CuSci 101

Which of the following software can best be used to help create digital art?
Adobe Illustrator
A popular Voice over Internet protocol service is ________.
Skype
Autonomy is defined as ________.
working without continual direction and control
An identification chip that is smaller than a period is known as ________.
m-chip
The emotional-social prosthesis (ESP) device, developed by a group at the MIT Media Lab, is targeted at helping people who have ________.
autism
The goal of ________ is to provide technological solutions to physical problems, such as providing sight to the blind.
Biomedical chip research.
_ is a field of study focused on information handling and retrieval of information automatically.
Information technology
The Witness Project uses the power of video and a grassroots movement to advocate for ________.
human rights
Using the Internet to get small donations from many people to start a business is called ________.
crowdfunding
Joining together as a group to use a specific product more efficiently is called _______
collaborative consumption
The process of searching huge amounts of data with the hope of finding a pattern is called _______
data mining
The difference between people with access to computers and the Internet and those without this access is known as the ________.
digital divide
Faculty at universities often use course management software such as ________ to make information available to students.
Moodle
The ________ is a strategic plan to focus on the young, talented, mathematical minds of Africa.
Next Einstein Initiative
The crisis-mapping tool ________ can collect information to make instantly and publicly available for use in emergencies.
Ushahidi
Unwanted or junk e-mail is called
spam
Affective computing is
responding to human emotions
Analyzing computer systems to gather potential legal evidence is ________.
computer forensics
All of the following factors lead to better personal satisfaction, EXCEPT ________.
consumption
_______ diseases account for about 1/5 of all deaths worldwide, and technology is used to increase the pace of vaccine production to decrease this death rate.
Infectious
A ________ is approximately 1 million bytes.
megabyte
Which of the following is the largest unit of measure for the size of a computer file?
Petabyte
Computers use the ________ language consisting of 0s and 1s.
binary
The standard keyboard is known as the ________ keyboard.
QWERTY
The term “bit” is short for ________.
binary digit
Flash drives plug into a(n) ________.
USB port
The ________ contains the central electronic components of the computer.The ________ contains the central electronic components of the computer.
motherboard
The most common type of monitor is a(n) ________.
liquid crystal display (LCD)
The area that holds all the instructions the computer needs to start up when it is powered on is ________.
ROM
A keyboard and mouse are examples of ________ devices.
input
A ________ was the first device with touch-screen capabilities.
tablet PC
________ is the applied science concerned with designing and arranging machines and furniture so that people use so that the people using them aren’t subjected to an uncomfortable or unsafe experience.
Ergonomics
All of the following are names for a flash drive, EXCEPT ________.
hard drive
Any part of the computer that you can touch is called ________.
hardware
After a picture has been taken with a digital camera and processed appropriately, the actual print of the picture is considered ________.
output
A(n) ________ is a specially designed computer that can perform complex calculations extremely fast.
supercomputer
What type of computer is the Apple iPad?
Tablet computer
The computer port that is used to connect televisions and DVD players is the ________.
DVI
A ________ sits on your computer monitor or is built into a laptop and is used primarily for transmitting live video.
webcam
________ computers are specially designed computer chips that reside inside other devices such as your car or the electronic thermostat in your home.
Embedded
All of the following are ways to avoid injuries when working on computers, EXCEPT ________.
place monitor at least 10″ from eyes
The most common way to connect devices to a computer is to use the ________ port.
Universal serial bus (USB)
The number of pixels displayed on the screen is known as ________.
screen resolution
_______ printers have tiny hammer-like keys that strike the paper through an inked ribbon
Impact
The four functions of the computer include input, process, output, and ________.
storage
A(n) ________ is where a peripheral device can attach to a computer so that data can be exchanged between it and the operating system.
port
The ________ is used in combination with other keys to perform shortcuts and special tasks.
