Chapter 6 Quiz: Input and Output, Chapter 9 - Privacy, Security & Ethics (Quiz), Chapter 8 - Communications and Networks (Quiz), ch 8 quiz, Chapter 5 Quiz: The System Unit, Chapter 4 Quiz: System Software, Chapter 3 Quiz: Application Software, ch 7 q...
voice over IP
-Transmission of telephone calls over networks.
Cellular services use _______ to provide wireless connectivity to the Internet
3G and 4G cellular networks
DSL
A service that uses existing phone lines to provide high-speed connections is called _______.
Using this type of communications channel, several users can simultaneously use a single connection for high-speed data transfer.
Broadband
Laptops and tablets use _____ that are typically located outside the system unit. Answers: A. AC adapters B. batteries C. power supply units D. MiniDc
Correct Answer: A. AC adapters
This indicates the monitor's ability to display colors by comparing the light intensity of the brightest white to the darkest black. Answers: A. Contrast ratio B. Dot Pitch C. Active display area D. Resolution
Correct Answer: A. Contrast ratio
With these systems, input and output devices are located outside the system unit. Answers: A. Desktop systems B. Personal digital assistants C. Smartphones D. Laptop computers
Correct Answer: A. Desktop systems
Most personal computers allow users to expand their systems by providing these on the system board. Answers: A. Expansion slots B. Ports C. Sound cards D. Network cards
Correct Answer: A. Expansion slots
These types of ports typically provide high-speed connections to specialized devices such as camcorders and storage devices. Answers: A. FireWire B. Serial C. Parallel D. AGP
Correct Answer: A. FireWire
Which of the following can be used to connect several devices to the system unit and are widely used to connect keyboards, mice, printers, storage devices, and a variety of specialty devices? Answers: A. USB port B. SATA C. Parallel port D. Firewire bus
Correct Answer: A. USB port
Pathways that support communication among the various electronic components on the system board are called _____. Answers: A. bus lines B. network lines C. logic paths D. gate ways
Correct Answer: A. bus lines
Which of the following ports provide high-speed connections for external hard-disk drives, optical discs, and other large secondary storage devices? Answers: A. eSATA B. S/PDIF C. HDMI D. MiniDP
Correct Answer: A. eSATA
Most operating systems support the ability to switch between different applications. This is called _______. Answers: A. multitasking B. booting C. translating D. driving
Correct Answer: A. multitasking
Which of the following printer features enables you to print on both sides of a sheet of paper? Answers: A. Simplex B. Duplex C. Resolution D. Dual Matrix
Correct Answer: B. Duplex
The category of operating system used for handheld devices. Answers: A. Network B. Embedded C. Stand-alone D. Open source
Correct Answer: B. Embedded
Which of the following is a function of the control unit? Answers: A. It provides pathways that support communication among the various electronic components. B. It directs the movement of electronic signals between memory and the arithmetic-logic unit. C. It performs fundamental math operations like addition, subtraction, and so on. D. It uses the logic to compare two pieces of data.
Correct Answer: B. It directs the movement of electronic signals between memory and the arithmetic-logic unit.
In a network operating system, this computer coordinates all communication between computers. Answers: A. Client B. Server C. Terminal D. Mode
Correct Answer: B. Server
This type of computer is a thin slab that is almost all monitor with the system unit located behind the monitor. Answers: A. Laptop B. Tablet C. Desktop D. Smartphone
Correct Answer: B. Tablet
This character encoding scheme allows non-English characters and special characters to be represented. Answers: A. ASCII B. Unicode C. EBCDIC D. ANSIC
Correct Answer: B. Unicode
Term used to describe the number of bits that a CPU can access at one time. Answers: A. Bitrate B. Word C. Pulse width D. Character
Correct Answer: B. Word
The size, or _______, is measured by the diagonal length of a monitor's viewing area. Answers: A. resolution B. active display area C. aspect ratio D. dot pitch
Correct Answer: B. active display area
Frequently-accessed information is held in _____. Answers: A. hard drive B. cache memory C. flash memory D. read only memory
Correct Answer: B. cache memory
On the motherboard, the connection points for chips are referred to as _____. Answers: A. slots B. sockets C. ports D. lines
Correct Answer: B. sockets
A 32-bit-word computer can access _____. Answers: A. 2 bytes at a time B. 16 bytes at a time C. 4 bytes at a time D. 8 bytes at a time
Correct Answer: C. 4 bytes at a time
Which of the following is not a character encoding standard? Answers: A. EBCDIC B. ASCII C. CISC D. Unicode
Correct Answer: C. CISC
