CIS #1

Your page rank:

Total word count: 8711
Pages: 32

Calculate the Price

- -
275 words
Looking for Expert Opinion?
Let us have a look at your work and suggest how to improve it!
Get a Consultant

Eight bits grouped together are collectively referred to as a ____.

a). Kilobit
b). byte
c). pixel
d). binary

b). byte

The numbering system we commonly use is called the decimal numbering system because it uses ____ symbols to represent all possible numbers.

a). 2
b). 5
c). 10
d). 16

c). 10

A ____ is the smallest unit of data that a binary computer can recognize.

a). byte
b). datum
c). pixel
d). bit

d). bit

A ____ is equal to 1,024 bytes.

a). kilobyte (KB)
b). megabyte (MB)
c). gigabyte (GB)
d). terabyte (TB)

a). Kilobyte

Each place value in a binary number represents ____ taken to the appropriate

a). 0
b). 1
c). 2
d). 10

c). 2

With bitmapped images, the color of each ____ is represented by bits; the more bits used, the better the image quality.

a). pixel
b). vector
c). map
d). byte

a). Pixel

In a 16.8-million-color (called photographic quality or ____) image, three bytes (24 bits) are used to store the color data for each pixel in the image.

a). mega color
b). true color
c). real color
d). full color

b). True color

Like graphics data, ____—such as a song or the sound of someone speaking— must be in digital form in order to be stored on a storage medium or processed by a PC.

a). pixel data
b). giga data
c). audio data
d). audio programs

c). Audio data

Video data—such as home movies, feature films, and television shows—is displayed using a collection of ____.

a). slides
b). pixels
c). vectors
d). frames

d). Frames

A(n) ____ instruction might look like a meaningless string of 0s and 1s, but it actually represents specific operations and storage locations.

a). COBOL language
b). ASCII
c). programming language
d). machine language

d). Machine language

11. ____ are very small pieces of silicon or other semiconducting material onto which integrated circuits are embedded.

a). Pixels
b). Pentiums
c). Chips
d). Motherboards

c). Chips

One measurement of the speed of a CPU is the ____, which is rated in megahertz (MHz) or gigahertz (GHz).

a). system speed
b). CPU clock speed
c). system rpm
d). CPU rpm

b). CPU clock speed

A computer ____ is the amount of data (measured in bits or bytes) that a CPU can manipulate at one time.

a). word
b). character
c). statement
d). unit

a). word

A ____ is an electronic path over which data can travel.

a). bus
b). lane
c). word
d). cache machine

a). bus

The bus width and bus speed together determine the bus’s ____ or bandwidth; that is, the amount of data that can be transferred via the bus in a given period of time.

a). clock speed
b).throughput
c).machine cycle
d).memory

b). throughput

The term ____ refers to chip-based storage used by the computer.

a). storage media
b). memory
c). hard drive
d). zip drive

b). memory

An emerging type of RAM is magnetic (or more precisely, ____) (MRAM).

a). magnetoselective
b). magnetobalanced
c). magnetoresistive
d). magnetocharged

c). magnetoresistive

____ are small components typically made out of aluminum with fins that help to dissipate heat.

a). ACs
b). Fans
c). Heat buses
d). Heat sinks

d). heat sinks

____ consists of nonvolatile memory chips that can be used for storage by the user.

a). RAM
b). Register
c). SDRAM
d). Flash memory

d). Flash memory

____ have begun to replace ROM for storing system information, such as a PC’s

a). Motherboards
b). Microprocessors
c). Adapter cards
d). Flash memory chips

d). Flash memory chips

The ____ enables up to 127 devices to be connected to a computer’s PCI bus through a single port on the computer’s system unit.

a). HyperTransport bus
b). USB standard
c). AGP (Accelerated Graphics Port) bus
d). PCI Express Bus

b). USB standard

Most network cards contain a port that accepts a(n) ____, which looks similar to connector but is larger.

a). RJ-11 connector
b). RJ-12 connector
c). RJ-14 connector
d). RJ-45 connector

d). RJ-45 connector

A USB ____ is a device that plugs into your PC’s USB port to convert one port USB ports.

a). hub
b). module
c). bus
d). connector

a). hub

Most computers today support the ____ standard, in which the computer automatically configures new devices as soon as they are installed and the PC is powered up.

a). Plug and Play
b). Match
c). Serial port
d). Parallel port

a). Plug and Play

The key element of the microprocessor is the ____—a device made of semiconductor material that acts like a switch controlling the flow of electrons inside a chip.

a). processor
b). transistor
c). chipbus
d). S-card

b). transistor

The ____ takes instructions from the prefetch unit and translates them into a form that the control unit can understand.

a). register
b). decode unit
c). ALU
d). internal cache

b). decode unit

The ____ is the section of the CPU that performs arithmetic involving integers and logical operations.

a). FPU
b). control unit
c). decode unit
d). ALU

d). ALU

The ____ orders data and instructions from cache or RAM based on the task at hand.

a). ALU
b). prefetch unit
c). control unit
d). decode unit

b). prefetch unit

The ____ tries to predict what data and instructions will be needed and retrieves of time, in order to help avoid delays in processing.

a). control unit
b). floating point unit
c). arithmetic/logic unit
d). prefetch unit

d). prefetch unit

Instructions and data flow in and out of the CPU via the ____.

a). control unit
b). prefetch unit
c). decode unit
d). bus interface unit

d). bus interface unit

In order to synchronize all of a computer’s operations, a ____—a quartz crystal located on the motherboard—is used.

a). cycle chip
b). fetch unit
c). system clock
d). microprocessor

c). system clock

Some ____ must be added in pairs.

a). interfaces
b). memory modules
c). USB ports
d). hard drives

b). memory modules

Today’s CPUs are formed using a process called ____ that imprints patterns on semiconductor materials.

a). vectoring
b). lithography
c). serigraphy
d). imprintment

b). lithography

One nanometer (nm) is ____ of a meter.

a). one-billionth
b). one-millionth
c). one-thousandth
d).one-tenth

a). one-billionth

Terascale computing is the ability of computers to process one ____ floating-point operations per second (teraflops).

