Computer Concepts Final
In computer terms the EXACT number of bytes in a KILOByte is ___. For your reference this is also called a KibiByte.
1024
Convert the hexadecimal number F to binary.
1111
_______ speed is the measure of the amount of time required by a storage device to retrieve data and programs.
Access
Which of the following is not malware? Trojan horses Viruses Worms Ad-Aware
Ad-Aware
This is a website that provides access to specific mobile apps that can be downloaded either for a nominal fee or free of charge.
App store
central processing unit
CPU
Computer criminals that create and spread viruses are punished under this law.
Computer Fraud and Abuse Act
This is a legal concept that gives content creators the right to control use and distribution of their work.
Copyright
_______ (acronym) uses standard telephone lines to provide high-speed connections.
DSL
According to which law is it illegal for an owner of a commercial program to make backup copies for their personal use and resell or give them away?
Digital Millennium Copyright Act
DVI
Digital video interface
Organizations use the following to allow suppliers and others limited access to their networks. Intranets Extranets Firewalls Proxy servers
Extranets
FERPA
Family Educational Rights and Privacy Act
Which physical connection is the fastest?
Fiber-optic cable
Every computer on the Internet has a unique numeric address called a(n) _______.
IP address
These are specialized graphics programs for editing or modifying digital photographs.
Image editors
IoT
Internet of Things
Which among the following is a fraudulent or deceptive act designed to trick individuals on the Internet into spending time or money for little or no return?
Internet scam
Which of the following is a function of the control unit?
It directs the movement of electronic signals between memory and the arithmetic-logic unit.
Mbps
Megabits per second
This device enables connectivity between two LANS or a LAN and a larger network.
Network gateway
Which of the following types of character recognition systems is used for standardized multiple- choice testing?
OMR
Which of the following characteristics about RAID is incorrect? Expanded storage capability Fast access speed Highly reliable One high-capacity hard disk drive
One high-capacity hard disk drive
_______ is representing some other person's work and ideas as your own without giving credit to the original source.
Plagiarism
RAID
Redundant Array of Independent Disks
This GUI includes tabs, groups, and galleries.
Ribbon
The GPS device in an automobile uses which communication channel?
Satellite
_______ make up the basic structure of a relational database with columns containing field data and rows containing record information.
Tables
A microcomputer that is smaller, lighter, and less powerful than a notebook, and that has a touch sensitive screen, is called a _______.
Tablet
All of the following are true of DVD-ROM drives except: They are also known as erasable optical discs. They can provide over two hours of high-quality video and sound comparable to that found in motion picture theatres. They are a type of optical disc. DVD-ROM stands for "digital versatile disc-read only memory."
They are also known as erasable optical discs.
_____ is an operating system widely used by servers on the web, mainframe computers, and very powerful personal computers.
UNIX
Which of the following can be used to connect several devices to the system unit and are widely used to connect keyboards, mice, printers, storage devices, and a variety of specialty devices? USB port SATA Parallel port Firewire bus
USB port
The _______ provides a multimedia interface to the numerous resources available on the Internet.
Web
WPA2
Wi-Fi protected access 2
WiMax stands for _______.
Worldwide Interoperability for Microwave Access.
ARPANET
advanced research project agency network
This type of software can be described as end user software and is used to accomplish a variety of tasks.
application
ALU
arithmetic-logic unit
The proportional relationship between a display's width and height.
aspect ratio
ADSL
asymmetric digital subscriber line
_______-input devices convert sounds into a form that can be processed by the system unit.
audio
In a wireless LAN, all communications pass through the network's centrally located wireless access point or _______ station.
base
giga
billion
BD
blue-ray disc
Google Chrome is an example of a web _______.
browser
Pathways that support communication among the various electronic components on the system board are called _____.
bus lines
Frequently-accessed information is held in _____.
cache memory
The _______ of a secondary storage device indicates how much data the storage medium can hold.
capacity
CSMA/CD
carrier sense multiple access/collision detection
CSS
cascading style sheets
The actual connecting or transmission medium that carries the message in a communication system is called the communication _______.
channel
Integrated circuits must be mounted on _____, which are then plugged into the system board. slots pins ports chip carriers
chip carriers
Office suites are also known as _______ suites.
cloud
Printers connected to the Internet that provide printing services to others on the Internet are called _______.
cloud printers
CD
compact disc
File _____ programs reduce the size of files so they require less storage space.
compression
_______ ratio indicates a monitor's ability to display colors by comparing the light intensity of the brightest white to the darkest black.
