VT Chapter 1, VT Quiz 12, VT Quiz 11, VT Quiz 10, VT Quiz 9, VT Quiz 8, VT Quiz 7, VT Quiz 6, VT Chapter 4, VT Chapter 3, VT Chapter 2, VT Chapter 5

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which is not a modern source of installing software? Floppy drive Web Flash drive CD/DVD

Floppy drive

________ printers create an image by heating specially coated heat-sensitive paper that changes color where the heat is applied. Thermal Inkjet Laser Dye-sublimation

Thermal

________ is the most popular video-sharing service on the Internet. YouTube Apple iMovie Windows Movie Maker iTunes

YouTube

Files saved to a hard disk are stored in ________. areas one long track platters clusters

clusters

Eight bits equal ________ byte(s). 1 32 256 16

1

Which printer creates a model by building layers of a material such as resin or metal? Laser Dye-sublimation Thermal 3D

3D

What is not a part of Project management software? A timeline Team-planning capability Portfolio manager A database of customer contacts

A database of customer contacts

________ is a small, portable, solid-state drive. CompactFlash An optical disc A hard drive A flash drive

A flash drive

When you buy a textbook online from Amazon.com, you are participating in ________ e-commerce. C2A A2C B2B B2C

B2C

What is the oldest optical disc still in use today? CD Blu-ray DVD SSD

CD

Which of the following is not a valid character in a file name? Colon (:) Hyphen (-) Underscore (_) Semicolon (;)

Colon (:)

________ raises money from multiple small investors rather than a few large ones. Crowdsourcing Crowdfunding Crowdresourcing Crowdborrowing

Crowdfunding

The ________ enables users to enter a friendly name like google.com instead of an address like 74.125.224.72. IP ISP DNS TLD

DNS

Windows ________ helps to protect a computer from viruses and spyware. Disk Cleanup Protector Defender Check Disk

Defender

________ computing refers to the efficient and eco-friendly use of computers. Green Grid Ubiquitous Distributed

Green

74.125.224.72 is an example of a(n) ________. domain name protocol DNS IP address

IP address

What is not true about multitasking? It switches between tasks quickly. Each application is assigned its own area in memory. It allows the processor to actually do more than one task at a time. All modern operating systems support this technology.

It allows the processor to actually do more than one task at a time.

What is not true about hyper-threading? It is not dependent on those who write software. It enables one CPU to appear as two logical processors. It is a technology implemented by Intel. It is a virtual form of parallel processing.

It is not dependent on those who write software.

The Android operating system is the embedded version of ________. Windows UNIX macOS Linux

Linux

MP3 stands for ________. Megapixel Audio3 MPEG-3 Audio Layer 1 MPEG-3 MPEG-1 Audio Layer 3

MPEG-1 Audio Layer 3

What is not true about the BIOS? It is a program. It is stored on a chip on the motherboard. It is used to start up the computer. Older computers used Unified Extensible Firmware Interface instead.

Older computers used Unified Extensible Firmware Interface instead.

Which is the correct order of the phases in the SDLC? Planning, requirements, design, implementation, testing Planning, analysis, design, implementation and testing, maintenance Requirements, analysis, design, implementation and testing, maintenance Requirements, planning, design, implementation, testing

Planning, analysis, design, implementation and testing, maintenance

What is not true about Twitter? Posts are called Tweets. Twitter users have followers. Hashtags allow your posts to be searchable. Posts can be as long as you want.

Posts can be as long as you want.

Which of the following is not a SQL relational keyword? SELECT FROM WHERE QUIT

QUIT

File Explorer includes ________ access items on the Navigation pane to help you work more easily. Program Shortcut Easy Quick

Quick

Which type of memory is very fast and is located close to the processor? Cache DIMM RAM ROM

ROM

Using social media sites to sell services is called ________. Secure Sockets Layer (SSL) Social media marketing (SMM) Short Message Service (SMS) Really Simple Syndication (RSS)

Social media marketing (SMM)

________ involves the delivery of applications — web apps — over the Internet. Information-as-a-Service (IaaS) Software-as-a-Service (SaaS) Programming-as-a-Service (PaaS) Business-as-a-Service (BaaS)

Software-as-a-Service (SaaS)

________ are very expensive, complex computer systems used in weather forecasting and medical research. Supercomputers Enterprise computers Minicomputers Mainframe computers

Supercomputers

What computing device falls between a smartphone and a notebook computer? Portable media player MP3 player iPod Tablet

Tablet

________ consists of these four components: input, processing, storage, and output. Bioinformatics The information processing cycle The Turing test Unicode

The information processing cycle

Employees who are travelling can connect securely to their office network through the Internet when a ________ has been established. PAN LAN WLAN VPN

VPN

What type of high-speed network is normally set up in a person's home? Hotspot Municipal Wi-Fi Satellite Wi-Fi

