CIS Final Exam
unlike memory, this type of storage holds data and programs eve after electric power to the computer system has been turned off: a. primary b. random-acess memory - RAM c. read-only memory - ROM d. secondary
7. d. secondary (ch1)
the next generation of optical discs
7. hi-def (ch7)
publishes short sentences that take only a few seconds to write
7. microblog (ch2)
Add-on programs for a variety of mobile devices, including smartphones and tablets.
7. mobile apps (ch3)
a computer specialist responsible for efficient network operations and implementation of new networks
7. network administrator (ch8)
used by scammers to trick internet users with official-looking websites
7. phishing (ch9)
image editors create images made up of thousands of dots known as _______.
7. pixels (ch3)
The _______ compares your entry against its database and returns the result, a list of sites on that topic.
7. search engine (ch2)
unlike hard disks, this type of storage does not have any moving parts, is more reliable, and requires less power
7. sold-state (ch1)
The most widely used character encoding standard today is _____.
8. Unicode (ch5)
_______ are invisible images or HTML code hidden within a webpage or e-mail message and are used to transmit information without your knowledge
8. Web bugs (ch9)
The most widely used personal computer operating system.
8. Windows (ch4)
this provides a pathway to connect parts of the CPU to each other: a. bus b. cable c. wired d. wireless
8. a. bus (ch5)
the use of the internet, cell phones, or other devices to send or post content intended to hurt or embarrass another person is known as: a. cyberbullying b. online harassment c. social networking discrimination d. unethical communication
8. a. cyberbullying (ch9)
this is the internet's equivalent to traditional cash: a. digital cash b. e-commerce c. ftp d. internet dollars
8. a. digital cash (ch2)
mobile devices able to store and display electronic media: a. e-book readers b. HDTV c. lasers d. whiteboards
8. a. e-book readers (ch6)
a utility program that copies all files in the libraries, contacts, favorites, and on the desktop: a. file history b. disk cleanup c. storage d. compactor
8. a. file history (ch4)
USB drives are also known as: a. flash drives b. optical drives c. ports d. universal state bus
8. a. flash drives (ch7)
type of program that guards computer system from viruses and other damaging programs
8. antivirus (ch4)
this type of file created by word processor, for example, memos, term papers, and letters: a. database b. document c. presentation d. worksheet
8. b. document (ch1)
a device that allows one LAN to be linked to other LANs or to larger networks: a. IDS b. network gateway c. PAN d. switch
8. b. network gateway (ch8)
programs that combine a variety of visual objects to create attractive, visually interesting presentations a. DBMS b. presentation software c. spreadsheet d. word processor
8. b. presentation software (ch3)
a type of scanning device such as fingerprint and iris (eye) scanner
8. biometric (ch9)
In a computer network, this node requests and uses resources available from other nodes.
8. client (ch8)
the most widely used communication device
8. modem (ch1)
Which of the following is true about an internal hard disk?
8. often stores the operating system (ch7)
This type of mouse emits and senses light to detect mouse movement.
8. optical (ch6)
electronic commerce involving individuals selling to individuals
8. search services (ch2)
similar to internal hard-disk drives except they use solid-state memory
8. solid-state drives (ch7)
a website that provides access to specific mobile apps is known as an app _______
8. store (ch3)
this bus connects the CPU to memory on the system board
8. system (ch5)
Which of the following is a collection of programs rather than a single program?
8. system software (ch1)
_______ messaging is the process of sending short electronic messages using a wireless network.
8. text (ch2)
this network, also known as hierarchical network, is often used to share corporatewide data
8. tree (ch8)
To create documents that consist primarily of text, you need this software.
8. word processor (ch3)
The web was introduced in _______.
9. 1991 (ch2)
A utility program that makes a copy of all files or selected files that are in the libraries, contacts, and favorites and on the desktop.
9. File History (ch4)
Which one of the following is not considered a form of secondary storage?
