CIT 15 Final Exam Study Guide Chapters 1-13 for Fresno City College Fall 2019: Professor Robert W. Devoe-Peterson
When you purchase a new computer from Apple.com for yourself to use at school, you are using which model of e-commerce?
B2C
The Windows ________ utility returns your computer to the state it was in when it came from the factory.
Backup
Which of the following is not a type of e-commerce business?
C2B
Which of the following is not a type of UTP cable you would use in a wired Ethernet network?
Cat 7B
Data ________ helps to ensure data integrity by maintaining information in only one place.
Centralization
________ uses a dedicated connection between two points with the connection remaining active for the duration of the transmission.
Circuit switching
Translating an algorithm into a programming language is called ________.
Coding
________ results when leisure time and available tools allow us to engage in creative acts.
Cognitive surplus
A(n) ________ check determines whether a required field such as LastName was filled in.
Completeness
To protect a movie, what category of intellectual property would be used?
Copyright
Which of the following is formally defined as any criminal action perpetrated primarily using a computer?
Cybercrime
Which of the following provides a visual representation of the patterns of an algorithm?
Flowchart
High-performance video graphics cards often use ________ memory.
GDDR5
To speed up the display of graphics, a(n) ________ is integrated into most video cards.
GPU
Which operating system interface uses point-and-click technology?
GUI
What is a popular copyleft license used for software?
General Public License (GNU)
Which computer port transmits audio and video without the need for compression?
HDMI
A typical IpV6 address has the following format: XXXX:XXXX:XXXX:XXXX:XXXX:XXXX:XXXX:XXXX. what does each X represent?
Hexadecimal digit
Which of these is not a system of ethics?
Humanism
________ provides high-speed information processing by enabling a new set of instructions to start before the previous set is finished.
Hyper threading
A(n) ________ address is a unique number that identifies a computer, server, or device connected to the Internet.
IP
________ permits two or more people to communicate over the Internet in real time.
Instant messaging
________ property is a product of a person's mind and is usually considered an expression of human creativity.
Intellectual
________ property is work that is the result of someone's creativity and knowledge.
Intellectual
Which of the following organizations research new Internet technologies to improve its capabilities?
Internet Engineering Task Force
Which of the following is not a common network architecture type?
Intraoffice Area Network (IAN)
Which of the following is not true about a computer byte?
It can either be a 1 or a 0.
Which of the following is not true about deep learning?
It is also known as supervised learning.
Which of the following is not true about a recovery drive?
It is critical if your computer crashes.
Which is not a reason someone might risk violating a copyright?
It is hard to prove the copyright in court.
Which of the following is not true about VOIP?
It stands for Voice Over Internet Possibility
Which of the following is not true about 5G wireless technology?
It will use more energy than current standards.
All of the following are terms related to part of the boot process except ________.
JSON
A small Java-based program is called a ________.
Java applet
Which of the following is not used in developing websites?
KML
. Which of the following is not an example of being computer literate?
Knowing how to hire a programmer
________ printers use static electricity, toner, and heat to set an image on a page very quickly.
Laser
Most supercomputers use the ________ operating system.
Linux
The unique number assigned to a network adapter by the manufacturer is referred to as the ________ address.
MAC
________ is an electronics standard that allows different kinds of electronic instruments to communicate with each other and with computers.
MIDI
Which of the following is the smallest unit of measure?
Megabyte
All of the following are examples of database software except ________.
Microsoft Excel
The ________ contains the central electronic components of the computer.
Motherboard
A(n) ________ device facilitates file sharing and data backup.
NAS
What kind of e-book reader does Barnes and Noble sell?
NOOK
Which of the following is not a part of a machine cycle?
Network
Which is not a key factor a programmer uses in selecting the language for a project?
Number of inputs required
LibreOffice is an example of a(n) ________ productivity software package.
Open Source
Apple's macOS and Microsoft Windows are examples of ________ software.
Operating System
Which of the following is not a precaution to take when shopping online?
Pay with a debit card, not a credit card.
In a ________ network, each node connected to the network communicates directly with every other node.
Peer-to-peer
Which of the following activities is carried out by the ALU?
Performs arithmetic calculations
________ software helps you manage e-mail, contacts, calendars, and tasks in the same application.
Personal Information Manager
What is the first step of the system development life cycle (SDLC)?
Problem and Opportunity Identification
Which refers to a text-based approach to documenting an algorithm?
Pseudocode
What is the fastest, most expensive memory in your computer?
RAM
The area that holds all the startup instructions the computer needs to start is ________.
ROM
The basic input/output system (BIOS) is stored on a ________ chip
ROM
________ means that for each value in the foreign key of one table, there is a corresponding value in the primary key of another table.
Referential integrity
________ databases are the most commonly used electronic databases.
Relational
The "fathers of the Internet" are Vinton Cerf and ________.
Robert Kahn
The number of pixels displayed on the screen is known as ________.
Screen Resolution
Which of the following is not a feature of the most popular web browsers?
