CIS 105

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

HTTPS (Hypertext Transfer Protocol Secure)

An encrypted version of HTTP. It uses port 443.

Sound Card

An expansion card that attaches to the motherboard inside the system unit and that enables the computer to produce sounds by providing a connection for the speakers and microphone.

How many Kilobytes are in a Megabyte?

1,024

What was the storage capacity of a floppy disk?

1.44 Mg

what was the storage capacity of a floppy disk?

1.44 mg

How many Kilobytes are in a Megabyte?

1024

When was the Energy Star founded?

1992

when was the energy star founded?

1992

How many of EPEAT's criteria are required for certification consideration?

23

8 Bits, 1 Byte

256 possibilities

How many of EPEAT's criteria are optional?

28

What is the current version of HTML?

5

How many total criteria in EPEAT?

51

how many total criteria in EPEAT?

51

How many bits in a byte?

8

how many bits in a byte?

8

What policy promotes efficient energy use in PSUs?

80 Plus

what policy promotes efficient energy use in PSUs?

80 Plus

CD-RW

A CD that allows data to be erased and written again several times.

Ethernet Card

A board inside a computer to which a network cable can be attached.

database functions

Analyze data for selected records in a database table

cell range

A cell range is identified by two or more cells within a table.

expansion card

A circuit board inserted into a slot on the motherboard to enhance the capability of the computer.

ISP (Internet Service Provider)

A company that provides customers access to the Internet.

Disable System Restore

A computer has been infected with multiple viruses and spyware. Which of the following tasks should be performed before removing this malware?

peer-to-peer (P2P)

A computer network that relies on the computing power and bandwidth of the participants in the network rather than a centralized server

logic bomb

A computer program or part of a program that lies dormant until it is triggered by a specific logical event.

Adjust the power settings

A customer calls to report that when she walks away from her laptop for an extended period of time, she has to reconnect to wireless upon her return. Which of the following will most likely correct this issue?

The parent folder has explicit Deny rights set for the third-party user

A customer reports to you that a file shared on her computer for another user is not accessible to that third party. The customer says that the third party was given Allow rights for Read and Write access to the file. Which of the following could be a reason as to why the third party cannot access the file?

This is an invalid IP address

A customer reports to you that he cannot access the company FTP site. He says that he is using the IP address given to him: 86200.43.118. What is most likely the problem?

Ignore

A customer tells you that it takes a long time to load the Windows desktop after logon. Which tool can help with this problem?

relational database

A database that represents data as a collection of tables in which all data relationships are represented by common values in related tables

network navigation devices

A device on a network such as a router, hub, and switch that moves data signals around the network.

input device

A device used to enter information into a computer.

Which is not word processing software?

Apple Word Press Pro

Primary Key

A field (or group of fields) that uniquely identifies a given entity in a table

When data is no longer needed on a daily basis, how is it backed up?

Archived

Internet

A global network connecting millions of computers, making it possible to exchange information.

column

A horizontal stack of cells in a table or worksheet.

Which of the following is not a feature of word processing software?

Array document protocols

The document is owned by the first user

At one of your customer's locations, two users share the same Windows 7 computer. The first user creates a document intended to be used by both users and then logs off the computer. The second user logs on and types the name of the document in the Start menu but the document cannot be found. Which of the following statements describes the problem?

What plays an important role when learning IT?

Attitude

client/server network

A network that uses centrally administered computers, known as servers, to enable resource sharing for and to facilitate communication between the other computers on the network.

After a computer gets power, it searches for what?

BIOS

after a computer gets power, it searches for what?

BIOS

Foreign Key

A primary key of one table that appears as an attribute in another table and acts to provide a logical relationship between the two tables

Where was WordPerfect originally developed?

BYU

A read/write head on a spinning disk is like what?

A record player arm

BIOS

Basic Input/Output System

what does the acronym BIOS mean?

Basic input/ output system

What does the acronym BIOS mean?

Basic input/output system

Referential Integrity

A set of rules that Access uses to ensure that the data between related tables is valid.

Virus (computer)

A small program attached to another program or data file. It replicates itself by attaching itself to other programs.

if-then-else statement

A statement used to select between the execution of two mutually exclusive behaviors.

Solid State Drive (SSD)

A storage device that uses the same kind of memory that flash drives use but that can reach data in only a tenth of the time a flash drive requires.

WWW (World Wide Web)

A system of interlinked hypertext documents contained on the Internet

GUI (Graphical User Interface)

A type of interface that allows users to interact with electronic devices through graphical icons and visual indicators such as secondary notation, as opposed to text-based interfaces, typed command labels or text navigation.

cache memory

A type of memory used to temporarily store frequently used data or programs for quick access; similar to RAM but faster.

Restart the Print Spooler service

A user can no longer print from his computer to the default printer. While troubleshooting this issue, you learn that you can print a test page from the printer, and the printer's queue shows that the job is ready to print. Which of the following tasks should be performed next to resolve the situation?

