MISY 160 Technology In Action Exam #1

All of the following are features of the most popular Web browsers, EXCEPT ______.
A. tabbed browsing
B. pinned browsing
C. tacked browsing
D. tear-off tabs
C. tacked browsing
A subset of e-commerce that uses social networks to assist in marketing and purchasing products is known as _____.

A. Social businesses
B. social shopping
C. social enterprise
D. social commerce

D. social commerce
______ is a Web-based universal chat service that lets you communicate with users on a variety of IM services from an computer without having to install a special program,
A. Trillian
B. Digsby
C. AIM
D. Meebo
D. Meebo
4. The internet is ______.
A. an internal communication system for a business
B. a communication system for the U.S. government
C. the same as the Web
D. A large network of networks
D. A large network of networks
5. Podcasts enable you to ____.
A. broadcast over the Internet using compressed audio and video files such as MP3s and MP4s
B. post journal entries on the Web
C. communicate with friends in real time
D. edit video files over the Web
A. broadcast over the Internet using compressed audio and video files such as MP3s and MP4s
All of the following are a type of e-commerce business, EXPECT _____.
A. B2C
B. B2B
C. C2C
D. C2B
D. C2B
The unique address for a particular Web site is the ______.
A. protocol
B. domain name
C. path
D. URL
D. URL
A list of pages within a Web site that you have visited and that usually appears at the top of a page is referred to as an _____.
A. index
B. navigation bar
C. breadcrumb trail
D. cookie trail
C. Breadcrumb Trail
Adobe Reader, Flash Player, and Quick time Player are all examples of special software programs called _____.
A. aggregators
B. plug-ins
C. podders
D. browsers
B. plug-ins
Using the Web to communicate and share information with our friends and others is known as _____.
A. emailing
B. friend networking
C. instant messaging
D. social networking
D. Social Networking
In the URL http://www.pearsonhighered.com/techinaction, the portion labeled “http” is the ______.
A. protocol
B. domain name
C. path
D. top-level domain
A. protocol
Podcasts deliver their content using ______.
A. Aggregator
B. Google Reader
C. Really Simple Syndication
D. iTunes
C. Really Simple Syndication
13. All of the following are examples of multimedia EXCEPT _______.
A. streaming video
B. text
C. MP3 music files
D. graphics
B. text
A visual search engine that uses pictures from our smartphone to search the Web for more information is known as ______.
A. Google Glasses
B. Google Goggles
C. Explorer Eyes
D. Explorer Shades
B. Google Goggles
You can keep track of IM contacts by using a ______.
A. buddy list
B. people finder
C. search engine
D. breadcrumb trail
A. buddy list
The “s” in “https” stands for _____.
A. secure socket lock
B. secure socket layer
C. secure socket link
D. secure socket line
B. secure socket layer
Which of the following are personal video journal entries posted on the web?
A. Podcasts
B. Newsgroups
C. Vlogs
D. Blogs
C. Vlogs
The browser feature where tabs are independent of each other is known as ______.
A. Pinned tabs
B. Tab isolation
C. Tear off tabs
D. Session tabs
B. Tab Isolation
______ uses continuous audio and video feeds.
A. Podcasts
B. Wikis
C. Instant messaging
D. Webcasts
D. Webcasts
______ is a personal journal posted on the web.
A. blog
B. podcast
C. wiki
D. webcast
A. Blog
In the URL http://www.pearsonhighered.com/techinaction, the portion labeled “techinaction” is the
A. protocol
B. domain name
C. path
D. top-level domain
C. Path
Software that enables you to display and interact with text and other media on the Web is a _______.
A. client
B. server
C. client/server network
D. Web browser
D. Web browser
Web 2.0 is classified as the _____.
A. social Web
B. social network
C. social page
D. social computer
A. Social Web
The concept of the Internet was developed in response to the ______ War.
A. Korean
B. Vietnam
C. Cold
D. Big
C. Cold
The unique identification number assigned to your computer when you connect to the Internet is known by all of the following, EXCEPT
A. dotted quad
B. dotted period
C. dotted decimal
D. IP address
B. dotted period
The Web is based on the _________ Protocol.
A. Hypertext Transfer
B. Hypertext Trade
C. Hypertext Transmit
D. Hypertext Translate
D. Hypertext Transfer
A _______ is a Website where anyone can add, remove, or edit its content.
A. blog
B. podcast
C. wiki
D. webcast
C. Wiki
_______ is a social networking service that enables you to exchange short text messages with your friends or “followers.”
