CIS 141 Final

Ace your homework & exams now with Quizwiz!

The ____ is the section of a CPU core that performs arithmetic involving integers and logical operations.

ALU

Mother Goose Computing, Inc. provides computational biology consulting services. They are currently updating several of their systems. For the genomics division, Mother Goose is planning to replace the old system by the new one all at once. This is called a ____ conversion.

Direct

A monitor should be placed directly in front of the user about an arm's length away, and the top of the screen should be no more than 12 inches above the user's eyes once the user's chair is adjusted. T/F

False

A paperless office can be implemented today through a variety of technologies and processing techniques. T/F

False

A(n) data mart typically stores data for an entire enterprise. T/F

False

According to the online version of the Merriam-Webster Dictionary, the term "aphorize" means "to steal and pass off the ideas or words of another as one's own" or to "use another's production without crediting the source." T/F

False

Advocates of war driving and cyberstalking state that, unless individuals or businesses protect their access points, they are welcoming others to use them.T/F

False

Application programmers manage day-to-day processing once a system has become operational. T/F

False

Application service providers (ASPs) supply the information that is available through the Internet. T/f

False

Display devices are used to select and manipulate objects, to input certain types of data (such as handwritten data), and to issue commands to the computer. T/F

False

Each pixel on an LCD display emits visible light in the necessary color. T/F

False

Early signs of CTS include a feeling of emotional and physical exhaustion. T/F

False

Extensive mouse use has also been associated with CVS. T/F

False

FTP programs block access to a computer from outside computers and enable each user to specify which programs on his or her computer are allowed to have access to the Internet. T/F

False

Hardware theft can take many forms, including individuals making illegal copies of programs to give to friends and businesses installing software on more computers than permitted in the program's end-user license agreement. T/f

False

In a worksheet, functions are words, column headings, and other nonmathematical data. T/F

False

Joysticks are headphones with a built-in microphone. T/F

False

Microsoft Office is available for users of all operating systems. T/F

False

One advantage of using personal computers for Internet access is that they have relatively large screens for viewing Internet content and keyboards for easier data entry. T/F

False

One of the most important skills an Internet user can acquire today is how to successfully publish databases on the Internet. T/F

False

One-dimension (1D) barcodes contain data only vertically. T/F

False

Operating systems manage and process data from the time it is generated (such as data resulting from orders, documents, and other business transactions) through its conversion into information. T/F

False

Optical marks are characters specifically designed to be identifiable by humans as well as by an OCR device. T/F

False

Printers produce soft copy. T/F

False

RAM capacity is measured in bits. T/F

False

The Cut command in Windows can be replaced by the keyboard shortcut [Ctrl]+[C].T/F

False

The combination of hardware, software, and other resources used to increase productivity and facilitate communications in the office, is collectively referred to as a(n) system development life cycle. T/F

False

The hard drives of devices to be disposed of should be destroyed before they are sold or recycled.T/F

False

The most common type of mobile phone is the satellite phone. T/F

False

The purpose of computer-aided manufacturing (CAM) is to reduce the time designers spend developing products. T/F

False

There are buses inside the CPU, as well as on the memory channel. T/F

False

Today's CPUs contain hundreds of millions of transistors, and the number doubles approximately every 18 months, a phenomenon known as Moliere's Law. T/F

False

Traditionally, the magnetic particles on a hard disk have been aligned vertically, perpendicular to the hard disk's surface. T/F

False

USB ports are used to connect a computer to a phone outlet via telephone connectors. T/F

False

Web-based software must be installed on the device being used before it is run. T/F

False

When entering a formula or function into a cell, most spreadsheet programs require that you begin with some type of symbol, usually the asterisk character (*). T/F

False

When you issue the command for your computer to store a document on your hard drive, the application software must make sure that the specified hard drive exists. T/F

False

Wi-Fi is a wireless standard that was originally designed for very short-range (10 meters, approximately 33 feet, or less) connections. T/F

False

With a DVD, the storage medium and the storage device are permanently sealed together to form one piece of hardware called a fixed-media storage system. T/F

False

Most operating systems include security features, such as an integrated ____, to protect against unauthorized access via the Internet.

Firewall

Many business software services are offered as ____, including applications geared for collaboration, scheduling, customer service, accounting, project management, and more.

