BUSI COMPUTER APPS FINAL review

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

A point in a computer (a hole or a slot) that accepts a specific connector is called a ________.

port

If you have compromised your U.S. debit card Federal law says that if you tell your bank within two business days of learning about it, you will only be liable for a maximum of ________ in fraudulent charges.

$50.00

The device that connects two networks is a ________.

router

To improve the sound quality of their smartphones, many users purchase larger external ________ to listen to music.

speakers

What is the most powerful computer type?

supercomputer

Which has the most storage capacity?

terabyte

The highest level in the domain name hierarchy is known as the ________.

top level domain

Screen size is an important consideration when buying a new computer.

true

CDs provide approximately ___ of data storage space.

700 MB

Data flows between different computer parts via ________.

BUSES

A person with unlawful access to networks to steal and corrupt information and data is called a ________.

HACKER

A port that allows the transfer of high quality video and audio signals is called a_____ port

HDMI

________ property laws protect against unauthorized use, sale, or distribution of software, music, movies, video games, and many other digital products.

Intellectual

A commonly used short-range wireless technology used for data transfer and electronic payments is called ________.

NFC

Though currently expensive, curved and paper-thin displays are possible using ________ display technology.

OLED

A request for an electronic "echo" or response from another computer or server is called a ________.

Ping

All of the following are true about RFID except RFID doesn't require line-of-sight scanning. RFID uses infrared transmissions. RFID stands for Radio Frequency Identification. RFID can be used to identify a variety of objects including chip-implanted objects, and animals.

RFID uses infrared transmissions

The type of storage that retains data and information when the power is turned off is called ________.

ROM (read only memory)

RFID stands for which of the following?

Radio Frequency Identification

Which category of management information systems (MIS) combines the forecasting capability of decision support software with the records keeping capability of transaction processing systems software to help businesses manage inventories efficiently?

SCMS

Most tablets and phones use ________ as their main storage device.

SSD

A processor that consists of one control unit and one ALU is called a ________.

Single-core processor

The first social media site to allow users to create profiles, organize groups, and invite friends was called ________.

SixDegrees.com

Sometimes spam messages are referred to as ________.

UBE

The standard for wireless network privacy and protection is known as ________.

WPA2

E-mailing a file to yourself is an example of using ________ storage.

cloud

Errors in data occurring while entering, reading, processing, storing or transmitting is known as data ________.

corruption

A crime in which a computer is the object of a crime or in which a crime or offense is committed is called ________.

cybercrime

Which transmission media has the largest bandwidth?

fiber optic

When referring to business information technology, MIS stands for ________.

management information systems

The word modem stands for ________.

modulator-demodulator

Server banks have capacities measured in ________.

petabytes

A typical laptop has a storage capacity of approximately ________.

500GB-1TB

Business owners, copyright holders, and network administrators publish ________ so that users understand what is expected and permissible when they use the network, computer equipment, and/or software.

AUP'S

A ________ attack on a network is created to stop or interrupt traffic by saturating it with too many requests.

DDoS

What technology enables business-oriented transactions and information to be communicated electronically between people and organizations?

EDI

IrDA radio waves pass easily through walls and furniture.

False

Cache is slower but larger than RAM.

False - Cache is smaller but faster than RAM.

The ________ computer creates images on your computer.

GPU

This type of analysis or walking stride identification is valuable because it can be used at night or through walls with infrared cameras or even with satellite imagery.

Gait analysis

Relatively rugged, water-resistant video cameras that allow users to film high-definition video under harsh conditions, such as on ski mountains, in the ocean, or at high altitudes are called extreme-action video cameras or simply a ________.

GoPro

What is equal to one cycle per second?

Hertz

VPN (Virtual Private Network) is a very useful tool in protecting your online identity. A VPN hides your ________ to outside websites.

IP address

All of the following statements about Instagram are true except

Instagram is difficult to integrate with apps like Facebook and Foursquare.

The processor directly houses the ________ cache.

L1

A switch distinguishes between various devices within a network by their ________ addresses.

MAC

All of the following are common ports that are included with laptop computers except ________.

MIDI

Digital music devices are connected to computers using ________ ports.

MIDI

Broadband is measured in ________.

