Deck 1: Introduction to the World of Computers

Full screen (f)
exit full mode
Question
In addition to hardware, software, data, and procedures, the fifth major component of a computer system are codes.
Use Space or
up arrow
down arrow
to flip the card.
Question
A mainframe computer is the standard choice for large organizations that need to manage large amounts of centralized data.
Question
Tablet computers are typically about the size of a notebook computer and are designed to be used with a digital pen / stylus or touch input.
Question
Just as you can learn to drive a car without knowing much about car engines, you can learn to use a computer without understanding the technical details of how a computer works.
Question
There are application programs that help users write their own programs using a programming language.
Question
Satellite communication (more commonly called s-com) is the process of exchanging electronic messages between computers over a network-usually the Internet.
Question
Once you have an Internet connection, you are ready to begin programming the Web-that is, using a Web browser to view Web pages.
Question
Small office networks enable workers to access company records stored on a network server.
Question
A computer does not always do whatever the instructions, or program, tell it to do.
Question
Computer literacy is knowing about and understanding computers and their uses.
Question
To begin to use a computer, the user first turns on the power by pressing the power button, and then the computer displays a prompt for the user to decide the next course of action.
Question
Systems analysts design computer systems to be used within their companies.
Question
  The accompanying figure shows a notebook computer.<div style=padding-top: 35px>
The accompanying figure shows a notebook computer.
Question
Information processing is a vital activity today because the success of many businesses depends heavily on the wise use of information.
Question
The external hardware components are located inside the main box or system unit of the computer.
Question
Web browsers maintain a History list, which is a record of all Web pages visited during the period of time specified in the browser settings.
Question
The slide rule is considered by many to be the earliest recorded calculating device.
Question
Storage devices are hardware used to store data on or access data from storage media, such as CD discs, DVD discs, or flash memory cards.
Question
Wireless networking allows the use of computers in virtually any location. _________________________
Question
Fourth-generation computers witnessed the development of computer networks, wireless technologies, and the Internet.
Question
<strong>  As shown in the accompanying figure, the computer is used extensively for access control at many organizations, such as ____ that allow individuals to enter the office building, punch in or out of work, or access the company network by providing the proper credentials or being authenticated via a fingerprint or hand scan.</strong> A) bar codes B) virtual reality glasses C) collaboration systems D) authentication systems <div style=padding-top: 35px>
As shown in the accompanying figure, the computer is used extensively for access control at many organizations, such as ____ that allow individuals to enter the office building, punch in or out of work, or access the company network by providing the proper credentials or being authenticated via a fingerprint or hand scan.

A) bar codes
B) virtual reality glasses
C) collaboration systems
D) authentication systems
Question
Fourth-generation computers typically use a keyboard and mouse for input, a monitor and printer for output, and hard drives, flash memory media, and optical discs for storage. _________________________
Question
In piracy, identity thieves send fraudulent e-mails to people masquerading as legitimate businesses to obtain social security numbers or other information needed for identity theft. _________________________
Question
A user inputs data into a computer, and then the computer processes it. _________________________
Question
In addition to the four primary computer operations, today's computers typically also perform ____ functions.

A) calculations
B) communications
C) sorting
D) programming
Question
Computing technologies make it possible to have ____, traditional appliances with some type of built-in computer or communications technology.

A) design appliances
B) smart computers
C) home computers
D) smart appliances
Question
Communications hardware includes modems, which are used to connect a computer to the Internet and network projectors, which are used to connect a computer to a computer network. _________________________
Question
Computer programmers are the people who use a computer to obtain information. _________________________
Question
In the early 1980s, ____ were invented and computer use increased dramatically.

A) Printers
B) Networks
C) Microcomputers
D) Computers
Question
An e-mail address consists of a(n) username, followed by the @ symbol, followed by the domain name for the computer that will be handling that person's e-mail (called a mail server). _________________________
Question
In cloud worlds, online users can explore anonymously. _________________________
Question
Mobile Tablets are extremely powerful computers used for complex computations and processing. _________________________
Question
IP addresses and their corresponding domain names are used to identify computers available through the Internet. _________________________
Question
The background work area displayed on the screen for computers running Microsoft Windows is called the desktop. _________________________
Question
Fifty years ago, computers were used primarily by researchers and ____.

A) musicians
B) scientists
C) writers
D) designers
Question
A growing number of college campuses have wireless ____ on campus that allow students to use their PCs to connect wirelessly to the college network and the Internet from anywhere on campus.

