Into to computers 5-8
The dotcom bubble occurred between the years 2008 and 2010
false
. ________ computers, such as UNIVAC, can be characterized by their use of vacuum tubes to store individual bits of data.
first-generation
Which of the following descriptions best matches that of computer science degree?
focuses on computer architecture and how to program computers to make them work effectively and efficiently
This dividing process is referred to as ___________.
formatting
Most computer historians agree that computers have evolved through _______ distinct generations.
four
A proprietary model called the __________ represents the position of a product during its life cycle of publicity
gartner hype cycle
In economics, _________ are things that can be used or consumed, whereas _________ are intangible actions performed for a consumer.
goods, services
The success of an underwater telegraph cable depended on the discovery of __________, a rubber-like substance.
gutta-percha
SMTP (Simple Mail Transfer Protocol)
handles outgoing mail
Antivirus software can use techniques called__________ to detect malware by analyzing the characteristics and behavior of suspicious files.
heuristic analysis
The ____________ was designed to tabulate the 1890 census and used cards with designated areas representing data fields.
hollerith tabulating machine
Owners with ___________ devices must ___________ the device to obtain apps from third-party sources.
iOS, jailbrake
_______________ are two of the world's largest exporters of ICT services.
india and ireland
They are typically downloaded and ________________ from an app store or Web sites.
installed
All of the creations that materialize from the mind or intellect are considered
intellectual property
Synchronous communication
interchanges happen in real time while all parties are online; these communications have the advantage of immediacy
1996 was the year that cable _______ service made its debut.
internet
Which of the following job descriptions best matches that of a systems analyst?
investigates the requirements of a business or an organization, its employees, and its customers in order to plan and implement new or improved computer services
Copyright
is a form of legal protection that grants the author of an original work an exclusive right to copy, distribute, and sell
VoIP
is a technology that uses a broadband Internet connection instead of PSTN land lines to place voice and video calls
trademark
is any word, name, symbol, or design used in commerce to identify and distinguish the goods of one company from those of another
copyleft
is designed to make a work freely available for distribution and modification under the condition that all derivative works use the same license
Geotagging
is the process of adding location data to photos, Web sites, HTML documents, audio files, blog posts, and text messages
The operating system _______________ remains in RAM while a device is in operation and manages the device's resources.
kernel
When an operating system fails to correctly track the allocation of RAM space to applications, a memory _____________ may produce "program not responding" error messages.
leak
A(n) ____________ calculator is a device that assists in the process of numeric calculations but requires the human operator to keep track of the algorithm.
manual
An abacus is an example of a(n) _________ calculator.
manual
Asynchronous communication
messages are held until the recipient is ready to view them; it offers convenience because information can be gathered whenever you want it
derivative work
modifies a copyrighted work but does not substantially change its content or purpose; translations and adaptations are examples of derivative work
___________ states that every two years the number of transistors in an integrated circuit will double without raising its cost.
moore's law
Transmitting data in a telegraph system used the _______ alphabet, a binary encoding system based on dots and dashes.
morse code
___________________ supports a division of labor among several processing units.
multiprocessing
Most operating systems have ___________ capabilities that allow two or more processes to run simultaneously.
multitasking
__________________ capabilities allow an operating system to run multiple simultaneous operations for a single program.
multithreading
Which of the following options offer selfstudy training to careerminded individuals who might not have the time or means to complete a traditional degree program?
nanodegree
A(n) ____________ administrator plans, installs, and maintains one or more local area networks and may also manage cloud resources.
network
Many employment contracts contain a(n) ______________ designed to prevent employees from divulging proprietary information to competitors or opening competing businesses.
non-complete clause
____________ reduces the cost of goods and services by using workers and manufacturing facilities in countries with inexpensive labor.
offshoring
A person's presence on a social media service is referred to as an
online identity
Social media
online services that facilitate communication and interaction among people who want to share information about their lives
Social networking can be traced back to
online services, such as CompuServe, Prodigy, and America Online (AOL), that were not part of the Internet
When you want to change margins, headers, and footers you can use __________ layout tools.
