• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/168

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

168 Cards in this Set

  • Front
  • Back
Which one of the following spelling errors would not be detected by a spelling checker?

notise
changable
blew
recieve
blew
Which one of the following spelling errors would not be detected by a spelling checker?

notise
changable
blew
recieve
blew
For which situation would a tutorial be appropriate?

finding out the meaning of the term “GIGO”
creating a slide show
learning how to use a spreadsheet
writing a report on the history of computers
learning how to use a spreadsheet
To which category of application software do dictionaries, encyclopedias, and tutorials belong?

personal
communications
productivity
reference
reference
What software product could help you look slimmer in a photograph?

graphics software
drawing software
image-editing software
painting software
image-editing software
For which of the following would project management software most likely be used?

constructing a light-rail system
testing a new type of aircraft
writing a book
designing a bridge
constructing a light-rail system
Which one of the following would be best for conducting the annual meeting of the board of directors of a national organization?

multipoint webconferencing
instant messaging
groupware
point-to-point webconferencing
multipoint webconferencing
Which database feature relates to organizing information in different ways?

sort
link
query
find
sort
Which feature would you use to create a list of clients living in the 98228 ZIP code?

sort
find
query
link
sort
WebCT, a popular distance-learning platform, originally began as

shareware.
customized software.
free software.
commercial software.
free software.
Which one of the following is the largest category of application software for individual use?

educational and reference software
communications software
productivity software
software for home and personal use
productivity software
Users enter data into a database by using a

file.
table.
record.
form.
form.
Which one of the following is an advantage of computer-aided design software?

It can be used to test design versions before the first prototype is built.
It can be adapted for use by small businesses and homeowners.
Compared with project management software, it is relatively inexpensive.
It can be used by anyone, with virtually no training.
It can be used to test design versions before the first prototype is built.
An image-editing program can eliminate red-eye effects from photographs.

True
False
True
Another name for a software suite is integrated software.

True
False
True
Painting and drawing programs can help you save money on

interior decorating.
art books.
oil paintings for your home.
greeting cards.
greeting cards.
How do developers of shareware make their money?

They charge users for product support.
They encourage users to pay a small fee each time they use the program.
They sell their software in retail stores.
They charge users a fee to download the software from the Internet.
They charge users for product support.
Which one of the following is not a way to format numbers in a spreadsheet?

currency value
upper or lower case
decimal point placement
positive or negative quantity
upper or lower case
A micro is a set of commands that automates complex or repetitive actions.

True
False
False
Copyrighted software that is owned by a company or an individual is

commercial software.
productivity software.
proprietary software.
customized software.
proprietary software.
A video store might use a database for all of the following purposes except

to generate a mailing list for an in-store promotion.
to keep track of which videos have been rented.
to manage records pertaining to its video inventory.
to estimate profits if video rentals increase by 10 percent.
to estimate profits if video rentals increase by 10 percent.
Personal finance software allows users to do all of the following except

keep track of investments.
pay bills.
balance checkbooks.
take out loans.
take out loans.
Which one of the following is not a search engine?

WebCrawler
Alta Vista
Yahoo!
Internet Explorer
Internet Explorer
Microsoft Word is an example of

individual application software.
workgroup application software.
horizontal application software.
vertical application software.
individual application software.
At the start of an application program the message “This product is licensed to ...” may come on the screen. This message means that you

own the software.
can make a backup copy.
passed a test in order to use the software.
have the right to resell the software.
can make a backup copy.
Which feature of presentation software guides the user step by step?

images
online help
templates
wizards
wizards
What is a possible solution to the problem of fiber-optic access?

dense-wave optics
light-point optics
optical rings
free-space optics
free-space optics
What is the function of a modem?

to raise the pitch of signals coming into the computer
to slow the frequency rate of signals coming into the computer
to allow access to the Internet service provider
to convert signals coming into the computer to digital form
to convert signals coming into the computer to digital form
What is required to make each networked client computer on a LAN work?

a NIC
a WAN
a hub
a spoke
a NIC
Baseband coaxial cable has several channels for transmitting digital signals.

True
False
False
In computer technology, what is a “hotspot”?

a network node that handles a high volume of data transmission
a foreign country from which inflammatory e-mails are sent to the United States
a building with a hard-wired infrastructure that often malfunctions
a public place that offers wireless access
a public place that offers wireless access
Upon arrival at a receiving e-mail server, messages are transferred to another server, called a

POP server.
print server.
data server.
file server.
POP server.
An extranet might be used to recruit new employees.

