ITEC1001

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Match the following: 1. Plug and Play 2. HDMI 3. MIDI Matching a) allows for the transmission of high-definition audio and video signals b) capable of carrying digital music signals and are common in today's music scene c) a technology that enables the OS to detect and configure peripherals without downloading software or drivers

2. a) 3. b) 1. c)

Select what's true about Nano Robots Check All That Apply a) A machine that can build and manipulate things precisely whose components are at a scale of a nanometer b) Intended to stay in the patient forever c) Detect diseases and can repair or manipulate damaged cells d) Nano Robots get into a patient's body either by implanting or ingestion

a) A machine that can build and manipulate things precisely whose components are at a scale of a nanometer c) Detect diseases and can repair or manipulate damaged cells

Natural language processing is when computers can understand human speech exactly as it is spoken. This is a major challenge being addressed by ___ Multiple Choice a) Artificial Intelligence (AI) b) Edge Computing c) Business Intelligence (BI) d) Advanced Computing

a) Artificial Intelligence (AI)

Word processing software is used for which of the following tasks? Check All That Apply a) Creating basic web pages b) Desktop publishing c) Creating documents d) Managing a database

a) Creating basic web pages c) Creating documents d) Managing a database

Cyberattacks include Check All That Apply a) DDoS attacks b) email spam c) identity theft d) hardware theft

a) DDoS attacks c) identity theft

Which of the following are common tasks performed by utility programs? Check All That Apply a) System backup and restore b) Disk cleanup c) Installing the OS d) File search

a) System backup and restore b) Disk cleanup d) File search

Examples of management information systems (MIS) include _____ . Check All That Apply a) TPS b) DSS c) ESS d) MBA

a) TPS b) DSS c) ESS

Select the major U.S. cell phone providers. Check All That Apply a) Verizon b) AT&T c) T-Mobile d) Sprint e) Telcel

a) Verizon b) AT&T c) T-Mobile d) Sprint

Devices with a separate system unit and a relatively large footprint are called _____ computers. Multiple Choice a) desktop b) 2-in-one c) all-in-one d) laptop

a) desktop

Fiber optic cable is _____ expensive than coaxial cable to install. Multiple Choice a) more b) the same c) less d) significantly less

a) more

Popular NOS include: Check All That Apply a) Microsoft b) Avaya c) UNIX d) Android

b) Avaya c) UNIX d) Android

A gene editing technique called ___ may one day provide a cure for cancer. Multiple Choice a) Genetrophy b) CRISPR c) Biometrics d) Splicology

b) CRISPR

When Wyatt, Kevin, Sally, and Casey are all on the same business phone call, it's referred to as ___ Multiple Choice a) Call forwarding b) Conference calling c) Auto answering d) Call management

b) Conference calling

Google and Novartis International Global Healthcare Company teamed up to create a smart contact lens that can help patients with ___ . Multiple Choice a) Opioid addiction b) Diabetes c) Alcoholism d) AIDS

b) Diabetes

Have you ever misplaced your purse or wallet? This may be a thing of the past since some companies are developing personal identification purchasing capability using ___ software. Multiple Choice a) Fingerprint recognition b) Facial recognition c) Password d) Retinal scan

b) Facial recognition

Because it's a Google product, downloading an app from the Play Store might require a(n) Multiple Choice a) Apple ID b) Google login c) Correct d) iPhone e) Outlook account

b) Google login

The abbreviation for megahertz is ___ . Multiple Choice a) mez b) MHz c) mb d) MB

b) MHz

An electronic element that stores data by changing its resistance based on the current that has passed through it (similar to RRAM) is called a(n) ___ . Multiple Choice a) Pixel b) Memristor c) Capacitor d) Receptor

b) Memristor

Pulsed laser technology called lidar to detect and monitor the environment is an integral part of ___ . Multiple Choice a) Climate change recognition b) Self-driving trucks c) Silver mining d) Deep-sea drilling

b) Self-driving trucks

Currently apps that run on the cloud are __________ compared to apps that run on local machines (the Edge). Multiple Choice a) Faster b) Slower c) About the same d) Much faster