Social browsing
A(n) ________ enables the computer to drive the speaker system
Sound Card
Which of the following does not influence a CPU's processing power?
Speed of the motherboard
________ software lets you perform calculations and numerical analyses
Spreadsheet
Windows uses a memory-management technique known as ________ to monitor which applications you use most frequently and then preloads them into your system memory.
SuperFetch
________ software helps run the computer and coordinates instructions between other software and the hardware devices.
System
The main suite of protocols used for transmitting data on the Internet is ________.
TCP/IP
A loop decision point for an algorithm consists of three features: an initial value, a set of actions to be performed, and a(n) ________.
Test conditions
Which of the following is the first step in the boot process?
The BIOS is activated.
What does the Digital Living Network Alliance standardize?
The convergence of devices.
Which statement does not describe fifth-generation languages?
They use a set of short, English-based commands (such as ADD) that speak directly to the CPU.
The World Wide Web was based on a protocol developed by ________.
Tim Berners-Lee
________ breaks down a problem into a series of high-level tasks and continues to break each task into successively more detailed subtasks.
Top-down design
What transmission media is used for normal telephone service?
Twisted-pair cable
The unique address for a particular website is the ________.
URL
Which of the following ports is not considered to be exclusively a video port?
USB
________ behavior is not conforming to a set of approved standards of behavior.
Unethical
Which of the following is not a type of cable used in wired networks?
Unshielded coaxial
Which of the following is not a tip for professional e-mail etiquette?
Use abbreviations such as "u," "r," and "BRB" to keep the e-mail message shorter.
A(n) ________ is the portion of virus code that is unique to a particular computer virus.
Virus Signature
Which of the following is an example of an instant messaging service?
When does copyright protection begin?
When a work is created and fixed into a digital or physical form
What is a good rule to follow to avoid plagiarism?
When in doubt, cite your source.
________ hackers break into systems legally for non-malicious reasons such as to test system security vulnerabilities.
White hat
________ describes the website content in terms of the data that is being described rather than how it is to be displayed.
XML
Which of the following is not true about locally installed software?
You need the Internet to run the program.
You can block logical ports from invaders and make your computer virtually invisible to others on the Internet by installing ________.
a firewall
In public-key encryption, the two keys, one for coding and one for decoding, are known as ________.
a key pair
QuickBooks is an example of ________ software.
accounting
Corona and App Inventor can be used to develop ________.
apps for mobile devices
Computer-aided design software is used by ________.
architects and engineers to create virtual models
A(n) ________ is a heavily secured server located between a company's secure internal network and its firewall.
bastion host
CPU ________ are measurements used to compare performance between processors.
benchmarks
Before its final commercial release, a(n) ________ version of software may be offered to certain test sites or to interested users free or at a reduced cost.
beta
In binary language, each letter of the alphabet, each number, and each special symbol is made up of a unique combination of eight ________.
bits
Unwanted or unneeded software included by manufacturers on new computers is called ________.
bloatware
What is the name of the massive public online ledger which records the time and amount of every finalized cryptocurrency transaction?
blockchain
A ________ sends data from one collision domain to another.
bridge
The box formed by the intersection of a row and column in a spreadsheet program is known as a ________.
cell
A client/server network is an example of ________ administration
central
A computer connected to the Internet that asks for data is a(n) ________.
client
Dropbox is an example of ________.
cloud storage
________ is joining together as a group to use a specific product more efficiently.
collaborative consumption
Creating and distributing ________ is one of the most widespread types of cybercrimes.
computer viruses
Catfishing is ________.
creating fake profiles on a dating site and developing a fabricated online and phone relationship
________ tools gather information from sources such as e-mails, text messages, and tweets and make the information instantly and publicly available for use in emergencies.
crisis- mapping
Using the Internet to get small donations from many people to start a business is called ________.
crowdfunding
Data in a multidimensional database is organized in a ________ format
cube
The gap in ease of access to the Internet and technology is known as the ________ divide.
digital
The term ________ refers to the use of a single unifying device that handles media, Internet, entertainment, and phone needs.
digital convergence
A(n) ________ address is a temporary IP address that is assigned from an available pool of IP addresses.
dynamic
Every keystroke and every mouse click creates an action, or ________, in the respective device.
event
Categories of data are called ________.
fields
A(n) ________ server is a server that stores and manages files for network users.
file
When using a spreadsheet, the expression =D8-D17 is called a ________.
formula
When using a spreadsheet, SUM in the expression =SUM(B10:B16), is called a(n) ________.
function
Viruses, adware, and spyware are referred to collectively as ________.
grayware
A(n) ________ backup makes a copy of all changes since the last backup.
incremental
Availability, Integrity, Authentication, Confidentiality, and Nonrepudiation are the five key attributes of ________.
information assurance
A violation of the holder's rights is known as copyright ________.
infringement
The two main categories of home and office printers are ________ and laser printers.
inkjet
Which of the following has the extension associated with a Microsoft Excel file?
inventory.xlsx
Creative Commons licenses are ________.
irrevocable
A packet analyzer is a program that can enable a hacker to do all of the following except ________.
