click below
click below
Normal Size Small Size show me how
ITC_FINALS_REVIEWER
| Question | Answer |
|---|---|
| TRUE OF FALSE: The IT Department in business employs people to do computer-related jobs. | TRUE |
| TRUE OR FALSE: Being an information system professional means you should be able to understand both technical and organizational factors of a business or enterprise. | TRUE |
| What computing knowledge area is concerned with the information that computer systems can provide to aid a company in defining its goals? | INFORMATION SYSTEM |
| TRUE OR FALSE: Developing effective ways to solve computing problems is one of the required special skill of an information technology student. | FALSE |
| TRUE OR FALSE: Operating system certification is awarded to professionals who demonstrate expertise in planning, installing, managing, and troubleshooting network. | FALSE |
| TRUE OR FALSE: Computer technicians need a thorough understanding of the products available, and need to know how to discuss computers without using jargon. | FALSE |
| It is a certification which requires technical expertise in networking hardware and configuration. | INTERNET CERTIFICATION |
| What certification is awarded to professionals who demonstrate expertise in planning, installing, managing, and troubleshooting network? | NETWORKING CERTIFICATION |
| It is a computer profession organization that comprises of programmers, system analysts, and information processing managers. | AITP |
| What computing program teaches students how to design and develop electrical components found in computers? | COMPUTER ENGINEERING |
| It is a program in computing field that stresses theoretical side of programming and operating systems. | COMPUTER SCIENCE |
| What department in a business or government agency is responsible for keeping all computer operations and network operating smoothly? | IT DEPARTMENT |
| TRUE OR FALSE: Computer scientists are the ones who do research and develop solution to complex software problems. | TRUE |
| TRUE OR FALSE: The job of a software engineer is to analyze requirements, design solutions, and oversee software development process. | FALSE |
| TRUE: If your career is in the software field, you must be able to understand computers and must have specific knowledge of all your products. | FALSE |
| It is an undergraduate degree program that refers to preparing students to meet computer technology needs of any organization. | INFORMATION TECHNOLOGY |
| TRUE OR FALSE: The MIS department are responsible for keeping all computer operations and networks in business and government running smoothly. | FALSE |
| ___________, which is a main area in an IT department, operates the centralized computer equipment and administers the network including both data and voice communications. | OPERATIONS |
| What type of certification recognizes general knowledge of hardware and controlling software need? | HARDWARE CERTIFICATION |
| TRUE OR FALSE: RPA automates repetitive tasks using software. | TRUE |
| TRUE OR FALSE: Computer technicians need a thorough understanding of the products available, and need to know how to discuss computers without using jargon. | FALSE |
| It is the process of verifying technical knowledge in a particular area in computing. | CERTIFICATION |
| This technology enables any device connected to the Internet to exchange data. | IoT |
| Which knowledge area of computing offers a foundation that permits graduates to adapt to new technologies? | COMPUTER SCIENCE |
| Being an information system professional means you should be able to ________________________. | UNDERSTAND BOTH TECHNICAL AND ORGANIZATIONAL FACTORS |
| Which of the following is not a subset of machine learning? | ARTIFICIAL INTELLIGENCE |
| Which of the following is not a required special skill of an IT professional? | DEVELOP EFFECTIVE WAYS TO SOLVE COMPUTING PROBLEMS |
| TRUE OR FALSE: Information system is a computing knowledge area that permits graduates to adapt to new technologies. | FALSE |
| What certification tests various tasks a database management staff must perform? | DATABASE SYSTEM CERTIFICATION |
| IT certification can do all the following EXCEPT _________. | GUARANTEE JOB SECURITY |
| TRUE OR FALSE: Blockchain is related to cryptocurrencies. | TRUE |
| It is the discovery, collection, and analysis of evidence found on computers and networks. | COMPUTER FORENSICS |
| TRUE OR FALSE: Computer forensics is the discovery, collection, and analysis of evidence found on computers and networks. | TRUE |
| It measures a candidate's ability to identify and control security risks to computer resources. | SECURITY CERTIFICATION |
| It is a subset of artificial intelligence. | MACHINE LEARNING |
| It enhances employee's career and provides better standing as industry professional. | CERTIFICATION |
| TRUE OR FALSE: VR immerses user in an environment that is not real. | TRUE |
| What does the acronym MIS stand for? | MANAGEMENT INFORMATION SYSTEM |
| TRUE OR FALSE: The computer service department is responsible for keeping all computer operations and network operating smoothly. | FALSE |
| He is responsible in installing, maintaining, and repairing computer hardware. | COMPUTER TECHNICIAN |
| He researches and develops solution to complex software problems. | COMPUTER SCIENTIST |
| TRUE OR FALSE: Professional group is a group of people with common interests in computer equipment or software. | FALSE |
| Which of the following statements is not true regarding taking certification exams? | CERTIFICATION EXAMS ARE PURELY MULTIPLE-CHOICE TYPE EXAM |
| What career in the computer industry is involved in designing and production of computer equipment? | COMPUTER EQUIPMENT FIELD |
| ____________ specialist, which is a job title in the security area of an IT department, configures routers and firewalls and specifies Web protocols and enterprise technologies. | NETWORK SECURITY |
| If a certification exam is not passed, the test-taker must ______. | PAY THE FEE AGAIN TO RETAKE THE TEST |
| __________ Certified Associate is an application software certification that tests a user's expertise with Flash and Dreamweaver. | ADOBE |
| ___________ Certified Professional for Lotus Software is an application software certification that tests knowledge of Lotus programs. | IBM |
| Software engineer, which is a job title in the system development and programming area of an IT department, specifies, designs, implements, tests, and documents high-quality software in all of the following fields EXCEPT ____________. | SEMIOTICS |
| Database ______, which is a job title in the system development and programming area of an IT department, uses data modeling techniques and tools to analyze, tune, and specify data usage within an application area. | ANALYST |
| Systems ______, which is a job title in the system development and programming area of an IT department, installs and maintains operating system software and provides technical support to the programming staff. | PROGRAMMER |
| ________, which is a job title in the technical services area of an IT department, maintains an organization's Web site and creates or helps users create Web pages. | WEBMASTER / WEB ADMINISTRATOR |
| A(n) __________ agreement ensures that if a student transfers to a four-year college or university, he or she will receive credit for most of the courses taken at the community college level. | ARTICULATION |
| Database administrator, which is a job title in the technical services area of an IT department, does all of the following except ________. | DEVELOPS WEB-BASED DATABASES |
| Job titles in the system development and programming area of an IT department include all of the following except ________. | E-COMMERCE DIRECTOR |
| The computer ________ field consists of manufacturers and distributors of computers and computer-related hardware. | EQUIPMENT |
| The _____ is a scientific and educational organization dedicated to advancing knowledge and proficiency of information technology. | ACM |
| ______________ specialist, which is a job title in the technical services area of an IT department, reviews programs and documentation to ensure they meet an organization's standards. | QUALITY ASSURANCE |
| Technical certification programs are offered by many vendors, called _____ organizations, that develop and administer the examinations to determine whether a person is qualified for certification. | SPONSORING |
| ____________ is a job title in the operations area of an IT department. | DATA COMMUNICATIONS ANALYST / VOIP SPECIALIST |
| __________ which is a job title in the technical services area of an IT department, produces documents such as newsletters, brochures, and books by combining text and graphics. | DESKTOP PUBLISHER / COMPOSITOR |
| ___________ is a job title in the training area of an IT department. | HELP DESK SPECIALIST |
| The computer service and repair field provides preventive __________, component installation, and repair services to customers. | MAINTENANCE |
| __________ is a benefit offered by vendor-sponsored certifications. | ALL OTHER CHOICES ARE CORRECT |
| _______ scientist, which is a job title in the system development and programming area of an IT department, researches, invents, and develops innovative solutions to complex software requirements or problems. | COMPUTER |
| Computing professionals typically obtain a certification by ______. | PASSING AN EXAMINATION |
| E-commerce _______, which is a job title in the management area of an IT department, supervises the development and execution of Internet or e-commerce systems. | DIRECTOR |
| ________________ specialist, which is a job in the training area of an IT department, answers hardware, software, and networking questions in person, over the telephone, and/or in a chat room. | HELP DESK |
| Web software developer, which is a job title in the system development and programming area of an IT department, analyzes, designs, implements, and supports Web applications and works with all of the following except _________. | VISUAL BASIC |
| This machine can be “programmed” to simplify the process of manufacturing textiles with complex patterns. | JACQUARD LOOM |
| These are used to control the amount of current or voltage or used for amplification/modulation or switching of an electronic signal. | TRANSISTORS |
| A(n) ________________________ is a computer small enough to fit in one hand. | UMPC (Ultra Mobile PC) |
| Examples of mobile technology include all of the following EXCEPT ________. | SERVERS |
| A(n) ________ computer is a personal computer that users can carry from place to place. | MOBILE |
| When was transistors made? | DECEMBER 23, 1947 |
| At home, every family member, or home ________, spends time on the computer for different reasons. | USER |
| The acronym UNIVAC stands for___________________________________. | UNVIERSAL AUTOMATIC COMPUTER |
| ________ is the process of setting up the software to work with the computer, printer, and other hardware components. | INSTALLING |
| A(n) ________ computer is a type of personal computer designed so the system unit, input devices, and any other devices fit entirely on or under a desk or table. | DESKTOP |
| With ________ software, a home user can play games, compose music, research genealogy, or create greeting cards. | ENTERTAINMENT |
| In a large business, the employees in the ________ department keep the computers and the network running. | IT |
| Resembling a letter-sized slate, the ________ PC is a special type of notebook computer that allows users to write or draw on the screen. | TABLET |
| The term, ________, refers to any personal computer based on the original IBM personal computer design. | PC-COMPATIBLE |
