________ is the semiconductor material used to make transistors. |
Silicon |
The ________ is the box that contains the central electronic components of the computer. |
system unit |
Which type of software lets you dictate letters, e-mails, and voice commands? |
speech recognition software |
CD ripping refers to ________. |
encoding CDs to MP3 format |
Multimedia software includes all of the following EXCEPT: |
utility software. |
GPS software allows users to ________. |
locate restaurants, airports, and points of interest |
Which type of software helps managers with tasks such as scheduling charts? |
project management software |
Software that does "back office" operations and processing functions such as billing, production, inventory management, and human resources management is called ________. |
enterprise resource planning software |
The special memory storage areas built into the CPU are called ________. |
registers |
Which of the following is an example of discounted software? |
educational versions of software |
Angel and Blackboard are examples of ________. |
course management software |
The ASCII code can represent ________ unique characters. |
256 |
In a spreadsheet, the columns and rows form individual boxes called _______. |
cells |
Which type of software stores client information in one central database for use by sales professionals? |
customer relationship management software |
Software designed for a specific industry is known as ________ software. |
vertical market |
The CPU processing cycle has how many steps? |
4 |
Unicode uses ________ bits to code character data. |
16 |
Microsoft ________ is software that allows students who have Tablet PCs to write their notes directly onto the tablet, using it as an electronic notebook. |
OneNote |
Software you can use to create a budget is called ________. |
spreadsheet software |
Every software program has a set of ________ that specify the minimum recommended standards for the operating system, processor, RAM, and hard drive capacity. |
system requirements |
Custom software, developed to address the needs of a specific company, is known as ________ software. |
proprietary |
Which of the following sequences lists the speed of memory from the fastest to the slowest? |
registers, Level 1 cache, Level 2 cache, RAM |
QuarkXPress and Adobe InDesign are examples of ________ software. |
desktop publishing |
Presentation software includes all of the following features EXCEPT: |
formulas. |
In a spreadsheet, equations you build yourself using values and cell references are called ________. |
formulas |
Microsoft Office and Corel WordPerfect Office are examples of ________. |
software suites |
All of the commands in an instruction set are written in ________ language, which is easier for humans to work with than binary. |
assembly |
An example of software that includes electronic checkbook registers and automatic bill payment tools is ________. |
Intuit Quicken |
Which Microsoft program is used to create technical drawings, map basic block diagrams, and more? |
Visio |
Predesigned forms that provide the basic structure for a particular kind of document are known as ________. |
templates |
The cell address F7 indicates that the cell ________. |
is at column F, row 7 of the worksheet |
Computer-aided design software is used primarily by ________. |
engineers to create models |
The main purpose of the decode stage is for the CPU’s ________ to translate program instructions into commands the CPU can understand. |
control unit |
Which type of software is used at colleges to keep track of student records? |
database software |
A(n) ________ software installation allows you to decide which features you want to install on the hard drive. |
custom |
The ________ number system uses the digits 0-9 and the symbols A-F. |
hexadecimal |
QuickBooks and Peachtree are examples of ________. |
accounting software |
Illegally copying an application onto another computer is called ________. |
software piracy |
Microsoft Word and OpenOffice.org Writer are examples of ________. |
word processing software |
The primary benefit of a spreadsheet program is ________. |
its ability to automatically recalculate formulas and functions |
System software does all of the following EXCEPT ________. |
add graphics and pictures to files |
Web-based application software is software that ________. |
is stored completely on a Web server instead of your hard drive |
Software refers to a set of instructions that tells the computer what to do. These instruction sets are called ________. |
programs |
When available, the best way to remove an unwanted software application is to ________. |
use the application’s uninstall program |
Software that lets you do tasks at home, school, and work is called ________. |
application software |
Which type of software is used to keep track of appointments, to-do lists, and telephone numbers? |
personal information manager (PIM) software |
Adobe Dreamweaver is an example of ________. |
Web page authoring software |
The collection of commands that a specific CPU executes is called its ________ |
instruction |
Which type of software is used to make a slide show? |
presentation software |
Adobe Premiere Pro and Microsoft Live Movie Maker are examples of ________ software. |
digital video editing |
Which file format enables users to share, view, and print any file as long as they have the appropriate program installed? |
|
The organization responsible for rating computer games is the ________. |
Entertainment Software Rating Board |
Software that is distributed for free, but often with the condition that you pay for it if you like and intend to use it, is called ________. |
shareware |
What type of memory stores frequently used instructions or data needed by the CPU? |
cache |
A byte is composed of ________ bits. |
8 |
In the URL http://www.prenhall.com, the portion labeled .com is the ________. |
top-level domain |
All of the following are ways to communicate on the Internet EXCEPT: |
hyperlinks. |
The "s" in https stands for ________. |
secure socket layer |
Podcasts enable you to ________. |
broadcast over the Internet using compressed audio and video files such as MP3s and MP4s |
One way to mark a Web site so that you can return to it later without typing the address is to ________. |
use Favorites or Bookmarks |
Which of the following is the desktop search feature in Mac OS X Snow Leopard? |
Spotlight |
If you wanted to keep a written online journal, you would use ________. |
a weblog |
The Internet backbone refers to ________. |
the main pathway of high-speed communications lines through which all Internet traffic flows |
________ is a social networking service that enables you to exchange short text messages with your friends or "followers." |
|
E-commerce that involves businesses buying and selling goods and services to other businesses is called ________. |
B2B |
Which of the following is similar to the Windows System Properties dialog box and displays hardware and software information on a Mac? |
System Profiler |
Adobe Reader, Flash Player, and QuickTime Player are all examples of special software programs called ________. |
plug-ins |
Which of the following are personal video journal entries posted on the Web? |
vlogs |
Which of the following is a free Web authoring suite? |
SeaMonkey |