Ensure the user is not utilizing a proxy server

A user is reporting that his web browser is not going to the site he is trying to

Cable is connected to the modem's line RJ11 port

A user tries to connect to the Internet using a dial-up modem and receives a message that says "no dial tone detected." Which of the following should be checked first?

Enabling contact synchronization by setting up the e-mail account on the phone

A user wishes to access contacts from an Android phone. Which of the following solutions will provide the most up-to-date contact information on the user's phone on a daily basis?

Acquiring technology when it is first introduced is called what?

Being a leader

What was the Internet's original name?

ARPANET

What was the internets original name?

ARPANET

What coding scheme do most microcomputers use?

ASCII

What coding scheme is used by most microcomputers?

ASCII

What company makes Acrobat?

Adobe

which is not a major OS in business?

Borland System Platform

Which is not a major OS in business?

Borland system platform

Processor Management

Breaks down the work into manageable chunks and prioritizes them

Where was WordPerfect originally developed?

Brigham Young University

What is bigger than a Yottabyte?

Brontobyte

What are the pathways inside a computer unit called?

Bus lines

Inheritance

By default, a file or folder will receive its NTFS permissions from the parent

Who is in charge of all computer assets for an organization?

CIO

Which memory helps decrease the time it takes to access memory?

CPU Cache

Which memory helps decrease the time it takes to access memory?

CPU cache

what are stored copies of previously viewed web pages?

Cache

What is it called when a row and column intersect in a spreadsheet?

Cell

absolute cell reference

Cell reference that does not adjust to the new cell location when copied or moved

CPU

Central Processing Unit refers to the micro-processor on the

What is JavaScript?

Client-side Programming Language

A microprocessor's speed is measured in what?

Clock rate

powering up a computer for the first time is called what?

Cold Boot

Modem

Communications hardware device that facilitates the transmission of data.

CD-R

Compact disc on which you can write only once and thereafter is read-only.

What is meant by the variety of ways a computer can save data and information?

Computer Storage

time bomb

Computer virus that does not cause its damage until a certain date or until the system has been booted a certain number of times.

system software

Consists of the programs that control or maintain the operations of the computer and its devices.

What EPEAT criteria require manufacturers to adopt sound corporate environmental policies?

Corporate performance

What determines a monitor's resolution?

DPI

What program unclutters a hard drive?

Defragmentation

Network Components

Device, Media, Network Adapter, Network Operating System, and Protocol.

what does the acronym DSL mean?

Digital Subscriber Line

What plan is for a future business catastrophes?

Disaster Recovery Plan

two types of RAM

Dynamic RAM (DRAM) and Static RAM (SRAM)

What coding scheme do mainframe computers use?

EBCDIC

what coding scheme do mainframe computers use?

EBCDIC

Who funded EPEAT?

EPA

Where are EPEAT criteria listed online?

EPEAT.net

what is the most important thing system software does?

Enables the operating system

Which EPEAT criteria require adoption of Energy Star specification?

Energy Conservation

The table of contents of a hard drive is called what?

FAT

What is the table of contents for a disk drive?

FAT

What is the table of contents to a hard drive?

FAT

Which uses more space between Fat Clients or Thin Clients?

Fat

in a DBMS, what is a column called?

Field

What does the acronym FAT mean?

File Allocation Table

what does the acronym FAT mean?

File Allocation Table

The programming on ROM chips is sometimes called what?

Firmware

the programming on ROM chips is sometimes called what?

Firmware

Who manages EPEAT?

GEC

who manages EPEAT?

GEC

What are the most common graphic files on the WWW?

GIFs and JPEGs

what are the most common graphic files on the WWW?

GIFs and JPEGs

Who sold IBM MS-DOS?

Gates and Allen

What is EPEAT's highest designation?

Gold star

How is information represented on a monitor?

Graphical User Interface

what does the acronym GUI mean?

Graphical User Interface

What document is based on the idea that business can become environmentally friendly?

Green Business Plan

Which is not a common plug-in for Gaming Websites?

HTML

which is not a common plug-in for gaming websites?

HTML

which type of memory is secondary storage?

Hard Drive

Which type of memory is secondary system?

Hard drive

Secondary storage

Hard drive, more permanent, does not

the tangible and physical aspects of a computer are called what?

Hardware

What is the central location of a network?

Hub

what differentiates system software from application software?

Human intervention

What does the acronym HTML mean?

Hypertext Markup Language

what does the acronym HTTP mean?

Hypertext Transfer Protocol

Setting encryption

In a SOHO wireless network, which of the following prevents unauthorized users from accessing confidential data?

What does the Materials Selection criteria do?

Informs consumers of percentage of renewable / bio-based plastic content

data and information that enters a computer is called what?

Input

4 Major Computer Functions

Input, Process, Output, Storage

What is the worlds largest network?

Internet

What does IP mean?

Internet Protocol Address

what does the acronym ISP mean?

Internet Service Provider

What does JavaScript need to work on a website?

