The ability to recover and read deleted or damaged files from a criminal’s computer is an example of a law enforcement specialty called ________.
A) computer forensics
B) RFID simulation
C) HALO animation
information that they want effectively.A) technologically informed
B) computer efficient
C) computer literate
D) computer productive
The goal of ________ is to provide solutions to physical problems, such as providing sight to the blind.
A) biomedical chip research
B) RFID technology
C) 3D animations
D) computer forensics
The Microsoft Authorized Refurbisher program supports refurbishers by allowing ________ to be installed for free on refurbished systems.
A) specific operating system utilities
B) antivirus software
C) certain Microsoft operating systems and Office software
D) certain gaming software packages
available for use in emergencies.A) The Witness Project
B) Google Earth
C) Data mining
communicate outside of class, take quizzes online, and find their class materials easily.A) Adobe Photoshop
B) Blackboard or Moodle
C) CAD or Visio
D) Microsoft Access
automatically.A) Database mining
B) Information technology
D) Computer forensics
multimedia devices such as TVs and DVD players.A) AVI
Which of the following is NOT one of the four major data processing functions of a computer?
A) processing data into information
B) storing the data or information
C) gathering data
D) analyzing the data or information
A ________ is approximately 1 billion bytes.
the computer is turned off.A) random
RAM is considered volatile storage, which means it is ________.
A(n) ________ enables you to enter data (text, images, and sound) and instructions (user responses and commands) into the computer.
A) output device
B) system unit
D) input device
computer.A) USB devices
B) Expansion cards
C) Drive bays
The agency that first began funding the Internet was called the ________.
A) National Science Foundation
B) Advanced Research Computing Agency
C) Advanced Research Projects Agency Network
D) Science Research Projects Agency
called ________.A) podders
All of the following are parts of a URL EXCEPT:
B) the protocol.
D) the domain name.
The World Wide Web (WWW) was invented by ________.
A) the same people who invented the Internet
C) Tim Berners-Lee at CERN
The text version of a Web site’s Internet address is called the ________.
A) home page
C) Uniform Resource Locator (URL)
D) IP address
The Internet backbone refers to ________.
A) abroadband Internet connection
B) the software that operates a Web server
C) the main pathway of high-speed communications lines through which all Internet traffic
D) a set of numbers comprising an Internet address
Adobe Photoshop and Corel PaintShop Photo Pro are examples of ________ software.
A) Web page authoring
B) digital image editing
D) computer-aided design
In a spreadsheet, the columns and rows form individual boxes called ________.
In databases, information is organized in ________.
D) all of the above
Microsoft Word and OpenOffice.org Writer are examples of ________.
A) utility software
B) graphic software
C) word processing software
D) system software
The ________ of the operating system allows the user to communicate with the computer system.
B) network adapter card
D) user interface
operating system?A) Mac OS
B) Windows Vista
C) Symbian OS
D) minimum requirements
XO is the name of the computer being provided by the ________ project.
A) IT Beta
B) One Laptop per Child
D) Computers for All
Two types of video memory are ________.
A) IrDA and IDE
B) SRAM and DRAM
C) 4 -bit and 8-bit
D) GDDR3 and GDDR5
Kernel memory is ________.
A) faster than RAM
B) the amount of memory in the memory modules
C) RAM memory used by the operating system
D) permanent memory
Which is the fastest type of optical drive on the market?
A) flash drives
B) Blu-ray drives
C) DVD drives
D) CD drives
When referring to hard drives, seek time and latency are the two factors that make up ________.
A) data transfer speed
B) access time
D) transfer rate
Network architectures are classified according to ________.
A) the way they are controlled and the distance between their nodes
B) the bandwidth supplied by the connection
C) the distance between the hub and the router
D) the speed at which the processor runs
Which of the following UTP cable types is the cheapest and often used in home networks?
A) Cat 4
B) Cat 7
C) Cat 6
D) Cat 5E
The most popular transmission media option for wired Ethernet networks is ________.
A) unshielded twisted-pair (UTP) cable
B) coaxial cable
C) power-line cable
D) fiber-optic cable
The ________ is a strategic plan to focus on the young, talented, mathematical minds of Africa.