The Internet2 is a project ________. |
to develop new Internet technologies |
You can keep track of IM contacts by using a ________. |
buddy list |
The name of the free Internet browser from Mozilla is ________. |
Firefox |
Facebook and MySpace are considered to be ________. |
social networking Web sites |
What protocol allows files to be transferred from a Web server so that you can view them on your computer using a browser? |
HTTP |
Web 2.0 describes ________. |
a trend of new Web applications that combine the functionality of multiple applications |
A(n) ________ is a keyword or term that is assigned to a piece of information such as a Web page, digital image, or video and describes the site so that it can be found again by browsing or searching. |
tag |
A set of programs that searches the Web to find information is called a ________. |
search engine |
Which of the following is most likely to be a popular choice for a broadband Internet connection in a rural area? |
satellite |
The large scale networking (LSN) project is ________. |
a U.S. government Internet research project |
Which of the following is NOT a type of broadband Internet connection? |
dial-up |
Which of the following is an open source operating system? |
Linux |
A Web site that allows anyone to add or edit content is called a ________. |
wiki |
Search engines have which three parts? |
a spider, an indexer, and search engine software |
When building your own computer, which of the following is NOT required? |
a router |
RSS stands for ________. |
Really Simple Syndication |
Instant messaging (IM) services are programs that enable you to ________. |
communicate in real time with others who are online |
The Internet is ________. |
a large network of networks |
The text version of a Web site’s Internet address is called the ________. |
Uniform Resource Locator (URL) |
Which of the following is free software to create or edit digital art? |
GIMP |
The World Wide Web was invented by ________. |
Tim Berners-Lee at CERN |
OpenOffice 3 includes all of the following components EXCEPT: |
Word. |
Podcasts use which of the following technologies? |
RSS |
A webcast is ________. |
the broadcast of audio or video content over the Internet |
A list of pages within a Web site that you have visited and that usually appears at the top of a page is referred to as a(n) ________. |
breadcrumb trail |
The concept of the Internet developed from ________. |
the Cold War crisis |
All of the following are examples of multimedia EXCEPT: |
text. |
In the URL http://www.prenhall.com, the portion labeled http is the ________. |
protocol |
Which of the following provides the highest speed Internet connection? |
cable |
The default file format for saving a spreadsheet in Calc is ________. |
.ods |
The advantage of a dial-up Internet connection is ________. |
low cost |
HTTP is the abbreviation for ________. |
hypertext transfer protocol |
All of the following are parts of a URL EXCEPT: |
hyperlinks. |
Webcasts differ from podcasts in that webcasts ________. |
are not updated automatically |
The agency that first began funding the Internet was called the ________. |
Advanced Research Projects Agency Network |
________ microphones pick up sound from only one direction. |
Unidirectional |
Computers gather data, which means that they allow users to ________ data. |
input |
In binary language, each letter of the alphabet, each number, and each special character is made up of a unique combination of |
eight bits. |
Inkjet printers and laser printers are examples of ________ printers. |
nonimpact |
________ is the theory that holds that there is no universal moral truth and that instead there are only beliefs, perspectives, and values. |
Relativism |
After a picture has been taken with a digital camera and processed appropriately, the actual print of the picture is considered ________. |
output |
A ________ is approximately 1 million bytes |
megabyte |
________ computers are specially designed computer chips that reside inside other devices such as your car or the electronic thermostat in your home. |
Embedded |
________ ports are now the most common ports for connecting input and output devices to the computer. |
Universal serial bus (USB) |
________ is a form of permanent memory that holds all the instructions the computer needs to start up. |
ROM |
________ printers have tiny hammer-like keys that strike the paper through an inked ribbon. |
Impact |
Computers process data into information by working exclusively with ________. |
numbers |
The type of monitor that looks like a traditional television set is called a ________ monitor. |
cathode-ray tube (CRT) |
Which of the following is NOT one of the four major data processing functions of a computer? |
analyzing the data or information |
________ is the applied science concerned with designing and arranging things that people use so that the people and things interact most efficiently and safely. |
Ergonomics |
Devices such as monitors and printers that are connected to the computer are called ________. |
peripheral devices |
The ________ contains the central electronic components of the computer. |
motherboard |
________ is a power mode that allows the computer to save an image of the desktop to the hard drive and enter a state of reduced power consumption to save energy. |
Hibernate |
Which of the following is an example of an input device? |
a scanner |
________ software is the set of programs that enables the computer’s hardware devices and application software to work together. |
System |
Large, expensive computers that support hundreds of users simultaneously are called ________. |
mainframes |
A(n) ________ enables you to enter data (text, images, and sound) and instructions (user responses and commands) into the computer. |
input device |
All of the following are types of cyberbullying EXCEPT: |
calling a co-worker to schedule a meeting |
________ plug into slots on the motherboard and provide additional functionality for your computer. |
Expansion cards |
Restarting a computer when it is already powered on is called ________. |
a warm boot |
________ are large printers used to produce oversize pictures that require precise continuous lines, such as maps and architectural plans. |
Plotters |
Which of the following ethical philosophies states that decision making should be based on the particular circumstances and not on fixed laws? |
situational ethics |
A ________ is approximately 1 billion bytes. |
gigabyte |
A(n) ________ uses an internal sensor or laser to detect the mouse’s movement. |
optical mouse |
The ________ language consists of just two digits: 0 and 1. |
binary |
The hard disk drive is a ________ storage device, meaning that it stores data permanently. |
nonvolatile |
The small, touch-sensitive area at the base of the keyboard on a notebook computer is known as a ________. |
touch pad |
A ________ is a portable computer that features a touch-sensitive screen and handwriting recognition software. |
Tablet PC |
________ is the place in a computer where the programs and data the computer is currently using are stored. |
RAM |
Any computer parts that you can actually touch are considered to be ________. |
hardware |
USB ports are fast replacing traditional ________ ports because of their ability to transfer data quickly. |
parallel and serial |
