Cis 110 Sec 0010 Final Exam Study Guide

Ace your homework & exams now with Quizwiz!

____ are unique in that they can create a three-dimensional object made of various materials.

3D printers

Which of the following is NOT a high-speed Internet connection for homes?

4G

Compact Discs (CDs) are capable of storing up to _________ of data.

700 MB

__ involves the development of intelligent systems.

AI

Which of the following networks, which began with just four universities, is the earliest ancestor of the Internet?

ARPANET

Which of the following is NOT an office suite?

Adobe Creative

Which of the following is an e-book reader?

Amazon Kindle

Although Google owns _________ and manages the Google Play Store for apps, they allow any manufacturer to use and modify this operating system for their devices.

Android

Which of the following products would you choose if you wanted to edit videos?

Apple Final Cut Pro

____ occurs when computers or machines can perform the work that was once done by a human.

Automation

When sending email to a large number of individuals, placing their addresses in the __________ field will prevent all those addresses from being seen by the recipients.

BCC

A(n) __________ is a copy of one or more files that is made in case the originals become lost or damaged.

Backup

_ is the amount of data that can be transmitted over a given amount of time.

Bandwidth

Which optical disc typically holds 25 GB or 50 GB of data?

Blu-ray

You are shopping for a new computer online. The description lists the following: "Intel i73630QM." What part of the computer does that refer to?

CPU

Created in 1981, _________ brought together researchers in the field of computer science.

CSNET

Computers in home

Communication, Business work done at home, Schoolwork, Entertainment, Creativity, Finances and Shopping

___ software aids architects, engineers, and many others who need to create a digital model of an object.

Computer Aided Design

Which of the following allows users to switch between a laptop and tablet experience?

Convertible laptop

A(n) __________ license allows authors to set conditions for the free use and distribution of their work.

Creative Commons

Repeated hostile behavior with intent to harm another individual is known as ___

Cyber bullying

The image quality (or print resolution) for printers is measured in:

DPI

The quality of a printer's output is measured in:

DPI

Google allows users to view and control all their data with a tool known as:

Dashboard

A(n) __________ is responsible for configuring, maintaining, and securing an organization's database.

Database Administrator

Computers in Industry

Design, Shipping, Process Control, Administration, Marketing

The __________refers to the technology gap that exists between different social and economic classes.

Digital Divide

Which part of a URL identifies a site and a brand on the web?

Domain name

The ability to automatically print to both sides of a piece of paper is known as ___

Duplexing

Which type of printer should you purchase if your company needs to print employee ID cards?

Dye-sub

__ is the ability to recognize, understand, and share the feelings of others.

Empathy

___ is the process of scrambling your data or storage devices to make them unreadable by anyone who doesn't have the proper key

Encryption

A(n) __________ is the typical license that a user must agree to before installing software

End-User License Agreement

Which type of keyboard is designed to be comfortable and help reduce the chance of hand and wrist strain?

Ergonomic

The network standard known as __________ uses a star topology with twisted-pair cables that plug into the RJ45 port located on many devices

Ethernet

__________ is the philosophical study of morality

Ethics

Which of the following is NOT a popular computer programming language?

Exchange

A(n) __________ is a type of information system that performs analytical tasks traditionally done by a human.

Expert System

Many websites have __________ areas that should be checked for common questions and their responses.

FAQ

Laws such as the Patriot Act and _________ give the U.S. government broad surveillance powers.

FISA

A Kensington lock is an effective countermeasure against phishing threats.

False

Application software is made for the computer's proper operation, while system software aims to make users more productive

False

Because of their high speeds and the sharp-looking text they produce, dot matrix printers are preferred by modern businesses.

False

Copyright protection lasts for approximately 15 years after the author applies for it.

False

For a computer, "sleep" mode uses less electricity than "hibernate" mode.

False

For mission-critical systems, technology companies construct computer hardware and software that can never fail.

False

HTTP and HTTPS are the heart of Internet communication, setting rules for the transport and addressing of packets.

False

It is illegal for social networking companies to share profile and usage information with marketing companies they are partnered with.

False

One gigabyte is larger than one terabyte.

False

Scalability is the ability of each organization's information system to work with the other, sharing both data and services.

False

The app known as Spotify is used by small businesses to accept mobile payments.

False

The asterisk symbol (*) is often used to mark keywords or topics in a social post or tweet.

False

The most popular format for file compression is known as CRM.

False

The physical devices that make up a computer system are known as software

False

In its simplest form, a(n) __________ is a node on a network that serves as an entrance to another network.

Gateway

Modern operating systems have a(n) __________ , allowing users to communicate via graphical elements on the screen.

Graphical User Interface

_____concentrates on reducing the environmental impact of computers and their widespread use.

Green Computing

The __________ language, which was used in the first web page, is still being used today alongside other languages.