| With ________, users access account balances, pay bills, and copy monthly transactions from a bank’s computer right into their personal computers. | ONLINE BANKING |
| A(n) _________ computer is a special-purpose computer that functions as a component in a larger product. | EMBEDDED |
| Together, hardware, software, data, people, and procedures comprise a(n) ________ system. | INFORMATION |
| A(n) _________________________ console is a mobile computing device designed for single-player or multiplayer video games. | GAME |
| With a(n) ___________________, users write on the screen or issue instructions to a Tablet PC, for example, by tapping on the screen. | DIGITAL PEN |
| You interact with a program through its ________, which controls how you enter data and instructions and how information is displayed on the screen. | USER INTERFACE |
| Offering the convenience of one-handed operation, a(n) _________________ phone is an Internet-enabled telephone that usually also provides PDA capabilities. | SMART |
| Standard ________ use a handheld controller(s) as an input device; a television screen as an output device; and hard disks, CDs, DVDs, and/or memory cards for storage. | GAME CONSOLES |
| Which of the following is NOT true of mobile devices? | MOBILE DEVICES USUALLY HAVE DISK DRIVES |
| ________ refers to the use of computers to assist with manufacturing processes such as fabrication and assembly. | CAM (Computer-Aided Manufacturing) |
| ________ are large, expensive, powerful computers that can handle hundreds or thousands of connected users simultaneously and store tremendous amounts of data, instructions, and information. | MAINFRAMES |
| At a photo sharing ________, users can create an online photo album and store their digital photographs. | COMMUNITY |
| A _________________________ provides personal organizer functions such as a calendar, appointment book, address book, calculator, and notepad. | PDA |
| The trend of computers and devices with technologies that overlap is known as ________. | CONVERGENCE |
| A computer contains many electric, electronic, and mechanical components known as _________________________. | HARDWARE |
| ________ are the fastest, most powerful computers — and the most expensive. | SUPERCOMPUTERS |
| Small business Web sites sometimes use a(n) ________ to show the world a live view of some aspect of their business. | WEBCAM |
| Each employee or customer who uses a computer in a large business is a(n) ________ user. | ENTERPRISE |
| A(n) ________ user is a category of user that requires the capabilities of a workstation or other powerful computer. | POWER |
| It is a term used to describe text that is informative to the individual reading it or the computer processing it. | INFORMATION |
| TRUE OR FALSE: The system unit allows you to enter data and instruction to the computer. | FALSE |
| TRUE OR FALSE: Waste management involves reducing electricity consumed and environmental waste generated when using a computer. | FALSE |
| TRUE OR FALSE: Transistors are used to control the amount of current or voltage or used for amplification/modulation or switching of an electronic signal. | TRUE |
| TRUE OR FALSE: Main frames are large, expensive, and powerful computer that can handle hundreds or thousands of connected users simultaneously. | TRUE |
| TRUE OR FALSE: The fifth generation of computers is the birth of artificial intelligence. | TRUE |
| It is a is a mobile computing device designed for single player or multiplayer video games. | GAME CONSOLE |
| These are glass tubes with electrical circuits inside. | VACUUM TUBES |
| Most major corporations use ________________________ for business activities. | MAINFRAME |
| A(n) _________________________ includes any company with fewer than 50 employees, as well as the self-employed who work from home. | SOHO |
| ___________ consist(s) of a series of instructions that tells the computer what to do and how to do it. | SOFTWARE |
| A(n) ________ message is a real-time Internet communication, where you exchange messages with other connected users. | INSTANT |
| _______________ include local law practices, accounting firms, travel agencies, and florists. | SMALL OFFICES |
| _________________________ are capable of processing more than 1 quadrillion instructions in a single second. | SUPERCOMPUTERS |
| A ________ computer targets a specific audience and offers high-quality audio, video, and graphics with optimal performance for sophisticated single-user and networked or Internet multiplayer games. | GAMING DESKTOP |
| With a(n) ________, users interact with the software using text, graphics, and visual images such as icons. | GUI |
| A(n) _________ computer is a special-purpose computer that functions as a component in a larger product. | EMBEDDED |
| ________ is a work arrangement in which employees work away from a company’s standard workplace and often communicate with the office through the computer. | TELECOMMUTING |
| Some mobile devices are ________, meaning they can connect to the Internet wirelessly. | INTERNET-ENABLED |
| Two categories of software are ________. | SYSTEM SOFTWARE AND APPLICATION SOFTWARE |
| He is considered as the father of computers. | CHARLES BABBAGE |
| A(n) ________ is a system that attempts to imitate the behavior of the human brain. | NEURAL NETWORK |
| All of the following are categories of users EXCEPT ________. | COMMUNICATIONS USERS |
| Many large companies use the term, ________ computing, to refer to the huge network of computers that meets their diverse computing needs. | ENTERPRISE |
| All computer keyboards have __ that includes letters of the alphabet, numbers, punctuation, and other basic keys. | numeric keyboard |
| Similar to a mechanical mouse; a stationary pointing device with a ball on its top or side | trackball |
| Touch-sensitive display device that users interact with by touching the screen with a finger | touch screen |
| [T/F] When the processor needs an instruction or data, it searches memory in this order: L1 cache, then L2 cache, then L3 cache (if it exists), then RAM — with a greater delay in processing for each level it must search. | TRUE |
| Bluetooth printing is more convenient than infrared printing because Bluetooth devices ________ an approximate 30-foot range. | do not have to be aligned but must be within |
| The drive designation of an optical disc drive, into which the disc would fit, usually ________. | follows alphabetically after that of all the hard disks |
| [T/F] Information on a display device, sometimes called hard copy, exists electronically and appears for a temporary period. | FALSE |
| [T/F] Most mobile computers and devices separate the display and other components into a different physical case. | FALSE |
| With ________ printing, a printer communicates with a device using light waves. | infrared |
| A printer creates images using a laser beam and powdered ink, called ________. | toner |
| A(n) ________ module, which is a small circuit board where RAM chips usually reside, being inserted into the motherboard. | memory |
| Memory ________ on the motherboard hold the memory modules. | slots |
| Keyboards contain keys that allow users to position the insertion point, also known as a(n) ________ in some programs. | cursor |
| The ________ unit is a case that contains electronic components of the computer used to process data. | system |
| [T/F] L2 cache is slightly faster than L1 cache but has a much smaller capacity. | FALSE |
| A printer uses software that enables it to interpret a(n) ________, which tells the printer how to lay out the contents of a printed page. | page description language (PDL) |
| [T/F] The higher the nits of an LCD monitor or LCD screen, the dimmer the images. | FALSE |
| A(n) ________ is a high-speed, high-quality nonimpact printer. | laser |
| [T/F] In addition to games, joysticks, wheels, and gamepads that include force feedback are used in practical applications such as in the military and aviation. | TRUE |
| Commonly used nonimpact printers include all of the following except ________. | line printers and dot-matrix |
| Developed by Hewlett-Packard, a leading printer manufacturer, ________ is a standard printer language that supports the fonts and layout used in standard office documents. | PCL |
| A(n) ________, which is contained on an integrated circuit, can act as an electronic switch that opens or closes the circuit for electrical charges. | transistor |
| With ________ printing, a computer or other device transmits output to a printer via radio waves. | bluetooth |
| [T/F] A system bus allows the processor to communicate with peripherals. | FALSE, expansion bus |
| [T/F] Pixel pitch describes the difference in light intensity between the brightest white and the darkest black that can be displayed on an LCD monitor. | FALSE, contrast |
| [T/F] For a right-handed user, the left button usually is the secondary mouse button. | FALSE |
| A program is ________. | a series of instructions that tells a computer what to do and how to do it |
| The ________ board is the main circuit board of the system unit. | mother |
| [T/F] Some data projectors are large devices that attach to a ceiling or wall in an auditorium. | TRUE |
| Until a few years ago, printing a document required connecting a computer to a printer with a ________. | cable |
| The case of the system unit, sometimes called the ________, is made of metal or plastic and protects the internal electronic components from damage. | chassis |
| In the machine cycle steps, ________ is the process of obtaining a program instruction or data item from memory. | fetching |
| A(n) ________ printer forms characters and graphics on a piece of paper without actually striking the paper. | non-impact printer |
| [T/F] The lower the time in milliseconds it takes to turn a pixel on or off on an LCD monitor, the slower the response time. | FALSE |
| [T/F] The processor interprets and executes a program’s instructions while the program is in RAM. | TRUE |
| [T/F] USB ports on a mobile device usually are the same size as those on personal computers. | FALSE |
| On ________, the electronic components and most storage devices are part of the system unit and other devices, such as the keyboard, mouse, and monitor, normally occupy space outside the system unit. | desktop personal computers |
| A computer ________ is a small piece of semi-conducting material, usually silicon, on which integrated circuits are etched. | chip |
| [T/F] Female connectors have one or more exposed pins, like the end of an electrical cord that is plugged into the wall. | FALSE |
| [T/F] ROM is nonvolatile | TRUE |
| [T/F] The access time (speed) of memory has no affect on the overall performance of a computer. | FALSE |
| Optical discs usually are ________ than one-twentieth of an inch thick. | 4.75 inches in diameter or less |
| [T/F] Most computers use flash memory to hold their startup instructions because it allows the computer easily to update its contents. | TRUE |
| Some ________ printers spray ink, while others use heat or pressure to create images. | non-impact |
| A(n) ____ monitor is a display that uses gas plasma technology, which sandwiches a layer of gas between two glass plates. | plasma |
| A(n) ____ printer forms characters and graphics on a piece of paper by striking a mechanism against an inked ribbon that physically contacts the paper. | impact |
| A(n) ____ printer forms characters and graphics on a piece of paper without actually striking the paper. | non-impact |
| ____ are audio output devices that rest inside the ear canal. | earbuds |
| ____ are audio output devices that cover or are placed outside the ear. | headphones |
