Microcomputer Applications
One kilobyte equals _____ bytes.
1,024
The average speed for 4G devices is often advertised as _____ times faster than 3G.
10
USB 3.0 is approximately _____ times faster than USB 2.0.
10
In what year was the first Mac OS released?
1984
The generation of web pages that allowed people to collaborate and share information with the website are known collectively as Web
2.0
Firefox was originally released in
2004
When was Google+ launched?
2011
What is the storage capacity of a single-layer Blu-ray disc?
25 GB
According to McAfee Threats Reports for early 2012, _____ computers worldwide were infected by botnets.
4 to 5 million
Chapter 5 mentions that in the area of entertainment software, World of Warcraft (WoW) has more than _____ subscribers.
7,000,000
As of June 2012, Facebook reported that it had _____ active users.
955 million
This common plug-in is used to view PDF documents.
Adobe Reader
Chapter 6 shows how this company maintains a customer service support page on Facebook.
Amazon
This mobile operating system has the biggest market share for mobile devices.
Android
Which of the following is a free, open source audio recording and edition software application?
Audacity
As you type, these two Word features help you fix common typing errors and format common characters.
AutoCorrect and AutoFormat
The _____ feature automatically scales the font size and adjusts spacing between points to fit text within a placeholder.
AutoFit
The company Research in Motion (RIM) developed which of the following mobile operating systems?
Blackberry OS
On a Windows system, the hard disk drive is usually assigned the drive letter
C
Google+ has four default circles. Which of the following is not one of them?
Celebrities
What is the name of Google's entry in the web browser market?
Chrome
How do you display the Numbering Library?
Click the Numbering button arrow.
You can use buttons in the _____ group of the SMARTART TOOLS DESIGN tab to add shapes or change the direction of the layout, and move shapes up or down the layout.
Create Graphic
To change a presentation's theme after the presentation has been created, begin by clicking the _____ tab.
DESIGN
In its discussion of _____, Chapter 6 describes an import utility that will import bookmarks you have saved in your browser.
Delicious
In a Windows operating system, which utility would you use to delete temporary Internet files and files moved to the Recycle Bin?
Disk Cleanup
Which of the following is discussed in Chapter 5 as an example of a document management system?
Dokmee
_____ a cell to open it for editing in the worksheet area.
Double-click
Google _____ is the SaaS formerly known as Google Docs.
Drive
You can delete the contents of the active cell by clicking the Clear button in the _____ group of the _____ tab.
Editing; HOME
What does EULA stand for?
End User License Agreement
_____ involves the design of equipment and workspace to promote safe and comfortable operation by the individual.
Ergonomics
A network interface card (NIC) is often referred to in computer advertisements as a(n) _____ port.
Ethernet
This financial function calculates the future value of a series of regular payments that earn a constant interest rate.
FV
The file management utility in Windows 8 is called
File Explorer.
In Mac OS X, file management tasks are handled through the _____ utility.
Finder
In which tab will you find the New Slide button?
HOME
The markup language used to create web pages is known by these initials.
HTML
In Google+, you can conduct video chats with this feature.
Hangout
The nonprofit organization in charge of keeping track of the Internet addresses and names all over the world is known by the initials:
ICANN
To add the copyright symbol to your document, begin by clicking the Symbol button on the _____ tab.
INSERT
Which acronym describes a company that provides access to the Internet's infrastructure for a fee?
ISP
You can add a chart to a slide using the Insert Chart button in the _____ group of the _____ tab.
Illustrations; INSERT
Two popular desktop publishing software programs are Adobe's _____ and Microsoft's _____.
InDesign; Publisher
Ultrabooks were originally named by _____ to differentiate them from older, bigger notebooks.
Intel
When a computing device is connected to the Internet, it is assigned a unique address called a(n) _____ address.
Internet Protocol (IP)
How does LinkedIn differ from Facebook and Google+?
It is more business-related.
This alternative to LCD displays is more expensive but consumes less energy.
LED
Scrobbler is the app from this music sharing website.
Last.fm
The Android mobile OS is based on
Linux
Which of the following operating systems is open source?
Linux
The open source OpenOffice productivity suite has been modified and repackaged under the name
Lotus Symphony.
Chapter 7 mentions that this type of computer was once considered safe from viruses but is now the focus of new malware.
Macs
Chapter 6 discusses three social networking sites, including all of the following except
MySpace
The _____ displays the active cell address or the name assigned to the active cell.
Name box
Apple devices contain three personal information management applications. Which of the following is not one of them?
Notes
What is the name of Microsoft's note-taking software?
OneNote
Buttons in the _____ tab are used to edit an image inserted into a document.
PICTURE TOOLS FORMAT
Once a picture has been inserted in a presentation, it can be resized using tool on the _____ tab.
