COSC_Collective

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

file extension

".docx" is an example of a(n) _______. Select one: a. taskpane shortcut b. Clipboard snippet c. file extension d. PowerPoint file

To help protect your computer, avoid opening email attachments with any of the following file extensions EXCEPT ____.

.jpg

Of the following, the only original TLD is ____.

.mil

Of the following, the TLD mentioned in the chapter that is intended for individuals is ____.

.name

Case 1-1 Nicole, a sophomore at the local college, spends an evening with her father and her grandfather talking about technology. Nicole is amazed at the changes that have happened over just a few generations. Nicole's father chimes in, and reminds her somewhat proudly that he was born right about the same time that integrated circuits were invented. He was born in ____.

1964

In the accompanying figure, the item in box _____ holds the results of processing.

3 Registers

In the accompanying figure, the item in box _____ stores data and instructions before and during processing.

5 Internal Cache Memory

BD-R dual-layer discs can store up to _____ of data.

50 GB

Copyrights remain in effect until ____ after the creator's death.

70 years

According to the text, a desktop computer may contain up to ____ different chemical elements and compounds.

700

______ binary digits (or bits) combine to create one byte.

8

In binary language, each letter of the alphabet, each number, and each special character is made up of a unique combination of.

8 bits.

hotspot

A Wi-Fi ____ is a location with a direct Internet connection and a wireless access point that allows users to connect wirelessly to the Internet. Select one: a. hotspot b. honeypot c. broadband d. linkup

spoofed

A ____ Web site is a fraudulent site that has been set up to be indistinguishable from the legitimate site it is pretending to be. Select one: a. phramed or framed b. spear phished c. spoofed d. sponged

virus

A ____ is a program that is installed without the permission or knowledge of the computer user, that is designed to alter the way a computer operates, and that can replicate itself to infect any new media it has access to. Select one: a. worm b. Trojan horse c. virus d. DDoS

Trojan horse

A ____ is a type of malware that masquerades as something else. Select one: a. switchbot b. zombie c. Trojan horse d. worm

blog

A ____ is an online personal journal accessible to the public, usually created and updated by one individual. Select one: a. wiki b. blog c. podcast d. plank

bus

A _____ is an electronic path over which data can travel. Select one: a. router b. bus c. redundant array of disks d. sluice

gallery

A _______ is a menu or grid that shows visual representations of the options available for a button. Select one: a. taskpane b. gallery c. tableau d. ScreenTip

favorite

A _______ is a shortcut to a Web page saved in a list in the Internet Explorer desktop application. Select one: a. Slice b. favorite c. frequent d. histogram

protocol

A communications ____ determines how devices on a network communicate. Select one: a. protocol b. topography c. hierarchy d. bridge

extranet

A company network that is accessible to authorized outsiders is called a(n) ____. Select one: a. WAN b. extranet c. intranet d. VPN

digital signature

A document with a(n) ____ guarantees that the document was indeed sent by a specific individual and that it hasn't been tampered with after it was sent. Select one: a. valid IP packet list b. Wi-Fi piggyback c. digital signature d. e-thumbprint

biometric

A fingerprint reader is an example of a(n) ____ access system. Select one: a. holistic b. biometric c. ephemeral d. trivial

botnet

A group of zombie computers controlled by one individual, working together in a coordinated fashion, is called a(n) ____. Select one: a. zero-day threat b. botnet c. wardriver d. etherbomb

mainframe

A large organization that needs a computer to run the programs that staff use during the day, and then spend the night performing payroll and billing, most likely will buy a ____. Select one: a. mainframe b. supercomputer c. cloud computer d. midrange server

the word is not in the built-in spell checker

A red wavy line under a word you type in the message section of Mail means _______. Select one: a. the word is a hyperlink b. the word is not in the built-in spell checker c. the word is too complex for the tone of the rest of the message d. there are synonyms to the word that you might prefer

credit card

A smart card is the size of a _____. Select one: a. postage stamp b. credit card c. sheet of A4 paper d. postcard

an arrow next to or below the button

A two-part button consists of the button and _______. Select one: a. an arrow next to or below the button b. its dialog box c. a corresponding button elsewhere on the ribbon d. the icon that executes the command

router

A wireless ____ is commonly used to connect both wireless and wired devices to a network and to connect that network to an Internet connection via the appropriate broadband modem. Select one: a. coupling b. jumper c. router d. NAC

client, server

A(n) ____ is a computer that requests and uses network resources from a(n) ____. Select one: a. client, peer b. server, ISP c. ISP, client d. client, server

VPN

A(n) ____ is a secure, private path across a public network that is set up to allow authorized users private, secure access to the company network. Select one: a. LAN b. intranet c. VPN d. Internet P2P network

utility program

A(n) ____ is a software program that performs a specific task, usually related to managing or maintaining the computer system. Select one: a. application b. utility program c. kernel d. device driver

digital certificate

A(n) ____ is designed to authenticate the identity of an individual or organization; it contains the name of the entity, a serial number, an expiration date, and a key pair. Select one: a. e-vitation b. digital certificate c. online watermark d. authenti-stamp

trackball

A(n) ____ is essentially an upside-down mouse that can be more comfortable to use. Select one: a. touchpad b. gnome c. trackball d. spinstick

bus

A(n) ____ network uses a central cable to which all network devices connect. Select one: a. ether-ring b. star c. bus d. mesh

surge suppressor

A(n) ____ prevents power spikes from harming your computer system. Select one: a. surge suppressor b. UPS c. rugged frame d. antivirus suite

ScreenTip

A(n) _______ is a box with descriptive text about a button, an object, or another element on the screen, which appears when you point to the button or object. Select one: a. ScreenTip b. contextual tab c. gallery d. Mini toolbar

a username and a payment method

According to the text, no matter what kind of Internet connection setup you arrange for your computer, you will likely need to select these two things: ____. Select one: a. RJ-45 wiring & coaxial cabling b. a username and a payment method c. phone number, username d. WiFi channel, payment method

Ctrl+P

All of the following are shortcut keys for either cutting, copying, or pasting EXCEPT _______. Select one: a. Ctrl+V b. Ctrl+P c. Ctrl+X d. Ctrl+C

mobile phones

All of the following typically use the same operating systems as desktop computers EXCEPT ____. Select one: a. notebooks b. netbooks c. mobile phones d. tablets

FCC

All wireless applications in the United States use specific frequencies as assigned by the ____. Select one: a. FTC b. FCC c. NTSB d. W3C

username

An email address consists of a ____, followed by an @ symbol, followed by the domain name of the mail server. Select one: a. URL b. username c. password d. TLD

@

An email address consists of your username and the server name separated by the ____ symbol. Select one: a. / b. % c. @ d. &

unauthorized use

An employee using a company computer to check personal email is an example of ____. Select one: a. fair use b. unauthorized use c. unauthorized access d. hacking

data

Any fact or set of facts, such as the words in a letter to a friend or the notes in a song, can become computer ____. Select one: a. data b. information c. networks d. hardware

URL

As you click different links on Web pages, the _______ in the Address bar change(s). Select one: a. URL b. history tiles c. protocol d. pins

In the accompanying figure, the Web server is shown in box ____.

B twitter.com/

50 GB

BD-R dual-layer discs can store up to _____ of data. Select one: a. 700 MB b. 8.5 GB c. 50 GB d. 1 TB

_____ is the science of identifying individuals based on measurable biological characteristics.

Biometrics

The _____ is the main processing device for a computer.

CPU

Of the following, _____ is the oldest and now least popular technology in computer monitors today.

CRT

An RSI related to repetitive finger movements on a keyboard is ____.

