digital competency
the most common computer port is the __ port
USB
moore's law refers to the
pace at which CPU's improve
SMTP is the set of rules used to
send e-mail along the Internet to its destination
when is a flat database sufficient to use when organizing data
when the data is simple and can be organized in one table
An IDE is a tool that has support for
Editing and debugging
ginny downloads and modifies an open source software program, then uploads the program with a different name. Which type of software license is she most likely to be working under
GNU General Public License
An example of an open source OS is
Linux
which of the following is a sensor found in certain smartphones
accelerometer
computer viruses can be spread by
all of the above
intellectual property
all of the above
it is important to maintain your online reputation
all of the above
Which is NOT a key component of a typical client/server network?
bastion host
ensuring that website content is not slanted in its point of view is checking for
bias
authentication techniques that rely on personal biological traits are called
biometrics
data captured as users navigate through a website is called
clickstream data
all of the following are current focuses of AI research EXCEPT
cognitive surplus
digital audio software can be used to
compose songs or soundtracks with virtual instruments
Unnecessary duplication of data in a database is referred to as
data redundancy
the combination of media, internet, entertainment, and phone services into a single device illustrates the principle of
digital convergence
when analog data is measured and converted to a stream of numerical values, this is referred to as __ the data
digitizing
which type of broadband internet offers connections nearing the speed of light
fiber-optic**check
Ergonomics is an important consideration
for all computing devices
which of the following is not one of the factors used in multi-factor authentication
identity
when someone uses your personal information to pose as you, this is
identity theft
which of the following is not a category of intellectual property
imprint
Sophisticated modeling software is helping international researchers
increase the pace of research in finding and producing vaccines
Antivirus software prevents infection by recording key attributes about your files and checking to see if they change over time in a process called
inoculation
The collection of large national and international network providers used to establish the Internet is called the
internet backbone
LibreOffice is an example of which type of software
open source software
When an OS processes tasks in a priority order, it is known as
preemptive multitasking
the most common output device for hard output is a
printer
What web browser feature would be particularly useful when using public computers?
privacy browsing
what is the first step of the system development life cycle (SDLC)
problem identification
data can be retrieved fastest from
registers
Windows creates "restore points" so that you can
return your system to the way it was before you installed new software.
which of the following devices would use a real-time operating system
roomba vacuum
the C: drive on Windows PC is like a large filing cabinet, and is referred to as the
root directory
on client/server networks, more users can be added without affecting the performance of other nodes. This is known as network
scalability
which of the following would not be a benefit of networking computers
sharing software licenses
Which statement is not true about the web
the web is based on the WWW protocol
a GUI user interface is special because
there is a set of icons that represent the OS tasks
when designing a program, the developer selects a design approach like
top down or object oriented
which of the following is a good precaution to take when making online purchases
use a private browser when purchasing items from a public computer
RAM is
volatile memory
is a set of strategies for using more than one drive in a system
RAID
Which of the following statements is false?
Unethical behavior is always illegal
the type of network that would be necessary to connect the networks of two college campuses would be
WAN
How the program should behave if the input data is invalid is part of
error handling
Using copyrighted works without permission of the copyright holder
is possible under the "fair use" doctrine
which of the following should you not do to secure a wireless network
keep the default network name and router password
which of the following would not impact the digital divide
less sharing of the work we produce
Ordering a mocha latte and paying for it from the Starbucks smartphone app is using what type of Internet commerce?
mobile commerce
What two devices are often combined into one device in a small network to connect the home network to the Internet and to share the connection between devices on the network?
modem and router
Firewalls use a process of _____________ to assign IP addresses to the devices internal to the network so hackers will not know what they are.
network address translation (NAT)
a process to ensure that data in a database is organized most efficiently is called
normalization
which of the following functions of a computer is mostly responsible for turning data into information
processing
which of the following is used to create a subset of data that matches certain criteria and that can be saved for future reference or use
query
Image-editing software allows you to
remove red eye
software that is hosted by the vendor and accessed online is called
software as a service (SaaS)
which of the following are common to all programming languages
syntax, keywords, and operators