These specialty chips are designed to improve specific computing operations such as displaying 3D images and encrypting data. Answers: A. Smartcards B. CPUs C. Coprocessors D. NIC cards
Correct Answer: C. Coprocessors
A type of specialty processor devoted exclusively to protecting your privacy. Answers: A. Data cards B. Micro cards C. Cryptoprocessor D. Embedded cards
Correct Answer: C. Cryptoprocessor
Which of the following ports is used for connecting musical instruments to a sound card? Answers: A. MiniDP B. S/PDIF C. MIDI D. eSATA
Correct Answer: C. MIDI
This operating system is designed to run only with Apple computers. Answers: A. Windows B. Linux C. Mac OS D. UNIX
Correct Answer: C. Mac OS
Which of the following allows a computer to run two or more operations simultaneously? Answers: A. Coprocessors B. Multiplexing C. Multicore processors D. Binary system
Correct Answer: C. Multicore processors
With this type of memory, large programs are divided into parts and the parts are stored on a secondary device, usually a hard disk. Answers: A. Flash B. Cache C. Virtual D. Extended
Correct Answer: C. Virtual
The processing speed of a microprocessor is typically represented by its _____. Answers: A. bus line B. control unit C. clock speed D. ALU
Correct Answer: C. clock speed
In most personal computer systems, the CPU is contained on a single chip called the _____. Answers: A. semiconductor B. ALU C. microprocessor D. control unit
Correct Answer: C. microprocessor
Before sending a large file over the Internet, you might want to use one of these programs. Answers: A. Disk defragmenter B. Uninstaller C. Disk cleanup program D. File compression program
Correct Answer: D. File compression program
When you reboot your system, the computer follows start-up instructions stored in this type of memory. Answers: A. DRAM B. SDRAM C. Cache D. Flash
Correct Answer: D. Flash
All of the following are commonly used units of measurement to describe memory capacity, except _____. Answers: A. Megabyte (MB) B. Gigabyte (GB) C. Terabyte (TB) D. Nanobyte (NB)
Correct Answer: D. Nanobyte (NB)
OMR, OCR, and MICR are all types of _______. Answers: A. Radio Frequency Card Readers B. magnetic card readers C. bar code readers D. character and mark recognition devices
Correct Answer: D. character and mark recognition devices
Tiny circuit boards etched onto squares of sandlike material, called silicon, are called _____. Answers: A. buses B. slots C. sockets D. chips
Correct Answer: D. chips
A computer can become infected with viruses in all the following ways, except by _______. Answers: A. opening attachments to e-mail messages B. downloading software from the Internet C. downloading files from the Web D. creating a new folder on your computer
Correct Answer: D. creating a new folder on your computer
The proportional relationship between a display's width and height. Answers: A. Aspect ratio B. Resolution C. Dot pitch D. Clock speed
Correct Answer: A. Aspect ratio
The distance between each pixel. Answers: A. Dot pitch B. Refresh rate C. Resolution D. Word size
Correct Answer: A. Dot pitch
A dedicated, mobile device for storing and displaying e-books and other electronic media including electronic newspapers and magazines. Answers: A. E-book reader B. Interactive whiteboard C. HDTV D. Flat panel monitor
Correct Answer: A. E-book reader
This reading device is used in banks to read the numbers on the bottom of checks and deposit slips. Answers: A. MICR B. OCR C. OMR D. UPC
Correct Answer: A. MICR
Keyboards that are widely used on various smartphones and other small portable devices, and which are designed primarily for communicating via texting and connecting to the Web. Answers: A. Thumb B. Traditional C. Notebook D. Combination
Correct Answer: A. Thumb
The system board is also known as the _____. Answers: A. expansion slot B. motherboard C. expansion card D. bus
Correct Answer: B. motherboard
Two categories of laser printers are _______. Answers: A. thermal and personal B. personal and shared C. ink-jet and high-definition D. active-matrix and passive matrix
Correct Answer: B. personal and shared
The arrangement of keys on a keyboard, QWERTY reflects the keyboard layout by _______. Answers: A. representing the phonetics of the alphabets most closely associated with the keyboard B. taking the letters of the first six alphabetic characters found on the top row of keys C. using the alphabetic characters most frequently used on the keyboard D. using the letters of the alphabetic characters that are closest to access while typing
Correct Answer: B. taking the letters of the first six alphabetic characters found on the top row of keys
This type of program allows communication between a peripheral device, such as a mouse or printer, and the rest of the computer system. Answers: A. Client B. Virtual machine C. Device driver D. Server
Correct Answer: C. Device driver
Which of the following types of character recognition systems is used for standardized multiple-choice testing? Answers: A. UPC B. MICR C. OMR D. OCR
Correct Answer: C. OMR
