Computer Science Final (1-5)
Errors in computer software are called ________. worms beetles spiders bugs
bugs
________ printers either melt a wax based ink on regular paper or by burning dots on specially coated paper. Inkjet Laser Nonimpact Thermal
Thermal
The World Wide Web was based on a protocol developed by ________. the U.S. government Apple Tim Berners-Lee Microsoft
Tim Berners-Lee
Mac OS X includes a backup utility called ________. Carbonite Time Machine System Restore Time Capsules
Time Machine
Deleted files on a Mac computer are moved to the ________. Trash Wastepaper Basket Recycle Bin Garbage Can
Trash
The unique address for a particular website is the ________. domain section URL protocol client
URL
All of the following are terms related to part of the boot process EXCEPT ________. USB CMOS ROM RAM
USB
Flash drives plug into a(n) ________. USB port drive bay expansion slot serial port
USB port
Which port is the most common port used to connect input and output devices. Ethernet FireWire Parallel Universal serial bus (USB)
Universal serial bus (USB)
Which of the following are personal video journal entries posted on the web? Newsgroups Podcasts Blogs Vlogs
Vlogs
The intersection of a row and column in a spreadsheet program is known as a ________. cell label function formula
cell
A computer connected to the Internet that asks for data is a ________. surrogate aggregator server client
client
A(n) ________ is usually a live broadcast of audio or video content. Podcast Instant message Webcast Wiki
Webcast
Blackboard is an example of ________ software. utility drawing course management gaming
course management
A(n) ________ software installation enables you to decide which features you want to install on the hard drive. upgrade custom partial full
custom
QuarkXPress is an example of ________ software. desktop publishing video-editing image-editing presentation
desktop publishing
Each device attached to your computer comes with a special program called a(n) ________ that enables the device and operating system to communicate with each other. device configurator translator interpreter device driver
device driver
A(n) ________ CPU has two processing paths, allowing it to process more than one instruction at a time. dual-mode dual-core bimodal all-in-one
dual-core
A(n) ________ is installed on your computer, and when the program is opened, your e-mail is downloaded to your computer. e-mail host e-mail client e-mail server web-based e-mail
e-mail client
Which operating system is used by most desktop and laptop computers? Linux Windows UNIX OS X
Windows
In databases, a category of data is called a ________. field worksheet table record
field
The location of a file is specified by its ________. file path drive identifier file type file extension
file path
When using a spreadsheet, the expression =D8-D17 is called a ________. cell formula range function
formula
A(n) ________ software installation installs all the most commonly used files to your computer's hard drive. custom upgrade full new
full
When using a spreadsheet, SUM in the expression =SUM(B10:B16), is called a(n) ________. operant operator function formula
function
All of the following are names for a flash drive EXCEPT ________ drive. jump thumb hard USB
hard
Which of the following is NOT a social networking site? YouTube iTunes LinkedIn Facebook
iTunes
Which of the following is NOT an example of a general productivity software application? image editing word processing personal information management spreadsheet
image editing
A keyboard and mouse are examples of ________ devices. processing output storage Input
input
Which of the following is the name of a Microsoft Excel file? inventory.xlsx inventory.accdb inventory.wpd inventory.pdf
inventory.xlsx
Web-based application software is software that ________. is installed by the computer manufacturer does not need an Internet connection is stored completely on a web server instead of your hard drive is always free
is stored completely on a web server instead of your hard drive
The most common type of monitor is a(n) ________. cathode ray tube (CRT) light-emitting diode (LED) organic light-emitting diode (OLED) liquid crystal display (LCD)
liquid crystal display (LCD)
Using applications on smartphones and tablets to buy and sell products is known as ________ commerce. remote mobile smart web
mobile
The ________ contains the central electronic components of the computer. arithmetic/logic unit motherboard input unit peripheral unit
motherboard
The Internet is ________. the same as the web an internal communication system for businesses a communication system for the U.S. military a large network of networks
a large network of networks
QuickBooks is an example of ________ software. gaming course management accounting educational
accounting
Which of the following is NOT a user interface? application programming interface (API) graphical user interface (GUI) menu-driven command-driven
application programming interface (API)
Computers use ________ language consisting of 0s and 1s. system binary symbol byte
binary
In binary language, each letter of the alphabet, each number, and each special symbol is made up of a unique combination of eight ________. bytes kilobytes bits characters
bits
Unwanted or unneeded software included by manufacturers on new computers is called ________. shareware adware bloatware malware
