Advanced Computer Science Chapters 1-8 Multiple Choice

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

The type of code that uses only seven bits for each character is _________.

ASCII

______ time is the average time it takes a computer to locate and read data on the storage medium.

Access

A problem a hacker can cause after breaking into your computer might be ________.

All of the above

A super-thin slice of semiconducting material packed with microscopic circuit elements is a(n) ____.

All of the above

A term which can refer to a person who manipulates computers with malicious intent is ____.

All of the above

Digital devices can use ____ as a code to represent character data.

All of the above

In terms of an authentication protocol, the phrase 'something a person possesses' could refer to ________.

An ID card

A set of computer programs that helps a person carry out a task is ____.

Application software

_______ are the result of a series of tests used to gauge overall microprocessor speed are useful in comparing microprocessor performance.

Benchmarks

In terms of an authentication protocol, the phrase 'something a person is' refers to a(n) _________.

Biometric device

A laptop can _____.

Both a and b

_______ is used to enhance processor performance.

Both a and c

A ________ attack uses password-cracking software.

Brute force

Storage is typically expressed as ____.

Bytes

In an advertisement, a speed specification, such as 3.4 GHz, indicates the speed of the microprocessor ________.

Clock

An example of an old form of convergence is a _________.

Clock radio

_________ computing provides access to information, applications, communications, and storage over the Internet.

Cloud

The first digital computers were built during World War II for ____.

Code breaking

A(n) _______ converts all the statements in a program in a single batch; the resulting collection of instructions is placed in a new file.

Compiler

Karen learns that microcontrollers are sometimes referred to by another name. What is another term for a microcontroller?

Computer-on-a-chip

Technology ____ is a process by which several different technologies with distinct functionality evolve to form a single product.

Convergence

A(n) _______ chip is a type of non-volatile memory chip that does not require power to hold data.

EEPROM

A(n) _____ media player is a handheld device designed for playing music and videos, which offers a camera, access to the Internet, and a variety of apps.

Enhanced

The type of code that uses eight bits for each character is __________.

Extended ASCII

The term ________ refers to the size and dimensions of a computer component.

Form factor

______ means a billion cycles per second.

Gigahertz

C, BASIC, COBOL, and Java are examples of ____ programming languages.

High-level

Data becomes ____ when it is presented in a format that people can understand and use.

Information

A collection of preprogrammed activities such as addition, subtraction, counting, and comparison is called a(n) ____.

Instruction set

A global computer network originally developed as a military project is the ____.

Internet

When restrictions on commercial use of the ____ were lifted in 1995, companies such as AOL and CompuServe became popular services.

Internet

A(n) _______ converts and executes one statement at a time.

Interpreter

Initially sales were slow for the personal computer because of ____.

Lack of software

_________ software refers to any software that is installed on a computer's hard disk.

Local

1,048,576 bytes is a ________.

Megabyte

An area of a computer that temporarily holds data waiting to be processed is ____.

Memory

An electronic component that can be programmed to perform tasks is a ____.

Microprocessor

A processor that includes circuitry for two or more processing units is called a ____ processor.

Multi-core

A(n) ________ is a microprocessor-based computing device designed to meet the computer needs of an individual.

Personal computer

A hacker posing as a legitimate representative of an official organization such as your bank is an example of ______.

Phishing

A microprocessor whose instruction set includes a limited set of simple instructions uses ______ technology.

RISC

______ is a type of memory circuitry that holds the computer's startup routine.

ROM (Read only memory)

Password management functions include all of the following EXCEPT ________.

Recording keystrokes

_______ is used by most of today's personal computers because it is fast and relatively inexpensive.

SDRAM

________ intercepts information sent over computer networks.

Sniffing

________ media are cloud-based applications designed for social interaction and consumer-generated content.

Social

You might represent ___ using character codes

Social Security numbers

The human-readable version of a program is called _____.

Source code

A compute-intensive problem runs on a ____.

Supercomputer

The ______ houses all essential chips and provides connecting circuitry between them.

System board

A set of computer programs that helps a computer monitor itself and function more efficiently is ________.

System software

The ______ is the case that holds the computer's main circuit boards, microprocessor, memory, power supply, and storage devices.

System unit

A ______ computer is a handheld computer that is essentially a large version of an enhanced media player.

Tablet

In a computer, most processing takes place in ____.

The CPU

According to the text, a key aspect of _________ is that it adds content and substance to the _________.

The Web, the Internet

When adding two numbers, Jim knows that each number is going into its own register and the control unit provides the instructions such as add. He wants to know where the result of the add goes. You tell him it goes to ______.

The accumulator

Jim wants to know why a compiler converts all statements in a program at one time and places them into an object code. You tell him it is so that ______.

The code is ready to execute

The master controller for all activities that take place within a computer is ____.

The operating system

A ________ is a series of characters that becomes a person's unique identifier.

User ID

________ refers to the number of bits that a microprocessor can manipulate at one time

Word size

A powerful desktop computer used for high-performance tasks is a ________.

Workstation

An ordinary personal computer that is connected to a network is a ____.

Workstation

Under U.S. law, copyright holders may be awarded statutory damages up to ____ for copyright infringement.

$250,000

The ______ wildcard character allows a search engine to find pages with any derivation of a basic word.

*

_____ is a valid top-level domain.

.ca

Support program files for PC applications often have a(n) _______ extension.

.dll

Tom and Andy both have Microsoft Word. It would be best to store their files in its native format with an extension of ____.

.docx

Anita has created files with the following names: roof, column, and sun. Which of the following file extensions would most likely be found on her files?

.wmf

Which of the following is a file extension you might find on a vector graphic filename?

.wmf

A ______ bit in a monochrome bitmap represents black.

0

For good basic performance, a computer running Windows 7 or 8 should have at least ____ of RAM.

1 GB

A resolution of 1600 x 1200 could also be expressed as ______ megapixels.

1.9

In 1982, the percentage of households that had a computer was closest to _________ percent.

10

One minute of CDDA music requires in excess of ____ of storage space.

10 MB

The original Ethernet standard carried data over a coaxial cable bus topology at ____.

10 Mbps

Most experts recommend that Web page graphics not exceed _______ KB.

100

As part of your research, you find that the longer the key, the longer it will take a devious competitor to crack the code. You also find that most encryption today uses a ______ key, and so you decide to use an encryption key of that size.

128-bit

A True Color or 24-bit bitmap can produce a maximum of ______ colors.

16.7 million

The modern definition and use of the term computer emerged in the ________.

1940s

Data transport rates depend on the technology of the cellular system. The generation of cellular technology associated with analog voice service is _______.

