Find study materials for any course. Check these out:
Browse by school
Make your own
To login with Google, please enable popups
To login with Google, please enable popups
Don’t have an account?
To signup with Google, please enable popups
To signup with Google, please enable popups
Sign up withor
1. Businesses are the primary users of ____ because this technology provides a means for departments to communicate with each other, suppliers, vendors, and with clients.
1. On a(n) ____ network, one or more computers act as a server and the other computers on the network request services from the server.
1. ____ is a network standard that specifies no central computer or device on the network should control when data can be transmitted.
1. Developed by IEEE, ____ is a series of network standards that specifies how two wireless devices communicate over the air with each other.
1. DSL ____.
a) uses a modem that sends digital data and information from a computer to a DSL line
1. A ____ is a communications device that connects multiple computers together and transmits data to its correct destination on a network.
1. For best performance of a communications channel, ____.
c) bandwidth should be high and latency low
1. The amount of data, instructions, and information that can travel over a communications channel sometimes is called the ____.
1. ____ is the time it takes a signal to travel from one location to another on a network.
1. ____ is an electrical disturbance that can degrade communications.
1. A microwave ____ is an earth-based reflective dish that contains the antenna, transceivers, and other equipment necessary for microwave communications.
1. Most businesses use a standard, such as ____________________, that defines how data transmits across telephone lines or other means.
1. A(n) ____________________ network is a network topology that consists of a single central cable, to which all computers and other devices connect.
1. ____________________ is a network technology that defines how messages are routed from one end of a network to the other, ensuring the data arrives correctly by dividing it into packets.
1. When a computer sends data over the Internet, the data is divided into small pieces, or ____________________.
1. The ____________________ is the worldwide telephone system that handles voice-oriented telephone calls.
1. Any illegal act involving a computer generally is referred to as a ____.
1. A(n) ____ has the same intent as a cracker but does not have the technical skills and knowledge.
1. In applications that allow users to write ____, the security level should be set so the application warns users that a document they are attempting to open contains a macro.
1. ____ is a server outside a company’s network that controls which communications pass into the Company’s network.
1. Many systems implement access controls using a two-phase process called ____.
1. Which of the following is not an example of a biometric device?
1. ____ occurs when someone steals personal or confidential information.
1. Social engineers can obtain information by ____.
a) snooping around computers looking for openly displayed confidential information
b) watching or filming people dialing telephone numbers or using ATMs
c) sifting through company dumpsters
d) all of the above
1. A(n) ____________________ is someone who accesses a computer or network illegally but has the intent of destroying data, stealing information, or other malicious action.
1. A(n) ____________________ attack is an assault whose purpose is to disrupt computer access to an Internet service such as the Web or e-mail.
1. A(n) ____________________ is a program or set of instructions in a program that allow users to bypass security controls when accessing a program, computer, or network.
1. Software ____________________ is the unauthorized and illegal duplication of copyrighted software.
1. Issues with copyright law led to the development of ____________________, a strategy designed to prevent illegal distribution of movies, music, and other digital content.
1. A(n) ____________________ is an authorized person or company that issues and verifies digital certificates.
1. ____ storage is the physical material on which a computer keeps data, instructions, and information.
1. Memory (chips) accesses items in ____.
1. ____ is the process of dividing a disk into tracks and sectors, so the operating system can store and locate data and information on the disk.
1. Some computers improve hard disk access time by using a disk ____, which consists of memory chips that store frequently accessed items.
1. A group of two or more integrated hard disks is called a(n) ____.
1. A disk ____ consists of a special-purpose chip and electronic circuits that control the transfer of data, instructions, and information from a disk to and from the system bus and other components in the computer.
1. All of the following use direct access EXCEPT ____.
1. ____________________ time measures the amount of time it takes a storage device to locate an item on a storage medium.
1. ____________________ rate is the speed with which data, instructions, and information transfer to and from a device.
1. A(n) ____________________ is a narrow recording band that forms a full circle on the surface of the disk.
1. A disk’s storage locations consist of pie-shaped sections, which break the tracks into small arcs called ____________________.
1. One of the first storage media used with mainframe computers was ____________________.
1. Flash memory cards are a type of ____________________ media, which means they consist entirely of electronic components and contain no moving parts.
1. Which of the following is not an operating system function?
A(n) ____ boot is the process of using the operating system to restart a computer
1. A(n) ____ OS is an operating system that organizes and coordinates how multiple users access and share resources on a network.
1. A performance ____ is a program that assesses and reports information about various computer resources and devices.
1. The first version of Windows was developed in the early ____.
1. Apple’s latest operating system version, Mac ____, is a multitasking operating system available only for computers manufactured by Apple.
