Concepts Exam #2 Flashcards

(45 cards)

1
Q

The central, controlling computer in a network is called a ___________ while the computer(s) connected to a central computer is/are called a ___________.
Ring Network Controller(s)

Star Peer(s)

Server Client(s)

Client Server(s)

A

Server Client(s)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

A ______ is a text file that contains information to help a Web server identify you and customize the information it presents.
Cache

Cookie

Browser

Port

A

Port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

A(n) _______ backup makes backup copies of files as they are added or changed.
Incremental

Auto

Manual

Full

A

Incremental

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

What application software (i.e. Google Chrome, Mozilla Firefox, and Apple Safari) allows users to view the Internet?

A

Browser

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Two or more computers connected together to communicate and share resources is called a __________.

A

Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Software sold as a collection is called a(n) __________ and is capable of sharing data and information between business application software.

Data Suite

Productivity Suite

Application Suite

Access Suite

A

Productivity Suite

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Data from one application can be shared with another application in either a static or a dynamic manner. Data that is shared statically is basically an unchanging snapshot of the data. T/F

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A compact and portable solid state storage device that makes it easy to carry files and programs with you is often called a(n) ________.
USB flash drive

DVD

CD

Portable drive

USB flash drive

A

USB flash drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A _______ is a temporary local storage area for copies of previously used web page elements.

Browser cache

Server

Cookie

Domain

A

Browser Cache

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Although we typically think of a kilobyte as 1,000 bytes, how many bytes is it really?

A

1,024

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which network topology uses a common linear backbone to which all networked devices are attached?
P2P
bus
ring
star

A

Bus

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

For what does URL stand?

A

Uniform resource locator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A type of computer network that connects computers in a relatively small area (typically a single building) is called a ___________.
Local area network

Personal area network

Wide area network

Peer-to-Peer network

A

Local Area Network

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The broad umbrella legal claim that a business has to names, inventions, and ideas is called _______________.

A

Intellectual Property

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which of the following methods of data sharing are static?
Object sharing

Copy and paste

Object linking

Object embedding

A

Copy and paste, Object embedding

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The _______ head of a hard disk scans the surface of a spinning disk, and scans to read the magnetic particles’ polarity to retrieve data.

A

Read

Write

Copy

Read-write

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The Internet is composed of computers and other devices that exchange data using a standard protocol called _______.
ISP

TCP/IP

P2P

NAP

A

TCP/IP

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Access time is the amount of time needed to get data and information from a storage device to its user. T/F

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What politician is sometimes credited with inventing the Internet?

19
Q

A(n) __________ is a file that travels along with an e-mail message.

Subject

Message

Hyperlink

File Attachment

A

File Attachment

20
Q

Google Docs, Apple Pages, and Microsoft Word are pieces of software called ____________________.
Browsers

Word Processors

Search Engines

DBMSs

A

Word Processors

21
Q

Which of the following is volatile?
RAM

Solid state storage mediums

Magnetic storage mediums

Optical storage mediums

22
Q

The TCP/IP protocol divides documents, e-mail, photos, and other digital messages into standard-sized _______ of data.
Packets

Folders

Files

Pockets

23
Q

Any search engine works to conduct keyword searches on multiple search engines and displays results after eliminating duplicate hits. T/F

24
Which of the following is not an aspect of a good website? interactivity high quality design absence of cookies accurate content
Absence of cookies
25
________________ documents retain the original layout of text and graphics and can be accessed on virtually any platform. PDF HTML DOCX Word processing
PDF
26
An e-mail-based scam that is designed to persuade users to reveal confidential information is called ________. Caching Scanning Surfing Phishing
Phishing
27
Any device connecting to a network must have electronic circuitry called a ___________. MAC NIC NOS LAN
NIC
28
__________ is the amount of data and information a storage device can hold. access time capacity data transfer rate rotation speed
Capacity
29
For what does PDF stand?
Portable Document Format
30
Any device connected to a network is called a ___________. Hub Node WAN NIC
Node
31
According to the text, what is the most common network topology?
Star
32
Given the following URL, http://www.hputx.edu/academics/programs.html what is the domain name? hputx.edu .html programs.html http://
hputx.edu
33
A structured database makes it easy to locate records using a ____________. locate query find sort
query
34
Software that arranges data in an electronic grid of columns and rows, and is helpful for modeling and manipulating numeric information. Network software Projecting software Spreadsheet Database
Spreadsheet
35
A _______ number system uses only two symbols. Binary ASCII Digital Fixed lengt
Binary
36
_______ documents can be posted on the Internet as a Web page and viewed with a Web browser. JavaScript HTML URL VoIP
HTML
37
A high data-transmission rate Internet connection is called _________.
broadband
38
A _______________ consists of slides that can be viewed on-screen and are often projected for an audience. Video Document Presentation Spreadsheet
Presentation
39
A circular, rigid storage medium that stores data on rapidly rotating platters with magnetic surfaces is a(n) ________. Hard disk USB flash drive DVD Plate
Hard disk
40
Recognizing .edu, .com, .org, and other _______ domains helps to classify the person, organization, or business that is responsible for web content. Top-level Top-tier URL Descriptive
Top-level
41
Which of the following is not an example of strong authentication? pin + ATM card zip code + credit card key card + fingerprint user name + password
user name + password
42
The most common type of network cable is called twisted-pair. T/F
True
43
What differentiates system software from application software? Machine code System software isn't actually programmed Human intervention Machine language
Human intervention
44
Instead of electromagnetic charges, an optical disk uses optical technology (lasers) to record and read pits and __________ as the mechanism for holding binary data. raids roads holes lands
lands