CGS FINAL EXAM

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Select the common image file formats.

-.jpg -.png -.xls -.avi

Select the common word processing file extensions.

-.odf -.docx -.avi

Match the following description with the appropriate programming language generation.

-3GL: High-level programming language-uses a compiler to convert into machine language. -4GL: Specifically designed for creating database management programs. -1GL: Machine language-represented by a series of 1s and 0s. -5GL: Extremely advanced-uses statements (scripts) rather than algorithms. -2GL: Assembly language-An assembler converts 2GL into machine language.

Select the advantages of using a database instead of a traditional filing system.

-A database can hold larger amounts of data. -A database can provide better data integrity. -A database can never be hacked. -Using a relational database, such as MS Access, is so easy that it requires no instruction.

Select the functions of a Digital Signal Processor.

-Analyzes signals received from the analog-digital converter to enhance audio quality. -Reduces unwanted noise. -Moderates call volume. -Encrypts phone signal.

Settings in Firefox can be changed to allow you to complete which three tasks?

-Approve cookie storage requests. -Deny cookie storage requests. -Delete stored cookies automatically when you start Firefox. -Send cookies to other Firefox users.

Select the cell phone manufacturers.

-Blackberry -Xiaomi -Huawei

Select two characteristics of computer storage.

-Connects the CPU to the memory -Sometimes referred to as secondary storage -Sometimes referred to as volatile memory -Retains data when power is turned off

Cyberattacks include ________ and ________.

-DDoS attacks -e-mail spam -hardware theft

Select two disadvantages of using cloud storage.

-Data deteriorates over time. -Data is only available if you are online.

The fifth step in the SDLC process is the system implementation phase. During this phase the new system is brought online. Select methods of converting an organization from an older IT system to a newer IT system.

-Direct conversion-shutting down the old system completely and starting the new one. -Parallel conversion-running both systems side-by-side for a while and then shutting the old system. -Pilot conversion-starting the new system in one sector of the organization to ensure that it works smoothly. -Holiday conversion-placing the new system online while everyone is gone.

Match the conversion methods with the correct description in the system implementation step of the SDLC.

-Direct: shuts down the old system and starts the new system -Parallel: Old and new systems run side-by-side for a while. -Pilot: starts in one area of the organization and then is deployed to the rest of the organization -Phased: implements new areas of the system in a predetermined period of time

Common symptoms of a computer virus include?

-Documents won't save. -Computer runs extremely slow. -Programs launch on their own.

Select two characteristics of solid state drive storage devices.

-Durable, no moving mechanical parts -Uses electronic circuits to store data -Uses magnetic charges to store data

Select the methods of using cloud storage.

-E-mailing a file to yourself. -Saving a photo on Flickr. -Purchasing online storage space. -Purchasing an external hard drive.

Which of the following are true regarding IP addresses? Please select three.

-IP stands for Internet Protocol. -In most home networks IP addresses are assigned by the Internet Service Provider. -If two laptops are connected to the same home network and surfing the web simultaneously, each laptop must have its own IP address. -If two laptops are connected to the same home network and surfing the web simultaneously, they share the same IP address.

Which two of the following statements regarding Instagram are true?

-If you don't want to be tracked turn off geo-tagging in the Settings under Location Services. -It is important to adjust your privacy settings so you can determine who follows you. -Your Profile section on Instagram must be accurate. -Instagram is difficult to integrate with apps like Facebook and Foursquare.

Select the usual roles of information systems (IS) technicians.

-Installing IS hardware and software. -Maintaining IS hardware and software. -Repairing and replacing IS hardware and software. -Researching databases to create reports.

Select two audio file compression formats.

-JPEG -WAV -STP -MP4

Choose the Samsung Galaxy tablet options.

-Note series -Tab series -Pad series -Nexus series

Check all the activities that would be considered uploading a file to the Internet.

-Posting a photo on social media. -Placing an ad on Craigslist. -Posting a YouTube video. -Printing a document.

Select the reasons for compressing a file.

-Reduce the bandwidth needed to transmit a file. -Reduce storage space requirements. -Reduce the memory needed to view a video file. -Reduce the number of files required to store movies.

Select two reasons to compress a file.

