PCA - Chapter 1 -6 reading questions

Ace your homework & exams now with Quizwiz!

Which of the following refers to large networks of compromised computers that can be used by a hacker to spread malware, send spam, and conduct carefully orchestrated network attacks?

botnets

A(n) ___ system is a type of information system that performs analytical tasks traditionally done by a human, typically by using information contained in a knowledge base.

expert

What is the name given to the limited set of circumstances where others can use portions of copyrighted material without first obtaining permission?

fair use

systems known as ___ are able to continue their operation even when problems are present

fault-tolerant

the file management tool on a mac is called

finder

Most desktop operating systems include a(n) ___ utility that is dedicated to examining and blocking Internet traffic.

firewall

preparing a storage device for use by an operating system is known as

formatting

___ are discussion boards where individuals can ask questions and reply to each other.

forums

today the term _____ generally refers to an individual who uses a computer and or network to commit a variety of crimes

hacker

___ technology produces output in the form of vibration, motion, or physical resistance.

haptic

____ specializes in tv shows offering episodes that can be seen as early as the day after they air

hulu

___ robots are those that are created to imitate the appearance or capabilities of humans.

humanoid

apple's mobile devices are powered by the ___ operating system

iOS

which of the following is not an example of a "music locker" service

iheartradio

_____ has become one of the most popular mobile apps because they make it easy to add cool effects/filters to photos, and then share those photos and short videos with your friends and followers

instagram

unlike an email, which can be read by the recipient at any time ___ engage individuals in a life conversation

instant messengers

which of the following units is the smallest

kilobyte

which of the following examples was not given by the author with respect to the way technology is used to day

landscaping

___ is a social network that is designed with a strictly business-or

linkedIn

which of the following is not of the advantages of owning a mac listed by the author

low cost

Higher ___ cameras can capture more detail, but they will produce a larger image file on your storage media.

megapixel

data ____ is the discovery of new patterns or relationships between data

mining

the creation or manipulation of matter at the smallest possible scale is known as

nanotechnology

which streaming services often accounts fo rover 30% of all internet traffic in north america

netflix

As the largest ___ in the world, the Internet connects billions of people and organizations.

network

which of the following examples for embedded systems was not given by the author

network servers

___ allow users to communicate and share information between computers and various devices

networks

____ allow us to communicate and share information between computers

networks

An approach to artificial intelligence that allows a machine to learn a new skill via the repeated analysis of large quantities of data is known as:

neural network

networks use media to carry data from one ____, or connection point, to another

node

today, our ___ behavior can either impact or be visible to thousands (or even millions) of individuals and businesses around the globe

online

The purpose of a(n) ___ is to manage the flow of data between hardware components and allow the user to communicate with the computer.

operating system

which software title would an employee most likely use to send email, manage contacts, create appointments, and set up meetings?

outlook

the processed results that a computer sends out to you are known as

output

When companies engage in ___ they are essentially transferring some aspect(s) of their business to a third party.

outsourcing

___ are pieces of a message broken down into small units by the sending device and reassembled by the receiving device.

packets

Which of the follows companies does NOT offer digital movie rentals

pandora

____ computers are those meant to be used by only one person at a time

personal

Which of the following is used by many online companies to describe what information is collected from users and what is done with that information?

privacy policy

Which browser feature will delete your history, cache, and cookies the moment you close the special window?

private browsing

For those who have lost a limb, engineers have developed robotic ___ that can perform a variety of movements by simply projecting a thought to them.

prosthetics

___ systems can be incrementally expanded to provide increasing amounts of computing power, storage, and/or software when the need arises.