Mbps

Which of the following might be risky to uninstall from a Windows PC laptop?

Microsoft Works 6-9 Converter

Which of the listed programs are used for creating documents, basic web pages, and desktop publishing?

Microsoft word

The technology that uses the reflection of a laser of the graphite left by a #2 pencil to determine if a bubble has been filled in is called

OMR

Because they have no mechanically moving parts, ________ provide extremely fast, efficient storage.

SSDs

A computer that is highly mobile, has a smaller OS, and uses a touchscreen as the primary input method is called a ________.

TABLET

Laser printers are popular in offices because they use relatively inexpensive ________.

TONER

Which category of management information systems (MIS) focuses on tracking sales and inventories?

TPS

The World Wide Web was created through a collaboration led by ________.

Tim Berners-Lee

The DMCA titles that directly affect digital copyright issues include all except Title 1-WIPO Copyright and Phonograms Treaties and Implementation Act. Title 2-Online Copyright Infringement Liability Limitation. Title 3-Computer Maintenance Competition Assurance. Title 5-Copyright Protection Proviso.

Title 5-Copyright Protection Proviso.

signs your system might have been hacked include fake antivirus messages and unwanted browser toolbars.

True

The wireless network privacy standard that was introduced in 2003 but was quickly replaced (due to numerous vulnerabilities) was known as _____.

WPA

The data definition, as described in the data dictionary, tells users how each unit of data is defined in the database. Which of the following elements will be used to describe the data? What field name will the data fall under What data type will be included What data type will be included What database manufacturer is used When was the database created

What field name will the data fall under What data type will be included When was the database created

If you want to know the name of an owner or sponsor of a website, you can go to ________ .net.

WhoIS

The wireless network protocol is called ________.

Wi-Fi

DVDs store data using ________.

a reflective coating that has pits and lands

In professional messages, avoid the use of emoticons and ________.

acronyms

Combining a desktop's power with a clean look, ________ computers are popular with companies. However, their inability to expand makes them less popular with serious gamers.

all-in-one

Which of the following HTML objects will find web pages with hyperlinks?

anchor

Lightning connectors and ports are used by which company?

apple

The mouse was developed by which company?

apple

The two main components of a processor are the control and the ________.

arithmetic logic unit

The width of a screen compared to the height of a screen is referred to as ________.

aspect ratio

The capacity of a particular transmission medium is called its ________. Multiple Choice

bandwidth

The volume of data that can be carried on an Internet transmission media in an amount of time is called ________.

bandwidth

A device commonly used for checkout in stores, that measures the reflection of a laser beam, is called a ________ reader.

barcode

Since its radio waves pass through walls or desktops, ________-capable devices are very popular.

bluetooth

An Internet signal that has enough bandwidth to allow multiple computers to be connected to the same router is called a ________ signal.

broadband

Software applications that allow users to access and surf the World Wide Web are called ________.

browsers

The two main factors that affect the speed of the processor are clock speed and ________.

bus width

One category of E-commerce includes ________.

business to business

One character of information, for example, a letter or a number comprises of one ________ of storage.

byte

Which might be a choice for Internet service in your area?

cable internet

The ________ speed of the processor dictates the number of instructions that CPU can process per second.

clock

Clock speed, also known as ________, is the speed at which the processor performs the operations required to run a digital device and the digital device's instructions.

clock rate

Because it allows their files to be accessed from any device on the Internet, many users like to back up their files using ________ storage.

cloud

A virus signature is the software ________ of a particular computer virus.

code

Which of these would be deemed a cybercrime?

data manipulation

Amazon.com allows you to search for thousands and thousands of items using images and information that are organized logically. This much storage and management requires a complex ________.

database

Devices with a separate system unit and a relatively large footprint are called ________ computers.

desktop

Which device carries a relatively large footprint and separate system unit?

desktop

Solid state drives store data using ________.

electronic circuits

E-commerce is short for ________.

electronic commerce

A pixel is the largest element in an electronic image.

false

Adware is software that collects the user's keystroke history.

false

Computer memory has many moving parts.

false

In general, game controllers can be interchanged between different types of gaming consoles.

false

An application that navigates all of the files and folders on your Mac is the ________.

