CIT 15 Final Exam Study Guide Chapters 1-13 for Fresno City College Fall 2019: Professor Robert W. Devoe-Peterson

Ace your homework & exams now with Quizwiz!

When you purchase a new computer from Apple.com for yourself to use at school, you are using which model of e-commerce?

B2C

The Windows ________ utility returns your computer to the state it was in when it came from the factory.

Backup

Which of the following is not a type of e-commerce business?

C2B

Which of the following is not a type of UTP cable you would use in a wired Ethernet network?

Cat 7B

Data ________ helps to ensure data integrity by maintaining information in only one place.

Centralization

________ uses a dedicated connection between two points with the connection remaining active for the duration of the transmission.

Circuit switching

Translating an algorithm into a programming language is called ________.

Coding

________ results when leisure time and available tools allow us to engage in creative acts.

Cognitive surplus

A(n) ________ check determines whether a required field such as LastName was filled in.

Completeness

To protect a movie, what category of intellectual property would be used?

Copyright

Which of the following is formally defined as any criminal action perpetrated primarily using a computer?

Cybercrime

Which of the following provides a visual representation of the patterns of an algorithm?

Flowchart

High-performance video graphics cards often use ________ memory.

GDDR5

To speed up the display of graphics, a(n) ________ is integrated into most video cards.

GPU

Which operating system interface uses point-and-click technology?

GUI

What is a popular copyleft license used for software?

General Public License (GNU)

Which computer port transmits audio and video without the need for compression?

HDMI

A typical IpV6 address has the following format: XXXX:XXXX:XXXX:XXXX:XXXX:XXXX:XXXX:XXXX. what does each X represent?

Hexadecimal digit

Which of these is not a system of ethics?

Humanism

________ provides high-speed information processing by enabling a new set of instructions to start before the previous set is finished.

Hyper threading

A(n) ________ address is a unique number that identifies a computer, server, or device connected to the Internet.

IP

________ permits two or more people to communicate over the Internet in real time.

Instant messaging

________ property is a product of a person's mind and is usually considered an expression of human creativity.

Intellectual

________ property is work that is the result of someone's creativity and knowledge.

Intellectual

Which of the following organizations research new Internet technologies to improve its capabilities?

Internet Engineering Task Force

Which of the following is not a common network architecture type?

Intraoffice Area Network (IAN)

Which of the following is not true about a computer byte?

It can either be a 1 or a 0.

Which of the following is not true about deep learning?

It is also known as supervised learning.

Which of the following is not true about a recovery drive?

It is critical if your computer crashes.

Which is not a reason someone might risk violating a copyright?

It is hard to prove the copyright in court.

Which of the following is not true about VOIP?

It stands for Voice Over Internet Possibility

Which of the following is not true about 5G wireless technology?

It will use more energy than current standards.

All of the following are terms related to part of the boot process except ________.

JSON

A small Java-based program is called a ________.

Java applet

Which of the following is not used in developing websites?

KML

. Which of the following is not an example of being computer literate?

Knowing how to hire a programmer

________ printers use static electricity, toner, and heat to set an image on a page very quickly.

Laser

Most supercomputers use the ________ operating system.

Linux

The unique number assigned to a network adapter by the manufacturer is referred to as the ________ address.

MAC

________ is an electronics standard that allows different kinds of electronic instruments to communicate with each other and with computers.

MIDI

Which of the following is the smallest unit of measure?

Megabyte

All of the following are examples of database software except ________.

Microsoft Excel

The ________ contains the central electronic components of the computer.

Motherboard

A(n) ________ device facilitates file sharing and data backup.

NAS

What kind of e-book reader does Barnes and Noble sell?

NOOK

Which of the following is not a part of a machine cycle?

Network

Which is not a key factor a programmer uses in selecting the language for a project?

Number of inputs required

LibreOffice is an example of a(n) ________ productivity software package.

Open Source

Apple's macOS and Microsoft Windows are examples of ________ software.

Operating System

Which of the following is not a precaution to take when shopping online?

Pay with a debit card, not a credit card.

In a ________ network, each node connected to the network communicates directly with every other node.

Peer-to-peer

Which of the following activities is carried out by the ALU?

Performs arithmetic calculations

________ software helps you manage e-mail, contacts, calendars, and tasks in the same application.

Personal Information Manager

What is the first step of the system development life cycle (SDLC)?

Problem and Opportunity Identification

Which refers to a text-based approach to documenting an algorithm?

Pseudocode

What is the fastest, most expensive memory in your computer?

RAM

The area that holds all the startup instructions the computer needs to start is ________.

ROM

The basic input/output system (BIOS) is stored on a ________ chip

ROM

________ means that for each value in the foreign key of one table, there is a corresponding value in the primary key of another table.

Referential integrity

________ databases are the most commonly used electronic databases.

Relational

The "fathers of the Internet" are Vinton Cerf and ________.

Robert Kahn

The number of pixels displayed on the screen is known as ________.

Screen Resolution

Which of the following is not a feature of the most popular web browsers?

Social browsing

A(n) ________ enables the computer to drive the speaker system

Sound Card

Which of the following does not influence a CPU's processing power?

