CIS 110 Introduction to Computers Final Exam
To help protect your computer, avoid opening email attachments with any of the following file extensions EXCEPT ____. Select one: a. .exe b. .jpg c. .com d. .vbs
.jpg
A folder name can have up to _____ characters. Select one: a. 8 b. 11 c. 255 d. 256
255
In the accompanying figure, the item in box _____ holds the results of processing. Select one: a. 1 b. 3 c. 4 d. 5
3
An email address consists of your username and the server name separated by the ____ symbol. Select one: a. / b. % c. @ d. &
@
A(n) _____ is a rectangular work area on the desktop that contains a program, text, files, or other data and tools. Select one: a. window b. portal c. app d. smartcard
window
The files you create in Excel are called _______. Select one: a. documents b. presentations c. workbooks d. databases
workbooks
Unlike ____, ____ cannot replicate themselves. Select one: a. Trojan horses, worms b. viruses, worms c. worms, Trojan horses d. worms, viruses
worms, Trojan horses
In a File Explorer window, you can tell that a folder is compressed by the _____ icon displayed. Select one: a. exclamation point b. open folder c. zipper d. empty folder
zipper
Case-Based Critical Thinking Questions Case 8-3 You are "learning the ropes" about using different functions when writing and replying to emails. In the questions below, select the answer that describes the best or most appropriate course of action. Travis sent you, Jill, Jack, Marlene, Bernie, and Raja an email. You want to reply, but only Travis needs to see the response. Select one: a. "Reply All" then delete unnecessary recipients b. "New" to Travis, then cut and paste his original email into your new email c. "Reply" to Travis d. "Reply" and put Travis in Bcc
"Reply" to Travis
The Bold button on the Word ribbon is an example of a(n) _______ button. Select one: a. bidirectional b. toggle c. active d. passive
toggle
Case-Based Critical Thinking Questions Case 1-3 Damon is learning about intellectual property, copyright, and plagiarism. You give him several scenarios to test his understanding. A teacher shares a poem with the class. Damon tells you this is ____. Select one: a. not plagiarism b. plagiarism c. too little information to say d. unethical but not illegal
too little information to say
A(n) ____ is essentially an upside-down mouse that can be more comfortable to use. Select one: a. touchpad b. gnome c. trackball d. spinstick
trackball
Case-Based Critical Thinking Questions Case 8-3 You are "learning the ropes" about using different functions when writing and replying to emails. In the questions below, select the answer that describes the best or most appropriate course of action. Jenny sent you an email. You want to respond to it, and also to show Ben your response. But you don't want Jenny to see that you've sent it to Ben. Select one: a. "Reply" with Ben as Cc b. "Forward" to Ben c. "New" to Ben, Bcc to Jenny d. "Reply" with Ben as Bcc
"Reply" with Ben as Bcc
Case-Based Critical Thinking Questions Case 8-3 You are "learning the ropes" about using different functions when writing and replying to emails. In the questions below, select the answer that describes the best or most appropriate course of action. Howard sent you an email with a good idea for a widget. You want to respond. You also want to bring Terry, who has experience with widgets, into the conversation. Select one: a. "New" to Terry, cut and paste Howard's original email b. "Reply" with Bcc to Terry c. "Reply" with Cc to Terry d. "Forward" to Terry with Bcc to Howard
"Reply" with Cc to Terry
SMS can transmit up to ____ characters in one message. Select one: a. 160 b. 64 c. 1,024 d. 256
160
In the accompanying figure, the item in box _____ stores data and instructions before and during processing. Select one: a. 1 b. 3 c. 5 d. 6
5
BD-R dual-layer discs can store up to _____ of data. Select one: a. 700 MB b. 8.5 GB c. 50 GB d. 1 TB
50 GB
In the accompanying figure, the item in box _____ takes instructions and translates them into a form that the control unit can understand. Select one: a. 2 b. 3 c. 4 d. 6
6
In the accompanying figure, the item in box _____ requests instructions and data from the cache or RAM and makes sure they are in the proper order for processing. Select one: a. 2 b. 3 c. 5 d. 7
7
Copyrights remain in effect until ____ after the creator's death. Select one: a. a year and a day b. 10 years c. a century d. 70 years
70 years
Wi-Fi is designed for medium-range transfers, up to ____ feet outdoors. Select one: a. 100 b. 300 c. 500 d. 900
900
You may not use the _____ character when creating a folder name. Select one: a. > b. ! c. @ d. .