HTML

The communication of vibration, motion, or physical resistance to a user is called:

Haptics

You might find a computer support specialist at a company's __________, troubleshooting systems and providing technical support to employees.

Help Desk

Which of the following is a popular streaming service that specializes in TV shows, especially those that have been aired recently?

Hulu

A(n) __________ is a complex system for acquiring, storing, organizing, using, and sharing data and information

Information System

___ is the act of having an online, text-based conversation with one or more individuals.

Instant messaging

Legal concepts have been created and refined to help protect __________, which are essentially products of the mind.

Intellectual Property

The __________ is the largest network in the world.

Internet

To access the Internet from home you must connect to a(n) __________, which typically involves making monthly payments to a telecommunications company.

Internet Service Provider

In which of the following social networking sites are you most likely to find professionals who seek to make business-related connections?

LinkedIn

__________ allow various apps to recommend nearby restaurants or let you check-in at the establishment where you are currently located

Location based services

In a category of games known as _________, millions of players connect to various servers to team up with other players in very large virtual worlds.

MMORPGs

A(n) __________ is a huge, noncredit, online course that is offered for free by a variety of universities.

MOOC

Computers in Goverment

Military, Security, Taxes, Police

The __________ is the largest circuit board in a personal computer.

Motherboard

__ combine either inkjet or laser printing capabilities with scanning, photocopying, and faxing capabilities.

Multifunction Printers

Because of a technology known as __________, many smartphones can now be tapped on special payment devices to complete a purchase at select stores.

NFC

Many government agencies, such as the _________, monitor the Internet and mobile activities of individuals all over the world.

NSA

Which of the following fields involves the creation or manipulation of matter at the smallest possible scale?

Nanotechnology

The term __________ refers to the set of online behaviors that are considered polite and proper.

Netiquette

Network media helps carry data from one __________, or connection point, to another

Node

Which of the following is NOT a cloud storage service?

OnLive

The purpose of a(n) __________ is to manage the flow of data between hardware components and allow the user to communicate with the computer

Operating System

Which of the following is a DBMS that you might find a large business using?

Oracle

A(n) __________ is software designed to keep individuals organized.

PIM

Printer speed is measured in:

PPM

__ file sharing uses a distributed network of individual users instead of a central server to transfer files.

Peer to Peer

Online companies typically have a(n) on their websites that clearly state what information is collected from users and what is done with that information.

Privacy Policy

__ is a feature of all modern browsers that will delete your history, cache, and cookies the moment you close the browser.

Private browsing

Computers in Healthcare

Procedures, Research, Training, Medical Records

A(n) __________ is a storage system that links any number of disk drives so that they act as a single disk.

RAID

__ is the temporary workspace of a computer. It stores the content you are currently working on.

RAM

_______ computers are ones that have multiple hardware systems performing the same task at the same time.

Redundant

Which of the following is NOT a web browser?

Skype

Which type of software is used for entering, calculating, and analyzing sets of numbers, as well as creating graphs and charts?

Spreadsheet

Which types of computers are ideal for handling highly complex problems that require extreme calculating power?

Supercomputers

The __________ of a desktop computer is the case that houses the computer's critical parts, such as the processing and storage devices

System Unit

Which type of information system handles the processing and tracking of transactions?

TPS

A(n) __________ is a device that can capture television signals for viewing on a computer

TV tuner

___ is the primary storage device of a personal computer.

The hard drive

Which of the following is a pointing device that can be useful if you have very limited space on your desk?

Trackball

__ is the act of being annoying and antagonistic in areas such as online forums.

Trolling

192.168.1.101 is an example of an IP address.

True

4 out of 4 points Chromebooks have very little internal storage, relying mainly on cloud storage

True

A decision support system can include or access other types of data, such as stock market reports or data about competitors.

True

A programmer or software company will often release a beta version in order to test software in real-world conditions.

True

Google Goggles is a service that will identify many of the objects and barcodes that you point your mobile device's camera at.

True

Google's Street View shows you almost any part of a map as if you were driving through a particular street.

True

If a company hires an outside organization to handle its accounting, it is engaged in outsourcing

True

If you do not have a smart TV, a streaming player can bring a variety of online services to your TV.

True

In some operating systems, folders may be referred to as directories.

True

Modern ROM chips can be electronically reprogrammed.

True

No single person or group controls the Internet. It is a decentralized and cooperative community.

True

Some humanoid robots can already jog, climb stairs, recognize objects, and understand human speech.

True

Wireless networks use radio signals that travel through the air in order to transmit data.

True

With a subscription model, users pay a fixed amount of money per month in order to use software.

