Exam 1 Study
Also known as additive manufacturing (AM), ________ printing sprays successive layers of material to create an object.
3D
The average tablet has a ________ hard drive compared to the average desktop.
smaller
The component of a computer that allows data to be retained after power is turned off is referred to as ________.
storage
Along with the From line, what is the most important factor in ensuring your business message is read?
subject line
Monitoring database systems performance, developing and maintaining databases, and establishing user privileges for databases are usual roles of a ________.
DBA
The ________ is a separate processor (computer) on your computer that enhances your video.
GPU
The two most common audio file formats are WAV and _______
MP4
Because of its capability of storing data in multiple hard drives, data warehouses use ________ technology to ensure redundant data storage.
RAID
Which category of management information systems (MIS) combines the forecasting capability of decision support software with the records keeping capability of transaction processing systems software to help businesses manage inventories efficiently?
SCMS
Most tablets and phones use ________ as their main storage device.
SSD
Smartphone cameras work by focusing incoming light onto what type of array that captures images
aps
Intrusion Detection Systems (IDS) use several techniques to protect networks. One is called a "halt", which stops the hacker from progressing into the network. Another is called a ________, which closes the access point used by the hacker.
block
Most touch pads use ________ to sense when a finger has moved across the pad.
cap
Because it allows their files to be accessed from any device on the Internet, many users like to back up their files using ________ storage.
cloud
The number of bits of data describing each pixel in a display is referred to as ________.
color depth
Which device carries a relatively large footprint and separate system unit?
desktop
In the body of a professionally formatted business e-mail, where should a request be placed?
first
Using refracted laser light to store data on a photoreceptive substrate is essentially how ________ storage works. Theoretically this could store gigabytes of data within a cubic millimeter.
holograph
A refracted laser beam striking a photoreceptor from many different angles allows ________ storage to retain many bits of data in the same location.
holographic
Be careful to only open e-mail from senders you know and trust. ________ may be contained in e-mail messages.
malware
Sometimes used in smaller business networks, employee ________ software is impractical for large networks because of the number of users and the potential for misuse.
monitoring
A type of printer that is used to print large graphic images such as architectural drawings by mechanically moving a pen over a large sheet of paper is known as a ________.
plotter
Software that gives network administrators the ability to provide computer assistance from a central location by allowing them to display and control any computer on the network is called ________ software.
remote desk
combination input and output device that allows users to interact with large computer displays that is sometimes found in classrooms is called an interactive whiteboard or a ________.
sb
To create an image with a laser printer ________ is(are) drawn to the drum.
toner
A terabyte equals approximately one ________ bytes?
trillion
Today, many computers use ________, a coding scheme that uses at least 16 bits to represent a character.
unicode