FBLA-Intro to Information Technology

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which one of the following is an example of an image file?

.jpeg

A software package which automatically plays, displays, or downloads advertisement to a computer after the software is installed or while the application is being used is known as:

Adware

Broadband transmissions refer to what signal?

Analog

Which one of the following signals is characterized by having the potential for infinite signal resolution and high density yet has noice and signal loss problems?

Analog

Email and FTP work at which layer of the OSI model?

Application

Which of the following is not a network topology?

Bus

The______ is the brain of the computer.

CPU

A group or block of cells in a spreadsheet.

Cell Range

This icon allows you to insert colorful cartoon like pictures in sliders.

Clip Art

What command will remove a file from the hard drive of a computer?

Delete

The__________ uniquely identifies each resource, starts its operation, monitors its progress, and, finally locates it making the operating system available to the next waiting process.

Device Manager

What is the term a change in frequency of a wave for an observer moving relative to the source of the waves as is most commonly heard when a vehicle sounding a siren or horn approaches, passes, and recedes?

Doppler effect

________________________ is an electronic version of a traditional printed book that can be download from the Internet and read on your computer of handheld device.

Ebook

The most popular type of network architecture is ____________.

Ethernet

The accepted standard for accessing an applications help system is to press the ________ key on the keyboard.

F1

Which is NOT a web browser?

File Zilla

The service required for a system in a Windows Domain to access a resource in a Netware domain is called"

Gateway Service for Netware (GSNW)

Most operating systems use a(n)____________ files system in which files are organized in a tree-like structure.

Hierarchical

A Token Rink network uses what device to connect to workstations?

MSAU

Which feature of your word processing program would be used to send a form letter to a group of names and addresses:

Mail Merge

___________________________ is a group of people using social media tools and sites on the internet.

Online community

OS computer abbreviation usually means:

Operating System

A set of programs through which the computer manages its own resources such as the central processing unit, memory, secondary storage devices, and input/output devices.

Operating Systems Software

__________ are devices which read media from CD or DVD media

Optical Devices

To run power hungry programs such as video editing software the computer needs a lot of:

RAM

A________ chip holds software that is used to start the computer.

ROM

Who developed a code for transitions of telegraphic information using sequence of long and short elements to represent letters, numerals, punctuation, and special characters?

Samuel Moore

________ are output devices which allow for sound to be produced.

Speakers

What type of malware installed on computers collects information about users without their knowledge?

Spyware

________ offer the advantage of being instant-on machines with long battery life but typically have limited storage and alternative operating systems.

Tablet computers

What part of a window shows the name of the program you opened?

Title bar

TCP stands for:

Transmission Control Protocol

_______ is the term used to describe malware that appears, to the user, to perform, a desirable function but facilities unauthorized access to the user's computer system.

Trojan

What does URL mean?

Universal Resource Locator also known as the address

The ___________ is often very different from one operating system to the next, sometimes even between different versions of the same operating system.

User Interface

_________ allows separate partitions of a single server to support different operating systems..

Virtualization

The general term for a slower speed network which spans a very long distance is a:

WAN

Which one of the following statements is not true about Wide Area Networks (WANs)?

WANs typically have greater bandwidth capacities than LANs.

Copying copyright protected software and giving it to others for free is:

a criminal act

Which one of the following would be used to compute the average score of four tests using a spreadsheet?

a formula

A copy of a file or disk you make for archiving purposes.

backup

The purpose of cache memory is to keep handy the most recently accessed data and instruction so that the CPU can access them repeatedly without wasting time. This purpose is similar to that of the:

bookmark file

Which signal sensitivity pattern is so name for its heart-shaped pattern?

cardioid

The act of giving an instruction to your computer either by menu choice or keystroke:

command

Which type of microphone, also known as a capacitor or electrostatic microphone, has a diaphragm that acts as one plate of a capacitor and vibrations produce changes in distance between the plates?

condenser

A program that allows you to change settings in a program.

