ITEC Final Exam
Quantum
A _______ computer can represent data in states beyond the two bits (0's and 1's) of today.
Modem
A _________ is a device that can convert digital information from a computer into analog sound waves that can be transmitted over the phone lines.
Worm
A _________ is a fully-contained program that self-replicates and spreads through computers and networks.
Trojan Horse
A _________ is a program that disguises itself as an interesting, useful, or desirable program in order to gain access to your system.
Volume
A _________ license allows companies to install the software on multiple (or all) the machines that they own.
Router
A _________ looks at each packet's header to determine where the packet should go and then determines the best route for the packet to take toward its destination.
Server
A network _________ is a powerful computer with special software and equipment that enables it to function as the primary computer in a network.
License
A software _________ is a contract from the software creator that specifies the rules for using this software
Firewall
A software-based _________ is dedicated to examining and blocking Internet traffic.
Access Point
A wireless _________ is the device that all nodes connect to in order communicate wirelessly.
Node
A(n) _________ is a connection point in a network.
MIS
A(n) _________ is a set of software tools that enables managers to gather, organize, and evaluate information.
Virtual Machine
A(n) _________ is a special environment that allows you to run an operating system on top of another operating system.
Bug
A(n) _________ is just another name for an error in a program.
Widget
A(n) _________ on Android provides automatically-updating information without the need to open an app.
CPU
As the main processor of a computer, the _________ is responsible for organizing and carrying out instructions in order to produce a desired output.
VPN
Because it increases the security of a network connection, a _________ is often required for users who wish to access a company's private network over an Internet connection.
Plug-Ins
Browser ________, such as Adobe Flash Player, are separate programs that allow your web browser to play several types of multimedia content.
Collaboration
Cloud _________ services allow individuals to view, edit, and share documents, even seeing each other's changes in real time.
Malware
Collectively, all malicious programs are referred to as:
Packets
Data moves though networks in structures known as ________, which are pieces of a message broken down into small units by the sending device and reassembled by the receiving device.
ISP
Every type of Internet service requires a connection and monthly payment to a(n):
Bandwidth
For modern networks, _________ is measured in either megabits per second (Mbps) or gigabits per second (Gbps).
Cleanup
If you want to clear an operating system's temporary files for storage, performance, or privacy reasons, you should run a disk _________ utility.
Computer
In the simplest terms, a(n) _________ is a device that accepts input, processes data, and can output or store the result of its actions.
Piracy
In the world of computing, _______ means acquiring or exchanging copies of protected digital creations without payment or permission from their creator.
DVR's
Many individuals are using TV tuners as _________ to record television shows for future playback.
Accelerometer
Many mobile devices contain a(n) _________ and gyroscope that can sense even the smallest movements.
Compress
Many users choose to _________ several files into one ZIP file for the sake of easy transport, especially when attaching them to an email message
Cyberterrosim
No form of hacking is as dangerous as ________, which is an attack against a country that seeks to create large-scale chaos and damage to a country's infrastructure.
Suite
Often times, several office programs are bundled as a unit known as an office:
Device Drivers
Operating systems communicate with most hardware components using:
Defragmentation
Operating systems typically contain a disk _________ or optimization utility, which will reorganize files and fragments to place related ones nearer to each other.
Formatting
Preparing a storage device for use by an operating system is known as:
Bitmap
Programs that are based on _________ graphics record your images on a pixel by pixel basis and will typically save files in formats such as JPG, GIF, and PNG.
Vector
Programs that are based on _________ graphics rely on mathematics to generate and manipulate a variety of shapes.
Beta
Software companies will often release a(n) _________ version to a limited audience that will test it on their systems. Programmers can then collect information from these users about any errors that were encountered.
CRM
Some ERP systems integrate _________ capabilities that allow sales departments to manage call centers, support customers, and keep track of sales commissions.
GPU
The _________ is a video card's microprocessor.
Duplexing
The ability to automatically print to both sides of a piece of paper is known as:
Hands-free Computing
The ability to communicate with a device without using your hands is known as _________ computing.
Desktop
The computer that has been traditionally found on the desks in many offices and homes is the _________ computer.
Backbones
The connections that carry most of the Internet's traffic are referred to as:
P2P
The most popular method for file transfer today is known as _________ file sharing, which uses a distributed network of individual users instead of a central server.
