Intro To Computers

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

A designation of ______ means that a blank optical disc can be recorded only once.

-R

What is the latest version of Windows?

10

The iPad from Apple is the most popular tablet. It took the world by storm when it was introduced in ________.

2010

Which type of printer is most likely to be use by an engineer who needs to create a small, plastic model?

3D

___ printers are unique in that they can create a physical object made of various materials, such as a plastic toy.

3D

Newer operating systems are ___, which means they are more powerful and capable of supporting more than 4 GB of RAM.

64-bit

Copyright protection lasts for ____ years after the death of the author.

70

Which of the following is NOT one of the specifications of Wi-Fi technology?

802.11z

What is a computer?

A device that accepts input, processes data, and can output or store the result of its actions

What is a computer program?

A list of instructions that enable a computer to perform a specific task

What is short message service (SMS)?

A system that allows delivery of short, text-based messages between wireless devices such as cellular phones and pagers.

Many trace the Internet's history to ___, a network connecting computers at four universities in 1969.

ARPANET

The seeds of the Internet were planted in 1969 with ___, which connected computers at four universities in the western United States.

ARPANET

Which of the following is a document that contains an organization's policies for the ethical, secure, and appropriate use of computing resources?

Acceptable use policy

Which of the following is an e-book reader?

Amazon Kindle

Which of the following is NOT and example of solid state storage?

BD-XL

It is common to use _____ when sending email to a large group of people, especially if you want to protect the privacy of the recipients' email addresses.

Bcc

Why are many computers, especially ultraportable ones, using SSDs instead of traditional magnetic hard drives?

Because SSDs are faster and consume less power

Which of the following units is represented as an on (1) or off (0) value?

Bit

With capacities starting at 25 GB, the ___ is the optical media with the most storage.

Blue-ray disc

Which type of software aids architects, engineers, and many others who need to create a digital model of an object?

CAD

The primary difference between the various optical discs is the amount of data that they can store. Which optical disc stores the least amount of data?

CD

The ______ and memory determine the overall speed and performance of your computer.

CPU

The ______, or microprocessor, is the main processor of the computer.

CPU

Intel and AMD are two companies that produce ______.

CPUs

With the ___ operating system, you will be fully immersed in Google's ecosystem of apps and services.

Chrome

Alex has $500 and needs a new laptop computer for school. He'll be using the school's WiFi to access Google applications. What type of laptop should he buy?

Chromebook

What is the name of the legal concept that grants rights and control to the owner of any published work, such as books, songs, and photographs?

Copyright

One of the newest additions to the Windows operating system is ___, an intelligent assistant that offers users a variety of services.

Cortana

A popular type of network attack, known as a(n) ___ attack, allows hackers to shut down or block access to websites and other network resources by overwhelming them with requests.

DDos

___ refers to technology that protects copyrighted material, such as copy protection and authenticity checks.

DRM

_ printers are often used to create lab-quality photos, as well as the images found on plastic ID cards.

Dye-sub

Which type large-business software can handle tasks as diverse as manufacturing and quality control to accounting and human resources?

ERP

___ is a strand for LANs that uses a star topology with twisted-pair cables that plug into RJ45 port located on many devices?

Ethernet

The ____ of a website or forum contains common questions and their responses.

FAQ

"FinalEssay", "Birthday2014", and "Attachment_3" are all examples of file extensions.

False

A CPU's clock rate, or speed, is measured in MB or GB.

False

HTTP and HTTPS are the heart of Internet communication, setting rules for the transport and addressing of packets.

False

In order to gauge user interest and opinion, Twitter uses a "like" system while Facebook uses a star-rating system.

False

Keyboard covers for tablets generally plug into the headphone jack in order to communicate with the tablet.

False

Many flatbed scanners now include an expansion cartridge, which is a tray that allows you to scan several sheets of paper automatically.

False

Since the NTFS file system enjoys more widespread compatibility with other operating systems, it is often used on removable devices such SD cards and USB flash drives.

False

The HTTPS protocol in a URL indicates that the web page has been completed sent or loaded

False

The asterisk symbol (*) is often used to mark keywords or topics in a social post or tweet.

False

The speed at which data travels to and from an ISP is measured in bytes per minute (Bpm).