Intellectual property (such as music, writing, and software) is protected through ________ law. |
copyright |
The ________ port resembles a standard phone jack. |
modem |
A person who does not conform to a set of approved standards of social or professional behavior ________. |
commits unethical behavio |
________ are a form of permanent storage that can be seen and accessed from outside the system unit and are typically used for CD and DVD drives. |
External drive bays |
A ________ enables your computer to connect to other computers or to the Internet. |
network interface card (NIC) |
The ________ is used in combination with other keys to perform shortcuts and special tasks. |
Control (Ctrl) key |
Correct |
Information |
Social media sites are about sharing information. The use of this information can raise questions regarding ________. |
personal privacy |
The term "bit" is short for ________. |
binary digit |
The S-video and the ________ ports on a computer facilitate connecting the computer to multimedia devices such as TVs and DVD players. |
DVI |
A(n) ________ is a device that looks like a skinny pen but has no ink. |
stylus |
________ binary digits (or bits) combine to create one byte. |
Eight |
Flash drives plug into a(n) ________. |
USB port |
Monitor screen grids are made up of millions of pixels, with each pixel containing ________ subpixels of colors. |
three |
The term ________ describes computing devices or peripherals that use techniques, parts, and methods from an earlier time that are no longer popular. |
legacy technology |
A(n) ________ is where a peripheral device can attach to a computer so that data can be exchanged between it and the operating system. |
port |
Google restricting its search engine services in China by not allowing search results for sites considered objectionable by the Chinese government is an example of ________. |
censorship |
________ is the set of computer programs that enables the hardware to perform different tasks. |
Software |
RAM is considered volatile storage, which means it is ________. |
temporary |
The ________, housed inside the system unit, regulates the wall voltage to the voltages required by the computer chips. |
power supply |
All the following are examples of input devices EXCEPT a ________. |
printer |
The ________ requires companies to provide mechanisms for employees and third parties to anonymously report complaints, including ethics violations. |
Sarbanes—Oxley Act |
Which personal computer was chosen as "machine of the year" by Time magazine? |
IBM PC |
A ________ is a special device that is installed in your computer and allows it to communicate with other devices on the network. |
network adapter |
Unwanted e-mail is called ________. |
spam |
Which of the following is NOT necessarily part of being computer literate? |
being able to build a computer |
________ is a type of wireless communication that transmits data through radio waves. |
Bluetooth technology |
What was the first word processing application to be used on personal computers? |
WordStar |
Technology no longer protected by copyright, available to everyone, is considered to be ________. |
in the public domain |
The ________ computer had switches on the front of it, which were used to enter data using 0s and 1s. |
Altair |
Many online courses are designed to use management software like ________ so that students can communicate outside of class, take quizzes online, and find their class materials easily. |
Blackboard or Moodle |
The ________, weighing 24.5 pounds, was the industry’s first portable computer. |
Osborne |
The goal of ________ is to provide solutions to physical problems, such as providing sight to the blind. |
biomedical chip research |
The ability to recover and read deleted or damaged files from a criminal’s computer is an example of a law enforcement specialty called ________. |
computer forensics |
________ is the study of molecules and structures whose sizes range from 1 to 100 nanometers. |
Nanoscience |
Children who do not have access to ________ and ________ won’t be prepared for future employment. |
the Internet, computers |
What programming language revolutionized the software industry because beginning students could learn it easily? |
BASIC |
By studying the data produced by ________, scientists hope to improve the prediction of weather phenomena. |
simulations |
The graphical user interface was developed by ________. |
Xerox |
________ tags are small versions of the roadway electronic toll system used in many states to automate paying tolls as motorists pass through the toll station. |
RFID |
Many people believe Grace Hopper’s greatest contribution to computing was ________. |
the compiler |
To set up a(n) ________, you must have an appropriate computer and digital devices connected to a home network. |
digital home |
Being ________ means being familiar enough with computers that you understand their capabilities and limitations. |
computer literate |
A ________ is a small device that enables users to carry digital information. |
Smartphone |
________ is a field of study focused on information handling and retrieval of information automatically. |
Information technology |
A ________ is a specially designed scannable sticker that resembles an inkblot and contains all the important information about a UPS package. |
MaxiCode |
________ is the application of computer systems and techniques to gather potential legal evidence. |
Computer forensics |
The Microsoft Authorized Refurbisher program supports refurbishers by allowing ________ to be installed for free on refurbished systems. |
certain Microsoft operating systems and Office software |
Which of the following do today’s educators NOT need to be familiar with to create constructive computerized lessons and to interact with students? |
Web authoring software |
Medical students can train on ________ and experience firsthand how a human would react to a particular treatment. |
patient simulators |
One of the reasons the Apple II computer was popular was that ________. |
the operating system instructions were stored in ROM |
________ computing relates to emotion or deliberately tries to influence emotion. |
Affective |
The prefix nano stands for ________. |
one-billionth |
The ________ is a global effort in which bioengineers are creating realistic computer simulations of all systems and features of the human anatomy. |
Physiome Project |
Surgeons use ________ to perform delicate operations by manipulating devices through computers instead of manually. |
robotics |
All of the following are examples of real security and privacy risks EXCEPT: |
spam. |
While engineers work to create computers that can understand us emotionally, ________ are also evolving toward a more human appearance. |
computer systems |
When a job is sent to other countries, as many programming jobs have been, it is said to have been ________. |
offshored |
________ tags, when placed on an animal, can be used to record and track in a database all of the animal’s movements. |
RFID |
One type of chip already being implanted in humans as a means of verifying a person’s identity is called a(n) ________. |
VeriChip |
One potential application of ________ is to provide sight to the blind |
biomedical chip implants |
A ________ allows you to transfer media from your computer to other media devices (such as a plasma TV). |
