Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

Computer Science Concepts and Terminology, Exams of Community Corrections

A list of computer science concepts and terminology, including device drivers, synchronizing files, cloud computing, web servers, opensource, databases, distance education, online content, search engines, malware, firewalls, ai applications, personal computer ethics, ecommerce technologies, and various types of software and networks. Each term is presented followed by a correct answer.

Typology: Exams

2023/2024

Available from 02/20/2024

doctorate01
doctorate01 🇺🇸

3.8

(8)

2.8K documents

Partial preview of the text

Download Computer Science Concepts and Terminology and more Exams Community Corrections in PDF only on Docsity! CSIT101 Final Exam Review Questions with 100% Correct Answers 2024 Update. 1. A printer requires a ____ installed on the computer in order to operate - Correct answer device driver 2. Users multiple computers, such as a desktop, notebook, and smartphone are well acquainted with the process of _____ files. - Correct answer synchronizing 3. A Kindle eBook reader is an example of a (n) _____ computer. - Correct answer special purpose 4. A _____ is an example of a computer assigned to a special task. - Correct answer kiosk 5. When a smart phone goes into ____ mode, pressing a button immediately turns it back on. - Correct answer sleep 6. Embedded operating systems are hardwired into a computer component, such as ROM or flash memory, to control a ____ computer. - Correct answer special purpose 7. Performing a system ____ utility rearranges your files on disk in an orderly fashion, resulting in faster access. - Correct answer defragmentation 8. An icon on your desktop is a component of a ____ interface. - Correct answer graphical user interface 9. The _____ computer platform provides a lot of computing power, such as for gaming, at a single location. - Correct answer desktop 10.Typical _____ computing providers deliver common software online that is accessed from another web service or browser. - Correct answer cloud 11.A _____ provides content that is accessible on the World Wide Web. - Correct answer web server 12.An industrial operating system works with a large computer system requiring a (n) ____. - Correct answer server 13.When you combine a system's hardware configuration and operating system, it is sometimes called the computer's ____. - Correct answer platform P a g e 1 | 18 14.A (n) ____ view of data is the way a user thinks about data. - Correct answer logical 15.Through the use of ____, one physical server can run several server operating systems. - Correct answer virtual servers 16.Linux is ____ software, which means users can manipulate the source code to customize their operating system to their needs. - Correct answer open- source 17.____ Operating systems are lightweight operating systems designed for mobile devices such as smart phones and tablets. - Correct answer mobile 18.Windows cleaners maintain the ____ for more effective system operation. - Correct answer registry 19.Embedded systems can be found in all of the following EXCEPT _____. - Correct answer cloud computers 20.Which is not part of the boot process - Correct answer verifies the user's login name and password 21.___ Communication allows participants to leave messages for each other. - Correct answer Asynchronous 22.The popularity of ____ has encouraged everyday users to share events of the day. - Correct answer social media 23.When evaluating information provided on the web, always consider the ____. - Correct answer source 24.Government agencies have not supported cloud computing due to the lack of ____. - Correct answer privacy and security 25.When using ____ as a Service, a business does not have to oversee the storage, backup, or security of its data. - Correct answer infrastructure 26.The most popular search engines such as Google use ____ to store information about webpages. - Correct answer databases 27.Through ____, nontraditional students can complete their coursework from the comfort of their own home. - Correct answer distance education 28.Google relies on ____ to relay information related to its mapped software. - Correct answer satellites P a g e 2 | 18 58.____ is credited with the development of the web. - Correct answer Tim- Berners Lee 59.Global positioning system (GPS) ____ are primarily used to assist travelers in getting from one place to another. - Correct answer receivers 60.Many cities have adopted ____ technology to provide faster Internet speed to their users. - Correct answer IMAX 61.Of the following, ____ contains the most information about citizens of the United States. - Correct answer Lexis Nexus 62. In a practice called ____, someone may manipulate people into performing actions or divulging confidential information on the Internet. - Correct answer social engineering 63.An item such as a smart card is an example of the ____ form of authentication. - Correct answer something you have 64.What is NOT a form of malware? - Correct answer updates 65.A company called ____ provides digital certifications for web transactions. - Correct answer VeriSign 66.A company may hire a ____ hacker to learn about vulnerabilities in its system. - Correct answer white-hat 67.An Internet-based crime is referred to as a (n) ____ crime. - Correct answer cyber 68.A (n) ____ certificate confirms your credentials when conducting business or other transactions on the web. - Correct answer SSL 69.An important function of a firewall is to protect all the ____ of a network or computer from undesirable data. - Correct answer ports 70.When using a public Wi-Fi network, when is it safe to send private information over the network? - Correct answer never 71.To protect your wireless devices and the information they hold, you should set up encryption such as ____. - Correct answer WPA2 72.Twitter is a ____ site. - Correct answer microblogging 73. In a distributed denial-of-service (Dodos) attack, the services of a (n) ____ can be halted. - Correct answer internet server P a g e 5 | 18 74.Which of the following is one realistic way to promote Internet security? - Correct answer select strong passwords and update them regularly 75.You can protect yourself from identity theft by using ____ when transmitting information over network connections. - Correct answer encryption 76.A ____ computer is remotely controlled by a hacker to damage or corrupt a computer resource. - Correct answer zombie 77.Receiving a fraudulent email that closely resembles a legitimate website, such as one from your bank, is known as a (n) ____ attack. - Correct answer phishing 78.A (n) ____ lifestyle involves ridding oneself of all concerns about privacy. - Correct answer transparent 79.An individual who illegally downloads copyright-protected software is referred to as a ____. - Correct answer pirate 80. In the United States, the fundamental law that specifies what kinds of information the government can keep about its citizens and the rights of citizens to know what's kept about them is the ____. - Correct answer Privacy Act of 1974 81.Geographical technology advances to cell phones such as user location and _____ software have improved augmented reality. - Correct answer directional 82.AI applications are ways in which AI methodologies are applied to ____ and provide services. - Correct answer solve problems 83.The ability of people with disabilities to interact with and make use of computer resources is known as ____. - Correct answer accessibility 84.Speech recognition technology has advanced to the point that some users are considering it as an alternative to ____. - Correct answer typing 85.Programs such as ____ support energy conservation for electronic devices - Correct answer ENERGY STAR 86.Why are LEDs used in green computing? - Correct answer they reduce the energy used in displays P a g e 6 | 18 87.Robots are used to perform jobs that involve the three Ds. Which of the following is NOT one of the three Ds? - Correct answer disasters 88.A game console relies on a fast _____ to handle the lively animations in a video game - Correct answer microprocessor 89._____ Virtual reality refers to a user experience where you may feel like you are actually part of the experience generated by the computer. - Correct answer immersive 90.The law that requires telecommunications manufacturers and service providers to make their products and services accessible to people with disabilities, if readily achievable, is ____. - Correct answer U.S. Telecommunications Act of 1996 91.One use for a (n) ____ is to search a database for information pertaining to a specific query. - Correct answer intelligent agent 92.Speech recognition, handwriting recognition, and face recognition all fall under the AI category of ____ recognition. - Correct answer pattern 93.Personal computer ethics involves ____. - Correct answer all of the above 94. IT Access for Everyone is an initiative for increasing access to digital technology for ____. - Correct answer developing nations 95.Users can interact in a virtual reality environment through the use of _____. - Correct answer avatars 96.The Children's Online Privacy Protection Act prohibits businesses from collecting data on children under the age of ____. - Correct answer 13 97. In general, governmental computer ethics involves two main types of responsibilities: ____ and ____. - Correct answer protection; empowerment 98._____ make up a large portion of the interactive media market. - Correct answer video games 99.Over the past few years, a group of ____ have emerged to identify and expose the mishandling of information on the Internet. - Correct answer activists 100. If a behavior is considered ethical, this most likely suggests it is ____. - Correct answer morally right P a g e 7 | 18 130. Computer _____ capture(s) the essence of today's business expectations for knowledge workers within their organizations. - Correct answer fluency 131. A computer relies on the combination of _____ and _____ to turn input into output. - Correct answer hardware; software 132. Traditional _____ media uses newspapers, magazines, and books to deliver information