b) Slower

While every election has its losers, one big winner in the 2016 U.S. presidential election was ___ media. Multiple Choice a) Television b) Social c) Mainstream d) Newsprint

b) Social

The two main components of a processor are the arithmetic logic unit (ALU) and the _____ unit. Multiple Choice a) intelligence b) control c) RAM d) router

b) control

Rootkits allow a remote user to do which of the following. Check All That Apply a) install drivers b) install rogue files c) create backdoor programs d) delete files

b) install rogue files c) create backdoor programs d) delete files

Cookies stored on a computer's hard drive and used to collect and store information about user preferences, password and username information, IP address, and/or data on web surfing behavior are called ___ cookies. Multiple Choice a) data b) persistent c) session d) database

b) persistent

Devices that allow for the retention of data when your computer has been shut down are called ___ devices. Multiple Choice a) memory b) storage c) cache d) register

b) storage

Your computer has been attacked and overtaken by a hacker. The hacker has control over your computer and can now use it to launch attacks on other computers and systems. Your computer is known as a ____ computer. Multiple Choice a) robot b) zombie c) virus d) hacked

b) zombie

Remote access connections must be secured using authentication and encryption software. ______ software confirms the identity of the user or computer system. Multiple Choice a) System b) Encryption c) Authentication d) Anti-virus

c) Authentication

Won't this be amazing? It's a contact lens that monitors sugar levels in tears to help patients with _____. Multiple Choice a) Snoring b) Migraines c) Diabetes d) Obesity

c) Diabetes

EDI stands for ___ . Multiple Choice a) Electronic Digital Information b) Easy Digital Interchange c) Electronic Data Interchange d) Easy Digital Information

c) Electronic Data Interchange

A big problem when travelling is not being able to converse in a foreign language. To address this issue, Waverly Labs developed ___, a earpiece that links by Bluetooth to a translating app. Multiple Choice a) TIM b) Chatmash c) Pilot d) TranslateNow

c) Pilot

A crime in which a computer is the object of the crime or is used to commit a crime or offense is called _____. Multiple Choice a) cyberstalking b) cyberattack c) cybercrime d) cyberbullying

c) cybercrime

Which of the following would be considered a cybercrime? Multiple Choice a) 3rd party cookies b) adware c) data manipulation d) spam

c) data manipulation

The machine cycle consists of which four steps? Multiple Choice a) decode, calculate, store, and print b) fetch, decode, execute, and calculate c) fetch, decode, execute, and store d) fetch, decode, execute, and print

c) fetch, decode, execute, and store

The field of study that gives computers the ability to learn without being explicitly programmed is called ___ . Multiple Choice a) Enterprise Resourcing b) Robotis c) Edge Computing d) Machine Learning

d) Machine Learning

A virtual _____ network (VPN) creates a secure connection between 2 computers. Multiple Choice a) Permission b) Portable c) Public d) Private

d) Private

A qubit is a basic unit of information that is similar to the 0s and 1s (bits) that represent transistors in today's computers. Using qubits in processors and memory is called ___ computing. Multiple Choice a) Nuclear b) Atomic c) Plasma d) Quantum

d) Quantum

Which category of management information systems (MIS) combines the forecasting capability of decision support software with the records keeping capability of transaction processing systems software to help businesses manage inventories efficiently? Multiple Choice a) ESS b) ERP c) EIS d) SCMS

d) SCMS

Rank the following from fastest to slowest. The fastest should be on top. megahertz kilohertz gigahertz hertz

gighertz megahertz kilohertz hertz

Match the following: 1. Desktop computer 2. Tablet computer 3. Laptop computer 4. All-in-one computer Matching a) not mobile, but allows for relatively easy upgrade and expansion b) clamshell (hinged) type computer c) not mobile, but since most of it's components are housed behind the monitor it takes relatively little space on your desk d) highly mobile - you can use it while standing or walking around

1. a) 2. d) 3. b) 4. c)

Match the following computer speed terms: 1. Gigahertz 2. Hertz 3. Bus width 4. Bus 5. Megahertz Matching a) equals one cycle (instruction) per second b) equals one million cycles (instructions) per second c) equals one billion cycles (instructions) per second d) A channel over which information flows inside a computer. e) The amount of data that can be transmitted over a channel at a given time.

