Deck 1: Introduction to the World of Technology

Full screen (f)
exit full mode
Question
Storage devices are used to store data on or access data from storage media, such as DVD discs and flash memory cards.
Use Space or
up arrow
down arrow
to flip the card.
Question
A computer does not always do whatever the instructions, or program, tell it to do.
Question
Information processing is a vital activity today for all computer users, as well as for businesses and other organizations.
Question
Fourth-generation computers witnessed the development of computer networks, wireless technologies, and the Internet.
Question
Systems analysts design computer systems to be used within their companies.
Question
There are application programs that help users write their own programs in a form the computer can understand using a programming language.
Question
Tablet computers are typically about the size of a notebook computer and are designed to be used with a digital pen/stylus or touch input.
Question
Small office networks enable workers to access company records stored on a network server.
Question
The external hardware components are located inside the main box or system unit of the computer.
Question
Web browsers maintain a History list, which is a record of all Web pages visited during the period of time specified in the browser settings.
Question
Once you have an Internet connection, you are ready to begin programming the Web-that is, to use a Web browser to view Web pages.
Question
Satellite communication (more commonly called s-com) is the process of exchanging electronic messages between individuals over a network-usually the Internet.
Question
To begin to use a computer, the user first turns on the power by pressing the power button, and then the computer displays a prompt for the user to decide the next course of action.
Question
Embedded computers are computers that host data and programs available to a small group of users .
Question
A mainframe computer is a powerful computer used in many large organizations that need to manage large amounts of centralized data.
Question
Just as you can learn to drive a car without knowing much about car engines, you can learn to use a computer without understanding the technical details of how a computer works.
Question
The slide rule is considered by many to be the earliest recorded calculating device.
Question
Computer literacy is knowing about and understanding computers and their uses.
Question
Notebook computers (also called laptops) are about the size of a paper notebook and open to reveal a screen and keyboard.
Question
In addition to hardware, software, data, and procedures, the fifth major component of a computer system are codes.
Question
In the early 1980s, ____ were invented and computer use increased dramatically.

A) printers
B) networks
C) microcomputers
D) computers
Question
An e-mail address consists of a(n) username , followed by the @ symbol, followed by the domain name for the computer that will be handling that person's e-mail (called a mail server). _________________________
Question
Fifty years ago, computers were used primarily by researchers and ____.

A) musicians
B) scientists
C) writers
D) designers
Question
Dr. Herman Hollerith's Punch Card Tabulating Machine and Sorter was the first electromechanical machine that could read slide rules . _________________________
Question
Many schools, particularly college campuses, today have wireless ____ that allow students to connect their devices wirelessly to the Internet and to campus resources from anywhere on campus.

A) hotspots
B) hotpoints
C) com spots
D) com points
Question
IP addresses and their corresponding domain names are used to identify computers available through the Internet. _________________________
Question
A(n) display screen is a programmable, electronic device that accepts data, performs operations on that data, presents the results, and stores the data or results as needed. _________________________
Question
Computing technologies make it possible to have ____, traditional appliances with some type of built-in computer or communications technology.

A) design appliances
B) smart computers
C) home computers
D) smart appliances
Question
Abbreviations or acronyms, such as BTW for " between the words ," are commonly used to save time in all types of communications today. _________________________
Question
Mobile tablets are extremely powerful computers used for complex computations and processing. _________________________
Question
Computer programmers are the people who use computers to perform tasks or obtain information. _________________________
Question
Fourth-generation computers typically use a keyboard and mouse for input, a monitor and printer for output, and hard drives, flash memory media, and optical discs for storage. _________________________
Question
Spam  refers to harmful programs that can be installed on our computers without our knowledge. _________________________
Question
The background work area displayed on the screen for computers running Microsoft Windows is called the desktop . _________________________
Question
Independent Web sites such as Snopes.com reports on the  sources  of current online rumors and stories . _________________________
Question
A user inputs data into a computer, and then the computer processes it. _________________________
Question
Access control at many businesses and organizations is provided by ____, which allow only authorized individuals to enter an office building, punch in or out of work, or access the company network via an access card or a fingerprint or hand scan.

