TB - Review/Practice Flashcards

1
Q

Automated bot accounts use social media

a) responsibly.
b) to help humans who are busy.
c) to manipulate opinion by posting news stories and quotes massive numbers of times.
d) in some countries but they are illegal in the U.S.

A

c)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The digital divide occurred because

a) the United States has the fastest Internet access.
b) not everyone has equal access to the Internet.
c) crowdfunding is increasing.
d) everyone now has a smartphone.

A

b)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Cognitive surplus means that we now find many people with

a) more money than free time.
b) limited access to the Internet.
c) mobile devices.
d) excess time and free tools for collaboration.

A

d)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Crowdfunding helps startup businesses by

a) selling stock more easily.
b) using QR codes to advertise and market products.
c) gathering financial contributions from supporters.
d) replacing Web 2.0 technology.

A

c)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Collaborative consumption is when people get together to

a) find the best prices on products.
b) increase the use of a single product by sharing access to it.
c) fight diseases of the respiratory tract.
d) exchange reviews on services and goods they have purchased.

A

b)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

__________ is a branch of computer science that focuses on creating computer systems or computer-controlled machines that have an ability to perform tasks usually associated with human intelligence.

a) Computer literacy
b) Artificial intelligence
c) Natural language
d) Information technology

A

b)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

AI systems that help people discover things they may like but may not discover on their own are known as

a) crowdsourcing systems.
b) Turing testers.
c) recommendation engines.
d) intelligent personal assistants.

A

c)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A working definition of ethics is

a) impossible because it means different things to different people.
b) the laws of a given society.
c) the study of the general nature of morals and of the specific moral choices individuals make.
d) the rules of conduct presented in Christian religions.

A

c)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The set of formal or informal ethical principles you use to make decisions is your

a) mindset.
b) instinct.
c) personal ethics.
d) personality.

A

c)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The analysis of a computer system to gather potential legal evidence is

a) affective computing.
b) data mining
c) hacktivism.
d) computer forensics.

A

d)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The crisis-mapping tool Ushahidi

a) prevents two-way dialog between people.
b) is only available in the United States.
c) shows that a free software product can have great value
d) relies on people using their desktop computing power to help others.

A

c)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Sophisticated modeling software is helping international researchers

a) create more intricate screenplays and movie scripts.
b) analyze computer systems to gather potential legal evidence.
c) market new types of products to a wider audience.
d) increase the pace of research in finding and producing vaccines.

A

d) (pg 5)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following would not impact the digital divide

a) A decline in the price of internet access
b) Less sharing of the work we produce
c) Expansion of free wifi connectivity in major cities
d) Legislation allowing communications companies to charge per website for access

A

b)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Crowdfunding sites include

a) Citi Bike and Zipcar.
b) Bing and Google.
c) Kickstarter and GoFundMe.
d) Amazon and Netflix.

A

c)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Bike-sharing programs like Citi Bike are an example of

a) principled psychology.
b) crowdfunding.
c) crowdsourcing.
d) a subscription-style business model made possible by technology.

A

d) (pg 7)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Being computer literate includes being able to

a) avoid spam, adware, and spyware.
b) use the web effectively.
c) diagnose and fix hardware and software problems.
d) all of the above.

A

d)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

All of the following are current focuses of AI research EXCEPT

a) natural language processing.
b) perception.
c) cognitive surplus.
d) knowledge representation

A

c)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which of the following statements is FALSE?

a) Unethical behavior is always illegal
b) Ethical decisions are usually influenced by personal ethics.
c) Individuals who have no sense of right or wrong exhibit amoral behavior.
d) Life experience affects an individual’s personal ethics.

A

a)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which of the following actions would NOT help to identify your personal ethics?

a) Describe yourself.
b) Conduct a genetic study of your extended family.
c) Identify the influences of your work environment.
d) Prepare a list of values that are most important to you.

A

b)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Intellectual property

a) is the result of someone’s creative work and design.
b) can be protected legally by the patent system.
c) can include works of music, film, or engineering design.
d) all of the above.

A

d)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Intellectual property can be legally protected even though it is not a physical object. true/false

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

The move toward access instead of ownership is a sign of cognitive surplus.
true/false

A

false

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Artificial intelligence systems think exactly like human beings do. true/false

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Web-based databases cannot be used to help investigators solve criminal cases. true/false