CTS

a cable modem

Cable Internet service requires ____. Select one: a. a cable modem b. digital telephone lines c. a satellite receiver d. a cable TV subscription

_____ memory is very fast memory circuitry located near the CPU that is used to speed up processing.

Cache

plagiarism

Case-Based Critical Thinking Questions Case 1-3 Damon is learning about intellectual property, copyright, and plagiarism. You give him several scenarios to test his understanding. A student copies and pastes information from various online documents to create a research paper, without crediting the original authors. The paper is only for school use and will not be shared or sold outside of school. Damon rightly says this is ____. Select one: a. plagiarism b. not plagiarism c. too little information to say d. illegal, though probably still ethical

too little information to say

Case-Based Critical Thinking Questions Case 1-3 Damon is learning about intellectual property, copyright, and plagiarism. You give him several scenarios to test his understanding. A teacher shares a poem with the class. Damon tells you this is ____. Select one: a. not plagiarism b. plagiarism c. too little information to say d. unethical but not illegal

not plagiarism

Case-Based Critical Thinking Questions Case 1-3 Damon is learning about intellectual property, copyright, and plagiarism. You give him several scenarios to test his understanding. In an article, a journalist paraphrases a few sentences from another author without changing the meaning, and credits the original author with a proper citation. The journalist receives pay for this article. Damon tells you this is ____. Select one: a. plagiarism b. not plagiarism c. too little information to say d. both illegal and unethical

UNIX

Case-Based Critical Thinking Questions Case 3-1 You are studying the history of various operating systems. The earliest operating system mentioned in this chapter is ____. Select one: a. UNIX b. Linux c. DOS d. Mac OS

Windows 3.1

Case-Based Critical Thinking Questions Case 3-1 You are studying the history of various operating systems. Your uncle talks about the Windows operating environment. He is most likely referring to his experience in using ____. Select one: a. Windows Mobile b. Windows 7 c. Windows Me d. Windows 3.1

personal finance software

Case-Based Critical Thinking Questions Case 3-2 You are in the market for various kinds of application software. Lastly, you need a specialized program to help you track your personal expenses, balance your checking accounts, and write checks. You were looking at buying ____, but you realized that much of what you need is already available via online banking with your local bank. Select one: a. database software b. accounting software c. personal finance software d. vector software

a spreadsheet program

Case-Based Critical Thinking Questions Case 3-2 You are in the market for various kinds of application software. You want a program that can use formulas to perform calculations, and organize numbers and values into rows and columns. You most likely want ____. Select one: a. a word processing program b. a spreadsheet program c. presentation software d. note taking software

database software

Case-Based Critical Thinking Questions Case 3-2 You are in the market for various kinds of application software. Your business has a growing client base as well as a growing inventory. You need to keep track of a good deal of information and be able to search for information quickly, so you decide to invest in ____. Select one: a. database software b. mastersheet software c. presentation software d. note taking software

MAN

Case-Based Critical Thinking Questions Case 4-1 Clarice is a network consultant, fielding questions from clients during the day, and navigating a wired and wireless world both at the office and at home. Clarice drives to her office from the suburbs. At the coffeeshop outside her office, she uses the public wireless network to check her email. Six blocks away, at the park where she takes her lunch, she uses the same wireless network. However, when she gets home she needs to use another network. The network Clarice uses during her workday is most likely a(n) ____. Select one: a. LAN b. MAN c. VPN d. extranet

PAN

Case-Based Critical Thinking Questions Case 4-1 Clarice is a network consultant, fielding questions from clients during the day, and navigating a wired and wireless world both at the office and at home. Clarice has a client looking to create a network for her mobile phone, headset, digital camera, and PDA. Clarice tells her about ____ options. Select one: a. PAN b. WAN c. intranet d. VPN

VPN

Case-Based Critical Thinking Questions Case 4-1 Clarice is a network consultant, fielding questions from clients during the day, and navigating a wired and wireless world both at the office and at home. Clarice sometimes accesses her work computer at home via the Internet. She does so knowing that her connection is secure and private. The connection path she uses is an example of a(n) ____. Select one: a. intranet b. extranet c. VPN d. supranet

LANs

Case-Based Critical Thinking Questions Case 4-1 Clarice is a network consultant, fielding questions from clients during the day, and navigating a wired and wireless world both at the office and at home. Next, Clarice meets with a client who leases two floors in a high-rise downtown. He wants to connect them all to their own network. So Clarice explains the various kinds of ____ he should consider. Select one: a. WANs b. PANs c. LANs d. MANs

CompUSA

Case-Based Critical Thinking Questions Case 4-2 Arnold has asked you to help him learn the dizzying array of new communications technologies being developed today. You ask Arnold which of the following companies in the United States is currently NOT supporting WiMAX-based 4G cellular networks. He answers, correctly, ____. Select one: a. AT&T Wireless b. Verizon Wireless c. T-Mobile d. CompUSA

Internet content providers

Case-Based Critical Thinking Questions Case 5-1 The world of the Internet can be overwhelming. You take some time to break it down in your mind, understanding the community and its players. For each of the following questions, look at the organizations, businesses, or individuals listed, and then determine what they represent as a whole. A blogger, your school's Web site, an online encyclopedia are ____. Select one: a. ASPs b. infrastructure companies c. Internet content providers d. users

ISPs

Case-Based Critical Thinking Questions Case 5-1 The world of the Internet can be overwhelming. You take some time to break it down in your mind, understanding the community and its players. For each of the following questions, look at the organizations, businesses, or individuals listed, and then determine what they represent as a whole. AT&T, Comcast are ____. Select one: a. ISPs b. software companies c. key Internet organizations d. ASPs

hardware and software companies

Case-Based Critical Thinking Questions Case 5-1 The world of the Internet can be overwhelming. You take some time to break it down in your mind, understanding the community and its players. For each of the following questions, look at the organizations, businesses, or individuals listed, and then determine what they represent as a whole. Router manufacturer, maker of the latest Web browser, computer designer are ____. Select one: a. ASPs b. key Internet organizations c. hardware and software companies d. users

a wiki

Case-Based Critical Thinking Questions Case 5-2 There are widely varied types of online communication and online writing-each with their own special purpose. Knowing what category of information you're trying to find on the Web will help you make more efficient and effective use of your time. In each of the following questions, give the answer that best describes the item listed in the question. A free online encyclopedia updated by thousands of active contributors and visited by individuals around the world is ____. Select one: a. a wiki b. a blog c. Twitter d. iDingo

Cable Internet

Case-Based Critical Thinking Questions Case 5-3 With all the types of Internet connections available, it's important to be able to keep them straight. These questions will test how well you understand the options. ____ has a typical speed of 10-25 Mbps, and is the most widely used type of home broadband connection. Select one: a. DSL b. Fixed wireless c. Cable Internet d. Satellite

online harassment

Case-Based Critical Thinking Questions Case 6-1 You study a series of real-life issues to determine what kind of security and/or privacy threat you are facing. A relative of yours is in junior high school and has been subjected to a lot of bullying via text messages and social networking sites. You want to help, so you start to read up on the state laws and school rules that deal with ____. Select one: a. cyberterrorism b. identity theft c. online harassment d. cyberstalking

war driving

Case-Based Critical Thinking Questions Case 6-1 You study a series of real-life issues to determine what kind of security and/or privacy threat you are facing. One evening you notice that your Internet seems to be running slower than normal. You look out your living room window and see a strange car parked on the street in front of your house, and someone's inside. It is possible you are being subjected to ____. Select one: a. war driving b. Wi-Fi piggybacking c. botnetting d. a dot con

Trojan horse

Case-Based Critical Thinking Questions Case 6-1 You study a series of real-life issues to determine what kind of security and/or privacy threat you are facing. You have found an interesting calendar program at a Web site and downloaded it to help you stay organized. However, within a couple days of installing the program, your computer starts behaving oddly. Strange popups appear, the home page of your Internet browser has been switched, and the system is running sluggishly. You likely have installed a ____. Select one: a. virus b. worm c. Trojan horse d. botnet

spoofed

Case-Based Critical Thinking Questions Case 6-1 You study a series of real-life issues to determine what kind of security and/or privacy threat you are facing. You have received an email from your bank asking you to update your account information and verify your password. Suspicious, you hover your mouse over one of the links in the email. It turns out that the actual link does not go to the bank's Web site, but to another site you are unfamiliar with. Knowing what you do about data theft, you assume that the bank's true Web site has been ____ at this Web site in order to trick people into giving their personal information to a thief. Select one: a. phished b. phramed or framed c. piggybacked d. spoofed

Wi-Fi piggybacking

Case-Based Critical Thinking Questions Case 6-1 You study a series of real-life issues to determine what kind of security and/or privacy threat you are facing. You live in a 20-unit apartment building. You notice that your wireless Internet seems to run more slowly many evenings, after your upstairs neighbor has come home from work. It is possible you are being subjected to ____. Select one: a. war driving b. Wi-Fi piggybacking c. botnetting d. a dot con

You have deleted your history.

