Computer Concepts Final

Ace your homework & exams now with Quizwiz!

In computer terms the EXACT number of bytes in a KILOByte is ___. For your reference this is also called a KibiByte.

1024

Convert the hexadecimal number F to binary.

1111

_______ speed is the measure of the amount of time required by a storage device to retrieve data and programs.

Access

Which of the following is not malware? Trojan horses Viruses Worms Ad-Aware

Ad-Aware

This is a website that provides access to specific mobile apps that can be downloaded either for a nominal fee or free of charge.

App store

central processing unit

CPU

Computer criminals that create and spread viruses are punished under this law.

Computer Fraud and Abuse Act

This is a legal concept that gives content creators the right to control use and distribution of their work.

Copyright

_______ (acronym) uses standard telephone lines to provide high-speed connections.

DSL

According to which law is it illegal for an owner of a commercial program to make backup copies for their personal use and resell or give them away?

Digital Millennium Copyright Act

DVI

Digital video interface

Organizations use the following to allow suppliers and others limited access to their networks. Intranets Extranets Firewalls Proxy servers

Extranets

FERPA

Family Educational Rights and Privacy Act

Which physical connection is the fastest?

Fiber-optic cable

Every computer on the Internet has a unique numeric address called a(n) _______.

IP address

These are specialized graphics programs for editing or modifying digital photographs.

Image editors

IoT

Internet of Things

Which among the following is a fraudulent or deceptive act designed to trick individuals on the Internet into spending time or money for little or no return?

Internet scam

Which of the following is a function of the control unit?

It directs the movement of electronic signals between memory and the arithmetic-logic unit.

Mbps

Megabits per second

This device enables connectivity between two LANS or a LAN and a larger network.

Network gateway

Which of the following types of character recognition systems is used for standardized multiple- choice testing?

OMR

Which of the following characteristics about RAID is incorrect? Expanded storage capability Fast access speed Highly reliable One high-capacity hard disk drive

One high-capacity hard disk drive

_______ is representing some other person's work and ideas as your own without giving credit to the original source.

Plagiarism

RAID

Redundant Array of Independent Disks

This GUI includes tabs, groups, and galleries.

Ribbon

The GPS device in an automobile uses which communication channel?

Satellite

_______ make up the basic structure of a relational database with columns containing field data and rows containing record information.

Tables

A microcomputer that is smaller, lighter, and less powerful than a notebook, and that has a touch sensitive screen, is called a _______.

Tablet

All of the following are true of DVD-ROM drives except: They are also known as erasable optical discs. They can provide over two hours of high-quality video and sound comparable to that found in motion picture theatres. They are a type of optical disc. DVD-ROM stands for "digital versatile disc-read only memory."

They are also known as erasable optical discs.

_____ is an operating system widely used by servers on the web, mainframe computers, and very powerful personal computers.

UNIX

Which of the following can be used to connect several devices to the system unit and are widely used to connect keyboards, mice, printers, storage devices, and a variety of specialty devices? USB port SATA Parallel port Firewire bus

USB port

The _______ provides a multimedia interface to the numerous resources available on the Internet.

Web

WPA2

Wi-Fi protected access 2

WiMax stands for _______.

Worldwide Interoperability for Microwave Access.

ARPANET

advanced research project agency network

This type of software can be described as end user software and is used to accomplish a variety of tasks.

application

ALU

arithmetic-logic unit

The proportional relationship between a display's width and height.

aspect ratio

ADSL

asymmetric digital subscriber line

_______-input devices convert sounds into a form that can be processed by the system unit.

audio

In a wireless LAN, all communications pass through the network's centrally located wireless access point or _______ station.

base

giga

billion

BD

blue-ray disc

Google Chrome is an example of a web _______.

browser

Pathways that support communication among the various electronic components on the system board are called _____.

bus lines

Frequently-accessed information is held in _____.

cache memory

The _______ of a secondary storage device indicates how much data the storage medium can hold.

capacity

CSMA/CD

carrier sense multiple access/collision detection

CSS

cascading style sheets

The actual connecting or transmission medium that carries the message in a communication system is called the communication _______.

channel

Integrated circuits must be mounted on _____, which are then plugged into the system board. slots pins ports chip carriers

chip carriers

Office suites are also known as _______ suites.

cloud

Printers connected to the Internet that provide printing services to others on the Internet are called _______.

cloud printers

CD

compact disc

File _____ programs reduce the size of files so they require less storage space.

compression

_______ ratio indicates a monitor's ability to display colors by comparing the light intensity of the brightest white to the darkest black.

contrast

DBMS

database management system

Creating a website is called web _______.

design

_______ __________ programs allow you to mix text and graphics to create publications of professional quality

desktop publishing

A _______ attack uses software to try thousands of common words sequentially in an attempt to gain unauthorized access to a user's account.

