BTM 200 FINAL Flashcards
What are the two types of software?
system and application
- Software that allows the application software to interact with the computer is called _________
C. system software
- The basic operations of a computer are managed by the __________.
operating system
A __________ is a named collection of data or a program that exists in a computer’s secondary
storage.
file
- User-interface features use _________ to facilitate a person’s interaction with the computer.
A. graphics
Keys found on the top or the left of the keyboard that are used to execute commands specific
to the software being used are called __________.
function keys
Small pictures that are used with GUIs to represent programs, data files, or procedures are
called __________.
A. icons
Menus and icons representing frequently used options and commands are displayed across
the top of a\the display window in an area known as the __________.
toolbar
T/F Application software is a basic component of system software used to support, enhance, or
expand existing programs.
FALSE
T/F Backup, data recovery, virus protection, disk cleanup, and data compression are utility programs.
TRUE
T/F Computer keyboards have special-purpose keys that are used to enter, delete, and edit data
and to execute commands.
TRUE
T/F A rollover feature provides a small box explaining an icon’s function when the mouse pointer
is rolled over the icon.
TRUE
T/F DOS is a legacy system.
TRUE
T/F Unix is a proprietary multitasking operating system for multiple users.
TRUE
The operating systems used in small or specialized devices, such as mobile phones, are called
open-source systems.
FALSE
The tiny piece of silicon that houses millions of microminiature electronic circuits is called a
__________.
CHIP
The two digits used in the binary system are __________.
0 and 1
A byte represents ________
1 character
One billion cycles (ticks) of the system clock per second equal 1 __________.
gigahertz
Electrical data roadways through which bits are transmitted within the CPU and other
components of the motherboard are called _________.
buses
Which port is used to transmit slow data over long distances?
A. serial
Which of these is a hard-disk technology for large computer systems?
A. RAID
B. SCSI
C. EIDE
D. VFAT
A. RAID
Cloud storage is ________ storage.
A. online
T/F A circuit is a closed path followed or capable of being followed by an electric current.
TRUE
T/F A tiny electrically operated switch that can turn on and off many millions of times per second
is a microchip.
FALSE
T/F A microprocessor contains the miniaturized circuitry of a computer processor.
TRUE
T/F All data and instructions that go into a computer, are processed by it, and come out of it are
represented as binary numbers signaling only two states: on and off.
TRUE
T/F The binary code widely used with microcomputers is EBCDIC.
FALSE
T/F Mainframe computers use the binary code EBCDIC.
TRUE
T/F uses 2 bytes for each character, rather than 1 byte; ASCII uses 1 byte.
TRUE
What are devices called that translate data into a form the computer can process
A. input hardware
Which of the following is NOT an input device?
A. light pen
B. webcam
C. scanner
D. monitor
MONITOR
Which of the following is NOT an output device?
A. monitor
B. printer
C. microphone
D. speaker
Microphones are input dev
MICROPHONE
Which of these pointing devices is used most often on microcomputers?
A. touchpad
B. mouse
C. stylus
D. joy stick
B. mouse
What kind of computer is a touchpad most often used for?
laptop
What do you call a video display screen that can receive input from the touch of a finger?
touch screen
Which device uses light-sensing (optical) equipment to convert images of text, drawings, and
photos into digital form?
scanner
T/F A webcam can be used to send a document to another location over the Internet.
FALSE
T/F Information technology includes technologies that measure and analyze human body
characteristics for the purpose of maintaining security.
TRUE
T/F Many laptops can be fingerprint-protected instead of just password-protected.
TRUE
T/F One of the trends of future input technology is the increased use of source data entry.
TRUE
T/F Data that is displayed on a screen or stored on a disk is called a hardcopy.
FALSE
T/F Video cards (also graphics cards, video adapters) are the devices that display images on
the screen. They have their own memory called video RAM, or VRAM.
TRUE
T/F Thermal printers are often used to print cash register receipts.
TRUE
What wired communications medium consists of dozens or hundreds of thin strands of glass plastic?
fiber-optic
A ________ is a fixed-length block of data for transmission.
packet
In the ________ network topology, communications devices are connected to a single cable with two endpoints.
bus
To create larger networks, a bridge connects the same types of networks, and a ________
connects dissimilar networks.
gateway
A virtual private network may include ________. (3)
- a company intranet
- a company extranet
- a company LAN
A network that operates without relying on a server is the ________ network.
peer-to-peer
A network that covers a wide geographical area is called a ________.