Java-enabled browser

Who developed the earliest Mac OS?

Jobs and Wozniak

Input device examples

Keyboard, mouse, speaker, touchscreen, storage device, scanner, microphone

Which network is the smallest?

LAN

Which operating system is open-source?

LINUX

Who started Linux?

Linus Torvalds

What operating system is open-source?

Linux

Which operating system is free of cost?

Linux

What does Apple call a motherboard?

Logic Board

What does Apple call the motherboard?

Logic board

What software did Excel replace as the most popular spreadsheet?

Lotus 123

What is the only real language a computer understands?

Machine code

What storage device is read sequentially?

Magnetic Tape

What storage device is considered the slowest?

Magnetic tape

Worm (Computers)

Malware computer program that replicates itself in order to spread to other computers.

What is considered the "brains" of the computer?

Microprocessor

What does IBM MS-DOS stand for?

Microsoft Disk Operating System

What does MS-DOS stand for?

Microsoft Disk Operating System

What is the leading presentation software?

Microsoft PowerPoint

What is the most popular word processor in the world?

Microsoft Word

Which is the leading presentation software?

Microsoft powerpoint

What is the most popular word processor in the world?

Microsoft word

What shows the last time a computer file was saved or created?

Modification date

Output device examples

Monitor, printer, storage device, speakers, projector

What law predicts that Google Earth will become Google Live?

Moore's Law

How is a computer different from other machines?

Multipurpose tool, versatile, can do many tasks well

Running more than one application at a time is called what?

Multitasking

Which is not a peripheral device?

NIC Card

What device allows a computer to connect to a network?

NIC card

Which is not a peripheral device?

NIC card

what device allows a computer to connect to a network?

NIC card

Software that controls an entire network is called what?

NOS

What is the newer version of FAT?

NTFS

what is the newer version of FAT?

NTFS

Can an embedded operating system be modified?

No

Does the average businessperson need to be an expert in IT?

No

Image and text scanners use a technology called what?

OCR

What method of sharing data is dynamic?

Object Linking

Moving the file to a new location on the same volume

Of the following ways to manipulate a file, which can retain the file's NTFS permissions?

Read

One of your co-workers is attempting to access a file on a share located on a remote computer. The file's share permissions are set to allow the user full control; however, the NTFS permissions allow the user to have read access. Which of the following will be the user's resulting access level for the file?

Restart the smartphone

One of your customers has not received any e-mails on his smartphone in the past few days. However, he's able to access the Internet. Which of the following should be your first troubleshooting step?

Use strong passwords. Assign security rights based on job roles

One of your customers has set up a perimeter firewall and has implemented up-to-date AV software. She asks you what else she can do to improve security. Which of the following will have the greatest impact on her network security? (Select the two best answers.)

What part of the computer coordinates memory?

Operating system

Ports

Places on the outside of the computer that connect to the motherboard and allows hardware to work

A common name for an operating system is what?

Platform

what is another name for an OS?

Platform

Which software visually communicates a point?

Presentation

In computing what is best described as where the user works?

Primary storage

Any task a computer performs is called what?

Process

What is it called when a computer performs a task?

Process

Which EPEAT criteria ask manufacturers to make their products last longer?

Product longevity/ life cycle extension

Which EPEAT criteria ask manufacturers to design products that can be upgraded with common tools?

Product longevity/life cycle extension

Which storage device is a series of stacked platters?

RAID

Name a primary storage with no physical movement that can be accessed in any order

RAM

Name a primary storage with no physical movement that can be accessed in any order.

RAM

Which type of memory is primary storage?

RAM

what type of memory is primary storage?

RAM

Primary storage

RAM (random access memory), temporary, requires constant electricity to hold data and programs, smaller generally 2 to 8 GB, faster than secondary, where programs and data

What tag can transmit through radio waves

RFID

What tag can transmit through radio waves?

RFID

Many chips encased in one chip working together is what?

RISC

RAM

Random Access Memory

ROM

Read Only Memory

Downloading

Receiving data, such as a music or video file, from a server or another computer system

in a DBMS, what is a row called?

Record

Which memory quickens the implementation of computer programs?

Registers

what is SEO?

Search Engine Optimization

In computing, what is best described as where the user stores their work?

Secondary Storage

How is a computer designed so it can do many different tasks?

Separation of hardware and software

What is the most important aspect of a productivity suite?

Sharing data

Who invented the first web browser?

Sir Tim Berners Lee

Who developed HTML?

Sir Tim Berners-Lee

who invented the first web browser?

Sir Tim Berners-Lee

who invented the world wide web?

Sir Tim Berners-Lee

A computer program that accomplishes a specific task is called what?

Software

Software sold as a collection are called what?

Software suite

Operating System (OS)

Software used to control the computer and its peripheral equipment.

What software models financial information?

Spreadsheets

Secondary Storage

Storage that is remote to the CPU and permanently holds data, even when the PC is turned off, such as a hard drive.

What are the set of rules to move data from one computer to another?

