Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
168 Cards in this Set
- Front
- Back
Which one of the following spelling errors would not be detected by a spelling checker?
notise changable blew recieve |
blew
|
|
Which one of the following spelling errors would not be detected by a spelling checker?
notise changable blew recieve |
blew
|
|
For which situation would a tutorial be appropriate?
finding out the meaning of the term “GIGO” creating a slide show learning how to use a spreadsheet writing a report on the history of computers |
learning how to use a spreadsheet
|
|
To which category of application software do dictionaries, encyclopedias, and tutorials belong?
personal communications productivity reference |
reference
|
|
What software product could help you look slimmer in a photograph?
graphics software drawing software image-editing software painting software |
image-editing software
|
|
For which of the following would project management software most likely be used?
constructing a light-rail system testing a new type of aircraft writing a book designing a bridge |
constructing a light-rail system
|
|
Which one of the following would be best for conducting the annual meeting of the board of directors of a national organization?
multipoint webconferencing instant messaging groupware point-to-point webconferencing |
multipoint webconferencing
|
|
Which database feature relates to organizing information in different ways?
sort link query find |
sort
|
|
Which feature would you use to create a list of clients living in the 98228 ZIP code?
sort find query link |
sort
|
|
WebCT, a popular distance-learning platform, originally began as
shareware. customized software. free software. commercial software. |
free software.
|
|
Which one of the following is the largest category of application software for individual use?
educational and reference software communications software productivity software software for home and personal use |
productivity software
|
|
Users enter data into a database by using a
file. table. record. form. |
form.
|
|
Which one of the following is an advantage of computer-aided design software?
It can be used to test design versions before the first prototype is built. It can be adapted for use by small businesses and homeowners. Compared with project management software, it is relatively inexpensive. It can be used by anyone, with virtually no training. |
It can be used to test design versions before the first prototype is built.
|
|
An image-editing program can eliminate red-eye effects from photographs.
True False |
True
|
|
Another name for a software suite is integrated software.
True False |
True
|
|
Painting and drawing programs can help you save money on
interior decorating. art books. oil paintings for your home. greeting cards. |
greeting cards.
|
|
How do developers of shareware make their money?
They charge users for product support. They encourage users to pay a small fee each time they use the program. They sell their software in retail stores. They charge users a fee to download the software from the Internet. |
They charge users for product support.
|
|
Which one of the following is not a way to format numbers in a spreadsheet?
currency value upper or lower case decimal point placement positive or negative quantity |
upper or lower case
|
|
A micro is a set of commands that automates complex or repetitive actions.
True False |
False
|
|
Copyrighted software that is owned by a company or an individual is
commercial software. productivity software. proprietary software. customized software. |
proprietary software.
|
|
A video store might use a database for all of the following purposes except
to generate a mailing list for an in-store promotion. to keep track of which videos have been rented. to manage records pertaining to its video inventory. to estimate profits if video rentals increase by 10 percent. |
to estimate profits if video rentals increase by 10 percent.
|
|
Personal finance software allows users to do all of the following except
keep track of investments. pay bills. balance checkbooks. take out loans. |
take out loans.
|
|
Which one of the following is not a search engine?
WebCrawler Alta Vista Yahoo! Internet Explorer |
Internet Explorer
|
|
Microsoft Word is an example of
individual application software. workgroup application software. horizontal application software. vertical application software. |
individual application software.
|
|
At the start of an application program the message “This product is licensed to ...” may come on the screen. This message means that you
own the software. can make a backup copy. passed a test in order to use the software. have the right to resell the software. |
can make a backup copy.
|
|
Which feature of presentation software guides the user step by step?
images online help templates wizards |
wizards
|
|
What is a possible solution to the problem of fiber-optic access?
dense-wave optics light-point optics optical rings free-space optics |
free-space optics
|
|
What is the function of a modem?
to raise the pitch of signals coming into the computer to slow the frequency rate of signals coming into the computer to allow access to the Internet service provider to convert signals coming into the computer to digital form |
to convert signals coming into the computer to digital form
|
|
What is required to make each networked client computer on a LAN work?
a NIC a WAN a hub a spoke |
a NIC
|
|
Baseband coaxial cable has several channels for transmitting digital signals.
