Computer Concepts Practice Exam 2021

Ace your homework & exams now with Quizwiz!

Firewall

A software-based ___ is dedicated to examining and blocking internet traffic.

Access Point

A wireless ___ is the device that all nodes connect to in order communicate wirelessly.

Modem

A(n) ___ is a device that can convert digital information from a computer into analog sound waves that can be transmitted over the phone lines.

Stylus

A(n) ___ is a pen-like input tool that is used with a variety of touchscreen devices.

MIS

A(n) ___ is a set of software tools that enables managers to gather, organize, and evaluate information.

Virtual machine

A(n) ___ is a special environment that allows you to run an operating system on top of another operating system.

Blog

A(n) ___ is a web page or small website that contains a series of chronological posts and comments.

webcast

A(n) ___ is the broadcast of various types of media over the web.

LCD

A(n) ___ monitor contains a light source and a screen of special crystals that shift when electricity is applied to them.

Expert

A(n) ___ system is a type of information system that performs analytical tasks traditionally done by a human.

Zombies

Computers which are under the external control of a hacker are known as:

Robonaut 2

NASA''s ___ robot can work alongside astronauts or perform tasks that are too dangerous for humans.

Business Intelligence

Often associated with the field of ___, a data analyst is skilled at analyzing large volumes of data in order to discover useful information for an organization.

live-tiles

On Windows, ___ can display real-time information such as the current weather, news, or social media updates.

Database

Simply put, a computer ___ is an organized method for storing and retrieving information such as customers, employees, inventory, and sales records.

CPU

Suppose you are shopping for a computer and the description lists the following: Intel i7 3630QM3. Which component is being described here?

Protocols

Systems follow certain rules, or ___, to ensure that the packets are sent, received, and interpreted properly, and that data integrity is guaranteed.

Gig

The ___ economy describes the explosion of freelance workers that now perform the work that may otherwise be performed by full-time workers.

HTML

The ___ language, which was used in the first web page ever created, is still in use today.

Contrast ratio

The ___ of a monitor measures how close the monitor can get to the brightest white and the darkest black.

duplexing

The ability to automatically print to both sides of a piece of paper is known as:

Empathy

The ability to recognize, understand, and share the feelings of others is known as:

Multitasking

The ability to run multiple programs at the same time is known as:

Firmware

The instructions that handle a computer's basic functions when it is powered on are referred to as:

Media

The means used to link together parts of a computer network are referred to as network:

Bit

The most fundamental unit of computing is the ___, which is typically represented as a 1 or 0 value.

P2P

The most popular method for file transfer today is known as ___ file sharing, which uses a distributed network of individual users instead of a central server.

Burning

The process of recording to a blank optical disc is known as:

The likelihood of user compliance

Which of the following is NOT one of the factors that we normally use to gauge the danger of a threat?

Green

Which of the following is NOT one of the four colors used in the ink nozzles of inkjet printers?

Pro Tools

Which of the following is an example of audio editing and production software?

Hibernate

Which of the following power-saving modes copies the contents of RAM to your hard drive, thereby saving additional power?

Twisted Pair

___ cable normally consists of four pairs of wires that are twisted around each other.

Digital

___ cameras are portable devices that electronically capture and store still images and video.

Fault-tolerant

___ computers are able to continue their operation even when problems are present.

Nanotechnology

___ involves the creation or manipulation of matter at the smallest possible scale.

Biotechnology

___ is an application of biology that uses living organisms to manufacture new products or improve existing ones.

Whistleblowing

___ is the act of alerting the public about harmful activities that are being hidden by an organization.

Scalability

___ is the capacity to provide increasing amounts of computing power, storage, and/or software.

data mining

___ is the discovery of new patterns or relationships between data.

Encrption

___ is the process of scrambling your data or storage devices to make them unreadable by anyone who doesn't have the proper key.

Telecommuting

___ is the process of working for a company without being physically present at the company's office.

E-commerence

___ means doing business online, such as when a consumer buys a product over the web instead of going to a store to buy it.

Wireless

___ networks use radio signals that travel through the air to transmit data.

Automation

___ occurs when computers or machines can perform the work that was once done by a human.

Strong

___ passwords are long and generally use a mix of upper and lower case letters, numbers, and at least one symbol such as a dash or period.

Media

___ players refer to applications that allow you to listen to music and play videos.

Dye-sub

___ printers are often used to create lab-quality photos, as well as the images found on plastic ID cards.

3-D

___ printers are unique in that they can create a physical object made of various materials, such as a plastic toy.

Thermal

___ printers, which are often used to create receipts and labels, apply heat to special paper in order to turn select areas black.

Cache

___ refers to a form of high-speed memory that stores a small, frequently-used set of instructions and data. It is located inside modern CPUs.

Attenuation

___ refers to the loss of intensity and clarity of the data signal being transmitted.

Database Management System (DBMS)

___ software is used to create and manage databases.

Application

___ software, which is made for the user, allows individuals to complete a variety of work and school-related tasks.

RFID

___ tags, such as those present in many automated toll collection systems, can be scanned from longer distances and at higher speeds than barcodes.