Software as a service (SaaS)

The bus width and bus speed together determine the bus's ____.

bandwidth

For an extra level of security, some smart cards today store ____ data in the card and use that data to authenticate the card's user before authorizing the smart card transaction.

biometric

Anthony is passionate about politics and enjoys sharing and discussing his views with others over the Internet. Every day, Anthony makes a new post to his personal ____, which is a Web page that displays entries in chronological order.

blog

A ____ is an area in RAM or on the hard drive designated to hold input and output on their way in or out of the computer system.

buffer

Heavy use of computers, combined with information overload and 24/7 accessibility via technology, can lead to ____—a state of fatigue or frustration brought about by overwork.

burnout

Mary is entering her senior year of college. She has a meeting on Friday with her advisor to discuss her career plans. Mary is also interested in identifying the business needs of a system and ensuring the systems meet those needs. Her advisor will probably tell her to look into becoming a ____.

business analyst

Eight bits grouped together are collectively referred to as a ____.

byte

A disaster recovery plan is also called a business continuity plan. T/F

True

A graphics tablet is also called a digitizing tablet. T/F

True

A personal area network (PAN) is a small network of two or more personal devices for one individual, such as a personal computer, smartphone, headset, tablet, portable speaker, smart watch, and/or printer. T/F

True

Benchmark tests typically run the same series of programs on several computer systems that are identical except for one component (such as the CPU) and measure how long each task takes in order to determine the overall relative performance of the component being tested. T/F

True

Braille printers print embossed output in Braille format on paper. T/F

True

Digital badges consist of icons that represent academic achievements or acquired skills. T/F

True

Each location in memory has an address. T/F

True

Early computers required programs to be written in machine language. T/F

True

Font size is measured in points. T/F

True

GPS receivers are commonly used by individuals to determine their geographic location while hiking and to obtain driving directions while traveling.T/F

True

In reaction to scandals at Enron, Tyco International, and WorldCom, Congress passed the Sarbanes-Oxley Act of 2002. T/F

True

In some countries, bootleg copies of music CDs and movie DVDs are sold openly. T/F

True

Intellectual property rights indicate who has the right to use, perform, or display a creative work and what can legally be done with that work. T/F

True

Many news sites have searchable archives to look for past articles, although some require a fee to view back articles. T/F

True

Mobile phones are also called wireless phones. T/F

True

One advantage of using a biometric access system is its very high accuracy. T/F

True

One antipiracy tool requires a unique activation code before the software can be installed, before certain key features of a program are unlocked, or after a trial period has expired. T/F

True

One reason advanced users may partition a primary hard drive is to be able to use two different operating systems on the same hard drive. T/F

True

Online auctions are one of the most common ways to purchase items online from other individuals. T/F

True

Optical discs are thin circular discs made out of polycarbonate substrate. T/F

True

People who use the Internet for activities, such as looking up telephone numbers, browsing through online catalogs, or making an online purchase, are referred to as "users." T/F

True

Processors consist of a variety of circuitry and components that are packaged together and connected directly to the motherboard. T/F

True

Product lifecycle management systems are designed to manage a product as it moves through the various stages of its life cycle, from design to manufacturing to retirement.. T/F

True

RAM capacity is measured in bits.

True

Remote storage services accessed via the Internet are often referred to as cloud storage or online storage. These services can be provided either as a stand-alone service or as part of a cloud computing service. T/F

True

Security software protects devices against malware and other threats. T/F

True

Since retrieving data from memory is much faster than from a magnetic hard disk, disk caching can speed up performance.. T/F

True

Some new personal computers come with two partitions: a C drive partition ready to use for programs and data and a D drive partition set up as a recovery partition. T/F

True

Storage devices can be internal (located inside the system unit), external (plugged into an external port on the system unit), or remote (located on another computer). T/F

True

Technically, the Internet is the physical network, and the Web is the collection of Web pages accessible over the Internet. T/F

True

The buses that connect peripheral (typically input and output) devices to the motherboard are often called expansion buses. T/F

True

The eBay Web site states that it prohibits the sale of some controversial or sensitive items, in addition to illegal items.T/F

True

The goal of SCM is to reduce operating and inventory costs while meeting delivery objectives and increasing profits; that is, to be able to deliver the right product to the right place, at the right time, and at the right price. T/F

True

The goal of business intelligence is to provide a detailed picture of an organization, its functions, and its systems, as well as the relationships among these items. T/F

True

The information systems (IS) department is also called the information technology (IT) department. T/F

True

To capture sound from a CD, ripping software is used. T/F

True

To comply with truth-in-advertising laws, a(n) unsubscribe ​e-mail address included in an unsolicited e-mail must be a working address. T/f

True

To retrieve information from a database, queries and reports are used. T/F

True

Transparent solar panels are in the research stage and are expected to eventually be built into the screens of smartphones, tablets, and other devices to charge those devices on a continual basis. T/F