True False |
False
|
|
In computer technology, what is a “hotspot”?
a network node that handles a high volume of data transmission a foreign country from which inflammatory e-mails are sent to the United States a building with a hard-wired infrastructure that often malfunctions a public place that offers wireless access |
a public place that offers wireless access
|
|
Upon arrival at a receiving e-mail server, messages are transferred to another server, called a
POP server. print server. data server. file server. |
POP server.
|
|
An extranet might be used to recruit new employees.
True False |
False
|
|
What are communications protocols?
capabilities provided by communications software programs, such as e-mail and use of Web browsers rules and procedures for exchanging information among computers on a network standard specifications for manufacturing communications hardware acceptable ways for computer users to behave when they are online |
rules and procedures for exchanging information among computers on a network
|
|
Which network topology features computers and peripheral devices linked to a central computer?
hybrid bus ring star |
star
|
|
Asynchronous transmission is faster than synchronous transmission.
True False |
False
|
|
Which communications hardware device helps wires and cables to carry a message the full distance?
gateways hubs repeaters routers |
repeaters
|
|
Which of these network components functions as a channel through which data are transmitted?
communications software telephone lines modem computer |
telephone lines
|
|
Computers linked in a single network on a college campus are an example of a
MAN. PAN. LAN. WAN. |
LAN.
|
|
What is a main advantage of peer-to-peer architecture?
It eliminates the need to install individual copies of programs on each computer within the network. It is simpler to install and maintain than client/server architecture. It is available only to authorized users. It operates well under heavy workloads. |
It is simpler to install and maintain than client/server architecture.
|
|
What is the name for a network that is housed within an organization to serve internal users?
intranet intrenet Ethernet Internet |
intranet
|
|
What is the name of the computer chip that Intel developed for Wi-Fi?
Pentium Centrino Celeron Athlon |
Centrino
|
|
Which of these is the strongest competitor to DSL?
ISDN lines Cable modems T3 lines T1 lines |
Cable modems
|
|
A wide area network limited to a specific site, such as a city or town, is a
PAN. VPN. VAN. MAN. |
MAN.
|
|
A network’s topology determines the type of networking software needed.
True False |
False
|
|
In contrast to twisted-pair cable, coaxial cable
consists of two parallel copper wires. can carry much more data. is less expensive. requires repeater stations to strengthen communication signals. |
can carry much more data.
|
|
What is Ethernet?
an extension of an intranet a LAN communication protocol the forerunner of the Internet specialized communications software Question 23 text Question 23 |
a LAN communication protocol
|
|
Where is the most likely location for a microwave station?
in outer space on top of a mountain in a user’s backyard in a valley |
on top of a mountain
|
|
What is another name for repeaters?
responders amplifiers splitters transceivers |
amplifiers
|
|
Bandwidth is measured in
bytes per second. bites per second. bots per second. bits per second. |
bits per second.
|
|
Blogs are electronic
newspapers. novels. magazines. journals. |
journals.
|
|
A more recent Internet application that allows conversations over the Web through live video transmission involves
webcasting. webcams. Voice over IP. audio mail. |
webcams.
|
|
What is moving about the Web called?
scanning the Web searching the Web surfing the Web scrolling the Web |
surfing the Web
|
|
All of the following are advantages of free e-mail except users can
easily close out a free e-mail account and open another one. see a large number of unsolicited ads. establish several free e-mail accounts to use for different purposes. access messages from any Internet connection. |
see a large number of unsolicited ads.
|
|
Until recently, instant messaging has been used primarily for
business communications. emergencies. chatting with friends. home entertainment. |
chatting with friends.
|
|
Larry Page and Sergey Brin are the creators of
Microsoft. Yahoo!. Google. Apple. |
Google.
|
|
AND, OR, and NOT are common
search terms. search options. search operators. keywords. |
search operators.
|
|
What is the advantage of using Internet telephone services?
