Advanced Computer Science Chapters 1-8 Multiple Choice
The type of code that uses only seven bits for each character is _________.
ASCII
______ time is the average time it takes a computer to locate and read data on the storage medium.
Access
A problem a hacker can cause after breaking into your computer might be ________.
All of the above
A super-thin slice of semiconducting material packed with microscopic circuit elements is a(n) ____.
All of the above
A term which can refer to a person who manipulates computers with malicious intent is ____.
All of the above
Digital devices can use ____ as a code to represent character data.
All of the above
In terms of an authentication protocol, the phrase 'something a person possesses' could refer to ________.
An ID card
A set of computer programs that helps a person carry out a task is ____.
Application software
_______ are the result of a series of tests used to gauge overall microprocessor speed are useful in comparing microprocessor performance.
Benchmarks
In terms of an authentication protocol, the phrase 'something a person is' refers to a(n) _________.
Biometric device
A laptop can _____.
Both a and b
_______ is used to enhance processor performance.
Both a and c
A ________ attack uses password-cracking software.
Brute force
Storage is typically expressed as ____.
Bytes
In an advertisement, a speed specification, such as 3.4 GHz, indicates the speed of the microprocessor ________.
Clock
An example of an old form of convergence is a _________.
Clock radio
_________ computing provides access to information, applications, communications, and storage over the Internet.
Cloud
The first digital computers were built during World War II for ____.
Code breaking
A(n) _______ converts all the statements in a program in a single batch; the resulting collection of instructions is placed in a new file.
Compiler
Karen learns that microcontrollers are sometimes referred to by another name. What is another term for a microcontroller?
Computer-on-a-chip
Technology ____ is a process by which several different technologies with distinct functionality evolve to form a single product.
Convergence
A(n) _______ chip is a type of non-volatile memory chip that does not require power to hold data.
EEPROM
A(n) _____ media player is a handheld device designed for playing music and videos, which offers a camera, access to the Internet, and a variety of apps.
Enhanced
The type of code that uses eight bits for each character is __________.
Extended ASCII
The term ________ refers to the size and dimensions of a computer component.
Form factor
______ means a billion cycles per second.
Gigahertz
C, BASIC, COBOL, and Java are examples of ____ programming languages.
High-level
Data becomes ____ when it is presented in a format that people can understand and use.
Information
A collection of preprogrammed activities such as addition, subtraction, counting, and comparison is called a(n) ____.
Instruction set
A global computer network originally developed as a military project is the ____.
Internet
When restrictions on commercial use of the ____ were lifted in 1995, companies such as AOL and CompuServe became popular services.
Internet
A(n) _______ converts and executes one statement at a time.
Interpreter
Initially sales were slow for the personal computer because of ____.
Lack of software
_________ software refers to any software that is installed on a computer's hard disk.
Local
1,048,576 bytes is a ________.
Megabyte
An area of a computer that temporarily holds data waiting to be processed is ____.
Memory
An electronic component that can be programmed to perform tasks is a ____.
Microprocessor
A processor that includes circuitry for two or more processing units is called a ____ processor.
Multi-core
A(n) ________ is a microprocessor-based computing device designed to meet the computer needs of an individual.
Personal computer
A hacker posing as a legitimate representative of an official organization such as your bank is an example of ______.
Phishing
A microprocessor whose instruction set includes a limited set of simple instructions uses ______ technology.
RISC
______ is a type of memory circuitry that holds the computer's startup routine.
ROM (Read only memory)
Password management functions include all of the following EXCEPT ________.
Recording keystrokes
_______ is used by most of today's personal computers because it is fast and relatively inexpensive.
SDRAM
________ intercepts information sent over computer networks.
Sniffing
________ media are cloud-based applications designed for social interaction and consumer-generated content.
Social
You might represent ___ using character codes
Social Security numbers
The human-readable version of a program is called _____.
Source code
A compute-intensive problem runs on a ____.
Supercomputer
The ______ houses all essential chips and provides connecting circuitry between them.
System board
A set of computer programs that helps a computer monitor itself and function more efficiently is ________.
System software
The ______ is the case that holds the computer's main circuit boards, microprocessor, memory, power supply, and storage devices.
System unit
A ______ computer is a handheld computer that is essentially a large version of an enhanced media player.
Tablet
In a computer, most processing takes place in ____.
The CPU
According to the text, a key aspect of _________ is that it adds content and substance to the _________.
The Web, the Internet
When adding two numbers, Jim knows that each number is going into its own register and the control unit provides the instructions such as add. He wants to know where the result of the add goes. You tell him it goes to ______.
The accumulator
Jim wants to know why a compiler converts all statements in a program at one time and places them into an object code. You tell him it is so that ______.
The code is ready to execute
The master controller for all activities that take place within a computer is ____.
The operating system
A ________ is a series of characters that becomes a person's unique identifier.
User ID
________ refers to the number of bits that a microprocessor can manipulate at one time
Word size
A powerful desktop computer used for high-performance tasks is a ________.
Workstation
An ordinary personal computer that is connected to a network is a ____.
Workstation
Under U.S. law, copyright holders may be awarded statutory damages up to ____ for copyright infringement.
$250,000
The ______ wildcard character allows a search engine to find pages with any derivation of a basic word.
*
_____ is a valid top-level domain.
.ca
Support program files for PC applications often have a(n) _______ extension.
.dll
Tom and Andy both have Microsoft Word. It would be best to store their files in its native format with an extension of ____.
.docx
Anita has created files with the following names: roof, column, and sun. Which of the following file extensions would most likely be found on her files?
.wmf
Which of the following is a file extension you might find on a vector graphic filename?
.wmf
A ______ bit in a monochrome bitmap represents black.
0
For good basic performance, a computer running Windows 7 or 8 should have at least ____ of RAM.
1 GB
A resolution of 1600 x 1200 could also be expressed as ______ megapixels.
1.9
In 1982, the percentage of households that had a computer was closest to _________ percent.
10
One minute of CDDA music requires in excess of ____ of storage space.
10 MB
The original Ethernet standard carried data over a coaxial cable bus topology at ____.
10 Mbps
Most experts recommend that Web page graphics not exceed _______ KB.
100
As part of your research, you find that the longer the key, the longer it will take a devious competitor to crack the code. You also find that most encryption today uses a ______ key, and so you decide to use an encryption key of that size.
128-bit
A True Color or 24-bit bitmap can produce a maximum of ______ colors.
16.7 million
The modern definition and use of the term computer emerged in the ________.