finder

To control how information is entered into a database, programmers and database administrators create ________ to help ensure data integrity.

forms

A desktop computer's RAM is measured in ________ of data.

gigabytes

Storage capacity for laptop hard drives is typically described in terabytes or ________.

gigabytes

The visual image output created by the computer is called ________.

graphics

For ________ it may be less expensive to add an existing cell phone data plan and to use the phone as a hot spot than to add wired Internet service.

individual users

A TV remote usually uses ________ waves.

infared

Although it sounds ironic, searching the ________ in your area is an efficient way to search for an ISP.

internet

Firewall software used to block Internet-specific content of a user is called an ________ filter.

internet

Cyberattacks include all the following except Internet browsing. pharming and phishing. spyware. spamming.

internet browsing

A ________ logger is a form of spyware that records your keyboard strokes.

keystroke

A short (simple text) e-mail uses about one ________ of data.

kilobyte

Which of the following represents the least amount of storage?

kilobyte

What type of virus is written in a macro language and placed in a document or table?

macro virus

Most desktop computers use ________ to store data.

magnetic hard drives

Because of its potential to diagnose health issues, one of the largest data requirements of the future will likely be ________.

mapping patients' genomes

Megahertz is the same as a ________ cycles (or instruction) per second.

million

Sometimes used in smaller business networks, employee ________ software is impractical for large networks because of the number of users and the potential for misuse.

monitoring

The standard code of respectful conduct governing the use of software and hardware for electronic communications is called electronic etiquette or ________.

netiquette

The information in the memory (the RAM, the caches, the registers) is ________ when a computer is shut down.

not saved

Single events and a(n) ________ series of events are two common cybercrime categories.

ongoing

Many manufacturers have made ________ optional equipment when purchasing a new laptop computer.

optical drives

RFID chips are found in many important items such as

passports

An input, output or storage device connected to a computer is known as a(an) ________.

peripheral

Using cells of ionized gas to create images, ________ displays are actually becoming less popular.

plasma

If antivirus software can not delete an infected file, it sends the file to a hard disk area called ________.

quarantine

To search a database for information, create a ________.

query

In the datasheet view of a relational database (such as Microsoft Access) a row of information is called a ________.

record

Anything you share on Facebook can be easily ________ to others.

sent

A collection of related records in a database is referred to as a ________.

table

One of the main differences between free and fee-based antivirus software is ________.

the number of features

Since they are low-priced and reliable, ________ storage devices are extremely popular.

thumb drives or flash drives

The Federal ________ Commission is the main government organization that oversees Internet privacy.

trade

The technology that uses cameras, microphones, displays, speakers, and software to allow users to both see and hear each other is called ________.

video conferencing

The maximum number of bits per CPU instruction during one machine cycle is ________.

word-size

A hacker-controlled computer is called a ________.

zombie

Most new laptop computers come with how much storage?

256 GB -1TB

When you buy a new laptop, how much RAM should it come with?

4-8 GB

Blu-rays provide approximately ________ of storage space.

50 GB

A wireless short-range transmission protocol is called ________.

Bluetooth

Which optical drive media stores approximately 700 MBs of data?

CD

Business management software that encompasses nearly all business activities in a corporation is called _____ software

ERP

As technology advances there are fewer keyboard options available for computer users.

False

PayPal charges a fee for making a purchase.

False

a protocol commonly used to transfer large files from one server to another on the Internet is the______

File transfer protocol

Trojan Horse programs are used to find all of the following except Finding free downloads bypassing firewalls destroying data finding passwords

Finding free downloads

Which is true regarding the length of a USB cord?

In general, the more data being transmitted, the shorter the cord should be.

In the body of a professionally formatted business e-mail, where should a request be placed?

In the first sentence of the body of your email

Josh is taking an Intro to Computers course and needs to use Microsoft Office to complete a variety of assignments. He has purchased the software, now he must ________ it so he can start his assignments.

Install

ISP stands for

Internet Service Provider

Boolean operators are the words "AND". "OR" and _____. The use of Boolean operators can make a search more precise and return better results.

NOT

Printer speed is described using which acronym?

PPM

The most common printers for printing receipts are ________ printers.

