Ist Midterm

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

________ provides high-speed information processing by enabling a new set of instructions to start before the previous set is finished. Cache memory Multitasking Overclocking Hyperthreading

Hyperthreading

________ property is work that is the result of someone's creativity and knowledge. Personal Public Intellectual Collective

Intellectual

Which of the following is not true about earbuds? -They can damage your ears if you turn the volume up too loud. -They can be wired or wireless. -They often connect in the same jack where external speakers connect. -They are always designed to fit over your ears.

They are always designed to fit over your ears.

The World Wide Web was based on a protocol developed by ________. Tim Berners-Lee Bill Gates Vinton Cerf Ray Tomlinson

Tim Berners-Lee

The unique address for a particular website is the ________. domain section protocol client URL

URL

________ behavior is not conforming to a set of approved standards of behavior. Legal Dogmatic Moral Unethical

Unethical

Which of the following is not a main area of research in artificial intelligence? cloud computing problem solving perception natural language processing

cloud computing

________is a nickname for social media tools which allow users to contribute content easily. Instant Messaging QR codes Web 2.0 Cognitive surplus

Web 2.0

cognitive surplus

combination of leisure time and the tools to be creative

augmented reality

combination of our normal sense of the world and digital information

Blackboard is an example of ________ software. utility course management gaming drawing

course management

Catfishing is ________. -posting inflammatory remarks to solicit angry and negative responses -bombarding someone with harassing messages -creating fake profiles on a dating site and developing a fabricated online and phone relationship -posting embarrassing pictures, rumors, or videos via social media

creating fake profiles on a dating site and developing a fabricated online and phone relationship

Podcasts enable you to ________. -deliver audio/video files via RSS -communicate with friends in real time -edit video files over the web -post journal entries on the web

deliver audio/video files via RSS

Which of the following is not a Windows utility program? System Restore Desktop Cleanup Defragment and Optimize Drives Disk Cleanup

desktop cleanup

Each device attached to your computer has a special program called a(n) ________ that enables the device and operating system to communicate with each other. interpreter Device configurator device driver translator

device driver

The ________ is the biggest power consumer on a mobile computing device. display hard drive memory module CPU

display

spam

electronic junk mail

A robot which moves and acts much like a human is a(n) ________. empathetic agent intelligent personal assistant embodied agent embedded operator

embodied agent

Software that manages "back office" functions such as billing, production, inventory management, and human resources management is called ________ software. enterprise resource planning customer relationship management project management accounting

enterprise resource planning

A ________ usually allows multiple users to add, remove, or edit its content. wiki blog vlog podcast

Wiki

Every keystroke and every mouse click creates an action, or ________, in the respective device. event spooler interrupt session

event

information technology

field of study focusing on the management, processing, and retrieval of information

The ________ Windows utility automatically creates duplicates of your libraries, desktops, contacts, and favorites to another storage location. File History Carbonite System Restore

file history

ROM

holds start up instructions needed when the computer is powered on

The Turing test consists of a person asking written questions of a person and a computer. If the questioner can't tell which one of the respondents is a computer, then the computer has attained ________. intelligence mastery Turing independence

intelligence

File ________ provides an organizational structure to the files and folders on your storage device. Management History Optimization compression

management

OLED

more energy efficient than LCD monitors

The Internet is ________. -communication system for the U.S. navy -an internal communication system for businesses -the same as the World Wide Web -a large network of networks

a large network of networks

Computer-aided design software is used by ________. web designers to create websites project managers to track tasks architects and engineers to create virtual models game makers to create games

architects and engineers to create virtual models

Computers use a ________ language consisting of 0s and 1s byte system binary symbol

binary

Unwanted or unneeded software included by manufacturers on new computers is called ________. adware bloatware malware shareware

bloatware

A(n) ________ is a navigation aid that shows the path you have taken to get to a web page or where the page is located within the website. navigation bar cookie trail index breadcrumb trail

breadcrumb trail

A network operating system is also known as a(n) ________. multiuser operating system real-time operating system multicore operating system multitasking operating system

