computer concepts practice exam questions

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

The connections that carry most of the internet's traffic are referred to as: gateways domains backbones web portals

backbone

A ___ is a copy of one or more files (or entire storage devices) that is made in case the originals become lost or damaged. path file system firewall backup

backup

With respect to online content, ___ refers to the suppression or deletion of content that is considered unacceptable. cyberbullying censorship fake news trolling

cencorship

The ability to automatically print to both sides of a piece of paper is known as: document feeding virtualization duplexing haptics

duplexing

Many individuals are using TV tuners as ___ to record television shows for future playback. QRs DVR sscanners LEDs

dvrs

___ printers are often used to create lab-quality photos, as well as the images found on plastic ID cards. Dye-sub Dot matrix 3D Thermal

dye sub

Most network installations use a(n) ___ star topology with twisted-pair cables that plug into the RJ45 port located on many devices. MIS DSS Ethernet Wi-Fi

ethernet

Once a computer program is compiled, the IDE will produce a(n) ___ file that can be run by the operating system on a user's computer. beta executable alpha algorithm

executable

A browser ___ is a separate program that adds a variety of useful features to the web browser, such as sending instant messages or playing mobile-style games. plug-in extension cookie meme

extension

Copyright law contains an exception known as ___, which provides for a limited set of circumstances where others can use portions of copyrighted material without first obtaining permission. fair use netiquette trolling licensing

fair use

___ computers are able to continue their operation even when problems are present. DSS Uninterruptable Scalable Fault-tolerant

fault tolerant

A ___ cable consists of a thin strand of glass that transmits pulsating beams of light rather than electric current. fiber-optic twisted-pair coaxial bluetooth

fiber optic

The communication of vibration, motion or physical resistance to a user is called: Biometrics Optics Haptics Ergonomics

haptics

Twitter popularized a system that uses the ___ symbol to mark keywords or topics in a message. plus hashtag exclamation tilde

hastag

Which of the following power-saving modes copies the contents of RAM to your hard drive, thereby saving additional power? Hibernate Shut down Sleep Log off

hibernate

A mobile ___ refers to a device that can connect to a mobile network and offer internet access to multiple devices near it. plug-in gateway hotspot portal

hotspot

___ is the ability of each organization's information system to work with the other, sharing both data and services. Scalability Interoperability Data mining Data warehousing

interoperability

A(n) ___ uses the same software and service structure as the Internet, but it contains only the company's private information such as documents managed by Microsoft Sharepoint. LAN intranet extranet WAN

intranet

Which of the following is an example of password management software? Carbonite TrueCrypt VirtualBox LastPass

last pass

Students often use a(n) ___, such as Blackboard, at school to complete exams, turn in work, and communicate with their instructor and classmates. webcast wiki LMS MMORPG

lms

Certain types of systems are called ___ because they must run without failure or with nearly instant recovery from failure. mission-critical uninterruptable expert systems MIS

mission-critical

Practically all of today's computers are equipped with complete ___ capabilities, which means that they can input and output sound, music, images, and video. multimedia biometric ergonomic virtual

multimedia

A(n) ___ is a connection point in a network. node hotspot intranet TPS

node

Printer speed is measured in: PPM MHz MB DPI

ppm

___ are individuals who broadcast themselves doing an activity, such as playing video games. YouTubers Professional streamers Influencers Gig workers

professional streamers

___ software allows managers to create and track a sophisticated plan in order to achieve a variety of goals. Project management CRM CAD Virtualization

project management

Computers that communicate over a network must follow certain ___ to ensure that the transmission is sent properly and understood. tags protocols extensions memes

protocols

The scam known as ___ threatens to delete or publicly expose a victim's stolen data unless money is paid to the thief. DDoS ransomware pretexting phishing

ransomware

___ tags, such as those present in many automated toll collection systems, can be scanned from longer distances and at higher speeds than barcodes. RFID LED QR OCR

rfid

A ___ looks at each packet's header to determine where the packet should go and then determines the best route for the packet to take toward its destination. repeater hub bridge router

router

___ involves improving the ranking of a website when users enter relevant keywords in a search engine. Social media SEO Graphic design Automation

seo

To keep using ___ after the trial period, you must purchase a full version or a code that can be entered into the software. freeware shareware volume licenses open source software

shareware

URL ___ convert a long URL into a smaller one that is easier to type or post on social media. converters protocols shorteners hyperlinks

shorteners

Which of the following power-saving modes uses only enough electricity to keep the contents of your RAM active? Hibernate Shut down Sleep Log off

sleep

Because it increases the security of a network connection, a ___ is often required for users who wish to access a company's private network over an Internet connection .VPN WAN gateway bridge

vpn

A(n) ___ on Android provides automatically-updating information without the need to open an app. GUI icon widget live tile

widget

___ is the security standard for wireless communication between devices and a router. VPN TPS DSS WPA2

wpa 2

Each device with a NIC contains a unique identifier, known as a(n) ___ address, which distinguishes it from any other network-connected device in the world. MAC VPN gateway Ethernet

mac

Which of the following alternatives to piracy will allow you to listen to your favorite songs for free? Public domain Digital rentals Subscription services Ad-supported streaming