A. Facebook
B. Twitter
C. MySpace
D. Yahoo! Text
B. Twitter
Live bookmarks is a feature in ___________ that adds the technology old RSS feeds to bookmarks.
A. Safari
B. Firefox
C. Internet Explorer
D. Chrome
B. Firefox
All the following are tips for professional e-mail etiquette EXCEPT:
A. be concise to the point
B. use spell-checker and proofread before sending
C. use abbreviations such as “u”, “r”, and “BRB” to make the email shorter.
D. include a meaningful subject line
C. use abbreviations such as “u”, “r”, and “BRB” to make the email shorter
The “fathers” of the internet are Vinton Cerf and _______.
A. Robert Cailliau
B. Tim Berners-Lee
C. Bill Gates
D. Robert Kahn
D. Robert Kahn
In the URL http://www.pearsonhighered.com/techinaction, the protion labeled “.com” is the _______.
A. domain name
B. host
C. top-level domain
D. protocol
C. Top-level domain
_____ lines are high-speed, fiber-optic communications lines.
A.T
B. OC
C. DSL
D. Cable
B. OC
A _____ server takes a pool of IP addresses and shares them with hosts on the network on an as-needed basis.
A. DOM
B. DHCP
C. CDIR
D. CGI
B. DHCP
. ______ is the main suite of protocols used on the Internet.
A. FTP
B. TCP/IP
C. SMTP
D. UDP
B. TCP/IP
The root servers know the location of all DNS servers that contain the master listings for an entire ______.
A. IP address
B. subdomain
C. Web site
D. top-level domain
D. top-level domain
An ______ is a small program that resides on a server designed to be downloaded and run on a client computer.
A. CGI Script
B. style sheet
C. applet
D. hypertext document
C. applet
____ uses a dedicated connection between two points with the connection remaining active for the duration of the transmission.
A. packet switching
B. An open circuit
C. Circuit switching
D. A closed circuit
C. circuit switching
_____ is the ability of two or more people to chat over the Internet in real time.
A. VoIP
B. Texting
C. Remote handshaking
D. Instant messaging
D. Instant messaging
_____ provides a methodology by which a browser can request that a program file be run rather than just being delivered to the browser.
A. PGP
B. ACK
C. POP
D. CGI
D. CGI
Computers that typically use special security protocols to protect personal, sensitive buyer information are known as ______ servers.
A. point of sale
B. commerce
C. business
D. Web
B. commerce
Which of the following is NOT an example of an instant messenger service?
A. Google Talk
B. Windows Live Messenger
C. Jabber
D. Google Docs
Google Docs
In public-key encryption, two keys, known as a ______ are created–one for coding–one for decoding.
A. Code keys
B. Public/private keys
C. Keytags
D. Key pair
D. Key Pair
Open system internet protocols replaced _____ system Internet protocols.
A. Restricted
B. Closed
C. Proprietary
D. Private
C. Proprietary
Sending a movie trailer over the Internet is most appropriate using the ______ protocol.
A. Real time transport
B. Connection- oriented
C. User datagram
D. TCP/IP
A. Real time transport
Which of the following information is NOT contained in a packet?
A. The size (in bytes) of the packet
B. The address to which the packet is sent
C. The address from where the packet originates
D. The data that are transmitted
A. The size (in bytes) of the packet
Text such as this should be bolded. is an example of an HTML ______.
A. Element
B. Script
C. Instruction
D. Marker
A. Element
Which of the following statements concerning IP addresses is TRUE?
A. Static IP addresses change often
B. Dynamic IP addresses are assigned manually by a network administrator
C. ISPs must maintain a pool of IP addresses for all their subscribers
D. Dynamic addressing is normally handled by DHCP.
D. Dynamic addressing is normally handled by DHCP.
Transport Layer Security (TLS) and ______ are two protocols that provide data integrity and security for internet transmission
A. Secure sockets layer SSL
B. Pretty good Privacy (PGP)
C. Hypertext Transfer Protocol (HTTP)
D. Public-key encryption
A. Secure sockets layer SSL
_______ allow developers to create formatting templates that organize and combine the attributes of objects on a Web page.
A. HTML tags
B. Applets
C. Key pairs
D. Cascading style sheets
D. Cascading style sheets
A(n) ______ address is a unique number that identifies a computer, server, or device connected to the Internet.
