ICT2101 Final

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

The value of any number raised to the zero power is 1. examples: The value of 6^0 = 1 The value of 3^0 = 1

True

This character encoding scheme allows non-English characters and special characters to be represented.

UNICODE

The set of protocols and technologies used to enable routing of digital voice conversations over the Internet is known as:

Voice Over IP (Internet Protocol)

One method for compressing files is to locate repeated patterns (such as the word "microprocessor") and replace them with a token, or code (such as "mc") which is shorter in order to reduce space.

false

Renaming a file and changing the file extension of a spreadsheet created in Microsoft Office Excel 2016 from (.xlsx) to (.docx) will alter the file so it can also be read by Microsoft Office Word.

false

Repeatedly compressing an audio file results in obtaining the optimal quality audio file in a size that can easily be transmitted over the Internet

false

The Internet has a standard system of quality control.

false

The function of a DNS is to assign mac addresses to each device connecting to a network.

false

The purpose of a DNS (Domain Name Service) is to create top level domains (TLD) for websites.

false

The terms "internet" and "www" (World Wide Web) both refer to exactly the same thing.

false

This image reflects an analog signal which transmitted voice sound waves over telephone lines.

false

Users have no way of changing the default setting in both the Windows and the Mac OS that hides the file extensions for filenames.

false

An important task of the ____ is to keep track of files stored on the hard drive.

flash ROM

The _____ number system, or base 16, is used in digital graphics as a shorthand for color representation.

hexadecimal

Disk caching refers to:

incorporating a temporary high-speed area between the processor and secondary storage devices to provide quicker access to frequently used, or soon to be needed, data

Four basic functions

input output processing storage

The second generation of the world wide web, Web 2.0, allowed users to _______ the web.

interact with and contribute to

Match the following ports with the type data they normally handle:

mail packets= port 25 web packets= port 80

What device connects a home network to the "cloud" (i.e. the Internet)?

modem

Which of the following groups of devices all support the output function of a computer?

monitors, printers, speakers, headphones

In what format is data transmitted over the Internet?

packets

[ C:/Program Files/Microsoft Office/Excel ]

pathname

On an optical disc, the lack of a(n) ____ represents a 1.

pit

Which of the following file types all represent bitmap (raster) image formats?

png, gif, tiff

A standardized range of _____ is reserved by convention to identify specific services types provided by host computers and establish entry points for specific types of data packets.

port numbers

Microwave communication uses high-frequency:

radio waves

What is file compression used for when working with graphics file formats?

reducing file size

Digital video and digital audio files are created using ________ .

samples

Select all of the following terms that refer to the physical location of a file stored on a magnetic drive.

sectors, tracks, platters

What is the main advantage of creating a home, or a business, network?

sharing resources

Which of the 4 basic computer functions would describe adding your friends new phone number to your contacts?

storage

The speed with which a modem transmits data is...

transfer rate

Which of the following devices act as a gate - in the closed position it allows current to flow through the wire, representing a one. In the open position it breaks the flow of the current through the wire, representing a zero.

transistor

A picture or image on the Web that does not include the copyright symbol (©) is considered in the public domain and anyone can copy and use that image.

true

A protocol is a set of communication rules for the exchange of information.

true

A zipped file is an example of a file in which the data has been compressed in order to reduce the size of the file.

true

ASCII was the earliest encoding scheme for personal computers but had to replaced when computers became commonly used worldwide due to its limitations on the number of characters it could represent.

true

Audio files can be compressed in iTunes.

true

Audio sampling refers to digital recording and playback, taking a sound and converting it to 1's and 0's.

true

Because lossless compression reproduces an image so accurately, it generally results in a large file size.

true

Digital sounds can be copyrighted with Creative Common Licenses.

true

Firewalls can be used for large corporate networks or for home networks in order to increase security.

true

If you only want to temporarily compress an audio file, such as to make it fit in an email or store it on a medium with limited space, use a file compression utility instead of degrading the quality of the audio.

true

In order to access your documents and files that are stored in the cloud, you must have an Internet connection.

true

Lossless compression reproduces images accurately because large amounts of information about the location and color of each pixel are stored in the file.

true

Most PC operating systems, such as Windows, Linux and the Mac OS, include networking functionality (NOS).

true

Network architecture describes how a computer network is configured and what strategies are employed to share resources.

true

The Mac OS can read files created by the Windows OS.

true

The TLD of a URL might help to determine the overall credibility of a website.

true

The most basic common image format on the web is GIF.

true

The two basic types of digital images are raster and vector.

true

Web 3.0 brought about a more personalized web experience, with content generated specifically for individual users.

true

While LANs have been widely used within organizations for years, they are now being commonly used by individuals in their homes and apartments.

true

iTunes can be used to compress audio files and convert them to different file format.

true

Remote users can connect to an organization's network through this type of secure private connection.

vpn

Which type of compression should be used if file size and download time are the main consideration when using a graphics image on a web page?

