click below
click below
Normal Size Small Size show me how
ch 1
CIS
| Question | Answer |
|---|---|
| 1. Examples of basic computer operations | input, processing, storage |
| 2. A client that accesses the server but does most of the processing on the data in its own system is called | fat client |
| 3. Technology has contributed to globalization, which has led to | outsourcing |
| 4. Most important type of memory that a typical computer uses during the processing operation is | Random access memory |
| 5. A______ Collection of webpages designed to enable collaborative or community websites. | Wiki |
| 6. Two main categories of software are | system software and application software |
| 7. A server is a computer that | makes programs and data available to people who are connected to a computer network |
| 8. NIC is an abbreviation for | network interface card |
| 9. The computer function in which raw data is converted into meaningful information is known as | processing |
| 10. Era when only the US government, colleges and universities were able to access the Internet | 1980s |
| 11. Computer used in large Corporation to complete huge processing needs, such as airline reservations | mainframe |
| 12. Business software alliance reports that reducing US piracy by 10% will have all of the following benefits | Higher tax revenues, creation of new jobs, increase in economic growth |
| 13. Which of the following are examples of input devices | scanners, digital cameras, microphones |
| 14. Disparity in computer ownership and Internet access is known as the | digital divide |
| 15. A floppy disk drive is an example of | legacy technology |
| 16. When an entire job category is made obsolete by advances in technology is called | structural unemployment |
| 17. What is a type of product that complements the human body's best posture and functionality | ergonomic |
| 18. The computer function in which process data is displayed is known as | output |
| 19. Spell checking a document is an example of the computer's ability to perform the | processing |
| 20. Recent branch of philosophy that deals with computer related moral dilemmas is called | computer ethics |
| 21. A feeling of anxiety and incapacity experience when people are presented with more information than they can handle is known as | information overload |
| 22 Which of the following statements is true | Most errors cause programs to run slowly or perform needless tasks |
| 23. The use of computers and computer programs to replace teachers and the time place limitations of learning is called | e-learning |
| 24. Safety critical systems have______ systems that kick in if the main computer goes down | backup |
| 25. A_____ is a client that relies on the server for its processing ability | thin client |
| 26. CPU is an abbreviation for | central processing unit |
| 27. A________ is a series of steps that results in the solution to a problem | algorithm |
| 28. Which of the following requires computer access to individuals with disabilities | the Americans with disabilities act of 1990 |
| 29. The computer function in which raw data is received as known as | input |
| 30. Users connect to networks on PCs called | clients |
| 31. The device that combines the capabilities of a handheld computer with mobile phone capabilities and web access is known as a______ | smart phone |
| 32. OS is an abbreviation for | operating system |
| 33. Output refers to | displaying the results of the processing operation so that people can understand it |
| 34.____ Have the portability of a notebook but not the functionality | netbooks |
| 35. The CPU is often referred to as the____ of the computer | brain |
| 36. Typing a document into the computer is an example of | input |
| 37. Type of software that sits on top of the operating system and utilizes the computers capabilities to perform a user task is called | application software |
| 38. The computer function where output is saved for later use is known as | storage |
| 39. _______ Is a portable, wireless, paperback sized e-book reading device that includes a text to speech function | Kindle |
| 40. What year did the World Wide Web began | 1993 |
| 41. Handheld devices such as iPhones, which have many characteristics of a PDA are also called | smart phones |
| 42. The_____ divide is the disparity in computer ownership and Internet access | digital |
| 43. The most important type of memory in a computer is | random access memory |
| 44. A_____ is a group of two or more computers systems that are connected | network |
| 45. Type of memory that provides very fast access but is more expensive than other forms of storage is commonly known by the acronym | RAM |
| 46. Anxiety people experience when presented with more information than they can reasonably handle | information overload |
| 47. Network client which relies on the server for its processing is known as | thin client |
