CGS Final 2060
Sage was developed during the _____ war.
Cold
The first commercially available computer with a graphical user interface was NeXT's _______ computer
Cube
Broadband is measured in _____ .
Mbps
To search a database for information, create a ___ .
Query
Which of the following are common email viruses
Ransomware Keystroke logging Trojan
A link between tables in a relational database that defines how the data is related is called a _____.
Relationship
If you accidentally delete a file it's not lost forever! Just go to your recycle bin, select the item, and click ___ .
Restore
You're tired of losing documents so you've decided to save your research paper to your desktop where you know you'll be able to locate it quickly. To save it to the desktop, you first click the File tab to open the file menu. Next you select ___ .
Save As
Select what's true about object-oriented databases.
Store instructions for how to compute the data as well as the data to be processed Equipped to handle unstructured data such as MP4 files, video, images, and extremely large files Use Object Query Language to construct queries that extract data from the database
Select the usual tasks of information systems (IS) program managers.
Supervising IS technicians. Working with developers and senior management to procure and implement IS processes. Developing training plans and policies for IS.
Transmission media can be either wired or wireless.
True
The volume of data that can be carried on an Internet transmission media in an amount of time is called _____.
bandwidth
Cell towers are connected to ___ .
base transceiver stations
Software applications that allow users to access and surf the World Wide Web are called ___ .
browsers
When you ___ a file Windows should automatically open it. If it can't Windows will prompt you to select the correct app to open the file.
double-click
The act of hacking, or breaking into a computer system, for a politically or socially motivated purpose is called
hacktivism
For _____ it may be less expensive to add an existing cell phone data plan and to use the phone as a hotspot than to add wired Internet service.
individual users
Because of the large infrastructure cost of building antennae and mobile switching stations, as well as leasing the rights to use radio frequencies, only ___ companies can compete nationally as cell phone providers.
large
Paul Baran developed a technology called _____ switching that made the Internet possible and reliable.
packet
The BitTorrent protocol is often called ___ file sharing.
peer-to-peer
To listen to an .mp4 (M4A) file, you'll need an app such as iTunes or QuickTime. These apps are called audio ___ .
players
Select the statements that are true regarding Cellular Internet service.
uses cell phone radio waves to transmit and receive Internet signals Many providers offer data packages that may place limits on uploading and downloading. Many smartphones can send and receive WiFi signal, allowing them to become hotspots.
In a database a _____ is a group of related characters in a database table that represents a characteristic of someone or something.
Field
You created a flyer and saved it in your Documents folder. To find this file you could open Cortana (in Windows 10) and type the flyer's name in the search window, or you could click on the ___ icon (all Windows versions, on your toolbar) and access the Documents folder from there.
File Explorer
The protocol used for transmitting large files from one server to another over the Internet is known as the ___ Protocol (FTP).
File Transfer
The protocol used for transmitting large files from one server to another over the Internet is known as the ____ Protocol (FTP)
File Transfer
Select the Amazon tablets.
Fire HD Fire HDX Nexus Pro
To control how information is entered into a database, programmers and database administrators create ___ to help ensure data integrity.
Forms
Select the email services.
Gmail Outlook iCloud
Letting computer users drag images and documents across their computers' monitors made the ___ User Interface very popular.
Graphical
The Bit Torrent protocol allows members to share large files over the Internet.
True
URL stands for ___ Resource Locator.
Uniform
To change the size of your folder's icon, just right-click on a blank area of the contents pane and click ___ .
View
Common types of malware include
Viruses Worms Trojan horses
The wireless network privacy standard that was introduced in 2003 but was quickly replaced (due to numerous vulnerabilities) was known as ___ .
WPA
Select what's true about the privacy risks with cookies
Websites using cookies can collect your information and sell it to third parties Websites can track your surfing behavior and create a profile
Select what's true about the privacy risks with cookies
Websites using cookies can collect your information and sell it to third parties Websites can track your surfing behavior and create a profile
Errors in data occurring while entering, reading, processing, storing or transmitting is known as data ___.
corruption
What was the major question that ARPAnet wanted to solve?
could newtork be built that would continue to work even if multiple parts collapsed?
Harming or harassing a person or group of people via information technology and networks in a repeated and deliberate manner is called
cyberbullying
Before you can start tethering, verify that it's included in your cell phone's ___ plan
data
Being able to surf the web, watch videos, and listen to steaming audio is why cell service with a ___ plan is extremely popular in the U.S.
data
Select the characteristics of the IOS.
developed by Apple for Apple products used on iPhones and iPads comes with Siri, iTunes, iBooks, etc.