PICTURE TOOLS FORMAT
_____ is similar to phishing except that the individual is tricked into typing in personal information at a phony website.
Pharming
You can add a border to an inserted picture with options in the _____ group of the PICTURE TOOLS LAYOUT tab.
Picture Styles
This feature automatically searches for and loads the appropriate driver when a new device is attached to the computer.
Plug and Play
Which popular plug-in come from Apple?
QuickTime
Which of the following is a popular program used for managing personal finances?
Quicken
What is the Mac OS X equivalent of the Windows Disk Cleanup utility?
Repair Disk
Text messages on mobile devices are sent using a service abbreviated as
SMS
When you are using software that is not installed on your computing device, you are using a(n) _____ application.
SaaS
The first time you save a document, clicking the Save button on the Quick Access Toolbar will cause the _____ to appear.
Save As Backstage view
A supercomputer named _____ at the Lawrence Livermore National Laboratory was named the top supercomputer in the Top 500 list of most powerful computers.
Sequoia
In Normal view, this pane displays at the left side of the screen.
Slide Thumbnail pane
_____ is a PowerPoint feature that uses graphics to visually communicate relationships in lists, processes, cycles, and hierarchies.
SmartArt
The decline of these two mobile operating systems is cited in Chapter 4 as an example of how the mobile market can change.
Symbian and Blackberry
The _____ feature is common to both PowerPoint and Word and allows you to organize text in columns and rows.
Table
How are rootkits different from other kinds of malware?
Their objective is not to spread to other computers.
In Mac OS X, the utility used to back up and restore files is called
Time Machine.
What type of malware disguises itself as a useful program?
Trojan horse
Three social bookmarking sites are discussed in Chapter 6. Which of the following is not one of them?
Tumblr
In Chapter 6, these two sites are categorized as microblogging services.
Twitter and Tumblr
_____ was designed as a server operating system.
UNIX
_____ computing refers to the fact that computing technology is everywhere and is used all the time.
Ubiquitous
Chapter 5 discusses three web-based productivity application suites. Which of the following is not one of them?
Ubuntu
_____ are a collection of different style and color schemes included in a theme family.
Variants
Which of the following is the latest security standard for wireless routers?
WPA2
What is the name of Quicken's legal software application?
WillMaker
Which of the following operating systems is the most popular?
Windows
What is the latest version of Microsoft's operating system?
Windows 8
Microsoft's earlier mobile OS, Windows Mobile, was replaced by
Windows Phone.
Font and paragraph formatting options in PowerPoint are the same as those in _____.
Word and Excel
Which of the following is the International Standards Organization (ISO) date format used by many global businesses?
YYYY-MM-DD
Can you send private messages on Facebook? If so, how?
Yes, with the Message tool.
What is the mathematical operator for exponentiation?
^
When you select a layout in the center pane of the Choose a SmartArt Graphic dialog box, what displays in the right pane?
a description of the layout and suggestions for its use
What displays when you click the WordArt button?
a drop-down list of WordArt styles
When a column's width has been made too narrow to show all of the characters, _____ displays instead.
a series of pound symbols (#####)
OneNote allows you to enter hand-written notes on a touch-enabled device via the use of
a stylus
The mixed addresses referred to in Chapter 9 are called mixed because they have both _____.
absolute and relative references
QuickBooks is a popular _____ application used by many small businesses.
accounting software
Apple uses _____ to designate versions of its Mac OS X family of operating systems.
animal names
Updating your family budget or writing a report for school are tasks you would accomplish with the _____ on your computer.
application software
A search phrase enclosed in quotations will return pages where the keywords
are in the same sequence
Social bookmarking is similar to using the Favorites list in your browser except that the links
are stored online on your social network
The inputs you supply for a function are referred to as parameters or _____.
arguments
A header is text that appears _____.
at the top of each page
The smallest unit of digital data in the binary system is called a
bit
A group of eight _____ is called a _____.
bits; byte
In Pinterest, you organize a collection of related pictures into a(n)
board
A category of social networking that provides tools with which you can organize, store, and share content with others is known as social
bookmarking
Starting a computer is called
booting
A collection of zombie computers used to conduct an attack on another network is called a
botnet
High-speed Internet access is referred to as
broadband
A software program used to view web pages is referred to as a web
browser
How do smart power strips reduce energy consumption?
by controlling the flow of power to peripheral devices when the main device is not active
In a table, the box that is the intersection of a row and a column is called a table _____.
cell
In Google+, the people you interact with are organized into categories called
circles
In this technique a button, graphic, or link on a web page appears to be real, but when clicked, causes malicious software to run.
clickjacking
In Chapter 1, Dropbox and Flickr are cited as examples of
cloud storage.