| 48. Collection of webpages designed to enable anyone with access to contribute or modify its content | wiki |
| 49. Devices that enable computers to connect to a computer network are known as | communication devices |
| 50. Writing on a tablet PC can be converted to standard text with | handwriting recognition software |
| 51. Software defect or error | bug |
| 52 Replacement of human workers by machines | automation |
| 53. The CPU is located within the system's case. The system case is also known as the | system unit |
| 54. The Palm series, Apple iPhone, blackberry curve are examples of | personal digital assistants |
| 55. Input, processing, output, and storage are collectively called the | information processing cycle |
| 56.Unorganized raw facts are known as | data |
| 57. Includes the programs that you can use to complete a specific task such as creating a database | application software |
| 58. Using computers and computer programs to replace specified time and place learning and teachers is called | e-learning |
| 59. Data may be put into a PDA using a stylus or | keyboard |
| 60. Obsolete computer equipment, also called_____, shouldn't just be thrown into the trash | e-waste |
| 61. If you borrowed software from a friend and installed it on your own computer, you engaged in digital | privacy |
| 62. The programs that enable a computer to work properly are known as | system software |
| 63. The hard disk drive, CD drive, and DVD drive in a computer are usually removable | false |
| 64. Kindle two is a portable, wireless, paperback sized e-book device | true |
| 65. A network is a group of two or more computers connected for the purpose of sharing resources | true |
| 66. A series of steps that results in the solution to a problem is called an algorithm | true |
| 67. More than 100 million technology devices are recycled each year | false |
| 68. Supercomputers are ultrafast systems that can process at a speed of over one petaflop – over 1 million billion calculations per second | true |
| 69. A free real-time connection between two or more parties that uses a buddy list to identify the users a person wishes to connect with is known as instant messaging | true |
| 70. Outsourcing is the real and only reason for eliminating many jobs | false |
| 71. Reducing software piracy will have no effect on creating jobs | false |
| 72. Errors in programming code could cause a computer to become nonresponsive | true |
| 73. A hardware element of the system unit, which houses the electronic components used to connect a computer to a network is known as a network interface card | true |
| 74. People who lose their jobs due to structural unemployment will eventually get them back | false |
| 75. In some cases PDAs can run commercial application software such as payroll. | False |
| 76. NICS can only be used with wireless networks | false |
| 77. External NICs are always plugged into a chip on the motherboard | false |
| 78. A communication device is a software component that moves data into an out of a computer | false |
| 79. A typical computer has different types of memory | true |
| 80. The USB flash drive is considered legacy technology | false |
| 81. A fat client accesses the server but does most of the processing on the data in its own system | true |
| 82. Hardware reliability and accuracy are two advantages of computers | True |
| 83. An OS is a malicious program that enters the computer without permission | false |
| 84. Secondary storage devices are only integrated in the computer system | false |
| 85. Prolonged keyboard use can cause carpal tunnel syndrome | true |
| 86. A wiki is a free web-based word processor and spreadsheet that allows project members to share and edit documents online | False |
| 87. The most important and will recognize type of application software is the computer's operating system | false |
| 88. Computer | a machine that performs input, processing, output and storage |
| 89. Google docs | A free web-based word processor and spreadsheet permitting member online sharing and editing |
| 90. Processing | transforms data into information |
| 91. Output device | used to display the results of processing operations |
| 92. Hardware | the physical components of the computer |
| 93. Program | Instructions that tell the computer how to perform a task |
| 94. Fat client | accesses the server but does most of the processing on the data on its own |
| 95. Application software | program on your computer that enable you to perform a specific task, example: word processing |
| 96. Computer system | Collection of related components designed to work together |
| 97. System unit | Holds the central processing unit |
| 98. System software | Programs, such as a disk cleanup tool, that enable the computer to function properly |
| 99. Program | series of instructions the computer needs to perform basic operations in the information processing cycle |
| 100. Software | The programs that instruct the computer |