World Wide Web
The pages in the _________ can contain a seemingly unlimited variety of information, from news and sports to updates from your family and social circle.
Computer Program
The set of instructions that directs the computer to perform a variety of tasks is known as a(n):
Broadband
The term _________ is used to describe any digital data connection that can transmit information faster than standard dial-up by using a wider band of frequencies.
Software
The term _________ refers to one or more computer programs that are packaged together for a unified purpose.
Shareware
To keep using _________ after the trial period, you must purchase a full version or a code that can be entered into the software.
NFC
Using a wireless technology known as ________, many smartphones can now be tapped on special payment devices to complete your purchase at select stores.
1,000 megabytes
What is the approximate value of a Gigabyte?
Offshoring
When companies outsource functions to another country it is referred to as:
Byte
When it comes to describing a computer's storage or memory we commonly use the unit known as the _________, which is simply a collection of eight bits.
UPS
When the power fails completely, the battery in a(n) _________ contains enough power to run a computer system for a given amount of time
Ports
When you look at the back of your system unit, you will likely find a variety of plugs known as _________.
RAM
Whenever you actively work on something using your computer, that work is temporarily stored in:
Personal Computer
Which category of computer is generally meant to be used by only one person at a time?
Roku
Which of the following is a streaming player for your TV that can use your home's wireless network to connect with online services such as Netflix and Pandora?
Adobe InDesign
Which of the following is an example of desktop publishing software?
Glass
Which of the following refers to special eyeglasses from Google that provide the user with visual information directly in front of their right eye?
Processing
Which of the following refers to the ability of a computer to perform a variety of actions based on instructions from the user or a program?
Cloud Computing
Which of the following technologies allows you to store your files and use various applications in an online account?
Smart
Which types of TVs allow you to connect to a variety of online services such as Netflix, Amazon, and Pandora?
All-In-One Computers
Which types of computers have all of the hardware integrated with the monitor?
Footprints
You and your devices usually leave digital ______, which is a trail of your data, activity, and even the locations where devices are used.
Hyperlinks
You will often find _________ on a web document that, when clicked, act as connectors to another document on the World Wide Web.
Intellectual Property
______, which are products of the mind, can be quite valuable even though they may not always take on a physical form.
Whistleblowing
_______ is the act of alerting the public about harmful activities that are being hidden by an organization.
Thermal
________ printers, which are often used to create receipts and labels, apply heat to special paper in order to turn select areas black.
Unix
________, which dates back to 1969, runs many of the world's most powerful servers.
Virtual Reality
_________ allows humans to experience immersive, realistic environments that are simulated by computers, usually with the aid of special headsets.
_________ allows messages to be sent to electronic mailboxes in an instant.
Chromebooks
_________ are lightweight laptops that run Google's Chrome operating system.
Embedded Systems
_________ are limited computers because they are placed inside devices which require specific computing functions.
Search Engine
_________ are sophisticated services that store the URL of millions of web pages and most of the content on those pages.
Twisted Pair
_________ cable normally consists of four pairs of wires that are twisted around each other.
Ultraportable
_________ computers are thin, lightweight laptops that possess strong processing power.
Mobile
_________ devices are lightweight, handheld computers that offer a variety of software and communication services for mobile users.
Phishing
_________ involves luring individuals into entering personal information into a website controlled by the hacker.
Social Engineering
_________ is a form of hacking that focuses on deceiving individuals into giving away the information that the thief needs.
Pretexting
_________ is gaining someone's trust by pretending you are someone else.
Interoperability
_________ is the ability of each organization's information system to work with the other, sharing both data and services.
Scalability
_________ is the capacity to provide increasing amounts of computing power, storage, and/or software.
Crowdsourcing
_________ is the gathering of information from a large group of people.
Dot Matrix
_________ printers create output by striking an inked ribbon against paper using metal pins, making them useful for printing on pressure-sensitive forms.
CAD
_________ software aids architects, engineers, and many others who need to create a digital model of an object.
ERP
_________ software aids architects, engineers, and many others who need to create a digital model of an object.
Project Management
_________ software allows managers to create and track a sophisticated plan in order to achieve a variety of goals.
Vertical Market
_________ software is created for a specific industry such as health care or insurance.
System
_________ software refers to any software that is created for the operation, maintenance, and security of a computer.
RFID
_________ tags, such as those present in many automated toll collection systems, can be scanned from longer distances and at higher speeds than barcodes.