1. c) 2. a) 3. e) 4. d) 5. b)

Select what's true about predictive policing. Check All That Apply a) A type of machine learning that utilizes the power of information technology b) Advanced analytics are monitored that allows law enforcement to predict and react to crimes c) Can also help to predict conditions in the financial markets d) Will lead to a 25% decrease in crime rates in the United States

a) A type of machine learning that utilizes the power of information technology b) Advanced analytics are monitored that allows law enforcement to predict and react to crimes c) Can also help to predict conditions in the financial markets

Select what's true about Touchless Interactive Project Soli being developed ATAP. Check All That Apply a) ATAP envisions a future in which the human hand becomes a universal input device for interacting with technology b) Project Soli is a microchip that uses miniature radar to detect touchless gesture interactions c) The Soli chip will be embedded in wearables, phones, computers, cars and IoT devices d) ATAP and project Soli are programs being developed by Microsoft

a) ATAP envisions a future in which the human hand becomes a universal input device for interacting with technology b) Project Soli is a microchip that uses miniature radar to detect touchless gesture interactions c) The Soli chip will be embedded in wearables, phones, computers, cars and IoT devices

Select what's true regarding all-in-one computers. Check All That Apply a) All-in-one computers house every component except the keyboard and mouse inside the same case as the monitor. b) All-in-one computers are designed to be highly mobile so that they can be used by people on the go. c) All-in-one computers are hinged computers. d) An all-in-one computer is a stationary device with a separate keyboard and mouse.

a) All-in-one computers house every component except the keyboard and mouse inside the same case as the monitor. d) An all-in-one computer is a stationary device with a separate keyboard and mouse.

Which of the following are cookie settings you can adjust in Internet Explorer (Microsoft Edge). Check All That Apply a) Allow cookies b) Delete cookies c) Create cookies d) Block cookies

a) Allow cookies b) Delete cookies d) Block cookies

Dash Replenishment Service enables Internet-connected coffee makers to order filters from ___ when supplies are running low. Multiple Choice a) Amazon b) Albertsons c) Walmart d) Best Buy

a) Amazon

Select the statements that are true regarding a Wi-Fi's SSID. Check All That Apply a) An SSID is the Wi-Fi's name. b) Most routers transmit the SSID every few seconds so roaming devices can find the signal. c) In home networks, after all legitimate devices have connected to the SSID once, transmitting the SSID is unnecessary. d) Once an SSID has been established it cannot be changed.

a) An SSID is the Wi-Fi's name. b) Most routers transmit the SSID every few seconds so roaming devices can find the signal. c) In home networks, after all legitimate devices have connected to the SSID once, transmitting the SSID is unnecessary.

Changing your cookie preferences or removing cookies and other website data in Safari may change or remove them in other apps, including Dashboard. Be cautious when adjusting cookie settings in Safari. Ranking Click Preferences. Click Privacy. Choose Safari. Change cookie settings.

1) Choose Safari. 2) Click Preferences. 3) Click Privacy. 4) Change cookie settings.

Select the characteristics of a router. Check All That Apply a) connects networks b) provides hardware firewall protection c) usually incorporates a switch d) designed to convert analog signals into digital signals

a) connects networks b) provides hardware firewall protection c) usually incorporates a switch

If you believe you have fallen victim to a phishing scam you should Check All That Apply a) contact the institution the message was allegedly sent from b) contact US-CERT c) contact your ISP d) contact the person or organization who sent the message

a) contact the institution the message was allegedly sent from b) contact US-CERT