page
To change the spacing between lines or the alignment of text, you can use tools to adjust ___________ style.
paragraph
If you feel more secure with a totally random and unique password for each of your logins, then a(n) _______________ is an excellent option.
password manager
A file's location is defined by a file ____________ , which includes the storage device, folder(s), file name, and extension.
path
Computer systems such as the Mark8 and the MITS Altair are examples of early ______ computers.
personal
The way that data is actually stored is referred to as the ____________ storage model.
physical
PC software that can be carried on a USB flash drive and used without installation is called ________________ software.
portable
____________ software supplies tools for creating a series of electronic slides that can be shown on a computer screen or projector.
presentation
Which of the following options is a useful format for your resume?
print, email and HTML
Word ___________________ software assists you with composing, editing, designing, printing, and electronically publishing documents.
processing
From the perspective of a business that creates and sells a technology product, the ____________maps the expected profitability of a product from its inception to its demise.
product life cycle
In the context of economics, ___________ is a measurement of the amount of output that is produced per unit of input.
productivity
Office suites are sometimes referred to as ___________ software because they offer features that really help get work done.
productivity
A computer _________ is any person whose primary occupation involves the design, configuration, analysis, development, modification, testing, or security of computer hardware or software.
professional
A computer ________ designs, codes, and tests computer programs. In addition, they may modify existing programs to meet new requirements or eliminate bugs.
programmer
With respect to organizations, confidentiality means protecting __________ information about company finances, procedures, products, and research that competitors would find valuable.
proprietary
The U.S. Department of Homeland Security identifies six national security functions supplied by the ICT sector. Which one of the following is not one of them?
provide disruptive technologies
Geosocial networking
provides a platform for users to carry out interactions based on their current locations
Social Media Honeycomb
provides a visual model for classifying and comparing various social media services
Which of the following would not be considered a common carrier?
radio
Guglielmo Marconi is credited as the person who invented the ___________, a device that sends and receives sound as electromagnetic waves.
radio
The years between 1920 and 1960 are considered the Golden Age of ________.
radio
Public domain
refers to the status of works with expired copyrights or whose creators have forfeited their copyright; the works of Shakespeare are in the public domain
When two sets of records are _____________ , database software allows you to access data from both tables at the same time.
related
transformative work
repackages a copyrighted work to add new meaning or produce a work that is used for a purpose different from the original work; parodies are considered transformative
These rules typically do not allow you to use certain characters or ___________ words in a file name.
reserved
A social networking service
revolves around personal profiles and interconnections among subscribers who want to share information about themselves
The top-level list of a device is referred to as the ____________ directory, which can be subdivided into several smaller lists called subdirectories that are depicted as ____________.
root, folders
Highlevel programming languages were available for use on ________generation computers
second
After a disk is divided into tracks it is further divided into ____________.
sectors
With the proliferation of computer viruses and worms, computer __________ has become a hot niche for IT workers
security
RSS reader or blog aggregator
sets up a "feed" that monitors your favorite blogs, collects the latest posts, and displays them
Local applications for PC's are installed using a(n) ______________ program that copies files, checks resources, and updates the Windows ________________.
setup, Registry
An emerging subset of geosocial networking called
social discovery, uses geolocation to meet with people who are nearby and have similar interests
Trojans depend on ________ to spread.
social engineering
The lines connecting nodes are referred to as
sociogram edges
The circles in these diagrams are referred to as
sociogram nodes
sociologists use social network diagrams called
sociograms to depict connections between people
Most economists regard goods and services as a continuum, with intangible goods, such as __________, in the middle of the continuum.
software
Open _____________ software may be sold or distributed free of charge, but the distribution must include the source code.
source
Participants in open _________ community projects get experience and make connections with other professionals that can be valuable resources during a job hunt
source
________________ software is like a smart piece of paper that automatically adds up the columns of numbers you write on it.
spreadsheet
Software pricing models include one-time purchase,___________________, trial, and freemium.
