Computer Concepts Practice Exam 2021
Firewall
A software-based ___ is dedicated to examining and blocking internet traffic.
Access Point
A wireless ___ is the device that all nodes connect to in order communicate wirelessly.
Modem
A(n) ___ is a device that can convert digital information from a computer into analog sound waves that can be transmitted over the phone lines.
Stylus
A(n) ___ is a pen-like input tool that is used with a variety of touchscreen devices.
MIS
A(n) ___ is a set of software tools that enables managers to gather, organize, and evaluate information.
Virtual machine
A(n) ___ is a special environment that allows you to run an operating system on top of another operating system.
Blog
A(n) ___ is a web page or small website that contains a series of chronological posts and comments.
webcast
A(n) ___ is the broadcast of various types of media over the web.
LCD
A(n) ___ monitor contains a light source and a screen of special crystals that shift when electricity is applied to them.
Expert
A(n) ___ system is a type of information system that performs analytical tasks traditionally done by a human.
Zombies
Computers which are under the external control of a hacker are known as:
Robonaut 2
NASA''s ___ robot can work alongside astronauts or perform tasks that are too dangerous for humans.
Business Intelligence
Often associated with the field of ___, a data analyst is skilled at analyzing large volumes of data in order to discover useful information for an organization.
live-tiles
On Windows, ___ can display real-time information such as the current weather, news, or social media updates.
Database
Simply put, a computer ___ is an organized method for storing and retrieving information such as customers, employees, inventory, and sales records.
CPU
Suppose you are shopping for a computer and the description lists the following: Intel i7 3630QM3. Which component is being described here?
Protocols
Systems follow certain rules, or ___, to ensure that the packets are sent, received, and interpreted properly, and that data integrity is guaranteed.
Gig
The ___ economy describes the explosion of freelance workers that now perform the work that may otherwise be performed by full-time workers.
HTML
The ___ language, which was used in the first web page ever created, is still in use today.
Contrast ratio
The ___ of a monitor measures how close the monitor can get to the brightest white and the darkest black.
duplexing
The ability to automatically print to both sides of a piece of paper is known as:
Empathy
The ability to recognize, understand, and share the feelings of others is known as:
Multitasking
The ability to run multiple programs at the same time is known as:
Firmware
The instructions that handle a computer's basic functions when it is powered on are referred to as:
Media
The means used to link together parts of a computer network are referred to as network:
Bit
The most fundamental unit of computing is the ___, which is typically represented as a 1 or 0 value.
P2P
The most popular method for file transfer today is known as ___ file sharing, which uses a distributed network of individual users instead of a central server.
Burning
The process of recording to a blank optical disc is known as:
The likelihood of user compliance
Which of the following is NOT one of the factors that we normally use to gauge the danger of a threat?
Green
Which of the following is NOT one of the four colors used in the ink nozzles of inkjet printers?
Pro Tools
Which of the following is an example of audio editing and production software?
Hibernate
Which of the following power-saving modes copies the contents of RAM to your hard drive, thereby saving additional power?
Twisted Pair
___ cable normally consists of four pairs of wires that are twisted around each other.
Digital
___ cameras are portable devices that electronically capture and store still images and video.
Fault-tolerant
___ computers are able to continue their operation even when problems are present.
Nanotechnology
___ involves the creation or manipulation of matter at the smallest possible scale.
Biotechnology
___ is an application of biology that uses living organisms to manufacture new products or improve existing ones.
Whistleblowing
___ is the act of alerting the public about harmful activities that are being hidden by an organization.
Scalability
___ is the capacity to provide increasing amounts of computing power, storage, and/or software.
data mining
___ is the discovery of new patterns or relationships between data.
Encrption
___ is the process of scrambling your data or storage devices to make them unreadable by anyone who doesn't have the proper key.
Telecommuting
___ is the process of working for a company without being physically present at the company's office.
E-commerence
___ means doing business online, such as when a consumer buys a product over the web instead of going to a store to buy it.
Wireless
___ networks use radio signals that travel through the air to transmit data.
Automation
___ occurs when computers or machines can perform the work that was once done by a human.
Strong
___ passwords are long and generally use a mix of upper and lower case letters, numbers, and at least one symbol such as a dash or period.
Media
___ players refer to applications that allow you to listen to music and play videos.
Dye-sub
___ printers are often used to create lab-quality photos, as well as the images found on plastic ID cards.
3-D
___ printers are unique in that they can create a physical object made of various materials, such as a plastic toy.
Thermal
___ printers, which are often used to create receipts and labels, apply heat to special paper in order to turn select areas black.
Cache
___ refers to a form of high-speed memory that stores a small, frequently-used set of instructions and data. It is located inside modern CPUs.
