Computer Concepts Practice Exam 2021
Firewall
A software-based ___ is dedicated to examining and blocking internet traffic.
Access Point
A wireless ___ is the device that all nodes connect to in order communicate wirelessly.
Modem
A(n) ___ is a device that can convert digital information from a computer into analog sound waves that can be transmitted over the phone lines.
Stylus
A(n) ___ is a pen-like input tool that is used with a variety of touchscreen devices.
MIS
A(n) ___ is a set of software tools that enables managers to gather, organize, and evaluate information.
Virtual machine
A(n) ___ is a special environment that allows you to run an operating system on top of another operating system.
Blog
A(n) ___ is a web page or small website that contains a series of chronological posts and comments.
webcast
A(n) ___ is the broadcast of various types of media over the web.
LCD
A(n) ___ monitor contains a light source and a screen of special crystals that shift when electricity is applied to them.
Expert
A(n) ___ system is a type of information system that performs analytical tasks traditionally done by a human.
Zombies
Computers which are under the external control of a hacker are known as:
Robonaut 2
NASA''s ___ robot can work alongside astronauts or perform tasks that are too dangerous for humans.
Business Intelligence
Often associated with the field of ___, a data analyst is skilled at analyzing large volumes of data in order to discover useful information for an organization.
live-tiles
On Windows, ___ can display real-time information such as the current weather, news, or social media updates.
Database
Simply put, a computer ___ is an organized method for storing and retrieving information such as customers, employees, inventory, and sales records.
Bit
The most fundamental unit of computing is the ___, which is typically represented as a 1 or 0 value.
P2P
The most popular method for file transfer today is known as ___ file sharing, which uses a distributed network of individual users instead of a central server.
Burning
The process of recording to a blank optical disc is known as:
The likelihood of user compliance
Which of the following is NOT one of the factors that we normally use to gauge the danger of a threat?
Green
Which of the following is NOT one of the four colors used in the ink nozzles of inkjet printers?
Pro Tools
Which of the following is an example of audio editing and production software?
Hibernate
Which of the following power-saving modes copies the contents of RAM to your hard drive, thereby saving additional power?
Twisted Pair
___ cable normally consists of four pairs of wires that are twisted around each other.
Digital
___ cameras are portable devices that electronically capture and store still images and video.
Fault-tolerant
___ computers are able to continue their operation even when problems are present.
Nanotechnology
___ involves the creation or manipulation of matter at the smallest possible scale.
Biotechnology
___ is an application of biology that uses living organisms to manufacture new products or improve existing ones.
Strong
___ passwords are long and generally use a mix of upper and lower case letters, numbers, and at least one symbol such as a dash or period.
Unix
___, which dates back to 1969, runs many of the world's most powerful servers.
Aspect ratio
"16:9" describes the ___ of a monitor
Fiber-optic
A ___ cable consists of a thin strand of glass that transmits pulsating beams of light rather than electric current.
computer support specialist
A ___ excels when it comes to installing, configuring, and supporting computer systems.
bridge
A ___ is a device that connects two LANs or two segments of the same LAN.
Worm
A ___ is a fully-contained program that self-replicates and spreads through computers and networks.
Pixels
A monitor's screen is divided up into millions of tiny dots, called:
VPN
Because it increases the security of a network connection, a ___ is often required for users who wish to access a company's private network over an Internet connection.
700 MB
Compact Discs (CDs) are capable of storing up to ___ of data.
700MB
Compact Discs (CDs) are capable of storing up to ___ of data.
Footprints
Digital ___ are effectively a trail of your data, activities, and even locations visited while carrying a smartphone.
Projectors
Digital ___ are used to project digital images and video onto a large screen where they can be viewed by an audience.
Bandwidth
For modern networks, ___ is measured in either megabits per second (Mbps) or gigabits per second (Gbps).
Dashboard
Google allows users to view and control all their data with a tool known as:
MMORPGs
In a category of games known as ___, millions of players connect to various servers to team up with other players in very large virtual worlds.
Hacker
In the early days of computing, a(n) ___ was an individual that possessed advanced skills, often making a computer do something that it wasn't originally intended to do.