1G

Personal computer hard disk platters typically have storage capacities ranging from 40 GB to ______.

2 TB

There are estimated to be more than ____ users of the Internet.

2 billion

Current versions of Windows support file names up to _____ characters long.

255

______ replaced analog technology with digital technology and added support for text messages.

2G

______ technologies support digital transmission for both voice and data.

3G

Professionals opt to have to least _____ of RAM on their computer's hard disk for video editing.

4 GB

The audio CDs you buy at your favorite music store are recorded at a sampling rate of ____.

44.1 kHz

3G technologies have speeds ranging from 200 Kbps to ____.

5 Mbps

For gaming systems, a response rate of ____ or less is desirable.

5 ms

Melissa wants to ensure that the resume she attaches to the e-mail messages she is sending to the potential employers will successfully make it to them. She should try to limit the size of the attachment to _____ or less for dial-up connections.

50 KB

Microsoft Windows is installed on more than _______ of the world's personal computers.

80%

To stay with the current Wi-Fi standard, make sure your device is compatible with ______.

802.11n

In addition to her computer, what other tool might Anita use to create vector graphics?

A digitizing tablet

To connect to a LAN, a computer requires ____.

A network interface card

A MIDI sequence contains all of the following EXCEPT _____.

A wavetable

The _____ format offers very good sound quality based on MPEG-4

AAC

____ depends on authorization and revocation built into devices and content.

AACS

The Internet began with a project called ______.

ARPANET

Sally tells James that a worksheet will automatically update to reflect any rows or columns that are deleted or copied. Sally tells James that if he does not want the cell reference to change, he should use a(n) _____ reference.

Absolute

Web applications are _______.

Accessed and run on the Web

In a wireless ______ network, devices broadcast directly to each other.

Ad-hoc

Server-side scripts can be written using any of the following EXCEPT _____.

Ada

Legacy equipment without Wi-Fi can be upgraded using a Wi-Fi _____.

Adapter

________ utilities alter a user's interface to create an accessible environment.

Adaptive

To access you router's configuration utility, open a browser and enter the router ______.

Address

All of the following are examples of video editing software EXCEPT _____.

Adobe Illustrator

A ________ is an example of a pointing device.

All of the above

A good computer maintenance routine would include regularly ____.

All of the above

A page layout includes ____.

All of the above

After researching this topic, you find that encryption can he used in _____.

All of the above

Another option Sally is considering is a portable satellite system. She asks you about the details and you tell her ______.

All of the above

BitTorrent can be used to distribute ____.

All of the above

Ethernet is easy to ____.

All of the above

Examples of 3G technologies include ____.

All of the above

Examples of Uniform Resource Identifiers include ______.

All of the above

File management capabilities available from application software include _______ files.

All of the above

Footage can originate from a ____.

All of the above

Gaming computers typically include _____.

All of the above

ISPs can maintain servers for _____.

All of the above

If networked, ____ can be accessed by an authorized LAN user.

All of the above

If virus protection software identifies a virus, it can try to ____.

All of the above

Karen is learning that, when combined with wireless networks, devices with microcontrollers can relay information to which of the following?

All of the above

Mobile apps ______.

All of the above

Most applications for PCs consist of multiple files. Additional files contain support modules called ______.

All of the above

Network service providers include ______.

All of the above

Now when you purchase a digital book from ____, you can read it on devices that include computers, tablets, and smartphones.

All of the above

Overclocking is a technique for increasing the speed of a computer component, such as ____. It can be very risky.

All of the above

Security suites can be ____.

All of the above

Symptoms of network problems include ____.

All of the above

The difference between the Save and the Save As commands is that ______.

All of the above

VoIP systems are offered by companies such as ____

All of the above

What type of information does Jessica find Web sites typically store in cookies?

All of the above

Which of the following is an example of a rerecordable optical storage medium?

All of the above

Wireless signal range can be limited by ____.

All of the above

You can install personal VPN software such as ____.

All of the above

You explain to the owner of ACME Widget Company that malware includes ______.

All of the above

You should consider making backups of your _____.

All of the above

_____ is a disadvantage of using a wireless networks when compared to a wired network.

All of the above

______ may pose a threat to your computer's security and/or your privacy.

All of the above

All of the following are examples of resources EXCEPT _______.

All of the above are resources

Jim knows that a collection of preprogrammed activities is an instruction set. He wants to know what an instruction set is designed to do. You tell him it is designed to _______.

Allow programmers to use them in creative ways for multiple tasks

Laura wants to make sure her computer is fast enough for her everyday use. which of the listed features is the most important?

Amount of RAM

One of the computer ads Laura is looking at specifies "2 GB Dual Channel DDR2 SDRAM at 800 MHz (max 4 GB)." What does the 2 GB specify?

Amount of RAM

Many ____ sites act as relay stations to forward your searches to search engines without leaving a trail back to a cookie or IP address.

Anonymizer

_________ tools cloak a person's identity online.

Anonymizer

______ software is a type of security software designed to identify and neutralize Web bugs, ad-serving cookies, and other types of malware.

Antispyware

Tom sends Andy an email attachment named OurProject.tif. Andy tries to open the attachment but can't. His problem may be that ____.

Any of the above

Which of the following is a Web resource?

Any of the above

To avoid security threats, a user can _______.

Avoid opening suspicious email attachments

_______ e-commerce involves one enterprise buying goods or services from another enterprise.

B2B

When you purchase a textbook online from a site like www.amazon.com, you are participating in ____ e-commerce.

B2C

______ e-commerce occurs when businesses sell to governments.

B2G

_____ file sizes might shrink by as much as 70% when compressed.

BMP

________ is a file sharing protocol that distributes the role of the file server across a collection of dispersed computers.

BitTorrent

A _____ graphic is composed of a grid of dots.

Bitmap

Data transmission speeds are typically expressed as ______.

Bits

To set up free VoIP, you and the people you communicate with can install free VoIP clients such as ____.

Blink

The ______ indicates that the operating system has encountered an error from which it cannot recover, and the computer no longer accepts any commands.

Blue screen of death

A _______ is any software that can automate a task or autonomously execute a task when commanded to do so.

Bot

Sending computer data over a ____ system required a voiceband modem to convert digital data into audible signals.

Both A and B

A Wi-Fi device _____.

Both a and b

When installing a PC application, most _____ for new software are placed in the folder you specify.

Both a and b

Hot plugging is allowed with what kind of devices?

Both b and c

A ______ is a network device that connects two similar networks.

Bridge

High-bandwidth communications systems are sometimes referred to as ____.