dictionary

DRM

digital rights management

DSL

digital subscriber line

In the URL http://www.simnetonline.com, the underlined section is the _______ name.

domain

DNS

domain name server

DIMM

dual in-line memory module

_______ is the process of coding information to make it unreadable except to those who have a special piece of information known as a key.

encryption

eSTATA

external serial advanced technology attachment

A(n) _______ is a private network that connects more than one organization.

extranet

5 gigabytes is more than 10 terabytes.

false

A bit can represent up to 4 logical situations.

false

A hard crash typically occurs on an optical disc when it makes contact with particles on its surface.

false

A milli second is one millionth of a second.

false

An MICR device senses the presence or absence of a mark, such as a pencil mark.

false

Based on the MAC OS, Android is designed for Apple's iPhone, iPod Touch, and iPad.

false

Because Mac OS X market share is so large, more application programs are developed to run under Mac OS X than any other operating system.

false

Cloud suites are stored on your hard drive and are available anywhere you can access the Internet.

false

External hard disks use different technology than internal hard disks.

false

Facebook is an example of cloud storage.

false

Image editors are used to create and edit vector images.

false

In a peer-to-peer network, only the central host computer supplies the resources, the other computers request resources from this host.

false

Microsoft Word cannot be used to create personalized web pages.

false

Programs such as word processors and spreadsheets are known as utilities.

false

RAM will retain data when the computer is turned off.

false

Running File History improves system performance.

false

Solid-state storage uses rigid metallic platters to store data using the magnetic charges of the disk's surface.

false

System software cannot handle technical details without user intervention.

false

System software is a single program.

false

The CAN-SPAM Act has proven to be more effective than spam blockers at preventing unwanted e-mail

false

The decimal system is base 10 and the binary system is base 1.

false

The process of saving information to a secondary storage device is referred to as embedding.

false

_______ cable transmits data as pulses of light through tiny tubes of glass.

fiber-optic

FiOS

fiber-optic service

FTP

file transfer protocol

A _______ acts as a security buffer between a corporation's private network and all external networks.

firewall

As a security buffer, all electronic communications coming into and leaving a corporation must be evaluated by the _______.

firewall

USB drives are also known as _______ drives.

flash

The prefix that means bigger than a million but smaller than a trillion.

giga

What is the metric term for one billion?

giga

GPS

global positioning device

GUI

graphical user interface

GPU

graphics processing unit

Cloud suites are stored at a _______ on the Internet, rather than on your microcomputer.

hard drive

The hard disk's surface is scratched and some or all of the data is destroyed when there is a _______.

head crash

HIPAA

health insurance portability accountability act

hecto

hundred

centi

hundredth

HTML

hypertext markup language

https

hypertext transfer protocol secure

______ is any data or instructions that are used by a computer.

input

IP

internet protocol

IP address

internet protocol device

IDS

intrusion detection system

Which programming language is used within HTML documents to trigger interactive features?

javascript

Which type of program would likely be used by investigators to record a potential suspects' Internet activities? Cookie Global positioning system Keystroke logger Web bug

keystroke logger

Which is the only one that is out of order from smallest to largest?

kilo mega

This version of UNIX is an open source operating system that is an alternative to Windows.

linux

LAN

local area network

LTE

long term evolution

Optical-_______ recognition is often used to score standardized multiple-choice tests.

mark

MAC

media access control

MAN

metropolitan area network

Which of the following is the smallest unit of measurement . . . micro , milli, or tera?

micro

The most widely used audio-input device is the _______.

microphone

What is the metric term for one thousandth?

milli

mega

million

MFD

multi-functional device

MMS

multimedia messaging system

MIDI

musical instrument digital interface

What is the metric term for one billionth?

nano

NAS

network attached storage

NIC

network interface card

NOS

network operating system

Storage that retains its data after the power is turned off is referred to as _______. volatile storage sequential storage direct storage nonvolatile storage

nonvolatile

Which of the following is true about an internal hard disk? Variable amount of storage Often stores the operating system Portable Slow

often stores the operating system

This type of mouse emits and senses light to detect mouse movement.

optical

OC

optical carrier

OMR

optimal-mark recognition

OLED

organic light-emitting diode

A LAN set up for a household's personal use is called a _______ network.

personal

Two categories of laser printers are _______.

personal and shared

PAN

personal area network

Bar code readers use _______ embedded in them to read bar codes.

photoelectric cells

In an image editor, photographs consist of thousands of dots or _______ that form images.

pixels

PGP

pretty good privacy

All communications between a company's internal networks and the outside world pass through this server.

proxy

RFID

radio-frequency identification

RAM

random access memory

ROM

read only memory

RTOS

real time operating system

A _______ Wi-Fi hotspot imitates a legitimate free Wi-Fi hotspot in order to capture personal information.