a). million
b). billion
c). trillion
d). quadrillion

c). trillion

To connect her external hard drive where her music files are stored to the computer, Jess needs to use the ____ port.

a). serial
b). USB
c). Network
d). Modern

b). USB

Jess has a music keyboard that she uses to compose music that will be stored electronically. To connect the keyboard to the computer, she would use the ____ port.

a). SCSI
b). FireWire
c). modem
d). MIDI

d). MIDI

Jack has many large files such as digital photos and movies stored on his computer. Since he only occasionally uses these files, he should consider moving them to a removable storage medium, such as a CD disc, DVD disc, or ____.

a). RAM memory module
b). USB hub
c).USB flash drive
d). FireWire disk

c).USB flash drive

Jack can use the ____ program to locate and delete temporary files, such as installation files, Web browsing history, and files in the Recycle Bin.

a). Windows Registry
b). Disk Defragmenter
c). Temporary Files
d). Windows Disk Cleanup

d). Windows Disk Cleanup

Since Jack has a Windows system, he can right-click a hard drive icon in Windows Explorer, select Properties, and then select the ____ option on the Tools tab to check that hard drive for errors.

a). Check Now
b).Disk Defragmenter
c). Defragment Now
d). Windows Disk Cleanup

a). Check Now

Rodney owns a computer that he uses to work, keep in touch with friends and family, watch movies, listen to music, and use the Internet.

If Rodney wants to record music files onto a CD, he needs to make sure that his operating system has CD-____ capabilities.

a). mirroring
b). burning
c). hybrid
d). striping

b). burning

Conventional CD discs use ____ lasers.

a). red
b). infrared
c).blue
d).violet

b). infrared

Most computer tapes today are in the form of ____ tapes, as shown in the accompanying figure

a).floppy
b). flash
c). optical
d). cartridge

d). cartridge

Media that allow random access are sometimes referred to as ____ media.

a).optical
b).identifiable
c).addressable
d).nonidentifiable

c).addressable

Usually the storage device and storage medium are two separate pieces of hardware (that is, the storage medium is ____).

a).procurable
b).static
c).removable
d).configurable

c).removable

The time required to move the read/write heads to the cylinder that contains (or will contain) the desired data is called the ____.

a).initial time
b).rotational delay
c).data movement time
d). seek time

d). seek time

Dan is a small business owner who depends on his computer to keep track of customer and sales data. He is investigating storage options because it is critical for him to ensure that his data is safe in the event of a computer failure.

A friend of Dan suggested to him that he can use an external hard drive for his data storage and backup needs. To use an external hard drive, Dan should make sure that his computer has an available USB or ____ port.

a).ScanDisk
b).zip
c).flash
d).fireWire

d).fireWire

A ____, as shown in the accompanying figure, consists of a vertical stack of tracks, with the same relative track on each disk surface

a).sector
b).segment
c).cylinder
d).section

c).cylinder

Anything (such as a program, letter, digital photograph, or song) stored on a storage medium is referred to as a(n) ____.

a).label
b).index
c).folder
d).file

d).file

One type of storage device that is sometimes used with computers and that uses sequential access is a ____.

a).hard drive
b).flash drive
c).compact card
d).magnetic tape drive

d).magnetic tape drive

____ devices are high-performance storage servers that are individually connected to a network to provide storage for the computers connected to that network.

a).Network attached storage (NAS)
b).super network storage
c).holographic Storage
d).RAID (redundant arrays of independent disks)

a).Network attached storage (NAS)

A ____ is a place to store something temporarily.

a).sector
b).cache
c).track
d).tape

b).cache

Regardless of how storage devices are connected to a computer, ____ and/or names are typically assigned to each storage device.

a).letters of the alphabet
b).vowels
c).single-digit numbers
d).special characters

a).letters of the alphabet

Each hard disk is divided into pie-shaped groups of ____.

a).tracks
b).clusters
c).files
d).sectors

d).sectors

To keep files organized, related documents are often stored in ____ (also called directories) located on the storage medium.

a).indexes
b).labels
c).folders
d).programs

c).folders

A ____ is the hardware where data is actually stored.

a).storage device
b).storage memory
c).storage processor
d).storage medium

d).storage medium

____ means that data can be retrieved directly from any location on the storage medium, in any order.

a).Indirect access
b).Random access
c).Sequential access
d).Online access

b).Random access

____ provide(s) a method of storing data on two or more hard drives that work in combination to do the job of a larger drive.

a).Storage Area Networks (SANs)
b).RAID (redundant arrays of independent disks)
c).Network Attached Storage (NAS)
d).Holographic Storage

b).RAID (redundant arrays of independent disks)

A storage medium is inserted into the appropriate ____ to be read from or written to.

a).storage processor
b).bay
c).board
d).storage device

d).storage device

Some drive letters, such as the letter ____ typically used with the primary hard drive, are usually consistent from computer to computer and do not change even if more storage devices are added to a computer.

a).A
b).B
c).C
d).H

c).C

____ keys on a keyboard are used for issuing commands in some programs.

a). Alphanumeric
b). Number
c). Arrow
d). Function

d). Function

A ____ is designed to scan flat objects one page at a time.

a).sheetfed scanner
b). handheld scanner
c). flatbed scanner
d). C-Pen scanner

c). flatbed scanner

____ input data from special forms to score or tally exams, questionnaires, ballots, and so forth.

a). Optical character recognition (OCR) Devices
b). Optical mark readers (OMRs)
c). Magnetic ink character recognition (MICR) Readers
d). Biometric readers

b). Optical mark readers (OMRs)

The accompanying figure shows a portable ____ reader.

a). barcode
b). scanner
c). RFID
d). optimal mark

a). barcode

Stacey is the office manager for a small business and is looking for a new printer and scanner for her office.