Connections are much better than traditional phone service. There are no long-distance telephone charges. Users pay reduced ISP connection fees. Calls can be transmitted anywhere. |
There are no long-distance telephone charges.
|
|
In the URL “http://www.wired.com/news,” what does “news” represent?
file specification communications protocol domain name format information |
file specification
|
|
According to a study of chat room behavior, which user name will receive the most malicious messages?
Jack Irene Nightwolf It is impossible to determine |
Irene
|
|
MP3 is a format that can reduce the size of CD music files by a factor of
1 to 2 . 3 to 5. 10 to 14. 30 to 40. |
10 to 14.
|
|
What are cookies?
small files that indicate what Web sites the user has visited small files that contain favorite recipes small programs that provide the ability to play online games miniprograms that extend the capabilities of Web browsers |
small files that indicate what Web sites the user has visited
|
|
On the Internet, what is flaming?
downloading copyrighted material monopolizing discussion in a chat room using the all-caps style in an e-mail message hurling insults at other users |
hurling insults at other users
|
|
Internet relay chat is a popular IM system.
True False |
True
|
|
It is legal for an employer to read an employee’s e-mail messages.
True False |
True
|
|
Someone who maintains order in a chat room is called
an operator. an enforcer. a moderator. a Web master. |
a moderator.
|
|
To start a one-on-one conversation via instant messaging, you must know the other person’s
handle. name. password. e-mail address. |
handle.
|
|
What is the domain suffix for the U.S. Navy?
.gov .org .mil .com |
.mil
|
|
At present, how many pages of information are available on the Web?
500,000 more than a million more than a billion more than a trillion |
more than a billion
|
|
P2P allows people to download material directly from other users’ hard drives.
True False |
True
|
|
Spam is the electronic equivalent of
overnight delivery. junk mail. first-class mail. snail mail. |
junk mail.
|
|
Cyberwars are wars between people who play virtual reality games.
True False |
False
|
|
Who would like to see longer, more complex encryption keys used on the Internet?
crackers Federal Bureau of Investigation e-tailers U.S. Congress |
e-tailers
|
|
Signature verification systems can tell all of the following except
the speed of each stroke. the delays and points where the pen was lifted from the paper. the brand of pen used. the pen pressure. |
the brand of pen used.
|
|
Why are many companies now using biometric authentication?
to apprehend employees who are stealing hardware and peripherals to avoid hiring known criminals to determine if employees are wasting time on the job to make sure only authorized employees enter secure areas |
to make sure only authorized employees enter secure areas
|
|
Why are many hackers difficult to catch?
They are constantly on the move. They change their identity frequently. They are too clever for law enforcement officials. They live in foreign countries. |
They live in foreign countries.
|
|
Computer programs that generate thousands of likely passwords are available for free over the Internet.
True False |
True
|
|
People who create and release viruses often do so in order to
keep from being bored. make money. demonstrate their computer skills. play a trick on friends. |
demonstrate their computer skills.
|
|
The most secure strategy is to save a backup
once a day. once a week. once every other week. once a month. |
once a day.
|
|
In contrast to passwords, user IDs are
the core security element. needed for authentication. sought by cyber criminals. publicly known. |
publicly known.
|
|
What crime do signature verification systems attempt to prevent?
burglary forgery homicide arson |
forgery
|
|
What happens in a denial of service attack?
Thousands of false requests bombard a Web site at once and force it to shut down. Groups of international hackers attack Web sites in opposing countries. The government raids the homes of suspected hackers and shuts down their computers. A group of Web sites refuses the legitimate requests of computer users. |
Thousands of false requests bombard a Web site at once and force it to shut down.
|
|
A mirrored hard drive is one way corporations protect their critical databases.
True False |
True
|
|
What is Alan Kay noted for?
helping to develop the Apple computer creating the first-known worm on the Internet developing data encryption protocols for the FBI inventing hand geometry systems |
helping to develop the Apple computer
|
|
What is another name for data browsing?
stealing gossiping spoofing snooping |
snooping
|
|
In keystroke identification, what is the amount of time between keystrokes called?
flight time release time exposure time dwell time |
flight time
|
|
Some e-mail viruses can be activated without downloading an attachment.
