Cis 110 Sec 0010 Final Exam Study Guide
____ are unique in that they can create a three-dimensional object made of various materials.
3D printers
Which of the following is NOT a high-speed Internet connection for homes?
4G
Compact Discs (CDs) are capable of storing up to _________ of data.
700 MB
__ involves the development of intelligent systems.
AI
Which of the following networks, which began with just four universities, is the earliest ancestor of the Internet?
ARPANET
Which of the following is NOT an office suite?
Adobe Creative
Which of the following is an e-book reader?
Amazon Kindle
Although Google owns _________ and manages the Google Play Store for apps, they allow any manufacturer to use and modify this operating system for their devices.
Android
Which of the following products would you choose if you wanted to edit videos?
Apple Final Cut Pro
____ occurs when computers or machines can perform the work that was once done by a human.
Automation
When sending email to a large number of individuals, placing their addresses in the __________ field will prevent all those addresses from being seen by the recipients.
BCC
A(n) __________ is a copy of one or more files that is made in case the originals become lost or damaged.
Backup
_ is the amount of data that can be transmitted over a given amount of time.
Bandwidth
Which optical disc typically holds 25 GB or 50 GB of data?
Blu-ray
You are shopping for a new computer online. The description lists the following: "Intel i73630QM." What part of the computer does that refer to?
CPU
Created in 1981, _________ brought together researchers in the field of computer science.
CSNET
Computers in home
Communication, Business work done at home, Schoolwork, Entertainment, Creativity, Finances and Shopping
___ software aids architects, engineers, and many others who need to create a digital model of an object.
Computer Aided Design
Which of the following allows users to switch between a laptop and tablet experience?
Convertible laptop
A(n) __________ license allows authors to set conditions for the free use and distribution of their work.
Creative Commons
Repeated hostile behavior with intent to harm another individual is known as ___
Cyber bullying
The image quality (or print resolution) for printers is measured in:
DPI
The quality of a printer's output is measured in:
DPI
Google allows users to view and control all their data with a tool known as:
Dashboard
A(n) __________ is responsible for configuring, maintaining, and securing an organization's database.
Database Administrator
Computers in Industry
Design, Shipping, Process Control, Administration, Marketing
The __________refers to the technology gap that exists between different social and economic classes.
Digital Divide
Which part of a URL identifies a site and a brand on the web?
Domain name
The ability to automatically print to both sides of a piece of paper is known as ___
Duplexing
Which type of printer should you purchase if your company needs to print employee ID cards?
Dye-sub
__ is the ability to recognize, understand, and share the feelings of others.
Empathy
___ is the process of scrambling your data or storage devices to make them unreadable by anyone who doesn't have the proper key
Encryption
A(n) __________ is the typical license that a user must agree to before installing software
End-User License Agreement
Which type of keyboard is designed to be comfortable and help reduce the chance of hand and wrist strain?
Ergonomic
The network standard known as __________ uses a star topology with twisted-pair cables that plug into the RJ45 port located on many devices
Ethernet
__________ is the philosophical study of morality
Ethics
Which of the following is NOT a popular computer programming language?
Exchange
A(n) __________ is a type of information system that performs analytical tasks traditionally done by a human.
Expert System
Many websites have __________ areas that should be checked for common questions and their responses.
FAQ
Laws such as the Patriot Act and _________ give the U.S. government broad surveillance powers.
FISA
A Kensington lock is an effective countermeasure against phishing threats.
False
Application software is made for the computer's proper operation, while system software aims to make users more productive
False
Because of their high speeds and the sharp-looking text they produce, dot matrix printers are preferred by modern businesses.
False
Copyright protection lasts for approximately 15 years after the author applies for it.
False
For a computer, "sleep" mode uses less electricity than "hibernate" mode.
False
For mission-critical systems, technology companies construct computer hardware and software that can never fail.
False
HTTP and HTTPS are the heart of Internet communication, setting rules for the transport and addressing of packets.
False
It is illegal for social networking companies to share profile and usage information with marketing companies they are partnered with.
False
One gigabyte is larger than one terabyte.
False
Scalability is the ability of each organization's information system to work with the other, sharing both data and services.
False
The app known as Spotify is used by small businesses to accept mobile payments.
False
The asterisk symbol (*) is often used to mark keywords or topics in a social post or tweet.
False
The most popular format for file compression is known as CRM.
False
The physical devices that make up a computer system are known as software
False
In its simplest form, a(n) __________ is a node on a network that serves as an entrance to another network.
Gateway
Modern operating systems have a(n) __________ , allowing users to communicate via graphical elements on the screen.