Broadband

A security suite will typically include all of the following EXCEPT ____ software.

Browser

A(n) ______ is client software that displays Web page elements and handles links between pages.

Browser

Webmail allows you to use a(n) ____ to access and view your e-mail messages.

Browser

The term _____ is a technical term for the region of memory that holds data waiting to be transferred from one device to another.

Buffer

When you are streaming a Netflix movie over a basic cable Internet connection, Netflix transmits the first few minutes of the movie to a memory area of your computer called a(n) _____.

Buffer

When you purchase a used digital camera directly from the owner on an online auction, you are participating in ______ e-commerce.

C2C

Which of the following is NOT a DRM encryption technology?

CDHA

______ is a digital rights management technology designed to encrypt and control the used of content stored on DVDs.

CSS

Tom wants to known which Internet access is the fastest. You tell him ______.

Cable

____ currently offers the fastest Internet speeds.

Cable

A wired network is one that uses ______ to connect network devices.

Cables

When your browser fetches pages and graphics to form a Web page, it stores them in temporary files on your hard drive called a Web ____.

Cache

RIM is the ____ company that developed the BlackBerry smartphone.

Canadian

A built-in ____ in your personal computer can make it simpler to transfer photos from a solid state memory card used in your digital camera.

Card reader

The intersection of a column and a row is called a ____________.

Cell

A great example of convergence in modern technology is ______.

Cell phones

A formula can contain _____ and mathematical operators.

Cell references

Portable Internet access includes all of the following EXCEPT ____.

Cellular

An encrypted message is referred to as ______.

Ciphertext

The telephone system uses a technology called ______, which establishes a dedicated, private link between telephones for the duration of a call.

Circuit switching

Cable Internet service needs _____.

Circuitry to handle Ethernet protocols and a cable modem

To use local e-mail you must install e-mail ____ software on your computer.

Client

_______ scripts tend to be used for interactive user interface elements.

Client-side

Most messaging is based on a(n) ____ model.

Client/server

_______ computing depends on a grid of servers, storage devices, and protocols that offer Internet-accessible computing services ranging from consumer-level media sharing to office productivity applications and complex corporate data processing.

Cloud

Which of the following Web-based applications is NOT sometimes characterized as Web 2.0?

Cloud computing

A group of sectors is called a ________.

Cluster

Each ____ uses a unique compression algorithm that allows the user to specify the compression ratio and/or bitrate used when compressing video.

Codec

The number of colors a monitor can display is referred to as ____.

Color depth

The size of the file that holds a bitmap depends on its resolution and ______.

Color depth

_______ is typically sold in computer stores or at Web sites.

Commercial software

A _____ is a physical path or a frequency used for signal transmission.

Communications channel

Before sending a large attachment in an e-mail, you can use a(n) ____ to shrink it.

Compression program

System software is designed to accomplish _______ tasks.

Computer-centric

An extension of .sys designates a ____ type of file.

Configuration

When you install a local application, all of its files are placed in the appropriate folders all your computer's hard disk, and then your computer performs any software or hardware ______ necessary to make sure the program is ready to run.

Configurations

A LAN would be used to _____.

Connect personal computers within a very limited geographical area, such as a single building

Digital video file formats are sometimes referred to as ____ formats.

Container

To access settings for Flash cookies, look for Flash Player in the ____ (PCs) or in System Preferences (Macs).

Control Panel

A _____ enables a Web server to keep track of your activity and compile a list of your purchases.

Cookie

As Jessica begins her research of just how shopping carts work, she is surprised to find that many e-commerce sites store information about her Web visits on her hard drive. What do these sites use to store visit information?

Cookies

Flash ____ can collect and store personal data, such as a user's name or the user's progress in a game.

Cookies

______ allow a Web site to store information on the client computer for late retrieval.

Cookies

It is illegal to do all of the following with software EXCEPT ______.

Copy and keep as backup

Popular codecs include all of the following EXCEPT ____.

Corel

A Web ______, automated to methodically visit Web sites, can be programmed to perform various activities as it visits those sites.

Crawler

You can use the results from a search on a database in all of these ways EXCEPT to ____.

Create records

You have just decreased the number pixels and file size of your graphic by selecting a portion of the image. You have ______.

Cropped your graphic

_____ refers to the process of selecting part of an image.

Cropping

A _____ is a procedure for encrypting or decrypting a message.

Cryptographic algorithm

A _____ is word, number, or phrase that must be known to encrypt or decrypt a message.

Cryptographic key

To reboot a PC, hold down the ____ keys at the same time.

Ctrl, Alt, and Del

In a(n) ______ installation, the setup program displays a list of software features for your selection.

Custom

A protocol known as ____ is designed to automatically distribute IP addresses.

DHCP

______ is a collection of techniques that copyright holders use to limit access to and use of digital content.

DRM

Digital telephone systems open up the possibilities for digital data transport options such as ____.

DSL

Tom wants to known what kind of service to opt for if cable Internet service is not available, or proves slower or less dependable than expected. You tell him the next choice would be ______.

DSL

Tom wants to known which of the services uses his existing telephone lines. You tell him ______.

DSL

A _____ is a device that connects a computer to a telephone line and converts computer data signals into signals compatible with DSL.

DSL modem

Jim likes to save MP3 files and photo files to disc and take them to work. His work computer has a DVD-RW. For his home computer, which would the best choice for an optical disc drive?

DVD/R/RW/CD-RW

The ______ is the amount of data that a storage device can move from the storage medium to the computer per second.

Data transfer rate

Harry's grandson has been coming to his house and downloading music. His grandson turned "file sharing" on. He is concerned this causes security problems. Harry should ______.

Deactivate it when not needed

The process of converting ciphertext into plaintext is called ______.

Decryption

_____ is typically available as a trial version.

Demoware

Portable software is ____.

Designed to run from removable storage

Productivity software that has sophisticated features to help you produced typeset-quality output is considered ______ software.

Desktop publishing

The operating system, application software, and ______ are organized similar to the chain of command in an army.

Device drivers

A fixed Internet connection that uses a voiceband modem and telephone lines is a(n) ____ connection.

Dial-up

A ______ displays the options associated with a command.

Dialog box

A(n) ______ backup contains any files that were added or changed since the last full backup.

Differential

A _____ watermark is a pattern of bits inserted at various places in an image or a content stream that can be used to track, identify, verify, and control content use.

Digital

________ is the process of converting text, numbers, sound, photos, and video into data that can be processed by digital devices.

Digitization

______ is the process of creating a CD, DVD, or BD by selecting all the files and then copying them in a single session.

Disc mastering

If you connect to a network and do not get a list of other devices, check your computer's network ______ setting.