>
In the accompanying figure, box _______ provides one-click access to commonly used commands, such as Save, Undo, and Redo. Select one: a. H b. A c. K d. M
A
In the accompanying figure, clicking the area denoted by box _______ provides access to Backstage view. Select one: a. C b. G c. M d. K
C
____ was the predecessor of the Internet. Select one: a. DRAGnet b. ARPANET c. APPLENET d. TARP-Net
ARPANET
You use the _______ to conduct a search using the default search site for Internet Explorer. Select one: a. status bar b. navigation pane c. Address bar d. Apps bar
Address bar
____ images are created by coloring the individual pixels in an image. Select one: a. Bitmap b. Vector c. Illustrator d. Radial
Bitmap
____ is a wireless standard in the 2.4 GHz frequency band that is designed for very short-range connections, to replace cables between devices. Select one: a. MIFI b. WiMAX c. Bluetooth d. Red Hat
Bluetooth
In the accompanying figure, you can type entries into the location(s) marked by box _______. Select one: a. B b. C c. F d. G
C
The first hard drive in a computer is usually drive _____. Select one: a. C b. A c. E d. Z
C
The _____ is the main processing device for a computer. Select one: a. CPU b. cache c. USB d. FPU
CPU
Case-Based Critical Thinking Questions Case 5-3 With all the types of Internet connections available, it's important to be able to keep them straight. These questions will test how well you understand the options. ____ has a typical speed of 10-25 Mbps, and is the most widely used type of home broadband connection. Select one: a. DSL b. Fixed wireless c. Cable Internet d. Satellite
Cable Internet
_____ memory is very fast memory circuitry located near the CPU that is used to speed up processing. Select one: a. ROM b. Flash c. Cache d. ALU
Cache
The Forward feature leaves the _______ box(es) blank. Select one: a. Cc and Bcc b. Bcc only c. To only d. To, Cc, and Bcc
Cc and Bcc
____ refers to data, applications, and even resources stored on computers accessed over the Internet. Select one: a. Telecommuting b. Cloud computing c. The Ethernet d. Embedded computing
Cloud computing
____ cable uses a thick center wire surrounded by insulation and covered with braided wire to block electromagnetic interference. Select one: a. Fiber-optic b. CAT5 c. Twisted-pair d. Coax
Coax
____ software includes any software that is developed and sold for a profit. Select one: a. Commercial b. Industry-ware c. Freeware d. Vaporware
Commercial
Case-Based Critical Thinking Questions Case 4-2 Arnold has asked you to help him learn the dizzying array of new communications technologies being developed today. You ask Arnold which of the following companies in the United States is currently NOT supporting WiMAX-based 4G cellular networks. He answers, correctly, ____. Select one: a. AT&T Wireless b. Verizon Wireless c. T-Mobile d. CompUSA
CompUSA
_____ are very small pieces of semiconducting material that contain integrated circuits. Select one: a. Motherboards b. Computer chips c. Optical drives d. Expansion slots
Computer chips
____ is the legal right to sell, publish, or distribute an original artistic or literary work. Select one: a. Trademark b. Service mark c. Copyright d. Prima corpus
Copyright
To select nonadjacent files, press and hold the _____ key while selecting individual files. Select one: a. Shift b. Tab c. Ctrl d. Windows
Ctrl
All of the following are shortcut keys for either cutting, copying, or pasting EXCEPT _______. Select one: a. Ctrl+V b. Ctrl+P c. Ctrl+X d. Ctrl+C
Ctrl+P
The keyboard shortcut for cutting text or objects is _______. Select one: a. Ctrl+C b. Ctrl+V c. Ctrl+Z d. Ctrl+X
Ctrl+X
The term ____ encompasses any illegal act involving a computer. Select one: a. Wardriving b. Websparring c. Nethacking d. Cybercrime
Cybercrime
In the accompanying figure, box _____ represents a status bar. Select one: a. A b. B c. C d. D
D
In the accompanying figure, the Address bar is denoted by box _____. Select one: a. D b. F c. A d. E
E
The U.S. Department of Energy and EPA developed the ____ program to encourage the creation of energy-saving devices. Select one: a. Gold Star b. ENERGY STAR c. LEED d. GreenWare
ENERGY STAR
The Formulas tab is unique to _______. Select one: a. Word b. Excel c. PowerPoint d. Access
Excel
Today, many notebook and netbook computers use _____ instead of PC Cards to give them additional capabilities. Select one: a. ExpressCard modules b. flash chips c. FireWire expansion slots d. USB cards
ExpressCard modules
_____ means to create an uncompressed copy of a compressed file or folder. Select one: a. Zipping b. Extracting c. Extruding d. Exploding
Extracting
In the accompanying figure, you would click the location(s) shown in box _______ to open another dialog box or window. Select one: a. F b. E c. B d. H
F
All wireless applications in the United States use specific frequencies as assigned by the ____. Select one: a. FTC b. FCC c. NTSB d. W3C
FCC
You use _____ to navigate, view, and work with the contents and resources on your computer. Select one: a. application windows b. dialog boxes c. Start windows d. File Explorer windows
File Explorer windows
____ programs reduce the size of files so they take up less storage space. Select one: a. File management b. Backup and recovery c. Cleanup d. File compression
File compression
_____ are the most common type of storage media for digital cameras and mobile phones. Select one: a. Mini-CDs b. Optical discs c. Cache packets d. Flash memory cards
Flash memory cards
_____ has/have begun to replace _____ for storing system information such as a computer's BIOS. Select one: a. Flash memory chips, ROM b. RAM, ROM c. ROM, flash memory chips d. Buses, ROM registers
Flash memory chips, ROM
If you wish to send a received message on to someone who wasn't in the original recipients' list, use the _______ command. Select one: a. Forward b. Forward all c. Reply all d. Broadcast
Forward
In the accompanying figure, box _______ points to a list box or boxes. Select one: a. B b. C c. F d. G
G
Most operating systems today primarily use a ____. Select one: a. GUI b. command-line interface c. YUI d. neural net interface
GUI
Case-Based Critical Thinking Questions Case 7-3 You are putting together a folder with a series of documents relating to a call to Gaspard Corporation from June 2014. The following questions will test your understanding of the concepts of folder & file naming discussed in the chapter. Based on the text's guidelines, choose the best folder name. Select one: a. Gaspard-Conf-Call-June-2014 b. Gaspard Call: 6-14 c. gcc614 d. Gaspard Corporation, LLC Conference Call to Discuss Strategic Realignment, noon, June 2014
Gaspard-Conf-Call-June-2014
In the accompanying figure, box _______ represents the view buttons. Select one: a. A b. B c. L d. H
H
You can find the _______ tab on the ribbon in all Office programs. Select one: a. HOME b. INSERT c. REVIEW d. VIEW
HOME
The ____ develops networking standards. Select one: a. ANSI b. WWW c. IEEE d. TCP/IP
IEEE
Case-Based Critical Thinking Questions Case 5-1 The world of the Internet can be overwhelming. You take some time to break it down in your mind, understanding the community and its players. For each of the following questions, look at the organizations, businesses, or individuals listed, and then determine what they represent as a whole. AT&T, Comcast are ____. Select one: a. ISPs b. software companies c. key Internet organizations d. ASPs
ISPs
____ occurs when someone obtains enough information about a person to be able to masquerade as that person. Select one: a. Spoofing b. Pharming c. Identity theft d. Data theft
Identity theft
Case-Based Critical Thinking Questions Case 8-2 You have had your touch-enabled tablet computer for a week now, and have spent a good deal of time surfing the Web with Internet Explorer. The following questions test your understanding. You want to return to a Web site you visited two or three days ago. Which of the following scenarios will get you there? Select one: a. In the app, you swipe down from the top, tap "Favorites," tap "History," and scan the selections for the right Web site. b. In the desktop application, you open the Favorites Center, click the History tab, then search for the right Web site. c. In the app, you open the Favorites Center, tap the History tab, then search for the right Web site. d. In the desktop application, you right-click a blank area of the current Web page, click "History," click the "All" arrow, then scan the selections for the right Web site.