| The series of dots that form the image on a monitor are called _______. | pixels |
| [T/F] On notebook and some handheld computers, smart phones, and other mobile devices, the keyboard is built in the top of the system unit. | TRUE |
| Which of the following printer is a color printer that produces photo-lab-quality pictures? | photo |
| Displays are geared for a specific resolution. What is this resolution called? | native |
| Which of the following is data that has been processed into a useful form? | output |
| Which of the following reads the magnetic stripe on the back of credit cards, entertainment cards, bank cards, and other similar cards? | magstripe reader |
| Most of these types of device include a small optical scanner for reading characters and sophisticated software to analyze what is read. What kind of device is this? | OCR |
| [T/F] As a user moves a mouse, the pointer on the screen also moves. | TRUE |
| [T/F] Portable media players that do not have touch screens typically have a touch-sensitive pad. | TRUE |
| [T/F] When drawing on a graphics tablet with a stylus or digital pen, the tablet detects and converts the movements into digital signals that are sent to a computer. | TRUE |
| [T/F] RFID requires line-of-site transmission. | FALSE |
| [T/F] With voice input, blind users have the computer speak out loud the information that appears on the screen. | FALSE |
| Increases the low bass sounds for a speaker system | subwoofer |
| [T/F] The lower the dpi (dots per inch) an ink-jet printer can output, the better the print quality. | FALSE |
| Video cards may have a standard monitor port and a(n) ____ port, allowing users to connect external devices such as a television, DVD/Blu-ray player, and video recorder to the computer. | s-video |
| An important measure of LCD monitors is the ____ time, which is the time in milliseconds (ms) that it takes to turn a pixel on or off. | response |
| _____ is data that has been processed into a useful form. | output |
| [T/F] Cloud storage is an Internet service that provides storage to computer users. | TRUE |
| An alternative for blind users is a(n) ____ printer, which outputs information in a special printer on paper. | braille |
| Which of the following is a small symbol on the screen whose location and shape changes as a user moves a pointing device? | pointer |
| Over time, which of the following is true of thermal printers? | They are inexpensive, but the print quality is low and the images tend to fade. |
| Technology that sends resistance to a device in response to actions of the user | force feedback (haptic) |
| All computer keyboards, such as that in the accompanying figure, have _____ that includes letters of the alphabet, numbers, punctuation marks, and other basic keys | typing area |
| The primary input device for a _____ is a digital pen, which allows users to write on the device's screen. | tablet PC |
| A(n) _______ is a small, flat, rectangular pointing device that is sensitive to pressure and motion. | touchpad |
| Some input devices eliminate manual data entry by capturing data from a _____, which is the original form of data. | source document |
| Manufacturers often use _____ to represent a digital camera's resolution. | PPI (pixels per inch) |
| Which of the following is a touch-sensitive device, resembling a dry-erase board, that displays the image on a connected computer screen? | interactive whiteboard |
| Which of the following devices read text printed with magnetized ink? | MICR |
| Many mobile computers and mobile devices use LCD monitors. What does LCD stand for? | liquid crystal display |
| Which of the following is the most advanced form of digital television? | HDTV |
| In computers, what is used to cool central processing units or graphics processors? | heat sink |
| On most ___________, including netbooks, the keyboard and pointing device often occupy the area on the top of the system unit, and the display attaches to the system unit by hinges | notebook computers |
| Interprets and carries out the basic instructions that operate a computer | processor |
| _____________ are circuit boards that provide connections and functions not built into the motherboard or expand on the capability of features integrated into the motherboard. | adapter cards |
| The power ________ is the component of the system unit that converts the wall outlet AC power into the DC power a computer requires. | power supply |
| _____________________ contains many microscopic pathways capable of carrying electrical current. | integrated circuit |
| The _____________ or simply core, contains the circuitry necessary to execute instructions. | processor core |
| The _______________ is the component of the processor that directs and coordinates most of the operations in the computer. | control unit |
| The ______________, another component of the processor, performs arithmetic, comparison, and other operations. | arithmetic logic unit (ALU) |
| _________________ refers to the process of translating the instruction into signals the computer can execute. | decoding |
| ___________________ means writing the result to memory (not to a storage medium). | storing |
| The processor relies on a small quartz crystal circuit called the ____________ to control the timing of all computer operations. | system clock |
| The faster the clock speed, the more ___________ the processor can execute per second. | instructions |
| ___________, also called main memory, consists of memory chips that can be read from and written to by the processor and other devices. | RAM |
| __________ is a type of random-access memory that stores each bit of data in a separate capacitor within an integrated circuit; must be re-energized constantly or they lose their contents | DRAM |
| ______________ chips are faster and more reliable than any variation of DRAM chips. These chips do not have to be re-energized as often as DRAM chips, thus, the term static. | SRAM |
| _________ stores data using magnetic charges instead of electrical charges; retains its contents after power is removed from the computer, which could prevent loss of data for users. | MRAM |
| A processor contains small high-speed storage locations, called ____, that temporarily hold data and instructions. | registers |
| [T/F] The arithmetic unit interprets each instruction issued by a program and then initiates the appropriate action to carry out the instruction. | FALSE, control |
| [T/F] Some computers use more than one processor chip. | TRUE |
| [T/F] Motorola is the leading manufacturer of Intel-compatible processors, which have an internal design similar to Intel processors, perform the same functions, and can be as powerful, but often are less expensive. | FALSE, AMD |
| [T/F] Replacing a motherboard is a fairly simple process, whereas replacing a processor is much more complicated. | FALSE |
| Some computer and chip manufacturers use the term ________ to refer to a personal computer processor chip. | microprocessor |
| The smallest unit of data a computer can process is a(n) ________. | bit |
| A(n) ________ drive is a flash memory storage device that plugs in a USB port on a computer or portable device. | thumb |
| Some computers improve hard disk access time by using a disk ________, which consists of memory chips that store frequently accessed items. | cache |
| The inflexible, circular platters on ________ disks use magnetic particles to store data, instructions, and information on a disk’s surface. | hard |
| An advantage of portable hard disks and removable hard disks is that users can ________. | all other choices are correct |
| A(n) ________ is a duplicate of a file, program, or disk that can be used in case the original is lost, damaged, or destroyed. | backup |
| A group of two or more integrated hard disks is called a(n) ________. | RAID |
| Current ________ have storage capacities of 16 GB to 256 GB and more. | SSD |
| A(n) ________ hard drive is a self-contained unit that you insert in and remove from a slot or USB port in a device or a computer. | removable |
| A(n) ________ device is any hardware component that conveys information to one or more people. | output |
| ________, are special keys programmed to issue commands to a computer. | function keys |
| An audio ________ device is a component of a computer that produces music, speech, or other sounds, such as beeps. | output |
| Printed information, called ________ copy, exists physically and is a more permanent form of output. | hard |
| A user response is ________. | an instruction issued by replying to a question that is displayed |
| In a graphical user interface, a(n) ________ is a small symbol on the screen whose location and shape changes as a user moves a pointing device. | pointer |
| A(n) ________ is an output device that produces text and graphics on a physical medium such as paper or transparency film. | printer |
| The goal of ________ is to incorporate comfort, efficiency, and safety in the design of items in the workplace. | ergonomics |
| ________ is any data and instructions entered into the memory of a computer. | input |
| A hard copy also is called a(n) ________. | printout |
| A small metal or plastic device that looks like a tiny ink pen but uses pressure instead of ink. | stylus |
| A pressure-sensitive pointing device shaped like a pencil eraser that is positioned between keys on a mobile computer keyboard. | pointing stick |
| [T/F] Some motherboards include all necessary capabilities and do not require adapter cards. | TRUE |
| A type of processor called ________ on a chip integrates the functions of a processor, memory, and a video card on a single chip. | system |
| AMD is the leading manufacturer of ____-compatible processors, which have an internal design similar to Intel processors, perform the same functions, can be as powerful, but often are less expensive. | intel |
| The ________ unit is the component of the processor that directs and coordinates most of the operations in the computer. | control |
| [T/F] On a personal computer, the various functions performed by the processor extend over many separate chips and often multiple circuit boards. | FALSE |
| A(n) ________ processor is a chip with two or more separate processors. | multi-core |
| ________ is the process of dividing a disk into tracks and sectors, so the operating system can store and locate data and information on the disk. | formatting |
| Common types of flash memory cards include ________. | all other choices are correct |
| ________ is the number of bytes (characters) a storage medium can hold. | capacity |
| ________ holds data, instructions, and information for future use. | storage |
| A(n) ________ is a display device that is packaged as a separate peripheral. | monitor |
| A(n) ________ mouse uses devices that emit and sense light to detect movement. | optical |
| A(n) ________ keyboard has a design that reduces the chance of wrist and hand injuries. | ergonomic |
| A(n) ________ device is any hardware component that allows users to enter data or instructions (programs, commands, and user responses) into a computer. | input |
| A(n) ________, is a pointing device that fits comfortably under the palm of the hand. | mouse |
| Many personal computer users add surround sound ___________________ to their computers to generate a higher-quality sound. | speakers |
| A(n) _______ output device that conveys text, graphics, and video information. | display |
| A(n) ___________ disc is a type of storage media that consists of a flat, round portable disc made of metal, plastic, and lacquer that is written and read by a laser. | optical |