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Hacktivism is different from cyberterrorism. true/false
True
26
Which of the following is not one of the four major functions of a computer? a) indexing b) processing c) storage d) output
a)
27
Which of the following statements is FALSE? a) Not all cell phones are smartphones. b) Smartphones generally have less computing power than desktop computers. c) Smartphones do not contain a CPU. d) Smartphones are considered a type of computer.
c)
28
Which of the following can be both an input device and an output device? a) display screen b) keyboard c) mouse d) laser printer
a)
29
The width-to-height proportion of a monitor is known as what? a) viewing density b) viewing plane c) aspect ratio d) screen resolution
c)
30
What type of printer works by spraying ink onto the paper? a) inkjet b) laser c) 3D d) resolution
a)
31
Which of the following is NOT found on a motherboard? a) RAM b) hard drive c) ROM d) CPU
b)
32
Which of these is considered the “brains” of the computer? a) CPU b) ROM c) RAM d) USB
a)
33
Which of these has moving parts which make them more prone to malfunction? a) thumb drive b) SSD c) conventional hard disk drive d) a flash memory card
c)
34
Which of the following is a port? a) HDMI b) RAM c) ROM d) CPU
a)
35
Which power control option leads to a cold boot? a) sleep b) restart c) log-off d) shut down
d)
36
Which of the following functions of a computer is mostly responsible for turning data into information? a) output b) storage c) input d) processing
d)
37
In a computer, each __________ can represent either a 0 or a 1. a) byte b) bit c) integrated circuit d) megabyte
a)
38
A(n) __________ is a laptop computer that can convert into a tablet-like device. a) 2-in-1 PC b) chromebook c) ultrabook d) all-in-one PC
a)
39
Touch-screen devices usually feature __________ keyboards. a) physical b) laser-projection c) virtual d) optical
c)
40
Which of the following is a sensor found in certain smartphones? a) RAM b) accelerometer c) HDMI d) hygrometer
b)
41
Ergonomics is an important consideration a) for all computing devices. b) only for laptop computers. c) only for laptop and desktop computers, but never for mobile devices. d) only for desktop computers.
a)
42
The most common output device for hard output is a a) printer b) scanner c) speaker d) display screen
a)
43
The most common output device for soft output is a a) printer b) scanner c) speaker d) display screen
d)
44
__________ printers work by spraying tiny drops of ink onto paper. a) inkjet b) cloud-ready c) laser d) large format
a)
45
The most common computer port is the __________ port. a) USB b) expansion c) thunderbolt d) wi-fi
a)
46
Which component of a computing device drains the battery the fastest? a) hard drive b) display screen c) wifi adapter d) Bluetooth adapter
b)
47
Data and information are interchangeable terms. | T/F
false
48
RAM is non-volatile storage. T/F
false
49
SSD drives are superior to conventional disk drives because they have no moving parts. T/F
true
50
A touchpad is a pointing device usually found in tablets. T/F
false
51
The “brain” of the computer is the CPU. T/F
true
52
Which is NOT an event associated with the beginning of the Internet? a) Vinton Cerf helped to develop the Internet communications protocol. b) Amazon.com was one of the first websites on the Internet. c) “Login” was intended to be the first network transmission d) The U.S. Department of Defense creates ARPANET.
b)
53
Which of the following best describes the transmission lines with the fastest speeds? a) internet backbone b) main internet c) main backbone d) primary backbone
a)
54
Which category of social networking do Instagram and YouTube fit into? a) infromation sharing b) social commerce c) media sharing d) business collaboration
c)
55
which of the following does not describe a desktop email client? a) the email program is installed on your computer b) email is downloaded when the program is opened c) sending emails is not dependent on an internet connection d) can access email from any internet-connected device
d)
56
which of the following would be an example of B2B business? a) BestBuy b) target c) google d) omaha paper
d)
57
which feature of a browser enables you to seperate a browser tabl into as own window? a) tabbed browsing b) pinned tabs c) tear-off tabs d) tab isolaton
d)
58
which of the following is not an internet protocol? a) HTTP b) FTP c) BitTorrent d) ARPANET
d
59
What is the navigation aid that shows users the path they have taken to get a web page located within a website? a) favorites b) breadcumb trail c) bookarks d) social boomarks
b)
60
Which search strategy should you use to search fo a specific phrase? a) use quotation marks around the phrase b) unclude boolean opertor in the pharase c) use asterisks around the phrase d) use a wild card around the phrase
a)
61
which of the following is not true when evaluating web articles for reasearch? a) you should not use an article if thereis ot an author listed b) you shold evaluate web articels for bias and relavance c) you can assume everything wit an author listed is accurate and appropriate d) you should check any links in a web sarticl to see if they are timely and releveant
c)
62
Which statement is not true about the web? a) the web was based on a protocol developed by TimBerner-Lee b) special links are used to navigate from page to page on the web c) the web is based on the WWW protocol d) the web is a subset of the internet
c)
63
Which of the following describes an IP address? a) it is reffered to a s a dotted quad b) it identifies any computer connecting to the internet c) it identifise a website d) all of the above
d)
64
Ordering a mocha latte and paying for it from the Starbucks smarphone app is using what type of internet commerse a) B2B b) C2C c) soial commmerce d) mobile commerce
d)
65
What web browser feature would be particularly useful when using public computers? a) pinned tabs b) privacy browsing c) session restore d) all of the above
b)
66
in the URL http:..www.whitehouse.gov/blog which part is considered the top-level domain name? a) .gov b) www.whitehouse.gov c) http d) /blog
a)
67
which of hte folling is not a component of search engine a) spider b) indexerp propram c) search assistant d) serach engine software
c)
68
Which feature in Google Chrome enables you to restric search result by Size, Color, Type, TIme, or Usage rights? a) search tool b) custom search c) favorites d) history
a)
69
Ensuring that sebsite content is not slanted in its poitn of view is checking for: a) audience b) authority c) bias d) relevance
c)
70
Which of the following is a good precaution to take when making online purchases? a) use the same strong password for all online accounts b) pay by debit card c) make sure http: and an open padlock displays in the address bar d) use a private browser when purchasing items from a public computer
