Save
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

ITC_FINALS_REVIEWER

QuestionAnswer
TRUE OF FALSE: The IT Department in business employs people to do computer-related jobs. TRUE
TRUE OR FALSE: Being an information system professional means you should be able to understand both technical and organizational factors of a business or enterprise. TRUE
What computing knowledge area is concerned with the information that computer systems can provide to aid a company in defining its goals? INFORMATION SYSTEM
TRUE OR FALSE: Developing effective ways to solve computing problems is one of the required special skill of an information technology student. FALSE
TRUE OR FALSE: Operating system certification is awarded to professionals who demonstrate expertise in planning, installing, managing, and troubleshooting network. FALSE
TRUE OR FALSE: Computer technicians need a thorough understanding of the products available, and need to know how to discuss computers without using jargon. FALSE
It is a certification which requires technical expertise in networking hardware and configuration. INTERNET CERTIFICATION
What certification is awarded to professionals who demonstrate expertise in planning, installing, managing, and troubleshooting network? NETWORKING CERTIFICATION
It is a computer profession organization that comprises of programmers, system analysts, and information processing managers. AITP
What computing program teaches students how to design and develop electrical components found in computers? COMPUTER ENGINEERING
It is a program in computing field that stresses theoretical side of programming and operating systems. COMPUTER SCIENCE
What department in a business or government agency is responsible for keeping all computer operations and network operating smoothly? IT DEPARTMENT
TRUE OR FALSE: Computer scientists are the ones who do research and develop solution to complex software problems. TRUE
TRUE OR FALSE: The job of a software engineer is to analyze requirements, design solutions, and oversee software development process. FALSE
TRUE: If your career is in the software field, you must be able to understand computers and must have specific knowledge of all your products. FALSE
It is an undergraduate degree program that refers to preparing students to meet computer technology needs of any organization. INFORMATION TECHNOLOGY
TRUE OR FALSE: The MIS department are responsible for keeping all computer operations and networks in business and government running smoothly. FALSE
___________, which is a main area in an IT department, operates the centralized computer equipment and administers the network including both data and voice communications. OPERATIONS
What type of certification recognizes general knowledge of hardware and controlling software need? HARDWARE CERTIFICATION
TRUE OR FALSE: RPA automates repetitive tasks using software. TRUE
TRUE OR FALSE: Computer technicians need a thorough understanding of the products available, and need to know how to discuss computers without using jargon. FALSE
It is the process of verifying technical knowledge in a particular area in computing. CERTIFICATION
This technology enables any device connected to the Internet to exchange data. IoT
Which knowledge area of computing offers a foundation that permits graduates to adapt to new technologies? COMPUTER SCIENCE
Being an information system professional means you should be able to ________________________. UNDERSTAND BOTH TECHNICAL AND ORGANIZATIONAL FACTORS
Which of the following is not a subset of machine learning? ARTIFICIAL INTELLIGENCE
Which of the following is not a required special skill of an IT professional? DEVELOP EFFECTIVE WAYS TO SOLVE COMPUTING PROBLEMS
TRUE OR FALSE: Information system is a computing knowledge area that permits graduates to adapt to new technologies. FALSE
What certification tests various tasks a database management staff must perform? DATABASE SYSTEM CERTIFICATION
IT certification can do all the following EXCEPT _________. GUARANTEE JOB SECURITY
TRUE OR FALSE: Blockchain is related to cryptocurrencies. TRUE
It is the discovery, collection, and analysis of evidence found on computers and networks. COMPUTER FORENSICS
TRUE OR FALSE: Computer forensics is the discovery, collection, and analysis of evidence found on computers and networks. TRUE
It measures a candidate's ability to identify and control security risks to computer resources. SECURITY CERTIFICATION
It is a subset of artificial intelligence. MACHINE LEARNING
It enhances employee's career and provides better standing as industry professional. CERTIFICATION
TRUE OR FALSE: VR immerses user in an environment that is not real. TRUE
What does the acronym MIS stand for? MANAGEMENT INFORMATION SYSTEM
TRUE OR FALSE: The computer service department is responsible for keeping all computer operations and network operating smoothly. FALSE
He is responsible in installing, maintaining, and repairing computer hardware. COMPUTER TECHNICIAN
He researches and develops solution to complex software problems. COMPUTER SCIENTIST
TRUE OR FALSE: Professional group is a group of people with common interests in computer equipment or software. FALSE
Which of the following statements is not true regarding taking certification exams? CERTIFICATION EXAMS ARE PURELY MULTIPLE-CHOICE TYPE EXAM
What career in the computer industry is involved in designing and production of computer equipment? COMPUTER EQUIPMENT FIELD
____________ specialist, which is a job title in the security area of an IT department, configures routers and firewalls and specifies Web protocols and enterprise technologies. NETWORK SECURITY
If a certification exam is not passed, the test-taker must ______. PAY THE FEE AGAIN TO RETAKE THE TEST
__________ Certified Associate is an application software certification that tests a user's expertise with Flash and Dreamweaver. ADOBE
___________ Certified Professional for Lotus Software is an application software certification that tests knowledge of Lotus programs. IBM
Software engineer, which is a job title in the system development and programming area of an IT department, specifies, designs, implements, tests, and documents high-quality software in all of the following fields EXCEPT ____________. SEMIOTICS
Database ______, which is a job title in the system development and programming area of an IT department, uses data modeling techniques and tools to analyze, tune, and specify data usage within an application area. ANALYST
Systems ______, which is a job title in the system development and programming area of an IT department, installs and maintains operating system software and provides technical support to the programming staff. PROGRAMMER
________, which is a job title in the technical services area of an IT department, maintains an organization's Web site and creates or helps users create Web pages. WEBMASTER / WEB ADMINISTRATOR
A(n) __________ agreement ensures that if a student transfers to a four-year college or university, he or she will receive credit for most of the courses taken at the community college level. ARTICULATION
Database administrator, which is a job title in the technical services area of an IT department, does all of the following except ________. DEVELOPS WEB-BASED DATABASES
Job titles in the system development and programming area of an IT department include all of the following except ________. E-COMMERCE DIRECTOR
The computer ________ field consists of manufacturers and distributors of computers and computer-related hardware. EQUIPMENT
The _____ is a scientific and educational organization dedicated to advancing knowledge and proficiency of information technology. ACM
______________ specialist, which is a job title in the technical services area of an IT department, reviews programs and documentation to ensure they meet an organization's standards. QUALITY ASSURANCE
Technical certification programs are offered by many vendors, called _____ organizations, that develop and administer the examinations to determine whether a person is qualified for certification. SPONSORING
____________ is a job title in the operations area of an IT department. DATA COMMUNICATIONS ANALYST / VOIP SPECIALIST
__________ which is a job title in the technical services area of an IT department, produces documents such as newsletters, brochures, and books by combining text and graphics. DESKTOP PUBLISHER / COMPOSITOR
___________ is a job title in the training area of an IT department. HELP DESK SPECIALIST
The computer service and repair field provides preventive __________, component installation, and repair services to customers. MAINTENANCE
__________ is a benefit offered by vendor-sponsored certifications. ALL OTHER CHOICES ARE CORRECT
_______ scientist, which is a job title in the system development and programming area of an IT department, researches, invents, and develops innovative solutions to complex software requirements or problems. COMPUTER
Computing professionals typically obtain a certification by ______. PASSING AN EXAMINATION
E-commerce _______, which is a job title in the management area of an IT department, supervises the development and execution of Internet or e-commerce systems. DIRECTOR
________________ specialist, which is a job in the training area of an IT department, answers hardware, software, and networking questions in person, over the telephone, and/or in a chat room. HELP DESK
Web software developer, which is a job title in the system development and programming area of an IT department, analyzes, designs, implements, and supports Web applications and works with all of the following except _________. VISUAL BASIC
This machine can be “programmed” to simplify the process of manufacturing textiles with complex patterns. JACQUARD LOOM
These are used to control the amount of current or voltage or used for amplification/modulation or switching of an electronic signal. TRANSISTORS
A(n) ________________________ is a computer small enough to fit in one hand. UMPC (Ultra Mobile PC)
Examples of mobile technology include all of the following EXCEPT ________. SERVERS
A(n) ________ computer is a personal computer that users can carry from place to place. MOBILE
When was transistors made? DECEMBER 23, 1947
At home, every family member, or home ________, spends time on the computer for different reasons. USER
The acronym UNIVAC stands for___________________________________. UNVIERSAL AUTOMATIC COMPUTER
________ is the process of setting up the software to work with the computer, printer, and other hardware components. INSTALLING
A(n) ________ computer is a type of personal computer designed so the system unit, input devices, and any other devices fit entirely on or under a desk or table. DESKTOP
With ________ software, a home user can play games, compose music, research genealogy, or create greeting cards. ENTERTAINMENT
In a large business, the employees in the ________ department keep the computers and the network running. IT
Resembling a letter-sized slate, the ________ PC is a special type of notebook computer that allows users to write or draw on the screen. TABLET
The term, ________, refers to any personal computer based on the original IBM personal computer design. PC-COMPATIBLE
With ________, users access account balances, pay bills, and copy monthly transactions from a bank’s computer right into their personal computers. ONLINE BANKING
A(n) _________ computer is a special-purpose computer that functions as a component in a larger product. EMBEDDED
Together, hardware, software, data, people, and procedures comprise a(n) ________ system. INFORMATION
A(n) _________________________ console is a mobile computing device designed for single-player or multiplayer video games. GAME
With a(n) ___________________, users write on the screen or issue instructions to a Tablet PC, for example, by tapping on the screen. DIGITAL PEN
You interact with a program through its ________, which controls how you enter data and instructions and how information is displayed on the screen. USER INTERFACE
Offering the convenience of one-handed operation, a(n) _________________ phone is an Internet-enabled telephone that usually also provides PDA capabilities. SMART
Standard ________ use a handheld controller(s) as an input device; a television screen as an output device; and hard disks, CDs, DVDs, and/or memory cards for storage. GAME CONSOLES
