application software must make sure that the specified hard drive exists
False
_____ is the type of direct connection most commonly used with smartphones and tablets to keep them connected to the Internet via a cellular network
Mobile wireless internet access
_____ refers to guidelines for online behavior
Netiquette
_____ is a scam that redirects traffic intended for a commonly used website to a spoofed website set up in an effort to obtain users' personal information
Pharming
____is used to plan, schedule, track, and analyze the tasks involved in a project, such as the construction of a building or the schedule for preparing a large advertising campaign for a client
Project management software
File compression programs reduce the size of flies so they take up less storage space on a storage medium or can be transmitted faster over the Internet
TRUE
For most software programs, the licensing agreement or terms of use agreement is usually displayed and must be agreed to by the end user at the beginning of the software installation
TRUE
Graphics software-also called digital imaging software- is used to create or modify images
TRUE
Large computers- such as high-end servers, mainframes, and supercomputers-sometimes use operating systems designed solely for that type of system
TRUE
Paragraph formatting changes an entire paragraph at one time, such as specifying the line spacing for a particular paragraph
TRUE
Spreadsheet templates are available to help uses quickly create common types of business documents, such as balance sheets, income statements, invoices, and purchase orders
TRUE
Using the Save As option on the File tab, before editing a document is a good idea, so you can return to the original version if needed
TRUE
in spreadsheet programs, when absolute cell references are used, formulas are copied exactly as they are written
TRUE
Unlike ASCII and EBCDIC, Unicode is a universal international coding standard designed to represent text based data written in any ancient or modern language, including those with different alphabets
True
File extensions should not be changed by the user because the operating system uses them to identify the program that should be used to open file
True
Fixed wireless internet access is similar to satellite Internet access in that it uses wireless signals, but it uses radio transmission towers instead of satellites
True
A collaborative Web page that is designed to be edited and republished by a variety of individuals is known as a _____
Wiki
Fourth generation computers witnessed the development of computer networks, wireless technologies, and the Internet
True
In addition to a keyboard, most computers today are used in conjunction with some type of pointing device
True
Like any document created with software instead of paper and pencil, word processing documents can be retrieved, modified, and printed as many times as needed
True
Once a file management program is open, you can look at the holfers and files stored on your computer.
True
One advantage of using a biometric access system is its very high accuracy
True
One reason advanced users may partition a primary hard drive is to be able to use two different operating systems on the same hard drive
True
Pipelining increases the number of machine cycles completed per second
True
Public domain software is not copyrighted; instead, the ownership rights to the program have been donated to the public domain.
True
SSDs are not subject to mechanical failures like magnetic hard drives, and are more resistant to shock and vibration
True
Security software protects devices against malware and other threats
True
Spyware is a possible privacy risk.
True
Storage devices are used to store data on or access data from storage media, such as DVD discs and flash memory cards
True
Storage devices can be internal (located inside the system unit) external (plugged into an external port on the system unit) or remote ( located on another computer)
True
System failure can occur because of hard problems, software problems or computer sabotage
True
Systems analysts design computer systems to be used within their companies
True
Technically the Internet is the physical network, and the Web is the collection of Web pages accessible over the Internet
True
The number of bits being transmitted at one time is dependent on the bust width
True
There are many stand-alone utility programs available as an alternative to the operating system utility programs.
True
To convert analog sound to digital sound, several thousand samples - digital representations of the sound at a particular moment - are taken every second
True
____programs are software programs that are distributed on the honor system
shareware
_____ are used to control access to facilities, devices, computer networks, company databases, Website accounts, and other assets
Access control systems
Rearranging the data on the hard drive so all files are stored in contiguous locations is called
Disk cleanup
As you work on your computer, the operating system continuously manages your computer's resources and makes them available to devices and programs when they are needed
FALSE
In a typical word processing program, as footer text is entered by the user that appears at the top of every page
FALSE
Most operating systems today use a text-based user interface
FALSE
Application service providers (ASPs) supply information that is available through the Internet
False
Embedded computers are computers that host data and programs available to a small group of users.