When buying a scanner, Stacey needs to make sure that the scanner has a high enough ____, typically measured in the number of dots per inch (dpi), for the business needs of the office.

a). magnetic resolution
b). image depth
c). optical resolution
d). word spacing

c). optical resolution

Digital still cameras most often use ____ cards for storage.

a). flash memory
b). RAM memory
c). ROM memory
d). laser memory

a). flash memory

A(n) ____ is a flat, touch-sensitive device used in conjunction with a digital pen.

a). graphics table
b). graphics tablet
c). image tablet
d). touch screen

b). graphics tablet

With a ____, the user touches the screen with his or her finger to select commands or otherwise provide input to the computer with which it is being used.

a). touch screen
b). graphics tablet
c). signature capture device
d). laser screen

a). touch screen

Lisa is a student who regularly uses the computers at her local Internet café to listen to music, talk to her friends and family through the Internet, and play computer games.

Lisa needs to make sure that the computer that she is using has a ____ attached to it for her to be able to hear music and the sounds of a computer game.

a). touch screen
b). scanner
c). speaker
d). microphone

c). speaker

The display device for a desktop computer is formally called a ____.

a). touch screen
b). video reader
c). video input
d). monitor

d). monitor

____ uses a combination of multi-touch input from multiple users and object recognition to interact with computers that are typically built into tabletops and other surfaces.

a). Tactile feedback
b). Surface computing
c). A digitizing tablet
d). Touch coding

b). Surface computing

____ are used to input data about a person into a computer system so that the individual can be identified based on a particular unique physiological characteristic.

a). Biometric readers
b). RFID tags
c). MICR readers
d). OMRs

a). Biometric readers

In a printer, the number of ____ affects the quality of printed output.

a). characters per inch (cpi)
b). dots per inch (dpi)
c). lines per inch (lpi)
d). characters per second (cps)

b). dots per inch (dpi)

Some data projectors include an iPod ____ to connect a video iPod in order to project videos stored on that device.

a). port
b). dock
c). touch-screen
d). display

b). dock

A(n) ____ keyboard folds or rolls up and connects to a device via a wired or wireless connection when needed.

a). slide-out
b). portable
c). MIDI
d). on-screen

b). portable

One of the most common 2D barcodes, the ____ code represents data with a matrix of small squares.

a). ISBN
b). QR
c). Code 39
d). UPC

b). QR

The number of bits used to store color information about each pixel is called ____.

a). bit depth
b). color concentration
c). pixel depth
d). byte resolution

a). bit depth

A ____ rests on the desk or other flat surface close to the user’s computer and is moved across the surface with the user’s hand in the appropriate direction to point to and select objects on the screen.

a). touch screen
b). virtual keyboard
c). stylus
d). mouse

d). mouse

A ____ is an optical code that represents data with bars of varying widths or heights.

a). digital code
b). character code
c). bar table
d). barcode

d). barcode

____ are the most common type of flat-panel technology used for small- to medium-sized computer monitors.

a). Gas plasmas
b). OLEDs
c). FOLEDs
d). LCDs

d). LCDs

____ is the proprietary operating system for computers made by Apple Corporation.

a). Linux
b). Solaris
c). Mac OS
d). Unix

c). Mac OS

Most operating systems have security features available, such as an option to automatically download and install ____ from the operating system’s manufacturer on a regular basis.

a). security walls
b). device patches
c). security patches
d). device drivers

c). security patches

Creating a(n) ____ means making a duplicate copy of important files so that when a problem occurs, you can restore those files using the backup copy.

a). mirror
b). backup
c). index
d). hidden file

b). backup

The most recent version of Windows is Windows ____.

a). Leopard
b). XP
c). 7
d). Vista

c). 7

Rearranging the data on the hard drive so all files are stored in contiguous locations is called ____.

a). disk defragmentation
b). file compression
c). disk backup
d). disk cleanup

a). disk defragmentation

In addition to personal operating systems and server operating systems, there are also mobile operating systems and ____.

a). embedded operating systems
b). high-performance operating systems
c). virtual operating systems
d). storage operating systems

a). embedded operating systems

____ memory allows you to use more memory than is physically available on your computer.

a). Shared
b). Virtual
c). Multithreading
d). Buffer

b). Virtual

A computer’s ____ is a collection of programs that manage and coordinate the activities taking place within a computer system.

a). database system
b). storage system
c). application system
d). operating system

d). operating system

____ is the most widely used mobile operating system worldwide.

a). Mac OS
b). Palm OS
c). Windows Mobile
d). Symbian OS

d). Symbian OS

In DOS, the command ____ displays the files and folders in the current location.

a). CD
b). FORMAT
c). DIR
d). COPY

c). DIR

____ is a Linux-based operating system developed by the Open Handset Alliance.

a). Android
b). UNIX
c). Mac OS X
d). Vista

a). Android

The means by which an operating system or any other program interacts with the user is called the ____.

a). user login
b). programming interface
c). program front-end
d). user interface

d). user interface

Filenames typically include a ____ at the end of the filename.

a). file extension
b). file subscript
c). file subname
d). file attachment

a). file extension

A ____ is a software program that is designed to cause damage to the computer system or perform some other malicious act.

a). firewall
b). utility program
c). spyware
d). computer virus

d). computer virus

All programs and data located in RAM are divided into fixed-length ____ or variable-length segments, depending on the operating system being used.

a). pies
b). sectors
c). pages
d). cylinders

c). pages

Janet is studying operating systems as part of her Understanding Computers 101 class. After learning about the different types of operating systems, she realizes that she uses a number of them in her daily life.

Janet has an Apple computer at home. The operating system of that computer is ____.

a). Windows Vista
b). Solaris
c). Windows Embedded
d). Mac OS

d). Mac OS

____ software consists of the operating system and utility programs that control a computer system and allow you to use your computer.

a). Background
b). Front-end
c). Application
d). System

d). System

System software is usually divided into two categories: operating system software and ____ programs.

a). planning system
b). utility
c). FAT system
d). background

b). utility

____ was originally developed in the late 1960s at AT&T Bell Laboratories as an operating system for midrange servers.

a). Linux
b). UNIX
c). Solaris
d). Mac OS X

b). UNIX

Dean has been using computers for some time now, but he is unfamiliar with a number of utility programs. In order to better maintain his computer, he decides to ask his coworker Andrea for advice on basic utility programs.