True

Two of the most common design and manufacturing systems are known as CAM and CAD. T/F

True

Users do not have to be concerned with how files are physically stored on a storage medium. T/F

True

With a JIT system, inventory, production resources, and finished products are limited to the right number at the right time as required to fill orders. T/F

True

With pipelining, a new instruction begins executing as soon as the previous one reaches the next stage of the pipeline. T/F

True

With telesurgery, at least one of the surgeons performs the operation by controlling the robot remotely over the Internet or another network. T/F

True

You can order free credit reports online quickly and easily via the AnnualCreditReport.com Web site. T/F

True

Like graphics data, ____—such as a song or the sound of someone speaking—must be in digital form in order to be stored on a storage medium or processed by a computer.

audio data

Word processing programs use a feature called ____, which means the insertion point automatically moves to the beginning of the next line when the end of the screen line is reached.

word wrap

IBF Consultants, LLC provides consulting services in privacy and theft deterrence solutions. One of IBF's clients owns a large number of expensive electronic devices and would like to be able to secure them in case of theft. IBF advises her to use ____.

cable locks

Although more expensive than conventional outsourcing since it requires organizing its own facilities and hiring employees in a foreign country, ____ does give a company much more control over the employees and procedures used than with conventional outsourcing.

captive offshoring

One RSI related to the repetitive movements made when using a keyboard is ____.

carpal tunnel syndrome (CTS)

Most computer tapes today are in the form of ____ tapes.

cartridge

____ transmissions are radio signals sent to and from cell phones via cellular (cell) towers.

cellular radio

____ carry on written "conversations" with people in a natural language.

chatterbots

Jack has a computer at home that he uses to access the Internet, store and edit personal photos, and create and edit documents. Recently, he has come to realize that in order to keep the computer performing at its best, he needs to carry out regular system maintenance on the computer. Since Jack has a Windows system, he can right-click a hard drive icon in File Explorer, select Properties, and then select the ____ option on the Tools tab to check that hard drive for errors.

check

A company's ____ oversees routing transaction processing and information systems activities, as well as other computer-related areas.

chief information officer (CIO)

A ____ is a policy, often for a school or business, that specifies allowable use of resources such as computers and other equipment.

code of conduct

To explain acceptable computer use to their employees, students, or other users, many organizations and educational institutions publish guidelines for behavior, often called ____.

codes of conduct

To speed up magnetic hard drive performance, ____ is often used.

disk caching

While a keyboard, mouse, monitor, and printer can be connected to a portable computer directly, a ____ is designed to connect a portable computer to peripheral devices more easily.

docking station

Data files are often called ____.

documents

Virtually all personal computers come with a(n) ____ that is used to store most programs and data.

hard drive

____ are small components typically made out of aluminum with fins that help to dissipate heat.

heat sinks

In an expert system, the ____ is a software program that applies the rules to the data stored in the knowledge base in order to reach decisions.

inference engine

A(n) ____ is a collection of elements (people, hardware, software, and data) and procedures that interact to generate information needed by the users in an organization.

information system

____ allows you to exchange real-time typed messages with people on your buddy list—a list of individuals that you specify.

instant messaging

____ is a consortium of researchers, educators, and technology leaders from industry, government, and the international community that is dedicated to the development of revolutionary Internet technologies.

internet 2

____ is increasingly being tied to crime and even death in some countries.

internet addiction

Today's CPUs are formed using a process called ____ that imprints patterns on semiconductor materials.

lithography

Partitions are sometimes referred to as ____.

logical drives

A(n) ____ instruction might look like a meaningless string of 0s and 1s, but it actually represents specific operations and storage locations.

machine language

Managers are usually classified into three categories: executive, ____, and operational.

middle

____ devices are high-performance storage systems that are connected individually to a network to provide storage for the computers connected to that network.

network attached storage

One nanometer (nm) is ____ of a meter.

one billionth

____ managers include supervisors, office managers, foremen, and other managers who supervise nonmanagement workers.

operational

By ____, you instruct companies with whom you do business not to share your personal information with third parties.

opting out

Print speed is typically measured in ____.

pages per minute (ppm)

A ____ protects inventions by granting exclusive rights of an invention to its inventor for a period of 20 years.

patent

The three main types of intellectual property rights are copyrights, trademarks, and ____.

patents

One controversial patent granted to Google in 2013 is for "____" advertising—a business model for charging advertisers according to the number of views an ad receives via a "head mounted gaze tracking device".

