Electronic components in computers process data using instructions on how to perform a
task. True False 2. An all-in-one device contains a separate tower True False 3. Smartphones typically communicate wirelessly with other devices or computers True False 4. Information is a collection of unprocessed items such as text,numbers, images, audio, and video True False 5. A headset is a type of input device True False 6. A scanner is a light-sensing output device True False 7. Data and instructions in most memory are erased when the computer is turned off True False 8. A solid-state drive contains circular platters to store data, instructions, and information True False 9. The terms, world wide web and Internet, are interchangeable True False 10. One way to protect your computer from malware is to scan any removable media before using it True False 11. Operating systems are a widely recognized example of system software True False 12. You usually do not need to install web apps before you can run them True False 13. A(n) ... is a hardware component that allows you to enter data and instructions into a computer output device communication device input device storage device 14. Which of the following is NOT an example of an output device? Scanner Printer Monitor Speaker 15. ..... consists of electronic components that store data and instructions waiting to be executed Storage Cloud Solid-state drives Memory 16. ..... is an Internet service that provides remote storage to computer users Smart TV Cloud storage Solid-state drive Bluetooth 17. A computer that delivers requested webpages to your computer or mobile device is a(n) ..... VoIP computer web server FTP device hard drive 18. A ... is software that enables users with an Internet connection to view webpages on a computer search engine wiki browser digital media player 19. ..... uses short-range radio signals to enable devices to communicate with each other Cellular radio Bluetooth Wi-Fi Hotspot 20. A ... is a collaborative website that allows user to create, add, modify, or delete the content podcast blog social network wiki 21. No single person or government agency controls or owns the Internet True False 22. The W3C is responsible for maintaining all networks and content on the Internet True False 23. Users may pay additional fees for mobile hot spot and tethering services True False 24. A gigabyte (GB) is the basic storage unit on a computer and represents a single character True False 25. A dynamic webpage’s contents generate each time a user displays the page True False 26. Most browsers are available for download at no cost True False 27. Mobile apps sometimes have fewer features than a web app True False 28. A subject directory is software that finds information related to a specific topic True False 29. When you post digital content online, it is a good idea to tag it so that it is easy to locate True False 30. The term, blogosphere, refers to the worldwide collection of blogs True False 31. Tethering transfers data but allows users to access and use a file while it is transmitting True False 32. One way to protect from identity theft online is to retain all your cookies in your browser True False 33. A(n) ... is any computer that provides services and connections to other computers on a network server client FTP site subject directory 34. ... is a sequence of numbers that identifies the location of computer connected to the Internet Internet backbone domain name IP address ccTLD 35. You register a domain name through .....; an organization that sells and manages domain names a cybersquatter a registrar ICANN an ISP 36. .... is the method the Internet uses to store domain names and their corresponding IP addresses Domain Name System (DNS) Top-level domain (TLD) File Transfer Protocol (FTP) W3C 37. To protect your identity while browsing, use ..... which screens all your in and out messages password anonymous FTP phishing filter proxy server 38. ..... is a set of rules that defines how webpages transfer on the Internet Top-level domain Hypertext Transfer Protocol IPv4 Web 2.0 39. ... website contain factual material, like libraries, dictionaries and other types of reference Wikis and collaboration Media sharing Business Informational and research 40. A ... is a website that offer a variety of Internet services from a single, convenient location LISTSERV microblog portal cache 41. Application software serves as the interface between the user, the apps, and the hardware True False 42. While a computer or mobile device is running, the operating system remains in memory True False 43. Open source software is mass-produced, copyrighted software that meets the needs of most users True False 44. Seek websites with ratings and reviews of product before downloading for shareware and freeware True False 45. With web apps, you always access the latest version of the software True False 46. With database software, users run functions to retrieve data True False 47. Software suites offer three major advantages: lower cost, ease of use, and integration True False 48. A PDF file can be viewed and printed without the software that created the original document True False 49. The military and airlines use CBT simulations to train pilots to fly in various environments True False 50. A router also can function as a hardware firewall True False 51. A worm is a destructive program disguised as a real program True False 52. Cookies typically are considered a type of spyware True False 53. ..... software performs functions specific to a business or industry Retail Open source Shareware Custom 54. A(n) ..... is the right to use a program or app license agreement product activation software registration automatic update 55. ..... is an application that allows users to organize data and perform calculations on the data Spreadsheet Database Presentation Document management 56. ..... is an application that assists designers in creating engineering, and scientific models Enterprise software CAD software Public-domain software A software suite 57. The term ..... refers to removing unwanted areas of a photo crop snip compress shrink 58. ..... is a device to stop network intrusions before attempt to affect your network maliciously anti-spam program pop-up blocker hardware firewall quarantine drive 59. ..... is a small text file that a web server stores on your computer A pop-up blocker A cookie Adware Spyware 60. Which of the following is not the function of a photo editing application? Adjust