CGS Exam 1 - Chapter 1-5

Ace your homework & exams now with Quizwiz!

A(n) ______ is a laptop computer that can convert into a tablet-like device. a) 2-in-1 PC b) all-in-one PC c) Chromebook d) ultrabook

a) 2-in-1 PC

Which of the following is an example of financial management software? a) Quicken b) AudioAcrobat c) Lumosity d) Photos

a) Quicken

Ensuring that the content, tone, and style of a website match your needs is checking for: a) Relevance b) Audience c) Authority d) Bias

b) Audience

Beta software is made available because a) wireless networking must be added b) a company is making an early release to test bugs c) the company needs more profits d) new programmers have been hired

b) a company is making an early release to test bugs

What exactly is a byte? a) A byte is a term that is short for binary digit. 8 bytes hold about one letter, one number, or one special character. b) A byte is a string of 0s and 1s that represents special characters such as the @ sign in a computer. c) A byte is a term used to represent eight bits of data. One byte can hold about one letter, one number, or one special character. d) A byte is one bit.

c) A byte is a term used to represent eight bits of data. One byte can hold about one letter, one number, or one special character.

What other precautions can be used to ensure secure online transactions? a) Always using PayPal helps ensure your online transactions are secure. b) You should also keep in mind that you should shop at reputable sites, investigate unfamiliar sites, and save the details of your transactions. c) You should also ensure that the company has a phone number and street address in addition to a website. Additionally, avoid paying by credit card as much as possible. d) You should pay by debit card only.

b) You should also keep in mind that you should shop at reputable sites, investigate unfamiliar sites, and save the details of your transactions.

________ printers work by spraying tiny drops of ink onto paper. a) Laser b) Inkjet c) Cloud-ready d) Large format

b) Inkjet

Examples of crowdfunding and crowdsourcing include a) Ushahidi and Kiva. b) Kickstarter and ScanLife. c) Call a Bike and Zipcar. d) Bing and Google.

b) Kickstarter and ScanLife.

What web browser feature would be particularly useful when using public computers? a) Session restore b) Privacy browsing c) Pinned tabs d) All of the above

b) Privacy browsing

What does productivity software include? a) Productivity software includes the operating system as well as programs that come preinstalled on your system. b) Productivity software includes word processing, spreadsheet, presentation, database, and personal information manager programs. c) Productivity software includes vertical management software. d) Productivity software includes software such as desktop publishing software.

b) Productivity software includes word processing, spreadsheet, presentation, database, and personal information manager programs.

What is the fastest port on the market? a) A solid-state port. b) The Thunderbolt port. c) A USB 3.1 port. d) Serial Port.

b) The Thunderbolt port

The fastest computer port is the ______ port a) WiFi b) Thunderbolt c) expansion d) USB

b) Thunderbolt

If I have a 1 TB internal hard drive, will I also need any additional storage devices? a) No, an internal hard drive with 1 TB of space has enough room to store all of your data, and it's easily portable. b) Yes, you might want to purchase an external hard drive for better portability or to back up data on your internal hard drive. c) Yes you should because an internal hard drive with 1 TB of space hardly has enough space to hold all of the information in one library book. d) No, an internal hard drive with 1 TB of space is not enough; 256 GB would be better.

b) Yes, you might want to purchase an external hard drive for better portability or to back up data on your internal hard drive.

What operating system is required to use Web 2.0 tools? a) Windows 10 is required. b) You can use any operating system to run many different Web 2.0 tools and apps. c) You need special graphics software, like Adobe Premiere, to participate in Web 2.0. Therefore, your operating system must be compatible with Adobe products. d) You must have a mobile operating system like iOS.

b) You can use any operating system to run many different Web 2.0 tools and apps.

Do I face any risks when I install or download beta versions and freeware from the Internet? a) Freeware contains up-to-date virus protection, and beta products are generally developed by reliable developers. As such, there aren't really any risks. b) You must exercise caution when downloading freeware and beta versions as they may contain bug or viruses. c) Freeware is associated with the risk of bugs or viruses, whereas beta products have built-in virus protection and are generally developed by reliable developers. Hence, it's important that you exercise caution with freeware. d) The whole concept of freeware and beta versions assumes ethics and therefore they are thoroughly safe.

b) You must exercise caution when downloading freeware and beta versions as they may contain bug or viruses.

