IST 110 (ALL)
Which of the following extensions is associated with a video file?
.wmv
Eight bits equal ________ byte(s).
1
Before November 2017, tweets were limited to ________ characters each.
140
A binary code using eight bits has ________ different possible combinations.
256
________ contains the tasks and dates for a project and shows the schedule and progress of the project in a graphic.
A Gantt chart
________ is a small, portable, solid-state drive.
A flash drive
What is the Internet backbone?
A high-speed connection between networks
The central processing unit consists of the control unit and the ________.
ALU
Which of the following is NOT part of Microsoft Office Online web apps? 1) Excel 2) PowerPoint 3) OneNote 4) Access
Access
An end user license agreement represents which of the following?
Agreement between the user and the software publisher
What is NOT true about the private cloud? 1) Backups are done automatically 2) Uses Internet technologies 3) Also available to the public 4) Used for a company's internal organization
Also available to the public
________ is an example of a wearable computer.
An Apple Watch
A computer can be a flexible and powerful tool by using what type of software?
Application
________ communication allows you to send a message that the receiver can access later.
Asynchronous
When sending one email to everyone in your address book, you should use the ________ field to keep their addresses private.
Bcc
________ hackers hack into systems to steal or vandalize.
Black-hat
To connect peripherals at short ranges, you would use the ________ wireless technology.
Bluetooth
Which of the following is a short-range wireless technology?
Bluetooth
What is the oldest optical disc still in use today?
CD
The ________ is the brain of the computer.
CPU
Which of the following is NOT a valid character in a file name? 1) Semicolon (;) 2) Colon (:) 3) Underscore (_) 4) Hyphen (-)
Colon (:)
________ raises money from multiple small investors rather than a few large ones.
Crowdfunding
When using Windows, to select all the folders in a window you simultaneously press the ________ and A keys.
Ctrl
Which cybercrime is considered to be a form of harassment?
Cyber-stalking
________ is an unlawful attack on computers or networks done to intimidate a government or its people.
Cyber-terrorism
By default, Windows computers are set to obtain an IP address automatically, using ________.
DHCP
________ technologies use telephone lines to carry digital signals.
DSL
Which type of camera would be the best choice for a photographer who prefers to manually adjust the focus and exposure for each image?
DSLR
The Internet was originally created as a communication system for the ________.
Department of Defense
________ computers offer the most speed, power, and upgradability for the lowest cost.
Desktop
The Windows ________ utility looks for files that can safely be deleted to free up disk space.
Disk Cleanup
________ is a form of freeware, where the developers accept contributions for themselves or for nonprofit organizations.
Donationware
________ are found on the motherboard and are used to attach your hard disk.
Drive controllers
________ printers produce lab-quality prints of your photos.
Dye-sublimation
The ________ was first designed to calculate artillery firing tables.
ENIAC
The ________ was the first working, digital, general-purpose computer.
ENIAC
What CANNOT be done with most video editing software? 1) Add captions 2) Edit pictures created in the software 3) Burn to a DVD 4) Upload to the web
Edit pictures created in the software
________ is an example of asynchronous communication.
________ is the study of the relationship between workers and their workspaces.
Ergonomics
Which of the following applications is not part of an office application suite?
Financial
The ________ in macOS is used to locate and arrange files, folders, and applications.
Finder
________ is one of the largest online image-sharing sites in the world.
Flickr
Which is NOT a modern source of installing software? 1) Flash drive 2) Floppy drive 3) CD/DVD 4) Web
Floppy drive
________ make data entry easier because they can be set up to match the layout of a paper document.
Forms
Which generation of programming languages is closer to natural language but still requires some programming knowledge?
Fourth-generation
________ can be used at no cost for an unlimited period of time.
Freeware
Today's processor speeds are measured in ________.
GHz
The ________ is a tracking system created by the U.S. Department of Defense that uses satellites for navigation.
GPS
________ computing refers to the efficient and eco-friendly use of computers.
Green
________ is the authoring language that defines the structure of a webpage.
HTML
Which of the following is not a common LAN topology?
