MIS 2223 test 2 (second set)

Ace your homework & exams now with Quizwiz!

A single point as shown in the accompanying figure is about what fraction of an inch in height?

1/72

One study found that a certain percentage of wireless connections like the kind in the accompanying figure are unsecured, leaving them susceptible to hackers. What was that percentage?

25

Why is a fragmented disk slower than one that is defragmented?

A fragmented disk has many files stored in noncontiguous sectors.

When data in a spreadsheet program is changed, what occurs?

All calculations can be recalculated.

You have encountered a technology that is effective in blocking computer-generated attempts to access a website because it is generally easy for humans to recognize distorted characters. What is this technology?

CAPTCHA

Which of the following kinds of software is software that enables professional designers to create sophisticated documents that contain text, graphics, and many colors?

DTP

Personal computers, display devices, and printers should comply with guidelines of which of the following programs?

ENERGY STAR

Which of the following is NOT true of the new multi-core processor you have just purchased?

Each processor core on the multi-core processor runs at a faster speed than a single-core processor.

Which of the following should you have if you plan to connect your computer or mobile device to a wired computer network?

Ethernet port

AMD is the leading manufacturer of which of the following kinds of processors, which have an internal design similar to Intel processors, perform the same functions, can be as powerful, but often are less expensive?

Intel-compatible

Which of the following describes a computing environment where everyday objects are connected to the Internet?

IoT

What is the role of an address when used in the context of computer memory?

It identifies the location of a byte in memory.

What is unique about a multi-core processor?

It is a single chip with two or more separate processor cores.

Current processors include advanced transfer cache, a type of cache built directly on a processor chip. Which type of cache is this?

L2 cache

In your engineering class, you are required to calculate the approximate size of a series of chips. Which of the following is true?

Most chips are no bigger than one-half-inch square.

If a computer advertisement states a computer operates at 5 GHz, what does that mean?

The system clock has a clock speed of five billion clock cycles per second.

Double Data Rate SDRAM (DDR SDRAM) chips are even faster than SDRAM chips because which of the following is true?

They transfer data twice for each clock cycle.

Plasma monitors offer large screen sizes and rich colors. Which of the following statements describe how plasma monitors work?

Voltage is applied to a layer of gas between two glass plates, which releases a UV light that causes the pixels on the screen to glow.

You are an expert in devising product activation schemes for software publishers. Which of the following is not one of the techniques you have used in the past?

You create the application to be available for download only.

If you see eight numbers such as 01000101 grouped together and you are told these numbers represent the letter E, what is this combination of numbers called?

a coding scheme

A computer technician told your friend he needed a circuit board that provides a connection to a peripheral device for use with his computer. What category of circuit board should your friend purchase?

adapter card

What is another name for public key encryption?

asymmetric key encryption

Which of the following determines the number of bits that the computer can transmit at one time?

bus width

Which of the following is another term for the system unit?

chassis

Which of the following is measured by the number of ticks per second?

clock speed

As you edit some photos from your summer vacation, you choose to make a beach photo much smaller in terms of its file size in order to be able to email it to your friends. Which tool will you use for this?

compress

Your business is looking to rely on cloud computing services to specify the applications, security settings, and computing resources available to employees on their computer desktops. What is the term for this?

desk top as a service

Which of the following is NOT an example of a common nonimpact printer?

dot-matrix printer

What are the four steps in the machine cycle?

executing, fetching, storing, decoding

Which of the following does your new smartphone use to unlock the device?

face recognition

If your friend recently has participated in e-filing, what has she been doing?

filing her state and/or federal tax returns online

Which of the following is a type of nonvolatile memory that can be erased electronically and rewritten?

flash memory

Which of the following performs calculations on the data in a worksheet like the one in the accompanying figure and displays the resulting value in a cell?

formula

Which of the following does you college use to verify your identity?

hand geometry system

What is the unit of measurement for the clock speed for the channel shown in the accompanying figure?

hertz

In a spreadsheet program, how is data organized?

in rows and columns collectively called a worksheet

Which of the following refers to the right of individuals and companies to deny or restrict the collection and use of information about them?

information privacy

What is the purpose of the system bus?

it connects the processor to main memory

Which of the following can be used to create a software registration number, sometimes illegally?

keygen

Using ink-jet printer technology, but on a much larger scale, which of the following creates photo-realistic-quality color prints?

large-format printer

What is an EULA intended to do?

licence software for individual user

Which category of applications allows you to locate a nearby restaurant or check the weather forecast?

life style

The accompanying figure shows which of the following kinds of modules, which are small circuit boards where RAM chips usually reside, being inserted into the motherboard?

memory

If a dog is identified by scanning the shoulder or neck of the animal, what provides the information about the dog?

microchip

____ apps can allow you to lock your mobile device and SIM card remotely.

mobile security

When your friend opened the case containing the electronic components of his computer, he saw the main circuit board for the computer. What is this circuit board called?

motherboard

What is a single device that provides functionality of a printer, scanner, copy machine, and perhaps a fax machine called?

multifunction printer

What kind of software allows users to combine text, graphics, audio, video, and animation into an interactive application?

multimedia authoring

Several factors that affect the quality of an LCD monitor or LCD screen, including the specific resolution for which they are geared. How is this resolution described?

native resolution

Which of the following terms means in a location separate from the computer site?

off-site

Where do RAM chips usually reside within a computer?

on a memory module

You are working for a book publisher and devising the height of the pages that will be required to print a given book. The text for the book is about 10 points. What will be the approximate height of each character in the book?

one-sixth of an inch

Which of the following printer is a color printer that produces photo-lab-quality pictures?

photo

What component converts the AC power in a wall plug to the DC power required by a computer?

power supply

which kind of software can be distributed by anyone to others at no cost?

public-domain

Which of the following is a request for specific data from a database?

query

Which of the following are small high-speed storage locations contained by the processor that temporarily hold data and instructions?

registers

During the infection stage, what three actions does a computer virus typically perform?

replicate itself, conceal itself, activate when a condition or event occurs

Which of the following features is offered by WBT?

self-directed, self-paced instruction

Which of the following is a collection of individual programs sold as a unit?

software clusters

Which of the following is the least likely motive for a DDoS?

spoofing

The role of memory to store both data and programs is known as which of the following concepts?

stored program

In reference to search utilities, what does an index do?

stores information about a file, including its name, date created, and author name

What is memory access time?

the amount of time it takes the processor to read data, instructions, and information from memory

You have a new word processing program. Which of the following is least likely to be a feature in the program's spelling checker?

the capability to check the arithmetic in a table of calculations

define the term payload, as it pertains to computer crime

the destructive event or prank the virus was intended to deliver

If your instructor turns on his computer and then starts a web browser, what contents are in RAM?

the web browser instructions and certain operating system instructions

To which of the following is a control unit most analogous?

traffic officer

When application software poses a question to a computer user and the user answers, what term is used to identify that answer?

user response

Many worksheet cells like those in the accompanying figure contain a number that can be used in a calculation. What is the name for this?

value

Which of the following warns that the computer is infected and needs immediate attention?

web filter

What kind of software helps users of all skill levels create web pages that include graphics, video, audio, animation, and other special effects?

website authoring


Related study sets

Milady's Standard Nail Technology

View Set

ATI RN Adult Medical Surgical Practice B 2023

View Set

Driver's Ed Level 01 Study Guide

View Set