BUSI COMPUTER APPS FINAL review
A point in a computer (a hole or a slot) that accepts a specific connector is called a ________.
port
If you have compromised your U.S. debit card Federal law says that if you tell your bank within two business days of learning about it, you will only be liable for a maximum of ________ in fraudulent charges.
$50.00
The device that connects two networks is a ________.
router
To improve the sound quality of their smartphones, many users purchase larger external ________ to listen to music.
speakers
What is the most powerful computer type?
supercomputer
Which has the most storage capacity?
terabyte
The highest level in the domain name hierarchy is known as the ________.
top level domain
Screen size is an important consideration when buying a new computer.
true
CDs provide approximately ___ of data storage space.
700 MB
Data flows between different computer parts via ________.
BUSES
A person with unlawful access to networks to steal and corrupt information and data is called a ________.
HACKER
A port that allows the transfer of high quality video and audio signals is called a_____ port
HDMI
________ property laws protect against unauthorized use, sale, or distribution of software, music, movies, video games, and many other digital products.
Intellectual
A commonly used short-range wireless technology used for data transfer and electronic payments is called ________.
NFC
Though currently expensive, curved and paper-thin displays are possible using ________ display technology.
OLED
A request for an electronic "echo" or response from another computer or server is called a ________.
Ping
All of the following are true about RFID except RFID doesn't require line-of-sight scanning. RFID uses infrared transmissions. RFID stands for Radio Frequency Identification. RFID can be used to identify a variety of objects including chip-implanted objects, and animals.
RFID uses infrared transmissions
The type of storage that retains data and information when the power is turned off is called ________.
ROM (read only memory)
RFID stands for which of the following?
Radio Frequency Identification
Which category of management information systems (MIS) combines the forecasting capability of decision support software with the records keeping capability of transaction processing systems software to help businesses manage inventories efficiently?
SCMS
Most tablets and phones use ________ as their main storage device.
SSD
A processor that consists of one control unit and one ALU is called a ________.
Single-core processor
The first social media site to allow users to create profiles, organize groups, and invite friends was called ________.
SixDegrees.com
Sometimes spam messages are referred to as ________.
UBE
The standard for wireless network privacy and protection is known as ________.
WPA2
E-mailing a file to yourself is an example of using ________ storage.
cloud
Errors in data occurring while entering, reading, processing, storing or transmitting is known as data ________.
corruption
A crime in which a computer is the object of a crime or in which a crime or offense is committed is called ________.
cybercrime
Which transmission media has the largest bandwidth?
fiber optic
When referring to business information technology, MIS stands for ________.
management information systems
The word modem stands for ________.
modulator-demodulator
Server banks have capacities measured in ________.
petabytes
A typical laptop has a storage capacity of approximately ________.
500GB-1TB
Business owners, copyright holders, and network administrators publish ________ so that users understand what is expected and permissible when they use the network, computer equipment, and/or software.
AUP'S
A ________ attack on a network is created to stop or interrupt traffic by saturating it with too many requests.
DDoS
What technology enables business-oriented transactions and information to be communicated electronically between people and organizations?
EDI
IrDA radio waves pass easily through walls and furniture.
False
Cache is slower but larger than RAM.
False - Cache is smaller but faster than RAM.
The ________ computer creates images on your computer.
GPU
This type of analysis or walking stride identification is valuable because it can be used at night or through walls with infrared cameras or even with satellite imagery.
Gait analysis
Relatively rugged, water-resistant video cameras that allow users to film high-definition video under harsh conditions, such as on ski mountains, in the ocean, or at high altitudes are called extreme-action video cameras or simply a ________.
GoPro
What is equal to one cycle per second?
Hertz
VPN (Virtual Private Network) is a very useful tool in protecting your online identity. A VPN hides your ________ to outside websites.
IP address
All of the following statements about Instagram are true except
Instagram is difficult to integrate with apps like Facebook and Foursquare.
The processor directly houses the ________ cache.
L1
A switch distinguishes between various devices within a network by their ________ addresses.
MAC
All of the following are common ports that are included with laptop computers except ________.
