Deck 1: Introduction to Computers and the Internet
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/74
Play
Full screen (f)
Deck 1: Introduction to Computers and the Internet
1
The instructions that are used to tell the computer what to do to accomplish tasks are known as hardware.
False
2
An IP address is a text-based Internet address.
False
3
When data is processed into a meaningful form, it becomes information.
True
4
Self-driving cars contain a large number of mainframe computers which enable the car to safely operate without a driver.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
5
Mobile devices are powered by a rechargeable battery and include wireless connectivity to enable the device to connect to the Internet.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
6
Computer professionals who are responsible for designing computers to be used within their companies are the _____.
A)systems analysts
B)technical support engineers
C)software testers
D)business developers
A)systems analysts
B)technical support engineers
C)software testers
D)business developers
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
7
Identify the difference between data and information from the following options.
A)Data is the outcome derived after processing information, while information is only the input given to a system.
B)Data is easily understood, while information is difficult to understand.
C)Data is an unorganized set of facts, while information is processed data.
D)Data is generated to answer a question, while information is a raw fact.
A)Data is the outcome derived after processing information, while information is only the input given to a system.
B)Data is easily understood, while information is difficult to understand.
C)Data is an unorganized set of facts, while information is processed data.
D)Data is generated to answer a question, while information is a raw fact.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
8
A security specialist is responsible for securing the company computers and networks against _____.
A)hackers
B)auditors
C)staff members
D)testers
A)hackers
B)auditors
C)staff members
D)testers
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
9
The processing operation occurs any time the data, a change to a program, or the output is saved for future use.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
10
An email message can be sent from any device such as a desktop computer, portable computer, or smartphone, to anyone without an Internet connection.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
11
Trademarks are the standards of moral conduct that guide a business's policies, decisions, and actions.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
12
The progression of input, processing, output, and storage is known as the _____.
A)secure storage cycle
B)information processing cycle
C)input transfer cycle
D)output transmission cycle
A)secure storage cycle
B)information processing cycle
C)input transfer cycle
D)output transmission cycle
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
13
An email address consists of an IP address (a unique identifying name), followed by the @ symbol, followed by the domain name for the computer that will be handling that person's email.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
14
To request a Web page located on the Internet, its Internet address-a unique numeric or text-based address-is used.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
15
Randy, an entrepreneur, has designed a trademark for his new business. He has claimed his trademark but has not registered it with the U.S. Patent and Trademark Office (USPTO), and so he should use the mark TM.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
16
E-grass includes electronic trash, such as discarded computer components.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
17
The physical parts of a computer are called software.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
18
Which of the following is an example of hardware?
A)A mouse
B)A device driver
C)A web desktop
D)A content management system
A)A mouse
B)A device driver
C)A web desktop
D)A content management system
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
19
Which of the following is true of an embedded computer?
A) It is a tiny computer embedded into a product designed to perform specific tasks or functions for that product.
B)It is a mainframe computer embedded into a product designed to perform specific tasks or functions for that product.
C)It is a supercomputer embedded into a product designed to perform specific tasks or functions for that product.
D)It is a personal computer embedded into a product designed to perform specific tasks or functions for that product.
A) It is a tiny computer embedded into a product designed to perform specific tasks or functions for that product.
B)It is a mainframe computer embedded into a product designed to perform specific tasks or functions for that product.
C)It is a supercomputer embedded into a product designed to perform specific tasks or functions for that product.
D)It is a personal computer embedded into a product designed to perform specific tasks or functions for that product.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
20
_____ runs a computer and allows people to use the computer to perform specific tasks, such as creating letters, preparing budgets, managing inventory and customer databases.
A)Hardware
B)Network interface card
C)Expansion card
D)Software
A)Hardware
B)Network interface card
C)Expansion card
D)Software
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
21
Integrated circuits incorporate many _____ on a single tiny silicon chip, making computers smaller and more reliable.