contrast
DBMS
database management system
Creating a website is called web _______.
design
_______ __________ programs allow you to mix text and graphics to create publications of professional quality
desktop publishing
A _______ attack uses software to try thousands of common words sequentially in an attempt to gain unauthorized access to a user's account.
dictionary
DRM
digital rights management
DSL
digital subscriber line
In the URL http://www.simnetonline.com, the underlined section is the _______ name.
domain
DNS
domain name server
DIMM
dual in-line memory module
_______ is the process of coding information to make it unreadable except to those who have a special piece of information known as a key.
encryption
eSTATA
external serial advanced technology attachment
A(n) _______ is a private network that connects more than one organization.
extranet
5 gigabytes is more than 10 terabytes.
false
A bit can represent up to 4 logical situations.
false
A hard crash typically occurs on an optical disc when it makes contact with particles on its surface.
false
A milli second is one millionth of a second.
false
An MICR device senses the presence or absence of a mark, such as a pencil mark.
false
Based on the MAC OS, Android is designed for Apple's iPhone, iPod Touch, and iPad.
false
Because Mac OS X market share is so large, more application programs are developed to run under Mac OS X than any other operating system.
false
Cloud suites are stored on your hard drive and are available anywhere you can access the Internet.
false
External hard disks use different technology than internal hard disks.
false
Facebook is an example of cloud storage.
false
Image editors are used to create and edit vector images.
false
In a peer-to-peer network, only the central host computer supplies the resources, the other computers request resources from this host.
false
Microsoft Word cannot be used to create personalized web pages.
false
Programs such as word processors and spreadsheets are known as utilities.
false
RAM will retain data when the computer is turned off.
false
Running File History improves system performance.
false
Solid-state storage uses rigid metallic platters to store data using the magnetic charges of the disk's surface.
false
System software cannot handle technical details without user intervention.
false
System software is a single program.
false
The CAN-SPAM Act has proven to be more effective than spam blockers at preventing unwanted e-mail
false
The decimal system is base 10 and the binary system is base 1.
false
The process of saving information to a secondary storage device is referred to as embedding.
false
_______ cable transmits data as pulses of light through tiny tubes of glass.
fiber-optic
FiOS
fiber-optic service
FTP
file transfer protocol
A _______ acts as a security buffer between a corporation's private network and all external networks.
firewall
As a security buffer, all electronic communications coming into and leaving a corporation must be evaluated by the _______.
firewall
USB drives are also known as _______ drives.
flash
The prefix that means bigger than a million but smaller than a trillion.
giga
What is the metric term for one billion?
giga
GPS
global positioning device
GUI
graphical user interface
GPU
graphics processing unit
Cloud suites are stored at a _______ on the Internet, rather than on your microcomputer.
hard drive
The hard disk's surface is scratched and some or all of the data is destroyed when there is a _______.
head crash
HIPAA
health insurance portability accountability act
hecto
hundred
centi
hundredth
HTML
hypertext markup language
https
hypertext transfer protocol secure
______ is any data or instructions that are used by a computer.
input
IP
internet protocol
IP address
internet protocol device
IDS
intrusion detection system
Which programming language is used within HTML documents to trigger interactive features?
javascript
Which type of program would likely be used by investigators to record a potential suspects' Internet activities? Cookie Global positioning system Keystroke logger Web bug
keystroke logger
Which is the only one that is out of order from smallest to largest?
kilo mega
This version of UNIX is an open source operating system that is an alternative to Windows.
linux
LAN
local area network
LTE
long term evolution
Optical-_______ recognition is often used to score standardized multiple-choice tests.
mark
MAC
media access control
MAN
metropolitan area network
Which of the following is the smallest unit of measurement . . . micro , milli, or tera?
micro
The most widely used audio-input device is the _______.
microphone
What is the metric term for one thousandth?
milli
mega
million
MFD
multi-functional device
MMS
multimedia messaging system
MIDI
musical instrument digital interface
What is the metric term for one billionth?
nano
NAS
network attached storage
NIC
network interface card
NOS
network operating system
Storage that retains its data after the power is turned off is referred to as _______. volatile storage sequential storage direct storage nonvolatile storage
nonvolatile
Which of the following is true about an internal hard disk? Variable amount of storage Often stores the operating system Portable Slow
often stores the operating system
This type of mouse emits and senses light to detect mouse movement.
optical
OC
optical carrier
OMR
optimal-mark recognition
OLED
organic light-emitting diode
A LAN set up for a household's personal use is called a _______ network.