Which of the following is not a type of scanning device? Answers: A. Optical scanner B. Bar code reader C. Stylus D. Character and mark recognition
Correct Answer: C. Stylus
This type of boot occurs when the computer is already on and you restart it without turning off the power. Answers: A. Generic boot B. Live boot C. Warm boot D. Cold boot
Correct Answer: C. Warm boot
For multicore processors to be used effectively, computers must understand how to divide tasks into parts that can be distributed across each core—an operation called _____. Answers: A. arithmetic-logic processing B. multiplexer processing C. parallel processing D. graphics coprocessing
Correct Answer: C. parallel processing
The series of dots that form the image on a monitor are called _______. Answers: A. picas B. bits C. pixels D. bytes
Correct Answer: C. pixels
_______-input devices convert sounds into a form that can be processed by the system unit. Answers: A. Electrolyzing B. Plotting C. Webcam D. Audio
Correct Answer: D. Audio
Specialized devices with a large display connected to a computer projector and are widely used in classrooms and corporate boardrooms. Answers: A. Scanners B. HDTV C. E-books D. Digital or interactive whiteboards
Correct Answer: D. Digital or interactive whiteboards
The study of human factors related to things people use. Answers: A. Headgear B. RSI C. Technical study D. Ergonomics
Correct Answer: D. Ergonomics
_______ is any data or instructions that are used by a computer. Answers: A. Digital B. Output C. Information D. Input
Correct Answer: D. Input
Which of the following statements is incorrect? Answers: A. Printer resolution is measured in dpi (dots per inch). B. Printer output is often called hard copy. C. Memory within a printer is used to store printing instructions and documents waiting to be printed. D. Printer speed is measured in the number of words printed per minute.
Correct Answer: D. Printer speed is measured in the number of words printed per minute.
Type of keyboard that uses a touch screen as the input device. Answers: A. PDA B. Wireless C. Traditional D. Virtual
Correct Answer: D. Virtual
Which of the following allows the transmission of telephone calls over computer networks? Answers: A. Faxing B. Cell phones C. PDAs D. Voice over IP
Correct Answer: D. Voice over IP
Integrated circuits must be mounted on _____, which are then plugged into the system board. Answers: A. slots B. pins C. ports D. chip carriers
Correct Answer: D. chip carriers
Printers connected to the Internet that provide printing services to others on the Internet are called _______. Answers: A. dot-matrix printers B. thermal printers C. plotters D. cloud printers
Correct Answer: D. cloud printers
Bar code readers use _______ embedded in them to read bar codes. Answers: A. coprocessors B. magnetic cells C. RFID microchip D. photoelectric cells
Correct Answer: D. photoelectric cells
The most widely used audio-input device is the _______. Answers: A. cloud printers B. microphone C. speakers and headphones D. faxes
Correct Answer: speakers and headphones
connection devices
In a communication system, which among the following convert messages into packets that can travel across the communication channel?
radio waves
Microwave communication uses high-frequency _______.
true
Modulation is the name of the process of converting from digital to analog.
_______ is the process of breaking down information sent or transmitted across the Internet into small parts.
Packetization
true
TCP/IP protocol involves identifying, sending, and receiving devices and breaking information into small parts for transmission across the Internet.
bandwidth
The capacity of a communication channel is measured in _______.
TCP/IP
The essential features of this include identifying, sending, and receiving devices and breaking information into small parts for transmission across the Internet.
mesh
This type of network topology does not use a specific physical layout
The three primary privacy issues are accuracy, property, and: a.) access b.) ethics c.) ownership d.) security
a.) Access
Match the words with the following definitions. phishing, encryption, plagiarism. information brokers, accuracy, spyware, zombies, malware, cookies, biometric a.) Privacy concern that relates to the responsibility to ensure correct data collection. b.) Individuals who collect and sell personal data. c.) Small data files deposited on your hard disk from websites you have visited. d.) Wide range of programs that secretly record and report an individual's activities on the internet. e.) Malicious programs that damage or disrupt a computer system. f.) Infected computers that can be remotely controlled. g.) Used by scammers to trick internet users with official-looking websites. h.) A type of scanning device such as fingerprint and iris (eye) scanner. i.) Process of coding information to make it unreadable except to those who have a key. j.) An ethical issue relating to using another person's work and ideas as your own without giving credit to the original source.