Select the methods of using cloud storage.
emailing a file to yourself saving a photo on Flickr
Software that limits the material that a browser fetches or that a search engine displays are called ___ .
filters
In order to keep your files organized, it's a good idea to create ___ and place your files in them.
folders
Which of the following file extensions is commonly used for drawings?
gif
Cell phones send and receive extremely weak ___ signals to and from cell towers.
microwave
Fiber optic cable is ________ expensive than coaxial cable to install
more
When choosing a cell phone provider, factors to consider include
network size/coverage. service/speed. pricing
Though legal, which of the following would likely be prohibited by a typical business computer-use policy?
playing online games
Software that can be added to a browser to increase its functionality are called ___ .
plug-ins
If you just need a phone for emergencies, you might consider a ___ phone.
prepaid
Select the reasons for compressing a file.
reduce the bandwidth needed to transmit a file reduce storage space requirements
Lossless
reduces space required by reducing redundancy within files
Lossy
reduces space required by removing less valuable data
An easy way to create a new folder in Windows is to ___ on any area in the Contents pane, and then click New and Folder.
right-click
If you're in an area where your home network has no cell coverage, you may need to use the cellular network of a different provider. This is called ___ .
roaming
Which are of the following are Internet service options?
satellite cable
The two major concerns regarding cloud storage are reliability and ___ .
security
After verifying that your data plan includes tethering, the first step in creating a hotspot with your Android phone is to click on the ___ icon.
settings
The small computer within your phone that enhances the sound quality of your call is called a digital ___ processor.
signal
You must individually adjust cookie settings in every browser you use
true
Select the statements that are true regarding Satellite Internet service.
uses microwaves to deliver service provides broadband service virtually anywhere Customers usually purchase a data plan that limits uploading and downloading.
Select the statements that are true regarding DSL Internet service.
uses telephone wires as transmission wires Internet signals tend to be very consistent
Select the characteristics of a modem.
usually provided by the ISP converts digital signals into analog signals
Some apps that use a surprising amount of data are those that include embedded ___ .
video
Select the advantages of using a database instead of a traditional filing system.
A database can hold larger amounts of data A database can provide better data integrity
If you just need a phone for calling and texting, a ___ phone can save you money.
3G
Which of the following file extensions is commonly used for term papers and other word processing tasks?
.docx
Select the common video file formats.
.mov .avi
A smartphone emits approximately ___ watts of microwaves.
0-1
When you make an online purchase and enter your shipping or billing information, you're actually filling out a form that was generated by a database management system. The DBMS subsystem that allows for form creation is the ___ generation subsystem.
Application
Because he wanted to be able to sort gifts according to continent and time zone, in 1984 Santa switched from using long lists to using ___ .
Databases
SAGE was developed by the US Department of ___ .
Defense
An integral part of a databases management system (DBMS) is the Data Definition subsection. This subsection uses a data schema, also called a data ___ .
Dictionary
Although it sounds ironic, searching the _____ in your area is an efficient way to search for an ISP.
Internet
Which of these browsers was developed by Microsoft?
Internet Explorer
ISP stands for:
Internet Service Provider
If you own a small business, what can you do to ensure your computers and data is kept secure?
Keep software updated, particularly antivirus software. Physically secure computers to minimize risk of theft. Backup your data regularly.
Select the examples of streaming.
Listening to Pandora. Watching a YouTube video. Watching a movie on Netflix.
The DBMS engine provides an interface for the end user of the database. This interface is called the ___ view.
Logical
Common symptoms of a computer virus infection include
OS doesn't launch properly files get deleted or encrypted strange error messages or pop-up ads.
There are several ways to rename a folder in Windows. Which of these would work?
On the command bar, click Organize and then click Rename. Right-click a folder and click Rename.
Select the following statements that are true regarding filters
Parents often use search engine filters to restrict offensive images from being displayed on computer monitors Filter settings are often acessed through a brower's preferences
There are several ways to create a new folder in Windows. Which of these would work?
Right-click a folder in the folders list. Click New and then click Folder. On the command bar, click New folder. Right-click any blank area in the Contents pane. Click New and then click Folder.
Which of the following refers to the distribution of computer applications over the Internet and is commonly referred to as web apps?
SaaS
Since it comes with a full computer operating system, some consider the ___ a laptop computer rather than a tablet computer.
Surface Pro 4
The World Wide Web was created through a collaboration led by ___ .
Tim Berners-Lee
Which of the following should be considered when choosing an ISP?
Will user's be streaming data?
Your computer has been attacked and overtaken by a hacker. The hacker has control over your computer and can now use it to launch attacks on other computers and systems. Your computer is known as a _____computer
Zombie
Zip
a lossless compression format
Software that collects the user's web browsing history and uses the data collected to create unsolicited targeted pop-up advertisements is called
adware
In order to change sound waves into digital signals, smartphones contain ___ - digital converter.
analog
Select the statements that are true regarding IP addresses.
assigned to your home network by your ISP means by which your network is identified by other servers and computers on the Internet ISPs often have blocks of IP addresses that they assign as demanded
The capacity of a particular transmission medium is called its
bandwidth
Which might be a choice for internet service in your area
cable internet
Select what's true regarding dual band routers.
can transmit Wi-Fi signals in the 2.4 GHz frequency range can transmit Wi-Fi signals in the 5.0 GHz frequency range
Select the usual tasks of a data analyst.
collects data interprets information provided by the database creates reports for senior management