Videocards
Individuals who require better speed and performance for graphics-intensive applications (e.g., video editing, gaming, etc.) prefer the faster processors and built-in memory included with ___.
Crowdfunding
Kickstarter is known as a(n) ___ website because it allows the general public to provide financial support to organizations and individuals that are working on a new product.
Real time
Many individuals today prefer various forms of ___ communication, where messages and conversations between two or more people occur instantaneously.
Gestures
Many new devices support the use of various ___, or finger movements, to accomplish various tasks.
Compress
Many users choose to ___ several files into one ZIP file for the sake of easy transport, especially when attaching them to an email message.
GUI
Modern operating systems have a ___, allowing users to communicate via graphical elements on the screen.
Ethernet
Most network installations use a(n) ___ star topology with twisted-pair cables that plug into the RJ45 port located on many devices.
Spam
Posting a message to a discussion forum that is completely off topic or appears to be promoting something may be considered ___ by the user community.
Multimedia
Practically all of today's computers are equipped with complete ___ capabilities, which means that they can input and output sound, music, images, and video.
Formatting
Preparing a storage device for use by an operating system is known as:
Modifiers
Search ___, such as quotes and the minus sign, can narrow down the results provided by search engines.
Twitch
The service known as ___ contains original content in the form of live or recorded streams showing individuals playing video games.
Broadband
The term ___ is used to describe any digital data connection that can transmit information faster than standard dial-up by using a wider band of frequencies.
Cards
Tiny and flat memory ___ are used to store data in tablets, smartphones, and devices such as digital cameras and digital photo frames.
SSD
Ultraportable computers will often use ___ technology exclusively, even though their storage capacity is lower than that of a traditional hard drive.
Optical Character Recognition (OCR)
What is the name of the technology that can translate a scanned document image into text that can be edited and formatted?
YouTube
When it comes to social video, no service is as large or popular as:
Mega-SD
Which of the following is NOT a type of memory card technology?
Intel's Alexis
Which of the following is NOT a virtual assistant that uses speech recognition to help users with a variety of tasks?
Terabyte (TB)
Which of the following storage units is the LARGEST?
Neural Networks
___ aim(s) to revolutionize AI by asking computers to process data and learn in a manner inspired by the human brain.
Logos
___ are files that record activities and events on a computer.
Virus
A ___ is a type of malware that is attached to a host file and has the ability to replicate, or copy, itself.
HDMI
A ___ is responsible for configuring and maintaining networks and communication systems.
network administration
A ___ is responsible for configuring and maintaining networks and communication systems.
Repeater
A ___ is used to prevent attenuation when packets are traveling long distances.
System Analyst
A ___ specializes in developing plans and recommendations that meet the software and system needs of an organization.
Domain name
A ___, such as apple.com and whitehouse.gov, uniquely identifies a site and a brand on the web.
Flash
A USB ___ drive is the small storage stick that plugs into a USB port.
Volume
A ___ license allows companies to install the software on multiple (or all) the machines that they own.
Banner
A(n) ___ ad is a thin, rectangular advertisement that is commonly placed across the top or on the sides of a web page.
Node
A(n) ___ is a connection point in a network.
widget
A(n) ___ on Android provides automatically-updating information without the need to open an app.
graphics
Artists who draw images on a computer often use a stylus in conjunction with special ___ tablets, which offer extra-sensitive touch surfaces that translate an artist's motions into drawings on the computer screen.
Laser
Because of their sharp quality text output and fast printing speeds, ___ printers are often preferred by businesses.
mission-critical
Certain types of systems are called ___ because they must run without failure or with nearly instant recovery from failure.
Malware
Collectively, all malicious programs are referred to as:
Copyright
Federal ___ law gives software creators a variety of rights and privileges over their creative work.
enhancement
Human ___ describes the various ways in which technology can be integrated with biological systems to repair or improve human functions.
DVRs
Many individuals are using TV tuners as ___ to record television shows for future playback.
Cores
Most of today's microprocessors have several processors, or ___, inside a single chip.