a.) Accuracy b.) Information brokers c.) Cookies d.) Spyware e.) Malware f.) Zombies g.) Phishing h.) Biometric i.) Encryption j.) Plagiarism
A short-range radio communication standard that transmits data over short distances of up to approximately 30 feet. a.) Bluetooth b.) broadband c.) DSL d.) TCP/IP
a.) Bluetooth
Match each term to the correct definition. node, TCP/IP, tree, microwave, protocols, intrusion detection system, peer-to-peer, analog, bus, network administrator a.) Type of network topology in which each device is connected to a common cable called a backbone. b.) A widely used Internet protocol. c.) Uses high-frequency radio waves. d.) Signals that are continuous electronic waves. e.) Rules for exchanging data between computers, f.) Any device that is connected to a network. g.) A computer specialist responsible for efficient network operations and implementation of new networks. h.) This network, also known as a hierarchical network, is often used to share corporate-wide data. i.) In this network, nodes have equal authority and can act as both clients and servers. j.) Work with firewalls to protect an organization's network.
a.) Bus b.) TCP/IP c.) Microwave d.) Analog e.) Protocols f.) Node g.) Network administrator h.) Tree i.) Peer-to-peer j.) Intrusion detection system
A high-frequency transmission cable that delivers television signals and connects computers in a network. a.) coaxial b.) hi def c.) 3-D d.) twisted pair
a.) Coaxial
The concept related to using computer networks to link people and resources. a.) connectivity b.) GPS c.) TCP/IP d.) Wi-Fi
a.) Connectivity
The use of the Internet, cell phones, or other devices to send or post content intended to hurt or embarrass another person is known as: a.) cyberbullying b.) online harassment c.) social media discrimination d.) unethical communication
a.) Cyberbullying
Browsers store the locations of sites visited in a: a.)history file b.) menu c.) tool bar d.) firewall
a.) History file
Typically using Wi-Fi technology, these wireless access points are available from public places such as coffee shops, libraries, bookstores, colleges, and universities. a.) hotspots b.) extranets c.) PANs d.) LANs
a.) Hotspots
Every computer on the Internet has a unique numeric address called a(n): a.) IP address b.) DNS c.) broadcast d.) packet
a.) IP address
Bus, ring, star, tree, and mesh are types of network: a.) topologies b.) protocols c.) strategies d.) devices
a.) Topologies
Programs that come into a computer system disguised as something else are called: a.) Trojan horses b.) viruses c.) web bugs d.) zombies
a.) Trojan horses
A byte is formed by a group of _____. Select one: a. 4 bits b. 8 bits c. 12 bits d. 16 bits.
b. 8 bits.
The bandwidth typically used for DSL, cable, and satellite connections to the Internet. a.) baseband b.) broadband c.) medium band d.) voiceband
b.) Broadband
Computer criminals who create and distribute malicious programs. a.) antispies b.) crackers c.) cyber traders d.) identity thieves
b.) Crackers
To prevent copyright violations, corporations often use: a.) ACT b.) DRM c.) VPN d.) WPA2
b.) DRM
Sometimes referred to as a LAN adapter, these expansion cards connect a computer to a network. a.) PCMCIA b.) NIC c.) server d.) VPN
b.) NIC
A device that allows one LAN to be linked to other LANs or to larger networks. a.) IDS b.) network gateway c.) PAN d.) switch
b.) Network gateway
Special hardware and software used to control access to a corporation's private network is known as a(n): a.) antivirus program b.) communication gate c.) firewall d.) spyware removal program
c.) Firewall
The information that people voluntarily post in social networking sites, blogs, and photo- and video-sharing sites is used to create their: a.) access approval b.) firewall c.) online identity d.) phish
c.) Online identity
The browser mode that ensures your browsing activity is not recorded. a.) detect b.) insert c.) privacy d.) sleep
c.) Privacy
Highly detailed and personalized descriptions of individuals are electronic: a.) cookies b.) histories c.) profiles d.) web bugs
c.) Profiles
In a computer network, this node that requests and uses resources available from other nodes
client
The speed with which a modem transmits data is called its: a.) digital velocity b.) dynamic rate c.) modular rating d.) transfer rate
d.) Transfer rate
Connection devices are the actual connecting or transmission medium that carries the message. a. true b.false
false
A type of mouse that emits and senses light to detect mouse movement.
optical
Combination keys perform a function when held down in combination with another key A. TRUE B. FALSE
true
Fiber-optic cable transmits data as pulses of light through tiny tubes of glass a. true b.false
true