CIS quiz 3 and 4

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Popular applications of ______ reality include gaming, healthcare, fashion, business, and training. Question 5 options: 1) virtual 2) virus 3) word processing 4) accounting 5) inventory

1) virtual

Personal interest applications include all of the following EXCEPT _____. Question 6 options: 1) lifestyle applications 2) entertainment applications 3) convenience applications 4) medical applications 5) legal applications

5) legal applications

Which best describes an app? Question 8 options: 1) A program that makes users more productive. 2) A series of related instructions. 3) Coordinates activities among computer or mobile device hardware. 4) Enables you to manage devices and media. 5) A hyperactive drive for transportation.

A program that makes users more productive.

Some peripheral devices use wireless communications technologies. Examples include ______. Question 39 options: 1) Thunderbolt and Lightning 2) Bluetooth and NFC 3) Zigbee and Lightning 4) Mesh and Thunderbolt 5) tablet and thin client

Bluetooth and NFC

Which of the following is NOT true about servers? Question 38 options: 1) Servers are typically located in a server farm. 2) Dedicated servers typically do not require a fast processor and use little memory. 3) Form factors for servers include rack, blade, and tower. 4) Services provided by servers include storing content and controlling access to network resources. 5) In many cases, a server accesses data, information, and programs on another server.

Dedicated servers typically do not require a fast processor and use little memory.

______ authoring software allows users to combine text, graphics, audio, video, and animation in an interactive application. Question 2 options: 1) Multimedia 2) Process 3) Website 4) Image 5) CAD

Multimedia

Which statement is NOT true about presentation software? Question 9 options: 1) Presentations are visual aids to communicate information to a group. 2) Presentations are viewed as clip shows. 3) Presentation software typically provides a variety of layouts for each slide. 4) When building a presentation, users can set the timing and add special effects. 5) Presentation software is a productivity app.

Presentations are viewed as clip shows.

Disc defragmentation is best described as __________. Question 3 options: 1) Reorganizing the hard disk so that files are stored in contiguous sectors. 2) Removing unnecessary files. 3) Compressing backup and other files to increase disk storage. 4) Installing partitions on the hard disk in order to run separate operating systems on the same computer. 5) A tool that removes a program, as well as any associated entries in the system files.

Reorganizing the hard disk so that files are stored in contiguous sectors.

______ software helps businesses record and report financial transactions. Question 7 options: 1) sales 2) marketing 3) accounting 4) inventory 5) shop floor

accounting

Product ______ is a technique that some manufacturers use to ensure you do not install software on more computers than legally licensed. Question 2 options: 1) certification 2) authorization 3) enrollment 4) activation 5) ordering

activation

Annoying programs that display an online advertisement in a banner or pop-up or pop-under window on webpages, email messages, or other Internet services are called ______. Question 12 options: 1) spyware 2) cracker 3) adware 4) open source 5) viral

adware

Ergonomics is ___________. Question 24 options: 1) often used with tablets and other mobile computers 2) a small, mobile computing device designed to be worn 3) a lightweight computer that enables warehouse employees to take inventory and check supplies 4) an applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace 5) a stable current flow and minimize the chances of an overvoltage reaching the computer and other electronic equipment

an applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace

A(n) _____ protects a computer against viruses by identifying and removing any computer viruses found in memory, on storage media, or on incoming files. Question 4 options: 1) antivirus program 2) trojan horse program 3) open source program 4) email program 5) legal program

antivirus program

You are viewing a 3D graphic of a human body that you can use to visualize various muscles and organs by zooming in and out. What type of app are you likely using? Question 17 options: 1) media player 2) augmented reality 3) video 4) CBT 5) digital camera

augmented reality

Fitness games often communicate with a(n) __________ board, which is shaped like a weight scale and contains sensors. Question 34 options: 1) step 2) motion 3) activity 4) wafer 5) balance

balance

Which communication application type requires real-time interaction? Question 8 options: 1) blog 2) mobile messaging 3) chat 4) email 5) file transfer

chat

______ computing refers to an environment that provides resources and services accessed via the Internet. Question 37 options: 1) Virtual 2) Cloud 3) Regional 4) Global 5) Intranet

cloud

The purpose of a __________ is to join a cable to a port.