THERMAL

One of the important Internet privacy law/rules is the Children's Online Privacy Act (COPPA).

TRUE

Television displays with resolutions of at least 3840 x 2160 pixels are referred to as ________.

UltraHD

A camera that takes photos or streams video into a computer or over the Internet is called a ________.

Webcam

CDs store data using ________.

a reflective coating that has pits and lands

A disadvantage of cloud storage is that ________.

data is only available when you're online.

How is the screen size of a laptop computer measured?

diagonally from left corner to right corner.

Search ________ optimization (SEO) is a set of strategies, techniques, and practices used to increase the amount of visitors to a specific website by getting a high ranking placement in the search engine.

engine

In a database a ___ is a group of related characters in a database table that represents a characteristic of someone or something.

field

Which of the following is a strength of the Linux platform? most widely used OS in smartphones and tablets most widely used OS in desktops and laptops free to download and use less susceptible to viruses than Mac OS

free to download and use

Which is not considered an e-commerce transaction? B2C C2C G2B B2B

g2b

Typical tablet computer or smartphone SSD capabilities are measured in ________.

gigabytes

A complex database that organizes and stores information in a cube format and has measure attributes and feature attributes is called a ___ database.

multidimensional

Though legal, which of the following would likely be prohibited by a typical business computer-use policy? making a bomb threat over the network setting up a pyramid-type computer scam intentionally installing a computer virus online personal shopping

online personal shopping

Cookies used to collect user information like passwords and stored on a computer hard drive until deleted or expired are called ________ cookies.

persistant

Once you accept a Facebook friend request, you have access to their ___ Facebook page

personal

The accuracy of a digital recording is determined by the device's ____ rate

sampling

Along with the From line, what is the most important factor in ensuring your business message is read?

subject line

Select the smartphone input device.

touch screen or keyboard

A damaging program duplicating itself on a single computer or over a network is called a ________.

worm

Sometimes used to create prototype models for casting, ________ printing is also known as additive manufacturing.

3-D

Bus width is the amount of data that can be transmitted at a given time. A 64-bit bus can transmit ________ bits of data.

64

The Internet service that tends to provide the most consistent speeds is ________.

DSL

What is the acronym for End-User Licensing Agreement?

EULA

Today, the standard port for video and audio input on TV is the ________ port.

HDMI

Adding software to a digital device, or adding hardware components to a digital device is called _____ .

Installing

The technology (chips) that allow cell phone microphones and hearing aids to be so small is the ________ chip.

MEMS

Megahertz abbreviation is ________.

MHz

A storage device that uses lasers to read CDs, DVDs, or Blu-ray discs is referred to as a(n) ________.

Optical Drive

An output device that uses light to display video or image output on a surface is called a ________.

PROJECTOR

Because of its capability of storing data in multiple hard drives, data warehouses use ________ technology to ensure redundant data storage.

RAID

a signal transmitted every few seconds by a wireless router so that users' computers can find the Wi-Fi hot spot is called

SSID

Select what's true about object-oriented databases.

Store instructions for how to compute the data as well as the data to be processed Equipped to handle unstructured data such as MP4 files, videos, images, and extremely large files Use Object Query Language to construct queries that extract data from the database

Applications are computer programs created to execute specific tasks.

TRUE

Bluetooth is a short-distance wireless communication technology that uses short-wavelength radio waves to transfer data.

TRUE

Many cellular ISPs offer modem/router combination devices that can create a ________ wherever there is adequate cell service.

Wi-Fi hotspor

An AUP is a written document that provides a framework of rules to be followed by computer users. AUP stands for ________.

acceptable use policy.

