REVIEW FOR CIC 1101
Columns and rows in a spreadsheet collectively are called a(n) ______. a. worksheet b. data table c. calculation area d. numerical document
A
The ______ network became functional in 1969, linking scientific and academic researchers across the United States. a. ARPANET b. AMERINET c. INTRANET d. NETAMERICA
A
Under what category of programs and apps do databases and enterprise computing fall? a. productivity b. security c. file, disk, and system management d. communications
A
What is a person called who can accomplish many types of daily tasks using technology? a. Tech savvy b. Internet wizard c. Computer savant d. App efficient
A
You are going to form a partnership with an organization that sells domain names. What kind of organization is your partner? a. registrar b. domain vendor c. cybersquatter d. ICANN vendor
A
You realize your computer has been infected with malware. The program has been copying itself repeatedly, using up resources. What type of malware might you have? a. worm b. rootkit c. trojan horse d. virus
A
You are viewing a 3D graphic of a human body that you can use to visualize various muscles and organs by zooming in and out. What type of app are you likely using? a. media player b. augmented reality c. video d. CBT
B
A common way to display a shortcut menu using a mouse is to ______. a. point b. drag c. right-click d. double-click
C
A virus ______ is a known specific pattern of virus code that antivirus programs use to identify viruses. a. designation b. fingerprint c. signature d. impression
C
A web ______ is a computer that delivers requested webpages to your computer or mobile device. a. host b. storage device c. server d. terminal
C
Activity trackers and smartwatches are two types of ______ devices. a. GPS b. plug-and-play c. wearable d. streaming media
C
Under what category of programs and apps do screen savers and backup programs fall? a. productivity b. security c. file, disk, and system management d. personal interest
C
Which of the following is NOT true about PCs? a. PC stands for personal computer. b. PC sometimes is used to describe a computer that runs a Windows operating system. c. Acer, Dell, and HP are examples of companies that sell computers that use the Mac operating system. d. A PC is intended to be used by one person at a time.
C
Which of the following is NOT true about public Wi-Fi hot spot safety? a. Avoid accessing financial information. b. Sign out of websites. c. Always keep your wireless connection on. d. Do not leave your computer unattended.
C
Which of the following server types is housed in a slot on a metal frame? a. blade b. tower c. rack d. dedicated
C
A result from a search engine search is called a(n) ______. a. tag b. pick c. smack d. hit
D
A(n) ______ is a sequence of numbers that uniquely identifies the location of each computer or device connected to the Internet or any other network. a. URL b. top-level domain c. fixed location d. IP address
D
A(n) ______ is a thin, lighter-weight mobile computer that has a touch screen. a. notebook b. PC c. desktop d. tablet
D
Gennie wants to zoom in. Mia tells her she should ______. a. Press and hold b. Drag or slide c. Swipe d. Stretch
D
Passcode is another term for a(n) ______. a. user name b. encryption algorithm c. passphrase d. PIN
D
Keyboards for mobile devices contain the same number of keys as desktop keyboards. T OR F
F
Mobile computers and devices typically have a separate physical display device. T OR F
F
Storage consists of electronic components that store instructions and data waiting to be executed.
F
Uploading is the process of transferring existing content stored on a server or other computer or device to your device via a network.
F
Without a built-in card slot, you cannot transfer stored items from a memory card to a computer or printer.
F
Word processing, presentation, and personal finance are types of personal interest applications.
