Chapter 1-6 (Intro to Business Computer Systems)

Ace your homework & exams now with Quizwiz!

The security principle known as _________ gives individuals a certain level of access based on who they are.

Authorization

A _________ is a copy of one or more files (or entire storage devices) that is made in case the originals become lost or damaged.

Backup

Very few countermeasures are as effective as _________, which can help you recover data that was lost to almost any type of threat.

Backups

A _________ ad is a thin, rectangular advertisement that is commonly placed across the top or on the sides of a web page.

Banner

In the simplest terms, a(n) _________ is a device that accepts input, processes data, and can output or store the result of its actions.

Computer

The set of instructions that directs the computer to perform a variety of tasks is known as a(n):

Computer program

A _________ excels when it comes to installing, configuring, and supporting computer systems.

Computer support specialist

A _________ license allows an author to set conditions for the free use and distribution of their work.

Creative Commons

A _________ attack allows hackers to shut down or block access to websites and other network resources by overwhelming them with requests.

DDoS (distributed denial-of-service)

A browser _________ is a separate program that adds a variety of useful features to the web browser, such as sending instant messages or playing mobile-style games.

Extension

Many websites have a(n) _________ area that should be checked for common questions and their responses.

FAQ (frequently asked questions)

Copyright law contains an exception known as _________, which provides for a limited set of circumstances where others can use portions of copyrighted material without first obtaining permission.

Fair use

Although a MOOC allows any individual to register for online classes at Harvard and MIT, their high registration cost has limited their popularity.

False

Although it can be dangerous to use mobile devices when driving a car, state governments have yet to enact any laws restricting this behavior.

False

In order to make a second copy of a file, you would first use the "cut" command followed by the "paste" command.

False

Keyboard covers for tablets generally plug into the headphone jack in order to communicate with the tablet.

False

A CPU's clock rate, or speed, is measured in MB or GB.

False (in gigahertz)

_________ computers are able to continue their operation even when problems are present.

Fault-tolerant

Preparing a storage device for use by an operating system is known as:

Formatting

Many companies and specialty websites offer _________, or discussion boards, where individuals can ask questions and reply to each other.

Forums

_________ computing concentrates on reducing the environmental impact of computers and their widespread use.

Green

The ability to communicate with a device without using your hands is known as _________ computing.

Hands-free

The physical devices that make up a computer system are called:

Hardware

The largest network in the world is known as the _________, which connects billions of people and organizations throughout the world.

Internet

Students often use a(n) _________, such as Blackboard, at school to complete exams, turn in work, and communicate with their instructor and classmates.

LMS (learning management systems)

A software _________ is a contract from the software creator that specifies the rules for using this software.

License

Which of the following is a feature on your mobile device that allows the Yelp app to provide a list of restaurants that are close to you?

Location-based services

The term _________ refers to the set of online behaviors that are considered polite and proper.

Netiquette

In an office environment, many organizations set up a(n) _________ to perform various operations such as word processing, accounting, document management, or communications.

Office automation system

Printer speed is measured in:

PPM (pager per minute)

Which category of computer is generally meant to be used by only one person at a time?

Personal computer

A monitor's screen is divided up into millions of tiny dots, called:

Pixels

Browser _________, such as Adobe Flash Player, are separate programs that allow your web browser to play several types of multimedia content.

Plug-ins

A web _________ is a website that provides a variety of useful information and services to visitors, making them popular as browser home pages.

Portal

Computers that communicate over a network must follow certain _________ to ensure that the transmission is sent properly and understood.

Protocols

Facial _________ is a biometric technology that looks for unique measurements in an individual's face.

Recognition

Social news sites, such as _________, encourage users to share links to news and other interesting content they find on the Web.

Reddit

Which of the following is NOT a cloud storage service?

Skype

A _________ is a pen-like input tool that is used with a variety of touchscreen devices.

Stylus

A(n) _________ is an inexpensive product that guards connected equipment against large power spikes or surges that may infrequently occur.

Surge protector

The _________ is a stationary, rectangular pointing surface that is typically found on laptop computers.

Touch-pad

3D modeling software is typically used by professional artists and animators who need to create three-dimensional graphics and characters for advertisements, video games, cartoons, and movies.

True

A file path is a complete address that describes the exact location of a file.

True

A network allows users to communicate and share information between computers and various devices.

True

After software is acquired, it must typically be installed before it can be used.

True

Antivirus, encryption, and file compression software are all examples of utilities.

True

Because solid state storage does not use moving parts, this technology can perform read, write, and erase operations at much quicker speeds.

True

Dividing a hard drive into multiple sections is known as partitioning.

True

Dust can clog cooling systems such as fans, which in turn may cause hardware to overheat.

True

Having a higher quantity of RAM will allow you to have more open programs and quickly switch between them.

True

Individuals have been caught and prosecuted both for sharing material online and for copying it from a pirate site.

True

Input can take a variety of forms, such as the text you type with your keyboard or a variety of finger movements on the touchscreen of a mobile device.

True

Like many businesses, schools have acceptable use policies (AUPs) to describe the appropriate use of their computers.

True

Many of the components inside a computer generate a great deal of heat. Without proper cooling, a computer could overheat and malfunction.

True

Nothing posted to social media services or anywhere else on the Internet should be considered private.

True

PayPal is an example of an online payment service that allows you to pay for goods online and transfer money to other individuals.

True

Tax preparation software allows individuals to prepare their income taxes and file electronically (e-file) with the IRS.

True

Which of the following is a popular test of a system's ability to think?

Turing test

A _________ is a fully-contained program that self-replicates and spreads through computers and networks.

Worm

Computers which are under the external control of a hacker are known as:

Zombies


Related study sets

Chapter 1: Intro to Research Statistics

View Set

Chapter 27 - Lower Respiratory Problems

View Set

Women Gender and Politics chap 1-3

View Set

Business Communications Exam 3 (Chapters 7,9,10,11)

View Set

FIN410 Chapter 5 The Foreign Exchange Market

View Set

Richard II - Hi Q - General Trivia

View Set