connector

_______ often are used with tablets and other mobile computers, providing connections to peripheral devices. Question 23 options: 1) Lightning 2) Docking stations 3) Terminals 4) Triggers 5) Kiosks

docking stations

You are developing a spreadsheet for your small business. You are in the process of removing and adding text. What phase are you in? Question 5 options: 1) creation 2) editing 3) formatting 4) printing 5) sharing

editing

Examples of a(n) ______ computer for automobiles include antilock brakes, airbag control units, and cruise control. Question 24 options: 1) embedded 2) kiosk 3) desktop 4) tracker 5) stick

embedded

Sales, marketing, and manufacturing are all types of software typically used by a(n) ______. Question 15 options: 1) enterprise 2) individual 3) power user 4) server 5) accountant

enterprise

What part of the body does CVS impact? Question 31 options: 1) eyes 2) legs 3) ears 4) arms 5) wrists

eyes

What is the category of programs and apps under which screen savers and backup programs fall? Question 7 options: 1) security 2) communication 3) project management 4) productivity 5) file, disk, and system management

file, disk, and system management

_____ detect and protect a computer and its data from unauthorized intrusions. Question 20 options: 1) Personal firewalls 2) Phishing poles 3) CAD programs 4) Open source 5) Spam programs

firewalls

An example of a ________ computer is a lightweight computer that enables warehouse employees to take inventory and check supplies. Question 29 options: 1) stick 2) super 3) handheld 4) power 5) turbo

handheld

Search tools typically use a(n) ______, which stores a variety of information about a file. Question 9 options: 1) index 2) signature 3) directory 4) header 5) crab

index

Data that a computer accepts and processes is called ______. Question 40 options: 1) input 2) bytes 3) digital facts 4) output 5) information

input

A self-service ______ is a freestanding terminal that usually has a touch screen for user interaction. Examples include financial, photo, and ticket. Question 22 options: 1) server 2) stick 3) desktop 4) kiosk 5) laptop

kiosk

Sometimes called a system board, a(n) ______ is the main circuit board of a personal computer. Question 27 options: 1) dynamic 2) sisterboard 3) motherboard 4) Q-port 5) micro

motherboard

A(n) ______ app is written for a specific platform and can take advantage of specific features of the devices on which they are installed. Question 11 options: 1) native 2) embedded 3) creative 4) closed 5) open

native

______ software is an application that enables users to enter typed text or handwritten comments on a page. Question 13 options: 1) Memo writer 2) Word processing 3) Note taking 4) Text editor 5) Data storage

note taking

Which of the following is NOT an example of an operating system? Question 14 options: 1) macOS 2) Android 3) Office 4) Windows 5) iOS

office

Linux is an example of a(n) ______. Question 13 options: 1) backup utility 2) operating system 3) lifestyle app 4) security software 5) stable wearable

operating system

Information produced and stored by a computer is called ______. Question 25 options: 1) output 2) accurate 3) data 4) input 5) filler

output

A scam in which a perpetrator sends an official-looking email message that attempts to obtain your personal and/ or financial information is termed ________. Question 12 options: 1) phishing 2) standing 3) adware 4) email 5) instant messaging

phishing

The smallest element in an electronic image is called a(n) _______. Question 35 options: 1) HDMI 2) graph 3) pixel 4) CVS 5) thunderbolt

pixel

Font size is gauged by a measurement system called ______. Question 6 options: 1) points 2) pixels 3) em units 4) kerning 5) bytes

points

The point at which a peripheral device attaches to or communicates with a computer or mobile device is termed a(n) _______. Question 21 options: 1) terminal 2) kiosk 3) port 4) pixel 5) handheld