1940s
Data transport rates depend on the technology of the cellular system. The generation of cellular technology associated with analog voice service is _______.
1G
Personal computer hard disk platters typically have storage capacities ranging from 40 GB to ______.
2 TB
There are estimated to be more than ____ users of the Internet.
2 billion
Current versions of Windows support file names up to _____ characters long.
255
______ replaced analog technology with digital technology and added support for text messages.
2G
______ technologies support digital transmission for both voice and data.
3G
Professionals opt to have to least _____ of RAM on their computer's hard disk for video editing.
4 GB
The audio CDs you buy at your favorite music store are recorded at a sampling rate of ____.
44.1 kHz
3G technologies have speeds ranging from 200 Kbps to ____.
5 Mbps
For gaming systems, a response rate of ____ or less is desirable.
5 ms
Melissa wants to ensure that the resume she attaches to the e-mail messages she is sending to the potential employers will successfully make it to them. She should try to limit the size of the attachment to _____ or less for dial-up connections.
50 KB
Microsoft Windows is installed on more than _______ of the world's personal computers.
80%
To stay with the current Wi-Fi standard, make sure your device is compatible with ______.
802.11n
In addition to her computer, what other tool might Anita use to create vector graphics?
A digitizing tablet
To connect to a LAN, a computer requires ____.
A network interface card
A MIDI sequence contains all of the following EXCEPT _____.
A wavetable
The _____ format offers very good sound quality based on MPEG-4
AAC
____ depends on authorization and revocation built into devices and content.
AACS
The Internet began with a project called ______.
ARPANET
Sally tells James that a worksheet will automatically update to reflect any rows or columns that are deleted or copied. Sally tells James that if he does not want the cell reference to change, he should use a(n) _____ reference.
Absolute
Web applications are _______.
Accessed and run on the Web
In a wireless ______ network, devices broadcast directly to each other.
Ad-hoc
Server-side scripts can be written using any of the following EXCEPT _____.
Ada
Legacy equipment without Wi-Fi can be upgraded using a Wi-Fi _____.
Adapter
________ utilities alter a user's interface to create an accessible environment.
Adaptive
To access you router's configuration utility, open a browser and enter the router ______.
Address
All of the following are examples of video editing software EXCEPT _____.
Adobe Illustrator
A ________ is an example of a pointing device.
All of the above
A good computer maintenance routine would include regularly ____.
All of the above
A page layout includes ____.
All of the above
After researching this topic, you find that encryption can he used in _____.
All of the above
Another option Sally is considering is a portable satellite system. She asks you about the details and you tell her ______.
All of the above
BitTorrent can be used to distribute ____.
All of the above
Ethernet is easy to ____.
All of the above
Examples of 3G technologies include ____.
All of the above
Examples of Uniform Resource Identifiers include ______.
All of the above
File management capabilities available from application software include _______ files.
All of the above
Footage can originate from a ____.
All of the above
Gaming computers typically include _____.
All of the above
ISPs can maintain servers for _____.
All of the above
If networked, ____ can be accessed by an authorized LAN user.
All of the above
If virus protection software identifies a virus, it can try to ____.
All of the above
Karen is learning that, when combined with wireless networks, devices with microcontrollers can relay information to which of the following?
All of the above
Mobile apps ______.
All of the above
Most applications for PCs consist of multiple files. Additional files contain support modules called ______.
All of the above
Network service providers include ______.
All of the above
Now when you purchase a digital book from ____, you can read it on devices that include computers, tablets, and smartphones.
All of the above
Overclocking is a technique for increasing the speed of a computer component, such as ____. It can be very risky.
All of the above
Security suites can be ____.
All of the above
Symptoms of network problems include ____.
All of the above
The difference between the Save and the Save As commands is that ______.
All of the above
VoIP systems are offered by companies such as ____
All of the above
What type of information does Jessica find Web sites typically store in cookies?
All of the above
Which of the following is an example of a rerecordable optical storage medium?
All of the above
Wireless signal range can be limited by ____.
All of the above
You can install personal VPN software such as ____.
All of the above
You explain to the owner of ACME Widget Company that malware includes ______.
All of the above
You should consider making backups of your _____.
All of the above
_____ is a disadvantage of using a wireless networks when compared to a wired network.
All of the above
______ may pose a threat to your computer's security and/or your privacy.
All of the above
All of the following are examples of resources EXCEPT _______.
All of the above are resources
Jim knows that a collection of preprogrammed activities is an instruction set. He wants to know what an instruction set is designed to do. You tell him it is designed to _______.
Allow programmers to use them in creative ways for multiple tasks
Laura wants to make sure her computer is fast enough for her everyday use. which of the listed features is the most important?
Amount of RAM
One of the computer ads Laura is looking at specifies "2 GB Dual Channel DDR2 SDRAM at 800 MHz (max 4 GB)." What does the 2 GB specify?
Amount of RAM
Many ____ sites act as relay stations to forward your searches to search engines without leaving a trail back to a cookie or IP address.
Anonymizer
_________ tools cloak a person's identity online.
Anonymizer
______ software is a type of security software designed to identify and neutralize Web bugs, ad-serving cookies, and other types of malware.
Antispyware
Tom sends Andy an email attachment named OurProject.tif. Andy tries to open the attachment but can't. His problem may be that ____.
Any of the above
Which of the following is a Web resource?
Any of the above
To avoid security threats, a user can _______.
Avoid opening suspicious email attachments
_______ e-commerce involves one enterprise buying goods or services from another enterprise.
B2B
When you purchase a textbook online from a site like www.amazon.com, you are participating in ____ e-commerce.
B2C
______ e-commerce occurs when businesses sell to governments.
B2G
_____ file sizes might shrink by as much as 70% when compressed.
BMP
________ is a file sharing protocol that distributes the role of the file server across a collection of dispersed computers.
BitTorrent
A _____ graphic is composed of a grid of dots.
Bitmap
Data transmission speeds are typically expressed as ______.
Bits
To set up free VoIP, you and the people you communicate with can install free VoIP clients such as ____.
Blink
The ______ indicates that the operating system has encountered an error from which it cannot recover, and the computer no longer accepts any commands.
Blue screen of death
A _______ is any software that can automate a task or autonomously execute a task when commanded to do so.
Bot
Sending computer data over a ____ system required a voiceband modem to convert digital data into audible signals.
Both A and B
A Wi-Fi device _____.
Both a and b
When installing a PC application, most _____ for new software are placed in the folder you specify.
Both a and b
Hot plugging is allowed with what kind of devices?
Both b and c
A ______ is a network device that connects two similar networks.
