TIA Final

Ace your homework & exams now with Quizwiz!

The distance between two near field communication (NFC) devices is` limited to about ________.

1.5 inches

________ floods a computer with requests until it shuts down and refuses to answer any requests for information.

A DDos attack

Which of the following statements about a graphical user interface is FALSE?

A GUI is a command-driven interface.

UNIX was developed by Ken Thompson and Dennis Richie who worked at ________.

AT&T's Bell Labs

Which of the following is NOT one of the four major data processing functions of a computer?

Analyzing the data or information

________ reality is the addition of digital information directly into our reality, either to add more detail or to remove unwanted visual effects.

Augmentative

Computers use the ________ language consisting of 0s and 1s.

Binary

The term "bit" is short for ________.

Binary digit

A denial-of-service attack can be used to deny hackers access to a computer system.

False

When uninstalling software, it is best simply to open the Explorer window and delete the folder containing the software.

False

Zipcar is an example of ownership.

False

A(n) ________ cable carries all audio and video information from devices to a connected TV.

HDMI

The Witness Project hopes to stop ________ abuses throughout the world.

Human rights

________ is a field of study focused on the management, processing and automatic retrieval of information.

Information Technology

Which of the following is an open source operating system for personal computers?

LInux

Which of the following Operating Systems was designed to be a Unix-like OS that would run on a standard PC, and eventually was published under Open Source licensing?

Linux

Which of the following was the first widely used operating system installed in personal computers?

MS-DOS

All of the following are examples of software suites, EXCEPT ________.

Microsoft OneNote

The top three operating systems for personal computers are ________.

Microsoft Windows, Mac OS X, and Linux

The ________ Initiative is rallying the support of the world to identify mathematical genius.

Next Newton

The Apple iPhone uses iOS, a version of Apple's ________ as its operating system.

OSX

All of the following are examples of database software, EXCEPT ________.

OneNote

________ software helps you manage e-mail, contacts, calendars, and tasks in one place.

Personal information manager

Which of these statements about physically protecting your computer is FALSE?

Power surges can be blocked by using a computer surround.

Scanning a product's ________ code with a smartphone can take you to a website, a video, or a Facebook page for more information about the product.

QR quick response

All of the following are examples of permanent storage, EXCEPT ________.

RAM

Another way to obtain software is through ________, where a vendor hosts the software online over the Internet and you do not have to install it on your computer.

Software as a Service

The four functions of the computer include input, process, output, and ________.

Storage

Which of the following is the largest unit of measure for the size of a computer file?

Terabyte

A zombie is another person's computer controlled by a hacker.

True

OpenOffice.org is an example of open source software.

True

The central processing unit controls all the functions performed by the computer's other components and processes all the commands issued to it by software instructions.

True

Wizards are step-by-step guides for performing complicated tasks in application software.

True

Which of the following operating systems is used primarily with servers in a data center as opposed to being a user OS for a desktop or mobile computer?

UNIX

The unique address for a particular Web site is the ________.

URL

RAM is a ________ storage location.

Volatile

Software that enables you to display and interact with text and other media on the Web is a ________.

Web browser

When using a cell phone, a(n) ________ converter chip changes your voice's sound waves into digital signals.

analog-to-digital

The general software you use to do tasks at home, school, or work is known as ________ software.

application

All of the following are the main functions of antivirus software, EXCEPT ________.

assassinating all viruses

The goal of ________ technology research is to provide solutions to physical and health-related problems.

biomedical

Which of the following uses radio waves to transmit data signals over short distances?

bluetooth

Sharing products rather than owning them individually is known as ________.

collaborative consumption

Intellectual property (such as music, writing, and software) is protected through ________ law.

copyright

Adobe InDesign is an example of ________ software.

desktop publishing

Each device attached to your computer comes with a special program called a ________ that facilitates communication between the device and the OS.

device driver

The OS enables you to organize the contents of your computer in a hierarchical structure of ________.

directories

Social ________ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information.

engineering

Computers gather data, which means that they allow users to ________ data.

enter

All Web-based software is free.

false

Identity theft does NOT cause financial harm to individuals.

false

Social media directors need to understand HTML, Perl, and JavaScript.

false

Theft of a tablet is considered cybercrime.

false

There are more virus attacks on cell phone and smartphones than there are on PCs.

false

With Skype software installed on your phone, you can call any phone number for free.

false

The conversion rate is the number of times per second that the analog signal is measured and converted into a digital value.

false - sampling rate

C:\Documents\Spring 2012\CIS 101\Term Paper\Computer Technology is an example of a ________.

file path

Any part of the computer that you can touch is called ________.

hardware

The Web is based on the ________ Protocol.

hypertext Transfer

Rules for creating passwords include all of the following, EXCEPT ________.

keep your password written down and stored in any easy-to-remember location

The Internet is ________.

large group of networks

A ________ is approximately 1 million bytes.

megabyte

All of the following are considered cybercrimes, EXCEPT ________.

non-delivery of merchandise purchased online

The type of software license that is often free and includes the human-readable programming code is known as ________ software.

open source

The ________ is(are) the group of programs that controls how your computer functions.

operating system

When a business hires a third-party firm to provide services it once offered itself, it is called ________.

outsourcing

In the URL http://www.pearsonhighered.com/techinaction, the portion labeled "http" is the ________.

protocol

The "s" in "https" stands for ________.

secure socket layer

Every software program has a set of ________ that specify the minimum recommended standards for the operating system, processor, RAM, and hard drive capacity.

system requirements

In the URL http://www.pearsonhighered.com/techinaction, the portion labeled ".com" is the ________.

top-level domain

An Atlanta business that once used in-house employees but now contracts with a San Francisco company to provide customer support is engaging in outsourcing.

true

ComputerJobs.Com and ComputerWork.com are websites that can be used to search for IT jobs.

true

Every new cell/smartphone has to include a GPS chip.

true

Facebook allows you to determine the extent to which your information can be shared.

true

MS-DOS first used a command-line interface.

true

The Institute of Electrical and Electronics Engineers (IEEE) is an organization that provides leadership and determines engineering standards for network computing devices and protocols.

true

The Internet is the largest computer network in the world.

true

A(n) ________ is a small program that performs general housekeeping tasks for your computer.

utility program

Multimedia software includes all of the following, EXCEPT ________.

utility software

A(n) ________ is the portion of virus code that is unique to a particular computer virus.

virus signature


Related study sets

multiplication facts up to 12 X 12

View Set

CYSA + Chapter 8 Identity and Access Management Security

View Set

Regulations - Securities Act of 1933 : Review Questions

View Set