pay-for-gaze

____ is a scam that redirects traffic intended for a commonly used Web site to a spoofed Web site set up in an effort to obtain users' personal information.

pharming

Monitoring systems may use ____, which are devices that respond to a stimulus (such as heat, light, or pressure) and generate an electrical signal that can be measured or interpreted.

sensors

____ programs are software programs that are distributed on the honor system.

shareware

A presentation graphics program contains an assortment of tools and operations for creating and editing slides, including preformatted ____ containing placeholders for the various elements in the slide.

slide layouts

Jess is a musician who has just bought a new computer. Now she need to figure out how to connect this computer to the devices that were connected to her old computer. Jess has pictures from her old computer saved on a flash memory card. To transfer these to her new computer, she will insert the card into a(n) ____.

slot

The types of ____ systems used with personal and business computers today include smart cards.

storage

A storage medium is inserted into its corresponding ____ in order to be read from or written to.

storage device

A ____ is the hardware where data is actually stored.

storage medium

A ____ is a separate piece of hardware containing multiple high-speed hard drives.

storage server

Each step of the ____ results in some type of documentation that carries forward to the next step in the cycle.

system development life cycle

____ refers to the complete malfunction of a computer system.

system failure

Some benefits can be computed relatively easily by calculating the amount of labor the new system will save, the reduction in paperwork it will allow, and so on. These gains are called ____ because they represent quantifiable dollar amounts.

tangible benefits

One reason a computer might become inefficient is that when programs are uninstalled, pieces of the program are sometimes left behind or references to these programs are left in operating system files such as the ____.

windows registry

A computer ____ is the amount of data (typically measured in bits or bytes) that a CPU can manipulate at one time.

word

PHOLED technology is especially appropriate for use on mobile devices, consumer electronics, and other devices where power consumption is an important concern. T/F

True

Cloud software is delivered on demand via the Web to wherever the user is at the moment, provided he or she has an Internet connection. T/F

True

Computer tapes are read by tape drives, which can be either an internal or an external piece of hardware. _________________________ T/F

True

Digital video cameras include digital camcorders and small digital video cameras used in conjunction with computers and other devices. T/F

True

Each pixel in a monochrome graphic can be only one of two possible colors (such as black or white). T/F

True

Folders can contain both files and other folders (called subfolders). T/F

True

Unlike ASCII and EBCDIC, Unicode is a universal international coding standard designed to represent text-based data written in any ancient or modern language, including those with different alphabets. T/F

True

Virtually all computer users will need at least one convenient USB port to be used to connect external hard drives, USB flash drives, printers, mice, and other USB-based hardware. T/F

True

The most common internal hard drive interface standard for desktop computers today is serial ATA. T/F

True

The number of bits being transmitted at one time is dependent on the bus width. T/F

True

The purpose of the preliminary investigation is to define and evaluate the proposal for a new system or system modification relatively quickly, to see if it is worthy of further study. T/F

True

One or more adjacent sectors form a(n) track, the smallest amount of disk space that can be used to hold a file. t/f

false

Storage media are volatile.

false

The use of cookies provides no benefits to consumers. T/F

False

RFID tags need to be within line of sight of a reader. T/F

False

Each place value in a binary number represents ____ raised to the appropriate power.

2

____ is the most widely used mobile operating system in the United States.

Android

One measurement of the speed of a CPU is the ____, which is rated in megahertz (MHz) or gigahertz (GHz).

CPU clock speed

Public key encryption utilizes a pair of encryption keys obtained through ____ .

Certificate authority

A government database is a collection of data about people that is collected and maintained by private industry. T/f

False

Most printers today are impact printers. T/F

False

Neural networks is the field devoted to the study of robots—devices, controlled by a person or a computer—that can move and react to sensory input. T/F

False

Research has shown that having an academic honor code does not effectively reduce cheating. T/F

False

Robots of the future are expected to have a less humanoid form than the household robots currently on the market. T/F

False

Semirugged devices are designed to withstand drops onto concrete, extreme temperature variations, and use while being bounced around over rough terrain in a vehicle. T/F

False

Several of the original ports used with desktop computers—such as the parallel ports traditionally used to connect printers—are now considered standard ports. T/F

False

Single-core CPUs allow computers to work simultaneously on more than one task at a time. T/F

False

Use a light touch on the keyboard to prevent backache. T/F

False

With random access, the data can only be retrieved in the order in which it is physically stored on the medium. _________________________

False

To keep files organized, related documents are often stored in ____ (also called directories) located on the storage medium.