A) bar codes
B) virtual reality glasses
C) collaboration systems
D) authentication systems
Question
The ISP is the largest and most well-known computer network in the world. _________________________
Question
Communications hardware includes modems, network projectors , and routers. _________________________
Question
Wireless networking allows the use of computers in virtually any location. _________________________
Question
Ultraportables conforming to Intel's standards can be marketed as ____.

A) IntelBooks
B) Ultrabooks
C) hybrids
D) smallframe computers
Question
Common input devices include the keyboard, ____, and integrated video cameras.

A) printer
B) mouse
C) speaker
D) monitor
Question
Integrated circuits incorporate many transistors and electronic circuits on a single tiny silicon chip, allowing ____ to be even smaller and more reliable than  earlier computers.

A) second-generation computers
B) third-generation computers
C) fourth-generation computers
D) fifth-generation computers
Question
A ____ is a collection of computers and other devices that are connected in order to enable users to share hardware, software, and data, as well as to communicate electronically with each other.

A) computer bank
B) database
C) data bank
D) computer network
Question
The term ____ refers to the programs or instructions used to tell the computer hardware what to do.

A) hardware
B) port
C) software
D) adapter
Question
In addition to the four primary computer operations, today's computers almost always perform ____ functions.

A) punching
B) communications
C) sorting
D) programming
Question
Application programs can help users write their own programs in a form the computer can understand using a programming language such as Visual Basic, COBOL, C++, Java, or ____.

A) Virtual D
B) Virtual RPG
C) Fort
D) Python
Question
Conventional personal computers that are designed to fit on or next to a desk are often referred to as ____.

A) desktop computers
B) laptop computers
C) office computers
D) processor computers
Question
____ that allow individuals to perform specific tasks are launched via the operating system, such as by using the Windows Start menu on Windows computers.

A) Clouds
B) Protocols
C) Routers
D) Apps
Question
Because many mobile devices and personal computers today are continually connected to the Internet, securing those devices against computer viruses and ____ is essential for both individuals and businesses.

A) hackers
B) scripts
C) booters
D) applets
Question
Hollerith's machine was used to process the 1890 U.S. Census data in ____, as opposed to the decade it usually took to process the data manually.

A) two and one-half years
B) six  and one-half  years
C) four  and one-half  years
D) eight  and one-half years
Question
A(n) ____ is a computer used to host programs and data for a network.

A) mainframe computer
B) super server
C) midrange server
D) Internet server
Question
____ occurs when data is entered into the computer.

A) Output
B) Processing
C) Input
D) Storage
Question
To request a Web page or other resource located on the Internet, use its ____.

A) MAC address
B) menu bar
C) domain ID
D) Internet address
Question
Some languages are traditional programming languages for developing applications; others, such as markup and scripting languages like HTML, XHTML, and ____, are designed to be used to create Web pages.

A) TCP/IP
B) Rextore
C) PDF
D) JavaScript
Question
A personal computer or PC, originally called a ____, is a small computer designed to be used by one person at a time.

A) processor
B) microcomputer
C) microchip
D) coprocessor
Question
Hybrid notebook-tablet computers are also called convertible tablets or  ____.

A) 2-in-1 computers
B) netbook computers
C) laptop computers
D) PDAs
Question
When data is processed into a meaningful form, it becomes ____.

A) information
B) code
C) a program
D) a database
Question
A ____ is loosely defined as a small device that has built-in computing or Internet capability.

A) mainframe computer
B) midrange server
C) mobile device
D) personal computer
Question
A variety of ____ and network adapters are available to communicate electronically because there are different types of Internet and network connections.

A) punch cards
B) licenses
C) monitors
D) modems
Question
____________________ payment systems allow individuals to pay for purchases using a smartphone or other device.
Question
Case-Based Critical Thinking Questions Case 1-2 Jamie is interested in pursuing some aspect of computer technology as a career. He is very comfortable working with PCs and has a broad knowledge of the typical systems and applications software that people use. He has always enjoyed working closely with people and has a good facility for explaining how technical systems work. Jamie's mother is a computer programmer and would like Jamie to follow in her footsteps. What course would she most likely suggest that Jamie take in college?