9. RAM (ch1)
this port can be used to connect many USB devices to the system
9. USB (ch5)
uses the internet and the web to shift many computer activities from a user's computer to computers on the internet: a. cloud computing b. high definition c. network d. solid-state storage
9. a. cloud computing (ch1)
typically using Wi-Fi technology, these wireless access points are available from public places such as coffee shops, libraries, bookstores, colleges, and universities: a. hotspots b. extranets c. PANs d. LANs
9. a. hotspots (ch8)
a troubleshooting utility that identifies and eliminates nonessential files, frees up valuable disk space. and improves system performance: a. file history b. disk cleanup c. storage d. compactor
9. b. disk cleanup (ch4)
virtual reality strives to create this type of experience: a. electronic b. immersive c. LCD d. liquid crystal
9. b. immersice (ch6)
the continuing internet development that allows objects to send and receive data over the internet: a. hypertext markup language - HTML b. internet of things - loT c. search engines d. web 2.0
9. b. internet of things - IoT (ch2)
the specialized port that connects musical instruments like an electronic keyboard to a sound card: a. eSTAT b. HDMI c. MIDI d. thunderbolt
9. c. MIDI (ch5)
an organizational strategy to promote efficient and safe use of data across the networks: a. cloud dynamic b. data mission statement c. enterprise storage system d. RAID
9. c. enterprise storage system (ch7)
special hardware and software used to control access to a corporation's private network is known as a(n): a. antivirus program b. communication gate c. firewall d. spyware removal program
9. c. firewall (ch9)
a type of suite that is stored as a server on the internet and is available anywhere you can access the internet
9. cloud (ch3)
The actual connecting or transmission medium that carries the message in a communication system is called the _______.
9. communication channel (ch8)
maintain huge databases relating to information provided on the web and the internet
9. consumer-to-consumer C2C (ch2)
program typically used to create sophisticated commercial websites a. game design programs b. illustration programs c. video editors d. web authoring programs
9. d. web authoring programs (ch3)
process of coding information to make it unreadable except to those who have a key
9. encryption (ch9)
Most general-purpose applications use a(n) _______ that displays graphical elements called icons to represent familiar objects.
9. graphical user interface (ch3)
the operating system operating on each virtual machine ______.
9. guest (ch4)
mass storage device widely used for home and small business storage
9. network attached storage (ch7)
in this network, nodes have equal authority and can act as both client and servers
9. peer-to-peer (ch8)
The series of dots that form the image on a monitor are called _______
9. pixels (ch6)
a type of a file that might contain, for example, audience handouts, speaker notes, and electronic slides
9. presentation (ch1)
Hard disks use tracks, sectors, and cylinders to store and organize files. true or false
9. true (ch7)
The number of bits that can travel simultaneously down a bus is known as the bus _____.
9. width (ch5)
_______ indicates a monitor's ability to display colors by comparing the light intensity of the brightest white to the darkest black.
1. Contrast ratio (ch6)
_____ programs reduce the size of files so they require less storage space.
1. File compression (ch4)
The _______ is the continuing development of the Internet that allows everyday objects embedded with electronic devices to send and receive data over the Internet.
1. Internet of Things (ch1)
the three primary privacy issues are accuracy, property, and: a. access b. ethics c. ownership d. security
1. a. access (ch9)
the concept related to using computer networks to link people and resources: a. connectivity b. GPS c. TCP/IP d. Wi-Fi
1. a. connectivity (ch8)
the keyboard, mouse, display, and system unit are: a. hardware b. output devices c. storage devices d. software
1. a. hardware (ch1)
RAM is sometimes referred to as: a. primary storage b. ratio active memory c. read-only memory d. secondary storage
1. a. primary storage (ch7)
privacy concern that relates to the responsibility to ensure correct data collection
1. accuracy (ch9)
the network that connects computers all over the world: a. ARPANTET b. internet c. LAN d. web
1. b internet (ch2)
type of network topology in which each device is connected to a common cable called a backbone
1. bus (ch8)
toolbars typically appear below the menu bar and include small graphic elements called ________.