A. TCP
B. IP
C. CGI
D. NetBIOS
B. IP
______ is a consortium of organizations that develops Web protocols and sets standards.
A. IETF
B. ISOC
C. Internet Society
D. W3C
D. W3C
Which protocol transfers HTML data from servers to browsers?
A. UDP
B. FTP
C. HTTP
D. TCP
C. HTTP
Which of the following was created especially for the transfer of hypertext documents across the Internet?
A. SSL
B. HTTP
C. TLS
D. HTML
B. HTTP
Which protocol is used to transmit e-mail over the Internet?
A. FTP
B. SMTP
C. HTTP
D. VolP
B. SMTP
The main path, analogous to the interstate highway system, of the Internet along which data travel the fastest is known as the Internet _______.
A. open system
B. highway
C. backbone
D. cache
C. backbone
The majority of Internet communications follow the ______ model of network communications.
A. client/server
B. peer-to-peer
C. circuit switching
D. IXP
A. client/server
Which of the following statements concerning IPv4 addresses is FALSE?
A. The addresses are 16-bit numbers.
B. IPv4 is the original IP addressing scheme.
C. The addresses contain four octets.
D. In binary, each octet of an IP address contains eight positions filled by either a 1 or 0.
A. The addresses are 16-bit numbers.
Which of the following has the greatest bandwidth?
A. OC-768
B. T1-lines
C. OC-48
D. T-3 lines
A. OC-768
An IP address that does not change and is usually assigned manually by a network administrator is called a _________.
A. dynamic address
B. static address
C. fixed address
D. stationary address
B. static address
The small, touch-sensitive area at the base of the keyboard on a notebook computer is known as a ________.
A. stylus
B. touch pad
C. game control
D. trackball
B. touch pad
Individual Internet users enter an ISP through a(n) _________.
A. NAP
B. T line
C. Optical Carrier (oc line)
D. Point of Presence (POP)
D. Point of Presence (POP)
The _____ provides leadership for the orderly growth and development of the Internet.
A. W3C
B. Internet Society
C. ICANN
D. IEEE
B. Internet Society
Which of the following is NOT a cascading style sheet layer?
A. External
B. Referenced
C. Embedded
D. Inline
B. Referenced
A typical ________ is made up of one or more network switches to which ISPs connect.
A. Internet Exchange Point
B. Router Point
C. Gateway Inference
D. Point of Preference
A. Internet Exchange Point
A(n) ________ address is a temporary IP address that is assigned from an available pool of IP addresses.
A. Dynamic
B. Static
C. Assigned
D. Mobile
A. Dynamic
IPv4 allows for approximately________ different IP addresses.
A. 4 million
B. 400 million
C. 4 billion
D. 40 billion
A. 4 million
When checking to see whether a particular name is registered on the internet, your computer consults a database that is maintained on a(n) __________ server.
A. DNS
B. URL
C. Internet
D. Web
A. DNS
Which protocol prepares data for transmission but has no resending capabilities?
A. UDP
B. Telnet
C. HTTP
D. TCP
A. UDP
A set of rules for exchanging electronic information is called ______.
A. handshaking
B. a computer protocol
C. DHCP
D. an open system protocol
B. A Computer Protocol
_______ is an IP addressing scheme that uses 128-bit addressing.
A. IPS
B. IP128
C. IPv4
D. IPv6
D. IPv6
Which of the following is NOT one of the four major data processing functions of a computer?
A. Gathering data
B. Processing data into information
C. Analyzing the data or information
D. Storing the data or information
C. Analyzing the data or information
Display screens that respond to commands initiated with your finger or a stylus are called ______.
A. touch pads
B. track points
C. touch screens
D. track screens
C. touch screens
Inkjet printers and laser printer are examples of ________ printers.
A. nonimpact
B. impact
C. dot-matrix
D. thermal
A. nonimpact
The most common type of monitor is a ________.
A. liquid crystal display (LCD)
B. light-emitting diode (LED)
C. organic light-emitting diode (OLED)
D. cathode ray tube (CRT)
A. Liquid crystal display (LCD)
Large, expensive computers that support hundreds of users simultaneously are called ______.
A. supercomputers
B. maxicomputers
C. mainframes
D. powercomputers
C. mainframes
The four functions of the computer include input, process, output, and ______.
A. storage
B. calculating
C. retrieval
D. saving
A. storage
An _________ is a specially designed computer that can perform complex calculations extremely fast.
A. desktop computer
B. supercomputer
C. mainframe computer
D. embedded computer
B. supercomputer
The area that holds all the instructions the computer needs to start up when it is powered on is ______.
