Technology in Action 12 E

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

802.11ac is the current wireless Ethernet standard. a. True b. False

a

A beta version of software is often released before the official commercial release. a. True b. False

a

A digital camera's resolution a. is measured in megapixels (MP). b. only matters for analog cameras. c. depends on the camera's lens. d. tells you how to transfer images to your printing service.

a

A gas purchase made with a credit card at the pump would be entered into which type of database system? a. transaction-processing system b. office support system c. management information system d. decision support system

a

A multi-core processor like the Intel i7 is a. one physical chip b. several chips joined together on the motherboard. c. two separate cards installed in your system. d. a software setting you can use to speed up CPU processing.

a

A query is used to extract a subset of data from a database. a. True b. False

a

A technique that uses illegally obtained information about individuals to perform targeted attacks in the hopes of getting them to reveal sensitive information is known as a. spear phishing. b. pretexting. c. keystroke logging. d. logic bombing

a

A typical CPU can complete billions of machine cycles in one second. a. True b. False

a

A wizard is a software tool that offers a step-by-step guide through complicated tasks. a. True b. False

a

Actual data throughput is usually higher on wired networks than on wireless networks. a. True b. False

a

An analog signal is different from a digital signal because a. it is continuous. b. it has only specific discrete values. c. it is easier to duplicate. d. it is easier to transmit.

a

An audio interface unit can a. connect a computer to musical instruments and microphones. b. provide Dolby surround sound. c. create electronic drum sounds. d. convert between different audio file formats.

a

An optical carrier (OC) line is a high-speed fiber optic line that forms the backbone of the Internet. a. True b. False

a

Being computer literate is an advantage in almost every type of career. a. True b. False

a

Bethany is in her home, watching a video she took on vacation, while her brother is playing FIFA Soccer on his X-Box, and her dad is checking stock quotes on his iPad? What kind of network does this family have? a. P2P network b. client/server network c. both A and B d. neither A and B

a

Client/server networks are generally more secure than P2P networks. a. True b. False

a

Collaborative, user-created web content is also known as Web 2.0. a. True b. False

a

Correctly entering the user ID and password on your college network is an example of a. authentication. b. scalability. c. packet screening. d. virtualization.

a

Data and information are NOT interchangeable terms. a. True b. False

a

Different versions of Linux are known as "distress". a. True b. False

a

Digital video can be stored in an .mpg file, a .mpeg file, or a .mp4 file. a. True b. False

a

Each device attached to your computer needs a device driver to communicate with the OS. a. True b. False

a

Early operating systems such as MS-DOS used a _____________ interface. a. command-driven b. graphical user c. menu-driven d. magnetic tape-based

a

Encryption is used to a. code your e-mail so only one person can decipher it. b. shrink the amount of space it takes to store e-mail. c. transfer e-mail more quickly. d. make shopping on the Internet more available.

a

Every smartphone contains a GPS chip. a. True b. False

a

Examples of crowdfunding and crowdsourcing include a. Kickstarter and MobileVoice b. Bing and Google. c. Call A Bike and ZipCar. d. Ushahidi and Kiva.

a

Firewalls work by closing ___________ in your computer. a. logical ports b. software gaps c. logical doors d. backdoors

a

From fastest to slowest, which is the fastest sequence of accessing memory? a. registers, RAM, Level 1 cache, Level 2 cache b. registers, Level 1 cache, Level 2 cache, RAM c. Level 1 cache, Level 2 cache, RAM, registers d. Level 2 cache, Level 1 cache, registers, RAM

a

Fuzzy logic uses approximate data gathered by experiences rather than fixed and exact facts. a. True b. False

a

HDMI is a single cable that carries both high-definition video as well as audio signals. a. True b. False

a

HTML5 a. supports powerful multimedia effects. b. is obsolete. c. is used to program server-side applications d. provides high-level security for e-mail.

a

HTML5 features helpful new tags like a. <audio> and <video> b. <movie> and <actor> c. <metaheader> d. <div>

a

Home network servers are used for file management tasks on a home network. a. True b. False

a

IP addresses are used to identify computers connected to the Internet. a. True b. False

a

If you place a document from your C: drive in the Recycle Bin in Windows a. it remains on your hard drive until you empty the Recycle Bin. b. it is immediately deleted from your system. c. it can only be recovered from the Recycle Bin by using File History. d. you can always retrieve it later if you ever need it again.

a

In the URL http://www.whitehouse.gov/blog, which part is considered the path or subdirectory? a. /blog b. .gov c. www.whitehouse.gov d. http

a

MIME is the protocol that supports sending files as e-mail attachments. a. True b. False

a

Most modern operating systems include some type of NOS functionality. a. True b. False

a

NOS software is needed a. on all computers in a client/server network. b. only on the servers in a client/server network. c. only if a communications server is deployed on a client/server network d. only when configuring a network in a star topology.

a

Network adapters installed internally in a device are called NICs. a. True b. False

a

One of the best and simplest ways to keep hackers out of your computer is to use a firewall. a. True b. False

a

Packet switching sends information between two points a. by breaking it into small chunks and sending the chunks across different routes. b. by finding one route between the two points and sending the data. c. by encrypting the data then sending it. d. differently for each company using it.

a

Password strength is only partially determined by the length of the password. a. True b. False

a

RAID 0 cuts the time it takes to write a file to disk in half. a. True b. False

a

Removing red-eye, cropping, and altering pictures with pen- and brush-like tools are features of image-editing software. a. True b. False

a

SSD startup drives will reduce the amount of time to boot up. a. True b. False

a

Search engines that search other search engines are called a. metasearch engines. b. betasearch engines. c. gigsearch engines. d. megasearch engines.

a

Social bookmarking and tagging are the same thing. a. True b. False

a

Software designed to close logical ports in your computer is known as a(n) a. firewall. b. packet filter. c. anti-malware blocker. d. network address translator.

a

Software that pretends your computer is infected with a virus to entice you into spending money on a solution is known as a. scareware. b. spyware. c. adware. d. trackingware.

a

Streaming music services allow you to a. subscribe monthly and have access to millions of songs. b. purchase audio CDs. c. make your own music available to your friends. d. avoid digital rights management.