1. buttons (ch3)
this type of software works with end users, application software, and computer hardware to handle the majority of technical details. a. ribbon b. specialized c. system d. utility
1. c. system (ch3)
this container house most of the electrical components for a computer system: a. chip carrier b. system board c. system unit d. unicode
1. c. system unit (ch5)
the most popular internet activity
1. communicating (ch2)
Most keyboards use an arrangement of keys known as: a. Alpha b. Daisy c. OptiKey d. QWERTY
1. d. QWERTY (ch6)
what type of software works with users, application software, and computer hardware to handle the majority of technical details? a. application b. desktop c. linux d. system
1. d. system (ch4)
Which physical connection is the fastest?
1. fiber-optic cable (ch8)
USB drives are also known as _______ drives.
1. flash (ch7)
References and _______connect to other documents or web pages containing related information.
1. hyperlinks (ch2)
These are specialized graphics programs for editing or modifying digital photographs.
1. image editors (ch3)
The system board is also known as the _____.
1. motherboard (ch5)
a type of multiprocessor chip that provides two or more separate and independent CPUs.
1. multicore (ch5)
_______ attempts to trick Internet users into thinking a fake but official-looking website or e-mail is legitimate
1. phishing (ch9)
Consists of the step-by-step instructions that tell the computer how to do its work.
1. presentation (ch1)
provides permanent or nonvolatile storage.
1. secondary storage (ch7)
programs that perform specific tasks related to managing computer resources
1. utilities (ch4)
_____ programs guard your computer system against viruses or other damaging programs that can invade your computer system.
10. Antivirus (ch4)
_______ tags are tiny chips that can be embedded into almost anything and contain information used to track and locate lost pets; to monitor production and update inventory; to record prices, product descriptions, and locations of retail items.
10. RFID (ch6)
also known as an online office suite a. cloud suite b. integrated suite c. business suite d. utility suite
10. a. cloud suite (ch3)
the study of human factors related to things people use is: a. ergonomics b. RFID c. RSI d. UAV
10. a. ergonomics (ch6)
bus, ring, star, tree, and mesh are five types of network: a. topologies b. protocols c. strategies d. devices
10. a. topologies (ch8)
Which of the following measures the amount of time required by the storage device to retrieve data and programs?
10. access speed (ch7)
to prevent copyright violations, corporations often use: a. ACT b. DRM c. VPN d. WPA2
10. b. DRM (ch9)
the largest network in the world is [the]: a. facebook b. internet c. supercomputer d. web
10. b. internet (ch1)
three basic components to cloud computing are clients, internet, and _______. a. CSS b. service providers c. streaming d. web 3.0
10. b. service provider (ch2)
computers can only recognized this type of electronic singal: a. analog b. bus c. digital d. maximum
10. c. digital (ch5)
specialized high-capacity secondary storage devices designed to meet organizational demands: a. CD devices d. flash drives c. mass storage system d. platters
10. c. mass storage system (ch7)
bitdefender, and norton are examples of: a. application packages b. apps c. operating systems d. utility suites
10. d. utility suites (ch4)
Corporations often use this to prevent copyright violations
10. digital rights management (DRM) (ch9)
program that works with the operating system to allow communication between a device and the rest of a computer system is called a device _______.
10. driver (ch4)
the basic components of cloud computing are clients, service providers, and the _______.
10. internet (ch2)
work with firewalls to protect an organization's network
10. intrusion detection systems (ch8)
In most personal computer systems, the CPU is contained on a single chip called the _____.
10. microprocessor (ch5)
The Internet is the largest _______ in the world.
10. network (ch1)
a communications system connecting two or more computers
10. network (ch1)
This device enables connectivity between two LANS or a LAN and a larger network.
10. network gateway (ch8)
an ethical issue relating to using another person's work and ideas as your own without giving credit to the original source
10. plagiarism (ch9)
a socket for external devices to connect to the system unit
10. port (ch5)
Programs that combine a variety of visual objects to create attractive, visually interesting presentations are called:
10. presentation software (ch3)
Architecture to link remote storage devices to computers such that the devices are as available as locally attached drives.
10. storage area network (ch7)
a type of specialized suite that includes a variety of programs designed to make computing easier and safer
10. utility (ch3)
A _______ is a website specially designed to allow visitors to use their browser to add, edit, or delete the site's content.