TCP/IP

What is the best protocol for transferring a large database file through a network?

TCP/IP

processing

Takes place on the CPU chip,

what is a misnomer when referring to the internet?

That you visit websites

User Interface (UI)

The "User Interface" or UI of an app refers to how a person (user) interacts with the computer or app.

Primary Storage

The computer's main memory, which consists of the random access memory (RAM), cache memory, and the read-only memory (ROM) that is directly accessible to the CPU

CPU (Central Processing Unit)

The internal operating unit or "brain" of a computer.

machine language

The language made up of binary-coded instructions that is used directly by the computer

HDD (Hard Disk Drive)

The most common type of hard drive in computers. It includes spinning platters and read/write heads.

network operating system (NOS)

The operating system that runs a network, steering information between computers and managing security and users

clock speed

The speed, or frequency, expressed in MHz, that controls activity on the motherboard and is generated by a crystal or oscillator located somewhere on the motherboard.

data transmission

The transfer of data between computers or other electronic devices through a network.

Which costs less to display between Fat Clients or Thin Clients?

Thin

Which has better distribution between Fat Clients or Thin Clients?

Thin

disks have concentric bands called what?

Tracks

Where was the university that produced the Internet?

UCLA

where was the university that produced the internet?

UCLA

What is the best protocol for transferring video through a network?

UDP

What protocol does YouTube.com use?

UDP

what is the best protocol for transferring video through a network?

UDP

What coding scheme is used for Japanese and Chinese computers?

Unicode

bits per second

Unit for measuring the speed of data transfer over a network connection.

What is the most inexpensive way to make a professional website?

WDPs

what is the most inexpensive way to make a professional website?

WDPs

is HTML considered a strong or weak language?

Weak

what is kept in cache?

Web Browsing History

Settings > Wi-Fi > SSID Name > IP Address

What is the correct path to determine the IP address of an iOS device?

Allows a peripheral to be contacted by the mobile device

When dealing with Bluetooth, which of the following statements best describes the purpose of discovery mode?

Calendar Address book

When setting up a Microsoft Exchange mail account to synchronize with an iPhone, which of the following items can be configured to synchronize besides e-mail? (Select the two best answers.)

Programs and Features

Which CP utility is best used to remove a Windows application?

Task kill

Which Windows command can stop a single process from the command line?

Task Manager

Which Windows utility can be used to see which users are currently logged on?

CHKNTFS

Which command in Windows can initiate CHKDSK at boot time?

DIR

Which command would display the contents of C:\Windows\System32\?

Windows 8.1 Pro 64-bit Windows 7 Home Premium x64

Which of the following OSes supports full usage of 8 GB of RAM? (Select the two best answers.)"

GSM

Which of the following allows you to make phone calls and transfer data from

Disk Cleanup

Which of the following applications can be scheduled to delete unwanted, Compressed, older files?

RSA tokens Privacy filters

Which of the following are examples of physical security? (Select the two best

Security alerts Windows Update failures Renamed system files

Which of the following are possible symptoms of malware? (Select all that apply.)

BOOTREC /FIXMBR

Which of the following commands might need to be run after a virus removal if a computer won't boot?

Authentication

Which of the following enables a user to reset his password with a series of

Using the virtual machine for patch testing before rollout

Which of the following identifies the best utilization for a virtual machine running locally on a PC?

Invalid boot disk

Which of the following is a common symptom of a problem that can occur while starting up the Windows operating system?

Drilling

Which of the following is a way to remove data from a hard drive through

Shredding Drilling

Which of the following is a way to remove data from a hard drive through

iCloud

Which of the following is an Apple smartphone feature that enables data to be

It reduces the amount of physical hardware required

Which of the following is an advantage of a PC-hosted virtual machine?

The technician notes the date, time, and who was given the computer.

Which of the following is the best example of the use of chain of custody?

NTFS

Which of the following is the most commonly used file system in Windows?

Complex password

Which of the following options is the best way to secure a Windows workstation?

Disable the ports in the firmware

Which of the following statements best describes how to secure only physically unused network ports on a switch?

Avoid distractions. Avoid being judgmental. Meet expectations that the customer sets for you

Which of the following statements describe how to demonstrate professionalism when dealing with a customer? (Select the three best answers.)

Squat and lift from the legs

Which of the following statements describes the proper lifting technique?

Squat and lift from the legs.

Which of the following statements describes the proper lifting technique?

ITunes

Which of the following terms best describes the Apple utility used with iOS

iTunes

Which of the following terms best describes the Apple utility used with iOS

Vacuum

Which of the following tools are commonly used to remove dust from the inside

Compressed air Vacuum

Which of the following tools are commonly used to remove dust from the inside of a computer? (Select the two best answers.)

WPS

Which of the following usually incorporates an 8-digit code that can be found on the bottom of a SOHO router?

Disk Management

Which operating system feature will show a hard drive's status?

Non-water-based fire extinguishers

Which type of fire extinguishing technology should be used during an electrical fire?