1. To defragment a disk means to ____.
1. The term ____ describes a potentially damaging computer program that affects, or infects, a computer negatively by altering the way the computer works without the user’s knowledge or permission.
1. A(n) ____________________ hides within or looks like a legitimate program such as a screen saver.
1. A(n) ____________________ is a segment of memory or storage in which items are placed while waiting to be transferred from an input device or to an output device.
1. To protect sensitive data and information as it travels over a network, an operating system often ____________________ it.
Computer ____ entails having knowledge and understanding of computers and their uses.
5. A(n) ____ system is a set of programs that coordinates all the activities among computer hardware devices.
____ are the fastest, most powerful computers -- and the most expensive.
A(n) ____ computer is a special-purpose computer that functions as a component in a larger product.
____ refers to the use of computers to assist with manufacturing processes such as fabrication and assembly.
A(n) ____________________ controls access to the hardware, software, and other resources on a network and provides a centralized storage area for programs, data, and information.
17. Consumer electronics, office machines, and automobiles all can contain ____________________ computers.
19. A(n) ____ address is a number that uniquely identifies each computer or device connected to the Internet.
20. A(n) ____ is a Web site that offers a variety of Internet services from a single, convenient location.
23. The (_____) oversees research and sets standards and guidelines for many areas of the Internet.
World Wide Web Consortium (W3C)
24. A cable ____________________ provides high-speed Internet connections through the cable television network.
25. The major carriers of traffic on the Internet are known collectively as the Internet ____________________.
1. Microsoft Office PowerPoint 2007 is a complete _____ program.
1. _____ are used to position the content on a slide.
1. A _____ is located at the end of each scroll bar.
1. The _____ is the control center in PowerPoint.
1. A _____ allows you to select a command using the keyboard.
1. Use the _____ to display different slides in the document window.
1. _____ allows you to point to a gallery choice and see its effect in the document.
1. _____ are designs that may include color, shading, patterns and texture.
1. _____ add pattern and texture to a background.
1. _____ specifies the arrangement of placeholders on the slide.
1. Using the _____, you can choose a slide layout.
1. A single media file is referred to as a _____.
1. Clips that reside on the Microsoft Website are considered to be in the _____.
1. Which of the following is not a major part of Excel?
1. The _________ box displays the active cell reference.
1. Excel opens a new workbook with ____________ worksheets.
1. A ____________ is the basic unit of a worksheet into which you enter data.
1. The ____________ button allows you to choose whether you want to copy the values from the source area to the destination area with formatting, without formatting, or copy only the format.
1. The ____________ Format causes the cells to display with two decimal places so that decimal places in cells below align vertically.
1. If the following arithmetic operations all are found in a formula with no parentheses, which one is completed last?
1. To alert Excel that you are entering a formula and not text, type a(n) ____________ preceding the formula.
1. When you copy a formula with relative cell references down a row, ____________.
1. A blank cell has the numeric value of ________.
1. The ____________ function is used to determine the lowest number in a given range.
1. To assign a dollar sign to appear immediately to the left of the first digit with no spaces, use a ____________.
1. When Excel automatically sets the width of a column based on the widest entry in the column, it is called ____________.
1. Database is a collection of data organized in a way that allows _____ of the data.
d. all of the above
1. The rows in the tables are called _____.
1. When a record has an entry that is unique to them, such as a customer number, this field is called a(n) _____.
a. primary key
b. unique identifier
1. A _____ indicates the type of data that can be stored in a field.
1. The file extension for Access 2007 is _____.
1. The default (preset) view is _____ view.
1. The _____, located near the top of the Word window, is the control center in Word.
1. The _____, called the primary tab, contains the more frequently used commands.
1. Word displays tabs, called_____, when you perform certain tasks or work with objects such as pictures or tables.
1. The _____ is a central location for managing and sharing documents.
1. You can press the _____ key on the keyboard to display a Key Tip Badge, or keyboard code icon.
1. The _____ defines the appearance and shape of the letters, numbers, and special characters.
1. Selected graphics display _____ handles at each corner and middle location.
1. MLA stands for __________ of America.
1. The MLA documentation style requires that you __________ the entire paper.
1. To show formatting marks on the screen, click the __________ button on the Home tab.
1. You can use the __________ to indent just the first line of a paragraph.
1. A ____________ is text and graphics that print at the top of each page.
1. ___________ is the process of copying an item from the Clipboard into a document at the location of the insertion point.
1. The MLA style specifies that a(n) ___________ be used for a note reference mark to signal that an explanatory note exists.
Sign up for free and study better.
Get started today!