d)
71
``` You want to search the web for information on the movie Captian America: Cicil War. Whta would be the bast way to enter the key terms to get the most specific results? a ) Captain America * b) "Captain America: Civil War" c) *Civil War d) Captin America Civil War ```
b)
72
Your location can be captured from yor moblie device even if app location tracking is turned off T/F
true
73
Podcasts can only be created by professional organizations T/F
Faulse
74
The "S" in HTTPS stands for secure and indicates that the secure sockets layer protocol has been applies to website T/F
true
75
Catfishing is posted infammatory remarks online to generate negative responses T/F
False
76
Google Docs is an example of wiki T/F
false
77
Microsoft Office is an example of which type of software? a) open source software b) proprietary application software c) open source application software d) proprietary system software
b)
78
Beta software is never a) sytem software b) the final finished versionof the software c) open source software d) application software
b)
79
Chossing which features of software yo want ot intall is what kind of installation? a) custom installation b) fulll installation c) restores installation d) single installation
a)
80
Which type of software is not upgraded automatically? a) software as a service b) mobile appls c) locally installed d) subscription based
c)
81
which best describes copyleft? a) a single license covering a single user on a single device b) a license that grants user the right to modify and redistribute the sotware c) a license covering one user with mutiple installations d) a family pack license
b)
82
Which type of productiivity software would you most likely use to do calcualtions and what-if analyses? a) database b) tax preparation c) spreadsheet d) word processing
c)
83
The software that allows you to edit digital images videos, as well as digitial audio is called? a) multimedia software b) encryption algorithms c) distributed software d) productivity software
a)
84
Which of the following is an uncompressed audio file format? a) WAV b) AAC c) MP3 d) WMA
a)
85
Which of the following software packages would not be used to create mobile applications? a) scratch b) App engine c) thunkable d) app inventor
d)
86
Which of the following is considered a benefit of using simulation programs? a) they allow users to experince potentially dangerous situations without risk b) they help to prevent costly errors c) they allow users to experience or control the software as if it were an actual event d) all of the above
d)
87
Software tht is hosted by the vendor and accessed online is called? a) application software b) productivity software c) SaaS d) open source software
c)
88
LibreOffice is an example of which type of software a) freeware b) open source software b) beta software c) SaaS
b)
89
Beta software is made avaliable because a) new programmers have been hired b) wireless networking must be added c) a company is making an early release to test bugs d) the company needs more profits
c)
90
when yoiu install all the most comly used files and programs to your computer's hard drive, you have completed which kind of software installation? a) custom b) full c) complete d) common
b)
91
The min recommended standards for the OS, processor, RAM, and storage cpacity for cetain softwares are called? a) redistributing standards b) system requirments c) hardware d) min standards
b)
92
Ginny downloads and modifies and open source software program, them upoads the program with a different name. Which type of software license is she most likely to be working under? a) copyleft b) general public license c) open source license d) no license needed
b)
93
Calendars, tasks, and email can be found in which applicatoin a) excel b) outlook c) OneNote d) Access
b)
94
Which of the following is an example of financial management software? a) lumosity b) audioAcrobat c) Photos d) Quicken
d)
95
Image-editing software allows you to a) compute complex formulas b) remove red eye c) creat drafting blueprints d) conduct product simulations
b)
96
Digital audio software can be used to a) compute comlex formulas b) compose songs or soundtracks with virtual instruments c) create drafting blueprints d) perform mathematical simulations
b)
97
google docs is an example of Software as a Service T/F
T
98
App creation software includes tools like adobe Photoshop T/F
F
99
Course management software creates a virtual learning experience for students and houses course material, tests, and discussion boards T/F
T
100
When you subscribe to software, no license is necessary T/F
F
101
a macro is a program release early to the public for testing and evaluation
F
102
``` Which is NOT an example of a mobile operating system? a) iOS ]b) Windows 10 c) Android d) macOS ```
d)
103
You're most likely to find an RTOS a) on an iPad b) in a robotic camera c) on a supercomputer d) on a mainframe
b)
104
OS's that have windows and icons have which type of user interface? a) comand-driven b) menu-driven c) graphical d) magnetic tape-base
c)
105
The OS can optimize RAM storage by using a) virtual memory b) thrashing c) an interrupt handler d) a spooler
a)
106
BIOS stands for a) bundled input-output software b) billable input-output service c) basic input-output system d) basic in order services
c)
107
The process of adding a windows 10 app to the Start menu is known as a) clipping b) pinning c) visualizing d) screening
b)
108
what windows app used for locating files and folders is a) disk manager b) finder c) library explorer d) file explorer
d)
109
Which view in File explorer can you use to sort files by column heading a) details b) small icons c) tiles d) large icons
a)
110
Which of the following is used to reduce the file size of a file or folder a) defragmenter b) extraction c) compression d) shrinker
c)
111
Which utility is used to exit from a nonresponsive program a) system refresh b) disk cleanup c) task manager d) file explorer
c)
112
Which of the following would you NOT see on a Windows 10 start menu? a) task view b) power c) apps list d) tiles
a)
113
When an OS processes tasks in priority order, it is known as a) preemptive interruption b) interruptive multitasking c) multitasking headling d) preemptive multitasking
d)
114
An example of an open-source OS is a) Linux b) macOS c) Windows d) DOS
a)
115
Which of the following is not considered an accessibility utility? a) magnifier b) system restore c) narrator d) speech recognition
b)
116
Which of the following devices would use a real-time OS a) iPhone b) Roomba Vacuum c) Microsoft Surface tablet d) all of the above
b)
117
