CSC 120

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Information systems include a collection of technical and human resources providing technological solutions for an entity or enterprise.

True

Protocols are used to determine how information is exchanged

True

Internet addresses are classified by domains like .gov, .edu and .net.

False

Nano technology refers to larger than life technology.

False

Types of networks include all except,

SAN

Major browsers include

Safari, Chrome & Firefox

Which of the following displays an incorrect domain name?

www.newyork.new

What is the protocol used for the Internet?

TCP/IP

3-D describes depth perception

True

4GL languages typically use real world objects as a basis for modeling software components.

True

A bus network broadcasts signals to all devices.

True

A gateway is a bridge to another LAN using the same protocol

True

As files are written and deleted, hard disks can become fragmented.

True

Authentication ensures that uses are who they say they are.

True

Bluetooth devices use short-range radio waves to transmit data.

True

Security is important because it is there are many security breaches that can cause loss or potential loss of data, equipment, and individuals.

True

The ARPANET was the beginning of the Internet.

True

The Internet is a massive network of networks, a networking infrastructure connected globally, forming a network in which any computer can communicate with any other computer as long as they are both connected to the Internet.

True

The data function of control allows the granting of permission to access data.

True

The only difference between cyberharrassment and cyberbullying is the age of the perpetrator.

True

The processor has two components, the ALU which handles the data manipulations and the control unit that handles the processor activities.

True

Unintentional acts can cause as much or more damage as intentional acts.

True

When virtual memory is used, that means the RAM is overloaded.

True

Simple set of instructions

algorithm

The Graphical User Interface is a program interface that

all of the above

Money or other valuable assets cannot be lost through the use of computers or computer systems.

False

Platforms are the only way files can be shared between different systems

False

Productivity software is designed and programmed for an individual customer, and can be very costly

False

Software developed for, marketed and sold to the general public is known as custom software.

False

Standard keyboards in the QWERTY design provide comfort, efficiency, and safety in the design of the workplace.

False

Storage media are not a function of data security and therefore do not need to be safeguarded.

False

Symbols and numbers were the only data used with the languages introduced by the third generation of computer programming.

False

Tablet computers can only respond to voice commands.

False

The Internet Society owns the Internet.

False

The OSI model defines a networking framework to implement protocols in nine layers.

False

The binary number system uses 8 digits to represent all data in a computer system.

False

The syntax used in 3GL is very close to human language which is an improvement from the previous generation of languages.

False

Accidental problems are only caused by the computer user, never the computer itself.

False

After you have looked at implementing safeguards for your computer system, you further protect it by looking at your risky behavior to modify them.

False

An early programming language called assembly language is the actual language that the computer understands.

False

Antivirus programs help protect your computer against pop-ups, slow performance and security threats caused by spyware and other unwanted software

False

Availability means the information needed from a computer system is not altered by unauthorized persons.

False

Cable moderm allows internet connection through mobile devices.

False

Command-line interfaces are no longer in use.

False

Communication software is not an interface for the user. It only helps users to connect to one another.

False

Computer Telephony uses telephone wire to transmit data.

False

Controllers are used to send data to and from the motherboard.

False

Embedded computer components can be removed and placed in different systems.

False

Hard copy is data and information that can only be view using a digital display unit like a monitor or LCD projector.

False

If you use an ISP to connect to the Internet, your computer is no longer part of a network.

False

Information travels between components on the motherboard through groups of wires called Expansion Slots.

False

Intelligent machines are programs that have "conversation" between the user and the computer program

False

Internet Service Providers (ISPs) only offer cable and DSL broadband connections. For other connections, you have to connect directly.

False

It's not important to backup your files. Once you save them you don't need to worry about losing them.

False

User interface refers to how the user connects the computer's peripherals to the system unit.

False

Pharming sends an email that falsely claims to be a legitimate enterprise in attempt to scam the user into surrendering private information to be used for identity theft.

False (Phishing)

Data storage that holds more that hold more than 1 million bytes of information

Gigabyte, Petavyte, and Terabyte

From the list below, choose the option that is not an accurate description of a Tower Case.

Mid cases are cubed or rectangular in shape and used for specialized motherboards

The ALU performs the actual operations on the data, including all of the basic operations except

Multiplication

Operating system that resides on a server allowing a group of computers to connect and share resources.

NOS

Choose the option that is not a part of the motherboard.

NOT IDE NOT BIOS

Technology that allows machines to determine what humans are saying.

Natural language processing (NLP)

Processing can be done in all the following ways except

No core

Every device of a network is called?

Node

Command-line interface systems

Not A and not D

What is booting a computer?

Powering up and loading operating system commands

Which of the following statements about the computer is false?

Primary Memory (RAM stores programs and data. When the computer you log off, the contents of RAM are automatically moved to storage.

The four primary functions of computer system components include all of the following except

Print Information

Which of the following opition is not accomplished by the control unit?

Providing logical and computational capabilities

Which type of memory is considered unalterable or permanent?

ROM

Which step is not a part of the Machine Cycle?

Retrieve

Every device has exactly two neighbours.

Ring

Layer of the OSI model that manages the connection between network applications.

Session Layer

A keylogger is a type of surveillance software that has the capability to record every keystroke you make to a log file.

True

Access to Web documents, called Web pages, is done via hyperlinks.

True

An electronic device that scans printed or handwritten text documents, images, or a particular object to convert them into a digital file format is a scanner.

True

Artificial intelligence is a branch of computer science that focuses on trying to make computers behave like humans

True

COTS us an acronym for commercial off-the-shelf software.