In the desktop application, you open the Favorites Center, click the History tab, then search for the right Web site.
Case-Based Critical Thinking Questions Case 5-1 The world of the Internet can be overwhelming. You take some time to break it down in your mind, understanding the community and its players. For each of the following questions, look at the organizations, businesses, or individuals listed, and then determine what they represent as a whole. A blogger, your school's Web site, an online encyclopedia are ____. Select one: a. ASPs b. infrastructure companies c. Internet content providers d. users
Internet content providers
Case-Based Critical Thinking Questions Case 4-1 Clarice is a network consultant, fielding questions from clients during the day, and navigating a wired and wireless world both at the office and at home. Next, Clarice meets with a client who leases two floors in a high-rise downtown. He wants to connect them all to their own network. So Clarice explains the various kinds of ____ he should consider. Select one: a. WANs b. PANs c. LANs d. MANs
LANs
Case-Based Critical Thinking Questions Case 4-1 Clarice is a network consultant, fielding questions from clients during the day, and navigating a wired and wireless world both at the office and at home. Clarice drives to her office from the suburbs. At the coffeeshop outside her office, she uses the public wireless network to check her email. Six blocks away, at the park where she takes her lunch, she uses the same wireless network. However, when she gets home she needs to use another network. The network Clarice uses during her workday is most likely a(n) ____. Select one: a. LAN b. MAN c. VPN d. extranet
MAN
Microsoft and Google have created large networks known as ____ to provide free or low-cost Internet access to area residents. Select one: a. PANs b. LANs c. MANs d. WANs
MANs
____ is a generic term that refers to any type of malicious software. Select one: a. Malware b. Cookie c. Virus d. Bug
Malware
_____ consists of high-performance storage servers that are connected individually to a network to provide storage for the computers connected to that network. Select one: a. NAS b. SAN c. RAID d. Cloud storage
NAS
The text lists all of the following as commonly used Web browsers EXCEPT ____. Select one: a. Navigator b. Internet Explorer c. Chrome d. Firefox
Navigator
_____ are thin circular discs made out of polycarbonate, topped with layers of materials and coatings used to store data and protect the disc. Select one: a. Platters b. Optical discs c. SSDs d. Hybrid hard drives
Optical discs
____ refers to following a predesignated procedure to remove yourself from marketing lists. Select one: a. Downsizing b. Rabbitholing c. Opting out d. Deprofiling
Opting out
Case-Based Critical Thinking Questions Case 7-3 You are putting together a folder with a series of documents relating to a call to Gaspard Corporation from June 2014. The following questions will test your understanding of the concepts of folder & file naming discussed in the chapter. Which of the following file names would not be accepted by Windows? Select one: a. Tully Experience.docx b. Outstanding Shares <protected>.docx c. [email protected] d. t.docx
Outstanding Shares <protected>.docx
Case-Based Critical Thinking Questions Case 4-1 Clarice is a network consultant, fielding questions from clients during the day, and navigating a wired and wireless world both at the office and at home. Clarice has a client looking to create a network for her mobile phone, headset, digital camera, and PDA. Clarice tells her about ____ options. Select one: a. PAN b. WAN c. intranet d. VPN
PAN
____ is the use of a fraudulent email message to trick the recipient into revealing sensitive personal information. Select one: a. Spamming b. Pharming c. Barnstorming d. Phishing
Phishing
The _____ standard means that a computer automatically configures new devices as soon as they are installed and the computer is powered up. Select one: a. Plug and Play b. Fast I/O c. Click and Go d. Slot and Start
Plug and Play
_______ is used to create a collection of slides that can contain text, charts, pictures, sound, movies, etc. Select one: a. PowerPoint b. Word c. Access d. Excel
PowerPoint
____ is one of the primary operations of a computer. Select one: a. Administration b. Sorting c. Processing d. Throughput
Processing
A(n) _______ is a box with descriptive text about a button, an object, or another element on the screen, which appears when you point to the button or object. Select one: a. ScreenTip b. contextual tab c. gallery d. Mini toolbar
ScreenTip
_____ is a method of storing data on two or more hard drives that work together. Select one: a. RAID b. SAN c. NAS d. Cloud computing
RAID
The term memory when referring to computers usually means _____. Select one: a. ROM b. BIOS c. RAM d. RAID
RAM
Most wireless networking applications use frequencies in the ____ band. Select one: a. RF b. audible c. IR d. UV
RF
_____ are the fastest type of memory used by the CPU. Select one: a. ROMs b. Level 1 caches c. Level 2 caches d. Registers
Registers
If you receive an email message that includes multiple recipients, and you wish to respond back to the same list of recipients, use the _______ command. Select one: a. Forward b. Forward all c. Reply d. Reply all
Reply all
