1、Multiple 11. The keyboard, mouse, monitor, and system unit are:hardware output devices storage devices software2. Programs that coordinate computer resources, provide an interface, and run applications are known as:application programs operating systemsstorage systems utility programs3. A browser is
2、 an example of a:basic application specialized programsystem application utility program4. Although not as powerful as a supercomputer, this type of computer is capable of great processing speeds and data storage.mainframe media center midrange netbook5. The smallest type of microcomputer:netbook ha
3、ndheld midrange tablet PC6. RAM is a type of:computer memory network secondary storage7. Unlike memory, this type of storage holds data and programs even after electrical power to the computer system has been turned off.primary RAM ROM secondary8. The type of file created by word processors to save,
4、 for example, memos, term papers, and letters.database document presentation worksheet9. The change in connectivity that uses the Internet and the Web to shift many computer activities from a users computer to computers on the Internet.cloud computing high definition network USB10. The largest netwo
5、rk in the world is the:Facbeook Internet Web USBMultiple 21. The network that connects computers all over the world.CERN Internet LAN Web2. The rules for exchanging data between computers.DSL protocols Web WWW3. Client-based e-mail accounts require this special program to be installed on your comput
6、er.e-mail client hyperlink Java utility4. Communities of individuals who share a common interest typically create Facebook:clients groups pages profiles5. E-mail that does not require an e-mail program installed on a users computer is known as:blog podcast Webmail utility6. A very well-known microbl
7、og.LinkedIn MySpace Twitter Wikipedia7. These programs continually look for new information and update search services database programs.filters IM spiders wikis8. A type of search engine that submits requests to other search engines, organizes their responses, eliminates duplicate responses, orders
8、 hits, and then provides an edited list.directory search ISPmetasearch engine specialized search engine9. This is the Internets equivalent to traditional cash.digital cash e-commerce icash Internet dollars10. Using file transfer utility software, you can copy files to your computer from specially co
9、nfigured servers on the Internet. This is called:downloading filtering blogging uploadingMultiple 31. This type of software works with end users, application software, and computer hardware to handle the majority of technical details.application general purpose system utility2. A rectangular area th
10、at can contain a document, program, or message.dialog box form frame window3. Programs that create text-based documents.DBMS suites spreadsheets word processors4. Programs that organize, analyze, and graph numeric data such as budgets and financial reports.DBMS suites spreadsheets word processors5.
11、In a spreadsheet, the intersection of a row and column creates a:cell formula function label6. A collection of related data that is the electronic equivalent of a file cabinet.cell database document table7. A database tool that will quickly rearrange a tables records according to a selected field.fi
12、lter sort spreadsheet word processor8. Programs that combine a variety of visual objects to create attractive, visually interesting presentations.DBMS presentation graphics spreadsheet word processor9. The primary disadvantage of this type of package is that the capabilities of each function are not
13、 as extensive as in individual programs.integrated office software utility10. A type of suite stored at a server on the Internet and available anywhere through Internet access.cloud integrated office utilityMultiple 41. These specialized graphics programs combine text and graphics to create publicat
14、ions of professional quality.desktop publishing programs image editorsimage galleries illustration programs2. Also known as drawing programs.desktop publishing programs image editorsimage galleries illustration programs3. Graphics programs used to create and edit vector images.desktop publishing pro
15、grams image editorsimage galleries illustration programs4. An essential multimedia feature that allows user participation.Flash interactivity immersion raster5. Special programs used to create multimedia presentations.desktop publishing programs Flash editorsimage editors multimedia authoring progra
16、ms6. A widely used interactive animation application from Adobe.ACTION Flash Fuzzy WYSIWYG7. Programs for Web site design and HTML coding are called Web page editors orapps HTML editors VR programs Web editors8. This area of artificial intelligence is also known as expert systems.acoustics knowledge
17、-based systems robotics virtual reality9. A type of artificial intelligence that uses a database to provide assistance to users.acoustics expert systems robotics virtual reality10. Another name for the database used in expert systems that contains specific facts and rules.access table expert table k