WAN
A ________ is a system of interconnected computers, telephones, or communications devices
that can communicate and share resources
network
The ________ is a device that converts digital computer signals into analog signals so that they
can be sent over a telephone line.
modem
Each zero and one signal represents a ________.
bit
T/F Impact printers are the only desktop printers that can use multilayered forms to print many
copies at once.
TRUE
T/F Multifunction printers can also fax, but not scan.
FALSE
T/F Ergonomics involves the relationship between workers and their environments, including
workers’ health.
TRUE
T/F Virtual private networks (VPNs) are private networks that use a public network (usually the
Internet) instead of private, leased (expensive) lines to connect remote sites.
TRUE
T/F In a network, communications protocols specify the type of electrical connections, the timing
of message exchanges, and error-detection techniques.
TRUE
T/F Ethernet is a long-distance wireless communications connection.
FALSE
T/F The two general classes of bandwidth are long and short.
FALSE
T/F Because of the excellence of satellite technology, GPS location IDs are 100% accurate.
FALSE
T/F Cellphones are basically two-way radios.
TRUE
Which of these is NOT a level of the data storage hierarchy?
A. bit
B. byte
C. record
D. metadata
METADATA
(RIGHT ANSWER: bit, byte
& record)
The ________ uniquely identifies a record.
key field
Wi-Fi connections are always secure; no one can steal your data when you are online.
FALSE
What is the software that controls the structure of a database and access to the data?
database management system
A file (table) is a collection of related ________.
records
A record (row) is a collection of related ________.
fields
Which of these is NOT an example of a computer crime?
entering incorrect data
Sending emails that appear to come from a trusted source, which direct you to a website
where you’re asked to reveal personal information is called _________.
phishing
Which of the following is NOT a method in which a security system tries to authenticate a
user’s identity?
A. What you have—cards, keys, signatures, badges
B. What you need—the kind of information you are asking for
C. Who you are—physical traits, or biometrics
D. What you know—PINs, passwords, and digital signatures
B. What you need—the kind of information you are asking for
_______ is a system of safeguards for protecting information technology against disasters,
system failures, and unauthorized access.
Security
Which of the following is NOT a function of the U.S. Computer Emergency Response Team
(CERT)?
A. Counseling the party under attack.
B. Helping to thwart the intruder.
C. Evaluating the system afterward against future break-ins.
D. Prosecuting those caught.
D. Prosecuting those caught.
In 2009 a cracker stole more than 500,000 patient records from a state-run database and
demanded ransom for the return of the records. This crime is called ________.
D. theft of information
T/F A software bug is an error in a program that causes it not to work properly.
TRUE
T/F A computer crime can be an illegal act perpetrated against computers/telecommunications, or it can be the use of computers/telecommunications to accomplish an illegal act.
TRUE
T/F Software obtained illegally is called open-source software.
FALSE
T/F When people at work play online games or do online shopping on their employer’s time, this is
called theft of information.
FALSE
T/F Internet users purchasing products on the Internet should enter private information only on
sites that show a padlock icon at the top or bottom of the page, which indicates that encryption technology is being used.
TRUE
Which of these is NOT a type of malware?
A. worm
B. virus
C. Trojan horse
D. denial-of-service attack
D. denial-of-service attack
What short-distance wireless standard is used to link cell phones, computers, and peripherals
at distances of up to about 33 feet?
A. Bluetooth
What form of wireless transmission sends data to an AM or FM receiver?
A. broadcast radio
What set of rules is used to link nearly all mobile devices to a telecommunications carrier’s
wireless network and content providers?
WAP
A type of wired communications technology used to connect equipment in a home network is
the following:
A. Ethernet
B. HomePNA
C. HomePlug
D. any of these
D. any of these
What kind of topology (layout) is used by a network that connects all its computers and
communications devices to a central server?
star
Which of these is NOT a network topology?
A. ring
B. bus
C. hub
D. star
HUB
A(n) ________ is a system of hardware and/or software that protects a computer or a network
from intruders.
firewall
A virtual private network may include _______
A. a company intranet
B. a company extranet
C. a company LAN
D. any of these
D. any of these