Text messaging is also known as ____. Select one: a. SMH b. VoIP c. IM d. SMS
SMS
The ____ protocol is used to deliver email over the Internet. Select one: a. HTTP b. XML c. FTP d. SMTP
SMTP
____ programs are distributed on the honor system. Select one: a. Malware b. Shareware c. Freeware d. Vaporware
Shareware
To select a series of adjacent files, click the first desired file, press and hold the _____ key, then click the last desired file. Select one: a. Shift b. Tab c. Ctrl d. Windows
Shift
____ refers to unsolicited email sent to a large group of individuals at one time. Select one: a. Spam b. Phish c. Salami d. Profiling
Spam
____ generally run one program at a time, as fast as possible. Select one: a. Supercomputers b. Mainframes c. Quantum computers d. Thin clients
Supercomputers
____ browsing allows you to open multiple Web pages at one time. Select one: a. Webbed b. Threaded c. Tabbed d. Reticulated
Tabbed
____ is the most well-known computer network in the world. Select one: a. Skynet b. Telnet c. The Internet d. AOL
The Internet
Case-Based Critical Thinking Questions Case 7-2 You are working in a File Explorer window. Choose the best answer for each of these scenarios. You have opened a file, but cannot make modifications to it. What is the most likely reason? Select one: a. The file is within a compressed folder. b. You have opened the file with the wrong program c. You are working in desktop mode. d. The desktop application is made for Windows 7.
The file is within a compressed folder.
The accompanying figure shows a File Explorer window in _____ view. Select one: a. Tiles b. Details c. Large Icons d. List
Tiles
A ____ is a type of malware that masquerades as something else. Select one: a. switchbot b. zombie c. Trojan horse d. worm
Trojan horse
Case-Based Critical Thinking Questions Case 6-1 You study a series of real-life issues to determine what kind of security and/or privacy threat you are facing. You have found an interesting calendar program at a Web site and downloaded it to help you stay organized. However, within a couple days of installing the program, your computer starts behaving oddly. Strange popups appear, the home page of your Internet browser has been switched, and the system is running sluggishly. You likely have installed a ____. Select one: a. virus b. worm c. Trojan horse d. botnet
Trojan horse
____ cable is the least expensive type of networking cable and has been in use the longest. Select one: a. Coaxial b. Fiber-optic c. Twisted-pair d. Packet-switched
Twisted-pair
Case-Based Critical Thinking Questions Case 3-1 You are studying the history of various operating systems. The earliest operating system mentioned in this chapter is ____. Select one: a. UNIX b. Linux c. DOS d. Mac OS
UNIX
Mac OS is based on the ____ operating system. Select one: a. LiMaX b. UNIX c. DOS d. FORTRAN
UNIX
As you click different links on Web pages, the _______ in the Address bar change(s). Select one: a. URL b. history tiles c. protocol d. pins
URL
_______ is used to enter, edit, and format text. Select one: a. Word b. PowerPoint c. Excel d. Access
Word
A(n) ____ is a secure, private path across a public network that is set up to allow authorized users private, secure access to the company network. Select one: a. LAN b. intranet c. VPN d. Internet P2P network
VPN
Case-Based Critical Thinking Questions Case 4-1 Clarice is a network consultant, fielding questions from clients during the day, and navigating a wired and wireless world both at the office and at home. Clarice sometimes accesses her work computer at home via the Internet. She does so knowing that her connection is secure and private. The connection path she uses is an example of a(n) ____. Select one: a. intranet b. extranet c. VPN d. supranet
VPN
Today, the standard term for placing telephone calls over the Internet is ____. Select one: a. podcasting b. Internet telephony c. cyberchatting d. VoIP
VoIP
Case-Based Critical Thinking Questions Case 6-1 You study a series of real-life issues to determine what kind of security and/or privacy threat you are facing. You live in a 20-unit apartment building. You notice that your wireless Internet seems to run more slowly many evenings, after your upstairs neighbor has come home from work. It is possible you are being subjected to ____. Select one: a. war driving b. Wi-Fi piggybacking c. botnetting d. a dot con
Wi-Fi piggybacking
Case-Based Critical Thinking Questions Case 3-1 You are studying the history of various operating systems. Your uncle talks about the Windows operating environment. He is most likely referring to his experience in using ____. Select one: a. Windows Mobile b. Windows 7 c. Windows Me d. Windows 3.1
Windows 3.1
The latest version of the Windows operating system is ____. Select one: a. Windows XP b. Windows 10 c. Windows Vista d. Windows 8
Windows 8
Case-Based Critical Thinking Questions Case 7-2 You are working in a File Explorer window. Choose the best answer for each of these scenarios. A file that was once in one folder is now in another folder, and missing from the original folder. Why? Select one: a. You dragged the file, and the two folders are on different drives. b. You dragged the file, and the two folders are on the same drive. c. You used the Copy command instead of the Cut command. d. The Clipboard was full and unable to accept the file.