Folders

A(n) ____ uses charged liquid crystals located between two sheets of clear material to light up the appropriate pixels to form the image on the screen.

Liquid crystal display (LCD)

____ is a method of storing data on two or more hard drives that work together.

RAID

An emerging type of system is the digital ecosystem, which is the collection of people, products, services, and business processes related to a digital element. T/F

True

An information system that combines geographic information with other types of data (such as information about customers, sales, and so forth) in order to provide a better understanding of the relationships among the data, is called a geographic information system (GIS). T/F

True

Computer tapes are read by tape drives, which can be either an internal or an external piece of hardware. T/F

True

Data mining used in conjunction with Web site data is referred to as Web mining. T/F

True

Recordable optical discs can be written to, but the discs cannot be erased and reused.

True

Spyware is a possible privacy risk. T/F

True

Media that allow random access are sometimes referred to as ____ media.

addressable

The original first-generation cell phones were ____ and designed for voice data only.

analog

Screen reader software is an example of a(n) ____.

assistive output device

Creating a(n) ____ means making a duplicate copy of important files so that when a problem occurs, you can restore those files using the copy.

backup

Microsoft Office markup tools and specialized ____ are used in conjunction with networking technology to allow multiple individuals to edit and make comments in a document without destroying the original content.

collaboration software

A(n) ____ is used to display output from a computer to a wall or projection screen.

data projector

The ____ takes instructions from the prefetch unit and translates them into a form that the control unit can understand.

decode unit

____ refers to using a personal computer to combine and manipulate text and images to create attractive documents that look as if they were created by a professional printer.

desktop publishing

In addition to being a copyright concern, ____ can be used to misquote individuals, repeat comments out of context, retouch photographs—even create false or misleading photographs.

digital manipulation

A ____ is a subtle alteration of digital content that is not noticeable when the work is viewed or played but that identifies the copyright holder.

digital watermark

Collecting in-depth information about an individual is known as ____.

electronic profiling

Dan is a small business owner who depends on his computer to keep track of customer and sales data. He is investigating storage options because it is critical for him to ensure that his data is safe in the event of a computer failure. As Dan is very concerned about maintaining the security of his business data, he should look for an external hard drive that comes with built-in ____.

encryption

____ consists of nonvolatile memory chips that can be used for storage by the computer or the user.

flash memory

Some 3D projectors are designed to project ____.

holograms

Enterprise storage systems typically use fast Fibre Channel or ____ connections and are scalable so more hard drives can be added as needed up to the maximum system capacity.

iSCSI

IBF Consultants, LLC provides consulting services in privacy and theft deterrence solutions. Another client has very sensitive data and they are less concerned about recovering any stolen computer than ensuring that the data located on the computer is not compromised. Which technology would be useful in this case?

kill switch hard drives

Technically, to be called a ____, a device must convert digital signals (such as those used by a computer) to modulated analog signals (such as those used by conventional telephone lines) and vice versa.

modem

With bitmapped images, the color of each ____ is represented by bits; the more bits used, the better the image quality.

pixel

A teacher who shares a poem with his class and leads the class to believe the poem is his original work has engaged in ____.

plagiarism

The ____ orders data and instructions from cache or RAM based on the current task.

prefetch unit

Antiglare screens are sometimes called ____.

privacy fiters

____ means that data can be retrieved directly from any location on the storage medium, in any order.

random access

CD-ROM discs and DVD-ROM discs are ____ optical discs that come prerecorded with commercial products.

read-only

Hard disks are permanently sealed inside the hard drive case, along with the ____ and an access mechanism.

read/write heads

Expired toner cartridges and ink cartridges can sometimes be returned to the manufacturer or exchanged when ordering new cartridges; the cartridges are then ____ and resold.

recharged

A ____ partition contains the data necessary to restore a hard drive back to its state at the time the computer was purchased and is designed to be used only if the computer malfunctions.

recovery

RAID 0 uses disk ____, which spreads files over two or more hard drives.

stripping

Encryption that uses 16-character keys is known as ____.

strong 128-bit encryption

The system unit is the main case of a computer or mobile device.

true

USB flash drives are designed to be very small and very portable. T/F

true

The keyboard shortcut [Ctrl]+[Z] is used to ____ the last change to the document.

Undo

The numbering system we commonly use is called the decimal numbering system because it uses ____ symbols to represent all possible numbers.

10

____ is a networking standard for very short-range wireless connections; the devices are automatically connected once they get within the allowable range.

Bluetooth

Rodney owns a computer that he uses to work, keep in touch with friends and family, watch movies, listen to music, and use the Internet. If Rodney wants to be able to write, erase, and overwrite the files on a CD, he should get a ____.