Bluetooth

Which type of technology is used when pairing devices such as headsets to a

Bluetooth

Which type of technology is used when pairing devices such as headsets to a smartphone?

Guest

Which type of user account should be disabled to adhere to security best practices?

What is the dominant OS in the operating system market?

Windows

what is the dominant OS in the operating system market?

Windows

WIMP

Windows, Icons, Menus, Pointers

What was the first web browser called?

WorldWideWeb

what was the first web browser called?

WorldWideWeb

Is it important to know how the inside of a computer works?

Yes

Will Google Earth become Google Live?

Yes

DHCP MAC filtering

You are configuring a SOHO wireless network for a customer. The customer wants only five authorized computers to connect to the network within a defined IP range. Which of the following should be configured on the router? (Select the two best answers.)

Server and domain

You are configuring a friend's iPad. He needs to access his work e-mail. To do this, you require information from his IT department. Which information should you ask for?

Establish a theory of probable cause

You are helping a customer with an Internet connectivity problem. The customer tells you that the computer cannot connect to her favorite website. After quickly analyzing the computer, you note that it cannot connect to any websites. Which of the following tasks should be performed next?

Select the load driver

You are installing Windows to a PC with a RAID card. All cables are connected

C:\Program Files (x86)

You are installing a 32-bit program on a 64-bit version of Windows 8. Where Does the program get installed to?

gpedit.msc

You are required to remove the ability for standard users to shut down or restart a hared computer. Which command should be used to accomplish this task?

Remove your watch and jewelry

You are required to replace a desktop power supply. Which of the following tasks should be performed first?

Report your findings through proper channels

You are servicing a computer and notice a lot of icons linking to inappropriate websites. Which of the following statements describes your first course of action?

Rejoin the computer to the domain

You are working on a client computer and receive a message that says the trust Rel58ationship to the domain has been broken. Which of the following steps should be taken to resolve this problem from the client computer?

The VM can be shut down with no harm to the host PC

You are working with a virtual machine (VM) when you discover that it has been infected with malware. Which of the following will apply?

Install the application in compatibility mode

You attempt to install a legacy application on a computer running Windows 8. You receive an error that says the application cannot be installed because the OS is not supported. Which of the following describes the first step you should take to continue installing the application?

Report the incident to management

You come across prohibited materials on a computer located in a common area. Which of the following statements describes what you should do first?

Install grounding bars

You have been asked to set up a new networking closet and you notice that the humidity level in the room is very low. Which of the following tasks should be done before rack-mounting any networking equipment?

Local Security Policy

You have been tasked with limiting computer access to certain users. Which of the following should be configured?

Shred the documents

You have been testing a financial software program by printing several test documents. Which of the following statements describes how to handle the confidential test documents when you are finished testing?

VER

You need to find out which Windows OS is running on a computer. Which command should be used?

Disconnect the network cable from the computer

Your customer has a computer (named comp112) that has been infected by a Worm. The worm has propagated to at least 30 other computers on the network. Which of the following tasks should be performed before attempting to Remove the worm from the comp112 computer?

Domain

Your organization's network consists of 25 computers. Your boss is interested

Domain

Your organization's network consists of 25 computers. Your boss is interested in employing a file server with network shares and a print server. Which of the following Windows network setups should you recommend?

expansion bus

a bus on the motherboard used to connect peripheral devices

Byte

a byte contains 8 bits, a bit is the smallest unit of storage, stored as 1's and 0's, all programs and data are stored and processed in binary

buses

a collection of wires through which data is transmitted from one part of a computer too another

system unit

a computer case that contains the CPU, power supply, memory, and storage

DVDs

a computer disk that stores multimedia messages in a digital format

Intranet

a local or restricted communications network, especially a private network created using World Wide Web software.

Video Card

a printed circuit board controlling output to a display screen.

DBMS (Database Management System)

a product used for the storage and organization of data that typically has defined formats and structures

A read/write head on a spinning disk is like what?

a record player arm

flash drive

a small electronic device containing flash memory that is used for storing data or transferring it to or from a computer, digital camera, etc.

row

a vertical group of cells in a worksheet identified by numbers

Trojan horses

a virus that does something different from what is expected to do.

What is the window a user is currently using?

active window

what is the window a user is currently using?

active window

What company makes Acrobat?

adobe

functioning properly?

afrustrated customer calls you about a PC that is not functioning properly. Which of the following questions should you ask of the user?

output device

allows the user to view or listen to the data a computer processes such as a monitor, printer, headphones, or speakers

Microprocessor

an integrated circuit that contains all the functions of a central processing unit of a computer.