10. wiki (ch2)
_______ is the use of the Internet, smartphones, or other devices to send or post content intended to hurt or embarrass another person
11. Cyberbullying (ch9)
Every computer on the Internet has a unique numeric address called a(n) _______.
11. IP address (ch8)
_______ organize, analyze, and graph numeric data such as budgets and financial reports.
11. Spreadsheet programs (ch3)
The processing speed of a microprocessor is typically represented by its _____.
11. clock speed (ch5)
With _______, or online storage, you can access your files from any computer with an Internet connection.
11. cloud storage (ch7)
Which of the following printer features enables you to print on both sides of a sheet of paper?
11. duplex (ch6)
Identify the program that coordinates computer resources, provides an interface between users and the computer, and runs applications.
11. operating system (ch1)
This system software is responsible for managing your computer's resources including memory, processing, and storage.
11. operating system (ch4)
Unsolicited e-mail is called _______.
11. spam (ch2)
The windows troubleshooting utility that identifies and eliminates nonessential files is called _____.
12. Disk Cleanup (ch4)
_______ is the distance between pixels on a monitor.
12. Dot pitch (ch6)
_______ are all about making people (end users) more productive.
12. Personal computers (ch1)
Apple's Mail and Microsoft's Outlook are examples of a _______.
12. client-based e-mail system (ch2)
Mass storage devices are specialized high-capacity secondary storage devices designed to store large amounts of data for an organization. true or false
12. cloud storage (ch7)
These programs are used to create and edit vector images.
12. illustration programs (ch3)
The _______ is the central node that coordinates the flow of data by sending messages directly between the sender and receiver nodes.
12. switch (ch8)
This type of computer is a thin slab that is almost all monitor with the system unit located behind the monitor.
12. tablet (ch5)
Computers infected by a virus, worm, or Trojan horse that allows them to be remotely controlled for malicious purposes are called _______
12. zombies (ch9)
_______ describes how a network is arranged and how resources are coordinated and shared.
13. Network architecture (ch8)
_______ is representing some other person's work and ideas as your own without giving credit to the original source
13. Plagiarism (ch9)
_______ are programs that combine a variety of visual objects to create attractive, visually interesting presentations.
13. Presentation software (ch3)
_______ are cell phones with wireless connections to the Internet.
13. Smartphones (ch1)
_______ cash is the Internet's equivalent to traditional cash.
13. digital (ch2)
The distance between each pixel.
13. dot pitch (ch6)
The _____, also known as the system chassis, is a container that houses most of the electronic components that make up a computer system.
13. system unit (ch5)
_______ improves hard-disk performance by anticipating data needs and reducing time to access data from secondary storage. true or false
13. true (ch7)
Disk Cleanup, File History, and Disk Defragmenter are all examples of _____ programs.
13. utility (ch4)
A website that provides access to specific mobile apps that can be downloaded either for a nominal fee or free of charge.
14. App store (ch3)
These discs have a capacity of 50 gigabytes on one side.
14. Blu-ray (ch7)
_______ printers are printers connected to the Internet that provide printing services to others on the Internet.
14. Cloud (ch6)
Which among the following is a fraudulent or deceptive act designed to trick individuals on the Internet into spending time or money for little or no return?
14. Internet scam (ch9)
_____ cards are used to connect a computer to a network.
14. Network adapter (ch5)
This computer component holds the program and data that is currently being processed.
14. RAM (ch1)
A _______ network topology does not use a specific physical layout, but requires that each node have more than one connection to the other nodes.
14. mesh (ch8)
The _____ system coordinates computer resources, provides the user interface, and runs applications.
14. operating (ch4)
For browsers to connect to resources on the Internet, the location of the resources must be specified through addresses called _______.
14. uniform resource locators (URLs) (ch2)
A(n) _____-bit-word computer can access 8 bytes of information at a time.
15. 64 (ch5)
_______ encrypt connections between company networks and remote users, such as workers connecting from home, creating a secure virtual connection to a company LAN across the Internet
15. Virtual private networks (ch9)
This type of network strategy uses central servers to coordinate and supply services to other nodes on the network.