Speed of the motherboard

________ software lets you perform calculations and numerical analyses

Spreadsheet

Windows uses a memory-management technique known as ________ to monitor which applications you use most frequently and then preloads them into your system memory.

SuperFetch

________ software helps run the computer and coordinates instructions between other software and the hardware devices.

System

The main suite of protocols used for transmitting data on the Internet is ________.

TCP/IP

A loop decision point for an algorithm consists of three features: an initial value, a set of actions to be performed, and a(n) ________.

Test conditions

Which of the following is the first step in the boot process?

The BIOS is activated.

What does the Digital Living Network Alliance standardize?

The convergence of devices.

Which statement does not describe fifth-generation languages?

They use a set of short, English-based commands (such as ADD) that speak directly to the CPU.

The World Wide Web was based on a protocol developed by ________.

Tim Berners-Lee

________ breaks down a problem into a series of high-level tasks and continues to break each task into successively more detailed subtasks.

Top-down design

What transmission media is used for normal telephone service?

Twisted-pair cable

The unique address for a particular website is the ________.

URL

Which of the following ports is not considered to be exclusively a video port?

USB

________ behavior is not conforming to a set of approved standards of behavior.

Unethical

Which of the following is not a type of cable used in wired networks?

Unshielded coaxial

Which of the following is not a tip for professional e-mail etiquette?

Use abbreviations such as "u," "r," and "BRB" to keep the e-mail message shorter.

A(n) ________ is the portion of virus code that is unique to a particular computer virus.

Virus Signature

Which of the following is an example of an instant messaging service?

WhatsApp

When does copyright protection begin?

When a work is created and fixed into a digital or physical form

What is a good rule to follow to avoid plagiarism?

When in doubt, cite your source.

________ hackers break into systems legally for non-malicious reasons such as to test system security vulnerabilities.

White hat

________ describes the website content in terms of the data that is being described rather than how it is to be displayed.

XML

Which of the following is not true about locally installed software?

You need the Internet to run the program.

You can block logical ports from invaders and make your computer virtually invisible to others on the Internet by installing ________.

a firewall

In public-key encryption, the two keys, one for coding and one for decoding, are known as ________.

a key pair

QuickBooks is an example of ________ software.

accounting

Corona and App Inventor can be used to develop ________.

apps for mobile devices

Computer-aided design software is used by ________.

architects and engineers to create virtual models

A(n) ________ is a heavily secured server located between a company's secure internal network and its firewall.

bastion host

CPU ________ are measurements used to compare performance between processors.

benchmarks

Before its final commercial release, a(n) ________ version of software may be offered to certain test sites or to interested users free or at a reduced cost.

beta

In binary language, each letter of the alphabet, each number, and each special symbol is made up of a unique combination of eight ________.

bits

Unwanted or unneeded software included by manufacturers on new computers is called ________.

bloatware

What is the name of the massive public online ledger which records the time and amount of every finalized cryptocurrency transaction?

blockchain

A ________ sends data from one collision domain to another.

bridge

The box formed by the intersection of a row and column in a spreadsheet program is known as a ________.

cell

A client/server network is an example of ________ administration

central

A computer connected to the Internet that asks for data is a(n) ________.

client

Dropbox is an example of ________.

cloud storage

________ is joining together as a group to use a specific product more efficiently.

collaborative consumption

Creating and distributing ________ is one of the most widespread types of cybercrimes.

computer viruses

Catfishing is ________.

creating fake profiles on a dating site and developing a fabricated online and phone relationship

________ tools gather information from sources such as e-mails, text messages, and tweets and make the information instantly and publicly available for use in emergencies.

crisis- mapping

Using the Internet to get small donations from many people to start a business is called ________.

crowdfunding

Data in a multidimensional database is organized in a ________ format

cube

The gap in ease of access to the Internet and technology is known as the ________ divide.

digital

The term ________ refers to the use of a single unifying device that handles media, Internet, entertainment, and phone needs.

digital convergence

A(n) ________ address is a temporary IP address that is assigned from an available pool of IP addresses.

dynamic

Every keystroke and every mouse click creates an action, or ________, in the respective device.

event

Categories of data are called ________.

fields

A(n) ________ server is a server that stores and manages files for network users.

file

When using a spreadsheet, the expression =D8-D17 is called a ________.

formula

When using a spreadsheet, SUM in the expression =SUM(B10:B16), is called a(n) ________.

function

Viruses, adware, and spyware are referred to collectively as ________.

grayware

A(n) ________ backup makes a copy of all changes since the last backup.

incremental

Availability, Integrity, Authentication, Confidentiality, and Nonrepudiation are the five key attributes of ________.

information assurance

A violation of the holder's rights is known as copyright ________.

infringement

The two main categories of home and office printers are ________ and laser printers.

inkjet

Which of the following has the extension associated with a Microsoft Excel file?

inventory.xlsx

Creative Commons licenses are ________.

irrevocable

A packet analyzer is a program that can enable a hacker to do all of the following except ________.

launch a denial of service (DoS) attack on your computer

The most common type of monitor for laptops and desktop computers is a(n) ________.

liquid crystal display (LCD)