Hierarchal
What project was coordinated by the U.S. Department of Energy and the National Institutes of Health?
Human Genome Project
Wi-Fi networks used in homes and public hotspots use the ________.
IEEE 802.11 standards
Which is a type of data that can be stored in an object-oriented database?
Images, audio, and video
In what phase of the SDLC does testing occur?
Implementation
In what phase of the SDLC does user training take place?
Implementation
Which is not an advantage of data normalization? 1) Makes it easier to update records 2) Increases query speed 3) Reduces the database size 4) Increases database development time
Increases database development time
Which of the following is a method of synchronous online communication? 1) Instant messaging 2) Email 3) Forum 4) Newsgroup
Instant messaging
________ allows you to communicate with one or more people at a time.
Instant messaging
Which of the following is NOT a cloud service provider? 1) Intel 2) Salesforce 3) Google 4) Amazon
Intel
Which of the following types of storage has a relatively low price per GB, fast transfer speed, and is secure inside a system unit?
Internal hard drive
Which of the following would NOT be a recommended place to back up computer files? 1) Internal hard drive 2) DVD 3) Flash drive 4) External drive
Internal hard drive
Which statement about a logic bomb is false? 1) It is often planted by a disgruntled IT worker. 2) It can spread to other machines. 3) It can lay dormant until specific conditions are met. 4) It can be triggered on a specific date.
It can spread to other machines.
Which statement about email is false? 1) Copies of your email may exist on several servers even after the recipient deletes it. 2) Your employer may read your email at your work. 3) It cannot be accessed by hackers. 4) Email can be used for targeted marketing.
It cannot be accessed by hackers.
What is NOT true about analytics? 1) It can raise profits. 2) It can help a business make decisions. 3) It detects patterns in data. 4) It comes standard in Project Management software.
It comes standard in Project Management software.
Which of the following is NOT true about a keypad? 1) It is normally used in POS systems. 2) It can make game play easier. 3) It contains special, programmable characters. 4) It has a limited number of keys.
It contains special, programmable characters.
Which is NOT an advantage of using a cloud storage service? 1) It is easy to set up. 2) It is faster than other backup options. 3) It can be set to back up files automatically. 4) It keeps your backups at a different location.
It is faster than other backup options.
What is NOT true about Firewire? 1) It is a legacy port. 2) It was released by Apple. 3) It is hot-swappable. 4) It is also known as IEEE 1394.
It is hot-swappable.
What is NOT true about hyper-threading? 1) It is a technology implemented by Intel. 2) It is a virtual form of parallel processing. 3) It enables one CPU to appear as two logical processors. 4) It is not dependent on those who write software.
It is not dependent on those who write software.
For a company that uses only one or two floors of an office building, all the company's computers and printers will be connected by a ________.
LAN
The 4G network standard includes ________ technologies.
LTE
________ is a social network that is designed for business connections.
ZIP files use what type of compression?
Lossless
MP3 stands for ________.
MPEG-1 Audio Layer 3
What is the most common desktop operating system?
Microsoft Windows
________ Law predicted that the number of transistors placed on an integrated circuit would double approximately every two years.
Moore's
Which of the following is NOT an example of an expansion card? 1) Video card 2) TV tuner 3) Motherboard 4) Modem
Motherboard
Which of the following is NOT a Boolean operator? 1) NOR 2) NOT 3) OR 4) AND
NOR
Which Boolean operator would you use to exclude a term in your search results?
NOT
When the Internet backbone was privatized, five large ________ Access Points made up the new backbone.
Network
What is NOT true about the public cloud? 1) None offer desktop applications 2) Often has limited free storage 3) Available to the public 4) Network of shared resources
None offer desktop applications
Which of the following is a network operating system (NOS)?
Novell
The free online storage provided by Microsoft is called ________.
OneDrive
________ allows the user to selectively extract data from different viewpoints.
Online analytical processing (OLAP)
________ software can be copied, modified, and redistributed without paying a fee.
Open source
________ software provides the user with an interface to communicate with the computer's hardware.
Operating system
The Windows ________ utility rearranges files on a hard drive in order to improve efficiency.