digital media adapter |
Which of the following allowed users to interact with the computer more easily? |
the graphical user interface |
The difference between people with access to computers and the Internet and those without this access is known as the ________. |
digital divide |
The first commercial Internet Web browser was developed by ________ in 1995. |
Netscape |
A nanometer is ________. |
one-billionth of a meter |
The emotional-social prosthesis (ESP) device, developed by a group at the MIT Media Lab, is targeted at helping people who have ________. |
autism |
________ is the science revolving around building devices on an extremely small scale. |
Nanotechnology |
________ is the nerve center of any digital home, allowing you to interface with the different digital devices connected to the network. |
A computer |
The process of searching huge amounts of data with the hope of finding a pattern is called ________. |
data mining |
In a Windows folder, to display files and folders as icons in list form, use ________ view. |
Tiles |
The ________ is responsible for managing the processor and all other components of the computer system, and is an essential part of the operating system. |
kernel |
In Windows, a file path starts with a ________. |
drive letter |
In the Windows operating system, the hard drive is represented as the ________. |
C Drive |
The version of Windows 7 that is most appropriate for high-end PC users, gamers, and multimedia professionals is _______. |
Windows 7 Ultimate |
Which of the following would be a name of a Microsoft Access document. |
inventory.accdb |
During the virtual memory process, the operating system moves data to a temporary storage area on the hard drive called the ________ file. |
swap |
A(n) ________ builds Web pages to deploy the materials that the content creators develop. |
Web publisher |
Which of the following is a single-user, multitask operating system? |
Mac OS |
When a U.S. company hires a company outside of the United States, they are using a technique called ________. |
offshoring |
XO-1 is the name of the computer being provided by the ________ project. |
One Laptop per Child |
C:\Documents\Spring 2012\CIS 101\Term Paper\Computer Technology is an example of a ________. |
file path |
All of the following are terms related to part of the boot process EXCEPT: |
USB. |
Microsoft Windows and Mac OS use a ________ interface. |
graphical user |
The process of replacing repeated patterns of letters in a file with a shorter placeholder is called ________. |
file compression |
The ________ of the operating system allows the user to communicate with the computer system. |
user interface |
f you want to automatically defragment your hard drive every week, you can set a predetermined time using the ________. |
Task Scheduler |
Which of the following is the first step in the boot process? |
The BIOS is activated by powering on the CPU. |
The OS allows you to organize the contents of your computer in a hierarchical structure of ________. |
directories |
Which of the following is NOT a function of the operating system? |
It manages the removal of spyware. |
You can use the Windows ________ to check on a nonresponsive program. |
Task Manager |
Some video games require a ________ operating system. |
real-time |
The basic input/output system is stored on a ________ chip. |
ROM |
________ are easy-to-use mini desktop programs that give you information at a glance or quick access to frequently used tools including weather information, calendar items, or games. |
Gadgets |
Which of the following does NOT occur during the power-on self-test? |
The OS is moved into RAM. |
Which of the following is a file compression utility? |
WinZip |
Which of the following is NOT a step in the boot process? |
The antivirus program checks all files for viruses. |
The most essential software in your computer system is the ________. |
operating system software |
Which of the following was the first widely used operating system installed in personal computers? |
MS-DOS |
In Windows, you can create ________ to reset your system in the case of a malfunction. |
restore points |
When an operating system receives an interrupt from the printer and pauses the CPU, it is performing which of the following functions? |
processor management |
The ________ is a program that manages the data between the operating system and all input and output devices attached to the system. |
BIOS |
Which of the following operating systems is used primarily with mainframes as a network operating system? |
UNIX |
Which of the following statements about a graphical user interface is FALSE? |
A GUI is a command-driven interface. |
With Windows Explorer, you can perform all of the following file management actions EXCEPT: |
editing files. |
________ staff the phones, respond to Internet live chat, or respond to e-mail and solve problems for customers or employees, either remotely or in person. |
Helpdesk analysts |
The location of a file is specified by its ________. |
file path |
The ________ contains all of the different configurations used by the OS and by other applications. |
registry |
The combination of operating system and processor in a computer is referred to as a computer’s ________. |
platform |
Programmers, systems analysts, project managers, and technical writers are generally considered part of a(n) ________ team. |
systems development |
Before upgrading your OS, you should back up your ________. |
data files |
When a U.S. business hires a third party within the United States to provide services they offer to their customers, it is called ________. |
outsourcing |
The ________ manages the flow of data and information through the computer system by coordinating the hardware, software, user interface, processor, and system memory. |
operating system |
An IT professional working a(n) ________-based job reports for work to the same location each day and interacts with the same people on a regular basis. |
office |
If Microsoft Word 2010 is used to create a file, which file extension is added automatically? |
.docx |
When your computer is in Safe mode, you can use the ________ to view and change the properties of all devices attached to the computer. |
Device Manager |
Real-time operating systems can be found in ________. |
scientific instruments |
Which of the following types of programs help manage system resources such as the hard drive? |
utility programs |
Which of the following statements concerning the Windows Recycle Bin is TRUE? |
You can restore files that have been moved to the Recycle Bin. |
Which of the following Windows utility programs arranges files on your hard drive in sequential order |
Disk Defragmenter |
Mac OS X Snow Leopard includes a backup utility called ________. |
Time Machine |
Which of the following is NOT a degree that prepares students for IT careers? |
ACM |
All of the following can be considered to be network operating systems EXCEPT |
Symbian OS. |
If you want to save a file that will be opened by people who use a wide variety of software, any of the following formats would be safe EXCEPT ________. |
.docx |
In Windows, which character is used as a path separator? |
backslash (\) |
Network, database, and Web server administrators are generally considered part of the ________ department. |