and entertainment. - Correct answer print 133. Which of the following will protect intellectual property for the life of the holder plus 70 years? - Correct answer copyright 134. A general-purpose computer relies on the _____ being used to perform an activity. - Correct answer software 135. Due to the ____ of intellectual property, distribution of content is much faster and easier than it was in the past. - Correct answer digitization 136. _____ Media is programming or music that can be accessed any time of the day, regardless of television and radio schedules. - Correct answer On-demand 137. Which of the following is true of the Digital Millennium Copyright Act? - Correct answer it outlaws the distribution of software meant to crack DRM code. 138. One opponent of the DMCA is the ____. - Correct answer EFF 139. Software such as ____ is used by both students and teachers to find plagiarism problems. - Correct answer Turn tin 140. Which of the following organizations has been successful in shutting down or helping shut down most P2P services. - Correct answer RIAA 141. In a database, a collection of related fields that describes some object or activity is referred to as a ____. - Correct answer record 142. A very large database that holds important data from a variety of sources is called a ____. - Correct answer data warehouse 143. A ____ is a collection of data that has been organized and made available to a user. - Correct answer database P a g e 10 | 18 144. A popular database software program called ____ offers a wizard and QBE tool to help build and generate SQL queries. - Correct answer MS Access 145. A data warehouse ____ data from several databases to provide useful information. - Correct answer merges 146. With ____, users are able to store data on Internet servers housed in data centers. - Correct answer cloud computing 147. ____ is a concern for some organizations and individuals when data is collected in databases without their permission. - Correct answer privacy 148. Installation and the ongoing maintenance of software in a database system are the job of the database ____. - Correct answer administrator 149. A ____ is a program that lets computer users create and access a collection of organized data. - Correct answer database management system 150. Query wizards and ____ automate the process of writing SQL commands in a relational database. - Correct answer QBE 151. The ____ data manipulation language is used to build databases in both mainframe and personal computers. - Correct answer SQL 152. On Amazon.com, when the customer is ready to make a purchase, the database ____ manages the entire process. - Correct answer management system 153. To avoid data ____, a database stores data in one place. - Correct answer redundancy 154. In a database, a collection of related records is referred to as a table or a ____. - Correct answer file 155. In a database, first name would be an example of a ____. - Correct answer field 156. The output of data mining in a business setting is sometimes called ____. - Correct answer business intelligence 157. The process of extracting information from a data warehouse or data mart is called ____. - Correct answer data mining P a g e 11 | 18 158. Data ____ refers to the quality and accuracy of the data. - Correct answer integrity 159. In a relational database, a ____ would ensure that two customers with the same name don't get confused with each other. - Correct answer primary key 160. A primary key is a ____ within a database table that uniquely identifies each record. - Correct answer field 161. When you're looking for Web pages containing specific words or phrases, use a _______________ engine. - Correct answer general 162. A _____________ lets you search blogs, microblogs, comments, and conversations on social media sites. - Correct answer social search tool 163. A ____________ sends a query to many search engines at the same time. - Correct answer met search 164. A ___________ is a catalog of Web pages organized by topic. - Correct answer subject directory 165. A ____________ engine lets you search databases, news providers, or podcasts. - Correct answer specialty search 166. Network protocol that defines how to route data across a network - Correct answer TCP/IP 167. A communications standard that specifies the method and speed that devices use to transmit data - Correct answer protocol 168. Standards that wireless fidelity devices use - Correct answer 802.11 169. Technology, also known as the 802.16 standard that computers and devices use to communicate wirelessly across long distances - Correct answer IMAX 170. Technology that computers and devices use when communicating via radio waves across a medium distance - Correct answer Wi-Fi 171. A (n) _____________ is a summary of your education, work experience, skills, and accomplishments. - Correct answer resume 172. A (n) _________ provides access to employment openings and offers services such as advice on writing resumes and giving interviews. - Correct answer job-search site P a g e 12 | 18 202. Chat groups, Web conferencing, and