| One gigahertz equals one ______ ticks of the system clock per second. | billion |
| Each tick equates to a ____________. | clock cycle |
| A(n) ________ device is an input device that allows a user to control a pointer on the screen. | pointing |
| The pace of the system clock, called the ______ speed, is measured by the number of ticks per second. | clock |
| If the computer has an internal hard disk (drive C) and a DVD drive (drive D) and no other disk drives, what will the USB flash drive probably be? | E |
| A(n) ________ is an input device that contains keys users press to enter data into a computer. | keyboard |
| A(n) ________ is a chip that controls the manipulation and display of graphics on a display device. | GPU |
| 1010_2 - 0011_2 | 0111 |
| EF86_16 + 6C39_16 | 15BBF |
| 1170_8 + 5217_8 | 6407 |
| 110 + 1101 + 1110 | 0100001 |
| 110_2 + 101_2 | 01011 |
| 1011_2 - 1001_2 | 10 |
| 11001011_2 - 10000011_2 | 01001000 |
| The maximum number of bits sufficient to represent a hexadecimal number in binary. | 15 |
| Convert the decimal number 6.75 to binary. | 110.11_2 |
| The octal equivalent of the binary number 10010100_2 is ___. | 224 |
| If the decimal number is a fraction then its binary equivalent is obtained by ______ the number continuously by 2. | multiplying |
| The decimal equivalent of hexadecimal value AA is ___. | 170_10 |
| Convert 110_2 to _10. | 6 |
| The binary number 111 in octal format is | 7 |
| The binary equivalent of hexadecimal 44_16 is | 01000100_2 |
| Convert binary 1111101 to octal. | 175_8 |
| [T/F] Binary number system is the number system used by computers. | TRUE |
| What is the base of the octal number system? | 8 |
| Which of the following is not a type of number system? | fractional |
| The highest single digit value in hexadecimal number system is 15. | FALSE |
| How many symbols are used to represent values in hexadecimal number? | 16 |
| The octal number 645_8 is ________ in decimal. | 421_10 |
| Convert the binary 110001 100101 to octal. | 6145_8 |
| The decimal equivalent of hexadecimal 2D is _____. | 45_10 |
| 1111110_2 + 10110101_2 | 110110011 |
| 10010011_2 + 10111001_2 | 101001100 |
| 5826_16 + A140_16 | F966 |
| The LSB and MSB of 1243247 are ___ and ____. | 4, 1 |
| In a number system, each position of a digit represents a specific power of the base. | TRUE |
| Convert 11001001_2 to decimal. | 201 |
| Convert the binary number 1011010 to hexadecimal. | 5A_16 |
| Convert decimal 58 to binary. | |
| DA96 - 1D68 | BD2E |
| 4102_8 - 2643_8 | 1237* |
| TRUE OR FALSE: A shortcut is an icon on the desktop or in a folder that provides a user with immediate access to a program or file. | TRUE |
| During a cold boot on a personal computer, the POST (power-on self-test) results are compared with data in a ________ chip. | CMOS |
| A(n) ________ is a private combination of characters associated with a username that allows access to certain computer resources. | PASSWORD |
| TRUE OR FALSE: Client operating systems can operate with or without a network. | TRUE |
| A program called a print ________ intercepts documents to be printed from the operating system and places them in the queue. | SPOOLER |
| ________ means the operating system automatically configures new devices as users install them. | PLUG AND PLAY |
| ________ software, such as operating systems and utility programs, consists of the programs that control or maintain the operations of a computer and its devices. | SYSTEM |
| TRUE OR FALSE: The advantage of device-dependent operating systems is that users can retain existing application software and data even if they change computer models or vendors. | FALSE |
| In a ________ , a user types commands or presses special keys on the keyboard (such as function keys or key combinations) to enter data and instructions. | COMMAND-LINE INTERFACE |
| TRUE OR FALSE: Some operating systems include a Web browser and an e-mail program, enabling users to begin accessing the Web and communicating with others as soon as they set up the Internet connection. | TRUE |
| A(n) ________ is the intersection of a column and row in a worksheet. | CELL |
| A(n) ________ is application software that includes an appointment calendar, address book, notepad, and other features to help users organize personal information. | PIM |
| Which of the following is an example of Web page authoring software? | ADOBE DREAMWEAVER |
| ________ software consists of programs designed to make users more productive and/or assist them with personal tasks. | APPLICATION |
| ________ software allows users to create, access, and manage a database. | DATABASE |
| ________ software is software that allows users to organize data in rows and columns and perform calculations on the data. | SPREADSHEET |
| ________ software enables users to enter typed text, handwritten comments, drawings, or sketches anywhere on a page and then save the page as part of a notebook. | NOTE TAKING |
| A(n) ________ is a rectangular area of the screen that displays data and information. | WINDOW |
| ________ software allows users to create and manipulate documents containing mostly text and sometimes graphics. | WORD PROCESSING |
| A(n) ________ contains a list of commands from which a user makes selections. | MENU |
| A(n) ________ program is a utility that protects a computer against viruses by identifying and removing any computer viruses found in memory, on storage media, or on incoming files. | ANTIVIRUS |
| A ________ does not replicate itself to other computers. | TROJAN HORSE |
| A(n) ________ utility allows users to copy selected files or an entire hard disk to another storage medium. | BACKUP |
| In Windows Operating System, the Windows ________ feature protects your computer from malwares as well as spyware. | DEFENDER |
| A(n) ________ is a unique combination of characters, such as letters of the alphabet or numbers, that identifies one specific user. | USERNAME |
| ________ software is privately owned software and limited to a specific vendor or computer model. | PROPRIETARY |
| The ________ is the core of an operating system that maintains the computer’s clock, starts applications, and assigns the computer’s resources, such as devices, programs, data, and information. | KERNEL |
| TRUE OR FALSE: Users today typically run multiple programs concurrently. | TRUE |
| A(n) ________ is a window that provides information, presents available options, or requests a response. | DIALOG BOX |
| To help organize a presentation, you can view ________ versions of all the slides similarly to how 35mm slides look on a photographer’s light table. | THUMBNAIL |
| When computer users ________ a document, the computer transfers the document from memory to a storage medium. | SAVE |
| ________ software allows users to create visual aids for presentations to communicate ideas, messages, and other information to a group. | PRESENTATION |
| ________ software provides a means for sharing, distributing, and searching through documents by converting them into a format that can be viewed by any user. | DOCUMENT MANAGEMENT |
| Which of the following is an example of desktop publishing software for the professional? | ADOBE INDESIGN |
| ________ software allows users to modify a segment of a video, called a clip. | VIDEO EDITING |
| TRUE OR FALSE: A disadvantage of preemptive multitasking is the operating system loses control if one program stops operating properly. | FALSE |
| Compressed files, sometimes called _________. | ZIPPED FILES, USUALLY HAVE A ZIPPED EXTENSION |
| Linux is ________ software, which means its code is provided for use, modification, and redistribution. | OPEN SOURCE |
| A personal ________ is a utility that detects and protects a computer from unauthorized intrusions. | FIREWALL |
| Which of the following is an example of photo editing software for the professional? | ADOBE PHOTOSHOP |
| When using spreadsheet software, the rows and columns collectively are called a(n) ________. | WORKSHEET |
| A ________ is an instruction that causes a program to perform a specific action. | COMMAND |
| The top of a window has a(n) ________, which is a horizontal space that contains the window’s name. | TITLE BAR |
| TRUE OR FALSE: Regardless of the size of the computer, most operating systems provide similar functions. | TRUE |
| The purpose of memory ________________ is to optimize the use of random access memory (RAM). | MANAGEMENT |
| TRUE OR FALSE: Some parts of the operating system are resident; that is, these instructions remain on the hard disk until they are needed. | FALSE |
| A file is ________. | A NAMED COLLECTION OF STORED DATA |
| A(n) ________________ operating system supports two or more processors running programs at the same time. | MULTIPROCESSING |
| ________ software assists people in becoming more effective and efficient while performing their daily business activities. | BUSINESS |
| With virtual memory, a ________________ is the amount of data and program instructions that can swap at a given time. | PAGE |
| With ________________ memory, the operating system allocates a portion of a storage medium, usually the hard disk, to function as additional RAM. | VIRTUAL |
| A font ________, such as bold, italic, and underline adds emphasis to a font. | STYLE |
| The kernel is memory ________, which means it remains in memory while the computer is running. | RESIDENT |
| TRUE OR FALSE: When you purchase a computer, it usually includes a boot disk. | TRUE |
| TRUE OR FALSE: Using tax preparation software, taxpayers can file their state and federal tax returns online, in a process called e-filing. | FALSE |
| In the Windows operating system, the ________ is an on-screen work area that has a graphical user interface. | DESKTOP |
| Networks, servers, mainframes, and supercomputers allow hundreds to thousands of users to connect at the same time, and thus are | MULTIUSER |
| TRUE OR FALSE: Most personal finance software includes financial planning features, such as analyzing home and personal loans, preparing income taxes, and managing retirement savings. | TRUE |
| TRUE OR FALSE: All sizes of computers typically use the same operating system. | FALSE |
| With ________________ multitasking, the operating system interrupts a program that is executing and passes control to another program waiting to be executed. | PREEMPTIVE |
| TRUE OR FALSE: Operating systems rarely provide a means to establish Internet connections. | FALSE |
| A(n) ________ viewer is a utility that allows users to display, copy, and print the contents of a graphics file. | IMAGE |
| The BIOS executes a series of tests, collectively called the ________, which check the various system components including the buses, system clock, adapter cards, RAM chips, mouse, keyboard, and drives. | POST |
| Word processing software includes a(n) ________, which reviews the spelling of individual words, sections of a document, or the entire document. | SPELLING CHECKER |
| A screen ________ causes a monitor’s screen to display a moving image or blank screen if no keyboard or mouse activity occurs for a specified period of time. | SAVER |
| _____ software helps companies record and report their financial transactions. | ACCOUNTING |
| TRUE OR FALSE: Because virtual memory is faster than RAM, users may notice the computer speeding up while it uses virtual memory, | FALSE |
| TRUE OR FALSE: Like other operating systems, Linux is a proprietary software. | FALSE |
| TRUE OR FALSE: A device-dependent programs runs on computers provided by a variety of manufacturers. | FALSE |
| The _____ is firmware that contains a computer's startup instructions. | BIOS |