information systems |
Each device attached to your computer comes with a special program called a ________ that facilitates communication between the device and the OS |
device driver |
All of the following can be used in a Windows file name EXCEPT: |
*. |
Windows 7 introduces the concept of ________, which are folders that gather files from different locations and display the files as if they were all saved in a single folder. |
libraries |
All of the following are forms of RAM EXCEPT: |
XRAM. |
Which statement pertaining to system reliability is FALSE? |
An accumulation of temporary Internet files has no effect on your computer’s overall performance. |
Notebooks are often equipped with a(n) ________ slot that allows you to read flash memory cards such as CompactFlash, Memory Sticks, and Secure Digital cards. |
ExpressCard |
Kernel memory is ________. |
RAM memory used by the operating system |
Moore’s Law is a rule that predicts ________. |
the pace at which CPUs improve |
The CPU is connected to the system memory by the ________. |
front side bus |
Windows 7 incorporates ________, which enables you to migrate files and settings from a Windows Vista system to a Windows 7 system via a network connection. |
Windows Easy Transfer |
CPU speed, also called clock speed, is measured in ________. |
gigahertz |
Which of the following statements is true about optical media? |
A Blu-ray burner will most likely burn both CDs and DVDs. |
To make sure your computer performs reliably, you can do all of the following EXCEPT: |
increase the front side bus speed. |
________ provides high-speed information processing by enabling a new set of instructions to start before the previous set has been finished. |
Hyperthreading |
Front side bus speed is measured in ________. |
megahertz |
The control unit is one component of the ________. |
CPU |
The amount of RAM recommended for most systems today is measured in ________. |
GB |
When referring to hard drives, seek time and latency are the two factors that make up ________. |
access time |
A video card is an expansion card installed inside your ________. |
system unit |
The small circuit boards that hold a series of RAM chips are called ________. |
memory modules |
A ________ performs the same kind of computational work that a CPU performs but is specialized to handle 3-D graphics and image and video processing. |
GPU |
Running the Disk Defragmenter utility will ________. |
make the hard drive work more efficiently. |
The CPU consists of which two parts? |
the control unit and the arithmetic logic unit |
On a Windows system, you can determine the amount of RAM by looking in the ________ window. |
System Properties |
Cache memory levels are determined by ________. |
the chip’s proximity to the CPU |
The percentage of time your CPU is working is referred to as CPU ________. |
usage |
Each of the following is a computer subsystem EXCEPT the: |
data subsystem. |
Which of the following activities is carried out by the ALU? |
completion of all arithmetic calculations |
Running the Disk Cleanup utility is a quick way to ________. |
clear out unnecessary files |
The amount of RAM that is actually on the memory modules in your computer is the ________ memory. |
physical |
An expansion card that translates binary data into images is a(n) ________. |
video card |
Two types of video memory are ________. |
GDDR3 and GDDR5 |
When referring to hard drives, access time is measured in ________. |
milliseconds |
Which is the fastest type of optical drive on the market? |
Blu-ray drives |
Which of the following is NOT a main characteristic associated with desktop computers as compared to notebooks? |
A desktop computer is more expensive. |
All of the following are advantages of notebook computers EXCEPT: |
you get more speed for a lower price. |
Which of the following devices translates electronic data into radio waves? |
a transceiver |
The ________ is the maximum speed at which data can be transmitted between two nodes on a network. |
data transfer rate |
A wireless network uses which of the following as its transmission medium? |
radio waves |
Which of the following UTP cable types is the cheapest and often used in home networks? |
Cat 5E |
Sophisticated networks generally use which of the following hardware devices to ease the flow of data packets throughout the network? |
routers and switches |
Throughput, the actual speed of data transfer that is achieved in a network, is usually ________. |
less than or equal to the data transfer rate |
When setting up a network, you should set up any computers running the Microsoft Windows 7 operating system ________. |
first |
WPA stands for ________. |
WiFi Protected Access |
A(n) ________ allows sharing of a broadband Internet connection. |
router |
Normal telephone wire is ________. |
twisted-pair cable |
Due to the expansion of media files on home computers, ________ options are now being marketed; however, they are not as full featured as their business-world counterparts. |
home network server |
Which of the following devices is needed to share an Internet connection on a wireless network? |
a wireless router |
One way to increase security on a network is by installing a ________. |
firewall |
Most ________ allow you to connect wireless and wired computers to the same network. |
wireless routers |
A ________ is a network located in your home that is used to connect all of your digital devices. |
HAN |
A network that has 10 or more nodes is usually configured as a ________. |
client/server network |
Client/server networks are controlled by a central server that runs a specialized piece of software called ________. |
a network operating system (NOS) |
A(n) ________ keeps track of data packets and, in conjunction with network interface cards, helps the data packets find their destination without running into each other on an Ethernet network. |
switch |
Which of the following is necessary if you want your Ethernet network to connect to the Internet through a DSL or cable modem? |
a DSL/cable router |
Which transmission medium is able to transmit data the fastest? |
fiber-optic cable |
Network adapters ________. |
enable nodes in a network to communicate with each other |
The most common type of home network is ________. |
a peer-to-peer (P2P) network |
Network architectures are classified according to ________. |
the way they are controlled and the distance between their nodes |
The most popular transmission media option for wired Ethernet networks is ________. |
The unique number assigned to a network adapter by the manufacturer is referred to as the ________ address. |
Which of the following is NOT an example of a network node? |
a mouse |
Which of the following is NOT an example of a WAN? |
LANs connected in a single building |
A computer network is defined as two or more computers connected with ________ so that they can communicate with each other. |
software and hardware |
Which of the following network adapters is most likely to be preinstalled in a typical notebook computer today? |
both a wireless and wired network adapter |
Text prediction ________ provide a list of popular words and save typing time when using text messaging. |
algorithms |
Images are a representation of light waves called ________ or continuous waves. |
analog |
Opera Mobile is an example of ________. |
a microbrowser |