subscription
An operating system uses a file _______________ to track the physical location of files.
system
Both _________software and application software are essential for accomplishing tasks with a digital device.
system
Data is stored in ___________, which form records.
tables
Based on existing laws governing international conflict, the ______________ sets out rules for conducting and responding to cyberwarfare.
tallinn manual
An information _________ degree programs focus on computer equipment and software used by businesses.
technology
A(n) _______________ uses available technology to work from home or an offsite location
telecommuter
__________ refers to transmitting text or symbolic information over long distances without the use of a living carrier, such as a courier.
telegraphy
A(n) ___________ is a device that transmits human voices over a distance using cables or airborne signals
telephone
The 1930s can be characterized as a phase of innovation for ________, a technology designed to send moving images over a distance.
television
Which of the following is not an example of an Information Technology Law?
the espionage act of 1917
Geocoding
the process of determining the coordinates of a specific place, such as the street address or the longitude and latitude of a location
social media profile
the set of information provided to friends, contacts, and the public
. It was not until the ______generation of computers that portable operating systems, such as CP/M and UNIX, provided programmers with similar operating system commands across hardware platforms.
third
_______generation computers became possible by the development of integrated circuits
third
Before a computer stores data on a disk, CD, or DVD, it creates the equivalent of electronic storage bins by dividing the disk into _____________.
tracks
A key feature of the Apple Lisa was its use of _______________.
transistors
Secondgeneration computers used ________ instead of vacuum tubes.
transistors
To remove software that has been installed on a PC, Windows supplies a(n) _________________ utility.
uninstalled
A software_________ or patch is a small section of program code designed to correct problems and address security vulnerabilities.
update
New versions of software are called__________ and are indicated by version numbers such as 1.0 and 2.0.
upgrades
The AtanasoffBerry Computer was the first computing device to use ________ instead of mechanical switches as processing circuitry.
vacuum tubes
A single device can run more than one operating system as a(n) ____________ machine.
virtual
A computer _________ is a set of self-replicating program instructions that surreptitiously attaches itself to a legitimate executable file on a host device.
virus
A key characteristic of ___________ is their ability to lurk in a device for days or months, quietly replicating themselves.
viruses
Early computers that held both programs and data in memory became known as ________ architecture.
von Neumann
____________ is the disclosure by an employee of confidential information that relates to some danger, fraud, or other illegal or unethical conduct connected with the workplace, be it of the employer or of fellow employees.
whistleblowing
Spam accounts for approximately ______ of all email.
70%
The current method of encrypting communication between a client and a server depends on a security protocol called _______.
TLS
A social engineering scam called ___________ is when a victim is promised a large sum of money in exchange for a bank account number from which a small advance fee is withdrawn.
advance fee fraud
A cryptographic __________ is a procedure for encryption or decryption.
algorithm
A(n) __________ is a device or software that is designed to block unauthorized access while allowing authorized communications.
firewall
A virus __________ usually arrives as an email message that contains warnings about a supposedly new virus.
hoax
A(n) ________________ takes place when an unauthorized person gains access to a digital device by using an Internet connection and exploiting vulnerabilities in hardware or software.
online intrusion
A(n) __________ pings a packet of data to a port in order to see if that port is open or not.
port scan
A ______________ exploit usually begins with a virus warning and an offer to disinfect the infected device.
rogue antivirus
Executable files for Macs have a(n)_______ extension.
.app
The executable file for PC software has a(n)________ extension.
.exe
A(n) ______________ attack exploits previously unknown vulnerabilities in software applications, hardware, and operating system program code.
.zero-day
The first telephone was invented and patented by Alexander Graham Bell in ________.
1876
Telegraphy remained the major technology for intercontinental communication well into the ________.
1950s
Companies such as IBM and Sperry Rand launched the computer industry when they brought the first mainframes to market in the ________.
1960s
Apple released the first Apple Macintosh computer in what year? ___________
1984
The Motorola DynaTAC 8000X was brought to market in what year? ___________
1984
Worldwide, the ICT industry directly employs about _____ of the total workforce in jobs such as computer manufacturing, programming, and data security.