Case-Based Critical Thinking Questions Case 8-2 You have had your touch-enabled tablet computer for a week now, and have spent a good deal of time surfing the Web with Internet Explorer. The following questions test your understanding. As you begin typing a URL into the Address bar, no suggested Web pages appear. Why? Select one: a. Suggested Web pages never appear in the Address bar. b. You are using the app and not the desktop application. c. You have deleted your history. d. You are operating Internet Explorer in protected mode.

In the desktop application, you open the Favorites Center, click the History tab, then search for the right Web site.

Case-Based Critical Thinking Questions Case 8-2 You have had your touch-enabled tablet computer for a week now, and have spent a good deal of time surfing the Web with Internet Explorer. The following questions test your understanding. You want to return to a Web site you visited two or three days ago. Which of the following scenarios will get you there? Select one: a. In the app, you swipe down from the top, tap "Favorites," tap "History," and scan the selections for the right Web site. b. In the desktop application, you open the Favorites Center, click the History tab, then search for the right Web site. c. In the app, you open the Favorites Center, tap the History tab, then search for the right Web site. d. In the desktop application, you right-click a blank area of the current Web page, click "History," click the "All" arrow, then scan the selections for the right Web site.

"Reply" with Cc to Terry

Case-Based Critical Thinking Questions Case 8-3 You are "learning the ropes" about using different functions when writing and replying to emails. In the questions below, select the answer that describes the best or most appropriate course of action. Howard sent you an email with a good idea for a widget. You want to respond. You also want to bring Terry, who has experience with widgets, into the conversation. Select one: a. "New" to Terry, cut and paste Howard's original email b. "Reply" with Bcc to Terry c. "Reply" with Cc to Terry d. "Forward" to Terry with Bcc to Howard

"Reply" to Travis

Case-Based Critical Thinking Questions Case 8-3 You are "learning the ropes" about using different functions when writing and replying to emails. In the questions below, select the answer that describes the best or most appropriate course of action. Travis sent you, Jill, Jack, Marlene, Bernie, and Raja an email. You want to reply, but only Travis needs to see the response. Select one: a. "Reply All" then delete unnecessary recipients b. "New" to Travis, then cut and paste his original email into your new email c. "Reply" to Travis d. "Reply" and put Travis in Bcc

opens Backstage view

Clicking the FILE tab _______. Select one: a. opens a dialog box b. adds contextual tabs to the ribbon c. gives you access to editing and formatting features d. opens Backstage view

launches a dialog box related to that group

Clicking the small button in the right corner of many groups on the ribbon tabs _______. Select one: a. expands the group b. launches a dialog box related to that group c. locks the group d. opens the Clipboard

____ refers to data, applications, and even resources stored on computers accessed over the Internet.

Cloud computing

_____ are very small pieces of semiconducting material that contain integrated circuits.

Computer chips

70 years

Copyrights remain in effect until ____ after the creator's death. Select one: a. a year and a day b. 10 years c. a century d. 70 years

____ software is rights-protection software used to control the use of a work.

DRM

burning

DVD ____ refers to recording data onto a recordable or rewritable DVD. Select one: a. ripping b. burning c. tracing d. authoring

The S-video and the ___ ports on a computer facilitate connecting the computer to multimedia devices such as TVs and DVD players.

DVI

In the accompanying figure, the item in box _____ takes instructions and translates them into a form that the control unit can understand.

Decode Unit

In the accompanying figure, the Address bar is denoted by box _____. Select one: a. D b. F c. A d. E

E

The U.S. Department of Energy and EPA developed the ____ program to encourage the creation of energy-saving devices.

ENERGY STAR

over public media

Email is typically transmitted ____. Select one: a. in encrypted form b. through a VPN c. over public media d. at times of low Internet usage

_______ computers are specifically designed computer chips that reside inside other devices such as your car or the electronic thermostat in your home.

Embedded

____ plug into slots on the motherboard and provide additional functionality for your computer.

Expansion cards

Today, many notebook and netbook computers use _____ instead of PC Cards to give them additional capabilities.

ExpressCard modules

social networking

Facebook is an example of a(n) ____ site. Select one: a. social networking b. Webinar c. ISP d. wiki

You use _____ to navigate, view, and work with the contents and resources on your computer. Select one: a. application windows b. dialog boxes c. Start windows d. File Explorer windows

File Explorer windows

IEEE 1394 is another name for _____.

FireWire

_____ are the most common type of storage media for digital cameras and mobile phones.

Flash memory cards

_____ has/have begun to replace _____ for storing system information such as a computer's BIOS.

Flash memory chips, ROM

it is not possible to go forward to a more recent URL, only back

From the accompanying figure, you can say that _______. Select one: a. this Internet Explorer application currently has no saved favorites b. it is not possible to go forward to a more recent URL, only back c. the computer has a touch screen d. the screen is not maximized

_____ are shortcut keys that you press to perform special tasks; each software application has its own set of tasks assigned to these keys.

Function

All of the following are common types of interfaces used to connect a monitor to a computer EXCEPT _____.

GPU

search sites

Google, Yahoo!, and Bing are all examples of ____. Select one: a. social networking software b. search sites c. third-party cookies d. tracking engines

over the Internet or another network

Hacking most often occurs ____. Select one: a. in upscale suburban areas b. when an attacker has physical access to a vulnerable computer c. over the Internet or another network d. on college campuses

Case 1-1 Nicole, a sophomore at the local college, spends an evening with her father and her grandfather talking about technology. Nicole is amazed at the changes that have happened over just a few generations. Nicole's grandfather told her that when his grandfather was a young man, he worked on the 1890 U.S. Census using Hollerith's Punch Card Tabulating Machine and Sorter. What can Nicole determine from this?

He worked on a machine built by a company that would much later create the IBM PC.

Web browsers maintain a(n) ____ list, a record of all Web pages visited during a specified period of time.

History

domain names

IP addresses and their corresponding ____ identify computers available through the Internet. Select one: a. HTML codes b. TCP/IP routes c. ring topographies d. domain names

the group button

If you are using a monitor set to a lower resolution and you can't find a ribbon button, you might need to click _______ first. Select one: a. Close b. the taskbar c. the group button d. the scroll bar

Reply all

If you receive an email message that includes multiple recipients, and you wish to respond back to the same list of recipients, use the _______ command. Select one: a. Forward b. Forward all c. Reply d. Reply all

Forward

If you wish to send a received message on to someone who wasn't in the original recipients' list, use the _______ command. Select one: a. Forward b. Forward all c. Reply all d. Broadcast

a star

In the Internet Explorer desktop application, the View favorites, feeds, and history button looks like _______. Select one: a. a turning gear b. a house c. a star d. two overlapping boxes

G

In the accompanying figure, box _______ points to a list box or boxes. Select one: a. B b. C c. F d. G

A

In the accompanying figure, box _______ provides one-click access to commonly used commands, such as Save, Undo, and Redo. Select one: a. H b. A c. K d. M

H

In the accompanying figure, box _______ represents the view buttons. Select one: a. A b. B c. L d. H

C

In the accompanying figure, clicking the area denoted by box _______ provides access to Backstage view. Select one: a. C b. G c. M d. K

3

In the accompanying figure, the item in box _____ holds the results of processing. Select one: a. 1 b. 3 c. 4 d. 5

7

In the accompanying figure, the item in box _____ requests instructions and data from the cache or RAM and makes sure they are in the proper order for processing. Select one: a. 2 b. 3 c. 5 d. 7

5

In the accompanying figure, the item in box _____ stores data and instructions before and during processing. Select one: a. 1 b. 3 c. 5 d. 6

6

In the accompanying figure, the item in box _____ takes instructions and translates them into a form that the control unit can understand. Select one: a. 2 b. 3 c. 4 d. 6

C

In the accompanying figure, you can type entries into the location(s) marked by box _______. Select one: a. B b. C c. F d. G

F

In the accompanying figure, you would click the location(s) shown in box _______ to open another dialog box or window. Select one: a. F b. E c. B d. H