Bridge
High-bandwidth communications systems are sometimes referred to as ____.
Broadband
A security suite will typically include all of the following EXCEPT ____ software.
Browser
A(n) ______ is client software that displays Web page elements and handles links between pages.
Browser
Webmail allows you to use a(n) ____ to access and view your e-mail messages.
Browser
The term _____ is a technical term for the region of memory that holds data waiting to be transferred from one device to another.
Buffer
When you are streaming a Netflix movie over a basic cable Internet connection, Netflix transmits the first few minutes of the movie to a memory area of your computer called a(n) _____.
Buffer
When you purchase a used digital camera directly from the owner on an online auction, you are participating in ______ e-commerce.
C2C
Which of the following is NOT a DRM encryption technology?
CDHA
______ is a digital rights management technology designed to encrypt and control the used of content stored on DVDs.
CSS
Tom wants to known which Internet access is the fastest. You tell him ______.
Cable
____ currently offers the fastest Internet speeds.
Cable
A wired network is one that uses ______ to connect network devices.
Cables
When your browser fetches pages and graphics to form a Web page, it stores them in temporary files on your hard drive called a Web ____.
Cache
RIM is the ____ company that developed the BlackBerry smartphone.
Canadian
A built-in ____ in your personal computer can make it simpler to transfer photos from a solid state memory card used in your digital camera.
Card reader
The intersection of a column and a row is called a ____________.
Cell
A great example of convergence in modern technology is ______.
Cell phones
A formula can contain _____ and mathematical operators.
Cell references
Portable Internet access includes all of the following EXCEPT ____.
Cellular
An encrypted message is referred to as ______.
Ciphertext
The telephone system uses a technology called ______, which establishes a dedicated, private link between telephones for the duration of a call.
Circuit switching
Cable Internet service needs _____.
Circuitry to handle Ethernet protocols and a cable modem
To use local e-mail you must install e-mail ____ software on your computer.
Client
_______ scripts tend to be used for interactive user interface elements.
Client-side
Most messaging is based on a(n) ____ model.
Client/server
_______ computing depends on a grid of servers, storage devices, and protocols that offer Internet-accessible computing services ranging from consumer-level media sharing to office productivity applications and complex corporate data processing.
Cloud
Which of the following Web-based applications is NOT sometimes characterized as Web 2.0?
Cloud computing
A group of sectors is called a ________.
Cluster
Each ____ uses a unique compression algorithm that allows the user to specify the compression ratio and/or bitrate used when compressing video.
Codec
The number of colors a monitor can display is referred to as ____.
Color depth
The size of the file that holds a bitmap depends on its resolution and ______.
Color depth
_______ is typically sold in computer stores or at Web sites.
Commercial software
A _____ is a physical path or a frequency used for signal transmission.
Communications channel
Before sending a large attachment in an e-mail, you can use a(n) ____ to shrink it.
Compression program
System software is designed to accomplish _______ tasks.
Computer-centric
An extension of .sys designates a ____ type of file.
Configuration
When you install a local application, all of its files are placed in the appropriate folders all your computer's hard disk, and then your computer performs any software or hardware ______ necessary to make sure the program is ready to run.
Configurations
A LAN would be used to _____.
Connect personal computers within a very limited geographical area, such as a single building
Digital video file formats are sometimes referred to as ____ formats.
Container
To access settings for Flash cookies, look for Flash Player in the ____ (PCs) or in System Preferences (Macs).
Control Panel
A _____ enables a Web server to keep track of your activity and compile a list of your purchases.
Cookie
As Jessica begins her research of just how shopping carts work, she is surprised to find that many e-commerce sites store information about her Web visits on her hard drive. What do these sites use to store visit information?
Cookies
Flash ____ can collect and store personal data, such as a user's name or the user's progress in a game.
Cookies
______ allow a Web site to store information on the client computer for late retrieval.
Cookies
It is illegal to do all of the following with software EXCEPT ______.
Copy and keep as backup
Popular codecs include all of the following EXCEPT ____.
Corel
A Web ______, automated to methodically visit Web sites, can be programmed to perform various activities as it visits those sites.
Crawler
You can use the results from a search on a database in all of these ways EXCEPT to ____.
Create records
You have just decreased the number pixels and file size of your graphic by selecting a portion of the image. You have ______.
Cropped your graphic
_____ refers to the process of selecting part of an image.
Cropping
A _____ is a procedure for encrypting or decrypting a message.
Cryptographic algorithm
A _____ is word, number, or phrase that must be known to encrypt or decrypt a message.
Cryptographic key
To reboot a PC, hold down the ____ keys at the same time.
Ctrl, Alt, and Del
In a(n) ______ installation, the setup program displays a list of software features for your selection.
Custom
A protocol known as ____ is designed to automatically distribute IP addresses.
DHCP
______ is a collection of techniques that copyright holders use to limit access to and use of digital content.
DRM
Digital telephone systems open up the possibilities for digital data transport options such as ____.
DSL
Tom wants to known what kind of service to opt for if cable Internet service is not available, or proves slower or less dependable than expected. You tell him the next choice would be ______.
DSL
Tom wants to known which of the services uses his existing telephone lines. You tell him ______.
DSL
A _____ is a device that connects a computer to a telephone line and converts computer data signals into signals compatible with DSL.
DSL modem
Jim likes to save MP3 files and photo files to disc and take them to work. His work computer has a DVD-RW. For his home computer, which would the best choice for an optical disc drive?
DVD/R/RW/CD-RW
The ______ is the amount of data that a storage device can move from the storage medium to the computer per second.
Data transfer rate
Harry's grandson has been coming to his house and downloading music. His grandson turned "file sharing" on. He is concerned this causes security problems. Harry should ______.
Deactivate it when not needed
The process of converting ciphertext into plaintext is called ______.
Decryption
_____ is typically available as a trial version.
Demoware
Portable software is ____.
Designed to run from removable storage
Productivity software that has sophisticated features to help you produced typeset-quality output is considered ______ software.
Desktop publishing
The operating system, application software, and ______ are organized similar to the chain of command in an army.
Device drivers
A fixed Internet connection that uses a voiceband modem and telephone lines is a(n) ____ connection.
Dial-up
A ______ displays the options associated with a command.
Dialog box
A(n) ______ backup contains any files that were added or changed since the last full backup.
Differential
A _____ watermark is a pattern of bits inserted at various places in an image or a content stream that can be used to track, identify, verify, and control content use.
Digital
________ is the process of converting text, numbers, sound, photos, and video into data that can be processed by digital devices.