| A(n) _____ system is set of programs containing instructions that coordinate all the activities among computer hardware resources. | OPERATING |
| TRUE OR FALSE: Even if uses are working on multiple programs simultaneously, it is impossible to run out of RAM. | FALSE |
| A pop-up _____ is a filtering program that stops pop-up ads from displaying on Web pages. | BLOCKER |
| A file _____ utility is a utility that shrinks the size of a file(s). | COMPRESSION |
| A(n) _____ is a small image displayed on the screen that represents a program, a document or some other object | ICON |
| If a hard disk is damaged, a computer can be booted from a(n) _____ disk which is usually a CD that contains a few system files that will start the computer. | RECOVERY |
| In the event a backup files is used, a(n) _____ program reverses the process and returns backed up files to their original form. | RESTORE |
| TRUE OR FALSE: Microsoft has continually updated its Windows operating system, incorporating new features and functions with each subsequent version. | TRUE |
| A software _____ is a collection of individual programs sold as a single package. | SUITE |
| TRUE OR FALSE: Stand-alone utilities typically offer improvements over those features built into an operating system or provide features not included in an operating system. | TRUE |
| TRUE OR FALSE: Few operating systems include any utility programs. | FALSE |
| The set of instructions entered into a computer that uses the command-line interface is called the ______ language. | COMMAND |
| With an operating system _____ can include fixes to bugs, enhancements to security, modifications to devices, drivers, and the like. | AUTOMATIC UPDATES |
| A(n) _____ is a private combinations of characters associated with a username that allows access to certain computer resources. | PASSWORD |
| A(n) _____ is a utility that removes a program, as well as any associated entries in the system files. | UNINSTALLER |
| TRUE OR FALSE: If the username and password entered match the username and password kept on file, a network operating system denies access to the user | FALSE |
| _____ software provides the capabilities of paint software and also includes the ability to enhance and modify existing image and pictures. | IMAGE EDITING |
| ____ is mass produced, copyrighted retail software that needs the needs of a wide variety of users, not just a single user or company | PACKAGED SOFTWARE |
| A feature, called _____, allows users of word processing software to type words continually without pressing the enter key at the end of each line | WORDWRAP |
| A(n) ____ is an online area where users have written discussions. | NEWSGROUP / MESSAGE BOARD |
| _____ is the electronic equivalent of a user manual. | ONLINE HELP |
| Simplified accounting program that helps home users and small office/home office users to balance their checkbooks, pay bills, etc | PERSONAL FINANCE SOFTWARE |
| _____________________ is an application that can guide individuals, families, or small businesses through the process of filing federal taxes. | TAX PREPARATION SOFTWARE |
| Which kind of software allows users to draw pictures, shapes, and other graphical images with various on-screen tools such as a pen, brush, and eyedropper? | PAINT |
| A(n) ________ is a specific named location on a storage medium that contains related documents. | FOLDER |
| A spyware ________ is a program that detects and deletes spyware and other similar programs. | REMOVER |
| The kernel is memory ________, which means it remains in memory while the computer is running. | RESIDENT |
| A(n) ________ viewer is a utility that allows users to display, copy, and print the contents of a graphics file. | IMAGE |
| Which of the following is an example of paint/image editing software for the professional? | ADOBE ILLUSTRATOR |
| A(n) ________ is a collection of data organized in a manner that allows access, retrieval, and use of that data. | DATABASE |
| A cross-platform program is one that runs __. | THE SAME ON MULTIPLE OPERATING SYSTEMS |
| The operating system that a computer uses sometimes is called the ____. | PLATFORM |
| In Windows Vista, the ____ consists of several files that contain the system configuration information. | REGISTRY |
| In Windows Vista, the ____ contains a list of programs that open automatically when users boot the computer. | START UP FOLDER |
| Windows Vista ____ offers the Aero interface (shown in the accompanying figure) to basic users. | HOME PREMIUM |
| A single user/single ____ operating system allows only one user to run one program at a time. | TASKING |
| A single user/____ operating system allows a single user to work on two or more programs that reside in memory at the same time | MULTITASKING |
| Smart phones and other small computing devices often use a ____ operating system. | SINGLE USER/SINGLETASKING |
| _________ operating system enables two or more users to run programs simultaneously. | MULTIUSER |
| _________ operating system supports two or more processors running programs at the same time. | MULTIPROCESSING |
| The area of the hard disk used for virtual memory is called a(n) ____ file because it exchanges data, information, and instructions between memory and storage. | SWAP |
| With virtual memory, which is illustrated in the accompanying figure, the technique of swapping items between memory and storage, called ____, is a time-consuming process for the computer. | PAGING |
| ____________ is a computer that continues to operate when one of its components fails, ensuring that no data is lost. | FAULT-TOLERANT COMPUTER |
| _____________ is a segment of memory or storage, such as the disk in the accompanying figure, in which items are placed while waiting to be transferred from an input device or to an output device. | BUFFER |
| A process called ____, which is illustrated in the accompanying figure, sends documents to a buffer instead of sending them immediately to the printer. | SPOOLING |
| In the accompanying figure, multiple documents line up in a(n) ____ in the buffer. | QUEUE |
| ____ operating system is an operating system that organizes and coordinates how multiple users access and share resources on a network. | SERVER |
| The latest version of the Macintosh operating system, Mac ____, is a multitasking operating system available only for computers manufactured by Apple. | OS X |
| Windows ____ is Microsoft’s fastest, most reliable and efficient operating system to date, offering quicker application start up, built-in diagnostics, automatic recovery, improved security, and enhanced searching and organizing capabilities. | VISTA |
| ____ is a multitasking operating system developed in the early 1970s by scientists at Bell Laboratories. | UNIX |
| Novell’s ____ is a server operating system designed for client/server networks. | NETWARE |
| ________ is someone who tries to access a computer or network illegally | HACKER |
| Windows ____ is an operating system that includes functionality, applications, and a user interface designed for specific types of devices. | MOBILE |
| The term, computer ____, describes a potentially damaging computer program that affects, or infects, a computer negatively by altering the way the computer works without the user’s knowledge or permission. | VIRUS |
| A ____ is malware that copies itself repeatedly, for example in memory or over a network, using up system resources and possibly shutting the system down | WORM |
| __________ is software that acts without a user’s knowledge and deliberately alters a computer’s operations. | MALWARE |
| __________ is malware that hides within or looks like a legitimate program, such as a screen saver. | TROJAN HORSE |
| An _______ program is a filtering program that attempts to remove spam before it reaches a user’s inbox. | ANTI-SPAM |
| A program that removes or blocks certain items from being displayed. | FILTER |
| A file ____ utility is a utility that transforms the contents of a file or data from one format to another. | CONVERSION |
| TRUE OR FALSE: The boot process is very different for large and small computers. | FALSE |
| TRUE OR FALSE: A warm boot is the process of using the operating system to restart a computer. | TRUE |
| TRUE OR FALSE: Application software is said to be downward compatible, meaning it will run on a new version of an operating system. | FALSE |
| TRUE OR FALSE: Network administrators can set up a network to decrypt data as it travels over a network to prevent unauthorized users from reading the data. | FALSE |
| __________ is a collection of electronic drawings- photos- and other images that can be inserted into documents. | CLIP ART |
| TRUE OR FALSE: Some parts of the operating system are resident; that is, these instructions remain on the hard disk until they are needed. | FALSE |
| TRUE OR FALSE: When a computer is turned on, the charge of electricity causes the processor chip to reset itself and find the ROM chip(s) that contains the BIOS. | TRUE |
| TRUE OR FALSE: The nexus is the core of an operating system that manages memory and devices. | FALSE |
| TRUE OR FALSE: Command-line interfaces like the one in the accompanying figure give a user less control to manage detailed settings. | FALSE |
| TRUE OR FALSE: A disadvantage of Linux is that it is available only in a command-line version like the one in the accompanying figure | FALSE |
| TRUE OR FALSE: A disadvantage of preemptive multitasking is the operating system loses control if one program stops operating properly. | FALSE |
| TRUE OR FALSE: Some personal computer maintenance utilities continuously monitor a computer while it is used and repair problems before they occur. | TRUE |
| TRUE OR FALSE: A compressed file takes up more storage space than the original file. | FALSE |
| TRUE OR FALSE: When you receive a compressed file, you must zip it. | FALSE |
| TRUE OR FALSE: Some operating systems such as Windows Vista include uncompress capabilities. | TRUE |
| TRUE OR FALSE: One sign of a virus infection is that available memory is less than what should be available. | TRUE |
| TRUE OR FALSE: The programmer of a virus, known as a virus author, intentionally writes a virus program. | TRUE |
| TRUE OR FALSE: Ghosting is a severe problem with today’s displays. | FALSE |
| TRUE OR FALSE: When users press a key or move the mouse, a screen saver disappears and the screen returns to the previous state. | TRUE |
| TRUE OR FALSE: Instead of backing up to a local disk storage device, some users opt to back up their files using online storage. | TRUE |
| TRUE OR FALSE: By compressing files, a backup utility program requires more storage space for the backup files than for the original files. | FALSE |
| TRUE OR FALSE: The iPhone and iPod devices are multi-touch, meaning that they recognize multiple points of contact. | TRUE |
| TRUE OR FALSE: Some devices with the Windows Mobile operating system support handwriting and voice input. | TRUE |
| TRUE OR FALSE: A server operating system typically resides on a client. | FALSE |
| TRUE OR FALSE: Most editions of Windows Server 2008 include Hyper-V, which is a virtualization technology. | TRUE |
| TRUE OR FALSE: In addition to being a stand-alone operating system, UNIX also is a network operating system. | TRUE |
| TRUE OR FALSE: Power users seldom work with UNIX because of its rigidity and vulnerability. | FALSE |
| TRUE OR FALSE: When programmers move application software from one UNIX version to another, they sometimes have to rewrite some of the programs. | TRUE |
| TRUE OR FALSE: Because virtual memory is faster than RAM, users may notice the computer speeding up while it uses virtual memory. | FALSE |