CD-RW

During the 1980s and early 1990s, ____ was the dominant operating system for microcomputers.

DOS (Disk Operating System)

When information from an ERP or other type of internal system is exchanged between different applications (either within an organization or between organizations), it is called ____.

EAI

____ is a special type of large, integrated system that ties together all types of a company's activities, such as planning, manufacturing, sales, marketing, distribution, customer service, and finance.

ERP

The ____ refers to a world where everyday physical objects are connected to, and uniquely identifiable on, the Internet so they can communicate with other devices.

Internet of Things (IoT)

A ____ is approximately 1,000 bytes.

Kilobyte (KB)

One of the most common painting programs is ____.

Microsoft Paint

Most Windows computers typically use ____, which supports much larger hard drives and files than the older FAT32 and includes better security and error-recovery capabilities.

NTFS

Most computers today support the ____ standard, which means the computer automatically configures new devices as soon as they are installed and the computer is powered up.

Plug and Play

____ is a method of storing data on two or more hard drives that work together.

RAID (redundant arrays of independent disks)

Network ports are used to connect a computer to a computer network via a networking cable—typically a cable using a(n) ____, which looks similar to a telephone connector but is larger.

RJ-45 connector

The ____ cards used with mobile phones today are a special type of smart card.

SIM

____ is the use of networking technology to provide medical information and services.

Telemedicine

External hard drives typically connect to a computer via an external port (such as a USB or ____ port) or a wireless connection.

Thunderbolt

To connect multiple USB devices to a single USB port, a ____ can be used.

USB hub

Jess is a musician who has just bought a new computer. Now she need to figure out how to connect this computer to the devices that were connected to her old computer. To connect her external hard drive, in which all of her music files are stored, to the computer, Jess needs to use a ____.

USB port

Jess is a musician who has just bought a new computer. Now she need to figure out how to connect this computer to the devices that were connected to her old computer. To connect her external hard drive, in which all of her music files are stored, to the computer, Jess needs to use a ____.

USB port

The ____ allows 127 different devices to connect to a computer via a single USB port on the computer's system unit.

USB standard

____ refers to driving around an area with a Wi-Fi-enabled device to find a Wi-Fi network in order to access and use it without authorization.

War driving

____ generally refers to applications and services that use the Web as a platform to deliver rich applications that enable people to collaborate, socialize, and share information online.

Web 2.0

Janet is studying operating systems as part of her Understanding Computers 101 class. After learning about the different types of operating systems, she realizes that she uses a number of them in her daily life. All the computers in Janet's school computer lab have the latest version of Windows installed, which is ____.

Windows 10

Jack has a computer at home that he uses to access the Internet, store and edit personal photos, and create and edit documents. Recently, he has come to realize that in order to keep the computer performing at its best, he needs to carry out regular system maintenance on the computer. Jack can use the ____ program to locate and delete temporary files, such as installation files, Web browsing history, and files in the Recycle Bin.

Windows Disk Cleanup

When computer systems perform in ways that would be considered intelligent if observed in human beings, it is referred to as ____.

artificial intelligence (AI)

A circuit board is a thin board containing ____ and other electronic components.

computer chips

A(n) ____ is a form of protection available to the creator of an original artistic, musical, or literary work, such as a book, movie, software program, song, or painting.

copyright

Jill is starting a fast food delivery company. She has designed a logo and plans to print flyers to advertise her services. Jill plans to publish a book based on her experiences to inspire young entrepreneurs. To help protect her publishing rights, she should register a ____.

copyright

____ is a useful sales and marketing tool to help companies match customers with products they would be likely to purchase.

customer profiling

____ is the act of registering a domain name with the intent to profit from the goodwill of a trademark belonging to someone else.

cybersquatting

Similar to spam, ____ can be annoying, waste people's time, bog down e-mail systems, and clog users' inboxes.

e-mail hoaxes

____ is a conceptual blueprint that defines the structure and operations of an enterprise (a business, organization, government agency, or other entity).

enterprise architecture

____ is a policy where manufacturers are responsible for the entire life cycle of their products and packaging, including recycling.

extended producer responsibility

"Tracking up data" refers to creating a second copy of important files.

false

An external flash memory card reader that connects via an RJ14 port can be used when the destination device doesn't have a built-in reader. t/f

false

Cache memory today is usually external cache. t/f

false

The decode unit coordinates and controls the operations and activities taking place within a CPU core. T/F

false

The main circuit board inside the system unit is called the megaboard.