a

SuperFetch is a memory-management technique that pulls info from your hard drive into RAM. a. True b. False

a

The "s" in HTTPS stands for secure and indicates that the secure sockets layer protocol has been applied to the website. a. True b. False

a

The Ethernet port is an example of a connectivity port. a. True b. False

a

The GNU General Public License is an example of copyleft. a. True b. False

a

The Khan Academy is a. a free technology tool used for education. b. a program in Africa to encourage study of mathematics c. of use to students but not useful for instructors. d. a simulation package to teach users how to run a business.

a

The Virtual Choir showed that people have the means to collaborate easily internationally. a. True b. False

a

The _________ utility is used for detecting lost files and fragments of files on your hard drive. a. Error-checking b. System Refresh c. Disk Cleanup d. Disk Defragmenter

a

The amount of time your current CPU is working is called a. CPU usage. b. Task Manager. c. virtual processing. d. system performance.

a

The amount of video memory in a modern video card is a. different from one model of card to the next. b. determined by the operating system. c. related to the size of the SSD drive. d. set by the CPU speed.

a

The ethical theory that states that individual happiness is not important is known as a. utilitarianism. b. virtue ethics. c. deontology. d. divine command theory.

a

The fastest broadband Internet service is usually a. fiber-optic. b. DSL. c. cable. d. satellite.

a

The life cycle of a program begins with describing a problem and making a plan. Then the PDLC requires a. coding, debugging, and testing. b. process, input, and output. c. data, information, and method. d. an algorithm.

a

The move toward access instead of ownership is a sign of collaborative consumption. a. True b. False

a

The open format for publishing of e-books that is optimized for mobile devices is a. ePub. b. raw. c. azw. d. pdf.

a

The processor speed of the CPU is not the only measure of a processor's expected performance. a. True b. False

a

To determine what devices are connected to your router, you should a. log into an account associated with your router's IP address. b. view My Computer properties. c. look to see if the device's IP address matches the router's IP address. d. all of the above

a

To improve video performance, modern computers have a _______ in addition to the CPU. a. GPU b. VPU c. DPU d. APU

a

Two lists showing the same data about the same person is an example of a. data redundancy. b. data inconsistency. c. data disparity. d. data irregularity.

a

What is another name for the base-10 number system? a. decimal notation b. binary number system c. hexadecimal notation d. integer system

a

What is the first step of the SDLC? a. Problem identification b. Analysis c. Development d. Design

a

What should you do if you want to search for a phrase? a. Place quotation marks around the phrase. b. Use AND in between all the words in the phrase. c. Precede the phrase with the keyword PHRASE. d. Use a wild card, such as an asterisk.

a

What type of job involves working at client locations and the ability to work with little direct supervision? a. field-based b. project-based c. office-based d. home-based

a

What was the name of the first web browser? a. Mosaic b. Internet Explorer c. Netscape d. Firefox

a

What would you use to see what network adapters are installed in your Windows computer? a. the Device Manager utility b. the Programs and Utilities manager c. the Ethernet Manager utility d. the Home Network manager

a

When is it sufficient to use a list to organize data? a. When the data is simple and can be organized in one table b. When data needs to be organized into two or more tables c. When more than one person needs to access the data d. all of the above

a

Which computer was touted as the first personal computer? a. Altair b. Commodore PET c. Lisa d. Osborne

a

Which invention enabled computers to be made smaller and lighter? a. the integrated circuit b. the transistor c. the microprocessor chip d. magnetic tape

a

Which is NOT an example of Web 2.0 technology? a. e-mail b. social networking c. blogging d. wiki

a

Which is a component of a search engine? a. indexer program b. spider c. search engine software d. subject directory

a

Which is a type of MIS report that provides a consolidated picture of detailed data? a. summary report b. detail report c. batch report d. exception report

a

Which of the following display screens does not require a backlight to function? a. an organic light-emitting diode (OLED) display b. a liquid crystal display (LCD) c. a light-emitting diode (LED) display d. a cathode ray tube (CRT)

a

Which of the following is NOT a mobile device? a. base transceiver station b. phablet c. tablet d. ultrabook

a

Which of the following is NOT considered an accessibility utility? a. System Restore b. Magnifier c. Narrator d. Speech Recognition

a

Which of the following is NOT considered to be a utility program? a. Internet Explorer b. Disk Cleanup c. Task Manager d. System Restore

a

Which of the following is an example of a locally administered network? a. P2P network b. Client/server network c. both A and B d. Neither A and B

a

Which of the following is an installed e-mail client? a. Outlook b. Windows Messenger c. Gmail d. Yahoo! mail

a

Which of the following is not an Internet protocol? a. ARPANET b. HTTP c. FTP d. BitTorrent

a

Which of the following is true about crisis-mapping software? a. Ushahidi was created in a few days and distributed globally for free. b. it is only useful for times of political upheaval. c. the results of the crisis map can only be displayed on a computer. d. it is only useful for collecting email results.

a

Which of the following is used to increase security on a client/server network? a. bastion host b. bridge c. transmission media d. database server

a

Which of these is NOT an optical storage device? a. flash drive b. CD drive c. DVD drive d. Blu-ray drive

a

Which of these is an example of optical storage media? a. DVD b. SSD c. thumb drive d. a flash memory card

a

Which port enables you to connect devices such as keyboards and printers to your computer? a. USB b. DVI c. connectivity d. HDMI

a

Which position is NOT typically a part of the information systems department? a. helpdesk analyst b. telecommunications technician c. network administrator d. web server administrator

a

Which power control option stores data on the hard drive? a. Hibernate b. Sleep c. Log off d. Shut down

a

Which service allows you to use your cell/smartphone to send messages that contain images? a. MMS b. ISP c. SMS d. MiFi

a

Which software is best to use if you want to change the looks of your digital pictures? a. image-editing program b. video-editing program c. media management software d. All of the above

a

Which statement about ultrabook computers is FALSE? a. Ultrabooks have the fastest optical drives. b. Ultrabooks are equipped with SSD drives for fast start-up. c. Ultrabooks typically weigh less than 3 pounds. d. Ultrabooks are available for either Windows or the OS X operating systems.

a

Which type of program takes advantage of automatic recalculation and what-if analysis? a. spreadsheet b. database c. CAD/CAM d. project management

a

Why are P2P networks not usually installed in businesses? a. Security is stronger on client/server networks. b. They require dedicated servers. c. They are more scalable than client/server networks. d. Client/server networks are cheaper to install.