A. RAM
B. ROM
C. USB
D. CPU
B. ROM
A _____ was the first device with touch-screen capabilities.
A. tablet PC
B. notebook
C. pocket PC
D. desktop
A. Tablet PC
the computer port that is used to connect televisions and DVD players is the _____.
A. VGA
B. DVI
C. HDMI
D. LCD
B. DVI
Any part of the computer that you can touch is called _____.
A. Hardware
B. Software
C. Operating system
D. Input
A. Hardware
A(n) _____ is where a peripheral device can attach to a computer so that data can be exchanged between it and the operating system
A. Port
B. Drive
C. Slot
D. Expansion bus
A. Port
A _______ enables your computer to connect to other computers or to the Internet
A. Video card
B. Network interface card (NIC)
C. Sound card
D. Controller card
B. Network interface card (NIC)
Flash drive plug into a(n)______.
A. USB Port
B. Serial port
C. Expansion slot
D. Drive bay
A. USB Port
RAM is a ______ storage location
A. Permanent
B. Volatile
C. Nonvolatile
D. Network
B. Volatile
All of the following are names for a flash drive, EXCEPT ______.
A. Jump drive
B. USB drive
C. Thumb drive
D. Hard drive
D. Hard drive
In binary language, each letter of the alphabet, each number, and each special character is made up of a unique combination of _______.
A. Eight bytes
B. Eight kilobytes
C. Eight characters
D. Eight bits
D. Eight Bits
_______ is applied science concerned with designing and arranging machines and furniture so that people use so that the people using them aren’t subjected to an uncomfortable or unsafe experience.
A. Ergonomics
B. Positioning
C. Occupational safety
D. Repetitive strain prevention
A. Ergonomics
A(n) ______ is an input device that looks like a pen.
A. joystick
B. e-pen
C. pointer
D. stylus
D. stylus
_______ are shortcut keys that you press to perform special tasks; each software application has its own set of tasks assigned to these keys.
A. Alt keys
B. Function keys
C. Control (Ctrl) keys
D. Windows keys
B. Function Keys
Which of the following is the largest unit of measure for the size of a computer file?
A. Megabyte
B. Gigabyte
C. Petabyte
D. Terabyte
C. Petabyte
Which of the following is NOT true about data?
A. It represents a fact, a figure, or an idea.
B. It can be a number, a word, or a picture.
C. It can be a recording of sound.
D. It has been organized or presented in a meaningful way.
D. It has been organized or presented in a meaningful way.
______ computers are specially designed computer chips that reside inside other devices such as your car or the electronic thermostat in your home.
A. Mainframe
B. Desktop
C. Embedded
D. Internal
C. Embedded
What type of computer is the Apple iPad?
A. Notebook
B. Netbook
C. Tablet PC
D. Tablet computer
D. Tablet Computer
______ keyboards can be rolled up and put in your backpack.
A. Virtual laser
B. Flexible
C. Elastic
D. Dvorak
B. Flexible
The ______ is used in combination with other keys to perform shortcuts and special tasks.
A. Toggle key
B. Function key
C. Control (Ctrl) key
D. Windows key
C. Control (Ctrl) key
After a picture has been taken with a digital camera and processed appropriately, the actual print of the picture is considered ________.
A. data
B. output
C. input
D. a process
B. output
The most common way to connect devices to a computer is to use the ______ port.
A. Universal serial bus (USB)
B. FireWire 400
C. FireWire 800
D. Ethernet
A. Universal serial bus (USB)
______ keyboards can be rolled up and put in your backpack.
A. Virtual laser
B. Flexible
C. Elastic
D. Dvorak
B. Flexible
Processing performance is affected by the number of processing paths called ______.
A. speed
B. chips
C. cores
D. stars
C. cores
The term “bit” is short for ______.
A. megabyte
B. binary language
C. binary digit
D. binary number
C. binary digit
A ________ is approximately 1 million bytes.
A. gigabyte
B. kilobyte
C. megabyte
D. terabyte
C. megabyte
________ is the abbreviation for the place in the computer where the programs and data the computer is currently using are stored.
A. ROM
B. CPU
C. RAM
D. USB
C. RAM
All of the following are examples of permanent storage, EXCEPT ________.
A. hard drive disk
B. DVD
C. RAM
D. USB Drive
C. RAM
The ________ contains the central electronic components of the computer.
A. motherboard
B. system unit
C. peripheral unit
D. input unit
A. motherboard
Computers gather data, which means that they allow users to ________ data.