Which of the following is NOT true of mobile devices? MOBILE DEVICES USUALLY HAVE DISK DRIVES
________ refers to the use of computers to assist with manufacturing processes such as fabrication and assembly. CAM (Computer-Aided Manufacturing)
________ are large, expensive, powerful computers that can handle hundreds or thousands of connected users simultaneously and store tremendous amounts of data, instructions, and information. MAINFRAMES
At a photo sharing ________, users can create an online photo album and store their digital photographs. COMMUNITY
A _________________________ provides personal organizer functions such as a calendar, appointment book, address book, calculator, and notepad. PDA
The trend of computers and devices with technologies that overlap is known as ________. CONVERGENCE
A computer contains many electric, electronic, and mechanical components known as _________________________. HARDWARE
________ are the fastest, most powerful computers — and the most expensive. SUPERCOMPUTERS
Small business Web sites sometimes use a(n) ________ to show the world a live view of some aspect of their business. WEBCAM
Each employee or customer who uses a computer in a large business is a(n) ________ user. ENTERPRISE
A(n) ________ user is a category of user that requires the capabilities of a workstation or other powerful computer. POWER
It is a term used to describe text that is informative to the individual reading it or the computer processing it. INFORMATION
TRUE OR FALSE: The system unit allows you to enter data and instruction to the computer. FALSE
TRUE OR FALSE: Waste management involves reducing electricity consumed and environmental waste generated when using a computer. FALSE
TRUE OR FALSE: Transistors are used to control the amount of current or voltage or used for amplification/modulation or switching of an electronic signal. TRUE
TRUE OR FALSE: Main frames are large, expensive, and powerful computer that can handle hundreds or thousands of connected users simultaneously. TRUE
TRUE OR FALSE: The fifth generation of computers is the birth of artificial intelligence. TRUE
It is a is a mobile computing device designed for single player or multiplayer video games. GAME CONSOLE
These are glass tubes with electrical circuits inside. VACUUM TUBES
Most major corporations use ________________________ for business activities. MAINFRAME
A(n) _________________________ includes any company with fewer than 50 employees, as well as the self-employed who work from home. SOHO
___________ consist(s) of a series of instructions that tells the computer what to do and how to do it. SOFTWARE
A(n) ________ message is a real-time Internet communication, where you exchange messages with other connected users. INSTANT
_______________ include local law practices, accounting firms, travel agencies, and florists. SMALL OFFICES
_________________________ are capable of processing more than 1 quadrillion instructions in a single second. SUPERCOMPUTERS
A ________ computer targets a specific audience and offers high-quality audio, video, and graphics with optimal performance for sophisticated single-user and networked or Internet multiplayer games. GAMING DESKTOP
With a(n) ________, users interact with the software using text, graphics, and visual images such as icons. GUI
A(n) _________ computer is a special-purpose computer that functions as a component in a larger product. EMBEDDED
________ is a work arrangement in which employees work away from a company’s standard workplace and often communicate with the office through the computer. TELECOMMUTING
Some mobile devices are ________, meaning they can connect to the Internet wirelessly. INTERNET-ENABLED
Two categories of software are ________. SYSTEM SOFTWARE AND APPLICATION SOFTWARE
He is considered as the father of computers. CHARLES BABBAGE
A(n) ________ is a system that attempts to imitate the behavior of the human brain. NEURAL NETWORK
All of the following are categories of users EXCEPT ________. COMMUNICATIONS USERS
Many large companies use the term, ________ computing, to refer to the huge network of computers that meets their diverse computing needs. ENTERPRISE
All computer keyboards have __ that includes letters of the alphabet, numbers, punctuation, and other basic keys. numeric keyboard
Similar to a mechanical mouse; a stationary pointing device with a ball on its top or side trackball
Touch-sensitive display device that users interact with by touching the screen with a finger touch screen
[T/F] When the processor needs an instruction or data, it searches memory in this order: L1 cache, then L2 cache, then L3 cache (if it exists), then RAM — with a greater delay in processing for each level it must search. TRUE
Bluetooth printing is more convenient than infrared printing because Bluetooth devices ________ an approximate 30-foot range. do not have to be aligned but must be within
The drive designation of an optical disc drive, into which the disc would fit, usually ________. follows alphabetically after that of all the hard disks
[T/F] Information on a display device, sometimes called hard copy, exists electronically and appears for a temporary period. FALSE
[T/F] Most mobile computers and devices separate the display and other components into a different physical case. FALSE
With ________ printing, a printer communicates with a device using light waves. infrared
A printer creates images using a laser beam and powdered ink, called ________. toner
A(n) ________ module, which is a small circuit board where RAM chips usually reside, being inserted into the motherboard. memory
Memory ________ on the motherboard hold the memory modules. slots
Keyboards contain keys that allow users to position the insertion point, also known as a(n) ________ in some programs. cursor
The ________ unit is a case that contains electronic components of the computer used to process data. system
[T/F] L2 cache is slightly faster than L1 cache but has a much smaller capacity. FALSE
A printer uses software that enables it to interpret a(n) ________, which tells the printer how to lay out the contents of a printed page. page description language (PDL)
[T/F] The higher the nits of an LCD monitor or LCD screen, the dimmer the images. FALSE
A(n) ________ is a high-speed, high-quality nonimpact printer. laser
[T/F] In addition to games, joysticks, wheels, and gamepads that include force feedback are used in practical applications such as in the military and aviation. TRUE
Commonly used nonimpact printers include all of the following except ________. line printers and dot-matrix
Developed by Hewlett-Packard, a leading printer manufacturer, ________ is a standard printer language that supports the fonts and layout used in standard office documents. PCL
A(n) ________, which is contained on an integrated circuit, can act as an electronic switch that opens or closes the circuit for electrical charges. transistor
With ________ printing, a computer or other device transmits output to a printer via radio waves. bluetooth
[T/F] A system bus allows the processor to communicate with peripherals. FALSE, expansion bus
[T/F] Pixel pitch describes the difference in light intensity between the brightest white and the darkest black that can be displayed on an LCD monitor. FALSE, contrast
[T/F] For a right-handed user, the left button usually is the secondary mouse button. FALSE
A program is ________. a series of instructions that tells a computer what to do and how to do it
The ________ board is the main circuit board of the system unit. mother
[T/F] Some data projectors are large devices that attach to a ceiling or wall in an auditorium. TRUE
Until a few years ago, printing a document required connecting a computer to a printer with a ________. cable
The case of the system unit, sometimes called the ________, is made of metal or plastic and protects the internal electronic components from damage. chassis
In the machine cycle steps, ________ is the process of obtaining a program instruction or data item from memory. fetching
A(n) ________ printer forms characters and graphics on a piece of paper without actually striking the paper. non-impact printer
[T/F] The lower the time in milliseconds it takes to turn a pixel on or off on an LCD monitor, the slower the response time. FALSE
[T/F] The processor interprets and executes a program’s instructions while the program is in RAM. TRUE
[T/F] USB ports on a mobile device usually are the same size as those on personal computers. FALSE
On ________, the electronic components and most storage devices are part of the system unit and other devices, such as the keyboard, mouse, and monitor, normally occupy space outside the system unit. desktop personal computers
A computer ________ is a small piece of semi-conducting material, usually silicon, on which integrated circuits are etched. chip
[T/F] Female connectors have one or more exposed pins, like the end of an electrical cord that is plugged into the wall. FALSE
[T/F] ROM is nonvolatile TRUE
[T/F] The access time (speed) of memory has no affect on the overall performance of a computer. FALSE
Optical discs usually are ________ than one-twentieth of an inch thick. 4.75 inches in diameter or less
[T/F] Most computers use flash memory to hold their startup instructions because it allows the computer easily to update its contents. TRUE
Some ________ printers spray ink, while others use heat or pressure to create images. non-impact
A(n) ____ monitor is a display that uses gas plasma technology, which sandwiches a layer of gas between two glass plates. plasma
A(n) ____ printer forms characters and graphics on a piece of paper by striking a mechanism against an inked ribbon that physically contacts the paper. impact
A(n) ____ printer forms characters and graphics on a piece of paper without actually striking the paper. non-impact
____ are audio output devices that rest inside the ear canal. earbuds
____ are audio output devices that cover or are placed outside the ear. headphones
The series of dots that form the image on a monitor are called _______. pixels
[T/F] On notebook and some handheld computers, smart phones, and other mobile devices, the keyboard is built in the top of the system unit. TRUE
Which of the following printer is a color printer that produces photo-lab-quality pictures? photo
Displays are geared for a specific resolution. What is this resolution called? native
Which of the following is data that has been processed into a useful form? output
Which of the following reads the magnetic stripe on the back of credit cards, entertainment cards, bank cards, and other similar cards? magstripe reader
Most of these types of device include a small optical scanner for reading characters and sophisticated software to analyze what is read. What kind of device is this? OCR
[T/F] As a user moves a mouse, the pointer on the screen also moves. TRUE
[T/F] Portable media players that do not have touch screens typically have a touch-sensitive pad. TRUE
[T/F] When drawing on a graphics tablet with a stylus or digital pen, the tablet detects and converts the movements into digital signals that are sent to a computer. TRUE
[T/F] RFID requires line-of-site transmission. FALSE
[T/F] With voice input, blind users have the computer speak out loud the information that appears on the screen. FALSE
Increases the low bass sounds for a speaker system subwoofer
[T/F] The lower the dpi (dots per inch) an ink-jet printer can output, the better the print quality. FALSE
Video cards may have a standard monitor port and a(n) ____ port, allowing users to connect external devices such as a television, DVD/Blu-ray player, and video recorder to the computer. s-video
An important measure of LCD monitors is the ____ time, which is the time in milliseconds (ms) that it takes to turn a pixel on or off. response
_____ is data that has been processed into a useful form. output
[T/F] Cloud storage is an Internet service that provides storage to computer users. TRUE
An alternative for blind users is a(n) ____ printer, which outputs information in a special printer on paper. braille
Which of the following is a small symbol on the screen whose location and shape changes as a user moves a pointing device? pointer
Over time, which of the following is true of thermal printers? They are inexpensive, but the print quality is low and the images tend to fade.
