Busy. Please wait.
or

show password
Forgot Password?

Don't have an account?  Sign up 
or

Username is available taken
show password

why


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
We do not share your email address with others. It is only used to allow you to reset your password. For details read our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

Remove ads
Don't know
Know
remaining cards
Save
0:01
To flip the current card, click it or press the Spacebar key.  To move the current card to one of the three colored boxes, click on the box.  You may also press the UP ARROW key to move the card to the "Know" box, the DOWN ARROW key to move the card to the "Don't know" box, or the RIGHT ARROW key to move the card to the Remaining box.  You may also click on the card displayed in any of the three boxes to bring that card back to the center.

Pass complete!

"Know" box contains:
Time elapsed:
Retries:
restart all cards




share
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

CTA-100

QuestionAnswer
The crisis-mapping tool ___________can collect information to make instantly and publicly available for use in emergencies. Ushahidi
Joining together as a group to use a specific product more efficiently is called collaborative consumption.
_______________is defined as working without continual direction and control. Autonomy
Using the Internet to get small donations from many people to start a business is called crowdfunding.
The process of searching huge amounts of data with the hope of finding a pattern is called data mining.
Being ___________means being familiar enough with computers that you understand their capabilities and limitations. computer literate
_____________is the gathering together of groups of people using online tools to connect and exchange ideas. Social networking
A popular VoIP is Skype.
Analyzing computer systems to gather potential legal evidence is computer forensics.
The technology called ___________stands for quick response. QR codes
Unwanted or junk email is called spam.
The difference between people with access to computers and the Internet and those without this access is known as the digital divide.
The most common type of monitor is a liquid crystal display (LCD)
___________is a volatile storage location. RAM
The number of pixels displayed on the screen known as screen resolution.
All of the following are examples of permanent storage, EXCEPT RAM.
___________is the abbreviation for the place in the computer where the programs and data the computer is currently using are stored. RAM
Display screens that respond to command initiated with you finger or a stylus are called touch screens.
The term “bit” is short for binary digit.
A _____________enables your computer to connect to other computers or to the Internet. Network Interface Card (NIC)
Any part of the computer that you can touch is called hardware.
After a picture has been taken with a digital camera and processed appropriately, the actual print of the picture is considered output.
The four functions of the computer include input, process, output, and storage.
A keyboard and mouse are examples of input devices.
Large, expensive computers that support many users simultaneously are called mainframes.
A _____________is approximately 1 million bytes. megabyte
The area that holds all the instructions the computer needs to start up when it is powered on is ROM.
What type of computer is the Apple iPad? Tablet computer
A ___________is where a peripheral device can attach to a computer so that data can be exchanged between it and the operating system. port
______________ are specially designed computer chips that reside inside other devices such as your car or the electronic thermostat in our home. Embedded computers
New technologies pushing the boundaries of printing Do Not include inkless printing.
___________have tiny hammer-like keys that strike the paper through an inked ribbon. Impact printers
In binary language, each letter of the alphabet, each number, and each special character is made up of a unique combination of eight bits.
Computers use the binary language consisting of 0s and 1s.
Flash drives plug into a USB port.
The __________contains the central electronic components of the computer. motherboard
A ___________is a specially designed computer that can perform complex calculations extremely fast. supercomputer
A ___________ sits on your computer monitor or is built into a laptop and is used primarily for transmitting live video. webcam
Facebook and Youtube are considered to be ___________web sites. social networking
The name of the free Internet browser from Mozilla is Firefox.
All of the following are tips for professional e-mail etiquette, except use abbreviations such as “u”, “r” and “BRB” to keep the e-mail message shorter.
The World Wide Web was invented by Tim Berners-Lee at CERN.
A computer connected to the Internet that asks for data is a client.
Software that enables you to display and interact with text and other media on the Web is a Web browser.
The___________ is a large network of networks. internet