Graphical User Interface
_____concentrates on reducing the environmental impact of computers and their widespread use.
Green Computing
The __________ language, which was used in the first web page, is still being used today alongside other languages.
HTML
The communication of vibration, motion, or physical resistance to a user is called:
Haptics
You might find a computer support specialist at a company's __________, troubleshooting systems and providing technical support to employees.
Help Desk
Which of the following is a popular streaming service that specializes in TV shows, especially those that have been aired recently?
Hulu
A(n) __________ is a complex system for acquiring, storing, organizing, using, and sharing data and information
Information System
___ is the act of having an online, text-based conversation with one or more individuals.
Instant messaging
Legal concepts have been created and refined to help protect __________, which are essentially products of the mind.
Intellectual Property
The __________ is the largest network in the world.
Internet
To access the Internet from home you must connect to a(n) __________, which typically involves making monthly payments to a telecommunications company.
Internet Service Provider
In which of the following social networking sites are you most likely to find professionals who seek to make business-related connections?
__________ allow various apps to recommend nearby restaurants or let you check-in at the establishment where you are currently located
Location based services
In a category of games known as _________, millions of players connect to various servers to team up with other players in very large virtual worlds.
MMORPGs
A(n) __________ is a huge, noncredit, online course that is offered for free by a variety of universities.
MOOC
Computers in Goverment
Military, Security, Taxes, Police
The __________ is the largest circuit board in a personal computer.
Motherboard
__ combine either inkjet or laser printing capabilities with scanning, photocopying, and faxing capabilities.
Multifunction Printers
Because of a technology known as __________, many smartphones can now be tapped on special payment devices to complete a purchase at select stores.
NFC
Many government agencies, such as the _________, monitor the Internet and mobile activities of individuals all over the world.
NSA
Which of the following fields involves the creation or manipulation of matter at the smallest possible scale?
Nanotechnology
The term __________ refers to the set of online behaviors that are considered polite and proper.
Netiquette
Network media helps carry data from one __________, or connection point, to another
Node
Which of the following is NOT a cloud storage service?
OnLive
The purpose of a(n) __________ is to manage the flow of data between hardware components and allow the user to communicate with the computer
Operating System
Which of the following is a DBMS that you might find a large business using?
Oracle
A(n) __________ is software designed to keep individuals organized.
PIM
Printer speed is measured in:
PPM
__ file sharing uses a distributed network of individual users instead of a central server to transfer files.
Peer to Peer
Online companies typically have a(n) on their websites that clearly state what information is collected from users and what is done with that information.
Privacy Policy
__ is a feature of all modern browsers that will delete your history, cache, and cookies the moment you close the browser.
Private browsing
Computers in Healthcare
Procedures, Research, Training, Medical Records
A(n) __________ is a storage system that links any number of disk drives so that they act as a single disk.
RAID
__ is the temporary workspace of a computer. It stores the content you are currently working on.
RAM
_______ computers are ones that have multiple hardware systems performing the same task at the same time.
Redundant
Which of the following is NOT a web browser?
Skype
Which type of software is used for entering, calculating, and analyzing sets of numbers, as well as creating graphs and charts?
Spreadsheet
Which types of computers are ideal for handling highly complex problems that require extreme calculating power?
Supercomputers
The __________ of a desktop computer is the case that houses the computer's critical parts, such as the processing and storage devices
System Unit
Which type of information system handles the processing and tracking of transactions?
TPS
A(n) __________ is a device that can capture television signals for viewing on a computer
TV tuner
___ is the primary storage device of a personal computer.
The hard drive
Which of the following is a pointing device that can be useful if you have very limited space on your desk?
Trackball
__ is the act of being annoying and antagonistic in areas such as online forums.
Trolling
192.168.1.101 is an example of an IP address.
True
4 out of 4 points Chromebooks have very little internal storage, relying mainly on cloud storage
True
A decision support system can include or access other types of data, such as stock market reports or data about competitors.
True
A programmer or software company will often release a beta version in order to test software in real-world conditions.
True
Google Goggles is a service that will identify many of the objects and barcodes that you point your mobile device's camera at.
True
Google's Street View shows you almost any part of a map as if you were driving through a particular street.
True
If a company hires an outside organization to handle its accounting, it is engaged in outsourcing
True
If you do not have a smart TV, a streaming player can bring a variety of online services to your TV.
True
In some operating systems, folders may be referred to as directories.
True
Modern ROM chips can be electronically reprogrammed.
True
No single person or group controls the Internet. It is a decentralized and cooperative community.
