IT Final Flashcards

1
Q

In order for something to be considered a computer it must have a keyboard attached.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What was used to make analyzing results faster for the 1890 census?

A

punch cards and punch card readers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Writing software is the job of programmers and software developers.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following is NOT an advantage of using Copy/Paste/Edit?

A

It allows the user to recreate the formatting from scratch.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The instructions written in software are followed or executed by

A

Hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

_____ made computers more affordable and allowed them to have more complex CPUs

A

Transistors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Software is a collective term for

A

Programs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Complexity is _____________ to manufacture, though it remains _________ to design

A

cheap, expensive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Computers do

A

exactly what you tell them to do

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A good way to learn how to use a new application or piece of software is to

A

click around

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A computer is considered a(n) ________ when it gets services from another computer.

A

client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Saving information for possible reuse is called

A

caching

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

This type of communication results in the sending and receiving of information to occur at different times.

A

asynchronous

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What can folders contain?

A

both files and folders

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The Internet is fast enough to mimic ________ communication.

A

synchronous

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Wireless network connections follow the 802.11 protocol.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

PandA representation is what kind of system?

A

Binary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Information describing information is called

A

metadata

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Hexadecimal is base ____

A

16

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Grouping binary digits in groups of four makes converting to ___ easier

A

Hex

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Analog information is?

A

continuous

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Every bit can exist in one of two states: 0 or 1.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Extended ASCII is a 9-bit code.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

The byte is the standard unit for computer memory.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
The RGB setting for blue is (0 is off, 1 is on)
0000 0000 0000 0000 1111 1111
26
The brightness of the light of a subpixel in an LCD display it its ________.
Intensity
27
JPEG is to still images what _______ is to motion pictures.
MPEG
28
The process of reducing the number of bits required to represent information from which the original form can be exactly reconstructed is known as ________ compression.
lossless
29
A megabyte is exactly one million bits.
False
30
Logic gates, part of a circuit in the ALU, are used to implement operations like AND and OR.
True
31
Memory has a finite capacity.
True
32
From smallest to largest, the correct order of prefixes is
kilo, mega, giga, tera
33
An example of a good password is.
a word that includes symbols or numbers to represent some letters
34
A(n) ________ is a programmed response to your email that’s sent when you are away.
Auto-response
35
Information that you did not create but can treat as your own is said to be
in the public domain
36
The term referring to the malicious practice of using deceptive emails to fraudulently obtain personal information such as Social Security numbers, bank account numbers, and credit card numbers is:
Phishing
37
If you commit a crime on the Internet, who can determine your real identify?
the law
38
Most people assume that when you send an email it is
private
39
Information in the __ is free for anyone to use
public domain
40
A type of malicious software that disguises itself as legitimate software but performs harmful actions once installed is called a:
Trojan
41
A type of malware that prevents the system from being used until the victim pays the attacker money is known as what?
Ransomware
42
You receive an email from your bank informing you that they are performing an audit and have found a problem with your account. They ask you to log in to help resolve the problem. This is an example of
phishing
43
Two-factor authentication allows for greater security in user access to web sites.
True
44
You cannot mix absolute and relative references in one cell reference.
False
45
Macs do not need virus protection software because it is built into the OS
False
46
A program that creates an access path through which attackers can run any program they want is called a _______
backdoor
47
A(n) ________ is information that is stored on a client computer by an HTTP server computer.
Cookie
48
In computer security, compromised computers that act under the direction of an external master computer are referred to as
Zombies
49
An absolute cell reference uses the ________ symbol to identify the value as an absolute reference.
Dollar sign ($) symbol
50
Cell references that do not change when copied from one cell to another are called ________ references.
absolute
51
Spreadsheet columns can be hidden but rows cannot
False
52
Spreadsheet can import any kind of data
False
53
Respectively, rows and columns are designated with...
Numbers and Letters
54
Use the _____ function to find the average of a range of cells
average
55
____ means "Join letter sequences together"
Concatenation
56
Spreadsheet formulas start with
=
57
Malware that directly manipulates operating system tables to hide its presence is known as a
rootkit
58
Recovery after a disaster involves installing the most recent ________ backup copy.
Full
59
Most Americans wrongly assume that their privacy regarding business information is restricted to
Internal Use
60
___refers to the relationship between computers that are communicating over the Internet where each of the computers—yours and someone else's—is a "file server" for the other.
Peer-To-Peer