A. present
B. Input
C. output
D. Store
B. Input
Computer use the _____ language consisting of 0’s and 1’s.
A. symbol
B. binary
C. byte
D. system
B. binary
All of the following are ways to avoid injuries when working on computers, EXCEPT ______.
A. place monitor at least 10″ from eyes
B. purchase an adjustable chair
C. ensure proper lighting
D. take breaks
A. place monitor at least 10″ from eyes
The number of pixels displayed on the screen is known as _____.
A. contrast ratio
B. aspect ratio
C. brightness resolution
D. screen resolution
D. Screen Resolution
The CPU consists of which two parts?
A. The arithmetic logic unit and the front side bus
B. The control unit and the arithmetic logic unit
C. The control unit and the front side bus
D. The control unit and cache memory
B. The control unit and the arithmetic logic unit
Which of the following activities is carried out by the arithmetic logic unit (ALU)?
A. Movement of read/write heads
B. Completion of all arithmetic calculations
C. Creation of virtual memory
D. Coordination of all other computer components
B. Completion of all arithmetic calculations
Two types of video memory are _______.
A. GDDR3 and GDDR5
B. SRAM and DRAM
C. IrDA and IDE
D. 4-bit and 8-bit
A. GDDR3 and GDDR5
In most current systems ______ is the type of RAM used.
A. DDR2
B. DDR3
C. DDR4
D. DDR5
B. DDR3
RAM is an example of _______.
A. volatile
B. nonvolatile
C. permanent
D. mobile
A. volatile
The small circuit boards that hold a series of RAM chips are called _______.
A. flash memory cards
B. expansion cards
C. virtual memory
D. memory modules
D. memory modules
The rule of thumb that predicts that CPU capacity will double every two years is called ______.
A. CPU Rule
B. Moore’s Law
C. Intel’s Law
D. Express Rule
B. Moore’s Law
A(n) ________ enables the computer to drive the speaker system.
A. video card
B. surround card
C. sound card
D. speaker card
C. sound card
On a Windows 7 system, you can determine the amount of RAM by looking in the ______ window.
A. Performance
B. Memory
C. System Properties
D. Utilities
C. System Properties
Running the Disk Cleanup utility is a quick way to ______.
A. defrag your hard drive
B. remove spyware programs
C. clear out unnecessary files
D. clean out your Startup folder
C. clear out unnecessary files
A video card is an expansion card installed inside your ______.
A. Monitor
B. VGA hookup
C. system unit
D. video memory
C. system unit
Which statement pertaining to system reliability is FALSE?
A. Having the latest version of software products can make your system more reliable
B. An accumulation of temporary Internet files has no effect on your computer’s overall performance.
C. You can clean out unnecessary programs from your Startup folder.
D. When you defrag your hard drive, it works more efficiently
B. An accumulation of temporary Internet files has no effect on your computer’s overall performance.
Cache memory levels are defined by ______.
A. the amount of storage space on chip
B. the physical size of the chip
C. the speed of the chip
D. the chip’s proximity to the CPU
D. the chip’s proximity to the CPU
Which program provides a seven layer overwrite for the Mac operating system?
A. File shredder
B. Shredlt X
C. Eraser
D. Wipe
B. Shredlt X
There are ____ levels of cache memory.
A. 5
B. 2
C. 3
D. 4
C. 3
Running the CPU at a faster speed than the manufacturer recommends is called _____.
A. fetching
B. clock speed
C. overclocking
D. hyperthreading
C. overclocking
A _____ uses electronic memory and has no motors or moving parts.
A. Mechanical hard drive
B. Solid state drive
C. Blu-ray disc
D. Digital video disc
B. Solid state drive
All of the following are procedures you can follow ensure your system performs reliably, EXCEPT ____.
A. Run the Disk Defragmenter
B. Run spyware and adware removal programs
C. Install a reliable antivirus package
D. Run key utilities only when you can observe the process
D. Run key utilities only when you can observe the process
All of the following are part of the machine cycle, EXCEPT _____.
A. Fetch
B. Encode
C. Execute
D. Store
B. Encode
Running the Disk Defragmenter utility will ______.
A. Detect and remove spyware
B. Clear out temporary Internet files
C. Make the hard drive work more efficiently
D. Clean out your Startup folder
C. Make the hard drive work more efficiently
All of the following are types of computer users, EXCEPT ______.
A. mobile user
B. typical user
C. power user
D. casual user
B. typical user
All of the following are parts of the machine cycle, EXCEPT ______.