_____ printers form images with toner powder and are the standard for business documents.

Laser

_____ readers are typically used to process bank checks.

MICR

UNIX

Mac OS is based on the ____ operating system. Select one: a. LiMaX b. UNIX c. DOS d. FORTRAN

platters

Magnetic hard drives contain round pieces of metal called _____, which are coated with a magnetizable substance. Select one: a. platters b. cylinders c. SSDs d. saucers

computer sabotage

Maliciously altering the content of a competitor's commercial Web site is an example of ____ is an act of malicious destruction to a computer or computer resource. Select one: a. computer sabotage b. Cyberterrorism c. cracking d. a dot con

MANs

Microsoft and Google have created large networks known as ____ to provide free or low-cost Internet access to area residents. Select one: a. PANs b. LANs c. MANs d. WANs

two-thirds

More than ____ of all home Internet connections in the United States are broadband. Select one: a. one-third b. two-thirds c. three-quarters d. 90%

direct

Most Internet connections today are ____ (always-on) connections. Select one: a. dial-up b. lossless c. direct d. scaled

digital

Most networking media send data using ____ signals. Select one: a. flash b. digital c. analog d. contiguous

GUI

Most operating systems today primarily use a ____. Select one: a. GUI b. command-line interface c. YUI d. neural net interface

magnetic hard disks

Most storage servers are based on _____. Select one: a. magnetic tape b. flash memory c. optical discs d. magnetic hard disks

RF

Most wireless networking applications use frequencies in the ____ band. Select one: a. RF b. audible c. IR d. UV

_____ consists of high-performance storage servers that are connected individually to a network to provide storage for the computers connected to that network.

NAS

The text lists all of the following as commonly used Web browsers EXCEPT ____.

Navigator

Of the following, _____ is the most energy-efficient display technology.

OLED

_____ input data from special forms to score or tally exams, questionnaires, ballots, and so forth.

OMRs

cluster

On most computer systems, the smallest storage area on a hard disk is a(n) _____. Select one: a. track b. cluster c. SSD d. cylinder

encrypted

Only ____ email can be transmitted safely and privately. Select one: a. work b. Web-based c. encrypted d. logged

desktop

Operating systems used with personal computers are typically referred to as ____ operating systems. Select one: a. desktop b. network c. mobile d. embedded

_____ are thin circular discs made out of polycarbonate, topped with layers of materials and coatings used to store data and protect the disc.

Optical discs

The _____ standard means that a computer automatically configures new devices as soon as they are installed and the computer is powered up.

Plug and Play

In the accompanying figure, the item in box _____ requests instructions and data from the cache or RAM and makes sure they are in the proper order for processing.

Prefetch Unit

plagiarism

Presenting someone else's work as your own is ____. Select one: a. libel b. trademark infringement c. plagiarism d. unethical but not illegal

____ is one of the primary operations of a computer.

Processing

_____ is a method of storing data on two or more hard drives that work together.

RAID

Case 2-1 Vincent is trying to build an ideal computer system for his house. He is currently looking at all the hardware options available to him. Vincent is comparing the DDR3 rates of different brands of an item. That item would be _____.

RAM

The term memory when referring to computers usually means _____.

RAM

____ is the place in a computer where the programs and data the computer is currently using are stored.

RAM

_____ contain tiny chips and radio antennas; the data in them is read by a reader whenever it is in range (from two inches to up to 300 feet or more).

RFID tags

_____ is a form of permanent memory that holds all the instructions the computer needs to start up.

ROM

_____ are the fastest type of memory used by the CPU

Registers

160

SMS can transmit up to ____ characters in one message. Select one: a. 160 b. 64 c. 1,024 d. 256

hits

Search engines return a list of links to Web pages that match your search criteria, called ____. Select one: a. hits b. homers c. webcrawlers d. hotspots

drivers

Small programs called ____ are used to communicate with peripheral devices such as monitors, printers, and keyboards. Select one: a. buses b. threads c. drivers d. page files

____ is the set of computer programs that enables the hardware to perform different tasks.

Software

software suite

Sometimes, related software programs are sold bundled together as a(n) ____. Select one: a. operating system b. software suite c. incentivization d. software cluster

____ is the colloquial term for unsolicited emails.

Spam

search sites

Special Web pages called ____ are available to help you locate what you are looking for on the Internet. Select one: a. robots b. search sites c. Web bugs d. scanner pages

Step D in the accompanying figure is known as the ____ step.

Storage

Case 2-1 Vincent is trying to build an ideal computer system for his house. He is currently looking at all the hardware options available to him. Vincent is looking for top-end bus data transfer rates, and knows that the new _____ technology seems to offer the fastest speeds.

SuperSpeed USB

____ generally run one program at a time, as fast as possible.

Supercomputers

the operating system & utility programs that control a computer

System software consists of ____. Select one: a. the operating system & utility programs that control a computer b. productivity programs such as Microsoft Office c. RAM, the hard disk, and any USB flash drives attached d. only those programs that operate enterprise-class servers

____ browsing allows you to open multiple Web pages at one time.

Tabbed

SMS

Text messaging is also known as ____. Select one: a. SMH b. VoIP c. IM d. SMS

toggle

The Bold button on the Word ribbon is an example of a(n) _______ button. Select one: a. bidirectional b. toggle c. active d. passive

Excel

The Formulas tab is unique to _______. Select one: a. Word b. Excel c. PowerPoint d. Access

____ is the most well-known computer network in the world.

The Internet

ENERGY STAR

The U.S. Department of Energy and EPA developed the ____ program to encourage the creation of energy-saving devices. Select one: a. Gold Star b. ENERGY STAR c. LEED d. GreenWare

IEEE

The ____ develops networking standards. Select one: a. ANSI b. WWW c. IEEE d. TCP/IP

SMTP

The ____ protocol is used to deliver email over the Internet. Select one: a. HTTP b. XML c. FTP d. SMTP

system clock

The _____ is a small quartz crystal located on the motherboard. Select one: a. ALU b. system clock c. bus interface d. heat sink

CPU

The _____ is the main processing device for a computer. Select one: a. CPU b. cache c. USB d. FPU

Plug and Play

The _____ standard means that a computer automatically configures new devices as soon as they are installed and the computer is powered up. Select one: a. Plug and Play b. Fast I/O c. Click and Go d. Slot and Start

the Internet Explorer desktop application

The accompanying figure shows _______. Select one: a. the Internet Explorer desktop application b. the Internet Explorer app c. the Windows 8 desktop d. a page of search results

command-line interface

The accompanying figure shows a(n) ____. Select one: a. GUI b. HUI c. command-line interface d. UNIX interface

flash memory cards

The accompanying figure shows various examples of _____. Select one: a. embedded drives b. flash memory cards c. external hard drives d. ZIP drives

speed

The biggest advantage of fiber-optic cabling is ____. Select one: a. ruggedness b. speed c. price d. flexibility

embedded computers

The computers found in DVD players, thermostats, answering machines, and some appliances are known as ____. Select one: a. mobile devices b. fifth-generation computers c. embedded computers d. miniframes

kernel

The core of the computer's operating system is called the ____. Select one: a. boot sector b. node c. shell d. kernel

workbooks

The files you create in Excel are called _______. Select one: a. documents b. presentations c. workbooks d. databases

Ctrl+X

The keyboard shortcut for cutting text or objects is _______. Select one: a. Ctrl+C b. Ctrl+V c. Ctrl+Z d. Ctrl+X

Windows 8

The latest version of the Windows operating system is ____. Select one: a. Windows XP b. Windows 10 c. Windows Vista d. Windows 8

being sent to foreign nations with lax environmental standards

The majority of discarded computer equipment sent to recyclers in developed nations ends up ____. Select one: a. being reused in new computer components b. being safely separated and recycled within the United States c. being sent to foreign nations with lax environmental standards d. being ground into the underlayment used in highways

interface

The means by which you interact with any program on a computer is called the user ____. Select one: a. interface b. shunt c. plug-in d. GIU

save

The most common tasks you perform in any Office application are to create, open, _______, and close files. Select one: a. share b. delete c. edit d. save

boot

The operating system is loaded into memory during the ____ process. Select one: a. kernel b. boot c. SOLE d. lacing

tabs

The ribbon is organized into _______ and groups. Select one: a. panes b. quadrants c. workspaces d. tabs

system failure

The technical term for the complete malfunction of a computer system is ____. Select one: a. BSOD b. asset demechanization c. file corruption d. system failure

green

The term ____ computing refers to the use of computers in an environmentally friendly manner. Select one: a. green b. blue c. bio d. tonic