Bike sharing programs like Citi Bike are an example of a) crowdsourcing. b) a subscription style business model made possible by technology. c) principled psychology. d) crowdfunding.

b) a subscription style business model made possible by

Search engines that search other search engines are called a) gigasearch engines b) metasearch engines c) betasearch engines d) megasearch engines

b) metasearch engines

Which of the following would NOT be a good precaution to take when making online purchases? a) use a prepaid credit card b) pay by debit card, not credit card c) use a third-party processor such as Pay Pal d) pay by credit card, not debit card

b) pay by debit card, not credit card

If you would like to return to a website that you visited last week but can't remember the URL, you should look at: a) a breadcrumb list b) the History list c) the Recycle Bin d) any of the above

b) the History list

What is a gigabyte? a) A gigabyte is about one million bytes. b) A gigabyte is approximately 1,000 bytes. c) A gigabyte is about one billion bytes. d) A gigabyte is about one trillion bytes.

c) A gigabyte is about one billion bytes.

What does e-commerace mean? a) E-commerce is a term that refers to transactions that take place between businesses and other businesses. b) E-commerce is a term that refers to transactions that take place between consumers themselves, such as on eBay. c) E-commerce is a term that refers to conducting business online for purposes ranging from fund-raising to advertising to selling products. d) E-commerce is a term that refers to transactions that take place between businesses and consumers.

c) E-commerce is a term that refers to conducting business online for purposes ranging from fund-raising to advertising to selling products.

Artificial intelligence is best described as a) A collection of programs installed with your operating system b) Any tool that makes you feel smarter c) robotics d) A branch of computer science that builds systems to do tasks we associate with humans

d) A branch of computer science that builds systems to do tasks we associate with humans

Can I add more USB ports to my computer in order to connect multiple peripheral devices? a) A port is an interface through which peripheral devices are connected to the computer. You can add extra ports through means such as expansion cards or expansion hubs. b) A port is an interface through which peripheral devices are connected to the computer. You can add extra ports through means such as flash cards. c) A port in an interface through which peripheral devices are connected to the computer. You can add extra ports through means such as routers and switches. d) A port is an interface through which peripheral devices are connected to the computer. You can add extra ports through adding serial ports.

a) A port is an interface through which peripheral devices are connected to the computer. You can add extra ports through means such as expansion cards or expansion hubs.

You want to search the web for information on the movie Captain America: Civil War. What would be the best way to enter the key terms to get the most specific results? a) Captain America b) "Captain America: Civil War" c) Civil War d) Captain America Civil War

b) "Captain America: Civil War"

How many bytes are there in a megabyte? a) A megabyte is approximately 1,000 bytes. b) A megabyte is about a million bytes. c) A megabyte is about a billion bytes. d) A megabyte is more than one quadrillion bytes.

b) A megabyte is about a million bytes.

Which of the following is a good suggestion for solving a boot problem? a) If you've recently installed new software or hardware, try uninstalling it. If the problem no longer occurs when rebooting, you can reinstall the device or software. b) Try uninstalling Windows and reinstalling a prior stable version. c) Try exiting out of Stable Boot Mode. d) Power your computer on and off several times quickly.

a) If you've recently installed new software or hardware, try uninstalling it. If the problem no longer occurs when rebooting, you can reinstall the device or software

An example of an open source OS is a) Linux b) Windows c) macOS d) DOS

a) Linux

Once the kernel is loaded, is my computer up and running? a) Not yet. The OS checks the registry for further configurations and customizations. b) That is right. Once the kernel is loaded, your computer is ready to accept your commands. c) Not yet. The OS asks for your login name and password. d) Not yet. The operating system checks your Device Manager in Safe mode

a) Not yet. The OS checks the registry for further configurations and customizations.

In Windows 10, what feature is used to locate and launch software or applications installed on your device? a) The Start Menu b) The Tiles screen c) The File Explorer screen d) The Smart Apps screen

a) The Start Menu

What do the different letters like A: and C: seen when File Explorer is opened refer to? a) These are drives, the first component of the hierarchical structure of drives, folders, subfolders, and files organized by Windows. The C drive is the hard drive. b) These are drives, the first component of the hierarchical structure of drives, folders, subfolders, and files organized by Windows. The A: drive is the hard drive and the C: drive is the flash drive. c) These are drives, the first component of the hierarchical structure of drives, folders, subfolders, and files organized by Windows. The C drive is the DVD drive. d) These are drives, the first component of the hierarchical structure of drives, folders, subfolders, and files organized by Windows. The F drive is the hard drive.

a) These are drives, the first component of the hierarchical structure of drives, folders, subfolders, and files organized by Windows. The C drive is the hard drive.