contrast Adjust sharpness Organize data in columns and rows Remove red-eye 61. The motherboard also is called a system board True False 62. On a personal computer, all functions of the processor usually are on a single chip True False 63. A dual-core processor doubles the processing speed of a single-core processor True False 64. In general, multi-core processors are less energy efficient than separate multiple processors True False 65. The system clock keeps track of the date and time in a computer True False 66. In cloud computing, the back end consists of the servers and storage that store the resources True False 67. In the binary system, the digit 1 represents the absence of an electronic charge True False 68. Most RAM is nonvolatile True False 69. The CPU interprets and executes an instruction while the program or application is in memory True False 70. ROM chips also are called firmware True False 71. As with processors, manufacturers state the clock speed for a bus in hertz True False 72. The power supply converts the wall outlet AC power into DC power True False 73. The ..... is the main circuit board of the computer ALU CPU motherboard system chassis 74. A ..... is a single chip with two or more separate processor cores transistor multi-core processor resistor capacitor 75. ..... include basic calculations such as addition, subtraction, multiplication, and division Arithmetic operations Comparison operations Machine cycles Transistors 76. In the machine cycle, the .... operation obtains a program instruction or data item from memory fetching decoding executing storing 77. ..... describes a computing environment where everyday objects are connected to the Internet IoT DaaS IaaS ASCII 78. ... allows developers to create and run solutions on cloud without buying the hardware/software DaaS IaaS SaaS PaaS 79. ..... are applications that incorporate data from multiple providers into a new application Plug and Play apps Firmware Mashups DDR2s 80. ..... enhances the functions of a desktop and/or provides connections to peripheral devices expansion slot USB adapter front side bus adapter card 81. CAPS LOCK and NUM LOCK are two examples of toggle keys True False 82. Keylogging software runs undetected and stores every keystroke in a file for later retrieval True False 83. Wearable devices mainly rely upon touch input True False 84. A smaller frame rate results in a smaller file size for a video, as well as a smoother playback True False 85. OCR and OMR are two technologies used by QR code readers True False 86. Many retailers do not believe RFID is alternative to bar code because it requires line- of-sight True False 87. A data collection device reads and scans data from a source document True False 88. In terms of response time, the lower the number, the faster the response time True False 89. Contrast ratio defines a display’s width relative to its height True False 90. Every electronic device emits some level of radiation True False 91. Printer resolution is measured by the number of pixels per inch a printer can print True False 92. A dye-sublimation printer uses heat to transfer colored dye to specially coated paper True False 93. A .... is an instruction a user issues by responding to a message displayed by a program or app command user response keyboard shortcut function 94. Which of the following is NOT an example of a pointing device? touchpad trackball touch screen pointing stick 95. ..... is an input device that contains buttons and/or wheels you operate with a thumb or finger digitizer interactive whiteboard touch-sensitive pad OCR device 96. ..... read hand-drawn marks, such as small circles or rectangles MICR readers Digitizers OMR devices OCR devices 97. LCD using .... uses a separate transistor to supply charges to each liquid crystal cell passive-matrix OLED Retina Display active-matrix 98. ..... displays use organic molecules that are self-illuminating thus do not require a backlight OLED TFT LED CCFL 99. ..... orientation refers to a printout that is wider than it is tall Cinematic Portrait Landscape Widescreen 100. How many sub-woofers would a 7.2 speaker system contain? 1 2 7 9 101. Storage devices can be categorized as input or output devices True False 102. Storage medium is volatile. Items stored on it remain intact even when you turn off the power True False 103. Compared with the access time of memory, the access time of storage devices is slow True False 104. On storage media, a higher density means less storage capacity True False 105. Because of current standards, head crashes no longer occur True False 106. The access time of a hard disk can be more than 100 times faster than an SSD True False 107. Encrypted files offer greater security but require more time to open and access the files True False 108. Each program may use a different method of encrypting files but all use process of cryptography True False 109. With serial transfers, data is sent one bit at a time True False 110. When you are finished using a USB flash drive, simply remove it from the USB port True False 111. Mini discs require a separate mini disc drive and do not work in standard optical disc drives True False 112. An active RFID tag contains a battery that runs the chip’s circuit and can be embedded in skin True False 113. ... measures the amount of time it takes a storage device to locate an item on a storage medium RPMs Transfer time Access time Clock speed 114. ..... contains inflexible, circular platters that use magnetic particles to store information Hard disk SSD USB flash drive Optical disc 115. Which of the following is NOT an advantage of SSDs over hard disks? faster transfer time lighter weight more durable higher storage capacity 116. A group of two or more integrated hard drives is called a(n) ..... RAID SSD HDD EIDE 117. A disc you can read but not write on or erase is a ..... CD-RW CD-ROM multisession WORM 118. Process of copying audio or video data from a purchased disc and saving on own media is called ripping burning tearing formatting 119. Enterprise storage uses ... technology to connects to the network because it's faster than SCSI SAS serial transfer Fibre Channel SATA 120. A selective backup sometimes is called a(n) ... backup differential incremental partial archival 121. All types of computers serve as sending and receiving devices in a communications system. True False 122. Files on an intranet also are accessible from the Internet. True False 123. Disadvantages of BANs include data validity