You dragged the file, and the two folders are on the same drive.
Case-Based Critical Thinking Questions Case 8-2 You have had your touch-enabled tablet computer for a week now, and have spent a good deal of time surfing the Web with Internet Explorer. The following questions test your understanding. As you begin typing a URL into the Address bar, no suggested Web pages appear. Why? Select one: a. Suggested Web pages never appear in the Address bar. b. You are using the app and not the desktop application. c. You have deleted your history. d. You are operating Internet Explorer in protected mode.
You have deleted your history.
Case-Based Critical Thinking Questions Case 7-3 You are putting together a folder with a series of documents relating to a call to Gaspard Corporation from June 2014. The following questions will test your understanding of the concepts of folder & file naming discussed in the chapter. The folder is quite large, and you compress it for archiving. Which of the following is true of the compressed folder? Select one: a. You may only give the compressed folder a name from one of the files within the folder. b. You must begin the compressed folder's name with the * character to distinguish it. c. You may only use a maximum of 16 characters in the compressed folder's name. d. You must extract any file from the folder before changing the file's name.
You must extract any file from the folder before changing the file's name.
Using only what you can see in the accompanying figure, you can say that the box marked A is pointing to _______. Select one: a. a URL b. the home page c. the status bar d. the current default search engine
a URL
Cable Internet service requires ____. Select one: a. a cable modem b. digital telephone lines c. a satellite receiver d. a cable TV subscription
a cable modem
Case-Based Critical Thinking Questions Case 3-2 You are in the market for various kinds of application software. You want a program that can use formulas to perform calculations, and organize numbers and values into rows and columns. You most likely want ____. Select one: a. a word processing program b. a spreadsheet program c. presentation software d. note taking software
a spreadsheet program
In the Internet Explorer desktop application, the View favorites, feeds, and history button looks like _______. Select one: a. a turning gear b. a house c. a star d. two overlapping boxes
a star
In the path C:\Book\Chapter8\images\fly.jpg, "Chapter8" is _____. Select one: a. a top-level folder b. a subfolder under "images" c. a subfolder under "Book" d. the drive name
a subfolder under "Book"
If you point to an application button on the desktop taskbar, _____. Select one: a. a thumbnail of the application window appears b. the application becomes active c. the application is maximized d. a shortcut menu appears
a thumbnail of the application window appears
According to the text, no matter what kind of Internet connection setup you arrange for your computer, you will likely need to select these two things: ____. Select one: a. RJ-45 wiring & coaxial cabling b. a username and a payment method c. phone number, username d. WiFi channel, payment method
a username and a payment method
Case-Based Critical Thinking Questions Case 5-2 There are widely varied types of online communication and online writing-each with their own special purpose. Knowing what category of information you're trying to find on the Web will help you make more efficient and effective use of your time. In each of the following questions, give the answer that best describes the item listed in the question. A free online encyclopedia updated by thousands of active contributors and visited by individuals around the world is ____. Select one: a. a wiki b. a blog c. Twitter d. iDingo
a wiki
A two-part button consists of the button and _______. Select one: a. an arrow next to or below the button b. its dialog box c. a corresponding button elsewhere on the ribbon d. the icon that executes the command
an arrow next to or below the button
The way a network is designed to communicate is known as its ____. Select one: a. architecture b. protocol path c. topology d. latency
architecture
When you click "Empty Recycle Bin," files stored in the Recycle Bin _____. Select one: a. return to their original position b. can be retrieved using the Restore tab on the ribbon c. are permanently deleted d. are compressed
are permanently deleted
A(n) ______ is a file you send with an email message. Select one: a. tag b. addendum c. attachment d. widget
attachment
The majority of discarded computer equipment sent to recyclers in developed nations ends up ____. Select one: a. being reused in new computer components b. being safely separated and recycled within the United States c. being sent to foreign nations with lax environmental standards d. being ground into the underlayment used in highways
being sent to foreign nations with lax environmental standards
A fingerprint reader is an example of a(n) ____ access system. Select one: a. holistic b. biometric c. ephemeral d. trivial
biometric
A ____ is an online personal journal accessible to the public, usually created and updated by one individual. Select one: a. wiki b. blog c. podcast d. plank
blog
The operating system is loaded into memory during the ____ process. Select one: a. kernel b. boot c. SOLE d. lacing
boot
A group of zombie computers controlled by one individual, working together in a coordinated fashion, is called a(n) ____. Select one: a. zero-day threat b. botnet c. wardriver d. etherbomb
botnet
Web pages are viewed using a Web ____. Select one: a. bug b. spinner c. browser d. compiler
browser
DVD ____ refers to recording data onto a recordable or rewritable DVD. Select one: a. ripping b. burning c. tracing d. authoring
burning
A _____ is an electronic path over which data can travel. Select one: a. router b. bus c. redundant array of disks d. sluice
bus
A(n) ____ network uses a central cable to which all network devices connect. Select one: a. ether-ring b. star c. bus d. mesh
bus
To ensure a unique email address for everyone in the world, usernames must be unique within each ____. Select one: a. region b. nation c. hub d. domain name
domain name
You can change your start page _______. Select one: a. from within the Internet Explorer app only b. by triple-clicking the Address bar c. by working with the Internet Options dialog box, General tab d. only when you first start Internet Explorer
by working with the Internet Options dialog box, General tab
To save a favorite in the Internet Explorer app, you _______. Select one: a. click the Pin site button, then click Add to favorites b. simply type '%' at the end of the URL in the Address bar c. drag the Address bar to the upper-left corner of the screen, then release d. are out of luck; you can only add favorites in the desktop application