Technology that sends resistance to a device in response to actions of the user force feedback (haptic)
All computer keyboards, such as that in the accompanying figure, have _____ that includes letters of the alphabet, numbers, punctuation marks, and other basic keys typing area
The primary input device for a _____ is a digital pen, which allows users to write on the device's screen. tablet PC
A(n) _______ is a small, flat, rectangular pointing device that is sensitive to pressure and motion. touchpad
Some input devices eliminate manual data entry by capturing data from a _____, which is the original form of data. source document
Manufacturers often use _____ to represent a digital camera's resolution. PPI (pixels per inch)
Which of the following is a touch-sensitive device, resembling a dry-erase board, that displays the image on a connected computer screen? interactive whiteboard
Which of the following devices read text printed with magnetized ink? MICR
Many mobile computers and mobile devices use LCD monitors. What does LCD stand for? liquid crystal display
Which of the following is the most advanced form of digital television? HDTV
In computers, what is used to cool central processing units or graphics processors? heat sink
On most ___________, including netbooks, the keyboard and pointing device often occupy the area on the top of the system unit, and the display attaches to the system unit by hinges notebook computers
Interprets and carries out the basic instructions that operate a computer processor
_____________ are circuit boards that provide connections and functions not built into the motherboard or expand on the capability of features integrated into the motherboard. adapter cards
The power ________ is the component of the system unit that converts the wall outlet AC power into the DC power a computer requires. power supply
_____________________ contains many microscopic pathways capable of carrying electrical current. integrated circuit
The _____________ or simply core, contains the circuitry necessary to execute instructions. processor core
The _______________ is the component of the processor that directs and coordinates most of the operations in the computer. control unit
The ______________, another component of the processor, performs arithmetic, comparison, and other operations. arithmetic logic unit (ALU)
_________________ refers to the process of translating the instruction into signals the computer can execute. decoding
___________________ means writing the result to memory (not to a storage medium). storing
The processor relies on a small quartz crystal circuit called the ____________ to control the timing of all computer operations. system clock
The faster the clock speed, the more ___________ the processor can execute per second. instructions
___________, also called main memory, consists of memory chips that can be read from and written to by the processor and other devices. RAM
__________ is a type of random-access memory that stores each bit of data in a separate capacitor within an integrated circuit; must be re-energized constantly or they lose their contents DRAM
______________ chips are faster and more reliable than any variation of DRAM chips. These chips do not have to be re-energized as often as DRAM chips, thus, the term static. SRAM
_________ stores data using magnetic charges instead of electrical charges; retains its contents after power is removed from the computer, which could prevent loss of data for users. MRAM
A processor contains small high-speed storage locations, called ____, that temporarily hold data and instructions. registers
[T/F] The arithmetic unit interprets each instruction issued by a program and then initiates the appropriate action to carry out the instruction. FALSE, control
[T/F] Some computers use more than one processor chip. TRUE
[T/F] Motorola is the leading manufacturer of Intel-compatible processors, which have an internal design similar to Intel processors, perform the same functions, and can be as powerful, but often are less expensive. FALSE, AMD
[T/F] Replacing a motherboard is a fairly simple process, whereas replacing a processor is much more complicated. FALSE
Some computer and chip manufacturers use the term ________ to refer to a personal computer processor chip. microprocessor
The smallest unit of data a computer can process is a(n) ________. bit
A(n) ________ drive is a flash memory storage device that plugs in a USB port on a computer or portable device. thumb
Some computers improve hard disk access time by using a disk ________, which consists of memory chips that store frequently accessed items. cache
The inflexible, circular platters on ________ disks use magnetic particles to store data, instructions, and information on a disk’s surface. hard
An advantage of portable hard disks and removable hard disks is that users can ________. all other choices are correct
A(n) ________ is a duplicate of a file, program, or disk that can be used in case the original is lost, damaged, or destroyed. backup
A group of two or more integrated hard disks is called a(n) ________. RAID
Current ________ have storage capacities of 16 GB to 256 GB and more. SSD
A(n) ________ hard drive is a self-contained unit that you insert in and remove from a slot or USB port in a device or a computer. removable
A(n) ________ device is any hardware component that conveys information to one or more people. output
________, are special keys programmed to issue commands to a computer. function keys
An audio ________ device is a component of a computer that produces music, speech, or other sounds, such as beeps. output
Printed information, called ________ copy, exists physically and is a more permanent form of output. hard
A user response is ________. an instruction issued by replying to a question that is displayed
In a graphical user interface, a(n) ________ is a small symbol on the screen whose location and shape changes as a user moves a pointing device. pointer
A(n) ________ is an output device that produces text and graphics on a physical medium such as paper or transparency film. printer
The goal of ________ is to incorporate comfort, efficiency, and safety in the design of items in the workplace. ergonomics
________ is any data and instructions entered into the memory of a computer. input
A hard copy also is called a(n) ________. printout
A small metal or plastic device that looks like a tiny ink pen but uses pressure instead of ink. stylus
A pressure-sensitive pointing device shaped like a pencil eraser that is positioned between keys on a mobile computer keyboard. pointing stick
[T/F] Some motherboards include all necessary capabilities and do not require adapter cards. TRUE
A type of processor called ________ on a chip integrates the functions of a processor, memory, and a video card on a single chip. system
AMD is the leading manufacturer of ____-compatible processors, which have an internal design similar to Intel processors, perform the same functions, can be as powerful, but often are less expensive. intel
The ________ unit is the component of the processor that directs and coordinates most of the operations in the computer. control
[T/F] On a personal computer, the various functions performed by the processor extend over many separate chips and often multiple circuit boards. FALSE
A(n) ________ processor is a chip with two or more separate processors. multi-core
________ is the process of dividing a disk into tracks and sectors, so the operating system can store and locate data and information on the disk. formatting
Common types of flash memory cards include ________. all other choices are correct
________ is the number of bytes (characters) a storage medium can hold. capacity
________ holds data, instructions, and information for future use. storage
A(n) ________ is a display device that is packaged as a separate peripheral. monitor
A(n) ________ mouse uses devices that emit and sense light to detect movement. optical
A(n) ________ keyboard has a design that reduces the chance of wrist and hand injuries. ergonomic
A(n) ________ device is any hardware component that allows users to enter data or instructions (programs, commands, and user responses) into a computer. input
A(n) ________, is a pointing device that fits comfortably under the palm of the hand. mouse
Many personal computer users add surround sound ___________________ to their computers to generate a higher-quality sound. speakers
A(n) _______ output device that conveys text, graphics, and video information. display
A(n) ___________ disc is a type of storage media that consists of a flat, round portable disc made of metal, plastic, and lacquer that is written and read by a laser. optical
One gigahertz equals one ______ ticks of the system clock per second. billion
Each tick equates to a ____________. clock cycle
A(n) ________ device is an input device that allows a user to control a pointer on the screen. pointing
The pace of the system clock, called the ______ speed, is measured by the number of ticks per second. clock
If the computer has an internal hard disk (drive C) and a DVD drive (drive D) and no other disk drives, what will the USB flash drive probably be? E
A(n) ________ is an input device that contains keys users press to enter data into a computer. keyboard
A(n) ________ is a chip that controls the manipulation and display of graphics on a display device. GPU
1010_2 - 0011_2 0111
EF86_16 + 6C39_16 15BBF
1170_8 + 5217_8 6407
110 + 1101 + 1110 0100001
110_2 + 101_2 01011
1011_2 - 1001_2 10
11001011_2 - 10000011_2 01001000
The maximum number of bits sufficient to represent a hexadecimal number in binary. 15
Convert the decimal number 6.75 to binary. 110.11_2
The octal equivalent of the binary number 10010100_2 is ___. 224
If the decimal number is a fraction then its binary equivalent is obtained by ______ the number continuously by 2. multiplying
The decimal equivalent of hexadecimal value AA is ___. 170_10
Convert 110_2 to _10. 6
The binary number 111 in octal format is 7
The binary equivalent of hexadecimal 44_16 is 01000100_2
Convert binary 1111101 to octal. 175_8
[T/F] Binary number system is the number system used by computers. TRUE
What is the base of the octal number system? 8
Which of the following is not a type of number system? fractional
The highest single digit value in hexadecimal number system is 15. FALSE
How many symbols are used to represent values in hexadecimal number? 16
The octal number 645_8 is ________ in decimal. 421_10
Convert the binary 110001 100101 to octal. 6145_8
The decimal equivalent of hexadecimal 2D is _____. 45_10
1111110_2 + 10110101_2 110110011
10010011_2 + 10111001_2 101001100
5826_16 + A140_16 F966
The LSB and MSB of 1243247 are ___ and ____. 4, 1
In a number system, each position of a digit represents a specific power of the base. TRUE
Convert 11001001_2 to decimal. 201
Convert the binary number 1011010 to hexadecimal. 5A_16
Convert decimal 58 to binary.