18、nowledge base rule baseMultiple 51. What type of software works with users, application software, and computer hardware to handle the majority of technical details?dapplication desktop Linux system2. The programs that convert programming instructions written by programmers into a language that compu
19、ters understand and process are language:converters linguists managers translators3. The ability to switch between different applications stored in memory is called:diversion multitasking operational interference programming4. Graphic representations for a program, type of file, or function:app icon
20、 image software5. This operating system feature is controlled by a mouse and changes shape depending on its current function.dialog box menu mouse pointer6. The operating system based on Linux, designed for Netbook computers, and focused on Internet connectivity through cloud computing:Chrome Mac Un
21、ix Windows7. The mobile operating system developed by Apple and originally called iPhone OS:Android BlackBerry OS IOS Mac OS8. A utility program that makes copies of files to be used in case the originals are lost or damaged:Backup and Restore Disk Cleanup Disk Defragmenter Compactor9. A troubleshoo
22、ting utility that identifies and eliminates nonessential files, frees up valuable disk space, and improves system performance:Backup and Restore Disk Cleanup Disk Defragmenter Compactor10. Windows makes it easy to update drivers with Windows:Backup Restore Driver UpdateMultiple 61. This container ho
23、uses most of the electrical components for a computer system.carrier package system board system unit TV tuner2. Similar to notebooks, this system unit specializes in on-the-go Web browsing and e-mail access.chassis desktop media center netbook3. Computers can only recognize this type of electronic
24、signal.analog bus digital maximum4. The main or motherboard is also known as the:computer board processor mobile system system board5. How many bytes can a 32-bit-word computer access at one time?1 4 8 166. In a microcomputer system, the central processing unit is contained on a single:bus chip modu
25、le RAM7. This type of memory divides large programs into parts and stores the parts on a secondary storage device.direct expanded random-access virtual8. Also known as NIC, this adapter card is used to connect a computer to a:AIA expansion graphics network9. This provides a pathway to connect parts
26、of the CPU to each other.bus Plug and Play wired wireless10. Older ports that have largely been replaced by faster, more flexible ports are called:buses expandable legacy renderedMultiple 71. Most keyboards use an arrangement of keys known as:Alpha Daisy OptiKey QWERTY2. The device that controls a p
27、ointer displayed on the monitor.cord mouse printer scanner3. Also known as a roller ball, this device controls the pointer by rotating a ball with your thumb.trackball joystick cordless mouse stylus4. The type of screen that can be touched with more than one finger and supports zooming in and out by
28、 pinching and stretching your fingers.digital dynamic multitouch OLED5. Flatbed and document are types of:headsets HDTVs monitors scanners6. Device used by banks to automatically read those unusual numbers on the bottom of checks and deposit slips.MICR FDIC OMR UPC7. The most widely used audio-input
29、 device.mouse VR microphone TFT8. The monitor feature that specifies how often a displayed image is updated.aspect ratio dot pitch refresh rate resolution rate9. Handheld, book-sized devices that display text and graphics.e-book readers HDTV lasers whiteboards10. This technology allows television st
30、ations to broadcast their programming directly to smartphones, computers, and digital media players.CRT HDTV LED Mobile DTVMultiple 81. RAM is sometimes referred to as:primary storage ratio active memoryread only memory secondary storage2. The actual physical material that holds the data and program
31、s.primary storage media disk access3. Measures how tightly these charges can be packed next to one another on the disk.density cylinders tracks sectors4. When a read/write head makes contact with the hard disks surface, it causes a head:crash land pit scratch5. This hard-disk performance enhancement
32、 anticipates data needs.disk caching file compression file decompression RAID6. This type of storage uses pits and lands to represent 1s and 0s.cloud hard disk optical solid state7. DVD stands for:digital versatile disc digital video datadynamic versatile disc dynamic video disc8. USB drives are als
33、o known as:flash drives optical drives ports universal state bus9. An organizational strategy to promote efficient and safe use of data across the networks.cloud dynamic data mission statemententerprise storage system RAID10. A mass storage device that provides access to data archived on tapes.file
