CGS FINAL

which of the following software is not usually included by an installed operating sytem
spreadsheet
which of the following style of tablet does not contain a physical keyboard
slate
which of the following is a colllection of unprocessed items which can include text, images, etx
data
Which of the following is a collection of computers and devices connected together
network
which of the following is a specification that enables web content to be distributed to subscribers
RSS
which of the following is not an example of malware
vaporware
collections, such as that pictured in the accompanying figure, allow computers to share.
resources
Which of the following is the term known for a specific pattern of viruses
virus signatures
What term is used to illustrate the gap between those with and those without access to technology
digital divide
what consists of a series of related instructions that tells the computer what tasks to perform them
software
what kind of desktop uses the same case to house the screen and processing circuitry
all in one
you interact with a program through which of the following, thereby controlling how you enter data and instructions and how information is displayed on the screen
user interface
which of the following is the spelling, disk, used
magnetic media
Most e-commerce actually takes place between businesses. What is this called?
business to business commerce
which of the following is equivalent to app. one million characters
megabyte
Which of the following is a computer that allows users to upload and/or download files using FTP?
ftp server
Which of the following is the use of computers to simulate a real or imagined environment that appears as three-dimensional (3-D) space?
VR
What is the descriptor for a filter that warns or blocks you from potentially fraudulent or suspicious websites?
phishing
Which of the following communicates with a satellite dish to provide high-speed Internet connections via satellite?
satellite modem
what separates the components of a domain name
periods
which of the following is a program that extends the capability of a browser
plug in
Which of the following
high-speed Internet connections use an antenna on a house or business to communicate with a tower location via radio signals?
fixed wireless
Which of the following is
true of VoIP?
.It uses a slow speed dial-up connection.
B.It uses the public switched telephone network.
C.Skype is an example of VoIP software.
D.All of the above.
D.All of the above.
which of the following is a technology that provides high-speed internet connection using a telephone network
DSL
Which of the following allows access to high-speed Internet services through the cable television network?
cable modem
Which of the following defines FTP sites at which anyone can transfer some, if not all, available files?
anonymous
Which of the following is a website like the one in the accompanying figure that offers a variety of Internet services from a single, convenient location? (MSN)
portal
Which of the following is a business that provides individuals and companies access to the Internet for free or for a fee?
access provider
what is the app. data usage for sending and receiving 100 messages with no attatchments
.3-6mb
Which of the following is the development and maintenance of webpages?
web publishing
The Internet has its roots in a network that became functional in 1969, linking scientific and academic researchers across the United States. What was the name of that network?
ARPANET
What is the descriptor for a filter that warns or blocks you from potentially fraudulent or suspicious websites?
phishing
What kind of server is another computer that screens all your incoming and outgoing messages?
proxy
Which of the following oversees research for the internet?
World Wide Web Consortium (W3C)
how many peripheral devices can you connect with a usb port
up to 127
Which of the following are capable of processing many trillions of instructions in a single second?
supercomputers
Short text messages sent via a text message service are typically fewer than how many characters?
300
If a POS terminal is able to update inventory at geographically separate locations, what is the term for this ability?
internet capable
Which of the following occurs when the incoming electrical supply or voltage increases, often defined as more than five percent, above the normal volts?
undervoltage
what is the term for the smallest element in an electronic image
pixel
Which of the following do most major corporations use for business activities like billing millions of customers, preparing payroll for thousands of employees, and managing millions of items in inventory?
mainframes
The video clips that users of video message services send are typically how long?
30 seconds
Which of the following is NOT a type of kiosk?
media
Which of the following is the practice of sharing computing resources, such as servers, like those in the accompanying figure?
virtualization
what percent of e waste is recylced
20%
which of the following are the fastest, most powerful computers – and the most expensive
supercomputers
if a POS terminal is able to update inventory at geographically seperate locations, what is the term for this ability
internet capable
Which of the following exists in the form of a single circuit board?
blade server
Which of the following kinds of UPS runs off a battery?
online ups
which of the following is housed in a bay within a metal frame
rack server
What is the electronic component that interprets and carries out the basic instructions that operate the computer?
processor
Which of the following is an external device that provides connections to peripheral devices through ports built into the device?
port replicator
Which of the following are large, expensive, powerful computers that can handle hundreds or thousands of connected users simultaneously and store tremendous amounts of data, instructions, and information?
mainframes
Which of the following is a four- or five-digit number assigned to a specific content or mobile service provider, for example, to vote for a television program contestant or donate to a charity?
CSC
It is estimated by one publisher that, on average, libraries replace a print book after how many checkouts?
26
Which of the following is a collection of individual programs sold as a unit
software suite
Which of the following kinds of programs displays an online advertisement in a banner or pop-up window on webpages, email, or other Internet service?
adware
Many worksheet cells like those in the accompanying figure contain a number that can be used in a calculation. What is the name for this?
value
Designers and graphic artists can print finished publications on a color printer, take them to a professional printer, or post them on the web in a format that can be viewed by those without what kind of software?
DTP
Which of the following programs allow designers to rotate designs of 3-D objects to view them from any angle?
CAD
Which of the following warns that the computer is infected and needs immediate attention?
virus hoax
A single point as shown in the accompanying figure is about what fraction of an inch in height?