Device drivers are a) are no longer used because of Plug and Play b) often bundled with the OS c) always installed from a CD d) mapping programs to generate driving instructions
b)
118
a GUI user interface is special because a) it uses a very small set of commands b) the menus are organized well c) there is a set of icons that represent the OS tasks d) it uses voice commands to run tasks
c)
119
A feature in Windows 10 that is used to organized open windows into task-specific groups is called a) program manager b) virtual view c) snap assist d) virtual desktops
d)
120
When a printer receives a command it generates a unique signal to the OS, which is called a a) interrupt b) event c) slice d) non of the above
a)
121
The C: drive on a windows PC is like a large filling cabinet and is referred to as the a) main directory b) root directory c) library directory d) main path
b)
122
different versions of Linux are known as distros T/F
T
123
Modern desktop operating systems are considered single-user multitasking OS T/F
T
124
The power-on self-test ensures all peripheral devices are attached and operational T/F
T
125
A system restore point can only be created by windows automatically on a regular schedule T/F
F
126
Once files are placed in the Recycle Bin they cannot be recovered
F
127
Moore's law describes the pace at which ____ improve a) RAM chips b) clock cylces c) CPU's d) cache modules
c)
128
Which of the following is a stage in the machine cycle? a) fetch b) calculate c) decrypt d) save
a)
129
CPU ____ are measurements used to compare performance between processors a) RAM speeds b) usage graphs c) cache cycles d) benchmarks
d)
130
the limit to how much RAM you can add to your system a) depends on the design of the motherboard b) depends on the OS running on your system c) depends on the amount of memory each memory card slot supports d) all of the above
d)
131
Adding RAM to your computer a) won't improve its performance b) is not limited by the OS installed c) is relatively easy for most people to do d) is not limited by how much RAM the computer can accommodate
c)
132
hard drives are classified as which type of storage? a) volatile b) GPU c) nonvolatile d) cache
c)
133
when would you want to consider RAID 0 tech? a) when you need the fastest solution for writing data b) if you think that SSDs are too expensive c) when you need an instant backup of your work d) When you want to have only one hard disk drive
c)
134
Your Windows computer can be brought to the state it was in before problems began occurring by using utility call Windows a) return b) refresh c) reste this PC d) reboot
c)
135
Dolby Digital 7.1 creates a) ultra-sharp high definition video b) a digital signal from an audio input c) seven-channel surround sound d) eight-channel surround sound
d)
136
Moore's law refers to the a) amount of memory on a memory chip b) overall system processing capability c) speed of DRAM d) pace at which CPU's improve
d)
137
when the binary code is retrieved from RAM and moved to the CPU, this stage is known as a) fetch b) decode c) store d) execute
a)
138
RAM is a) volatile memory b) nonvolatile memory c) neither volatile nor nonvolatile memory d) both volatile and nonvolatile memory
a)
139
a good way to assess your CPU usage is to a) check the performance tab of the task manager b) listen for the sound of a spinning hard disk drive c) check the number reported by the system defrag utility d) feel the temperature of the CPU with your hand
a)
140
______ is a set of strategies for using more than one drive in a system a) a machine cycle b) GPU c) RAID d) VPU
c)
141
a special processing chip found on video cards is the a) ROM b) HDMI c) CPU d) GPU
d)
142
if you want to use your computer for recording your band, you would benefit most from a a) HDMI interface b) MIDI interface c) RAID interface d) overclocking interface
b)
143
before donating your Windows computer you should perform a windows a) restore b) refresh c) reclaim d) reset this PC
d)
144
data can be retrieved fastest from a) registers b) cache memory c) RAM d) HDMI
a)
145
windows create a "restore point" so that you can a) return your system to the way it was before you installed new software b) add additional hard disk storage space c) extend your warrenty d) protect your system from hackers
a)
146
Desktop systems are invariably a better value than light, more mobile computers T/F
T
147
conventional hard drives are preferable to SSD drives because they transfer data more quickly. T/F
F
148
in windows, if you experience unreliable behaviour, try to system restore before doing a reset this PC T/F
T
149
there is no limit to how much RAM you can add to a modern computer T/F
F
150
Moore's law describes the pace at which RAM modules improve T/F
F
151
Which of the following transmission media is used most often for wired connections within a home a) twisted-pair cable b) coaxial cable c) fiber-optic cable d) unshielded twisted-pair cable
b)
152
The type of network used for communication among a laptop and smartphone using Bluetooth is a a) PAN b) MAN c) LAN d) WAN
a)
153
Which of the following is not part of a combined device that brings and distributes internet to home devices? a) switch b) modem c) home network server e) router
c)
154
the fastest broadband internet service is usually a) DSL b) fiber-optic c) cable d) satellite
b)
155
Which of the following needs a cellular plan to connect to the internet wirelessly? a) wifi b) 4G c) DSL d) mobile broadband
d)
156
which is the central device to a home network? a) modem/router b) wired-connected PC c) network range extender d) network interface card
a)
157
When planning a network, which devices should be considered? a) only the computers that will have a wired connection b) just the computers and printers that will have a wired connection c) just PCs connected with a wired connection and any laptop or tablet connected wirelessly d) all devices that will connect with a wired or wireless connection
d)
158
which of the following might cause a potential problem on a wireless network? a) devices too close to the router b) interference from walls, floors, and large objects c) a router using the wifi 5 standard d) a unique password created for the network
b)
159
Which of the following would help improve a wireless signal throughout a network? a) network internet card b) access point c) network switch d) wireless router
b)
160
Which is a precaution to be taken when setting up a wireless network a) disable the passphrase b) keep the default network name c) keep the default network password d) use WPA2 encryption
d)
161
Which of the following would not be a benefit of networking computers? a) sharing an internet connection b) sharing software licenses c) sharing printers and other peripherals d) sharing files