F
A computer accepts data, called output. a. True b. False
FALSE
With an all-in-one computer the display device is separate from the tower. a. True b. False
FALSE
A study concluded that drivers using hands-free technologies are distracted, miss visual clues, and have slower reaction times. T OR F
TRUE
A content aggregation website allows users to collect and compile content from a variety of websites about a particular topic or theme. a. True b. False
True
A shopping cart allows a customer to collect items to purchase on an e-retail website. a. True b. False
True
Catfishing is when someone creates a fake online social network or online dating profile and forms relationships with unsuspecting users. a. True b. False
True
Using a subject directory, you locate a particular topic by clicking links through different levels. a. True b. False
True
. A(n) ______ tablet has a screen in its lid and a keyboard in its base, with the lid and base connected by a swivel-type hinge. a. convertible b. detachable c. slate d. ultrathin
A
A(n) ______ combines video instruction and interaction with an instructor and students in an online classroom. a. MOOC b. CBT c. virtual course d. webclass
A
A(n) ______ is a handheld vertical lever, mounted to a base, that you move to control the actions in a game. a. joystick b. gamepad c. drive shaft d. control wand
A
A(n) ______ is a program that extends the capability of a browser. a. plug-in b. aggregator c. magnifier d. power-up
A
A(n) ______ is a request for specific data from a database. a. query b. retrieval c. filter d. function
A
A(n) ______ is a type of collaborative website that allows users to create, add, modify, or delete website content. a. wiki b. portal c. bookmarking site d. macroblog
A
A(n) ______ is an output device that visually conveys text, graphics, and video information. a. display b. printer c. scanner d. webcam
A
A(n) ______ is the destructive event or prank the virus delivers. a. payload b. bomb c. explosion d. fireball
A
A(n) ______ network is a system that attempts to imitate the behavior of the human brain. a. neural b. intelligent c. cerebral d. advanced
A
An iris recognition system uses technology to read patterns in the user's ______. a. eye b. fingerprints c. signature d. face
A
An organization creates a disaster recovery plan. Which part would include return procedures (who can enter the facility, and what actions they are to perform)? a. emergency plan b. recovery plan c. restoration plan d. building plan
A
An organization to which you belong is joining the W3C. What is the mission of the work you will undertake as a member? a. To ensure the continued growth of the web b. To promote Internet2 ventures c. To devise technology for connecting to the Internet d. To expand mobile broadband access
A
Data that a computer accepts and processes is called ______. a. input b. digital facts c. information d. bytes
A
Font size is gauged by a measurement system called ______. a. points b. pixels c. em units d. kerning
A
In Internet terminology, what is the term, google.com, called? a. domain name b. Internet service provider c. webpage protocol d. TLD
A
PIN stands for personal identification ______. a. number b. name c. network d. note
A
Power users may work with a high-end desktop, sometimes called a(n) ______, designed to handle intense calculations and sophisticated graphics. a. workstation b. ultrabook c. supercomputer d. magnapower
A
Sales, marketing, and manufacturing are all types of software typically used by a(n) ______. a. enterprise b. small business c. individual d. power user
A
Search tools typically use a(n) ______, which stores a variety of information about a file. a. index b. signature c. directory d. header
A
Several words separated by spaces used in place of a password are called what? a. passphrases b. user names c. logical keys d. symbol generators
A
What is the purpose of a TLD? a. To identify the type of organization associated with the domain b. To monitor Internet traffic to ensure high speed performance c. To approve and control the assignment of domain names d. To provide Internet access to rural areas
A
What part of http://www.nps.gov/history/preserve-places.html is the protocol? a. http:// b. www.nps.gov c. history d. preserve-places.html
A
What part of the body does CVS impact? a. eyes b. ears c. arms d. wrists
A
What should an AUP specify? a. The acceptable use of technology by employees for personal reasons. b. The guidelines for using licensed software. c. A list of IP addresses known to be safe. d. A user's personal authentication methods.
A
Which manufacturer uses the term AirPods to refer to headphones that fit in your ear and connect wirelessly to devices? a. Apple b. Samsung c. Nokia d. Blackberry
A
Which of the following adds interactivity to webpages? a. JavaScript b. HTML c. CSS d. RWD
A
Which of the following best describes a rootkit? a. A destructive program disguised as a real program, such as a screensaver. b. A virus that changes its code as it delivers the infection. c. Replicates itself over a network to infect computers and devices. d. A program that easily can hide and allow someone to take full control of your computer from a remote location.
A
Which of the following best describes an app? a. A program that makes users more productive. b. A series of related instructions. c. Coordinates activities among computer or mobile device hardware. d. Enables you to manage devices and media.