A) hotspots
B) hotpoints
C) com spots
D) com points
Question
The ISP is the largest and most well-known computer network in the world. _________________________
Question
A(n) display screen can be defined as a programmable, electronic device that accepts data, performs operations on that data, presents the results, and can store the data or results as needed. _________________________
Question
Dr. Herman Hollerith's Punch Card Tabulating Machine and Sorter was the first electromechanical machine that could read slide rules. _________________________
Question
Abbreviations or acronyms, such as BTW for "between the words," are commonly used to save time in all types of communications today. _________________________
Question
A personal computer (PC) or ____ is a small computer system designed to be used by one person at a time.

A) processor
B) microcomputer
C) microchip
D) small processor
Question
____ are unique numeric or text-based addresses used to identify resources accessible through the Internet, such as computers, Web pages, and people.

A) Computer addresses
B) Machine IDs
C) Domain IDs
D) Internet addresses
Question
Hollerith's machine was used to process the 1890 U.S. Census data and was able to complete the task in ____, instead of the decade it usually took to process the data by hand.

A) two months
B) four years
C) two and a half years
D) six years
Question
When data is processed into a meaningful form, it becomes ____.

A) information
B) code
C) a program
D) a database
Question
____ consists of programs designed to allow people to perform specific tasks using a computer, such as creating letters, preparing budgets, and managing inventory.

A) Cloud storage
B) HTML
C) Java Script
D) Application software
Question
To contact people using the Internet, you most often use their ____.

A) domain names
B) e-mail addresses
C) usernames
D) passwords
Question
The term ____ refers to the programs or instructions used to tell the computer hardware what to do.

A) hardware
B) port
C) software
D) adapter
Question
Common input devices include the keyboard and ____.

A) printer
B) mouse
C) speaker
D) monitor
Question
<strong>  The accompanying figure corresponds to the ____ style for desktop PCs.</strong> A) all-in-one case B) tower case C) desktop case D) sub case <div style=padding-top: 35px>
The accompanying figure corresponds to the ____ style for desktop PCs.

A) all-in-one case
B) tower case
C) desktop case
D) sub case
Question
To navigate to a new Web page for which you know the URL, type that URL in the browser's ____ and press Enter.

A) Address bar
B) Domain bar
C) Address button
D) Name button
Question
<strong>  The Windows ____ shown in the accompanying figure contains the following objects: Windows, Icons, Menus, Toolbars, Taskbar, Hyperlinks, Sizing buttons, and a Dialog box.</strong> A) command B) toolbox C) general menu D) desktop <div style=padding-top: 35px>
The Windows ____ shown in the accompanying figure contains the following objects: Windows, Icons, Menus, Toolbars, Taskbar, Hyperlinks, Sizing buttons, and a Dialog box.

A) command
B) toolbox
C) general menu
D) desktop
Question
A ____ is a collection of hardware and other devices that are connected together so that users can share hardware, software, and data, as well as electronically communicate with each other.

A) computer bank
B) database
C) data bank
D) computer network
Question
There are a number of special Web pages, called ____, available to help you locate what you are looking for on the Internet.

A) search sites
B) domain identifications
C) domain sites
D) Internet repositories
Question
A ____ is loosely defined as a very small device that has some built-in computing or Internet capability.

A) mainframe computer
B) midrange server
C) mobile device
D) personal computer
Question
With the advent of ____, integrated circuits incorporating many transistors and electronic circuits on a single tiny silicon chip, allowed computers to be even smaller and more reliable than earlier computers.

A) second-generation computers
B) third-generation computers
C) fourth-generation computers
D) fifth-generation computers
Question
Similar to the way an IP address or domain name uniquely identifies a computer on the Internet, a ____ uniquely identifies a Web page.

A) universal resource identifier (URI)
B) Web ID (WID)
C) uniform resource locator (URL)
D) Web resource identifier (WRI)
Question
A(n) ____ is a medium-sized computer used to host programs and data for a small network.

A) mainframe computer
B) super server
C) midrange server
D) Internet server
Question
Two of the most common types of communications hardware are ____ and network adapters.

A) ports
B) slide rules
C) monitors
D) modems
Question
Conventional PCs are often referred to as ____ because the complete computer system fits on or next to a desk.

A) desktop computers
B) laptop computers
C) super computers
D) processor computers
Question
Ultraportables conforming to Intel's standards can be marketed as ____.

A) IntelBooks
B) Ultrabooks
C) hybrids
D) smallframe computers
Question
____ is typically free and provided by virtually all ISPs used with personal computers.