False
Microsoft Office is available for uses of all operating systems
False
Optical character recognition (OCR) is a technology used primarily by the banking industry to facilitate check processing
False
Performance based exams cannot be administered and taken online
False
Printers produce soft copy
False
RFID tags need to be within line of sight of a reader
False
ROM (read only memory) also called main memory or system memory is used to store the essential parts of the operating system while the computer is running
False
Repeated threats or other malicious behavior that poses a credible threat of hard carried out online is referred to as phishing
False
With a DVD the storage medium and the storage device are permanently sealed together to form one piece of hardware called a fixed media storage system
False
With rewritable optical media, the laser permanently alters the disc surface
False
A _____ is a security system that essentially creates a barrier between a computer or a network and the Internet in order to protect against unauthorized access
Firewall
_____ coordinates activities related to the Internet's naming system, such as IP address allocation and domain name management
ICANN ( internet corporation for assigned names and numbers)
_____ is an online tool designed for delivering news articles, blogs, and other content regularly published to a website
RSS
There are a number of special web pages called _____ available to help you locate what you are looking for on the Internet
Search sites
A graphics tablet is also called a digitizing tablet
True
A mainframe computer is a powerful computer used in many large organizations that need to manage large amounts of centralized data
True
A strategy that is sometimes used with keywords is the wildcard approach
True
Automating the data entry process is referred to as source data automation
True
Computer literacy is knowing about and understanding computers and their uses
True
Early computers required programs to be written in machine language
True
Similar to the way an IP address or domain name uniquely identifies a computer on the Internet, a _____ uniquely identifies a specific Web page
Uniform resource locator (URL)
____ memory allows you to use more memory than is physically available on your computer.
Virtual
Today, the standard term for placing telephone calls over the Internet or any other type of data network is _____
VoIP
_____ refers to driving around an area with a WiFi enabled device to find a WiFi network in order to access and use it without authorization
War driving
Creating a _____ means making a duplicate copy of important files so you can restore those files if needed
backup
Creating a(n) _____ means making a duplicate copy of important files so that when a problems occurs, you can restore those files using the copy
backup
Chrome OS is the first
cloud operating system
A _____ is a collection of computers and other devices that are connected in order to enable users to share hardware, software, and data as well as to communicate electronically with each other
computer network
___ refers to using a personal computer to combine and manipulate text and images to create attractive documents that look as if they were created by a professional printer
desktop publishing
A fraud or scam carried out through the Internet is a form of _____
dot con
Small programs called____ are used to communicate with peripheral devices, such as monitors, printers, portable storage devices, and keyboards
drivers
Online shopping and online investing are examples of _____
e-commerce
A _____ is a collection of an individual's work accessible through a website
e-portfolio
A(n) ____is named, preprogrammed formula, such as to compute the average of a group of cells or to calculate a mortgage payment amount
function
___allow the user to issue commands by selecting icons, buttons, menu items, and other objects- typically with a mouse, pen, or finger
graphical user interfaces
When data is processed into a meaningful form, it becomes _____
information
____ are programs designed to play audio and video files
media players
A personal computer or PC originally called a _____ is a small computer designed to be used by one person at a time
microcomputer
The ____ boots the computer, launches application software, and ensures that all actions requested by a user are valid and processed in an orderly fashion
operating system
A ____ is a question, or, in database terms, a request for specific information from the database.
query
Bryan has just started an internship in which he uses a database frequently. The database contains information about the company's employees. Bryan's supervisor senses that he is anxious about using the database and drops by to give him a short tutorial. The supervisor explains that each employee's information forms a separate___
record
The most common type of database used with personal computers today is a____
relational database
The term _____ refers to the programs of instructions used to tell the computer hardware what to do
software
Related software programs (such as a group of graphics programs, utility programs, or office-related software) are sometimes sold bundled together as a___
software suite
____-consists of the operating system and utility programs that control your computer and allow you to use it
system software
The means by which an operating system or any other program interacts with the user is called the____
user interface
Word processing programs use a feature called___, which means the insertion point automatically moves to the beginning of the next line when the end of the screen line is reached.
word wrap