Ad-supported streaming

Which of the following is NOT one of the specifications of Wi-Fi technology? A. 802.11g B. 802.11n C. 802.11x D. 802.11ac

C

___ software aids architects, engineers, and many others who need to create a digital model of an object.

CAD

___ aim(s) to revolutionize AI by asking computers to process data and learn in a manner inspired by the human brain. Digital footprints Biotechnology Nanotechnology Neural networks

Neural networks

Mobile apps known as news ___ collect articles from a variety of sources and present them to you in a magazine-style format. servers blogs portals aggregators

aggregrators

___ software helps protect your computer from various types of malware. Anti-malware Firewall Encryption Backup

anti malaware

The security principle known as ___ gives individuals a certain level of access based on who they are. attenuation authentication authorization validation

authorization

Software companies will often release a(n) ___ version to a limited audience that will test it on their systems. Programmers can then collect information from these users about any errors that were encountered. bug SDLC IDE beta

beta

The piracy of music and movies is often evident on file-sharing services that use the ___ protocol. BitTorrent VoIP ICMP Tunneling

bit torrent

A(n) ___ is a web page or small website that contains a series of chronological posts and comments. blog aggregator wiki forum

blog

Often associated with the field of ___, a data analyst is skilled at analyzing large volumes of data in order to discover useful information for an organization. business intelligence data architecture social media strategy mobile app development

business intelligence

As the main processor of a computer, the ___ is responsible for organizing and carrying out instructions in order to produce a desired output. SSD RAM chipset CPU

cpu

In the field known as ___, experts use modeling software and statistics to extract knowledge from large volumes of data. data validation data analytics MIS social engineering

data analytics

___ software is used to create and manage databases. Word processing Spreadsheet DBMS Presentation

dbms

___ refers to the technology gap that exists between different social and economic classes. Offshoring Outsourcing Digital divide Green computing

digital divide

___ printers create output by striking an inked ribbon against paper using metal pins, making them useful for printing on pressure-sensitive forms. Inkjet Laser Dot matrix Thermal

dot matrix

Which of the following is an example of web development software? Pro Tools Premiere Dreamweaver InDesign

dreamweaver

The ___ economy describes the explosion of freelance workers that now perform the work that may otherwise be performed by full-time workers. sharing B2C gig C2C

gig

The ___ refers to circuitry that specializes in processing images and video. HDMI CRT LED GPU

gpu

___ involves activities such as editing photos and designing layouts. Social media SEO Graphic design Systems analysis

graphic design

Which of the following is NOT one of the four colors used in the ink nozzles of inkjet printers?

green

__ computing concentrates on reducing the environmental impact of computers and their widespread use. Green Ethical Cyber Social

green

Today, a ___ generally refers to an individual who uses a computer and/or network to commit a variety of crimes. zombie hacker Trojan worm

hacker

Which of the following is NOT an example of an office suite? MySQL Microsoft Office iWork G Suite

not g suite, not micro. office, not i work

In an office environment, many organizations set up a(n) ___ to perform various operations such as word processing, accounting, document management, or communications. TPS MIS office automation system DSS

office automation system

In the world of computing, ___ means acquiring or exchanging copies of protected digital creations without payment or permission from their creator. empathy copyright piracy licensing

piracy

A monitor's screen is divided up into millions of tiny dots, called: bits bytes pixels cursors

pixels

Turning in the work of another as if it were your own or failing to cite the source of your work in known as: spamming tagging plagiarism blogging

plaigarism

Operating systems use ___ utilities to place computers and devices in low-power states when they are not being used. encryption power management acceptable use optimization

power management

___ software is used for entering, calculating, and analyzing sets of numbers. Word processing Spreadsheet DBMS Presentation

spreadsheet

Windows can be found on many desktops and laptops, as well as Microsoft's ___ tablets. iPad Pixel Galaxy Surface

surface

The protocols that are at the heart of internet communication are known as: TCP/IP CSNET NSFNET VoIP

tcp/ip

__ printers, which are often used to create receipts and labels, apply heat to special paper in order to turn select areas black. Dye-sub Dot matrix 3D Thermal

thermal

What is the name of the backup utility in macOS? iBackup Mac Backup Pro Tools Time Machine

time machine

Which of the following is a popular test of a system's ability to think? Empathy test Turing test BenchMark PassMark

turing test

A ___ license allows companies to install the software on multiple (or all) the machines that they own. freeware shareware volume subscription

volume


संबंधित स्टडी सेट्स

Public Speaking Chapter 6: Analyzing the Audience

View Set

Operations Management Exam 2 (Ch. 5, 8, 9 & 11)

View Set

DSST Introduction to Computing, or Information Systems and Computer Applications CLEP

View Set

Trig 7.5: Complex Numbers in Polar Form

View Set

Accounting Fundamentals: Accounts Payable

View Set

Essay: My daughter taught me prison is part of our family story, but not the whole story

View Set