Discovery

In _____ mode two Bluetooth devices can find each other and exchange passkeys.

Discovery

A Linux ______ contains the Linux kernel, system utilities, GUI, applications and installation routine.

Distribution

All of the following are DRM technologies EXCEPT _____.

Dithering

Every domain name corresponds to a unique IP address that has been entered into the ____.

Domain Name System

What should Paul look for in a display device as a measure of image clarity?

Dot pitch

The rate of data arriving at your computer is ______.

Downstream speed

Vector graphics software is sometimes referred to as _____ software.

Drawing

A(n) ______ printer can print on both sides of the paper.

Duplex

A printer's ____ determines how many pages a printer is able to churn out.

Duty cycle

The configuration settings are stored in the router's _____ memory.

EEPROM

Legacy equipment without Wi-Fi can be outfitted with a Wi-Fi adapter that plugs into a(n) ____.

Either a or b

The significance of ____ data is that it cannot be intercepted by corporate spies or government censors.

Encrypted

Wireless ____ scrambles the data transmitted between wireless devices and then unscrambles the data only on devices that have a valid key.

Encryption

______ transforms a message in such a way that its contents are hidden from unauthorized readers.

Encryption

During product activation, you must ____.

Enter a product key

Esteban's router has no screen or keyboard of its own so the easiest way for him to access the router's configuration software is for him to make this connection with a(n) ______.

Ethernet cable

Which of the following is NOT a true statement you can make to Charlie?

Even if you lose your encryption key, you can still access and use encrypted data

Where would Paul install his new optical drive?

External drive bay

Most Internet servers have an easy to remember name that is known as a(n) ____.

FQDN

Most hard disks are formatted by the ____.

Factory

A ______ server is a computer whose primary purpose is to be a repository for files that can be accessed by network workstations.

File

A named collection of data that exists on a storage medium is known as (a) ____.

File

An optional file identifier that is separated from a main file name by a period is a ____.

File extension

To see a list of devices on your network, you can use your operating system's ____ utility.

File management

Thomas's friend has asked that the network be configured such that, if he has photos on his tablet computer and wants to transfer them to his desktop computer, he can do so easily. What capability is Thomas's friend looking for?

File sharing

A computer file's location is defined by a ____.

File specification

One way to transfer photo data from a camera directly to a computer is via ____.

FireWire ports

________ wireless Internet service is designed to offer Internet access to homes and businesses by broadcasting data signals over areas large enough to cover most cities and outlying areas.

Fixed

______ is a popular format for Web-based video that requires Adobe Flash Player.

Flash video

In the Mac OS, the data ______ contains data or the commands for a program.

Fork

In the Mac OS, the resource ______ stores information about the data.

Fork

Files maintained by the Macintosh operating system can have two parts, called ____.

Forks

A common use of ______ shifting is ripping audio tracks from a CD and converting them into MP3 format to playback on a portable media device.

Format

_____ shifting is the process of converting media files from a format suitable for one device to a format suitable for a different kind of device.

Format

HTML ____ are used to display a question and a box into which you can enter an answer.

Forms

Files stored in noncontiguous clusters are ____.

Fragmented

A video is composed of a series of bitmap graphics, each one called a ____.

Frame

A(n) ______ installation gives you access to all features of the software.

Full

A(n) ______ system backup includes a copy of every file stored on your computer's hard drive. In addition to data files, it includes copies of all installed programs, settings, and the operating system.

Full

Charlie wants to know what the term is for making a copy of all his files. Charlie has a Windows machine. You tell him the correct term is ____.

Full system backup

The paragraph style that is used to assure paragraphs are aligned evenly on both the right and left is ______.

Fully justified

______ is the most frequently used HTTP method.

GET

1,073,741,824 bytes is a ________.

Gigabyte

Storage capacity is usually measured in ______.

Gigabytes or terabytes

A ______ is a smooth blending of shades from one color to another or from light to dark.

Gradient

Anita would like to make her columns appear to be three-dimensional. She should see if her graphics software allows her to use ____.

Gradients

_____ can be used to create the illusion of three dimensions by smoothly blending shades from one color to another or from light to dark.

Gradients

_____ is a hardware-based DRM technology that requires compliant devices for content playback.

HDCP

The file system used by Mac OS is ____.

HFS+

An e-mail message in ____ format can include graphics in addition to a wide variety of fonts and font colors.

HTML

When working with ______ mail, make sure your antivirus software is checking incoming messages.

HTML

A(n) ______ adds HTML tags to a document, spreadsheet, or other text-based file to create an HTML document that can be displayed by a browser.

HTML conversion utility

______ is a protocol that works in conjunction with TCP/IP to get Web resources to your desktop.

HTTP

______ checks a Web server's security certificate to determine if the site is legitimate.

HTTPS

Two devices on a network might have to negotiate their communications protocols through a process called ____.

Handshaking

Software considered to be utility software is ____.

Hard disk backup software

Product activation can create a ____ based on your validation code and your computer's internal serial number.

Hash value

Thomas's friend has indicated that he will accept the system that Thomas is constructing for him. However, he is concerned about security risks and wants to know what limits he can place on the system. Which of the following is NOT a true statement that Thomas can make to his friend?

He can't remove sharing from files that he no longer wants to share

Alison has only taken 10 pictures with her digital camera, and she finds she has filled her memory card. Why might this have occurred?

Her images were taken at a very high resolution

DVD authoring software offers tools for creating DVDs with ____-style menus.

Hollywood

A _____ ad overlays the content on a Web page, sometimes obscuring it until you click to ad or its timer expires and the ad disappears.

Hover

The following is NOT a factor upon which your ability to share files with other devices on a network depends: ______.

How long you have been using your computer

A ______ is a network device that extends a wired network by adding additional ports.

Hub

Technical management of the Internet's Domain Name System is coordinated by _______.

ICANN

Ethernet is a wired technology that is defined by ____ standards.

IEEE 802.3

The IEEE designation for the Gigabit Ethernet standard is ______.

IEEE 802.3z

_____ is similar to POP3, but it leaves messages on the server until you specifically delete them.

IMAP (Internet Messaging Access Protocol)

To configure a file server, open a browser from any workstation, enter the file server's ____ address, and provide the administrator ID and password.

IP

Until domain names are added to the DNS database, new sites can only be accessed by entering their numeric ____.

IP addresses

_____ service offered slightly faster service than dial-up but has today been replaced by DSL.

ISDN

A disk ____ is a bit-by-bit copy of the data from all sectors of a disk.