Smartphone cameras work by focusing incoming light onto what type of array that captures images?

active pixel scanner

A bus is a channel over which information flows. A bus has two parts: the ____ and the____?

address bus; data bus

Social media apps integrate all of the multimedia listed except images. addresses. videos. messages.

addresses

Software that collects the web browsing history of the user and uses the collected data to create unwanted pop-up ads is called ________.

adware

The smallest unit of data storage is a ________.

bit

Intrusion Detection Systems (IDS) use several techniques to protect networks. One is called a "halt", which stops the hacker from progressing into the network. Another is called a ________, which closes the access point used by the hacker.

block

Most touch pads use ________ to sense when a finger has moved across the pad.

capacitance

The technology that allows any text, even handwritten scrawls, to be digitized is known as optical ________ recognition.

character

The fact that data on servers is nearly always backed up onto other servers gives ________ storage a major advantage over other data storage methods.

cloud

A description of the difference in the luminance of a display's white pixels compared to the black pixels is called ________.

contrast ratio

The most popular web browsers have a private browsing mode (Incognito). While browsing in Incognito mode your browser will not store ________.

cookies

________ Commons is a global nonprofit organization that empowers people to create open resource materials that can be shared or reused.

creative

Repeated and deliberate harassment or harassment of a person or group of people through information technology and networks is called?

cyberbullying

A person who uses computers and the Internet to launch attacks against computer systems for political or ideological reasons is called a ________.

cyberterrorist

Collecting data, interpreting information gleaned from a database, and preparing reports for senior management are tasks that are typically assigned to a ________.

data analyst

What element of a database field specifies the data in a field such as text, numeric, or date/time?

data type

SAGE was developed by the U.S. Department of ________.

defense

Which of the following could have a traditional (magnetic) hard drive?

dell desktop computer

An integral part of a database management system (DBMS) is the Data Definition subsection. This subsection uses a data schema, also called a data ________.

dictionary

A database that stores data in different physical locations and that users access though client/server networks is called a ________ database.

distributed

The Linux OS is owned by IBM.

false

Trojan programs replicate themselves often.

false

Worms are designed to only attack wireless networks.

false

When you need to link two tables in a database that don't have a field in common, one solution is to create a ________ in one table that links to the primary key in the other table.

foreign key

The number of times per second a frame in a video is advanced is the definition of ____

frame rate

The ________ is a separate processor (computer) on your computer that enhances your video.

graphic processor (GPU)

Breaking into a computer system (hacking), for politically or socially purposes is called ________.

hacktivism

To allow hard disk drive platters to spin more smoothly and cooler, some manufacturers seal the platters in ________ instead of air.

helium

Using refracted laser light to store data on a photoreceptive substrate is essentially how ________ storage works. Theoretically this could store gigabytes of data within a cubic millimeter.

holographic

All the following should be taken into account when using Twitter, except

if a Twitter user has been blocked you can file a formal complaint through Twitter.

Which of the following are examples of HTML objects? Anchor Image Link Storage

image link anchor

The roles of directing IS technicians, working with senior management to procure and implement IS, and developing policies for corporate IS typically falls to the ________.

information systems (information technology) program manager

The role of installing, maintaining, repairing and replacing information system hardware and software typically falls to the ________.

information systems (information technology) technician

Which of these browsers was developed by Microsoft?

internet explorer

Because a metal platter is physically spinning, hard drives have ________ access times than solid state hard drives.

longer

A million bytes of data equals one ________.

megabyte

One thousand kilobytes (KB) equals one ________.

megabyte

Which of the following is a strength of the Android platform?

most widely used OS for smartphones and tablets.

Electronic etiquette is also known as ________.

netiquette

All of the following are protected by intellectual property laws against unauthorized use or distribution, except

open educational resources

What manages hardware and software, supports the computer's basic functions, and runs programs?

operating systems

Using reflective material to store data that can be read using a laser is called ________ media storage.

optical

Which of the following is an e-mail program?

outlook

________ runs the processor faster than recommended by the manufacturer. This can increase performance and speed, but will also void the manufacturer warranty.

overclocking

The three most common types of e-mail viruses include all except

password savers

The BitTorrent protocol is often called ________ file sharing.

peer-peer

Unlike phishing that uses fake e-mails to gain personal information about a user, ________ uses fake websites to gain personal information.

pharming

The smallest controllable element of an image is called a(n) ________.

pixel

The smallest image element is a(n) ________.

pixel

A type of printer that is used to print large graphic images such as architectural drawings by mechanically moving a pen over a large sheet of paper is known as a ________.

plotter

With regard to digital storage, RAID stands for ________.

redundant array of independent discs

The type of database that uses common fields to create links between tables is called a ________ database.

