MIS 2223 test 2 (second set)
A single point as shown in the accompanying figure is about what fraction of an inch in height?
1/72
One study found that a certain percentage of wireless connections like the kind in the accompanying figure are unsecured, leaving them susceptible to hackers. What was that percentage?
25
Why is a fragmented disk slower than one that is defragmented?
A fragmented disk has many files stored in noncontiguous sectors.
When data in a spreadsheet program is changed, what occurs?
All calculations can be recalculated.
You have encountered a technology that is effective in blocking computer-generated attempts to access a website because it is generally easy for humans to recognize distorted characters. What is this technology?
CAPTCHA
Which of the following kinds of software is software that enables professional designers to create sophisticated documents that contain text, graphics, and many colors?
DTP
Personal computers, display devices, and printers should comply with guidelines of which of the following programs?
ENERGY STAR
Which of the following is NOT true of the new multi-core processor you have just purchased?
Each processor core on the multi-core processor runs at a faster speed than a single-core processor.
Which of the following should you have if you plan to connect your computer or mobile device to a wired computer network?
Ethernet port
AMD is the leading manufacturer of which of the following kinds of processors, which have an internal design similar to Intel processors, perform the same functions, can be as powerful, but often are less expensive?
Intel-compatible
Which of the following describes a computing environment where everyday objects are connected to the Internet?
IoT
What is the role of an address when used in the context of computer memory?
It identifies the location of a byte in memory.
What is unique about a multi-core processor?
It is a single chip with two or more separate processor cores.
Current processors include advanced transfer cache, a type of cache built directly on a processor chip. Which type of cache is this?
L2 cache
In your engineering class, you are required to calculate the approximate size of a series of chips. Which of the following is true?
Most chips are no bigger than one-half-inch square.
If a computer advertisement states a computer operates at 5 GHz, what does that mean?
The system clock has a clock speed of five billion clock cycles per second.
Double Data Rate SDRAM (DDR SDRAM) chips are even faster than SDRAM chips because which of the following is true?
They transfer data twice for each clock cycle.
Plasma monitors offer large screen sizes and rich colors. Which of the following statements describe how plasma monitors work?
Voltage is applied to a layer of gas between two glass plates, which releases a UV light that causes the pixels on the screen to glow.
You are an expert in devising product activation schemes for software publishers. Which of the following is not one of the techniques you have used in the past?
You create the application to be available for download only.
If you see eight numbers such as 01000101 grouped together and you are told these numbers represent the letter E, what is this combination of numbers called?
a coding scheme
A computer technician told your friend he needed a circuit board that provides a connection to a peripheral device for use with his computer. What category of circuit board should your friend purchase?
adapter card
What is another name for public key encryption?
asymmetric key encryption
Which of the following determines the number of bits that the computer can transmit at one time?
bus width
Which of the following is another term for the system unit?
chassis
Which of the following is measured by the number of ticks per second?
clock speed
As you edit some photos from your summer vacation, you choose to make a beach photo much smaller in terms of its file size in order to be able to email it to your friends. Which tool will you use for this?
compress
Your business is looking to rely on cloud computing services to specify the applications, security settings, and computing resources available to employees on their computer desktops. What is the term for this?
desk top as a service
Which of the following is NOT an example of a common nonimpact printer?
dot-matrix printer
What are the four steps in the machine cycle?
executing, fetching, storing, decoding
Which of the following does your new smartphone use to unlock the device?
face recognition
If your friend recently has participated in e-filing, what has she been doing?
filing her state and/or federal tax returns online
Which of the following is a type of nonvolatile memory that can be erased electronically and rewritten?
flash memory
Which of the following performs calculations on the data in a worksheet like the one in the accompanying figure and displays the resulting value in a cell?
formula
Which of the following does you college use to verify your identity?
hand geometry system
What is the unit of measurement for the clock speed for the channel shown in the accompanying figure?
hertz
In a spreadsheet program, how is data organized?
in rows and columns collectively called a worksheet
Which of the following refers to the right of individuals and companies to deny or restrict the collection and use of information about them?
information privacy
What is the purpose of the system bus?
it connects the processor to main memory
Which of the following can be used to create a software registration number, sometimes illegally?
keygen
Using ink-jet printer technology, but on a much larger scale, which of the following creates photo-realistic-quality color prints?
large-format printer
What is an EULA intended to do?
licence software for individual user
Which category of applications allows you to locate a nearby restaurant or check the weather forecast?
life style
The accompanying figure shows which of the following kinds of modules, which are small circuit boards where RAM chips usually reside, being inserted into the motherboard?
memory
If a dog is identified by scanning the shoulder or neck of the animal, what provides the information about the dog?
microchip
____ apps can allow you to lock your mobile device and SIM card remotely.
mobile security
When your friend opened the case containing the electronic components of his computer, he saw the main circuit board for the computer. What is this circuit board called?
motherboard
What is a single device that provides functionality of a printer, scanner, copy machine, and perhaps a fax machine called?
multifunction printer
What kind of software allows users to combine text, graphics, audio, video, and animation into an interactive application?
multimedia authoring
Several factors that affect the quality of an LCD monitor or LCD screen, including the specific resolution for which they are geared. How is this resolution described?
native resolution
Which of the following terms means in a location separate from the computer site?
off-site
Where do RAM chips usually reside within a computer?
on a memory module
You are working for a book publisher and devising the height of the pages that will be required to print a given book. The text for the book is about 10 points. What will be the approximate height of each character in the book?
one-sixth of an inch
Which of the following printer is a color printer that produces photo-lab-quality pictures?
photo
What component converts the AC power in a wall plug to the DC power required by a computer?
power supply
which kind of software can be distributed by anyone to others at no cost?
public-domain
Which of the following is a request for specific data from a database?
query
Which of the following are small high-speed storage locations contained by the processor that temporarily hold data and instructions?
registers
During the infection stage, what three actions does a computer virus typically perform?
replicate itself, conceal itself, activate when a condition or event occurs
Which of the following features is offered by WBT?
self-directed, self-paced instruction
Which of the following is a collection of individual programs sold as a unit?
software clusters
Which of the following is the least likely motive for a DDoS?
spoofing
The role of memory to store both data and programs is known as which of the following concepts?
stored program
In reference to search utilities, what does an index do?
stores information about a file, including its name, date created, and author name
What is memory access time?
the amount of time it takes the processor to read data, instructions, and information from memory
You have a new word processing program. Which of the following is least likely to be a feature in the program's spelling checker?
the capability to check the arithmetic in a table of calculations
define the term payload, as it pertains to computer crime
the destructive event or prank the virus was intended to deliver
If your instructor turns on his computer and then starts a web browser, what contents are in RAM?
the web browser instructions and certain operating system instructions
To which of the following is a control unit most analogous?
traffic officer
When application software poses a question to a computer user and the user answers, what term is used to identify that answer?
user response
Many worksheet cells like those in the accompanying figure contain a number that can be used in a calculation. What is the name for this?
value
Which of the following warns that the computer is infected and needs immediate attention?
web filter
What kind of software helps users of all skill levels create web pages that include graphics, video, audio, animation, and other special effects?
website authoring