Course management software creates a virtual learning experience for students and houses course materials, tests, and discussion boards. a) True b) False

a) True

Different versions of Linux are known as distros a) True b) False

a) True

The power-on self-test (POST) ensures all peripheral devices are attached and operational. a) True b) False

a) True

When you buy software, you can use it only as specified in the EULA. a) True b) False

a) True

The first personal computers that used MS-DOS as the operating system had which kind of user interface? a) command-driven b) graphical c) menu-driven d) GUI

a) command-driven

When a printer receives a command, it generates a unique signal to the OS, which is called a(n) a) interrupt b) slice c) event d) none of the above

a) interrupt

What happens after the POST? a) After POST, BIOS copies the operating system from ROM to the hard drive. b) After POST, BIOS copies the operating system from the hard drive to RAM. c) After POST, BIOS copies the operating system from the hard drive to the ROM. d) After POST, BIOS performs the authentication process.

b) After POST, BIOS copies the operating system from the hard drive to RAM.

A macro is a program released early to the public for testing and evaluation a) True b) False

b) False

Files deleted from a flash drive are sent to the Recycle Bin and could be recovered, if necessary. a) True b) False

b) False

Modern desktop operating systems are considered single-user multitasking operating systems. a) True b) False

b) False

System restore points can only be created by Windows automatically on a regular schedule. a) True b) False

b) False

How can you view the contents of your folder in Icons view, which shows the contents of folders as small images? a) You can easily get an overview of your files and folders by using Windows Viewer. b) In File Explorer, you can access various ways to view the contents of your folder by clicking the View tab. c) You can easily get an overview of your files and folders by using My Desktop. d) You can easily get an overview of your files and folders by using Windows Flip 3D.

b) In File Explorer, you can access various ways to view the contents of your folder by clicking the View tab.

If I have many files related to one topic, can they all have the same name? a) As long as you group all of the files into one folder, that can be done. Just remember to use a different file extension for each file so that you are not confused. b) No. Every file in the same folder or storage device must be uniquely identified. c) No. Every file in the same folder has to have the same file extension. d) No. Every file in the same folder can have the same name and append a different numeral to the end of the file extension

b) No. Every file in the same folder or storage device must be uniquely identified.

Once the BIOS program is activated, what happens next? a) The BIOS loads the operating system into RAM. b) The BIOS makes sure that all your computer's peripheral devices are attached and working. c) The BIOS verifies your login name and password. d) The BIOS checks the kernel is loaded.

b) The BIOS makes sure that all your computer's peripheral devices are attached and working.

What is the boot process? a) The boot process ensures that the operating system is loaded into ROM. b) The boot process ensures that the operating system is loaded into RAM. c) The boot process ensures that the operating system is loaded onto the hard drive. d) The boot process ensures that the operating system is loaded into the kernel.

b) The boot process ensures that the operating system is loaded into RAM.

What is the kernel? a) The kernel is the essential component of the OS. It manages the ROM. b) The kernel is the essential component of the OS. It manages the processor and all other components of the system. c) The kernel is the essential component of the OS. It manages the configuration of peripherals. d) The kernel verifies your login name and password.

b) The kernel is the essential component of the OS. It manages the processor and all other components of the system.

A feature in Windows 10 that is used to organize open windows into task-specific groups is called a) Program Manager b) Virtual Desktops c) Snap Assist d) Virtual View

b) Virtual Desktops

Which of the following devices would use a real-time operating system? a) iPhone b) Microsoft Surface Tablet c) Roomba Vacuum d) all of the above

c) Roomba Vacuum

Which of the following is not considered an accessibility utility? a) Speech Recognition b) Narrator c) System restore d) Magnifier

c) System restore

Which of the following would you NOT see on a Windows 10 Start menu? a) Power b) apps list c) Task View d) tiles

c) Task View

Why are the letters at the end of file names (like .docx) needed? a) The letters that follow the period at the end of a file name are the file's extension. This enables the computer to know what drive it should store the file in when it is saved. b) The letters that follow the period at the end of a file name are the file's extension. This enables the windows drive organization to function. c) The letters that follow the period at the end of a file name are the file's extension. This enables the computer to know what application it should use to read the file. d) The letters that follow the period at the end of a file name are the file's extension. This provides the information on how long ago the file was saved.

c) The letters that follow the period at the end of a file name are the file's extension. This enables the computer to know what application it should use to read the file.