click the Pin site button, then click Add to favorites
A(n) ____ is a computer that requests and uses network resources from a(n) ____. Select one: a. client, peer b. server, ISP c. ISP, client d. client, server
client, server
When only one file is open in an application, clicking the application's Close button _______. Select one: a. closes only the file b. closes the file and the application c. is dimmed and unclickable d. has different effects depending on the application open
closes the file and the application
Windows Live SkyDrive is an example of _____ storage. Select one: a. NAS b. SAN c. cloud d. direct
cloud
On most computer systems, the smallest storage area on a hard disk is a(n) _____. Select one: a. track b. cluster c. SSD d. cylinder
cluster
The accompanying figure shows a(n) ____. Select one: a. GUI b. HUI c. command-line interface d. UNIX interface
command-line interface
Maliciously altering the content of a competitor's commercial Web site is an example of ____ is an act of malicious destruction to a computer or computer resource. Select one: a. computer sabotage b. Cyberterrorism c. cracking d. a dot con
computer sabotage
A smart card is the size of a _____. Select one: a. postage stamp b. credit card c. sheet of A4 paper d. postcard
credit card
Any fact or set of facts, such as the words in a letter to a friend or the notes in a song, can become computer ____. Select one: a. data b. information c. networks d. hardware
data
Case-Based Critical Thinking Questions Case 3-2 You are in the market for various kinds of application software. Your business has a growing client base as well as a growing inventory. You need to keep track of a good deal of information and be able to search for information quickly, so you decide to invest in ____. Select one: a. database software b. mastersheet software c. presentation software d. note taking software
database software
Operating systems used with personal computers are typically referred to as ____ operating systems. Select one: a. desktop b. network c. mobile d. embedded
desktop
Most networking media send data using ____ signals. Select one: a. flash b. digital c. analog d. contiguous
digital
A(n) ____ is designed to authenticate the identity of an individual or organization; it contains the name of the entity, a serial number, an expiration date, and a key pair. Select one: a. e-vitation b. digital certificate c. online watermark d. authenti-stamp
digital certificate
A document with a(n) ____ guarantees that the document was indeed sent by a specific individual and that it hasn't been tampered with after it was sent. Select one: a. valid IP packet list b. Wi-Fi piggyback c. digital signature d. e-thumbprint
digital signature
Most Internet connections today are ____ (always-on) connections. Select one: a. dial-up b. lossless c. direct d. scaled
direct
When a Web site is requested by its ____, the corresponding ____ is looked up using one of the Internet's DNS servers. Select one: a. domain name, IP address b. IP address, domain name c. TCP/IP route, ring topography d. ISP, HTML code
domain name, IP address
IP addresses and their corresponding ____ identify computers available through the Internet. Select one: a. HTML codes b. TCP/IP routes c. ring topographies d. domain names
domain names
Small programs called ____ are used to communicate with peripheral devices such as monitors, printers, and keyboards. Select one: a. buses b. threads c. drivers d. page files
drivers
The computers found in DVD players, thermostats, answering machines, and some appliances are known as ____. Select one: a. mobile devices b. fifth-generation computers c. embedded computers d. miniframes
embedded computers
A happy face or sad face image placed in the message text of an email is called a(n) _______. Select one: a. emoticon b. charm c. facetile d. winkie
emoticon
Only ____ email can be transmitted safely and privately. Select one: a. work b. Web-based c. encrypted d. logged
encrypted
A company network that is accessible to authorized outsiders is called a(n) ____. Select one: a. WAN b. extranet c. intranet d. VPN
extranet
A _______ is a shortcut to a Web page saved in a list in the Internet Explorer desktop application. Select one: a. Slice b. favorite c. frequent d. histogram
favorite
".docx" is an example of a(n) _______. Select one: a. taskpane shortcut b. Clipboard snippet c. file extension d. PowerPoint file
file extension
The accompanying figure shows various examples of _____. Select one: a. embedded drives b. flash memory cards c. external hard drives d. ZIP drives
flash memory cards
A _______ is a menu or grid that shows visual representations of the options available for a button. Select one: a. taskpane b. gallery c. tableau d. ScreenTip
gallery
The term ____ computing refers to the use of computers in an environmentally friendly manner. Select one: a. green b. blue c. bio d. tonic
green
Case-Based Critical Thinking Questions Case 5-1 The world of the Internet can be overwhelming. You take some time to break it down in your mind, understanding the community and its players. For each of the following questions, look at the organizations, businesses, or individuals listed, and then determine what they represent as a whole. Router manufacturer, maker of the latest Web browser, computer designer are ____. Select one: a. ASPs b. key Internet organizations c. hardware and software companies d. users
hardware and software companies
Search engines return a list of links to Web pages that match your search criteria, called ____. Select one: a. hits b. homers c. webcrawlers d. hotspots
hits
A Wi-Fi ____ is a location with a direct Internet connection and a wireless access point that allows users to connect wirelessly to the Internet. Select one: a. hotspot b. honeypot c. broadband d. linkup
hotspot
When you type a URL into the Address bar and press the Enter key, Internet Explorer automatically adds _______ to the URL and then displays the page. Select one: a. html::80 b. IE10:// c. TCP/IP d. http://
http://
When shopping at an e-commerce Web site, make sure you only enter payment information on a secure Web page, one with a URL that begins with ____. Select one: a. http b. https c. SEC-http d. a deadbolt symbol
https
File naming rules differ from folder naming rules _____. Select one: a. in specifying a different maximum length for file names b. in no way; the rules are the same c. in the characters that are not allowed d. in that two files in different folders may not have the same name
in no way; the rules are the same