False

The system unit is another name for the CPU, or processor, of a personal computer.

False

Twitter restricts posts, or tweets, to a maximum of 180 characters.

False

Unfortunately, it is not possible to upgrade the amount of RAM on desktop and laptop computers.

False

When a folder is located inside another folder, it is referred to as a file.

False

When it comes to file transfers on the Internet, "downloading" means you are sending something while "uploading" means you are receiving something.

False

Which type of cable consists of a thin strand of glass that transmits pulsating beams of light rather than electric current?

Fiber-optic

Which of the following is an example of video editing software?

Final Cut Pro

The file management tool on a Mac is called:

Finder

A(n) __________ is a discussion board where individuals can ask questions and reply to each other.

Forum

Today's processors have reached the ___ mark, capable of processing billions of instructions per second.

GHz

A(n) _____ interface allows users to communicate with their computer via graphical elements on the screen.

GUI

Although ___ owns Android and manages the store for apps, it allows any manufacturer to use and modify this operating system for their devices.

Google

A(n) _______ connector carries both digital video and sound.

HDMI

Which of the following is a popular streaming service that specializes in TV shows, especially those that have been aired recently?

HULU

192.168.1.101 is an example of a(n)______

IP address

Which software title allows users to create works that require complex layouts, such as magazines and newspapers?

InDesign

___ printers create an image directly on the paper by spraying ink through tiny nozzles.

Inkjet

Unlike email, ______ is having a live, online, text-based conversation with one or more individuals.

Instant Messaging

Which of the following is NOT a speech recognition program/assistant?

Intel's Eris

________ technology changes the way LCD monitors are illuminated.

LED

Students often use a(n) ___, such as Blackboard, at school to complete exams, turn in work, and communicate with their instructor and classmates.

LMS

Which of the following is an open-source operating system that has distributions for both desktops and servers

Linux

A(n)__ uniquely identifies every network-connected device in the world.

MAC address

A(n)____ is a set of software tools that enables managers to gather, organize, and evaluate information.

MIS

In a category of games known as ___, millions of players connect to various servers to team up with other players in very large virtual worlds.

MMORPGs

A(n) ____ is a huge online course offered for free by a variety of universities, including prestigious ones such as Princeton, Harvard, and MIT

MOOC

three 3D modeling and animation software applications that artists and animators use to create 3D objects and animated characters

Maya, Blender, and 3ds max

Which of the following is NOT a type of memory card technology?

Mega SD

______ is a type of integrated development environment (IDE) that has tools and features that help programmers build software and apps.

Microsoft Visual Studio

two examples of operating system software

Microsoft office, MacOS, and windows

Two software applications that can help you keep up with your family's personal finances.

Mint and Intuit Quicken

Which of the following is NOT an example of an office suite?

MySQL

Because of a technology known as __________, many smartphones can now be tapped on special payment devices to complete a purchase at select stores.

NFC

Which of the following is a government agency that has the capability to monitor the Internet and mobile activities of individuals?

NSA

Which streaming service often accounts for over 30 percent of all Internet traffic in North America?

Netflix

Nathan uses Microsoft Word on his MacBook at work. He wants to work from home on his Windows-based Dell laptop. Can he install and run a copy of the Mac-based software on his PC at home?

No

Sara likes to use free Wi-Fi in public places like libraries and coffee shops. Is it okay if she does her online banking in a coffee shop?

No

____ technology can translate a scanned image into text that can be edited and formatted.

OCR

Which of the following is NOT a cloud storage service?

OnLive

Which software title would an employee most likely use to send email, manage contacts, create appointments and set up meetings?

Outlook

___ file sharing uses a distributed network of individual users instead of a central server to transfer files.

P2P

The speed of a printer is measure in:

PPM

Which of the following companies does NOT offer digital movie rentals?

Pandora

Which of the following is used by many online companies to describe what information is collected from users and what is done with that information?

Privacy Policy

Computers that communicate over a network must follow certain ___ to ensure that the transmission is sent properly and understood.

Protocols

Which type of software title would help a business manage all aspects of their company's finances?