Who can modify Linux?

anyone

Which is not word processing software?

apple word press pro

When data is no longer needed on a daily basis, how is it backed up?

archived

which of the following is not a feature of word processing software

array document protocols

What plays an import role when learning IT?

attitude

What does logging in do for a network user?

authenticates them

what does logging in do for a network user?

authenticates them

Waiting to acquire technology until it is proven is called what?

being a follower

Acquiring technology when it is first introduced is called what?

being a leader

Loading a platform into a computer's memory is called what?

booting

loading a platform into a computers memory is called what?

booting

What application software provides an interface that displays the WWW?

browser

what application software provides an interface that displays the WWW?

browser

Which software displays web pages?

browser software

what software displays web pages?

browser software

What topology is also called a linear bus?

bus

What are the pathways inside a computer until called?

bus lines

What technology has made presentation software more popular?

business intelligence

what technology has made presentation software more popular?

business intelligence

With Web Development Platforms, who designs the website?

business owners

properly

but the install DVD does not detect any hard drives. Which of the following tasks should be performed next?

What are stored copies of previously viewed web pages?

cache

What does the acronym CAN mean?

campus area network

Hardware

can run/execute different Software

What measures a human's impact on the environment?

carbon foot print

what measures a human's impact on the environment?

carbon footprint

What is it called when a row and column intersect in a spreadsheet?

cell

relative cell reference

cell reference that adjusts to a new location when copied or moved

Physically, what is a motherboard?

circuit board

A computer connected to a server is called what?

client

What is the computer used to browse the Web called?

client

what is the computer used to browse the web called?

client

What is JavaScript?

client-side programming language

What kind of network model is the Internet?

client/server

what kind of network model is the internet?

client/server

a microprocessor's speed is measured in what?

clock rate

Powering up a computer for the first time is called what?

cold boot

bootrec /fixmbr

command ran after a virus removal if a computer won't boot

What kind of website is to sell goods and services?

commerce websites

What kind of websites is to sell goods and services?

commerce websites

What does the extension, ".com" mean?

commercial

what does the extension ".com" mean?

commercial

CD-ROM

compact disc-read-only memory

Application Software

computer software created to allow the user to perform a specific job or task

What is meant by the variety of ways a computer can save data and information?

computer storage

What is it called when one computer can connect to another?

connectivity

what is it called when one computer can connect to another?

connectivity

What is meant by C2C?

consumer-to-consumer

what is meant by C2C?

consumer-to-consumer

ROM (Read-Only Memory)

contains programs to start computer, programs are stored when electricity is off (like secondary storage)

What is the most important aspect of a website?

content

what is the most important aspect of a website?

content

What are text files used for tracking a WWW user?

cookies

what are text files used for tracking a WWW user?

cookies

What is the easiest and most basic way to share data?

copy (or cut) and paste

What is the easiest and most basic way to share data?

copy and paste

Which EPEAT criteria require manufacturers to adopt sound corporate environmental policies?

corporate performance

What program organizes a disk?

defragmentation

What program unclutters a hard drive?

defragmentation

what program organizes a disk?

defragmentation

What is the background display on a monitor called?

desktop

what is the background display on a monitor called?

desktop

Another term for acceptance of an acknowledged problem is what?

diffusion

What does the acronym DSL mean?

digital subscriber line

A PSU converts Alternating Current to what?

direct current

A PSU converts alternating current to what?

direct current

What plan is for a future business catastrophes?

disaster recovery plan

What are tags called in HTML?

elements

What kind of operating system does an iPhone use?

embedded

What is the most important thing system software does?

enables the operating system

Which EPEAT criteria ask manufacturers to take their products back when they are no longer useful?

end of life management

Which EPEAT criteria require adoption of Energy Star specification?

energy conservation

What is the problem with NCAR's climate models?

extremely unreliable

Which is more powerful between Fat Clients or Thin Clients?

fat

Which is more powerful between fat clients or thin clients?

fat

What is another name for a bookmark?

favorite

what is another name for a bookmark?

favorite

In a DBMS, what is a column called?

field

What function stores and organize a user's work in computer files?

file manager

Operating systems have their file management systems modeled after what?

filing cabinets

operating systems have their file management systems modeled after what?

filing cabinets

What is a common name for a hierarchy of directories?

folder

What contains groups of computer files?

folders

units of storage

fundamental storage - byte (takes one byte to store a keystroke)

Who sold IBM MS-DOS?

gates and allen

How is information represented on a monitor?

graphical user interface

What does the acronym GUI mean?

graphical user interface

Environmentally friendly computer systems are called what?

green PCs

environmentally friendly computer systems are called what?

green PCs

What document(s) is based on the idea that business can become environmentally friendly?

green business plan

The practice of using computing resources efficiently and reducing waste is called what?

green computing

the practice of using computer resources efficiently and reducing waste is called what?

green computing

What is it called when heat cannot escape into space?

greenhouse effect

the tangible and physical aspects of a computer are called?

hardware

Firewalls

hardware, software, or both designed to prevent unauthorized persons from accessing electronic information

What differentiates system software from application software?

human intervention

What is a clickable navigation element?

hyperlink

what is a clickable navigation element?

hyperlink

What allows web users to navigate to different parts of the web?

hyperlinks

what allows web users to navigate to different parts of the web?

hyperlinks

What does the acronym HTML mean?

hypertext markup language

What does the acronym HTTP mean?

hypertext transfer protocol

What is a small pictogram that launches an application?

icon

what is the small pictogram that launches an application?

icon

Pivot Table

in most spreadsheet software it is the name of the tool used to create summary tables.