Image

Charlie wants to know where he should keep his backups. You tell him the most secure storage location is ____.

In a different location from where his computer resides

A(n) ______ backup makes a copy of only those files that were added or changed since your last backup.

Incremental

Search engine ____ software is designed to pull keywords from a Web page and store them in a database.

Indexer

Activities associated with resources management by an operating system include all of the following EXCEPT _______.

Installing new memory

Indicators of pirated software include all of the following EXCEPT software that ____.

Is downloaded

A true statement about Bluetooth is _____.

It forms networks automatically when two or more devices in discovery mode are within range.

The strengths of Mac OS do NOT include ______.

Its use of resource forks

Which of the following formats does not offer lossless compression?

JPEG

_______ preprocesses an image by tweaking the colors in adjoining pixels so that they are the same color whenever possible.

JPEG

iPads, iPhones, and iPods are only allowed to download apps from the iTunes App Store, and while apps are available from other sources, using them requires an unauthorized change to the device's software called a(n) ____.

Jailbreak

______ consists of a series of instructions that is embedded directly into an HTML document that instruct the browser to carry out specific actions or to respond to specific user actions.

JavaScript

The _____ is a security mechanism that is factory-installed on many personal computers.

Kensington Security Slot

_____ searches are simply a collection of words relevant to a search.

Keyword

When a Web page author includes meta keywords, like "sex," that have little to do with the information on the page, the author is engaging in __

Keyword stuffing

1,024 bytes is a ________.

Kilobyte

Paul remembers that the monitor he was looking at included backlighting. What type of monitor was it?

LCD

_______ technology produces an image by filtering light through a layer of liquid crystal cells.

LCD

_______ was developed by a Finnish student. It continues to gain popularity as an operating system for personal computers. It is distributed under the terms of a GPL.

LINUX

Interim 4G technologies such as ____ have been deployed since 2009.

LTE

Satellite data transport is subject to ____ delays of one second or more, which occur as your data is routed between your computer and a satellite that orbits 22,200 miles above the Earth.

Latency

The elapsed time for data to make a round trip from point A to point B and back is called ____.

Latency

Weaknesses of Mac OS include ____.

Limited selection of applications

If your backups are ____, keep them in a safe place.

Local

________ applications are software that is installed on a computer's hard disk.

Local

Which of the following is tracking and recovery software?

Lojack for Laptops

Through many editions, the Windows user interface was characterized by a colorful Start button in the ____ corner of the screen.

Lower-left

A _____ is a public high-speed network capable of voice and data transmission within a range of about 50 miles.

MAN

Devices with one or more antennas use ____ technology to boost signals and spread them more evenly over the signal range.

MIMO

Hard disk storage technology can be classified as ____ storage.

Magnetic

An example of mathematical modeling software is ____.

Mathcad

A(n) ______ keyword is entered into a header section of a Web page when it is created and is supposed to describe the page contents.

Meta

Graphics files that contain both bitmap and vector data are called________.

Metafiles

In addition to using search engines, you can also fine Web-based information using a(n) ______ engine that searches a series of other search engines and compiles the search results.

Metasearch

With ______ you can easily assemble a small network just about anywhere.

MiFi

All of the following are examples of portable applications EXCEPT ______.

Microsoft Internet Explorer

______ is an up-and-coming standard destined to be deployed by ISPs and cell phone carriers to allow seamless handoff between one tower and another.

Mobile WiMAX

A ____ bitmap would be displayed by manipulating the pattern of "off" and "on" pixels displayed on the screen.

Monochrome

The signal on Esteban's wireless network is weak. What is the best solution to this problem?

Move the workstation closer to the router, if possible

Popular presentation software products include all of the following EXCEPT ____.

Movie Maker

Five of the people in Tom's company use a Web design software package. You advise Tom to get a license for a specific number of users. He needs a ________ license.

Multiple-user

An operating system's _____ capability supports a division of labor among all the processing units.

Multiprocessing

______ provides process and memory management services that allow two or more tasks, jobs, or programs to run simultaneously.

Multitasking

Within a single program, ____ allows multiple parts to run simultaneously.

Multithreading

Her first search is for pages that include the term "railroad history," but she is not interested in "cars." What search operator should she use to precede the keyword "cars"?

NOT

The file system used by Windows 8 is _______.

NTFS

The file system used by Windows Vista is ______.

NTFS

Dial-up Internet access is an example of a(n) ______ communications system.

Narrowband

______ queries are questions stated in a language such as English, rather than an esoteric query language.

Natural language

All of the following are currently popular browsers EXCEPT ______.

Netscape Navigator

A group of computers linked together to share data and resources is a(n) ________.

Network

The octets in an IP address correspond to a ____.

Network class

The average "survival time" for an unprotected computer to remain uncompromised is only ____.

Nine minutes

With PGP, you send the private key to ______.

No one

A network _____ usually contains a computer, networked peripheral, or network device.

Node

Window Phone apps run on _____.

None of the above

Today's ____ editing simply requires a computer hard disk and video editing software.

Nonlinear

You and Harry are discussing firewalls. You explain that he has a firewall built into Windows. He says he has one that came with his virus protection. He should _______.

Not enable the Windows firewall if his antivirus software firewall is activated

A laptop computer (also referred to as a ______ computer) is a small, lightweight portable computer that opens like a clamshell to reveal a screen and keyboard.

Notebook

______ has been slow to catch on as a popular standard.

Ogg Vorbis

Web sites that offer storage space for backups are called ____ backup services.

Online

The ______ in machine language is a command word for an operation such as add, compare, or jump.

Op code

A shrink-wrap license goes into effect as soon as you ____.

Open it

Andy sent Tom a picture file as a JPEG. Tom wants to convert it to a GIF. To do that, Tom should ______.

Open it in Paint and convert it

________ may be sold or distributed free of charge in compiled form but must always include the source code.

Open source software

The _______ from an instruction specifies the data.

Operand

A(n) _____ system is a type of system software that acts as the master controller for all activities that take place within a computer system.

Operating

CD, DVD, and Blu-ray technologies can be classified as ____ storage.

Optical

In a classic Webmail configuration, messages are sent immediately and thus a(n) ____ is not needed.

Outbox

PayPal is a pioneering example of a(n) ____ payment system.

P2P (person-to-person)

A _____ is a term sometimes used to refer to the interconnection of personal digital devices or consumer electronics within a range of about 30 feet and without the use of wires or cables.

PAN

_______ is the most widely used language for communications between computers and printers.

PCL

Adobe Reader works with files stored in standard ____ format.