SMS delivers messages to the appropriate mobile device using ________ technology. |
store-and-forward |
Which of the following uses radio waves to transmit data signals over short distances and does not need a direct line of sight? |
Bluetooth |
Which of the following statements is NOT true about the JPEG file format? |
JPEGs are larger than raw files. |
A(n) ________ is included in a cell phone to handle the compression of data for it to be quickly transmitted to another phone. |
digital signal processor |
The operating system of a cell phone is stored in ________. |
ROM |
Which of the following describes the number of times an analog wave is measured each second during an analog-to-digital conversion? |
sampling rate |
Web content specially designed for viewing via a cell phone or smartphone is written in a format called ________. |
WML (Wireless Markup Language) |
________ is the use of equipment to provide voice communications over a distance. |
Telephony |
A ________ runs a full-featured operating system and weighs less than two pounds |
netbook |
Which of the following allows you to download and play music with restrictions enforced about its use? |
tethered downloads |
_______ is a form of voice-based Internet communication that turns a standard Internet connection into a means to place phone calls, including long-distance calls. |
VoIP |
________ is a special copyleft license used for software. |
GNU |
Digital formats are descriptions of signals as ________. |
a long string of numbers |
An analog-to-digital converter chip ________. |
converts the sound waves from a voice into digital signals |
The most full-featured and powerful cell phones are put in the category of ________. |
smartphones |
To transfer files from your computer to a portable media player (PMP), most newer PMPs use a ________ port or a FireWire port. |
USB 2.0 |
The Apple iPhone uses a version of ________ as an operating system. |
Mac OS X |
________ is a single cable that carries all audio and video information from devices connected to a TV to the TV itself. |
HDMI |
An iPod is an example of a ________. |
portable media player (PMP). |
The newest cell/smartphone displays are ________, which allow bright, sharp imaging and draw less power. |
OLED |
Text messaging is also called ________. |
short message service (SMS) |
Flash memory, used by most MP3 players, is a type of ________. |
nonvolatile memory |
What is Symbian? |
An operating system for cell/smartphones. |
Broadcasting your video to a live audience over the Web is referred to as ________. |
webcasting |
A portable media player can play files with all of the following file extensions EXCEPT ________. |
.doc |
A base transceiver station receives a request for cellular service and passes that request to a central location called a ________. |
mobile switching center |
LogMeIn is an example of a ________. |
remote access service for mobile devices |
Ensuring that two devices, for example, a PC and a cell phone or smartphone, have the same files is the process of ________. |
synchronizing |
Which of the following is the process of sharing files between two or more computers? |
peer-to-peer (P2P) sharing |
Which of the following is specialized software made to display Web pages on a cell phone? |
microbrowser |
MPEG-4, H.264, and DivX are all examples of ________. |
codecs |
All of the following are advantages of VoIP EXCEPT: |
reliability. |
________ floods a computer with requests until it shuts down and refuses to answer any requests for information. |
A DDoS attack |
Which of the following classifications of viruses can change its own code to avoid detection? |
polymorphic |
A(n) ________ virus runs a program that searches for common data files, compresses them, and makes them unusable. |
encryption |
________ is an unwanted piggyback program that usually downloads with software you are installing from the Internet. |
Spyware |
A(n) ________ is the portion of virus code that is unique to a particular computer virus. |
virus signature |
A cyberspace ________ is an attempt to make someone believe something that is untrue. |
hoax |
Which of the following statements about cookies is NOT true? |
Cookies obtain your personal information by searching your hard drive. |
The most likely method a hacker would use to access a computer is ________. |
entering through its Internet connection |
All of the following approaches can be taken to protect your notebook computer from theft EXCEPT: |
installing an external hard drive. |
Which of the following is formally defined as any criminal action perpetrated primarily through the use of a computer? |
cybercrime |
A ________ is a virus that is attached to documents such as Word or Excel files. |
macro virus |
Which of the statements about protecting against power surges is FALSE? |
Printers do not require power surge protection. |
________ is doing non-work-related activities with a computer while you are being paid to do your job. |
Cyberloafing |
A(n) ________ virus temporarily erases its code from the files where it resides and then hides in the computer’s active memory. |
stealth |
A ________ works independently of host file execution and is much more active in spreading itself than a virus is. |
worm |
Which of the following is a program that appears to be something useful or desirable but does something malicious in the background? |
a Trojan horse |
A packet sniffer is a program that can enable a hacker to do all of the following EXCEPT: |
launch a denial of service (DoS) attack on your computer. |
Which type of virus was the famous Michelangelo virus? |
a time bomb |
A ________ is a virus that is triggered when certain conditions are met, such as a file opening or starting a program a certain number of times. |
logic bomb |
The purpose of network address translation (NAT) is to ________. |
hide user IP addresses from the Internet |
All of the following can be used for backing up data files EXCEPT: |
RAM. |
Devices that use a unique personal characteristic, such as a fingerprint, in place of a password are called ________ authentication devices. |
biometric |
During the process of ________ the antivirus software records key attributes about the files on your computer and keeps these statistics in a safe place on your hard drive. |
inoculation |
_______ occurs when a hacker takes control of a Bluetooth-enabled device to make phone calls, read phonebook entries, send and receive text messages, and more. |
Bluebugging |
Adware and spyware are referred to collectively as ________. |
grayware |
With regard to computer protection, quarantining is defined as ________. |
placing a found virus in a secure area on the hard drive |
Configuring a firewall to ignore all incoming packets that request access to a specific port is known as ________. |
logical port blocking |
Which of these statements about physically protecting your computer is FALSE? |
Power surges can be blocked by using a computer surround. |
Drive-by downloads occur when ________. |
a Web site downloads harmful software onto your computer |
A computer virus normally attaches itself to another computer program known as a ________. |
host program |
Using a ________, hackers can access and delete all files on your computer, send e-mail, run programs, and do just about anything else you can do with your computer. |