Cybercrime

The term ____ encompasses any illegal act involving a computer. Select one: a. Wardriving b. Websparring c. Nethacking d. Cybercrime

software

The term ____ refers to the programs or instructions used to tell a computer what to do, and allow people to use a computer to perform specific tasks. Select one: a. hardware b. networking c. vaporware d. software

RAM

The term memory when referring to computers usually means _____. Select one: a. ROM b. BIOS c. RAM d. RAID

Navigator

The text lists all of the following as commonly used Web browsers EXCEPT ____. Select one: a. Navigator b. Internet Explorer c. Chrome d. Firefox

stringing together easy-to-remember family names

The text recommends all of the following for creating strong passwords EXCEPT ____. Select one: a. using at least eight characters b. using a combination of upper- and lowercase letters c. creating a password from an easy-to-remember passphrase d. stringing together easy-to-remember family names

keywords

The use of multiple _______ is sometimes called using a search phrase. Select one: a. hits b. search results c. search engines d. keywords

architecture

The way a network is designed to communicate is known as its ____. Select one: a. architecture b. protocol path c. topology d. latency

scroll bars

To change which area of the workspace is visible in the program window, you can use the _______. Select one: a. zoom bars b. scroll bars c. resolution setting d. ScreenFilter

keywords

To conduct a Web search, you type ____ into a search box on a search site. Select one: a. passwords b. passphrases c. spiders d. keywords

domain name

To ensure a unique email address for everyone in the world, usernames must be unique within each ____. Select one: a. region b. nation c. hub d. domain name

.jpg

To help protect your computer, avoid opening email attachments with any of the following file extensions EXCEPT ____. Select one: a. .exe b. .jpg c. .com d. .vbs

click the Pin site button, then click Add to favorites

To save a favorite in the Internet Explorer app, you _______. Select one: a. click the Pin site button, then click Add to favorites b. simply type '%' at the end of the URL in the Address bar c. drag the Address bar to the upper-left corner of the screen, then release d. are out of luck; you can only add favorites in the desktop application

ExpressCard modules

Today, many notebook and netbook computers use _____ instead of PC Cards to give them additional capabilities. Select one: a. ExpressCard modules b. flash chips c. FireWire expansion slots d. USB cards

VoIP

Today, the standard term for placing telephone calls over the Internet is ____. Select one: a. podcasting b. Internet telephony c. cyberchatting d. VoIP

Case 1-1 Nicole, a sophomore at the local college, spends an evening with her father and her grandfather talking about technology. Nicole is amazed at the changes that have happened over just a few generations. Nicole's grandfather then told her that when he was a teenager, back in 1952, he helped out in the local Eisenhower for President campaign office. At that time, there was talk of a fancy new machine that was going to help count and analyze the votes that year. That machine was ____.

UNIVAC

____ ports are now the most common ports for connecting input and output devices to the computer.

USB

Case 2-1 Vincent is trying to build an ideal computer system for his house. He is currently looking at all the hardware options available to him. Vincent wants to be able to move very large amounts of data around from one physical site to another. The technology that currently will let him put the most information on one easily portable device is _____.

USB flash drives

Flash drives plug into a

USB port

worms, Trojan horses

Unlike ____, ____ cannot replicate themselves. Select one: a. Trojan horses, worms b. viruses, worms c. worms, Trojan horses d. worms, viruses

a URL

Using only what you can see in the accompanying figure, you can say that the box marked A is pointing to _______. Select one: a. a URL b. the home page c. the status bar d. the current default search engine

The term ____ refers to one resource available through the ____.

WWW, Internet

tabs

Web pages are displayed on _______ in the Internet Explorer desktop application. Select one: a. slices b. dialogs c. slides d. tabs

browser

Web pages are viewed using a Web ____. Select one: a. bug b. spinner c. browser d. compiler

domain name, IP address

When a Web site is requested by its ____, the corresponding ____ is looked up using one of the Internet's DNS servers. Select one: a. domain name, IP address b. IP address, domain name c. TCP/IP route, ring topography d. ISP, HTML code

the buyer acquires a software license specifying the terms of use

When a software program is purchased, ____. Select one: a. the buyer is buying the software b. the buyer can modify and resell the software c. the buyer may always install the software on as many systems as he or she wishes d. the buyer acquires a software license specifying the terms of use

closes the file and the application

When only one file is open in an application, clicking the application's Close button _______. Select one: a. closes only the file b. closes the file and the application c. is dimmed and unclickable d. has different effects depending on the application open

https

When shopping at an e-commerce Web site, make sure you only enter payment information on a secure Web page, one with a URL that begins with ____. Select one: a. http b. https c. SEC-http d. a deadbolt symbol

it is moved to the Deleted items folder

When you delete a message from the Inbox, _______. Select one: a. the sender's name is deleted from your Contacts as well b. it is moved to the Deleted items folder c. it is immediately permanently deleted d. it is moved to a holding area on the desktop or the Start screen

http://

When you type a URL into the Address bar and press the Enter key, Internet Explorer automatically adds _______ to the URL and then displays the page. Select one: a. html::80 b. IE10:// c. TCP/IP d. http://

900

Wi-Fi is designed for medium-range transfers, up to ____ feet outdoors. Select one: a. 100 b. 300 c. 500 d. 900

cloud

Windows Live SkyDrive is an example of _____ storage. Select one: a. NAS b. SAN c. cloud d. direct

radio

Wireless networks usually use ____ signals to send data. Select one: a. analog b. radio c. fiber-optic d. contiguous modulation

serial

With ____ transmission, data is sent one bit at a time. Select one: a. serial b. parallel c. pulse d. fiber-optic

operating system

Without a(n) ____, a computer cannot function. Select one: a. pointing device b. application suite c. operating system d. optical drive

by working with the Internet Options dialog box, General tab

You can change your start page _______. Select one: a. from within the Internet Explorer app only b. by triple-clicking the Address bar c. by working with the Internet Options dialog box, General tab d. only when you first start Internet Explorer

HOME

You can find the _______ tab on the ribbon in all Office programs. Select one: a. HOME b. INSERT c. REVIEW d. VIEW

Address bar

You use the _______ to conduct a search using the default search site for Internet Explorer. Select one: a. status bar b. navigation pane c. Address bar d. Apps bar

_____ paper looks like regular white photo paper, but is embedded with dye crystals that change color when heat-activated.

ZINC

Tabbed

____ browsing allows you to open multiple Web pages at one time. Select one: a. Webbed b. Threaded c. Tabbed d. Reticulated

Twisted-pair

____ cable is the least expensive type of networking cable and has been in use the longest. Select one: a. Coaxial b. Fiber-optic c. Twisted-pair d. Packet-switched

Coax

____ cable uses a thick center wire surrounded by insulation and covered with braided wire to block electromagnetic interference. Select one: a. Fiber-optic b. CAT5 c. Twisted-pair d. Coax

Supercomputers

____ generally run one program at a time, as fast as possible. Select one: a. Supercomputers b. Mainframes c. Quantum computers d. Thin clients

Bitmap

____ images are created by coloring the individual pixels in an image. Select one: a. Bitmap b. Vector c. Illustrator d. Radial

Malware

____ is a generic term that refers to any type of malicious software. Select one: a. Malware b. Cookie c. Virus d. Bug

Bluetooth

____ is a wireless standard in the 2.4 GHz frequency band that is designed for very short-range connections, to replace cables between devices. Select one: a. MIFI b. WiMAX c. Bluetooth d. Red Hat

Processing

____ is one of the primary operations of a computer. Select one: a. Administration b. Sorting c. Processing d. Throughput

Copyright

____ is the legal right to sell, publish, or distribute an original artistic or literary work. Select one: a. Trademark b. Service mark c. Copyright d. Prima corpus

The Internet

____ is the most well-known computer network in the world. Select one: a. Skynet b. Telnet c. The Internet d. AOL

Phishing

____ is the use of a fraudulent email message to trick the recipient into revealing sensitive personal information. Select one: a. Spamming b. Pharming c. Barnstorming d. Phishing