b)
162
Bethany is in her home, watching a video she took on vacation, while her brother is playing FIFA soccer on his Xbox and her dad is checking stock quotes on his iPad. What kind of network does this family most likely have? a) client/server network b) P2P network c) both a and b d) neither a nor b
b)
163
What two devices are often combined into one device to connect the network to the internet and to share the connection between devices on the network? a) router hub and switch b) switch and hub c) router and switch d) modem and router
d)
164
Which of the following does NOT describe mobile broadband? a) 4G or 5G b) a cellular service that brings internet access to mobile devices c) a wireless hotspot d) requires a wireless ISP
d)
165
Which of the following should you NOT do to secure a wireless network? a) implement media access control b) disable SSID broadcasting c) create a security encryption passphrase d) keep the default network name and router password
d)
166
Which type of broadband internet offers connections nearing the speed of light? a) cable b) satellite c) DSL d) Fiber-optic
d)
167
What is the type of broadband Internet in which the connection is degraded by adding multiple users? a) DSL b) fiber-optic c) cable d) satellite
c)
168
Which of the following would NOT cause interference or poor connectivity between nodes on a wireless network? a) concrete walls b) a wireless extender c) some appliances d) nodes that are too far apart
b)
169
Which of the following is the most secure security protocol used with routers? a) WPA2 b) WPA c) WEP2 d) WEP
a)
170
The type of network that would be necessary to connect the networks of two college campuses would be a) LAN b) MAN c) WAN d) PAN
c)
171
Which of the following describes fiber-optic broadband? a) it uses strands of pure glass or plastic b) it connects via an orbiting satellite c) it connects with coaxial cable d) speed drops as the distance from the main signal source increases
a)
172
You can attach more than four wired devices to a network by using a switch T/F
F
173
P2P networks require specialized network OS software T/F
T
174
Actual data throughput is usually higher on wireless networks than on wired networks T/F
F
175
A network-attached storage device is like a network-connected hard drive T/F
T
176
Cat 5e and Cat 6 are types of twisted-pair cable
T
177
An analog signal is different from a digital signal because it a) is easier to transmit b) has only specific discrete values c) is easier to duplicate d) is continuous
d)
178
____ are specialized devices designed for reading e-books a) e-tablets b) e-readers c) DBDs (digital book devices) d) digitized readers
b)
179
the number of times the analog wave is measured each second when digitized music is the a) MP3 rate b) bit rate c) sampling rate d) DRM rate
c)
180
Digital cameras capture images using a) digital film b) DRM sensors c) LEDs d) charge-coupled devices arrays (CCD)
d)
181
Which of the following is TRUE about the Deep web and the dark web a) the two terms mean the same thing b) the dark web is part of the deep web c) the deep web is part of the dark web d) they are both dangerous places you should avoid
b)
182
Which of the following is considered intellectual property? a) a song b) a sculpture c) a movie d) all
d)
183
Copyright a) protects you from having others use your work b) is a term for a set of licensing plans c) legalizes unlimited copying of digital music d) all of the above
a)
184
When is posting a picture on social media considered copyright infringement a) when you don't own the copyright to the photo b) when you don't have permission from the copyright holder to post the photo c) neither A nor B d) both A and B
d)
185
Fake news is? a) illegal under US civil law b) a type of hoax c) not unethical d) not a big problem on social media
b)
186
altering a picture so that it doesn't reflect the reality of what is being shown is known as a) digital interpretation b) pixel manipulation c) digital manipulation d) digital intervention
c)
187
the combination of media, internet, entertainment, and phone services into a single device illustrates the principle of a) digital collusion b) digital cohesion c) digital combination d) digital convergence
d)
188
which of the following is an OPEN electronic publishing format a) PDF b) azw c) ePub d) SMS
c)
189
When analog data is measured and converted to a stream of numerical values, this is referred to as ____ the data a) compressing b) streamlining c) digitizing d) upstreaming
c)
190
Reducing the sampling rate when digitizing a file has which effect on the file a) it increases the file size b) it decreases the file size c) it neither increases no decreases file size d) it depends on the codec used to digitize the file
b)
191
which of the following does NOT determine the quality of a digital image a) resolution of the camera b) image sensor size c) file format and compression used d) the number of pixels in the camera lens
d)
192
which of the following is NOT a digital video file format a) MPEG-4 b) PDF c) AVI d) WMV
b)
193
Which of the following is NOT a category of intellectual property? a) Copyright b) Imprint c) Patent d) Trade dress
b)
194
Using copyrighted works without permission of the copyright holder a) is never possible b) is possible under the "fair use" doctrine c) only applies to proprietary software d) is only possible for photographs of public places
b)
195
A type of journalism where stories are invented and intended to spread misinformation rather than being factual is known as a) a public domain tale b) a persistence of information story c) fake news d) an urban legend
c)
196
it is important to maintain your online reputation a) because of the persistence of information b) because employers often review social media before hiring employees c) to ensure information about you is accurate d) all of the above
d)
197
analog signals are continuous T/F
T
198
plagiarism is technically not illegal in the united states T/F
F
199
Digital rights management (DRM) is a system of access control that allows only limited use of material T/F
T
200
copyright lasts for only 50 years in the united states T/F
F
201
Copying a music CD and giving it to a friend is "fair use" T/F
F
202
when a hacker steals personal info with the intent of impersonating another individual to commit fraud, it is known as a) impersonation theft b) identity theft c) scareware theft d) malware theft
b)
203
an attack that renders a computer unable to respond to the legitimate user because it is being bombarded with data requests is known as a ____ attack a) stealth b) backdoor c) denial-of-service d) scareware
c)
204
some spyware catches your private information by using a) a spam filter b) botnets c) a keystroke logger d) a data breach