True
False
False
What are communications protocols?

capabilities provided by communications software programs, such as e-mail and use of Web browsers
rules and procedures for exchanging information among computers on a network
standard specifications for manufacturing communications hardware
acceptable ways for computer users to behave when they are online
rules and procedures for exchanging information among computers on a network
Which network topology features computers and peripheral devices linked to a central computer?

hybrid
bus
ring
star
star
Asynchronous transmission is faster than synchronous transmission.

True
False
False
Which communications hardware device helps wires and cables to carry a message the full distance?

gateways
hubs
repeaters
routers
repeaters
Which of these network components functions as a channel through which data are transmitted?

communications software
telephone lines
modem
computer
telephone lines
Computers linked in a single network on a college campus are an example of a

MAN.
PAN.
LAN.
WAN.
LAN.
What is a main advantage of peer-to-peer architecture?

It eliminates the need to install individual copies of programs on each computer within the network.
It is simpler to install and maintain than client/server architecture.
It is available only to authorized users.
It operates well under heavy workloads.
It is simpler to install and maintain than client/server architecture.
What is the name for a network that is housed within an organization to serve internal users?

intranet
intrenet
Ethernet
Internet
intranet
What is the name of the computer chip that Intel developed for Wi-Fi?

Pentium
Centrino
Celeron
Athlon
Centrino
Which of these is the strongest competitor to DSL?

ISDN lines
Cable modems
T3 lines
T1 lines
Cable modems
A wide area network limited to a specific site, such as a city or town, is a

PAN.
VPN.
VAN.
MAN.
MAN.
A network’s topology determines the type of networking software needed.

True
False
False
In contrast to twisted-pair cable, coaxial cable

consists of two parallel copper wires.
can carry much more data.
is less expensive.
requires repeater stations to strengthen communication signals.
can carry much more data.
What is Ethernet?

an extension of an intranet
a LAN communication protocol
the forerunner of the Internet
specialized communications software

Question 23 text Question 23
a LAN communication protocol
Where is the most likely location for a microwave station?

in outer space
on top of a mountain
in a user’s backyard
in a valley
on top of a mountain
What is another name for repeaters?

responders
amplifiers
splitters
transceivers
amplifiers
Bandwidth is measured in

bytes per second.
bites per second.
bots per second.
bits per second.
bits per second.
Blogs are electronic

newspapers.
novels.
magazines.
journals.
journals.
A more recent Internet application that allows conversations over the Web through live video transmission involves

webcasting.
webcams.
Voice over IP.
audio mail.
webcams.
What is moving about the Web called?

scanning the Web
searching the Web
surfing the Web
scrolling the Web
surfing the Web
All of the following are advantages of free e-mail except users can

easily close out a free e-mail account and open another one.
see a large number of unsolicited ads.
establish several free e-mail accounts to use for different purposes.
access messages from any Internet connection.
see a large number of unsolicited ads.
Until recently, instant messaging has been used primarily for

business communications.
emergencies.
chatting with friends.
home entertainment.
chatting with friends.
Larry Page and Sergey Brin are the creators of

Microsoft.
Yahoo!.
Google.
Apple.
Google.
AND, OR, and NOT are common

search terms.
search options.
search operators.
keywords.
search operators.
What is the advantage of using Internet telephone services?

Connections are much better than traditional phone service.
There are no long-distance telephone charges.
Users pay reduced ISP connection fees.
Calls can be transmitted anywhere.
There are no long-distance telephone charges.
In the URL “http://www.wired.com/news,” what does “news” represent?

file specification
communications protocol
domain name
format information
file specification
According to a study of chat room behavior, which user name will receive the most malicious messages?

Jack
Irene
Nightwolf
It is impossible to determine
Irene
MP3 is a format that can reduce the size of CD music files by a factor of

1 to 2 .
3 to 5.
10 to 14.
30 to 40.
10 to 14.
What are cookies?

small files that indicate what Web sites the user has visited
small files that contain favorite recipes
small programs that provide the ability to play online games
miniprograms that extend the capabilities of Web browsers
small files that indicate what Web sites the user has visited
On the Internet, what is flaming?

downloading copyrighted material
monopolizing discussion in a chat room
using the all-caps style in an e-mail message
hurling insults at other users
hurling insults at other users
Internet relay chat is a popular IM system.

True
False
True
It is legal for an employer to read an employee’s e-mail messages.

True
False
True
Someone who maintains order in a chat room is called

an operator.
an enforcer.
a moderator.
a Web master.
a moderator.
To start a one-on-one conversation via instant messaging, you must know the other person’s

handle.
name.
password.
e-mail address.
handle.
What is the domain suffix for the U.S. Navy?

.gov
.org
.mil
.com
.mil
At present, how many pages of information are available on the Web?

500,000
more than a million
more than a billion
more than a trillion
more than a billion
P2P allows people to download material directly from other users’ hard drives.