Another thing that Andrea tells Dean is that it is very important for him to ____ all of his important data on a regular basis to protect against data loss in the case of a problem with the computer. He can use a(n) ____ utility to do this.

a). cleanup
b). defragment
c). compress
d). backup

d). backup

Dean has been using computers for some time now, but he is unfamiliar with a number of utility programs. In order to better maintain his computer, he decides to ask his coworker Andrea for advice on basic utility programs.

Andrea advises Dean to remove unnecessary programs from his computer by using a(n) ____ utility.

a). delete
b). uninstall
c). remove
d). cleanup

b). uninstall

In addition to personal operating systems and server operating systems, there are also mobile operating systems and ____.

a). embedded operating systems
b). high-performance operating systems
c). virtual operating systems
d). storage operating systems

a). embedded operating systems

With a ____, as shown in the accompanying figure, icons, buttons, menus, and other objects are selected with the mouse to issue commands to the PC.

a). graphical user interface
b). command line interface
c). desktop
d). command-driven interface

a). graphical user interface

One of the most obvious initial changes in Windows Vista is the ____ interface.

a). Leopard
b). Android
c). Aero
d). Symbian

c). Aero

____ includes all the programs that allow a user to perform specific tasks on a computer, such as writing a letter.

a). System software
b). Utility programs
c). Application software
d). Background programs

c). Application software

Commercial Linux distributions, such as those available from ____ and Novell, come with maintenance and support materials.

a). Red Hat
b). .NET Framework
c). Cisco
d). Adobe

a). Red Hat

The ____ boots the computer, launches application software programs, and ensures that all actions requested by a user are valid and processed in an orderly fashion.

a). startup
b). operating system
c). driver
d). registry

b). operating system

During the 1980s and early 1990s, ____ was the dominant operating system for microcomputers.

a). Mac OS
b). DOS (Disk Operating System)
c). Linux
d). desktop operating system

b). DOS (Disk Operating System)

Filenames typically include a ____ at the end of the filename.

a). file extension
b). file subscript
c). file subname
d). file attachment

a). file extension

The most recent version of Windows is Windows ____.

a). Leopard
b). XP
c). 7
d). Vista

c). 7

Most operating systems have security features available, such as an option to automatically download and install ____ from the operating system’s manufacturer on a regular basis.

a). security walls
b). device patches
c). security patches
d). device drivers

c). security patches

There are four basic categories of software: commercial software, shareware, freeware, and ____.

a). publish software
b). public domain software
c). advertising software
d). licensed software

b). public domain software

Charts are inserted into an Excel spreadsheet using the commands in the Charts group on the ____ tab on the Ribbon.

a). Format
b). Insert
c). Tools
d). Data

b). Insert

The most common type of database used on PCs today is a(n) ____.

a). relational database
b). two-way database
c). one-dimensional database
d). concurrent database

a). relational database

When typing text in a word processing program, you should only press ____ after a short line (like a title), at the end of a paragraph, and to leave a blank line between paragraphs.

a). Enter
b). Backspace
c). Insert
d). Esc

a). Enter

A single spreadsheet document is often called a ____.

a). cell
b). database
c). workbook
d). worksheet

d). worksheet

____ is used to plan, schedule, track, and analyze the tasks involved in a project, such as the construction of a building or the schedule for preparing a large advertising campaign for a client.

a). Computer-aided design (CAD)
b). Desktop publishing
c). Project management software
d) Personal productivity

c). Project management software

When selecting font size in a document, ____ points equals one-inch-tall text.

a). 36
b). 48
c). 60
d). 72

d). 72

Related software programs are sometimes sold bundled together as a ____, such as a group of graphics programs, utility programs, or office-related software.

a). software suite
b). software thread
c). software bank
d). software base

a). software suite

Bryan has just started an internship in which he uses a database frequently. The database contains information about the company’s employees. Bryan’s supervisor senses that he is anxious about using the database and drops by to give him a short tutorial.

The supervisor explains that each employee’s information forms a separate ____.

a). field
b). record
c). table
d). file

b). record

When a software program is purchased, the buyer is acquiring a(n) ____ that permits him or her to use the software.

a). software license
b). copyright
c). ownership right
d). software key

a). software license

Word processing programs use a feature called ____, which means the insertion point automatically moves to the beginning of the next line when the end of the screen line is reached.

a). word wrap
b). character wrap
c). letter wrap
d). character overflow

a). word wrap

____ programs are software programs that are distributed on the honor system.

a). Commercial
b). Freeware
c). Shareware
d). Public domain

c). Shareware

____ is freeware software.

a). Norton AntiVirus (antivirus program)
b). Image Shrinker (image optimizer)
c). Internet Explorer (Web browser)
d). Lynx (text-based Web browser)

c). Internet Explorer (Web browser)

A ____ is a group of values and other data organized into rows and columns, similar to the ruled paper worksheets traditionally used by bookkeepers and accountants.

a). document
b). cell
c). spreadsheet
d). block

c). spreadsheet

Bryan has just started an internship in which he uses a database frequently. The database contains information about the company’s employees. Bryan’s supervisor senses that he is anxious about using the database and drops by to give him a short tutorial.

Bryan’s supervisor explains that to retrieve information from the database, Bryan needs to use a ____.

a). query
b). form
c). presentation
d). formula

a). query

____ refers to organizing the content to be transferred to DVD, such as importing video clips, creating the desired menu structure, and so forth.

a). DVD authoring
b). Video editing
c). Video ripping
d). DVD ripping

a). DVD authoring

In a worksheet, the intersection of a row and a column is called a ____.

a). pointer
b). table
c). footer
d). cell

d). cell

When Mary started college, her parents bought her a new computer that came with minimal software. She is now looking into purchasing additional software.

Mary enjoys taking digital photos and would like software that would allow her to perform tasks such as correct brightness or contrast, eliminate red eye, crop, resize, etc. In order to have this functionality on her computer, she needs a photo ____ program.

a). dramatization
b). embedding
c). formatting
d). editing

d). editing

When Mary started college, her parents bought her a new computer that came with minimal software. She is now looking into purchasing additional software.