True
Some humanoid robots can already jog, climb stairs, recognize objects, and understand human speech.
True
Wireless networks use radio signals that travel through the air in order to transmit data.
True
With a subscription model, users pay a fixed amount of money per month in order to use software.
True
With speech recognition, it is possible to issue commands and search for information by speaking into your mobile device
True
Without proper cooling, a computer could overheat and malfunction.
True
Which of the following are thin, lightweight laptops that possess strong processing power and are more expensive than typical laptops?
Ultraportable computers
A(n) __________ employs a method called "tunneling" in which each packet from the sending computer is encapsulated within another packet before being sent over the Internet.
Virtual Private Network
Many feel that the future of gaming will involve __________ , where humans can experience realistic environments that are simulated by computers.
Virtual Reality
Which type of memory is nothing more than the use of your hard drive when you are running out of RAM?
Virtual memory
_ translates analog voice signals into digital data and uses the Internet to transport the data.
VoIP
___ is the act of alerting the public about harmful activities that are being hidden by an organization.
Whistleblowing
A(n) __________ is the device that all nodes connect to in order to communicate wirelessly.
Wireless Access Point
The __________ is a global system of linked, hypertext documents.
World Wide Web
Which type of malware is a fully contained program that self-replicates and spreads through networks?
Worm
Which of the following Wi-Fi standards is the fastest?
ac
Many mobile devices contain a(n) _________ and gyroscope that can sense even the smallest movements.
accelerometer
A(n) _________ is a document containing an organization's policies for the ethical, secure, and appropriate use of computing resources.
acceptable use policy
________ computers are personal computers that have all of the hardware integrated with the monitor
all in one computers
If you want to include a file with your email message, it should be placed it in the _________ area.
attachments
Google's Glass provides a basic __________ experience, where the real world is supplemented with computer-generated information.
augmented reality
Both fingerprint scanners and facial recognition are examples of:
biometrics
The most fundamental unit of computing is the __________ , which is typically represented as a 1 or a 0.
bit
Many network servers come in the form of thin units known as __________ servers, which can slide in and out of a rack that holds many of its companion servers.
blade servers
A(n) __________ is a web page or small website that contains a series of chronological posts and comments.
blog
The term __________ is used to describe any digital data connection that can transmit information faster than standard dial-up by using a wider band of frequencies.
broadband
If you want to clear an operating system's temporary files for storage, performance, or privacy reasons, you should run a disk _________ utility
cleanup
When using __________, your files can be stored online and accessed from any Internet-connected device
cloud storage
A _________ excels when it comes to installing, configuring, and supporting computer systems.
computer support specialist
One of the foundation blocks of intellectual property law is the__________, a legal concept that grants rights and control to the owner of any published work
copyright
Most of today's microprocessors have several processors, or _________, inside a single chip.
cores
The gathering of information from a large group of people is known as:
crowdsourcing
__________ consist of individual facts or pieces of information.
data
A computer __________ is simply an organized method for storing information.
database
Simply put, a computer _________ is an organized method for storing and retrieving information such as customers, employees, inventory, and sales records.
database
A _________ is responsible for configuring, maintaining, and securing an organization's database.
database administrator
Operating systems communicate with most hardware components using:
device drivers
Someone who possesses _________ has a broad understanding of computer technology and is able to use it well.
digital literacy
The ability to automatically print to both sides of a piece of paper is known as:
duplexing
Once a computer program is compiled, the IDE will produce a(n) _________ file that can be run by the operating system on a user's computer.
executable
"FinalEssay", "Birthday2014", and "Attachment_3" are all examples of file extensions.
false
Also known as RAID 1, striping writes data onto two or more disks simultaneously.
false
Although NSFNET offered connectivity to academic researches, it was much slower than the newer CSNET.
false
Although a MOOC allows any individual to register for online classes at Harvard and MIT, their high registration cost has limited their popularity
false
Although cloud backups are convenient, they have historically been more vulnerable to theft and damage than the backups kept in your home or business.
false
Although e-books are affordable, their adoption has been limited by the lack of photo support and the fact that they can be opened only by e-book readers.
false
Although high quality movies can easily be streamed in homes, the slower speed of mobile networks creates a poor viewing experience for streamed movies.
false
An active DSS collects and displays data in the format requested, while a passive DSS makes recommendations as to the best decision.
false
An information system is a large and highly-specialized server that hosts the database for large businesses, generally those with over 10,000 employees.
false
Copyright protection lasts 20 years after the date of publication or release.
false
In Windows, files are managed with a tool known as Finder. On a Mac, that tool is known as Explorer.
