CIS quiz 3 and 4
Popular applications of ______ reality include gaming, healthcare, fashion, business, and training. Question 5 options: 1) virtual 2) virus 3) word processing 4) accounting 5) inventory
1) virtual
Personal interest applications include all of the following EXCEPT _____. Question 6 options: 1) lifestyle applications 2) entertainment applications 3) convenience applications 4) medical applications 5) legal applications
5) legal applications
Which best describes an app? Question 8 options: 1) A program that makes users more productive. 2) A series of related instructions. 3) Coordinates activities among computer or mobile device hardware. 4) Enables you to manage devices and media. 5) A hyperactive drive for transportation.
A program that makes users more productive.
Some peripheral devices use wireless communications technologies. Examples include ______. Question 39 options: 1) Thunderbolt and Lightning 2) Bluetooth and NFC 3) Zigbee and Lightning 4) Mesh and Thunderbolt 5) tablet and thin client
Bluetooth and NFC
Which of the following is NOT true about servers? Question 38 options: 1) Servers are typically located in a server farm. 2) Dedicated servers typically do not require a fast processor and use little memory. 3) Form factors for servers include rack, blade, and tower. 4) Services provided by servers include storing content and controlling access to network resources. 5) In many cases, a server accesses data, information, and programs on another server.
Dedicated servers typically do not require a fast processor and use little memory.
______ authoring software allows users to combine text, graphics, audio, video, and animation in an interactive application. Question 2 options: 1) Multimedia 2) Process 3) Website 4) Image 5) CAD
Multimedia
Which statement is NOT true about presentation software? Question 9 options: 1) Presentations are visual aids to communicate information to a group. 2) Presentations are viewed as clip shows. 3) Presentation software typically provides a variety of layouts for each slide. 4) When building a presentation, users can set the timing and add special effects. 5) Presentation software is a productivity app.
Presentations are viewed as clip shows.
Disc defragmentation is best described as __________. Question 3 options: 1) Reorganizing the hard disk so that files are stored in contiguous sectors. 2) Removing unnecessary files. 3) Compressing backup and other files to increase disk storage. 4) Installing partitions on the hard disk in order to run separate operating systems on the same computer. 5) A tool that removes a program, as well as any associated entries in the system files.
Reorganizing the hard disk so that files are stored in contiguous sectors.
______ software helps businesses record and report financial transactions. Question 7 options: 1) sales 2) marketing 3) accounting 4) inventory 5) shop floor
accounting
Product ______ is a technique that some manufacturers use to ensure you do not install software on more computers than legally licensed. Question 2 options: 1) certification 2) authorization 3) enrollment 4) activation 5) ordering
activation
Annoying programs that display an online advertisement in a banner or pop-up or pop-under window on webpages, email messages, or other Internet services are called ______. Question 12 options: 1) spyware 2) cracker 3) adware 4) open source 5) viral
adware
Ergonomics is ___________. Question 24 options: 1) often used with tablets and other mobile computers 2) a small, mobile computing device designed to be worn 3) a lightweight computer that enables warehouse employees to take inventory and check supplies 4) an applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace 5) a stable current flow and minimize the chances of an overvoltage reaching the computer and other electronic equipment
an applied science devoted to incorporating comfort, efficiency, and safety into the design of items in the workplace
A(n) _____ protects a computer against viruses by identifying and removing any computer viruses found in memory, on storage media, or on incoming files. Question 4 options: 1) antivirus program 2) trojan horse program 3) open source program 4) email program 5) legal program
antivirus program
You are viewing a 3D graphic of a human body that you can use to visualize various muscles and organs by zooming in and out. What type of app are you likely using? Question 17 options: 1) media player 2) augmented reality 3) video 4) CBT 5) digital camera
augmented reality
Fitness games often communicate with a(n) __________ board, which is shaped like a weight scale and contains sensors. Question 34 options: 1) step 2) motion 3) activity 4) wafer 5) balance
balance
Which communication application type requires real-time interaction? Question 8 options: 1) blog 2) mobile messaging 3) chat 4) email 5) file transfer
chat
______ computing refers to an environment that provides resources and services accessed via the Internet. Question 37 options: 1) Virtual 2) Cloud 3) Regional 4) Global 5) Intranet
cloud
The purpose of a __________ is to join a cable to a port.