MIDI
Digital music devices are connected to computers using ________ ports.
MIDI
Broadband is measured in ________.
Mbps
Which of the following might be risky to uninstall from a Windows PC laptop?
Microsoft Works 6-9 Converter
Which of the listed programs are used for creating documents, basic web pages, and desktop publishing?
Microsoft word
The technology that uses the reflection of a laser of the graphite left by a #2 pencil to determine if a bubble has been filled in is called
OMR
Because they have no mechanically moving parts, ________ provide extremely fast, efficient storage.
SSDs
A computer that is highly mobile, has a smaller OS, and uses a touchscreen as the primary input method is called a ________.
TABLET
Laser printers are popular in offices because they use relatively inexpensive ________.
TONER
Which category of management information systems (MIS) focuses on tracking sales and inventories?
TPS
The World Wide Web was created through a collaboration led by ________.
Tim Berners-Lee
The DMCA titles that directly affect digital copyright issues include all except Title 1-WIPO Copyright and Phonograms Treaties and Implementation Act. Title 2-Online Copyright Infringement Liability Limitation. Title 3-Computer Maintenance Competition Assurance. Title 5-Copyright Protection Proviso.
Title 5-Copyright Protection Proviso.
signs your system might have been hacked include fake antivirus messages and unwanted browser toolbars.
True
The wireless network privacy standard that was introduced in 2003 but was quickly replaced (due to numerous vulnerabilities) was known as _____.
WPA
The data definition, as described in the data dictionary, tells users how each unit of data is defined in the database. Which of the following elements will be used to describe the data? What field name will the data fall under What data type will be included What data type will be included What database manufacturer is used When was the database created
What field name will the data fall under What data type will be included When was the database created
If you want to know the name of an owner or sponsor of a website, you can go to ________ .net.
WhoIS
The wireless network protocol is called ________.
Wi-Fi
DVDs store data using ________.
a reflective coating that has pits and lands
In professional messages, avoid the use of emoticons and ________.
acronyms
Combining a desktop's power with a clean look, ________ computers are popular with companies. However, their inability to expand makes them less popular with serious gamers.
all-in-one
Which of the following HTML objects will find web pages with hyperlinks?
anchor
Lightning connectors and ports are used by which company?
apple
The mouse was developed by which company?
apple
The two main components of a processor are the control and the ________.
arithmetic logic unit
The width of a screen compared to the height of a screen is referred to as ________.
aspect ratio
The capacity of a particular transmission medium is called its ________. Multiple Choice
bandwidth
The volume of data that can be carried on an Internet transmission media in an amount of time is called ________.
bandwidth
A device commonly used for checkout in stores, that measures the reflection of a laser beam, is called a ________ reader.
barcode
Since its radio waves pass through walls or desktops, ________-capable devices are very popular.
bluetooth
An Internet signal that has enough bandwidth to allow multiple computers to be connected to the same router is called a ________ signal.
broadband
Software applications that allow users to access and surf the World Wide Web are called ________.
browsers
The two main factors that affect the speed of the processor are clock speed and ________.
bus width
One category of E-commerce includes ________.
business to business
One character of information, for example, a letter or a number comprises of one ________ of storage.
byte
Which might be a choice for Internet service in your area?
cable internet
The ________ speed of the processor dictates the number of instructions that CPU can process per second.
clock
Clock speed, also known as ________, is the speed at which the processor performs the operations required to run a digital device and the digital device's instructions.
clock rate
Because it allows their files to be accessed from any device on the Internet, many users like to back up their files using ________ storage.
cloud
A virus signature is the software ________ of a particular computer virus.
code
Which of these would be deemed a cybercrime?
data manipulation
Amazon.com allows you to search for thousands and thousands of items using images and information that are organized logically. This much storage and management requires a complex ________.
database
Devices with a separate system unit and a relatively large footprint are called ________ computers.
desktop
Which device carries a relatively large footprint and separate system unit?
desktop
Solid state drives store data using ________.
electronic circuits
E-commerce is short for ________.
electronic commerce
A pixel is the largest element in an electronic image.
false
Adware is software that collects the user's keystroke history.
false
Computer memory has many moving parts.