QuickBooks

A ______ system writes data on two or more disks simultaneously, thereby creating a complete copy of all the information on multiple drives

RAID 1 and mirrored system

Which type of memory temporarily holds the programs and files that you are actively working on?

RAM

A(n) ______ scanner uses radio frequencies to read data stored in special tags.

RFID

Which type of memory contains device-specific information and handles a computer's basic functions when it is powered on?

ROM

Which of the following is NOT a popular programming language?

SDLC

Services such as ____ and Microsoft Teams include many real-time communication tools, along with a variety of apps and services, to make it easier for teams to wok on projects together.

Slack

The ______ sets rules for both the transport of data packets and the addressing system for a network such as the ARPANET?

TCP/IP

Many individuals are using _______ as DVRs to record television shows for future playback.

TV turners

Which type of malware disguises itself as an interesting, useful, or desirable program in order to gain access to your system?

Trojan horse

A computer's sound card is a circuit board that converts sound from analog to digital form, and vice versa, for recording or playback.

True

Add-on circuit boards that can improve the performance of a computer's video or sound are known as known as expansion cards.

True

After software is acquired, it must typically be installed before it can be used.

True

Apple's Siri and the Google app both employ speech recognition, allowing users to issue voice commands on their mobile devices.

True

Chromebooks have very little internal storage, relying mainly on cloud storage.

True

Medium to large businesses, or those with large data-storage needs, are more likely to use Microsoft SQL Server or Oracle as their DBMS.

True

The "sports" in the address sports.yahoo.com refers to the subdomain.

True

The Internet of Things (IoT) refers to everyday objects, such as lightbulbs and thermostats, that have the ability to connect to the Internet.

True

The purpose of an operating system is to manage the flow of data between hardware components and allow the user to communicate with the computer.

True

Tripadvisor.com is a travel-related website that allows individual travelers to rate their experiences with hotels and attractions.

True

Websites are typically located, or hosted, on servers known as web servers

True

Both YouTube and ___ have allowed many individuals to earn significant amounts of money from their videos and streams.

Twitch

A(n)___ contains a rechargeable battery, allowing it to run a computer system for a given amount of time if the power fail.

UPS

The _____ port is used to connect almost all of today's external devices

USB

What type of computers are thin, lightweight laptops that possess strong processing power?

Ultraportable computers

A popular way for both individuals and businesses to increase the security of a network connection (via tunneling) is by using a(n):

VPN

which can connect to the telephone network, translates analog voice signals into digital data and uses the Internet to transport the data

VoIP

Which license allows companies to install software on multiple machines?

Volume

A(n)___ is the connection of two or more central computers or local area networks, generally across a wide of geographical area.

WAN

__ requires a password when connecting to your router and makes your wireless transmissions unreadable by hackers.

WPA2 encryption

Which of the following displays a form of AI with its astounding capability to understand complex questions and quickly finding answers using large databases of info?

Watson

refers to a new way to use the World Wide Web, whereby any user can create and share content, as well as provide opinions on existing content.

Web 2.0

There are three general strategies used to authenticate individuals. What are they?

What you know, What you have, Who you are

the website where you can upload videos

YouTube

When it comes to social video, no service is as large or popular as:

Youtube

What is a smartphone?

a combination mobile phone and handheld computer

Bringing your thumb and index together in a pinching motion (for zooming in and out) is an example of:

a gesture

What is a tablet computer/ tablet?

a mobile device that typically ranges from 7-10 inches in size

What is a network server?

a powerful computer with special software and equipment that enables it to function as the primary computer in a network

What is social media?

a variety of websites and services that allow individuals to share photos, news, and thoughts on just about anything

Which of the following Wi-Fi standards is the fastest?

ac

All nodes connect to a wireless ___ in order to communicate wirelessly.

access point

A(n)___ is a series of steps that describes what each portion of a computer program is supposed to do.

algorithm

What is real-time information?

any information that is delivered to you immediately after it is created

____software, which is made for the user, allows individuals to complete a variety of work and school-related tasks.

application

The ratio of monitor's width to its height is known as the:

aspect ratio

Most Creative Commons licenses require, at a minimum, that the user provide attribution to the author wherever the work is used.