4%
What generation of cell phone technology was the first to offer true mobile broadband?
4G
There are various encryption methods, but __________ is the encryption standard currently used worldwide.
AES
__________ changes an originating address or a destination address to redirect the flow of data between two parties.
Address spoofing
_____________ software shields certain applications against behaviors commonly exhibited by intrusions.
Anti-exploit
__________ is the process of modifying an executable file or data stream by adding additional commands
Code injection
_____________ software is usually sold in retail stores or at Web sites and may have options for site licenses as well as single user licenses.
Commercial
Software for Macs is distributed as _____________ packages that are dragged to the Applications folder to complete the installation.
DMG
__________________ is also available free of charge, but is limited in some way until you pay for it.
Demoware
_________________ operating systems--such as Windows, Chrome OS and OS, X-- accommodate one user at a time, are capable of multitasking, and include a graphical user interface designed for keyboard and mouse input.
Desktop
________ was designed to calculate trajectory tables for the U.S. Army.
ENIAC
Software licenses, referred to by the acronym __________, can be divided into two main categories: public __________ and proprietary.
EULA, domain
To establish a(n) ________, hackers set up an unsecured Wi-Fi hotspot complete with an Internet connection.
Evil Twin
Windows File Explorer and the OS X ____________ are examples of file management utilities provided by operating systems.
Finder
_________ is the monetary value of all the goods and services produced by a nation's workforce on an annual basis.
GDP
Which of the following would be considered a thirdgeneration computer?
IBM 360
______ certification, offered by Certiport, covers basic computing knowledge and skills.
IC3
The __________ is made up of businesses that focus on digital equipment, software, communications technologies, and related services.
ICT industry
__________ operating systems, such as iOS and Android, are designed for smartphones and tablet computers.
Mobile
Doppelgangers
Online doppelgangers are two or more online personas with the same name or username; the personas of doppelgangers are sometimes mistaken for each other, and their reputations may become intertwined
What is the term used to describe unwanted software that installs along with the application software that you originally downloaded and installed?
PUP
Operating systems manage resources by monitoring processor cycles, allocating ______________ space to programs, tracking stored files, and supervising data exchanges with peripheral devices.
RAM
A ___________ is malware that arrives in a trojan disguised as legitimate software and sets up a secret communication link to a hacker.
RAT
__________ is the term that describes devices that automate many industrial tasks by receiving digital commands and converting them into real-world actions such as shutting down a power grid or opening a valve in a fuel pipeline
SCADA
____________ is a service offered by Google that checks URLs against a list of suspicious Web site URLs.
Safe Browsing
Which of the following i would be considered a mechanical calculator?
Schikard's calculator, pascaline, de colmar's arithmometer
_________ operating systems, such as UNIX and Linux, are designed for hosting distributed networks.
Server
________________ is also distributed free of charge but uses the honor system to collect payment.
Shareware
What is the process called when an app from a source other than an official app store is installed on a device?
Side-loading
Unit Contents
Social Networking Content Communities Blogs and More Online Communication Social Media Values
______________ is a deceptive practice that exploits human psychology by inducing victims to interact with a digital device in a way that is not in their best interest.
Social engineering
If you use a password manager, what do you as the user need to remember?
The master password.
Similar to a worm, a _________ is not designed to spread itself to other devices.
Trojan
_____ was the first commercially successful computer.
UNIVAC
When the PC version of the spreadsheet program __________ became available, the IBM PC quickly became the topselling personal computer.
VisiCalc
___________ apps run in a browser and require no installation.
Web
Because it is so easy to experiment with different numbers, this type of software is particularly useful for __________ analysis.
What-if
wiki
a collaborative Web application that provides tools that enable contributors to post, read, and modify content
binary adjacency matrix
a set of cells containing a 0 if there is no connection between two people and a 1 if there is a connection
When antivirus software detects malware, which of the following would not be a course of action you could take?
a. Conduct a heuristic analysis.