Botnets

___, which are large networks of compromised computers, can be used by a hacker to spread malware, send spam, and conduct carefully orchestrated network attacks.

Unix

___, which dates back to 1969, runs many of the world's most powerful servers.

Aspect ratio

"16:9" describes the ___ of a monitor

Fiber-optic

A ___ cable consists of a thin strand of glass that transmits pulsating beams of light rather than electric current.

computer support specialist

A ___ excels when it comes to installing, configuring, and supporting computer systems.

bridge

A ___ is a device that connects two LANs or two segments of the same LAN.

Worm

A ___ is a fully-contained program that self-replicates and spreads through computers and networks.

Pixels

A monitor's screen is divided up into millions of tiny dots, called:

VPN

Because it increases the security of a network connection, a ___ is often required for users who wish to access a company's private network over an Internet connection.

700 MB

Compact Discs (CDs) are capable of storing up to ___ of data.

700MB

Compact Discs (CDs) are capable of storing up to ___ of data.

Footprints

Digital ___ are effectively a trail of your data, activities, and even locations visited while carrying a smartphone.

Projectors

Digital ___ are used to project digital images and video onto a large screen where they can be viewed by an audience.

Bandwidth

For modern networks, ___ is measured in either megabits per second (Mbps) or gigabits per second (Gbps).

Dashboard

Google allows users to view and control all their data with a tool known as:

MMORPGs

In a category of games known as ___, millions of players connect to various servers to team up with other players in very large virtual worlds.

Hacker

In the early days of computing, a(n) ___ was an individual that possessed advanced skills, often making a computer do something that it wasn't originally intended to do.

Videocards

Individuals who require better speed and performance for graphics-intensive applications (e.g., video editing, gaming, etc.) prefer the faster processors and built-in memory included with ___.

Crowdfunding

Kickstarter is known as a(n) ___ website because it allows the general public to provide financial support to organizations and individuals that are working on a new product.

Real time

Many individuals today prefer various forms of ___ communication, where messages and conversations between two or more people occur instantaneously.

Gestures

Many new devices support the use of various ___, or finger movements, to accomplish various tasks.

Compress

Many users choose to ___ several files into one ZIP file for the sake of easy transport, especially when attaching them to an email message.

GUI

Modern operating systems have a ___, allowing users to communicate via graphical elements on the screen.

Ethernet

Most network installations use a(n) ___ star topology with twisted-pair cables that plug into the RJ45 port located on many devices.

Spam

Posting a message to a discussion forum that is completely off topic or appears to be promoting something may be considered ___ by the user community.

Multimedia

Practically all of today's computers are equipped with complete ___ capabilities, which means that they can input and output sound, music, images, and video.

Formatting

Preparing a storage device for use by an operating system is known as:

Modifiers

Search ___, such as quotes and the minus sign, can narrow down the results provided by search engines.

Twitch

The service known as ___ contains original content in the form of live or recorded streams showing individuals playing video games.

Broadband

The term ___ is used to describe any digital data connection that can transmit information faster than standard dial-up by using a wider band of frequencies.

Cards

Tiny and flat memory ___ are used to store data in tablets, smartphones, and devices such as digital cameras and digital photo frames.

SSD

Ultraportable computers will often use ___ technology exclusively, even though their storage capacity is lower than that of a traditional hard drive.

Optical Character Recognition (OCR)

What is the name of the technology that can translate a scanned document image into text that can be edited and formatted?

YouTube

When it comes to social video, no service is as large or popular as:

Mega-SD

Which of the following is NOT a type of memory card technology?

Intel's Alexis

Which of the following is NOT a virtual assistant that uses speech recognition to help users with a variety of tasks?

Terabyte (TB)

Which of the following storage units is the LARGEST?

Neural Networks

___ aim(s) to revolutionize AI by asking computers to process data and learn in a manner inspired by the human brain.

Logos

___ are files that record activities and events on a computer.

Virus

A ___ is a type of malware that is attached to a host file and has the ability to replicate, or copy, itself.

HDMI

A ___ is responsible for configuring and maintaining networks and communication systems.

network administration

A ___ is responsible for configuring and maintaining networks and communication systems.

Repeater

A ___ is used to prevent attenuation when packets are traveling long distances.

System Analyst

A ___ specializes in developing plans and recommendations that meet the software and system needs of an organization.

Domain name

A ___, such as apple.com and whitehouse.gov, uniquely identifies a site and a brand on the web.


Related study sets

GIS (Geographic Information Systems) Paper Exam 1

View Set

Area Studies B (Russia and CIS) Final - Mr. Causey's Class

View Set

O P E R A T I N G - S Y S T E M -P4 INFO TECH!

View Set

Physics Exam 2 - RQs & Chapter Quizzes

View Set

Chapter 5 Managing Across Cultures

View Set

Chapter 1: Health Promotion and Disease Prevention

View Set

OB Chapt 20 Nursing Management of the Pregnancy at Risk

View Set