TIA CHAPTERS 1-3

Card Set Information

Author:
Anonymous
ID:
42480
Filename:
TIA CHAPTERS 1-3
Updated:
2010-10-15 23:23:27
Tags:
TIA
Folders:

Description:
TEST
Show Answers:

Home > Flashcards > Print Preview

The flashcards below were created by user Anonymous on FreezingBlue Flashcards. What would you like to do?


  1. All of the following are examples of real security and privacy risks EXCEPT
    A) hackers.
    B) spam.
    C) identity theft.
    D) viruses.
    B) spam.
    (this multiple choice question has been scrambled)
  2. __________ is a type of wireless communication used by UPS to transmit scanned data through radio waves to a terminal.
    Bluetooth technology
  3. Game programming requires an in-depth knowledge of
    software animation tools.
  4. There are simulations and instructional __________ on the Web that serve as incredible learning tools.
    software
  5. __________ tags are small versions of the roadway electronic toll system used in many states to automate paying tolls as you pass through the toll station.
    RFID
  6. Surgeons use __________ to perform delicate operations by manipulating devices through computers instead of manually.
    robotics
  7. One type of chip already being implanted in humans as a means of verifying a person's identity is called a
    VeriChip
  8. One potential application of __________ is to provide sight to the blind.
    biomedical chip implants
  9. By studying the data produced by __________, scientists hope to improve the prediction of weather phenomena.
    simulations
  10. __________ is the study of molecules and structures whose sizes range from 1 to 100 nanometers.
    Nanoscience
  11. True or false
    When a job is sent to other countries, as many programming jobs have been, it is said to have been exported.
    False
  12. True or false
    The process of searching huge amounts of data with the hope of finding a pattern is called data warehousing
    False
  13. True or false
    Trend-spotting programs developed for business have been used to predict criminal activity.
    true
  14. True or false
    Ranchers use VeriChips to track their cattle
    False
  15. True or false
    Nanostructures represent the smallest human-made structures that can be built.
    True
  16. True or false
    Employers have the right to monitor network traffic on employee systems used at work
    True
  17. True or false
    Although the automotive industry has become more computerized in the last ten years, there is still not a great need for automotive technicians to be computer literate.
    False
  18. True or false
    Being computer literate enables you to form educated opinions in today's digital society and to take a stand based on accurate information rather than media hype and misinformation
    true
  19. True or false
    The discrepancy between the "haves" and "have nots" with regard to computer technology is commonly referred to as the digital society
    false
  20. True or false
    A TV tuner allows your computer to receive television channels from a cable connection and display them on your computer monitor.
    true
  21. Being __________ means being familiar enough with computers to understand their capabilities and limitations and to know how to use them.
    computer literate
  22. The term __________ refers to the programs that give commands to the computer.
    software
  23. __________ is the set of techniques used in information handling and retrieval.
    information technology
  24. The discrepancy between the "haves" and the "have nots" with regard to computer technology is commonly referred to as the __________.
    digital divide
  25. Many employees don't know that employers have the right to monitor __________ and __________ traffic on the systems they use at work.
    e-mail, network
  26. Computers process data into information by working exclusively with______
    numbers
  27. In binary language, each letter of the alphabet, each number, and each special character is made up of a unique combination of
    eight bits.
  28. Any computer parts that you can actually touch are considered to be
    hardware
  29. A(n) __________ uses an internal sensor or laser to detect the mouse's movement.
    optical mouse
  30. __________ are large printers used to produce oversize pictures that require precise continuous lines, such as maps and architectural plans.
    Plotters
  31. __________ is what happens when the computer saves an image of the desktop and enters a state of reduced power consumption to save energy.