Device drivers
Operating systems communicate with most hardware components using:
Tag
Photo sharing services allow you to ___ your photos with keywords, current location, and the names of people you know.
LMS
Students often use a(n) ___, such as Blackboard, at school to complete exams, turn in work, and communicate with their instructor and classmates.
Contrast ratio
The ___ of a monitor measures how close the monitor can get to the brightest white and the darkest black.
duplexing
The ability to automatically print to both sides of a piece of paper is known as:
Empathy
The ability to recognize, understand, and share the feelings of others is known as:
Multitasking
The ability to run multiple programs at the same time is known as:
Backbones
The connections that carry most of the internet's traffic are referred to as:
Firmware
The instructions that handle a computer's basic functions when it is powered on are referred to as:
Media
The means used to link together parts of a computer network are referred to as network:
BitTorrent
The piracy of music and movies is often evident on file-sharing services that use the ___ protocol.
Authorization
The security principle known as ___ gives individuals a certain level of access based on who they are.
Encrption
___ is the process of scrambling your data or storage devices to make them unreadable by anyone who doesn't have the proper key.
Telecommuting
___ is the process of working for a company without being physically present at the company's office.
Automation
___ occurs when computers or machines can perform the work that was once done by a human.
Media
___ players refer to applications that allow you to listen to music and play videos.
Dye-sub
___ printers are often used to create lab-quality photos, as well as the images found on plastic ID cards.
3-D
___ printers are unique in that they can create a physical object made of various materials, such as a plastic toy.
Thermal
___ printers, which are often used to create receipts and labels, apply heat to special paper in order to turn select areas black.
Cache
___ refers to a form of high-speed memory that stores a small, frequently-used set of instructions and data. It is located inside modern CPUs.
Attenuation
___ refers to the loss of intensity and clarity of the data signal being transmitted.
Database Management System (DBMS)
___ software is used to create and manage databases.
Application
___ software, which is made for the user, allows individuals to complete a variety of work and school-related tasks.
Botnets
___, which are large networks of compromised computers, can be used by a hacker to spread malware, send spam, and conduct carefully orchestrated network attacks.
HTML
The ___ language, which was used in the first web page ever created, is still in use today.
E-commerence
___ means doing business online, such as when a consumer buys a product over the web instead of going to a store to buy it.
Wireless
___ networks use radio signals that travel through the air to transmit data.
CPU
Suppose you are shopping for a computer and the description lists the following: Intel i7 3630QM3. Which component is being described here?
Protocols
Systems follow certain rules, or ___, to ensure that the packets are sent, received, and interpreted properly, and that data integrity is guaranteed.
Gig
The ___ economy describes the explosion of freelance workers that now perform the work that may otherwise be performed by full-time workers.
Sharing
The ___ economy is an expression that refers to the way in which the internet has facilitated our ability to share (usually for a price) our goods or services with other individuals.
Ports
When you look at the back of your system unit, you will likely find a variety of plugs known as ___.
Photoshop
Which of the following Adobe products would be the best choice for editing bitmap images?
Hulu
Which of the following companies offers access to a large library of TV shows to users who pay a monthly subscription fee?
802.11x
Which of the following is NOT one of the specifications of Wi-Fi technology?
LastPass
Which of the following is an example of password management software?
Chrome
With the ___ operating system, you will be fully immersed in Google's ecosystem of apps and services.
Professional Streamers
___ are individuals who broadcast themselves doing an activity, such as playing video games.
Search engines
___ are sophisticated services that store the URL of millions of web pages and most of the content on those pages.
Whistleblowing
___ is the act of alerting the public about harmful activities that are being hidden by an organization.
Scalability
___ is the capacity to provide increasing amounts of computing power, storage, and/or software.
data mining
___ is the discovery of new patterns or relationships between data.
Data Validaiton
___ is the process of safeguarding against erroneous or duplicate data by checking what is entered and, in some cases, placing restrictions on how the data is entered.
RFID
___ tags, such as those present in many automated toll collection systems, can be scanned from longer distances and at higher speeds than barcodes.