15. client/server (ch8)
Most operating systems support the ability to switch between different applications. This is called _____.
15. multitasking (ch4)
This GUI uses interrelated ribbons, tabs, and galleries.
15. ribbon (ch3)
On a hard disk each track is divided into invisible wedge-shaped sections called _______.
15. sectors (ch7)
The arrangement of keys on a keyboard, QWERTY reflects the keyboard layout by _______.
15. taking the letters of the first six alphabetic characters found on the top row of keys (ch6)
The five types of personal computers are: desktops, laptops, tablets, smartphones, and _____.
15. wearables (ch1)
In a(n) _______ sellers post descriptions of products at a website and buyers submit bids electronically.
15. web auction (ch2)
A 32-bit-word computer can access _____.
2. 4 bytes at a time (ch5)
This type of e-commerce often resembles the electronic version of the classified ads or an auction.
2. C2C (ch2)
_______ programs allow you to mix text and graphics to create publications of professional quality.
2. Desktop publishing (ch3)
a widely used internet protocol
2. TCP/IP (ch8)
a high-frequency transmission cable that delivers television signals as well as connects computers in a network: a. coaxial b. hi-def c. 3D d. twisted pair
2. a. coaxial (ch8)
browsers store the locations of sites visited in a: a. history file b. menu c. tool bar d. firewall
2. a. history file (ch9)
the actual physical material that holds the data and programs: a. primary storage b. media c. capacity d. access
2. b. media (ch7)
the device that controls a pointer displayed on the monito: a. cord b. mouse c. printer d. scanner
2. b. mouse (ch6)
programs that coordinate computer resources, provide an interface, and run applications are known as: a. application programs b. operating systems c. storage systems d. utility programs
2. b. operating systems (ch1)
the rules for exchanging data between computers: a. DSL b. protocols c. web d. WWW
2. b. protocols (ch2)
highly detailed and personalized descriptions of individuals are electronic: a. cookies b. histories c. profiles d. web bugs
2. c. profiles (ch9)
the most popular mobile device: a. all-in-one b. desktop c. smartphone d. ultrabook
2. c. smartphone (ch5)
The use of the Internet, smartphones, or other devices to send or post content intended to hurt or embarrass another person
2. cyberbullying (ch9)
the programs that convert programming instructions written by programmers into a language that computers understand and process are language: a. converters b. linguists c. managers d. translators
2. d. translators (ch4)
a rectangular area that can contain a document, program, or message: a. dialog box b. form c. frame d. window
2. d. window (ch3)
Troubleshooting or _____ programs recognize and correct problems.
2. diagnostic (ch4)
simplifies that process of making selection from a list of alternative by graphically displaying the effect of alternative before being selected
2. galleries (ch3)
A wireless access point that provides Internet access in a public place such as a coffee shop, library, bookstore, or university.
2. hotspot (ch8)
individuals who collect and sell personal data
2. information broker (ch9)
the most common way to access the internet is throught a(n)______.
2. internet service provider - ISP (ch2)
Desktop, laptop, and tablet computers, and mobile devices are classified as _______.
2. personal computers (ch1)
a type of memory that is volatile or loses it contents when power is turned off
2. random-access (ch5)
another name for a program
2. software (ch1)
hardware that reads data and programs from storage media
2. storage devices (ch7)
A keyboard key, like Caps Lock, that turns a feature on or off is called a _______ key.
2. toggle (ch6)
DVD stands for digital _______ disc.
2. versatile (ch7)
restarting a running computer without turning off the power
2. warm boot (ch4)
_______ scanning devices use fingerprints and iris scanners to identify individuals
3. Biometric (ch9)
_______ do not use streaming technology and are used to download media files to your computer.
3. Podcasts (ch2)
_______ storage devices do not lose data or programs after the electrical power is turned off.
3. Secondary (ch1)
_____ buses connect the CPU to memory on the system board.
3. System (ch5)
_______ are used on smartphones and other small portable devices.
3. Virtual keyboards (ch6)
a short-range radio communication standard that transmits data over distances of up to approximately 33 feet: a. bluetooth b. broadband c. DSL d. TCP/IP
3. a. bluetooth (ch8)
measures how tightly the magnetic charges can be packed next to one another on the disk: a. density b. cylinders c. tracks d. sectors
3. a. density (ch7)
using file transfer utility software, you can copy files to your computer from specially configured servers on the internet. this is called: a. downloading b. filtering c. blogging d. uploading
3. a. downloading (ch2)
a browser is an example of a: a. general-purpose application b. specialized program c. system application d. utility program
3. a. general-purpose application (ch1)
Creating a website is called web _______.