bloatware
A ________ is a personal journal posted on the web. podcast blog webcast wiki
blog
A(n) ________ is a navigation aid that shows the path you have taken to get to a web page or where the page is located within the website. cookie trail navigation bar index breadcrumb trail
breadcrumb trail
Software that enables you to display and interact with text and other media on the web is a web ________. client browser agent server
browser
A ________ enables your computer to connect to other computers or to the Internet. video card network interface card (NIC) controller card sound card
network interface card (NIC)
Inkjet printers and laser printers are examples of ________ printers. thermal impact dot-matrix nonimpact
nonimpact
Apache OpenOffice is an example of a(n) ________ productivity suite. desktop publishing open source web-based system
open source
Apple's OS X and Microsoft Windows are examples of ________ software. operating system application utility communication
operating system
The two major types of system software programs are utility programs and the ________. operating system charms user interface application software
operating system
C:\Windows\System32\drivers\etc\protocol is an example of a file ________. path list extension type
path
The unique identification number assigned to your computer when you connect to the Internet is known as all of the following EXCEPT ________. IP address dotted quad path dotted decimal
path
All of the following are types of multimedia and entertainment software EXCEPT ________. productivity software drawing software digital audio software gaming software
productivity software
Each of these is a basic type of a touch screen, EXCEPT ________. surface acoustic wave capacitive resistive reflective
reflective
C: denotes a ________ directory that is at the top of the filing structure of a computer. upper-level top-level cluster root
root
The number of pixels displayed on the screen is known as ________. screen resolution brightness resolution aspect ratio contrast ratio
screen resolution
The "s" in "https" stands for ________ socket layer. server secure semantic socia
secure
A subset of e-commerce that uses social networks to assist in marketing and purchasing products is known as ________ commerce. friend source crowd social
social
A(n) ________ is an input device that looks like a pen. pointer joystick e-rod stylus
stylus
An Apple iPad and a Samsung Galaxy Tab are examples of ________ computers. netbook desktop tablet laptop
tablet
The web is based on the ________ Protocol. Hypertext Transfer Hypertext Translate Hypertext Trade Hypertext Transmit
Hypertext Transfer
A Microsoft ________ account allows you to store and share files in the cloud. Dropbox OneDrive iCloud Drive
OneDrive
Which of the following top-level domains identifies a degree-granting institution? .gov .edu .info .net
.edu
Which of the following operating systems are used on most tablets? Windows and Android BlackBerry and Windows Windows and iOS Android and iOS
Android and iOS
Which of the following optical storage media has the greatest storage capacity? DVD DL DVD CD BD
BD
All of the following are types of e-commerce business EXCEPT ________. C2C B2C B2B C2B
C2B
Which of the following is NOT a Windows utility program? Desktop Disk Cleanup System Restore Disk Defragmenter
Desktop
When using Windows 8 File Explorer, which view provides the most information at a glance? Tiles Details Content List
Details
Which of the following Windows utility programs arranges pieces of files on your hard drive to allow for faster access? Disk Defragmenter Task Manager Disk Cleanup Error-checking
Disk Defragmenter
________ computers are specially designed computer chips that reside inside other devices such as a car. Tablet Netbook Desktop Embedded
Embedded
Which utility removes redundancies in a file to reduce the file size? File Compression Disk Defragmenter Disk Cleanup Error-checking
File Compression
Most smartphones use operating systems developed by ________. Microsoft and Google Google and Apple Apple and Microsoft Symbian and Apple
Google and Apple
All of the following are examples of database software EXCEPT ________. Access MySQL Oracle OneNote
OneNote
________ is a professional, business-oriented social networking site. Twitter LinkedIn Picasa Flickr
Most supercomputers use the ________ operating system. iOS Windows Linux UNIX
Linux
Which of the following is the most common audio compression format? WMA WAV AU MP3
MP3
All of the following are examples of network operating systems EXCEPT ________. Linux OS X Windows 8 MS-DOS
MS-DOS
Which of the following computers is large, expensive and supports many simultaneous users and manages large amounts of data? Embedded computer Supercomputer Desktop computer Mainframe computer
Mainframe computer
Which of the following is the smallest unit of measure? Gigabyte Petabyte Megabyte Terabyte
Megabyte
All of the following are examples of software suites EXCEPT ________. Microsoft OneNote Apple iWork Apache OpenOffice Microsoft Office 2013
Microsoft OneNote
Which of the following is NOT a precaution to take when shopping online? Pay with a debit card, not a credit card. Avoid making online transactions on a public computer. When placing an order, make sure you receive a confirmation number. Shop at well-known, reputable sites.