false
In general, game controllers can be interchanged between different types of gaming consoles.
false
An application that navigates all of the files and folders on your Mac is the ________.
finder
To control how information is entered into a database, programmers and database administrators create ________ to help ensure data integrity.
forms
A desktop computer's RAM is measured in ________ of data.
gigabytes
Storage capacity for laptop hard drives is typically described in terabytes or ________.
gigabytes
The visual image output created by the computer is called ________.
graphics
For ________ it may be less expensive to add an existing cell phone data plan and to use the phone as a hot spot than to add wired Internet service.
individual users
A TV remote usually uses ________ waves.
infared
Although it sounds ironic, searching the ________ in your area is an efficient way to search for an ISP.
internet
Firewall software used to block Internet-specific content of a user is called an ________ filter.
internet
Cyberattacks include all the following except Internet browsing. pharming and phishing. spyware. spamming.
internet browsing
A ________ logger is a form of spyware that records your keyboard strokes.
keystroke
A short (simple text) e-mail uses about one ________ of data.
kilobyte
Which of the following represents the least amount of storage?
kilobyte
What type of virus is written in a macro language and placed in a document or table?
macro virus
Most desktop computers use ________ to store data.
magnetic hard drives
Because of its potential to diagnose health issues, one of the largest data requirements of the future will likely be ________.
mapping patients' genomes
Megahertz is the same as a ________ cycles (or instruction) per second.
million
Sometimes used in smaller business networks, employee ________ software is impractical for large networks because of the number of users and the potential for misuse.
monitoring
The standard code of respectful conduct governing the use of software and hardware for electronic communications is called electronic etiquette or ________.
netiquette
The information in the memory (the RAM, the caches, the registers) is ________ when a computer is shut down.
not saved
Single events and a(n) ________ series of events are two common cybercrime categories.
ongoing
Many manufacturers have made ________ optional equipment when purchasing a new laptop computer.
optical drives
RFID chips are found in many important items such as
passports
An input, output or storage device connected to a computer is known as a(an) ________.
peripheral
Using cells of ionized gas to create images, ________ displays are actually becoming less popular.
plasma
If antivirus software can not delete an infected file, it sends the file to a hard disk area called ________.
quarantine
To search a database for information, create a ________.
query
In the datasheet view of a relational database (such as Microsoft Access) a row of information is called a ________.
record
Anything you share on Facebook can be easily ________ to others.
sent
A collection of related records in a database is referred to as a ________.
table
One of the main differences between free and fee-based antivirus software is ________.
the number of features
Since they are low-priced and reliable, ________ storage devices are extremely popular.
thumb drives or flash drives
The Federal ________ Commission is the main government organization that oversees Internet privacy.
trade
The technology that uses cameras, microphones, displays, speakers, and software to allow users to both see and hear each other is called ________.
video conferencing
The maximum number of bits per CPU instruction during one machine cycle is ________.
word-size
A hacker-controlled computer is called a ________.
zombie
Most new laptop computers come with how much storage?
256 GB -1TB
When you buy a new laptop, how much RAM should it come with?
4-8 GB
Blu-rays provide approximately ________ of storage space.
50 GB
A wireless short-range transmission protocol is called ________.
Bluetooth
Which optical drive media stores approximately 700 MBs of data?
CD
Business management software that encompasses nearly all business activities in a corporation is called _____ software
ERP
As technology advances there are fewer keyboard options available for computer users.
False
PayPal charges a fee for making a purchase.
False
a protocol commonly used to transfer large files from one server to another on the Internet is the______
File transfer protocol
Trojan Horse programs are used to find all of the following except Finding free downloads bypassing firewalls destroying data finding passwords
Finding free downloads
Which is true regarding the length of a USB cord?
In general, the more data being transmitted, the shorter the cord should be.
In the body of a professionally formatted business e-mail, where should a request be placed?
In the first sentence of the body of your email
Josh is taking an Intro to Computers course and needs to use Microsoft Office to complete a variety of assignments. He has purchased the software, now he must ________ it so he can start his assignments.