A) Short Message mail
B) Web-based e-mail
C) Web-com
D) Program-based e-mail
Question
Consumer ____________________ are small self-service computer-based stations, such as ATM machines, bridal registries, and ticketing systems.
Question
There are independent Web sites (such as the ____ Web site) that report on the validity of current online rumors and stories.

A) Spammer
B) Snopes
C) Phisher
D) Identifier
Question
____________________ are computer professionals whose primary job responsibility is to write the programs that computers use.
Question
____ are illustrations of faces showing smiles, frowns, and other expressions that are created with keyboard symbols.

A) Spams
B) Phishes
C) Emoticons
D) Trojan horses
Question
Typically, individual users connect to the Internet by connecting to servers belonging to a(n) ____________________.
Question
____________________ is an alternative to traditional classroom learning that allows students to participate from their current location, instead of physically going to class.
Question
____ refers to typing your entire e-mail message or discussion group post using only capital letters.

A) Spamming
B) Phishing
C) Calling
D) Shouting
Question
An emerging payment option is the use of ____________________ payment systems-systems that allow individuals to pay for products and services via a mobile phone or other portable device.
Question
The ____________________ being used with a computer determine the tasks the computer is able to perform.
Question
The progression of input, processing, output, and storage is sometimes referred to as the ____________________ cycle or the information processing cycle.
Question
____ refers to guidelines for online behavior.

A) Net rules
B) Web etiquette
C) Internet Rules
D) Netiquette
Question
One online security problem is ____, in which someone else uses your identity, typically to purchase goods or services.

A) identity duplication
B) domain theft
C) identity theft
D) phishing
Question
HTML is called a(n) ____________________ or scripting language.
Question
One common opinion is that fifth-generation computers will be based on ____________________, allowing them to think, reason, and learn.
Question
One trend involving servers today is ____________________, which means creating virtual (rather than actual) versions of a computing resource.
Question
The first computers were powered by thousands of ____________________ that needed replacing constantly, required a great deal of electricity, and generated a lot of heat.
Question
The physical parts of a computer are collectively referred to as ____________________.
Question
____________________-technically an input or output operation, depending on which direction the information is going-is increasingly considered the fifth primary computer operation.
Question
____________________ are regular appliances with some type of built-in computer technology.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/90
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 1: Introduction to the World of Computers
1
In addition to hardware, software, data, and procedures, the fifth major component of a computer system are codes.
False
2
A mainframe computer is the standard choice for large organizations that need to manage large amounts of centralized data.
True
3
Tablet computers are typically about the size of a notebook computer and are designed to be used with a digital pen / stylus or touch input.
True
4
Just as you can learn to drive a car without knowing much about car engines, you can learn to use a computer without understanding the technical details of how a computer works.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
5
There are application programs that help users write their own programs using a programming language.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
6
Satellite communication (more commonly called s-com) is the process of exchanging electronic messages between computers over a network-usually the Internet.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
7
Once you have an Internet connection, you are ready to begin programming the Web-that is, using a Web browser to view Web pages.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
8
Small office networks enable workers to access company records stored on a network server.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
9
A computer does not always do whatever the instructions, or program, tell it to do.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
10
Computer literacy is knowing about and understanding computers and their uses.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
11
To begin to use a computer, the user first turns on the power by pressing the power button, and then the computer displays a prompt for the user to decide the next course of action.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
12
Systems analysts design computer systems to be used within their companies.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
13
  The accompanying figure shows a notebook computer.
The accompanying figure shows a notebook computer.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
14
Information processing is a vital activity today because the success of many businesses depends heavily on the wise use of information.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
15
The external hardware components are located inside the main box or system unit of the computer.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
16
Web browsers maintain a History list, which is a record of all Web pages visited during the period of time specified in the browser settings.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
17
The slide rule is considered by many to be the earliest recorded calculating device.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
18
Storage devices are hardware used to store data on or access data from storage media, such as CD discs, DVD discs, or flash memory cards.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
19
Wireless networking allows the use of computers in virtually any location. _________________________
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
20
Fourth-generation computers witnessed the development of computer networks, wireless technologies, and the Internet.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
21
<strong>  As shown in the accompanying figure, the computer is used extensively for access control at many organizations, such as ____ that allow individuals to enter the office building, punch in or out of work, or access the company network by providing the proper credentials or being authenticated via a fingerprint or hand scan.</strong> A) bar codes B) virtual reality glasses C) collaboration systems D) authentication systems
As shown in the accompanying figure, the computer is used extensively for access control at many organizations, such as ____ that allow individuals to enter the office building, punch in or out of work, or access the company network by providing the proper credentials or being authenticated via a fingerprint or hand scan.