3. authoring (ch3)
the ability to switch between different applications stored in memory is called: a. diversion b. multitasking c. operational interference d.programming
3. b. multitasking (ch4)
the type of screen that can be touched with more than one finger and supports zooming in and out by pinching and stretching your fingers: a. digital b. dynamic c. multitouch d. OLED
3. c. multitouch (ch6)
What is it called when servers on the Internet supply applications as a service, rather than a product?
3. cloud computing (ch7)
small data files deposited on your hard disk from websites you have visited
3. cookies (ch9)
the mainboard or motherboard is also known as the: a. computer b. board processor c. mobile system d. system board
3. d. system board (ch5)
programs that create text-based documents a. DBMS b. suites c. spreadsheets d. work processors
3. d. work processors (ch3)
transmission of electronic messages over the internet
3. e-mail (ch2)
uses high-frequency radio waves
3. microwave (ch8)
type of operating system that controls and coordinates networked computers
3. networking operating systems NOS (ch4)
The _____ is often referred to as the software environment or software platform.
3. operating system (ch4)
system board component that provides a connection point for specialized cards or circuit boards
3. slots (ch5)
Enables the application software to interact with the computer hardware.
3. system software (ch1)
concentric rings on a hard-disk platter.
3. tracks (ch7)
One of the most dramatic changes in connectivity and communications in the past few years has been _______.
3. widespread use of mobile devices with wireless Internet connectivity (ch8)
a general-purpose program that creates text-based documents
3. word processor (ch3)
The _____ utility program identifies and eliminates nonessential files.
4. Disk Cleanup (ch4)
_______ are programs that migrate through networks and operating systems and attach themselves to various other programs and databases
4. Viruses (ch9)
when a read-write head makes contact with the hard disk's surface, it causes a head: a. crash b. land c. pit d. scratch
4. a. crash (ch7)
although not as powerful as a supercomputer, this type of computer is capable of great processing speeds and data storage: a. main frame b. midrange c. laptop d. tablet
4. a. main frame (ch1)
signal that are continuous electronic waves
4. analog (ch8)
A(n) _______ store is typically a website that provides access to specific mobile apps that can be downloaded either for a nominal fee or free of charge.
4. app (ch3)
how many bytes can a 32-bit-word computer access at one time? a. 1 b. 4 c. 8 d. 16
4. b. 4 (ch5)
communities of individuals who share a common interest typically create facebook: a. clients b. groups c. pages d. profiles
4. b. groups (ch2)
graphic representation for a program, type of file, or function: a. app b. icon c. image d. software
4. b. icon (ch4)
Supermarkets use _______ to scan codes printed on product containers.
4. bar code readers (ch6)
Google Chrome is an example of a web _______.
4. browser (ch2)
the browser mode that ensures your browsing activity is not recorded: a. detect b. insert c. privacy d. sleep
4. c. privacy (ch9)
programs that organize, analyze, and graph numerical data such as budgets and financial reprots a. DBMS b. suites c. spreadsheets d. work processors
4. c. spreadsheets (ch3)
The _______ of a secondary storage device indicates how much data the storage medium can hold.
4. capacity (ch7)
two popular instant messaging services are google talk and facebook______.
4. chat (ch2)
flatbed and document are types of: a. headset b. maxicode c. monitors d. scanners
4. d. scanners (ch6)
the speed with which a modem transmit data is called its: a. digital velocity b. dynamic rate c. modular rating d. transfer rate
4. d. transfer rate (ch8)
type of computer that is small enough to fit on top of or alongside a desk yet is too big to carry around
4. desktop (ch1)
Which of the following ports provide high-speed connections for external hard-disk drives, optical discs, and other large secondary storage devices?