Install
ISP stands for
Internet Service Provider
Boolean operators are the words "AND". "OR" and _____. The use of Boolean operators can make a search more precise and return better results.
NOT
Printer speed is described using which acronym?
PPM
The most common printers for printing receipts are ________ printers.
THERMAL
One of the important Internet privacy law/rules is the Children's Online Privacy Act (COPPA).
TRUE
Television displays with resolutions of at least 3840 x 2160 pixels are referred to as ________.
UltraHD
A camera that takes photos or streams video into a computer or over the Internet is called a ________.
Webcam
CDs store data using ________.
a reflective coating that has pits and lands
A disadvantage of cloud storage is that ________.
data is only available when you're online.
How is the screen size of a laptop computer measured?
diagonally from left corner to right corner.
Search ________ optimization (SEO) is a set of strategies, techniques, and practices used to increase the amount of visitors to a specific website by getting a high ranking placement in the search engine.
engine
In a database a ___ is a group of related characters in a database table that represents a characteristic of someone or something.
field
Which of the following is a strength of the Linux platform? most widely used OS in smartphones and tablets most widely used OS in desktops and laptops free to download and use less susceptible to viruses than Mac OS
free to download and use
Which is not considered an e-commerce transaction? B2C C2C G2B B2B
g2b
Typical tablet computer or smartphone SSD capabilities are measured in ________.
gigabytes
A complex database that organizes and stores information in a cube format and has measure attributes and feature attributes is called a ___ database.
multidimensional
Though legal, which of the following would likely be prohibited by a typical business computer-use policy? making a bomb threat over the network setting up a pyramid-type computer scam intentionally installing a computer virus online personal shopping
online personal shopping
Cookies used to collect user information like passwords and stored on a computer hard drive until deleted or expired are called ________ cookies.
persistant
Once you accept a Facebook friend request, you have access to their ___ Facebook page
personal
The accuracy of a digital recording is determined by the device's ____ rate
sampling
Along with the From line, what is the most important factor in ensuring your business message is read?
subject line
Select the smartphone input device.
touch screen or keyboard
A damaging program duplicating itself on a single computer or over a network is called a ________.
worm
Sometimes used to create prototype models for casting, ________ printing is also known as additive manufacturing.
3-D
Bus width is the amount of data that can be transmitted at a given time. A 64-bit bus can transmit ________ bits of data.
64
The Internet service that tends to provide the most consistent speeds is ________.
DSL
What is the acronym for End-User Licensing Agreement?
EULA
Today, the standard port for video and audio input on TV is the ________ port.
HDMI
Adding software to a digital device, or adding hardware components to a digital device is called _____ .
Installing
The technology (chips) that allow cell phone microphones and hearing aids to be so small is the ________ chip.
MEMS
Megahertz abbreviation is ________.
MHz
A storage device that uses lasers to read CDs, DVDs, or Blu-ray discs is referred to as a(n) ________.
Optical Drive
An output device that uses light to display video or image output on a surface is called a ________.
PROJECTOR
Because of its capability of storing data in multiple hard drives, data warehouses use ________ technology to ensure redundant data storage.
RAID
a signal transmitted every few seconds by a wireless router so that users' computers can find the Wi-Fi hot spot is called
SSID
Select what's true about object-oriented databases.
Store instructions for how to compute the data as well as the data to be processed Equipped to handle unstructured data such as MP4 files, videos, images, and extremely large files Use Object Query Language to construct queries that extract data from the database
Applications are computer programs created to execute specific tasks.
TRUE
Bluetooth is a short-distance wireless communication technology that uses short-wavelength radio waves to transfer data.
TRUE
Many cellular ISPs offer modem/router combination devices that can create a ________ wherever there is adequate cell service.
Wi-Fi hotspor
An AUP is a written document that provides a framework of rules to be followed by computer users. AUP stands for ________.
acceptable use policy.