attribution

Using robotic arms (instead of people) during certain phases of car manufacturing is referred to as:

automation

Making copies of important files to the cloud or to an external storage device is known as:

backing up

Typically measured in Mbps or Gbps, ___ is the amount of data that can be transmitted over a given amount of time.

bandwidth

It is common to use a(n) ___________ when sending an email to a large group of people, especially if you want to protect the privacy of the recipient's email address.

bcc

Software companies will often release a(n) ___ version to a limited audience that will test it on their systems. Programmers can then collect information from these users about any errors that were encountered.

beta

Which term refers to the large volumes of date that are constantly being generated by our devices and digital transactions?

big data

A(n)______ input device authenticates you based on patterns or characteristics found in the human body.

biometric

People use various ______ devices such as facial recognition and fingerprint scanners to access devices such as smartphones.

biometric

Adobe Photoshop excels in editing _____ graphics such as JPGs.

bitmap

Many network servers come in the form of thin units known as __________ servers, which can slide in and out of a rack that holds many of its companion servers.

blade

A(n) __________ is a web page or small website that contains a series of chronological posts and comments.

blog

Which of the following refers to large networks of compromised computers that can be used by a hacker to spread malware, send spam, and conduct carefully orchestrated network attacks?

botnets

The term __________ is used to describe any digital data connection that can transmit information faster than standard dial-up by using a wider band of frequencies.

broadband

A(n)___ is an error in a computer program.

bug

Most computers provide a sound subsystem directly on the motherboard and do not require a separate sound _____ for audio output.

card

The ___ is a temporary location for things that are being moved or copied.

clipboard

the safest place to back up your data

cloud back-up provider

What are the fastest-growing areas on the internet?

cloud computing and social media

When using __________, your files can be stored online and accessed from any Internet-connected device.

cloud storage

What is the function of a wireless network?

communication that uses radio waves

Many users choose to ___ several files into one ZIP file for the sake of easy transport, especially when attaching them to an email message.

compress

___ utilities use a variety of techniques that can "squeeze" one or more files into a smaller file, such as a ZIP.

compression

What are multi-server computers?

computers that manage a variety of services for businesses and organizations

The ___ of a monitor measures how close the monitor can get to the brightest white and the darkest black.

contrast ratio

Home automation allows people to use a mobile device to ______.

control temp, turn lights on and off, activate locked doors

A___ is any step you take to ward off a threat.

countermeasure

The ______ appears on the screen as a blinking vertical line, a small box, or some other symbol to show your place in a document or command line.

cursor

The___ command removes the selected object (or objects) from their current location and places them into the clipboard.

cut

____ consist of individual facts or pieces of information.

data

___ is when a hacker targets the database of large online business to steal user account data and credit card information.

data theft

In order to keep a database free of errors, online forms usually have built-in ______ so that users don't enter erroneous or duplicate data.

data validation

If your magnetic hard drive seems to be running slower than usual, you can speed it up by reorganizing and optimizing its files with a disk ______ utility.

defragmentation

What type of computers are usually used on a desk or flat surface?

desktops

Which of the following terms refers to the technology gap between different social and economic classes?

digital divide

In some operating systems, folders may be referred to as:

directories

Which type of printer is most likely to be used by a business that uses carbon-copy forms?

dot matrix

Which of the following mouse operations is typically used to move objects around your screen?

dragging

___ can clog cooling systems such as fans, which in turn may cause hardware to overheat.

dust

A(n) _____ utility can scramble your data or storage devices to make them unreadable by anyone who doesn't have the proper key.

encryption

Which keyboards are designed to be comfortable and tailored for the human body?

ergonomic

____ is the philosophical study of morality. It is a rational analysis of the voluntary, moral choices that individuals make.

ethics

A(n)___ system is a type of information system that performs analytical tasks traditionally done by a human, typically by using information contained in knowledge base.

expert

What is the name given to the limited set of circumstances where others use portions of copyrights material without first obtaining permission?

fair use

Mission-critical hardware and software systems use ______ computers so they continue their operations even when problems are present.

fault-tolerant

Systems known as ___ are able to continue their operation even when problems are present.

fault-tolerant

A(n)___ is a short, unique sequence of characters located after the file's name that indicated the file type.