-Reduce the number of files required to store movies -Reduce bandwidth needed to transmit a file -Reduce storage space requirements -Reduce the memory needed to view a video file

Select appropriate business e-mail etiquette practices.

-Remember that potentially negative news is best given face-to-face. -Keep attachments small. -Finish your e-mails with a friendly joke. -Because it's an e-mail and not a business letter, use a casual writing style.

There are several ways to create a new folder in Windows. Which of these would work?

-Right-click a folder in the folders list. Click New and then click Folder. -Right-click any blank area in the Contents pane. Click New and then click Folder.

Select what's true about object-oriented databases.

-Store instructions for how to compute the data as well as the data to be processed -Equipped to handle unstructured data such as MP4 files, videos, images, and extremely large files -Use Object Query Language to construct queries that extract data from the database -Are commonly referred to as relational databases

Your college has a database with a Students table. Which of the following could be a primary key in the table?

-Student number -Social Security Number -Street address -Last name

Select the usual tasks of information systems (IS) program managers.

-Supervising IS technicians. -Working with developers and senior management to procure and implement IS processes. -Developing training plans and policies for IS. -Maintaining a corporate database.

Which two statements about Instagram are true?

-The Profile section lists your name, birthday, gender, and phone number. -If you don't want to be tracked, turn off geo-tagging in the Settings under Location Services.

Select two optical drives.

-USB drive -DVD drive -Hard disk -Blu-ray player

Select what's true regarding uninstalling software.

-Uninstalling system software is not recommended. -Be cautious when uninstalling software from the OS manufacturer. -Be cautious when uninstalling software from the computer manufacturer. -You can uninstall any program that comes with your computer without causing an impact on performance.

Select three characteristics of cloud storage.

-Users can download files to other devices on the Internet. -Files are backed-up (stored on multiple servers). -Lasers read the reflective substrate (coating) on the discs. -Servers act like giant hard drives.

Which of the following should you consider when buying a new computer?

-What is the cost? -Does it have HDMI ports? -Does it have an SD card slot?

Which of the following are designed as a network operating system?

-Windows Server -UNIX

Choose the reasons for purchasing broadband Internet service.

-You have several devices online at the same time. -You need relatively high-speed Internet service. -You want Wi-Fi in your home. -You want to save money over a dial-up connection.

Select the reasons why you might want to add a microSD card to your smartphone.

-You want to save more music files. -You want to save more image files (photos). -Your iPhone needs more storage. -Your phone's processor is running too slowly.

Select what is true regarding dual-band routers. Please select three.

-can transmit Wi-Fi signals in the 2.4 GHz frequency range -can transmit Wi-Fi signals in the 5.0 GHz frequency range -minimizes the impact of interference from microwave ovens and car alarms -usually less expensive than single-band routers

Select the characteristics of a Base Transceiver Station.

-connected to a cell tower -broadcasts weak microwave signals to create "cells" of mobile coverage -sends phone signals to the cellular provider's Mobile Switching Station (MSS) -sends phone signals to the recipient's Mobile Switching Station (MSS)

Which of these would be considered a cybercrime?

-cyber espionage -information theft -cyber monitoring

Select what is true about session cookies.

-determine the start and end of a session -analyze and measure traffic on a web page -determine the web browser being used -are stored on the computer's hard drive

Properly formatted professional e-mail message should contain which of these components?

-humorous opening -subject -salutation -complimentary close

When choosing a cell phone provider, factors should you consider?

-network size/coverage -service/speed -pricing -number of frequencies

What is true of the malware Trojan horse?

-often found attached to free downloads and apps -often used to find passwords, destroy data, or to bypass firewalls -Trojan malware is the same as a macro virus.

A two-in-one computer combines a tablet with a detachable ________ to make a relatively powerful, yet mobile computer.

-printer -keyboard -motherboard -mouse

An Internet filter is firewall software used to block a user's access to specific Internet content. This software can reside on which three of the following?

-router or user's computer -network -keyboard tracker -stand-alone filter attached to a server

Websites that use cookies can collect information about

-surfing habits. -selling your collected information to third parties. -tracking a user's cloud storage.

Which of the listed activities are considered theft of software?

-taking a registration code from the Internet and using it register a program that you did not purchase -illegally copying a program -stealing software programs

Important considerations when purchasing a new tablet computer include which three items?