A)transistors and electronic circuits
B)batch files and algorithmic circuits
C)arrays and bitmap circuits
D)metafiles and mnemonic circuits
A)transistors and electronic circuits
B)batch files and algorithmic circuits
C)arrays and bitmap circuits
D)metafiles and mnemonic circuits
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
22
Identify the computer that generally runs one program at a time as fast as possible.
A)A supercomputer
B)A quantum computer
C)A photonic computer
D)A mainframe computer
A)A supercomputer
B)A quantum computer
C)A photonic computer
D)A mainframe computer
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
23
Ray, a computer professional, works from home using a tablet. He separates the display from the keyboard for his convenience. Which of the following types of tablet computers is Ray using?
A)Stand-alone notebook-tablet computers
B)Notebook-tablet mainframe computers
C)Notebook-tablet supercomputers
D)Hybrid notebook-tablet computers
A)Stand-alone notebook-tablet computers
B)Notebook-tablet mainframe computers
C)Notebook-tablet supercomputers
D)Hybrid notebook-tablet computers
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
24
Desktop computers can be housed in a _____, which is a system unit designed to sit vertically on the floor.
A)tower case
B)drive bay
C)hub cove
D)floppy disk
A)tower case
B)drive bay
C)hub cove
D)floppy disk
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
25
Many mobile devices can perform Internet searches and other tasks via _____.
A)voice commands
B)diagnostic signals
C)thought transference
D)command prompts
A)voice commands
B)diagnostic signals
C)thought transference
D)command prompts
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
26
Identify a true statement about supercomputers.
A)They tend to be very small and are slow at processing.
B)They are used for applications that require extraordinary speed, accuracy, and processing capabilities.
C)They can function as either a notebook or a tablet computer because they have display screen that folds shut to resemble a tablet.
D)They include smartphones and small tablet devices.
A)They tend to be very small and are slow at processing.
B)They are used for applications that require extraordinary speed, accuracy, and processing capabilities.
C)They can function as either a notebook or a tablet computer because they have display screen that folds shut to resemble a tablet.
D)They include smartphones and small tablet devices.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
27
Determine the device that helps a mainframe serve thousands of users connected to it.
A)A thin client
B)A punch card
C)A plotter
D)A facsimile
A)A thin client
B)A punch card
C)A plotter
D)A facsimile
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
28
The computers found in DVD players, thermostats, answering machines, and some appliances are known as _____.
A)supercomputers
B)fifth-generation computers
C)embedded computers
D)mainframe computers
A)supercomputers
B)fifth-generation computers
C)embedded computers
D)mainframe computers
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
29
Identify a device that is used to make send text messages, view Web pages and documents, take digital photos, play games, and access other tools.
A)A biometric device
B)A translation device
C)A mnemonic device
D)A mobile device
A)A biometric device
B)A translation device
C)A mnemonic device
D)A mobile device
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
30
Rita, a computer science student, studies about servers with her friend. They learn about a trend that stores each user's desktop environment on a server and delivers it to each individual via any authorized device. Which of the following trends is discussed in this scenario?
A)Desktop virtualization
B)Desktop authorization
C)Desktop normalization
D)Desktop generalization
A)Desktop virtualization
B)Desktop authorization
C)Desktop normalization
D)Desktop generalization
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
31
Kevin has designed a computer that can fit on or next to a piece of furniture so that it can be used by people at home or office. Conventional personal computers that are designed to fit on or next to a piece of furniture are often referred to as _____.
A)desktop computers
B)mainframe computers
C)supercomputers
D)server computers
A)desktop computers
B)mainframe computers
C)supercomputers
D)server computers
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
32
The Apple watch is an example of a _____.
A)mobile device
B)mainframe computer
C)wireframe device
D)supercomputer
A)mobile device
B)mainframe computer
C)wireframe device
D)supercomputer
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
33
Susie purchased a tablet computer. Which of the following devices should she use to work on her new computer?
