CGS FINAL

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Select the common image file formats.

.jpg .png

Select the common video file formats.

.mov .avi

Select the common audio file formats.

.mp3 .mp4 (M4A) .wav

Select the common word processing file extensions.

.odf .docx

Select the advantages of using a database instead of a traditional filing system.

A database can hold larger amounts of data A database can provide better data integrity

FireWire connectors were developed for ___ computers.

Apple

When you make an online purchase and enter your shipping or billing information, you're actually filling out a form that was generated by a database management system. The DBMS subsystem that allows for form creation is the ___ generation subsystem.

Application

Select the cell phone manufacturers.

Blackberry Xiaomi Huawei

If you have 2 folders open on your desktop and you want to copy a file from one folder to the other, hold down ___ and drag the file.

CTRL

One way to copy a file to a new location is to click on the file and press CTRL + C, then move your cursor to the new site and press ___ .

CTRL + V

Which of the following are examples of downloading a file?

Copying a driver from a company's website and saving it to your computer. Buying a song on iTunes so you can listen to it on your phone. Copying a photo from Facebook and saving it to your desktop.

An attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests is called a _____ attack.

DDoS

The DBMS subsystem that allows for data recovery, support, and maintaining and securing the database is called the ___ subsystem.

Data Administration

What element of a database field specifies the data in a field such as text, numeric, or date/time?

Data Type

Amazon.com allows you to search for thousands and thousands of items using images and information that are organized logically. This much storage and management requires a complex ___ .

Database

Because he wanted to be able to sort gifts according to continent and time zone, in 1984 Santa switched from using long lists to using ___ .

Databases

SAGE was developed by the US Department of ___ .

Defense

An integral part of a databases management system (DBMS) is the Data Definition subsection. This subsection uses a data schema, also called a data ___ .

Dictionary

A database that stores data in different physical locations and that users access though client/server networks is called a ___ database.

Distributed

A DDoS attack is when computers that have been infected by a virus act as "zombies" and work together to send out illegitimate messages creating huge volumes of network traffic. The acronym DDoS stands for ___ .

Distributed Denial of Service

If you see the extension .xlsx, you know that you are looking at a(n) ___ file.

Excel

A quick way to rename files or folders in Windows is to select the item and then press the ___ key.

F2

In a database a _____ is a group of related characters in a database table that represents a characteristic of someone or something.

Field

You created a flyer and saved it in your Documents folder. To find this file you could open Cortana (in Windows 10) and type the flyer's name in the search window, or you could click on the ___ icon (all Windows versions, on your toolbar) and access the Documents folder from there.

File Explorer

The protocol used for transmitting large files from one server to another over the Internet is known as the ___ Protocol (FTP).

File Transfer

To control how information is entered into a database, programmers and database administrators create ___ to help ensure data integrity.

Forms

Databases are built by starting with single characters of data, organizing the data into fields, organizing the related fields into records, the records then make up a table. This organization is referred to as a data ___ .

Hierarchy

Which of the following should be considered when choosing an ISP?

How many users will be logged on my network at the same time? Will user's be streaming data? What ISP choices are available in my area?

Which of the following are true regarding IP addresses?

IP stands for Internet Protocol. In most home networks IP addresses are assigned by the Internet Service Provider. If two laptops are connected to the same home network and surfing the web simultaneously, they share the same IP address.

Adam was in the fifth grade when he was adopted by the Smith's. Because his school used a centralized database, all of his teachers had his correct name on their grade reports. This is an example of how a centralized database can help improve data ___ .

Integrity

Firewall software used to block a user's access to specific Internet content is called a(n) _____ filter.

Internet

Select the examples of streaming.

Listening to Pandora. Watching a YouTube video. Watching a movie on Netflix.

The DBMS engine provides an interface for the end user of the database. This interface is called the ___ view.

Logical

Connecting digital musical devices to computers is accomplished by using ___ ports.

MIDI

When you receive a utility bill, you're actually getting a report that was generated by a database management system. The DBMS subsystem that provides for data maintenance, analysis, and the generation of reports is called the data ___ subsystem.

Manipulation

Broadband is measured in _____ .

Mbps

A complex database that organizes and stores information in a cube format and has measure attributes and feature attributes is called a ___ database.

Multidimensional

Choose the Samsung Galaxy tablet options.

Note series Tab series

Microsoft offers free cloud storage for everyone who has a Microsoft email account. This storage is called Microsoft ___ .

OneDrive

Changing the appearance of your can make it easier to keep your information organized. To change your folder's appearance, first click on the folder, and then go to the command bar and click ___ .

Organize

You own a pet care center. what fields might you enter when you create a table for dogs that you care for?

Owner's last name Pet's name

Check all the activities that would be considered uploading a file to the Internet.

Posting a photo on social media. Placing an ad on Craigslist. Posting a YouTube video.

Which of the following are common email viruses.

Ransomware keystroke logging Trojan adware

In the datasheet view of a relational database (such as Microsoft Access) a row of information is called a ___ .

Record

A link between tables in a relational database that defines how the data is related is called a _____.

Relationship

Because they're both Apple products, the browser that works smoothest with Macintosh OS X is ___ .

Safari

You're tired of losing documents so you've decided to save your research paper to your desktop where you know you'll be able to locate it quickly. To save it to the desktop, you first click the File tab to open the file menu. Next you select ___ .

