Being ___ means being familiar enough with computers that you understand their capabilities and limitations.
C. Computer literate
The process of searching huge amounts of data with the hope of finding a pattern:
Data Mining
Which of the following do today's educator NOT need to be familiar with to create constructive computerized lessons and to interact with students?
C. Web authoring software
_____ aare extremely detailed re-creations of crimes or crime scenes that are generated with computers based on forensic evidence, depositions of witnesses, and the opinions of experts.
D. Computer forensics animations
Medical students can train on ____ and experience firsthand how a human would react to a particular treatment.
C. Patient simulators
By studying the data produced by___, scientists hope to improve the prediction of weather phenomena.
D. Simulations
A nanometer is:
D. One-billionth of a meter
The difference between people with access to computers and the internet and those without this access is known as the :
C. digital divide
A___ is a special device that is installed in your computer that allows it to communicate with other deivices on the network.
C. network adaptor
While engineers work to create computer that can understand us emotionally, ___ are also evolving toward a more human apperance.
a. RFIDs
B. affecting computing techniques
c. ESP systems
D. computer systems
D computer systems
____ is data that has been organized or presented in a meaningful fashion.
A. information
___ binary digits (or bits) combine to create on byte.
D. eight
A___ is approx. 1 billion bytes.
A. gigabyte
____ Computers are specially designed computer chips that reside inside other devices such as your car or the electronic thermostat in your home.
D. embedded
A____ is a device that looks like a skinny pen but has no ink.
A. stylus
A(n)____ uses internal sensor or laser to detect the mouse's movement.
A. optical mouse
_____ printers have tiny hammer-like keys that strike the paper through an inked ribbon.
B. impact
___ is power mode that allows the compupter to save an image of the desktop and enter a state of reduce power consumption to save energy.
a. sleep
b hibernate
c. standby
d. coool down
b. hibernate
USB ports are fast replacing traditional___ and ___ ports because of their ability to transer data quickly.
a. video, audio
b ethernet, speaker
c. monitor, modem
d. parallel, serial
d. parallel, serial
A___ enables your computer to connect to other computers or to the internet.
A. controller card
b. video card
c network interface card
d. sound card
c. network interface card (NIC)
The internet is:
A. a large networks of networks
Instant messaging (IM) services are programs that enable you to:
D. communicate with others who are online
Web 2.0 describes:
D. a trend of new web applicaions that combine the functionality of multiple applications.
Podcasts use which of the following technologies?
A. RSS
Adobe Reader, Flash player, and Quicktime player are all examples of special sofeware programs called;
A. plug-ins
The name of the free internet browser from Mozzilla is:
D. firefox
What protocol allows files to be transferred from a web server so that you can view them on your computer using a browser?
A. HTTP
A set of programs that searches the Web to find informations is called a:
C. search engine
The advantage of a dial-up internet connection is:
C. low costs
the large scale newworking (LSN) project is:
D. a U. S Governement Internet research project
System software does all the following Except:
A. add graphics and pictures to files
In a spreadsheet, the colums and rows form indicifual boxes called:
B. cells
Presentation software includes all of the following features Except:
a,. transitions
b. animation effects
c. formulas
d. themes
c. formulas
Microsoft Office and Corel Wordperfect Office are examples of:
B. software suites
CD ripping refers to:
A. encoding CD to MP3 format
QuarkXpress and Adobe Indesign are examples of ____ software.
a word processing
b. video editing
c. image editing
d. destop publishing
d. desktop publishing
GPS software allows users to:
B. locate restaurants, airports, and points of interest
Web-based application software is software that:
B. is stored completely on a web server intead of your hard drive
A(n)___ software installation allows you to decide which features you want to install on the hard drive.
A. custom
Which of the following is an example of discounted software?
B. educational versions of software
The______ of the operating system allows the user to communicate with the computer system.
D. interface
Which of the following is a single-user, multiask operating system?
A. Mac Os
Which of the following statments about Apple Mac OS is TRUE?
a. Mac OS was first OS to use a graphuical user interface.
c. Mac OS can be used on Windows-based PCs
d. There are more software applications avaiable for the Mac OS than for Windows-based PCs
A. Mac OS was the first OS to use a graphical user interface
The ______ is responsible for managing the processor and all other components of the computer system, and is an essential part of the operating system.
D. kernel
The basic input/output system is stored on a ___chip.