The C: drive on a Windows PC is like a large filing cabinet, and is referred to as the a) main path b) main directory c) root directory d) library directory

c) root directory

In Windows 10, what do you find on the Start menu? a) On the Windows 10 Start menu, you will find icons, widgets, and documents. b) On the Windows 10 Start menu, you will find widgets, scrollbars, and ribbons. c) On the Windows 10 Start menu, you will find Documents, Computer, and All Programs folders. d) On the Windows 10 Start menu, you will find tiles representing your most used applications.

d) On the Windows 10 Start menu, you will find tiles representing your most used applications.

What is the first step in the boot process? a) The BIOS loads the operating system into RAM. b) The BIOS makes sure that all your computer's peripheral devices are attached and working. c) The BIOS verifies your login name and password. d) The CPU accesses the BIOS

d) The CPU accesses the BIOS

Can I get back an important file if I accidentally delete it? a) Unfortunately, it's not possible to recover a file once you've deleted it without special Restore software. b) This will depend on where the file was. If the deleted file was from a flash drive it would go to the Recycle Bin. Files that are located in the Recycle Bin can be restored. c) This will depend on where the file was. If the deleted file was from one of your disks it would go to the Recycle Bin. Files that are located in the Recycle Bin can be restored. d) This will depend on where the file was. If the deleted file was from your hard drive, it would go to the Recycle Bin. Files that are located in the Recycle Bin can be restored.

d) This will depend on where the file was. If the deleted file was from your hard drive, it would go to the Recycle Bin. Files that are located in the Recycle Bin can be restored.

Special programs that facilitate interaction between application software and the OS are called a) utility programs b) hardware players c) APIs d) device drivers

d) device drivers

When an OS processes tasks in a priority order, it is known as a) multitasking handling b) preemptive interrupting c) interruptive multitasking d) preemptive multitasking

d) preemptive multitasking

How do I uninstall a software program? a) Always choose Uninstall for the software application you would like to delete from Program and Features in Control Panel or by right-clicking the program name on the Start menu in Windows 10.​ b) Select the program icon and press Delete to automatically uninstall the software. c) You remove a software program by clicking the Remove All icon in the Control Panel on the Start menu. d) You remove a software program by dragging the program icon to the Recycle Bin.

a) Always choose Uninstall for the software application you would like to delete from Program and Features in Control Panel or by right-clicking the program name on the Start menu in Windows 10.​

All of the following are current focuses of AI research EXCEPT: a) cognitive surplus b) knowledge representation c) natural language processing d) perception

a) cognitive surplus

Web 2.0 has led to a shift from just consuming content toward a) producing content. b) less sharing of the work we produce. c) spending all our time on leisure activities. d) new standards for HTML.

a) producing content.

Image-editing software allows you to a) remove red-eye b) compute complex formulas c) conduct product simulations d) create drafting blueprints

a) remove red-eye

A blog is usually written by multiple authors. a) True b) False

b) False

Is there some place where a student can get software at discounted prices? a) Although student versions of software are available at a reduced price to students, these versions usually are not as full-featured as standard versions. b) The best place to get student software is through the software supplier itself. Campus computer stores or college bookstores may not be able to offer discounted prices on standard software, only on less powerful academic versions. c) No. Beta testers can get discounted prices for full-fledged programs but usually not students. d) You may be able to buy software that is no different from regularly priced software at prices that sometimes are substantially less than general consumer prices. You should try your college bookstore or campus computer store, which generally require a valid ID.

d) You may be able to buy software that is no different from regularly priced software at prices that sometimes are substantially less than general consumer prices. You should try your college bookstore or campus computer store, which generally require a valid ID.

If you have an external hard drive, is a flash drive needed? a) You might want a flash drive if you want portability and need to store up to 500 GB. b) You might want a flash drive if you want portability and need to store up to 600 GB. c) You might want a flash drive if you want portability and need to store up to 356 GB. d) You might want a flash drive if you want portability and need to store up to 256 GB.

d) You might want a flash drive if you want portability and need to store up to 256 GB.

Is there a way to refine the list of results when using a search engine? a) You should try using a metasearch engine when you conduct your search. b) There is no way to refine your search and lessen the list size. c) You should always make sure you put your search term in brackets. d) You should trying using specialty search tools or a specialty search engine to refine your searches.

d) You should trying using specialty search tools or a specialty search engine to refine your searches.

Being computer literate includes being able to a) avoid spam, adware, and spyware. b) use the web effectively. c) diagnose and fix hardware and software problems. d) all of the above

d) all of the above

Which of the following describes an IP address? a) It identifies a website. b) It identifies any computer connecting to the Internet. c) It is referred to as a dotted quad. d) all of the above

d) all of the above

Intellectual property a) is the result of someone's creative work and design b) can be protected legally by the patent system. c) can include works of music, film, or engineering design d) all of the above.

d) all of the above.