Control (Ctrl) key
Display screens that respond to commands initiated with your finger or a stylus are called ________.
touch screens
Large, expensive computers that support hundreds of users simultaneously are called ________.
mainframes
Which of the following is NOT one of the four major data processing functions of a computer?
Analyzing the data or information
________ are shortcut keys that you press to perform special tasks; each software application has its own set of tasks assigned to these keys.
Function keys
Computers gather data, which means that they allow users to ________ data.
input
Processing performance is affected by the number of processing paths called ________.
cores
________ is the abbreviation for the place in the computer where the programs and data the computer is currently using are stored.
RAM
________ keyboards can be rolled up and put in your backpack.
Flexible
In binary language, each letter of the alphabet, each number, and each special character is made up of a unique combination of ________.
eight bits
Which of the following is NOT true about data?
It has been organized or presented in a meaningful way.
RAM is a ________ storage location.
volatile
A ________ enables your computer to connect to other computers or to the Internet.
network interface card (NIC)
A(n) ________ is an input device that looks like a pen.
stylus
All of the following are examples of permanent storage, EXCEPT ________.
RAM
New technologies pushing the boundaries of printing include ________.
a.cloud printing
b. 3-D printing
c. inkless printing
d. all of the above
Apple developed ________ Mouse, which is the first multitouch wireless mouse.
Magic
Inkjet printers and laser printers are examples of ________ printers.
nonimpact
The small, touch-sensitive area at the base of the keyboard on a notebook computer is known as a ________.
touch pad
Facebook and MySpace are considered to be ________ Web sites.
social networking
Podcasts deliver their content using ________.
Really Simple Syndication
________ is a Web-based universal chat service that lets you communicate with users on a variety of IM services from any computer without having to install a special program.
Meebo
The World Wide Web was invented by ________.
Tim Berners-Lee at CERN
The “s” in “https” stands for ________
Secure Socket Layer
The name of the free Internet browser from Mozilla is ________.
Firefox
Podcasts use which of the following technologies?
b. Really Simple Syndication (RSS)
A ________ is a personal journal posted on the Web.
blog
The Web is based on the ________ Protocol.
Hypertext Transfer
Podcasts enable you to ________.
broadcast over the Internet using compressed audio and video files such as MP3s and MP4s
Web 2.0 is classified as the ________.
social Web
All of the following are examples of multimedia, EXCEPT ________.
text
You can keep track of IM contacts by using a ________.
buddy list
The unique identification number assigned to your computer when you connect to the Internet is known by all of the following, EXCEPT ________.
dotted period
________ use(s) continuous audio and video feeds.
Webcasts
The Internet is ________.
a large network of networks
In the URL http://www.pearsonhighered.com/techinaction, the portion labeled “techinaction” is the ________.
path
________ is a social networking service that enables you to exchange short text messages with your friends or “followers.”
Twitter
The browser feature where tabs are independent of each other is known as ________.
tab isolation
In the URL http://www.pearsonhighered.com/techinaction, the portion labeled “.com” is the ________.
top-level domain
The ________ computer had no keyboard or monitor and used switches on the front of it to enter data using 0s and 1s.
Altair
Introduced in the late 1970s, which of the following allowed users to interact with the computer more easily?
The graphical user interface (GUI)
Many people believe Grace Hopper’s greatest contribution to computing was the invention of the ________.
the compiler
The ________ was the first portable computer.
Osborne
The Alto computer, built by ________, was based on the WYSIWYG principle.
Xerox
One of the reasons the Apple II computer was popular was that ________.
the operating system was stored in ROM
Which company approached Bill Gates to write an operating system (OS) program for its computer in 1980?
IBM
What programming language revolutionized the software industry because beginning students could learn it easily?
BASIC
What was the first electronic spreadsheet application to be used on personal computers?
VisiCalc
Released in 1993, ________ was the first Internet Web browser.
Mosaic
The most essential software in your computer system is the ________.
operating system
All of the following are examples of network operating systems, EXCEPT ________.
OS X Mountain Cougar
UNIX was developed by Ken Thompson and Dennis Richie who worked at ________.