scalable

the scam referred to as ____ typically comes in form of an alert message that claims to be from the FBI of your security software

scareware

When users type specific keywords into a ___, they will receive an organized list of matching sites, images, and news articles that contain those keywords

search engine

the ____ mode on a computer will place it in a low-power state when it is not being used

sleep

apple transformed the ____ market with the release of its revolutionary iphone in 2007

smartphone

the android wear operating system is most commonly found on

smartwatches

which mobile app became famous for allowing messages and photos to disappear a few seconds after you friend received them

snapchat

___ is a form of hacking that focuses on deceiving individuals into giving away the information that the thief needs.

social engineering

one or more computer programs that are packaged together for a unified purpose are known as

software

___ are experts in one or more computer programming languages and have a good understanding of the software that runs on (or manages) various computer systems.

software engineers

which of the following is not a cloud storage or synchronization service

solid state drive

Which type of software is used for entering, calculating, and analyzing sets of numbers?

spreadsheet

which type of malware is designed to report activity on your computer to anther party

spyware

____ are small affordable devices that can add many "smart" features to almost TV

streaming media players

One of its most powerful features of Google Maps is ___, which shows you almost any part of the map as if you were driving through that street.

street view

What is the name of the pen-like tool that allows you to tap or write notes on many touchscreen interfaces?

stylus

____ used by large organizations such as NASA, are the largest and most powerful computers in the world

supercomputers

which device can guard connected equipment against large power spikes or surges that may infrequently occur

surge protector

which network device provides multiple ports for connecting nodes and is aware of the exact address or identity of all the nodes attracted to it

switch

which category of software is created for the operation, maintenance, and security of a computer

system

the main component of a desk top computer is the ____, which is the case that houses the computer's critical parts, such as the processing and storage devices

system unit

which browser feature allows you to have multiple web pages open in one browser window

tabbed browsing

a mobile device that generally ranges from 7 to 10 inches in size is referred to as a

tablet

____ are often used to back up or archive large quantities of information

tape drives

The term ___ describes a wide variety of remote work practices, from working at home occasionally to living in a different country than the company.

telecommuting

which of the following statements regarding autonomous vehicles is true?

the ability to park on its own is a feature of many autonomous vehicles

suppose that a laptop identifies its processor as follows: AMD's A8-4500M. What does the AMD represent?

the manufacturer

the ___ of a network is the logical layout of the cables and devices that connect the nodes of the network

topology

Which rectangular, stationary pointing surface is found on almost all laptop computers?

touchpad

Which of the following is NOT one of the ways freeware developers can make money off their creation?

trial period

which type of malware disguises itself as an interesting, useful, or desirable program in order to gain access to your system

trojan horse

One popular test of a machine's ability to think is known as the ___ test.

turing

Both YouTube and ___ have allowed many individuals to earn significant amounts of money from their videos and streams.

twitch

which microblogging service famously restricts posts to 280 characters

twitter

___ is a feature that requires two forms of identification, such as a password and possession of your phone, to log into an account.

two-factor authentication

apple's macbook air is a type of _____ computer

ultraportable

You should run a(n) ___ if you want to run one operating system on top of another operating system.

virtual machine

which of the following applications for home automation was not given by the author

water purification

Which of the following displays a form of artificial intelligence with its astounding capability to understand complex questions and quickly find the answers using large databases of information?

watson

the act of alerting the public about harmful activities that re being hidden by an organization is called

whistleblowing

There are three general strategies used to authenticate individuals. Which of the following is NOT one of them?

who you know

___ provide automatically updating information without the need to open an app

widgets

A(n) ___ is a collaboration information site that encourages people with subject knowledge to contribute at their convenience, adding to or fixing pages where information is missing or incorrect.

wiki

Although many of the articles in ___ are written and edited by experts, you cannot be 100 percent certain that the specific information you need comes from a credible source.

wikipedia

which of the following is not one of that specifications of wifi technology

802.11z

___ refers to technology that protects copyrighted material, such as copy protection and authenticity checks.

DRM

why are many computers especially ultraportable ones, using SSDs instead of traditional magnetic hard drives

because SSDs are faster and consume less power

which type of cable consists of a thin strand of glass that transmits pulsating beams of light rather than electric current

fiber-optic

A(n) ___ is a short, unique sequence of characters located after the file's name that indicate the file type.A(n) ___ is a short, unique sequence of characters located after the file's name that indicate the file type.