True False |
True
|
|
What has heightened the problem of employee theft of hardware and peripherals?
Internet accessibility redundant systems data encryption mobile computing |
mobile computing
|
|
Spoofing is the process of fooling another computer by pretending to send packets from a legitimate source.
True False |
True
|
|
Software that enables users to perform the types of activities and work computers were designed for is called
|
Application Software
|
|
Software used to create professional-quality publications is called
|
A desktop publishing (DTP) software
|
|
A previously created and stored form is called a(n)
|
Template
|
|
A word processor editing feature that checks a document for common errors in grammar, usage, and mechanics is called a(n)
|
Grammar Checker
|
|
The transmission and receipt of messages over a worldwide system of communications networks is called
|
E-Mail (Electronic Mail)
|
|
Software versions of rules worksheets accountants used in the past are called
|
Spreadsheet Software
|
|
A collection of data organized in one or more tables consisting of fields and records is known as a(n)
|
Database
|
|
A group of software programs bundled into a single package is called
|
A Software Suite
|
|
A communication method that enables people to communicate over the Internet with other users in real time is called
|
Instant Messaging
|
|
Software that allows people to share information and collaborate on various projects, such as developing a new product, is called
|
Groupware
|
|
The process of altering content of an existing document is called
|
Editing
|
|
A set of commands that automates complex or repetitive actions is known as a(n)
|
Macro
|
|
A program that allows the user to create and manage a computerized database, and to produce reports from stored data is a(n)
|
Database Management System (DBMS)
|
|
___ software makes it possible to create slide shows that combine text, numbers, graphics, sounds, and video.
|
Presentation Graphics Software
|
|
___ software is a sophisticated kind of software providing tools that enable professionals to create architectural, engineering, product, and scientific designs.
|
Computer-aided design *CAD)
|
|
A ___ is a form of instruction in which students are guided step by step through the learning process.
|
Tutorial
|
|
Spreadsheets display numbers and text in columns and rows known as a matrix or
|
Grid
|
|
___ software enables users to readily view how their money is being spent.
|
Personal Finance Software
|
|
A ____ database allows tables to be linked in a way that allows data to be retrieved from more than one table.
|
Relational
|
|
Software provided without charge to anyone wanting to use it is called
|
Freeware
|
|
A(n) ___ signal is a transmission signal in which information is sent in the form of continuous waves over a medium at a certain frequency range.
|
Analog
|
|
The term ___ refers to the amount of data that can travel over an analog medium.
|
Bandwidth
|
|
___ is an increasingly popular communications medium that requires no phone lines or cables.
|
Cellular Technology
|
|
A ____ is an electronic device used in a local area network that links computers and allows them to communicate.
|
Hub
|
|
Standards (rules) that govern the transfer of information among computers on a network and those using telecommunications are called
|
Communications Protocols
|
|
A network architecture that uses a central, or host, computer through which all transmissions pass is called
|
Client/Server Architecture
|
|
A ___ consists of hardware and/or software that allows communication between dissimilar networks.
|
Gateway
|
|
A ___ is a private network that connects PCs and workstations located in close proximity, storing software applications and other resources on a special computer called a file server.
|
Local Area Network
|
|
In a ___ topology, multiple computers and devices are linked to a central computer, called a host.
|
Star
|
|
In ___ , all of the data bits are transmitted one bit after another in a continuous line.
|
Serial Transmission
|
|
___ refers to the use of computer hardware and software for sending and receiving information over communications media, making it possible for computer users throughout the world to communicate with each other.
|
Telecommunications
|
|
A physical link that allows computers to be connected to other computers in different locations is called a ____.
|
Communications Medium
|
|
___ refers to the way a network is designed and built.
|
Network Architecture
|
|
A ___ topology combines different kinds of network layouts into one.
|
Hybrid
|
|
In a ___ topology, all computers are linked by a single line of cable.
|
Bus
|
|
In a ___ topology, each computer is connected to two other computers, with the entire network forming a circle.
|
Ring
|
|
Hardware and/or software that allows communication between two similar networks is called a
|
Bridge
|
|
Notebook and other portable computers use ___ modems.