A) Next Einstein Initiative
B) National Research Council
C) Childhood Walk
D) Future Civic Media
low-income families to access the Internet.A) Nintendo Wii
B) affective computing
C) social networking
D) mobile devices
________.A) data warehousing
B) data retrieval
C) data searching
D) data mining
________ microphones pick up sound from only one direction.
B) Magnetically shielded
as your car or the electronic thermostat in your home.A) Internal
Podcasts enable you to ________.
A) communicate with friends in real time
B) post journal entries on the Web
C) edit video files over the Web
D) broadcast over the Internet using compressed audio and video files such as MP3s and MP4s
C) Internet Explorer
inventory management, and human resources management is called ________.A) accounting software
B) enterprise resource planning software
C) customer relationship management software
D) project management software
are called ________.A) devices
In Windows, a file path starts with a ________.
A) backslash ()
B) file name
D) drive letter
on the hard drive called the ________ file.A) RAM
The small circuit boards that hold a series of RAM chips are called ________.
A) flash memory cards
B) virtual memory
C) expansion cards
D) memory modules
________ address.A) SSID
Unwanted e-mail is called ________.
________.A) touch pad
C) game control
Podcasts use which of the following technologies?
A) an open source software application for 3D modeling
D) MSN Messenger
The primary benefit of a spreadsheet program is ________.
A) its ability to create charts
B) its ability to automatically recalculate formulas and functions
C) the preprogrammed functions
D) its ability to have multiple worksheets in one workbook
Which of the following types of programs help manage system resources such as the hard drive?
A) application software
B) utility programs
C) application programming interfaces
D) productivity software
All of the following are advantages of notebook computers EXCEPT:
A) they are portable.
B) wireless Internet access is easy to install.
C) they take up little space.
D) you get more speed for a lower price.
Which of the following is NOT an example of a WAN?
A) LANs connected in a single building
B) A computer at a bank’s main branch connected with a LAN at the bank’s branch office
C) A computer at a military base in Georgia connected with a computer at a military base in
D) A LAN at the main university campus connected with a LAN at the university extension site
One potential application of ________ is to provide sight to the blind.
A) biomedical chip implants
C) RFID tags
D) patient simulators
________ software is the set of programs that enables the computer’s hardware devices and application software to work together.
Boolean operators include such words as ________.
D) all of the above
SixthSense is a wearable device that consists of a camera, projector, and a mirror that can communicate with the Internet over wireless Bluetooth via a computer.
use the site.True/False
Data mining is the process of searching huge amounts of data with the hope of finding a pattern.
The menuboard of the Khan Academy shows exactly which topic a student has mastered and where they are failing to progress.
Light-emitting diode technology uses organic compounds that produce light when exposed to an electric current.
The operating system provides the means for users to interact with a computer.
Modern printers feature Bluetooth connectivity technology.
An alternative to the QWERTY keyboard is the virtual keyboard.
The four main functions of a computer are inputting data, processing data, outputting the data or information, and communicating the data or information.
Webcasts can be used to initiate a response from a viewing audience.
If you post a picture on your own social networking site, it could become available to the public via search engines.
The Internet was developed to ensure faster delivery of communications such as mail.
The Internet is the largest computer network in the world.
Macros are forms included in many productivity applications that provide the basic structure for a particular kind of document, spreadsheet, or presentation.
There are financial planning software applications available, such as Quicken, that integrate with tax preparation software.
Windows 7 is operating system software.
When your computer runs out of RAM, the operating system borrows space from the CPU.
The type of processor in the computer dictates which operating system a desktop uses.
3D sound is the same as surround sound.
Every computer is designed with a maximum limit on the amount of RAM it can support.
WEP is a stronger form of security than WPA.
All desktop and notebook systems sold today are network ready.
Biomedical chip implants are being used to provide sight to the blind.
Purpose is the freedom to work without constant direction and control.
Speakers connect to the VGA port.
A universal chat client allows you to chat with users who are using a different IM service than you are.
Shareware is software that is distributed as trial software for a limited time.
When using Windows, you should create a restore point before installing new software.
RAM is your computer’s permanent storage space for data that is entered from the keyboard.
Ethernet networks are always connected using twisted-pair cable technology.
and galleries at this time.True/False
When using Windows 7 power management tools, you really only need to shut down your computer when you need to repair the system, install hardware, or move the system.
Instant messaging is available only from AOL.
Many spreadsheet applications have the ability to sort, filter, and group data.
If you install a device that is not PnP, you will be prompted to install a driver.
Video cards often include their own RAM.
A P2P network needs network operating system software installed on every node.