A. fetch
B. encode
C. execute
D. store
B. encode
The maximum memory you can install using the 64-bit version of Windows 8 Pro is ____ GB.
A. 4
B. 16
C. 176
D. 192
D. 192
The amount of RAM recommended for most systems today is measured in _______.
A. KB
B. gigahertz
C. GB
D. megahertz
C. GB
All of the following are examples of optical drives, EXCEPT ______.
A. solid-state disc
B. compact disc
C. digital video disc
D. Blu-ray disc
A. solid-state disc
The control unit is one component of the ______.
A. CPU
B. RAM
C. front side bus
D. clock
A. CPU
A ________ is an expansion card that’s installed inside the system unit to translate data into images.
A. graphic processing unit
B. audio card
C. video card
D. memory card
C. video card
The amount of RAM that is actually on the memory modules in your computer is the _____ memory.
A. virtual
B. nonvolatile
C. permanent
D. physical
D. physical
Which of the following is NOT a main characteristic associated with desktop computers as compared to notebooks?
A. A desktop computer requires more space.
B. A desktop computer is harder to move around.
C. A desktop computer is more expensive.
D. A desktop computer is easier to expand.
C. A desktop computer is more expensive.
Laptops are often equipped with a(n) ________ slot that allows you to read flash memory cards such as CompactFlash, memory sticks, and secure digital cards.
A. eSATA
B. ExpressCard
C. USB
D. FireWire
B. ExpressCard
When referring to hard drives, access time is measuring in _______.
A. hertz
B. bps
C. milliseconds
D. kilobytes
C. milliseconds
All of the following are examples of database software, EXCEPT _____.
A. Oracle
B. OneNote
C. My SQL
D. Access
B. OneNote
Presentation software includes all of the following features, EXPECT______.
A. animation effects
B. formulas
C. transitions
D. themes
B. formulas
The appropriate software to use for creating research paper is _____.
A. spreadsheet software
B. presentation software
C. word processing software
D. database software
C. word processing software
4. _____ software helps you manage e-mail, contacts, calendars, and tasks in one place.
A. database
B. Personal information manager
C. spreadsheet
D. word processing
B. Personal information manager
Software refers to a set of instructions that tells the computer what to do. These instructions set are called ______.
A. database
B. programs
C. peripherals
D. Devices
B. Programs
All of the following are media management software used to organize music, video, and pictures, EXCEPT _____.
A. Windows Media Player
B. Sony Sound Forge
C. Apple Itunes
D. Winamp
B. Sony Sound Forge
In databases, information is organized in _______.
A. tables
B. records
C. fields
D. all of the above
D. all of the above
The cell address C5 indicates that the cell ______.
A. contains a label values of “C5”
B. is at row C, column 5 of the worksheet
C. is used in a formula involving the value “C5”
D. is at column C, row 5 of the worksheet
D. is at column C, row 5 of the worksheet
In a spreadsheet, equations you build yourself using values and cell references are called ______.
A. functions
B. calculations
C. formulas
D. values
C. formulas
Web-based application software is software that ______.
A. enables you to create Web pages
B. is installed by the computer manufacturer
C. is stored completely on a web server instead of your hard drive
D. does not need an Internet connection
C. is stored completely on a web server instead of your hard drive
Computer-aided design software is used primarily by _______.
A. engineers to create models
B. airline pilots to navigate
C. project managers to track tasks
D. game makers to create games
A. engineers to create models
A ________ is a Microsoft office feature that walks you through steps to complete a complicated task.
A. template
B. macro
C. wizard
D. function
C. wizard
Microsoft’s _______ enables you to create a 3-D walkthrough of your favorite vacation places.
A. Photostitch
B. Photosynth
C. Photosync
D. Photosee
B. Photosynth
QuickBooks and Peachtree are examples of _______ software.
A. educational
B. accounting
C. course management
D. gaming
B. accounting
Adobe Photoshop and Corel PaintShop Photo Pro are examples of ______ software.
A. image-editing
B. painting
C. Web page authoring
D. computer-aided desig
A. image-editing
The intersection of a row and a column in a spreadsheet program is known as a _______.
A. label
B. formula
C. function
D. cell
D. cell
QuarkXPress and Adobe InDesign are examples of ______ software.
A. image-editing
B. word processing
C. desktop publishing
D. video-editing
C. desktop publishing
Software designed for specific industry is known as _____.
A. multimedia
B. general business
C. project management
D. vertical market
D. vertical market
The type of software that is best used to create a simple budget is ____.
