CGS FINAL
Select the common image file formats.
.jpg .png
Select the common video file formats.
.mov .avi
Select the common audio file formats.
.mp3 .mp4 (M4A) .wav
Select the common word processing file extensions.
.odf .docx
Select the advantages of using a database instead of a traditional filing system.
A database can hold larger amounts of data A database can provide better data integrity
FireWire connectors were developed for ___ computers.
Apple
When you make an online purchase and enter your shipping or billing information, you're actually filling out a form that was generated by a database management system. The DBMS subsystem that allows for form creation is the ___ generation subsystem.
Application
Select the cell phone manufacturers.
Blackberry Xiaomi Huawei
If you have 2 folders open on your desktop and you want to copy a file from one folder to the other, hold down ___ and drag the file.
CTRL
One way to copy a file to a new location is to click on the file and press CTRL + C, then move your cursor to the new site and press ___ .
CTRL + V
Which of the following are examples of downloading a file?
Copying a driver from a company's website and saving it to your computer. Buying a song on iTunes so you can listen to it on your phone. Copying a photo from Facebook and saving it to your desktop.
An attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests is called a _____ attack.
DDoS
The DBMS subsystem that allows for data recovery, support, and maintaining and securing the database is called the ___ subsystem.
Data Administration
What element of a database field specifies the data in a field such as text, numeric, or date/time?
Data Type
Amazon.com allows you to search for thousands and thousands of items using images and information that are organized logically. This much storage and management requires a complex ___ .
Database
Because he wanted to be able to sort gifts according to continent and time zone, in 1984 Santa switched from using long lists to using ___ .
Databases
SAGE was developed by the US Department of ___ .
Defense
An integral part of a databases management system (DBMS) is the Data Definition subsection. This subsection uses a data schema, also called a data ___ .
Dictionary
A database that stores data in different physical locations and that users access though client/server networks is called a ___ database.
Distributed
A DDoS attack is when computers that have been infected by a virus act as "zombies" and work together to send out illegitimate messages creating huge volumes of network traffic. The acronym DDoS stands for ___ .
Distributed Denial of Service
If you see the extension .xlsx, you know that you are looking at a(n) ___ file.
Excel
A quick way to rename files or folders in Windows is to select the item and then press the ___ key.
F2
In a database a _____ is a group of related characters in a database table that represents a characteristic of someone or something.
Field
You created a flyer and saved it in your Documents folder. To find this file you could open Cortana (in Windows 10) and type the flyer's name in the search window, or you could click on the ___ icon (all Windows versions, on your toolbar) and access the Documents folder from there.
File Explorer
The protocol used for transmitting large files from one server to another over the Internet is known as the ___ Protocol (FTP).
File Transfer
To control how information is entered into a database, programmers and database administrators create ___ to help ensure data integrity.
Forms
Databases are built by starting with single characters of data, organizing the data into fields, organizing the related fields into records, the records then make up a table. This organization is referred to as a data ___ .
Hierarchy
Which of the following should be considered when choosing an ISP?
How many users will be logged on my network at the same time? Will user's be streaming data? What ISP choices are available in my area?
Which of the following are true regarding IP addresses?
IP stands for Internet Protocol. In most home networks IP addresses are assigned by the Internet Service Provider. If two laptops are connected to the same home network and surfing the web simultaneously, they share the same IP address.
Adam was in the fifth grade when he was adopted by the Smith's. Because his school used a centralized database, all of his teachers had his correct name on their grade reports. This is an example of how a centralized database can help improve data ___ .
Integrity
Firewall software used to block a user's access to specific Internet content is called a(n) _____ filter.
Internet
Select the examples of streaming.
Listening to Pandora. Watching a YouTube video. Watching a movie on Netflix.
The DBMS engine provides an interface for the end user of the database. This interface is called the ___ view.
Logical
Connecting digital musical devices to computers is accomplished by using ___ ports.
MIDI
When you receive a utility bill, you're actually getting a report that was generated by a database management system. The DBMS subsystem that provides for data maintenance, analysis, and the generation of reports is called the data ___ subsystem.
Manipulation
Broadband is measured in _____ .
Mbps
A complex database that organizes and stores information in a cube format and has measure attributes and feature attributes is called a ___ database.
Multidimensional
Choose the Samsung Galaxy tablet options.
Note series Tab series
Microsoft offers free cloud storage for everyone who has a Microsoft email account. This storage is called Microsoft ___ .
OneDrive
Changing the appearance of your can make it easier to keep your information organized. To change your folder's appearance, first click on the folder, and then go to the command bar and click ___ .
Organize
You own a pet care center. what fields might you enter when you create a table for dogs that you care for?
Owner's last name Pet's name
Check all the activities that would be considered uploading a file to the Internet.
Posting a photo on social media. Placing an ad on Craigslist. Posting a YouTube video.
Which of the following are common email viruses.
Ransomware keystroke logging Trojan adware
In the datasheet view of a relational database (such as Microsoft Access) a row of information is called a ___ .
Record
A link between tables in a relational database that defines how the data is related is called a _____.
Relationship
Because they're both Apple products, the browser that works smoothest with Macintosh OS X is ___ .
Safari
You're tired of losing documents so you've decided to save your research paper to your desktop where you know you'll be able to locate it quickly. To save it to the desktop, you first click the File tab to open the file menu. Next you select ___ .