A) bar codes
B) virtual reality glasses
C) collaboration systems
D) authentication systems
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
22
Fourth-generation computers typically use a keyboard and mouse for input, a monitor and printer for output, and hard drives, flash memory media, and optical discs for storage. _________________________
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
23
In piracy, identity thieves send fraudulent e-mails to people masquerading as legitimate businesses to obtain social security numbers or other information needed for identity theft. _________________________
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
24
A user inputs data into a computer, and then the computer processes it. _________________________
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
25
In addition to the four primary computer operations, today's computers typically also perform ____ functions.

A) calculations
B) communications
C) sorting
D) programming
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
26
Computing technologies make it possible to have ____, traditional appliances with some type of built-in computer or communications technology.

A) design appliances
B) smart computers
C) home computers
D) smart appliances
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
27
Communications hardware includes modems, which are used to connect a computer to the Internet and network projectors, which are used to connect a computer to a computer network. _________________________
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
28
Computer programmers are the people who use a computer to obtain information. _________________________
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
29
In the early 1980s, ____ were invented and computer use increased dramatically.

A) Printers
B) Networks
C) Microcomputers
D) Computers
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
30
An e-mail address consists of a(n) username, followed by the @ symbol, followed by the domain name for the computer that will be handling that person's e-mail (called a mail server). _________________________
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
31
In cloud worlds, online users can explore anonymously. _________________________
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
32
Mobile Tablets are extremely powerful computers used for complex computations and processing. _________________________
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
33
IP addresses and their corresponding domain names are used to identify computers available through the Internet. _________________________
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
34
The background work area displayed on the screen for computers running Microsoft Windows is called the desktop. _________________________
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
35
Fifty years ago, computers were used primarily by researchers and ____.

A) musicians
B) scientists
C) writers
D) designers
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
36
A growing number of college campuses have wireless ____ on campus that allow students to use their PCs to connect wirelessly to the college network and the Internet from anywhere on campus.

A) hotspots
B) hotpoints
C) com spots
D) com points
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
37
The ISP is the largest and most well-known computer network in the world. _________________________
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
38
A(n) display screen can be defined as a programmable, electronic device that accepts data, performs operations on that data, presents the results, and can store the data or results as needed. _________________________
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
39
Dr. Herman Hollerith's Punch Card Tabulating Machine and Sorter was the first electromechanical machine that could read slide rules. _________________________
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
40
Abbreviations or acronyms, such as BTW for "between the words," are commonly used to save time in all types of communications today. _________________________
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
41
A personal computer (PC) or ____ is a small computer system designed to be used by one person at a time.

A) processor
B) microcomputer
C) microchip
D) small processor
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
42
____ are unique numeric or text-based addresses used to identify resources accessible through the Internet, such as computers, Web pages, and people.

A) Computer addresses
B) Machine IDs
C) Domain IDs
D) Internet addresses
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
43
Hollerith's machine was used to process the 1890 U.S. Census data and was able to complete the task in ____, instead of the decade it usually took to process the data by hand.

A) two months
B) four years
C) two and a half years
D) six years
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
44
When data is processed into a meaningful form, it becomes ____.

A) information
B) code
C) a program
D) a database
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
45
____ consists of programs designed to allow people to perform specific tasks using a computer, such as creating letters, preparing budgets, and managing inventory.

A) Cloud storage
B) HTML
C) Java Script
D) Application software
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
46
To contact people using the Internet, you most often use their ____.

A) domain names
B) e-mail addresses
C) usernames
D) passwords
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
47
The term ____ refers to the programs or instructions used to tell the computer hardware what to do.

A) hardware
B) port
C) software
D) adapter
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
48
Common input devices include the keyboard and ____.

A) printer
B) mouse
C) speaker
D) monitor
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
49
<strong>  The accompanying figure corresponds to the ____ style for desktop PCs.</strong> A) all-in-one case B) tower case C) desktop case D) sub case
The accompanying figure corresponds to the ____ style for desktop PCs.

A) all-in-one case
B) tower case
C) desktop case
D) sub case
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
50
To navigate to a new Web page for which you know the URL, type that URL in the browser's ____ and press Enter.

