Computer Concepts Final Review

Ace your homework & exams now with Quizwiz!

Diagonal

A CRT monitor's viewable size is the _____ measurement of the actual viewing area provided by the screen in the monitor.

PERT chart

A _____ analyzes the time required to complete a task and identifies the minimum time required for an entire project.

magnetic stripe

A _____ card is a credit card, entertainment card, bank card, or other similar card, with a stripe that contains information identifying you and the card.

Gadget

A _____ is a mini-program with minimal functionality that connects to another program or provides information.

Rootkit

A _____ is a program that hides in a computer and allows someone from a remote location to take full control of the computer.

photo sharing community

A _____ is a specific type of social networking web site that allows users to create an online photo album and store and share their digital photos.

mashup

A _____ is a web application that combines services from two or more sources, creating a new application.

Microblog

A _____ is a website that allows users to post short text updates, usually between 100 and 200 characters.

denial of service attack

A _____ is an assault whose purpose is to disrupt computer access to an internet service such as the web or e-mail.

Podcast

A _____ is recorded audio stored on a web site that can be downloaded to a computer or portable media player.

reduces cost of maintenance and increases

A centralized approach to information systems usually _____ manageability.

provides for storage and management of a company's documents

A document management system _____.

RAID

A group of two or more integrated hard disks is called a _____.

Registers

A processor contains small, high-speed storage locations, called _____, that temporarily hold data and instructions.

determines whether a number is within a specified range

A range check _____.

selective backup

A(n) _____ allows a user to choose specific files to backup, regardless of whether or not the files have changed.

ergonomic keyboard

A(n) _____ has a design that reduces the change of wrist and hang injuries.

front side bus

A(n) _____ is a part of the mother-board and connects the processor to main memory.

phishing filter

A(n) _____ is a program that warns or blocks you from potentially fraudulent or suspicious web sites.

encryption key

A(n) _____ is a programmed formula that the originator of the data uses to encrypt the plaintext and the recipient of the data uses to decrypt the ciphertext.

Thumbnail

A(n) _____ is a small version of a larger graphic.

interactive whiteboard

A(n) _____ is a touch-sensitive device, resembling a dry-erase board, that displays the image on a connected computer screen.

optical disk

A(n) _____ is a type of storage media that consist of a flat, round, portable disc made of metal, plastic, and lacquer that is written and read by a laser.

port replicator

A(n) _____ is an external device that provides connections to peripherals through ports built into the device.

legacy system

A(n) _____ is an information system that has existed within the organization for an extended length of time and is relied upon heavily.

newsgroup/message board

A(n) _____ is an online area where users have written discussions.

decision table

A(n) _____ lists a variety of conditions and the actions that correspond to each condition.

Instant

A(n) _____ message is a real-time internet communication, where you exchange messages with other connected users.

Acceptance

A(n) _____ test is performed by end-users and checks the new system to ensure that it works with actual data.

docking station

A(n) _____, which is an external device that attaches to a mobile computer or device, contains a power connection and provides connection to peripherals; it usually also includes slots for memory cards, optical disc drives, and other devices.

less complexity

All of the following are strengths of the database, except _____.

put the most important terms last

All of the following techniques can be used to improve web searches except _____.

graphics tablet

Architects, mapmakers, designers, artists, and home users create drawings and sketches on a _____.

social engineering

As related to the use of computers, _____ is defined as gaining unauthorized access or obtaining confidential information by taking advantage of the trusting human nature of some victims and the naivety of others.

Periods

As with an IP address, the components of a domain name are separated by _____.

data dictionary

Because the _____ contains details about data, some call it metadata (meta means more comprehensive).

computers and their uses

Computer literacy, also known as digital literacy, involves having a current knowledge and understanding of _____.

contiguous sectors, which speeds

Defragmenting reorganizes the files on a disk so that they are located in _____ access time.

mandated by management or some other governing body

During the planning phase the projects that receive the highest priority are those _____.

fibre channel

Enterprises often use _____ technology to connect ot storage systems at data rates up to Gbps.

letters, reports, and e-mail messages

Examples of output that primarily contain text-based documents are _____.

project request

In larger organizations, users write a formal request for a new or modified information system, which is called a _____.

composite key

In some tables, the primary key consists of multiple fields, called a _____.

dots per inch (dpi)

Ink-jet printer resolution is measured by the number of _____ a printer can print.

rootkits, worms, and back doors

Malware is a term that can be used to describe _____.

enterprise computing

Many large companies use the word(s), _____ to refer to the huge network of computers that meets their diverse computing needs.

principle of least privilege

Many organizations adopt the _____ policy, where users access privileges are limited to the lowest level necessary to perform required tasks.

tape library

On larger computers, tape cartridges are mounted in a separate cabinet called a(n) _____.

hardware theft

Physical access controls, such as locked doors and windows, usually are adequate to protect against _____.

radio signals

RFID is a technology that uses _____ to communicate with a tag placed in or attached to an object, an animal, or a person.