false
Keyboard covers for tablets generally plug into the headphone jack in order to communicate with the tablet.
false
Mac OS has the largest market share for personal computers.
false
Mainframe computers, which are the largest and most powerful computers in the world, are ideal for handling large and highly complex problems that require extreme calculating power.
false
Organizations create an extranet in order to allow their systems to have access to the rest of the Internet.
false
A(n)__________ cable consists of a thin strand of glass that transmits pulsating beams of light rather than electric current.
fiber-optic
A(n) __________ is a discussion board where individuals can ask questions and reply to each other.
forum
Although it is best to avoid any distractions when driving, __________ technology will at least let you keep your eyes on the road.
hands free technology
Some organizations offer an internal version of the Internet, called a(n):
intranet
A software _________ is a contract from the software creator that specifies the rules for using this software.
license
It is through _________ that a copyright holder can grant usage or distribution rights to others
licensing
______ computers are very large and powerful systems used in organizations where a heavy amount of processing and user requests need to be handled
mainframe
Collectively, all malicious programs are referred to as:
malware
Higher _________ cameras can capture more detail, but they will produce a larger image file on your storage media.
megapixel
Search _________, such as quotes and the minus sign, can narrow down the results provided by search engines
modifiers
The ability to run multiple programs at the same time is known as __
multitasking
A(n) _________ allows users to communicate and share information between computers.
network
A(n) __________ allows users to communicate and share information between computers.
network
A technology known as __________ can translate the image of a scanned document into text that can be edited and formatted.
optical character recognition (ocr)
Data moves through networks in structures known as __________, which are pieces of a message broken down into small units by the sending device and reassembled by the receiving device.
packets
Dividing a hard drive into multiple sections is known as:
partitioning
A file __________ is a complete address that describes the exact location of a file.
path
In the world of computing, _________ means acquiring or exchanging copies of protected digital creations without payment or permission from their creator.
piracy
In the world of computing, __________ means acquiring or exchanging copies of protected digital creations without payment to or permission from their creator
piracy
The USB __________ is the most popular type of plug found on desktop and laptop computers
port
Networks must follow rules, known as communication __________, to ensure that data is sent, received, and interpreted properly.
protocols
If you want to know the maximum number of pixels that a monitor can display on the screen, you would look at its:
resolution
The _________ of a monitor refers to the number of pixels that it can display on the screen.
resolution
Hackers often set up their own wireless access points in popular areas with the hope that users connect to them. These are known as:
rogue hotspots
A network _________ is a powerful computer with special software and equipment that enables it to function as the primary computer in a network.
server
A(n) __________ is a combination mobile phone and handheld computer
smartphone
_____ sites, such as Reddit, encourage users to share links to news and other interesting content they find on the web
social news
A _________ is responsible for the development of computer software.
software engineer
Junk mail, or __________, is unsolicited email that is sent in bulk
spam
The __________ topology, where nodes connect to a hub, is the most common type used today.
star
Often times, several office programs are bundled as a unit known as an office:
suite
A __________ is similar to a hub, but it is aware of the exact address or identity of all the nodes attached to it.
switch
The most popular ___________is the iPad from Apple
tablet
Photo sharing services allow you to _________ your photos with keywords, current location, and the names of people you know.
tag
A VPN employs a method called "tunneling" in which each packet from the sending computer is encapsulated within another packet before being sent over the Internet
true
A network allows users to communicate and share information between computers and various devices.
true
After software is acquired, it must typically be installed before it can be used.
true
An MIS system can provide different types of information or summaries to managers at different levels.
true
Input can take a variety of forms, such as the text you type with your keyboard or a variety of finger movements on the touchscreen of a mobile device.
true
It is possible to purchase a waterproof case for your mobile device.
true
Many computers do not need a video card because the video-processing circuitry is built directly into the motherboard.
true
Many social engineering tactics require very little expertise and can be as simple as looking through someone's trash or glancing at their desk.
true
Many thieves use the temptation of free (illegal) software to lure individuals into downloading malware on file-sharing services.
true
Since most browsers now have pop-up blockers built-in, few companies use pop-up advertisements today.
true
Some apps have the ability to monitor your sleep by using the sensors inside your device to measure how often you snore and move around
true
The "sports" in the address sports.yahoo.com refers to the subdomain.
true
some watches can display useful alerts and incoming messages from your smartphone.
true
A(n) _________ is a special environment that allows you to run an operating system on top of another operating system.
virtual machine
Yahoo and MSN are both examples of:
web portals
A(n) __________ is a collaborative information site that relies on the Internet community to both create and edit content.
wiki