rogue

A deceptive act, using the Internet, to trick people into spending their money and time for no gain is called an Internet _______.

scam

A _______ engine is a specialized program that assists you in locating information on the web and the Internet.

search

SFTP

secure file transfer protocol

SSD

solid-state storage

_______ organize, analyze, and graph numeric data such as budgets and financial reports.

spreadsheets

_____ operating systems control a single desktop or laptop computer.

stand-alone

SAN

storage area network

_____ buses connect the CPU to memory on the system board.

system

_____ software consists of operating systems, utilities, device drivers, and language translators

system

What are the two major software types?

system software and application software

deca

ten

deci

tenth

kilo

thousand

milli

thousanth

TLD

top-level domain

TCP/IP

transmission control protocol/ Internet protocol

tera

trillion

pico

trillionth

Free computer games and free screen saver programs are typical carriers of _______.

trojan horses

_______ (2 words) are malicious programs that come into a computer system disguised as something else such as a free computer game or screen saver.

trojan horses

A network gateway can be used to connect the LAN of one office group to the LAN of another office group.

true

A system unit consists of the keyboard and the monitor.

true

A window is a rectangular area that can contain a document, a program, or a message.

true

Another name for a midrange computer is "server."

true

Application software includes general-purpose applications, specialized applications, and mobile apps.

true

Client-based e-mail accounts require a special program called an e-mail client to be installed on your computer.

true

Cloud computing is an example of a social networking site.

true

Cutting and pasting material from a website directly into your own report or paper without giving proper credit to the original source is unethical.

true

External hard drives are used primarily to complement an internal hard disk.

true

Illustration programs are specialized graphics programs for editing bitmap or raster images.

true

In a Ribbon GUI, tabs are used to divide the ribbon into major activity areas.

true

Information systems consist of people, procedures, software, hardware, data, and the Internet.

true

Microsoft Office uses an interface with traditional menus and toolbars.

true

MiniDP ports are an audiovisual port typically used to connect large monitors.

true

Multitouch screens allow for interaction such as rotating graphical objects on the screen with your hand.

true

Presentation graphics software is an excellent tool to communicate a message and to persuade people.

true

Privacy concerns the collection and use of data about individuals.

true

Software is another name for a program or programs.

true

The parts of an information system are: people, procedures, software, hardware, data, and the Internet

true

The purpose of software is to convert data into information.

true

To be an effective and efficient computer user, you need to recognize the role of information technology in your personal and professional life.

true

Web authoring programs are used to create sophisticated commercial websites.

true

What-if analysis is a very powerful and simple tool to test the effects of different assumptions in a spreadsheet.

true

When a single physical computer runs a special program known as virtualization software, it operates as though it were two or more separate and independent computers, known as virtual machines

true

Wikis allow many individuals to edit the site's content.

true

URL

uniform resource locator

UPC

universal product code

USB

universal serial bus

One way to improve the storage capacity of a hard disk is to _______.

use file compression

An external hard disk _______. is heavy is hard to remove cannot be used in addition to an internal hard disk usually connects to a USB or Thunderbolt port

usually connects to a USB or Thunderbolt port

VGA

video graphics adapter

_____ memory uses the hard drive to substitute for RAM.

virtual

VPN

virtual private network

_______ are programs that migrate through networks and operating systems and attach themselves to various other programs and databases.

viruses

WAN

wide area network

One of the most dramatic changes in connectivity and communications in the past few years has been _______. widespread use of mobile devices with wireless Internet connectivity chat rooms satellite uplinks running programs on remote computers

widespread use of mobile devices with wireless Internet connectivity

The most widely used personal computer operating system

windows

Which of the following is not one of the three basic components of cloud computing? client organizations and end-users service providers the Internet wireless connectivity

wireless connectivity

WWAN

wireless wide area network

Term used to describe the number of bits that a CPU can access at one time.

word

To create documents that consist primarily of text, you need this software.

word processor

WiMax

worldwide Interoperability for microwave access


Related study sets

fathers and doctors of the church

View Set

Penny: Chapter 14 Superficial Structures

View Set

AP Micro: Supply and Demand Review

View Set

FINA 456 Risk Management and Insurance Ch.4-6

View Set

Explain how the United States sought to stop the spread of communism through the Berlin Airlift, the Korean War, and the North Atlantic Treaty Organization.

View Set

Ap biology- cell membrane and cell communication for exam 3 so I actually pass this time

View Set

Accounting 205 3T Exam 1 Study Set

View Set

Algebra 2B: Review of quadratic Functions and Equations

View Set

Biology - Exam 1 questions and answers

View Set

GEN BUS 310 - Modules 1-4 PRACTICE EXAMS

View Set