A) systems analysis
B) history of computing
C) computer literacy
D) Java
Question
____ is typically free and virtually all ISPs used with personal computers include e-mail service in their monthly fee.

A) Short Message mail
B) Web-based e-mail
C) Web-com
D) Program-based e-mail
Question
Case-Based Critical Thinking Questions Case 1-1 Sarah is a busy real estate agent with a growing clientele. She is looking to purchase a new computer and software so that she can keep track of her client's accounts, access the Internet from anywhere in the city, and touch up photos of real estate properties. Sarah stores digital photographs of houses she is previewing. She needs to be able to copy these to the computer at her office. What type of storage device should she use?

A) data projector
B) router
C) scanner
D) USB flash drive
Question
____________________ are traditional appliances with some type of built-in computer or communications technology.
Question
____________________ is an alternative to traditional classroom learning in which students participate, typically at their own pace, from their current location instead of physically going to class.
Question
Case-Based Critical Thinking Questions Case 1-1 Sarah is a busy real estate agent with a growing clientele. She is looking to purchase a new computer and software so that she can keep track of her client's accounts, access the Internet from anywhere in the city, and touch up photos of real estate properties. What kind of computer would most likely fit Sarah's needs?

A) midrange server
B) embedded device
C) notebook computer
D) docking station
Question
Consumer ____________________ are small self-service computer-based stations that provide information or other services to the public, including those used for ATM transactions and bridal registries.
Question
There are a number of special Web pages, called ____, available to help you locate what you are looking for on the Internet.

A) search sites
B) virtual IDs
C) domain sites
D) Internet repositories
Question
Case-Based Critical Thinking Questions Case 1-2 Jamie is interested in pursuing some aspect of computer technology as a career. He is very comfortable working with PCs and has a broad knowledge of the typical systems and applications software that people use. He has always enjoyed working closely with people and has a good facility for explaining how technical systems work. From the description provided, what type of computer-related job would Jamie probably enjoy the most?

A) hardware designer
B) computer operations personnel
C) graphic designer
D) end user
Question
Case-Based Critical Thinking Questions Case 1-1 Sarah is a busy real estate agent with a growing clientele. She is looking to purchase a new computer and software so that she can keep track of her client's accounts, access the Internet from anywhere in the city, and touch up photos of real estate properties. Sarah has hired a programmer to create a Web page for her business. What type of programming language will the programmer most likely use?

A) Python
B) COBOL
C) XHTML
D) BASIC
Question
Similar to the way an IP address or domain name uniquely identifies a computer on the Internet, a ____ uniquely identifies a specific Web page.

A) universal resource identifier (URI)
B) Web ID (WID)
C) uniform resource locator (URL)
D) Web resource identifier (WRI)
Question
To contact people using the Internet, you most often use their ____.

A) domain names
B) e-mail addresses
C) usernames
D) passwords
Question
Because of ____________________, many devices today are single units with multiple computing or Internet capabilities.
Question
To navigate to a new Web page for which you know the URL, type that URL in the browser's ____ bar and press Enter.

A) address
B) domain
C) data
D) menu
Question
____ refers to typing your entire e-mail message or online post using capital letters.

A) Spamming
B) Phishing
C) Calling
D) Shouting
Question
____ refers to guidelines for online behavior.

A) Net rules
B) Web etiquette
C) Internet Rules
D) Netiquette
Question
A variety of problems have emerged from our extensive use of computers and related technology, ranging from stress and health concerns, to the proliferation of ____ and malware.

A) wardriving
B) domain theft
C) spam
D) caching
Question
By their very nature, online communications lend themselves to ____ .

A) patriotism
B) anonymity
C) caching
D) plaguing
Question
____ are illustrations of faces showing smiles, frowns, and other expressions that are created with keyboard symbols.