multiuser operating system

LibreOffice is an example of a(n) ________ productivity software package. open source online proprietary system

open source

Apple's macOS and Microsoft Windows are examples of ________ software. utility application operating system communication

operating system

The two major types of system software programs are utility programs and the ________. user interface application software operating system supervisor programs

operating system

The process of determining which applications and tiles are on the Start Menu is called ________. Adhering sticking Attaching pinning

pinning

desktop

primary work area

CPU

processes commands issued by software instructions

HTTP

protocol that allows files to be transferred over the Internet

FTP

protocol that allows files to be uploaded/downloaded from a web server

C: denotes a(n) ________ directory that is at the top of the filing structure of a computer. cluster sub domain root

root

The number of pixels displayed on the screen is known as ________. screen resolution aspect ratio brightness resolution contrast ratio

screen resolution

data mining

searching for patterns within large amounts of data

The "s" in "https" stands for ________ socket layer. server semantic secure social

secure

A subset of e-commerce that uses social networks to assist in marketing and purchasing products is known as ________ commerce. social source crowd friend

social

open source

software code that is freely available

web-based

software that is hosted on a website

personal information manager

software used to keep track of appointments

Project Management

software used to track tasks and coordinate resources

proprietary

software which must be purchased

QWERTY

standard keyboard layout

RAM

stores programs and data the computer is currently using

Teaching Siri or the Google Assistant how to recognize your voice by reading to it is an example of ________. perception supervised learning supervised learning planning

supervised learning

Use the Windows ________ to check on a nonresponsive program. Backup utility Error-checking System Restore Task Manager

task manager

The established code, in which a letter is represented by one byte is known as the ________. Base 2 Unicode Binary ASCII code

ASCII code

The Next Einstein Initiative and the ________ Institute for Mathematical Sciences bring bright young learners and the best lecturers in the world together. Computer Canadian African Austrian

African

The web is based on the ________ Protocol. Hypertext Trade Hypertext Transmit Hypertext Translate Hypertext Transfer

Hypertext Transfer

Microsoft ________ is a cloud storage and file sharing service. Drive Dropbox iCloud OneDrive

OneDrive

According to the book, if your CPU usage levels are greater than ________ during most of your work session, a faster CPU can greatly increase your computer's performance. 60% 70% 90% 80%

90%

Which of the following is not true about the concept of copyleft? -The distributed software comes with the same terms as the original software. -All enhancements and additions to copyleft software will cost the user an update or upgrade fee. -It often refers to the distribution of open source software. -It provides a way of not violating copyright law.

All enhancements and additions to copyleft software will cost the user an update or upgrade fee.

Which of the following is an example of a recommendation engine? -An Excel spreadsheet listing all employees and their annual salaries in a random order -A printout of all sales taken from the register at the end of the day -Amazon providing you a list of products similar to others you've viewed -Raw data from marketing questionnaires

Amazon providing you a list of products similar to others you've viewed

Which of the following categories of software do you use directly if you need to write a research paper? Machine language Application System Development

Application

________ reality is the addition of digital information directly into our reality, either to add more detail or to remove unwanted visual effects. Visual Augmented Altruistic Assisted

Augmented

________ tools gather information from sources such as e-mails, text messages, and tweets and make the information instantly and publicly available for use in emergencies. Social networking Crowdsourcing Affective computing Crisis-mapping

Crisis-mapping

Which of the following is not a goal of green IT? Use technology to reduce travel Use technology as long as possible Cleaning waterways with repurposed computers Reduce use of electricity

Cleaning waterways with repurposed computers

What technology allows retailers to better respond to consumer buying patterns? Deep learning warehousing Data accumulation Data mining

Data mining

Which utility temporarily removes redundancies in a file to reduce the file size? Disk cleanup File compression Defragment and Optimize Drives Error-checking

File compression

When using a spreadsheet, the expression =D8-D17 is called a ________. function cell range formula

Formula

To speed up the display of graphics, a(n) ________ is integrated into most video cards. ALU SSD VGA GPU

GPU

Which computer port transmits audio and video without the need for compression? USB RGA HDMI VGA

