Concepts Exam #2 Flashcards
The central, controlling computer in a network is called a ___________ while the computer(s) connected to a central computer is/are called a ___________.
Ring Network Controller(s)
Star Peer(s)
Server Client(s)
Client Server(s)
Server Client(s)
A ______ is a text file that contains information to help a Web server identify you and customize the information it presents.
Cache
Cookie
Browser
Port
Port
A(n) _______ backup makes backup copies of files as they are added or changed.
Incremental
Auto
Manual
Full
Incremental
What application software (i.e. Google Chrome, Mozilla Firefox, and Apple Safari) allows users to view the Internet?
Browser
Two or more computers connected together to communicate and share resources is called a __________.
Network
Software sold as a collection is called a(n) __________ and is capable of sharing data and information between business application software.
Data Suite
Productivity Suite
Application Suite
Access Suite
Productivity Suite
Data from one application can be shared with another application in either a static or a dynamic manner. Data that is shared statically is basically an unchanging snapshot of the data. T/F
True
A compact and portable solid state storage device that makes it easy to carry files and programs with you is often called a(n) ________.
USB flash drive
DVD
CD
Portable drive
USB flash drive
USB flash drive
A _______ is a temporary local storage area for copies of previously used web page elements.
Browser cache
Server
Cookie
Domain
Browser Cache
Although we typically think of a kilobyte as 1,000 bytes, how many bytes is it really?
1,024
Which network topology uses a common linear backbone to which all networked devices are attached?
P2P
bus
ring
star
Bus
For what does URL stand?
Uniform resource locator
A type of computer network that connects computers in a relatively small area (typically a single building) is called a ___________.
Local area network
Personal area network
Wide area network
Peer-to-Peer network
Local Area Network
The broad umbrella legal claim that a business has to names, inventions, and ideas is called _______________.
Intellectual Property
Which of the following methods of data sharing are static?
Object sharing
Copy and paste
Object linking
Object embedding
Copy and paste, Object embedding
The _______ head of a hard disk scans the surface of a spinning disk, and scans to read the magnetic particles’ polarity to retrieve data.
Read
Write
Copy
Read-write
The Internet is composed of computers and other devices that exchange data using a standard protocol called _______.
ISP
TCP/IP
P2P
NAP
TCP/IP
Access time is the amount of time needed to get data and information from a storage device to its user. T/F
True
What politician is sometimes credited with inventing the Internet?
Al Gore
A(n) __________ is a file that travels along with an e-mail message.
Subject
Message
Hyperlink
File Attachment
File Attachment
Google Docs, Apple Pages, and Microsoft Word are pieces of software called ____________________.
Browsers
Word Processors
Search Engines
DBMSs
Word Processors
Which of the following is volatile?
RAM
Solid state storage mediums
Magnetic storage mediums
Optical storage mediums
RAM
The TCP/IP protocol divides documents, e-mail, photos, and other digital messages into standard-sized _______ of data.
Packets
Folders
Files
Pockets
Packets
Any search engine works to conduct keyword searches on multiple search engines and displays results after eliminating duplicate hits. T/F
False
Which of the following is not an aspect of a good website?
interactivity
high quality design
absence of cookies
accurate content
Absence of cookies
________________ documents retain the original layout of text and graphics and can be accessed on virtually any platform.
HTML
DOCX
Word processing
An e-mail-based scam that is designed to persuade users to reveal confidential information is called ________.
Caching
Scanning
Surfing
Phishing
Phishing
Any device connecting to a network must have electronic circuitry called a ___________.
MAC
NIC
NOS
LAN
NIC
__________ is the amount of data and information a storage device can hold.
access time
capacity
data transfer rate
rotation speed
Capacity
For what does PDF stand?
Portable Document Format
Any device connected to a network is called a ___________.
Hub
Node
WAN
NIC
Node
According to the text, what is the most common network topology?
Star
Given the following URL, http://www.hputx.edu/academics/programs.html what is the domain name?
hputx.edu
.html
programs.html
http://
hputx.edu
A structured database makes it easy to locate records using a ____________.
locate
query
find
sort
query
Software that arranges data in an electronic grid of columns and rows, and is helpful for modeling and manipulating numeric information.
Network software
Projecting software
Spreadsheet
Database
Spreadsheet
A _______ number system uses only two symbols.
Binary
ASCII
Digital
Fixed lengt
Binary
_______ documents can be posted on the Internet as a Web page and viewed with a Web browser.
JavaScript
HTML
URL
VoIP
HTML
A high data-transmission rate Internet connection is called _________.
broadband
A _______________ consists of slides that can be viewed on-screen and are often projected for an audience.
Video
Document
Presentation
Spreadsheet
Presentation
A circular, rigid storage medium that stores data on rapidly rotating platters with magnetic surfaces is a(n) ________.
Hard disk
USB flash drive
DVD
Plate
Hard disk
Recognizing .edu, .com, .org, and other _______ domains helps to classify the person, organization, or business that is responsible for web content.
Top-level
Top-tier
URL
Descriptive
Top-level
Which of the following is not an example of strong authentication?
pin + ATM card
zip code + credit card
key card + fingerprint
user name + password
user name + password
The most common type of network cable is called twisted-pair. T/F
True
What differentiates system software from application software?
Machine code
System software isn’t actually programmed
Human intervention
Machine language
Human intervention
Instead of electromagnetic charges, an optical disk uses optical technology (lasers) to record and read pits and __________ as the mechanism for holding binary data.
raids
roads
holes
lands
lands