The means by which you interact with any program on a computer is called the user ____. Select one: a. interface b. shunt c. plug-in d. GIU
interface
When you drag a file or folder from one location to another on the same drive, it _____. Select one: a. is copied, not moved b. is moved, not copied c. is automatically extracted d. is automatically compressed
is moved, not copied
When you delete a message from the Inbox, _______. Select one: a. the sender's name is deleted from your Contacts as well b. it is moved to the Deleted items folder c. it is immediately permanently deleted d. it is moved to a holding area on the desktop or the Start screen
it is moved to the Deleted items folder
From the accompanying figure, you can say that _______. Select one: a. this Internet Explorer application currently has no saved favorites b. it is not possible to go forward to a more recent URL, only back c. the computer has a touch screen d. the screen is not maximized
it is not possible to go forward to a more recent URL, only back
The core of the computer's operating system is called the ____. Select one: a. boot sector b. node c. shell d. kernel
kernel
The use of multiple _______ is sometimes called using a search phrase. Select one: a. hits b. search results c. search engines d. keywords
keywords
To conduct a Web search, you type ____ into a search box on a search site. Select one: a. passwords b. passphrases c. spiders d. keywords
keywords
Clicking the small button in the right corner of many groups on the ribbon tabs _______. Select one: a. expands the group b. launches a dialog box related to that group c. locks the group d. opens the Clipboard
launches a dialog box related to that group
Most storage servers are based on _____. Select one: a. magnetic tape b. flash memory c. optical discs d. magnetic hard disks
magnetic hard disks
A large organization that needs a computer to run the programs that staff use during the day, and then spend the night performing payroll and billing, most likely will buy a ____. Select one: a. mainframe b. supercomputer c. cloud computer d. midrange server
mainframe
All of the following typically use the same operating systems as desktop computers EXCEPT ____. Select one: a. notebooks b. netbooks c. mobile phones d. tablets
mobile phones
Case-Based Critical Thinking Questions Case 1-3 Damon is learning about intellectual property, copyright, and plagiarism. You give him several scenarios to test his understanding. In an article, a journalist paraphrases a few sentences from another author without changing the meaning, and credits the original author with a proper citation. The journalist receives pay for this article. Damon tells you this is ____. Select one: a. plagiarism b. not plagiarism c. too little information to say d. both illegal and unethical
not plagiarism
Case-Based Critical Thinking Questions Case 6-1 You study a series of real-life issues to determine what kind of security and/or privacy threat you are facing. A relative of yours is in junior high school and has been subjected to a lot of bullying via text messages and social networking sites. You want to help, so you start to read up on the state laws and school rules that deal with ____. Select one: a. cyberterrorism b. identity theft c. online harassment d. cyberstalking
online harassment
Clicking the FILE tab _______. Select one: a. opens a dialog box b. adds contextual tabs to the ribbon c. gives you access to editing and formatting features d. opens Backstage view
opens Backstage view
Without a(n) ____, a computer cannot function. Select one: a. pointing device b. application suite c. operating system d. optical drive
operating system
Email is typically transmitted ____. Select one: a. in encrypted form b. through a VPN c. over public media d. at times of low Internet usage
over public media
Hacking most often occurs ____. Select one: a. in upscale suburban areas b. when an attacker has physical access to a vulnerable computer c. over the Internet or another network d. on college campuses
over the Internet or another network
Case-Based Critical Thinking Questions Case 3-2 You are in the market for various kinds of application software. Lastly, you need a specialized program to help you track your personal expenses, balance your checking accounts, and write checks. You were looking at buying ____, but you realized that much of what you need is already available via online banking with your local bank. Select one: a. database software b. accounting software c. personal finance software d. vector software
personal finance software
Case-Based Critical Thinking Questions Case 1-3 Damon is learning about intellectual property, copyright, and plagiarism. You give him several scenarios to test his understanding. A student copies and pastes information from various online documents to create a research paper, without crediting the original authors. The paper is only for school use and will not be shared or sold outside of school. Damon rightly says this is ____. Select one: a. plagiarism b. not plagiarism c. too little information to say d. illegal, though probably still ethical
plagiarism
Presenting someone else's work as your own is ____. Select one: a. libel b. trademark infringement c. plagiarism d. unethical but not illegal
plagiarism
Magnetic hard drives contain round pieces of metal called _____, which are coated with a magnetizable substance. Select one: a. platters b. cylinders c. SSDs d. saucers
platters
A communications ____ determines how devices on a network communicate. Select one: a. protocol b. topography c. hierarchy d. bridge
protocol
Wireless networks usually use ____ signals to send data. Select one: a. analog b. radio c. fiber-optic d. contiguous modulation
radio
A wireless ____ is commonly used to connect both wireless and wired devices to a network and to connect that network to an Internet connection via the appropriate broadband modem. Select one: a. coupling b. jumper c. router d. NAC
router
The most common tasks you perform in any Office application are to create, open, _______, and close files. Select one: a. share b. delete c. edit d. save
save
To change which area of the workspace is visible in the program window, you can use the _______. Select one: a. zoom bars b. scroll bars c. resolution setting d. ScreenFilter
scroll bars
Google, Yahoo!, and Bing are all examples of ____. Select one: a. social networking software b. search sites c. third-party cookies d. tracking engines
search sites
Special Web pages called ____ are available to help you locate what you are looking for on the Internet. Select one: a. robots b. search sites c. Web bugs d. scanner pages
search sites
With ____ transmission, data is sent one bit at a time. Select one: a. serial b. parallel c. pulse d. fiber-optic