launch a denial of service (DoS) attack on your computer
The most common type of monitor for laptops and desktop computers is a(n) ________.
liquid crystal display (LCD)
Configuring a firewall to ignore all incoming packets that request access to a specific port is known as ________.
logical port blocking
In a Microsoft Access database, something like the Gettysburg Address would be stored in a(n) ________ field.
long text
A ________ is a virus that is attached to documents.
macro virus
Running the Disk Defragmenter utility will ________.
make the hard drive work more efficiently
All of the following are top cybercrimes reported to the IC3 except________.
malware fraud
File ________ provides an organizational structure to the files and folders on your storage device.
management
A network operating system is also known as a(n) ________.
multiuser operating system
A ________ is a group of two or more computers, or nodes, configured to share information and resources.
network
For the nodes on a network to communicate with each other and access the network, each node needs a ________.
network adapter
IPv6 was introduced when IPv4 ________.
no longer had enough unique addresses
Some of the cache memory of a CPU is ________.
on the CPU, itself
The two major types of system software programs are utility programs and the ________.
operating system
Data are sent through a network in bundles called ________.
packets
If a client must wait too long for software that works, he might attempt to add requests for more and more features to be added to the program. This is known as ________.
scope creep
A ________ displays a subset of data from a table (or tables) based on the specified criteria.
select query
A subset of e-commerce that uses social networks to assist in marketing and purchasing products is known as ________ commerce.
social
A(n) ________ is an input device that looks like a pen.
stylus
On a network, a(n) ________ helps prevent data packets from colliding with each other.
switch
Division by zero is a ________ error that is caught when the program executes.
syntax
is an example of an HTML ________.
tag Correct
An application programming interface (API) is ________.
the code the application software uses to take advantage of code written by others
A data ________ is a large-scale collection of data that contains and organizes all of an organization's data in one place.
warehouse Correct
Dreamweaver is an example of ________ software.
web authoring
If you want to access your home network from your distant garage, a ________ might help boost the signal.
wireless range extender
The concept of the Internet was developed by the U.S. Department of Defense as a network that ________ in event of an attack.
would not be disrupted easily
If you are going to attach more than 15 devices to your wireless network, you should make sure your router supports which standard?
802.11ac
Which of the following is not an example of a factor used in multi-factor authentication?
A captcha
Which programming language uses a combination of existing technologies like JavaScript, CSS, and XML?
AJAX
To remove red eye from a digital image, you would use software such as ________.
Adobe Photoshop
The Next Einstein Initiative and the ________ Institute for Mathematical Sciences bring bright young learners and the best lecturers in the world together.
African
Which of the following is not done by modern IDE editors to help the programmer?
Align sections of code appropriately
Which of the following is not true about the concept of copyleft?
All enhancements and additions to copyleft software will cost the user an update or upgrade fee.
Which of the following is an example of a recommendation engine?
Amazon providing you a list of products similar to others you've viewed
Which of the following two operating systems are used most frequently on tablets?
Android and iOS
Which is not one of the four key pieces of personal information you should protect from identity thieves?
Anniversary
MacOS is the operating system developed by ________.
Apple
A(n) ________ is a small program that resides on a server and is designed to be downloaded and run on a client computer.
Applet
Which of the following categories of software do you use directly if you need to write a research paper?
Application
Which of the following is not a type of user interface?
Application programming interface (API)
When checking to see whether a particular name is registered on the Internet, your computer accesses a database that is kept on a(n) ________ server.
DNS
The ________ consists of anonymously hosted websites that are mostly used for illegal activities.
Dark Web
What technology allows retailers to better respond to consumer buying patterns?
Data mining
Adobe InDesign is an example of ________ software.
Desktop Publishing
Which of the following is not a type of a productivity software application?
Disk Defragmentation
Which of the following is not true about rapid application development (RAD)?
Documents are created before the prototype.v
________ is digital textual information that can be stored, manipulated, and transmitted by electronic devices.
E-text
________ is the standard communications protocol used on most client/server networks.
Ethernet
Which of the following would not be used to build websites with interactive capabilities?
FORTRAN
Which of the following is not true about fake news?
Fake news is not used for financial gain.
Which of the following would not be considered a possessed object?
password
Which of the following is not a description of the unique identification number assigned to your computer when you connect to the Internet?
path
Which of the following refers to the encoding of information about the world into formats that artificial intelligence systems can understand?
perception
Individual Internet users connect to ISPs through a(n) ________.
point of presence (POP)
Wireless network devices use ________ to communicate with each other.
radio waves
In a database, the term ________ is synonymous with a category of data.
record
C: denotes a(n) ________ directory that is at the top of the filing structure of a computer.
root
A ________ sends information between two networks.
router
To transfer data packets between two networks, a ________ is used.
router
Most wired home networks use ________ cable, which is most susceptible to interference.
unshielded twisted-pair
The ________ of the operating system enables users to communicate with the computer system.
user interface
Which of the following involves using specialized software to make individual physical servers behave as though they are more than one physical device?
virtualization