Chapter 8: Computer Concepts

Ace your homework & exams now with Quizwiz!

Domain usually use by colleges and universities

.edu

Common extension for photographic file

.jpg

Advantages to laser printers

Speed, Quality of printing, Efficiency

Printer that uses replaceable cartridges, the cost of which must be considered when planning the long term cost of the machine

Ink jet

A mouse is an

Input device

Functions of microcomputers

Input, Storage, processing

Features that differentiate microprocessors

Instruction set, bandwidth, clock speed

Used to ensure that all office computer programs and data are secure in case of a mishap, fire, or natural disaster

Backup functions

Example of something that is NOT a peripheral device

Keyboard

When a floppy disk is formatted, it

Becomes usable in a computer and organizes the disk into tracks and sectors

Smallest piece of information on a computer

Bit

Software applications that allow the computer to surf the Internet are called

Browsers

Which part of the computer contains logic circuitry, which interprets instructions from a program?

CPU

Special type of high speed storage, may be part of the computers main memory or a separate storage device is called a

Cache

The ___ allows a user to return to previously viewed Web sites

Cache

An application program is software that is designed to

Perform a variety of tasks, such as word processing, database functions, an patient billing

Health information cannot be used or shared without the patients ____

Permission

____ business should not be conducted at work

Personal

What is an example of an output device?

Printer

Internal memory that cannot be overwritten and is not erased when the computer is turned off

ROM

RSI stands for ___

Repetitive strain injury

A device used to connect any numbers of LANs that communicate with other routers and determine the bet route between any two hosts is called a ______

Router

The type of file made up of rich text format is called a ____ file

Rtf

Example of a peripheral device

Scanner

If you want to transfer paper files to a computerized system without inputting all the date using the keyboard, you could use a

Scanner

A ____ allows a computer user to look for information on the Internet using specific key words

Search engine

Electronic ____ are used to sign documents generated on the computer

Signatures

Most common use for disks today is for

Storing information

A suite of communications protocols used to connect users or hosts to the Internet is called ___

TCP/IP

Common file extensions include .jpeg and .gif

True

DSL operates over a telephone line

True

DVD stands for digital video disk

True

If a disk is not preformatted, most computers detect that and format the disk automatically

True

Networks allow several computers to use the same printer

True

Search engines are programs in which a topic, word, or group of words can be entered and the engine searches the Internet for matches

True

The initial part of a URL listing is the domain name

True

A _____ specifies the global address of documents or information on the Internet

URL

Which is largest; WAN, LAN, CAN, HAN?

WAN

A dialog box in windows is a

Window that appears requesting more information from the user

Example of computer software

Word 2007

____ are usually found on college campuses and sometimes on military bases

Campus area networks

Encrypted data are called ____ text

Cipher

Encrypted data are called

Cipher text

Best printer selection if you plan to prepare multicolored newsletters with computer generated graphics and illustrations

Color laser

The term for individuals who break into computers with dishonorable intent is ___

Crackers

The pointer or flat bar that appears on the monitor to show where the next character will appear is called the ____

Cursor

DVD stands for ____

Digital video disk

Devices that load a program or data stored on a disk into the computer are called ___

Disk drives

Which kind f printer would be most beneficial for printing multiparty insurance claim forms?

Dot matrix

Types of printers

Dot matrix, laser, ink jet

The word used for selling and buying of good over the Internet is ____

E-commerce

A communications tool that is used to send and retrieve messages and computer generated documents is called

Electronic mail E-mail

____ was enacted partly to ensure that medical records would be kept private and confidential

HIPAA

Language used to create documents for use on the Internet is

HTML

All of the following are storage devices

Hard disk drive, CD-ROM drive, Zip drive

Individuals can access information at ____ in airports and some businesses

Hot spots

Locations in places such as airports, libraries, and hotels that offer an access point for public wireless broadband network services are known as

Hot spots

A ____ is a device that connects several computers or networks

Hub

A picture, often a computers desktop, that represents a program or an object is called an ______, and clicking on it takes the user into the program

Icon

Advantages of computerized office database

Info is stored together and is easily accessible, can be used by more than one person at a time, links related piece of information to process insurance claims

An intranet is a local network that uses Internet technology within a company but does not access the Internet directly

True

The aspect of computer science that deals with computers taking on the attributes of humans is called

Artificial intelligence

A HAN would be used in an educational facility

False

A Zip drive is also called a thumb drive or flash drive

False

A computer user cannot copy an entire disk

False

A gigabyte is approximately 5 million bytes of data

False

A kilobyte is approximately 2419 bits

False

Cyberspace is the physical space of the online world of computer networks in which communication takes place

False

Dot matrix printers produce a better quality output than do laser printers

False

Information transmitted by the computer to a monitor or printer is a query

False

Magnetically creating tracks on a disk where information will be stored is called making a backup

False

System software and application software have the same meaning

False

The acronym for the language used to create documents for use on the Internet is called HTTP

False

The hard drive is used to burn a new CD from information on a computer

False

The help function in software programs is a feature that must be paid for before it can be used

False

The magnetic creation of tracks on a disk where information will be stored is called flash

False

Wave keyboards are not designed with ergonomics in mind

False

What are used to help prevent access to private networks?

Firewalls

The magnetic creation of tracks on a disk where information will be stored, usually done by the disks manufacturer, is called ___

Formatting

Clock speed is expressed as

Megahertz

A device that allows information to be transmitted over telephone lines at speeds measured in bits per second is called a ____

Modem

Parts of the hardware of a computer system

Monitor, Disk drive, Printer

Main circuit board for the computer to which other devices are attached is called the

Motherboard

The _____ is the main circuit board for the computer, to which other devices can be attached

Motherboard

Most commonly used input device, allows computer operator to select commands by interfacing with the monitor screen

Mouse

Many printers in use today are ____ and can perform different tasks

Multifunctional

Presentation of graphics, animation, video, and sound on a computer in an integrated way or all at once is called

Multimedia

A series of computers that are linked, allowing them to share information is a

Network

An embedded computer is one that is inside another device

True

A PDA is a type of handheld computer

True

A server manages shared network resources

True

A terabyte is approximately 1 trillion bytes

True


Related study sets

Cost Accounting - Chapter 19 - Strategic Performance Measurement

View Set

Principle of web design chapter 1

View Set

Com Arts Midterm II, Ch. 6, 8, 16, 17

View Set

implementing secure protocols and application Security Solutions

View Set