CSCI
Microsoft Windows 1.0 was introduced in 1986 and cost about _____ USD. $50,000 $99 $1,000,000 $10
$99
Microsoft Word can be used to create and edit formatted text. That formatted text is normally saved in which kind of file to enable subsequent editing of that formatted text by Microsoft Word? .doc or .docx .pdf or .pdfx .fmt .com
.doc or .docx
Suppose a song is 200 seconds, that a digital recording sampled the audio 50,000 times per second, and each sample is stored in 1 byte. How many bytes are needed to digitally store a song? 50,000 50,200 250 10,000,000
10,000,000
In 2012, the social data value of a user on Facebook was about _____ (in USD). 30 cents 100 dollars 10,000 dollars 1,000,000 dollars
100 dollars
Early forms of email appeared in the _____ . 1900s 1960s 1980s 2000s
1960s
Given the following uncompressed text, which is a more reasonable LZ dictionary? "Mark Smith, 100 Main St., Smithville" 1: Ma, 2: Smith 1: Mark, 2: Smith 1: M, 2: Sm 1: a: 2: 100
1: Ma, 2: Smith
Video consists of a series of still pictures (frames) that should be shown at a rate of at least _____ frames per second so that humans don't notice the individual pictures and instead see smooth video. 2.5 25 250 2,500
25
"Knowledge" workers spend nearly _____ of their time writing and reading emails. 90% 5% 30% 75%
30%
A text message containing characters from alphabets such as Chinese, Arabic, or Cyrillic is limited to _____ characters. 5000 500 2000 70
70
A high-level concept that protects information from unauthorized users through methods like password protection and secure communication channels. The use of an algorithm to transform plaintext into ciphertext or ciphertext into plaintext. A high-level concept that protects information from unauthorized users through methods like password protection and secure communication channels. A communication protocol, meaning the rules for transferring information among computers. A unit that measures the strength of an encryption method.
A high-level concept that protects information from unauthorized users through methods like password protection and secure communication channels.
Facebook revenues are mostly from _____ . user subscriptions advertisements performing background checks for corporate and government employees annual contribution drives, asking users to donate to the company
Advertisements
Which of the following could be used to infer more about a user than what the user intentionally posts online? GPS data embedded in a tweet An email that transmits the sender's IP along with the message Purchasing items with a credit card All of the above
All of the above
An audio recording app stores audio in a file consisting of _____. Analog audio Analog audio converted to digital values (numbers) Formatted text Rows of data consisting of various fields, each row known as a record
Analog audio converted to digital values (numbers)
Which of the following statements is true? The only information available about a user is what the user intentionally posts online. Users cannot share information online. Apps must prompt users to approve any embedded data before collecting or posting the data. Apps may embed hidden data such as time and location data in a photo.
Apps may embed hidden data such as time and location data in a photo.
What does an email filter do? Performs a search of the user's email, and returns emails that correspond to the search criteria Alerts the user of a new email Automatically takes a user-specified action, such as applying a category label Slows the delivery of email so that a user is distracted less frequently
Automatically takes a user-specified action, such as applying a category label
Which of the following social-media activities is most likely to POSITIVELY impact a hiring decision for a potential employee of a job for a college-graduate? Background information supporting candidate's professional qualifications Harsh criticisms of previous employers because they were unfair Sharing of the person's personal confidential information Numerous photographs of extensive partying
Background information supporting candidate's professional qualifications
_____ started Microsoft in 1975 to develop the BASIC programming language for a particular type of PC. Bill Gates and Paul Allen Steve Jobs and Steve Wozniak Michael Eisner and Randy Newman Masters Stevenson and Dr. Omar Said
Bill Gates and Paul Allen
_____ may collect and sell user information Free apps Paid apps Both free and paid apps No apps
Both free and paid apps
A spreadsheet's columns and rows are labeled with letters and numbers. Which represents the cell 5 rows down and 3 columns to the right? 53 35 15 C5
C5
For what are wiki-based platforms typically used? Hosting multiple websites Collaborative development of content by multiple users Fundraising Finding highly-paid professionals to develop professional looking content for websites
Collaborative development of content by multiple users
Which of the following is NOT a good strategy to protect a user's personal identity? Create multiple accounts so the user's information cannot be linked to a single individual. Before providing information in a form, consider what that information is needed for. Treat online activity as public. Use privacy tools to limit a website's ability to track user activities
Create multiple accounts so the user's information cannot be linked to a single individual.
