CIS 130 MIDTERM

Smartphones use which of these storage technologies?
flash memory card
For browsers to connect to resources on the internet, the location of the resources must be specified through addresses called
URLs
An external hard disk
usually connects to a USB or thunderbolt port
A keyboard key that turns a feature on or off is called a ________ key.
toggle
A system unit consist of the keyboard and the monitor
false
System software includes all of the following except
browsers
The internet is the largest ___________ in the world.
network
A microcomputer that is smaller, lighter, and less powerful than a notebook, and which has a touch sensitive screen, is called a
tablet
Attachments to e-mail messages can be a document or an image
true
Online banking is an example of what type of e-commerce?
B2C
Identify the four basic categories of hardware in a personal computer system.
System unit, input/output, secondary storage, and communication
The most common way to access the internet is through
an Internet service provider
The electronic equivalent of a file cabinet is a
database
These organize commonly used commands into a set of tabs.
ribbons
This type of image is made up of geometric shapes or objects
vector
Many apps are written for a particular type of mobile device and will not run on other types
true
Presentation graphics software is an excellent tool to communicate a message and to persuade people.
true
Starting or restarting a computer is called tasking the system
false
Smartphones generally include a network operating system
false
Most operating systems support the ability to switch between different applications. This is called
multitasking
Which of the following is a function of the control unit
directs movement of electronic signals between memory and the ALU
This screens can be touched with more than one finger
multitouch
The windows troubleshooting utility that identifies and eliminates nonessential files is called
disk cleanup
The system board is also known as
the mother board
RAM is considered temporary, or volatile storage
true
The arrangement of the keys on a QWERTY keyboard reflects the layout by
taking the letters of the first six alphabetic characters found on the top row keys
Another name for a midrange computer is server
true
The series of dots that form the image on a monitor are called
pixels
This type of mouse emits and senses light to detect movement
optical
A service that uses existing phone lines to provide high speed internet connections is called
DSL
Every computer on the internet has unique numeric address called
IP address
Corporations often use this to prevent copyright violations
DMCA
A __________ acts as a security buffer between a corporation’s private network and all external networks
firewall
Computer criminals that create and spread viruses are punished under this law
Computer Fraud and Abuse Act
Which of the following is not a measure to protect computer security?
keeping the same password on all systems consistently
A browser is an example of system software
false
Programs used to secretly record an individual’s activities on the internet are called
spyware
Desktop, laptop, and tablet computers and mobile devices are classified as
personal computers
Insurance companies are most likely to use personal computers to process information about policy holders
false
People that collect and sell personal data are called
information sellers
Printers connected to the internet that provide printing services to others on the internet ar called
cloud printers
A CD-RW disc
can be erased and rewritten
The processing speed of a microprocessor is represented by its
clock speed
Cloud printers provide printing services to users without access to the internet
false
Four common types of files are document files, worksheet files, database files, and presentation files.
true
Microwave communication uses high frequency
radio waves
All communications between a company’s internal networks and the outside world pass through this server
proxy
The web was introduced in
1991
Cloud computing has the potential to free end-users from owning, maintaining and storing software and data
true
Optical discs use this to represent data
pits and lands