c)
205
a series of commands that are executed without our knowledge is a typical attribute of a ____ virus a) script b) boot-sector c) time bomb d) encryption
a)
206
software that pretends your computer is infected with a virus to entice you into spending money on a solution is known as a) trackingware b) spyware c) adware d) scareware
d)
207
firewalls work by closing ____ in your computer a) software gap b) logical ports c) logical doors d) backdoors
b)
208
antivirus software looks for ____ to detect viruses in files a) virus signature b) virus artifacts c) virus bots d) virus CPNs
a)
209
____ involve using a physical attribute such as a fingerprint for authentication a) backdoors b) biometrics c) rootkits d) trojan horses
b)
210
when you are surfing the web anonymously a) the sites you visit are not stored in the browser history b) temporary files created are immediately deleted c) you are using a browser that has privacy tools d) all of the above
d)
211
once you encrypt your SD card, those files a) are illegal b) are compressed and can be stored in less space c) cannot be read if the SD card is put in another phone d) are backed up
c)
212
when someone uses your personal info to pose as you this is a) identity theft b) white-hat hacking c) cybersecurity d) a backdoor rootkit
a)
213
viruses that load from USB drives left connected to computers when computers are turned on are known as a) script viruses b) polymorphic viruses c) encryption viruses d) boot-sector viruses
d)
214
a packet analyzer is called a sniffer because a) it filters out spam b) it starts a denial-of-service attack c) it captures and reads data inside each packet d) it detects high-speed transmissions
c)
215
computer viruses can be spread by a) sharing the flash drive b) downloading and running a file attached to an email c) downloading a song from a peer-to-peer sharing site d) all of the above
d)
216
A ___ is a program that takes complete control of your computer without your knowledge a) botnet b) rootkit c) VPN d) sniffer
b)
217
a backup of all the data files on your computer can be managed easily using the windows 10 ____ utility a) windows defender b) file history c) windows update d) recovery
b)
218
authentication techniques that rely on personal biological traits are called a) trojan horses b) scanner c) botnets d) biometrics
d)
219
a surge protector may look like just another power strip but it also can a) detect viruses b) prevent theft c) save your device if a voltage spike is sent through the electrical system d) help manage heat
c)
220
firewalls use a process of _____ to assign IP addresses to the devices internal to the network so hackers will not know what they are a) packet filtering b) port blocking c) VPN d) network address translation (NAT)
d)
221
a 32-character password is an example of using biometrics T/F
F
222
your social security number should never be shared on a website, in an email, or through messaging T/F
T
223
Sending emails to lure people into revealing personal info is a technique known as phishing T/F
T
224
encrypting data is not an appropriate measure for mobile devices such as smartphones T/F
F
225
virtual private networks make it just as secure to send info across a public network as it is on a secure private network T/F
T
226
custom-built mini-programs that can execute a complicated series of commands in a tool like Microsoft Word or excel are called a) executables b) compilers c) macros d) debuggers
c)
227
a flow chart is used for a) visually documenting an algorithm b) locating runtime errors in code c) developing the relationships between classes d) compiling source code
a)
228
the life cycle of a program begins with describing a problem and making a plan. Then PDLC requires a) an algorithm b) process, input, and output c) data, info, and method d) coding, debugging, and testing
c)
229
in object-oriented analysis, classes are defined by a) objects and data b) operators and objects c) data and methods d) behaviors and keywords
c)
230
compiling a program turns a) top-down design into object-oriented design b) source code into an executable program c) a first-generation; language into a fourth-generation language d) none of the above
b)
231
Rapid application development (RAD) encourages developers to a) use an integrated debugging environment b) write code in visual programming languages c) create code that executes as fast as possible d) create a prototype first during the development of a system
d)
232
selecting the right programming language for a project depends on a) who you have working for you and what they know b) the final requirement for performance and space used c) the environment of the finished project d) all of the above
d)
233
which is NOT an advantage of Java? a) Java is architecture neutral b) Java needs to compile only once prior to distribution c) Java performs faster than C++ d) Java supports network communication
c)
234
Which is TRUE about XML? a) XML supports the development of rich multimedia b) XML enables designers to define their own data-based tags c) XML makes it possible to update web pages without refreshing d) XML has classes that represent drop-down lists and other web elements
b)
235
There is no one "perfect" language for programming because a) visual programming is more elegant b) programmers enjoy learning many different languages c) it's easier to maintain a software system if it uses many different languages d) forcing a language to be general-purpose also forces it to become inefficient
d)
236
You need to know how to program to a) create animations in PowerPoint b) create unique software solutions for specialized problems c) use Microsoft Word to type text and select various fonts d) open a template file for budgeting in Microsoft Excel
b)
237
What is the first step of the SDLC? a) design b) analysis c) development d) problem identification
d)
238
The steps of the program development life cycle start with a) algorithm development b) coding c) describing the problem d) testing
c)
239
The first step when using the object-oriented design is to a) identify all of the categories of inputs that are part of the problem b) break down the problem into a series of high-level tasks c) identify which control structures are needed d) select the data types that need to be used to solve the problem
a)
240
An IDE is a tool that has support for a) editing and debugging b) flowcharting and creating the project specification c) releasing updates to the public d) scope creep
a)
241
Which of the following are common to all programming languages? a) Architecture neutrality b) Syntax, keywords, and operators c) SDLC and PDLC d) JSON and APIs
b)
242