Digitization
______ is the process of creating a CD, DVD, or BD by selecting all the files and then copying them in a single session.
Disc mastering
If you connect to a network and do not get a list of other devices, check your computer's network ______ setting.
Discovery
In _____ mode two Bluetooth devices can find each other and exchange passkeys.
Discovery
A Linux ______ contains the Linux kernel, system utilities, GUI, applications and installation routine.
Distribution
All of the following are DRM technologies EXCEPT _____.
Dithering
Every domain name corresponds to a unique IP address that has been entered into the ____.
Domain Name System
What should Paul look for in a display device as a measure of image clarity?
Dot pitch
The rate of data arriving at your computer is ______.
Downstream speed
Vector graphics software is sometimes referred to as _____ software.
Drawing
A(n) ______ printer can print on both sides of the paper.
Duplex
A printer's ____ determines how many pages a printer is able to churn out.
Duty cycle
The configuration settings are stored in the router's _____ memory.
EEPROM
Legacy equipment without Wi-Fi can be outfitted with a Wi-Fi adapter that plugs into a(n) ____.
Either a or b
The significance of ____ data is that it cannot be intercepted by corporate spies or government censors.
Encrypted
Wireless ____ scrambles the data transmitted between wireless devices and then unscrambles the data only on devices that have a valid key.
Encryption
______ transforms a message in such a way that its contents are hidden from unauthorized readers.
Encryption
During product activation, you must ____.
Enter a product key
Esteban's router has no screen or keyboard of its own so the easiest way for him to access the router's configuration software is for him to make this connection with a(n) ______.
Ethernet cable
Which of the following is NOT a true statement you can make to Charlie?
Even if you lose your encryption key, you can still access and use encrypted data
Where would Paul install his new optical drive?
External drive bay
Most Internet servers have an easy to remember name that is known as a(n) ____.
FQDN
Most hard disks are formatted by the ____.
Factory
A ______ server is a computer whose primary purpose is to be a repository for files that can be accessed by network workstations.
File
A named collection of data that exists on a storage medium is known as (a) ____.
File
An optional file identifier that is separated from a main file name by a period is a ____.
File extension
To see a list of devices on your network, you can use your operating system's ____ utility.
File management
Thomas's friend has asked that the network be configured such that, if he has photos on his tablet computer and wants to transfer them to his desktop computer, he can do so easily. What capability is Thomas's friend looking for?
File sharing
A computer file's location is defined by a ____.
File specification
One way to transfer photo data from a camera directly to a computer is via ____.
FireWire ports
________ wireless Internet service is designed to offer Internet access to homes and businesses by broadcasting data signals over areas large enough to cover most cities and outlying areas.
Fixed
______ is a popular format for Web-based video that requires Adobe Flash Player.
Flash video
In the Mac OS, the data ______ contains data or the commands for a program.
Fork
In the Mac OS, the resource ______ stores information about the data.
Fork
Files maintained by the Macintosh operating system can have two parts, called ____.
Forks
A common use of ______ shifting is ripping audio tracks from a CD and converting them into MP3 format to playback on a portable media device.
Format
_____ shifting is the process of converting media files from a format suitable for one device to a format suitable for a different kind of device.
Format
HTML ____ are used to display a question and a box into which you can enter an answer.
Forms
Files stored in noncontiguous clusters are ____.
Fragmented
A video is composed of a series of bitmap graphics, each one called a ____.
Frame
A(n) ______ installation gives you access to all features of the software.
Full
A(n) ______ system backup includes a copy of every file stored on your computer's hard drive. In addition to data files, it includes copies of all installed programs, settings, and the operating system.
Full
Charlie wants to know what the term is for making a copy of all his files. Charlie has a Windows machine. You tell him the correct term is ____.
Full system backup
The paragraph style that is used to assure paragraphs are aligned evenly on both the right and left is ______.
Fully justified
______ is the most frequently used HTTP method.
GET
1,073,741,824 bytes is a ________.
Gigabyte
Storage capacity is usually measured in ______.
Gigabytes or terabytes
A ______ is a smooth blending of shades from one color to another or from light to dark.
Gradient
Anita would like to make her columns appear to be three-dimensional. She should see if her graphics software allows her to use ____.
Gradients
_____ can be used to create the illusion of three dimensions by smoothly blending shades from one color to another or from light to dark.
Gradients
_____ is a hardware-based DRM technology that requires compliant devices for content playback.
HDCP
The file system used by Mac OS is ____.
HFS+
An e-mail message in ____ format can include graphics in addition to a wide variety of fonts and font colors.
HTML
When working with ______ mail, make sure your antivirus software is checking incoming messages.
HTML
A(n) ______ adds HTML tags to a document, spreadsheet, or other text-based file to create an HTML document that can be displayed by a browser.
HTML conversion utility
______ is a protocol that works in conjunction with TCP/IP to get Web resources to your desktop.
HTTP
______ checks a Web server's security certificate to determine if the site is legitimate.
HTTPS
Two devices on a network might have to negotiate their communications protocols through a process called ____.
Handshaking
Software considered to be utility software is ____.
Hard disk backup software
Product activation can create a ____ based on your validation code and your computer's internal serial number.
Hash value
Thomas's friend has indicated that he will accept the system that Thomas is constructing for him. However, he is concerned about security risks and wants to know what limits he can place on the system. Which of the following is NOT a true statement that Thomas can make to his friend?
He can't remove sharing from files that he no longer wants to share
Alison has only taken 10 pictures with her digital camera, and she finds she has filled her memory card. Why might this have occurred?
Her images were taken at a very high resolution
DVD authoring software offers tools for creating DVDs with ____-style menus.
Hollywood
A _____ ad overlays the content on a Web page, sometimes obscuring it until you click to ad or its timer expires and the ad disappears.
Hover
The following is NOT a factor upon which your ability to share files with other devices on a network depends: ______.
How long you have been using your computer
A ______ is a network device that extends a wired network by adding additional ports.
Hub
Technical management of the Internet's Domain Name System is coordinated by _______.
ICANN
Ethernet is a wired technology that is defined by ____ standards.
IEEE 802.3
The IEEE designation for the Gigabit Ethernet standard is ______.
IEEE 802.3z
_____ is similar to POP3, but it leaves messages on the server until you specifically delete them.
IMAP (Internet Messaging Access Protocol)
To configure a file server, open a browser from any workstation, enter the file server's ____ address, and provide the administrator ID and password.
IP
Until domain names are added to the DNS database, new sites can only be accessed by entering their numeric ____.