A) Spams
B) Phishes
C) Emoticons
D) Trojan horses
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/100
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 1: Introduction to the World of Technology
1
Storage devices are used to store data on or access data from storage media, such as DVD discs and flash memory cards.
True
2
A computer does not always do whatever the instructions, or program, tell it to do.
False
3
Information processing is a vital activity today for all computer users, as well as for businesses and other organizations.
True
4
Fourth-generation computers witnessed the development of computer networks, wireless technologies, and the Internet.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
5
Systems analysts design computer systems to be used within their companies.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
6
There are application programs that help users write their own programs in a form the computer can understand using a programming language.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
7
Tablet computers are typically about the size of a notebook computer and are designed to be used with a digital pen/stylus or touch input.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
8
Small office networks enable workers to access company records stored on a network server.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
9
The external hardware components are located inside the main box or system unit of the computer.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
10
Web browsers maintain a History list, which is a record of all Web pages visited during the period of time specified in the browser settings.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
11
Once you have an Internet connection, you are ready to begin programming the Web-that is, to use a Web browser to view Web pages.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
12
Satellite communication (more commonly called s-com) is the process of exchanging electronic messages between individuals over a network-usually the Internet.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
13
To begin to use a computer, the user first turns on the power by pressing the power button, and then the computer displays a prompt for the user to decide the next course of action.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
14
Embedded computers are computers that host data and programs available to a small group of users .
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
15
A mainframe computer is a powerful computer used in many large organizations that need to manage large amounts of centralized data.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
16
Just as you can learn to drive a car without knowing much about car engines, you can learn to use a computer without understanding the technical details of how a computer works.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
17
The slide rule is considered by many to be the earliest recorded calculating device.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
18
Computer literacy is knowing about and understanding computers and their uses.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
19
Notebook computers (also called laptops) are about the size of a paper notebook and open to reveal a screen and keyboard.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
20
In addition to hardware, software, data, and procedures, the fifth major component of a computer system are codes.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
21
In the early 1980s, ____ were invented and computer use increased dramatically.

A) printers
B) networks
C) microcomputers
D) computers
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
22
An e-mail address consists of a(n) username , followed by the @ symbol, followed by the domain name for the computer that will be handling that person's e-mail (called a mail server). _________________________
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
23
Fifty years ago, computers were used primarily by researchers and ____.

A) musicians
B) scientists
C) writers
D) designers
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
24
Dr. Herman Hollerith's Punch Card Tabulating Machine and Sorter was the first electromechanical machine that could read slide rules . _________________________
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
25
Many schools, particularly college campuses, today have wireless ____ that allow students to connect their devices wirelessly to the Internet and to campus resources from anywhere on campus.

A) hotspots
B) hotpoints
C) com spots
D) com points
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
26
IP addresses and their corresponding domain names are used to identify computers available through the Internet. _________________________
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
27
A(n) display screen is a programmable, electronic device that accepts data, performs operations on that data, presents the results, and stores the data or results as needed. _________________________
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
28
Computing technologies make it possible to have ____, traditional appliances with some type of built-in computer or communications technology.

A) design appliances
B) smart computers
C) home computers
D) smart appliances
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
29
Abbreviations or acronyms, such as BTW for " between the words ," are commonly used to save time in all types of communications today. _________________________
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
30
Mobile tablets are extremely powerful computers used for complex computations and processing. _________________________
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
31
Computer programmers are the people who use computers to perform tasks or obtain information. _________________________
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
32
Fourth-generation computers typically use a keyboard and mouse for input, a monitor and printer for output, and hard drives, flash memory media, and optical discs for storage. _________________________
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
33
Spam  refers to harmful programs that can be installed on our computers without our knowledge. _________________________
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
34
The background work area displayed on the screen for computers running Microsoft Windows is called the desktop . _________________________
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
35
Independent Web sites such as Snopes.com reports on the  sources  of current online rumors and stories . _________________________
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
36
A user inputs data into a computer, and then the computer processes it. _________________________
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
37
Access control at many businesses and organizations is provided by ____, which allow only authorized individuals to enter an office building, punch in or out of work, or access the company network via an access card or a fingerprint or hand scan.