and security. True False 124. A client computer sometimes is called a host computer. True False 125. Voice and video calling require large amounts of bandwidth. True False 126. UWB requires line-of-sight transmission, so its technology is not as widespread as IrDA. True False 127. Successful communications with NFC devices must touch or be placed within two of each other. True False 128. DSL transmits on existing standard copper phone wiring. True False 129. Large corporations, phone networks, and other networks with large amounts of traffic use DSL. True False 130. A modem is a communications device that converts signals for data to travel along a phone line. True False 131. The performance of the router may decline as you add more connected devices. True False 132. With satellite Internet, uplink transmissions usually are slower than downlink transmissions. True False 133. For successful communications, you need all of the following except a ... sending device transponder communications channel receiving device 134. A(n) ... is an internal network that uses Internet technologies. router extranet intranet communications channel 135. A ... is a network that connects computers and devices in an individual’s workspace. LAN PAN BAN WAN 136. A(n) ... network is a simple, inexpensive network that connects fewer than 10 computers. protocol WAN extranet P2P 137. A ... is a special series of bits that functions like a ticket. packet Bluebug token host 138. ..... occurs when cyberthieves exploit Bluetooth devices that have been paired. Bluebugging IP hijacking Capping Throttling 139. Which of the following is not a digital dedicated line? NFC ISDN FTTP T-carrier lines 140. ..... used by some ISPs that provides a certain amount of data usage at the optimal speed. Bluebugging IP hijacking Capping Throttling 141. In a data hierarchy, each higher level of data contains one or more items from the lower level. True False 142. A check digit often confirms the accuracy of a primary key value. True False 143. In a typical database system, each department within an organization has its own set of files. True False 144. In a file processing system, duplicated data can increase the chance of errors. True False 145. Many programs today use forms on a webpage as their front end. True False 146. File processing systems require more memory, storage, and processing power than a database. True False 147. To retrieve or select data in a database, you query it. True False 148. Unlike a form, you use a report writer only to retrieve data. True False 149. To secure a database is to allow only administrators to have access to create and delete tables True False 150. In a rollforward, the DBMS uses the log to undo any changes made to the database True False 151. Gantt chart are more suited than PERT chart for planning and scheduling large, complex projects True False 152. The planning phase begins when the steering committee receives a project request. True False 153. A(n) ..... check tests data in two or more fields to ensure that the relationship is logical completeness consistency range alphabetic 154. Which of the following is not an advantage of a database approach? data integrity reduced data redundancy shared data requires less memory, storage, and processing power 155. A ..... defines how users view the organization of data in a database data dictionary data mart data model report writer 156. A(n) ..... database stores data in tables that consist of rows and columns. object-oriented multidimensional relational distributed 157. A _____ contains data about each file in the database and each field in those files. query form data dictionary data mart 158. Which of the following is not a phase in the SDLC? planning analysis implementation converting 159. ..... feasibility measures whether the established deadlines for the project are reasonable Operational Technical Economic Schedule 160. A(n) ..... test to verify that all programs in an application work together properly. unit systems integration acceptance 161. Accessible information has meaning to the person who receives it. True False 162. An enterprise consists of a wide variety of departments collectively known as functional units True False 163. CMS are popular in large part because of their ease of use and need minimal technical skills True False 164. Licensed software owner can make multiple copies of software for back up or to share with other True False 165. Good practice to back up and wipe all data before turning over computer to computer technician. True False 166. With third-party extended warranties, it is easier to obtain quick service for your device True False 167. Educational level for helpdesk specialist are more stringent than other careers in the IT field True False 168. Apps made for a specific mobile device will work on any other device without any modification. True False 169. Like native apps, hybrid apps are developed for specific platforms and deployed to an app store True False 170. Most professionals have the exp and skill set to take a certification exam without preparation True False 171. Data analysis certification focus on discovery, collection and analysis of evidence on computer True False 172. Employers often use social media to determine if a candidate would fit into the company culture True False 173. ..... information is arranged to suit the needs of the decision maker. Verifiable Organized Timely Cost-effective 174. A(n) ..... allows for storage and management of a company’s documents. CMS MRP II DMS ERP 175. With ....., the computer processes each transaction as it is entered. batch processing inference rules rooting online transaction processing 176. A(n) ..... report consolidates data usually with totals, tables, or graphs. detailed summary exception criteria 177. In expert system, the .... is the combined subject knowledge and experience of the human expert inference rules artificial intelligence (AI) decision support system knowledge base 178. Which of the following skills is not necessary for technology salespeople? a general understanding of technology specific knowledge of the product they are selling testing internal components strong people skills 179. A(n) ..... is written for mobile devices running a particular mobile phone operating system. native app hybrid app DSS expert system 180. If you are interested in developing application, you also may benefit from certification in ... hardware operating system networking and web design CISSP