backdoor program |
________ makes broadband users more vulnerable to attacks. |
Static addressing |
Rules for creating passwords include all of the following EXCEPT: |
keep your password written down and stored in any easy-to-remember location. |
Social ________ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information. |
engineering |
Many ________ sold for home use are also configured as firewalls and are capable of performing network address translation (NAT). |
routers |
________ encourages Internet users to reveal sensitive information that could lead to identity theft by sending e-mails that look like they are from legitimate companies but are, in fact, fake. |
Phishing |
Spyware programs that monitor keystrokes with the intent of stealing passwords, login IDs, or credit card information are referred to as ________. |
keystroke loggers |
For complete protection when backing up your files, you should use a program that creates a(n) ________ of your entire system. |
image backup |
A ________ is a secure Internet pathway that large corporations use to protect sensitive data. |
VPN |
You can block logical ports to invaders and make your computer invisible to others on the Internet by installing ________. |
a firewall |
Small Java-based programs are called ________. |
Java applets |
Violations of the strict, precise set of rules that define a programming language are called ________. |
syntax errors |
An alternative approach to systems development, called ________, makes use of a prototype at the beginning of the project. |
rapid application development (RAD) |
Which of the following statements about pseudocode is TRUE? |
It is a text-based approach to documenting an algorithm. |
What is the first step of the system development life cycle? |
problem and opportunity identification |
Which of the following statements about Java is FALSE? |
Java can run only on a Windows operating system. |
To develop Web-based multimedia, Adobe Flash includes a programming language named ________, which is similar to JavaScript in its keywords, operators, and classes. |
ActionScript |
The two main types of decision points are the binary decision and the ________. |
loop |
Translating an algorithm into a programming language is called ________. |
coding |
Which statement does NOT describe fifth-generation languages? |
They use a set of short, English-based commands (such as SUB) that speak directly to the CPU. |
Which phase of the system development life cycle explores the problem in depth and develops program specifications? |
analysis |
Structured Query Language (SQL) is an example of a ________. |
ourth-generation language |
The loop decision point consists of three features: an initial value, a set of actions to be performed, and a(n) ________. |
test condition |
Which phase of the system development life cycle generates a detailed plan for programmers to follow? |
design |
Who is responsible for writing internal documentation for software programs? |
technical writers |
Which language do programmers use if the problem requires a lot of number crunching? |
C++ |
________ is the process of translating a task into a series of commands that a computer will use to perform that task. |
Programming |
________ is a text-based approach to documenting an algorithm. |
Pseudocode |
The language that the CPU understands, consisting of a sequence of bits, is called |
machine language. |
Which statement about selecting the right programming language for a project is FALSE? |
Programming languages require the same amount of time to execute. |
Which of the following development environments enables Web sites to talk to each other easily by introducing a standard way for software to interact through Web services? |
the .NET framework |
________ is the instructions programmers have written in a higher-level language. |
________ is the instructions programmers have written in a higher-level language. |
In a ________ system, each step is dependent on the previous step being completed first |
waterfall |
Keywords in a programming language that allow the programmer to redirect the flow of the program based on a decision are called ________. |
control structures |
The process by which program code is converted into machine language is called ________. |
compilation |
What is the final step of the system development life cycle? |
maintenance and evaluation |
A ________ is a visual diagram of a process, including the decisions that need to be made along the way. |
flowchart |
With object-oriented analysis, programmers identify all the categories of input that are part of the problem into |
classes. |
A variable declaration tells the operating system to allocate storage space ________. |
in RAM |
Which language is used for applications that need to collect information from networked computers? |
Java |
Most integrated development environments (IDEs) include a debugger that ________. |
helps programmers find logical errors |
BASIC, FORTRAN, COBOL, C++, and Java are all ________-generation languages. |
third |
Which of the following is taught as the beginning computer language at many colleges and universities? |
Java |
________ enables users to define their own tags and facilitates exchange of information between Web sites. |
XML |
During which phase of the system development life cycle are flowcharts and data-flow diagrams developed? |
design |
Which of the following would NOT be used to build Web sites with interactive capabilities? |
Java |
Which of the following is/are NOT part of a program’s problem statement? |
pseudocode, or the text-based approach to documenting the algorithm |
A(n) ________ is a set of specific, sequential steps that describe in natural language exactly what the computer must do to complete its task. |
algorithm |
Which of the following is the first stage of the program development life cycle (PDLC)? |
describing the problem |
The method of algorithm creation used when a programmer breaks down a problem into a series of high-level tasks and continues to break each task into successively more detailed subtasks is called: |
top-down design. |
Decision points consist of binary decisions and ________. |
repeating loops |
Some programmers include scroll bars, title bars, buttons, and menus in a program simply by adding them to a layout through a process called ________ programming. |
visual |
How many steps are there in the system development life cycle? |
6 |
In object-oriented programming, ________ allows a new class to automatically pick up all the data and methods of an existing class. |
inheritance |
In object-oriented programming, each object from a given class is described by its ________. |
data and methods |
A(n) ________ error is caught when the program executes. |
runtime |
________, building a small program model, is a form of rapid application development (RAD). |
Prototyping |
PROLOG (PROgramming LOGic) is an example of a ________-generation language. |
fifth |
The binary sequence that instructs the CPU to run the programming code is called a(n) ________. |
xecutable program |
Which of the following statements describes dynamic decision making? |
It is the ability of a Web page to decide how to display itself based on choices the reader makes. |
A ________ is a program that a Web site uses to make information available to other Web sites. |