file extention

FAT and NTFS are two popular types of

file systems

many thieves use the temptation of free (illegal) software on ___ services to lure individuals into downloading malware

file-sharing

fitbit is an example of a

fitness device worn on the wrist

the magnetic ____ often serves as the primary storage device of a personal computer

hard drive

_____ is generally any part of the computer you can touch

hardware

which symbol which is used to mark keywords or topics in a message was popularized by twitter

hashtag

Your browser's ___ keeps the name and URL of every site you have visited, and allows browsers to autocomplete the URL when you type the first few characters.

history

if your smartphone is set up as a mobile ___ it can offer wifi access to devices near it

hotspot

the term ___ refers to smart devices that have the ability to connect to wireless networks and the internet

loT / IoT

to protect the data on your mobile devices set a password, pin, or other security measure on your:

lock screen

Employers can check ___ periodically to determine whether there was inappropriate computer use by an employee.

logs

which of the following statements about recycling and reducing waste is false

most organizations have found that going paperless is worse for the environment and for their productivity than their previous paper-based systems

which of the following statements regarding employee monitoring is false

most types of employee monitoring and internet restrictions at the workplace are illegal

as the largest circuit board in a personal computer the __ contains a variety of slots, connectors, and plugs for hooking up all the other parts of the computer

motherboard

One of the most famous ___ licenses is the GNU General Public License (GPL), which ensures that a particular program and any of its derivatives remain free to distribute.

open source

Which strategy involves luring individuals into entering personal information into a website that is controlled by a hacker?

phishing

acquiring or exchanging copies of protected digital creations without payment to or permission from their creator is known as

piracy

A browser ___ is a separate program that allows your web browser to play several types of multimedia content.

plug-in

which of the following "new social challenges" was not mentioned by the author

preforming in class research with a smartphone

Which type of software enables users to create electronic slideshows that contain a combination of text, images, charts, videos, and other elements?

presentation

Machines that communicate over a network must follow certain rules, or ___, to ensure that the packets are sent, received, and interpreted properly.

protocols

____ is a social news site that encourages users to share links to news and other interesting content they find on the web. it is also famous for hosting AMA sessions

reddit

A modern monitor might have a(n) ___ of 1920x1080 pixels.

resolution

the wireless access points that are used in homes contain in homes contain integrated ___, as do the devices that ISPs typically provide for internet connectivity

routers

which of these mobile apps/technologies would you use if you wanted to have a video video conversation with another person

skype

which type of software allows humans to experience realistic environments that are simulated by computers

virtual reality

which type of malware is attached to a host file and has the ability to replicate, or copy, itself

virus

Which license allows companies to install software on multiple machines?

volume

Which type of software provides tools for creating and editing all kinds of text-based documents?

word processing

which of the following is a global system of linked, hypertext documents

world wide web

Which type of malware consists of a fully-contained program that self-replicates and spreads through computers and networks?

worm

which of the following is not a web browser

yahoo

all nodes connect to a wireless ___ in order to communicate wirelessly

access point

A(n) ___ is a series of steps that describes exactly what each portion of a computer program is supposed to do.

algorithm

all of the cloud applications below would allow you to share and collaborate on documents and lists except

amazon cloud

The ratio of monitor's width to its height is known as the:

aspect ratio

the _____ part of an email contains any files included with the message

attachments

Most Creative Commons licenses require, at a minimum, that the user provide ___ to the author wherever the work is used.

attribution

devices that add computer generated information on top of the real world that a user sees offer a _____ experience

augmented reality

Using robotic arms (instead of people) during certain phases of car manufacturing is referred to as:

automation

Making copies of important files to the cloud or to an external storage device is known as:

backing up

Typically measured in Mbps or Gbps, ___ is the amount of data that can be transmitted over a given amount of time.