Identity theft

____ occurs when someone obtains enough information about a person to be able to masquerade as that person. Select one: a. Spoofing b. Pharming c. Identity theft d. Data theft

Shareware

____ programs are distributed on the honor system. Select one: a. Malware b. Shareware c. Freeware d. Vaporware

File compression

____ programs reduce the size of files so they take up less storage space. Select one: a. File management b. Backup and recovery c. Cleanup d. File compression

Cloud computing

____ refers to data, applications, and even resources stored on computers accessed over the Internet. Select one: a. Telecommuting b. Cloud computing c. The Ethernet d. Embedded computing

Opting out

____ refers to following a predesignated procedure to remove yourself from marketing lists. Select one: a. Downsizing b. Rabbitholing c. Opting out d. Deprofiling

Spam

____ refers to unsolicited email sent to a large group of individuals at one time. Select one: a. Spam b. Phish c. Salami d. Profiling

Commercial

____ software includes any software that is developed and sold for a profit. Select one: a. Commercial b. Industry-ware c. Freeware d. Vaporware

ARPANET

____ was the predecessor of the Internet. Select one: a. DRAGnet b. ARPANET c. APPLENET d. TARP-Net

Registers

_____ are the fastest type of memory used by the CPU. Select one: a. ROMs b. Level 1 caches c. Level 2 caches d. Registers

Flash memory cards

_____ are the most common type of storage media for digital cameras and mobile phones. Select one: a. Mini-CDs b. Optical discs c. Cache packets d. Flash memory cards

Optical discs

_____ are thin circular discs made out of polycarbonate, topped with layers of materials and coatings used to store data and protect the disc. Select one: a. Platters b. Optical discs c. SSDs d. Hybrid hard drives

Computer chips

_____ are very small pieces of semiconducting material that contain integrated circuits. Select one: a. Motherboards b. Computer chips c. Optical drives d. Expansion slots

NAS

_____ consists of high-performance storage servers that are connected individually to a network to provide storage for the computers connected to that network. Select one: a. NAS b. SAN c. RAID d. Cloud storage

Flash memory chips, ROM

_____ has/have begun to replace _____ for storing system information such as a computer's BIOS. Select one: a. Flash memory chips, ROM b. RAM, ROM c. ROM, flash memory chips d. Buses, ROM registers

RAID

_____ is a method of storing data on two or more hard drives that work together. Select one: a. RAID b. SAN c. NAS d. Cloud computing

Cache

_____ memory is very fast memory circuitry located near the CPU that is used to speed up processing. Select one: a. ROM b. Flash c. Cache d. ALU

PowerPoint

_______ is used to create a collection of slides that can contain text, charts, pictures, sound, movies, etc. Select one: a. PowerPoint b. Word c. Access d. Excel

Word

_______ is used to enter, edit, and format text. Select one: a. Word b. PowerPoint c. Excel d. Access

multi-core CPU

a CPU that contains the processing components or cores of multiple independent processors in a single CPU

expansion bus

a bus on the motherboard used to connected peripheral devices

expansion card (interface card)

a circuit board used to give desktop computers additional capabilities

hybrid hard drive

a combination flash memory/magnetic hard drive

LED (light emitting diode)

a common flat panel technology

track

a concentric ring on the surface of a hard disk where data is recorded

port

a connector on the exterior of the system unit case that is used to connect an external hardware device

smart card

a credit card sized piece of plastic that contains a chip and computer circuitry that can store data

transistor

a device made of semiconductor material that controls the flow of electrons inside a chip

output device

a device that accepts processed data from the computer and presents the results to the user

optical mark reader (OMR)

a device that inputs data from special forms to score or tally the data on those forms

biometric reader

a device used to input biometric data, such as an individuals fingerprint or voice

optical drive

a drive designed to read optical discs

cache memory

a group of very fast memory circuitry located on or close to the CPU to speed p processing

magnetic hard drive

a hard drive consisting of one or more metal magnetic disks permanently sealed with an access mechanism and read/write heads, inside its drive

solid state drive (SSD or flash memory hard drive)

a hard drive that uses flash memory media

FireWire

a high speed bus standard used to connected devices-particularly multimedia devices like digital video cameras-to a computer

network attached storage (NAS)

a high-performance storage server connected individually to a network to provide storage for computers on that network

expansion slot

a location on the motherboard into which an expansion card is inserted to connect to the motherboard

dots per inch(dpi)

a measurement of resolution that indicates the quality of an image or output

clock speed

a measurement of the number of instructions that a CPU can process per second

RAID (redundant array of independent disks)

a method of storing data on two or more hard drives that work together

file

a named collection of bytes that represent virtually any type of data

storage area network (SAN)

a network of hard drives or other storage devices that provide storage for another network

sector

a pie-shaped section on the surface of a hard disk

Which of the following is an example of an input device?

a scanner

system clock

a small quartz crystal located on the motherboard that synchronizes the computers' operations

flash memory card

a small rectangle flash memory medium

storage server

a storage device containing multiple high-speed hard drives connected to the computer system or network

remote storage

a storage device that is not connected directly to the users computer

optical disc

a storage medium in the shape of a thin circular disc made of polycarbonate substance read from and write to using a laser beam

In the path C:\Book\Chapter8\images\fly.jpg, "Chapter8" is _____. Select one: a. a top-level folder b. a subfolder under "images" c. a subfolder under "Book" d. the drive name

a subfolder under "Book"

radio frequency identification (RFID)

a technology that can store, read, and transmit data in RFID tags

circuit board

a thin board containing computer chips and other electronic components

RFID tag

a tiny chip and radio antenna attached to an object so it can be identified using RFID technology

liquid crystal display (LCD)

a type of flat-panel display that uses charged liquid crystals to display images

Universal Serial Bus (USB)

a versatile bus architecture widely used for connected peripherals

computer chip

a very small piece of silicon or other semiconducting material that contains integrated circuits (ICs) and transistors

Restarting a computer when it is already powered on is called ____.

a warm boot

You may not use the _____ character when creating a folder name. Select one: a. > b. ! c. @ d. .

a. >

The first hard drive in a computer is usually drive _____. Select one: a. C b. A c. E d. Z

a. C

The Forward feature leaves the _______ box(es) blank. Select one: a. Cc and Bcc b. Bcc only c. To only d. To, Cc, and Bcc

a. Cc and Bcc

Case-Based Critical Thinking Questions Case 7-3 You are putting together a folder with a series of documents relating to a call to Gaspard Corporation from June 2014. The following questions will test your understanding of the concepts of folder & file naming discussed in the chapter. Based on the text's guidelines, choose the best folder name. Select one: a. Gaspard-Conf-Call-June-2014 b. Gaspard Call: 6-14 c. gcc614 d. Gaspard Corporation, LLC Conference Call to Discuss Strategic Realignment, noon, June 2014

a. Gaspard-Conf-Call-June-2014

To select a series of adjacent files, click the first desired file, press and hold the _____ key, then click the last desired file. Select one: a. Shift b. Tab c. Ctrl d. Windows

a. Shift

Case-Based Critical Thinking Questions Case 7-2 You are working in a File Explorer window. Choose the best answer for each of these scenarios. You have opened a file, but cannot make modifications to it. What is the most likely reason? Select one: a. The file is within a compressed folder. b. You have opened the file with the wrong program c. You are working in desktop mode. d. The desktop application is made for Windows 7.

a. The file is within a compressed folder.