4. eSATA (ch5)
This type of network topology does not use a specific physical layout.
4. mesh (ch8)
an operating system is often referred to as the software environment or software _______
4. platform (ch4)
In most cases, the word "software" is interchangeable with the word _______.
4. program (ch1)
each tracks is divided into invisible wedge-shaped sections called _______.
4. sectors (ch7)
provide connection points for chips
4. sockets (ch5)
program that organizes, analyzes, and graphs numerical data
4. spreadsheet (ch3)
wide range of programs that secretly record and report an individual's activities on the internet
4. spyware (ch9)
_______ is the illegal assumption of someone's identity for the purposes of economic gain
5. Identity theft (ch9)
_____ operating systems are used to control and coordinate computers that are linked together.
5. Network (ch4)
_______ are countrywide and worldwide networks.
5. Wide area networks (ch8)
device used by banks to automatically read those unusual numbers on the bottom of checks and deposit slips: a. MICR b. FDIC c. OMR d. UPC
5. a. MICR (ch6)
this hard-disk performance enhancement anticipates data needs: a. disk caching b. file compression c. file decompression d. RAID
5. a. disk caching (ch7)
the bandwidth typically used for DSL, cable, and satellite connections to the internet: a. baseband b. broadband c. medium band d. voiceband
5. b. broadband (ch8)
in a personal computer system, the central processing unit is typically contained on a single: a. bus b. chip c. module d. RAM
5. b. chip (ch5)
program that allows you to mix text and graphics to create publications of professional quality a. database b. desktop publishing c. presentation d. productivity
5. b. desktop publishing (ch3)
Pathways that support communication among the various electronic components on the system board are called _____.
5. bus lines (ch5)
the information that people voluntarily post in social networking sites, blogs, and photo-and video-sharing sites is used to create their: a. access approval b. firewall c. online identity d. phish
5. c. online identity (ch9)
a type of memory that improves processing by acting as a temporary high-speed holding area between the memory and the CPU
5. cache (ch5)
this operation system feature is controlled by a mouse and changes shape depending on its current function: a. dialog box b. menu c. mouse d. pointer
5. d. pointer (ch4)
Apple's Watch is what type of computer? a. laptop b. smartphone c. tablet d. wearable
5. d. wearable (ch1)
type of e-mail account that does not require an e-mail program to be installed on a user's computer is: a. blog-based b. client-based c. utility-based d. web-based
5. d. web-based (ch2)
The electronic equivalent of a file cabinet is a _______.
5. database (ch3)
a collection of related data
5. database (ch3)
"Wiki" comes from the Hawaiian word for _______.
5. fast (ch2)
increases storage capacity by reducing the amount of space required to store data and programs
5. file compression (ch7)
The equipment that processes data in order to create information is called the _______.
5. hardware (ch1)
a business-oriented social networking site
5. linkedin (ch2)
The most common card reader is the _______ card reader which reads encoded information stored on a thin magnetic strip located on the back of the card.
5. magnetic (ch6)
malicious programs that damage or disrupt a computer system
5. malware (ch9)
switching between different applications
5. multitasking (ch4)
Optical discs use these to represent data.
5. pits and lands (ch7)
rules for exchanging data between computers
5. protocols (ch8)
a container that houses most of the electronic components that make up a computer system
5. system unit (ch1)
A service that uses existing phone lines to provide high-speed connections is called _______.
6. DSL (ch8)
optical disc most common on today's personal computers
6. DVD (ch7)
These types of ports typically provide high-definition video and audio, making it possible to use a computer as a video jukebox or an HD video recorder.
6. HDMI (ch5)
Which of the following will not retain data after the computer is turned off?
6. RAM (ch1)
_______ are specialized digital video cameras that capture images and send them to a computer for broadcast over the Internet.