PDF

______ software may be used by personal computer users when they want to encrypt e-mail or other documents.

PGP

Incoming mail can be stored on a(n) ____ server until it is downloaded to the inbox on your hard disk.

POP3

______, also referred to as personal mode, is a type of WPA used on most home networks.

PSK

On an Ethernet, a ____ is broadcast to every device but is accepted only by the device to which it is addressed.

Packet

In the technology referred to as ____, a message is divided into several parcels that can be routed independently to their destination.

Packet switching

In relation to disks, ____ is a recording technology that lets you record in multiple sessions.

Packet writing

Many of today's microprocessors perform ____, in which multiple instructions are executed at the same time.

Parallel processing

Voice-overs and narrations are often recorded with a sampling rate of 11 KHz, which means that 11,000 samples are taken ____.

Per second

The term ____ designates equipment that might be added to a computer system to enhance its functionality.

Peripheral device

A _____ HTTP connection reuses the same HTTP connection to send and receive multiple requests.

Persistent

______ schemes redirect users to fake sites by poisoning a domain name server with a fake IP address.

Pharming

An e-mail scam designed to persuade you into revealing confidential information by replying to an e-mail is called ____.

Phishing

DSL uses ____ to transmit data.

Phone lines

"Reh" and "gay" are examples of _______ that speech synthesizers string together to form words.

Phonemes

A description of what actually happens on the disk and in the circuits is represented by a _______.

Physical storage model

A technology called _______ allows the processor to begin executing another instruction before it completes the previous instruction.

Pipelining

Dot pitch is the distance in millimeters between like-colored ____ —the small dots of light that form an image.

Pixels

______ shifting is often achieved using computer networks, as when you stream a movie from your computer to your Wi-Fi equipped DVD player to your Wi-Fi equipped HDTV.

Place

A message that has not been encrypted is referred to as ______.

Plaintext

A hard disk ____ is a flat, rigid disk made of aluminum or glass and coated with magnetic iron oxide particles

Platter

DNS cache ____ has been used by governments to keep citizens away from Web sites that supply politically or culturally inflammatory information.

Poisoning

A(n) ________ computer is a small, lightweight personal computer with screen, keyboard, storage, and processing components integrated into a single unit.

Portable

The ability to easily move your Internet service from one location to another is considered ______ Internet service.

Portable

Network services such as the Web, ftp, and e-mail operate from _______.

Ports

Sharing files on a LAN or the Internet requires open _____.

Ports

A ______ is a sudden increase or spike in electrical energy, affecting the current that flows to the electrical outlets.

Power surge

The use of automated software to locate computers that are vulnerable to unauthorized access is a port _____.

Probe

Solid state storage, also called flash memory storage, _____.

Provides fairly fast access to data

A service pack ______.

Provides updates to the operating system

A tradeoff to the anonymity offered by anonymous ____ is that they tend not to operate at the same speed as your regular browser.

Proxies

Software that may be freely copied, distributed, and even resold is ____.

Public domain

______ encryption uses one key to encrypt a message but another key to decrypt the message.

Public key

_______ is a crucial technology for e-commerce and e-mail.

Public key encryption

_____ simply requires you to fill out a form with the type of data you want to locate in a database.

QBE

To find a particular record or group of records in a database, you use a(n) _______.

Query

A search engine's ______ looks for your search terms in the search engine's indexed database and returns a list of relevant Web sites.

Query processor

For the next search, she wants only Web pages containing the complete phrase "Mars exploration." Which screen operator should she use to formulate the query?

Quotation marks

Cindy wants to know how a computer can run more than one program at a time. You explain to her that the operating system allocates specific areas of memory for each program. This memory is called ______.

RAM

Cindy wants to know where the kernel is stored. You tell her that it stays in _____ all the time your computer is on.

RAM

______ is a temporary holding area for data, application program instructions, and the operating system.

RAM

Most wireless networks transport data as ____ signals.

RF (radio frequency)

_____ is the ability of a device to "jump" directly to the requested data.

Random access

A vector graphic can quite easily be converted into a bitmap graphic through a process called ____.

Rasterizing

Thomas's fiend has a particular file that he wants to allow authorized people to open and view without being able to modify or delete it. What kind of permission should Thomas assign to this file?

Read

When using word processing software to analyze the reading level of your document, you should use a ____.

Readability formula

Application software is designed to accomplish ______ tasks.

Real-world

A(n) _______ disk is a bootable CD, DVD, or other media that contains a complete copy of your computer's hard disk as it existed when the computer was new.

Recovery

The Windows _____ is a database that keeps track of your computer's peripheral devices, software, preferences and settings.

Registry

Sally tells James that if he wants the cell reference to automatically change when moved or copied, he should use a(n) ______ reference.

Relative

The strengths of Microsoft Windows include all of the following EXCEPT ______.

Reliability

The process of covering a wireframe with surface color and texture is called _____.

Rendering

A ______ is a network device that extends the range of a network by restoring signals to maximum strength and retransmitting them.

Repeater

If Paul is most concerned with the sharpness of the images and text he will be printing, he should focus on comparing the ______ of the printers he is considering purchasing.

Resolution

The quality of a bitmap graphic is ____ dependent.

Resolution

When a bitmap graphic is enlarged, it still retains its original ____.

Resolution

The main directory maintained by your computer's operating system is the ____ directory.

Root

The process of overcoming limitations imposed by mobile service providers on an Android phone is called ____.

Rooting

A ________ IP address is one which can be accessed by packets on the Internet.

Routable

Before using your network, you should adjust the configuration settings of the ____ to make sure your network is secure.

Router

One important security precaution when connecting your computer to public networks is to install a(n) ______.

Router

The most important network device is a ______.

Router

_______ are intended to work within LANs to monitor and direct packets being transported from one device to another.

Routers

To get rid of software you no longer want from a PC, you ____.

Run an uninstall routine

VoIP software is sometimes referred to as a(n) ____ client.

SIP

Most routers ship with a(n) ____ predefined by the manufacturer.

SSID

In areas where there are overlapping wireless networks, such as in a city or on a college campus, ______ help you log in to the right network, rather than a network run by a hacker who will try to such important information off your computer as soon as your connect.

SSIDs

Amelia explains that there is a difference between HTTP and HTTPS. HTTPS is a combination of HTTP and ____

SSL/TLS

_______ plates leave an indelible tattoo on your computer equipment, which contains a unique ID number registered in an international database.

STOP

_____ is supported by most modern browsers without requiring a plug-in; it supports gradients, drop shadows, multiple levels of transparency, and animation effects, along with portability to other platforms, such as handheld computers and cellular phones.

SVG

_______ is a limited version of Windows that allows you to use your mouse, screen and keyboard but no other peripheral devices.