|
Personal Computer Memory Card International Association (PCMCIA)
|
|
Three possible directional protocols that determine the directional flow of transmissions among devices are ___ , ___ , and ___
|
Simplex, Half-duplex and Full-Duplex
|
|
The World Wide Web uses the ___ to transfer Web pages to computers.
|
Internet
|
|
The first screen visible when entering a Web site is called the
|
Home Page
|
|
Of the following types of internet connections, which generally provides the fastest speed?
|
DSL
|
|
Files contained in e-mail messages are known as
|
attachments
|
|
A type of ISP connection that provides high-speed access that might have to be shared with other users is a
|
Cable modem
|
|
HTML stands for
|
Hypertext Markup Language
|
|
A file can be transported from a Web page to a PC by
|
downloading
|
|
ISP stands for
|
Internet Service Provider
|
|
Instant messaging is different from e-mail because
|
instant messaging is interruptive, like a phone call.
|
|
Telecommuting or telework involves
|
Avoiding the effort of commuting in a car to work every day
Working online from home rather than in an Office A new and growing way for companies to reduce operating costs. |
|
Why should users of chat rooms and instant messaging environments be wary of online strangers?
|
The anonymous nature of online conversations mean that you don't really know with whom you are conversing.
|
|
The graphic persona of a player in a virtual reality game is called a(n)
|
Avatar
|
|
A small file stored on a web surfer's hard drive that might be used to track behavior is called a(n)
|
Cookie
|
|
The part of a URL that comes last and identifies the type of organization is called the
|
Domain Name
|
|
Another term used for telecommuting is called
|
Telework
|
|
A four-group series of numbers separated by periods represents a(n)
|
Internet Protocol Address
|
|
An advertisement that occupies a rectangular portion of the screen is called a(n)
|
Banner
|
|
Unwanted, repeated e-mail messages that are transmitted over the internet are called
|
Spam Messages
|
|
The design feature that describes how packets are moved around the Internet by the best available route is called
|
Dynamic Routing
|
|
Web sites often ask for the user's approval before downloading and installing a
|
Plug In
|
|
A(n) ___ is a group of related Web sites that are linked together.
|
Webring
|
|
A company's most valuable possession is often its
|
Information
|
|
A ___ is a work-around or an alteration of a program so that software copy protection is removed.
|
Crack
|
|
Passwords are a form of the security measure known as
|
Authentication
|
|
____ measure a biometric identifier.
|
Fingerprint Scanners
Hand Geometry Systems Computerized Facial Recognition (CFR) Systems |
|
A ___ is a program that displays network traffic.
|
Network Sniffer
|
|
What is the difference between a software virus and a software worm?
|
A worm actively tries to send itself places
|
|
___ eliminate(s) the need for users to remember user IDs and passwords for multiple systems
|
Single sign-on (SSO)
|
|
A powerful form of attack upon a Web site that is difficult to guard against and often involves organized team of hackers is called
|
Denial of Service
|
|
A power supply for your computer that will keep it running smoothly during brownouts and blackouts is called a
|
UPS
|
|
A ____ virus hides inside another legitimate program or data file
|
Trojan Horse
|
|
___ is a type of information theft that equates to an invasion of privacy.
|
Data Browsing
|
|
The difference between a hacker and a ___ is that the latter has malicious intent.
|
Cracker
|
|
The process of fooling another computer by pretending to send packets from a legitimate source is called
|
Spoofing
|
|
A ___ is a physical attribute that is unique to an individual and can be used to authenticate identity.
|
Biometric Identifier
|
|
The proof that a user is who he says he is, and that he is authorized to access an account is called
|
Authentication
|
|
A hardware problem that causes the electricity to surge and possibly damage data is called a
|
Power Spike
|
|
A plan to fix a system after a catastrophe is called a
|
Disaster Recovery Plan
|
|
The act of one company seeking illicit information from another company is called
|
Industrial Espionage
|
|
A rare and sophisticated virus that attempts to hide from antivirus software by covering up its identifiable characteristics is called
|
Stealth Virus
|