True

With speech recognition, it is possible to issue commands and search for information by speaking into your mobile device

True

Without proper cooling, a computer could overheat and malfunction.

True

Which of the following are thin, lightweight laptops that possess strong processing power and are more expensive than typical laptops?

Ultraportable computers

A(n) __________ employs a method called "tunneling" in which each packet from the sending computer is encapsulated within another packet before being sent over the Internet.

Virtual Private Network

Many feel that the future of gaming will involve __________ , where humans can experience realistic environments that are simulated by computers.

Virtual Reality

Which type of memory is nothing more than the use of your hard drive when you are running out of RAM?

Virtual memory

_ translates analog voice signals into digital data and uses the Internet to transport the data.

VoIP

___ is the act of alerting the public about harmful activities that are being hidden by an organization.

Whistleblowing

A(n) __________ is the device that all nodes connect to in order to communicate wirelessly.

Wireless Access Point

The __________ is a global system of linked, hypertext documents.

World Wide Web

Which type of malware is a fully contained program that self-replicates and spreads through networks?

Worm

Which of the following Wi-Fi standards is the fastest?

ac

Many mobile devices contain a(n) _________ and gyroscope that can sense even the smallest movements.

accelerometer

A(n) _________ is a document containing an organization's policies for the ethical, secure, and appropriate use of computing resources.

acceptable use policy

________ computers are personal computers that have all of the hardware integrated with the monitor

all in one computers

If you want to include a file with your email message, it should be placed it in the _________ area.

attachments

Google's Glass provides a basic __________ experience, where the real world is supplemented with computer-generated information.

augmented reality

Both fingerprint scanners and facial recognition are examples of:

biometrics

The most fundamental unit of computing is the __________ , which is typically represented as a 1 or a 0.

bit

Many network servers come in the form of thin units known as __________ servers, which can slide in and out of a rack that holds many of its companion servers.

blade servers

A(n) __________ is a web page or small website that contains a series of chronological posts and comments.

blog

The term __________ is used to describe any digital data connection that can transmit information faster than standard dial-up by using a wider band of frequencies.

broadband

If you want to clear an operating system's temporary files for storage, performance, or privacy reasons, you should run a disk _________ utility

cleanup

When using __________, your files can be stored online and accessed from any Internet-connected device

cloud storage

A _________ excels when it comes to installing, configuring, and supporting computer systems.

computer support specialist

One of the foundation blocks of intellectual property law is the__________, a legal concept that grants rights and control to the owner of any published work

copyright

Most of today's microprocessors have several processors, or _________, inside a single chip.

cores

The gathering of information from a large group of people is known as:

crowdsourcing

__________ consist of individual facts or pieces of information.

data

A computer __________ is simply an organized method for storing information.

database

Simply put, a computer _________ is an organized method for storing and retrieving information such as customers, employees, inventory, and sales records.

database

A _________ is responsible for configuring, maintaining, and securing an organization's database.

database administrator

Operating systems communicate with most hardware components using:

device drivers

Someone who possesses _________ has a broad understanding of computer technology and is able to use it well.

digital literacy

The ability to automatically print to both sides of a piece of paper is known as:

duplexing

Once a computer program is compiled, the IDE will produce a(n) _________ file that can be run by the operating system on a user's computer.

executable

"FinalEssay", "Birthday2014", and "Attachment_3" are all examples of file extensions.

false

Also known as RAID 1, striping writes data onto two or more disks simultaneously.

false

Although NSFNET offered connectivity to academic researches, it was much slower than the newer CSNET.

false

Although a MOOC allows any individual to register for online classes at Harvard and MIT, their high registration cost has limited their popularity

false

Although cloud backups are convenient, they have historically been more vulnerable to theft and damage than the backups kept in your home or business.

false

Although e-books are affordable, their adoption has been limited by the lack of photo support and the fact that they can be opened only by e-book readers.

false

Although high quality movies can easily be streamed in homes, the slower speed of mobile networks creates a poor viewing experience for streamed movies.

false

An active DSS collects and displays data in the format requested, while a passive DSS makes recommendations as to the best decision.

false

An information system is a large and highly-specialized server that hosts the database for large businesses, generally those with over 10,000 employees.

false

Copyright protection lasts 20 years after the date of publication or release.

false

In Windows, files are managed with a tool known as Finder. On a Mac, that tool is known as Explorer.

false

Keyboard covers for tablets generally plug into the headphone jack in order to communicate with the tablet.

false

Mac OS has the largest market share for personal computers.

false

Mainframe computers, which are the largest and most powerful computers in the world, are ideal for handling large and highly complex problems that require extreme calculating power.

false

Organizations create an extranet in order to allow their systems to have access to the rest of the Internet.

false

A(n)__________ cable consists of a thin strand of glass that transmits pulsating beams of light rather than electric current.