6. Webcams (ch6)
every computer on the Internet has a unique numeric address called a(n): a. IP address b. DNS c. broadcast d. packet
6. a. IP address (ch8)
the operating system based on linux, designed for notebook computers that use cloud computing and cloud storage: a. chrome b. mac c. UNIX d. windows
6. a. chrome (ch4)
computer criminals who create and distribute malicious programs: a. antispies b. crackers c. cyber traders d. identity thieves
6. b. crackers (ch9)
RAM is a type of: a. computer b. memory c. network d. secondary storage
6. b. memory (ch1)
individual website to keep in touch with friends and family
6. blog (ch2)
the most widely used audio-imput device: a. mouse b. VT c. microphone d. RFID
6. c. microphone (ch6)
this type of storage uses pits and lands to represent 1s and 0s: a. cloud b. hard disk c. optical d. solid state
6. c. optical (ch7)
the most popular microblogging site: a. linkedin b. google+ c. twitter d. wikipedia
6. c. twitter (ch2)
This is a legal concept that gives content creators the right to control use and distribution of their work
6. copyright (ch9)
the type of image that consists of geometric shapes a. bitmap b. raster c. ribbon d. vector
6. d. vector (ch3)
this type of memory divides large programs into parts and stores the parts on a secondary storage device: a. direct b. expanded c. random-access d. virtual
6. d. virtual (ch5)
a type of memory that provides a combination of features of RAM and ROM
6. flash (ch5)
also known as a photo editor, this specialized graphics program edits or modifies digital photographs
6. image editor (ch3)
any device that is connected to a network
6. node (ch8)
devices that translate the processed information from the computer into a form that humans can understand
6. output (ch1)
These organize commonly used commands into sets of related activities.
6. ribbons (ch3)
Tracks are divided into invisible wedge-shaped sections called _______.
6. sectors (ch7)
The most popular microblogging site is _______.
6. twitter (ch2)
When a single physical computer runs this type of software, it operates as though it were two or more separate and independent computers.
6. virtualization (ch4)
a type of software that allows a single physical computer to operate as though it were two or more separate and independent computers
6. virtualization (ch4)
infected computers that can be remotely controlled
6. zombies (ch9)
_______ is concerned with protecting software and data from unauthorized tampering or damage
7. Data security (ch9)
_____ programs reduce the size of files so they require less storage space and can be sent more efficiently over the Internet.
7. File compression (ch4)
_______ memory cards are a form of a solid-state storage device widely used in smartphones, digital media players, and GPS navigation systems.
7. Flash (ch7)
another name for a network adapter card
7. NIC (ch5)
A(n) _______ is any injury that is caused by fast, repetitive work that can generate neck, wrist, hand, and arm pain.
7. RSI (ch6)
The _______ provides a multimedia interface to the numerous resources available on the Internet.
7. World Wide Web or the web (ch1)
DVD stands for: a. digital versatile disc b. digital video data c. dynamic versatile disc d. dynamic video disc
7. a. digital versatile disc (ch7)
programs that come into a computer system disguised as something else are called: a. trojan horses b. viruses c. web bugs d. zombies
7. a. trojan horses (ch9)
mobile operating system that is owned by google and is widely used in many smartphones
7. android (ch4)
sometimes referred to as a LAN adapter, these expansion cards connect a computer to a network: a. PCMCIA b. NIC c. server d. VPN
7. b. NIC (ch8)
an online diary or commentary a. bitmap b. blog c. HTML d. vector
7. b. blog (ch3)
the monitor feature that indicates the ability to display colors: a. aspect ratio b. contrast ratio c. dot pitch d. resolution rate
7. b. contrast ratio (ch6)
using a keyword, a search engine returns a list of related sites known as: a. blogs b. hits c. podcasts d. strikes
7. b. hits (ch2)
the mobile operating system developed by apple and originally called iphone os: a. android b. iOS c. macOS d. phone OS
7. b. iOS (ch4)
The _____ system consists of only two digits—0 and 1.
7. binary (ch5)
Using this type of communications channel, several users can simultaneously use a single connection for high-speed data transfer.
7. broadband (ch8)
also known as NIC, this adapter card is used to connect a computer to a(n): a. AIA b. expansion c. graphics d. network
7. d. network (ch5)