IP addresses
_____ service offered slightly faster service than dial-up but has today been replaced by DSL.
ISDN
A disk ____ is a bit-by-bit copy of the data from all sectors of a disk.
Image
Charlie wants to know where he should keep his backups. You tell him the most secure storage location is ____.
In a different location from where his computer resides
A(n) ______ backup makes a copy of only those files that were added or changed since your last backup.
Incremental
Search engine ____ software is designed to pull keywords from a Web page and store them in a database.
Indexer
Activities associated with resources management by an operating system include all of the following EXCEPT _______.
Installing new memory
Indicators of pirated software include all of the following EXCEPT software that ____.
Is downloaded
A true statement about Bluetooth is _____.
It forms networks automatically when two or more devices in discovery mode are within range.
The strengths of Mac OS do NOT include ______.
Its use of resource forks
Which of the following formats does not offer lossless compression?
JPEG
_______ preprocesses an image by tweaking the colors in adjoining pixels so that they are the same color whenever possible.
JPEG
iPads, iPhones, and iPods are only allowed to download apps from the iTunes App Store, and while apps are available from other sources, using them requires an unauthorized change to the device's software called a(n) ____.
Jailbreak
______ consists of a series of instructions that is embedded directly into an HTML document that instruct the browser to carry out specific actions or to respond to specific user actions.
JavaScript
The _____ is a security mechanism that is factory-installed on many personal computers.
Kensington Security Slot
_____ searches are simply a collection of words relevant to a search.
Keyword
When a Web page author includes meta keywords, like "sex," that have little to do with the information on the page, the author is engaging in __
Keyword stuffing
1,024 bytes is a ________.
Kilobyte
Paul remembers that the monitor he was looking at included backlighting. What type of monitor was it?
LCD
_______ technology produces an image by filtering light through a layer of liquid crystal cells.
LCD
_______ was developed by a Finnish student. It continues to gain popularity as an operating system for personal computers. It is distributed under the terms of a GPL.
LINUX
Interim 4G technologies such as ____ have been deployed since 2009.
LTE
Satellite data transport is subject to ____ delays of one second or more, which occur as your data is routed between your computer and a satellite that orbits 22,200 miles above the Earth.
Latency
The elapsed time for data to make a round trip from point A to point B and back is called ____.
Latency
Weaknesses of Mac OS include ____.
Limited selection of applications
If your backups are ____, keep them in a safe place.
Local
________ applications are software that is installed on a computer's hard disk.
Local
Which of the following is tracking and recovery software?
Lojack for Laptops
Through many editions, the Windows user interface was characterized by a colorful Start button in the ____ corner of the screen.
Lower-left
A _____ is a public high-speed network capable of voice and data transmission within a range of about 50 miles.
MAN
Devices with one or more antennas use ____ technology to boost signals and spread them more evenly over the signal range.
MIMO
Hard disk storage technology can be classified as ____ storage.
Magnetic
An example of mathematical modeling software is ____.
Mathcad
A(n) ______ keyword is entered into a header section of a Web page when it is created and is supposed to describe the page contents.
Meta
Graphics files that contain both bitmap and vector data are called________.
Metafiles
In addition to using search engines, you can also fine Web-based information using a(n) ______ engine that searches a series of other search engines and compiles the search results.
Metasearch
With ______ you can easily assemble a small network just about anywhere.
MiFi
All of the following are examples of portable applications EXCEPT ______.
Microsoft Internet Explorer
______ is an up-and-coming standard destined to be deployed by ISPs and cell phone carriers to allow seamless handoff between one tower and another.
Mobile WiMAX
A ____ bitmap would be displayed by manipulating the pattern of "off" and "on" pixels displayed on the screen.
Monochrome
The signal on Esteban's wireless network is weak. What is the best solution to this problem?
Move the workstation closer to the router, if possible
Popular presentation software products include all of the following EXCEPT ____.
Movie Maker
Five of the people in Tom's company use a Web design software package. You advise Tom to get a license for a specific number of users. He needs a ________ license.
Multiple-user
An operating system's _____ capability supports a division of labor among all the processing units.
Multiprocessing
______ provides process and memory management services that allow two or more tasks, jobs, or programs to run simultaneously.
Multitasking
Within a single program, ____ allows multiple parts to run simultaneously.
Multithreading
Her first search is for pages that include the term "railroad history," but she is not interested in "cars." What search operator should she use to precede the keyword "cars"?
NOT
The file system used by Windows 8 is _______.
NTFS
The file system used by Windows Vista is ______.
NTFS
Dial-up Internet access is an example of a(n) ______ communications system.
Narrowband
______ queries are questions stated in a language such as English, rather than an esoteric query language.
Natural language
All of the following are currently popular browsers EXCEPT ______.
Netscape Navigator
A group of computers linked together to share data and resources is a(n) ________.
Network
The octets in an IP address correspond to a ____.
Network class
The average "survival time" for an unprotected computer to remain uncompromised is only ____.
Nine minutes
With PGP, you send the private key to ______.
No one
A network _____ usually contains a computer, networked peripheral, or network device.
Node
Window Phone apps run on _____.
None of the above
Today's ____ editing simply requires a computer hard disk and video editing software.
Nonlinear
You and Harry are discussing firewalls. You explain that he has a firewall built into Windows. He says he has one that came with his virus protection. He should _______.
Not enable the Windows firewall if his antivirus software firewall is activated
A laptop computer (also referred to as a ______ computer) is a small, lightweight portable computer that opens like a clamshell to reveal a screen and keyboard.
Notebook
______ has been slow to catch on as a popular standard.
Ogg Vorbis
Web sites that offer storage space for backups are called ____ backup services.
Online
The ______ in machine language is a command word for an operation such as add, compare, or jump.
Op code
A shrink-wrap license goes into effect as soon as you ____.
Open it
Andy sent Tom a picture file as a JPEG. Tom wants to convert it to a GIF. To do that, Tom should ______.
Open it in Paint and convert it
________ may be sold or distributed free of charge in compiled form but must always include the source code.
Open source software
The _______ from an instruction specifies the data.
Operand
A(n) _____ system is a type of system software that acts as the master controller for all activities that take place within a computer system.
Operating
CD, DVD, and Blu-ray technologies can be classified as ____ storage.
Optical
In a classic Webmail configuration, messages are sent immediately and thus a(n) ____ is not needed.
Outbox
PayPal is a pioneering example of a(n) ____ payment system.
P2P (person-to-person)
A _____ is a term sometimes used to refer to the interconnection of personal digital devices or consumer electronics within a range of about 30 feet and without the use of wires or cables.