VoIP are examples of this type of communication. - Correct answer synchronous 203. Enables several colleagues to work together on a single document at the same time. - Correct answer groupware 204. In this type of communication, the communicators do not have to be online at the same time. - Correct answer asynchronous 205. A communications device a laptop uses to connect to networks - Correct answer wireless adapter 206. Type of network in which data travels from one device to another over cables - Correct answer wired network 207. The world's largest wide area network - Correct answer internet 208. Type of network in which data travels through the air - Correct answer wireless network 209. Type of network that can transmit data from a media player to a computer's speakers - Correct answer personal area network (PAN) 210. Every domain name ends with an extension that indicates its _____. - Correct answer top-level domain 211. A _____ site gathers and organizes Web content, and may automatically downloads updates to subscribers. - Correct answer content aggregator 212. A wiki is an example of a _____ Web site. - Correct answer collaborative 213. Every domain name and its corresponding IP address are entered into a world-wide database called the _____. - Correct answer Domain Name System 214. _____ is an organization that coordinates Internet addresses and domain names around the world. - Correct answer ICANN 215. The first computer network, consisting of four computers, created by the U.S. Department of Defense - Correct answer ARPANET 216. Patented the first mouse in 1970 - Correct answer Douglas Engle Bart P a g e 15 | 18 217. Agency that sets standards and guidelines for the Web - Correct answer W3C 218. The largest network in the world, consisting of millions of interconnected networks - Correct answer internet 219. The part of a worksheet that displays the cell address of the active cell - Correct answer Name box 220. A group of adjacent or nonadjacent cells - Correct answer range 221. Text that describes the contents of another cell or cells in a worksheet - Correct answer label 222. An equation that performs a calculation to generate a value - Correct answer formula 223. The intersection of a single row and column in a worksheet - Correct answer cell 224. Part of the hard drive that the operating system uses as additional RAM - Correct answer virtual memory 225. A key task that operating systems perform to use RAM efficiently - Correct answer memory management 226. A processing technique an operating system uses to process many parts of a single program - Correct answer multithreading 227. A processing technique an operating system uses to divide one task among many processors - Correct answer parallel processing 228. A processing technique an operating system can use if the computer has many processors - Correct answer multiprocessing 229. Type of application software that automates common or repetitive tasks - Correct answer productivity 230. Productivity software that is customized for specific industries - Correct answer vertical market 231. Software that runs on household appliances and consumer electronic devices - Correct answer embedded 232. Type of software that is categorized as operating system (OS) software and utility programs - Correct answer system P a g e 16 | 18 233. Type of program that includes device drivers - Correct answer utility 234. Obtain a software program from an online app store - Correct answer download 235. When publishers load software on a computer before selling it - Correct answer preinstall 236. Install a newer version of your current software program - Correct answer upgrade 237. Remove a software program from your computer - Correct answer uninstall 238. Start a software program - Correct answer run 239. An arrangement that employees who need flexible work schedules use to work from home is called ______. - Correct answer telecommunicating 240. Companies streamline production and perform tasks too dangerous or monotonous for humans using _____ manufacturing. - Correct answer computer-aided 241. A company's computers monitor assembly lines and equipment with _____ communications. - Correct answer machine-to-machine 242. The computer network a business uses to let employees communicate with customers, vendors, and other employees is referred as _____. - Correct answer enterprise computing 243. The gap between people who can access digital information and those who cannot is called the _____. - Correct answer digital divide 244. With ______________, you can buy and sell stocks and bonds without using a broker. - Correct answer online investing 245. With _______________, you can view or listen to online content at any time rather than according to a set schedule. - Correct answer on- demand 246. In ______________ online education, the instructor holds a class that students attend virtually and at the same time. - Correct answer synchronous P a g e 17 | 18
Docsity logo



Copyright © 2024 Ladybird Srl - Via Leonardo da Vinci 16, 10126, Torino, Italy - VAT 10816460017 - All rights reserved