IT Final Flashcards

1
Q

In order for something to be considered a computer it must have a keyboard attached.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What was used to make analyzing results faster for the 1890 census?

A

punch cards and punch card readers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Writing software is the job of programmers and software developers.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which of the following is NOT an advantage of using Copy/Paste/Edit?

A

It allows the user to recreate the formatting from scratch.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The instructions written in software are followed or executed by

A

Hardware

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

_____ made computers more affordable and allowed them to have more complex CPUs

A

Transistors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Software is a collective term for

A

Programs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Complexity is _____________ to manufacture, though it remains _________ to design

A

cheap, expensive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Computers do

A

exactly what you tell them to do

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

A good way to learn how to use a new application or piece of software is to

A

click around

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

A computer is considered a(n) ________ when it gets services from another computer.

A

client

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Saving information for possible reuse is called

A

caching

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

This type of communication results in the sending and receiving of information to occur at different times.

A

asynchronous

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

What can folders contain?

A

both files and folders

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The Internet is fast enough to mimic ________ communication.

A

synchronous

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Wireless network connections follow the 802.11 protocol.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

PandA representation is what kind of system?

A

Binary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Information describing information is called

A

metadata

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Hexadecimal is base ____

A

16

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Grouping binary digits in groups of four makes converting to ___ easier

A

Hex

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Analog information is?

A

continuous

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Every bit can exist in one of two states: 0 or 1.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Extended ASCII is a 9-bit code.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

The byte is the standard unit for computer memory.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

The RGB setting for blue is (0 is off, 1 is on)

A

0000 0000 0000 0000 1111 1111

26
Q

The brightness of the light of a subpixel in an LCD display it its ________.

A

Intensity

27
Q

JPEG is to still images what _______ is to motion pictures.

A

MPEG

28
Q

The process of reducing the number of bits required to represent information from which the original form can be exactly reconstructed is known as ________ compression.

A

lossless

29
Q

A megabyte is exactly one million bits.

A

False

30
Q

Logic gates, part of a circuit in the ALU, are used to implement operations like AND and OR.

A

True

31
Q

Memory has a finite capacity.

A

True

32
Q

From smallest to largest, the correct order of prefixes is

A

kilo, mega, giga, tera

33
Q

An example of a good password is.

A

a word that includes symbols or numbers to represent some letters

34
Q

A(n) ________ is a programmed response to your email that’s sent when you are away.

A

Auto-response

35
Q

Information that you did not create but can treat as your own is said to be

A

in the public domain

36
Q

The term referring to the malicious practice of using deceptive emails to fraudulently obtain personal information such as Social Security numbers, bank account numbers, and credit card numbers is:

A

Phishing

37
Q

If you commit a crime on the Internet, who can determine your real identify?

A

the law

38
Q

Most people assume that when you send an email it is

A

private

39
Q

Information in the __ is free for anyone to use

A

public domain

40
Q

A type of malicious software that disguises itself as legitimate software but performs harmful actions once installed is called a:

A

Trojan

41
Q

A type of malware that prevents the system from being used until the victim pays the attacker money is known as what?

A

Ransomware

42
Q

You receive an email from your bank informing you that they are performing an audit and have found a problem with your account. They ask you to log in to help resolve the problem. This is an example of

A

phishing

43
Q

Two-factor authentication allows for greater security in user access to web sites.

A

True

44
Q

You cannot mix absolute and relative references in one cell reference.

A

False

45
Q

Macs do not need virus protection software because it is built into the OS

A

False

46
Q

A program that creates an access path through which attackers can run any program they want is called a _______

A

backdoor

47
Q

A(n) ________ is information that is stored on a client computer by an HTTP server computer.

A

Cookie

48
Q

In computer security, compromised computers that act under the direction of an external master computer are referred to as

A

Zombies

49
Q

An absolute cell reference uses the ________ symbol to identify the value as an absolute reference.

A

Dollar sign ($) symbol

50
Q

Cell references that do not change when copied from one cell to another are called ________ references.

A

absolute

51
Q

Spreadsheet columns can be hidden but rows cannot

A

False

52
Q

Spreadsheet can import any kind of data

A

False

53
Q

Respectively, rows and columns are designated with…

A

Numbers and Letters

54
Q

Use the _____ function to find the average of a range of cells

A

average

55
Q

____ means “Join letter sequences together”

A

Concatenation

56
Q

Spreadsheet formulas start with

A

=

57
Q

Malware that directly manipulates operating system tables to hide its presence is known as a

A

rootkit

58
Q

Recovery after a disaster involves installing the most recent ________ backup copy.

A

Full

59
Q

Most Americans wrongly assume that their privacy regarding business information is restricted to

A

Internal Use

60
Q

___refers to the relationship between computers that are communicating over the Internet where each of the computers—yours and someone else’s—is a “file server” for the other.

A

Peer-To-Peer