bandwidth

It is common to use ___ when sending email to a large group of people, especially if you want to protect the privacy of the recipients' email address.

bcc

which term refers to the large volumes of data that are constantly being generated by our devices and digital transactions

big data

A(n) ___ input device authenticates you based on patterns or characteristics found in the human body.

biometeric

The use of living organisms to manufacture new products or improve existing ones is called:

biotechnology

which of the following units is represented as an on (1) or off (0) value

bit

Adobe Photoshop excels in editing _____ graphics such as JPGs

bitmap

____ servers are typically arranged in a space-saving manner in an enclosure along side other servers

blade

a page or website that contains chronological posts and comments from individuals or organizations is known as a

blog

using a short-range wireless technology known as ____, users can make hands-free calls in some cars

bluetooth

An ___ is another name for the full address that is used to locate a web page on the internet

URL

the ___ part is used to connect almost all of today's external devcies

USB

many trace the internet's history to ____, a network connecting computers at four universities in 1969

ARPANET

with of the following is NOT an example of solid state storage?

BD-XL

communication speeds between you and your ISP are measured in

BPS

Which type of software aids architects, engineers, and many others who need to create a digital model of an object?

CAD

the ___, or microprocessor , is the main processor of a computer

CPU

Which software title allows users to create works that require complex layouts, such as magazines and newspapers

InDesign

____ technology can translate a scanned image into text that can be edited and formatted

OCR

which type of memory contains device specific information and handles a computer's basic functions when it is powered on

ROM

A popular way for both individuals and businesses to increase the security of a network connection (via tunneling) is by using a(n):

VPN

A(n) ___ is an error in a computer program.

bug

Most computers provide a sound subsystem directly on the motherboard and do not require a separate sound ___ for audio output.

card

a ____ is any step you take to ward off a threat

countermeasure

A(n) ___ connector carries both digital video and sound.

HDMI

____ file sharing uses a distributed network of individual users instead of a central server to transfer files

P2P

the speed fo a printer in measured in

PPM

a ___ scanner uses radio frequencies to read the data stored in special tags

RFID

a designation of ___ means that a blank optical disc can be recorded only once

-R

what is the latest version of windows

10

which type of printer is most likely to be used by an engineer who needs ot create a small plastic model

3D

Newer operating systems are ___, which means they are more powerful and capable of supporting more than 4 GB of RAM.

64-bit

copyright protection lasts for ___ years after the death of the author

70

A(n) ___ contains a rechargeable battery, allowing it to run a computer system for a given amount of time if the power fails.

UPS

with capacities starting at 25 GB, the ____ is the optical media with the most storage

Blu-Ray disk

A popular type of network attack, known as a(n) ___ attack, allows hackers to shut down or block access to websites and other network resources by overwhelming them with requests.

DDoS

Which type large-business software can handle tasks as diverse as manufacturing and quality control to accounting and human resources?

ERP

the ____ of a website or forum contains common questions and their responses

FAQ

today's processors have reached the ____ mark, capable of processing billions of instructions per second

GHz

A(n) ___ interface allows users to communicate with their computer via graphical elements on the screen.

GUI

Although ___ owns Android and manages the store for apps, it allows any manufacturer to use and modify this operating system for their devices.

Google

192.168.1.101 is an example of a(n):

IP address

___ technology changes the way LCD monitors are illuminated

LED

Which of the following choices is NOT a speech recognition program/assistant?

Intel's Eris

Which of the following is an open-source operating system that has distributions for both desktops and servers?

Linux

a ____ uniquely identifies every network-connected device in the world

MAC address

A(n) ___ is a set of software tools that enables managers to gather, organize, and evaluate information.

MIS

A(n) ___ is a huge online course offered for free by a variety of universities, including prestigious ones such as Princeton, Harvard, and MIT.