serial
Facebook is an example of a(n) ____ site. Select one: a. social networking b. Webinar c. ISP d. wiki
social networking
The term ____ refers to the programs or instructions used to tell a computer what to do, and allow people to use a computer to perform specific tasks. Select one: a. hardware b. networking c. vaporware d. software
software
Sometimes, related software programs are sold bundled together as a(n) ____. Select one: a. operating system b. software suite c. incentivization d. software cluster
software suite
The biggest advantage of fiber-optic cabling is ____. Select one: a. ruggedness b. speed c. price d. flexibility
speed
A ____ Web site is a fraudulent site that has been set up to be indistinguishable from the legitimate site it is pretending to be. Select one: a. phramed or framed b. spear phished c. spoofed d. sponged
spoofed
Case-Based Critical Thinking Questions Case 6-1 You study a series of real-life issues to determine what kind of security and/or privacy threat you are facing. You have received an email from your bank asking you to update your account information and verify your password. Suspicious, you hover your mouse over one of the links in the email. It turns out that the actual link does not go to the bank's Web site, but to another site you are unfamiliar with. Knowing what you do about data theft, you assume that the bank's true Web site has been ____ at this Web site in order to trick people into giving their personal information to a thief. Select one: a. phished b. phramed or framed c. piggybacked d. spoofed
spoofed
The text recommends all of the following for creating strong passwords EXCEPT ____. Select one: a. using at least eight characters b. using a combination of upper- and lowercase letters c. creating a password from an easy-to-remember passphrase d. stringing together easy-to-remember family names
stringing together easy-to-remember family names
A(n) ____ prevents power spikes from harming your computer system. Select one: a. surge suppressor b. UPS c. rugged frame d. antivirus suite
surge suppressor
The _____ is a small quartz crystal located on the motherboard. Select one: a. ALU b. system clock c. bus interface d. heat sink
system clock
The technical term for the complete malfunction of a computer system is ____. Select one: a. BSOD b. asset demechanization c. file corruption d. system failure
system failure
The ribbon is organized into _______ and groups. Select one: a. panes b. quadrants c. workspaces d. tabs
tabs
Web pages are displayed on _______ in the Internet Explorer desktop application. Select one: a. slices b. dialogs c. slides d. tabs
tabs
The desktop _____ is a horizontal bar containing buttons that provide quick access to common tools and running programs. Select one: a. taskbar b. Charms bar c. Start screen d. notification area
taskbar
The accompanying figure shows _______. Select one: a. the Internet Explorer desktop application b. the Internet Explorer app c. the Windows 8 desktop d. a page of search results
the Internet Explorer desktop application
In the accompanying figure, you know that there is no previously displayed window because _____. Select one: a. box E is at the root directory b. the buttons in box B are grayed out c. none of the subdirectories in box A are opened d. box D does not have a History tab visible
the buttons in box B are grayed out
When a software program is purchased, ____. Select one: a. the buyer is buying the software b. the buyer can modify and resell the software c. the buyer may always install the software on as many systems as he or she wishes d. the buyer acquires a software license specifying the terms of use
the buyer acquires a software license specifying the terms of use
When you delete a file from a USB drive, _____. Select one: a. the file is deleted permanently b. the file moves to the Recycle Bin c. a backup of the file is moved to your SkyDrive d. the total storage space on your USB drive is reduced by the file's size
the file is deleted permanently
If you are using a monitor set to a lower resolution and you can't find a ribbon button, you might need to click _______ first. Select one: a. Close b. the taskbar c. the group button d. the scroll bar
the group button
If you see a paperclip icon next to a message in the message list, that means _______. Select one: a. the message is time-sensitive b. the message is high-priority c. the message has been read d. the message has an attachment
the message has an attachment
System software consists of ____. Select one: a. the operating system & utility programs that control a computer b. productivity programs such as Microsoft Office c. RAM, the hard disk, and any USB flash drives attached d. only those programs that operate enterprise-class servers
the operating system & utility programs that control a computer
A red wavy line under a word you type in the message section of Mail means _______. Select one: a. the word is a hyperlink b. the word is not in the built-in spell checker c. the word is too complex for the tone of the rest of the message d. there are synonyms to the word that you might prefer
the word is not in the built-in spell checker
More than ____ of all home Internet connections in the United States are broadband. Select one: a. one-third b. two-thirds c. three-quarters d. 90%
two-thirds
An employee using a company computer to check personal email is an example of ____. Select one: a. fair use b. unauthorized use c. unauthorized access d. hacking
unauthorized use
An email address consists of a ____, followed by an @ symbol, followed by the domain name of the mail server. Select one: a. URL b. username c. password d. TLD
username
A(n) ____ is a software program that performs a specific task, usually related to managing or maintaining the computer system. Select one: a. application b. utility program c. kernel d. device driver
utility program
A ____ is a program that is installed without the permission or knowledge of the computer user, that is designed to alter the way a computer operates, and that can replicate itself to infect any new media it has access to. Select one: a. worm b. Trojan horse c. virus d. DDoS
virus
Case-Based Critical Thinking Questions Case 6-1 You study a series of real-life issues to determine what kind of security and/or privacy threat you are facing. One evening you notice that your Internet seems to be running slower than normal. You look out your living room window and see a strange car parked on the street in front of your house, and someone's inside. It is possible you are being subjected to ____. Select one: a. war driving b. Wi-Fi piggybacking c. botnetting d. a dot con
war driving