A)A digital pen
B)A primary key
C)A secondary key
D)An analog pen
A)A digital pen
B)A primary key
C)A secondary key
D)An analog pen
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
34
Identify an accurate statement about embedded computers.
A)They cannot be used as general-purpose computers.
B)They are used for large-scale computing purposes.
C)They cannot be used in a car's navigational or entertainment systems.
D)They are used in various fields such as weather forecasting and quantum mechanics.
A)They cannot be used as general-purpose computers.
B)They are used for large-scale computing purposes.
C)They cannot be used in a car's navigational or entertainment systems.
D)They are used in various fields such as weather forecasting and quantum mechanics.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
35
Which of the following statements is true of supercomputers?
A)They have enormous processing power.
B)They can process multiple applications simultaneously.
C)They are setup in simulated environments on a single server.
D)They do not facilitate faster research breakthroughs.
A)They have enormous processing power.
B)They can process multiple applications simultaneously.
C)They are setup in simulated environments on a single server.
D)They do not facilitate faster research breakthroughs.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
36
Roger, an entrepreneur of a software industry, decides to use a system that will run the programs needed to meet the different needs of a wide variety of users during business hours. This system also performs large processing tasks, such as payroll and billing. Which of the following systems should Roger use?
A)Mainframe computers
B)Optical mark recognition systems
C)Remote desktop systems
D)Stand-alone computers
A)Mainframe computers
B)Optical mark recognition systems
C)Remote desktop systems
D)Stand-alone computers
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
37
Which of the following statements is true of servers?
A)They are known as microcomputers and do not host programs and data for a network.
B)They can serve only one person at a time to connect to a network.
C)They are accessed by users connected through a network using a computer.
D)They cannot be accessed by a home network.
A)They are known as microcomputers and do not host programs and data for a network.
B)They can serve only one person at a time to connect to a network.
C)They are accessed by users connected through a network using a computer.
D)They cannot be accessed by a home network.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
38
One trend involving servers, as well as mainframe computers, is _____ that is the creation of practical versions of a computing resource.
A)virtualization
B)fragmentation
C)normalization
D)optimization
A)virtualization
B)fragmentation
C)normalization
D)optimization
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
39
Randy sets up a home server that will allow him to securely access his stored content remotely via the Internet. Here, Randy has created a _____.
A)logical cloud
B)personal cloud
C)cloud gate
D)cloud agent
A)logical cloud
B)personal cloud
C)cloud gate
D)cloud agent
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
40
Identify a true statement about mainframe computers.
A)Mainframe computers are dedicated to serve only a single user connected via a personal computer.
B)Mainframe computers are dedicated to serve only a single user connected via a dumb terminal.
C)Mainframe computers are typically located in climate-controlled data centers.
D)Mainframe computers are typically located within a tower case of a desktop computer.
A)Mainframe computers are dedicated to serve only a single user connected via a personal computer.
B)Mainframe computers are dedicated to serve only a single user connected via a dumb terminal.
C)Mainframe computers are typically located in climate-controlled data centers.
D)Mainframe computers are typically located within a tower case of a desktop computer.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
41
Case 1-2 Bruce, a freelance Web designer, has signed a contract to design a Web site for Glenvalley Corporation. He has been told that the Web site will only provide company specifics, the products they develop, the company founders, and the contact details; and no financial transactions would happen on the Web site.
Which of the following email addresses should Bruce use to update in the "Contact Us" tab of the Web page?
A)abruce@glenvalleycorporation.com
B)abruce.glenvalleycorporation@com
C)abruce. glenvalleycorporation.com
D)abruce@glenvalleycorporation@com
Which of the following email addresses should Bruce use to update in the "Contact Us" tab of the Web page?
A)abruce@glenvalleycorporation.com
B)abruce.glenvalleycorporation@com
C)abruce. glenvalleycorporation.com
D)abruce@glenvalleycorporation@com
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
42
Bill is a trainer at a data entry company in Brampton, Canada. He is asked to train physically and visually challenged individuals to perform necessary job tasks and to communicate with others. Which of the following technologies should Bill use to assist them?