Wi-Fi

To protect your computer from adware, you would purchase ________ software. anti-spam firewall antivirus antispyware

antispyware

The ________ allows a program to request a service such as printing from the operating system. client-server connection graphical user interface (GUI) Plug and Play (PnP) feature application programming interface (API)

application programming interface (API)

The Subscriber Identity Module (SIM card) stores all the following information on a mobile device, EXCEPT ________. cellular carrier apps account information phone identification

apps

The pre-release version of a program that is provided to some users and developers to preview and test before the final version is released, is called a(n) ________ version. beta delta out-house in-house

beta

Most larger businesses use a ________ type of network. client-server business-to-business workgroup peer-to-peer

client-server

An email claiming that you have won a lottery might be an example of ________. cyber-harassment cyberbullying cyber-stalking computer fraud

computer fraud

The part of the web that is unindexed is known as the ________. deep web clear web dark web closed web

deep web

The least expensive form of Internet connection is ________. DSL FTTH cable dial-up

dial-up

Linux ________ include the OS, various utilities, software applications, and an office suite. drivers clients distros APIs

distros

In the URL http://www.irs.gov, irs is the ________. TLD subdomain domain name protocol

domain name

In a transaction-processing system, ________ insures that transactions, once completed, cannot be undone. atomicity consistency isolation durability

durability

Knowledge engineers develop ________, which are programmed to make decisions in real-life situations. clones fuzzy logic expert systems knowledge bases

expert systems

A ________ can be set by an employer to prevent you from accessing eBay. firewall switch router wireless access point

firewall

In blockchain, each block has a unique ________ that converts the data into an encrypted output of a fixed length. chain hash block code

hash

In the Windows operating system, the Documents, Music, Pictures, and Videos folders are known as ________. file extensions libraries collections root directories

libraries

Forcing a processor to run at speeds higher than it was designed to perform is known as ________. overclocking supercharging turbocharging throttling

overclocking

Which would be the strongest password? p@ssw*rd p22w0r6 customer p@55W0?d

p@55W0?d

In the ________ phase of the SDLC, the project team is assembled and the feasibility studies are completed. planning analysis maintenance implementation

planning

The rules for communication between network devices are called ________. domains firewalls packets protocols

protocols

To print data or display it in an easy-to-read format, a ________ can be used. record form table report

report

One disadvantage to e-ink technology is that it ________. has a short battery life requires an external light for night reading causes eye strain cannot be read in bright light

requires an external light for night reading

The s in https stands for ________. system sponsored service secure

secure

A(n) ________ is a larger, planned update that addresses multiple problems or adds multiple features. upgrade patch hotfix service pack

service pack

Podcasts allow time ________, so you can listen on your own schedule. lagging delay shifting warping

shifting

All of the following are examples of malware, EXCEPT ________. spyware worms viruses spam

spam

To secure your wireless network at home, you should ________. back up the computers on the network use wireless encryption with a difficult passphrase password-protect important document files set the SSID to CLOSED

use wireless encryption with a difficult passphrase

Which of the following extensions is associated with a video file? .rtf .pdf .wmv .pptx

.wmv

Which of the following is a server-side programming technology? ASP Java applets JavaScript ActiveX controls

ASP

An end user license agreement represents which of the following? Agreement between the user and the software publisher Agreement between the user and the store where the software was purchased System requirements needed for downloading the software Hardware specifications for the computer

Agreement between the user and the software publisher

Which of the following is not an example of speech recognition software? Amazon Respond Cortana Google Now Siri

Amazon Respond

When sending one email to everyone in your address book, you should use the ________ field to keep their addresses private. Bcc To Subject Cc

Bcc

________ is the application of information technology to the field of biology. Bioengineering Bioinformatics Biocenosis Biofeedback

Bioinformatics

________ hackers hack into systems to steal or vandalize. Red-hat Black-hat White-hat Gray-hat

Black-hat

To connect peripherals at short ranges, you would use the ________ wireless technology. Ultraviolet RFID Infrared Bluetooth

Bluetooth

The ________ was the first working, digital, general-purpose computer. Z1 UNIVAC Colossus ENIAC

ENIAC

________ is an example of asynchronous communication. VoIP Chat Email Skype

Email

________ computers are present in such diverse applications as gasoline pumps, home appliances, and traffic lights. Embedded Grid Convertible Distributed

Embedded

________ is the study of the relationship between workers and their workspaces. Biometrics Workplace safety Ergonomics Genomics

Ergonomics

Default programs are associated with which of the following? File types File folders Paths Devices

File types

Which of the following is not a common LAN topology? Bus Hierarchical Star Ring

Hierarchical

Which statement about a logic bomb is false? It can be triggered on a specific date. It can lay dormant until specific conditions are met. It can spread to other machines. It is often planted by a disgruntled IT worker.