Digital audio software can be used to a) compute complex formulae. b) perform mathematical simulations. c) create drafting blueprints. d) compose songs or soundtracks with virtual instruments.

d) compose songs or soundtracks with virtual instruments.

Sophisticated modeling software is helping international researchers a) analyze computer systems to gather potential legal evidence. b) market new types of products to a wider audience. c) create more intricate screenplays and movie scripts. d) increase the pace of research in finding and producing vaccines.

d) increase the pace of research in finding and producing vaccines.

Social media a) prevents two-way dialog between people. b) is useful only for personal friendships. c) cannot be immediate enough to react to quickly developing issues. d) is incorporated as part of a political strategy by many politicians.

d) is incorporated as part of a political strategy by many politicians.

What do B2B and B2C mean? a) B2B is an e-commerce term that refers to businesses buying and selling goods and services to other businesses. B2C is an e-commerce term that refers to transactions that take place between businesses and consumers. b) B2B is an e-commerce term that refers to consumers selling to each other through online auction sites. B2C is an e-commerce term that refers to businesses buying and selling goods and services to other businesses. c) B2C is an e-commerce term that refers to businesses buying and selling goods and services to other businesses. B2B is an e-commerce term that refers to transactions that take place between businesses and consumers. d) B2B is an e-commerce term that refers to businesses buying and selling goods and services to other businesses. B2C is an e-commerce term that refers to consumers selling to each other through online auction sites.

a) B2B is an e-commerce term that refers to businesses buying and selling goods and services to other businesses. B2C is an e-commerce term that refers to transactions that take place between businesses and consumers.

Which of the following actions would NOT help to identify your personal ethics? a) Conduct a genealogic study of your extended family. b) Identify the influences of your work environment. c) Describe yourself. d) Prepare a list of values that are most important to you.

a) Conduct a genealogic study of your extended family.

The "sharing economy" is made possible by technology and Internet connectivity. What kinds of things are people sharing? a) Custom products, preowned items, transportation services, office space, or places to stay are all examples of things that can be shared. b) Usually they are sharing experiences by showing photographs or videos of places they have traveled. c) They are sharing pet care, child care and elder care services. d) They are sharing smartphones and laptops.

a) Custom products, preowned items, transportation services, office space, or places to stay are all examples of things that can be shared.

What about installing software that I download from the Internet? a) Downloaded software comes in one compressed file having everything needed for installing and running the program. Mostly, these downloaded files unzip themselves and automatically start the setup program. b) When you download software, you have to run a separate installation program that then prompts the download process to begin. c) To install a program that is downloaded, you need to locate the file command from your hard drive and complete the setup process. d) To install a program that is downloaded, you need to contact the manufacturer's help desk for a special code.

a) Downloaded software comes in one compressed file having everything needed for installing and running the program. Mostly, these downloaded files unzip themselves and automatically start the setup program.

How do I ensure that the software I buy will work on my computer? a) Ensure that you have the set of system requirements of sufficient storage, memory capacity, and processing capabilities for the software you are installing. b) You need to call up the manufacturer's help desk to know how to tweak the software settings as per your system setup. c) You need to ensure that your system setup has the latest OS and the amount of RAM as specified on the software package that you wish to install. d) You need to install an additional 250 GB hard drive to accommodate all new software.

a) Ensure that you have the set of system requirements of sufficient storage, memory capacity, and processing capabilities for the software you are installing.

The Turing test a) Is used to decide whether a computer can be considered intelligent. b) Is conducted by presenting a 50-question multiple-choice exam. c) Is used to measure automation software for efficiency. d) Measures the delay before an automated system responds.

a) Is used to decide whether a computer can be considered intelligent.

What is an identifier that an online transaction is safe? a) Look for third-party verification from TRUSTe or the Better Business Bureau symbol. b) One way to be sure that a website is secure is to see if the site URL changes from https:// to http://. c) One way to be sure that a website is secure is to look to see whether it shows an open padlock on the toolbar. d) One way to be sure that a website is secure is to click the closed padlock icon and supply your Social Security number as asked.

a) Look for third-party verification from TRUSTe or the Better Business Bureau symbol.