Safe Mode

CSS stands for Content ____ System.

Scramble

The disadvantage of WAP-enabled devices is their _____.

Screen size

A(n) _______ helps people locate information on the Web by formulating simple keyword queries.

Search engine

A virus signature is a _______.

Section of program code used to identify a known malicious program

A popular ______ activity is verifying billing data at an e-commerce site.

Server-side

______ scripts accept data submitted by a form, process that data, and then generate a custom HTML document that is sent to the browser for display.

Server-side

_____ is typically copyrighted software that is marketed under a try-before-you buy policy.

Shareware

On a home network, file ____ allows you to view and copy photos, for example, from your desktop computer to a tablet computer.

Sharing

One of Tom's employees told him about a ______ license that goes into effect as soon as you open the packaging.

Shrink-wrap

Tom will be the only person using the license, so he needs a _______ license.

Single-user

You tell Cindy that the type of operating system that expects to deal with one set of input devices is a ______.

Single-user

Tom has another need. Everyone at the company needs word processing software. You advise Tom to use a license that is priced at a flat rate. It is called a _______ license.

Site

An HTTP exchange takes place over a pair of ____.

Sockets

For HTTP, ____ usually are associated with port 80 on the client and server.

Sockets

A command to print a document is relayed through various levels of ______.

Software

The term rootkit refers to ______,

Software tools used to conceal malware and backdoors

Tom asked Andy if he converts a file, will it be identical to the original? Andy should tell him ____.

Sometimes

An extension of .wav designates a ____ type of file.

Sound

A(n) ____ is a device that contains a variety of input and output jacks, plus audio-processing circuitry.

Sound card

A(n) _____ is a type of utility software that captures unsolicited e-mails before they reach your inbox.

Spam filter

If you have dialed Directory Assistance lately to obtain a telephone number, you have probably encountered ____.

Speech recognition

Joseph has noticed that a visually impaired co-worker has a ____ to read the computer screen aloud when she browses the Internet.

Speech synthesizer

______ is NOT true.

Speed increases a signal strength decreases

A Web server's response to a browser's request includes an HTTP ______ that indicates whether the browser's request could be fulfilled.

Status code

Keyword ____ is an unethical practice in which meta keywords are manipulated to gain high relevancy rankings.

Stuffing

A ______ is an additional set of commands that the computer displays after you make a selection from the main menu.

Submenu

An extension of .ocx designates a ____ type of file.

Support

Visitors to a Web site are sometimes called Web ____.

Surfers

A(n) ______ strip monitors the electrical current that passes from the outlet to all the devices plugged into the strip.

Surge

Power ____ can originate from a number of sources: downed power lines, power grid switching by the electric company, faulty wiring, and large appliances powering on and off.

Surges

With BitTorrent, as more computers request the file, they become part of a ____ that uses peer-to-peer technology to exchange file pieces with each other.

Swarm

A ______ is a network device that intelligently facilitates communication among multiple devices on a network.

Switch

In ______ key encryption, the key used to encrypt a message is also used to decrypt the message.

Symmetric

_____ compares the content of files on two devices and makes them the same.

Synchronization

Both SSL and its successor, ____, are protocols that encrypt data traveling between a client computer and an HTTP server.

TLS

A file ____, in the context of Windows, is a piece of information that describes a file.

Tag

Messaging and chat protocols include all of the following EXCEPT _____.

Talkie

Sally has heard that cellular data service has poor quality. You tell her ______.

That it depends on the generation of the technology being used

Harry's daughter has a personal VPN. He had decided he wants to be current and wants one also. You tell him ______.

That it would provide extra security if he intends to use public Wi-Fi hotspots

You decide to use public encryption to protect e-commerce transactions. Once the browser uses the public key it receives from the server to encrypt the credit card information, who can decrypt the message?

The Web server with access to the private key

After videotaping her sister's wedding with an analog video camera, Nancy decided to edit out some of the footage using her computer. She finds that, although she has connected her camera, with the videotape, to her computer, she cannot access the video footage. Why?

The analog video footage must first be converted into a digital form.

Nancy is working on a class project. She has converted a vector image of a sunset into a bitmap graphic. Nancy tried to change the color of the sun object from red to orange, but she is unable to make this change. Why?

The graphic no longer has the qualities of a vector graphic, therefore she cannot easily change the color of one specific object

Amelia tells Mark that when he enters a URL in his browser's Address box and presses the Enter key, a communications process begins. The domain name contained in the URL leads to a Web server that his browser contacts. The browser opens a socket and connects to a similar open socket at the Web server. Then the browser generates and sends and HTTP message through the socket. The server responds by sending back the requested HTML document through the open sockets. At this point, Amelia tells Mark, the final step in which the process occurs. What is this last step?

The server closes its socket, and the browser closes its socket

Which of the following would NOT be true of computers priced higher than $1,200?

These computers do not adequately support video editing tasks.

The following is NOT true of broadcast flags: _____.

They permit global access to content use.

Which of the following is NOT a true statement that Karen learns about microcontrollers?

They tend to be environmentally unfriendly

The _______ phase of the digital revolution materialized in the 1990s when the Internet was opened to public use.

Third

______ shifting is the process of recording a broadcast so that it can be played back at a more convenient time.

Time

Tablet computers, handheld devices, retail store self checkouts, and information kiosks collect input from a ______.

Touchscreen

______ are the form factor of choice for computer owners who might want to upgrade components in the future because it is easy to get inside the case and swap out parts.

Tower units

________ software locates the edges of objects in a bitmap image and converts the resulting shapes into vector graphic objects.

Tracing

A _______ is a touch-sensitive surface on which you can slide your fingers to move the on-screen pointer.

Trackpad

One file storage metaphor that is based on a hierarchical diagram is sometimes referred to as a ____ structure.

Tree

Another possibility is that ACME Widget Company has a ______ that seems to perform one function while actually doing something else.

Trojan horse

Satellite Internet service and TV service requires ______.

Two satellite dishes and a modem

The operating system that has developed in 1969 at AT&T's Bell Labs and gained a good reputation for its dependability is ______.

UNIX

A _______ is a device that not only provides surge protection, but also furnishes your computer with battery backup power during a power outage.

UPS

If Perry decides that he does not need the computer equivalent of a luxury automobile, and that his needs are more in line with those of the average user, what can he expect to pay?

US $500 to $1,200

If your computer and your camera have ______ ports, you can connect a cable between these two ports to transfer the photo data.

USB

You can connect most standard microphones to your computer through the microphone socket or ____ port.