file extension

FAT and NTFS are two popular types of:

file systems

Many thieves use the temptation of free (illegal) software to lure individuals into downloading malware on file-sharing services.

file-sharing

Most desktop operating systems include a(n) ___ utility that is dedicated to examining and blocking Internet traffic.

firewall

Preparing a storage device for use by an operating system is known as:

formatting

Which of the following is NOT one of the four colors used in the ink nozzles of inkjet printers?

green

Although it is best to avoid any distractions when driving, __________ technology will at least let you keep your eyes on the road.

hands-free

The most common device using ______ technology is the smartphone, which can buzz for incoming calls or be triggered by a specific action with an app

haptic

______ technology produces output in the form of vibration, motion, or physical resistance.

haptic

The ___ is the primary storage device of a personal computer.

hard drive

The magnetic ___ often serves as the primary storage device of a personal computer.

hard drive

___ robots are those that are created to imitate the appearance or capabilities of humans.

humanoid

Which of the following is NOT a "music locker"?

iHeartradio

Apple's mobile devices are powered by the ___ operating system.

iOS

Which of the following operating systems is NOT likely to be running on a server?

iOS

What is data?

individual facts or pieces of information

The __________ is the largest network in the world.

internet

Some organizations offer an internal version of the Internet, called a(n):

intranet

What is a computer network?

it is what allows multiple employees to access information about customers or products from a central computer

Which of the following units is the smallest?

kilobyte

What type of computers are portable and contain all the components of a desktop computer in a single, integrated unit?

laptops

________ allow various apps to recommend nearby restaurants or let you check-in at the establishment where you are currently located.

location-based services

Employers can check _____ periodically to determine whether there was inappropriate computer use by an employee.

logs

Which of the following is NOT of the advantages of owning a Mac listed by the author?

low cost

players refer to applications that allow you to listen to music and play videos.

media

Higher ___ cameras can capture more detail, but they will produce a larger image file on your storage media.

megapixel

Many apps encourage users to make small, yet frequent purchases of in-game (or virtual) cash via a process known as a(n):

microtransaction

Data ___ is the discovery of new patterns or relationships between data.

mining

Search ___, such as quotes and the minus sign, can narrow down the results provided by search engines.

modifiers

As the largest circuit board in a personal computer, the ___ contains a variety of slots, connectors, and plugs for hooking up all the other parts of a computer.

motherboard

The optical ___ is the most common pointing device for desktop computers.

mouse

The creation or manipulation of matter at the smallest possible scale is known as:

nanotechnology

Many organizations will purchase just one or two printers because they know that any user on the _______ will be able to print to them

network

____ allows users to communicate and share information between computers.

network

Social ___ sites are used to create connections between friends, family members, and organizations.

networking

An approach to AI that allows a machine to learn a new skill via the repeated analysis of large quantities of data is known as:

neural network

Networks use media to carry data from one ___, or connection point, to another.

node

What is software?

one or more of computer programs that are packaged together for a unified purpose

Today, our____ behavior can either impact or be visible to thousands (or even millions) of individuals and businesses around the globe.

online

One of the most famous licenses is the GNU General Public License (GPL), which ensures that a particular program and any of its derivatives remain free to distribute.

open source

The purpose of a(n) ____ is to manage the flow of data between hardware components that and allow the user to communicate with the computer.

operating system

When companies engage in ____ they are essentially transferring some aspects of their business to a third party.

outsourcing

____ are piece of a message broke down into small units by the sending device and reassemble by the receiving device?

packets

What is the World Wide Web (WWW)?

pages that contain a seemingly unlimited variety of information

BitTorrent uses a ______ design that makes large numbers of user connections and requests small pieces of the desired file from each of them.

peer-to-peer (P2P)

What type of computers are used by only one person at a time?

personal computers

A large smartphone that is almost the size of a tablet is called a

phablet

Which strategy involves luring individuals into entering personal information into a website that is controlled by a hacker?

phishing

Acquiring or exchanging copies of protected digital creations without payment to or permission from their creator is known as:

piracy

Turning in the work of another as if it were your own or failing to cite the source of your work in known as

plagiarism

A browser ___ is a separate program that allows your web browser to play several types pf multimedia content

plug-in

Which type of software enables users to create electronic slideshows that contain a combination of text, images, charts, videos, and other elements?

presentation

Which of the following will delete your history, cache, and cookies the moment you close the special window?

private browsing

What is output?

refers to the processed results that a computer sends out to you.