-the amount of RAM it has. -the size of its screen. -the amount of storage it has. -whether the tablet has an optical drive installed.

Select the statements that are true regarding Cellular Internet service.

-uses cell phone radio waves to transmit and receive Internet signals -Many providers offer data packages that may place limits on uploading and downloading. -Many smartphones can send and receive Wi-Fi signal, allowing them to become hot spots. -Upload and download speed are consistent nearly everywhere.

Select the characteristics of a modem.

-usually provided by the ISP -converts analog signals into digital signals -converts digital signals into analog signals -often transmits Bluetooth signals

RFID chips are found in many important items such as (select two),

-wired earphones. -credit cards. -coins. -passports.

Select the statements that describe a computer programmer's algorithm.

-written in a natural language, such as English. -written in the form of a flowchart so that it will be more easily converted into a programming language -usually written in Javascript -used to train the program's users

You've started a report and want to save it to your Desktop. Place the following steps in order, with the first step on the top.

1. Click the File tab. 2. Select Save As. 3. Select Computer. 4. Select Desktop. 5. Name the file and click Save.

Place the following steps in order for the process of uninstalling a program from a Chromebook.

1. Click the Launcher (circle icon). 2. Right-click the unwanted app. 3. Select Uninstall or Remove from Chrome. 4. Click Remove.

Windows 7 lets you change the appearance of your folders. Place the following steps in order if you wanted to open your folder options to modify the look of a folder.

1. Click the folder. 2. Click Organize (on the command bar). 3. Click Folder and Search options.

List in order the steps required to install a home Wi-Fi network

1. Connect the incoming Internet signal to the modem provided by your ISP. 2. Plug in the modem's electrical cord and turn on the modem. 3. Connect the modem to the router using a high-quality Ethernet cable (if required, some modems include integrated routers). 4. Plug in the router's electrical cord and turn on the router (if necessary). 5. Turn on your computer and locate your new Wi-Fi signal.

Match the business information systems (IS, sometimes called information technology or IT) activity with the appropriate management level.

1. First level managers (supervisors, floor managers): Use IS for scheduling daily and weekly operations. Use IS for scheduling daily and weekly operations. 2. Middle managers: Use IS for record keeping and reporting purposes. 3. Top-level management (business executives and presidents): Use IS to monitor overall business performance.

Place the following steps in order to attach a Document from your documents folder to an e-mail in Outlook.

1. Go to Outlook (log in if necessary) and create your message. 2. Click Attach (also indicated by a paper clip symbol). 3. Select Computer. 4. Select Documents. 5. Double-click the desired file and select Attach as a copy.

Match the image compression formats.

1. Joint Photographic Experts Group (JPEG or JPG): Most popular lossy image compression format 2. Portable Network Graphics (PNG): Most popular lossless image compression format 3. Graphics Interchange Format (GIF): Legacy (outdated) lossless format, still popular for simple animations

Match the following regarding file compression.

1. Lossy: reduces space required by removing less valuable data 2. Lossless: reduces space required by reducing redundancy within files 3. Zip: a lossless compression format

Put the following steps in order for creating a new e-mail message in Microsoft Outlook.

1. Open Outlook (log in if necessary). 2. Click New. 3. Enter the recipient's address in the To area. 4. Type the subject in the Subject area. 5. Type your message in the area beneath the formatting buttons. 6. Click Send.

Match the extension with the type of document.

1. Spreadsheet: .xlsx 2. Presentation: .pez 3. Web page: .html 4. Database: .accdb

Most new laptop computers come with how much storage?

256 GB - 1 TB

Sometimes used to create prototype models for casting, ________ printing is also known as additive manufacturing.

3-D

Select the technologies used by facial recognition software.

3-D mapping, Feature charting, Skin texture analysis, Capacitance analysis

If you just need a phone for calling and texting, a ________ phone can save you money.

3G

Two major catagories of cell phones are available. Smartphones with LTE or 4G capability and ________ phones.

3G

When you buy a new laptop, how much RAM should it come with?

4-8 GB

A tablet is a highly-mobile computer with a mobile operating system and a touchscreen rather than a keyboard/touchpad. To differentiate a tablet from a smartphone, a tablet is generally understood to have a screen size of at least ________ inches.