personal
Two categories of laser printers are _______.
personal and shared
PAN
personal area network
Bar code readers use _______ embedded in them to read bar codes.
photoelectric cells
In an image editor, photographs consist of thousands of dots or _______ that form images.
pixels
PGP
pretty good privacy
All communications between a company's internal networks and the outside world pass through this server.
proxy
RFID
radio-frequency identification
RAM
random access memory
ROM
read only memory
RTOS
real time operating system
A _______ Wi-Fi hotspot imitates a legitimate free Wi-Fi hotspot in order to capture personal information.
rogue
A deceptive act, using the Internet, to trick people into spending their money and time for no gain is called an Internet _______.
scam
A _______ engine is a specialized program that assists you in locating information on the web and the Internet.
search
SFTP
secure file transfer protocol
SSD
solid-state storage
_______ organize, analyze, and graph numeric data such as budgets and financial reports.
spreadsheets
_____ operating systems control a single desktop or laptop computer.
stand-alone
SAN
storage area network
_____ buses connect the CPU to memory on the system board.
system
_____ software consists of operating systems, utilities, device drivers, and language translators
system
What are the two major software types?
system software and application software
deca
ten
deci
tenth
kilo
thousand
milli
thousanth
TLD
top-level domain
TCP/IP
transmission control protocol/ Internet protocol
tera
trillion
pico
trillionth
Free computer games and free screen saver programs are typical carriers of _______.
trojan horses
_______ (2 words) are malicious programs that come into a computer system disguised as something else such as a free computer game or screen saver.
trojan horses
A network gateway can be used to connect the LAN of one office group to the LAN of another office group.
true
A system unit consists of the keyboard and the monitor.
true
A window is a rectangular area that can contain a document, a program, or a message.
true
Another name for a midrange computer is "server."
true
Application software includes general-purpose applications, specialized applications, and mobile apps.
true
Client-based e-mail accounts require a special program called an e-mail client to be installed on your computer.
true
Cloud computing is an example of a social networking site.
true
Cutting and pasting material from a website directly into your own report or paper without giving proper credit to the original source is unethical.
true
External hard drives are used primarily to complement an internal hard disk.
true
Illustration programs are specialized graphics programs for editing bitmap or raster images.
true
In a Ribbon GUI, tabs are used to divide the ribbon into major activity areas.
true
Information systems consist of people, procedures, software, hardware, data, and the Internet.
true
Microsoft Office uses an interface with traditional menus and toolbars.
true
MiniDP ports are an audiovisual port typically used to connect large monitors.
true
Multitouch screens allow for interaction such as rotating graphical objects on the screen with your hand.
true
Presentation graphics software is an excellent tool to communicate a message and to persuade people.
true
Privacy concerns the collection and use of data about individuals.
true
Software is another name for a program or programs.
true
The parts of an information system are: people, procedures, software, hardware, data, and the Internet
true
The purpose of software is to convert data into information.
true
To be an effective and efficient computer user, you need to recognize the role of information technology in your personal and professional life.
true
Web authoring programs are used to create sophisticated commercial websites.
true
What-if analysis is a very powerful and simple tool to test the effects of different assumptions in a spreadsheet.
true
When a single physical computer runs a special program known as virtualization software, it operates as though it were two or more separate and independent computers, known as virtual machines
true
Wikis allow many individuals to edit the site's content.
true
URL
uniform resource locator
UPC
universal product code
USB
universal serial bus
One way to improve the storage capacity of a hard disk is to _______.
use file compression
An external hard disk _______. is heavy is hard to remove cannot be used in addition to an internal hard disk usually connects to a USB or Thunderbolt port
usually connects to a USB or Thunderbolt port
VGA
video graphics adapter
_____ memory uses the hard drive to substitute for RAM.
virtual
VPN
virtual private network
_______ are programs that migrate through networks and operating systems and attach themselves to various other programs and databases.
viruses
WAN
wide area network
One of the most dramatic changes in connectivity and communications in the past few years has been _______. widespread use of mobile devices with wireless Internet connectivity chat rooms satellite uplinks running programs on remote computers
widespread use of mobile devices with wireless Internet connectivity
The most widely used personal computer operating system
windows
Which of the following is not one of the three basic components of cloud computing? client organizations and end-users service providers the Internet wireless connectivity
wireless connectivity
WWAN
wireless wide area network
Term used to describe the number of bits that a CPU can access at one time.
word
To create documents that consist primarily of text, you need this software.
word processor
WiMax
worldwide Interoperability for microwave access