Intro to Comp Chapter 1,2,3, & 13

________ tools enable groups of people to connect and exchange ideas.
A. Debugging
B. Social Networking
C. Affective Computing
D. Computer Foresics
Social Networking
The gap between those who have easy access to the Internet and technology those who do not is known as the ________ divide
A. digital
B. technology
C. web
D. Internet
Digital
Using the Internet to get small donations from many people to start a business is called ________.
A. kickstarting
B. crowd funding
C. crowd sourcing
D. collaborating
Crowd funding
Sharing products rather than owning them individually is known as ________. (1 point)
crowdfunding
collaborative consumption
social networking
crowdsourcing
Collaborative consumption
A popular Voice over Internet Protocol (VoIP) service is ________. (1 point)
Social Network
Mobile bridge
Tablet
Skype
Skpye
The term computer ________ is used to describe someone who is familiar enough with computers to understand their capabilities and limitations. (1 point)
hawker
webmaster
master
literate
Literate
________ refers to the commands that instruct a computer what to do. (1 point)
Data mining
Spam
Software
Hardware
software
________ is a field of study focused on handling and automatic retrieval of information. (1 point
Information technology
Computer forensics
RFID
Crisis mapping
information technology
The process of searching huge amounts of data seeking a pattern is called data ________. (1 point)
diving

warehousing

searching

data mining

data mining
Which of the following is an example of the results of data mining? (1 point)
An Excel spreadsheet listing all employees and their annual salaries in a random order

A printout of all sales taken from the register at the end of the day

Raw data from questionnaires given at the mall

Netflix providing you with a list of videos you might enjoy

Netflix providing you with a list of videos you might enjoy
`The goal of ________ research is to provide technological solutions to physical and health-related problems. (1 point)
crisis-mapping

computer forensics

biomedical

RFID ““

biomedical
One potential application of ________ is to provide sight to the blind. (1 point)
patient simulators

Bluetooth technology

biomedical chip implants

RFID tags

bio medical chip implants
Analyzing computer systems to gather potential legal evidence is computer ________. (1 point)
forensics

enforcement

analysis

detectives

forensics
________ tools gather information from sources such as e-mails, text messages, and tweets and make the information instantly and publicly available for use in emergencies. (1 point)
Affective computing

Crisis-mapping

Social networking

Crowdsourcing

Crisis-mapping
Mastery is defined as ________. (1 point)
working for something larger
feeling confident and excited about learning new skills
working without continual direction and control
combining leisure time with the tools to be creative
feeling confident and excited about learning new skills
Computers use ________ language consisting of 0s and 1s. (1 point)
byte

system

binary

symbol

binary
In binary language, each letter of the alphabet, each number, and each special symbol is made up of a unique combination of eight ________. (1 point)
kilobytes

bits

bytes

characters

bits
Which of the following is the smallest unit of measure?
megabyte
Apple’s OS X and Microsoft Windows are examples of ________ software.
operating system
Which of the following computers supports many simultaneous users and manages large amounts of data?
mainframe computer
________ computers are specially designed computer chips that reside inside other devices such as a car.
embedded
A keyboard and mouse are examples of ________ devices.
input
Which of the following is NOT a system used with touch screens?
induction
the number of pixels displayed on the screen is known as ________.
screen resolution
The most common type of monitor is a(n) ________.
LCD
Inkjet printers and laser printers are examples of ________ printers.
nonimpact
______ printers have tiny hammer-like keys that strike the paper through an inked ribbon
impact
The ________ contains the central electronic components of the computer.
motherboard
A ________ enables your computer to connect to other computers or to the Internet.
network inference card NIC
________ is the abbreviation for the place in the computer where the programs and data the computer is currently using are temporarily stored.
RAM
RAM is a ________ storage location.
volatile
The area that holds all the instructions the computer needs to start up when it is powered on is ________.
ROM
A(n)________ CPU has two processing paths, allowing it to process more than one instruction at a time.
dual-processing
The concept of the Internet was developed in response to the ________ War.
Cold
The World Wide Web was based on a protocol developed by ________.
Tim Burners Lee
Software that enables you to display and interact with text and other media on the web is a web ________.
broswer
The web is based on the ________ Protocol.
hypertext protocol
A computer connected to the Internet that asks for data is a ________.
client
The unique identification number assigned to your computer when you connect to the Internet is known as all of the following EXCEPT ________.
path
A(n) ________ system requires a program, such as Microsoft Outlook, to be installed on your computer, and when the program is opened, your e-mail is downloaded to your computer.
email client
Which of the following are personal video journal entries posted on the web?
VLOGS
A ________ is a personal journal posted on the web.
BLOGS
Podcasts enable you to ________.
deliver audio/video files via RSS
A(n) ________ is a usually a live broadcast of audio or video content.
webcast
Adobe Reader, Flash Player, and QuickTime Player are examples of software programs called ________.
plug ins
________ media are continuously fed to your browser so you do not have to wait for the entire file to completely download before listening to or watching it.
streaming
All of the following are types of e-commerce business EXCEPT ________.
C2B
The ________ is responsible for the Internet’s domain name system and the allocation of IP addresses.
ICANN
The main path of the Internet along which data travel the fastest is known as the Internet ________.
backbone
High-speed ________ communication lines use fiber-optics.
OC
Individual Internet users connect to ISPs through a(n) ________.
POP point of preference
The main suite of protocols used on the Internet is ________.
TCP/IP
________ uses a dedicated connection between two points with the connection remaining active for the duration of the transmission.
circuit switching
Which of the following information is NOT contained in a packet?
the size (in bytes) of the packet
A(n) ________ address is a unique number that identifies a computer, server, or device connected to the Internet.
IP
A(n) ________ address is a temporary IP address that is assigned from an available pool of IP addresses.
dynamic
An IP address that does not change and is usually assigned manually by a network administrator is called a ________ address.
static
When checking to see whether a particular name is registered on the Internet, your computer accesses a database that is kept on a(n) ________ server.
DNS
An IP address in the form 197.169.100.1 is called a(n) ________.
dotted quad
In http://www.pearsonhighered.com, which of the following is the top-level domain?
com
By adding a network prefix to an IP address, supernetting or ________ lets a single IP address represent multiple unique IP addresses.
classless inter domain routing CIDR
Which of the following is NOT a language used in developing websites?
KML
Which of the following was created for the transfer of hypertext documents across the Internet?
HTTP
< b > is an example of an HTML ________.
tag
Text such as < b >This should be bolded.< /b > is an example of an HTML ________.
element
________ defines the content in terms of the data that is being described rather than how it is to be displayed.
XML