| TRUE OR FALSE: Windows Vista Ultimate includes all features of Windows Vista Home Premium and provides additional features designed to make mobile users’ computers more secure and easier to network. | TRUE |
| TRUE OR FALSE: In Windows Vista, the Windows SideShow feature connects to personalized mini-applications, called gadgets, such as weather, photos, or headline news. | FALSE |
| TRUE OR FALSE: In Windows Vista, the Windows Sidebar allows viewing of messages on a powered-off notebook computer equipped with a secondary display. | FALSE |
| A(n) ________ drive is the drive from which a personal computer starts. | BOOT |
| Reorganizing a disk so that the files are stored in contiguous sectors, thus speeding up disk access and the performance of the entire computer. | DEFRAGMENTING |
| Utility program that writes text, graphics, audio, and video files to a recordable or rewriteable CD, DVD, or Blu-ray Disc. | DISK BURNING SOFTWARE |
| Utility that reorganizes the files and unused space on a computer's hard disk so that the operating system accesses data more quickly and programs run faster. | DISK DEFRAGMENTER |
| Small program that tells an operating system how to communicate with a specific device. | DRIVER |
| The operating system that resides on a ROM chip inside most PDAs and small devices. | EMBEDDED OPERATING SYSTEM |
| Utility that performs functions related to file management. | FILE MANAGER |
| Operating system function that saves any open documents and programs to a hard disk before removing power from the computer. | HIBERNATE |
| Utility program that allows you to view images and animation, listen to audio, and watch video files. | MEDIA PLAYER |
| Operating system program that assesses and reports information about various computer resources and devices. | PERFORMANCE MONITOR |
| Scam in which a perpetrator attempts to obtain your personal and/or financial information. | PHISHING |
| Utility program that attempts to locate a file on your computer based on criteria you specify. | SEARCH |
| Operating system that organizes and coordinates how multiple users access and share resources on a network. | SERVER OPERATING SYSTEM |
| Free downloadable software updates provided by the software manufacturer to users who have registered and/or activated their software. | SERVICE PACK |
| Operating system function that saves any open documents and programs to RAM, turns off all unneeded functions, and then places the computer in a low-power state. | SLEEP MODE |
| Unsolicited e-mail message or newsgroups posting sent to many recipients or newsgroups at once. | SPAM |
| The __________ is a small symbol displayed on the screen that moves as a user moves the mouse. | POINTER |
| The ________ of the document window usually displays a document’s file name. | TITLE BAR |
| TRUE OR FALSE: A company can use thousands of computer system in a single computer-based information system. | TRUE |
| A(n) ____________ is a window on the screen that provides areas for entering or changing data in a database. | FORM |
| A ____________ is a field or set of fields in your table that acts as a unique identifier for every row. | PRIMARY KEY |
| ____________ is an element of an information system which refers to the physical component of a computer system. | HARDWARE |
| What kind of relationship is observed in the situation: A customer to products that can be ordered. | ONE TO MANY |
| CBIS is an acronym which stands for ____________. | COMPUTER BASED INFORMATION SYSTEM |
| This element of a CBIS tells hardware how to function. | SOFTWARE |
| It is the most overlooked element of a CBIS. | PEOPLE |
| A(n) ____________ is an organized collection of information which can easily be retrieved. | DATABASE |
| It is a collection of unprocessed information. | DATA |
| These are all types of information systems EXCEPT: | FILE PROCESSING SYSTEM |
| ____________is a set of data related for a specific purpose or topic. | DATABASE |
| It is an element of CBIS that is responsible in disseminating information to other people faster and safer. | COMMUNICATION |
| What kind of relationship is observed in the situation: Suppliers to products. | MANY TO MANY |
| ____________ are designed in a way that it can be printed just like a file done in word processing software. | REPORTS |
| Every row in a database table is also called ____________. | RECORD |
| These are used to retrieve data from a database. | QUERY |
| When compared with a file processing system, a database offers all of the following except _________. | LESS REQUIRED MEMORY, STORAGE, AND PROCESSING POWER |
| You can create a _______ to perform a specific series of actions in a database. | MACRO |
| The tables or queries from which a query gets its data are referred to as its _______ | RECORD SOURCE |
| It is considered as the bloodline of all CBIS, these needs to be processed first before they become meaningful. | DATA |
| TRUE OR FALSE: Some companies develop their own software that their CBIS uses. | TRUE |
| TRUE OR FALSE: Databases can be used to sort, summarize, and filter information. | TRUE |
| TRUE OR FALSE: Queries can be used to retrieve data from one or more tables. | TRUE |
| It comprises rules, descriptions and instructions for how things are done. | PROCEDURES |
| A(n) ____________ is a collection of multiple hardware, software, and communication networks that people needs to create, collect, and distribute useful data. | INFORMATION SYSTEMS |
| ____________ allow relational databases to split and store data in different tables, while linking disparate data items. | RELATIONSHIPS |
| Every item data stored in a table is called ____________. | DATA VALUE |
| A ____________ is a kind of user interface so that users can easily interact with the database. | FORM |
| This is added to every table in a database to make every record unique. | PRIMARY KEYS |
| A ____________ is another database object which can be use to summarize information from a table or query. | REPORT |
| TRUE OR FALSE: Companies of the same business type uses the same software. | FALSE |
| Difficulty to access data stored in separate files in different departments. | DATA ISOLATION |
| TRUE OR FALSE: You can choose which fields you want in your report. | TRUE |
| It is the repository of related data in a database. | TABLE |
| What kind of relationship is observed in the situation: Person to email address. | ONE TO MANY |
| TRUE OR FALSE: A visually attractive form have no effect on working with the database. | FALSE |
| Each column in a database table is also called _____. | FIELD |
| Where do we usually find procedures covering how hardware and software are used? | USER MANUALS |
| A ______ can be used to create an action or set of actions that can be used to automate a task. | MACRO |
| What kind of relationship is observed in the situation. People to address. | MANY TO MANY |
| The information part of an information system, and whether that is statistical data, sets of instructions, lists of names or even graphics and animation. | DATA |
| ________ is a database object that can be used to extract or show information in Datasheet view. | QUERY |
| A _______ is a situation that exists between two relational database tables. | RELATIONSHIPS |
| TRUE OR FALSE: Forms cannot help in preventing incorrect data to be entered to the CBIS. | FALSE |
| _______ can be embedded with forms and reports. | MACRO |
| All of the following are component of a computer-based Information System EXCEPT: | FILE SYSTEM |
| Editing an entry from a duplicated file mean that you will have to edit all other files where the edited data appeared. | INTEGRITY PROBLEMS |
| TRUE OR FALSE: Primary keys are also useful for designing relational databases. | TRUE |
| ____________ gathers, organizes and manipulates data and carries out instructions. | SOFTWARE |
| TRUE OR FALSE: Relational databases requires that tables to be related to other tables must have primary keys. | TRUE |
| A communication ____________ is a transmission media on which data, instructions, or information travel. | CHANNEL |
| The risk to a bus network is that ____________. | THE BUS ITSELF MIGHT BECOME INOPERABLE |
| The Internet has its roots in ____________, a network that became functional in 1969, linking scientific and academic researchers across the United States. | ARPANET |
| A(n) ____________ is a wireless network that provides Internet connections to mobile computers and other devices. | HOT SPOT |
| The ____________ is a worldwide collection of networks that links millions of businesses, government agencies, educational institutions, and individuals. | INTERNET |
| A(n) ____________ is a collection of computers and devices connected together via communications devices and transmission media. | NETWORK |
| ____________ allows users to share documents with others in real time. | AN ONLINE MEETING |
| A satellite Internet service ____________. | IS A HIGH-SPEED INTERNET CONNECTION |
| TRUE OR FALSE: Some operating systems include an instant messenger. | TRUE |
| A(n) ____________ is a network that covers a large geographic area, such as a city, country, or the world, using a communications channel that combines many types of media. | WAN |
| ________ is the code of acceptable behaviors users should follow while on the Internet; that is, it is the conduct expected of individuals while online. | NETIQUETTE |
| TRUE OR FALSE: Some operating systems include an instant messenger. | TRUE |
| ________ is the process of transferring documents, graphics, and other objects from a computer to a server on the Internet. | UPLOADING |
| A(n) ____ is application software that allows users to access and view Web pages. | BROWSER |
| DSL ____________. | uses a modem that sends digital data and information from a DSL line |
| A(n) ____ is a Web site that offers a variety of Internet services from a single, convenient location. | PORTAL |
| ____________ is a network standard that specifies no central computer or device on the network should control when data can be transmitted. | ETHERNET |
| A(n) ____ is a digital representation of non-text information such as a drawing, chart, or photograph. | GRAPHIC |
| ___________ is the time it takes a signal to travel from one location to another on a network. | LATENCY |
| _____________ oversees research and sets standards and guidelines for many areas of the Internet. | WORLD WIDE WEB CONSORTIUM (W3C) |
| A(n) __________ provider is a business that provides individuals and companies access to the Internet for free or for a fee. | ACCESS |
| ________ is a technology that provides high-speed Internet connection using regular copper telephone lines. | DSL |
| The amount of data, instructions, and information that can travel or a communications channel sometimes is called the _________. | BANDWIDTH |
| TRUE OR FALSE: One of the major reasons business, home, and other users purchase computers is for Internet access. | TRUE |
| TRUE OR FALSE: Most current web browsers support tabbed browsing, where the top of the browser displays a tab for each web page you open. | TRUE |
| A web ____ is a collection of related web pages and associated items, such as documents and pictures, stored on a web server | SITE |
| TRUE OR FALSE: A computer that stores and distributes newsgroup messages is called a newsreader. | FALSE |
| ___________ is an unsolicited e-mail message or newsgroup article sent to many recipients or newsgroups at once. | A FLAME |
| _________ are two of the more widely accessed Internet services. | THE WORLD WIDE WEB AND E-MAIL |
| TRUE OR FALSE: Computers cannot get a virus through e-mail. | FALSE |
| A popular web-based type of discussion group that does not require a newsreader is a(n) __________. | MESSAGE BOARD |