1/72
Which of the following is a request for specific data from a database?
query
Which of the following is a scam in which a perpetrator sends an official looking e-mail that attempts to obtain a user’s personal and financial information?
phishing
An alternative to e-mail filtering is to purchase which of the following kinds of program that attempts to remove a message before it reaches a user’s inbox?
anti spam
What kind of software helps users of all skill levels create web pages that include graphics, video, audio, animation, and other special effects?
website authoring
Which of the following is a utility that detects and protects a computer from unauthorized intrusions?
personal firewall
Which of the following kinds of software is software that enables professional designers to create sophisticated documents that contain text, graphics, and many colors?
DTP
Which of the following kinds of malware is a malicious mobile app that uses a variety of fraudulent schemes to charge unsuspecting users for premium messaging services?
toll fraud
What is the term for a square-shaped coded graphic that corresponds to a web address or other information?
QR Code
What kind of software consists of programs designed to make users more productive and/or assist them with personal tasks?
application
What kind of software allows users to combine text, graphics, audio, video, and animation into an interactive application?
multimedia authoring
Which of the following is, as shown in the accompanying figure, a small text file that a web server stores on a user’s computer?
cookie
One study found that a certain percentage of wireless connections like the kind in the accompanying figure are unsecured, leaving them susceptible to hackers. What was that percentage?
25%
Which kind of license is a legal agreement that allows multiple users to access the software on the server simultaneously?
network
Which of the following is a federally funded Internet security research and development center?
CERT/CC
In which particularly devastating type of DoS attack are multiple unsuspecting computers used to attack multiple computer networks?
Distributed
Which of the following replaces each character in the plaintext with a different letter by shifting the alphabet a certain number of positions?
caesar cipher
Which law states that it is not illegal to intercept or access an electronic communication made through an electronic communication system that is configured so that such electronic communication is readily accessible to the general public?
Electronic Communication Privacy Act
internet advertising firms often use which of the following to collect information about users web browsing habits
spyware
which of the following is a scam in which a perpetrator sends an official looking email that attempts to obtain a user’s personal and financial information?
phishing
which of the following laws provides the same protection that covers mail and telephone communications to electronic communications such as voice mail
Electronic Communications Privacy Act
Which encryption algotrithm inserts characters between existing characters
expansion
which of the following is someone who demands payment in order to stop an attack on an organizations technology infrastructure
cyber extortionist
Which of the following is a federally funded internet security research and development center
CERT/CC
Which of the following provides the mobile user with a secure connection to the company network server
VPN
Which of the following is a case on a desktop that contains and protects the item shown in the accompanying figure and other electronic components
system unit
which of the following allows the processor to communicate with peripheral devices
expansion bus
which of the following is a small piece of semiconducting material, usually silicon on which integrated circuits are etched
computer chip
in the accompanying picture, what on the motherboard holds the memory modules
memory slots
which of the following interprets and carries out basic instructions that operate a computer
CPU
Which of the following is a kind of ROM chip that contains permanently written data, instructions, or information that is recorded when the chip is manufactured
firmware
which of the following is a register function
storing the location from where an instruction was fetched
Double data rate SDRAM (DDR SDRAM) chips are even faster than SDRM chips because which of the following is true
they transfer data twice for each cycle
as shown in the accompanying picture, which of the following kinds of card is a circuit board that enhances functions of a component system and or provides connections to peripherals
adapter
which of the following is the component of the processor that performs arithmetic, comparison, and other operations
ALU
what is the unit of measurement for the clock speed for the channel shown in the accompanying figure
hertz
which of the following is another term for the system unit
chassis
some computer and chip manufacturers use which of the following terms to refer to a personal computer processor chip
microproccesor
Which of the following refers to the right of individuals and companies to deny or restrict the collection and use of information about them?
information privacy
Websites use which of the following to keep track of items in a user’s shopping cart?
session cookie
What is another name for public key encryption?
assymetric key encryption
Which of the following are used to record, save, an then execute a set of keystrokes and instructions repeatedly?
macros
which of the following is a duplicate file, program, or disk that can be used if the original is lost, damaged, or destroyed
backup
How much do fingerprint readers typically cost?
less than 100
how long can digital certificates be valid
2 years
Which of the following has the same intent as a cracker, but does not have the technical skills and knowledge?
script kiddie
Which of the following is true of synchronous DRAM (SDRAM) chips?
they are synchronized to the system clock
Which of the following is another term for the system unit?
chassis
Which of the following is the most common type of volatile memory?
RAM
Which of the following means the computer automatically can configure cards like the one in the accompanying figure and other peripherals as users install them?
plug and play
How many fans are typically in a desktop case?
at least three
The role of memory to store both data and programs is known as which of the following concepts?
stored program
Which of the following circuits contains many microscopic pathways capable of carrying electrical current?
integrated
Which of the following is a cache separate from the processor chip on the item shown in the accompanying figure?
L3 Cache
Within the circuitry of a computer, each channel along which bits transfer allows the various devices both inside and attached to the system unit to communicate with each other. What are these channels, shown in the accompanying figure, called?
busses
Which of the following is the main circuit board of the system unit?
system board
Which of the following is the component of the system unit that converts the wall outlet AC power into the DC power a computer requires?
power supply
Which of the following is measured by the number of ticks per second?
clock speed
The processor relies on which of the following to control the timing of all computer operations?
system clock
What is the process of copying items from RAM to a storage device?
saving
Current processors include advanced transfer cache, a type of cache built directly on a processor chip. Which type of cache is this?
l2 cache