Mary needs word processing software for her classes, but she has to budget her resources carefully this semester. She might consider using ____, which is available as a free download via the Internet.

a). Microsoft Office
b. OpenOffice.org
c). SmartSuite.org
d). WordPerfect Office

b. OpenOffice.org

Most application programs have a built-in help feature, typically available through a(n) ____ button.

a). Tool
b). Window
c). Help
d). Advanced

c). Help

Although labels and constant values will be copied exactly to the new location, the way formulas behave when they are copied depends on whether they use relative cell referencing or ____.

a). total cell referencing
b). integral cell referencing
c). absolute cell referencing
d). full cell referencing

c). absolute cell referencing

In addition to their full versions, some commercial software is available as a ____ or trial version.

a). sample
b). friendly version
c). complimentary version
d). demo

d). demo

Presentation graphics programs contain an assortment of tools and operations for creating and editing slides, including preformatted ____ containing placeholders for the various elements in the slide.

a). wizards
b). charts
c). slide clips
d). slide layouts

d). slide layouts

Bryan has just started an internship in which he uses a database frequently. The database contains information about the company’s employees. Bryan’s supervisor senses that he is anxious about using the database and drops by to give him a short tutorial.

Bryan is told by the supervisor that to create a database, he first needs to create the database ____ itself, and then he can create the necessary database objects.

a). table
b). field
c). record
d). file

d). file

The most common type of database used on PCs today is a(n) ____.

a). relational database
b. two-way database
c). one-dimensional database
d). concurrent database

a). relational database

Most ____ programs are available to try free of charge, but typically a small fee is required to use the program regularly.

a). shareware
b). commercial
c). freeware
d). public domain

a). shareware

Related software programs are sometimes sold bundled together as a ____, such as a group of graphics programs, utility programs, or office-related software.

a). software suite
b). software thread
c). software bank
d). software base

a). software suite

A ____ is an image designed to enhance a presentation (such as an electronic slide show or a printed report) visually, typically to convey information more easily to people.

a). projector
b). presentation graphic
c). Trojan horse
d). phish

b). presentation graphic

____ refers to using a PC to combine and manipulate text and images to create attractive documents that look as if they were created by a professional printer.

a). Computer-aided design (CAD)
b). Desktop publishing
c). Project management software
d). Personal productivity

b). Desktop publishing

Businesses and many individuals often use office suites, sometimes called ____, to produce various types of documents.

a). integral suites
b). productivity software suites
c). mid-range suites
d). corporate suites

b). productivity software suites

Word processing programs use a feature called ____, which means the insertion point automatically moves to the beginning of the next line when the end of the screen line is reached.

a). word wrap
b). character wrap
c). letter wrap
d). character overflow

a). word wrap

The ____ is a new feature in versions of Microsoft Office, starting with Office 2007; it consists of tabs, which contain groups of related commands for the program being used.

a). shortcut menu
b). menu bar
c). Ribbon
d). Wizard

c). Ribbon

A single spreadsheet document is often called a ____.

a). cell
b). database
c). workbook
d). worksheet

d). worksheet

A(n) ____ is a named, preprogrammed formula, such as to compute the average of a group of cells or calculate a mortgage payment amount.

a). argument
b). label
c). cell
d). function

d). function

The accompanying figure represents the toolbar command button for the ____ command.

a). New document
b). Open
c). Save
d). Undo

d). Undo

Charts are inserted into an Excel spreadsheet using the commands in the Charts group on the ____ tab on the Ribbon.

a). Format
b). Insert
c). Tools
d). Data

b). Insert

Some mobile software programs are designed to be compatible with popular ____ to facilitate sharing documents between the two platforms.

a). Web-based software
b). system utilities
c). desktop software
d). Internet utilities

c). desktop software

Companies that deliver SaaS are sometimes referred to as ____.

a). download services
b). application service providers (ASPs)
c). Internet service providers (ISPs)
d). running services

b). application service providers (ASPs)

One of the most common painting programs is ____.

a). Macromedia’s Dreamweaver
b). Adobe’s Acrobat
c). Microsoft Paint
d). IBM’s Storyboard

c). Microsoft Paint

____ is a shareware program.

a). Microsoft Office (office suite)
b). Internet Explorer (Web browser)
c). Pine (e-mail program)
d). WinZip (file compression program)

d). WinZip (file compression program)

There are four basic categories of software: commercial software, shareware, freeware, and ____.

a). publish software
b). public domain software
c). advertising software
d). licensed software

b). public domain software

The original first-generation cell phones were ____ and designed for voice data only.

a). digital
b). discrete
c). analog
d). magnetic

c). analog

____ transmissions are used with cell phones and are sent and received via cellular (cell) towers.

a). PM radio
b). Wi-Fi radio
c). Cellular radio
d). Satellite radio

c). Cellular radio

A standard that is designed to connect peripheral devices, similar to Bluetooth, but that transfers data more quickly is ____.

a). WiMAX
b). xMax
c). Mobile-Fi
d). wireless USB

d). wireless USB

____ are earth-based stations that can transmit microwave signals directly to each other over distances of up to about 30 miles.

a). Satellite stations
b). RFID stations
c). Wi-Fi stations
d). Microwave stations

d). Microwave stations

____ is the use of networking technology to conduct real-time, face-to-face meetings between individuals physically located in different places.

a). Online conferencing
b). Videoconferencing
c). Phone conferencing
d). VoIP conferencing

b). Videoconferencing

A global positioning system (GPS) consists of ____ and a group of GPS satellites.

a). GPS transmitters
b). Wi-Fi receivers
c). GPS amplifiers
d). GPS receivers

d). GPS receivers

With ____, data is sent one bit at a time, one after the other along a single path.

a). serial transmission
b). parallel transmission
c). digital transmission
d). wireless transmission

a). serial transmission

Gabrielle is the network administrator at a medium-sized company. One of her responsibilities is to purchase network devices to maintain the company network.