A calculation is based on a(n) ___________—the stepbystep process by which numbers are manipulated.
algorithm
Fair use
allows for the limited use of copyrighted material without obtaining permission from the copyright holder
Babbage's __________ was an allpurpose computing device
analytical engine
The best defense against malware is _____________.
antivirus software
sockpuppets
any online identity created and used for purposes of deception—is widespread
Thomas de Colmar's _________ became the first massproduced mechanical calculator
arithmometer
If you are hired as an entry level programmer, your job title would be a(n) ___________ programmer.
associate
A type of attack that uses password-cracking software to generate every possible combination of letters, numerals, and symbols.
brute force
A stock market _________ refers to a sharp rise in stock values that is later followed by a sudden decline.
bubble
Operating systems also manage ____________ that collect and hold data from peripheral devices until a device is ready to accept it.
buffers
Public communications
can be accessed by individuals unknown to the person who created a message; the word posting is associated with this type of communication because it is similar to posting a billboard, sign, or poster
The protocols POP3 (Post Office Protocol version 3) and IMAP
can be used to manage incoming mail
__________ goods are raw materials, tools, and machinery used by businesses to make consumer good
capital
A(n) __________ is a device that uses a lowpower radio transmitter to carry out twoway voice communications.
cellular telephone
__________ are awarded based on successful completion of an exam that verifies your level of knowledge about a particular technology or subject.
certificates
Chrome OS is considered a thin ____________ because it depends substantially on processing supplied by a remote computer.
client
Many computers work with a group of sectors, called a(n) ______________, to increase the efficiency of file storage operations.
cluster
. A(n) _________ is a set of guidelines designed to help professionals thread their way through a sometimes tangled web of ethical on-the-job decisions.
code of ethics
In Windows, storage devices are identified by a drive letter, followed by a(n) _______________.
colon
________ was an electronic device designed to decode messages that were being sent between the german high command and their field commanders in WWII
colossus
A(n) ___________ is any person or company that transports goods, passengers, or electronic signals over regular routes at set rates.
common carrier
Private communications
communications for which you specify one or more recipients; text messaging is a popular type of private communication
. ___________ is the obligation not to disclose willingly any information that should be kept private.
confidentiality
the message header
contains the sender and recipient addresses, date, and subject line
The information industry has three major facets: _________, computers, and telecommunications.
content
The rules that specify valid file names are called file-naming _________________.
conventions
When individuals contribute computer time, expertise, opinions, or money to a defined project, they are participating in
crowdsourcing
The Stuxnet virus that disabled Iranian nuclear centrifuges is an example of _____________
cyberwarfare
_____________ is the use of ICT technology to carry out politically motivated attacks designed to infiltrate, sabotage, or damage an opponent's information systems and defensive capabilities.
cyberwarfare
A(n) ________ administrator analyzes a company's data to determine the most effective way to collect and store it.
database
__________ software helps you store, find, organize, update, and report information located in one or more tables.
database
The Harvard Mark I was digital but used _________ rather than binary representation
decimal
Impersonation
deliberately using the name or avatar of another person without his or her consent and with the intent to harm, defraud, or intimidate is called impersonation
Which of the following information technology laws makes it illegal to circumvent copyprotection technologies, such as those used to prevent unauthorized copying of software CDs, music CDs, and movie DVDs?
digital millennium copyright act
Every storage device has a(n) _________ containing a list of files stored on the device.
directory
________ technology displaces an existing business process, market, industry, or product.
disruptive
At the heart of a typical email system is an
email server— a computer that essentially acts as a central post office for a group of people
The computers and software that provide email services form an
email system
The term professional _______ refers to onthejob choices and actions that reflect a person's values.
ethics
Telephone networks are based on a hierarchy of interconnected stars. At the center of the star is a telephone ___________ that manages connections between callers.
exchange
One-way edges
exist when a relationship is not reciprocal, such as a Twitter follower who does not follow back
Two-way edges
exist when two people consider each other to be friends