USB

An easy way to back up your important data is simply by copying selected files to a ____.

USB flash drive

What is the best storage medium for storing James' three databases, each of which is approximately 500 MB?

USB flash drive

Which of the following is NOT an advantage of using a wired network?

Unlimited mobility

The rate of data that is transmitted from your computer to the Internet is ____.

Upstream speed

To avoid becoming a spam victim, you should _______.

Use a disposable e-mail address when you register it for online sites

Nancy is using codec software to reduce the size of some of her video files by allowing her to specify a compression ratio or bitrate. If she is very concerned with minimizing the size of her video files, she could ____.

Use a high compression ratio

Ethernet networks _____.

Use a nonproprietary technology, making Ethernet equipment available from a variety of vendors

Jessica has an always-on connection to the Internet. She has read about IP addresses and knows that some Web sites can track them. She would like the surf the Internet anonymously to protect her privacy. How can she do this?

Use an anonymous proxy service

To delete data from a disk in such a way that no one can ever read it, you should ____.

Use special file shredder software

The type of system software designed to help you monitor and configure settings for your computer system equipment is ______ software.

Utility

A _____ graphic consists of a set of instructions for re-creating a picture.

Vector

One clue that an image might be a ____ graphic is a flat, cartoon-like quality.

Vector

You plan to create a cartoon-like image of a computer to be used in a flyer for your school's computer lab. You should create a _____ graphic.

Vector

The process of converting analog video signals into a digital format is referred to as _____.

Video capture

VMWare and Parallels Desktop software are examples of ____.

Virtual machine software

If a program exceeds its allocated space, the operating system uses an area of the hard disk, called ____________ , to store parts of programs or data files until they are needed.

Virtual memory

You think that the computers at ACME Widget Company may be infected with a ______. You explain that it is a set of program instructions that attaches itself to a file and spreads to other files.

Virus

Unlike disk storage, most RAM is ____.

Volatile

A communications protocol that provides Internet access from handheld devices is _____.

WAP

_____ is supported by browsers without a plug-in.

WAV

The original wireless encryption was called ____.

WEP

_______ requires Windows Media Player 9 or above.

WMA

Which is the highest resolution?

WQXGA

RAM can be thought of as the _______ for the computer's processor.

Waiting room

A _____ palette contains a standard set of colors used by most Internet Web browsers.

Web

The _______ is a collection of linked documents, graphics, and sounds.

Web

______ provides tools specifically designed to enter and format Web page text, graphics, and links.

Web authoring software

When you view a page infested with a(n) ____, an HTTP set-cookie request automatically goes to a third-party server, which may set a cookie on your computer for later retrieval or record your IP address.

Web bug

The following statement is NOT true: _______.

Web pages that provide a secure connection start with httpx: instead of http:.

A(n) _____ is a collection of related information organized and formatted so it can be accessed using software called a browser.

Web site

Melissa is concerned about the security of her computer, and she wants to avoid malicious exploits, which can work their way into her computer through various security holes. Which type of e-mail service has been the target of many such exploits?

Webmail

Melissa is planning to travel a great deal in the coming weeks. She will not be taking her computer with her, but she knows that the hotels she will be staying at have business centers with Internet-enabled computers. She plans to access her e-mail account every day so the she can quickly respond should she be contacted by a prospective employer. Which one of the following account types should she use?

Webmail

ROM BIOS is a small set of instructions that tells the computer all of the following EXCEPT ____.

What the data transfer rate should be

Spreadsheets are particularly useful for ____.

What-if analysis

When should she use a digital camera rather than a scanner?

When she wants to create an image of a real object

Esteban decides to install a wireless network. Which LAN technology will he most likely choose?

Wi-Fi

The most popular wireless LAN technology is ____.

Wi-Fi

To connect a phone or other device to a network, make sure that ______ is enabled, then wait for the device to sense the network, and when asked, enter the encryption key.

Wi-Fi

An Ethernet-compatible network standard designated as IEEE 802.16 is ____.

WiMAX

______ is a wireless MAN or WAN technology commonly used for fixed Internet access.

WiMAX

The number and variety of programs that run on ______ are unmatched by any other operating system.

Windows

3-D graphics software provides a set of tools for creating ____ that represent three-dimensional objects.

Wireframes

Sometimes Sally wants to browse the Internet while sitting and enjoying a cup of coffee. She has heard that there are some public WiFi options but she knows there are some limitations. You tell her ______.

Wireless eavesdroppers can access personal info

A(n) _____ is the basis for scrambling and unscrambling the data transmitted between wireless devices.

Wireless encryption key

Productivity software that provides you with the ability to create, spell-check, edit, and format is considered ____ software.

Word processing

An example of software most commonly associated with productivity software is ____.

Word processing software

A ______ is NOT a type of network device.

Workstation

ACME Widget Company is concerned it may have a _______, which is a self-replicating program designed to carry out some unauthorized activity on a victim's computer.

Worm

Word ____ determines how your text flows from line to line by automatically moving words down to the next line as you reach the right margin in a word processing document.

Wrap

Thomas's friend has a particular folder into which he wants to allow people to put files without allowing them to open, copy or change any files in that folder. What kind of permission should Thomas assign to this folder?

Write only

You describe WiMAX to Sally. You tell her ______.

You can use the same provider for home and mobile use

You need your own domain name if ____.

You have your own Web site

When you use a search engine, it stores all of the following information about your query EXCEPT ____.

Your name

The following is NOT a technique used to produce video footage that will maintain good quality as it is edited and processed: _____.

Zoom in and out quickly

The _____ protocol allows the transfer of files from one computer to another over any TCP/IP network.

ftp

Jim wants to know what machine language instructions look like to the machine. You tell him they appear as _______.

A series of 0s and 1s

During the period from ________, computing was characterized by the Web, e-mail, multiplayer games, music downloads, and enormous software applications.

1995-2010

The binary number 10 represents _______ in the decimal number system.

2

Myspace lost steam in _____, but Facebook and Twitter marched ahead by attracting millions of users.

2008

Mike and Andre consider themselves to be average consumers when it comes to digital devices. In light of this, each of them could be expected to own more than ________ digital devices.

24

In terms of an authentication protocol, the phrase 'something a person knows' refers to _______.

A password


Set pelajaran terkait

Med Surg I Prep U Chapter 37: Assessment and Management of Patients With Allergic Disorders

View Set

Knapp CH 1: Bronchiolitis and CH2: Asthma

View Set

Writing Assignment: Module 01 Review Questions

View Set

Exam 4 Eyes, Ears, and Reproductive

View Set

Chapter 10 Administering Users and Groups

View Set