Pay with a debit card, not a credit card.
________ software helps you manage e-mail, contacts, calendars, and tasks in the same application. Presentation Spreadsheet Personal information manager Note-taking
Personal information manager
All of the following are examples of nonvolatile storage EXCEPT ________. hard drive DVD RAM flash drive
RAM
________ is the abbreviation for the place in the computer where the programs and data the computer is currently using are temporarily stored. ROM USB CPU RAM
RAM
The area that holds all the startup instructions the computer needs to start is the ________. CPU ROM USB RAM
ROM
The basic input/output system (BIOS) is stored on a ________ chip. ROM RAM CPU CMOS
ROM
________ applications are software in which the vendor hosts the software online over the Internet and you do not to install the software on your computer. Proprietary as a Service Open Source as a Service Webware as a Service Software as a Service
Software as a Service
________ software is used to perform calculations and numerical analyses. Personal information manager Database Presentation Spreadsheet
Spreadsheet
________ media are continuously fed to your browser so you do not have to wait for the entire file to completely download before listening to or watching it. Top-level Streaming Hyperlinked Tagged
Streaming
________ software helps run the computer and coordinates instructions between other software and the hardware devices. Recovery System Application Productivity
System
You can use the Windows ________ to check on a nonresponsive program. Task Manager Backup utility System Restore Error-checking
Task Manager
Which of the following is the first step in the boot process? The OS is loaded into RAM. The BIOS checks that all devices are in place. The BIOS is activated by turning on the computer. Configuration and customization settings are c
The BIOS is activated by turning on the computer.
In the URL http://www.microsoft.com/surface, the portion labeled ".com" is the ________. domain name host top-level domain protocol
top-level domain
All of the following are tips for professional e-mail etiquette EXCEPT ________. use spell-checker and proofread before sending use abbreviations such as "u," "r," and "BRB" to keep the e-mail message shorter include a meaningful subject line be concise and to the point
use abbreviations such as "u," "r," and "BRB" to keep the e-mail message shorter
The ________ of the operating system enables users to communicate with the computer system. network adapter card modem window user interface
user interface
Multimedia software includes all of the following EXCEPT________. utility software audio-editing software animation software image-editing software
utility software
Using hard disk space to temporarily store data or instructions from RAM is referred to as ________. interrupting compressing spooling virtual memory
virtual memory
RAM is a ________ storage location. permanent nonvolatile volatile peripheral
volatile
Dreamweaver is an example of ________ software. course management web authoring accounting desktop publishing
web authoring
A ________ allows visitors to add, remove, or edit its content. podcast wiki blog chat
wiki
The appropriate software to use for creating research papers is ________ software. spreadsheet word processing database presentation
word processing
The concept of the Internet was developed by the U.S. Department of Defense as a network that ________ in event of an attack. allow commerce to continue provide point to point connections would not be disrupted easily would not be easily hacked
would not be disrupted easily