A
Which of the following best describes disk defragmentation? a. Reorganizing the hard disk so that files are stored in contiguous sectors. b. Removing unnecessary files. c. Compressing backup and other files to increase disk storage. d. Installing partitions on the hard disk in order to run separate operating systems on the same computer.
A
Which of the following best describes open source software? a. Provided for use, modification, and redistribution. b. Distributed at no cost for a trial period. c. Copyrighted software provided at no cost. d. Donated for public use and has no copyright restrictions.
A
Which of the following best describes the purpose of an ISP? a. To provide access to the Internet for free or for a fee b. To register domain names for websites c. To monitor Internet activity for fraud or illegal activity d. To create guidelines for web design
A
Which of the following is NOT true about databases? a. Each column contains data about a given item in the database, such as a person or product. b. Much of the information you access on the web is stored in databases. c. A database consists of a collection of tables. d. You can create forms and reports using data in a database.
A
Which of the following is recommended to avoid malware infections? a. Some software touted as offering malware protection actually installs more malware. b. Flash memory storage from a friend should be safe to use without scanning. c. Malware authors typically avoid social media. d. If a pop-up window warns you that your computer is infected with a virus, follow its instructions.
A
Which of the following server types is in the form of a single circuit board? a. blade b. tower c. rack d. dedicated
A
You are in charge of an event at work. You want to plan and schedule events and resources. What type of software should you use? a. project management b. calendar c. database d. software suite
A
______ blindness occurs when a person's attention is diverted while performing a natural activity, such as walking. a. Inattentional b. Accidental c. Virtual d. Occupational
A
______ computing refers to an environment that provides resources and services accessed via the Internet. a. Cloud b. Virtual c. Intranet d. Global
A
A common way to move an object from one location to another using a mouse is to ______. a. point b. drag c. right-click d. double-click
B
A mouse is an example of a(n) ______ device. a. output b. pointing c. processing d. display
B
A(n) ______ disk is a storage device that contains one or more inflexible, circular platters that use magnetic particles to store data, instructions, and information. a. solid-state b. hard c. flash d. optical
B
A(n) ______ is an abusive or insulting message in online communication. a. troll b. flame c. bomb d. grenade
B
A(n) ______ is software that finds websites, webpages, images, videos, and other information related to a specific topic. a. browser b. search engine c. web server d. cloud app
B
A(n) ______ site, such as Pinterest, is a website that enables members to organize, tag, and share links to media and other online content. a. portal b. bookmarking c. favorites d. personal
B
A(n) ______ system is a set of programs that coordinates all the activities among computer or mobile device hardware. a. management b. operating c. network d. application
B
Adjusting the ______ adjusts the difference in appearance between light and dark areas of the photo. a. brightness b. contrast c. sharpness d. compression
B
DSL and FTTP are examples of wired ______ Internet service technologies. a. fidelity b. broadband c. analog d. satellite
B
Digital ______ includes music, photos, and videos. a. animation b. media c. multiplex d. playables
B
Fitness games often communicate with a(n) ______ board, which is shaped like a weight scale and contains sensors. a. activity b. balance c. motion d. step
B
Gennie wants to move an item around on the screen. Mia tells her she should ______. a. Press and hold b. Drag or slide c. Swipe d. Stretch
B
If the web address of a website begins with https instead of http, what do you know about the website? a. It likely is spoofed. b. It is secure. c. It provides security services and information. d. It contains encrypted data.