Configuring a firewall to ignore all incoming packets that request access to a specific port is known as ________.

logical port blocking

In a Microsoft Access database, something like the Gettysburg Address would be stored in a(n) ________ field.

long text

A ________ is a virus that is attached to documents.

macro virus

Running the Disk Defragmenter utility will ________.

make the hard drive work more efficiently

All of the following are top cybercrimes reported to the IC3 except________.

malware fraud

File ________ provides an organizational structure to the files and folders on your storage device.

management

A network operating system is also known as a(n) ________.

multiuser operating system

A ________ is a group of two or more computers, or nodes, configured to share information and resources.

network

For the nodes on a network to communicate with each other and access the network, each node needs a ________.

network adapter

IPv6 was introduced when IPv4 ________.

no longer had enough unique addresses

Some of the cache memory of a CPU is ________.

on the CPU, itself

The two major types of system software programs are utility programs and the ________.

operating system

Data are sent through a network in bundles called ________.

packets

If a client must wait too long for software that works, he might attempt to add requests for more and more features to be added to the program. This is known as ________.

scope creep

A ________ displays a subset of data from a table (or tables) based on the specified criteria.

select query

A subset of e-commerce that uses social networks to assist in marketing and purchasing products is known as ________ commerce.

social

A(n) ________ is an input device that looks like a pen.

stylus

On a network, a(n) ________ helps prevent data packets from colliding with each other.

switch

Division by zero is a ________ error that is caught when the program executes.

syntax

is an example of an HTML ________.

tag Correct

An application programming interface (API) is ________.

the code the application software uses to take advantage of code written by others

A data ________ is a large-scale collection of data that contains and organizes all of an organization's data in one place.

warehouse Correct

Dreamweaver is an example of ________ software.

web authoring

If you want to access your home network from your distant garage, a ________ might help boost the signal.

wireless range extender

The concept of the Internet was developed by the U.S. Department of Defense as a network that ________ in event of an attack.

would not be disrupted easily

If you are going to attach more than 15 devices to your wireless network, you should make sure your router supports which standard?

802.11ac

Which of the following is not an example of a factor used in multi-factor authentication?

A captcha

Which programming language uses a combination of existing technologies like JavaScript, CSS, and XML?

AJAX

To remove red eye from a digital image, you would use software such as ________.

Adobe Photoshop

The Next Einstein Initiative and the ________ Institute for Mathematical Sciences bring bright young learners and the best lecturers in the world together.

African

Which of the following is not done by modern IDE editors to help the programmer?

Align sections of code appropriately

Which of the following is not true about the concept of copyleft?

All enhancements and additions to copyleft software will cost the user an update or upgrade fee.

Which of the following is an example of a recommendation engine?

Amazon providing you a list of products similar to others you've viewed

Which of the following two operating systems are used most frequently on tablets?

Android and iOS

Which is not one of the four key pieces of personal information you should protect from identity thieves?

Anniversary

MacOS is the operating system developed by ________.

Apple

A(n) ________ is a small program that resides on a server and is designed to be downloaded and run on a client computer.

Applet

Which of the following categories of software do you use directly if you need to write a research paper?

Application

Which of the following is not a type of user interface?

Application programming interface (API)

When checking to see whether a particular name is registered on the Internet, your computer accesses a database that is kept on a(n) ________ server.

DNS

The ________ consists of anonymously hosted websites that are mostly used for illegal activities.

Dark Web

What technology allows retailers to better respond to consumer buying patterns?

Data mining

Adobe InDesign is an example of ________ software.

Desktop Publishing

Which of the following is not a type of a productivity software application?

Disk Defragmentation

Which of the following is not true about rapid application development (RAD)?

Documents are created before the prototype.v

________ is digital textual information that can be stored, manipulated, and transmitted by electronic devices.

E-text

________ is the standard communications protocol used on most client/server networks.

Ethernet

Which of the following would not be used to build websites with interactive capabilities?

FORTRAN

Which of the following is not true about fake news?

Fake news is not used for financial gain.

Which of the following would not be considered a possessed object?

password

Which of the following is not a description of the unique identification number assigned to your computer when you connect to the Internet?

path

Which of the following refers to the encoding of information about the world into formats that artificial intelligence systems can understand?

perception

Individual Internet users connect to ISPs through a(n) ________.

point of presence (POP)

Wireless network devices use ________ to communicate with each other.

radio waves

In a database, the term ________ is synonymous with a category of data.

record

C: denotes a(n) ________ directory that is at the top of the filing structure of a computer.

root

A ________ sends information between two networks.

router

To transfer data packets between two networks, a ________ is used.

router

Most wired home networks use ________ cable, which is most susceptible to interference.

unshielded twisted-pair

The ________ of the operating system enables users to communicate with the computer system.

user interface

Which of the following involves using specialized software to make individual physical servers behave as though they are more than one physical device?

virtualization


Related study sets

Fundamental Questions (250 question practice)

View Set

Ch. 15 Portfolio Management and Investment Risk

View Set

Psych Statistics Exam 1 // CH. 3

View Set

Code HS Digital Information Study Guide

View Set

government test review (Ch. 5-8)

View Set