7

Which of the following are output?

A YouTube video displayed on a screen, An antilock brake system applying brakes, Uploading photos to Facebook, Sending a text message

A set of programs for exchanging data on a website without altering the display of the website is ________.

AJAX

Business owners, copyright holders, and network administrators publish ________ so that users understand what is expected and permissible when they use the network, computer equipment, and/or software.

AUPs

Smartphone cameras work by focusing incoming light onto what type of array that captures images?

Active pixel scanner

AJAX stands for ________ JavaScript and XML.

Asynchronous

One category of E-commerce includes ________.

B2B (Business to Business)

The programming language of the third generation learned by most students when most computers used MS DOS was ________. It continues as a secure programming language to use 3rd party code and offers a standard for coding that readily integrates with other programming languages.

BASIC

Select the input devices often found at a point-of-sale station.

Bar code or UPC reader, Keypad, UPC scanning wand, Receipt printer

A wireless short-range transmission protocol is called BLANK.

Bluetooth

If you have two folders open on your desktop and you want to copy a file from one folder to the other, hold down ________ and drag the file.

CTRL

One way to copy and paste a file to a new location is to click on the file and press CTRL + C to copy, then move your cursor to the new site and press ________ to paste.

CTRL + V

To remove a file from one folder and place it in another, click on the item and press ________, then move your cursor to the new location and press CTRL + V.

CTRL + X

What was the major question that ARPANET wanted to solve?

Could a network be built that would continue to work even if multiple parts collapsed?

Which category of management information systems (MIS) focuses on providing forecasting capabilities for sales and production?

DSS

The DBMS subsystem that allows for data recovery, support, and maintaining and securing the database is called the ________ subsystem.

Data Administration

What element of a database field specifies the data in a field such as text, numeric, or date/time?

Data type

Which are true regarding a display's refresh rate?

Describes how fast each pixel in a display is updated, The higher the refresh rate, the smoother the video., Videos play best with refresh rates at even multiples of the frame rate., Describes the number of times per second a frame is advanced in a video

The acronym DDoS stands for ________.

Distributed Denial of Service

In the United States, most consumer-oriented electronic transactions are covered by the federal ________.

EFT Act

Business management software that encompasses nearly all business activities in a corporation is called ________ software.

ERP

What is the acronym for End-User Licensing Agreement?

EULA

Which are true regarding a screen's resolution?

Equals the number of pixels in a display, Measures image quality, Equals the diagonal length of the screen

A quick way to rename files or folders in Windows is to select the item and then press the ________ key.

F2

An application that navigates all of the files and folders on your Mac is the ________.

Finder

The ________ computer creates images on your computer.

GPU

This type of analysis or walking stride identification is valuable because it can be used at night or through walls with infrared cameras or even with satellite imagery.

Gait analysis

A port that allows the transfer of high quality video and audio signals is called a(n) ________ port.

HDMI

Today, the standard port for video and audio input on TV is the ________ port.

HDMI

Amazon offers two lines of tablet computers: the Amazon Fire and the Amazon Fire ________.

HDX

VPN (Virtual Private Network) is a very useful tool in protecting your online identity. A VPN hides your ________ to outside websites.

IP address

Computer hardware and software used by an organization to improve its performance is called its ________.

IT system

The following are all true for Instagram except

Instagram charges a fee to download the app.

________ property laws protect against unauthorized use, sale, or distribution of software, music, movies, video games, and many other digital products.

Intellectual

Smartphone features include

Internet capablility, touch screen, front/back facing cameras, speaker

After creating the algorithm or schedule, the next stage in the PDLC is to compose the program coding. What languages can be used to complete this extremely organized process?

Java, JavaScript, C++

Most laptops, tablets, and smartphones use a(n) ________ display.

LCD

A switch distinguishes between various devices within a network by their ________ addresses.

MAC

This technology allows musicians to create written sheet music simply by playing an instrument.

MIDI

The two most common audio file formats are WAV and ________.

MP4

Be careful to only open e-mail from senders you know and trust. ________ may be contained in e-mail messages.

Malware

Because Microsoft Access includes not only the software needed to create a database, but also the software needed to create forms, reports, data dictionaries and other capabilities, it is often referred to as a Database ________ System.