connector
_______ often are used with tablets and other mobile computers, providing connections to peripheral devices. Question 23 options: 1) Lightning 2) Docking stations 3) Terminals 4) Triggers 5) Kiosks
docking stations
You are developing a spreadsheet for your small business. You are in the process of removing and adding text. What phase are you in? Question 5 options: 1) creation 2) editing 3) formatting 4) printing 5) sharing
editing
Examples of a(n) ______ computer for automobiles include antilock brakes, airbag control units, and cruise control. Question 24 options: 1) embedded 2) kiosk 3) desktop 4) tracker 5) stick
embedded
Sales, marketing, and manufacturing are all types of software typically used by a(n) ______. Question 15 options: 1) enterprise 2) individual 3) power user 4) server 5) accountant
enterprise
What part of the body does CVS impact? Question 31 options: 1) eyes 2) legs 3) ears 4) arms 5) wrists
eyes
What is the category of programs and apps under which screen savers and backup programs fall? Question 7 options: 1) security 2) communication 3) project management 4) productivity 5) file, disk, and system management
file, disk, and system management
_____ detect and protect a computer and its data from unauthorized intrusions. Question 20 options: 1) Personal firewalls 2) Phishing poles 3) CAD programs 4) Open source 5) Spam programs
firewalls
An example of a ________ computer is a lightweight computer that enables warehouse employees to take inventory and check supplies. Question 29 options: 1) stick 2) super 3) handheld 4) power 5) turbo
handheld
Search tools typically use a(n) ______, which stores a variety of information about a file. Question 9 options: 1) index 2) signature 3) directory 4) header 5) crab
index
Data that a computer accepts and processes is called ______. Question 40 options: 1) input 2) bytes 3) digital facts 4) output 5) information
input
A self-service ______ is a freestanding terminal that usually has a touch screen for user interaction. Examples include financial, photo, and ticket. Question 22 options: 1) server 2) stick 3) desktop 4) kiosk 5) laptop
kiosk
Sometimes called a system board, a(n) ______ is the main circuit board of a personal computer. Question 27 options: 1) dynamic 2) sisterboard 3) motherboard 4) Q-port 5) micro
motherboard
A(n) ______ app is written for a specific platform and can take advantage of specific features of the devices on which they are installed. Question 11 options: 1) native 2) embedded 3) creative 4) closed 5) open
native
______ software is an application that enables users to enter typed text or handwritten comments on a page. Question 13 options: 1) Memo writer 2) Word processing 3) Note taking 4) Text editor 5) Data storage
note taking
Which of the following is NOT an example of an operating system? Question 14 options: 1) macOS 2) Android 3) Office 4) Windows 5) iOS
office
Linux is an example of a(n) ______. Question 13 options: 1) backup utility 2) operating system 3) lifestyle app 4) security software 5) stable wearable
operating system
Information produced and stored by a computer is called ______. Question 25 options: 1) output 2) accurate 3) data 4) input 5) filler
output
A scam in which a perpetrator sends an official-looking email message that attempts to obtain your personal and/ or financial information is termed ________. Question 12 options: 1) phishing 2) standing 3) adware 4) email 5) instant messaging
phishing
The smallest element in an electronic image is called a(n) _______. Question 35 options: 1) HDMI 2) graph 3) pixel 4) CVS 5) thunderbolt
pixel
Font size is gauged by a measurement system called ______. Question 6 options: 1) points 2) pixels 3) em units 4) kerning 5) bytes
points
The point at which a peripheral device attaches to or communicates with a computer or mobile device is termed a(n) _______. Question 21 options: 1) terminal 2) kiosk 3) port 4) pixel 5) handheld
port
Another term for overvoltage is a(n) ______ surge. Question 28 options: 1) lightning 2) over 3) triple 4) power 5) trap
power
The two main components on the motherboard are ________. Question 22 options: 1) memory and storage 2) interpreter and compiler 3) processor and memory 4) storage and processor 5) compiler and processor
processor and memory
Under what category of programs and apps do databases and enterprise computing fall? Question 11 options: 1) productivity 2) security 3) file, disk, and system management 4) communication 5) project management
productivity
You are in charge of an event at work. You want to plan and schedule events and resources. What type of software should you use? Question 4 options: 1) project management 2) calendar 3) database 4) software suite 5) word processing
project management
Open source software is best described as _______. Question 1 options: 1) provided for use, modification, and redistribution 2) distributed at no cost for a trial period 3) copyrighted software provided at no cost 4) donated for public use and has no copyright restrictions 5) freemium
provided for use, modification, and redistribution
A(n) ______ is a request for specific data from a database. Question 18 options: 1) query 2) retrieval 3) filter 4) function 5) store
query
You use a POS terminal at work. Which of the following is the type of business at which you likely work? Question 33 options: 1) retail 2) financial 3) healthcare 4) research laboratory 5) library
retail
A computer dedicated to providing one or more services to other computers on a network is called a(n) ________. Question 30 options: 1) stick 2) desktop 3) server 4) laptop 5) tablet
server
oftware as a(n) ______ describes a model in which a software provider hosts applications and makes them available to users via the Internet. Question 3 options: 1) service 2) vendor 3) package 4) safety 5) search
service
An unsolicited email message or posting sent to many recipients or forums at once. Spam is considered Internet junk mail is called _______. Question 10 options: 1) spam 2) adware 3) spyware 4) viral 5) open source
spam
A type of program placed on a computer or mobile device without the user's knowledge that secretly collects information about the user and then communicates the information it collects to some outside source while the user is online is called _____. Question 10 options: 1) spyware 2) cracker 3) adware 4) open source 5) viral
spyware
A(n) ______ computer is a small computer usually the same size as a USB flash drive. Question 29 options: 1) laptop 2) tablet 3) desktop 4) stick 5) pen
stick
To provide a stable current flow and minimize the chances of an overvoltage reaching the computer and other electronic equipment, you might use a ________. Question 26 options: 1) surge protector 2) Bluetooth device 3) connector 4) docking station 5) kiosk
surge protector
The operating system and other tools are collectively known as ______ software. Question 1 options: 1) system 2) open source 3) ranging 4) premium 5) productivity
system
How many instructions are supercomputers capable of processing in a single second? Question 25 options: 1) billions 2) hundreds 3) trillions 4) millions 5) thousands
trillions
If power fails, a ________ uses batteries to provide electricity for a limitedamount of time.
ups (uninterruptible power supply)
Server ______ uses software to enable a physical server to emulate the hardware and computing capabilities of one or more servers. Question 32 options: 1) virtualization 2) optics 3) stands 4) clones 5) stationary
virtualization
A computer ______ is a potentially damaging program that affects a computer or device negatively by altering the way it works. Question 19 options: 1) virtual 2) virus 3) word processing 4) accounting 5) inventory
virus
A(n) ______ device is a small, mobile computing device designed to be worn. Examples include activity trackers and smartwatches. Question 36 options: 1) tracker 2) virtual 3) wearable 4) wicket 5) stick
wearable
Compressed files sometimes are called ______ files. Question 16 options: 1) packed 2) abridged 3) zipped 4) concentrated 5) open
zipped