DA96 - 1D68 BD2E
4102_8 - 2643_8 1237*
TRUE OR FALSE: A shortcut is an icon on the desktop or in a folder that provides a user with immediate access to a program or file. TRUE
During a cold boot on a personal computer, the POST (power-on self-test) results are compared with data in a ________ chip. CMOS
A(n) ________ is a private combination of characters associated with a username that allows access to certain computer resources. PASSWORD
TRUE OR FALSE: Client operating systems can operate with or without a network. TRUE
A program called a print ________ intercepts documents to be printed from the operating system and places them in the queue. SPOOLER
________ means the operating system automatically configures new devices as users install them. PLUG AND PLAY
________ software, such as operating systems and utility programs, consists of the programs that control or maintain the operations of a computer and its devices. SYSTEM
TRUE OR FALSE: The advantage of device-dependent operating systems is that users can retain existing application software and data even if they change computer models or vendors. FALSE
In a ________ , a user types commands or presses special keys on the keyboard (such as function keys or key combinations) to enter data and instructions. COMMAND-LINE INTERFACE
TRUE OR FALSE: Some operating systems include a Web browser and an e-mail program, enabling users to begin accessing the Web and communicating with others as soon as they set up the Internet connection. TRUE
A(n) ________ is the intersection of a column and row in a worksheet. CELL
A(n) ________ is application software that includes an appointment calendar, address book, notepad, and other features to help users organize personal information. PIM
Which of the following is an example of Web page authoring software? ADOBE DREAMWEAVER
________ software consists of programs designed to make users more productive and/or assist them with personal tasks. APPLICATION
________ software allows users to create, access, and manage a database. DATABASE
________ software is software that allows users to organize data in rows and columns and perform calculations on the data. SPREADSHEET
________ software enables users to enter typed text, handwritten comments, drawings, or sketches anywhere on a page and then save the page as part of a notebook. NOTE TAKING
A(n) ________ is a rectangular area of the screen that displays data and information. WINDOW
________ software allows users to create and manipulate documents containing mostly text and sometimes graphics. WORD PROCESSING
A(n) ________ contains a list of commands from which a user makes selections. MENU
A(n) ________ program is a utility that protects a computer against viruses by identifying and removing any computer viruses found in memory, on storage media, or on incoming files. ANTIVIRUS
A ________ does not replicate itself to other computers. TROJAN HORSE
A(n) ________ utility allows users to copy selected files or an entire hard disk to another storage medium. BACKUP
In Windows Operating System, the Windows ________ feature protects your computer from malwares as well as spyware. DEFENDER
A(n) ________ is a unique combination of characters, such as letters of the alphabet or numbers, that identifies one specific user. USERNAME
________ software is privately owned software and limited to a specific vendor or computer model. PROPRIETARY
The ________ is the core of an operating system that maintains the computer’s clock, starts applications, and assigns the computer’s resources, such as devices, programs, data, and information. KERNEL
TRUE OR FALSE: Users today typically run multiple programs concurrently. TRUE
A(n) ________ is a window that provides information, presents available options, or requests a response. DIALOG BOX
To help organize a presentation, you can view ________ versions of all the slides similarly to how 35mm slides look on a photographer’s light table. THUMBNAIL
When computer users ________ a document, the computer transfers the document from memory to a storage medium. SAVE
________ software allows users to create visual aids for presentations to communicate ideas, messages, and other information to a group. PRESENTATION
________ software provides a means for sharing, distributing, and searching through documents by converting them into a format that can be viewed by any user. DOCUMENT MANAGEMENT
Which of the following is an example of desktop publishing software for the professional? ADOBE INDESIGN
________ software allows users to modify a segment of a video, called a clip. VIDEO EDITING
TRUE OR FALSE: A disadvantage of preemptive multitasking is the operating system loses control if one program stops operating properly. FALSE
Compressed files, sometimes called _________. ZIPPED FILES, USUALLY HAVE A ZIPPED EXTENSION
Linux is ________ software, which means its code is provided for use, modification, and redistribution. OPEN SOURCE
A personal ________ is a utility that detects and protects a computer from unauthorized intrusions. FIREWALL
Which of the following is an example of photo editing software for the professional? ADOBE PHOTOSHOP
When using spreadsheet software, the rows and columns collectively are called a(n) ________. WORKSHEET
A ________ is an instruction that causes a program to perform a specific action. COMMAND
The top of a window has a(n) ________, which is a horizontal space that contains the window’s name. TITLE BAR
TRUE OR FALSE: Regardless of the size of the computer, most operating systems provide similar functions. TRUE
The purpose of memory ________________ is to optimize the use of random access memory (RAM). MANAGEMENT
TRUE OR FALSE: Some parts of the operating system are resident; that is, these instructions remain on the hard disk until they are needed. FALSE
A file is ________. A NAMED COLLECTION OF STORED DATA
A(n) ________________ operating system supports two or more processors running programs at the same time. MULTIPROCESSING
________ software assists people in becoming more effective and efficient while performing their daily business activities. BUSINESS
With virtual memory, a ________________ is the amount of data and program instructions that can swap at a given time. PAGE
With ________________ memory, the operating system allocates a portion of a storage medium, usually the hard disk, to function as additional RAM. VIRTUAL
A font ________, such as bold, italic, and underline adds emphasis to a font. STYLE
The kernel is memory ________, which means it remains in memory while the computer is running. RESIDENT
TRUE OR FALSE: When you purchase a computer, it usually includes a boot disk. TRUE
TRUE OR FALSE: Using tax preparation software, taxpayers can file their state and federal tax returns online, in a process called e-filing. FALSE
In the Windows operating system, the ________ is an on-screen work area that has a graphical user interface. DESKTOP
Networks, servers, mainframes, and supercomputers allow hundreds to thousands of users to connect at the same time, and thus are MULTIUSER
TRUE OR FALSE: Most personal finance software includes financial planning features, such as analyzing home and personal loans, preparing income taxes, and managing retirement savings. TRUE
TRUE OR FALSE: All sizes of computers typically use the same operating system. FALSE
With ________________ multitasking, the operating system interrupts a program that is executing and passes control to another program waiting to be executed. PREEMPTIVE
TRUE OR FALSE: Operating systems rarely provide a means to establish Internet connections. FALSE
A(n) ________ viewer is a utility that allows users to display, copy, and print the contents of a graphics file. IMAGE
The BIOS executes a series of tests, collectively called the ________, which check the various system components including the buses, system clock, adapter cards, RAM chips, mouse, keyboard, and drives. POST
Word processing software includes a(n) ________, which reviews the spelling of individual words, sections of a document, or the entire document. SPELLING CHECKER
A screen ________ causes a monitor’s screen to display a moving image or blank screen if no keyboard or mouse activity occurs for a specified period of time. SAVER
_____ software helps companies record and report their financial transactions. ACCOUNTING
TRUE OR FALSE: Because virtual memory is faster than RAM, users may notice the computer speeding up while it uses virtual memory, FALSE
TRUE OR FALSE: Like other operating systems, Linux is a proprietary software. FALSE
TRUE OR FALSE: A device-dependent programs runs on computers provided by a variety of manufacturers. FALSE
The _____ is firmware that contains a computer's startup instructions. BIOS
A(n) _____ system is set of programs containing instructions that coordinate all the activities among computer hardware resources. OPERATING
TRUE OR FALSE: Even if uses are working on multiple programs simultaneously, it is impossible to run out of RAM. FALSE
A pop-up _____ is a filtering program that stops pop-up ads from displaying on Web pages. BLOCKER
A file _____ utility is a utility that shrinks the size of a file(s). COMPRESSION
A(n) _____ is a small image displayed on the screen that represents a program, a document or some other object ICON
If a hard disk is damaged, a computer can be booted from a(n) _____ disk which is usually a CD that contains a few system files that will start the computer. RECOVERY
In the event a backup files is used, a(n) _____ program reverses the process and returns backed up files to their original form. RESTORE
TRUE OR FALSE: Microsoft has continually updated its Windows operating system, incorporating new features and functions with each subsequent version. TRUE
A software _____ is a collection of individual programs sold as a single package. SUITE
TRUE OR FALSE: Stand-alone utilities typically offer improvements over those features built into an operating system or provide features not included in an operating system. TRUE
TRUE OR FALSE: Few operating systems include any utility programs. FALSE
The set of instructions entered into a computer that uses the command-line interface is called the ______ language. COMMAND
With an operating system _____ can include fixes to bugs, enhancements to security, modifications to devices, drivers, and the like. AUTOMATIC UPDATES
A(n) _____ is a private combinations of characters associated with a username that allows access to certain computer resources. PASSWORD
A(n) _____ is a utility that removes a program, as well as any associated entries in the system files. UNINSTALLER
TRUE OR FALSE: If the username and password entered match the username and password kept on file, a network operating system denies access to the user FALSE