WPS (Wi-Fi Protected Setup)

incorporates an 8-digit code that can be found on the bottom of a SoHo router

What does the Materials Selection criteria do?

informs consumers of percentage of renewable/bio-based plastic content

Boot Sequence

initial sett of operations that the computer performs when it is switched on

Data and information that enters a computer is called what?

input

Four functions of a computer

input, output, processing, storage

What is the world's largest network?

internet

What does IP mean?

internet protocol address

What does the acronym ISP mean?

internet service provider

What does JavaScript need to work on a website?

java-enabled browser

input

keyboard, mouse, graphics tablet, scanner, etc

What does a user type in to a search engine?

keywords

what does a user type in to a search engine

keywords

Who started Linux?

linus torvalds

Which operating system is free of cost?

linux

What does the acronym LAN mean?

local area network

A business computer authenticates a user based on what?

login

a business computer authenticates a user based on what?

login

What is the only real language a computer understands?

machine code

What storage device is considered the slowest?

magnetic tape

What storage device is read sequentially?

magnetic tape

What storage device is reel-to-reel?

magnetic tape

Magnetic tape is still used extensively for what type of computer?

mainframe computers

What are the largest and most powerful business computers?

mainframes

what are the largest and most powerful business computers?

mainframes

What is software designed to damage a computing system?

malware

What is the software designed to damage a computing system?

malware

What button expands a window?

maximize

what button expands a window?

maximize

How does a search engine match keywords to a web user?

meta words

Where does a search engine get a description of a website?

meta-description tag

how does a search engine match keywords to a web user?

meta-words

What kind of website returns many search engine results?

metasearch engine

what kind of website returns many search engine results?

metasearch engine

What does the acronym MAN mean?

metropolitan area network

Desktop computers are considered what type of computer?

microcomputers

what is considered the "brains" of a computer?

microprocessor

What computers process large amounts of data for a mid-sized business?

midrange computers

what shows the last time a computer file was saved and created?

modification date

output

monitor, printer

What is the main component of a system unit?

motherboard

what is the main component of a system unit?

motherboard

Running more than one application at a time is called what?

multitasking

What is it called when a computer runs more than one process at a time?

multitasking

Connecting two or more computers is called what?

network

Who is the person responsible for a network's smooth operation?

network administrator

Can an embedded operating system be modified?

no

Does the average businessperson need to be an expert in IT?

no

Any device connected to a network is called what?

node

The integrated system video chip is failing

ntested video drivers were installed, You have been tasked with diagnosing a laptop that is experiencing heavy artifact corruption along with random loss of video during operation. Which of the following are the most likely causes to the problem? (Select the two best answers.)

Which method of sharing data is dynamic?

object linking

Where does the microprocessor reside?

on the motherboard

Linking the customer and transaction tables is called what?

one-to-many relationship

linking the customer and transaction tables is called what?

one-to-many relationship

Disk Management

operating feature that will show a hard drive's status

Starting a computer loads system software to provide what?

operating system

What part of a computer is responsible for reading and writing data?

operating system

What part of the computer coordinates memory?

operating system

starting a computer loads system software to provide what?

operating system

Data and information that leaves a computer is called what?

output

data and information that leaves a computer is called what?

output

24 Bits, 3 Bytes

over 16 million possibilities

32 Bits, 4 Bytes

over 4 billion possibilities

16 Bits, 2 Bytes

over 65,000 possibilities

TCP/IP and UDP break large files into what?

packets

TCP/IP breaks file into what?

packets

Smaller files that represent larger files are called what?

pages

smaller files that represent larger files are called what?

pages

What does the acronym P2P mean?

peer-to-peer network

What is the most important part of an information system?

people

A printer or scanner connected to a network is called what?

peripheral device

privacy filters

physical security

A common name for an operating system is what?

platform

What is another name for an OS?

platform

What is a separate window that opens a browser without user interaction?

popup

what is a separate window that opens a browser without user interaction?

popup

Which software visually communicates a point?

presentation

What software is designed to display on-screen?

presentation software

storage

primary and secondary

In computing, what is best described as where the user works?

primary storage

Any task a computer performs is called what?

process

Which EPEAT criteria ask manufacturers to make their products last longer?

product longevity/ life cycle extension

What represents a user's specific preferences?

profile

what represents a users specific preferences?

profile

What are "rules" called when referring to a network?

protocols

In a DBMS, what is a row called?

record

Visual Basic for Applications (VBA)

refers to a programming language you can use to create macros. It is a descendant of the BASIC programming language that is used in all Office products, as well as some other types of software.