Management

When referring to business information technology, MIS stands for ________.

Management information systems

Windows OS is owned and maintained by ________.

Microsoft

By upgrading to its maximum capacity of 16 GB of RAM and 1 TB of storage, the ________ tablet could be an extremely powerful computer!

Microsoft Surface Pro 4

Which of the listed programs are used for creating documents, basic web pages, and desktop publishing?

Microsoft Word

MIDI is an acronym that stands for?

Musical Instrument Digital Interface

JSON stands for JavaScript ________ Notation.

Object

Microsoft offers free cloud storage for everyone who has a Microsoft e-mail account. This storage is called Microsoft ________.

OneDrive

Match the following regarding printers.

Plotter: Used for drafting or blueprints Inkjet printer: Uses ink cartridges Thermal printer: Commonly used for receipts Laser printer: Uses toner cartridges

The information in ________ is dumped when a computer is shut down.

RAM

All of the following are true about RFID except

RFID uses infrared transmissions.

The type of database that uses common fields to create links between tables is called a ________ database.

Relational

You're tired of losing documents so you've decided to save your research paper to your desktop where you know you'll be able to locate it quickly. To save it to the desktop, you first click the File tab to open the file menu. Next you select ________.

Save As

Select the factors that should be considered when purchasing external speakers for a digital device.

Sound quality, Portability, Price, Resolution

Which of the following is not a presentation software term?

Speaker Image

Match the following.

Storage device: Hard drive Output device: Projector Input device: Game controller

What group determines the standards for the World Wide Web?

The World Wide Web Consortium (W3C)

The Federal ________ Commission is the main government organization that oversees Internet privacy.

Trade

Often with downloaded music or apps, programs that seem authentic but perform an unwanted activity when activated are called a ________.

Trojan horse

This type of connector is the most common type of connection to a Windows computer for peripherals (printers, monitors, storage devices etc.).

USB

This type of connector is the most common type of connection to a computer for peripherals (printers, monitors, storage devices, etc.).

USB

One type of storage device is a ________.

USB drive

URL stands for ________ Resource Locator.

Uniform

Select the characteristics of a projector.

Usually requires a darkened environment, Allows large audiences to view digital output, Usually used with a screen, Typically uses plasma to create images

To change the size of your folder's icon, just right-click on a blank area of the Contents pane and click ________.

View

The original wireless network privacy and protection standard for Wi-Fi was known as ________.

WEP

In addition to activating ________ protection, it's a good idea to disable your router's SSID transmission once all your devices are connected.

WPA2

The standard for wireless network privacy and protection is known as ________.

WPA2

A camera that takes photos or streams video into a computer or over the Internet is called a ________.

Webcam

CDs store data using ________.

a reflective coating that has pits and lands

Software that collects the web browsing history of the user and uses the collected data to create unwanted pop-up ads is called ________.

adware

Written in the English language and as a flowchart, a programmer uses a(n) ________ to describe the problem to be solved by the program.

algorithm

One of the first stages of the PDLC testing method is a test of fresh software performed by the programmers themselves or contract evaluators working alongside the programmers. This is called the ________ test.

alpha

Testing and documenting the software are the final steps in the PDLC process. When testing is carried out by the software's potential customers, it is called a(n) ________ test.

beta

A gigabyte equals approximately one ________ bytes.

billion

The smallest unit of data storage is a ________.

bit

Intrusion Detection Systems (IDS) use several techniques to protect networks. One is called a "halt", which stops the hacker from progressing into the network. Another is called a ________, which closes the access point used by the hacker.

block

An Internet signal that has enough bandwidth to allow multiple computers to be connected to the same router is called a ________ signal.

broadband

The two main factors that affect the speed of the processor are clock speed and ________.

bus width

In ASCII 8 bits are combined to create a ________.

byte

One character of information, for example, a letter or a number comprises of one ________ of storage.

byte

Clock speed, also known as ________, is the speed at which the processor performs the operations required to run a digital device and the digital device's instructions.

clock rate

Because it allows their files to be accessed from any device on the Internet, many users like to back up their files using ________ storage.

cloud

E-mailing a file to yourself is an example of using ________ storage.

cloud

The fact that data on servers is nearly always backed up onto other servers gives ________ storage a major advantage over other data storage methods.