_____ software provides the capabilities of paint software and also includes the ability to enhance and modify existing image and pictures. IMAGE EDITING
____ is mass produced, copyrighted retail software that needs the needs of a wide variety of users, not just a single user or company PACKAGED SOFTWARE
A feature, called _____, allows users of word processing software to type words continually without pressing the enter key at the end of each line WORDWRAP
A(n) ____ is an online area where users have written discussions. NEWSGROUP / MESSAGE BOARD
_____ is the electronic equivalent of a user manual. ONLINE HELP
Simplified accounting program that helps home users and small office/home office users to balance their checkbooks, pay bills, etc PERSONAL FINANCE SOFTWARE
_____________________ is an application that can guide individuals, families, or small businesses through the process of filing federal taxes. TAX PREPARATION SOFTWARE
Which kind of software allows users to draw pictures, shapes, and other graphical images with various on-screen tools such as a pen, brush, and eyedropper? PAINT
A(n) ________ is a specific named location on a storage medium that contains related documents. FOLDER
A spyware ________ is a program that detects and deletes spyware and other similar programs. REMOVER
The kernel is memory ________, which means it remains in memory while the computer is running. RESIDENT
A(n) ________ viewer is a utility that allows users to display, copy, and print the contents of a graphics file. IMAGE
Which of the following is an example of paint/image editing software for the professional? ADOBE ILLUSTRATOR
A(n) ________ is a collection of data organized in a manner that allows access, retrieval, and use of that data. DATABASE
A cross-platform program is one that runs __. THE SAME ON MULTIPLE OPERATING SYSTEMS
The operating system that a computer uses sometimes is called the ____. PLATFORM
In Windows Vista, the ____ consists of several files that contain the system configuration information. REGISTRY
In Windows Vista, the ____ contains a list of programs that open automatically when users boot the computer. START UP FOLDER
Windows Vista ____ offers the Aero interface (shown in the accompanying figure) to basic users. HOME PREMIUM
A single user/single ____ operating system allows only one user to run one program at a time. TASKING
A single user/____ operating system allows a single user to work on two or more programs that reside in memory at the same time MULTITASKING
Smart phones and other small computing devices often use a ____ operating system. SINGLE USER/SINGLETASKING
_________ operating system enables two or more users to run programs simultaneously. MULTIUSER
_________ operating system supports two or more processors running programs at the same time. MULTIPROCESSING
The area of the hard disk used for virtual memory is called a(n) ____ file because it exchanges data, information, and instructions between memory and storage. SWAP
With virtual memory, which is illustrated in the accompanying figure, the technique of swapping items between memory and storage, called ____, is a time-consuming process for the computer. PAGING
____________ is a computer that continues to operate when one of its components fails, ensuring that no data is lost. FAULT-TOLERANT COMPUTER
_____________ is a segment of memory or storage, such as the disk in the accompanying figure, in which items are placed while waiting to be transferred from an input device or to an output device. BUFFER
A process called ____, which is illustrated in the accompanying figure, sends documents to a buffer instead of sending them immediately to the printer. SPOOLING
In the accompanying figure, multiple documents line up in a(n) ____ in the buffer. QUEUE
____ operating system is an operating system that organizes and coordinates how multiple users access and share resources on a network. SERVER
The latest version of the Macintosh operating system, Mac ____, is a multitasking operating system available only for computers manufactured by Apple. OS X
Windows ____ is Microsoft’s fastest, most reliable and efficient operating system to date, offering quicker application start up, built-in diagnostics, automatic recovery, improved security, and enhanced searching and organizing capabilities. VISTA
____ is a multitasking operating system developed in the early 1970s by scientists at Bell Laboratories. UNIX
Novell’s ____ is a server operating system designed for client/server networks. NETWARE
________ is someone who tries to access a computer or network illegally HACKER
Windows ____ is an operating system that includes functionality, applications, and a user interface designed for specific types of devices. MOBILE
The term, computer ____, describes a potentially damaging computer program that affects, or infects, a computer negatively by altering the way the computer works without the user’s knowledge or permission. VIRUS
A ____ is malware that copies itself repeatedly, for example in memory or over a network, using up system resources and possibly shutting the system down WORM
__________ is software that acts without a user’s knowledge and deliberately alters a computer’s operations. MALWARE
__________ is malware that hides within or looks like a legitimate program, such as a screen saver. TROJAN HORSE
An _______ program is a filtering program that attempts to remove spam before it reaches a user’s inbox. ANTI-SPAM
A program that removes or blocks certain items from being displayed. FILTER
A file ____ utility is a utility that transforms the contents of a file or data from one format to another. CONVERSION
TRUE OR FALSE: The boot process is very different for large and small computers. FALSE
TRUE OR FALSE: A warm boot is the process of using the operating system to restart a computer. TRUE
TRUE OR FALSE: Application software is said to be downward compatible, meaning it will run on a new version of an operating system. FALSE
TRUE OR FALSE: Network administrators can set up a network to decrypt data as it travels over a network to prevent unauthorized users from reading the data. FALSE
__________ is a collection of electronic drawings- photos- and other images that can be inserted into documents. CLIP ART
TRUE OR FALSE: Some parts of the operating system are resident; that is, these instructions remain on the hard disk until they are needed. FALSE
TRUE OR FALSE: When a computer is turned on, the charge of electricity causes the processor chip to reset itself and find the ROM chip(s) that contains the BIOS. TRUE
TRUE OR FALSE: The nexus is the core of an operating system that manages memory and devices. FALSE
TRUE OR FALSE: Command-line interfaces like the one in the accompanying figure give a user less control to manage detailed settings. FALSE
TRUE OR FALSE: A disadvantage of Linux is that it is available only in a command-line version like the one in the accompanying figure FALSE
TRUE OR FALSE: A disadvantage of preemptive multitasking is the operating system loses control if one program stops operating properly. FALSE
TRUE OR FALSE: Some personal computer maintenance utilities continuously monitor a computer while it is used and repair problems before they occur. TRUE
TRUE OR FALSE: A compressed file takes up more storage space than the original file. FALSE
TRUE OR FALSE: When you receive a compressed file, you must zip it. FALSE
TRUE OR FALSE: Some operating systems such as Windows Vista include uncompress capabilities. TRUE
TRUE OR FALSE: One sign of a virus infection is that available memory is less than what should be available. TRUE
TRUE OR FALSE: The programmer of a virus, known as a virus author, intentionally writes a virus program. TRUE
TRUE OR FALSE: Ghosting is a severe problem with today’s displays. FALSE
TRUE OR FALSE: When users press a key or move the mouse, a screen saver disappears and the screen returns to the previous state. TRUE
TRUE OR FALSE: Instead of backing up to a local disk storage device, some users opt to back up their files using online storage. TRUE
TRUE OR FALSE: By compressing files, a backup utility program requires more storage space for the backup files than for the original files. FALSE
TRUE OR FALSE: The iPhone and iPod devices are multi-touch, meaning that they recognize multiple points of contact. TRUE
TRUE OR FALSE: Some devices with the Windows Mobile operating system support handwriting and voice input. TRUE
TRUE OR FALSE: A server operating system typically resides on a client. FALSE
TRUE OR FALSE: Most editions of Windows Server 2008 include Hyper-V, which is a virtualization technology. TRUE
TRUE OR FALSE: In addition to being a stand-alone operating system, UNIX also is a network operating system. TRUE
TRUE OR FALSE: Power users seldom work with UNIX because of its rigidity and vulnerability. FALSE
TRUE OR FALSE: When programmers move application software from one UNIX version to another, they sometimes have to rewrite some of the programs. TRUE
TRUE OR FALSE: Because virtual memory is faster than RAM, users may notice the computer speeding up while it uses virtual memory. FALSE
TRUE OR FALSE: Windows Vista Ultimate includes all features of Windows Vista Home Premium and provides additional features designed to make mobile users’ computers more secure and easier to network. TRUE
TRUE OR FALSE: In Windows Vista, the Windows SideShow feature connects to personalized mini-applications, called gadgets, such as weather, photos, or headline news. FALSE
TRUE OR FALSE: In Windows Vista, the Windows Sidebar allows viewing of messages on a powered-off notebook computer equipped with a secondary display. FALSE
A(n) ________ drive is the drive from which a personal computer starts. BOOT
Reorganizing a disk so that the files are stored in contiguous sectors, thus speeding up disk access and the performance of the entire computer. DEFRAGMENTING
Utility program that writes text, graphics, audio, and video files to a recordable or rewriteable CD, DVD, or Blu-ray Disc. DISK BURNING SOFTWARE
Utility that reorganizes the files and unused space on a computer's hard disk so that the operating system accesses data more quickly and programs run faster. DISK DEFRAGMENTER
Small program that tells an operating system how to communicate with a specific device. DRIVER
The operating system that resides on a ROM chip inside most PDAs and small devices. EMBEDDED OPERATING SYSTEM
Utility that performs functions related to file management. FILE MANAGER
Operating system function that saves any open documents and programs to a hard disk before removing power from the computer. HIBERNATE