What is input?

refers to user entries or activities that tell the computer what to do.

A______ prevents attenuation when packets are traveling long distances.

repeater

Users with broadband connections are typically equipped with a(n) ___ that connects their home's network to the Internet.

residential gateway

A modern monitor might have a(n) ______ of 1920x1080 pixels.

resolution

Hackers often set up their own wireless access points in popular areas with the hope that users connect to them. These are known as:

rogue hotspots

The wireless access points that are used in homes contain integrated____, as do the devices that ISPs typically provide for internet activity.

routers

_____ systems can be incrementally expanded to provide increasing amounts of computing power, storage, and/or software when the need arises.

scalable

The scam referred to as___ typically comes in form of an alert message that claims to be from the FBI or your security software.

scareware

The ___ economy is an expression that refers to the way in which the Internet has facilitated our ability to share (usually for a price) our goods or services with other individuals.

sharing

The ____ mode on a computer will place it in a low-power state when it is not being used.

sleep

____ is a form of hacking that focuses on deceiving individuals into giving away their information that the thief needs.

social engineering

Another popular use of the Internet is ______, which allows messages to be sent to electronic mailboxes in an instant.

social media and email

______sites, such as Reddit, encourage users to share links to news and other interesting content they find on the web.

social news

The tiny memory cards used by digital cameras and mobile devices are an example of ___ storage.

solid state

What is cloud computing?

something that allows you to store your files and use various applications in an online account

Also known as "junk" mail, ______ is unsolicited email that is sent to a bulk folder.

spam

What is Near Field Communication (NFC)?

special payment devices to complete your purchase at select stores

Which type of software is used for entering, calculating, and analyzing sets of numbers?

spreadsheet

Which type of malware is designed to report activity on your computer to another party?

spyware

The __________ topology, where nodes connect to a hub, is the most common type used today.

star

Malware attempts to ______.

steal info, harm data flow through network, take control of computer, and destroy data

What is the name of the pen-like tool that allows you to tap or write notes on many touchscreen interfaces?

stylus

What are the largest and most powerful computers in the world?

supercomputers

Which types of computers are ideal for handling highly complex problems that require extreme calculating power?

supercomputers

Though macOS and Windows share similar features and functions, Mac users cite five key advantages of owning these types of computers

support, unified ecosystem, included software, stability and fewer viruses

Which device can guard connected equipment against large power spikes or surges that may infrequently occur?

surge protector

A __________ is similar to a hub, but it is aware of the exact address or identity of all the nodes attached to it.

switch

Which network device provides multiples ports for connecting nodes and is aware of the exact address of identity of all the nodes attached to it?

switch

Which category of software is created for the operation, maintenance, and security of the computer?

system

The main component of a desktop computer is the _________, which is the case that houses the computer's critical parts, such as the processing and storage.

system unit

All newer web browsers use a(n) ___ browsing interface, which allows you to have multiple web pages open in one browser window.

tabbed

____ are often used to back up or archive large quantities of information.

tape drives

The term _____ describes a wide variety of remote work practices, from working at home occasionally to living in a different country than the company.

telecommuting

What is storage?

the ability of a computer to hold or remember the information it processes

What is processing?

the ability of a computer to perform actions based on instructions from the user or a program

What is the largest network in the world?

the internet

Suppose that a laptop identifies its processor as follows: AMD's A8-4500M. What does the AMD represent?

the manufacturer

What is hardware?

the physical parts of a computer

What is cloud collaboration?

tools that allow people to view, edit, and share documents

The___ of a network is the logical layout of the cables and devices that connect the nodes of the network.

topology

Which rectangular, stationary pointing surface is found on almost all laptop computers?

touchpad

Which of the following is NOT one of the ways freeware developers can make money off their creation?

trial period

One popular test of a machine's ability to think is known as the ___ test.

turing

____ is a feature that requires two forms of identification, such as a password and possession of your phone, to log into an account.