a

With a home network, you can share digital entertainment content between devices. a. True b. False

a

XML and JSON are both common formats for the exchange of information between web services. a. True b. False

a

You are most likely to find an RTOS a. in a robotic camera. b. on a supercomputer. c. on a mainframe. d. on an iPad.

a

You can terminate nonresponsive programs with Task Manager. a. True b. False

a

Your Internet service provider has a default domain name server to translate a URL into an IP address. a. True b. False

a

A WiFi network is always faster than a 4G network. a. True b. False

b

A backup of only the files on your computing device that have been created (or changed) since the last backup is known as a(n) a. total backup. b. incremental backup. c. image backup. d. global backup.

b

A benefit of using database software applications is the ability to perform what-if analysis. a. True b. False

b

A communications server is used to host websites on a client/server network. a. True b. False

b

A field labeled PHONE that accepts data such as (610) 555-1212 would use the Number data type. a. True b. False

b

A large group of software programs used to launch coordinated DoS attacks is known as a __________. a. rootkit b. botnet c. Trojan horse d. zombienet

b

A logical error can be detected and repaired by the compile a. True b. False

b

A network consisting of two LANs separated by great physical distances is known as a: a. HAN b. WAN c. SAN d. LAN

b

A search engine that searches other search engines is called a SuperSearch engine. a. True b. False

b

A small slice of a data warehouse is called a data market. a. True b. False

b

A social engineering technique in which you send people an e-mail for the purpose of inducing them into revealing sensitive information is known as a. spyware. b. phishing. c. pharming. d. key logging.

b

A system that's designed to help perform routine daily tasks is known as (a)n a. data mart. b. office support system. c. data warehouse. d. decision support system.

b

A type of data validation that would ensure the number of hours worked for an employee is greater than 0 but less than or equal to 40 is called a a. consistency check. b. range check. c. completeness check. d. numeric check.

b

AJAX allows you to create websites that never need to refresh. a. True b. False

b

All data inside the computer is stored as a. words. b. alpha-numeric fields. c. binary patterns. d. cache memory.

b

All devices must run the same version of an operating system to connect to a home network. a. True b. False

b

Apps specifically designed for Windows 8 a. run on the desktop. b. run full screen. c. can't be closed down once started. d. use a large amount of RAM

b

Apps specifically designed for Windows 8.1 a. run on the desktop. b. run full screen. c. can't be closed down once started. d. use a large amount of RAM

b

Being computer literate means you know how to solve any computer problem. a. True b. False

b

Borrowing hard drive space to optimize RAM storage is known as a. authentication. b. virtual memory. c. paging. d. multitasking.

b

Client-server networks are the type of network used mainly in homes. a. True b. False

b

Computer forensics a. tests computer systems to gather potential legal evidence. b. analyzes computer systems to gather potential legal evidence. c. analyzes the design of a computer system. d. is used to create three-dimensional art.

b

Country codes are what part of a URL? a. sub-top-level domain b. top-level domain c. path d. protocol

b

Criminal investigators may find evidence on a computer, but that evidence cannot be used in court. a. True b. False

b

Crowdfunding helps startup businesses by a. selling stock more easily. b. gathering financial contributions from supporters. c. using QR codes to advertise and market products. d. replacing Web 2.0 technology.

b

Donating your computer will necessarily put you at risk for identity theft. a. True b. False

b

E-mail is synchronous while instant messaging is asynchronous. a. True b. False

b

Encrypting data is not an appropriate measure for protecting mobile devices such as tablets. a. True b. False

b

Fiber-optic cable most likely would be used in a business network when a. saving money is more important than speed. b. electrical or magnetic interference is present. c. very short cable runs are required. d. the installation budget is very limited.

b

GDDR5 memory is often used in external hard drives. a. True b. False

b

HTTP is the only Internet protocol. a. True b. False

b

HTTPS is different than HTTP because a. of how it transforms or reformats the data. b. it is a combination of HTTP and the Secure Sockets Layer (SSL). c. it extracts data from source databases. d. it stores data in the data warehouse.

b

How can you tell what wireless devices are connected to your router? a. Look at the router itself. b. Log in to the router's IP address and check the configuration page. c. Look at the device's wireless settings. d. All of the above.

b

If you are artistic and have mastered software packages such as Adobe Photoshop, Autodesk 3ds Max, and Autodesk Maya, you might consider a career as which of the following? a. game programmer b. game designer c. game tester d. web designer

b

In Windows, the Refresh procedure is the same as the Restore procedure. a. True b. False

b

In object-oriented analysis, classes are defined by their a. objects and data. b. data and methods. c. operators and objects. d. behaviors and keywords.

b

Inkjet printers are considered legacy technology. a. True b. False

b

Instant messaging is secure because of the type of encryption used. a. True b. False

b

Java is considered to be architecture neutral because a. it can be recompiled to run on many CPUs. b. it only needs to be compiled once and can run on many different CPUs. c. it can run on many different generations of Windows. d. it can run in any browser.

b

Modern motivation theory says people work hardest when offered the highest pay. a. True b. False

b

On client/server networks, bridges a. transfer data between two networks. b. route data between two collision domains on a single network. c. move data efficiently from node to node on the internal network. d. are necessary only in networks using the ring topology.

b

Outsourcing is thought to be an attractive option for many companies because of a. the emphasis on employee training. b. the cost savings that can be realized. c. increased data security. d. decreased travel and entertainment costs.

b

P2P is an acronym for a. packet-to-packet networking. b. peer-to-peer sharing. c. person-to-person texting. d. power-to-people delivery.

b

PowToon and HaikuDeck are alternatives to a. Microsoft Word. b. Microsoft PowerPoint. c. Adobe InDesign. d. Apple iWork Pages.

b

Productivity software suites are not available as web-based software. a. True b. False

b

Proprietary software is free and available with few licensing restrictions. a. True b. False

b

QR codes conduct a "quick release" of information from your phone to a website. a. True b. False

b

SSDs are classified as what type of storage? a. volatile b. nonvolatile c. video d. cache

b

Sending e-mails to lure people into revealing personal information is a technique known as pharming. a. True b. False

b

Simulation software that can be used in education includes a. data mining. b. the Interactive Body. c. MOMA WiFi. d. Netflix.