Utility program that allows you to view images and animation, listen to audio, and watch video files. MEDIA PLAYER
Operating system program that assesses and reports information about various computer resources and devices. PERFORMANCE MONITOR
Scam in which a perpetrator attempts to obtain your personal and/or financial information. PHISHING
Utility program that attempts to locate a file on your computer based on criteria you specify. SEARCH
Operating system that organizes and coordinates how multiple users access and share resources on a network. SERVER OPERATING SYSTEM
Free downloadable software updates provided by the software manufacturer to users who have registered and/or activated their software. SERVICE PACK
Operating system function that saves any open documents and programs to RAM, turns off all unneeded functions, and then places the computer in a low-power state. SLEEP MODE
Unsolicited e-mail message or newsgroups posting sent to many recipients or newsgroups at once. SPAM
The __________ is a small symbol displayed on the screen that moves as a user moves the mouse. POINTER
The ________ of the document window usually displays a document’s file name. TITLE BAR
TRUE OR FALSE: A company can use thousands of computer system in a single computer-based information system. TRUE
A(n) ____________ is a window on the screen that provides areas for entering or changing data in a database. FORM
A ____________ is a field or set of fields in your table that acts as a unique identifier for every row. PRIMARY KEY
____________ is an element of an information system which refers to the physical component of a computer system. HARDWARE
What kind of relationship is observed in the situation: A customer to products that can be ordered. ONE TO MANY
CBIS is an acronym which stands for ____________. COMPUTER BASED INFORMATION SYSTEM
This element of a CBIS tells hardware how to function. SOFTWARE
It is the most overlooked element of a CBIS. PEOPLE
A(n) ____________ is an organized collection of information which can easily be retrieved. DATABASE
It is a collection of unprocessed information. DATA
These are all types of information systems EXCEPT: FILE PROCESSING SYSTEM
____________is a set of data related for a specific purpose or topic. DATABASE
It is an element of CBIS that is responsible in disseminating information to other people faster and safer. COMMUNICATION
What kind of relationship is observed in the situation: Suppliers to products. MANY TO MANY
____________ are designed in a way that it can be printed just like a file done in word processing software. REPORTS
Every row in a database table is also called ____________. RECORD
These are used to retrieve data from a database. QUERY
When compared with a file processing system, a database offers all of the following except _________. LESS REQUIRED MEMORY, STORAGE, AND PROCESSING POWER
You can create a _______ to perform a specific series of actions in a database. MACRO
The tables or queries from which a query gets its data are referred to as its _______ RECORD SOURCE
It is considered as the bloodline of all CBIS, these needs to be processed first before they become meaningful. DATA
TRUE OR FALSE: Some companies develop their own software that their CBIS uses. TRUE
TRUE OR FALSE: Databases can be used to sort, summarize, and filter information. TRUE
TRUE OR FALSE: Queries can be used to retrieve data from one or more tables. TRUE
It comprises rules, descriptions and instructions for how things are done. PROCEDURES
A(n) ____________ is a collection of multiple hardware, software, and communication networks that people needs to create, collect, and distribute useful data. INFORMATION SYSTEMS
____________ allow relational databases to split and store data in different tables, while linking disparate data items. RELATIONSHIPS
Every item data stored in a table is called ____________. DATA VALUE
A ____________ is a kind of user interface so that users can easily interact with the database. FORM
This is added to every table in a database to make every record unique. PRIMARY KEYS
A ____________ is another database object which can be use to summarize information from a table or query. REPORT
TRUE OR FALSE: Companies of the same business type uses the same software. FALSE
Difficulty to access data stored in separate files in different departments. DATA ISOLATION
TRUE OR FALSE: You can choose which fields you want in your report. TRUE
It is the repository of related data in a database. TABLE
What kind of relationship is observed in the situation: Person to email address. ONE TO MANY
TRUE OR FALSE: A visually attractive form have no effect on working with the database. FALSE
Each column in a database table is also called _____. FIELD
Where do we usually find procedures covering how hardware and software are used? USER MANUALS
A ______ can be used to create an action or set of actions that can be used to automate a task. MACRO
What kind of relationship is observed in the situation. People to address. MANY TO MANY
The information part of an information system, and whether that is statistical data, sets of instructions, lists of names or even graphics and animation. DATA
________ is a database object that can be used to extract or show information in Datasheet view. QUERY
A _______ is a situation that exists between two relational database tables. RELATIONSHIPS
TRUE OR FALSE: Forms cannot help in preventing incorrect data to be entered to the CBIS. FALSE
_______ can be embedded with forms and reports. MACRO
All of the following are component of a computer-based Information System EXCEPT: FILE SYSTEM
Editing an entry from a duplicated file mean that you will have to edit all other files where the edited data appeared. INTEGRITY PROBLEMS
TRUE OR FALSE: Primary keys are also useful for designing relational databases. TRUE
____________ gathers, organizes and manipulates data and carries out instructions. SOFTWARE
TRUE OR FALSE: Relational databases requires that tables to be related to other tables must have primary keys. TRUE
A communication ____________ is a transmission media on which data, instructions, or information travel. CHANNEL
The risk to a bus network is that ____________. THE BUS ITSELF MIGHT BECOME INOPERABLE
The Internet has its roots in ____________, a network that became functional in 1969, linking scientific and academic researchers across the United States. ARPANET
A(n) ____________ is a wireless network that provides Internet connections to mobile computers and other devices. HOT SPOT
The ____________ is a worldwide collection of networks that links millions of businesses, government agencies, educational institutions, and individuals. INTERNET
A(n) ____________ is a collection of computers and devices connected together via communications devices and transmission media. NETWORK
____________ allows users to share documents with others in real time. AN ONLINE MEETING
A satellite Internet service ____________. IS A HIGH-SPEED INTERNET CONNECTION
TRUE OR FALSE: Some operating systems include an instant messenger. TRUE
A(n) ____________ is a network that covers a large geographic area, such as a city, country, or the world, using a communications channel that combines many types of media. WAN
________ is the code of acceptable behaviors users should follow while on the Internet; that is, it is the conduct expected of individuals while online. NETIQUETTE
TRUE OR FALSE: Some operating systems include an instant messenger. TRUE
________ is the process of transferring documents, graphics, and other objects from a computer to a server on the Internet. UPLOADING
A(n) ____ is application software that allows users to access and view Web pages. BROWSER
DSL ____________. uses a modem that sends digital data and information from a DSL line
A(n) ____ is a Web site that offers a variety of Internet services from a single, convenient location. PORTAL
____________ is a network standard that specifies no central computer or device on the network should control when data can be transmitted. ETHERNET
A(n) ____ is a digital representation of non-text information such as a drawing, chart, or photograph. GRAPHIC
___________ is the time it takes a signal to travel from one location to another on a network. LATENCY
_____________ oversees research and sets standards and guidelines for many areas of the Internet. WORLD WIDE WEB CONSORTIUM (W3C)
A(n) __________ provider is a business that provides individuals and companies access to the Internet for free or for a fee. ACCESS
________ is a technology that provides high-speed Internet connection using regular copper telephone lines. DSL
The amount of data, instructions, and information that can travel or a communications channel sometimes is called the _________. BANDWIDTH
TRUE OR FALSE: One of the major reasons business, home, and other users purchase computers is for Internet access. TRUE
TRUE OR FALSE: Most current web browsers support tabbed browsing, where the top of the browser displays a tab for each web page you open. TRUE
A web ____ is a collection of related web pages and associated items, such as documents and pictures, stored on a web server SITE
TRUE OR FALSE: A computer that stores and distributes newsgroup messages is called a newsreader. FALSE
___________ is an unsolicited e-mail message or newsgroup article sent to many recipients or newsgroups at once. A FLAME
_________ are two of the more widely accessed Internet services. THE WORLD WIDE WEB AND E-MAIL
TRUE OR FALSE: Computers cannot get a virus through e-mail. FALSE
A popular web-based type of discussion group that does not require a newsreader is a(n) __________. MESSAGE BOARD
TRUE OF FALSE: Some web sites that sponsors newsgroups have a built-in newsreader. TRUE
TRUE OF FALSE: Many web sites use newsgroups instead of message boards because they are easier to use. FALSE
Physical transmission media used in communications include all of the following except _____________. BROADCAST RADIO CABLE
The design of computers, devices, and media in a network, sometimes called the ___________, is categorized as either client/server or peer-to-peer. NETWORK ARCHITECTURE
A __________ is a device that provides a central point for cables in a network. HUB
A(n) ______________ is a collection of computers and devices connected together via communications devices and transmission media. NETWORK
On a ____, all of the computers and devices (nodes) on the network connect to a central device. STAR
TRUE OR FALSE: No single person, company, institution, or government agency controls or owns the Internet. TRUE
The type of peer-to-peer network, called a ____ network, describes an Internet network on which users connect directly to each other’s hard disks and exchange files over the Internet. P2P
