!! Technology in Action / FINAL / Concepts Assessment
wiki
A ________ is a Web site where anyone can add, remove, or edit its content.
HAN
A ________ is a network located in your home that connects to all your digital devices.
image backup.
A backup of all files on your computer which is essentially a snapshot of exactly how your computer looks at a particular point in time is known as a(n)
input
A keyboard and mouse are examples of ________ devices.
launch a denial of service (DoS) attack on your computer
A packet sniffer is a program that can enable a hacker to do all of the following, EXCEPT ________.
plug-ins
Adobe Reader, Flash Player, and QuickTime Player are all examples of special software programs called ________.
output
After a picture has been taken with a digital camera and processed appropriately, the actual print of the picture is considered ________.
sharing an operating system
All of the following are benefits of networks EXCEPT, ________.
use a variety of animations on most slides to keep audience attention
All of the following are tips for a great presentation, EXCEPT ________.
use abbreviations such as "u", "r", and "BRB" to keep the e-mail message shorter
All of the following are tips for professional e-mail etiquette, EXCEPT ________.
USB
Almost all cell phones are designed with a ________ port.
computer forensics
Analyzing computer systems to gather potential legal evidence is ________.
computer literate
Being ________ means being familiar enough with computers that you understand their capabilities and limitations.
a network operating system (NOS)
Client/server networks are controlled by a central server that runs a specialized piece of software called ________.
binary
Computers use the ________ language consisting of 0s and 1s.
integrity
Data ________ means that the data contained in a database is accurate and reliable.
device driver
Each device attached to your computer comes with a special program called a ________ that facilitates communication between the device and the OS.
primary key
Each record must have a unique field called a(n) ________ field.
social networking
Facebook and YouTube are considered to be ________ Web sites.
USB port
Flash drives plug into a(n) ________.
table
In a database, a group of related records is called a(n) ________.
formulas
In a spreadsheet, equations that use addition, subtraction, multiplication, and division operators, as well as values and cell references are called ________.
tables records fields all of the above
In databases, information is organized in ________.
protocol
In the URL https://www.pearsonhighered.com/techinaction, the portion labeled "http" is the ________.
nonimpact
Inkjet printers and laser printers are examples of ________ printers.
course management software
Moodle and Blackboard are examples of ________.
biomedical chip implants
One potential application of ________ is to provide sight to the blind
formulas
Presentation software includes all of the following features, EXCEPT ________.
accounting
QuickBooks and Peachtree are examples of ________ software.
real-time
Robotic cameras used by television stations for sports events require a ________ operating system.
programs
Software refers to a set of instructions that tells the computer what to do. These instruction sets are called ________.
add graphics and pictures to files
System software does all of the following, EXCEPT ________.
secure socket layer
The "s" in "https" stands for ________.
a large network of networks
The Internet is ________.
Tim Berners-Lee at CERN
The World Wide Web was invented by ________.
motherboard
The ________ contains the central electronic components of the computer.
operating system
The ________ is(are) the group of programs that controls how your computer functions.
user interface
The ________ of the operating system enables the user to communicate with the computer system.
ROM
The basic input/output system is stored on a ________ chip.
is at column C, row 5 of the worksheet
The cell address C5 indicates that the cell ________.
texting
The choice communication mode of people aged 14 to 30 is ________.
digital divide
The difference between people with access to computers and the Internet and those without this access is known as the ________.
application
The general software you use to do tasks at home, school, or work is known as ________ software.
cell
The intersection of a row and column in a spreadsheet program is known as a ________.
Firefox
The name of the free Internet browser from Mozilla is ________.
ROM
The operating system of a cell phone is stored in ________.
microphone and touch pad
The primary input devices for smartphones are ________.
binary digit
The term "bit" is short for ________.
spreadsheet software
The type of software that is best used to create a simple budget is ________.
open source
The type of software that is free and available with few licensing and copyright restrictions is known as ________ software.
URL
The unique address for a particular Web site is the ________.
Vlogs
Which of the following are personal video journal entries posted on the Web?
Polymorphic
Which of the following classifications of viruses can change its own code to avoid detection?
Analyzing the data or information
Which of the following is NOT one of the four major data processing functions of a computer?
It has been organized or presented in a meaningful way.
Which of the following is NOT true about data?
The BIOS is activated by turning on the computer.
Which of the following is the first step in the boot process?
A GUI is a command-driven interface.
Which of the following statements about a graphical user interface is FALSE?
HTTP
Which protocol transfers HTML data from servers to browsers?
Sky Drive
Windows 8 uses a(n) ________ account to easily access and store your files online.
placing a found virus in a secure area on the hard drive
With regard to computer protection, quarantining is defined as ________
a firewall
You can block logical ports to invaders and make your computer invisible to others on the Internet by installing ________.
Embedded
________ computers are specially designed computer chips that reside inside other devices such as your car or the electronic thermostat in your home.
Infectious
________ diseases account for about 1/5 of all deaths worldwide, and technology is used to increase the pace of vaccine production to decrease this death rate.
Spyware
________ is an unwanted piggyback program that usually downloads with software you are installing from the Internet.
Social networking
________ is the gathering together of groups of people using online tools to connect and exchange ideas.