Screensize is measured by the ___ across the monitor. Multiple Choice a) diagonal b) depth c) height d) resolution

a) diagonal

Spyware is software that collects information about your Internet surfing habits and behaviors. Spyware includes the collection of Check All That Apply a) keystrokes b) passwords c) confidential information d) viruses

a) keystrokes b) passwords c) confidential information

What is the name of a virus written in a macro language and placed within a document or spreadsheet. Multiple Choice a) macro virus b) polymorphic virus c) memory resident viruses d) micro virus

a) macro virus

Select the characteristics of fiber optic lines. Check All That Apply a) made of 1 or thousands of fibers b) high-speed transmission c) susceptible to electromagnetic interference d) inexpensive to install

a) made of 1 or thousands of fibers b) high-speed transmission

Select the reasons to purchase a prepaid phone. Check All That Apply a) no long-term contracts b) useful if you just need a phone for calling or texting c) useful if you just need a phone for emergencies d) less expensive for video streaming

a) no long-term contracts b) useful if you just need a phone for calling or texting c) useful if you just need a phone for emergencies

Select the characteristics of an SSD. Check All That Apply a) no moving parts b) extremely fast c) uses magnets to store information d) uses lasers to read information

a) no moving parts b) extremely fast

If you buy a new computer game that emphasizes graphics, or new photo/video editing software for your desktop computer, you may want to purchase a new ___ card. Multiple Choice a) video b) CPU c) MIDI d) ethernet

a) video

A computer that requests resources such as a web page, spreadsheet, image file, or services from another computer on a network is called a _____. Multiple Choice a) Server b) Client c) Mainframe d) Desktop

b) Client

Which of the following are common email viruses. Check All That Apply a) spam b) ransomware c) keystroke logging Trojan d) adware

b) ransomware c) keystroke logging Trojan

Your ___ can provide hardware firewall protection for your home network where it connects to the ISP's network, just as ISP networks have firewalls where they connect to the Internet. Multiple Choice a) switch b) router c) modem d) FSB

b) router

An unsolicited email message is called _____. Multiple Choice a) pharming b) spam c) spyware d) phishing

b) spam

Using a corporation's data in real-time requires effective data management strategies for developing advanced analytics. This is a fundamental part of ___ . Multiple Choice a) Enterprise Networking (EN) b) Data Warehousing c) Business Intelligence (BI) d) Data Security (DI)

c) Business Intelligence (BI)

Being able to surf the Web, watch videos, and listen to steaming audio is why cell service with a ___ plan is extremely popular in the United States. Multiple Choice a) Roaming b) Internet c) Data d) Mobile

c) Data

Business management software that encompasses nearly all business activities in a corporation is called ___ software. Multiple Choice a) GPS b) DSS c) ERP d) TPS

c) ERP

Named for the man in Greek mythology who flew too close to the sun, the ___ drone can deliver urgent medical supplies to remote areas Multiple Choice a) AENEAS b) ODYSSEUS c) ICARUS d) ACHILLES

c) ICARUS

____ is actually storage since it retains data and information when the power has been turned off. Multiple Choice a) Register b) RAM (Random Access Memory) c) ROM (Read Only Memory) d) L3 cache

c) ROM (Read Only Memory)

One advantage of using a web-based Email service, such as Gmail, is that ___ . Multiple Choice a) Email can be transmitted even when offline. b) Messages can be drafted when offline and then sent when connected to the Internet. c) Users can access it from nearly any Internet-connected device. d) It is available even when not connected to the Internet.

c) Users can access it from nearly any Internet-connected device.

Some apps that use a surprising amount of data are those that include embedded ___. Multiple Choice a) Audio b) Cookies c) Video d) Images

c) Video

Represented as either a 0 or 1, a ____ is the smallest unit of data a computer can process. Multiple Choice a) pixel b) byte c) bit d) binary

c) bit

A form of spyware that records all actions typed on a keyboard is called a _____ logger. Multiple Choice a) command b) touch c) keystroke d) input

c) keystroke

Running the processor faster than recommended by the manufacturer is called _____ . This can increase performance and speed, but will also void the manufacturer warranty. Multiple Choice a) hyperthreading b) overspeeding c) overclocking d) blinding

c) overclocking

Specialized hardware or software that capture packets transmitted over a network are called packet _____. Multiple Choice a) analyzers b) snakes c) sniffers d) snoops

c) sniffers

Which category of management information systems (MIS) focuses on providing forecasting capabilities for sales and production? Multiple Choice a) TPS b) EIS c) ESS d) DSS