True
False
True
Spam is the electronic equivalent of

overnight delivery.
junk mail.
first-class mail.
snail mail.
junk mail.
Cyberwars are wars between people who play virtual reality games.

True
False
False
Who would like to see longer, more complex encryption keys used on the Internet?

crackers
Federal Bureau of Investigation
e-tailers
U.S. Congress
e-tailers
Signature verification systems can tell all of the following except

the speed of each stroke.
the delays and points where the pen was lifted from the paper.
the brand of pen used.
the pen pressure.
the brand of pen used.
Why are many companies now using biometric authentication?

to apprehend employees who are stealing hardware and peripherals
to avoid hiring known criminals
to determine if employees are wasting time on the job
to make sure only authorized employees enter secure areas
to make sure only authorized employees enter secure areas
Why are many hackers difficult to catch?

They are constantly on the move.
They change their identity frequently.
They are too clever for law enforcement officials.
They live in foreign countries.
They live in foreign countries.
Computer programs that generate thousands of likely passwords are available for free over the Internet.

True
False
True
People who create and release viruses often do so in order to

keep from being bored.
make money.
demonstrate their computer skills.
play a trick on friends.
demonstrate their computer skills.
The most secure strategy is to save a backup

once a day.
once a week.
once every other week.
once a month.
once a day.
In contrast to passwords, user IDs are

the core security element.
needed for authentication.
sought by cyber criminals.
publicly known.
publicly known.
What crime do signature verification systems attempt to prevent?

burglary
forgery
homicide
arson
forgery
What happens in a denial of service attack?

Thousands of false requests bombard a Web site at once and force it to shut down.
Groups of international hackers attack Web sites in opposing countries.
The government raids the homes of suspected hackers and shuts down their computers.
A group of Web sites refuses the legitimate requests of computer users.
Thousands of false requests bombard a Web site at once and force it to shut down.
A mirrored hard drive is one way corporations protect their critical databases.

True
False
True
What is Alan Kay noted for?

helping to develop the Apple computer
creating the first-known worm on the Internet
developing data encryption protocols for the FBI
inventing hand geometry systems
helping to develop the Apple computer
What is another name for data browsing?

stealing
gossiping
spoofing
snooping
snooping
In keystroke identification, what is the amount of time between keystrokes called?

flight time
release time
exposure time
dwell time
flight time
Some e-mail viruses can be activated without downloading an attachment.

True
False
True
What has heightened the problem of employee theft of hardware and peripherals?

Internet accessibility
redundant systems
data encryption
mobile computing
mobile computing
Spoofing is the process of fooling another computer by pretending to send packets from a legitimate source.