Optimize Drives
________ recommends music to you based on your listening preferences.
Pandora
________ uses multiple processors, or multi-core processors, to share processing tasks.
Parallel processing
________ redirects you to a phony website by hijacking a domain name.
Pharming
Which is the correct order of the phases in the SDLC?
Planning, analysis, design, implementation and testing, maintenance
When you connect a printer to your computer, ________ allows the operating system to detect the printer to make setup easier.
PnP
The ________ is a set of five steps that a programmer follows to create a computer program.
Program Development Cycle
________ conveys the steps of an algorithm using English-like statements that focus on logic, not syntax.
Pseudocode
Which of the following is not a SQL relational keyword? 1) WHERE 2) QUIT 3) FROM 4) SELECT
QUIT
Which of the following types of memory is nonvolatile?
ROM
You can subscribe to ________ feeds to stay up-to-date on podcasts and news feeds.
RSS
Using System ________ returns your operating system to a previous point in time.
Restore
Which device on a network performs network address translation?
Router
When you set up your wireless router, you should change the ________, which is also called the wireless network name.
SSID
Which broadband service are you likely to use if you live in a very remote area?
Satellite
Sophia heard about some media software with a free trial download. She thought it would be a good idea to try it before buying. She is using which type of proprietary software?
Shareware
An intelligent personal assistant app for Apple devices that allows you to speak using natural language is known as ________.
Siri
________ technology is used for sending email messages.
Store-and-forward
Which would make the best primary key in a table?
Student ID
________ are very expensive, complex computer systems used in weather forecasting and medical research.
Supercomputers
________ consists of these four components: input, processing, storage, and output.
The information processing cycle
What was the ARPANET?
The origins of the Internet
Which of the following statements about P2P networks is false? 1) They can only support a small number of devices. 2) The services and security are centralized. 3) All computers are considered equal. 4) They can share a printer.
The services and security are centralized.
Which statement about smartphones is FALSE? 1) They are limited to the programs already installed during production. 2) They run a mobile operating system. 3) They combine phone, PDA, and MP3 player capabilities. 4) They are convergence devices.
They are limited to the programs already installed during production
What is not true about pop-up blockers? 1) They are triggered by cookies. 2) They prevent webpages from opening a new window. 3) They can be configured for different sites. 4) They can serve useful purposes.
They are triggered by cookies.
What is NOT true about default programs? 1) They cannot be changed 2) Doesn't work well with generic file extensions 3) Automatically opens the correct program 4) List is maintained by the operating system
They cannot be changed
Which statement about cookies is false? 1) They are used by websites to identify you. 2) They are small text files. 3) They cannot collect information you do not want to share. 4) They can be installed without your knowledge.
They cannot collect information you do not want to share.
What is not true about vacuum tubes? 1) They resemble light bulbs. 2) They seldom need to be replaced. 3) They generate a lot of heat when operating. 4) They were used in first-generation computers.
They seldom need to be replaced.
Which of the following is a form of solid-state storage?
Thumb drive
Which of the following is not used to transmit signals on an Ethernet network?
Topology
A ________ appears to be a legitimate program, but is actually something malicious.
Trojan horse
________ is an example of a microblogging site that allows a limited number of characters in a post.
The ________ is an early computer created in 1951, which was used to predict election results.
UNIVAC
The macOS operating system is based on ________.
UNIX
Which is NOT a mobile embedded operating system? 1) Microsoft Windows 2) Apple iOS 3) Google Android 4) UNIX Apache
UNIX Apache
In modern computers, FireWire ports have been largely replaced by ________ and Thunderbolt ports.
USB
Which symbol is allowed in file names?
Underscore (_)
Employees who are travelling can connect securely to their office network through the Internet when a ________ has been established.
VPN
Which of the following is NOT a Windows user account type? 1) Administrator 2) Standard 3) Child 4) Visitor
Visitor
A company with offices in Buffalo and Seattle would use dedicated ________ lines to connect the two offices.
WAN
According to the text, which of the following is NOT typically one of the important features when selecting a digital camera? 1) lenses 2) storage type 3) weight 4) resolution
Weight
In a WLAN, devices are connected by ________.