b

Social networking a. prevents two-way dialog between people. b. is incorporated as part of a political strategy by many politicians. c. cannot be immediate enough to react to quickly developing issues. d. only is useful for personal friendships

b

Software that is available on demand via the Internet is called a. proprietary software. b. Software as a Service (SaaS). c. productivity software. d. open source software

b

Switches are used to route data between two different networks. a. True b. False

b

System restore points can only be created by Windows automatically on a regular schedule. a. True b. False

b

The Next Einstein Initiative uses the power of supercomputing to enhance mathematical education. a. True b. False

b

The OS can optimize RAM storage by using a. thrashing. b. virtual memory. c. an interrupt handler. d. a spooler.

b

The Windows 8 desktop no longer includes the taskbar. a. True b. False

b

The _________ utility can free up space on the hard drive. a. Task Manger b. Disk Cleanup c. System Refresh d. File Explorer

b

The crisis of growing digital divide is being addressed by a. Ushahidi. b. the Next Einstein Initiative project. c. the Freecycle program. d. building faster computers

b

The faster data transfer port for computers today is the _______ port a. USB 3.0 b. HDMI c. Thunderbolt d. DisplayPort

b

The field of psychology that theorizes that happiness results from ethical living is known as a. principled psychology. b. positive psychology. c. moral psychology. d. affirmative psychology.

b

The first step of the boot process is the power-on self-test (POST). a. True b. False

b

The hard drive is an example of a volatile storage device. a. True b. False

b

The individuals responsible for generating images for websites are referred to as a. network administrators. b. graphic designers c. web programmers. d. interface designers

b

The minimum set of recommended standards for a program is known as the a. operating system. b. system requirements. c. setup guide d. installation specs

b

The oldest scientific computing organization is a. Institute of Electrical and Electronics Engineers. b. Association for Computing Machinery. c. Information Systems Security Association. d. Association for Women in Computing.

b

The operating system is a type of application software. a. True b. False

b

The third step of the boot process is the power-on self-test (POST). a. True b. False

b

The type of computer that you might find in your automobile is a. a supercomputer. b. an embedded computer. c. a mainframe computer. d. none of the above.

b

The type of network used for communication among a laptop and smartphone using Bluetooth is a a. WAN. b. PAN. c. LAN. d. MAN.

b

There are several categories of mobile devices because a. we do not yet have digital convergence. b. there is a range of tradeoffs between weight and performance. c. everyone wants the fastest processor. d. no one has designed a digital device that works well for travel.

b

To add ports to your computer, what do you need? a. a digital media card reader b. an expansion hub c. a flash memory card d. an external hard drive

b

To decide if your current system is still useful for you a. check the brand and speed of your CPU. b. check each subsystem to see how it is performing during your work day. c. ask the salesman at the store. d. make sure your have more than 4 GB of RAM.

b

To ensure only authorized users are logging onto a network, which server would a client/server network include? a. Internet b. authentication c. communications d. application

b

To manage authorized connections to the internal network, which server would a client/server network include? a. Internet b. authentication c. communications d. application

b

To regulate the internal timing of a computer system, the motherboard uses a. a system clock. b. software simulation. c. RAM. d. a register.

b

To share files between computers on a Windows home network, you must a. enable groupsharing. b. create a homegroup. c. enable Windows sharing. d. none of the above.

b

VOIP is a service that lets you a. record messages to your hard drive. b. place phone calls using the internet as the network. c. locate anyone based on their name. d. eliminate viruses from your mobile devices.

b

VoIP is a phone service that a. requires a fiber-optic connection. b. works over an Internet connection. c. is only available for calls within the United States. d. has extremely high quality but is very expensive.

b

Webcasts are only delivered as prerecorded audio and video content. a. True b. False

b

What do you need to get wireless Internet access at home? a. Mobile router b. Wireless router c. Wireless nodes d. All of the above

b

What is a terabyte? a. one million bytes b. one trillion bytes c. one billion bits d. one trillion bits

b

What is the navigation aid that shows users the path they have taken to get to a web page located within a website? a. favorites b. breadcrumb trail c. bookmarks d. social bookmarks

b

When buying a monitor, which factor determines the difference in light intensity? a. screen resolution b. contrast ratio c. color depth d. aspect ratio

b

When using the Internet for research, you a. can assume that everything you find is accurate and appropriate. b. should evaluate sites for bias and relevance. c. can assume the author is an authority on the subject matter. d. can assume that the links provided on the site are the only additional sources of information.

b

When would you want to consider RAID 1 technology? a. When you need the fastest solution for writing data b. When you need an instant backup of your work c. If you think that SSDs are too expensive d. When you only want to have one hard disk drive

b

When you buy software, you then own it and can do anything you'd like with it, including giving it to friends to install on their machines. a. True b. False

b

Which computer first stored its operating system in ROM? a. Apple I b. Apple II c. Lisa d. Macintosh

b

Which encoding scheme can represent the alphabets of all modern and historic languages? a. base-2 number system b. Unicode c. ASCII d. scientific

b

Which ethical philosophy states that morals are internal? a. deontology b. virtue ethics c. relativism d. divine command theory

b

Which is NOT a technology that has been used to deliver assistance during times of crisis? a. Ushahidi b. QR codes c. social networking d. e-mail

b

Which of the following allows retailers to respond to consumer buying patterns? a. outsourcing b. data mining c. smart labels d. Bluetooth technology

b

Which of the following can be used to add additional ports to your network? a. Switch extension b. Switch c. Router hub d. Router extension

b

Which of the following describes copyleft? a. Terms enabling redistributing proprietary software. b. Terms enabling redistributing open source software. c. Terms enabling free use of software content. d. Terms restricting free use of software content.

b

Which of the following is NOT an example of a smartphone OS? a. Blackberry b. Linux c. iOS d. Android

b

Which of the following is NOT an operating system for a smartphone? a. iOS b. HTC c. Windows Phone d. Android

b

Which of the following is a private network set up by a business that's used exclusively by a select group of employees and suppliers? a. MAN b. Intranet c. HAN d. Vender network

b

Which of the following is an OS that is NOT used on tablet computers? a. iOS b. BlackBerry c. Android d. Windows

b

Which of the following is an advantage of installing a client/server network in a business? a. centralization of network adapters b. centralization of network security protection c. decentralization of files and data d. decentralization of peripherals

b

Which of the following is true about open source software? a. The program code is confidential. b. The program can be changed and freely distributed. c. The program can be freely distributed as long as the program code is not changed. d. The program code is subject to copyright protection.