A. spreadsheet worksheet
B. word processing software
C. presentation software
D. database software
A. spreadsheet worksheet
______ software is the software that helps run the computer and coordinate instructions between the computer and the hardware devices.
A. Application
B. Recovery
C. Backup
D. System
D. System
All of the following are tips for a great presentation, EXCEPT ______.
A. limit bullet points per slide to four to six
B. use images to convey a thought or illustrate a point
C. use a variety of animations on most slides
D. keep the font size large enough to be read from the back of the r
C. use a variety of animations on most slides
All of the following are examples of educational and reference software EXCEPT _____.
A. Test Preparation
B. Trip planning
C. Genealogy
D. EverQuest
D. EverQuest
Another way to obtain software is through ______, where a vendor hosts the software online over the Internet and you do not have to install it on your computer.
A. Open Source as a service
B. Proprietary as a service
C. Software as a service
D. Webware as a Service
C. Software as a service
System software does all of the following, EXCEPT ______.
A. help run the computer
B. coordinate instructions between application software and the company’s hardware devices
C. add graphics and pictures to files
D. help manage system resource
C. add graphics and pictures to files
Multimedia software includes all of the following, EXCEPT _______.
A. image-editing software
B. animation software
C. utility software
D. audio-editing software
C. utility software
CD ripping refers to _______.
A. stealing songs off the Internet
B. encoding CDs to MP3 format
C. creating your own CDs from your MP3 collection
D. erasing content on a CD
B. encoding CDs to MP3 format
What is Google’s first attempt at a netbook where all applications and files are stored on the Web?
A. Google docs
B. Gmail
C. Chromebooks
D. Cloud Computing
C. Chromebooks
In a spreadsheet, equations you build yourself using values and cell references are called _____.
A. functions
B. calculations
C. formulas
D. values
C. formulas
Every software program has a set of ______ that specify the minimum recommended standards for the operating system, processor, RAM, and the hard drive capacity.
A. specifications
B. programming instructions
C. system requirements
D. help files
C. system requirements
Google ______ is a popular application that lets you edit images and helps to organize and share your digital images.
A. Snapfish
B. Shutterfly
C. Picaso
D. Rembrand
C. Picaso
Moodle and Blackboard are examples of ________.
A. utility software
B. educational software
C. course management software
D. gaming software
C. course management software
A(n) ________ software installation enables you to decide which features you want to install on the hard drive.
A. full
B. upgrade
C. custom
D. new
C. custom
All of the following are types of multimedia and entertainment software, EXCEPT ______.
A. digital audio software
B. gaming software
C. drawing software
D. productivity software
D. productivity software
________ software helps you manage e-mail, contacts, calendars, and takes in one place.
A. Database
B. Personal information manager
C. Spreadsheet
D. Word processing
B. Personal information manager
Errors in computer software are called _______.
A. ants
B. insects
C. bugs
D. spiders
C. bugs
C:DocumentsSpring 2012CIS 101Term PaperComputer Technology is an example of a _______.
A. file extension
B. file type
C. file path
D. file list
C. file path
If Microsoft Word 2010 is used to create a file, which file extension is added automatically?
A. .docx
B. .doc
C. .docs
D. .docf
A. .docx
Which of the following types of programs help manage system resources such as the hard drive?
A. Application software
B. Utility programs
C. Productivity software
D. Application programming interfaces
B. Utility programs
The most popular tablet operating system was developed by _______.
A. Microsoft
B. Apple
C. Google
D. Symbian
B. Apple
A(n) _______ is a small program that performs general housekeeping tasks for your computer.
A. operating system
B. user interface
C. application software
D. utility program
D. utility program
All of the following are true about real-time operating systems (RTOS), EXCEPT _______.
A. they are also called embedded systems
B. they are programs with specific purposes
C. they require significant user interaction
D. they are written specifically for the needs of the de
C. they require significant user interaction
MS-DOS first used a(n) _______ interface.
A. menu-driven
B. graphical-user
C. event-driven
D. command-driven
D. command-driven
Which of the following does NOT occur during the power-on self-test?
A. The video card and video memory are tested.
B. The OS is moved into RAM.
C. The BIOS is identified.
D. Memory is tested
B. The OS is moved into RAM.
A special numerical code that prioritizes device requests from the operating systems is called _______.
A. event
B. interrupt handler
C. interrupt
D. spooler
B. interrupt handler
UNIX was developed by Ken Thompson and Dennis Richie who worked at _____.