On a network a(n) ____ computer controls access to the hardware, software, and other resources on the network and provides a centralized storage area for programs, data, and information HOST
On a network, some servers, called ____ servers, perform a specific task and can be placed with other servers to perform multiple tasks DEDICATED
On a network, the ____ are the computers and mobile devices on the network that rely on the server for its resources. CLIENTS
On a(n) ____ network, one or more computers act as a server and the other computers on the network request services from the server. CLIENT/SERVER
A ____ network is a network topology in which a cable forms a closed loop, with all computers and devices arranged along it. RING
A GPS receiver is a handheld, mountable, or embedded device that contains all of the following except a(n) ____. FLOPPY DISK
A ____ device is any type of hardware capable of transmitting data, instructions, and information between a sending device and a receiving device COMMUNICATIONS
A ____ is a communications device that connects multiple computers together and transmits data to its correct destination on a network. ROUTER
A ____ license is a legal agreement that allows multiple users to access software on a server simultaneously. NETWORK
A ____ line is a temporary connection that uses one or more analog telephone lines for communications. DIAL-UP
TRUE OR FALSE: In a chat room, others connected to the same chat room server see what a user has typed. TRUE
TRUE OR FALSE: To help minimize errors, most current browsers and web sites do not require the and www portions of a Web address. TRUE
A file server is a dedicated server that ____. STORES AND MANAGES FILES
A network ____ defines guidelines that specify the way computers access the medium to which they are attached, the type(s) of medium used, the speeds used on different types of networks, and the type(s) of physical cable and/or the wireless technology use STANDARD
A network ____ refers to the layout of the computers and devices in a communications network. TOPOLOGY
A type of communications device that connects a communications channel to a sending or receiving device is a ____. MODEM
A wireless ____ point is a central communications device that allows computers and devices to transfer data wirelessly among themselves or to transfer data wirelessly to a wired network ACCESS POINT
_________ is the process of transferring documents, graphics, and other objects from a computer to a server on the Internet. UPLOADING
A(n) ____ extends the basic home network to include features such as lighting control, thermostat adjustment, and a security system. INTELLIGENT HOME NETWORK
A(n) ______ program is used to create, send, receive, forward, store, print, and delete e-mail messages. E-MAIL
__________ is a business transaction that occurs over an electronic network such as the Internet. E-COMMERCE
A(n) ____ is a USB network adapter, ExpressCard module, PC Card, or memory card that enables a computer or devices to access a network. NIC
_________ is the transmission of messages and files via a computer network. E-MAIL
A(n) ____ modem is a digital modem that sends and receives digital data over the cable television (CATV) network. BROADBAND
A(n) ____ modem sends and receives data and information to and from a digital line. DIGITAL
A(n) ____ network is a simple, inexpensive network that typically connects fewer than 10 computers. PEER-TO-PEER
Broadcast radio is ____ susceptible to noise than physical transmission media but it provides flexibility and portability SLOWER AND MORE
Businesses are the primary users of ____ because this technology provides a means for departments to communicate with each other, suppliers, vendors, and with clients. WEB SERVICES
_________________ consists of programs that help users establish a connection to another computer or network, manage the transmission of data, instructions, and information and provide an interface for users to communicate with one another. COMMUNICATIONS SOFTWARE
A satellite ___________ communicates with a satellite dish to provide high-speed Internet connections via satellite. MODEM
Computer ______________describes a process in which two or more computers or devices transfer data, information and instructions COMMUNICATIONS
The ______ is a worldwide collection of networks that links millions of business, government agencies, educational institutions, and individuals. INTERNET
____________ cables have all of the following advantages over cables that use wire except lower costs and easier installation and modification FIBER-OPTIC
For smaller business and home networks, a ____ allows multiple computers to share a single high-speed Internet connection such as through a cable modem or DSL modem. ROUTER
Many home users are connecting multiple computers and devices together into a(n) home ___________, which saves money and provides many conveniences. NETWORK
Groupware is a component of a broad concept called ____, which includes network hardware and software that enables group members to communicate, manage projects, schedule meetings, and make group decisions. WORKGROUP COMPUTING
A(n) ____________ is an online area in which users have written discussions about a particular subject. NEWSGROUP
Microwave transmission, often called ____, involves sending signals from one microwave station to another. FIXED WIRELESS
Each electronic document on the web is called a web ____, which can contain text, graphics, audio, and video. PAGE
According to netiquette, Internet users should assume ____. THE USE OF ALL CAPITAL LETTERS IS THE EQUIVALENT OF SHOUTING
Some large areas, such as college or business campuses, are set up as a Wi-Fi ____ network, in which each mesh node routes its data to the next available node until the data reaches its destination – usually an Internet connection. MESH
Some services use the term video ____ to refer separately to the capability of sending video clips. MESSAGING
Sometimes a company uses a(n) ____, which allows customers or suppliers to access part of its intranet. EXTRANET
Web _______ is the development and maintenance of Web pages. PUBLISHING
The core of a(n) ____ cable consists of dozens or hundreds of thin strands of glass or plastic that use light to transmit signals. FIBER-OPTIC
The term ____ identifies any network based on the 802.11 family of standards. WI-FI
To make collaboration possible among employees, some companies use a document ____ system, which provides for storage and management of a company’s documents, such as word processing documents, presentations, and spreadsheets. MANAGEMENT
Which of the following is NOT true of a Wi-Fi network? A WI-FI''S INTERNET SERVICE CAN BE DIAL-UP ACCESS
With ____, users type and send short text messages on a smart phone or mobile device. SMS
____ TV is a service that provides television programs over the cellular network. MOBILE
____ allows users to send graphics, pictures, video clips, and sound files, as well as short text messages to another smart phone or mobile device. MMS
____ cable consists of one or more twisted-pair wires bundled together. TWISTED PAIR
____ cable consists of a single copper wire surrounded by at least three layers: an insulating material, a woven or braided metal, and a plastic outer coating. COAXIAL
____ is a conversation that takes place over the Internet using a telephone connected to a computer, mobile device, or telephone adapter. VOLP
____ is a real-time Internet communications service that allows wireless mobile devices to exchange messages with one or more mobile devices or online users. WIRELESS INSTANT MESSAGING
____ is a software application that helps groups of people work together on projects and share information over a network. GROUPWARE
____ is an electrical disturbance that can degrade communications. NOISE
____ media consist of materials or substances capable of carrying one or more signals. TRANSMISSION
____ radio is a form of broadcast radio that is used widely for mobile communications, specifically wireless modems and telephones. CELLULAR
____ radio is a wireless transmission medium that distributes radio signals through the air over long distances. BROADCAST
____ can serve as sending and receiving devices in a communications system. mainframe computers and servers, desktop computers and notebooks, and smart phones
Types of wired home networks include all of the following EXCEPT ____. WI-FI
For best performance of a communications channel, ____. bandwidth should be high and latency low
Developed by IEEE, ____ is a series of network standards that specifies how two wireless devices communicate over the air with each other. 802.11
A microwave ____ is an earth-based reflective dish that contains the antenna, transceivers, and other equipment necessary for microwave communications. STATION
Use ___________, such as :) or :( to express emotion in an e-mail message or newsgroup article. EMOTICONS
Today, ________ is a primary communications method for both personal and business use. E-MAIL
__________ is an Internet standard that permits the uploading and downloading with other computers on the Internet. FTP
TRUE OR FALSE: According to netiquette, Internet users should assume all material is accurate and up to date. FALSE
A program that displays a list of ____, or Web page names, that contain the search text. HITS
Computer communications describes a process in which two or more computers or devices transfer ______. ALL OTHER CHOICES ARE CORRECT
A(n) ____ is a program that finds Web sites and Web pages. SEARCH ENGINE
Many pages use a program, called a(n) ____, to build and maintain lists of words found on Web sites. SPIDER
To find a Web page, the user of a resource would simply enter a word or phrase, called ____, in the search engine’s text box KEYWORD
A newsreader enables users to access a newsgroup to read previously entered messages, called ____. ARTICLES
A computer that stores and distributes newsgroup messages is called a ____. NEWS SERVER
The components of a domain name are separated by ____. PERIODS
A cable ____ allows access to high-speed Internet services through the cable television network. MODEM
A(n) ____ is a computer program that can damage files and the operating system. VIRUS
A(n) ____ is a Web site that offers a variety of Internet services from a single, convenient location. PORTAL
A(n) ____ is a group of e-mail names and addresses given a single name. MAILING LIST
A(n) ____ is a digital representation of non-text information such as a drawing, chart, or photograph. GRAPHIC
Internet-enabled mobile devices such as smart phones use a special type of browser, called a(n) ____, which is designed for their small screens and limited computing power. MICROBROWSER