false

The process of recording data onto a recordable or rewritable optical disc is called tracking. T/F

false

The process of representing data in a form that can be understood by a digital computer is called decimal byte representation. T/F

false

Thunderbolt ports are used to receive wireless transmissions from devices. t/f

false

To help you identify USB 3 ports, they are colored red. T/F

false

With a DVD, the storage medium and the storage device are permanently sealed together to form one piece of hardware called a fixed-media storage system.

false

With rewritable optical media, the laser permanently alters the disc surface. T/F

false

Anything (such as a program, letter, digital photograph, or song) stored on a storage medium is referred to as a(n) ____.

file

An important task that the operating system performs is ____, which keeps track of the files stored on a computer so that they can be retrieved when needed.

file management

Digital still cameras most often use ____ cards for storage.

flash memory

____ have begun to replace ROM for storing system information, such as a computer's BIOS.

flash memory chips

Although both the user and the computer use drive letters, ____ names, and filenames to save and retrieve documents, they perceive them differently.

folder

A GPS receiver measures the distance between the receiver and ____ GPS satellites simultaneously to determine the receiver's exact geographic location.

four

In ____, data can move in both directions at the same time, such as with a telephone.

full-duplex transmission

Mother Goose Computing, Inc. provides computational biology consulting services. They are currently updating several of their systems. For the biochemistry division, Mother Goose is planning to implement the new system first in their New York location. If it works properly, they will extend it to their Boston and Chicago locations. This is called a ____ conversion.

pilot

A ____ is the smallest colorable area on a display device.

pixel

The ____ tries to predict what data and instructions will be needed and retrieves them ahead of time in order to help avoid delays in processing.

prefetch unit

When a proposal for a new system or system modification is submitted, one of the first steps is to conduct a ____.

preliminary investigation

A ____ is an image designed to enhance a presentation (such as an electronic slide show or a printed report) visually, typically to convey information more easily to people.

presentation graphic

Many Web browsers, including Internet Explorer, Edge, Chrome, and Safari, have a(n) ____ option to browse the Web without leaving any history of the sites you visited on the computer you are using.

private browsing

Businesses and many individuals often use office suites, sometimes called ____, to produce written documents.

productivity software suites

Often the storage device and storage medium are two separate pieces of hardware (that is, the storage medium is ____).

removable

The ____ contains a list of technical specifications for equipment, software, and services needed for a new system, as determined during the system design phase, and requests that vendors propose products that meet those specifications.

request for proposal (RFP)

In a printer, the print ____ affects the quality of the printed output.

resolution

One type of mobile phone that is not commonly used is the ____.

satellite phone

Some worms are specifically written to take advantage of newly discovered ____ in operating systems and e-mail programs before the security patch to correct that vulnerability is available.

security holes

The ____ Web is a predicted evolution of the current Web in which all Web content is stored in a manner similar to data in a database so that it can be retrieved easily when needed to fulfill user requests.

semantic

A common RAID technique is disk mirroring, in which data is written to two duplicate drives simultaneously. T/F

true

ASCII is the coding system traditionally used with personal computers. T/F

true

Pipelining increases the number of machine cycles completed per second.

true

To create 3D RAM or flash memory chips, the memory cells are stacked on top of one another in layers. t/f

true

Unlike ASCII and EBCDIC, Unicode is a universal international coding standard designed to represent text-based data written in any ancient or modern language, including those with different alphabets. t/f

true

While the memory used for disk caching can be a designated portion of RAM, today's hard drives typically use a disk cache consisting of memory chips located on a circuit board inside the hard drive case. T/F

true

Phishing schemes may use a technique called ____, which is setting up spoofed Web sites with URLs slightly different from legitimate sites.

typosquatting

Jack is a computer programmer who spends most of the day at his desk. Recently, he visited the doctor to get advice about his persistent eyestrain and aching back. To combat his backache, Jack's doctor correctly advises him to ____

use a footrest

Jack is a computer programmer who spends most of the day at his desk. Recently, he visited the doctor to get advice about his persistent eyestrain and aching back. To combat his eyestrain, Jack's doctor correctly advises him to____.

use a lower screen resolution

An inventory management system that goes beyond just managing inventory to act as a complete distribution system (including inventory, order, shipping, and transportation management among other features) is often referred to as a ____ management system (WMS).

warehouse

A collaborative Web page that is designed to be edited and republished by a variety of individuals is known as a(n) ____.