A. IBM
B. Microsoft
C. Xerox
D. AT&T’s Bell Labs
D. AT&T’s Bell Labs
Each device attached to your computer comes with a special program called a _____ that facilitates communication between the device and the OS.
A. device driver
B. translator
C. communication utility
D. device configuraton
A. device driver
More than 50% of smartphones use an operating system developed by ____.
A. Google
B. Apple
C. Microsoft
D. Symbian
A. Google
Which of the following Windows utility programs arranges pieces of files on your hard drive in sequential order?
A. Disk cleanup
B. Disk Defragmenter
C. Error Checking
D. Task manager
B. Disk Defragmenter
XO is the name of the computer provided by the ______ initative.
A. IT Beta
B. Computers for All
C. Digikid
D. One Laptop per Child
D. One Laptop per Child
The process of optimizing RAM storage by borrowing hard drive space is called _____.
A. Thrashing
B. swap file
C. virtual memory
D. page file
C. virtual memory
Which of the following is the name of Microsoft Access File?
A. inventory.xlsx
B. inventory.wpd
C. inventory.accdb
D. inventory.bm
C. inventory.accdb
The top three operating systems for personal computers are_____.
A. Microsoft Windows, Mac OS X, and Android 3.0
B. Mac OS X, Android 3.0, and UNIX
C. Microsoft Windows, Android 3.0, and Linux
D. Microsoft Windows, Mac OS X. and Linux
D. Microsoft Windows, Mac OS X. and Linux
The latest version of the Mac OS X is the ______.
A. Snow leopard
B. Mountain Lion
C. Mountain Cougar
D. Snow Tiger
B. Mountain Lion
The _____ of the operating system enable the user to communicate with the computer system.
A. Window
B. Modem
C. Network adapter card
D. User interface
D. User interface
Which of the following was the first widely used operating system installed in personal computers?
A. Symbian OS
B. Microsoft Windows
C. MS-DOS
D. Linux
C. MS-DOS
The basic input/output system is stored on a _____ chip.
A. ROM
B. CPU
C. RAM
D. CMOS
A. ROM
The location of a file is specified by its ______.
a. drive letter
b. file path
c. file type
d. file extension
b. file path
The _______ is(are) the group of programs that controls how your computer functions.
a. utility programs
b. application software
c. user interface
d. operating system
d. operating system
All of the following are examples of network operating systems, EXCEPT ________.
a. Windows Server
b. Linux
c. UNIX
d. OS X Mountain Cougar
d. OS X Mountain Cougar
Which of the following operating systems is used primarily with mainframes as a network operating system?
a. UNIX
b. Mac OS
c. Symbian OS
d. Windows Vista
a. UNIX
Windows 8 is offered in ______ versions.
A. 1
B. 2
C. 3
D. 4
B. 2
All of the following are terms related to part of the boot process, EXCEPT
A. ROM
B. BIOS
C. RAM
D. USB
D. USB
Robotic cameras used by television stations for sports events require a ______ operating system.
A. single-user, single-task
B. single-user, multitask
C. multiuser
D. real-time
D. real-time
You can use the Windows _______ to check on a nonresponsive program.
A. System restore
B. Backup utility
C. Explorer
D. Task Manager
D. Task Manager
What utility takes out redundancies in a file to reduce the file size?
A. Disk cleanup
B. File Compression
C. Error-checking
D. System restore
B. File Compression
. The most essential software in your computer system is the ________.
A. security
B. antivirus
C. operating system
D. productivity
C. operating system
Which of the following is the name of a Microsoft Access file?
A. inventory.xlsx
B. inventory.wpd
C. inventory.accdb
D. inventory.bmp
C. inventory.accdb
The OS enables you to organize the contents of your computer in a hierarchical structure of ________.
A. files
B. libraries
C. directories
D. drives
C. directories
Most supercomputers use the ________ operating system.
A. UNIX
B. Linux
C. Windows
D. iOS 5
B. Linux
For performing common tasks, Windows 8 has special shortcuts called ______.
A. bracelets
B. pins
C. charms
D. apps
C. charms
The _____ of the operating system enables the user to communicate with the computer system.
A. window
B. modem
C. network adaptor card
D. user interface
D. user interface
Which of the following is the first step in the boot process?
A. The BIOS is activated by turning on the computer.
B. The BIOS checks that all devices are in place.
C. The OS is loaded into the RAM.
D. Configuration and customization settings are check
A. The BIOS is activated by turning on the computer