MOOC

android pay and apple pay rely on ____ to make the smartphone payments in stores

NFC

Which of the following is a government agency that has the capability to monitor the Internet and mobile activities of individuals?

NSA

___ is a model whereby advertisers pay for their ads only when a website visitor clicks on the ad.

Pay-per-click

___ is an example of an online payment service that allows you to pay for goods online and transfer money to other individuals.

PayPal

A(n) ___ code, which appears as a square filled with dots and lines, is often used to direct a smartphone to open a specific web address.

QR

Which software title would help a business manage all aspects of their company's finances?

QuickBooks

which type of memory temporarily holds the programs and files that you are actively working on?

RAM

which of the following is not a popular programming language

SDLC

Services such as ___ and Microsoft Teams include many real-time communication tools, along with a variety of apps and services, to make it easier for teams to wok on projects together.

Slack

Many individuals are using ___ to turn their computers into DVRs, which allow you to record television shows for future playback.

TV tuners

___ translates analog voice signals into digital data and uses the Internet to transport the data.

VoIP

A(n) ___ is the connection of two or more central computers or local area networks, generally across a wide geographical area.

WAN

Which of the following is a document that contains an organization's policies for the ethical, secure, and appropriate use of computing resources?

acceptable use policy

____ is a set of instructions that directs the computer to perform a variety of tasks

a computer program

Bringing your thumb and index together in a pinching motion (for zooming in and out) is an example of:

a gesture

which of the following types of computers rare generally the most affordable, partly because they use google's operating system and they contain very little storage

chormebook

with the ___ operating system, you will be fully immersed in google's ecosystem

chrome

____ allows you to store your files and use various applications in an online account

cloud computing

___ utilities use a variety of techniques that can "squeeze" one or more files into a smaller file, such as a ZIP.

compression

The small data files known as ___ are used by websites to remember users and their preferences.

cookies

What is the name of the legal concept that grants rights and control to the owner of any published work, such as books, songs, and photographs?

copyright

___ websites, such as Kickstarter, allow any organization or individual to solicit funds from the general public in exchange for a future good or service.

crowdfunding

many navigation and traffic apps rely on ____ to determine which roads have accidents/construction and which gas stations have the lowest prices

crowdsourcing

bitcoin is an example of

cryptocurrency

The ___ appears on the screen as a blinking vertical line, a small box, or some other symbol to show your place in a document or command line.

cursor

The ___ command removes the selected object (or objects) from their current location and places them into the clipboard.

cut

___, which refers to repeated hostile behavior with intent to harm another, has led to many teenagers seeking therapy or even committing suicide.

cyberbullying

the internet is ___, meaning no single person or group controls it

decentralized

which of the following connections types is generally the slowest

dial-up

which of the following terms refers to the technology gap between different social and economic classes

digital divide

someone who possesses _____ has a broad understanding of computer technology and is possible to use it well

digital literacy

in some operating systems folders may be referred to as

directories

which part of a URL uniquely identifies a site and a brand on the web

domain name

which type of printer is most likely to be used by a business that uses carbon-copy forms

dot matrix

___ can clog cooling systems such as fans, which in turn may cause hardware to overheat

dust

A(n) ___ utility can scramble your data or storage devices to make them unreadable by anyone who doesn't have the proper key.

encryption

which key boards are designed to be conformable and tailored for the human body

ergonomic

___ is a standard for LANs that uses a star topology with twisted-pair cables that plug into the RJ45 port located on many devices

ethernet

____ is the philosophical study of morality. it is a rational analysis of the voluntary, moral choices that individuals make

ethics


Related study sets

PMP Terms & Test Prep (6th Edition)

View Set

How Did Continental Drift Explain Glacial Deposits in Unusual Places?

View Set

Take Test: Resume Format Module & Quiz

View Set

Pen Test Chp. 4-7 Review Questions

View Set