PAN
_______ is the most widely used language for communications between computers and printers.
PCL
Adobe Reader works with files stored in standard ____ format.
______ software may be used by personal computer users when they want to encrypt e-mail or other documents.
PGP
Incoming mail can be stored on a(n) ____ server until it is downloaded to the inbox on your hard disk.
POP3
______, also referred to as personal mode, is a type of WPA used on most home networks.
PSK
On an Ethernet, a ____ is broadcast to every device but is accepted only by the device to which it is addressed.
Packet
In the technology referred to as ____, a message is divided into several parcels that can be routed independently to their destination.
Packet switching
In relation to disks, ____ is a recording technology that lets you record in multiple sessions.
Packet writing
Many of today's microprocessors perform ____, in which multiple instructions are executed at the same time.
Parallel processing
Voice-overs and narrations are often recorded with a sampling rate of 11 KHz, which means that 11,000 samples are taken ____.
Per second
The term ____ designates equipment that might be added to a computer system to enhance its functionality.
Peripheral device
A _____ HTTP connection reuses the same HTTP connection to send and receive multiple requests.
Persistent
______ schemes redirect users to fake sites by poisoning a domain name server with a fake IP address.
Pharming
An e-mail scam designed to persuade you into revealing confidential information by replying to an e-mail is called ____.
Phishing
DSL uses ____ to transmit data.
Phone lines
"Reh" and "gay" are examples of _______ that speech synthesizers string together to form words.
Phonemes
A description of what actually happens on the disk and in the circuits is represented by a _______.
Physical storage model
A technology called _______ allows the processor to begin executing another instruction before it completes the previous instruction.
Pipelining
Dot pitch is the distance in millimeters between like-colored ____ —the small dots of light that form an image.
Pixels
______ shifting is often achieved using computer networks, as when you stream a movie from your computer to your Wi-Fi equipped DVD player to your Wi-Fi equipped HDTV.
Place
A message that has not been encrypted is referred to as ______.
Plaintext
A hard disk ____ is a flat, rigid disk made of aluminum or glass and coated with magnetic iron oxide particles
Platter
DNS cache ____ has been used by governments to keep citizens away from Web sites that supply politically or culturally inflammatory information.
Poisoning
A(n) ________ computer is a small, lightweight personal computer with screen, keyboard, storage, and processing components integrated into a single unit.
Portable
The ability to easily move your Internet service from one location to another is considered ______ Internet service.
Portable
Network services such as the Web, ftp, and e-mail operate from _______.
Ports
Sharing files on a LAN or the Internet requires open _____.
Ports
A ______ is a sudden increase or spike in electrical energy, affecting the current that flows to the electrical outlets.
Power surge
The use of automated software to locate computers that are vulnerable to unauthorized access is a port _____.
Probe
Solid state storage, also called flash memory storage, _____.
Provides fairly fast access to data
A service pack ______.
Provides updates to the operating system
A tradeoff to the anonymity offered by anonymous ____ is that they tend not to operate at the same speed as your regular browser.
Proxies
Software that may be freely copied, distributed, and even resold is ____.
Public domain
______ encryption uses one key to encrypt a message but another key to decrypt the message.
Public key
_______ is a crucial technology for e-commerce and e-mail.
Public key encryption
_____ simply requires you to fill out a form with the type of data you want to locate in a database.
QBE
To find a particular record or group of records in a database, you use a(n) _______.
Query
A search engine's ______ looks for your search terms in the search engine's indexed database and returns a list of relevant Web sites.
Query processor
For the next search, she wants only Web pages containing the complete phrase "Mars exploration." Which screen operator should she use to formulate the query?
Quotation marks
Cindy wants to know how a computer can run more than one program at a time. You explain to her that the operating system allocates specific areas of memory for each program. This memory is called ______.
RAM
Cindy wants to know where the kernel is stored. You tell her that it stays in _____ all the time your computer is on.
RAM
______ is a temporary holding area for data, application program instructions, and the operating system.
RAM
Most wireless networks transport data as ____ signals.
RF (radio frequency)
_____ is the ability of a device to "jump" directly to the requested data.
Random access
A vector graphic can quite easily be converted into a bitmap graphic through a process called ____.
Rasterizing
Thomas's fiend has a particular file that he wants to allow authorized people to open and view without being able to modify or delete it. What kind of permission should Thomas assign to this file?
Read
When using word processing software to analyze the reading level of your document, you should use a ____.
Readability formula
Application software is designed to accomplish ______ tasks.
Real-world
A(n) _______ disk is a bootable CD, DVD, or other media that contains a complete copy of your computer's hard disk as it existed when the computer was new.
Recovery
The Windows _____ is a database that keeps track of your computer's peripheral devices, software, preferences and settings.
Registry
Sally tells James that if he wants the cell reference to automatically change when moved or copied, he should use a(n) ______ reference.
Relative
The strengths of Microsoft Windows include all of the following EXCEPT ______.
Reliability
The process of covering a wireframe with surface color and texture is called _____.
Rendering
A ______ is a network device that extends the range of a network by restoring signals to maximum strength and retransmitting them.
Repeater
If Paul is most concerned with the sharpness of the images and text he will be printing, he should focus on comparing the ______ of the printers he is considering purchasing.
Resolution
The quality of a bitmap graphic is ____ dependent.
Resolution
When a bitmap graphic is enlarged, it still retains its original ____.
Resolution
The main directory maintained by your computer's operating system is the ____ directory.
Root
The process of overcoming limitations imposed by mobile service providers on an Android phone is called ____.
Rooting
A ________ IP address is one which can be accessed by packets on the Internet.
Routable
Before using your network, you should adjust the configuration settings of the ____ to make sure your network is secure.
Router
One important security precaution when connecting your computer to public networks is to install a(n) ______.
Router
The most important network device is a ______.
Router
_______ are intended to work within LANs to monitor and direct packets being transported from one device to another.
Routers
To get rid of software you no longer want from a PC, you ____.
Run an uninstall routine
VoIP software is sometimes referred to as a(n) ____ client.
SIP
Most routers ship with a(n) ____ predefined by the manufacturer.
SSID
In areas where there are overlapping wireless networks, such as in a city or on a college campus, ______ help you log in to the right network, rather than a network run by a hacker who will try to such important information off your computer as soon as your connect.
SSIDs
Amelia explains that there is a difference between HTTP and HTTPS. HTTPS is a combination of HTTP and ____
SSL/TLS
_______ plates leave an indelible tattoo on your computer equipment, which contains a unique ID number registered in an international database.
