IST 110 (ALL)

Ace your homework & exams now with Quizwiz!

Which of the following extensions is associated with a video file?

.wmv

Eight bits equal ________ byte(s).

1

Before November 2017, tweets were limited to ________ characters each.

140

A binary code using eight bits has ________ different possible combinations.

256

________ contains the tasks and dates for a project and shows the schedule and progress of the project in a graphic.

A Gantt chart

________ is a small, portable, solid-state drive.

A flash drive

What is the Internet backbone?

A high-speed connection between networks

The central processing unit consists of the control unit and the ________.

ALU

Which of the following is NOT part of Microsoft Office Online web apps? 1) Excel 2) PowerPoint 3) OneNote 4) Access

Access

An end user license agreement represents which of the following?

Agreement between the user and the software publisher

What is NOT true about the private cloud? 1) Backups are done automatically 2) Uses Internet technologies 3) Also available to the public 4) Used for a company's internal organization

Also available to the public

________ is an example of a wearable computer.

An Apple Watch

A computer can be a flexible and powerful tool by using what type of software?

Application

________ communication allows you to send a message that the receiver can access later.

Asynchronous

When sending one email to everyone in your address book, you should use the ________ field to keep their addresses private.

Bcc

________ hackers hack into systems to steal or vandalize.

Black-hat

To connect peripherals at short ranges, you would use the ________ wireless technology.

Bluetooth

Which of the following is a short-range wireless technology?

Bluetooth

What is the oldest optical disc still in use today?

CD

The ________ is the brain of the computer.

CPU

Which of the following is NOT a valid character in a file name? 1) Semicolon (;) 2) Colon (:) 3) Underscore (_) 4) Hyphen (-)

Colon (:)

________ raises money from multiple small investors rather than a few large ones.

Crowdfunding

When using Windows, to select all the folders in a window you simultaneously press the ________ and A keys.

Ctrl

Which cybercrime is considered to be a form of harassment?

Cyber-stalking

________ is an unlawful attack on computers or networks done to intimidate a government or its people.

Cyber-terrorism

By default, Windows computers are set to obtain an IP address automatically, using ________.

DHCP

________ technologies use telephone lines to carry digital signals.

DSL

Which type of camera would be the best choice for a photographer who prefers to manually adjust the focus and exposure for each image?

DSLR

The Internet was originally created as a communication system for the ________.

Department of Defense

________ computers offer the most speed, power, and upgradability for the lowest cost.

Desktop

The Windows ________ utility looks for files that can safely be deleted to free up disk space.

Disk Cleanup

________ is a form of freeware, where the developers accept contributions for themselves or for nonprofit organizations.

Donationware

________ are found on the motherboard and are used to attach your hard disk.

Drive controllers

________ printers produce lab-quality prints of your photos.

Dye-sublimation

The ________ was first designed to calculate artillery firing tables.

ENIAC

The ________ was the first working, digital, general-purpose computer.

ENIAC

What CANNOT be done with most video editing software? 1) Add captions 2) Edit pictures created in the software 3) Burn to a DVD 4) Upload to the web

Edit pictures created in the software

________ is an example of asynchronous communication.

Email

________ is the study of the relationship between workers and their workspaces.

Ergonomics

Which of the following applications is not part of an office application suite?

Financial

The ________ in macOS is used to locate and arrange files, folders, and applications.

Finder

________ is one of the largest online image-sharing sites in the world.

Flickr

Which is NOT a modern source of installing software? 1) Flash drive 2) Floppy drive 3) CD/DVD 4) Web

Floppy drive

________ make data entry easier because they can be set up to match the layout of a paper document.

Forms

Which generation of programming languages is closer to natural language but still requires some programming knowledge?

Fourth-generation

________ can be used at no cost for an unlimited period of time.

Freeware

Today's processor speeds are measured in ________.

GHz

The ________ is a tracking system created by the U.S. Department of Defense that uses satellites for navigation.

GPS

________ computing refers to the efficient and eco-friendly use of computers.

Green

________ is the authoring language that defines the structure of a webpage.

HTML

Which of the following is not a common LAN topology?

Hierarchal

What project was coordinated by the U.S. Department of Energy and the National Institutes of Health?

Human Genome Project

Wi-Fi networks used in homes and public hotspots use the ________.

IEEE 802.11 standards

Which is a type of data that can be stored in an object-oriented database?

Images, audio, and video

In what phase of the SDLC does testing occur?

Implementation

In what phase of the SDLC does user training take place?

Implementation

Which is not an advantage of data normalization? 1) Makes it easier to update records 2) Increases query speed 3) Reduces the database size 4) Increases database development time

Increases database development time

Which of the following is a method of synchronous online communication? 1) Instant messaging 2) Email 3) Forum 4) Newsgroup

Instant messaging

________ allows you to communicate with one or more people at a time.

Instant messaging

Which of the following is NOT a cloud service provider? 1) Intel 2) Salesforce 3) Google 4) Amazon

Intel

Which of the following types of storage has a relatively low price per GB, fast transfer speed, and is secure inside a system unit?

Internal hard drive

Which of the following would NOT be a recommended place to back up computer files? 1) Internal hard drive 2) DVD 3) Flash drive 4) External drive

Internal hard drive

Which statement about a logic bomb is false? 1) It is often planted by a disgruntled IT worker. 2) It can spread to other machines. 3) It can lay dormant until specific conditions are met. 4) It can be triggered on a specific date.

It can spread to other machines.

Which statement about email is false? 1) Copies of your email may exist on several servers even after the recipient deletes it. 2) Your employer may read your email at your work. 3) It cannot be accessed by hackers. 4) Email can be used for targeted marketing.

It cannot be accessed by hackers.

What is NOT true about analytics? 1) It can raise profits. 2) It can help a business make decisions. 3) It detects patterns in data. 4) It comes standard in Project Management software.

It comes standard in Project Management software.

Which of the following is NOT true about a keypad? 1) It is normally used in POS systems. 2) It can make game play easier. 3) It contains special, programmable characters. 4) It has a limited number of keys.

It contains special, programmable characters.

Which is NOT an advantage of using a cloud storage service? 1) It is easy to set up. 2) It is faster than other backup options. 3) It can be set to back up files automatically. 4) It keeps your backups at a different location.

It is faster than other backup options.

What is NOT true about Firewire? 1) It is a legacy port. 2) It was released by Apple. 3) It is hot-swappable. 4) It is also known as IEEE 1394.

It is hot-swappable.

What is NOT true about hyper-threading? 1) It is a technology implemented by Intel. 2) It is a virtual form of parallel processing. 3) It enables one CPU to appear as two logical processors. 4) It is not dependent on those who write software.

It is not dependent on those who write software.

For a company that uses only one or two floors of an office building, all the company's computers and printers will be connected by a ________.

LAN

The 4G network standard includes ________ technologies.

LTE

________ is a social network that is designed for business connections.

LinkedIn

ZIP files use what type of compression?

Lossless

MP3 stands for ________.

MPEG-1 Audio Layer 3

What is the most common desktop operating system?

Microsoft Windows

________ Law predicted that the number of transistors placed on an integrated circuit would double approximately every two years.

Moore's

Which of the following is NOT an example of an expansion card? 1) Video card 2) TV tuner 3) Motherboard 4) Modem

Motherboard

Which of the following is NOT a Boolean operator? 1) NOR 2) NOT 3) OR 4) AND

NOR

Which Boolean operator would you use to exclude a term in your search results?

NOT

When the Internet backbone was privatized, five large ________ Access Points made up the new backbone.

Network

What is NOT true about the public cloud? 1) None offer desktop applications 2) Often has limited free storage 3) Available to the public 4) Network of shared resources

None offer desktop applications

Which of the following is a network operating system (NOS)?

Novell

The free online storage provided by Microsoft is called ________.

OneDrive

________ allows the user to selectively extract data from different viewpoints.

Online analytical processing (OLAP)

________ software can be copied, modified, and redistributed without paying a fee.

Open source

________ software provides the user with an interface to communicate with the computer's hardware.

Operating system

The Windows ________ utility rearranges files on a hard drive in order to improve efficiency.

Optimize Drives

________ recommends music to you based on your listening preferences.

Pandora

________ uses multiple processors, or multi-core processors, to share processing tasks.

Parallel processing

________ redirects you to a phony website by hijacking a domain name.

Pharming

Which is the correct order of the phases in the SDLC?

Planning, analysis, design, implementation and testing, maintenance

When you connect a printer to your computer, ________ allows the operating system to detect the printer to make setup easier.

PnP

The ________ is a set of five steps that a programmer follows to create a computer program.

Program Development Cycle

________ conveys the steps of an algorithm using English-like statements that focus on logic, not syntax.

Pseudocode

Which of the following is not a SQL relational keyword? 1) WHERE 2) QUIT 3) FROM 4) SELECT

QUIT

Which of the following types of memory is nonvolatile?

ROM

You can subscribe to ________ feeds to stay up-to-date on podcasts and news feeds.

RSS

Using System ________ returns your operating system to a previous point in time.

Restore

Which device on a network performs network address translation?

Router

When you set up your wireless router, you should change the ________, which is also called the wireless network name.

SSID

Which broadband service are you likely to use if you live in a very remote area?

Satellite

Sophia heard about some media software with a free trial download. She thought it would be a good idea to try it before buying. She is using which type of proprietary software?

Shareware

An intelligent personal assistant app for Apple devices that allows you to speak using natural language is known as ________.

Siri

________ technology is used for sending email messages.

Store-and-forward

Which would make the best primary key in a table?

Student ID

________ are very expensive, complex computer systems used in weather forecasting and medical research.

Supercomputers

________ consists of these four components: input, processing, storage, and output.

The information processing cycle

What was the ARPANET?

The origins of the Internet

Which of the following statements about P2P networks is false? 1) They can only support a small number of devices. 2) The services and security are centralized. 3) All computers are considered equal. 4) They can share a printer.

The services and security are centralized.

Which statement about smartphones is FALSE? 1) They are limited to the programs already installed during production. 2) They run a mobile operating system. 3) They combine phone, PDA, and MP3 player capabilities. 4) They are convergence devices.

They are limited to the programs already installed during production

What is not true about pop-up blockers? 1) They are triggered by cookies. 2) They prevent webpages from opening a new window. 3) They can be configured for different sites. 4) They can serve useful purposes.

They are triggered by cookies.

What is NOT true about default programs? 1) They cannot be changed 2) Doesn't work well with generic file extensions 3) Automatically opens the correct program 4) List is maintained by the operating system

They cannot be changed

Which statement about cookies is false? 1) They are used by websites to identify you. 2) They are small text files. 3) They cannot collect information you do not want to share. 4) They can be installed without your knowledge.

They cannot collect information you do not want to share.

What is not true about vacuum tubes? 1) They resemble light bulbs. 2) They seldom need to be replaced. 3) They generate a lot of heat when operating. 4) They were used in first-generation computers.

They seldom need to be replaced.

Which of the following is a form of solid-state storage?

Thumb drive

Which of the following is not used to transmit signals on an Ethernet network?

Topology

A ________ appears to be a legitimate program, but is actually something malicious.

Trojan horse

________ is an example of a microblogging site that allows a limited number of characters in a post.

Twitter

The ________ is an early computer created in 1951, which was used to predict election results.

UNIVAC

The macOS operating system is based on ________.

UNIX

Which is NOT a mobile embedded operating system? 1) Microsoft Windows 2) Apple iOS 3) Google Android 4) UNIX Apache

UNIX Apache

In modern computers, FireWire ports have been largely replaced by ________ and Thunderbolt ports.

USB

Which symbol is allowed in file names?

Underscore (_)

Employees who are travelling can connect securely to their office network through the Internet when a ________ has been established.

VPN

Which of the following is NOT a Windows user account type? 1) Administrator 2) Standard 3) Child 4) Visitor

Visitor

A company with offices in Buffalo and Seattle would use dedicated ________ lines to connect the two offices.

WAN

According to the text, which of the following is NOT typically one of the important features when selecting a digital camera? 1) lenses 2) storage type 3) weight 4) resolution

Weight

In a WLAN, devices are connected by ________.

Wi-Fi

________ is one of the largest online video-hosting sites in the world.

YouTube

________ is the most popular video-sharing service on the Internet.

Youtube

Procedural programming involves ________.

a step-by-step list of instructions

Alan Turing is known for developing ________.

a test that tests a machine's ability to display intelligent behavior

A router is a form of security because it ________.

acts like a firewall

You would install a(n) ________ if you wanted to enable new capabilities in your web browser.

add-on

When using Windows to make changes, install hardware, or configure settings, you need to use the ________ account on your computer.

administrator

A(n) ________ is a procedure that you would use to solve a problem.

algorithm

A moderated chat room ensures that ________.

all content is screened

Which of the following is NOT an example of speech recognition software? 1) siri 2) cortana 3) amazon respond 4) google now

amazon respond

The desired output from the ________ phase of the SDLC is a list of requirements for a new system.

analysis

The programs that make up the Control Panel are sometimes referred to as control panel ________.

applets

The ________ allows a program to request a service such as printing from the operating system.

application programming interface (API)

The ________ allows programs to run on computers with different hardware configurations.

application programming interface (API)

The Subscriber Identity Module (SIM card) stores all the following information on a mobile device, EXCEPT ________. 1) apps 2) cellular carrier 3) account information 4) phone identification

apps

Fifth-generation programming languages are primarily used in ________ applications.

artificial intelligence

One of the most important reasons for Ethernet standards is they ________.

assure equipment from different manufacturers is compatible

The test that a transaction processing system uses to make sure that transactions are fully completed or aren't undertaken at all is known as ________.

atomicity

An .mp3 file extension indicates that the file is a(n) ________ file.

audio

In a virtual community, you can communicate with other people by using a(n) ________.

avatar

The pre-release version of a program that is provided to some users and developers to preview and test before the final version is released, is called a(n) ________ version.

beta

Machine language is written in ________.

binary

A ________ is the smallest unit of digital data.

bit

Network speeds are measured in ________ per second.

bits

A ________ is similar to an online journal, in which you can write about anything you want to share.

blog

A ________ changes your home page and redirects you to other websites.

browser hijacker

________ mode enables you to take several pictures in quick succession by holding down the shutter button.

burst

Which type of memory is very fast and is located close to the processor?

cache

A distorted series of letters and numbers, called a ________, is used to ensure that you are a human and not a computer.

captcha

________ display the text of the audio in a video.

captions

The intersection of a row and a column in a spreadsheet is called a ________.

cell

A(n) ________ is a computer that connects to or requests services from a server.

client

A ________ network is one that has at least one computer that provides centralized management, resources, and security.

client-server

Businesses should use a ________ network to share resources.

client-server

Files saved to a hard disk are stored in ________.

clusters

________ is the process of converting an algorithm into a language the computer can understand.

coding

Wikis are designed for ________, which is allowing people to contribute more than just posting a response.

collaboration

An email claiming that you have won a lottery might be an example of ________.

computer fraud

A ________ computer has a screen that can swivel and fold to resemble a tablet.

convertible notebook

When you trust the collective opinion of a crowd of people rather than an expert, it is known as ________.

crowdsourcing

The cyberbullying of one adult by another adult, using a computer is known as ________.

cyber-harassment

Windows ________ helps to protect a computer from viruses and spyware.

defender

Without ________, the computer would not know how to use new hardware.

device drivers

The least expensive form of Internet connection is ________.

dial-up

A data ________ defines the fields in a database and the type of data that each field contains.

dictionary

All the information someone can find out about you by searching the web is called your ________.

digital footprint

Linux ________ include the OS, various utilities, software applications, and an office suite.

distros

A ________ is a network composed of a group of clients and servers under the control of one central security database.

domain

Which operating system is specialized, has limited function, and can run on simple hardware?

embedded

When the CPU retrieves an instruction from the main memory, that is known as the ________ process.

fetch

A(n) ________ is a single piece of information in a record in a database.

field

In a database, title, author, publication date, and ISBN are examples of ________.

fields

A ________ can be set by an employer to prevent you from accessing eBay.

firewall

An Excel spreadsheet is an example of a(n) ________ database.

flat

Which of the following is NOT a video streaming service? 1) netflix 2) flickr 3) hulu 4) amazon prime

flickr

A graphic view of an algorithm is called a ________.

flowchart

The distance at which subjects in front of the lens are in sharp focus is known as a camera's ________.

focal length

The most common way to enter data into a database, is to use a(n) ________.

form

Making money through in-app purchases is common in ________ software.

freemium

Which of the following is not a type of programming error? 1) syntax 2) runtime 3) logic 4) grammatical

grammatical

Hacking to make a political statement is called ________.

hacktivism

The type of folder structure created by Windows is known as a ________.

hierarchy

P2P networks are normally found in ________.

homes

Wireless access points that are available in public spaces are called ________.

hotspots

The online free storage provided by Apple is called ________.

iCloud

________ allows you to sync your photos between your iPhone and your Mac.

iCloud

The iPhone, iPad, and iPod touch use the ________ operating system.

iOS

Camera shake can be reduced by using a camera that provides ________.

image stabilization

________ counteracts camera shake and allows you to take sharper images.

image stabilization

Windows maintains a(n) ________ on your system that helps to speed up searches.

index

A database is a collection of ________ that has been organized in a meaningful way.

information

The most common personal printer is the ________ printer.

inkjet

The fetch-and-execute cycle is also called the ________ cycle.

instruction

Third-generation computers are characterized by the use of ________.

integrated circuits

In the Windows operating system, the Documents, Music, Pictures, and Videos folders are known as ________.

libraries

When using a Windows PC, you can use a ________ to organize similar files that are located in different locations.

library

The Android operating system is the embedded version of ________.

linux

A ________ error is an error in programming design that results in an unexpected outcome.

logic

To ensure that a person does not misspell Wednesday in a field, a(n) ________ list can be used.

lookup

In Excel, you can use ________ to automate tasks.

macros

Hard drives store data ________.

magnetically

During the ________ phase of the SDLC, updates to the system may occur, bugs are fixed, and new features are added.

maintenance

The SDLC follows the development of a system from planning to the final stage, ________.

maintenance

An expert system is a computer programmed to ________.

make decisions in real-life situations

Clickjacking results in ________.

malware posting unwanted links on your Facebook page

The collection of websites that enable users to create user-generated content, connect, network, and share is called social ________.

media

The ________ is a complex integrated circuit that enables it to act as the brain of the computer.

microprocessor

Fourth-generation computers use ________.

microprocessors

Smartphones have the ability to download additional programs, called ________, to extend their capabilities, making them convergence devices.

mobile applications

Pixels are most closely associated with ________.

monitors

Data in a ________ database are stored in data cubes.

multidimensional

The total zoom available on a camera is determined by digital zoom ________ optical zoom.

multiplied by

The science and telecommunications industries would most likely use the ________ database type.

object-oriented

When you define objects and the actions that can be performed on them, you are using ________ programming.

object-oriented

Microsoft Office is an example of a(n) ________.

office support system (OSS)

In a relational database for vehicles, a ________ relationship occurs when each vehicle record may link to several repair records, but each repair can link to only one vehicle.

one-to-many

The ________ is the most important software on a PC.

operating system

Forcing a processor to run at speeds higher than it was designed to perform is known as ________.

overclocking

A(n) ________, also known as a hotfix, addresses individual software problems as they are discovered.

patch

The sequence of folders to a file or a folder is known as the file's ________.

path

Another name for the actual attack caused by a virus is a ________.

payload

A ________ network is a network in which all computers are considered equal.

peer-to-peer

Each computer is considered equal in a ________ network.

peer-to-peer

A ________ enables you to manage your email, calendar, contacts, and tasks—all in one application.

personal information manager

An email supposedly from your bank asking for your password so that it can troubleshoot your account is a form of ________.

phishing

When you decide to use your neighbor's open wireless network without permission, you are ________.

piggybacking

A method by which the CPU can be processing four instructions at the same time is called ________.

pipelining

In the ________ phase of the SDLC, the project team is assembled and the feasibility studies are completed.

planning

An online environment for programming that allows development, testing, and deploying custom applications is called ________.

platform-as-a-service

A third-party program, such as Adobe Flash Player, is considered to be a(n) ________.

plug-in

Basic ________ cameras are easy to use, but most do not have a viewfinder to help you frame an image.

point-and-shoot

In a one-to-one relationship, both tables use the same ________ to link two records.

primary key

A ________ helps you to complete projects, keep within your budget, stay on schedule, and work with others.

project management software

File information such as type, size, and date are called file ________.

properties

The rules for communication between network devices are called ________.

protocols

A ________ could be used to retrieve all the phone numbers from a student database.

query

A ________ contains the information for a single entity in the database.

record

A(n) ________ contains information about a single entry in a database.

record

The ________ database is the most popular type used by businesses.

relational

To print data or display it in an easy-to-read format, a ________ can be used.

report

One disadvantage to e-ink technology is that it ________. 1) requires an external light for night reading 2) causes eye strain 3) cannot be read in bright light 4) has a short battery life

requires an external light for night reading

A digital camera's image quality is determined by the camera's ________.

resolution

If your computer has a ________, someone else can gain access to it undetected.

rootkit

A ________ connects two or more networks together.

router

A ________ is a device that connects two or more networks together.

router

If you want to connect your home network to the Internet, you will need a ________ in addition to a modem.

router

Podcasts allow time ________, so you can listen on your own schedule.

shifting

The time between a person pressing the button and the camera taking the picture is called ________.

shutter lag

Antivirus software uses ________ to search for known viruses.

signature checking

An email ________ is a block of text that is automatically put at the end of your messages.

signature line

All of the following are examples of malware, EXCEPT ________. 1) worms 2) spam 3) viruses 4) spyware

spam

In addition to performing calculations, ________ organize data that can be sorted and filtered, making the data functional for lists and schedules.

spreadsheets

You should use a(n) ________ account for everyday computing on a computer running Windows.

standard

A(n) ________ allows someone to use software for a monthly or yearly fee.

subscription

A ________ is a device that connects multiple devices on a LAN.

switch

Most home routers also include a built-in ________.

switch

If you misspell a command word in a computer program, you have created a ________ error.

syntax

The rules that ensure the correct construction of commands in a programming language is called the ________.

syntax

The ________ software makes the computer run.

system

When you purchase software in a box, reading the ________ is important to know if the software will function properly.

system requirements

The ________ is the logical model of a new system.

system specification report

The ________ houses the power supply, memory, and drive bays of the computer.

system unit

In a database, a ________ stores data in rows and columns.

table

In a database, related records are organized into one or more ________.

tables

The term "cloud" in cloud computing refers to ________.

the Internet

Distributed computing distributes ________.

the processing of tasks across a group of computers

C++ is an example of a ________-generation language.

third

Adding a browser ________ gives you quick access to the features of the application that installed it.

toolbar

A(n) ________ is most commonly found on a notebook computer.

touchpad

Second-generation computers used ________.

transistors

An autofocus camera mechanically adjusts the focal length by moving the lens in or out.

true

The resolution of a camera is calculated by multiplying the length by the width of the image in pixels.

true

You can use a wide-angle lens for shooting an image such as a landscape.

true

To secure your wireless network at home, you should ________.

use wireless encryption with a difficult passphrase

A data ________ rule would prevent a user from entering text in a date/time field.

validation

The difference between a virus and a worm is a ________.

virus needs a host file, but a worm does not

Moving through a neighborhood trying to locate open wireless access points is called ________.

wardriving

The SDLC, the traditional model for system development, is also called the ________ model.

waterfall

Programs that interpret HTML to display webpages are called ________.

web browsers

________ provide the ability to carry on two-way visual communication with people in different locations.

webcams

When a company pays people to hack into its own system, it calls in ________ hackers.

white-hat

A(n) ________ is a high-end desktop computer or one that is connected to a network in a business setting.

workstation


Related study sets

Chapter 11-13 Review Finance & Valuation

View Set

Chapter 11: water and major minerals

View Set

ADN 120 Unit 2 Intracranial Regulation, Immunity, Inflammation, Infection, Reproduction and Sexuality

View Set

Analyzing Conflicting Information-Quiz- Level H

View Set

5.3 classification of investment

View Set