Wi-Fi
________ is one of the largest online video-hosting sites in the world.
YouTube
________ is the most popular video-sharing service on the Internet.
Youtube
Procedural programming involves ________.
a step-by-step list of instructions
Alan Turing is known for developing ________.
a test that tests a machine's ability to display intelligent behavior
A router is a form of security because it ________.
acts like a firewall
You would install a(n) ________ if you wanted to enable new capabilities in your web browser.
add-on
When using Windows to make changes, install hardware, or configure settings, you need to use the ________ account on your computer.
administrator
A(n) ________ is a procedure that you would use to solve a problem.
algorithm
A moderated chat room ensures that ________.
all content is screened
Which of the following is NOT an example of speech recognition software? 1) siri 2) cortana 3) amazon respond 4) google now
amazon respond
The desired output from the ________ phase of the SDLC is a list of requirements for a new system.
analysis
The programs that make up the Control Panel are sometimes referred to as control panel ________.
applets
The ________ allows a program to request a service such as printing from the operating system.
application programming interface (API)
The ________ allows programs to run on computers with different hardware configurations.
application programming interface (API)
The Subscriber Identity Module (SIM card) stores all the following information on a mobile device, EXCEPT ________. 1) apps 2) cellular carrier 3) account information 4) phone identification
apps
Fifth-generation programming languages are primarily used in ________ applications.
artificial intelligence
One of the most important reasons for Ethernet standards is they ________.
assure equipment from different manufacturers is compatible
The test that a transaction processing system uses to make sure that transactions are fully completed or aren't undertaken at all is known as ________.
atomicity
An .mp3 file extension indicates that the file is a(n) ________ file.
audio
In a virtual community, you can communicate with other people by using a(n) ________.
avatar
The pre-release version of a program that is provided to some users and developers to preview and test before the final version is released, is called a(n) ________ version.
beta
Machine language is written in ________.
binary
A ________ is the smallest unit of digital data.
bit
Network speeds are measured in ________ per second.
bits
A ________ is similar to an online journal, in which you can write about anything you want to share.
blog
A ________ changes your home page and redirects you to other websites.
browser hijacker
________ mode enables you to take several pictures in quick succession by holding down the shutter button.
burst
Which type of memory is very fast and is located close to the processor?
cache
A distorted series of letters and numbers, called a ________, is used to ensure that you are a human and not a computer.
captcha
________ display the text of the audio in a video.
captions
The intersection of a row and a column in a spreadsheet is called a ________.
cell
A(n) ________ is a computer that connects to or requests services from a server.
client
A ________ network is one that has at least one computer that provides centralized management, resources, and security.
client-server
Businesses should use a ________ network to share resources.
client-server
Files saved to a hard disk are stored in ________.
clusters
________ is the process of converting an algorithm into a language the computer can understand.
coding
Wikis are designed for ________, which is allowing people to contribute more than just posting a response.
collaboration
An email claiming that you have won a lottery might be an example of ________.
computer fraud
A ________ computer has a screen that can swivel and fold to resemble a tablet.
convertible notebook
When you trust the collective opinion of a crowd of people rather than an expert, it is known as ________.
crowdsourcing
The cyberbullying of one adult by another adult, using a computer is known as ________.
cyber-harassment
Windows ________ helps to protect a computer from viruses and spyware.
defender
Without ________, the computer would not know how to use new hardware.
device drivers
The least expensive form of Internet connection is ________.
dial-up
A data ________ defines the fields in a database and the type of data that each field contains.
dictionary
All the information someone can find out about you by searching the web is called your ________.
digital footprint
Linux ________ include the OS, various utilities, software applications, and an office suite.
distros
A ________ is a network composed of a group of clients and servers under the control of one central security database.
domain
Which operating system is specialized, has limited function, and can run on simple hardware?
embedded
When the CPU retrieves an instruction from the main memory, that is known as the ________ process.
fetch
A(n) ________ is a single piece of information in a record in a database.
field
In a database, title, author, publication date, and ISBN are examples of ________.