Areas of active research in AI include a) NLP, knowledge representation, perception (data gathering) b) Operating systems c) Database design and user interface design d) Cloud-based storage systems

a) NLP, knowledge representation, perception (data gathering)

What kind of software will be needed for taking courses over the Internet? a) Online classes are run through course management software programs. b) Online classes are run through test preparation software. c) Online classes are run through project management software. d) Online classes are run through simulation programs.

a) Online classes are run through course management software programs.

What software is used to edit digital photos and digital video? a) To edit photos, you can use the software included with your camera, a simple program like Adobe Photoshop Elements, or one of the full-featured programs, such as Adobe Photoshop. For your videos, try a digital video-editing software application, such as Microsoft Movie Maker, or the more full-featured Adobe Premiere Pro. b) To edit photos, you can use the software included with your camera, a simple program like Adobe Photoshop Elements, or one of the full-featured programs, such as Adobe InDesign. For your videos, try a digital video-editing software application, such as Microsoft Movie Maker. c) To edit photos, you can use the software included with your camera, a simple program like Adobe Photoshop Elements, or one of the full-featured programs, such as Corel PaintShop Pro. For your videos, try a digital video-editing software application, such as Adobe Premiere. d) To edit photos, you can use the software included with your camera, a simple program like Adobe Photoshop Elements, or one of the full-featured programs, such as Microsoft Movie Maker. For your videos, try a digital video-editing software application, such as Adobe Photoshop.

a) To edit photos, you can use the software included with your camera, a simple program like Adobe Photoshop Elements, or one of the full-featured programs, such as Adobe Photoshop. For your videos, try a digital video-editing software application, such as Microsoft Movie Maker, or the more full-featured Adobe Premiere Pro.

When installing software you will often see a question that asks a) If you have paid for the software b) If you want a full (typical) or custom installation c) how long you plan on keeping the software d) what kind of mobile device you own

b) If you want a full (typical) or custom installation

What strategies can I use with key words to help narrow down the search results? a) To improve a search use quotation marks around a search phrase, use wild card characters, or search within a specific website. b) To improve a search use both Google and Bing. c) To improve a search use quotation marks to take the place of a letter or letters in keyword. d) To improve a search, use more than one search engine.

a) To improve a search use quotation marks around a search phrase, use wild card characters, or search within a specific website.

A touch pad is a pointing device usually found in laptops. a) True b) False

a) True

Big data describes the vast amounts of both structured and unstructured data that is generated daily. a) True b) False

a) True

Data and information are NOT interchangeable terms. a) True b) False

a) True

Geolocation requires a GPS chip in a mobile device. a) True b) False

a) True

Google Docs is an example of Software as a Service a) True b) False

a) True

Hactivism is different from cyberterrorism. a) True b) False

a) True

RAM is volatile storage. a) True b) False

a) True

The "S" in HTTPS stands for secure and indicates that the secure sockets layer protocol has been applied to the website. a) True b) False

a) True

What kind of port is needed to connect an LCD monitor to a notebook computer? a) You will want an HDMI port, which also allows you to connect a game console. b) You will want an Ethernet port, which allows you to transfer data at 1,000 Mbps. c) You will want a USB 3.1 port, which is a type of video port. d) You will want a serial port.

a) You will want an HDMI port, which also allows you to connect a game console.

Ordering a mocha latte and paying for it from the Starbucks smartphone app is using what type of Internet commerce? a) mobile commerce b) social commerce c) B2B d) C2C

a) mobile commerce

Which of the following describes copyleft? a) terms enabling the redistribution of open source software b) terms enabling the redistribution of proprietary software c) terms restricting the use of leftover copies of software d) political philosophy of the corporation

a) terms enabling the redistribution of open source software

Touch-screen devices usually feature _____________ keyboards. a) virtual b) optical c) laser-projection d) physical

a) virtual

Which web-authoring software enables users to create sophisticated web pages without knowing any HTML code? a) A program like QuarkXPress allows you to create sophisticated web pages without knowing HTML code. b) A program like Adobe Dreamweaver allows you to create sophisticated web pages without knowing HTML code. c) A computer-aided design (CAD) program helps users create sophisticated web pages without knowing HTML code. d) A desktop publishing program like Adobe InDesign helps users create sophisticated web pages without knowing HTML code.

b) A program like Adobe Dreamweaver allows you to create sophisticated web pages without knowing HTML code

Is web page-authoring software the same type of software I would use if I wanted to design a brochure or newsletter? a) Yes, you can easily use web page-authoring programs to design newsletters and brochures. b) Actually, to design newsletters and brochures, you would need special software, such as Adobe InDesign. c) Actually, you need special graphics software, like Adobe Premiere, to design newsletters and brochures. d) Actually, Peachtree is the best software for designing newsletters and brochures.

b) Actually, to design newsletters and brochures, you would need special software, such as Adobe InDesign.