port

Another term for overvoltage is a(n) ______ surge. Question 28 options: 1) lightning 2) over 3) triple 4) power 5) trap

power

The two main components on the motherboard are ________. Question 22 options: 1) memory and storage 2) interpreter and compiler 3) processor and memory 4) storage and processor 5) compiler and processor

processor and memory

Under what category of programs and apps do databases and enterprise computing fall? Question 11 options: 1) productivity 2) security 3) file, disk, and system management 4) communication 5) project management

productivity

You are in charge of an event at work. You want to plan and schedule events and resources. What type of software should you use? Question 4 options: 1) project management 2) calendar 3) database 4) software suite 5) word processing

project management

Open source software is best described as _______. Question 1 options: 1) provided for use, modification, and redistribution 2) distributed at no cost for a trial period 3) copyrighted software provided at no cost 4) donated for public use and has no copyright restrictions 5) freemium

provided for use, modification, and redistribution

A(n) ______ is a request for specific data from a database. Question 18 options: 1) query 2) retrieval 3) filter 4) function 5) store

query

You use a POS terminal at work. Which of the following is the type of business at which you likely work? Question 33 options: 1) retail 2) financial 3) healthcare 4) research laboratory 5) library

retail

A computer dedicated to providing one or more services to other computers on a network is called a(n) ________. Question 30 options: 1) stick 2) desktop 3) server 4) laptop 5) tablet

server

oftware as a(n) ______ describes a model in which a software provider hosts applications and makes them available to users via the Internet. Question 3 options: 1) service 2) vendor 3) package 4) safety 5) search

service

An unsolicited email message or posting sent to many recipients or forums at once. Spam is considered Internet junk mail is called _______. Question 10 options: 1) spam 2) adware 3) spyware 4) viral 5) open source

spam

A type of program placed on a computer or mobile device without the user's knowledge that secretly collects information about the user and then communicates the information it collects to some outside source while the user is online is called _____. Question 10 options: 1) spyware 2) cracker 3) adware 4) open source 5) viral

spyware

A(n) ______ computer is a small computer usually the same size as a USB flash drive. Question 29 options: 1) laptop 2) tablet 3) desktop 4) stick 5) pen

stick

To provide a stable current flow and minimize the chances of an overvoltage reaching the computer and other electronic equipment, you might use a ________. Question 26 options: 1) surge protector 2) Bluetooth device 3) connector 4) docking station 5) kiosk

surge protector

The operating system and other tools are collectively known as ______ software. Question 1 options: 1) system 2) open source 3) ranging 4) premium 5) productivity

system

How many instructions are supercomputers capable of processing in a single second? Question 25 options: 1) billions 2) hundreds 3) trillions 4) millions 5) thousands

trillions

If power fails, a ________ uses batteries to provide electricity for a limitedamount of time.

ups (uninterruptible power supply)

Server ______ uses software to enable a physical server to emulate the hardware and computing capabilities of one or more servers. Question 32 options: 1) virtualization 2) optics 3) stands 4) clones 5) stationary

virtualization

A computer ______ is a potentially damaging program that affects a computer or device negatively by altering the way it works. Question 19 options: 1) virtual 2) virus 3) word processing 4) accounting 5) inventory

virus

A(n) ______ device is a small, mobile computing device designed to be worn. Examples include activity trackers and smartwatches. Question 36 options: 1) tracker 2) virtual 3) wearable 4) wicket 5) stick

wearable

Compressed files sometimes are called ______ files. Question 16 options: 1) packed 2) abridged 3) zipped 4) concentrated 5) open

zipped


संबंधित स्टडी सेट्स

AP World History Chapter 18 and 19 Test

View Set

Unit 4: Anthropogenic Climate Change

View Set

5300 Transportation Final Exam, Geog 5300 morton okelly

View Set

CH 13 EXERCISES Q: How would each of the following items be reported on the balance sheet?

View Set

Nursing Fundamental - Chapter 28 Safety

View Set