Which is NOT a common use of spreadsheets? Displaying a table of data, like a table showing recent home sales Drawing a chart, like a chart showing stock prices over the past year Creating formatted text, like a resume that nicely shows a person's education/experience Performing calculations, like adding a restaurant's daily sales into a month's total sales
Creating formatted text, like a resume that nicely shows a person's education/experience
Which is a general approach that uses a community of users via the Internet to perform a particular task, such as developing articles for an online encyclopedia? Fundraising Nupedia Community grouping Crowdsourcing
Crowdsourcing
Which of the following is a technique that strives to analyze language usage, faces, locations, and other items to match information to a unique individual? Data mining EXIF Ghostery IP
Data Mining
A user wishes to keep a record of all employees that work at a company, and to quickly be able to get answers to questions like "Which employees earn over $50,000?" or "How many employees live in California?". Which application is best suited? Word processor app Spreadsheet app Presentation app Database app
Database app
Which of the following is NOT a good strategy to contain personal information on the Internet? Delete old posts that are no longer relevant to a user's changing interests. Before posting, first consider how the information will be interpreted by others who may not be the intended target audience. Before sharing information about others online, consider if the person would be comfortable becoming famous for the shared content. Limit sharing by updating app privacy settings to "opt out".
Delete old posts that are no longer relevant to a user's changing interests.
Which of the following is NOT a task likely to be carried out by an operating system? Interfaces directly with the keyboard and other hardware. Keeps track of file locations on a drive. Switches between multiple applications. Edits video and audio files.
Edits video and audio files.
Which of the following statements is most true? Checking emails frequently improves a user's focus by reminding the user to complete tasks on time. Email has no impact on a user's productivity or focus. Knowledge workers commonly receive and reply to more than 10,000 emails per day, which slows a user's productivity. Email interruptions cause loss of focus, requiring 10-15 minutes after each interruption for a user to regain focus.
Email interruptions cause loss of focus, requiring 10-15 minutes after each interruption for a user to regain focus.
_____ scrambles plaintext into a cyphertext so that a packet transmitted through the network is not readable along the route. Encryption Decryption Cryptokey PGP
Encryption
What is metadata? Extra information, such as the location of an image. A common image format. The practice of inferring more about a user from the user's online posts. A record of a user's online activities.
Extra information, such as the location of an image.
A word processor is primarily intended for enabling a user to create _____. plain text formatted text tweets device drivers
Formatted Text
Windows is a _____ OS developed by Microsoft in the mid-to-late 1980s. text-based touch-based command line graphical
Graphical
Modern operating systems use a _____ interface which allow pointing devices like a mouse. line-oriented text-based windows-based graphical user
Graphical user
Which of the following is a web-based communication protocol involving encryption? HTTPS WIFI Phishing Cyphertext
HTTPS
_____ is a common protocol for retrieving email messages via the Internet. IMAP SMTP WIFI Gmail
IMAP
Which of the following is NOT a common kind of text formatting? bold image italic underline
Image
What happens to information once information is shared online? Users are able to control who has access to the shared information Users can permanently delete information the user no longer wants to share Information can be manipulated or taken out of context Information is by default kept private unless a user provides explicit permission.
Information can be manipulated or taken out of context
Starting as a DVD rent-by-mail company, _____ is currently the largest movie and TV show streaming company in the world. iTunes Hulu Plus Amazon Instant Video Netflix
Netflix
Which of the following is a browser mode that keeps a user fully anonymous on the Internet? Incognito Rapleaf Windowed No such mode. Information such as browser settings and app requests may still be transmitted by the web browser.
No such mode. Information such as browser settings and app requests may still be transmitted by the web browser.
PDF stands for _____ Document Format. Processor Printable Portable Private
Portable
An operating system is a _____ that carries out detailed interactions with hardware on behalf of applications, such as reading data from a keyboard or displaying data on the screen. program USB device memory device driver
Program
A user runs a command to find all entries in a database whose "year" field is 2016. Such a command is called a _____. DBMS Query field cell
Query
A user's laptop is running unusually slowly. After not finding any obvious reasons like a runaway application, the most reasonable next attempted fix by the user would be _____ . take the laptop to a computer store for repair call a computer repair company for assistance restart the laptop reinstall the operating system
Restart the laptop
Being a good OS user does NOT include which of the following? Running apps for long periods so the memory leaks and the memory's contents are refreshed Occasionally removing unneeded files, folders, and apps Backing up important files by making copies of the files to save in another location Taking the time to quit unused apps
Running apps for long periods so the memory leaks and the memory's contents are refreshed
A(n) _____ is responsible for storing and delivering text messages. SMS (short message service) SMSC (short message service center) MMS (multimedia messaging service) cell tower
SMSC (short message service center)
_____ is a common protocol for sending email messages via the Internet. bcc SMTP spam IMAP
SMTP
_____ searching is a technique that infers the context of a term from other items in a search to better understand the user's intended query. Heavy Decrypted Semantic Anonymous
Semantic