What is crowdfunding? a) Crowdfunding lets a crowd of people use a single item, like a car or a bicycle. b) Crowdfunding is way to help businesses gather financial contributions from many people using the Internet. c) Crowdfunding is when a company uses technology tools to gather opinions and ideas from customers. d) Crowdfunding is a group of people using one product efficiently together on a sharing or subscription basis.

b) Crowdfunding is way to help businesses gather financial contributions from many people using the Internet.

Which component of a computing device drains the battery the fastest? a) WiFi adapter b) Display screen c) Bluetooth adapter d) hard drive

b) Display screen

App creation software includes tools like Adobe Photoshop.as a) True b) False

b) False

Artificial intelligence systems must think exactly like human beings do. a) True b) False

b) False

Conventional disk drives are superior to SSD drives because they have no moving parts. a) True b) False

b) False

Digital activism is an exercise platform a) True b) False

b) False

The "brain" of the computer is the USB. a) True b) False

b) False

The move toward access instead of ownership is a sign of cognitive surplus. a) True b) False

b) False

Web-based databases cannot be used to help investigators solve criminal cases. a) True b) False

b) False

Webcasts are delivered only as prerecorded audio and video content. a) True b) False

b) False

What is the digital divide? a) It is a mapping app to help you plan a trip. b) It refers to the differences between the generation that grew up with analog technology and the generation raised on digital technology. c) It is a term used to highlight the difference in accessibility to technology. d) It is a system of sensors for your smartphone that digitally measure distance.

c) It is a term used to highlight the difference in accessibility to technology.

How can I ensure the material is authentic and or timely? a) If you can't find the author or a date on a website or webpage, you should avoid it. b) If the links on the website are outdated or broken, the material on the website shouldn't be trusted. c) Look for specific information as to dates that reflect when an article was written or when a website was updated. Also look for the author's name, or an "About us" section or biographical information. These features are good indicators of a website's authenticity and timeliness. d) The web is updated constantly, with new content replacing old. You can always assume anything posted to the web is timely and accurate.

c) Look for specific information as to dates that reflect when an article was written or when a website was updated. Also look for the author's name, or an "About us" section or biographical information. These features are good indicators of a website's authenticity and timeliness.

Calendars, tasks, and e-mail can be found in which application? a) Excel b) OneNote c) Outlook d) Access

c) Outlook

What factors determine the processing power of a CPU? a) Processing power is only determined by the number of tasks the main chip in the computer can perform in one second. b) Processing power is measured by Hz, which represents the number of cores in the processor. c) Processing power is determined by the speed of the processor, the number of cores, as well as other factors such as cache memory and FSB. d) Processing power is determined by the amount of RAM in the system.

c) Processing power is determined by the speed of the processor, the number of cores, as well as other factors such as cache memory and FSB.

What are specialty search engines? a) Specialty search engines refine your searches by describing the relationships between keywords in a search. b) Specialty search engines have a large index and hence offer an advantage when searching hard-to-find information. c) Specialty search engines search only sites that are deemed relevant to the particular subject. d) Specialty search engines only search social networking sites for images, and audio and video files.

c) Specialty search engines search only sites that are deemed relevant to the particular subject.

What does an internal hard drive do? a) The internal hard drive stores data in a portable format. b) The hard drive is the computer's volatile memory. That means that data stored on the hard drive is erased when you shut off the computer. c) The hard drive is the computer's permanent memory. Data stored on the hard drive is not erased when you shut off the computer. d) The hard drive resembles a floppy disk drive but has a slightly wider opening.

c) The hard drive is the computer's permanent memory. Data stored on the hard drive is not erased when you shut off the computer.

How do I get a sense of whether the information on a website is biased? a) If the author of a site is well known or if the site is from a reputable news source, you know for sure that the information is accurate and appropriate. b) Stick with sites in the .edu and .gov domains, as they have trustworthy information. c) There isn't one specific way to identify bias. You need to review the material carefully to determine if the information is one-sided or based on opinion. d) If the site is hosted by a reputable media source, it is unbiased.

c) There isn't one specific way to identify bias. You need to review the material carefully to determine if the information is one-sided or based on opinion.