B
If you are viewing a webpage with customized or regenerated content, such as updated stock quotes, what type of webpage are you viewing? a. static b. dynamic c. transformative d. animated
B
In M2M communication, such as with the Internet of Things trend, the M stands for ______. a. mobile b. machine c. manufacturer d. media
B
Linux is an example of a(n) ______. a. backup utility b. operating system c. lifestyle app d. security software
B
Some smartphones support a(n) ______ keyboard app, on which users enter words by tracing a path on an on-screen keyboard. a. touch b. swipe c. finger d. virtual
B
To what does the term, traffic, refer to when used in conjunction with the Internet? a. The number of computers on the Internet b. The communications activity on the Internet c. All the wired, wireless, and satellite connections on the Internet d. The wires, fiber optics, underground cables, and radio signals used to carry the data and information across the Internet
B
What is described as having a current knowledge of computers, mobile devices, the web, and related technologies? a. Tech knowledge b. Digital literacy c. Computer certification d. Webmaster
B
What part of http://www.nps.gov/history/preserve-places.html is the host name? a. http:// b. www.nps.gov c. history d. preserve-places.html
B
When purchasing a mobile computer, you should determine the form factor that meets your needs. What is a form factor? a. The speed at which data is processed. b. The type of device, such as a tablet or ultrathin laptop. c. The size of the screen. d. The ergonomic aspects of the computer.
B
Which of the following is NOT a recommended practice for gaming safety? a. Avoid games requiring passwords to be saved to an online account on a smartphone. b. Look for games that use ActiveX or JavaScript, as these are always safe. c. Check the developer of any software or apps to be certain it is legitimate. d. Use a firewall when using multiplayer online games.
B
Which of the following is NOT true about CAPTCHAs? a. A CAPTCHA is an image containing a series of distorted characters. b. CAPTCHAs were developed to verify input is coming from computer programs, not humans. c. The CAPTCHA text can be read aloud for visually impaired users. d. You have the option of generating a new CAPTCHA.
B
Which of the following is NOT true about PDFs? a. Adobe Reader is downloadable for free. b. To read a PDF, you need the software that created the original document. c. PDF is an image file format. d. Productivity applications often integrate the ability to save a project as a PDF.
B
Which of the following is NOT true about digital cameras? a. Many digital cameras have built-in GPS. b. To record video, you must purchase a separate digital video camera. c. Digital cameras typically allow you to review, and sometimes modify, images while they are on the camera. d. A smart digital camera can communicate wirelessly with other devices.
B
Which of the following is NOT true about presentation software? a. Presentations are visual aids to communicate information to a group. b. Presentations are viewed as clip shows. c. Presentation software typically provides a variety of layouts for each slide. d. When building a presentation, users can set the timing and add special effects.
B
Which of the following is NOT true about servers? a. In many cases, a server accesses data, information, and programs on another server. b. Dedicated servers typically do not require a fast processor, and use little memory. c. Services provided by servers include storing content and controlling access to network resources. d. Form factors for servers include rack, blade, and tower.
B
Which of the following is NOT true about software suites? a. The applications in the suite normally use a consistent interface and share features. b. A software suite typically costs more than purchasing each application individually. c. You can share information among applications. d. Some suites are available as web apps. ANSWER: b
B
Which of the following is NOT true about two-step verification? a. Another term for it is two-factor verification. b. When a system sends an authentication code, it typically does not expire. c. If you sign in from a device you use frequently, you can elect to bypass two-step verification. d. ATMs usually require a two-step verification.
B
Which of the following specifies the headings, paragraphs, images, links, and other content elements of webpages? a. JavaScript b. HTML c. CSS d. RWD
B
With ______ voice mail, users can view message details, and in some cases read message contents without listening to them. a. interpreted b. visual c. text d. virtual
B
You realize your computer has been infected with malware. It seems as if someone is controlling your computer from a remote location. What type of malware might you have? a. worm b. rootkit c. trojan horse d. virus
B
You use a POS terminal at work. Which of the following is the type of business at which you likely work? a. financial b. retail c. research laboratory d. library
B
You want to remove red-eye from photos you took with your digital camera. You should use photo ______ software. a. management b. editing c. illustration d. image
B
______ is a measure of the capability of a network to send and receive data. a. Broadband b. Bandwidth c. Streaming d. Net worth
B
A(n) ______ consists of programs designed to make users more productive and/or assist them with personal tasks. a. operating system b. server c. application d. system software
C
Adjusting the ______ increases or decreases the crispness of objects in the photo. a. brightness b. contrast c. sharpness d. compression
C
Badges, cards, smart cards, and keys are examples of _____ objects. a. wearable b. carried c. possessed d. pocket
C
Compressed files sometimes are called ______ files. a. packed b. abridged c. zipped d. concentrated
C
During which phase of web publishing would you use a text editor to enter codes that instruct the browser how to display webpage content? a. Plan b. Design c. Create d. Host
C
If you use an asterisk (*) in a search engine query, what are you trying to do? a. Combine search results. b. Exclude a word from search results. c. Substitute characters. d. Search for an exact phrase.