d) DSS

Business management software that encompasses nearly all business activities in a corporation is called ___ software. Multiple Choice a) GPS b) DSS c) TPS d) ERP

d) ERP

_____ software is designed to track and record the use of network and hardware resources in the workplace by employees. Multiple Choice a) Employee-scanning b) Environmental scanning c) Work-place monitoring d) Employee-monitoring

d) Employee-monitoring

__________ is the term used to describe a three-dimensional, computer generated environment which can be explored and interacted with by a person. While a person is submersed in the virtual world, they can interact with other virtual characters, manipulate objects, and perform many other tasks or actions. Multiple Choice a) Suspended reality b) Augmented reality c) Generated reality d) Virtual reality

d) Virtual reality

Which of the following is a strength of the Windows platform? Multiple Choice a) It is fully compatible with the macOS b) Most widely used OS in smartphones c) Less susceptible to viruses than the macOS d) Wide availability of software options

d) Wide availability of software options

The two major factors that impact processor speed are clock speed and _____ . Multiple Choice a) hard drive capacity b) ping speed c) bandwidth d) bus width

d) bus width

In ASCII, eight bits are combined together to create one ____. Multiple Choice a) bit b) pixel c) bite d) byte

d) byte

A small text file of information created by websites you visit that your web browser stores on your hard disk is called a(n) _____. Multiple Choice a) app b) spam c) driver d) cookie

d) cookie

Which transmission media has the largest bandwidth? Multiple Choice a) telephone b) Wi-Fi c) coaxial d) fiber optic

d) fiber optic

Downloading Xcode and Swift are easy first steps in creating an app for your ___ . Multiple Choice a) Motorola phone b) Android phone c) Windows phone d) iPhone

d) iPhone

A type of phishing that seeks to obtain personal information through malicious software that is inserted on a victim's computer is called _______ . Multiple Choice a) spoofing b) farming c) trolling d) pharming

d) pharming

Select what's true about 3D crime scene cameras. Check All That Apply a) 3D forensic technology replicates the entire crime scene before it is altered b) Using 3D scanning forensic scientists can analyze line of sight, blood spatter, and bullet trajectories c) Allows law enforcement officers to verify witness testimony or evaluate plausible hypotheses d) Used for the collection and analysis of DNA left at the crime scene

a) 3D forensic technology replicates the entire crime scene before it is altered b) Using 3D scanning forensic scientists can analyze line of sight, blood spatter, and bullet trajectories c) Allows law enforcement officers to verify witness testimony or evaluate plausible hypotheses

There are many technical challenges associated with implementing an Augmented Reality system, some of which include: Check All That Apply a) Latency b) Registration errors c) Occlusion d) Specification errors

a) Latency b) Registration errors c) Occlusion

Select what's true about troubleshooting network hardware issues. Check All That Apply a) If your network isn't working it is a good idea to check the status of the indicator lights. b) Sometimes firmware updates can occur that can cause a network outage. If you experience trouble you may need to reboot the hardware device. c) A device that isn't positioned properly can cause weak signals and system issues. d) Most network hardware issues will be resolved over time. There is no need to try and troubleshoot.

a) If your network isn't working it is a good idea to check the status of the indicator lights. b) Sometimes firmware updates can occur that can cause a network outage. If you experience trouble you may need to reboot the hardware device. c) A device that isn't positioned properly can cause weak signals and system issues.

Select what's true about WANs. Check All That Apply a) Large organizations with many offices located across the globe often have individual LANs in each location that need to be connected in order to share data and information b) When two or more LANs have been connected using a public network a WAN or Wide Area Network is created. c) The largest WAN on earth is the Internet. d) There are only a few WANs across the globe.

a) Large organizations with many offices located across the globe often have individual LANs in each location that need to be connected in order to share data and information b) When two or more LANs have been connected using a public network a WAN or Wide Area Network is created. c) The largest WAN on earth is the Internet.