A) Address bar
B) Domain bar
C) Address button
D) Name button
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
51
<strong>  The Windows ____ shown in the accompanying figure contains the following objects: Windows, Icons, Menus, Toolbars, Taskbar, Hyperlinks, Sizing buttons, and a Dialog box.</strong> A) command B) toolbox C) general menu D) desktop
The Windows ____ shown in the accompanying figure contains the following objects: Windows, Icons, Menus, Toolbars, Taskbar, Hyperlinks, Sizing buttons, and a Dialog box.

A) command
B) toolbox
C) general menu
D) desktop
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
52
A ____ is a collection of hardware and other devices that are connected together so that users can share hardware, software, and data, as well as electronically communicate with each other.

A) computer bank
B) database
C) data bank
D) computer network
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
53
There are a number of special Web pages, called ____, available to help you locate what you are looking for on the Internet.

A) search sites
B) domain identifications
C) domain sites
D) Internet repositories
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
54
A ____ is loosely defined as a very small device that has some built-in computing or Internet capability.

A) mainframe computer
B) midrange server
C) mobile device
D) personal computer
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
55
With the advent of ____, integrated circuits incorporating many transistors and electronic circuits on a single tiny silicon chip, allowed computers to be even smaller and more reliable than earlier computers.

A) second-generation computers
B) third-generation computers
C) fourth-generation computers
D) fifth-generation computers
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
56
Similar to the way an IP address or domain name uniquely identifies a computer on the Internet, a ____ uniquely identifies a Web page.

A) universal resource identifier (URI)
B) Web ID (WID)
C) uniform resource locator (URL)
D) Web resource identifier (WRI)
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
57
A(n) ____ is a medium-sized computer used to host programs and data for a small network.

A) mainframe computer
B) super server
C) midrange server
D) Internet server
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
58
Two of the most common types of communications hardware are ____ and network adapters.

A) ports
B) slide rules
C) monitors
D) modems
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
59
Conventional PCs are often referred to as ____ because the complete computer system fits on or next to a desk.

A) desktop computers
B) laptop computers
C) super computers
D) processor computers
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
60
Ultraportables conforming to Intel's standards can be marketed as ____.

A) IntelBooks
B) Ultrabooks
C) hybrids
D) smallframe computers
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
61
____ is typically free and provided by virtually all ISPs used with personal computers.

A) Short Message mail
B) Web-based e-mail
C) Web-com
D) Program-based e-mail
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
62
Consumer ____________________ are small self-service computer-based stations, such as ATM machines, bridal registries, and ticketing systems.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
63
There are independent Web sites (such as the ____ Web site) that report on the validity of current online rumors and stories.

A) Spammer
B) Snopes
C) Phisher
D) Identifier
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
64
____________________ are computer professionals whose primary job responsibility is to write the programs that computers use.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
65
____ are illustrations of faces showing smiles, frowns, and other expressions that are created with keyboard symbols.

A) Spams
B) Phishes
C) Emoticons
D) Trojan horses
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
66
Typically, individual users connect to the Internet by connecting to servers belonging to a(n) ____________________.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
67
____________________ is an alternative to traditional classroom learning that allows students to participate from their current location, instead of physically going to class.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
68
____ refers to typing your entire e-mail message or discussion group post using only capital letters.

A) Spamming
B) Phishing
C) Calling
D) Shouting
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
69
An emerging payment option is the use of ____________________ payment systems-systems that allow individuals to pay for products and services via a mobile phone or other portable device.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
70
The ____________________ being used with a computer determine the tasks the computer is able to perform.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
71
The progression of input, processing, output, and storage is sometimes referred to as the ____________________ cycle or the information processing cycle.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
72
____ refers to guidelines for online behavior.

A) Net rules
B) Web etiquette
C) Internet Rules
D) Netiquette
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
73
One online security problem is ____, in which someone else uses your identity, typically to purchase goods or services.

A) identity duplication
B) domain theft
C) identity theft
D) phishing
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
74
HTML is called a(n) ____________________ or scripting language.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
75
One common opinion is that fifth-generation computers will be based on ____________________, allowing them to think, reason, and learn.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
76
One trend involving servers today is ____________________, which means creating virtual (rather than actual) versions of a computing resource.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
77
The first computers were powered by thousands of ____________________ that needed replacing constantly, required a great deal of electricity, and generated a lot of heat.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
78
The physical parts of a computer are collectively referred to as ____________________.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
79
____________________-technically an input or output operation, depending on which direction the information is going-is increasingly considered the fifth primary computer operation.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
80
____________________ are regular appliances with some type of built-in computer technology.
Unlock Deck
Unlock for access to all 90 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 90 flashcards in this deck.