relational

Software that gives network administrators the ability to provide computer assistance from a central location by allowing them to display and control any computer on the network is called ________ software.

remote desktop

To display or distribute information from a database, programmers or database administrators create ________.

reports

Amateur computer hackers with little programming expertise, who illegally access computer systems by means of programs (scripts) written by others, are called ________.

script kiddies

In general, the ________ the access time, the faster the hard drive.

shorter

Increased data transfer will be less likely to have errors if you use a ________ USB cord.

shorter

Contact your ISP if your actual Internet speed is ________ than advertised.

slower

Data from the hard drive reaches the CPU ________ than data from the RAM.

slower

The average tablet has a ________ hard drive compared to the average desktop.

smaller

Specialized hardware or software that capture packets transmitted over a network are called packet ________.

sniffers

Which of the following is not a category of Intellectual property? copyrights trademarks software use patents

software use

An unwelcome e-mail message is called ________.

spam

Devices allowing data to be retained when your computer is shut down are called ________ devices.

storage

The component of a computer that allows data to be retained after power is turned off is referred to as ________.

storage

To create an image with a laser printer ________ is(are) drawn to the drum.

toner

Used in a variety of devices including ATMs and point-of-sale terminals, ________ allow for the input of data with the use of a stylus or finger.

touchscreens

3-D mapping, feature charting, and skin texture are some of the methods facial recognition software uses to identify individuals.

true

A computer platform is commonly referred to as an operating system or OS.

true

The 3.5-mm connectors are the most popular for audio devices and have been used for nearly 70 years.

true

The BitTorrent protocol allows members to share large files over the Internet.

true

The term hacker and cracker are synonymous.

true

Transmission media can be either wired or wireless.

true

You must adjust the cookie settings individually in each browser you use.

true

URL stands for ________ Resource Locator.

uniform

Cookies stored on a computer store information about ________.

user preferences

Most smartphones and tablets produced today use a ________ keyboard.

virtual

Software that infects a computer and is created by computer code is called a

virus

A company brand identity is derived from all except what goals they want to accomplish. what their competition perceived them to be. who people perceive them to be. who they are.

what their competition perceived them to be.

Non-malicious computer security specialists that take a look at the safety measures of associate organization's info systems to confirm they're protected against malicious intrusions are called ________.

white hat hackers

A form of E-mail fraud where criminals change the account where money is being transferred is called a ________ scam.

wire-wire

Which category of management information systems (MIS) focuses on providing forecasting capabilities for sales and production?

DSS

This type of connector is the most common type of connection to a Windows computer for peripherals (printers, monitors, storage devices etc.).

USB

This type of connector is the most common type of connection to a computer for peripherals (printers, monitors, storage devices, etc.).

USB

What type of port do most digital devices use to attach peripherals?`

USB

When discussing digital cameras or smartphone cameras with APS CMOS, APS stands for ________.

active pixel sensor

The number of bits of data describing each pixel in a display is referred to as ________.

color depth

A digital device that accepts input, processes and stores the input, and provides output is a ________.

computer

A site on the Windows operating system where you can uninstall programs, adjust settings, and manage tasks is the ________.

control panel

A small text file of information created by websites that your web browser stores on your hard drive is called a ________.

cookie

Monitoring database systems performance, developing and maintaining databases, and establishing user privileges for databases are usual roles of a ________.

database administrator (DBA)

Because he wanted to be able to sort gifts according to continent and time zone, in 1984 Santa switched from using long lists to using ________.

databases

The acronym DDoS stands for ________.

distributed denial of service.

A ________ name identifies a server site on the Internet.

domain

The distance between two adjacent sub-pixels on a display is referred to as ________.

dot pitch

Transferring a file to your digital device from the Internet is called ________.

downloading

Routers that can send Internet signals over two distinct frequencies are called ________ routers.

dual-band

Using a stylus and touch pad to map the signature and also measure pressure, pen angle, pen up/down, speed, etc., is known as what type of signature recognition?

dynamic

RAM is ________ and has no moving parts.

electrical (solid state)

The protocol used for transmitting large files from one server to another over the Internet is known as the ________ Protocol (FTP).