Gabrielle would like to purchase a new ____, which would be used to connect the company’s LAN and the Internet.

a). hub
b). USB port
c). router
d). bridge

c). router

____ satellites travel at a speed and direction that keeps pace with the earth’s rotation, so they appear (from earth) to remain stationary over a given spot.

a). Microwave
b). Geosynchronous
c). Isochronous
d). Full-duplex transmission

b). Geosynchronous

The ____ allows individuals to "placeshift" multimedia content from their home TVs and DVRs to their portable computer or mobile device.

a). Singbox
b). Slingbox
c). Singmedia
d). Shiftmedia

b). Slingbox

Robert is a medical writer for a pharmaceutical company. The company allows Robert to work from home.

Every day, Robert uses ____ to have a real-time, face-to-face meeting with his boss.

a). intranets
b). telemarketing
c). virtual networks
d). videoconferencing

d). videoconferencing

The accompanying figure shows a ____ network.

a). star
b). ring
c). bus
d0. mesh

a). star

Robert is a medical writer for a pharmaceutical company. The company allows Robert to work from home.

Robert’s job is a(n) ____ job.

a). telemarketing
b). telecommuting
c). videoconferencing
d). e-working

b). telecommuting

Technically, to be called a ____, a device must convert digital signals (such as those used by a computer) to modulated analog signals (such as those used by conventional telephone lines) and vice versa.

a). hub
b). modem
c). switch
d). router

b). modem

__________ technology is commonly used to monitor the status of objects, such as shipping boxes, livestock, or expensive equipment to which these types of tags are attached

a). IrDA
b). cellular
c). RFID
d). Bluetooth

c). RFID

In ____ transmission, data is sent at the same time as other related data to support certain types of real-time applications that require the different types of data to be delivered at the proper speed for that application.

a). synchronous
b). isochronous
c). asynchronous
d). endrosynchronous

b). isochronous

Gabrielle is the network administrator at a medium-sized company. One of her responsibilities is to purchase network devices to maintain the company network.

Gabrielle is planning to connect selected devices to the network wirelessly with a wireless ____.

a). hotspot
b). access point
c). hub
d). data point

b). access point

Gabrielle is the network administrator at a medium-sized company. One of her responsibilities is to purchase network devices to maintain the company network.

Gabrielle realizes that to improve network performance, she needs to buy and install a ____, which identifies the device on the network for which the data is intended and sends the data to that device only.

a). switch
b). node
c). bus
d). bridge

a). switch

A ____ is a network that covers a relatively small geographical area, such as a home, office building, or school.

a). small area network (SAN)
b). metropolitan area network (MAN)
c). local area network (LAN)
d). personal area network (PAN)

c). local area network (LAN)

A ____ transmits all data received to all network devices connected to it, regardless of which device the data is being sent to.

a). bridge
b). router
c). gateway
d). hub

d). hub

____ refers to the amount of data that can be transferred (such as over a certain type of networking medium) in a given time period.

a). Bandwidth
b). Bluetooth
c). Modulation
d). Throughband

a). Bandwidth

Monitoring systems may also use ____, which are devices that respond to a stimulus (such as heat, light, or pressure) and generate an electrical signal that can be measured or interpreted

a). transmitters
b). interpreters
c). IAs
d). sensors

d). sensors

The ____ network consists of 24 Department of Defense satellites that are used for location and navigation purposes.

a). location positioning system (LPS)
b). satellite positioning system (SPS)
c). cellular phone
d). global positioning system (GPS)

d). global positioning system (GPS)

Microsoft Office markup tools and specialized ____ are used in conjunction with networking technology to allow multiple individuals to edit and make comments in a document without destroying the original content.

a). collaboration software
b). online software
c). job software
d). OCR software

a). collaboration software

A network adapter, also called a ____ when it is in the form of an expansion card, is used to connect a computer to a network.

a). network interface card (NIC)
b). powerline card
c). data communications card (DCC)
d). USB

a). network interface card (NIC)

___ transmission is relatively uncommon in data transmissions since most devices that are mainly one-directional, such as a printer, can still transmit error messages and other data back to the computer.

a). Half-duplex
b). Simplex
c). Full-duplex
d). Asynchronous

b). Simplex

In ____ transmission, data can move in both directions at the same time, such as with a telephone.

a). full-duplex
b). full-simplex
c). half-simplex
d). half-duplex

a). full-duplex

____ are acts of malicious destruction to a computer or computer resource.

a). Phishing attacks
b). Blocking attacks
c). Computer sabotage
d). Spoofing attacks

c). Computer sabotage

Repeated threats or other harassment carried out online between adults is referred to as ____.

a). cyberstalking
b). computer sabotage
c). cyberterrorism
d). phishing

a). cyberstalking

____ are sets of tools that allow hackers to access a system.

a). Toolkits
b). Hackkits
c). Crimekits
d). Rootkits

d). Rootkits

A booming area of computer crime involves online fraud, theft, scams, and related activities collectively referred to as ____.

a). e-cons
b). e-scams
c). dot frauds
d). dot cons

d). dot cons

____ identify users by a particular unique biological characteristic.

a). Possessed object access systems
b). Password access systems
c). Possessed knowledge access systems
d). Biometric access systems

d). Biometric access systems

____ is a type of scam that uses spoofed domain names to obtain personal information for use in fraudulent activities.

a). Framing
b). Fishing
c). Pharming
d). Farming

c). Pharming

A ____ is a malicious program that masquerades as something else—usually as some type of application program.

a). Trojan horse
b). computer worm
c). computer insect
d). computer bug

a). Trojan horse

___ software, such as that shown in the accompanying figure, can control which devices can be connected to an employee’s computer.

a). Data-leakage prevention
b). Device authentication
c). Professional firewall
d). Network quarantine

a). Data-leakage prevention

Melissa is the network administrator for a small publishing company. As network administrator, she is in charge of maintaining the security of all the computers that are part of the company’s network.