I've heard some friends talking about software that they got for free. Can you tell me more about free software? a) Software you can use for free is called freeware or beta ware, but it prevents you from using the product once the initial trial period is over. b) You can use freeware, which is software that can be used free for a limited time. Alpha versions, software still under development, are also available for free. c) You can use freeware, software that is available for free, and beta versions, free software that is still under development. d) Copyleft is the only free software.

c) You can use freeware, software that is available for free, and beta versions, free software that is still under development.

What software do I need to create 3D graphics? a) You need mapping programs to help you with this. b) You need DTP software for this purpose. c) You need CAD programs to create flowcharts. d) You need simulation software for this purpose.

c) You need CAD programs to create flowcharts.

The Internet was created to provide a) a secure form of communications b) a common communication means for all computers c) both a and b d) neither a nor b

c) both a and b

In a computer, each_____ can represent one letter, number, or symbol. a) megabyte b) integrated circuit c) byte d) bit

c) byte

The most common output device for soft output is a a) scanner. b) laser printer. c) display screen. d) inkjet printer

c) display screen.

In the URL https://www.whitehouse.gov/blog, which part is considered the protocol? a) .gov b) /blog c) https d) www.whitehouse.gov

c) https

All of the following are sensors found in certain smartphones EXCEPT a) accelerometer. b) barometer. c) hygrometer. d) magnetometer.

c) hygrometer.

Which of the following functions of a computer is mostly responsible for turning data into information? a) input b) storage c) processing d) output

c) processing

Software that includes programs to help you at work, home, and school is called a) open source software b) system software c) productivity software d) Software as a Service (SaaS)

c) productivity software

The minimum recommended standards for the operating system, processor, primary memory (RAM), and storage capacity for certain software are called a) hardware b) redistributing standards c) system requirements d) ministream

c) system requirements

What does a kilobyte indicate? a) A kilobyte (KB) is a unit of measure. It equals about 1 million bytes. b) A kilobyte (KB) is a unit of measure. It equals about 100 bytes. c) A kilobyte (KB) is a unit of measure. It equals about 1 trillion bytes. d) A kilobyte (KB) is a unit of measure. It equals about 1,000 bytes

d) A kilobyte (KB) is a unit of measure. It equals about 1,000 bytes

Which of the following statements is true about unsupervised learning? a) There is not a set of training data supplied. b) The system builds its own set of rules for its decision-making. c) The algorithms improve their accuracy over time. d) All of the above.

d) All of the above.

Recommendation engines a) Are bots that post stories to social media sites. b) Run robots called embodied agents. c) Do facial recognition in photographs. d) Are used to predict future purchases (or selections) from past activity.

d) Are used to predict future purchases (or selections) from past activity.

How do metasearch engines work? a) Metasearch engines search only sites that are deemed relevant to a particular subject. b) Metasearch engines only create an index from which to do an advanced search. c) Metasearch engines create guides to the internet organized by topics and subtopics. d) Metasearch engines search other search engines rather than websites

d) Metasearch engines search other search engines rather than websites

What is social commerce? a) Social commerce is commerce that refers to all transactions taking place between two people, not two computers. b) Social commerce is a subset of e-commerce that consists of people selling items to each other online. c) Social commerce is a subset of e-commerce that uses sites such as eBay as payment intermediaries. d) Social commerce is a subset of e-commerce that uses social networks to assist in marketing and purchasing products.

d) Social commerce is a subset of e-commerce that uses social networks to assist in marketing and purchasing products.

When a vendor hosts software on a website and you don't need to install the software on your device, this is known as: a) open source software b) beta software c) freeware d) Software as a Service

d) Software as a Service

Which of the following statements is false? a) Individuals who have no sense of right or wrong exhibit amoral behavior. b) Life experience affects an individual's personal ethics. c) Ethical decisions are usually influenced by personal ethics. d) Unethical behavior is always illegal.

d) Unethical behavior is always illegal.

Ergonomics is an important consideration a) only for laptop and desktop computers, but never for mobile devices. b) only for desktop computers. c) only for laptop computers. d) for all computing devices

d) for all computing devices


Related study sets

SW 2000 Ch.13 Quiz: Communities at Risk and Housing

View Set

PN 131 Quiz 3 NCLEX Practice Questions

View Set

FIN 221 Chapter 2 & 6 Intro Exercises

View Set

Math Of Personal Finance Section 1 review 2

View Set

ASTRONOMY Ch.1-4 Concept Checks/Quiz Questions

View Set

Developmental Psychology Midterm - Aalai, Fall 2022

View Set

Adult Nursing - Chapter 17: Preoperative Nursing Management - PrepU

View Set