TRUE OR FALSE: A popular Web-based type of discussion group that does not require a newsreader is a message board. TRUE
TRUE OR FALSE: Gmail and Windows Live Hotmail are two popular free e-mail Web applications. TRUE
A(n) ____________ is a network that covers a large geographic area, such as a city, country, or the world, using a communications channel that combines many types of media. WIDE AREA NETWORK (WAN)
TRUE OR FALSE: A computer that stores and distributes newsgroup messages is called a newsreader. FALSE
TRUE OR FALSE: Web addresses of pages that use TLS (Transport Layer Security) typically begin with https, instead of http. TRUE
TRUE OR FALSE: Undervoltages can cause equipment damage, but generally do not cause data loss. FALSE
A system ________ is the prolonged malfunction of a computer. FAILURE
TRUE OR FALSE: A cyberextortionist uses the Internet or network to destroy or damage computers for political reasons. FALSE
A computer ________ risk is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability. SECURITY
A(n) __________ has the same intent as a cracker but does not have the technical skills and knowledge. SCRIPT KIDDIE
In the case of system failure or the discovery of corrupted files, users _____ the files by copying the backed up files to their original location on a computer. RESTORE
A(n) ________ occurs when the incoming electrical power increases significantly above the normal 120 volts. OVERVOLTAGE
TRUE OR FALSE: A corrupt individual stealing credit card numbers to make fraudulent purchases is an example of information theft. TRUE
A(n) ____ program secretly collects information about a user. SPYWARE
TRUE OR FALSE: Some security systems for notebook computers shut down the computer and sound an alarm if the computer moves outside a specified distance. TRUE
TRUE OR FALSE: A wireless access point (WAP) should be configured to broadcast a network name, in order to increase security. FALSE
A(n) ________ is someone who uses e-mail as a vehicle for extortion. CYBEREXTORTIONIST
A(n) ________ occurs when the electrical supply drops. UNDERVOLTAGE
Computer viruses, worms, Trojan horses, and rootkits are classified as ________, which are programs that act without a user’s knowledge and deliberately alter the computer’s operations. MALWARE
Some perpetrators use a technique called ________ in which they attempt to connect to wireless networks via their notebook computers while driving a vehicle through areas they suspect have a wireless network. WAR DRIVING
Content ____ is the process of restricting access to certain material on the Web. FILTERING
TRUE OR FALSE: Assume that because information is on the Web, it is accurate. FALSE
Users may have ____ if they have sore, tired, burning, itching or dry eyes; blurred or double vision; or difficulty focusing on a screen image. CVS
Some operating systems and e-mail programs allows you to encrypt the contents of files and messages that are stored in your computer. TRUE
TRUE OR FALSE: A program scans for programs that attempt to modify the boot program, the operating system, and other programs that normally are read from but not modified. FALSE
TRUE OR FALSE: Although eyestrain associated with CVS (computer vision syndrome) is not thought to be disruptive or unpleasant, it has serious long-term consequences. FALSE
TRUE OR FALSE: Computer addiction is an untreatable illness. FALSE
Web ____ software is a program that restricts access to specified Web sites. FILTERING
TRUE OR FALSE: Many businesses use spyware to limit employees’ Web access. FALSE
The 1986 ____ provides the same protection that covers mail and telephone communications to electronic communications such as voice mail. ELECTRONIC COMMUNICATIONS PRIVACY ACT (ECPA)
TRUE OR FALSE: To remove spyware, users need to obtain a special program that can detect and delete it. TRUE
TRUE OR FALSE: Carpal tunnel syndrome (CTS) is inflammation of a tendon due to some repeated motion or stress on that tendon. FALSE
To prevent repetitive strain injury, take all of the following precautions except ____. PLACE THE MOUSE AT LEAST SIX INCHES FROM THE EDGE OF THE DESK
TRUE OR FALSE: A spyware program communicates information it collects to some inside source while a user is offline. FALSE
A(n) ________ is a device that contains surge protection circuits and one or more batteries that can provide power during a temporary or permanent loss of power. UPS
To ________ a file means to make a copy of it. BACK UP
TRUE OR FALSE: A surge protector absorbs small overvoltages — generally without damage to the computer or equipment. TRUE
TRUE OR FALSE: For a computer workspace, ergonomIcs experts recommend an area smaller than two by four feet. FALSE
Many businesses use ________ to limit employees' web access. CONTENT FILTERING
TRUE OR FALSE: The higher a surge protector’s Joule rating, the poorer the protection. FALSE
TRUE OR FALSE: A brownout is a complete power failure. FALSE
TRUE OR FALSE: A program scans for programs that attempt to modify the boot program, the operating system, and other programs that normally are read from but not modified. FALSE
TRUE OR FALSE: Typically, the amount of protection offered by a surge protector is inversely proportional to its cost; that is, the more expensive, the more protection the protector offers. TRUE
A(n) ____ is an injury or disorder of the muscles, nerves, tendons, ligaments, and joints. RSI
Employee ____ involves the use of computers to observe, record, and review an employee’s use of a computer, including communications such as e-mail messages, keyboarding activity, and Web sites visited. MONITORING
___________, which provides encryption of all data that passes between a client and an Internet server, requires only that the client has a digital certificate, TLS
Digital forensics is used by ____. ALL OTHER CHOICES ARE CORRECT
TRUE OR FALSE: A standby UPS, sometimes called an offline UPS, runs constantly off the battery, which provides continuous protection. FALSE
TRUE OR FALSE: Phishing is an unsolicited e-mail message or newsgroup posting sent to many recipients or newsgroups at once. FALSE
Software ____ is the unauthorized and illegal duplication of copyrighted software. THEFT
____ is a scam in which a perpetrator sends an official looking e-mail that attempts to obtain a user’s personal and financial information. PHISHING
Personal computers, display devices, and printers should comply with guidelines of the ____ program. ENERGY STAR
TRUE OR FALSE: Many organizations and businesses have strict written policies governing the installation and use of software and enforce their rules by checking networked or online computers periodically to ensure that all software is licensed properly. TRUE
TRUE OR FALSE: Any illegal act involving a computer generally is referred to as a computer security risk. FALSE
TRUE OR FALSE: Most multiuser operating systems require that users correctly enter a user name and password before they can access the data, information, and programs stored on a computer network. TRUE
TRUE OR FALSE: Hardware theft is the act of stealing computer equipment. TRUE
A personal ____ is a utility program that detects and protects a personal computer and its data from unauthorized access. FIREWALL
Software ____ occurs when someone steals software media, intentionally erases software programs, or illegally copies a software program. THEFT
A particularly devastating type of DoS attack is the ____ DoS attack, in which multiple unsuspecting computers are used to attack multiple computer networks. DISTRIBUTED
TRUE OR FALSE: It is illegal for employers to use software programs that monitor employees. FALSE
TRUE OR FALSE: Some security systems for notebook computers shut down the computer and sound an alarm if the computer moves outside a specified distance. TRUE
________ is any unwanted signal, usually varying quickly, that is mixed with the normal voltage entering a computer. UNDERVOLTAGE
TRUE OR FALSE: To remove spyware, users need to obtain a special program that can detect and delete it. TRUE
Employee __ involves the use of computers to observe, record, and review an employee’s use of a computer, including communications such as e-mail messages, keyboarding activity, and Web sites visited. MONITORING
TRUE OR FALSE: Methods that guarantee a computer or network is safe from computer viruses, worms, and Trojan horses exist. FALSE
A(n) ________ is someone who uses the Internet or network to destroy or damage computers for political reasons. CYBERTERRORIST
TRUE OR FALSE: A corrupt individual stealing credit card numbers to make fraudulent purchases is an example of information theft. TRUE
Computer ____ occurs when a computer consumes someone’s entire social life. ADDICTION
Many Web sites require a user to enter a(n) ____, which is a private combination of characters associated with a user name that allows access to certain computer resources. PASSWORD
TRUE OR FALSE: The best preventive measures against hardware theft and vandalism are common sense and a constant awareness of the risk. TRUE
Web sites use a ____ to keep track of items in a user’s shopping cart. SESSION COOKIE
__ is a program placed on a computer without the user’s knowledge that secretly collects information about the user. SPYWARE
TRUE OR FALSE: Personal firewalls constantly monitor all transmissions to and from a computer and inform users of any attempted intrusion TRUE
TRUE OR FALSE: Undervoltages can cause equipment damage, but generally do not cause data loss. FALSE
A(n) ____ program secretly collects information about a user. SPYWARE
To prevent repetitive strain injury, take all of the following precautions except ____. USE THE HEEL OF THE HAND AS A PIVOT POINT WHILE TYPING OR USING THE MOUSE
An online UPS switches to battery power when a problem occurs in the power line. FALSE
TRUE OR FALSE: A fault-tolerant computer has duplicate components so that it can continue to operate when one of its main components fail. FALSE
__ detection software automatically analyzes all network traffic, assesses system vulnerabilities, identifies any unauthorized access (intrusions), and notifies a network administrator of suspicious behavior patterns or system breaches. INTRUSION
_______ is any unwanted signal, usually varying quickly, that is mixed with the normal voltage entering a computer. NOISE
TRUE OR FALSE: Perpetrators of back doors trick their victims into interacting with phony Web sites. FALSE
TRUE OR FALSE: Biometric objects often are used in combination with personal identification numbers. FALSE
FALSE
Created by: a_zhan
Popular Computers sets

 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards