Computer Concepts

Ace your homework & exams now with Quizwiz!

A bit can represent how many different values?

2

A byte is _________ bit(s).

8

Cell A7 (words) likely contains

A label

Digital video cameras are used for _______

All of the above

The central processing unit________.

All of the above

Which of the following is considered a benefit of using simulation programs?

All of the above

Which program can you use to take notes in class?

All of the above

All of the statements below are true about the Digital Divide, except:

Allows the use of all minds on the planet to solve problems.

The OS with the largest market share on tablet devices is

Android

All of the following are browsers EXCEPT:

Bing

The smallest unit of storage in the computer is a

Bit

A benefit of using a hard disk as secondary storage is that it has_______.

Both faster transfer than a DVD and more capacity than a DVD are correct

A large group of software programs used to launch coordinated DoS attacks is known as a __________.

Botnet

Small text files that some websites automatically store on your computer's hard drive are known as

Cookies

Which of the following is NOT necessary to do before installing beta software?

Defragging the hard drive.

An attacker that renders a computer unable to respond to legitimate users because it is being bombarded with data requests is known as a ____________ attack

Denial-of-service

To be processed by a computer, data must be converted to

Digital form

Gordon Moore, the Chairman of Intel, predicted in 1965 that the speed of a silicon chip of the same price would

Double about every 18 months for at least two decades

A set of choices that appears, in the manner of a window shade, from the top of a screen is called a

Drop-down or pull-down menu

Making changes to a word processing document to fix errors or improve its content is called

Editing

The science of creating work environments that are safe and efficient for workers is known as:

Ergonomics

A gigabyte is approximately 1,000 kilobytes

False

A potential risk of today's technology is the increased efficiency of business operations.

False

A search engine that searches other search engines is called a super search engine.

False

Each device attached to your computer needs an interrupt file to communicate with the OS.

False

First-generation computers were characterized by the transistor.

False

Hackers that break into systems for no malicious reasons, such as to test security systems are known as black-hat hackers.

False

Sending e-mails to lure people into revealing personal information is a technique known as pharming.

False

System software is another term for application software.

False

The physical parts of the computer system are referred to as software.

False

Using a surge protector will even protect your computer from massive surges such as a lightning strike.

False

When you buy software, you then own it and can do anything you'd like with it, including giving it to friends to install on their machines.

False

When you need help with software, you should use the program's help features or manufacturer FAQs, not online help like podcasts or Youtube videos.

False

The __________ utility automatically backs up files from your libraries.

File History

The location of a file on a drive such as C:\Documents\CSC1113\Homework\Termpaper.docx is known as the

File path

The action of finding and changing each instance of a repeated item is called

Find and replace

Augusta Ada King, Countess of Lovelace is often called the

First computer programmer

What should you do if you spot unethical behavior at your work place?

Follow company procedures for reporting unethical behavior.

The appearance of a document is called its

Format

Modern operating systems such as Windows and OS X use a

Graphical user

Connectivity for a new computer means:

Having a modem and/or network connection to communicate with other computers

When purchasing a new printer the most important factor to consider is

How it is going to be used.

Hard disks for personal computers typically have this amount of storage.

Hundreds of gigabytes.

When a hacker steals personal information with the intent of impersonating another individual to commit fraud, it is known as

Identity theft

A backup of all your files on your computer, which is essentially a snap shot of exactly how your computer looks at a particular point in time, is known as a(n)

Image backup

Which software is best use if you want to change the looks of your digital pictures?

Image-editing program

Which one of the following statements is NOT true about e-mail?

It is private.

All of the following are key attributes of an operating system EXCEPT

It tracks connections to external networks

Which of the following is ranked from smallest to largest?

KB, MB, GB, TB

Firewalls work by closing _________ in your computer.

Logical porta

The current active cell is

Look in the box on the right

The circuit board on which the processor and other chips are placed is called the

Motherboard

You are most likely to find a Linux OS

On a desktop

Windows is a(n):

Operating system

A social engineering technique in which you send people an e-mail for the purpose of inducing them into revealing sensitive information is known as

Phishing

The sockets on the outside of a computer's system unit where cables are connected to it are called

Ports

In the URL http://www.hindscc.edu, the portion labeled http is the:

Protocol

RAM stands for:

Random Access Memory

In a relational database, another name for a record is a

Row

Apps not specifically designed for Windows 8 (such as Word 2010)

Run on the desktop

When using the Internet for research, you

Should evaluate sites for bias and relevance.

Facebook, MySpace, and Twitter are considered:

Social networking Web sites.

Software that is available on demand via the Internet is called

Software as a Service (SaaS).

A technique that uses illegally obtained information about individuals to perform targeted attacks in the hopes of getting them to reveal sensitive information is known as

Spear phishing

Which of the following is considered an accessibility utility?

Speech Recognition

A program that checks for the correct word spelling is the

Spelling checker

Another name for a worksheet is a

Spreadsheet

Software that transmits information about you, such as your Internet surfing habits, back to a third party is known as

Spyware

The minimum set of recommended standards for a program is known as the

System requirements

The Windows app used for closing unresponsive apps is

Task Manager

Which of the following is true about open source software?

The program can be changed and freely distributed.

Which is NOT an advantage of using a software suite?

The programs integrate easily with programs from other software suites.

When shopping online, which of the following does NOT indicate that you have a secure connection displays?

The word "secure" in the title bar.

From the title (ID) bar, we can tell that

This is a Microsoft Excel workbook named Acme Sales.xlsx

Viruses that activate on certain dates or with the passage of time are known as

Time bombs

A tall, upright system unit with relatively more expansion slots and bays is known as a (n):

Tower

A person can truly be addicted to the internet.

True

A primary benefit if a jump or flash drive is portability.

True

A wizard is a software tool that offers a step-by-step guide through complicated tasks.

True

Adware and spyware are both types of malware.

True

Cybercrime is any crime that is carried out with the aide if a computer.

True

Fourth-generation computers were characterized by the microprocessor.

True

In the URL www.hindscc.edu the top level domain is edu.

True

Input, in computer terminology, is known as data.

True

Machines with built-in computers use real-time operating systems.

True

Many household appliances contain embedded computers.

True

Mauchly and Eckert developed the ENIAC.

True

Multimedia is a common application of computers.

True

System restore points can be created manually by a user at any time.

True

The main purpose of File Explorer is to help you organize and find files on your computer.

True

The second step of the boot process is the power-on self-test (POST).

True

There is no universally agreed-on best system of ethics.

True

To delete an unwanted program from Windows 8, right-click the program tile from the Start screen and select Unistall.

True

You can share your favorite sites with others through social bookmarking

True

A 2.0 GHz personal computer has a processor capable of handling how many clock (machine) cycles per second?

Two billion

Which is NOT an example of a tablet OS?

UNIX

Which of the following statements is false?

Unethical behavior is always illegal.

Which of the following is an uncompressed audio file format?

WAV

Software that is available on-demand via the Internet is called:

Web-based software.

Which of the following companies developed the very first GUI?

Xerox


Related study sets

patho of blood disorders (NURS 352)

View Set

Cardiovascular Changes in Pregnancy

View Set

Chap 10 - Health & Accident Insurance - FINAL LIFE CHAPTER

View Set