!! Technology in Action / FINAL / Concepts Assessment

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

wiki

A ________ is a Web site where anyone can add, remove, or edit its content.

HAN

A ________ is a network located in your home that connects to all your digital devices.

image backup.

A backup of all files on your computer which is essentially a snapshot of exactly how your computer looks at a particular point in time is known as a(n)

input

A keyboard and mouse are examples of ________ devices.

launch a denial of service (DoS) attack on your computer

A packet sniffer is a program that can enable a hacker to do all of the following, EXCEPT ________.

plug-ins

Adobe Reader, Flash Player, and QuickTime Player are all examples of special software programs called ________.

output

After a picture has been taken with a digital camera and processed appropriately, the actual print of the picture is considered ________.

sharing an operating system

All of the following are benefits of networks EXCEPT, ________.

use a variety of animations on most slides to keep audience attention

All of the following are tips for a great presentation, EXCEPT ________.

use abbreviations such as "u", "r", and "BRB" to keep the e-mail message shorter

All of the following are tips for professional e-mail etiquette, EXCEPT ________.

USB

Almost all cell phones are designed with a ________ port.

computer forensics

Analyzing computer systems to gather potential legal evidence is ________.

computer literate

Being ________ means being familiar enough with computers that you understand their capabilities and limitations.

a network operating system (NOS)

Client/server networks are controlled by a central server that runs a specialized piece of software called ________.

binary

Computers use the ________ language consisting of 0s and 1s.

integrity

Data ________ means that the data contained in a database is accurate and reliable.

device driver

Each device attached to your computer comes with a special program called a ________ that facilitates communication between the device and the OS.

primary key

Each record must have a unique field called a(n) ________ field.

social networking

Facebook and YouTube are considered to be ________ Web sites.

USB port

Flash drives plug into a(n) ________.

table

In a database, a group of related records is called a(n) ________.

formulas

In a spreadsheet, equations that use addition, subtraction, multiplication, and division operators, as well as values and cell references are called ________.

tables records fields all of the above

In databases, information is organized in ________.

protocol

In the URL https://www.pearsonhighered.com/techinaction, the portion labeled "http" is the ________.

nonimpact

Inkjet printers and laser printers are examples of ________ printers.

course management software

Moodle and Blackboard are examples of ________.

biomedical chip implants

One potential application of ________ is to provide sight to the blind

formulas

Presentation software includes all of the following features, EXCEPT ________.

accounting

QuickBooks and Peachtree are examples of ________ software.

real-time

Robotic cameras used by television stations for sports events require a ________ operating system.

programs

Software refers to a set of instructions that tells the computer what to do. These instruction sets are called ________.

add graphics and pictures to files

System software does all of the following, EXCEPT ________.

secure socket layer

The "s" in "https" stands for ________.

a large network of networks

The Internet is ________.

Tim Berners-Lee at CERN

The World Wide Web was invented by ________.

motherboard

The ________ contains the central electronic components of the computer.

operating system

The ________ is(are) the group of programs that controls how your computer functions.

user interface

The ________ of the operating system enables the user to communicate with the computer system.

ROM

The basic input/output system is stored on a ________ chip.

is at column C, row 5 of the worksheet

The cell address C5 indicates that the cell ________.

texting

The choice communication mode of people aged 14 to 30 is ________.

digital divide

The difference between people with access to computers and the Internet and those without this access is known as the ________.

application

The general software you use to do tasks at home, school, or work is known as ________ software.

cell

The intersection of a row and column in a spreadsheet program is known as a ________.

Firefox

The name of the free Internet browser from Mozilla is ________.

ROM

The operating system of a cell phone is stored in ________.

microphone and touch pad

The primary input devices for smartphones are ________.

binary digit

The term "bit" is short for ________.

spreadsheet software

The type of software that is best used to create a simple budget is ________.

open source

The type of software that is free and available with few licensing and copyright restrictions is known as ________ software.

URL

The unique address for a particular Web site is the ________.

Vlogs

Which of the following are personal video journal entries posted on the Web?

Polymorphic

Which of the following classifications of viruses can change its own code to avoid detection?

Analyzing the data or information

Which of the following is NOT one of the four major data processing functions of a computer?

It has been organized or presented in a meaningful way.

Which of the following is NOT true about data?

The BIOS is activated by turning on the computer.

Which of the following is the first step in the boot process?

A GUI is a command-driven interface.

Which of the following statements about a graphical user interface is FALSE?

HTTP

Which protocol transfers HTML data from servers to browsers?

Sky Drive

Windows 8 uses a(n) ________ account to easily access and store your files online.

placing a found virus in a secure area on the hard drive

With regard to computer protection, quarantining is defined as ________

a firewall

You can block logical ports to invaders and make your computer invisible to others on the Internet by installing ________.

Embedded

________ computers are specially designed computer chips that reside inside other devices such as your car or the electronic thermostat in your home.

Infectious

________ diseases account for about 1/5 of all deaths worldwide, and technology is used to increase the pace of vaccine production to decrease this death rate.

Spyware

________ is an unwanted piggyback program that usually downloads with software you are installing from the Internet.

Social networking

________ is the gathering together of groups of people using online tools to connect and exchange ideas.


संबंधित स्टडी सेट्स

Quoting, Summarizing, and Paraphrasing

View Set

143 Module 2 - Respiratory Drugs (PRACTICE QUESTIONS)

View Set

S-130 Wildland Hazards and Human Factors on the Fireline

View Set