Lossy compression

This type of network topology does not use a specific physical layout, but ensures more consistent connectivity by requiring each node to be connected to more than a single node.

Mesh

Which of the following devices converts analog signals to digital and digital signals to analog?

Modem

Which of the following is NOT a common file system for computers in the personal computer category?

RDOS

What kind of a connector is used on an Ethernet cable?

RJ45

Match the protocols to the services that use them:

SMTP=email HTTP=web pages FTP=transferring files TCP/IP=packaging all files transmitted over the internet

C: on a Windows operating system, or Macintosh HD on the Mac operating system, denotes:

The primary internal hard drive

File systems allow users to organize files using folders, subfolders or directories, making it much easier to locate files.

True

Which of the following is not an example of secondary storage?

RAM

File Sizes

1. Byte 2. Kilobyte (kB) 3. megabyte (MB) 4. gigabyte (GB) 5. terabyte (TB) 6. petabyte (PB) 7. exabyte (EB) 8. Zettabyte (ZB) 9. Yottabyte (YB)

Select all of the following items that are Boolean operators:

AND/OR

Which of the following Internet resources is most likely to contain peer-reviewed articles?

An online scholarly journal.

Which of the following might lead you to suspect a website is NOT suitable for use in your academic research?

Any of the reasons listed here would be good reasons to suspect the website's credibility and perhaps check into it further.

_________ is a wireless technology used to connect devices over very short distances; it is most frequently used in a PAN.

Bluetooth

In a computer network, this type of node requests and uses resources available from other nodes.

Client

A file system retains data about the properties of each file stored in the system. This set of data is referred to as big data.

False

In order to process data, a computer must first convert the required data to a decimal ASCII code, then to the binary ASCII code. Question options:

False

The decimal numbering system (base 10) is used in computer processors because it uses only 1 and 0's which can be easily represented by current, or no current.

False

The storage function of a computer is not supported by devices housed inside the system unit, only by external devices or by cloud computing systems.

False

Which of the following best describes the capabilities of fourth generation (4G) cell phone technologies?

High-speed Internet service over cellular networks

The new Internet Protocol that was recently implemented to identify the large amount of Internet users is called ____.

IPv6

Which of the following terms best describe the method, or hierarchy, used by the Windows OS to keep files logically organized?

Libraries, folders, subfolders

The essential features of this include identifying sending and receiving devices, and breaking information into small parts for transmission across the Internet - 'packaging' data for transmission over the Internet.

TCP/IP

What is the standard protocol for the Internet?

TCP/IP

Which of the following are software applications used by the Windows and the Mac operating systems to manage files?

Windows Explorer and Finder

Which of the following locations could be used to store files to be shared with other users?

any of these promote online file sharing

Early computers worked with which two basic types of data?

binary and UNICODE

Just like the quality of an image is measured in resolution, the quality of an audio or video file is measured by the _________ .

bit rate

eight bits grouped together is a

byte

OMR, OCR, and MICR are all types of _____, or specialized scanners supporting the input function.

character and mark recognition devices

A high-frequency transmission cable that delivers television signals as well as connects computers in a network.

coaxial

Display size is measured ____

diagonally

Digitizing the things we sense typically requires an analog-to-____ conversion.

digital

A web browser and a search engine are both software applications used for identical purposes.

false

All images publicly accessible on the Internet may be freely and legally downloaded and reproduced.

false

File management functions come pre-built into the hardware features on mobile devices.

false

Flash memory devices, such as USB drives and memory cards, most often use the NTFS file system.

false

If you want to find something on the Internet, you go to a search engine, as they contain everything that is available online.

false

In a peer-to-peer network, only the central host computer supplies the resources, the other computers request resources from this host.

false

MP3, OGG, AAC & WMA are all types of lossless compression audio files.

false

Mobile devices use the same file management systems as PC's and Mac's.

false


Set pelajaran terkait

Darwin and Natural Selection/Evidence of Evolution, Evolution Chapter 15- Patterns of Evolution, Speciation and Reproductive Isolation Videos, Chapter 15 Study guide-Hardy Weinberg and Genetic Drift, Bottleneck, Mechanisms of Evolution Videos, Last o...

View Set

Original Exam 2 CLAR120 study guide

View Set

General Psychology - Chapter 9: Human Development

View Set