wiki

Dan is a small business owner who depends on his computer to keep track of customer and sales data. He is investigating storage options because it is critical for him to ensure that his data is safe in the event of a computer failure. A friend of Dan suggests to him that he can use an external hard drive for his data storage and backup needs. To use an external hard drive, Dan should make sure that his computer has an available USB or ____ port.

thunderbolt

The key element of the microprocessor is the ____—a device made of semiconductor material that controls the flow of electrons inside a chip.

transitistor

The JPEG images taken by most digital cameras today use 24-bit ____.

true color images

Dean has been using computers for some time now, but he is unfamiliar with a number of utility programs. In order to better maintain his computer, he decides to ask his coworker Andrea for advice on basic utility programs. Andrea advises Dean to remove unnecessary programs from his computer by using a(n) ____ utility.

uninstall

System software is usually divided into two categories: operating systems and ____ programs.

utility

An external flash memory card reader that connects via an RJ14 port can be used when the destination device doesn't have a built-in reader. T/F

False

Each machine language instruction in a CPU's instruction set is broken down into several smaller, machine-level instructions called supercode. T/F

False

Filename rules are the same in all operating systems. T/F

False

RAM capacity is measured in bits. _________________________

False

The process of recording data onto a recordable or rewritable optical disc is called tracking. T/F

False

In general, the operating system serves as an intermediary between the user and the computer. T/F

True

Open source software are programs made up of source code that is available to the public.

True

Optical zoom specifications reflect how much the camera can zoom without losing image quality. T/F

True

SSDs are becoming the norm for netbooks, mobile devices, and other very portable devices. T/F

True

SSDs are not subject to mechanical failures like magnetic hard drives, and are more resistant to shock and vibration. T/F

True

Speech recognition systems enable the device being used to recognize voice input as spoken words. T/F

True

The data on a(n) read-only disc cannot be erased, changed, or added to because the pits that are molded into the surface of the disc when the disc is produced are permanent. T/F

True

There are many stand-alone utility programs available as an alternative to the operating system's utility programs. T/F

True

There are two primary forms of DOS: PC-DOS and MS-DOS. T/F

True

To retrieve information from a database, queries and reports are used.

True

While the memory used for disk caching can be a designated portion of RAM, today's hard drives typically use a disk cache consisting of memory chips located on a circuit board inside the hard drive case. T/F

True

Rodney owns a computer that he uses to work, keep in touch with friends and family, watch movies, listen to music, and use the Internet. If Rodney wants to record music files onto a CD, he needs to make sure that his operating system has CD-________ capabilities.

burning

A(n)____is a flat, touch sensitive device used in conjunction with a digital pen.

graphics tablet

Conventional CD discs use ____ lasers.

infrared

One type of storage device that is sometimes used with computers for backup purposes and that uses sequential access is a ____.

magnetic tape drive

A ____ typically rests on the desk or other flat surface close to the user's computer, and it is moved across the surface with the user's hand in the appropriate direction to point to and select objects on the screen.

mouse

A computer's ____ is a collection of programs that manage and coordinate the activities taking place within the computer.

operating system

The surface of a hard disk is organized into tracks and pie-shaped groups of_____.

sectors

Lisa is a student who regularly uses the computers at her local Internet café to listen to music, talk to her friends and family through the Internet, and play computer games. Lisa needs to make sure that the computer that she is using has a ____ attached to it for her to be able to hear music and the sounds of a computer game.

speaker

Jack has a computer at home that he uses to access the Internet, store and edit personal photos, and create and edit documents. Recently, he has come to realize that in order to keep the computer performing at its best, he needs to carry out regular system maintenance on the computer. Jack can speed up his computer by scanning it for viruses and _________.

spyware

A ____ is a large screen computer either built into a table or designed to be used on a table that allows multi-touch input from multiple users.

table PC


Related study sets

Sociology quiz 4, chapters 9 and 10

View Set

Marketing: Midterm 1 (Chapters 1, 2, 5, 9, 10, 11, 12, 15, 16)

View Set

chapter 12 & 20 FINAL ( pharmacology , airway clearance technique), Neo CH. 25, Lesson 1-5 Pediatrics Final, Neo CH. 26, practicum 3 exam review, Chapter 26 - Vicky - Fall 16, CHAPTER 10 & 11 FINAL 02 ADMINISTRATION/AERSOL FINAL, Ch. 12, Neo CH. 25,...

View Set

C248 Intermediate Accounting 1, Intermediate Accounting Test 1, Intermediate Accounting 1

View Set

AP Stat AP classroom Unit 1 Part A

View Set

FFPN Module 8 Tax Implications of Financial Decisions

View Set