| TRUE OF FALSE: Some web sites that sponsors newsgroups have a built-in newsreader. | TRUE |
| TRUE OF FALSE: Many web sites use newsgroups instead of message boards because they are easier to use. | FALSE |
| Physical transmission media used in communications include all of the following except _____________. | BROADCAST RADIO CABLE |
| The design of computers, devices, and media in a network, sometimes called the ___________, is categorized as either client/server or peer-to-peer. | NETWORK ARCHITECTURE |
| A __________ is a device that provides a central point for cables in a network. | HUB |
| A(n) ______________ is a collection of computers and devices connected together via communications devices and transmission media. | NETWORK |
| On a ____, all of the computers and devices (nodes) on the network connect to a central device. | STAR |
| TRUE OR FALSE: No single person, company, institution, or government agency controls or owns the Internet. | TRUE |
| The type of peer-to-peer network, called a ____ network, describes an Internet network on which users connect directly to each other’s hard disks and exchange files over the Internet. | P2P |
| On a network a(n) ____ computer controls access to the hardware, software, and other resources on the network and provides a centralized storage area for programs, data, and information | HOST |
| On a network, some servers, called ____ servers, perform a specific task and can be placed with other servers to perform multiple tasks | DEDICATED |
| On a network, the ____ are the computers and mobile devices on the network that rely on the server for its resources. | CLIENTS |
| On a(n) ____ network, one or more computers act as a server and the other computers on the network request services from the server. | CLIENT/SERVER |
| A ____ network is a network topology in which a cable forms a closed loop, with all computers and devices arranged along it. | RING |
| A GPS receiver is a handheld, mountable, or embedded device that contains all of the following except a(n) ____. | FLOPPY DISK |
| A ____ device is any type of hardware capable of transmitting data, instructions, and information between a sending device and a receiving device | COMMUNICATIONS |
| A ____ is a communications device that connects multiple computers together and transmits data to its correct destination on a network. | ROUTER |
| A ____ license is a legal agreement that allows multiple users to access software on a server simultaneously. | NETWORK |
| A ____ line is a temporary connection that uses one or more analog telephone lines for communications. | DIAL-UP |
| TRUE OR FALSE: In a chat room, others connected to the same chat room server see what a user has typed. | TRUE |
| TRUE OR FALSE: To help minimize errors, most current browsers and web sites do not require the and www portions of a Web address. | TRUE |
| A file server is a dedicated server that ____. | STORES AND MANAGES FILES |
| A network ____ defines guidelines that specify the way computers access the medium to which they are attached, the type(s) of medium used, the speeds used on different types of networks, and the type(s) of physical cable and/or the wireless technology use | STANDARD |
| A network ____ refers to the layout of the computers and devices in a communications network. | TOPOLOGY |
| A type of communications device that connects a communications channel to a sending or receiving device is a ____. | MODEM |
| A wireless ____ point is a central communications device that allows computers and devices to transfer data wirelessly among themselves or to transfer data wirelessly to a wired network | ACCESS POINT |
| _________ is the process of transferring documents, graphics, and other objects from a computer to a server on the Internet. | UPLOADING |
| A(n) ____ extends the basic home network to include features such as lighting control, thermostat adjustment, and a security system. | INTELLIGENT HOME NETWORK |
| A(n) ______ program is used to create, send, receive, forward, store, print, and delete e-mail messages. | |
| __________ is a business transaction that occurs over an electronic network such as the Internet. | E-COMMERCE |
| A(n) ____ is a USB network adapter, ExpressCard module, PC Card, or memory card that enables a computer or devices to access a network. | NIC |
| _________ is the transmission of messages and files via a computer network. | |
| A(n) ____ modem is a digital modem that sends and receives digital data over the cable television (CATV) network. | BROADBAND |
| A(n) ____ modem sends and receives data and information to and from a digital line. | DIGITAL |
| A(n) ____ network is a simple, inexpensive network that typically connects fewer than 10 computers. | PEER-TO-PEER |
| Broadcast radio is ____ susceptible to noise than physical transmission media but it provides flexibility and portability | SLOWER AND MORE |
| Businesses are the primary users of ____ because this technology provides a means for departments to communicate with each other, suppliers, vendors, and with clients. | WEB SERVICES |
| _________________ consists of programs that help users establish a connection to another computer or network, manage the transmission of data, instructions, and information and provide an interface for users to communicate with one another. | COMMUNICATIONS SOFTWARE |
| A satellite ___________ communicates with a satellite dish to provide high-speed Internet connections via satellite. | MODEM |
| Computer ______________describes a process in which two or more computers or devices transfer data, information and instructions | COMMUNICATIONS |
| The ______ is a worldwide collection of networks that links millions of business, government agencies, educational institutions, and individuals. | INTERNET |
| ____________ cables have all of the following advantages over cables that use wire except lower costs and easier installation and modification | FIBER-OPTIC |
| For smaller business and home networks, a ____ allows multiple computers to share a single high-speed Internet connection such as through a cable modem or DSL modem. | ROUTER |
| Many home users are connecting multiple computers and devices together into a(n) home ___________, which saves money and provides many conveniences. | NETWORK |
| Groupware is a component of a broad concept called ____, which includes network hardware and software that enables group members to communicate, manage projects, schedule meetings, and make group decisions. | WORKGROUP COMPUTING |
| A(n) ____________ is an online area in which users have written discussions about a particular subject. | NEWSGROUP |
| Microwave transmission, often called ____, involves sending signals from one microwave station to another. | FIXED WIRELESS |
| Each electronic document on the web is called a web ____, which can contain text, graphics, audio, and video. | PAGE |
| According to netiquette, Internet users should assume ____. | THE USE OF ALL CAPITAL LETTERS IS THE EQUIVALENT OF SHOUTING |
| Some large areas, such as college or business campuses, are set up as a Wi-Fi ____ network, in which each mesh node routes its data to the next available node until the data reaches its destination – usually an Internet connection. | MESH |
| Some services use the term video ____ to refer separately to the capability of sending video clips. | MESSAGING |
| Sometimes a company uses a(n) ____, which allows customers or suppliers to access part of its intranet. | EXTRANET |
| Web _______ is the development and maintenance of Web pages. | PUBLISHING |
| The core of a(n) ____ cable consists of dozens or hundreds of thin strands of glass or plastic that use light to transmit signals. | FIBER-OPTIC |
| The term ____ identifies any network based on the 802.11 family of standards. | WI-FI |
| To make collaboration possible among employees, some companies use a document ____ system, which provides for storage and management of a company’s documents, such as word processing documents, presentations, and spreadsheets. | MANAGEMENT |
| Which of the following is NOT true of a Wi-Fi network? | A WI-FI''S INTERNET SERVICE CAN BE DIAL-UP ACCESS |
| With ____, users type and send short text messages on a smart phone or mobile device. | SMS |
| ____ TV is a service that provides television programs over the cellular network. | MOBILE |
| ____ allows users to send graphics, pictures, video clips, and sound files, as well as short text messages to another smart phone or mobile device. | MMS |
| ____ cable consists of one or more twisted-pair wires bundled together. | TWISTED PAIR |
| ____ cable consists of a single copper wire surrounded by at least three layers: an insulating material, a woven or braided metal, and a plastic outer coating. | COAXIAL |
| ____ is a conversation that takes place over the Internet using a telephone connected to a computer, mobile device, or telephone adapter. | VOLP |
| ____ is a real-time Internet communications service that allows wireless mobile devices to exchange messages with one or more mobile devices or online users. | WIRELESS INSTANT MESSAGING |
| ____ is a software application that helps groups of people work together on projects and share information over a network. | GROUPWARE |
| ____ is an electrical disturbance that can degrade communications. | NOISE |
| ____ media consist of materials or substances capable of carrying one or more signals. | TRANSMISSION |
| ____ radio is a form of broadcast radio that is used widely for mobile communications, specifically wireless modems and telephones. | CELLULAR |
| ____ radio is a wireless transmission medium that distributes radio signals through the air over long distances. | BROADCAST |
| ____ can serve as sending and receiving devices in a communications system. | mainframe computers and servers, desktop computers and notebooks, and smart phones |
| Types of wired home networks include all of the following EXCEPT ____. | WI-FI |
| For best performance of a communications channel, ____. | bandwidth should be high and latency low |
| Developed by IEEE, ____ is a series of network standards that specifies how two wireless devices communicate over the air with each other. | 802.11 |
| A microwave ____ is an earth-based reflective dish that contains the antenna, transceivers, and other equipment necessary for microwave communications. | STATION |
| Use ___________, such as :) or :( to express emotion in an e-mail message or newsgroup article. | EMOTICONS |
| Today, ________ is a primary communications method for both personal and business use. | |
| __________ is an Internet standard that permits the uploading and downloading with other computers on the Internet. | FTP |
| TRUE OR FALSE: According to netiquette, Internet users should assume all material is accurate and up to date. | FALSE |
| A program that displays a list of ____, or Web page names, that contain the search text. | HITS |
| Computer communications describes a process in which two or more computers or devices transfer ______. | ALL OTHER CHOICES ARE CORRECT |
| A(n) ____ is a program that finds Web sites and Web pages. | SEARCH ENGINE |
| Many pages use a program, called a(n) ____, to build and maintain lists of words found on Web sites. | SPIDER |
| To find a Web page, the user of a resource would simply enter a word or phrase, called ____, in the search engine’s text box | KEYWORD |
| A newsreader enables users to access a newsgroup to read previously entered messages, called ____. | ARTICLES |
| A computer that stores and distributes newsgroup messages is called a ____. | NEWS SERVER |
| The components of a domain name are separated by ____. | PERIODS |