Save As

To look for a file or folder in Windows 10, just type the file name in the __ box.

Search

Your college has a database with a Students table. Which of the following could be a primary key in the table?

Student number Social Security Number

What group determines the standards for the World Wide Web?

The World Wide Web Consortium (W3C)

By default Windows hides file extensions for known file types but you can unhide them if you wish.

True

Some cell phone carriers promising "unlimited data" will actually limit your high-speed, 4G LTE data to a couple of gigabytes per month.

True

Your network's mobile switching station locates the MSS of the person you're calling, even if they use a different cell phone provider.

True

Spam messages are sometimes referred to as ___.

UBE

URL stands for ___ Resource Locator.

Uniform

Select what's true about passwords.

Use a combination of letters, symbols, and numbers; the more characters you use, the more secure your password will be. Regularly check your accounts to ensure they have not been tampered with.

The data definition, as described in the data dictionary, tells users how each unit of data is defined in the database. Which of the following elements will be used to describe the data?

What field name will the data fall under. What data type will be included

Many cellular ISPs offer modem/router combination devices that can create a _____ wherever there's adequate cell service.

Wi-Fi hotspot

Though not yet commercially successful, the ___ was developed by one of the world's largest software manufacturers.

Windows Phone

Software that collects the user's web browsing history and uses the data collected to create unsolicited targeted pop-up advertisements is called _____ .

adware

Software applications that allow users to access and surf the World Wide Web are called ___ .

browsers

Select what's true regarding dual band routers.

can transmit Wi-Fi signals in the 2.4 GHz frequency range can transmit Wi-Fi signals in the 5.0 GHz frequency range minimizes the impact of interference from microwave ovens and car alarms

To select a folder, simply put your cursor on it and ___ .

click

Select the characteristics of a Base Transceiver Station

connected to a cell tower broadcasts weak microwave signals to create "cells" of mobile coverage sends phone signals to the cellular provider's Mobile Switching Station (MSS)

Select the characteristics of a router.

connects networks provides hardware firewall protection usually incorporates a switch

Select the characteristics of a traditional hard drive.

contains platters contains read/write heads stores data magnetically

The two main components of a processor are the arithmetic logic unit (ALU) and the _____ unit.

control

A small text file of information created by websites you visit that your web browser stores on your hard disk is called a(n) _____.

cookie

Before you can start tethering, verify that it's included in your cell phone's ___ plan

data

Being able to surf the web, watch videos, and listen to steaming audio is why cell service with a ___ plan is extremely popular in the U.S.

data

Which of the following would be considered a cybercrime?

data manipulation

Which of the following are considered cybercrimes?

data manipulation data corruption cyberbullying

Devices with a separate system unit and a relatively large footprint are called _____ computers.

desktop

The devices inside your phone that convert analog waves (such as sound waves) into digital signals that your phone can process are called ___ .

digital - analog converters

Identify common symptoms of a computer virus.

documents won't save computer runs extremely slowly programs launch on their own

If you have 2 folders open on your desktop and you want to move a file from one folder to the other, simply ___ the file.

drag

Routers that can send Internet signals over 2 distinct frequencies are called _____ routers.

dual band

Select the statements that are true regarding Fiber Optic Internet service.

fastest home network option when available not available in all areas signal is carried by light waves so it's less subject to electromagnetic interference

A URL identifies a particular __ address on the World Wide Web.

file

The act of hacking, or breaking into a computer system, for a politically or socially motivated purposes is called _____.

hacktivism

The cost of an SSD is ____ than the cost of a traditional hard drive.

higher

In order to sync your iPhone to your MacBook you must first open the ___ app.

iTunes

A television remote usually uses ___ waves.

infrared (IR)

A form of spyware that records all actions typed on a keyboard is called a _____ logger.

keystroke

Megahertz is equal to one _____ cycles (or instructions) per second.

million

Select the advantages of a 3G phone

more energy efficient - battery lasts longer less expensive

When a computer is shut down, the information in the memory (the RAM, the caches, the registers) is ___ .

not saved

Running the processor faster than recommended by the manufacturer is called _____ . This can increase performance and speed, but will also void the manufacturer warranty.

overclocking

Cookies stored on a computer's hard drive and used to collect and store information about user preferences, password and username information, IP address, and/or data on web surfing behavior are called ___ cookies.

persistent

To listen to an .mp4 (M4A) file, you'll need an app such as iTunes or QuickTime. These apps are called audio ___ .

players

To watch an .mpeg file, you'll need an app such as Windows Media Player or QuickTime. These apps are called video ___ .

players

Select the characteristics of a OneDrive account

requires a Microsoft Email account provides free cloud storage can serve as extra storage space

The device that connects 2 networks is a _____.

router

Contact your ISP if your actual Internet speed is _____ than advertised.

slower

Devices that allow for the retention of data when your computer has been shut down are called ___ devices.

storage

Persistent cookies store information about

user preferences

Select the statements that are true regarding cable Internet service.

uses the same coaxial cable that brings the cable television signal usually has more bandwidth than DSL lines Internet service can often be bundled with television service

Software that infects a computer and is created using computer code is called a computer _____.

virus

A destructive program that replicates itself throughout a single computer or across a network is called a _____.

worm


संबंधित स्टडी सेट्स

history exam 3 film questions & class notes

View Set

Primary & Secondary Markets/Financing Concepts - 5

View Set

CS Principles Unit 2 Study Guide

View Set