b

Which of the following statements about compressed audio files is FALSE? a. Compressed audio files have a smaller file size than uncompressed audio files. b. The sound is noticeably different on compressed audio files than on uncompressed audio files. c. WAV is a compressed audio file format. d. Downloaded songs are compressed audio files.

b

Which of the following would be the correct classification for Etsy.com? a. B2B b. C2C c. B2C d. click-and-brick business

b

Which of the four major functions of a computer is responsible for manipulating, calculating, and organizing data into information? a. input b. processing c. storage d. output

b

Which of these is considered nonvolatile storage? a. CPI b. ROM c. FireWire 800 d. expansion card

b

Which part of the CPU is specifically designed to perform mathematical operations? a. fetch module b. ALU c. registers d. cache memory

b

Which programming language revolutionized the software industry? a. ALGOL b. BASIC c. COBOL d. FORTRAN

b

Which tool do hackers use to gain access to and take control of your computer? a. stealth viruses b. backdoor programs c. scareware d. phishing software

b

Which web browser is open source? a. Internet Explorer b. Firefox c. Google Chrome d. Safari

b

Which would NOT be considered productivity software? a. Personal finance b. Project management c. Note-taking d. Database

b

Who are the founders of Apple? a. Paul Allen and Bill Gates b. Steve Jobs and Steve Wozniak c. Steve Jobs and Bill Gates d. Bill Gates and Steve Wozniak

b

XML and JSON a. create a secure connection between client and server. b. allow web services to exchange information. c. encrypt e-mail messages. d. cannot be easily read by humans since they are in binary.

b

You can run multiple monitors on your system only if a. you have a Mac OS X operating system. b. you have a video card that supports more than one monitor. c. you have CrossFire. d. you have SLI.

b

You cannot get good productivity software for free. a. True b. False

b

You would not want to consider overclocking if a. you are looking to run the CPU faster than the recommended speed. b. you want to keep the warranty on your system. c. you have hyperthreading. d. your CPU is already faster than 2.1 GHz.

b

A _________ takes the place of an IP address because it's easier for humans to recall than a long string of numbers. a. DNS b. CGI c. domain name d. HTML

c

A backup of all the files on your computer, which essentially creates a "snapshot" of what your computer looks like at that point in time, is known as a(n) a. total backup. b. incremental backup. c. image backup. d. modification backup.

c

A cascading style sheet is a list of rules that defines which of the following? a. proper use of HTML b. how data is transmitted across the Internet c. how to display HTML elements d. how domain names can be constructed

c

A cell phone is cellular because a. software can be plugged in or removed. b. phones have become so small in size. c. it uses a network made up of cells or base transceiver stations. d. of the pattern on the screen of the device.

c

A computer that a hacker has gained control of in order to launch DoS attacks is known as a __________ computer. a. rookit b. compromised c. zombie d. breached

c

An example of an open source OS is a. Windows. b. OS X. c. Linux. d. DOS.

c

Calendars, tasks, and e-mail will be found in which application? a. Excel b. One Note c. Outlook d. Access

c

Cascading style sheets allow you to quickly change a. from server-side processing to client-side processing. b. to a more secure transport protocol. c. the rules for applying formatting to an HTML document d. from HTML to XML

c

Cognitive surplus means that we now find many people with a. more money than free time. b. limited access to the Internet. c. excess time and free tools for collaboration. d. mobile devices.

c

Compiling a program turns a. top-down design into object-oriented design. b. a first-generation language into a fourth-generation language. c. source code into an executable program. d. none of the above

c

Computers are designed with a. volatile memory. b. non-volatile memory. c. both volatile and non-volatile memory. d. neither volatile nor non-volatile memory.

c

Digestible microchips a. look like small computer chips. b. are not approved by the FDA. c. have embedded sensors to transmit information to physicians. d. deliver medication through the skin.

c

Dolby Digital 7.1 creates a. ultra-sharp high-def video. b. a digital signal from an audio input. c. 8-channel surround sound. d. 7-channel surround sound.

c

IPv6 uses 32 bits to assign a. a data packet to each transmission. b. a memory address to the CPU. c. an address to every device connected to the Internet. d. a destination Internet address to each e-mail.

c

If your computer can't store all the required OS data in RAM, it can use a temporary file on the hard drive to store data. This is known as a _________ file. a. nonvolatile b. Linux c. swap d. thrash

c

Medication delivered through pills with embedded sensors a. is dangerous to humans. b. will be available in the next decade. c. allows the physician to track the patient's heart rate. d. requires hospitalization.

c

Megabit per second is usually used to measure a. data transfer rate. b. throughput c. both A and B. d. Only A

c

Monitor screens are made up of millions of tiny dots known as a. bytes. b. resolution points. c. pixels. b. bits

c

Moore's law refers to: a. the amount of memory on a memory chip. b. the overall system processing capability. c. the number of transistors inside a CPU chip. d. the speed of DRAM.

c

PHP is a scripting language used to a. create applications for iOS devices. b. program for Android smartphones. c. control the automatic generation of HTML pages. d. edit text documents.

c

Providing adequate security on a corporate network involves all of the following issues except a. authentication b. restricting access to servers. c. proprietary software lockout. d. limiting network access by requiring passwords.

c

RTM is the point in the software release cycle when a. real people are brought into the testing process. b. the software is released to programmers. c. the software is released to computer manufacturers who install it on the systems they build. d. a software update is released to the public.

c

Software that allows an individual to track financial transactions is called a. checking software. b. tax planning software. c. personal financial software. d. small business accounting software.

c

Special areas of memory storage built into the CPU are known as a. switches. b. semiconductors c. registers. d. DIMMs.

c

SuperFetch is a memory-management technique that a. determines the type of RAM your system requires. b. makes the boot-up time for the system very quick. c. preloads the applications you use most into system memory. d. defragments the hard drive to increase performance.

c

The Internet was created to provide: a. a secure form of communications. b. a common communications means for all computers. c. both A and B. d. neither A or B.