In selecting the most appropriate language it is useful to know a) how quickly the final code must run b) how much space the final cod delivered can occupy c) if there is a specific target environment (say, a specific OS) d) all of the above
d)
243
Java is considered to be ARCHITECTURE NEUTRAL because it a) can be recompiled to run on many CPUs b) can run on many different generations of Windows c) only needs to be compiled once and can run on many different CPUs d) can run in any browser
c)
244
The database programming language SQL stands for a) Structured question Lingo b) Structured Query Language c) Selected Query Launch d) Simple Quick Language
b)
245
A logical error can be detected and repaired by the compiler T/F
F
246
An RTM version of the software is often released so users can help debug it T/F
F
247
AJAX allows you to create websites that can refresh without the user taking an action T/F
T
248
Their-generation programming languages include Java, C, and FORTRAN T/F
F
249
many programming languages are moving away from the object-oriented paradigm T/F
F
250
two lists showing different values for the same data in different places of a database is an example of a) data redundancy b) data disparity c) data irregularity d) data inconsistency
d)
251
which of the following is a TRUE statement when considering using relational databases instead of flat databases a) data can be easily shared among users b) data-entry errors can be minimized with databases c) data integrity can be ensured with a database d) all of the above
d)
252
Which type of relationship should be used to connect a password table to a user account table? a) one-to-many relationship b) one-to-one relationship c) many-to-many relationship d) one-to-noe relationship
b)
253
Which type of database organizes data by measure and feature attributes? a) multidimensional database b) relational database c) object-oriented database d) all of the above
a)
254
The field that has a unique entry for each record in a database table is called a) foreign key b) logical key c) primary key d) master field
c)
255
Which best describes a data warehouse? a) a building that stores computer servers b) a collection of all the data from an organization's database c) a software program that assists with file management d) a database that organizes data from multiple organizations
d)
256
After data has been extracted and transformed it is held in an intermediate storage area called a) a transaction processing center b) an online analytical processing area c) data staging d) a data scrubbing area
c)
257
The process by which great amounts of data are analyzed and investigated is known as a) clustering b) data staging c) online analytical processing d) data mining
d)
258
a system that is designed to help keep track of everyday business activities is a a) transaction-processing system b) management information system c) decision support system d) enterprise resource planning system
a)
259
Natural language processing systems, artificial intelligence, and expert systems are all types of which larger type of database system a) business intelligence system b) decision support system c) knowledge-base system d) voice management system
c)
260
When is a flat database sufficient to use when organizing data? a) When the data needs to be organized into two or more tables b) When the data is simple and can be organized in one table c) When more than one person needs to access the data d) When the data includes video and audio
b)
261
A customer information table linked to a password table in a business database reflects which type of relationship? a) one-to-many b) many-to-one c) many-to-many d) one-to-one
a) customer can have more than one password
262
A process to ensure that data in a database is organized most efficiently is called a) centralization b) data staging c) normalization d) integration
c)
263
which of the following is NOT considered metadata? a) data type b) database name c) field name d) field size
b)
264
Data captured as users navigate through a website is called a) staged data b) web-user data c) time-variant data d) clickstream data
d)
265
The type of database that would be best to store and organize data with feature and measure attributes is which of the follows a) object-oriented database b) relational database c) multidimensional database d) knowledge-based database
a)
266
Which of the following is used to create a subset of data that matches certain criteria and that can be saved for future reference or use? a) relationship b) query c) request d) filter
d)
267
Unnecessary duplication of data in a database is referred to as a) data redundancy b) normalized data c) validated data d) data inconsistency
a)
268
Which of the following is a method of inputting data into a transaction-processing system while the transaction is taking place? a) batch processing b) input processing c) real-time processing d) click data processing
c)
269
a field labeled PHONE that accepts data such as (610) 555-1212 would use the Number of data types T/F
F
270
A filter is used to create a temporary subset of data from a database T/F
T
271
A small slice of a data warehouse is called a data mine T/F
F
272
Data warehouses capture data only form one time period T/F
F
273
A primary key is used to uniquely identify records T/F
T
274
which of the following is NOT an advantage of installing a network in a business? a) enables peripheral sharing b) decentralization of files and data c) enables software sharing d) centralization of files and data
b)
275
Why aren't the client/server network usually installed in the home? a) security is weaker on client/server networks than on P2P networks b) Client/server networks aren't scalable enough for home networks c) client/server networks are too complex for most home networks d) client/server networks can't share peripherals
c)
276
A network consisting of nodes covering a small geographic area is a a) PAN b) WAN c) MAN d) LAN
d)
277
A ____ server is a repository for shared computer programs accessed by client computers a) authentication b) database c) communications d) application
d)
278
A ____ is a set of rules for exchanging communications a) blueprint b) domain c) topology d) protocol
d)
279
Fiber-optic cable most likely would be used in a business network when a) saving money is more important than speed b) the installation budget is very limited c) very short cable runs are required d) electrical or magnetic interference is present
d)
280
Network adapters use ___ addresses to route data on an internal network a) IP b) authentication c) MAC d) data collision
c)
281
On client/server networks, routers a) transfer data between two networks b) move data efficiently from node to node on the internal network c) route data between two collision domain on a single network d) are necessary only in networks using the ring topology