fiber-optic

A(n) __________ is a discussion board where individuals can ask questions and reply to each other.

forum

Although it is best to avoid any distractions when driving, __________ technology will at least let you keep your eyes on the road.

hands free technology

Some organizations offer an internal version of the Internet, called a(n):

intranet

A software _________ is a contract from the software creator that specifies the rules for using this software.

license

It is through _________ that a copyright holder can grant usage or distribution rights to others

licensing

______ computers are very large and powerful systems used in organizations where a heavy amount of processing and user requests need to be handled

mainframe

Collectively, all malicious programs are referred to as:

malware

Higher _________ cameras can capture more detail, but they will produce a larger image file on your storage media.

megapixel

Search _________, such as quotes and the minus sign, can narrow down the results provided by search engines

modifiers

The ability to run multiple programs at the same time is known as __

multitasking

A(n) _________ allows users to communicate and share information between computers.

network

A(n) __________ allows users to communicate and share information between computers.

network

A technology known as __________ can translate the image of a scanned document into text that can be edited and formatted.

optical character recognition (ocr)

Data moves through networks in structures known as __________, which are pieces of a message broken down into small units by the sending device and reassembled by the receiving device.

packets

Dividing a hard drive into multiple sections is known as:

partitioning

A file __________ is a complete address that describes the exact location of a file.

path

In the world of computing, _________ means acquiring or exchanging copies of protected digital creations without payment or permission from their creator.

piracy

In the world of computing, __________ means acquiring or exchanging copies of protected digital creations without payment to or permission from their creator

piracy

The USB __________ is the most popular type of plug found on desktop and laptop computers

port

Networks must follow rules, known as communication __________, to ensure that data is sent, received, and interpreted properly.

protocols

If you want to know the maximum number of pixels that a monitor can display on the screen, you would look at its:

resolution

The _________ of a monitor refers to the number of pixels that it can display on the screen.

resolution

Hackers often set up their own wireless access points in popular areas with the hope that users connect to them. These are known as:

rogue hotspots

A network _________ is a powerful computer with special software and equipment that enables it to function as the primary computer in a network.

server

A(n) __________ is a combination mobile phone and handheld computer

smartphone

_____ sites, such as Reddit, encourage users to share links to news and other interesting content they find on the web

social news

A _________ is responsible for the development of computer software.

software engineer

Junk mail, or __________, is unsolicited email that is sent in bulk

spam

The __________ topology, where nodes connect to a hub, is the most common type used today.

star

Often times, several office programs are bundled as a unit known as an office:

suite

A __________ is similar to a hub, but it is aware of the exact address or identity of all the nodes attached to it.

switch

The most popular ___________is the iPad from Apple

tablet

Photo sharing services allow you to _________ your photos with keywords, current location, and the names of people you know.

tag

A VPN employs a method called "tunneling" in which each packet from the sending computer is encapsulated within another packet before being sent over the Internet

true

A network allows users to communicate and share information between computers and various devices.

true

After software is acquired, it must typically be installed before it can be used.

true

An MIS system can provide different types of information or summaries to managers at different levels.

true

Input can take a variety of forms, such as the text you type with your keyboard or a variety of finger movements on the touchscreen of a mobile device.

true

It is possible to purchase a waterproof case for your mobile device.

true

Many computers do not need a video card because the video-processing circuitry is built directly into the motherboard.

true

Many social engineering tactics require very little expertise and can be as simple as looking through someone's trash or glancing at their desk.

true

Many thieves use the temptation of free (illegal) software to lure individuals into downloading malware on file-sharing services.

true

Since most browsers now have pop-up blockers built-in, few companies use pop-up advertisements today.

true

Some apps have the ability to monitor your sleep by using the sensors inside your device to measure how often you snore and move around

true

The "sports" in the address sports.yahoo.com refers to the subdomain.

true

some watches can display useful alerts and incoming messages from your smartphone.

true

A(n) _________ is a special environment that allows you to run an operating system on top of another operating system.

virtual machine

Yahoo and MSN are both examples of:

web portals

A(n) __________ is a collaborative information site that relies on the Internet community to both create and edit content.

wiki


Related study sets

Statstics Test 1 Review - Chapter 1, 2 and 3

View Set

Diet 425 Food Assistance Programs

View Set

Chapter 37: Prep U Assessment and Management of Patients With Allergic Disorders

View Set

fahmy Geology and Environmental Science - English - german for 3rd secondary certificate

View Set

4312 Cybersecurity Final (Ch. 6,7,8,9)

View Set

Domino theory, rollback and containment

View Set

"Sin Cos Tan (30°, 45°, 60°, 90°, 180°, 270°, 360°)

View Set

Environmental Biology- Chapter 21

View Set