The accompanying figure shows a File Explorer window in _____ view. Select one: a. Tiles b. Details c. Large Icons d. List

a. Tiles

If you point to an application button on the desktop taskbar, _____. Select one: a. a thumbnail of the application window appears b. the application becomes active c. the application is maximized d. a shortcut menu appears

a. a thumbnail of the application window appears

A happy face or sad face image placed in the message text of an email is called a(n) _______. Select one: a. emoticon b. charm c. facetile d. winkie

a. emoticon

The desktop _____ is a horizontal bar containing buttons that provide quick access to common tools and running programs. Select one: a. taskbar b. Charms bar c. Start screen d. notification area

a. taskbar

When you delete a file from a USB drive, _____. Select one: a. the file is deleted permanently b. the file moves to the Recycle Bin c. a backup of the file is moved to your SkyDrive d. the total storage space on your USB drive is reduced by the file's size

a. the file is deleted permanently

bus

an electronic path over which data travels

display device

an output device that contains a viewing screen

input device

any piece of equipment that is used to enter data into the computer

Case 2-2 Tracy works at a computer supply company. This week she has fielded a surprising number of questions about printers. Lastly, Tracy has a long discussion with a potential client about the process known as FDM. The client is most likely a(n) _____.

architect

_____ means to create an uncompressed copy of a compressed file or folder. Select one: a. Zipping b. Extracting c. Extruding d. Exploding

b. Extracting

Case-Based Critical Thinking Questions Case 7-3 You are putting together a folder with a series of documents relating to a call to Gaspard Corporation from June 2014. The following questions will test your understanding of the concepts of folder & file naming discussed in the chapter. Which of the following file names would not be accepted by Windows? Select one: a. Tully Experience.docx b. Outstanding Shares <protected>.docx c. [email protected] d. t.docx

b. Outstanding Shares <protected>.docx

Case-Based Critical Thinking Questions Case 7-2 You are working in a File Explorer window. Choose the best answer for each of these scenarios. A file that was once in one folder is now in another folder, and missing from the original folder. Why? Select one: a. You dragged the file, and the two folders are on different drives. b. You dragged the file, and the two folders are on the same drive. c. You used the Copy command instead of the Cut command. d. The Clipboard was full and unable to accept the file.

b. You dragged the file, and the two folders are on the same drive.

File naming rules differ from folder naming rules _____. Select one: a. in specifying a different maximum length for file names b. in no way; the rules are the same c. in the characters that are not allowed d. in that two files in different folders may not have the same name

b. in no way; the rules are the same

When you drag a file or folder from one location to another on the same drive, it _____. Select one: a. is copied, not moved b. is moved, not copied c. is automatically extracted d. is automatically compressed

b. is moved, not copied

In the accompanying figure, you know that there is no previously displayed window because _____. Select one: a. box E is at the root directory b. the buttons in box B are grayed out c. none of the subdirectories in box A are opened d. box D does not have a History tab visible

b. the buttons in box B are grayed out

The majority of discarded computer equipment sent to recyclers in developed nations ends up ____.

being sent to foreign nations with lax environmental standards

The _____ language consists of just two digits: 0 and 1.

binary

The term "bit" is short for ______.

binary digit

Web pages are viewed using a Web ____.

browser

A _____ is an electronic path over which data can travel.

bus

A folder name can have up to _____ characters. Select one: a. 8 b. 11 c. 255 d. 256

c. 255

To select nonadjacent files, press and hold the _____ key while selecting individual files. Select one: a. Shift b. Tab c. Ctrl d. Windows

c. Ctrl

When you click "Empty Recycle Bin," files stored in the Recycle Bin _____. Select one: a. return to their original position b. can be retrieved using the Restore tab on the ribbon c. are permanently deleted d. are compressed

c. are permanently deleted

A(n) ______ is a file you send with an email message. Select one: a. tag b. addendum c. attachment d. widget

c. attachment

In a File Explorer window, you can tell that a folder is compressed by the _____ icon displayed. Select one: a. exclamation point b. open folder c. zipper d. empty folder

c. zipper

The type of monitor that looks like a traditional television set is called a ____ monitor.

cathode-ray tube (CRT)

memory

chips located inside the system unit used to store data and instructions while is working with them

Windows Live SkyDrive is an example of _____ storage.

cloud

On most computer systems, the smallest storage area on a hard disk is a(n) _____.

cluster

The ____ is used in combination with other keys to perform shortcuts and special tasks.

control

A smart card is the size of a _____.

credit card

Case-Based Critical Thinking Questions Case 8-3 You are "learning the ropes" about using different functions when writing and replying to emails. In the questions below, select the answer that describes the best or most appropriate course of action. Jenny sent you an email. You want to respond to it, and also to show Ben your response. But you don't want Jenny to see that you've sent it to Ben. Select one: a. "Reply" with Ben as Cc b. "Forward" to Ben c. "New" to Ben, Bcc to Jenny d. "Reply" with Ben as Bcc

d. "Reply" with Ben as Bcc

In the accompanying figure, box _____ represents a status bar. Select one: a. A b. B c. C d. D

d. D

Case-Based Critical Thinking Questions Case 7-3 You are putting together a folder with a series of documents relating to a call to Gaspard Corporation from June 2014. The following questions will test your understanding of the concepts of folder & file naming discussed in the chapter. The folder is quite large, and you compress it for archiving. Which of the following is true of the compressed folder? Select one: a. You may only give the compressed folder a name from one of the files within the folder. b. You must begin the compressed folder's name with the * character to distinguish it. c. You may only use a maximum of 16 characters in the compressed folder's name. d. You must extract any file from the folder before changing the file's name.

d. You must extract any file from the folder before changing the file's name.

If you see a paperclip icon next to a message in the message list, that means _______. Select one: a. the message is time-sensitive b. the message is high-priority c. the message has been read d. the message has an attachment

d. the message has an attachment

Any fact or set of facts, such as the words in a letter to a friend or the notes in a song, can become computer ____.

data

Display device size is measured _____.

diagonally from corner to corner

When a Web site is requested by its ____, the corresponding ____ is looked up using one of the Internet's DNS servers.

domain name, IP address

IP addresses and their corresponding ____ identify computers available through the Internet.

domain names

Case 2-2 Tracy works at a computer supply company. This week she has fielded a surprising number of questions about printers. Tracy takes a call from a factory that needs an economical printer to produce large numbers of packing slips and invoices. The emphasis is quantity over quality. Tracy suggests that a(n) _____ printer might be just right.

dot-matrix

A device that must be connected to a network to perform processing or storage tasks is referred to as a ____.

dumb terminal

byte

eight bits grouped together

The computers found in DVD players, thermostats, answering machines, and some appliances are known as ____.

embedded computers

____ is the applied science concerned with designing and arranging things that people use so that the people and things interact most efficiently and safely.

ergonomics

The term "____" refers to overall standards of moral conduct.

ethics

_____ are a form of permanent storage that can be seen and accessed from outside the system unit are typically used for CD and DVD drives.

external drive bays

The accompanying figure shows various examples of _____.

flash memory cards

USB flash drive

flash memory media integrated into a self-contained unit that plugs into a USB port

Which of the following is NOT one of the four major data processing functions of a computer?

gathering data

A ______ is approximately 1 billion bytes.

gigabyte

The term ____ computing refers to the use of computers in an environmentally friendly manner.

green

Any computer parts that you can actually touch are considered to be _____.

hardware

hard drive

hardware used to store most programs and data on a computer

_____ is a power mode that allows the computer to save an image of the desktop to the hard drive and enter a state of reduced power consumption to save energy.

hibernate

register

high-speed memory built into the CPU

In the accompanying figure, the protocol identifier is shown in box ____.

http://

_____ printers have tiny hammer-like keys that strike the paper through an inked ribbon.

impact

In the accompanying figure, the document being retrieved and displayed is found in box ____.

index.html

Case 2-2 Tracy works at a computer supply company. This week she has fielded a surprising number of questions about printers. Tracy's next phone call comes from a college student who needs to print out term papers and decent quality color reports on a budget. Tracy easily suggests a(n) _____ printer for her.

inkjet

Computers gather data, which means that they allow users to ____ data.

input

A(n) _____ enables you to enter data and instructions into the computer.

input device

A(n) _____ is any piece of equipment that is used to enter data into a computer.

input device

Information

is data that has been organized or presented in a meaningful fashion

Case 2-2 Tracy works at a computer supply company. This week she has fielded a surprising number of questions about printers. Next, Tracy hears from an administrative assistant in a law office who wants a printer that will deliver high quality & resolution appropriate for legal documents. Tracy recommends a(n) _____ printer.

laser

Case 2-1 Vincent is trying to build an ideal computer system for his house. He is currently looking at all the hardware options available to him. In order to choose the fastest hard disk, Vincent examines all of the following details EXCEPT _____.

latency

The term, ____ describes computing devices or peripherals that use techniques, parts, and methods from an earlier time that are no longer popular.

