Computer Concepts Practice Exam
___ are individuals with a large number of followers on social media sites who are often paid to promote products.
Influencers
A(n) ___ is a set of software tools that enables managers to gather, organize, and evaluate information.
MIS Management information system
What is the name of the backup utility in macOS?
Time machine
___ cable normally consists of four pairs of wires that are twisted around each other.
Twisted-pair
___ players refer to applications that allow you to listen to music and play videos.
media
___ printers combine either inkjet or laser printing capabilities with scanning, photocopying, and faxing capabilities.
multifunction
The ability to run multiple programs at the same time is known as:
multitasking
___ occurs when an organization transfers some aspect of their business to a third party.
outsourcing
In the model known as ___, advertisers pay for their ads only when a website visitor clicks on the ad.
pay per click
A monitor's screen is divided up into millions of tiny dots, called:
pixels
Browser ___ are separate programs that allow your web browser to display specialized content or certain types of multimedia.
plug ins
A ___ is a fully-contained program that self-replicates and spreads through computers and networks.
worm
___ is a feature that requires two forms of identification, such as a password and possession of your phone, to log into an account.
2FA
Which of the following is NOT an example of an office suite?
??? Adobe???
Although Google owns ___ and manages the Google Play Store for apps, they allow any manufacturer to use and modify this operating system for their devices.
Android
As the main processor of a computer, the ___ is responsible for organizing and carrying out instructions in order to produce a desired output.
CPU
___ is a form of electronic money that is decentralized and whose transactions are encrypted, processed, and recorded via peer-to-peer networks.
Cryptocurrency
___ software is used to create and manage databases.
DBMS
Software is sometimes illegally modified in order to disable ___ technologies such as copy protection and authenticity checks.
DRM
A(n) ___, which is a special application that collects and reports certain types of data, can help managers make better decisions.
DSS decision support system
Most of today's PC software and standard definition movies are sold as:
DVDs
___ is the process of scrambling your data or storage devices to make them unreadable by anyone who doesn't have the proper key.
Encryption
Laws such as the Patriot Act and ___ give the U.S. government broad surveillance powers.
FISA
Ultraportable computers will often use ___ technology exclusively, even though their storage capacity is lower than that of a traditional hard drive.
SSD
___ is unsolicited email that is sent in bulk.
Spam
Web pages have a standard addressing system known as a(n) ___, which allows them to be located on the internet.
URL
Instead of calling a taxi company or hailing a cab on the street, apps such as ___ connect drivers who have some free time and individuals who need transportation.
Uber
Because it increases the security of a network connection, a ___ is often required for users who wish to access a company's private network over an Internet connection.
VPN
___ refers to a new way to use the World Wide Web, whereby any user can create and share content, as well as provide opinions on existing content.
Web 2.0
Which of the following is NOT a popular computer programming language?
Xero
When it comes to social video, no service is as large or popular as:
YouTube
The series of steps that describe exactly what each portion of a program is supposed to do is known as a(n):
algorithm
Some licenses require that the user provide ___, or credit, to the author wherever the work is used.
attribution
___ are small data files that are created by websites in order to remember users and their preferences the next time they visit the site.
cookies
Google ___ is a tool that allows users to view and control all their data.
dashboard
Many mobile users purchase a monthly ___ that allows them to connect to the internet using a cellular network.
data plan
Simply put, a computer ___ is an organized method for storing and retrieving information such as customers, employees, inventory, and sales records.
database
Operating systems typically contain a disk ___ or optimization utility, which will reorganize files and fragments to place related ones nearer to each other.
defragmentation
___ is a browser feature that attempts to stop websites from automatically sharing details about your visit with other companies.
do not track
A ___, such as apple.com and whitehouse.gov, uniquely identifies a site and a brand on the web.
domain name
___ printers create output by striking an inked ribbon against paper using metal pins, making them useful for printing on pressure-sensitive forms.
dot matrix
Operating systems communicate with most hardware components using:
drivers
___ printers are often used to create lab-quality photos, as well as the images found on plastic ID cards.
dye-sub
Human ___ describes the various ways in which technology can be integrated with biological systems to repair or improve human functions.
enhancement
A(n) ___ examines and blocks Internet traffic in order to protect your private network.
firewall
The instructions that handle a computer's basic functions when it is powered on are referred to as:
firmware
A USB ___ drive is the small storage stick that plugs into a USB port.
flash
While storms could be a cause, power ___ are more likely to be caused by disturbances from high-demand equipment in a home or building.
fluctuations
Digital ___ are effectively a trail of your data, activities, and even locations visited while carrying a smartphone.
footprints
Which of the following is NOT one of the four colors used in the ink nozzles of inkjet printers?
green
Today's web browsers include a feature that will delete all of your browsing ___ with a single click.
history
___ robots are those that are created to imitate the appearance or capabilities of humans.
humanoid
A type of spyware known as ___ can record the individual keystrokes of a user.
keyloggers
It is through ___ that a copyright holder can grant usage or distribution rights to others.
licensing
Certain types of systems are called ___ because they must run without failure or with nearly instant recovery from failure.
mission critical
Search ___, such as quotes and the minus sign, can narrow down the results provided by search engines.
modifiers
___ occurs when computers or machines can perform the work that was once done by a human.
automation
A(n) ___ is just another name for an error in a program.
bug
Many users choose to ___ several files into one ZIP file for the sake of easy transport, especially when attaching them to an email message
compress
A web ___ is a website that provides a variety of useful information and services to visitors, making them popular as browser home pages.
portal
Operating systems use ___ utilities to place computers and devices in low-power states when they are not being used.
power management
Computers that communicate over a network must follow certain ___ to ensure that the transmission is sent properly and understood.
protocols
A(n) ___ computer can represent data in states beyond the two bits (0's and 1's) of today.
quantum
Users with broadband connections are typically equipped with a(n) ___ that connects their home's network to the internet.
residential gateway
The scam known as ___ typically comes in form of an alert message that claims to be from the FBI or your security software.
scareware
The ___ economy is an expression that refers to the way in which the internet has facilitated our ability to share (usually for a price) our goods or services with other individuals.
sharing
To keep using ___ after the trial period, you must purchase a full version or a code that can be entered into the software.
sharware
In a(n) ___ topology, all nodes are connected to a hub or switch and communicate through it.
star
All newer web browsers use a(n) ___ browsing interface, which allows you to have multiple web pages open in one browser window.
tabbed
When using a discussion forum, placing your message in the correct ___ will maximize your chances of getting a reply.
thread
A(n) ___ is a pointing device that works like an upside-down mouse, with users moving the pointer around the screen by rolling a ball with their finger.
trackball
Programs that are based on ___ graphics rely on mathematics to generate and manipulate a variety of shapes.
vector
Businesses often use more sophisticated versions of webcams to engage in ___, where multiple individuals hold meetings and converse using internal networks or the internet.
videoconferencing