A)Braille technology
B)Quantum technology
C)La crosse technology
D)Nanotechnology
A)Braille technology
B)Quantum technology
C)La crosse technology
D)Nanotechnology
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
43
Steve, a senior architect, has to design a work environment for the people who work in the office, including properly adjusting furniture and hardware. Which of the following should Steve make use of to set up a safe and effective workspace?
A)Ergonomics
B)Macronomics
C)Hydrodynamics
D)Geonomics
A)Ergonomics
B)Macronomics
C)Hydrodynamics
D)Geonomics
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
44
_____, the largest and most well-known computer network in the world, is a network of networks because it consists of a vast collection of networks that can access each other.
A)The Internet
B)An extranet
C)An intranet
D)The World Wide Web
A)The Internet
B)An extranet
C)An intranet
D)The World Wide Web
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
45
_________-technically an input or output operation, depending on which direction the information is going-is considered the fifth primary computer operation.
A)Communication
B)Processing
C)Transmutation
D)Computing
A)Communication
B)Processing
C)Transmutation
D)Computing
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
46
Which of the following statements is considered a benefit of a computer-oriented society?
A)As more and more data about our everyday activities is collected and stored on computers accessible via the Internet, our privacy is never at risk.
B)There is no potential risk to personal privacy, which is one of the most important societal advantages.
C)It increases the need of people and reduces unemployment in society.
D)The capability to virtually design, build, and test new buildings before the actual construction begins helps professionals create safer products.
A)As more and more data about our everyday activities is collected and stored on computers accessible via the Internet, our privacy is never at risk.
B)There is no potential risk to personal privacy, which is one of the most important societal advantages.
C)It increases the need of people and reduces unemployment in society.
D)The capability to virtually design, build, and test new buildings before the actual construction begins helps professionals create safer products.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
47
Raw, unorganized facts are termed as _________.
A)information
B)data
C)program
D)terminal
A)information
B)data
C)program
D)terminal
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
48
Which of the following was introduced by the U.S. Environmental Protection Agency (EPA) as a voluntary labeling program designed to identify and promote power-efficient products in an effort to reduce greenhouse gas emissions?
A)VOLUNTEER PLANT
B)ENERGY STAR
C)Power Commando
D)Gas Quantum Vessel
A)VOLUNTEER PLANT
B)ENERGY STAR
C)Power Commando
D)Gas Quantum Vessel
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
49
Case 1-1 Casey is learning about the types of servers and more powerful computers available. She has asked her friend Burt, an expert on computers and its uses, to quiz her.
Burt describes an incredibly expensive computer designed to focus all of its computing power on one specific task at a time that can handle applications requiring speed, accuracy, and processing capabilities. Casey identifies the type of computer to be a(n)_____.
A) wireframe computer
B) supercomputer
C) mainframe computer
D) enterprise-class computer
Burt describes an incredibly expensive computer designed to focus all of its computing power on one specific task at a time that can handle applications requiring speed, accuracy, and processing capabilities. Casey identifies the type of computer to be a(n)_____.
A) wireframe computer
B) supercomputer
C) mainframe computer
D) enterprise-class computer
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
50
Which of the following is considered an intellectual property?
A)An ethic
B)A patent
C)A plagiarized content
D)An auction
A)An ethic
B)A patent
C)A plagiarized content
D)An auction
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
51
Identify a true statement about an intellectual property.
A)It provides copyrights only for published works.
B)It includes original creative work such as movies and music.
C) It withdraws the protection rights for a work after its creator's death.
D)It uses the TM symbol for unregistered service marks.
A)It provides copyrights only for published works.
B)It includes original creative work such as movies and music.
C) It withdraws the protection rights for a work after its creator's death.