Smartphone cameras work by focusing incoming light onto what type of array that captures images?
active pixel scanner
A bus is a channel over which information flows. A bus has two parts: the ____ and the____?
address bus; data bus
Social media apps integrate all of the multimedia listed except images. addresses. videos. messages.
addresses
Software that collects the web browsing history of the user and uses the collected data to create unwanted pop-up ads is called ________.
adware
The smallest unit of data storage is a ________.
bit
Intrusion Detection Systems (IDS) use several techniques to protect networks. One is called a "halt", which stops the hacker from progressing into the network. Another is called a ________, which closes the access point used by the hacker.
block
Most touch pads use ________ to sense when a finger has moved across the pad.
capacitance
The technology that allows any text, even handwritten scrawls, to be digitized is known as optical ________ recognition.
character
The fact that data on servers is nearly always backed up onto other servers gives ________ storage a major advantage over other data storage methods.
cloud
A description of the difference in the luminance of a display's white pixels compared to the black pixels is called ________.
contrast ratio
The most popular web browsers have a private browsing mode (Incognito). While browsing in Incognito mode your browser will not store ________.
cookies
________ Commons is a global nonprofit organization that empowers people to create open resource materials that can be shared or reused.
creative
Repeated and deliberate harassment or harassment of a person or group of people through information technology and networks is called?
cyberbullying
A person who uses computers and the Internet to launch attacks against computer systems for political or ideological reasons is called a ________.
cyberterrorist
Collecting data, interpreting information gleaned from a database, and preparing reports for senior management are tasks that are typically assigned to a ________.
data analyst
What element of a database field specifies the data in a field such as text, numeric, or date/time?
data type
SAGE was developed by the U.S. Department of ________.
defense
Which of the following could have a traditional (magnetic) hard drive?
dell desktop computer
An integral part of a database management system (DBMS) is the Data Definition subsection. This subsection uses a data schema, also called a data ________.
dictionary
A database that stores data in different physical locations and that users access though client/server networks is called a ________ database.
distributed
The Linux OS is owned by IBM.
false
Trojan programs replicate themselves often.
false
Worms are designed to only attack wireless networks.
false
When you need to link two tables in a database that don't have a field in common, one solution is to create a ________ in one table that links to the primary key in the other table.
foreign key
The number of times per second a frame in a video is advanced is the definition of ____
frame rate
The ________ is a separate processor (computer) on your computer that enhances your video.
graphic processor (GPU)
Breaking into a computer system (hacking), for politically or socially purposes is called ________.
hacktivism
To allow hard disk drive platters to spin more smoothly and cooler, some manufacturers seal the platters in ________ instead of air.
helium
Using refracted laser light to store data on a photoreceptive substrate is essentially how ________ storage works. Theoretically this could store gigabytes of data within a cubic millimeter.
holographic
All the following should be taken into account when using Twitter, except
if a Twitter user has been blocked you can file a formal complaint through Twitter.
Which of the following are examples of HTML objects? Anchor Image Link Storage
image link anchor
The roles of directing IS technicians, working with senior management to procure and implement IS, and developing policies for corporate IS typically falls to the ________.
information systems (information technology) program manager
The role of installing, maintaining, repairing and replacing information system hardware and software typically falls to the ________.
information systems (information technology) technician
Which of these browsers was developed by Microsoft?
internet explorer
Because a metal platter is physically spinning, hard drives have ________ access times than solid state hard drives.
longer
A million bytes of data equals one ________.
megabyte
One thousand kilobytes (KB) equals one ________.
megabyte
Which of the following is a strength of the Android platform?
most widely used OS for smartphones and tablets.
Electronic etiquette is also known as ________.
netiquette
All of the following are protected by intellectual property laws against unauthorized use or distribution, except
open educational resources
What manages hardware and software, supports the computer's basic functions, and runs programs?
operating systems
Using reflective material to store data that can be read using a laser is called ________ media storage.
optical
Which of the following is an e-mail program?
outlook
________ runs the processor faster than recommended by the manufacturer. This can increase performance and speed, but will also void the manufacturer warranty.
overclocking
The three most common types of e-mail viruses include all except
password savers
The BitTorrent protocol is often called ________ file sharing.
peer-peer
Unlike phishing that uses fake e-mails to gain personal information about a user, ________ uses fake websites to gain personal information.
pharming
The smallest controllable element of an image is called a(n) ________.