True

Clusters share common characteristics and can be used to target segments

True

Cryptography ensures the protection of information by using code and a secret key.

True

Email uses asynchronous network technology.

True

Fifth generation languages test the use of neural networks with computer technology.

True

Google Drive allows you to compose files, share files and folders, and keep your documents organized.

True

Hyperlinks are elements in an electronic document that link to another place in the same document or to a different document.

True

In order to protect your computer system from a malicious threat, you should never use the Internet without virus protection software.

True

MAN is biger than LAN.

True

Microsoft Edge enables you to view Web pages using a graphical interface.

True

Multi-Touch input devices include the smart phones and tablet PCs.

True

Neural networking is a process used to turn raw data into useful information using software to look for patterns in large batches of data

True

Poor managment and data security issues are disadventages of using computer networks.

True

Portable computers are small enough to be carried around.

True

Ports are located on the outside of the computer system box and are used to attach peripherals.

True

Semantic Analysis is a more sophisticated form of Natural Language Processing focused on the process of stringing words together.

True

Social networking use dedicated websites and applications to interact with people from various parts of the country and world.

True

Software programming is the link between human language and machine language.

True

Storage holds data, instructions, and information for future use. It is a permanent holding placed for data and information.

True

The WWW uses HTTP transmission protocol.

True

The hard disk is a common example of persistent storage.

True

Port that is replacing serial and parallel ports.

USB

Which of these closely defines what network topology is?

Virtual structure of a network

which of the following term is not associated with wireless network?

WAN

Apple gadgets of the 2010's

Watch, iPad, and AirPod

The difference between the Web and Web 2.0 is:

Web 2.0 focuses on collaboration and information sharing

Productivity Software includes all of the following except

Windows 10

Domain Names

both

Physical security protects computer systems from the people who work in an organization.

false

The security function of detection means that you must prepare yourself to pull up your backup files and restore from scratch.

false

When you buy software you are purchasing a EULA license that allows you to

legally use the software

All of the following are true about Windows Defender except

prevents unauthorized access

With cloud storage you can do all except

text message

How your data is managed is part of data function security.

true

The data functions of switching, interchanging, transmitting, and receiving refer to how data travels along telecommunications media and should be protected during those functions.

true

The difference between an attack and a vulnerability is that a vulnerability is a weakness in a controlled system, where an attack takes advantage of a vulnerability to cause loss or potential loss.

true

The programs used to direct the operation of a computer, as well as documentation giving instructions on how to use them is the definition of software.

-

This application is an online version of the Microsoft Office application suite giving users the experience as if the software is running from their personal computer.

-

Software piracy is

A violation of copyright and/or patent laws

An access point is a hardware device or computer software that is used as a communication hub for wireless device users to connect to a wired LAN.

Access Point

Adventages of computer networks?

All of the above

Productivity software allows you to produce

All of the above

Which of the following network is called a file sharing network?

All of the above

Gadgets of the future include

An umbrella that can detect weather

Utility programs can complete all of the following tasks except

Antivirus Protection

Numbering system that uses 2-digits to represent everything a computer can understand.

Binary

Technology used to provide short-range data and voice communication.

Bluetooth

Graphical user interfaces

Both

Storage devices that can be hardware components of your personal computer include all of this list except

Cloud

Science that combine multiple studies to learn how the mind functions and, when applied to AI, how machines can simulate human thought and action.

Cognitive Science, True

When actual program code that the developer created has run through a special program that translates the source code into a form that the computer can understand, ________________ is produced.

Complied Software

When organizing files and folders, you can do all the following in File Explorer except

Defragmentation

Slowest form of internet connection is?

Digital Subscriber Line

The card that connected to motherboard to transmit data is called?

Ethernet

A byte is the smallest unit of information a computer can process. It is represented by a 0 or 1.

False

A computer is any system that can process data, but the input and output must be done by a separate device.

False

A neural network is a form of artificial intelligence that attempts to imitate how the human nervous system works.

False

Most Operating Systems

-

Real-time communication network is?

Synchronous

Wireless broadband connections include

Satellite

Network topologies include all except

Cash

A popular encoding system used is called

ASCII

Peripheral devices

All of the above

Home networks commonly use?

Star Topology

You create Web pages using

Website Builders

In an information system, the software includes entities needed to carry out the telecommunication process. These entities include,

-

Apps can only be used on mobile devices.

-

What is a Node?

A processing location, like a computer or printer.

A digitizing device is an input device that can take samples of the real world and convert it into a form that a computer can use. They include each of the following except

Key Boards

Branch of AI that gives tecnology the ability to learn a task without pre-existing code

Machine Learning

This computer is used to send data to multiple systems in remote locations.

Mainframe

Components of the motherboard include all except

Peripherals

Desktop and workstation computers are for single use, but

The desktop is on the low end of the processing scale

The most common forms of electronic infection include all of the following except

e-mail

Computer viruses fall under the category of natural disasters

false

If your passwords, passcodes, or other access data are left in a secure place, they are vulnerable to unauthorized access.

false


संबंधित स्टडी सेट्स

Week 16 - Palliative Care & End of Life

View Set

BIOLOGY - UNIT 6: MICROBIOLOGY ARCHAEA

View Set

Compensation/Benefits Administration Ch. 8, 9, 10, & 11

View Set

Biology Concepts and Investigations: Chapter 1

View Set

AP Physics Chapter 7 & 8 practice quizzes

View Set

18. Unit 6: Lesson 2: LS Assignment 3

View Set