D)It uses the TM symbol for unregistered service marks.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
52
Case 1-2 Bruce, a freelance Web designer, has signed a contract to design a Web site for Glenvalley Corporation. He has been told that the Web site will only provide company specifics, the products they develop, the company founders, and the contact details; and no financial transactions would happen on the Web site.
According to the specifications provided by the organization, which of the following Web page protocols should Bruce make use of to develop the Web site?
A)Hypertext Transfer Protocol ( http://)
B)File Transfer Protocol (ftp://)
C)Transmission Control Protocol (tcp://)
D)Secure sockets layer (ssl://)
According to the specifications provided by the organization, which of the following Web page protocols should Bruce make use of to develop the Web site?
A)Hypertext Transfer Protocol ( http://)
B)File Transfer Protocol (ftp://)
C)Transmission Control Protocol (tcp://)
D)Secure sockets layer (ssl://)
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
53
Which of the following best describes the World Wide Web?
A)It refers to one resource available through the Internet.
B)It refers to the physical structure of a network.
C)It is a company that provides Internet access.
D)It is a closed-source information center.
A)It refers to one resource available through the Internet.
B)It refers to the physical structure of a network.
C)It is a company that provides Internet access.
D)It is a closed-source information center.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
54
Which of the following statements is true of Internet Protocol version 6 (IPv6)?
A)It has four parts that are separated by periods.
B)It was designed for use with third-generation computers.
C)It allows 2128 unique addresses for all devices connecting to the Internet.
D)It performs IP fragmentation.
A)It has four parts that are separated by periods.
B)It was designed for use with third-generation computers.
C)It allows 2128 unique addresses for all devices connecting to the Internet.
D)It performs IP fragmentation.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
55
Which of the following statements is true of a home network?
A)It allows home computers to share a single printer and Internet connection.
B)It permits home computers to work with a peak speed of 27,000 trillion calculations per second.
C)It requires home computers to be located in climate-controlled data centers.
D)It can be used to control missile guidance systems and satellites.
A)It allows home computers to share a single printer and Internet connection.
B)It permits home computers to work with a peak speed of 27,000 trillion calculations per second.
C)It requires home computers to be located in climate-controlled data centers.
D)It can be used to control missile guidance systems and satellites.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
56
Case 1-3 Damon asks his friend Tanya to test his understanding on computer and business ethics.
Tanyaasks Damon to provide a scenario that is an act of plagiarism. Which of the following scenarios can Damon provide?
A)A teacher sharing a poem with a class, leading the class to believe the poem was his original work
B)A newspaper reporter paraphrasing a few sentences or paragraphs written by another author without changing the meaning of the text, including the revised text in an article, and crediting the original author with a proper citation
C)A student copying and pasting information from various online documents and using those quotes in her research paper either indented or enclosed in quotation marks with the proper citations for each author
D)A philosopher referring to the information available on the Internet and using certain quotes in her research paper either indented or enclosed in quotation marks with the proper citations for each author
Tanyaasks Damon to provide a scenario that is an act of plagiarism. Which of the following scenarios can Damon provide?
A)A teacher sharing a poem with a class, leading the class to believe the poem was his original work
B)A newspaper reporter paraphrasing a few sentences or paragraphs written by another author without changing the meaning of the text, including the revised text in an article, and crediting the original author with a proper citation
C)A student copying and pasting information from various online documents and using those quotes in her research paper either indented or enclosed in quotation marks with the proper citations for each author
D)A philosopher referring to the information available on the Internet and using certain quotes in her research paper either indented or enclosed in quotation marks with the proper citations for each author
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
57
Case 1-1 Casey is learning about the types of servers and more powerful computers available. She has asked her friend Burt, an expert on computers and its uses, to quiz her.
Burt asks Casey what type of computer she will need to operate and maintain the network in her school's computer lab. Casey replies that it would be a _____.
A) third-generation computer
B)minicomputer
C)supercomputer
D)netbook
Burt asks Casey what type of computer she will need to operate and maintain the network in her school's computer lab. Casey replies that it would be a _____.