STOP
_____ is supported by most modern browsers without requiring a plug-in; it supports gradients, drop shadows, multiple levels of transparency, and animation effects, along with portability to other platforms, such as handheld computers and cellular phones.
SVG
_______ is a limited version of Windows that allows you to use your mouse, screen and keyboard but no other peripheral devices.
Safe Mode
CSS stands for Content ____ System.
Scramble
The disadvantage of WAP-enabled devices is their _____.
Screen size
A(n) _______ helps people locate information on the Web by formulating simple keyword queries.
Search engine
A virus signature is a _______.
Section of program code used to identify a known malicious program
A popular ______ activity is verifying billing data at an e-commerce site.
Server-side
______ scripts accept data submitted by a form, process that data, and then generate a custom HTML document that is sent to the browser for display.
Server-side
_____ is typically copyrighted software that is marketed under a try-before-you buy policy.
Shareware
On a home network, file ____ allows you to view and copy photos, for example, from your desktop computer to a tablet computer.
Sharing
One of Tom's employees told him about a ______ license that goes into effect as soon as you open the packaging.
Shrink-wrap
Tom will be the only person using the license, so he needs a _______ license.
Single-user
You tell Cindy that the type of operating system that expects to deal with one set of input devices is a ______.
Single-user
Tom has another need. Everyone at the company needs word processing software. You advise Tom to use a license that is priced at a flat rate. It is called a _______ license.
Site
An HTTP exchange takes place over a pair of ____.
Sockets
For HTTP, ____ usually are associated with port 80 on the client and server.
Sockets
A command to print a document is relayed through various levels of ______.
Software
The term rootkit refers to ______,
Software tools used to conceal malware and backdoors
Tom asked Andy if he converts a file, will it be identical to the original? Andy should tell him ____.
Sometimes
An extension of .wav designates a ____ type of file.
Sound
A(n) ____ is a device that contains a variety of input and output jacks, plus audio-processing circuitry.
Sound card
A(n) _____ is a type of utility software that captures unsolicited e-mails before they reach your inbox.
Spam filter
If you have dialed Directory Assistance lately to obtain a telephone number, you have probably encountered ____.
Speech recognition
Joseph has noticed that a visually impaired co-worker has a ____ to read the computer screen aloud when she browses the Internet.
Speech synthesizer
______ is NOT true.
Speed increases a signal strength decreases
A Web server's response to a browser's request includes an HTTP ______ that indicates whether the browser's request could be fulfilled.
Status code
Keyword ____ is an unethical practice in which meta keywords are manipulated to gain high relevancy rankings.
Stuffing
A ______ is an additional set of commands that the computer displays after you make a selection from the main menu.
Submenu
An extension of .ocx designates a ____ type of file.
Support
Visitors to a Web site are sometimes called Web ____.
Surfers
A(n) ______ strip monitors the electrical current that passes from the outlet to all the devices plugged into the strip.
Surge
Power ____ can originate from a number of sources: downed power lines, power grid switching by the electric company, faulty wiring, and large appliances powering on and off.
Surges
With BitTorrent, as more computers request the file, they become part of a ____ that uses peer-to-peer technology to exchange file pieces with each other.
Swarm
A ______ is a network device that intelligently facilitates communication among multiple devices on a network.
Switch
In ______ key encryption, the key used to encrypt a message is also used to decrypt the message.
Symmetric
_____ compares the content of files on two devices and makes them the same.
Synchronization
Both SSL and its successor, ____, are protocols that encrypt data traveling between a client computer and an HTTP server.
TLS
A file ____, in the context of Windows, is a piece of information that describes a file.
Tag
Messaging and chat protocols include all of the following EXCEPT _____.
Talkie
Sally has heard that cellular data service has poor quality. You tell her ______.
That it depends on the generation of the technology being used
Harry's daughter has a personal VPN. He had decided he wants to be current and wants one also. You tell him ______.
That it would provide extra security if he intends to use public Wi-Fi hotspots
You decide to use public encryption to protect e-commerce transactions. Once the browser uses the public key it receives from the server to encrypt the credit card information, who can decrypt the message?
The Web server with access to the private key
After videotaping her sister's wedding with an analog video camera, Nancy decided to edit out some of the footage using her computer. She finds that, although she has connected her camera, with the videotape, to her computer, she cannot access the video footage. Why?
The analog video footage must first be converted into a digital form.
Nancy is working on a class project. She has converted a vector image of a sunset into a bitmap graphic. Nancy tried to change the color of the sun object from red to orange, but she is unable to make this change. Why?
The graphic no longer has the qualities of a vector graphic, therefore she cannot easily change the color of one specific object
Amelia tells Mark that when he enters a URL in his browser's Address box and presses the Enter key, a communications process begins. The domain name contained in the URL leads to a Web server that his browser contacts. The browser opens a socket and connects to a similar open socket at the Web server. Then the browser generates and sends and HTTP message through the socket. The server responds by sending back the requested HTML document through the open sockets. At this point, Amelia tells Mark, the final step in which the process occurs. What is this last step?
The server closes its socket, and the browser closes its socket
Which of the following would NOT be true of computers priced higher than $1,200?
These computers do not adequately support video editing tasks.
The following is NOT true of broadcast flags: _____.
They permit global access to content use.
Which of the following is NOT a true statement that Karen learns about microcontrollers?
They tend to be environmentally unfriendly
The _______ phase of the digital revolution materialized in the 1990s when the Internet was opened to public use.
Third
______ shifting is the process of recording a broadcast so that it can be played back at a more convenient time.
Time
Tablet computers, handheld devices, retail store self checkouts, and information kiosks collect input from a ______.
Touchscreen
______ are the form factor of choice for computer owners who might want to upgrade components in the future because it is easy to get inside the case and swap out parts.
Tower units
________ software locates the edges of objects in a bitmap image and converts the resulting shapes into vector graphic objects.
Tracing
A _______ is a touch-sensitive surface on which you can slide your fingers to move the on-screen pointer.
Trackpad
One file storage metaphor that is based on a hierarchical diagram is sometimes referred to as a ____ structure.
Tree
Another possibility is that ACME Widget Company has a ______ that seems to perform one function while actually doing something else.
Trojan horse
Satellite Internet service and TV service requires ______.
Two satellite dishes and a modem
The operating system that has developed in 1969 at AT&T's Bell Labs and gained a good reputation for its dependability is ______.
UNIX
A _______ is a device that not only provides surge protection, but also furnishes your computer with battery backup power during a power outage.