True
False
True
Software that enables users to perform the types of activities and work computers were designed for is called
Application Software
Software used to create professional-quality publications is called
A desktop publishing (DTP) software
A previously created and stored form is called a(n)
Template
A word processor editing feature that checks a document for common errors in grammar, usage, and mechanics is called a(n)
Grammar Checker
The transmission and receipt of messages over a worldwide system of communications networks is called
E-Mail (Electronic Mail)
Software versions of rules worksheets accountants used in the past are called
Spreadsheet Software
A collection of data organized in one or more tables consisting of fields and records is known as a(n)
Database
A group of software programs bundled into a single package is called
A Software Suite
A communication method that enables people to communicate over the Internet with other users in real time is called
Instant Messaging
Software that allows people to share information and collaborate on various projects, such as developing a new product, is called
Groupware
The process of altering content of an existing document is called
Editing
A set of commands that automates complex or repetitive actions is known as a(n)
Macro
A program that allows the user to create and manage a computerized database, and to produce reports from stored data is a(n)
Database Management System (DBMS)
___ software makes it possible to create slide shows that combine text, numbers, graphics, sounds, and video.
Presentation Graphics Software
___ software is a sophisticated kind of software providing tools that enable professionals to create architectural, engineering, product, and scientific designs.
Computer-aided design *CAD)
A ___ is a form of instruction in which students are guided step by step through the learning process.
Tutorial
Spreadsheets display numbers and text in columns and rows known as a matrix or
Grid
___ software enables users to readily view how their money is being spent.
Personal Finance Software
A ____ database allows tables to be linked in a way that allows data to be retrieved from more than one table.
Relational
Software provided without charge to anyone wanting to use it is called
Freeware
A(n) ___ signal is a transmission signal in which information is sent in the form of continuous waves over a medium at a certain frequency range.
Analog
The term ___ refers to the amount of data that can travel over an analog medium.
Bandwidth
___ is an increasingly popular communications medium that requires no phone lines or cables.
Cellular Technology
A ____ is an electronic device used in a local area network that links computers and allows them to communicate.
Hub
Standards (rules) that govern the transfer of information among computers on a network and those using telecommunications are called
Communications Protocols
A network architecture that uses a central, or host, computer through which all transmissions pass is called
Client/Server Architecture
A ___ consists of hardware and/or software that allows communication between dissimilar networks.
Gateway
A ___ is a private network that connects PCs and workstations located in close proximity, storing software applications and other resources on a special computer called a file server.
Local Area Network
In a ___ topology, multiple computers and devices are linked to a central computer, called a host.
Star
In ___ , all of the data bits are transmitted one bit after another in a continuous line.
Serial Transmission
___ refers to the use of computer hardware and software for sending and receiving information over communications media, making it possible for computer users throughout the world to communicate with each other.
Telecommunications
A physical link that allows computers to be connected to other computers in different locations is called a ____.
Communications Medium
___ refers to the way a network is designed and built.
Network Architecture
A ___ topology combines different kinds of network layouts into one.
Hybrid
In a ___ topology, all computers are linked by a single line of cable.
Bus
In a ___ topology, each computer is connected to two other computers, with the entire network forming a circle.
Ring
Hardware and/or software that allows communication between two similar networks is called a
Bridge
Notebook and other portable computers use ___ modems.
Personal Computer Memory Card International Association (PCMCIA)
Three possible directional protocols that determine the directional flow of transmissions among devices are ___ , ___ , and ___
Simplex, Half-duplex and Full-Duplex
The World Wide Web uses the ___ to transfer Web pages to computers.
Internet
The first screen visible when entering a Web site is called the
Home Page
Of the following types of internet connections, which generally provides the fastest speed?
DSL
Files contained in e-mail messages are known as
attachments
A type of ISP connection that provides high-speed access that might have to be shared with other users is a
Cable modem
HTML stands for
Hypertext Markup Language
A file can be transported from a Web page to a PC by
downloading
ISP stands for
Internet Service Provider
Instant messaging is different from e-mail because
instant messaging is interruptive, like a phone call.
Telecommuting or telework involves
Avoiding the effort of commuting in a car to work every day

Working online from home rather than in an Office

A new and growing way for companies to reduce operating costs.
Why should users of chat rooms and instant messaging environments be wary of online strangers?
The anonymous nature of online conversations mean that you don't really know with whom you are conversing.
The graphic persona of a player in a virtual reality game is called a(n)
Avatar
A small file stored on a web surfer's hard drive that might be used to track behavior is called a(n)
Cookie
The part of a URL that comes last and identifies the type of organization is called the
Domain Name
Another term used for telecommuting is called
Telework
A four-group series of numbers separated by periods represents a(n)
Internet Protocol Address
An advertisement that occupies a rectangular portion of the screen is called a(n)
Banner
Unwanted, repeated e-mail messages that are transmitted over the internet are called
Spam Messages
The design feature that describes how packets are moved around the Internet by the best available route is called
Dynamic Routing
Web sites often ask for the user's approval before downloading and installing a
Plug In
A(n) ___ is a group of related Web sites that are linked together.
Webring
A company's most valuable possession is often its
Information
A ___ is a work-around or an alteration of a program so that software copy protection is removed.
Crack
Passwords are a form of the security measure known as
Authentication
____ measure a biometric identifier.
Fingerprint Scanners

Hand Geometry Systems

Computerized Facial Recognition (CFR) Systems
A ___ is a program that displays network traffic.
Network Sniffer
What is the difference between a software virus and a software worm?
A worm actively tries to send itself places
___ eliminate(s) the need for users to remember user IDs and passwords for multiple systems
Single sign-on (SSO)
A powerful form of attack upon a Web site that is difficult to guard against and often involves organized team of hackers is called
Denial of Service
A power supply for your computer that will keep it running smoothly during brownouts and blackouts is called a
UPS
A ____ virus hides inside another legitimate program or data file
Trojan Horse
___ is a type of information theft that equates to an invasion of privacy.
Data Browsing
The difference between a hacker and a ___ is that the latter has malicious intent.
Cracker
The process of fooling another computer by pretending to send packets from a legitimate source is called
Spoofing
A ___ is a physical attribute that is unique to an individual and can be used to authenticate identity.
Biometric Identifier
The proof that a user is who he says he is, and that he is authorized to access an account is called
Authentication
A hardware problem that causes the electricity to surge and possibly damage data is called a
Power Spike
A plan to fix a system after a catastrophe is called a
Disaster Recovery Plan
The act of one company seeking illicit information from another company is called
Industrial Espionage
A rare and sophisticated virus that attempts to hide from antivirus software by covering up its identifiable characteristics is called
Stealth Virus