cloud

The number of bits of data describing each pixel in a display is referred to as ________.

color depth

Large databases, often called data banks, that cover particular subjects are referred to as ________ databases.

commercial

If you wish to e-mail a file to a friend, but find that it's too big for your e-mail server, you can always ________ the file.

compress

A small text file of information created by websites that your web browser stores on your hard drive is called a ________.

cookie

Errors in data occurring while entering, reading, processing, storing or transmitting is known as data ________.

corruption

The malevolent use of computer code to change a computer or network's normal operations is called a ________.

cyberattack

Being able to surf the web, watch videos, and listen to steaming audio is why cell service with a ________ plan is extremely popular in the United State.

data

Collecting data, interpreting information gleaned from a database, and preparing reports for senior management are tasks that are typically assigned to a ________.

data analyst

A disadvantage of cloud storage is that ________.

data is only available when you are online

Stealing confidential materials such as copyrighted material, confidential information, or company e-mails from a network is called ________. Most often, this crime is committed by employees inside the company rather than outside hackers.

data theft

Monitoring database systems performance, developing and maintaining databases, and establishing user privileges for databases are usual roles of a ________.

database administrator (DBA)

Because he wanted to be able to sort gifts according to continent and time zone, in 1984 Santa switched from using long lists to using ________.

databases

The fourth step in the life cycle of system growth is to get the required equipment and ensure that it operates properly. This is called the system development step.

development

An integral part of a database management system (DBMS) is the Data Definition subsection. This subsection uses a data schema, also called a data ________.

dictionary

A database that stores data in different physical locations and that users access though client/server networks is called a ________ database.

distributed

If you have two folders open on your desktop and you want to move a file from one folder to the other, simply ________ the file.

drag

Solid state drives store data using ________.

electronic circuits

The interfaces for the logical view of a database and the physical view of a database are provided by the DBMS ________.

engine

The machine cycle consists of which four steps?

fetch, decode, execute, and store

A URL identifies a particular ________ address on the World Wide Web.

file

In a relational database, a common field that links two tables in a relationship but is not a primary key is called a ________ key.

foreign

When you need to link two tables in a database that don't have a field in common, one solution is to create a ________ in one table that links to the primary key in the other table.

foreign key

To control how information is entered into a database, programmers and database administrators create ________ to help ensure data integrity.

forms

Storage capacity for laptop hard drives is typically described in terabytes or ________.

gigabytes

Typical tablet computer or smartphone SSD capabilities are measured in ________.

gigabytes

Rank the following from fastest to slowest. The fastest should be on top.

gigahertz, kilohertz, hertz, megahertz

What is equal to one cycle per second?

hertz

Apple's mobile device with the largest display is the ________.

iPad Pro

While many 3rd party apps are available through its App Store, apps for ________ must first be tested and approved before they're made available for downloading.

iPhones

In order to sync your iPhone to your MacBook you must first open the ________ app.

iTunes

Software piracy include all the following except

illegally learning about software.

For ________ it may be less expensive to add an existing cell phone data plan and to use the phone as a hot spot than to add wired Internet service.

individual users

These facilitate getting data and information into your computer.

input devices

Adding software to a digital device, or adding hardware components to a digital device is called ________.

installing

Forms structure data input to help ensure data ________, meaning the information entered is accurate, timely, and useful.

integrity

A program that can be used to turn a single line of C# into a machine language without the complete program being compiled is called a C# ________.

interpreter

A mobile hinged computer with an integrated keyboard that uses a full operating system is called a notebook or a ________ computer.

laptop

Because of the large infrastructure cost of building antennae and mobile switching stations, as well as leasing the rights to use radio frequencies, only ________ companies can compete nationally as cell phone providers.

large

It's always a good idea to check the ________ before clicking Reply to All.

list of addressees

An initial value process, a process and a test condition which can potentially return to the initial value is called a ________.

loop

What type of virus is written in a macro language and placed in a document or table?

macro virus

The DBMS subsystem that allows for data maintenance and data analysis, including providing the capability to create queries, reports, and forms is referred to as the data ________ subsystem.

maintenance

Select the domain name.

mheducation.com

One advantage that the Samsung tablets have over the iPads is that you can add ________ to the Note or Tab.

microSD storage

Cell phones send and receive extremely weak ________ signals to and from cell towers.

microwave

Fiber-optic cable is ________ expensive than coaxial cable to install.

more

A complex database that organizes and stores information in a cube format and has measure attributes and feature attributes is called a ________ database.

multidimensional

Common names for a USB drive include?

nail drive, thumb drive, flash drive, jump drive

The following are all part of an RFID transmission system except for ________.

network

The information in the memory (the RAM, the caches, the registers) is ________ when a computer is shut down.

not saved

All of the following are protected by intellectual property laws against unauthorized use or distribution, except

open educational resources.