fields
A ________ can be set by an employer to prevent you from accessing eBay.
firewall
An Excel spreadsheet is an example of a(n) ________ database.
flat
Which of the following is NOT a video streaming service? 1) netflix 2) flickr 3) hulu 4) amazon prime
flickr
A graphic view of an algorithm is called a ________.
flowchart
The distance at which subjects in front of the lens are in sharp focus is known as a camera's ________.
focal length
The most common way to enter data into a database, is to use a(n) ________.
form
Making money through in-app purchases is common in ________ software.
freemium
Which of the following is not a type of programming error? 1) syntax 2) runtime 3) logic 4) grammatical
grammatical
Hacking to make a political statement is called ________.
hacktivism
The type of folder structure created by Windows is known as a ________.
hierarchy
P2P networks are normally found in ________.
homes
Wireless access points that are available in public spaces are called ________.
hotspots
The online free storage provided by Apple is called ________.
iCloud
________ allows you to sync your photos between your iPhone and your Mac.
iCloud
The iPhone, iPad, and iPod touch use the ________ operating system.
iOS
Camera shake can be reduced by using a camera that provides ________.
image stabilization
________ counteracts camera shake and allows you to take sharper images.
image stabilization
Windows maintains a(n) ________ on your system that helps to speed up searches.
index
A database is a collection of ________ that has been organized in a meaningful way.
information
The most common personal printer is the ________ printer.
inkjet
The fetch-and-execute cycle is also called the ________ cycle.
instruction
Third-generation computers are characterized by the use of ________.
integrated circuits
In the Windows operating system, the Documents, Music, Pictures, and Videos folders are known as ________.
libraries
When using a Windows PC, you can use a ________ to organize similar files that are located in different locations.
library
The Android operating system is the embedded version of ________.
linux
A ________ error is an error in programming design that results in an unexpected outcome.
logic
To ensure that a person does not misspell Wednesday in a field, a(n) ________ list can be used.
lookup
In Excel, you can use ________ to automate tasks.
macros
Hard drives store data ________.
magnetically
During the ________ phase of the SDLC, updates to the system may occur, bugs are fixed, and new features are added.
maintenance
The SDLC follows the development of a system from planning to the final stage, ________.
maintenance
An expert system is a computer programmed to ________.
make decisions in real-life situations
Clickjacking results in ________.
malware posting unwanted links on your Facebook page
The collection of websites that enable users to create user-generated content, connect, network, and share is called social ________.
media
The ________ is a complex integrated circuit that enables it to act as the brain of the computer.
microprocessor
Fourth-generation computers use ________.
microprocessors
Smartphones have the ability to download additional programs, called ________, to extend their capabilities, making them convergence devices.
mobile applications
Pixels are most closely associated with ________.
monitors
Data in a ________ database are stored in data cubes.
multidimensional
The total zoom available on a camera is determined by digital zoom ________ optical zoom.
multiplied by
The science and telecommunications industries would most likely use the ________ database type.
object-oriented
When you define objects and the actions that can be performed on them, you are using ________ programming.
object-oriented
Microsoft Office is an example of a(n) ________.
office support system (OSS)
In a relational database for vehicles, a ________ relationship occurs when each vehicle record may link to several repair records, but each repair can link to only one vehicle.
one-to-many
The ________ is the most important software on a PC.
operating system
Forcing a processor to run at speeds higher than it was designed to perform is known as ________.
overclocking
A(n) ________, also known as a hotfix, addresses individual software problems as they are discovered.
patch
The sequence of folders to a file or a folder is known as the file's ________.
path
Another name for the actual attack caused by a virus is a ________.
payload
A ________ network is a network in which all computers are considered equal.
peer-to-peer
Each computer is considered equal in a ________ network.
peer-to-peer
A ________ enables you to manage your email, calendar, contacts, and tasks—all in one application.
personal information manager
An email supposedly from your bank asking for your password so that it can troubleshoot your account is a form of ________.
phishing
When you decide to use your neighbor's open wireless network without permission, you are ________.
piggybacking
A method by which the CPU can be processing four instructions at the same time is called ________.