C
In the educational practice of BYOD, what does D stand for? a. disc b. drive c. device d. data
C
Lighting, HDMI, and Thunderbolt are all types of ______. a. networks b. ISP c. ports d. gaming consoles
C
Some smartphones use ______ text, where you press one key on the keyboard or keypad for each letter in a word, and software on the phone suggests words you may want. a. suggestive b. interpretive c. predictive d. presumptive
C
The actual photographed resolution is known as the ______ resolution. a. native b. original c. optical d. raw
C
The keyboard shortcut for pasting text is CTRL+______ or COMMAND+______. a. P b. X c. V d. C
C
The major carriers of network traffic are known collectively as the Internet ______. a. bandwidth b. highway c. backbone d. conductors
C
Which of the following allows users to have multiple home pages that automatically open when the browser starts? a. linked browsing b. bookmarks and favorites c. tabbed browsing d. hypertext
C
Which of the following are two main components on the motherboard? a. memory and storage b. interpreter and compiler c. processor and memory d. compiler and processor
C
Which of the following best describes B2C e-commerce? a. Consumers selling to each other, such as an online auction b. Businesses selling to each other, such as technical support or training c. The sale of goods and services to the general public d. Commerce restricted to the sale of financial goods and services
C
Which of the following communication application types requires real-time interaction? a. blog b. mobile messaging c. chat d. email
C
Which of the following graphic formats should you use for comic-style drawings? a. BMP b. JPEG c. PNG d. TIFF
C
Which of the following is NOT a basic function of a computer? a. Accept data b. Process data c. Produce input d. Store information
C
Which of the following is NOT a recommended safe browsing technique? a. Turn off location sharing. b. Enable a pop-up blocker. c. Keep your browsing history in your cache. d. Never store passwords.
C
Which of the following is NOT an example of an operating system? a. macOS b. Android c. Office d. Windows
C
Which of the following would not fit on a desk or your hand? a. PC b. mobile computer c. supercomputer d. game console
C
Which virus type targets a computer's start-up files? a. macro b. stealth c. boot sector d. kickstarter
C
You want to ensure your wireless network is secure. Which of the following should you NOT do? a. Retain the default administrative password. b. Choose a secure location for your wireless router. c. Broadcast the SSID. d. Enable an encryption method such as WPA2.
C
______ software is an application that enables users to enter typed text or handwritten comments on a page. a. Memo writer b. Word processing c. Note taking d. Text editor
C
. A(n) ______ screen restricts access to a computer or mobile device until a user performs a certain action. a. control b. firewall c. check d. lock
D
A collection of related instructions organized for a common purpose is referred to as ______. a. hardware b. scripts c. data d. software
D
A host in a network performs which of the following tasks? a. Ensures satellite communications are functional b. Exclusively monitors wireless networks to search for data transmission errors c. Routes transmissions over a network to guarantee data reaches its intended destination d. Provides services and connections to other computers on the network
D
A password ______ is a service that stores all of your account information securely. a. vault b. binder c. manager d. collection
D
A(n) ______ version is an application you can use at no charge for a limited time to see if it meets your needs. a. preview b. beta c. preliminary d. trial
D
Digital device ______ is the trend of computers and devices with technologies that overlap. a. transference b. compatibility c. merging d. convergence
D
For which purpose might you use a CSC? a. To save content from a text to your phone. b. To text a friend a link to a website. c. To receive a notification from a website. d. To send a message to your mobile service provider.