Melissa has set up procedures so that every user using a computer connected to the network needs to enter his or her ____, which appears as asterisks on the screen as it is being entered.

a). private key
b). e-mail address
c). public key
d). password

d). password

A computer that is controlled by a hacker or other computer criminal is referred to as a ____.

a). spider
b). server
c). client
d). bot

d). bot

____ access systems use physical objects for identification purposes and they are frequently used to control access to facilities and computer systems.

a). Touch object
b). Possessed object
c). Two-factor
d). Biometric

b). Possessed object

When a digitally signed document is received, the recipient’s computer uses the sender’s ____ key to verify the digital signature.

a). private
b). public
c). organizational
d). token

b). public

The ____, implemented in 2001, grants federal authorities expanded surveillance and intelligence-gathering powers, such as broadening their ability to obtain the real identity of Internet users and to intercept Internet communications.

a). Sarbanes-Oxley Act
b). USA Patriot Act
c). Identity Theft and Assumption Deterrence Act of 1998
d). No Electronic Theft (NET) Act

b). USA Patriot Act

Melissa is the network administrator for a small publishing company. As network administrator, she is in charge of maintaining the security of all the computers that are part of the company’s network.

One of the first items that Melissa installed was a(n) ____, which checks all incoming and outgoing traffic and only allows authorized traffic to pass through.

a). botnet
b). firewall
c). IPS
d). encryption algorithm

b). firewall

The term ____ refers to accessing someone else’s unsecured Wi-Fi network from the hacker’s current location (such as inside his or her home, outside a Wi-Fi hotspot location, or near a local business).

a). war driving
b). Wi-Fi piggybacking
c). Wi-Fi worming
d). denial of service

b). Wi-Fi piggybacking

The ____ includes provisions to combat cyberterrorism, including protecting ISPs against lawsuits from customers for revealing private information to law enforcement agencies.

a). Heath Insurance Portability and Accountability Act (HIPAA)
b). PROTECT Act
c). Homeland Security Act of 2002
d). National Information Infrastructure Protection Act

c). Homeland Security Act of 2002

____ can be extremely distressing for victims, can take years to straighten out, and can be very expensive.

a). Spams
b). Identity theft
c). Remote access
d). Software theft

b). Identity theft

____ occurs whenever an individual gains access to a computer, network, file, or other resource without permission.

a). Spoofing
b). Unauthorized access
c). Phishing
d). Vandalizing

b). Unauthorized access

Advocates of ____ state that, unless individuals or businesses protect their access points, they are welcoming others to use them.

a). spoofing
b). phishing
c). spamming
d). war driving

d). war driving

Phishing schemes may use a technique called ____, which is setting up spoofed Web sites with addresses slightly different from legitimate sites.

a). typosquatting
b). spamming
c). DoS attacks
d). identity theft

a). typosquatting

____ uses a single secret key to both encrypt and decrypt the file or message.

a). Private key encryption
b). Asymmetric key encryption
c). Public key encryption
d). Synchronous key encryption

a). Private key encryption

Melissa is the network administrator for a small publishing company. As network administrator, she is in charge of maintaining the security of all the computers that are part of the company’s network.

Melissa also decided to use a(n) ____, which continuously monitors and analyzes the traffic allowed to and from the network to detect possible attacks as they are occurring and block them.

a). IPS
b). firewall
c). antivirus software
d). RAM

a). IPS

Fernando has been having problems with his computer. He takes it to his local computer repair shop to be checked and finds out that his computer has a number of malware that he was not even aware of.

The technician tells Fernando that his computer has a ____, which might have gotten into Fernando’s computer when he downloaded a free computer game from the Internet.

a). spider
b). bot
c). virus
d). spam

c). virus

Antivirus programs are usually set up to automatically download new ____ from their associated Web site on a regular basis.

a). virus definitions
b). upgrades
c). software versions
d). virus reports

a). virus definitions

Fernando has been having problems with his computer. He takes it to his local computer repair shop to be checked and finds out that his computer has a number of malware that he was not even aware of.

The technician also found a ____ on the computer, which is designed to find sensitive information about the user located on the PC and then send it to the malware creator. The technician explains that this type of malware cannot replicate itself.

a). Trojan horse
b). worm
c). virus
d). bot

a). Trojan horse

____ access systems use physical objects for identification purposes and they are frequently used to control access to facilities and computer systems.

a). Touch object
b). Possessed object
c). Two-factor
d). Biometric

b). Possessed object

A ____ provides a secure private tunnel from the user’s computer through the Internet to another destination and is most often used to provide remote employees with secure access to a company network.

a). laptop private network
b). USB private network
c). tunnel private network
d). virtual private network

d). virtual private network

____ refers to the act of breaking into a computer or network.

a). Spamming
b). Phishing
c). Hacking
d). Spoofing

c). Hacking

Advocates of ____ state that, unless individuals or businesses protect their access points, they are welcoming others to use them.

a). spoofing
b). phishing
c). spamming
d). war driving

d). war driving

____ is a generic term that refers to any type of malicious software.

a). Spamware
b). Malware
c). Spyware
d). Badware

b). Malware

Some Web-based encrypted e-mail systems—such as the popular free ____ service—require both the sender and recipient to have accounts through that system.

a). CryptMail
b). QuietMail
c). HushMail
d). PrivateMail

c). HushMail

____ identify users by a particular unique biological characteristic.

a). Possessed object access systems
b). Password access systems
c). Possessed knowledge access systems
d). Biometric access systems

d). Biometric access systems

A computer ____ spreads by creating copies of its code and sending those copies to other computers via a network.

a). virus
b). software
c). worm
d). hacker

c). worm

The accompanying figure shows the iGoogle ____ Web page.

a). portal
b). RSS
c). social networking
d). podcasting

a). portal

One of the most straightforward ways to improve the quality of the hits returned in a search is to use ____—essentially typing more than one keyword in a keyword search.

a). character searching
b). phrase searching
c). index searching
d). code searching

b). phrase searching

The ____ is cited as a disadvantage of Web-based training and distance learning by some educators.

a). lack of face-to-face contact
b). slow feedback and generalized content
c). strict-paced instruction
d). inflexible location

a). lack of face-to-face contact

____ generally refers to applications and services that use the Web as a platform to deliver rich applications that enable people to collaborate, socialize, and share information online.

a). Web X
b). Web Y
c). Web 1.0
d). Web 2.0

d). Web 2.0

____ is the most widely used type of home broadband connection, with over half of the home broadband market.

a). DSL (Digital Subscriber Line) Internet access
b). Fixed wireless Internet access
c). Mobile wireless Internet access
d). Cable Internet access

d). Cable Internet access

One advantage of a dial-up connection is ____.

a). connection speed
b). security
c). sharing the connection
d). continuous availability

b). security

____ are businesses or other organizations that provide Internet access to others, typically for a fee.

a). Application service providers (ASPs)
b). Conferencing service providers
c). Telephone service providers
d). Internet service providers (ISPs)

d). Internet service providers (ISPs)

Online shopping and online investing are examples of ____.

a). online merchandising
b). online marketing
c). e-commerce
d). e-trade

c). e-commerce

Anthony is passionate about politics and enjoys sharing and discussing his views with others over the Internet.