| A cable ____ allows access to high-speed Internet services through the cable television network. | MODEM |
| A(n) ____ is a computer program that can damage files and the operating system. | VIRUS |
| A(n) ____ is a Web site that offers a variety of Internet services from a single, convenient location. | PORTAL |
| A(n) ____ is a group of e-mail names and addresses given a single name. | MAILING LIST |
| A(n) ____ is a digital representation of non-text information such as a drawing, chart, or photograph. | GRAPHIC |
| Internet-enabled mobile devices such as smart phones use a special type of browser, called a(n) ____, which is designed for their small screens and limited computing power. | MICROBROWSER |
| TRUE OR FALSE: A popular Web-based type of discussion group that does not require a newsreader is a message board. | TRUE |
| TRUE OR FALSE: Gmail and Windows Live Hotmail are two popular free e-mail Web applications. | TRUE |
| A(n) ____________ is a network that covers a large geographic area, such as a city, country, or the world, using a communications channel that combines many types of media. | WIDE AREA NETWORK (WAN) |
| TRUE OR FALSE: A computer that stores and distributes newsgroup messages is called a newsreader. | FALSE |
| TRUE OR FALSE: Web addresses of pages that use TLS (Transport Layer Security) typically begin with https, instead of http. | TRUE |
| TRUE OR FALSE: Undervoltages can cause equipment damage, but generally do not cause data loss. | FALSE |
| A system ________ is the prolonged malfunction of a computer. | FAILURE |
| TRUE OR FALSE: A cyberextortionist uses the Internet or network to destroy or damage computers for political reasons. | FALSE |
| A computer ________ risk is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability. | SECURITY |
| A(n) __________ has the same intent as a cracker but does not have the technical skills and knowledge. | SCRIPT KIDDIE |
| In the case of system failure or the discovery of corrupted files, users _____ the files by copying the backed up files to their original location on a computer. | RESTORE |
| A(n) ________ occurs when the incoming electrical power increases significantly above the normal 120 volts. | OVERVOLTAGE |
| TRUE OR FALSE: A corrupt individual stealing credit card numbers to make fraudulent purchases is an example of information theft. | TRUE |
| A(n) ____ program secretly collects information about a user. | SPYWARE |
| TRUE OR FALSE: Some security systems for notebook computers shut down the computer and sound an alarm if the computer moves outside a specified distance. | TRUE |
| TRUE OR FALSE: A wireless access point (WAP) should be configured to broadcast a network name, in order to increase security. | FALSE |
| A(n) ________ is someone who uses e-mail as a vehicle for extortion. | CYBEREXTORTIONIST |
| A(n) ________ occurs when the electrical supply drops. | UNDERVOLTAGE |
| Computer viruses, worms, Trojan horses, and rootkits are classified as ________, which are programs that act without a user’s knowledge and deliberately alter the computer’s operations. | MALWARE |
| Some perpetrators use a technique called ________ in which they attempt to connect to wireless networks via their notebook computers while driving a vehicle through areas they suspect have a wireless network. | WAR DRIVING |
| Content ____ is the process of restricting access to certain material on the Web. | FILTERING |
| TRUE OR FALSE: Assume that because information is on the Web, it is accurate. | FALSE |
| Users may have ____ if they have sore, tired, burning, itching or dry eyes; blurred or double vision; or difficulty focusing on a screen image. | CVS |
| Some operating systems and e-mail programs allows you to encrypt the contents of files and messages that are stored in your computer. | TRUE |
| TRUE OR FALSE: A program scans for programs that attempt to modify the boot program, the operating system, and other programs that normally are read from but not modified. | FALSE |
| TRUE OR FALSE: Although eyestrain associated with CVS (computer vision syndrome) is not thought to be disruptive or unpleasant, it has serious long-term consequences. | FALSE |
| TRUE OR FALSE: Computer addiction is an untreatable illness. | FALSE |
| Web ____ software is a program that restricts access to specified Web sites. | FILTERING |
| TRUE OR FALSE: Many businesses use spyware to limit employees’ Web access. | FALSE |
| The 1986 ____ provides the same protection that covers mail and telephone communications to electronic communications such as voice mail. | ELECTRONIC COMMUNICATIONS PRIVACY ACT (ECPA) |
| TRUE OR FALSE: To remove spyware, users need to obtain a special program that can detect and delete it. | TRUE |
| TRUE OR FALSE: Carpal tunnel syndrome (CTS) is inflammation of a tendon due to some repeated motion or stress on that tendon. | FALSE |
| To prevent repetitive strain injury, take all of the following precautions except ____. | PLACE THE MOUSE AT LEAST SIX INCHES FROM THE EDGE OF THE DESK |
| TRUE OR FALSE: A spyware program communicates information it collects to some inside source while a user is offline. | FALSE |
| A(n) ________ is a device that contains surge protection circuits and one or more batteries that can provide power during a temporary or permanent loss of power. | UPS |
| To ________ a file means to make a copy of it. | BACK UP |
| TRUE OR FALSE: A surge protector absorbs small overvoltages — generally without damage to the computer or equipment. | TRUE |
| TRUE OR FALSE: For a computer workspace, ergonomIcs experts recommend an area smaller than two by four feet. | FALSE |
| Many businesses use ________ to limit employees' web access. | CONTENT FILTERING |
| TRUE OR FALSE: The higher a surge protector’s Joule rating, the poorer the protection. | FALSE |
| TRUE OR FALSE: A brownout is a complete power failure. | FALSE |
| TRUE OR FALSE: A program scans for programs that attempt to modify the boot program, the operating system, and other programs that normally are read from but not modified. | FALSE |
| TRUE OR FALSE: Typically, the amount of protection offered by a surge protector is inversely proportional to its cost; that is, the more expensive, the more protection the protector offers. | TRUE |
| A(n) ____ is an injury or disorder of the muscles, nerves, tendons, ligaments, and joints. | RSI |
| Employee ____ involves the use of computers to observe, record, and review an employee’s use of a computer, including communications such as e-mail messages, keyboarding activity, and Web sites visited. | MONITORING |
| ___________, which provides encryption of all data that passes between a client and an Internet server, requires only that the client has a digital certificate, | TLS |
| Digital forensics is used by ____. | ALL OTHER CHOICES ARE CORRECT |
| TRUE OR FALSE: A standby UPS, sometimes called an offline UPS, runs constantly off the battery, which provides continuous protection. | FALSE |
| TRUE OR FALSE: Phishing is an unsolicited e-mail message or newsgroup posting sent to many recipients or newsgroups at once. | FALSE |
| Software ____ is the unauthorized and illegal duplication of copyrighted software. | THEFT |
| ____ is a scam in which a perpetrator sends an official looking e-mail that attempts to obtain a user’s personal and financial information. | PHISHING |
| Personal computers, display devices, and printers should comply with guidelines of the ____ program. | ENERGY STAR |
| TRUE OR FALSE: Many organizations and businesses have strict written policies governing the installation and use of software and enforce their rules by checking networked or online computers periodically to ensure that all software is licensed properly. | TRUE |
| TRUE OR FALSE: Any illegal act involving a computer generally is referred to as a computer security risk. | FALSE |
| TRUE OR FALSE: Most multiuser operating systems require that users correctly enter a user name and password before they can access the data, information, and programs stored on a computer network. | TRUE |
| TRUE OR FALSE: Hardware theft is the act of stealing computer equipment. | TRUE |
| A personal ____ is a utility program that detects and protects a personal computer and its data from unauthorized access. | FIREWALL |
| Software ____ occurs when someone steals software media, intentionally erases software programs, or illegally copies a software program. | THEFT |
| A particularly devastating type of DoS attack is the ____ DoS attack, in which multiple unsuspecting computers are used to attack multiple computer networks. | DISTRIBUTED |
| TRUE OR FALSE: It is illegal for employers to use software programs that monitor employees. | FALSE |
| TRUE OR FALSE: Some security systems for notebook computers shut down the computer and sound an alarm if the computer moves outside a specified distance. | TRUE |
| ________ is any unwanted signal, usually varying quickly, that is mixed with the normal voltage entering a computer. | UNDERVOLTAGE |
| TRUE OR FALSE: To remove spyware, users need to obtain a special program that can detect and delete it. | TRUE |
| Employee __ involves the use of computers to observe, record, and review an employee’s use of a computer, including communications such as e-mail messages, keyboarding activity, and Web sites visited. | MONITORING |
| TRUE OR FALSE: Methods that guarantee a computer or network is safe from computer viruses, worms, and Trojan horses exist. | FALSE |
| A(n) ________ is someone who uses the Internet or network to destroy or damage computers for political reasons. | CYBERTERRORIST |
| TRUE OR FALSE: A corrupt individual stealing credit card numbers to make fraudulent purchases is an example of information theft. | TRUE |
| Computer ____ occurs when a computer consumes someone’s entire social life. | ADDICTION |
| Many Web sites require a user to enter a(n) ____, which is a private combination of characters associated with a user name that allows access to certain computer resources. | PASSWORD |
| TRUE OR FALSE: The best preventive measures against hardware theft and vandalism are common sense and a constant awareness of the risk. | TRUE |
| Web sites use a ____ to keep track of items in a user’s shopping cart. | SESSION COOKIE |
| __ is a program placed on a computer without the user’s knowledge that secretly collects information about the user. | SPYWARE |
| TRUE OR FALSE: Personal firewalls constantly monitor all transmissions to and from a computer and inform users of any attempted intrusion | TRUE |
| TRUE OR FALSE: Undervoltages can cause equipment damage, but generally do not cause data loss. | FALSE |
| A(n) ____ program secretly collects information about a user. | SPYWARE |
| To prevent repetitive strain injury, take all of the following precautions except ____. | USE THE HEEL OF THE HAND AS A PIVOT POINT WHILE TYPING OR USING THE MOUSE |
| An online UPS switches to battery power when a problem occurs in the power line. | FALSE |
| TRUE OR FALSE: A fault-tolerant computer has duplicate components so that it can continue to operate when one of its main components fail. | FALSE |
| __ detection software automatically analyzes all network traffic, assesses system vulnerabilities, identifies any unauthorized access (intrusions), and notifies a network administrator of suspicious behavior patterns or system breaches. | INTRUSION |
| _______ is any unwanted signal, usually varying quickly, that is mixed with the normal voltage entering a computer. | NOISE |
| TRUE OR FALSE: Perpetrators of back doors trick their victims into interacting with phony Web sites. | FALSE |
| TRUE OR FALSE: Biometric objects often are used in combination with personal identification numbers. | FALSE |
| FALSE |