control panel

The blinking line, box, or arrow on the computer screen is called the:

cursor

The pointer, usually arrow or cross shaped, which is controlled by the mouse.

cursor

You move a file using which

cut and paste

A connection-oriented protocol guarantees what?

delivery of data

Each peripheral device has its own software, called a(n), which contains the detailed instructions required to start that device, allocate it to a job, use the device correctly, and deallocate it when it's appropriate.

device driver

To transfer data from one computer to another computer.

downloading

Which type of microphone works by using electromagnetic induction and is relatively inexpensive and resistant to moisture?

dynamic

Solid State Disk (SSD) hard drives generally have the advantage of_________ than solid state drives.

faster speed

The following command is used to locate work with a subset of data in a worksheet.

filter

Software programs or hardware devices setup to protect computers while online are called:

firewalls

A________ is a container that helps you organize your files.

folder

When you change the color and background of a chart in a spreadsheet you are:

formatting

1024 megabytes equals:

gigabyte

The part of a word processing documents used to display repetitive information such as titles, dates, and page numbers is:

header and footer

Which one of the following devices forwards incoming traffic to all ports except for the incoming port?

hub

The name for the core portion of an operating system is the :

kernel

The main difference between a switch(or bridge) and a hub is that a switch also lies within the ______ layer of the OSI model

layer 2

Labels are aligned at the _________ edge of the cell:

left

This is another name for secondary storage.

memory

A_________ is a list of related commands.

menu

The standard toolbar is located underneath the:

menu bar

Some programs have_______, words you click to show lists of commands.

menus

Who had the Internet first?

military

When you ____ a file, the file is transferred to the new location and no longer exists in its original location

move

With the development of ___________ technology, a single chip was equipped with two or more processor cores.

multicore

What is the common term for combining many analog or digital signals and forwarding the selected input into a single line?

multiplexing

The connecting of computers so that information can be shared is called:

networking

When referring to signal response, which is generally considered to be a perfect sphere in three dimensions?

omnidirectional

Approximately how many bytes make one megabyte?

one million

What step of information processing send s the information back to you in the manner you need it?

output

What is a subdivision of a hard drives surface that is defined and used as a separate drive?

partition

An add-on component to your computer.

peripheral

Which one of the following is an output device:

printer

Which one of the following is a set of instructions written for a computer?

program

Main memory is also known as:

random access memory

A__________ is a group of cells that form a rectangle on the screen.

range

If over time a print device's output becomes lighter and lighter, it may be time to:

replace the toner cartridge

The primary responsibility of the Network OSI layer is:

routing

____________ go horizontally--- a side-by-side layout of boxes.

rows

Which one of the following is an example of a peripheral?

scanner

When planning a database, what is the first step?

select fields

"Spamming" is very poor Netiquette and means:

sending lines of nonsensical garbage in a chat conversation

A port that allows data to be transmitted in a series one after the other, such as the printer and modem ports on a computer.

serial port

There are _____ layers in the OSI Model.

seven

Cache memory is divided into blocks of equal size called:

slots

Rotational hard disk drivers are typically _________ than solid state drives.

slower

What is the term for headphones which sit on top of the ears rather than around them?

super-aural

A server-based network usually involves one or more:

switches

Pressing________ at the end of a row moves the insertion point to the first cell in the next row.

tab

The main function of a firewall is:

to prevent unauthorized access to your network

You should give folders_______ names that help you easily to identify them.

unique

To send a file from one computer to another through a network.

upload

What is the term for a computer attached to the Internet that has been compromised by a hacker, a computer virus, or a Trojan horse?

zombie


Set pelajaran terkait

MKTG - CH. 9 +10, 11 + 12 - QUIZZES

View Set

Історія соціології

View Set

Ethical Hacking - C701 CEH Certified Ethical Hacker Practice Exams, Fourth Edition 1/2

View Set

Human Anatomy and Physiology- Chapter 10 Chapter Test

View Set

Lesson 28 - Fighting The Persian wars

View Set

Powers -- are they delegated, reserved, or concurrent?

View Set