Anthony regularly visits several popular political ____, which are Web pages designed to facilitate written discussions between people on specific subjects.

a). e-mail programs
b). message boards
c). Webinars
d). podcasts

b). message boards

Internet Explorer users can view and/or delete cookies and other temporary files by using the ____ dialog box.

a). Windows
b). Edit
c). File
d). Internet Options

d). Internet Options

____ are companies that manage and distribute Web-based software services to customers over the Internet.

a). Internet service providers (ISPs)
b). Internet content providers
c). Online conferencing service providers
d). Application service providers (ASPs)

d). Application service providers (ASPs)

The primary infrastructure that makes up the ____ is typically owned by communications companies, such as telephone and cable companies.

a). main Internet
b). World Net
c). Internet backbone
d). super net

c). Internet backbone

____ sites allow you to generate map and driving directions and provide access to specific types of useful information.

a). Educational
b). Reference
c). News
d). Product information

b). Reference

____ is an online news tool designed for facilitating the delivery of news articles, podcasts, and other content regularly published to a Web site.

a). VoIP
b). RSS
c). Video-on-demand
d). Blog

b). RSS

One objective of the ____ project was to create a computer network that would allow researchers located in different places to communicate with each other.

a). World Wide Web
b). ARPANET
c). ISOC
d). W3C

b). ARPANET

To determine if the information from a Web page can be trusted, you should evaluate both the ____ and the source.

a). technology
b). hardware
c). designer
d). author

d). author

Brenda is a college student who enjoys downloading music, movies, and television shows from the Internet. She also uses the Internet for other entertainment, such as sports.

Because she is an avid baseball fan, Brenda has subscribed to the ____ feed of her local team so that news about her team is delivered to her as it becomes available.

a). wiki
b). RSS
c). portal
d). VOD

b). RSS

____ allows you to exchange real-time messages easily with people on your buddy list—a list of individuals that you specify.

a). VoIP
b). Blogging
c). Instant messaging
d). Streaming

c). Instant messaging

Many Web pages today use ____ —small text files that are stored on your hard drive by a Web server, typically the one associated with the Web page being viewed—to identify return visitors and their preferences.

a). cookies
b). blogs
c). podcasts
d). filters

a). cookies

Video content delivered at the user’s request is called ____.

a). video channel
b). video networking
c). video-on-demand
d). Video over Internet Protocol

c). video-on-demand

____ is a consortium of researchers, educators, and technology leaders from industry, government, and the international community that is dedicated to the development of revolutionary Internet technologies.

a). P2P
b). Internet2
c). ICANN2
d). ISP

b). Internet2

Conventional dial-up connects to the Internet at a maximum of ____.

a). 10.2 Kbps
b). 28.8 Kbps
c). 56 Kbps
d). 128 Kbps

c). 56 Kbps

____, as it relates to the Internet, encompasses what information about individuals is available, how it is used, and by whom.

a). Security
b). Privacy
c). Filtering
d). Control

b). Privacy

In a nutshell, blogs are designed for primarily one-way running communications, while ____ are intended to be modified by others.

a). e-portfolios
b). wikis
c). e-blogs
d). e-diaries

b). wikis

Today, the standard term for placing telephone calls over any type of data network (including the Internet, as well as a LAN, WAN, or other type of data network) is ____.

a). VoIP
b). DSL
c). ISDN
d). BoF

a). VoIP

Direct Internet connections are typically ____ connections.

a). broadband
b). dial-up
c). bandwidth
d). satellite

a). broadband

Brenda is a college student who enjoys downloading music, movies, and television shows from the Internet. She also uses the Internet for other entertainment, such as sports.

Because she is an avid baseball fan, Brenda has subscribed to the ____ feed of her local team so that news about her team is delivered to her as it becomes available.

a). wiki
b). RSS
c). portal
d). VOD

b). RSS

____ limit search results to just those pages with a specific Web page title, URL, text, or top-level domain.

a). Keyword searches
b). Directory searches
c). Field searches
d). Phrase searches

c). Field searches

Brenda is a college student who enjoys downloading music, movies, and television shows from the Internet. She also uses the Internet for other entertainment, such as sports.

Brenda likes to download her music from a(n) ____ site and then transfer it to her portable digital media player so that she can listen to her music while she’s away from her computer.

a). VoIP
b). RSS
c). mobile music
d). online music store

d). online music store

____ is a new alternative for homes and businesses today in areas where there is fiber optic cabling available all the way to the building.

a). T1
b). DSL
c). ISDN
d). BoF

d). BoF

Brenda is a college student who enjoys downloading music, movies, and television shows from the Internet. She also uses the Internet for other entertainment, such as sports.

Brenda also orders movies and television through the Internet via a(n) ____ provider, which allows users to download video for a small fee.

a). RSS
b). VOD
c). VoIP
d). blog

b). VOD

Share This
Flashcard

More flashcards like this

NCLEX 10000 Integumentary Disorders

When assessing a client with partial-thickness burns over 60% of the body, which finding should the nurse report immediately? a) ...

Read more

NCLEX 300-NEURO

A client with amyotrophic lateral sclerosis (ALS) tells the nurse, "Sometimes I feel so frustrated. I can’t do anything without ...

Read more

NASM Flashcards

Which of the following is the process of getting oxygen from the environment to the tissues of the body? Diffusion ...

Read more

Unfinished tasks keep piling up?

Let us complete them for you. Quickly and professionally.

Check Price

Successful message
sending