legacy technology

Most storage servers are based on _____.

magnetic hard disks

A large organization that needs a computer to run the programs that staff use during the day, and then spend the night performing payroll and billing, most likely will buy a ____.

mainframe

Case 1-2 Casey is learning about the types of servers and more powerful computers available. She's asked you to come over and quiz her. Lastly, you tell Casey that she needs a computer for a large organization that can manage large amounts of data and run multiple programs simultaneously. She tells you that this would be a(n) ____.

mainframe

Large, expensive computers that support hundreds of users simultaneously are called ______.

mainframe

A _____ is approximately 1 million bytes.

megabyte

Case 2-1 Vincent is trying to build an ideal computer system for his house. He is currently looking at all the hardware options available to him. Vincent is looking into buying a solid-state drive for storage. Of the following, _____ is a disadvantage of SSD compared to a traditional hard drive.

memory cells prone to wearing out

disk cache

memory used in conjunction with a magnetic hard drive to improve system performance

RAM (random access memory)

memory used to store data and instructions while the computer is running

The fourth generation of computers was marked by the introduction of ____.

microprocessors

Case 1-2 Casey is learning about the types of servers and more powerful computers available. She's asked you to come over and quiz her. You tell Casey that she needs a computer to operate and maintain the network in her school's computer lab. Casey tells you that would be a(n) ____.

minicomputer

Midrange servers are also known as ____.

minicomputers

The _____ port resembles a standard phone jack.

modem

A 3D printer typically forms output by layering _____.

molten plastic

The _____ contains the central electronic components of the computer.

motherboard

A _____ enables your computer to connect to other computers or to the Internet.

network interface card (NIC)

Inkjet printers and laser printers are examples of ____ printers.

nonimpact

The hard disk drive is a ____ storage device, meaning that it stores data permanently.

nonvolatile

ROM (read only memory)

nonvolatile chips on the motherboard that permanently store data or programs

flash memory

nonvolatile memory chips that can be used for storage by he computer or the user

Case 1-3 Damon is learning about intellectual property, copyright, and plagiarism. You give him several scenarios to test his understanding. In an article, a journalist paraphrases a few sentences from another author without changing the meaning, and credits the original author with a proper citation. The journalist receives pay for this article. Damon tells you this is ____.

not plagiarism

Computers process data into information by working exclusively with _____.

numbers

An _____ uses an internal sensor or laser to detect the mouse's movement.

optical

Intellectual property is ____.

original creative work

After a picture has been taken with a digital camera and processed appropriately, the actual print of the picture is considered _____.

output

USB ports are fast replacing traditional ____ ports because of their ability to transfer data quickly.

parallel and serial

Devices such as monitors and printers that are connected to the computer are called _____.

peripheral devices

A(n) _____ is the smallest colorable area on a display device.

pixel

PPI stands for _____.

pixels per inch

Case 1-3 Damon is learning about intellectual property, copyright, and plagiarism. You give him several scenarios to test his understanding. A student copies and pastes information from various online documents to create a research paper, without crediting the original authors. The paper is only for school use and will not be shared or sold outside of school. Damon rightly says this is ____.

plagiarism

Presenting someone else's work as your own is ____.

plagiarism

Magnetic hard drives contain round pieces of metal called _____, which are coated with a magnetizable substance.

platters

____ are large printers used to produce oversize pictures that require precise continuous lines, such as maps and architectural plans.

plotters

A ____ is where a peripheral device can attach to a computer so that data can be exchanged between it and the operating system.

port

The ____, housed inside the system unit, regulates the wall voltage to the voltages required by the computer chips.

power supply

All the following examples are of input devices except a _____

printer

online storage

remove storage devices accessed via the internet

Special Web pages called ____ are available to help you locate what you are looking for on the Internet.

search sites

The term ____ refers to the programs or instructions used to tell a computer what to do, and allow people to use a computer to perform specific tasks.

software

magnetic tape

storage media consisting of plastic tape coated with a magnetizable substance

A ______ is a device that looks like a skinny pen but has no ink.

stylus

An electronic pen is also called a(n) _____.

stylus

Case 1-2 Casey is learning about the types of servers and more powerful computers available. She's asked you to come over and quiz her. Next, you tell Casey that she is standing in front of an incredibly expensive computer that can handle intensive 3D medical imaging applications, and will be designed to focus all of its computing power on one task at a time. Casey tells you that you're describing a(n) ____.

supercomputer

_____ software is the set of programs that enables the computer's hardware devices and application software to work together.

system

The _____ is a small quartz crystal located on the motherboard.

system clock

A ______ is a portable computer that features a touch-sensitive screen and handwriting recognition software.

tablet PC

A(n) ____ is a notebook computer designed for use with a digital pen or touch input.

tablet PC

RAM is considered volatile storage, which means it is _____.

temporary

word

the amount of data (measured in bits or bytes) that a CPU can manipulate at one time

throughput (bandwidth)

the amount of data that can be transferred via the bus in a given time period

central processing unit (CPU)

the chip located on the motherboard of a computer that performs the processing for the computer

cylinder

the collection of tracks located in the same location as a set of hard disk surfaces

storage device

the hardware where a storage medium is read from or written to

storage medium

the hardware where data is actually stored

system unit

the main case of a computer

motherboard

the main circuit board inside the system unit

Case 1-1 Nicole, a sophomore at the local college, spends an evening with her father and her grandfather talking about technology. Nicole is amazed at the changes that have happened over just a few generations. Nicole has enjoyed hearing about the advances in computers before her day. She asks her grandfather and father which was the longest-lasting generation of computers. They smile, and tell her it's ____.

the one in which she was born

prefetch unit

the part of a CPU core that attempts to retrieve data and instructions before they are needed for processing to avoid delays

control unit

the part of a CPU core that coordinates its operations

floating point unit (FPU)

the part of a CPU core that performs decimal arithmetic

arithmetic/logic unit (ALU)

the part of a CPU core that performs logical operations and integer arithmetic

decode unit

the part of a CPU core that translates instructions into a form that can be processed by the ALU and FPU

bus interface unit

the section of a CPU core that allows the Core to communicate with other CPU components

BIOS ( basic input/output system)

the sequence of instructions the computer follows during the boot process

machine cycle

the series of steps performed by the computer when the CPU processes a single piece of microcode

cluster

the smallest storage area on a hard disk formed by one or more sectors

bit

the smallest unit of data that a binary computer can recognize

disk access time

the total time that is takes for a hard drive to read or write data

Devices designed primarily to be used with a company network are called ____.

thin clients

Monitor screen grids are made up of millions of pixels, with each pixel containing ____ sub pixels of colors.

three

Case 1-3 Damon is learning about intellectual property, copyright, and plagiarism. You give him several scenarios to test his understanding. A teacher shares a poem with the class. Damon tells you this is ____.

too little information to say

A _____ is a rectangular pad most often found on notebook and netbook computers.

touch pad

The small, touch-sensitive area at the base of the keyboard on a notebook computer is known as a ______

touch pad

A(n) ____ is essentially an upside-down mouse that can be more comfortable to use.

trackball

The accompanying figure demonstrates the primary four operations of a computer.

true

_____ microphones pick up sound from only one direction

unidirectional

An email address consists of a ____, followed by an @ symbol, followed by the domain name of the mail server.

username

Case 2-1 Vincent is trying to build an ideal computer system for his house. He is currently looking at all the hardware options available to him. Lastly, Vincent is researching various display devices. He discovers that OLED technology has many plusses over LCD technology, including all of the following EXCEPT _____.

uses variable backlighting

A(n) _____ is a rectangular work area on the desktop that contains a program, text, files, or other data and tools. Select one: a. window b. portal c. app d. smartcard

window


संबंधित स्टडी सेट्स

Unit 2- Adrenal Insufficiency (primary and secondary)

View Set

Chapter 4: Consideration: The Value for the Promise

View Set

98-369 Microsoft Cloud Fundamentals Chapter 1: Understanding the Cloud - 2

View Set

HM 386 Final Exam-- Chapters 6, 9, and 10 (Without Games)

View Set

Business Management Brand Promise Test

View Set

BF - Exam 2 Review (FROM PROFESSOR)

View Set