c

The Windows app used for file management is a. Disk Manager. b. Task Manager. c. File Explorer d. Library Explorer

c

The Windows app used for locating files and folders is a. Disk Manager. b. Finder. c. File Explorer. d. Library Explorer

c

The current standard for home wireless Ethernet networks is a. WiGig. b. 802.3 c. 802.11ac. d. all of the above

c

The information in a data packet includes a. the data and the destination. b. the data and circuit identifier. c. the "To" address, "From" address, data, and reassembly instructions. d. different types of information depending on the type of message being sent.

c

The most common type of video memory in a modern video card is a. SDRAM. b. VRAM. c. GDDR5. d. GDDR3.

c

The process of adding a Windows 8 app to the Start screen is known as a. clipping. b. visualizing. c. pinning. d. screening.

c

The step of the SDLC in which we document the transfer of data from the point where it enters the system to its final storage or output is the a. problem and opportunity identification phase. b. analysis phase. c. design phase. d. development phase.

c

The type of database that is best for organizing unstructured data such as video and audio is a. multidimensional. b. relational. c. object-oriented. d. two-dimensional.

c

Unethical behavior a. is the same as illegal behavior. b. is based on civil disobedience. c. is different from illegal behavior. d. is governed by specific laws passed by legislative bodies

c

Viruses that are often launched from infected USB drives left in a computer are known as a. boot-sector viruses. b. script viruses. c. time bombs. d. encryption viruses.

c

What device would be useful to amplify a wireless signal? a. Dual-band router b. Network Interface Card c. Wireless range extender d. Router amplifier

c

What is often distributed prior to a final release of software? a. Alpha prerelease b. Open source release c. Beta version d. Freeware version

c

What should you do if you spot unethical behavior at your workplace? a. Nothing, as long as the behavior is legal. b. Report it to the police immediately. c. Follow company procedures for reporting unethical behavior. d. Start looking for a new job.

c

What two devices are often combined into one device in a small network to connect the home network to the Internet and to share the connection between devices on the network? a. router hub and switch b. switch and router c. modem and router d. modem and switch

c

What type of printer uses wax-based ink? a. inkjet b. plotter c. thermal d. laser

c

What web browser feature would be particularly useful when using public computers? a. Pinned tabs b. Session restore c. Privacy browsing d. All of the above

c

When just one residence hall can be listed for multiple students in a database, which type of relationship should be established between the database tables? a. one-to-none relationship b. many-to-many relationship c. one-to-many relationship d. one-to-one relationship

c

When using 7.1 surround sound there are a total of a. 7 speakers and one microphone. b. 6 speakers. c. 8 speakers. d. 7 subwoofers and a dialogue speaker.

c

Which best describes a data warehouse? a. a building that stores computer servers b. a software program that assists with file management c. a collection of all the data from an organization's databases d. a database that organizes data from multiple organizations

c

Which components are a characteristic of third-generation computers? a. transistors b. vacuum tubes c. integrated circuits d. microprocessor chips

c

Which is NOT a component of a search engine? a. social bookmarking site b. indexer program c. subject directory d. live bookmark site

c

Which is NOT a type of video port? a. HDMI b. DVI c. USB 3.0 d. DisplayPort

c

Which is NOT an event associated with the beginning of the Internet? a. The U.S. Department of Defense creates ARPA. b. TCP/IP protocol was developed that allowed different computers to communicate with each other. c. Amazon.com was one of the first websites on the Internet. d. the first e-mail program was written by Ray Tomlinson.

c

Which is NOT an example of a network operating system? a. Linux b. UNIX c. Android d. Windows

c

Which is NOT considered a social networking site? a. Delicious b. YouTube c. Gmail d. Wikipedia

c

Which is TRUE about XML? a. XML supports the development of rich multimedia. b. XML makes it possible to update web pages without refreshing. c. XML enables designers to define their own data-based tags. d. XML has classes that represent drop-down lists and other web elements.

c

Which is TRUE about supercomputers? a. They are specially built to support hundreds of users simultaneously. b. They are specially designed computing devices that reside in other devices. c. They perform complex calculations rapidly. d. They are best used to execute many programs at the same time.

c

Which of the following IT positions is responsible for directing a company's strategy on sites such as Facebook, Twitter, and Yelp? a. project manager b. customer interaction technician c. social media director d. social web analyst

c

Which of the following actions would NOT help to identify your personal ethics? a. Describe yourself. b. Identify the influences of your work environment. c. Conduct a genealogic study of your extended family. d. Prepare a list of values that are most important to you.

c

Which of the following database systems uses artificial intelligence? a. office support system b. transaction-processing system c. knowledge-based system d. enterprise resource planning system

c

Which of the following is FALSE? a. Bluetooth technology uses radio waves. b. An analog-to-digital converter chip converts your voice into digital signals. c. Your phone can only be connected to the Internet if there is a WiFi network available. d. SMS is an acronym for short message service, also called text messaging.

c

Which of the following is NOT a characteristic of a blog? a. Blogs are used to express opinions. b. Blogs are generally written by a single author. c. Blogs are private and require password access. d. Blogs are arranged as a listing of entries.

c

Which of the following is NOT a compressed audio file type? a. WMA b. AAC c. WAV d. MP3

c

Which of the following is NOT a major type of cybercrime reported to the IC3? a. FBI-related scams b. identity theft c. malware fraud d. advance fee fraud

c

Which of the following is NOT a reason to connect your digital entertainment device to your home network? a. You can access digital content stored on other network devices. b. You can share digital content between network devices. c. Your stored entertainment files are more secure when connected to a home network. d. You can easily download entertainment content from the Internet.

c

Which of the following is NOT found on a motherboard? a. network interface card b. CPU c. SSD d. sound card

c

Which of the following is NOT necessary to do before installing beta software? a. creating a restore point b. backing up your system c. defragging the hard drive d. ensuring your virus protection software is updated

c

Which of the following is not an advantage of installing a network in a business? a. enables peripheral sharing b. enables software sharing c. decentralization of files and data d. centralization of files and data

c

Which of the following is true? a. RAM is where the CPU is located. b. Intel is the only manufacturer of CPUs. c. The CPU contains the ALU. d. The Windows System Properties window tells you how much memory you should buy.