A) bar codes
B) virtual reality glasses
C) collaboration systems
D) authentication systems
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
38
The ISP is the largest and most well-known computer network in the world. _________________________
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
39
Communications hardware includes modems, network projectors , and routers. _________________________
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
40
Wireless networking allows the use of computers in virtually any location. _________________________
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
41
Ultraportables conforming to Intel's standards can be marketed as ____.

A) IntelBooks
B) Ultrabooks
C) hybrids
D) smallframe computers
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
42
Common input devices include the keyboard, ____, and integrated video cameras.

A) printer
B) mouse
C) speaker
D) monitor
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
43
Integrated circuits incorporate many transistors and electronic circuits on a single tiny silicon chip, allowing ____ to be even smaller and more reliable than  earlier computers.

A) second-generation computers
B) third-generation computers
C) fourth-generation computers
D) fifth-generation computers
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
44
A ____ is a collection of computers and other devices that are connected in order to enable users to share hardware, software, and data, as well as to communicate electronically with each other.

A) computer bank
B) database
C) data bank
D) computer network
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
45
The term ____ refers to the programs or instructions used to tell the computer hardware what to do.

A) hardware
B) port
C) software
D) adapter
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
46
In addition to the four primary computer operations, today's computers almost always perform ____ functions.

A) punching
B) communications
C) sorting
D) programming
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
47
Application programs can help users write their own programs in a form the computer can understand using a programming language such as Visual Basic, COBOL, C++, Java, or ____.

A) Virtual D
B) Virtual RPG
C) Fort
D) Python
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
48
Conventional personal computers that are designed to fit on or next to a desk are often referred to as ____.

A) desktop computers
B) laptop computers
C) office computers
D) processor computers
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
49
____ that allow individuals to perform specific tasks are launched via the operating system, such as by using the Windows Start menu on Windows computers.

A) Clouds
B) Protocols
C) Routers
D) Apps
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
50
Because many mobile devices and personal computers today are continually connected to the Internet, securing those devices against computer viruses and ____ is essential for both individuals and businesses.

A) hackers
B) scripts
C) booters
D) applets
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
51
Hollerith's machine was used to process the 1890 U.S. Census data in ____, as opposed to the decade it usually took to process the data manually.

A) two and one-half years
B) six  and one-half  years
C) four  and one-half  years
D) eight  and one-half years
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
52
A(n) ____ is a computer used to host programs and data for a network.

A) mainframe computer
B) super server
C) midrange server
D) Internet server
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
53
____ occurs when data is entered into the computer.

A) Output
B) Processing
C) Input
D) Storage
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
54
To request a Web page or other resource located on the Internet, use its ____.

A) MAC address
B) menu bar
C) domain ID
D) Internet address
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
55
Some languages are traditional programming languages for developing applications; others, such as markup and scripting languages like HTML, XHTML, and ____, are designed to be used to create Web pages.

A) TCP/IP
B) Rextore
C) PDF
D) JavaScript
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
56
A personal computer or PC, originally called a ____, is a small computer designed to be used by one person at a time.

A) processor
B) microcomputer
C) microchip
D) coprocessor
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
57
Hybrid notebook-tablet computers are also called convertible tablets or  ____.

A) 2-in-1 computers
B) netbook computers
C) laptop computers
D) PDAs
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
58
When data is processed into a meaningful form, it becomes ____.

A) information
B) code
C) a program
D) a database
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
59
A ____ is loosely defined as a small device that has built-in computing or Internet capability.

A) mainframe computer
B) midrange server
C) mobile device
D) personal computer
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
60
A variety of ____ and network adapters are available to communicate electronically because there are different types of Internet and network connections.

A) punch cards
B) licenses
C) monitors
D) modems
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
61
____________________ payment systems allow individuals to pay for purchases using a smartphone or other device.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
62
Case-Based Critical Thinking Questions Case 1-2 Jamie is interested in pursuing some aspect of computer technology as a career. He is very comfortable working with PCs and has a broad knowledge of the typical systems and applications software that people use. He has always enjoyed working closely with people and has a good facility for explaining how technical systems work. Jamie's mother is a computer programmer and would like Jamie to follow in her footsteps. What course would she most likely suggest that Jamie take in college?

