Find study materials for any course. Check these out:
Browse by school
Make your own
To login with Google, please enable popups
To login with Google, please enable popups
Don’t have an account?
To signup with Google, please enable popups
To signup with Google, please enable popups
Sign up withor
Name two personal computer platforms.
Name two uses for supercomputers.
Illegal copying, use and distribution of digital intellectual property is called __________________.
I downloaded a paper from the internet that was offered for free by its writer. Can I sign my name to it and submit it as my own work?
The chip typically described as the brains of your computer is ___________________________.
Moore’s Law describes how quickly ___________ increases.
a. The number of pixels in a camera
b. The size of a hard disk
c. The number of transistors on a chip
d. The amount of data flowing around the internet
Storage that allows you to maintain data even without power is called persistent/temporary storage. (Circle one)
Name two different types of printers.
Name three factors to consider when buying a laptop computer.
I want to store some photographs somewhere other than my hard drive. What are some options I have for storing those files?
Writing in ALL CAPITAL letters in email is a good idea. T/F
The inability to deal with the huge amount of data and information stored and delivered to each of us daily is called _________________________.
It’s legal to use a hands free device to talk on the phone in your car in California if you are over 18. T/F
Name one ergonomic suggestion for using a computer safely.
Fewer than half of all Americans play digital games. T/F
System software includes operating systems and ____________________ software.
What’s the difference between source code and object code?
Name two tasks done by an operating system.
Name two operating systems.
A set of programs designed to work together, with some shared design characteristics is called a ______________________________.
Software used for calculation and numeric data, as well as graphical depiction of numeric data is
a. Word processing software
b. Spreadsheet software
c. Presentation software
d. Database software
Mobile apps are designed to run on what hardware?
Free software comes without any restrictions for distribution or use. T / F
Software can be uninstalled by deleting the files for it. T / F
The “network of networks” is another name for ___________________________.
The Internet Protocol defines the format and addressing scheme used for emailing. T / F
The Internet uses ____ that allow(s) different types of networks to communicate.
b. Domain names
Rather than learning IP addresses, users typically use _____________________ to specify internet sites.
File sharing such as Bit Torrent is an example of a client-server relationship. T / F
Where is a cookie file stored?
Safari is an example of a Web Browser. T / F
In the URL http://www.cengage.com/index.html, http is the ____.
a. Domain name
c. Web server
d. Location on the internet
The H in HTML stands for __________________________________.
_____________ can be applied to more than one Web page producing a Web site with consistent design and appearance.
Instant messaging is an example of asynchronous communication. T / F
Twitter, Facebook, and YouTube are all examples of Social Media Web sites. T / F
Udacity, Coursera, and edX are all examples of a new way of delivering online education called
a. Distance ed
b. Virtual classroooms
d. Social education
________________ is a micro-blogging service.
Google relies on ______________________ to relay information related to its mapping service.
a. Users on line at the same time
c. Web cookies
User-generated content is a growing Web trend that has begun to be embraced by some mainstream media outlets. T / F
Posting a story to a blog that a neighbor is selling drugs, when you know that’s not true, is protected Free Speech. T / F
YouTube, Apple, and Flickr have the right to censor what you can and can’t post or view at their sites because ____.
a. Of the Communications Decency Act
b. Of the Tenth Amendment
c. You signed a user agreement stating what you can and cannot do at their site
Net Nanny is an example of ___________________________ .
There is consensus among psychologists and governmental bodies that video games depicting graphic violence are harmful to the minds of gamers. T / F
When creating a new presentation, the first consideration should be to determine ____.
a. Sources for the presentation
c. Purpose of the presentation
d. Technology available in the presentation location
The purpose of using ____ in a presentation is to support whatever you’re saying.
Name two types of information that can be added to a slide show.
Every type of talk can be improved with a PowerPoint slide show to help your audience remember the information presented. T / F
Factual information will not be taken seriously if presented in story format. T / F
The language of telecommunications is governed by ____.
b. the web
c. hardware specifications
Three types of physical cables that carry a signal are twisted pair, fiber optic, and ____.
The most popular international standard for mobile phones is GSM / CDMA. (circle one)
Today’s cell phone networks use an analog signal. T / F
A(n) ____ network includes transmission towers that connect to area handsets.
Tagging a photo with geographic data is known as ____.
d. Digital geography
Devices attached to a network are identified as ____.
Local area networks are privately owned. T / F
Wireless data communications refers to telecommunications that take place over the air for data and Internet access. T / F
There is widespread support for using RFID technology in numerous ways including passports, driver’s licenses, and tracking of ex-convicts. T / F
Through the use of ____, data is secured when it is stored and transported over a network.
b. pattern recognition
d. retinal patterning
When starting a new job, you may need to sign a(n) ____ that defines acceptable and unacceptable uses of computer and network resources.
a. Network usage policy
b. Corporate access contract
c. Password agreement
d. Internet notification policy
Biometrics uses a token system to authenticate users of a device. T / F
To avoid viruses, most organizations allow users to install their own software on their corporate PC. T / F
It is fine to use the same password on two unconnected sites. T / F
All of the following are pillars of information security EXCEPT ____.
a. Practicing safe, cautious online behavior
b. Using anti-virus software
c. Using P2P networks
d. Using a firewall
In a practice called ____, someone may manipulate people into performing actions or divulging confidential information on the Internet.
a. Dumpster diving
b. Social engineering
c. Packet sniffing
d. Port scanning
A zombie computer helps fight against intrusions by hackers. T / F
Once installed, antivirus software is effective for the life of the computer. T / F
Malware is often spread through music-sharing P2P networks. T / F
Data about individuals’ shopping, interests, and other behavior is used by ____.
a. Government entities
c. Law enforcement
e. All of the above
Job openings are posted online most often at
If you make social media information such as photos private, it won’t be accessible to anyone you don’t want to see it. T / F
You can control all the data that is stored about you. T / F
There are laws that address specific privacy-related data collection. T / F
The Kindle is an example of a(n) ____ device.
b. tablet computer
d. automated reading
e. All of the above
Through the use of ____, publishers can control the distribution of their digital content.