UPS
If Perry decides that he does not need the computer equivalent of a luxury automobile, and that his needs are more in line with those of the average user, what can he expect to pay?
US $500 to $1,200
If your computer and your camera have ______ ports, you can connect a cable between these two ports to transfer the photo data.
USB
You can connect most standard microphones to your computer through the microphone socket or ____ port.
USB
An easy way to back up your important data is simply by copying selected files to a ____.
USB flash drive
What is the best storage medium for storing James' three databases, each of which is approximately 500 MB?
USB flash drive
Which of the following is NOT an advantage of using a wired network?
Unlimited mobility
The rate of data that is transmitted from your computer to the Internet is ____.
Upstream speed
To avoid becoming a spam victim, you should _______.
Use a disposable e-mail address when you register it for online sites
Nancy is using codec software to reduce the size of some of her video files by allowing her to specify a compression ratio or bitrate. If she is very concerned with minimizing the size of her video files, she could ____.
Use a high compression ratio
Ethernet networks _____.
Use a nonproprietary technology, making Ethernet equipment available from a variety of vendors
Jessica has an always-on connection to the Internet. She has read about IP addresses and knows that some Web sites can track them. She would like the surf the Internet anonymously to protect her privacy. How can she do this?
Use an anonymous proxy service
To delete data from a disk in such a way that no one can ever read it, you should ____.
Use special file shredder software
The type of system software designed to help you monitor and configure settings for your computer system equipment is ______ software.
Utility
A _____ graphic consists of a set of instructions for re-creating a picture.
Vector
One clue that an image might be a ____ graphic is a flat, cartoon-like quality.
Vector
You plan to create a cartoon-like image of a computer to be used in a flyer for your school's computer lab. You should create a _____ graphic.
Vector
The process of converting analog video signals into a digital format is referred to as _____.
Video capture
VMWare and Parallels Desktop software are examples of ____.
Virtual machine software
If a program exceeds its allocated space, the operating system uses an area of the hard disk, called ____________ , to store parts of programs or data files until they are needed.
Virtual memory
You think that the computers at ACME Widget Company may be infected with a ______. You explain that it is a set of program instructions that attaches itself to a file and spreads to other files.
Virus
Unlike disk storage, most RAM is ____.
Volatile
A communications protocol that provides Internet access from handheld devices is _____.
WAP
_____ is supported by browsers without a plug-in.
WAV
The original wireless encryption was called ____.
WEP
_______ requires Windows Media Player 9 or above.
WMA
Which is the highest resolution?
WQXGA
RAM can be thought of as the _______ for the computer's processor.
Waiting room
A _____ palette contains a standard set of colors used by most Internet Web browsers.
Web
The _______ is a collection of linked documents, graphics, and sounds.
Web
______ provides tools specifically designed to enter and format Web page text, graphics, and links.
Web authoring software
When you view a page infested with a(n) ____, an HTTP set-cookie request automatically goes to a third-party server, which may set a cookie on your computer for later retrieval or record your IP address.
Web bug
The following statement is NOT true: _______.
Web pages that provide a secure connection start with httpx: instead of http:.
A(n) _____ is a collection of related information organized and formatted so it can be accessed using software called a browser.
Web site
Melissa is concerned about the security of her computer, and she wants to avoid malicious exploits, which can work their way into her computer through various security holes. Which type of e-mail service has been the target of many such exploits?
Webmail
Melissa is planning to travel a great deal in the coming weeks. She will not be taking her computer with her, but she knows that the hotels she will be staying at have business centers with Internet-enabled computers. She plans to access her e-mail account every day so the she can quickly respond should she be contacted by a prospective employer. Which one of the following account types should she use?
Webmail
ROM BIOS is a small set of instructions that tells the computer all of the following EXCEPT ____.
What the data transfer rate should be
Spreadsheets are particularly useful for ____.
What-if analysis
When should she use a digital camera rather than a scanner?
When she wants to create an image of a real object
Esteban decides to install a wireless network. Which LAN technology will he most likely choose?
Wi-Fi
The most popular wireless LAN technology is ____.
Wi-Fi
To connect a phone or other device to a network, make sure that ______ is enabled, then wait for the device to sense the network, and when asked, enter the encryption key.
Wi-Fi
An Ethernet-compatible network standard designated as IEEE 802.16 is ____.
WiMAX
______ is a wireless MAN or WAN technology commonly used for fixed Internet access.
WiMAX
The number and variety of programs that run on ______ are unmatched by any other operating system.
Windows
3-D graphics software provides a set of tools for creating ____ that represent three-dimensional objects.
Wireframes
Sometimes Sally wants to browse the Internet while sitting and enjoying a cup of coffee. She has heard that there are some public WiFi options but she knows there are some limitations. You tell her ______.
Wireless eavesdroppers can access personal info
A(n) _____ is the basis for scrambling and unscrambling the data transmitted between wireless devices.
Wireless encryption key
Productivity software that provides you with the ability to create, spell-check, edit, and format is considered ____ software.
Word processing
An example of software most commonly associated with productivity software is ____.
Word processing software
A ______ is NOT a type of network device.
Workstation
ACME Widget Company is concerned it may have a _______, which is a self-replicating program designed to carry out some unauthorized activity on a victim's computer.
Worm
Word ____ determines how your text flows from line to line by automatically moving words down to the next line as you reach the right margin in a word processing document.
Wrap
Thomas's friend has a particular folder into which he wants to allow people to put files without allowing them to open, copy or change any files in that folder. What kind of permission should Thomas assign to this folder?
Write only
You describe WiMAX to Sally. You tell her ______.
You can use the same provider for home and mobile use
You need your own domain name if ____.
You have your own Web site
When you use a search engine, it stores all of the following information about your query EXCEPT ____.
Your name
The following is NOT a technique used to produce video footage that will maintain good quality as it is edited and processed: _____.
Zoom in and out quickly
The _____ protocol allows the transfer of files from one computer to another over any TCP/IP network.
ftp
Jim wants to know what machine language instructions look like to the machine. You tell him they appear as _______.
A series of 0s and 1s
During the period from ________, computing was characterized by the Web, e-mail, multiplayer games, music downloads, and enormous software applications.
1995-2010
The binary number 10 represents _______ in the decimal number system.
2
Myspace lost steam in _____, but Facebook and Twitter marched ahead by attracting millions of users.
2008
Mike and Andre consider themselves to be average consumers when it comes to digital devices. In light of this, each of them could be expected to own more than ________ digital devices.
24
In terms of an authentication protocol, the phrase 'something a person knows' refers to _______.
A password