34、system NAS RAID system tape libraryMultiple 91. The concept related to using computer networks to link people and resources.connectivity GPS TCP/IP Wi-Fi2. A high-frequency transmission cable that delivers television signals as well as connects computers in a network.coaxial hi def 3-D twisted pair3
35、. A short-range radio communication standard that transmits data over short distances of up to approximately 30 feet.Bluetooth broadband DSL TCP/IP4. The speed with which a modem transmits data is called its:digital velocity dynamic rate modular rating transfer rate5. The bandwidth typically used fo
36、r DSL, cable, and satellite connections to the Internet.baseband broadband medium band voiceband6. Every computer on the Internet has a unique numeric address called a(n):IP address DNS broadcast packet7. Sometimes referred to as a LAN adapter, these expansion cards connect a computer to a network.P
37、CMCIA NIC server VPN8. A device that allows one LAN to be linked to other LANs or to larger networks.IDS network gateway PAN switch9. Typically using Wi-Fi technology, these wireless access points are typically available from public places such as coffee shops, libraries, bookstores, colleges, and u
38、niversities.hotspots extranets PANs LANs10. Star, tree, and mesh are three types of network:topologies protocols strategies devicesMultiple 101. The three primary privacy issues are accuracy, property, and:access ethics ownership security2. To easily get names, addresses, and other details about a p
39、erson using only his or her telephone number, government authorities and others use a(n):adware cookie keystroke logger reverse directory worm3. Browsers store the locations of sites visited in a:history menu tool bar firewall4. The browser mode that eliminates history files and blocks most cookies.
40、detect insert privacy sleep5. The information that people voluntarily post in social networking sites, blogs, and photo- and video-sharing sites is used to create their:access approval firewall online identity phish6. Computer criminals who specialize in stealing, trading, and using stolen credit ca
41、rds over the Internet are known as:carders card scammers cyber traders identity thieves7. Programs that come into a computer system disguised as something else are called:Trojan horses viruses Web bugs zombies8. The use of the Internet, cell phones, or other devices to send or post content intended
42、to hurt or embarrass another person is known as:cyber-bullying online harassmentsocial media discrimination unethical communication9. Special hardware and software used to control access to a corporations private network is known as a(n):antivirus program communication gatefirewall spyware removal p
43、rogram10. To prevent copyright violations, corporations often use:ACT DRM VPN WPAMultiple 111. Which of the basic organizational functions records all financial activity from billing customers to paying employees?accounting marketing production research2. What managerial level has information flow t
44、hat is vertical, horizontal, and external?top supervisory middle foreman3. Which computer-based information system uses data from TPS and analytical tools to support middle managers?ESS MIS DSS TPS4. Accounts payable refers to money the company owes its suppliers for materials and services it has:cr
45、eated exported inventoried received5. What accounting activity keeps track of all summaries of all transactions?balance sheet general ledgerincome statement inventory control6. What accounting statement lists the overall financial condition of an organization?balance sheet general ledgerincome state
46、ment inventory control7. What type of report is produced at regular intervals?demand exception inventory periodic8. A DSS consists of four parts: user, system software, decision models, and:application software data operating system spreadsheets9. What type of worker is involved with the distributio
47、n, communication, and creation of information?executive foreman information knowledge10. What type of program is designed to schedule, plan, and control project resources?auditing dtp project managers schedulersMultiple 121. Facts or observations about people, places, things, and events are:data occ
48、urrences records tables2. The most basic logical data element such as a single letter, number, or special character is known as a:character element phrase record3. Each record in a database has at least one distinctive field, called the:key field structure type view4. One element of database securit
49、y is to provide only authorized users with:classes nodes passwords relations5. The bridge between the logical and physical views of the data is provided by:DBMS records SQL tables6. Highly trained computer specialists who interact with the data administration subsystem are known as:DBMS data modelers database administrators relational specialists7. In a network database, each child node may have more than one parent node; this is known as a:hierarchy many-to-many relationshipparent relationship relational relationship8. Connections between parent nodes and child nodes are provide