Concepts Exam #2 Flashcards

1
Q

The central, controlling computer in a network is called a ___________ while the computer(s) connected to a central computer is/are called a ___________.
Ring Network Controller(s)

Star Peer(s)

Server Client(s)

Client Server(s)

A

Server Client(s)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A ______ is a text file that contains information to help a Web server identify you and customize the information it presents.
Cache

Cookie

Browser

Port

A

Port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A(n) _______ backup makes backup copies of files as they are added or changed.
Incremental

Auto

Manual

Full

A

Incremental

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What application software (i.e. Google Chrome, Mozilla Firefox, and Apple Safari) allows users to view the Internet?

A

Browser

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Two or more computers connected together to communicate and share resources is called a __________.

A

Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Software sold as a collection is called a(n) __________ and is capable of sharing data and information between business application software.

Data Suite

Productivity Suite

Application Suite

Access Suite

A

Productivity Suite

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Data from one application can be shared with another application in either a static or a dynamic manner. Data that is shared statically is basically an unchanging snapshot of the data. T/F

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A compact and portable solid state storage device that makes it easy to carry files and programs with you is often called a(n) ________.
USB flash drive

DVD

CD

Portable drive

USB flash drive

A

USB flash drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A _______ is a temporary local storage area for copies of previously used web page elements.

Browser cache

Server

Cookie

Domain

A

Browser Cache

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Although we typically think of a kilobyte as 1,000 bytes, how many bytes is it really?

A

1,024

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which network topology uses a common linear backbone to which all networked devices are attached?
P2P
bus
ring
star

A

Bus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

For what does URL stand?

A

Uniform resource locator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A type of computer network that connects computers in a relatively small area (typically a single building) is called a ___________.
Local area network

Personal area network

Wide area network

Peer-to-Peer network

A

Local Area Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The broad umbrella legal claim that a business has to names, inventions, and ideas is called _______________.

A

Intellectual Property

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following methods of data sharing are static?
Object sharing

Copy and paste

Object linking

Object embedding

A

Copy and paste, Object embedding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The _______ head of a hard disk scans the surface of a spinning disk, and scans to read the magnetic particles’ polarity to retrieve data.

A

Read

Write

Copy

Read-write

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The Internet is composed of computers and other devices that exchange data using a standard protocol called _______.
ISP

TCP/IP

P2P

NAP

A

TCP/IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Access time is the amount of time needed to get data and information from a storage device to its user. T/F

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What politician is sometimes credited with inventing the Internet?

A

Al Gore

19
Q

A(n) __________ is a file that travels along with an e-mail message.

Subject

Message

Hyperlink

File Attachment

A

File Attachment

20
Q

Google Docs, Apple Pages, and Microsoft Word are pieces of software called ____________________.
Browsers

Word Processors

Search Engines

DBMSs

A

Word Processors

21
Q

Which of the following is volatile?
RAM

Solid state storage mediums

Magnetic storage mediums

Optical storage mediums

A

RAM

22
Q

The TCP/IP protocol divides documents, e-mail, photos, and other digital messages into standard-sized _______ of data.
Packets

Folders

Files

Pockets

A

Packets

23
Q

Any search engine works to conduct keyword searches on multiple search engines and displays results after eliminating duplicate hits. T/F

A

False

24
Q

Which of the following is not an aspect of a good website?
interactivity

high quality design

absence of cookies

accurate content

A

Absence of cookies

25
Q

________________ documents retain the original layout of text and graphics and can be accessed on virtually any platform.

PDF

HTML

DOCX

Word processing

A

PDF

26
Q

An e-mail-based scam that is designed to persuade users to reveal confidential information is called ________.
Caching

Scanning

Surfing

Phishing

A

Phishing

27
Q

Any device connecting to a network must have electronic circuitry called a ___________.
MAC

NIC

NOS

LAN

A

NIC

28
Q

__________ is the amount of data and information a storage device can hold.
access time

capacity

data transfer rate

rotation speed

A

Capacity

29
Q

For what does PDF stand?

A

Portable Document Format

30
Q

Any device connected to a network is called a ___________.
Hub

Node

WAN

NIC

A

Node

31
Q

According to the text, what is the most common network topology?

A

Star

32
Q

Given the following URL, http://www.hputx.edu/academics/programs.html what is the domain name?
hputx.edu

.html

programs.html

http://

A

hputx.edu

33
Q

A structured database makes it easy to locate records using a ____________.
locate

query

find

sort

A

query

34
Q

Software that arranges data in an electronic grid of columns and rows, and is helpful for modeling and manipulating numeric information.
Network software

Projecting software

Spreadsheet

Database

A

Spreadsheet

35
Q

A _______ number system uses only two symbols.

Binary

ASCII

Digital

Fixed lengt

A

Binary

36
Q

_______ documents can be posted on the Internet as a Web page and viewed with a Web browser.
JavaScript

HTML

URL

VoIP

A

HTML

37
Q

A high data-transmission rate Internet connection is called _________.

A

broadband

38
Q

A _______________ consists of slides that can be viewed on-screen and are often projected for an audience.
Video

Document

Presentation

Spreadsheet

A

Presentation

39
Q

A circular, rigid storage medium that stores data on rapidly rotating platters with magnetic surfaces is a(n) ________.
Hard disk

USB flash drive

DVD

Plate

A

Hard disk

40
Q

Recognizing .edu, .com, .org, and other _______ domains helps to classify the person, organization, or business that is responsible for web content.
Top-level

Top-tier

URL

Descriptive

A

Top-level

41
Q

Which of the following is not an example of strong authentication?

pin + ATM card

zip code + credit card

key card + fingerprint

user name + password

A

user name + password

42
Q

The most common type of network cable is called twisted-pair. T/F

A

True

43
Q

What differentiates system software from application software?
Machine code

System software isn’t actually programmed

Human intervention

Machine language

A

Human intervention

44
Q

Instead of electromagnetic charges, an optical disk uses optical technology (lasers) to record and read pits and __________ as the mechanism for holding binary data.
raids

roads

holes

lands

A

lands