A cable modem connects to your cable network using a _____ cable, and from the cable modem to your computer or wireless router using a _____ cable.
coaxial; twisted pair
The combination of hardware architecture and software design that allows applications to run on your computer is referred to as the
computing platform
Technological _____ is the term used to describe the merging of several technologies into a single device.
convergence
The illegal activities involving computers discussed in Chapter 7 are collectively known as
cybercrime
In terms of the topics discussed in Chapter 7, DoS stands for
denial of service
Which of the following is not considered a mobile computer?
desktop computer
A USB wireless adapter is sometimes referred to as a
dongle
Server rooms are specially designed and maintained to avoid all of the following except
drafts.
These are the small programs the OS uses to communicate with devices connected to the computer.
drivers
Buying or selling over the Internet is known by this term.
e-commerce
IPv6 uses _____ groups of characters separated by _____.
eight; colons
From the Word Start screen, you can do any of the following except _____.
email a document to another user
Digital cameras, game consoles, and electronic thermostats are examples of devices that include
embedded computers.
Macro viruses are viruses that are
embedded in a document.
What type of operating systems will you find on devices such as ATMs and GPS units?
embedded operating systems
ERP software is used for
enterprise resource planning.
In a database table, columns are called _____ and rows are called _____.
fields; records
A _____ is hardware, software, or a combination of hardware and software that blocks unwanted access to your network.
firewall
Solid state drives (SSDs) use _____ to store information.
flash memory
All of the popular social networking sites discussed in Chapter 6 have _____ for use on your smartphone.
free mobile apps
A CPU's clock speed is usually measured in
gigahertz (GHz)
In the URL http://www.census.gov, the top level domain is
gov.
Chapter 4 mentions that Mac computers have been popular with _____ because of their hardware design.
graphic artists
Software programs for creating, editing, and manipulating drawings, photos, clip art, and scanned images are called _____ software.
graphics
In a worksheet, the active cell displays with a _____ border around it.
green
The alignment guides that help you position an inserted picture display as _____ horizontal and vertical lines.
green
All the physical components and devices comprising a computer are referred to as
hardware.
Chapter 7 lists three things you can do to prevent your computer from becoming a zombie, including 1) using antivirus software, 2) updating the OS regularly, and 3)
having an active firewall.
The Show/Hide button turns on or off the display of _____.
hidden formatting symbols
You can select cells using the keyboard by _____.
holding down the Shift key while you press an arrow key
The goal of Google's Android@Home project is to control _____ via an Android device.
household objects like a dishwasher or a heating system
What is the name of Apple's cloud based operating system?
iCloud
What is the name of Apple's mobile operating system?
iOS
Spiders and crawlers are used by search engines to generate
index entries.
Any device used to enter raw data or communicate instructions to the computer is referred to as a(n) _____ device.
input
Chapter 7 lists three common ways a computer can become infected with software that turns it into a zombie. Which of the following is not one of them?
installing an infected piece of hardware
What is the name for the process in which a CPU retrieves, decodes, executes, and stores an instruction?
instruction cycle
The PMT function cannot be used to estimate loan payments where the _____.
interest rate is variable
In Chapter 3, what reason is given for why OLED may replace LCD in the screens of mobile devices?
it consumes far less power
In a pie chart, each pie slice is sized to show _____.
its proportion to the total
Chapter 6 explains that blogs are basically _____ posted on a website with the most recent entry at the top of the page.
journals
Database management software
keeps track of large amounts of data
Each cell in a worksheet is identified with a _____ for the column and a _____ for the row.
letter, number
Pressing Shift + Enter inserts a _____, which moves the insertion point to the next line without creating a new paragraph.
line break
Debit and credit cards are read by
magnetic strip readers.
In the example given in the discussion of ubiquitous computing, a restaurant in California is using a sophisticated computer system to
manage sound levels.
Chapter 6 categorizes websites such as YouTube, Flickr, and Last.fm as _____ sites.
media sharing
Broadband connectivity speed is usually expressed as
megabits per second (Mbps)
Midrange servers used to be known as
minicomputers.
Handheld computing devices smaller than notebooks are referred to by the general term
mobile devices.
The main circuit board in a computer is called the
motherboard
On Windows computers, hard disk drives are assigned a drive letter; on a Mac computer, they are assigned a
name
A(n) _____ is two or more computers or other devices that are linked together to share resources and communicate with each other.
network
The device used to connect a computer to a network is called a
network adapter
The SmartArt List layout would be best used for _____.
non-sequential tasks or processes
Laptop computers are also referred to as
notebooks.