Web service |
Which of the following is the final stage of the program development life cycle (PDLC)? |
implementing the project |
________ is a powerful programming language used to build a wide range of Windows applications. |
Microsoft Visual Basic |
Creating programs with higher-level programming languages that can be easily moved from one type of computer to another provides ________. |
portability |
Special symbols called tags are used in which of the following languages? |
HTML/XHTML |
In a database, a record is a ________. |
group of related fields |
In a database, a video clip would be stored in a(n) ________ field. |
object |
Which type of database excels in the storage of structured (analytical) data? |
relational |
Nontraditional data such as audio clips, video clips, pictures, and very large documents are called ________. |
unstructured data |
When creating a database with a DBMS, you must create a description of the data called the ________. |
data dictionary. |
In a database, a text field capable of holding complete paragraphs is referred to as a ________ field. |
memo |
Microsoft ________ is a database management system. |
Access |
In a database, a field is a ________. |
category of information |
A data dictionary is also called a ________. |
database schema |
An example of ________ would be customer demographic data purchased from third parties or statistics compiled by the federal government. |
external data |
In a transaction-processing system (TPS), if the TPS database is queried and updated while the transaction is taking place, this is called ________. |
real-time processing |
________ is reordering records in a database. |
Sorting |
Management information systems provide reports that show conditions that are unusual or need attention from users of the system. These reports are called ________. |
exception reports |
A ________ displays a subset of data from a table (or tables) based on the criteria specified. |
select query |
In a database table that stores name and address information, "State" would be an example of a(n) ________. |
field name |
Customer Relationship Management (CRM) software contains sophisticated databases that are designed to ________ and track all interactions with customers. |
manage |
Which of the following is NOT a likely primary key? |
street address |
What does the acronym DBMS stand for? |
database management system |
________ means that for each value in the foreign key of one table, there is a corresponding value in the primary key of another table. |
Referential integrity |
If a college’s database maintains a student’s major and GPA information in only one place, this is an example of ________. |
data centralization |
A(n) ________ is designed to improve communications and assist employees in accomplishing their daily tasks. |
office support system |
________ is the process of reducing data redundancy by recording data only once. |
Normalization |
A ________ check ensures that the data entered into the database is within a certain range of numbers. |
range |
A ________ check ensures that the data entered into the database is within a certain range of numbers. |
range |
The type of information system that uses model management systems is a(n) ________. |
decision support system |
The ________ indicates what type of data can be stored in a field. |
data type |
A spreadsheet you create in Microsoft Excel that contains the supplies needed to start the semester is an example of a(n) ________. |
list |
Which of the following is NOT a database component? |
list |
In a transaction-processing system, if transaction data is accumulated until a certain point and then many transactions are processed all at once, this is called ________. |
batch processing |
The speech-recognition feature of Microsoft Windows is an example of a ________. |
natural language processing (NLP) system |
When you want to extract data from two or more tables, you use a(n) ________ query. |
join |
To store a Web address, use a(n) ________ field in a database. |
hyperlink |
A ________ relationship indicates that for each record in a table, there is only one corresponding record in a related table. |
one-to-one |
________ helps to ensure data integrity by maintaining information in only one place. |
Data centralization |
Data ________ means that the data contained in a database is accurate and reliable. |
integrity |
If a college keeps two lists, one for registration and one for overdue library books, both containing name and address information, this is an example of data ________. |
redundancy |
A data ________ is a large-scale electronic repository of data that contains and organizes all of an organization’s data in one place. |
warehouse |
An individual trained in the design and building of databases is called a database ________. |
administrator |
An expert system and a natural language processing system are both ________. |
knowledge-based systems |
If a numeric field has a size of 7, which is the highest number it can hold? |
9999999 |
________ defines the maximum number of characters or numbers that a particular field can hold. |
Field size |
The most commonly used type of database in the market today is the ________ database. |
relational |
In Access, the Simple Query Wizard uses ________ to create a query. |
SQL |
Exception reports and summary reports are part of a(n) ________. |
management information system |
________ is the branch of computer science that deals with the attempt to create computers that think like humans. |
Artificial intelligence |
In a data warehouse, data gathered from sales, billing, and inventory departments are examples of ________ sources. |
internal data |
Which of the following is a reason for creating a list instead of creating a database? |
to organize data for simple tasks |
Unstructured data such as video clips and pictures are known as ________ because of the way they are encoded. |
binary large objects (BLOBs) |
Computational fields are a type of database field used to store ________. |
formulas |
Oracle Database 11g is an example of which type of database? |
multidimensional database |
Classification, affinity grouping, and estimation are ________ methods used by managers to make their data more meaningful. |
data mining |
The ________ is the value that the database uses for the field unless the user enters another value. |
default value |
________ databases can easily be customized to provide information to a variety of users (based on their need) and can process data much faster than pure relational databases |
Multidimensional |
Data in a multidimensional database is organized in a ________ format. |
cube |
A database ________ instructs a database to search for particular pieces of data. |
query |
In a database, ________ fields store numbers used to perform calculations. |
numeric |
Which of the following statements about object-oriented databases is FALSE? |
They store data in table format. |
SQL uses ________ to extract records from a database by using English-like expressions that have variables and operations. |
relational algebra |
A ________ relationship indicates that for a record in one table, there can be many related records in another table. |
one-to-many |
COSC 100
Share This
Unfinished tasks keep piling up?
Let us complete them for you. Quickly and professionally.
Check Price