A. ROM
The ____ contains all of the different configurations used by the OS and by other applications.
D. registry
Berfore upgrading your OS, you should back up your:
A. data files
Windows 7 introduces the concept of___. which are folder that gather files from different locations and display the files as if they were all saved in a single folder.
A. libraries
With Windows Explorer, you can perform all of the following file management actions EXCEPT:
C. editing files
The most essential software in your computer system is the:
A. operating system software
You can use the Windows____ to check on a nonrepsonsive program.
A. Task manager
Moore's Law is a rule that predicts:
B. the pace at which CPUs improve
The CPU is connected to the system memory by the:
A. front side bus
CPU speed is measure in:
C. gigahertz
When your computer is using virtual memory, the operating system builds a file called the____ on the hard drive that allows processing to continue.
A. page file
The amount of RAM that is actuall on the memory modules in your computer is the ___ memory.
A. physical
Which is fastest type of optical drive on the market?
d DVD drives
C. Blu-ray drives
Two types of video memory;
A. GDDR3 and GDDR5
An expansion card that translates binary data into images is a(n):
A. video card
Running the Disk Cleanup utility is a quick way to:
a. clean out your Start up folder
b. clear out unnecessary files.
c, remove spyware programs
d. defrag your hard drive
b. clear out your unnecessary files
Which of the following is NOT an example of a network node?
D. mouse
The ___ is the maximum speed at which data can be transmitted between two nodes on a network.
a, throughput
b. data transfer rate
c. node speed
d. transmission speed
b. data transfer rate
A ____ is a newtowk located in your home that is used to connect all of your digital devices.
D. HAN
Client/server newtorks are controlled by a central server that runs a sprecialized piece of software called:
C. Networking operatins system (NOS)
A ____ keeps track of data packets and in conjunction with network interface cards, helps the data packets find their destination without running into each other on an Ethernet network.
A. switch
Which of the following newtowkr adapters is most likely to be preinstalled in a typical notebook computer today?
a. modem
b. a transceiver
b. both a wireless and wired network adapter
d. a power-line adapter
c. both a wireless and wired network adapter
The unique number assigned to a network adapter by the manufacturer is referred to as the ____ address.
D. Mac
Which transmission medium is able to transmit data the fastest?
C. fiber-optic cable
The most popular transmission medium option for wired Ethernet networks is:
B. unshilded twisted pair cable (UTP)
Which of the following devices is needed to share an Internet connection on a wireless network?
B. wireless router
Images are representation of sound and light waves called___ or continuous waves.
A. digital
The operating system of a cell phone is stored:
a the CPU
b. the transciever
c. RAM
d. ROM
d. ROM
A ____ is included in a cell phone to hangle the compression of data for it to be quickly trnasmitted to another phone.
B. digital signal processor
SMS delivers messages to appropriate mobile device using__ technology
A. store and forward
An IPOD is an example of a:
d personal information manager
A. PMP
To transfer files from your computer to a portable media player, most new pmps use a ___ port or fire wire port.
C. USB
_____ is a special copyleft license used for software.
D. GNU
A__ runs a full-featured operating system and weighs less than 2 lbs.
Netbook
Flash memory, used MP3 players, is a type of:
D. nonvolatile memory
Broadcasting your video to a live audience over the WEB is referred to as:
A. webcasting
A___ is a secure internet pathway that large corporations use to protect sensitive date.
D. VPN
Which type of virus was the famous Michelangelo virus?
a. a time bomb
b. a worm
d. a script virus
d. an e-mail virus
a. time bomb
During the process of___ the antivirus software records key attributes about the files on your computer and keeps these statistics in a safe place on your hard drive.
C. encryption
___floods the computer with requests until it shuts down and refuses to answer any more requests for information.
a. A trojan hourse
a polymorphic virus
c. portblocking
d. a ddos attack
d. a ddos attack
The purpose of network address translation (NAT) is to:
C. hide user IP addresses from the internet
Adware and spyware are referred to collectively as:
A. grayware
All of the following can be used for backing up data files EXCEPT:
A. RAM
For complete protection when backing up your files, you should use a program that creates a ____ of your entire system.
A. image backup
Which of the statements about protecting against power surges is false?
C. PRinters dont require protectors
Social ___ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information.
a. engineering
b/ pharming
c. pretexting
d. theft