Network transmission media

refers to the various types of media used to carry the signal between computers

Which memory quickens the implementation of computer programs?

registers

This contains settings like screen savers, appearance, and personalization.

registry

this contains settings like screen savers, appearance, and personalization

registry

Overwriting writes 1s and 0s to the drive

replacing the data; formatting only clears the reference to the data and only overwrites as space is used, When it comes to sanitizing drives, which of the following statements best describes the difference between overwriting a drive and formatting a drive?

Microsoft replaced menus with what?

ribbons

microsoft replaced menus with what?

ribbons

What is the least used topology?

ring

What topology is in a circle?

ring

What kind of website uses keywords to locate content?

search engine

what kind of websites uses keywords to locate content?

search engine

What is SEO?

search engine optimization

In computing, what is best described as where the user stores their work?

secondary storage

Tracks are separated into wedges called what?

sectors

tracks are separated into wedges called what?

sectors

Uploading

sending data, such as a music or video file, from a local computer system to another computer system or server

The central computer in a network is called what?

server

What is the most important aspect of a productivity suite?

sharing data

A computer program that accomplishes a specific task is called what?

software

Software sold as a collection are called what?

software suite

Spyware

software that enables a user to obtain covert information about another's computer activities by transmitting data covertly from their hard drive.

What application software features a "what-if" analysis?

spreadsheets

What software models financial information?

spreadsheets

Which PC mode uses the least amount of power?

standby mode

What is the most common topology?

star

booting your computer

startup sequence that starts the operating system of a computer when its is turned on

What is a pen-like device that can "write" on a screen?

stylus

Operating System

supports and provides services to applications in RAM

Files exchanged in and out of RAM are called what?

swap files

files exchanged in and out of RAM are called what?

swap files

Is an OS system software or application software?

system

What kind of software requires no human interaction?

system software

What is the main body of a computer called?

system unit

What is the main body of a computer?

system unit

What compensates for operating system inadequacies?

system updates

Physical items like desks, computers, and tractors constitute what in business?

tangible property

physical items like desks, computers, and tractors constitute what in business?

tangible property

What is the work arrangement that allows an employee to work from home?

telecommuting

What is a misnomer when referring to the Internet?

that you visit websites

What is the chassis commonly referred as?

the "box"

What is the chassis commonly referred as?

the "box'

Software

the instructions (programs) that tell the computer how to do something, can easily and quickly be changed

motheboard

the main circuit board of a computer housing the microprocessor and providing the means of connecting all the components that makes up the computer.

HTTP (Hypertext Transfer Protocol)

the protocol used for transmitting web pages over the Internet

Bits

the smallest unit of data in a computer

Code Window

the window in Visual Basic Editor (VBE) that displays the Visual Basic code (commands) for a macro

Which costs less to display between Fat Clients or Thin Clients?

thin

Which has better distribution between Fat Clients or Thin Clients?

thin

What does the "M" mean in CPM?

thousands

The technician notes the date

time, and who was given the computer, Which of the following is the best example of the use of chain of custody?

What is the mapping of a physical network called?

topology

Disks have concentric bands called what?

tracks

What are the most common types of cables in a network?

twisted pair

Internal Buses

type of buses that connect all the internal computer components to the CPU and main memory

What coding scheme is used for Japanese and Chinese computers?

unicode

What does the acronym URL mean?

uniform resource locator

what does the acronym URL mean?

uniform resource locator

What is the capacity of Cloud Storage?

unlimited

What is the capacity of cloud storage?

unlimited

Bytes

used to measure computer memory and storage

Which memory coordinates, tracks, allocates other memory?

virtual

This is actually a technique of breaking up files.

virtual memory

this is actually a technique of breaking up files

virtual memory

Restarting a computer is called what?

warm boot

restarting a computer is called what?

warm boot

Is HTML considered a strong or weak language?

weak

What is kept in cache?

web browsing history

Internet servers that serve content are called what?

web hosts

internet servers that serve content are called what?

web hosts

What were blogs originally called?

web logs

what were blogs originally called?

web logs

Disk Cleanup

which of the following applications can be scheduled to delete unwanted, compressed, older files?

What does the acronym WAN mean?

wide area network

How are bus lines measured?

width

A GUI unto its own is called what?

window

Which software can provide a table of contents?

word processor

What does platform neutral mean in context of a PDF?

works on any operating system

Is it important to know how the inside of a computer works?

yes

Will Google Earth become Google Live?

yes


Set pelajaran terkait

CPR/First Aid - Chapter 17 Question Study Guide

View Set

3130 first 3 quizzes- study set for 1st test

View Set

CompTIA A+ Certification Practice Test 19 (Exam 220-902)

View Set

Unit 8.2 Exempted Securities Under The Securities Act of 1933 (Series 65)

View Set

Chapter 11 (command-line Troubleshooting tools)

View Set

64 C'est pas sorcier -chien aveugle

View Set

12 Quick Check - What is Logistics?

View Set

Saunders NCLEX-PN: Fundamentals - Culture and Health Promotion Practice Questions

View Set