It can spread to other machines.

What is not true about analytics? It comes standard in Project Management software. It detects patterns in data. It can raise profits. It can help a business make decisions.

It comes standard in Project Management software.

Which of the following is not true about Joint Application Development? It resolves usability problems, but it adds to the development time. It results in shorter development times. It is more collaborative than System Development Life Cycle. It resolves usability problems early in the process.

It resolves usability problems, but it adds to the development time.

Which of the following is not true of computational photography? It improves the quality of images. It uses optical processes. It allows for specialized images. It happens instantly inside the camera.

It uses optical processes.

________ Law predicted that the number of transistors placed on an integrated circuit would double approximately every two years. Turing's Babbage's Lovelace's Moore's

Moore's

Which of the following is not a Boolean operator? OR NOT NOR AND

NOR

The free online storage provided by Microsoft is called ________. LiveDrive CloudDrive OneDrive iCloud

OneDrive

________ software can be copied, modified, and redistributed without paying a fee. Open source Retail Trialware Shareware

Open source

What is not true about pop-up blockers? They prevent webpages from opening a new window. They can be configured for different sites. They are triggered by cookies. They can serve useful purposes.

They are triggered by cookies.

A system that simulates human thinking by emulating the biological connections of the brain is called ________. an expert system biofeedback a neural network fuzzy logic

a neural network

Procedural programming involves ________. writing executable pseudocode defining objects and the actions that can be performed on them a step-by-step list of instructions drawing flowcharts to ensure that procedures are followed

a step-by-step list of instructions

You would install a(n) ________ if you wanted to enable new capabilities in your web browser. plug-in add-on taskbar toolbar

add-on

In a transaction-processing system, ________ insures that transactions are either completed or not begun. consistency atomicity durability isolation

atomicity

All the information someone can find out about you by searching the web is called your ________. folksonomy tagged information avatar digital footprint

digital footprint

A ________ is a network composed of a group of clients and servers under the control of one central security database. homegroup domain client workgroup

domain

Hacking to make a political statement is called ________. cracking politicking sneaking hacktivism

hacktivism

The # symbol used by Twitter is called a(n) ________. hashtag forum digital footprint avatar

hashtag

P2P networks are normally found in ________. universities libraries homes corporations

homes

Wireless access points that are available in public spaces are called ________. Network Access Points hotspots hyperlinks Internet protocols

hotspots

________ allows you to sync your photos between your iPhone and your Mac. Flickr iCloud Photobucket Picasa

iCloud

Camera shake can be reduced by using a camera that provides ________. burst mode an optical zoom image stabilization a digital zoom

image stabilization

Windows maintains a(n) ________ on your system that helps to speed up searches. index algorithm default file property

index

A(n) ________ is a set of rules that are used to apply a knowledge base to each situation. difference engine cognitive computing system inference engine decision support system

inference engine

When using a Windows PC, you can use a ________ to organize similar files that are located in different locations. folder library path directory

library

A ________ error is an error in programming design that results in an unexpected outcome. logic syntax grammatical runtime

logic

To ensure that a person does not misspell Wednesday in a field, a(n) ________ list can be used. master Find feature inference lookup

lookup

The total zoom available on a camera is determined by digital zoom ________ optical zoom. multiplied by divided by added to subtracted from

multiplied by

Web apps which will run on any device with a supported browser and Internet access are called platform-________. apps neutral dependent specific

neutral

In a one-to-one relationship, both tables use the same ________ to link two records. primary key foreign key form query

primary key

Bidding by an accomplice to drive up the price of an auction is known as ________. fake bidding shill bidding bait-and-switch bidding false bidding

shill bidding

In addition to performing calculations, ________ organize data that can be sorted and filtered, making the data functional for lists and schedules. documents graphics pie charts spreadsheets

spreadsheets

You should use a(n) ________ account for everyday computing on a computer running Windows. guest administrator standard visitor

standard

A ________ is a device that connects multiple devices on a LAN. bus repeater router switch

switch

The rules that ensure the correct construction of commands in a programming language is called the ________. logic syntax grammatical semantic

syntax

The ________ houses the power supply, memory, and drive bays of the computer. ALU control unit CPU system unit

system unit

In a database, a ________ stores data in rows and columns. field table cell matrix

table

The difference between a virus and a worm is a ________. worm is a threat to your computer, but a virus is not virus is a threat to your computer, but a worm is not virus replicates itself, but a worm cannot self-replicate virus needs a host file, but a worm does not

virus needs a host file, but a worm does not


Ensembles d'études connexes

environmental chapter 13 test questio

View Set

SOC 100 - Chapter 16: Education Quiz

View Set

trauma & burns practice questions (ch 20 & 21)

View Set

Intro Midterm: Professional Socialization & Communication

View Set

Government Health Insurance Plans

View Set