The first consideration in purchasing a player is the audio file formats that it supports. T / F
Compressed audio files such as .mp3 files produce the same quality of sound as CDs. T / F
The digitization of music has fundamentally altered production and distribution mechanisms within the music industry. T / F
A basic example of ____ is the use of graphs and charts to illustrate numeric data.
Digital video ____ involves analyzing each frame of the video and storing only the pixels that change from frame to frame.
____ make up a large portion of the interactive media market.
a. Video games
b. Virtual objects
c. Educational tools
d. Both A and B
Bitmapped graphics are also known as vector graphics. T / F
Some photojournalists have been criticized for using photo-editing software to make photos more interesting than what was originally captured by their cameras. T / F
A ____ consists of a group of programs that manipulates data within a database.
a. Data definition language
b. Data manipulation language
c. Database management system
d. Query by example
A(n) ____ database organizes data into multiple tables that are related by common fields.
c. flat file
A primary key is a ____ within a database table that uniquely identifies the record.
iTunes is a website based on database technology. T / F
The ability to connect data in different tables through a common field is sometimes referred to as a relationship. T / F
Installation and ongoing function of software on a database system is the job of the database ____.
A data warehouse ____ data from several databases to provide information.
A database ____ is a graphical representation of the structure of a database.
c. data type
SQL is not considered a programming language. T / F
Data mining is used to generate business intelligence. T / F
Of the following, ____ contains the most information about citizens of the United States..
c. The federal government
____ can tell more about a person than all other kinds of electronic surveillance.
b. Data mining
c. GPS tracking
d. RFID surveillance
_______________is a description of people and objects that are attached to the internet and transfer uniquely identifiable information without human intervention.
a. Big Data
b. Government surveillance
c. Behavioral targeting
d. The Internet of Things
The First Amendment of the Constitution of the United States includes the phrase: “the right of each citizen to expect and enjoy a reasonable degree of personal privacy.” T / F
Data mining involves collecting and analyzing large amounts of information generated about a person, including financial, medical, communications, and entertainment data. T / F
A good example of an e-commerce site is ____.
Information transmitted from an online sales transaction uses a secure ____ connection where buyers enter their account information and submit it.
b. Credit card
A (n) ____ provides software and a network that connects businesses within an industry.
a. Electronic exchange
c. Online community
Location-based advertising can keep track of customers’ locations and provide them with discount coupons in their area. T / F
Working with an e-commerce host requires knowledge of the underlying technologies in order to maximize the benefits and minimize the costs. T / F
A(n) ____ system is a business information system that begins the process of handling incoming data.
a. Transaction processing system
b. Management information system
c. Decision support system
d. Expert system
In a ____ system, a what-if analysis can be applied to understand the impact of a decision.
a. Management information
b. Decision support
c. Business intelligence
d. Knowledge management
A(n) ____ system can help a business alleviate the need for multiple information system programs.
a. Decision support
b. Customer relationship management
c. Management information
d. Enterprise resource planning
Customer relationship management software, by itself, will improve customer satisfaction. T / F
Some businesses and organizations provide a knowledge base that can be queried to find solutions to product or service related issues. T / F
Often software engineers develop ____ of software to test a concept or gather feedback from users.
b. Gantt charts
Before developing a software program, a programmer will ____.
a. Develop an algorithm
b. Review program specifications
c. Build a prototype
d. Develop quality specifications
When deciding whether to update or build a new software program, one thing to consider is the cost of maintenance versus ____.
a. Critical success factors
b. The request for identification
c. Site preparation
d. The cost of development
Once a software program is written, it does not require maintenance. T / F
The process of developing information systems often includes more details than are possible to track without automated help. T / F
A feature of neural networks includes the ability to quickly ____ stored data when new information is identified.
A(n) ____ system is software that is knowledgeable in a particular field or area.
a. decision support
The art and science of creating computer systems that simulate human thought and behavior are referred to as ____.
b. artificial intelligence
c. expert systems
d. knowledge management
Computerized expert systems are still not able to diagnose diseases given a patient’s symptoms. T / F
No machine has yet passed the Turing Test. T / F
a. often contains toxic contaminants
b. is sometimes shipped illegally to developing nations with lax safety/environmental regulations
c. accounts for 400,000 tons of material sent for recycling each year
d. all of the above
The ability of people with disabilities to interact with and make use of computer resources is known as ____.
d. “Ramping in”
In the past 10 years, the “digital divide” in the U.S. has ____.
c. stayed about the same
d. impossible to tell from the text
Codes of ethical conduct that exceed the basic requirements of federal laws have been drawn up by various professional associations and organizations. T / F
Environmentally-conscious manufacture and use of computer technologies is known as green computing. T / F
Sign up for free and study better.
Get started today!