c

Which of the following should you avoid doing on social networking sites? a. Only posting the month and day of your birthday. b. Using caution in choosing what pictures to post. c. Posting information about pet names, favorite teachers, and other commonly identifiable information. d. Revisiting privacy settings periodically.

c

Which of the following statements is false? a. Individuals who have no sense of right or wrong exhibit amoral behavior. b. Ethical decisions are usually influenced by personal ethics. c. Unethical behavior is always illegal. d. Life experience affects an individual's personal ethics.

c

Which of the following types of software allows you to experience a real situation through a virtual environment? a. Reference b. Brain Training c. Simulation d. Genealogy

c

Which position is a part of the Systems Development department? a. webmaster b. interface designer c. programmer d. database administrator

c

Which search engine searches other search engines? a. Ipl2 b. Bing c. Dogpile d. ChaCha

c

Which type of Internet connection requires hardware to be installed outside your home? a. DSL b. Fiber-optic c. Satellite d. Dial-up

c

Which would NOT be a feature or component of a transaction-processing system? a. batch processing b. real-time processing c. virtual processing d. online transaction processing

c

Why are client/server networks usually installed in businesses? a. Security is weaker on client/server networks. b. They do not require dedicated servers like P2P networks. c. They are more scalable than P2P networks. d. Client/server networks are cheaper to install.

c

Windows creates "restore points" so that you can a. extend your warranty b. add additional hard disk storage space. c. return your system to the way it was before you installed new software. d. protect your system from viruses.

c

You are most likely to find a real-time operating system (RTOS) a. on an iPad. b. on a laptop. c. in your automobile. d. on a smartphone.

c

A data category in Access is called a a. query. b. record. c. table. d. field

d

A visual representation of an algorithm is represented by a. an executable. b. a compiler. c. a debugger. d. a flowchart.

d

All of the following are methods to secure your wireless network except a. disabling SSID broadcast. b. creating a passphrase. c. changing your network name (SSID). d. disabling WEP.

d

An IDE is a tool that facilitates a. editing. b. debugging. c. compiling. d. all of the above.

d

An attack that renders a computer unable to respond to legitimate users because it is being bombarded with data requests is known as a ______________ attack. a. stealth b. backdoor c. scareware d. denial-of-service

d

An audio MIDI interface box lets you connect your computer to a. printers. b. plotters. c. external hard drives. d. guitars and microphones.

d

Being computer literate includes being able to a. avoid spam, adware, and spyware. b. use the web effectively. c. diagnose and fix hardware and software problems d. all of the above

d

Calendars, tasks, and e-mail are features of a. personal finance software. b. personal communication software. c. personal desktop software. d. personal information management software.

d

Collaborative consumption is when people get together to a. find the best prices on products. b. exchange reviews on services and goods they have purchased. c. fight diseases of the respiratory tract. d. increase the use of a single product by sharing access to it.

d

Computer forensics uses computer systems and technology to a. simulate a person's anatomical system. b. train law enforcement officers to be more effective. c. create a crisis map. d. gather potential legal evidence.

d

DRM is an acronym for a. Digital Role Maker. b. Digital Real Movie. c. Distribution Regional Media. d. Digital Rights Management.

d

Ergonomics is an important consideration a. only for desktop computers. b. only for laptop computers c. only for laptop and desktop computers, but never for mobile devices. d. for all computing devices.

d

Ethical decisions in business affect which of the following? a. the employees b. the business's clients and customers c. the suppliers and financial lenders d. all stakeholders

d

For what is the UNIVAC computer best known? a. It was the first computer used to tabulate U.S. census data. b. It was the first computer to use the binary system. c. It was the first computer to incorporate a magnetic tape system. d. It was the first computer used as a mechanical calculator.

d

IT is the abbreviation for a. information training. b. Internet training. c. Internet technology. d. information technology.

d

In the client-server model, clients are phones or computers and servers are a. computers hosting web pages. b. computers with software allowing you to make purchases. c. computers that are storehouses for files. d. all of the above

d

JSON stands for a. Just Short Of Notice. b. Javascript Only. c. Java Startup Output Naming. d. Javascript Object Notation.

d

MME is a protocol that's used when you're a. sending a video file to YouTube. b. encrypting an e-mail message. c. executing a CGI script. d. sending an e-mail that has a photo attached.

d

Network adapters send data packets based on a(n) a. IP address. b. router address. c. frame address. d. MAC address.

d

QR codes can be linked to a. a Facebook page. b. a website. c. a video. d. any of the above.

d

Selecting the right programming language for a project depends on a. who you have working for you and what they know. b. the final requirements for performance and space used. c. the environment of the finished project. d. all of the above.

d

Small text files that some websites automatically store on your computer's hard drive are known as a. greyware. b. spam. c. adware. d. cookies.

d

The MACH Coach project shows that a. there is a digital divide limiting access to computer systems. b. sports performance can be recorded and analyzed by software. c. there are some things computers cannot teach. d. computers can help people with interpersonal skills development.

d

The collection of large national and international network providers used to establish the Internet is called the a. T1. b. highway system. c. OC. d. Internet backbone

d

The device used to move data between two networks is called a a. gateway. b. switch. c. wireless range extender. d. router.

d

The field that has a unique entry for each record in a database table is called the a. logical key. b. master field. c. crucial field. d. primary key.

d

The limit to how much RAM you can add to your system a. depends on the design of the motherboard. b. depends on the operating system running on your system. c. depends on the amount of memory each memory card slot supports. d. all of the above

d

The main suite of Internet protocols used to transmit data is called a. DNS. b. XML. c. HTTP. d. TCP/IP.

d

The operating system of on your cell phone a. can be changed from iOS to Android. b. is a version of Android if you are using an iPhone. c. is stored on the SD card in the phone. d. None of the above.

d

The protocol used to send e-mail over the Internet is a. HTTP. b. DHTML. c. DNS. d. SMTP.

d

The system unit is a component of which type of computer? a. a tablet computer b. an ultrabook c. an embedded computer d. a desktop

d

Viruses that compress files and then demand money to restore them are known as a. boot-sector viruses. b. script viruses. c. polymorphic viruses. d. encryption viruses.

d

Web 2.0 has led to a shift from just consuming content toward a. spending all our time on leisure activities. b. less sharing of the work we produce. c. new standards for HTML d. producing content.