pipelining
In the ________ phase of the SDLC, the project team is assembled and the feasibility studies are completed.
planning
An online environment for programming that allows development, testing, and deploying custom applications is called ________.
platform-as-a-service
A third-party program, such as Adobe Flash Player, is considered to be a(n) ________.
plug-in
Basic ________ cameras are easy to use, but most do not have a viewfinder to help you frame an image.
point-and-shoot
In a one-to-one relationship, both tables use the same ________ to link two records.
primary key
A ________ helps you to complete projects, keep within your budget, stay on schedule, and work with others.
project management software
File information such as type, size, and date are called file ________.
properties
The rules for communication between network devices are called ________.
protocols
A ________ could be used to retrieve all the phone numbers from a student database.
query
A ________ contains the information for a single entity in the database.
record
A(n) ________ contains information about a single entry in a database.
record
The ________ database is the most popular type used by businesses.
relational
To print data or display it in an easy-to-read format, a ________ can be used.
report
One disadvantage to e-ink technology is that it ________. 1) requires an external light for night reading 2) causes eye strain 3) cannot be read in bright light 4) has a short battery life
requires an external light for night reading
A digital camera's image quality is determined by the camera's ________.
resolution
If your computer has a ________, someone else can gain access to it undetected.
rootkit
A ________ connects two or more networks together.
router
A ________ is a device that connects two or more networks together.
router
If you want to connect your home network to the Internet, you will need a ________ in addition to a modem.
router
Podcasts allow time ________, so you can listen on your own schedule.
shifting
The time between a person pressing the button and the camera taking the picture is called ________.
shutter lag
Antivirus software uses ________ to search for known viruses.
signature checking
An email ________ is a block of text that is automatically put at the end of your messages.
signature line
All of the following are examples of malware, EXCEPT ________. 1) worms 2) spam 3) viruses 4) spyware
spam
In addition to performing calculations, ________ organize data that can be sorted and filtered, making the data functional for lists and schedules.
spreadsheets
You should use a(n) ________ account for everyday computing on a computer running Windows.
standard
A(n) ________ allows someone to use software for a monthly or yearly fee.
subscription
A ________ is a device that connects multiple devices on a LAN.
switch
Most home routers also include a built-in ________.
switch
If you misspell a command word in a computer program, you have created a ________ error.
syntax
The rules that ensure the correct construction of commands in a programming language is called the ________.
syntax
The ________ software makes the computer run.
system
When you purchase software in a box, reading the ________ is important to know if the software will function properly.
system requirements
The ________ is the logical model of a new system.
system specification report
The ________ houses the power supply, memory, and drive bays of the computer.
system unit
In a database, a ________ stores data in rows and columns.
table
In a database, related records are organized into one or more ________.
tables
The term "cloud" in cloud computing refers to ________.
the Internet
Distributed computing distributes ________.
the processing of tasks across a group of computers
C++ is an example of a ________-generation language.
third
Adding a browser ________ gives you quick access to the features of the application that installed it.
toolbar
A(n) ________ is most commonly found on a notebook computer.
touchpad
Second-generation computers used ________.
transistors
An autofocus camera mechanically adjusts the focal length by moving the lens in or out.
true
The resolution of a camera is calculated by multiplying the length by the width of the image in pixels.
true
You can use a wide-angle lens for shooting an image such as a landscape.
true
To secure your wireless network at home, you should ________.
use wireless encryption with a difficult passphrase
A data ________ rule would prevent a user from entering text in a date/time field.
validation
The difference between a virus and a worm is a ________.
virus needs a host file, but a worm does not
Moving through a neighborhood trying to locate open wireless access points is called ________.
wardriving
The SDLC, the traditional model for system development, is also called the ________ model.
waterfall
Programs that interpret HTML to display webpages are called ________.
web browsers
________ provide the ability to carry on two-way visual communication with people in different locations.
webcams
When a company pays people to hack into its own system, it calls in ________ hackers.
white-hat
A(n) ________ is a high-end desktop computer or one that is connected to a network in a business setting.
workstation