file transfer

The risks of downloading a file from the Internet includes all except fileware. virus. malware. spyware

fileware

A ________ is the hardware or software used to keep a computer secure from external threats such as hackers and viruses by allowing or blocking Internet traffic.

firewall

A zombie is a computer controlled by a ________.

hacker

Databases are built by starting with single characters of data, organizing the data into fields, organizing the related fields into records, the records then make up a table. This organization is referred to as a data ________.

hierarchy

A refracted laser beam striking a photoreceptor from many different angles allows ________ storage to retain many bits of data in the same location.

holographic

Malware is designed to do all the following except

improve data

Adam was in the fifth grade when he was adopted by the Smith's. Because his school used a centralized database, all of his teachers had his correct name on their grade reports. This is an example of how a centralized database can help improve data ________.

integrity

A mobile hinged computer with an integrated keyboard that uses a full operating system is called a notebook or a ________ computer.

laptop

Because of their compact size, touch pads are most often used with ________ computers.

laptop

Avoiding viruses include all the following except only visit trusted sites. purchase a new router often (yearly) for the latest firewall protection. bypass your browser's built-in security. leave USB drives in when booting the computer.

leave USB drives in when booting the computer.

The DBMS engine provides an interface for the end user of the database. This interface is called the ________ view.

logical

Because Microsoft Access includes not only the software needed to create a database, but also the software needed to create forms, reports, data dictionaries and other capabilities, it is often referred to as a Database ________ System.

management

When you receive a utility bill, you're actually getting a report that was generated by a database management system. The DBMS subsystem that provides for data maintenance, analysis, and the generation of reports is called the data ________ subsystem.

manipulation

Fiber-optic cable is ________ expensive than coaxial cable to install.

more

Blu-ray technology stores data using ________.

pits and landing that are read by a blue spectrum laser beam.

The term that describes how fast each pixel in a display is updated is ________.

refresh rate

A link between tables in a relational database that defines how the data is related is called a ________.

relationship

The number of pixels in a display is called the display's ________.

resolution

Your ________ can provide hardware firewall protection for your home network where it connects to the ISP's network, just as ISP networks have firewalls where they connect to the Internet.

router

If copyrighted software is illegally copied, distributed, modified or sold and is regarded as a direct infringement of copyright, this is called ________.

software piracy

Using information systems to help foresee corporate business opportunities and threats that might be done by all levels of management, but it is most important for which management level?

top-level managers

A connector is a specialized end of a cord, plug, or expansion card that connects to a port.

true

A port is a slot or hole that matches the cord or expansion card being connected to the port.

true

Graphics are usually created by a separate processor within a computer known as the GPU (Graphics Processing Unit).

true

Maintenance type tasks can be executed using utility programs that are included with most operating systems.

true

Random access memory (RAM) does not store data when the computer is shut down.

true

Some cell phone carriers promising "unlimited data" will actually limit your high-speed, 4G LTE data to a couple of gigabytes per month.

true

Spreadsheet programs are used to format spreadsheets and display numbers and text in cells.

true

The more pixels in an image, the better the image quality.

true

The most ideal firewall configuration consists of both hardware and software.

true

The platform or operating system of a computer controls all of the functions of a computer.

true

The processes of removing software from a computer is called uninstalling.

true

The purpose of an HDMI connector is to transmit high-definition audio and video signals.

true

Downloading content from the Internet poses risks. When downloading from the Internet, it is important to consider all of the following except the source of the content. It is important to consider if the content came from a legitimate source. when sharing files via the Internet via file sharing programs you can unknowingly give outside users access to your computer. your antivirus software will always ensure your files are safe. files downloaded from unknown sites and file sharing sites often contain a variety of malware including spyware and viruses.

your entire virus software will always ensure your files are safe


Set pelajaran terkait

Chapter 43. Sleep and the Nursing Process EAQ

View Set

Section 5: Quiz 53 - Network and Endpoint Devices

View Set

IB BUSINESS - OPERATIONS MANAGEMENT

View Set

Kappa Alpha Psi - Cumulative Test - 1

View Set

Respiration 5: Control of Respiratory System

View Set

BUSI-230 Probability & Statistics - Module 2

View Set

Biology- Chapter 8: Photosynthesis

View Set