BCCC CISC110 Final

Ace your homework & exams now with Quizwiz!

Which of the following would NOT be a recommended place to back up or copy computer files?

***Internal hard drive DVD External Drive Flash Drive

Which is NOT a file extension used by Microsoft Office programs?

.rtf ***.pff .docx .pptx

A binary code using eight bits has ________ different possible combinations.

256

Which operator is used to return results that includes two specific words?

AND

program stored on a chip on the motherboard that starts up the computer

BIOS

chip that stores settings for computer start-up

CMOS

________ computers offer the most speed, power, and upgradability for the lowest cost.

Desktop

Which operating system is specialized and can run on simple hardware?

Embedded

________ computers are present in such diverse applications as gasoline pumps, home appliances, and traffic lights.

Embedded

The backbone of the Internet is composed of numerous Internet ________ Points around the world.

Exchange

transfers files between computers

FTP

256 bits equal one byte T/F

False

A DBMS will define a data type for you by evaluating the data currently entered into the fields. T/F

False

A decision support system is made up of a knowledge base and an inference engine. T/F

False

Cloud backup is generally more limited than cloud storage. T/F

False

Mainframes are computer systems that perform complex mathematical calculations, such as those used in weather forecasting. T/F

False

NIC stands for network input card T/F

False

Pixels store the colors red, green, and black. T/F

False

The information processing cycle consists of five stages: input, processing, retrieval, storage, and output. T/F

False

The speed at which the processor executes the cycles is known as a CPU's clock cycle T/F

False

Today's processor speeds are measured in ________.

GHz

________ contains the tasks and dates for a project and shows the schedule and progress of the project in a graphic.

Gantt Chart

________ is the authoring language that defines the structure of a webpage

HTML

language used to display information on the web

HTML

What project was coordinated by the U.S. Department of Energy and the National Institutes of Health.

Human Genome Project

Wi-Fi networks used in homes and public hotspots use the ________

IEEE 802.11 standards

Which is NOT an advantage of using a cloud storage service?

It keeps your backups at a different location. It is faster than other backup options. It can be set to backup files automatically. It is easy to set up.

MP3 stands for ________.

MPEG-1 Audio Layer 3

Fourth-generation computers used ________

Microprocessors

predicts the growth of integrated circuitry

Moore's Law

The smallest type of notebook computer is a ________, which is designed primarily for accessing the Internet.

Netbook

When the Internet backbone was privatized, five large ________ Access Points made up the new backbone.

Network

________ provides the user with an interface to communicate with the computer's hardware.

Operating system software

network that does not require a network operating system

P2P

allows easy addition of new hardware to a computer system

PnP

To share files with other users of the same computer using macOS, you would place them in the ________ folder.

Public

volatile memory

RAM

non-volatile memory

ROM

sends email

SMTP

________ involves the delivery of applications - web apps - over the Internet.

SaaS

ensures that all packets are transmitted reliably

TCP

.com is an example of a ________.

TLD

Which statement about vacuum tubes is NOT accurate?

They are similar to light bulbs. They were used in first-generation computers. They generate a lot of heat when operating. ***They seldom need to be replaced.

Which of the following statements about P2P networks is FALSE?

They can share a printer. All computers are considered equals. ***The services and security are centralized. They can only support a small number of devices

Adding a browser ________ gives you quick access to the features of the application that installed it.

Toolbar

A static HTML page is the simplest form of a webpage. T/F

True

Computers use a base 2 number system and binary codes to carry out commands. T/F

True

Distributed computing that uses a group of computers in one location is called grid computing.

True

Information flows between the components of a computer over wires on the motherboard called data buses T/F

True

It is illegal to remove DRM from a protected file T/F

True

MP3 files use lossy compression to reduce the size of an audio file. T/F

True

Rootkits are very difficult to detect T/F

True

Web mail is an example of SaaS. T/F

True

To protect your computer from adware, you would purchase ________ software.

antispyware

The ________ allows programs to run on computers with different hardware configurations

application programming interface

The ________ allows a program to request a service such as printing from the operating system.

application programming interface (API)

Network speeds are measured in ________ per second.

bits

Businesses should use a ________ network to share resources

client-server

A data ________ defines the fields in a database and the type of data that each field contains.

dictionary

Linux ________ include the OS, various utilities, software applications, and an office suite

distros

An Excel spreadsheet is an example of a(n) ________ database

flat

sets up a file system of a disk

high-level formatting

The fetch-and-execute cycle is also called the ________ cycle

instruction

Third-generation computers are characterized by the use of ________.

integrated circuits

When using a Windows PC, you can use a ________ to organize similar files that are located in different locations.

library

sets up clusters on a disk

low-level formatting

Hard drives store data ________.

magnetically

Clickjacking results in ________

malware posting unwanted links on your Facebook page

Data in a(n) ________ database are stored in data cubes

multidimensional

Wi-Fi that is made available in some cities and towns is known as ________ Wi-Fi.

municipal

When you decide to use your neighbor's open wireless network without permission, you are ________.

piggybacking

Which device uses one or more pens to draw an image on a roll of paper?

plotter

One disadvantage to e-ink technology is that it ________.

requires an external light for night reading

If you want to connect your home network to the Internet, you will need a ________ in addition to a modem.

router

_______ technology is used for sending email messages

store-and-forward

Most home routers also include a built-in ________

switch

The ________ is the logical model of a new system.

system specification report

C++ is an example of a ________-generation language

third

represents the type of website that is visited

top level domain

The ________ is a complex circuit that enables it to act as the brain of the computer.

transistor IC chip vacuum tube ***microprocessor

Second-generation computers used ________

transistors

The difference between a virus and a worm is a ______

virus needs a host file, but a worm does not


Related study sets

GSBA544 - A Firm In A Global Economy

View Set

ACCY 1 LS: Chapter 8. Current Liabilities

View Set

Module 2: Structures and Functions

View Set