Firmware

ROM chips, called _____, contain permanently written data, instructions, or information.

power usage effectiveness (PUE)

Some organizations continually review their _____, which is a ratio that measures how much power enters the computer facility, or data center, against the amount of power required to run the computers.

predictive text input

Some phones use _____, where you press one key on the keypad for each letter in a word and software on the phone predicts the word you want.

massive parallel processing

Supercomputers use _____ for applications such as artificial intelligence and weather forecasting.

CMOS

The ____ chip, which uses battery power, stores configuration information about the computer.

display port

The _____ is an alternative to DVI that also supports HDMI.

control unit

The _____ is the component of the processor that directs and coordinates most of the operations in the computer.

decides on the proper placement of fields

The database analyst (DA) _____.

if the multifunctional peripheral breaks down, all functions are lost

The primary disadvantage of multifunctional peripherals is that _____.

central processing unit (CPU)

The processor also is called the _____.

system proposal

The purpose of the _____ is to access the feasibility of each alternative solution and then recommend the most feasible solution for the project.

VPN tunnel

The secure connection created between user's computer and a company's network is called a(n) _____.

multi-touch

Touch screens that recognize multiple points of contact at the same time are known as _____.

longitudinal recording

Traditionally, hard disks stored data using _____, which aligned the magnetic particles horizontally around the surface of the disk.

save time by storing large files instantaneously, allow others to access their files, and store offsite backups of data

Users subscribe to a cloud storage service to _____.

quality control software

Using statistical analysis, _____ can identify and predict product defects and problems with the company's processes.

a web conference

When an online meeting takes place on the web, it is called _____.

Index

When you enter search criteria, instead of looking through every file and folder on the storage medium, the search utility looks through the _____ first to find a match.

windows readyboost

Windows users can increase the size of memory through _____, which can allocate available storage space on removable flash memory devices as additional memory cache.

gesture recognition

With _____, the computer will detect human motions.

visual voicemail

With _____, users can view message details such as the length of calls and, in some cases, read message contents instead of listening to them.

photo management software

With _____, you can view, organize, sort, catalog, print, and share digital photos.

a neutral network

____ is a system that attempts to initiate the behavior of the human brain.

project management software

_____ allows a user to plan, schedule, track, and analyze the events, resources, and costs of a project.

music production software

_____ allows users to record, compose, mix, and edit music and sounds.

hubs and switches

_____ are devices that provide a common central connection point for nodes on the network.

SMBs

_____ are smaller in size than enterprises and typically do not have an international presence.

Hypermedia

_____ combines text-based links with graphics, audio, and video links.

coaxial cable

_____ consist of a single copper wire surrounded by at least three layers.

system software

_____ consists of the programs that control or maintain the operations of the computer and its devices.

personal DTP software

_____ helps home and small business users create newsletters, brochures, advertisements, postcards, greeting cards, letterhead, business cards, banners, calendars, logos, and web pages.

business intelligence

_____ includes several types of applications and technologies for acquiring, storing, analyzing, and providing access to information to help users make more sound business decisions.

Timely

_____ information has an age suited to its use.

digital forensics

_____ involves the examination of computer media, programs, data, and log files on computers, serves, and networks.

a software suite

_____ is a collection of individual programs available together as a unit.

Adware

_____ is a program that displays an online advertisement in a banner or pop-up window on webpages, email, or other internet services.

mobile TV

_____ is a service that provides television programs over the cellular network.

RFID

_____ is a standard, specifically a protocol, that defines how a network uses radio signals to communicate with a tag placed in or attached to an object, an animal, or a person.

extreme project management

_____ is a team-driven project management approach, in which a project leader is more of a participant and facilitator than a manager during the project.

force feedback

_____ is a technology that sends resistance to a device in response to actions of the users.

windows firewall

_____ is a utility that detects and protects a personal computer from unauthorized intrusions.

packaged software

_____ is mass-produced, copyrighted retail software that meets the needs of a wide variety of users, not just a single user or company.

Netiquette

_____ is the code of acceptable behaviors users should follow while on the internet.

voice recognition

_____ is the computer's capability of distinguishing spoken words.

online help

_____ is the electronic equivalent of a user manual.

Uploading

_____ is the process of transferring documents, graphics, and other objects from your computer to a server on the internet.

transfer rate

_____ is the speed with which data, instructions, and information transfer to and from a device.

Data

_____ is/are a collection of unprocessed items, which can include text, numbers, images, audio, and video.

A cellular radio network

_____ offers high-speed internet connections to devices with built-in compatible technology or computers with wireless modems.

file maintenance

_____ procedures include adding records to, modifying records in, and deleting records from a file.

document management

_____ software provides a means for sharing, distributing, and searching through documents by converting them into a format that can be viewed by any user.

computer-aided software engineering (CASE)

_____ tools are designed to support one or more activities of system development.

OLED

_____ uses organic molecules that produce an even brighter, easier-to-read display than standard TFT displays.

Lightscribe

_____, technology works with specially coated optical discs to etch labels directly on the disc.


Related study sets

Final Exam Review (Tests 4,5, + 6)

View Set

FINAL exam - RNSG 1343 ENDOCRINE

View Set

BUS 204 Ch. 21 Consumer Protection

View Set

NSE 4 Security - Firewall Policies

View Set

Principles of Accounting T/F and Multiple choice

View Set