    Hibernation
  32. The __________ port resembles a standard phone jack.
    modem
  33. __________ plug into slots on the motherboard.
    Expansion cards
  34. __________ is a form of permanent memory that holds all the instructions the computer needs to start up.
    ROM
  35. __________ is the applied science concerned with designing and arranging things that people use so that the people and things interact most efficiently and safely.
    Ergonomics
  36. TRUE OR FALSE
    One bit is equal to 8 bytes.
    False
  37. TRUE OR FALSE
    The operating system provides the means for users to interact with a computer.
    True
  38. TRUE OR FALSE
    You cannot connect a full-size keyboard to a notebook computer
    False
  39. TRUE OR FALSE
    The leading alternative to the QWERTY keyboard is the virtual keyboard.
    False
  40. TRUE OR FALSE
    All function keys on all keyboards work the same in all programs
    False
  41. TRUE OR FALSE
    Thermal printers are specialty printers that melt wax-based ink onto ordinary paper or burn dots onto specially coated paper
    True
  42. TRUE OR FALSE
    Speed, resolution, color output, and memory are factors to be considered when selecting a monitor
    false
  43. TRUE OR FALSE
    Speakers connect to the VGA port
    False
  44. TRUE OR FALSE
    External hard drives are often used to back up data that is contained on the internal hard drive
    True
  45. TRUE OR FALSE
    Bluetooth is the latest incarnation of optical storage to hit the market
    FALSE
  46. __________ is data that has been organized or presented in a meaning fashion
    Information
  47. __________ bits equal one byte
    Eight
  48. __________ devices, such as monitors, modems, and printers, are externally connected to the computer
    Peripheral
  49. __________ is sometimes referred to as primary storage.
    RAM
  50. __________ are specially designed computers that can perform complex calculations extremely rapidly
    Supercomputers
  51. The concept of the Internet developed from
    the cold war crisis.
  52. The first Internet communication took place between which of the following locations?
    Stanford and UCLA
  53. If your professor wanted to have his/her lecture available over the Internet, he/she would use
    a podcast
  54. An Internet site that anyone can change is called a
    wiki
  55. Small text files that can be automatically stored on your computer when you visit an Internet site are called
    cookies
  56. If you receive an e-mail asking for personal information, it may be part of a scam called
    phishing
  57. HTTP is the abbreviation for
    Hypertext Transfer Protocol
  58. A set of programs that searches the Web to find information is called a
    search engine
  59. Which of the following is NOT a type of broadband Internet connection?
    A) cable
    B) DSL
    C) dial-up
    D) satellite
    C) dial-up
    (this multiple choice question has been scrambled)
  60. The World Wide Web was invented by
    Tim Berners-Lee at CERN
  61. TRUE OR FALSE
    The Internet is the largest computer network in the world
    True
  62. TRUE OR FALSE
    Tim Berners-Lee is known as the father of the Internet
    False
  63. TRUE OR FALSE
    The original Web browser built by Tim Berners-Lee was built to run on the Windows operating system
    False
  64. TRUE OR FALSE
    ARPANET began as a three-node network
    False
  65. TRUE OR FALSE
    All IM services are proprietary; there are none that let you talk with someone who is using a different IM service than you
    False
  66. TRUE OR FALSE
    Most Webcasts are not updated automatically
    True
  67. TRUE OR FALSE
    Weblogs or blogs are public, allowing anyone to view them
    True
  68. TRUE OR FALSE
    The Internet and the World Wide Web are the same thing
    False
  69. TRUE OR FALSE
    The Internet is referred to as a client/server network
    True
  70. TRUE OR FALSE
    Most public Wi-fi hotspots are secured
    False
  71. The __________ is a worldwide computer network.
    internet
  72. __________ was the person who developed the basic architecture of the Web
    Tim Berners-Lee
  73. __________ is a broad term used to refer to software, such as viruses, worms, or Trojan horses, that has a malicious intent
    Malware
  74. The protocol used for file transfers is __________.
    FTP
  75. __________ is the U.S. government project that resulted in the invention the Internet
    ARPANET

What would you like to do?

Home > Flashcards > Print Preview