The COUNT function returns the _____ from the specified range.
number of cells that have values
What does Word do automatically when you use the Insert Caption feature?
numbers the pictures
Dates typed into a cell are stored as _____ values.
numerical
Chrome OS is designed for people who spend most of their computing time
on the Web
Resize an image in your slide by clicking and dragging _____.
one of the corner selection handles
In a DoS attack, a network or web server is
overwhelmed with network traffic
Chapter 5 explains that for professional publications, desktop publishing software is preferred over word processing software because of its advanced _____ capabilities.
page layout
Microsoft Outlook is an example of this type of productivity software.
personal information management
A message that appears to be from a bank directs the user to click a link and enter his or her account information, which is then used fraudulently. This is known as
phishing
Flickr is a popular _____ sharing website.
photo
Productivity software suites usually include all of the following applications except
photo editing
Connecting to someone else's wireless network without their consent is called
piggybacking
Resolution refers to the number of picture elements, or _____, that make up the image.
pixels
If you create a range with the name PricePerPound, which of the following would be recognized by Excel as the same name?
priceperpound
Which type of productivity software makes heavy use of Gantt charts to display data?
project management software
A rectangular-shaped group of cells is referred to as a _____.
range
Characters that are typed or otherwise entered into a computer are called
raw data.
In terms of video display, what does RGB stand for?
red, green, and blue
In a(n) _____ formula containing two addresses, both addresses will update if the formula is copied to a new location.
relative
Suppose someone sneaks into your house and unlocks the back door so other criminals can enter and steal your possessions. This is similar to what a _____ does.
rootkit
One of the things you can edit in an inserted photo is the purity of the colors, which is a characteristic referred to as _____.
saturation
A _____ is a device that uses optical technology to analyze text and/or images and convert them into data that can be used by the computer.
scanner
A personal computer (PC) is a computer in which the input, processing, and storage are
self-contained
A _____ is a computer with hardware and software that allows it to link together other computers in order to provide services and share resources.
server
When you add color behind text, it is called _____.
shading
In contrast to Facebook, Google+ lets you more easily
share information with a targeted group of people in your network.
When inserting a new slide, the _____ you choose determines the number, position, and type of content placeholders.
slide layout
When positioning an image in your slide, you can precisely align the image relative to adjacent text placeholders and margins with PowerPoint's horizontal and vertical _____.
smart guides
The AutoFormat feature converts straight apostrophes and quotation marks to _____.
smart quotes
What does SaaS stand for?
software as a service
Programs like Dragon NaturallySpeaking convert _____ into _____.
speech; text
Phishing and pharming scams use _____ techniques where a sender's email or IP address is altered to appear to be a trusted source.
spoofing
This type of software tracks your online activity without your knowledge.
spyware
Apple's iPad is an example of a(n)
tablet PC
In social bookmarking, bookmarks are created by _____ a website.
tagging
The Convert to SmartArt button converts existing _____ to a SmartArt graphic.
text
A cookie is a small _____ placed on your computer by a web server.
text file
To uninstall a program from your Windows system, you would begin by clicking Programs in
the Control Panel.
Several features new to Word 2013 are mentioned in Chapter 7. Which of the following is not one of them?
the ability to add clip art from Office.com
Moore's Law predicts a trend involving
the number of transistors that could be placed on a circuit.
At the Caption dialog box, what do you enter in the Caption text box?
the text that will appear as the caption
Most receipts you receive from retail stores are printed with a _____ printer.
thermal
According to Experian Hitwise's 2012 report, where does Pinterest rank in the United States in terms of the number of site visits?
third
The first slide in a presentation is a _____.
title slide
Chapter 7 lists several reasons why a DoS attack may be launched, including all of the following except
to steal personal information.
How many possible values are there for the smallest unit of data in a binary system?
two
Chapter 6 reports that as of June 2012, individuals are joining LinkedIn at a rate of
two new members per second.
Pinterest describes itself as a
virtual pinboard.
A _____ is a form of malware that once installed on a host computer, can replicate itself and spread to other computers.
virus
In Chapter 1, Google's Project Glass eyeglasses are discussed as an example of a(n)
wearable computer.
The web pages and resources needed for a website are stored on computers known as
web servers.
A _____ is a video camera built into a computer or plugged in as a peripheral.
webcam
A _____ is a collection of related web pages for one organization or individual.
website
QR codes are usually used to direct the reading device to a
website
_____ is a wiki described in Chapter 6; it contains over 140,000 how-to articles.
wikiHow
Microsoft Word is best described as a _____ application.
word processing
Files that you save in Excel are called _____.
workbooks
This type of malware is a self-replicating program that requires no action on the part of the user to copy itself to another computer.
worm
Computer-related tendonitis usually affects the
wrist.
Use the Pictures button to insert into your document pictures from _____.
your PC
Most personal finance software applications allow you to download activity from _____ into the program.
your banking account
The price you pay your ISP for Internet access likely depends on
your connection speed.
Table 7.1 lists several signs that your computer may be a zombie, including all of the following except
your login password no longer works
An Internet-connected computer that is controlled by a hacker or other cybercriminal without the owner's knowledge is called a _____ computer.
zombie