a)
282
NOS software is needed a) only if a communications server is deployed on a client/server network b) only on the servers in a client/server network c) on all computers in a client/server network d) only when configuration a network in a star topology
c)
283
Which of the following is NOT used to increase security on a client/server network? a) firewall b) bastion host c) switch d) screening router
c)
284
Which of the following is an advantage of installing a client/server network in a business? a) centralization of network adapters b) decentralization of peripherals c) decentralization of files and data d) sharing of peripherals
a)
285
on client/server networks, more users can be added without affecting the performance of other nodes. This is known as network a) scalability b) decentralization c) topology d) flexibility
a)
286
Which server would a client/server network include to ensure only authorized users are logging onto the network? a) cloud b) communications c) authentication d) application
c)
287
Which of the following is a private network set up by a business that's used exclusively by a select group of employees and suppliers? a) WAN b) VPN c) PAN d) intranet
d)
288
Sometimes groups of data packets are sent together in a package called a a) protocol b) bridge c) MAC d) frame
d)
289
Which of the following is NOT one of the factors used in multi-factor authentication? a) inherence b) identity c) possession d) knowledge
b)
290
Which network cable type is most susceptible to signal interference? a) UTP b) STP c) Coaxial d) Fiber-optic
a)
291
The process whereby users prove they have the authorization to use a computer network is known as a) authentication b) decentralization c) proxy control d) repudiation
a)
292
Which is NOT a key component of a typical client/server network? a) transmission media b) network navigation devices c) network interface card d) bastion host
d)
293
Routers are used to send data on a specific route through an internal network T/F
F
294
An authentication server is used to host websites on a client/server network T/F
F
295
Network adapters perform specific tasks to enable nodes to communicate on a network T/F
T
296
most modern OS includes some type of NOS functionality T/F
T
297
star topologies are the most widely used topology
T
298
The internet is managed by a) the US government b) one one c) the national science foundation d) several nonprofit organizations
d)
299
In the client/server model, clients are phones or computers and servers are computers a) with software allowing you to make purchases b) hosting web pages c) that are storehouses for files d) any of the above
d)
300
Packet switching sends information between two points a) by finding one route between the two points and sending the data b) by breaking it into small chunks and sending the chunks across different routes c) by encrypting the data, then sending it d) differently for each company using it
b)
301
the rise of the internet of things has meant a) we need longer IP addresses than are available in IPv4 b) there are more machines with wireless network adapters c) light bulbs can join your wifi network at home d) all of the above
d)
302
the section of your hard drive that stores frequently accessed web pages and IP addresses is the a) internet cache b) DNS c) XML d) root directory
a)
303
JSON, JavaScript Object Notions, is useful because it a) allows web services to exchange information b) uses OpenPGP to encrypt data c) makes the document Object Model usable in HTML d) in hexadecimal codes that execute quickly on computers
a)
304
Cascading style sheets allow you to quickly change a) from server-side processing to client-side processing b) the rules for applying formatting to an HTML document c) to a more secure transport protocol d) from HTML to XML
b)
305
JavaScript a) is the same language as Java b) is commonly used to make HTML documents more dynamic c) is obsolete d) provides high-level security for email
b)
306
A server-side program a) lives on the user's computer b) is a combination of HTML and secure sockets layer (SSL) c) can require many different communication sessions between client-server d) defines every item on a web page
b)
307
a key pair is a set of two keys you use to a) encrypt and decrypt an email message b) open doors into websites so you can pass through a firewall c) execute a CSS script d) attach a photo to an email message
a)
308
the internet is primarily funded by a) your state income taxes b) voluntary contributions c) your federal income taxes d) google
c)
309
The collection of large national and international networks used to establish the internet is called the a) internet backbone b) highway system c) OC d) T1
a)
310
The info in a data packet includes a) the data and circuit identifier b) the data and the destination c) just the data d) different types of info depending on the type of message being sent
b) just like an amazon package
311
IPv6 uses 128 bits to assign a a) data packet to each transmission b) memory address to the CPU c) destination internet address to each email d) address to every device connected to the internet
d)
312
HTTPS is different than HTTP because a) of how it transforms or reformates the data b) it extracts data from the source database c) it is a combination of HTTP and the Secure Sockets Layer (SSL) d) it stores data in the data warehouse
c)
313
A private key is important a) to reboot system hardware b) to reset your public key if you lose a password c) because it enables you to use MIME d) to decode an encrypted message
d)
314
Encryption is used to a) shrink the amounts of space it takes to store email b) code your email so only one person can decipher it c) transfer email more quickly d) make shopping on the internet more available
b)
315
An applet is a) a program distributed by Apple Inc b) a small app located on a server computer c) a hardware device that encrypts email messages d) a programming language used to help create a dynamic web page
b)
316
SMTP is the set of rules used to a) shrink the amount of space it takes to store email b) send an email along the internet to its destination c) encrypt email messages d) make shopping on the internet more avaliable
b)
317
the set of instructions that define how to display the HTML elements in your site is a) XML b) CSS c) AJAX d) PHP
b)
318
If you use an internet cache, then the info displayed in your browser is automatically refreshed T/F
F
319
Your internet service provider has a default DNS server to translate a URL into an IP address
T
320
IM is secure because of the type of encryption used
F
321
MIME is the protocol that supports sending files as email attachments T/F
T
322
The term 'dotted quad' means you have four dots in a row in your Java Source code T/F
F