two-factor authentication

What is remote wipe?

utilities allow users to erase their mobile device if it is lost or stolen

Programs that are based on ___ graphics rely on mathematics to generate and manipulate a variety of shapes.

vector

Individuals who require better speed and performance for graphics-intensive applications (e.g., video editing, gaming, etc.) prefer the faster processors and built-in memory included with ___.

video cards

You should run a(n)___ if you want to run one operating system on top of another operating system.

virtual machine

Which type of software allows humans to experience realistic environments that are simulated by computers?

virtual reality

Which type of malware is attached to a host file and has the ability to replicate, or copy, itself?

virus

With millions of computer infections and intrusions yearly, home users and businesses can no longer afford to be without ______ and malware protection.

virus

Yahoo and MSN are both examples of:

web portals

What is augmented reality?

where real world is supplemented with computer-generated information

The act of alerting the public about harmful activities that are being hidden by an organization is called:

whistleblowing

___ provide automatically updating information without the need to open an app.

widgets

A(n) __________ is a collaborative information site that relies on the Internet community to both create and edit content.

wiki

Which type of software provides tools for creating and editing all kinds of text-based documents?

word processing

Which type of malware consists of a fully-contained program that self-replicates and spreads through computers and networks?

worm

Someone who possesses _________ has a broad understanding of computer technology and is able to use it well.

digital literacy

Which of the following is NOT a high-speed Internet connection for homes?

4G

Colossus was the first programmable electronic ______ used by the British during World War II to help crack coded messages.

Computers

What are mainframe computers?

Massive, room-sized computers that process and store enormous amounts of bulk data and information

When a single network server can't handle all the data processing requests, more servers can be added and joined together to create a ______.

cluster and server farms

What type of computers are lightweight laptop computers that allow users to swivel or detach the touchscreen monitor? (HINT: A.K.A 2-in-1)

convertible laptops

Which of the following connection types is generally the SLOWEST?

dial-up

You can see the name and URL of every site you have visited by looking at your browser's ______.

history

Which of the following networks, which began with just four universities, is the earliest ancestor of the Internet?

ARPANET

Computers now help a wide range of office workers complete their tasks more quickly and efficiently. For example, ______ use sophisticated software to track income and expenses for the company

Accountants

What are two examples of ultraportable computers?

Apple's Macbook Air and Microsoft Surface Pro

When sending email to a large number of individuals, placing their addresses in the __________ field will prevent all those addresses from being seen by the recipients.

Bcc

The app known as Spotify is used by small businesses to accept mobile payments.

False

The physical devices that make up a computer system are known as software.

False - hardware

If you do not have a smart TV, a streaming player can bring a variety of online services to your TV.

True

___ translates analog voice signals into digital data and uses the internet to transport the data

VoIP

The __________ is a global system of linked, hypertext documents.

WWW

What is bluetooth?

a standard for the short-range wireless interconnection of mobile phones, computers, and other electronic devices.

What is a blade server?

a thin unit which can slide in and out of an enclosure that holds many of its companion servers

What type of computers have all of the hardware integrated with the monitor?

all-in-one

What is the function of a network?

allows users to communicate and share information between computers

Which part of the URL uniquely identifies a site and a brand on the web?

domain name

Compared to tablet computers, ______ are lighter, more affordable, and enjoy a longer battery life. People use them mainly to read books because their screens can be read in bright, outdoor conditions.

ebooks

What is crowdsourcing?

gathering of information from a large group of people

What are chromebooks?

lightweight laptops that run Google Chrome's operating systems

What are mobile devices?

lightweight, handheld computers that offer a variety of software and communication services for mobile users

________ computers are very large and powerful systems used in organizations where a heavy amount of processing and user requests need to be handled.

mainframe

Who created phablets?

Android

To access the Internet from home you must connect to a(n) __________, which typically involves making monthly payments to a telecommunications company.

ISP

_______ computers are personal computers that have all of the hardware integrated with the monitor.

all-in-one

What is Multimedia Messaging Services (MMS)?

lets you attach a variety of media such as photos and short videos


Ensembles d'études connexes

Nutrition (BIO-135-002), study guide questions, Exam 1, modules 1&2

View Set