AT&T’s Bell Labs
Which of the following was the first widely used operating system installed in personal computers?
MS-DOS
The location of a file is specified by its ________.
file path Correct
b. file type
Windows 8 uses a(n) ________ account to easily access and store your files online.
Sky Drive
The ________ of the operating system enables the user to communicate with the computer system.
user interface
Which of the following types of programs help manage system resources such as the hard drive?
Utility programs
Which of the following is an open source operating system for personal computers?
Linux
If Microsoft Word 2010 is used to create a file, which file extension is added automatically?
.docx
MS-DOS first used a(n) ________ interface.
command-driven
For performing common tasks, Windows 8 has special shortcuts called ________.
charms
The ________ is(are) the group of programs that controls how your computer functions.
Google
All of the following are terms related to part of the boot process, EXCEPT ________.
USB
Which of the following does NOT occur during the power-on self-test?
The OS is moved into RAM.
You can use the Windows ________ to check on a nonresponsive program.
Task Manager
The OS enables you to organize the contents of your computer in a hierarchical structure of ________.
d. directories
Windows 8 is the operating system developed by ________.
Microsoft
Social media sites such as Facebook inherently share information with others. The use of this information can raise questions regarding ________.
personal privacy
All of the following are types of cyberbullying EXCEPT ________.
physically stalking an individual
Enacted in 2002, the ________ Act requires companies to provide mechanisms for employees and third parties to anonymously report complaints, including ethics violation, anonymously.
Sarbanes-Oxley
_______ is the theory that holds that there is no universal moral truth and that instead moral principles are dictated by cultural tastes and customs.
Relativism
When Google first launched its search engine services in China, it restricted search results for sites considered objectionable by the Chinese government. This is an example of ________.
censorship
What do privacy filters do in relation to social networking sites?
They allow users to choose to share information publicly, with friends, or keep it private
The study of the general nature of morals and of the specific moral choices individuals make is called ________.
ethics
Which of the following is NOT considered a typical stakeholder for most businesses?
Competitors
Intellectual property (such as music, writing, and software) is protected through ________ law.
copyright
A person who does not conform to a set of approved standards of social or professional behavior ________.
commits unethical behavior
A(n) ________ software installation enables you to decide which features you want to install on the hard drive.
custom
QuickBooks and Peachtree are examples of ________ software.
accounting
All of the following are examples of educational and reference software EXCEPT ________.
EverQuest
Software that does “back office” operations and processing functions such as billing, production, inventory management, and human resources management is called ________.
enterprise resource planning software
______ software is the software that helps run the computer and coordinate instructions between the computer and the hardware devices.
System
Software refers to a set of instructions that tells the computer what to do. These instruction sets are called ________.
programs
Presentation software includes all of the following features, EXCEPT ________.
formulas
Software designed for a specific industry is known as ________ software.
vertical market
What is Google’s first attempt at a netbook where all applications and files are stored on the Web?
Chromebooks
Another way to obtain software is through ________, where a vendor hosts the software online over the Internet and you do not have to install it on your computer.
Software as a Service
All of the following are tips for a great presentation, EXCEPT ________.
use a variety of animations on most slides to keep audience attention
Using applications on smartphones and tablets to buy and sell products is known as ________.
mobile commerce
System software does all of the following, EXCEPT ________.
add graphics and pictures to files
Computer-aided design software is used primarily by ________.
engineers to create models
Web-based application software is software that ________.
is stored completely on a Web server instead of your hard drive
The general software you use to do tasks at home, school, or work is known as ________ software.
application
In databases, information is organized in ________.
a. records
b. tables
c. fields
d. all of the above
Microsoft’s ________ enables you to create a 3-D walkthrough of your favorite vacation places.
Photosynth
The appropriate software to use for creating research papers is ________.
word processing software
Google ________ is a popular application that lets you edit images and helps to organize and share your digital images.
Picaso