pixel
The smallest image element is a(n) ________.
pixel
A type of printer that is used to print large graphic images such as architectural drawings by mechanically moving a pen over a large sheet of paper is known as a ________.
plotter
With regard to digital storage, RAID stands for ________.
redundant array of independent discs
The type of database that uses common fields to create links between tables is called a ________ database.
relational
Software that gives network administrators the ability to provide computer assistance from a central location by allowing them to display and control any computer on the network is called ________ software.
remote desktop
To display or distribute information from a database, programmers or database administrators create ________.
reports
Amateur computer hackers with little programming expertise, who illegally access computer systems by means of programs (scripts) written by others, are called ________.
script kiddies
In general, the ________ the access time, the faster the hard drive.
shorter
Increased data transfer will be less likely to have errors if you use a ________ USB cord.
shorter
Contact your ISP if your actual Internet speed is ________ than advertised.
slower
Data from the hard drive reaches the CPU ________ than data from the RAM.
slower
The average tablet has a ________ hard drive compared to the average desktop.
smaller
Specialized hardware or software that capture packets transmitted over a network are called packet ________.
sniffers
Which of the following is not a category of Intellectual property? copyrights trademarks software use patents
software use
An unwelcome e-mail message is called ________.
spam
Devices allowing data to be retained when your computer is shut down are called ________ devices.
storage
The component of a computer that allows data to be retained after power is turned off is referred to as ________.
storage
To create an image with a laser printer ________ is(are) drawn to the drum.
toner
Used in a variety of devices including ATMs and point-of-sale terminals, ________ allow for the input of data with the use of a stylus or finger.
touchscreens
3-D mapping, feature charting, and skin texture are some of the methods facial recognition software uses to identify individuals.
true
A computer platform is commonly referred to as an operating system or OS.
true
The 3.5-mm connectors are the most popular for audio devices and have been used for nearly 70 years.
true
The BitTorrent protocol allows members to share large files over the Internet.
true
The term hacker and cracker are synonymous.
true
Transmission media can be either wired or wireless.
true
You must adjust the cookie settings individually in each browser you use.
true
URL stands for ________ Resource Locator.
uniform
Cookies stored on a computer store information about ________.
user preferences
Most smartphones and tablets produced today use a ________ keyboard.
virtual
Software that infects a computer and is created by computer code is called a
virus
A company brand identity is derived from all except what goals they want to accomplish. what their competition perceived them to be. who people perceive them to be. who they are.
what their competition perceived them to be.
Non-malicious computer security specialists that take a look at the safety measures of associate organization's info systems to confirm they're protected against malicious intrusions are called ________.
white hat hackers
A form of E-mail fraud where criminals change the account where money is being transferred is called a ________ scam.
wire-wire
Which category of management information systems (MIS) focuses on providing forecasting capabilities for sales and production?
DSS
This type of connector is the most common type of connection to a Windows computer for peripherals (printers, monitors, storage devices etc.).
USB
This type of connector is the most common type of connection to a computer for peripherals (printers, monitors, storage devices, etc.).
USB
What type of port do most digital devices use to attach peripherals?`
USB
When discussing digital cameras or smartphone cameras with APS CMOS, APS stands for ________.
active pixel sensor
The number of bits of data describing each pixel in a display is referred to as ________.
color depth
A digital device that accepts input, processes and stores the input, and provides output is a ________.
computer
A site on the Windows operating system where you can uninstall programs, adjust settings, and manage tasks is the ________.
control panel
A small text file of information created by websites that your web browser stores on your hard drive is called a ________.
cookie
Monitoring database systems performance, developing and maintaining databases, and establishing user privileges for databases are usual roles of a ________.
database administrator (DBA)
Because he wanted to be able to sort gifts according to continent and time zone, in 1984 Santa switched from using long lists to using ________.
databases
The acronym DDoS stands for ________.
distributed denial of service.