Attenuation
___ refers to the loss of intensity and clarity of the data signal being transmitted.
Database Management System (DBMS)
___ software is used to create and manage databases.
Application
___ software, which is made for the user, allows individuals to complete a variety of work and school-related tasks.
RFID
___ tags, such as those present in many automated toll collection systems, can be scanned from longer distances and at higher speeds than barcodes.
Botnets
___, which are large networks of compromised computers, can be used by a hacker to spread malware, send spam, and conduct carefully orchestrated network attacks.
Unix
___, which dates back to 1969, runs many of the world's most powerful servers.
Aspect ratio
"16:9" describes the ___ of a monitor
Fiber-optic
A ___ cable consists of a thin strand of glass that transmits pulsating beams of light rather than electric current.
computer support specialist
A ___ excels when it comes to installing, configuring, and supporting computer systems.
bridge
A ___ is a device that connects two LANs or two segments of the same LAN.
Worm
A ___ is a fully-contained program that self-replicates and spreads through computers and networks.
Pixels
A monitor's screen is divided up into millions of tiny dots, called:
VPN
Because it increases the security of a network connection, a ___ is often required for users who wish to access a company's private network over an Internet connection.
700 MB
Compact Discs (CDs) are capable of storing up to ___ of data.
700MB
Compact Discs (CDs) are capable of storing up to ___ of data.
Footprints
Digital ___ are effectively a trail of your data, activities, and even locations visited while carrying a smartphone.
Projectors
Digital ___ are used to project digital images and video onto a large screen where they can be viewed by an audience.
Bandwidth
For modern networks, ___ is measured in either megabits per second (Mbps) or gigabits per second (Gbps).
Dashboard
Google allows users to view and control all their data with a tool known as:
MMORPGs
In a category of games known as ___, millions of players connect to various servers to team up with other players in very large virtual worlds.
Hacker
In the early days of computing, a(n) ___ was an individual that possessed advanced skills, often making a computer do something that it wasn't originally intended to do.
Videocards
Individuals who require better speed and performance for graphics-intensive applications (e.g., video editing, gaming, etc.) prefer the faster processors and built-in memory included with ___.
Crowdfunding
Kickstarter is known as a(n) ___ website because it allows the general public to provide financial support to organizations and individuals that are working on a new product.
Real time
Many individuals today prefer various forms of ___ communication, where messages and conversations between two or more people occur instantaneously.
Gestures
Many new devices support the use of various ___, or finger movements, to accomplish various tasks.
Compress
Many users choose to ___ several files into one ZIP file for the sake of easy transport, especially when attaching them to an email message.
GUI
Modern operating systems have a ___, allowing users to communicate via graphical elements on the screen.
Ethernet
Most network installations use a(n) ___ star topology with twisted-pair cables that plug into the RJ45 port located on many devices.
Spam
Posting a message to a discussion forum that is completely off topic or appears to be promoting something may be considered ___ by the user community.
Multimedia
Practically all of today's computers are equipped with complete ___ capabilities, which means that they can input and output sound, music, images, and video.
Formatting
Preparing a storage device for use by an operating system is known as:
Modifiers
Search ___, such as quotes and the minus sign, can narrow down the results provided by search engines.
Twitch
The service known as ___ contains original content in the form of live or recorded streams showing individuals playing video games.
Broadband
The term ___ is used to describe any digital data connection that can transmit information faster than standard dial-up by using a wider band of frequencies.
Cards
Tiny and flat memory ___ are used to store data in tablets, smartphones, and devices such as digital cameras and digital photo frames.
SSD
Ultraportable computers will often use ___ technology exclusively, even though their storage capacity is lower than that of a traditional hard drive.
Optical Character Recognition (OCR)
What is the name of the technology that can translate a scanned document image into text that can be edited and formatted?
YouTube
When it comes to social video, no service is as large or popular as:
Mega-SD
Which of the following is NOT a type of memory card technology?
Intel's Alexis
Which of the following is NOT a virtual assistant that uses speech recognition to help users with a variety of tasks?
Terabyte (TB)
Which of the following storage units is the LARGEST?
Neural Networks
___ aim(s) to revolutionize AI by asking computers to process data and learn in a manner inspired by the human brain.
Logos
___ are files that record activities and events on a computer.
Virus
A ___ is a type of malware that is attached to a host file and has the ability to replicate, or copy, itself.
HDMI
A ___ is responsible for configuring and maintaining networks and communication systems.
network administration
A ___ is responsible for configuring and maintaining networks and communication systems.
Repeater
A ___ is used to prevent attenuation when packets are traveling long distances.
System Analyst
A ___ specializes in developing plans and recommendations that meet the software and system needs of an organization.
Domain name
A ___, such as apple.com and whitehouse.gov, uniquely identifies a site and a brand on the web.