HDMI

Which of the following refers to the encoding of information about the world into formats that artificial intelligence systems can understand? Problem solving Natural language processing Perception Knowledge representation

Knowledge representation

________ is a professional, business-oriented social networking site. LinkedIn Twitter Pinterest Flickr

LinkedIn

________ is an electronics standard that allows different kinds of electronic instruments to communicate with each other and with computers. MIDI SOUNDID MUSICID SMID

MIDI

Which of the following is the most common audio compression format? WAV AU MP3 WMA

MP3

All of the following are examples of database software except ________. Oracle Microsoft Access MySQL Microsoft Excel

Microsoft Excel

Using applications on portable computing devices to buy and sell products is known as ________ commerce. web smart mobile remote

Mobile

Which of the following is not a part of a machine cycle? Execute Decode Network Fetch

Network

Which of the following is not true about grid computing? -It is also known as distributed computing. -It is used by many non-profit organizations. -Only desktop or laptop computers are powerful enough to be used for grid computing. -It is a much-less expensive method of obtaining near-supercomputer power.

Only desktop or laptop computers are powerful enough to be used for grid computing.

Which of the following is not a precaution to take when shopping online? -When placing an order, make sure you receive a confirmation number. -Pay with a debit card, not a credit card -Avoid making online transactions on a public computer. -Shop at well-known, reputable sites.

Pay with a debit card, not a credit card

________ is a technique that allows the CPU to work on more than one instruction at the same time. Hyperthreading OverclockingOption Parallel processing pipelining

Pipelining

To connect a peripheral device to a computer to exchange data, find the appropriate ________ for the device. expansion bus SSD bay port drive

Port

QR or ________ codes let any piece of print host a link to online information. quality retention quality response quick response quick retention

Quick Response

The computer stores currently used programs and data in ________. ROM RAM USB CPU

RAM

Which of the following is not an example of nonvolatile storage? Cloud storage Flash drive RAM Hard drive

RAM

The area that holds all the startup instructions the computer needs to start is ________. RAM ROM USB CPU

ROM

________ applications are software in which the vendor hosts the software online over the Internet and you do not to install the software on your computer. -Open Source as a Service -Infrastructure as a Service -Software as a Service -Platform as a Service

Software as a Service

Windows uses a memory-management technique known as ________ to monitor which applications you use most frequently and then preloads them into your system memory. SuperTake SuperFetch SuperRetrieve SuperGet

SuperFetch

________ software helps run the computer and coordinates instructions between other software and the hardware devices. Recovery Application System Productivity

System

Which of the following is the first step in the boot process? -Configuration and customization settings are checked. -The OS is loaded into RAM. -The BIOS checks that all devices are operational. -The BIOS is activated.

The BIOS is activated.

An application programming interface (API) is ________. -the code to interface between an application and RAM -the code the application software uses to take advantage of code written by others -the currently active part of an application -code to interface between an application and a peripheral like a printer

the code the application software uses to take advantage of code written by others

thrashing

the condition of excessive paging

latency

time needed for correct sector to spin to the read/write head

B2C

transactions between a company and consumers

C2C

transactions between two individuals

GUI

type of user interface in macOS and Microsoft Windows 10

The ________ of the operating system enables users to communicate with the computer system. network adapter card window modem user interface

user interface

Software designed specifically for managing real estate is an example of ________ software. e-commerce vertical market general business project management

vertical market

URL

website address

The concept of the Internet was developed by the U.S. Department of Defense as a network that ________ in event of an attack. -allows commerce to continue -would not be easily hacked -provides point to point connections -would not be disrupted easily

would not be disrupted easilyCorrect


Set pelajaran terkait

Public Goods & Common Pool Resources

View Set

Special Senses: Vision - Structures and Function

View Set

History: First 3 Presidents video

View Set

UNIT 5 - CH27 PREPU with Rationales

View Set

Homonymus Hemianopia/Hemianopsia & Blindsight Rehabilitation + Neural Plasticity

View Set

Catcher in the Rye Chapter 13-15 vocabulary

View Set

Chapter 31 - The Nurse in Schools

View Set