A ________ name identifies a server site on the Internet.
domain
The distance between two adjacent sub-pixels on a display is referred to as ________.
dot pitch
Transferring a file to your digital device from the Internet is called ________.
downloading
Routers that can send Internet signals over two distinct frequencies are called ________ routers.
dual-band
Using a stylus and touch pad to map the signature and also measure pressure, pen angle, pen up/down, speed, etc., is known as what type of signature recognition?
dynamic
RAM is ________ and has no moving parts.
electrical (solid state)
The protocol used for transmitting large files from one server to another over the Internet is known as the ________ Protocol (FTP).
file transfer
The risks of downloading a file from the Internet includes all except fileware. virus. malware. spyware
fileware
A ________ is the hardware or software used to keep a computer secure from external threats such as hackers and viruses by allowing or blocking Internet traffic.
firewall
A zombie is a computer controlled by a ________.
hacker
Databases are built by starting with single characters of data, organizing the data into fields, organizing the related fields into records, the records then make up a table. This organization is referred to as a data ________.
hierarchy
A refracted laser beam striking a photoreceptor from many different angles allows ________ storage to retain many bits of data in the same location.
holographic
Malware is designed to do all the following except
improve data
Adam was in the fifth grade when he was adopted by the Smith's. Because his school used a centralized database, all of his teachers had his correct name on their grade reports. This is an example of how a centralized database can help improve data ________.
integrity
A mobile hinged computer with an integrated keyboard that uses a full operating system is called a notebook or a ________ computer.
laptop
Because of their compact size, touch pads are most often used with ________ computers.
laptop
Avoiding viruses include all the following except only visit trusted sites. purchase a new router often (yearly) for the latest firewall protection. bypass your browser's built-in security. leave USB drives in when booting the computer.
leave USB drives in when booting the computer.
The DBMS engine provides an interface for the end user of the database. This interface is called the ________ view.
logical
Because Microsoft Access includes not only the software needed to create a database, but also the software needed to create forms, reports, data dictionaries and other capabilities, it is often referred to as a Database ________ System.
management
When you receive a utility bill, you're actually getting a report that was generated by a database management system. The DBMS subsystem that provides for data maintenance, analysis, and the generation of reports is called the data ________ subsystem.
manipulation
Fiber-optic cable is ________ expensive than coaxial cable to install.
more
Blu-ray technology stores data using ________.
pits and landing that are read by a blue spectrum laser beam.
The term that describes how fast each pixel in a display is updated is ________.
refresh rate
A link between tables in a relational database that defines how the data is related is called a ________.
relationship
The number of pixels in a display is called the display's ________.
resolution
Your ________ can provide hardware firewall protection for your home network where it connects to the ISP's network, just as ISP networks have firewalls where they connect to the Internet.
router
If copyrighted software is illegally copied, distributed, modified or sold and is regarded as a direct infringement of copyright, this is called ________.
software piracy
Using information systems to help foresee corporate business opportunities and threats that might be done by all levels of management, but it is most important for which management level?
top-level managers
A connector is a specialized end of a cord, plug, or expansion card that connects to a port.
true
A port is a slot or hole that matches the cord or expansion card being connected to the port.
true
Graphics are usually created by a separate processor within a computer known as the GPU (Graphics Processing Unit).
true
Maintenance type tasks can be executed using utility programs that are included with most operating systems.
true
Random access memory (RAM) does not store data when the computer is shut down.
true
Some cell phone carriers promising "unlimited data" will actually limit your high-speed, 4G LTE data to a couple of gigabytes per month.
true
Spreadsheet programs are used to format spreadsheets and display numbers and text in cells.
true
The more pixels in an image, the better the image quality.
true
The most ideal firewall configuration consists of both hardware and software.
true
The platform or operating system of a computer controls all of the functions of a computer.
true
The processes of removing software from a computer is called uninstalling.
true
The purpose of an HDMI connector is to transmit high-definition audio and video signals.
true
Downloading content from the Internet poses risks. When downloading from the Internet, it is important to consider all of the following except the source of the content. It is important to consider if the content came from a legitimate source. when sharing files via the Internet via file sharing programs you can unknowingly give outside users access to your computer. your antivirus software will always ensure your files are safe. files downloaded from unknown sites and file sharing sites often contain a variety of malware including spyware and viruses.
your entire virus software will always ensure your files are safe