d

What do you need if you want to read, send, and organize e-mail from any computer connected to the Internet? a. an e-mail client program b. an e-mail server c. an e-mail aggregator d. a web-based e-mail account

d

What is the last step of the PDLC? a. Describing the problem b. Debugging c. Coding d. Testing and documentation

d

What should you check first to ensure software will work on your computer? a. The type of operating system b. The amount of available RAM c. The available hard drive capacity d. All of the above.

d

What was the first spreadsheet application? a. Lotus 1-2-3 b. Excel c. WordStar d. VisiCalc

d

What was the importance of the Turing machine to today's computers? a. It described a system that was a precursor to today's notebook computer. b. It was the first electronic calculator and a precursor to the computer. c. It was the first computer to have a monitor. d. It described a process to read, write, and erase symbols on a tape and was the precursor to today's RAM.

d

When a computer is no longer useful, it can be a. securely donated. b. recycled. c. turned into a sand-like substance. d. all of the above.

d

When a hacker steals personal information with the intent of impersonating another individual to commit fraud, it is known as a. impersonation theft. b. scareware theft. c. identity theft. d. malware theft.

d

When there are no available wireless networks, your phone a. cannot reach the Internet. b. can use Bluetooth technology to connect to the Internet. c. can use VoIP to still send e-mail. d. can use tethering to connect your computer to the Internet .

d

Which is NOT a common protocol used on the Internet? a. TCP b. IP c. HTTP d. PGP

d

Which is NOT a component of a database that describes how data is stored? a. field b. record c. table d. report

d

Which is NOT a factor that determines the quality of images taken with a digital camera? a. lens quality b. resolution c. file format d. type of battery

d

Which is NOT an advantage of Java? a. Java is architecture neutral. b. Java needs to compile only once prior to distribution. c. Java supports network communications. d. Java performs faster than C++.

d

Which is the correct set and order of steps in the machine cycle? a. execute, store, fetch, decode b. store, fetch, execute, decode c. execute first instruction, execute second instruction, execute third instruction d. fetch, decode, execute, store

d

Which is the most widely used form of communication on the Internet? a. wiki b. social networking c. blogging d. e-mail

d

Which network device acts as a traffic signal on a network? a. network operating software b. transmission media c. a network navigation device d. a switch

d

Which network-ready device facilitates file sharing and data backup? a. home network server b. AirPort Time Capsule c. network-attached storage d. all of the above

d

Which of the following describes an IP address? a. It is referred to as a dotted quad. b. It identifies any computer connecting to the Internet. c. It identifies a website. d. All of the above.

d

Which of the following is NOT a common file name extension? a. .docx b. .jpg c. .pptx d. .zipped

d

Which of the following is NOT a true statement when considering using databases instead of lists? a. Data can be easily shared among users. b. Data-entry errors can be minimized with databases. c. Data integrity can be ensured with a database. d. Databases are easier to build and maintain than lists.

d

Which of the following is NOT a video port? a. HDMI b. VGA c. DVI d. Thunderbolt

d

Which of the following is NOT an input device? a. a touch-screen monitor b. an optical mouse c. a keyboard d. a laser printer

d

Which of the following is NOT an online photo-sharing site? a. Snapfish b. Shutterfly c. Picasa d. Gimpshop

d

Which of the following is NOT considered a step in data staging? a. Transforming or reformatting of the data. b. Inputting data not stored in source databases. c. Extracting data from source databases. d. Storing data in the data warehouse.

d

Which of the following is a component of data staging? a. extraction of data from source databases b. transformation of the data c. storage of the data in the data warehouse d. all of the above

d

Which of the following is an example of a web-based OS? a. OS X b. Windows. c. Linux d. Chrome

d

Which of the following is considered a benefit of using simulation programs? a. They allow users to experience potentially dangerous situations without risk. b. They help to prevent costly errors. c. They allow users to train on software that is not installed on their systems. d. All of the above

d

Which of the following is false? a. An analog to digital converter chip converts your voice into digital signals. b. Bluetooth technology uses radio waves. c. SMS is an acronym for text messaging. d. Your phone can only be connected to the Internet if there is a WiFi network available.

d

Which of the following might cause interference or poor connectivity between nodes on a wireless network? a. concrete walls b. nodes that are too far apart c. some appliances d. all of the above

d

Which of the following statements about IT careers is FALSE? a. IT employers typically prefer experience to certification. b. Women who have IT skills have ample opportunities for securing IT employment. c. Many IT jobs are staying in the United States. d. Most IT jobs require little interaction with other people.

d

Which of the following would NOT be a benefit of networking computers? a. sharing an Internet connection b. sharing printers and other peripherals c. sharing files d. sharing software licenses

d

Which of these is NOT located on the motherboard? a. CPU b. ROM c. RAM d. DVD drive

d

Which program can you use to take notes in class? a. Noteability b. Evernote c. OneNote d. all of the above

d

Which software application would you use to calculate and manipulate numerical data? a. Microsoft Office Excel. b. Apple iWork Numbers. c. Apache OpenOffice Calc. d. All of the above

d

Which statement about pipelining is TRUE? a. Pipelining does not boost CPU performance. b. Pipeline design is only used in computers in conjunction with parallel processing. c. Pipelining allows a less complicated hardware design. d. Pipelining allows the computer to process multiple instructions simultaneously.

d

Which system of ethics is most widely agreed on to be the best system? a. utilitarianism b. relativism c. virtue ethics d. There is no universally agreed-on best system.

d

Which task is NOT typically performed by a network administrator? a. developing network usage policies b. installing networks c. planning for disaster recovery d. web programming

d

Which theory states that there is no universal moral truth? a. deontology b. divine command theory c. utilitarianism d. relativism

d

Which type of network topology is most popular? a. bus b. Ethernet c. ring d. star

d


संबंधित स्टडी सेट्स

Dashboard Test ID: 270144179 31%

View Set

Final Exam- Public Health- Quiz Questions (set 1)

View Set

UWorld Questions & kaplan - surgery review

View Set

🔥 FINAL EXAM ARIZONA LIFE AND HEALTH 🔥

View Set

Teamwork 1 & 2: Team Types and Composition

View Set

ATI PN Pharmacology Proctored Exam Review

View Set

Mastering A&P- practice questions

View Set

Principles of accounting Pre assesment

View Set