Which are the two key benefits of compressing an image file? Smaller files, faster opening Smaller files, faster transfers Faster transfers, faster resolutions Faster transfers, smaller resolutions
Smaller files, faster transfers
_____ refers to playing videos or music directly from the Internet in a web browser or other app. Streaming Downloading Roku WiFi
Streaming
A good two-step troubleshooting process starts with predicting a problem, then testing to confirm or deny the prediction (repeating as needed). A smartphone user wearing a headset doesn't hear a youtube video's audio. Which is a prediction of the problem? Turning up the volume on the smartphone The headset may not be plugged in all the way Playing a different video Trying a different headset
The headset may not be plugged in all the way
A user decides against posting an embarrassing photo of a friend on their personal webpage. Which of the following strategies did the user employ to minimize negative consequences of online behavior? Think before posting Get the facts Communicate about preferences Check app settings
Think before posting
_____ is a text-based operating system developed in the late 1960's. Unix iOS Windows Android
Unix
Which of the following social-media activities is most likely to NEGATIVELY impact a hiring decision for a potential employee? Unprofessional screen name Creativity Wide range of interests Interacting with the company's social media
Unprofessional screen name
Which is NOT a key item that a presentation app helps a user create, for display on slides? Formatted text Video Simple drawings Animations
Video
Most video sharing sites earn revenues through _____. user subscriptions advertisements selling videos and related merchandise to users annual contribution drives, asking users to donate to the company
advertisements
An encrypted message can be viewed by _____ . anyone who has a computer no one an authorized user users along the packet's delivery route
an authorized user
Email is a type of _____ that a user runs to carry out a particular task, such as sending or receiving messages. application (or app) operating system file device driver
application (or app)
In 2015, more than 200 _____ emails were sent and received worldwide each day. (Select the closest value) thousand million billion trillion
billion
WordPress.com and Tumblr.com are popular websites that provide services to users to create and share _____. blogs backups of files and folders emails plugins
blogs
A given Huffman dictionary is 01: a, 001: b, and 000: c. What do these bits represent (decoding from left to right)? 00000000101 cccbb ccba cba ccab
ccba
A zip file can group multiple files into one file, and commonly may also include _____ of those files. formatting reversing compressing translating
compressing
Moving files to the trash or recycle bin _____. deletes the file from the drive creates a backup of important files doesn't actually delete files from the drive speeds up applications that are currently running
doesn't actually delete files from the drive
The term _____ refers to organizing items on a hard drive or other storage device. folder management file administration file management folder administration
file management
Which is most likely a presentation file? filename.txt filename.pptx filename.pdf filename.doc
filename.pptx
A(n) _____ is a group of files or folders that help a user to organize items. file word processor folder OS
folder
On a drive, a _____ is a container used to store files. document platter domain folder
folder
The amount of information on the internet is _____ . growing shrinking stagnating limited by the date the content was posted
growing
_____ is a graphical operating system developed by Apple in 2007 for Apple smartphones and tables. Unix iOS Windows Android
iOS
Web browsers make local copies of a web page's _____ to speed loading for subsequent visits. html images visitors links
images
Finder and Windows Explorer are examples of applications that provide a way for users to _____. manage multiple applications that run simultaneously move, delete, and create file/folder/app items on a drive view formatted text and images on multiple platforms edit movies
move, delete, and create file/folder/app items on a drive
A device driver is typically part of the computer's _____ . hardware operating system scheduler apps
operating system
Quitting unused apps on a smartphone or tablet can _____. reduce CPU usage improve battery life free up memory reduce CPU usage, improve battery life, and free up memory
reduce CPU usage, improve battery life, and free up memory
A _____ site connects people via the Internet with other users who share common interests and backgrounds. Users are able to add connections to other users, post information, share photos, and more. hashtag mailing list twitter social networking
social networking
A device driver is _____. the computer's disk, which stores a user's files and apps a service that drives around a user's file system to recover lost or corrupt files a virus that corrupts the computer hardware software that interfaces with hardware devices, such as a screen, keyboard, or printer
software that interfaces with hardware devices, such as a screen, keyboard, or printer
A device driver for a printer might send print commands that are _____. specific to a particular printer used across all printers, regardless of manufacturer or model are specific to all printers made by one manufacturer, such as HP read by the user and then typed by the user for processing by the printer
specific to a particular printer
Video files could be huge, so compression is used. The main idea of video compression is _____ . storing only the difference between one frame and the next storing each frame as an individual digitized picture recording as many frames per second as possible recording video as a series of dots
storing only the difference between one frame and the next
What types of items can a search engine extract data from? plain text plain and formatted text text and static images text, images, video, audio
text, images, video, audio
Typically, a user's post on Facebook are published for _____ to view. the user's friends/connections the world possible employers an individual
the user's friends/connections
Users can apply _____ , which contain predefined color palettes and text formatting to provide blogs with a consistent look and feel. filters themes plugins a post
themes
YouTube is a widely-used _____ sharing website. homework solution application advertisement video
video