The unique identification number assigned to your computer when you connect to the Internet is known by all of the following, except a dotted period.
All of the following are a type of e-commerce business, except C2B.
The unique address for a particular Web site is the URL.
The appropriate software to use for creating research papers is word processing software.
Every software program has a set of system requirements that specify the minimum recommended standard for the operating system, processor, RAM, and hard drive capacity.
The general software you use to do takes at home, school, or work is known as application.
Multimedia software includes all of the following, except utility software.
The type of software that is best used to create a simple budget is spreadsheet software.
The intersection of a row and column in a spreadsheet program is known as a cell.
___________refers to a set of instructions that tells the computer what to do. These instructions sets are called________. Software programs
A _________is a Microsoft Office feature that walks you through steps to complete a difficult task. wizard
In a spreadsheet, equations that use addition, subtraction, multiplication, and division operators, as well as values and cell references are called formulas.
__________application software is software that is stored completely on a Web server instead of your hard drive. Web-based
The cell address C5 indicates that the cell is at __________ of the worksheet. column C, row 5
________is the software that helps run the computer and coordinate instructions between the computer and the hardware devices. System software
The _________is the group of programs that controls how your computer functions. operating system
The top three operating systems for personal computers are Microsoft Windows, Mac OS X, and Linux.
Which of the following types of programs help manage system resources such as the hard drive? Utility Programs.
The basic input/output system is stored on a ROM.
_______first used a Command-driven interface. MS-DOS
Which of the following is the first step in the boot process? The BIOS is activated by turning on the computer.
The location of a file is specified by its file path.
For performing common tasks, Windows 8 has special shortcuts called charms.
More than 50% of smartphones use an operating system developed by Google.
Windows 8 uses a ___________account to easily access and store your files online. SkyDrive
All of the following are terms related to part of the boot process, EXCEPT USB.
If Microsoft Word 2010 is used to create a file, which file extension is added automatically? .docx
Which utility takes out redundancies in a file to reduce the file size? File Compression
Windows 8 is the operating system developed by Microsoft
The _____________of the operating system enabled the user to communicate with the computer system. user interface
Errors in computer software are called bugs.
Which of the following was the first widely used operating system installed in personal computer? MS-DOS
The most essential software in your computer system is the operating system.
Which of the following statements about a graphical user interface is FALSE? A GUI is a command-driven interface.
The most popular tablet operating system was developed by Apple.
A __________ is a small program that performs general housekeeping tasks for your computer. utility program
C:\Documents\Spring2012\CIS 101 is an example of a file path.
When referring to hard drives, access time is measure in milliseconds. (Kilobytes-RAM, hertz-CPU, bps-Internet access)
A____________ enables the computer to drive the speaker system. sound card
A ___________ is an expansion card installed inside your system unit. video card
Windows uses a memory-management technique known as___________ to monitor which applications you use the most and preloads them into system memory. SuperFetch
The CPU consists of which two parts? The Control Unit and the arithmetic logic unit
All of the following are part of the machine cycle, EXCEPT encode.
Which is the fasted typed of optical drive on the market? Blu-ray drives
All of the following are examples of optical drives, EXCLEPT solid-state disc.
Which of the following activities is carried out by the arithmetic logic unit (ALU)? Completions of all arithmetic calculations
All of following are procedures you can follow to ensure your system performs reliably, except run key utilities only when you can observe the process.
There are how many levels of cache memory? 3
Running the_____________ utility will make the hard drive work more efficiently. Disk Defragmenter
The rule of thumb that predicts that CPU capacity will double every two years is called Moore’s Law.
The amount of RAM recommended for most systems today is measured in GB.
A _________ uses electronic memory and has no motors or moving parts. solid state drive
The control unit is one component of the CPU.
A ___________ is an expansion card that’s installed inside the system unit to translate data into images. video card
Running the _____________ utility is a quick way to clear out unnecessary files. Disk Cleanup
Created by: StaciSisson