A) systems analysis
B) history of computing
C) computer literacy
D) Java
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
63
____ is typically free and virtually all ISPs used with personal computers include e-mail service in their monthly fee.

A) Short Message mail
B) Web-based e-mail
C) Web-com
D) Program-based e-mail
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
64
Case-Based Critical Thinking Questions Case 1-1 Sarah is a busy real estate agent with a growing clientele. She is looking to purchase a new computer and software so that she can keep track of her client's accounts, access the Internet from anywhere in the city, and touch up photos of real estate properties. Sarah stores digital photographs of houses she is previewing. She needs to be able to copy these to the computer at her office. What type of storage device should she use?

A) data projector
B) router
C) scanner
D) USB flash drive
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
65
____________________ are traditional appliances with some type of built-in computer or communications technology.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
66
____________________ is an alternative to traditional classroom learning in which students participate, typically at their own pace, from their current location instead of physically going to class.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
67
Case-Based Critical Thinking Questions Case 1-1 Sarah is a busy real estate agent with a growing clientele. She is looking to purchase a new computer and software so that she can keep track of her client's accounts, access the Internet from anywhere in the city, and touch up photos of real estate properties. What kind of computer would most likely fit Sarah's needs?

A) midrange server
B) embedded device
C) notebook computer
D) docking station
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
68
Consumer ____________________ are small self-service computer-based stations that provide information or other services to the public, including those used for ATM transactions and bridal registries.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
69
There are a number of special Web pages, called ____, available to help you locate what you are looking for on the Internet.

A) search sites
B) virtual IDs
C) domain sites
D) Internet repositories
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
70
Case-Based Critical Thinking Questions Case 1-2 Jamie is interested in pursuing some aspect of computer technology as a career. He is very comfortable working with PCs and has a broad knowledge of the typical systems and applications software that people use. He has always enjoyed working closely with people and has a good facility for explaining how technical systems work. From the description provided, what type of computer-related job would Jamie probably enjoy the most?

A) hardware designer
B) computer operations personnel
C) graphic designer
D) end user
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
71
Case-Based Critical Thinking Questions Case 1-1 Sarah is a busy real estate agent with a growing clientele. She is looking to purchase a new computer and software so that she can keep track of her client's accounts, access the Internet from anywhere in the city, and touch up photos of real estate properties. Sarah has hired a programmer to create a Web page for her business. What type of programming language will the programmer most likely use?

A) Python
B) COBOL
C) XHTML
D) BASIC
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
72
Similar to the way an IP address or domain name uniquely identifies a computer on the Internet, a ____ uniquely identifies a specific Web page.

A) universal resource identifier (URI)
B) Web ID (WID)
C) uniform resource locator (URL)
D) Web resource identifier (WRI)
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
73
To contact people using the Internet, you most often use their ____.

A) domain names
B) e-mail addresses
C) usernames
D) passwords
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
74
Because of ____________________, many devices today are single units with multiple computing or Internet capabilities.
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
75
To navigate to a new Web page for which you know the URL, type that URL in the browser's ____ bar and press Enter.

A) address
B) domain
C) data
D) menu
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
76
____ refers to typing your entire e-mail message or online post using capital letters.

A) Spamming
B) Phishing
C) Calling
D) Shouting
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
77
____ refers to guidelines for online behavior.

A) Net rules
B) Web etiquette
C) Internet Rules
D) Netiquette
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
78
A variety of problems have emerged from our extensive use of computers and related technology, ranging from stress and health concerns, to the proliferation of ____ and malware.

A) wardriving
B) domain theft
C) spam
D) caching
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
79
By their very nature, online communications lend themselves to ____ .

A) patriotism
B) anonymity
C) caching
D) plaguing
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
80
____ are illustrations of faces showing smiles, frowns, and other expressions that are created with keyboard symbols.

A) Spams
B) Phishes
C) Emoticons
D) Trojan horses
Unlock Deck
Unlock for access to all 100 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 100 flashcards in this deck.