A switch distinguishes between various devices within a network by their __ addresses. Multiple Choice a) MAC b) MCA c) BUS d) IP

a) MAC

Common presentation software programs include which of the following? Check All That Apply a) Microsoft PowerPoint b) Keynote for Mac c) Google Slides d) OpenOffice Calc

a) Microsoft PowerPoint b) Keynote for Mac c) Google Slides

Select what's true about system software. Check All That Apply a) One of the most important types of system software is the operating system b) System software is composed of the operating system and applications software c) System software refers to programs that offer the structure and hardware control necessary to run the computer and its peripheral devices d) You can run a smartphone or tablet without system software

a) One of the most important types of system software is the operating system b) System software is composed of the operating system and applications software

A computer platform is commonly referred to as a _____ system or OS. Multiple Choice a) Operating b) Organizing c) Optimizing d) Computing

a) Operating

Select what's true about client/server networks. Check All That Apply a) Server-based models are popular because they provide more security than a peer-to-peer network b) In this type of network when a client requests information or access to the Internet the request is controlled by the server c) Server-based networks are designed to have individual computers and devices connected to the network interact through a central server computer d) Server-based networks uses a peer-to-peer design structure

a) Server-based models are popular because they provide more security than a peer-to-peer network b) In this type of network when a client requests information or access to the Internet the request is controlled by the server c) Server-based networks are designed to have individual computers and devices connected to the network interact through a central server computer

Select what's true about the privacy risks with cookies. Check All That Apply a) Websites using cookies can collect your information and sell it to third parties. b) Websites can track your surfing behavior and create a profile. c) Corporate and government entities can track your web behavior d) Hackers can use cookies to launch attacks on your computers.

a) Websites using cookies can collect your information and sell it to third parties. b) Websites can track your surfing behavior and create a profile. c) Corporate and government entities can track your web behavior

Which of the following are true statements regarding LinkedIn? Check All That Apply a) You can use LinkedIn to apply for jobs. b) LinkedIn includes a resume tool to assist you in creating a professional resume. c) LinkedIn is often used to highlight favorite restaurants. d) Many users post photos of their children in LinkedIn

a) You can use LinkedIn to apply for jobs. b) LinkedIn includes a resume tool to assist you in creating a professional resume.

Select the reasons you might purchase a tablet computer. Check All That Apply a) You need a computer that is easy to hold in your hands and can be used while standing. b) You need a highly mobile computer that works well for reading ebooks or for online gaming. c) You need a computer you can upgrade with additional memory (RAM). d) You need a computer with a large amount of storage (hard drive).

a) You need a computer that is easy to hold in your hands and can be used while standing. b) You need a highly mobile computer that works well for reading ebooks or for online gaming.

Combining the power of a desktop with a neat, clean, look ____ computers are popular with businesses. Their lack of expandability make them less popular with serious gamers though. Multiple Choice a) all-in-one b) smartphone c) server d) tablet

a) all-in-one

Identify what's true about script kiddies. Check All That Apply a) amateur computer hackers with little programming expertise b) illegally gain access to computer systems using programs (scripts) that others have written c) have the skill or experience to write their own programs d) are usually females between the ages of 30 and 50

a) amateur computer hackers with little programming expertise b) illegally gain access to computer systems using programs (scripts) that others have written

Select what's true about worms. Check All That Apply a) automatically reproduce b) replication exhausts network bandwidth or available storage c) designed to attack only wired networks d) often sent using email attachments

a) automatically reproduce b) replication exhausts network bandwidth or available storage d) often sent using email attachments

An Internet signal that has enough bandwidth to allow multiple computers to be connected to the same router is called a ___ signal. Multiple Choice a) broadband b) latency c) multiple carrier d) bandwidth

a) broadband

Select appropriate LinkedIn contacts. Check All That Apply a) business contacts b) professional peers c) romantic acquaintances d) favorite foods

a) business contacts b) professional peers


Set pelajaran terkait

BYU English 12 Part 2 Final Exam

View Set

Human Anatomy & Physiology Ch#4 Q&A

View Set

Week 24: Teaching & Learning (Chapter 25)

View Set

Part 2: Summarizing Central Ideas about Elizabethan England

View Set

GEO Chapters 1 & Chapter 2 - Minerals & The Rock Cycle = Metamorphic, Igneous and Sedimentary Rocks.

View Set

AP Government: Landmark Supreme Court Cases long version

View Set