D
How many instructions are supercomputers capable of processing in a single second? a. thousands b. millions c. billions d. trillions
D
In a spreadsheet, B4 represents a(n) ______. a. table b. worksheet c. formula d. cell
D
Productivity suites typically include, at minimum, all of the following EXCEPT ______. a. spreadsheet b. word processing c. presentation d. project management
D
Thieves can capture a credit card number by placing a(n) ______ on an ATM. a. swiper b. scanner c. sweeper d. skimmer
D
Trojan horses and zombies are examples of ______. a. cloud apps b. search engines c. hackers d. malware
D
What kind of software do you need to use an Internet phone? a. FTP b. chat c. Internet messaging d. VoIP
D
When purchasing a mobile computer, which of the following is NOT recommended? a. If you have large fingers, you should not purchase a computer with a small, condensed keyboard. b. Upgrading a mobile computer's memory and internal storage may be less expensive at the time of initial purchase. c. Consider purchasing a second battery if you plan to use your mobile device for a long time without access to an outlet. d. The availability of ports is not important because you can always add ports.
D
Which of the following best describes a back door? a. A file recovery method that circumvents the computer or mobile device's network. b. An invisible image on a website that, if accidentally clicked, downloads a virus to the user's computer or mobile device. c. A hardware device that reinforces security settings on a computer or network. d. A program or set of instructions that allows user to bypass security controls when accessing a program, computer, or network.
D
Which of the following best describes a hot spot? a. A zone in which it is unsafe to use your computer or network without additional security. b. Another term for the deep web, an unsearchable area of the Internet known for illegal activity. c. An area on a webpage that provides the most important, up-to-date content. d. A wireless network that provides Internet connections to mobile computers and devices.
D
Which of the following best describes an ultrabook? a. An e-book reader that has capabilities similar to a tablet. b. A supercomputer in laptop format. c. A laptop with a large, detachable screen. d. A thin laptop that uses a low-power processor.
D
Which of the following graphic formats should you use for photos used in the printing industry? a. BMP b. JPEG c. PNG d. TIFF
D
Which of the following is true about privacy and security risks with online social networks? a. Provide as much information as possible during registration. b. Online social networks typically do not change privacy settings. c. If a friend asks for help, respond urgently to help him or her protect himself or herself. d. Limit the number of friends.
D
You interact with a program through its user ______. a. protocol b. development unit c. input window d. interface
D
You tell your friends that product ______ is a technique that some manufacturers use to ensure you do not install software on more computers than legally licensed. a. certification b. authorization c. enrollment d. activation
D
Flash memory has many moving parts, making it less durable and shock resistant than other types of media.
F
Gaming consoles are more portable than handheld gaming devices. T OR F
F
A fingerprint is a small version of a larger image. a. True b. False
False
Contributors to a wiki typically do not need to register before they can edit or comment. a. True b. False
False
LinkedIn allows users to follow one another without confirmation, while Google+ requires you to confirm a friendship. a. True b. False
False
Most browsers require you to enter the protocol and host name in a web address. a. True b. False
False
A headset contains both a microphone and a speaker. T OR F
T
Both earbuds and headphones usually include noise-cancelling technology that enable you to reduce the volume level needed. T OR F
T
By subscribing to an ISP, you can connect to the Internet through your computers and mobile devices.
T
Google is an example of a search engine.
T
Most e-book reader models have a touch screen, and some are Internet capable. T OR F
T
CTS is inflammation of the nerve that connects the forearm to the palm of your hand. a. True b. False
TRUE
A web feed contains links to or information about updated or changed content on a website. a. True b. False
True
GPS stands for global positioning system. a. True b. False
True
MP3 is a type of audio file that includes compression. a. True b. False
True
Search text generally is not case sensitive. a. True b. False
True
The Safari browser comes preinstalled on Apple computers and devices. a. True b. False
True
The collection of a user's Tweets forms a microblog. a. True b. False
True
______ is the process of initiating contact between two Bluetooth devices. a. Tethering b. Initiating c. Coupling d. Pairing
d