Many manufacturers have made ________ optional equipment when purchasing a new laptop computer.

optical drives

he BitTorrent protocol is often called ________ file sharing.

peer-to-peer

Cookies used to collect user information like passwords and stored on a computer hard drive until deleted or expired are called ________ cookies.

persistent

Instagram is a ________ sharing app.

photo

The software development process includes which of the following steps?

planning, programming, beta review

To listen to an .mp4 (M4A) file, you'll need an app such as iTunes or QuickTime. These apps are called audio ________.

players

Your posts on LinkedIn should be kept ________.

professional

Converting a task into commands that a computer can use to perform the task is called ________.

programming

Converting a task into commands that a computer can use to perform the task is one definition of computer ________.

programming

A database provides the capability of conducting searches or asking questions. A question or search for information in a database is called a ________.

query

With regard to digital storage, RAID stands for ________.

redundant array of independent discs

To display or distribute information from a database, programmers or database administrators create ________.

reports

PayPal free service enables users to do all the following except

reveal your financial details.

The most common method of renaming files and folders is to simply ________ on the item and select Rename.

right-click

Amateur computer hackers with little programming expertise, who illegally access computer systems by means of programs (scripts) written by others, are called ________.

script kiddies

Privacy and ________ are the two main factors related to your digital identity.

security

WhatsApp messenger is a cross-platform messaging app that allows you to ________ and receive messages without having to pay for SMS (text messaging).

send

Increased data transfer will be less likely to have errors if you use a ________ USB cord.

shorter

Data from the hard drive reaches the CPU ________ than data from the RAM.

slower

The average tablet has a ________ hard drive compared to the average desktop.

smaller

Specialized hardware or software that capture packets transmitted over a network are called packet ________.

sniffers

To improve the sound quality of their smartphones, many users purchase larger external ________ to listen to music.

speakers

While not a required step in sending an e-mail, it's wise to ________ any message before clicking Send.

spell-check

Choose what all-in-one computers actually mean.

stationary device, have a large monitor, usually touch screen monitor

The cell tower's base transmission station is connected to a mobile ________ station.

switching

Select the two phases of the final step in the system development life cycle.

system audit, evaluation phase, training phase, system analysis

Along with the From line, what is the most important factor in ensuring your business message is read?

the Subject line

One of the main differences between free and fee-based antivirus software is ________.

the number of features

A kilobyte is equal to approximately one ________ bytes.

thousand

Used in a variety of devices including ATMs and point-of-sale terminals, ________ allow for the input of data with the use of a stylus or finger.

touchscreens

Tiffany has purchased a new laptop. She noticed many unwanted programs came pre installed on her laptop. She wants to ________ the programs from her device so they do not take up storage space.

uninstall

Because of the popularity and bandwidth demands of video streaming, ________ data plans are not as common as they were in the past.

unlimited

A company brand identity is derived from all except

what their competition perceived them to be.

Non-malicious computer security specialists that take a look at the safety measures of associate organization's info systems to confirm they're protected against malicious intrusions are called ________.

white hat hackers

A form of E-mail fraud where criminals change the account where money is being transferred is called a ________ scam.

wire-wire


Set pelajaran terkait

Human Nutrition Chapter 10 Review

View Set

CHAPTER 19- BREACH OF CONTRACT AND REMEDIES

View Set

NCLEX Pharm: Psychiatric Medications

View Set

JOMC 101 (Princ Mass Media) Exam 3

View Set

what are the advantages and disadvantages of sexual reproduction and asexal

View Set

Unit 13: Types and Characteristics of Fixed Income (Debt) Securities and Methods Used to Determine Their Value

View Set