Save As
To look for a file or folder in Windows 10, just type the file name in the __ box.
Search
Your college has a database with a Students table. Which of the following could be a primary key in the table?
Student number Social Security Number
What group determines the standards for the World Wide Web?
The World Wide Web Consortium (W3C)
By default Windows hides file extensions for known file types but you can unhide them if you wish.
True
Some cell phone carriers promising "unlimited data" will actually limit your high-speed, 4G LTE data to a couple of gigabytes per month.
True
Your network's mobile switching station locates the MSS of the person you're calling, even if they use a different cell phone provider.
True
Spam messages are sometimes referred to as ___.
UBE
URL stands for ___ Resource Locator.
Uniform
Select what's true about passwords.
Use a combination of letters, symbols, and numbers; the more characters you use, the more secure your password will be. Regularly check your accounts to ensure they have not been tampered with.
The data definition, as described in the data dictionary, tells users how each unit of data is defined in the database. Which of the following elements will be used to describe the data?
What field name will the data fall under. What data type will be included
Many cellular ISPs offer modem/router combination devices that can create a _____ wherever there's adequate cell service.
Wi-Fi hotspot
Though not yet commercially successful, the ___ was developed by one of the world's largest software manufacturers.
Windows Phone
Software that collects the user's web browsing history and uses the data collected to create unsolicited targeted pop-up advertisements is called _____ .
adware
Software applications that allow users to access and surf the World Wide Web are called ___ .
browsers
Select what's true regarding dual band routers.
can transmit Wi-Fi signals in the 2.4 GHz frequency range can transmit Wi-Fi signals in the 5.0 GHz frequency range minimizes the impact of interference from microwave ovens and car alarms
To select a folder, simply put your cursor on it and ___ .
click
Select the characteristics of a Base Transceiver Station
connected to a cell tower broadcasts weak microwave signals to create "cells" of mobile coverage sends phone signals to the cellular provider's Mobile Switching Station (MSS)
Select the characteristics of a router.
connects networks provides hardware firewall protection usually incorporates a switch
Select the characteristics of a traditional hard drive.
contains platters contains read/write heads stores data magnetically
The two main components of a processor are the arithmetic logic unit (ALU) and the _____ unit.
control
A small text file of information created by websites you visit that your web browser stores on your hard disk is called a(n) _____.
cookie
Before you can start tethering, verify that it's included in your cell phone's ___ plan
data
Being able to surf the web, watch videos, and listen to steaming audio is why cell service with a ___ plan is extremely popular in the U.S.
data
Which of the following would be considered a cybercrime?
data manipulation
Which of the following are considered cybercrimes?
data manipulation data corruption cyberbullying
Devices with a separate system unit and a relatively large footprint are called _____ computers.
desktop
The devices inside your phone that convert analog waves (such as sound waves) into digital signals that your phone can process are called ___ .
digital - analog converters
Identify common symptoms of a computer virus.
documents won't save computer runs extremely slowly programs launch on their own
If you have 2 folders open on your desktop and you want to move a file from one folder to the other, simply ___ the file.
drag
Routers that can send Internet signals over 2 distinct frequencies are called _____ routers.
dual band
Select the statements that are true regarding Fiber Optic Internet service.
fastest home network option when available not available in all areas signal is carried by light waves so it's less subject to electromagnetic interference
A URL identifies a particular __ address on the World Wide Web.
file
The act of hacking, or breaking into a computer system, for a politically or socially motivated purposes is called _____.
hacktivism
The cost of an SSD is ____ than the cost of a traditional hard drive.
higher
In order to sync your iPhone to your MacBook you must first open the ___ app.
iTunes
A television remote usually uses ___ waves.
infrared (IR)
A form of spyware that records all actions typed on a keyboard is called a _____ logger.
keystroke
Megahertz is equal to one _____ cycles (or instructions) per second.
million
Select the advantages of a 3G phone
more energy efficient - battery lasts longer less expensive
When a computer is shut down, the information in the memory (the RAM, the caches, the registers) is ___ .
not saved
Running the processor faster than recommended by the manufacturer is called _____ . This can increase performance and speed, but will also void the manufacturer warranty.
overclocking
Cookies stored on a computer's hard drive and used to collect and store information about user preferences, password and username information, IP address, and/or data on web surfing behavior are called ___ cookies.
persistent
To listen to an .mp4 (M4A) file, you'll need an app such as iTunes or QuickTime. These apps are called audio ___ .
players
To watch an .mpeg file, you'll need an app such as Windows Media Player or QuickTime. These apps are called video ___ .
players
Select the characteristics of a OneDrive account
requires a Microsoft Email account provides free cloud storage can serve as extra storage space
The device that connects 2 networks is a _____.
router
Contact your ISP if your actual Internet speed is _____ than advertised.
slower
Devices that allow for the retention of data when your computer has been shut down are called ___ devices.
storage
Persistent cookies store information about
user preferences
Select the statements that are true regarding cable Internet service.
uses the same coaxial cable that brings the cable television signal usually has more bandwidth than DSL lines Internet service can often be bundled with television service
Software that infects a computer and is created using computer code is called a computer _____.
virus
A destructive program that replicates itself throughout a single computer or across a network is called a _____.
worm