A) third-generation computer
B)minicomputer
C)supercomputer
D)netbook
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
58
Case 1-3 Damon asks his friend Tanya to test his understanding on computer and business ethics.
Tanya provides a scenario to Damon where a student copies and pastes information from various online documents to create a research paper, without crediting the original authors. The paper is only for school use and will not be shared or sold outside of school. Damon replies saying that this is an act of _____.
A)plagiarism
B)inchoateness
C)felony
D)solicitation
Tanya provides a scenario to Damon where a student copies and pastes information from various online documents to create a research paper, without crediting the original authors. The paper is only for school use and will not be shared or sold outside of school. Damon replies saying that this is an act of _____.
A)plagiarism
B)inchoateness
C)felony
D)solicitation
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
59
Roger, a budding author, completes a manuscript and sends it to various publishers. He copyrights his work so that it will not be copied by others. For how long will the copyright cover Roger's work?
A)85 years
B)80 years
C)75 years
D)70 years
A)85 years
B)80 years
C)75 years
D)70 years
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
60
The term _____ refers to the use of computers in an environmentally friendly manner.
A)green computing
B)bio computing
C)scene computing
D)organic computing
A)green computing
B)bio computing
C)scene computing
D)organic computing
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
61
Briefly explain how an email is used as a means of communication.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
62
_________ components can be internal (located inside a computer) or external (located outside a computer and connected to a computer via a wired or wireless connection).
A)Hardware
B)Software
C)Data
D)Instruction
A)Hardware
B)Software
C)Data
D)Instruction
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
63
One recent focus for _________ is ensuring that they can handle new and emerging needs, such as having the computational power to process data from smart meters and having the ability to run mobile and social networking applications.
A)minicomputers
B)mainframe computers
C)portable computers
D)desktop computers
A)minicomputers
B)mainframe computers
C)portable computers
D)desktop computers
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
64
People who use computers to perform tasks or obtain information are known as _________.
A)computer programmers
B)systems analysts
C)end users
D)operations personnel
A)computer programmers
B)systems analysts
C)end users
D)operations personnel
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
65
Sandy is a computer professional who writes instructions for computers to perform specific tasks. Sandy is a(n) _________.
A)analyst
B)programmer
C)operator
D)designer
A)analyst
B)programmer
C)operator
D)designer
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
66
Briefly explain the roles of a computer user and a software professional.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
67
Used toner cartridges, obsolete or broken hardware, and discarded CDs, DVDs, and other storage media are referred to as _________.
A)system dispose
B)e-dump
C)electronic compost
D)computing refuse
A)system dispose
B)e-dump
C)electronic compost
D)computing refuse
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
68
_________ is a collection of eye and vision problems, including eyestrain or eye fatigue, dry eyes, burning eyes, light sensitivity, and blurred vision.
A)Repetitive stress injuries (RSIs)
B)Carpal tunnel syndrome (CTS)
C)Computer vision syndrome (CVS)
D)De Quervain's tendonitis
A)Repetitive stress injuries (RSIs)
B)Carpal tunnel syndrome (CTS)
C)Computer vision syndrome (CVS)
D)De Quervain's tendonitis
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
69
A(n) _________ is a device that is designed to be used in conjunction with a company network instead of using local hard drives for storage.
A)network hub
B)thin client
C)coupled modem
D)enterprise router
A)network hub
B)thin client
C)coupled modem
D)enterprise router
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
70
Conventional and mobile telephone companies like AT&T, Verizon, and Sprint are known as _________.
A)Web servers
B)Web hosts
C)Internet Service Providers
D)Internet Messengers
A)Web servers
B)Web hosts
C)Internet Service Providers
D)Internet Messengers
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
71
_________ are used to back up the content located on all the computers in a home and to host music, photos, movies, and other media to be shared via a home network.
A)Home routers
B)Home modems
C)Home servers
D)Home modulators
A)Home routers
B)Home modems
C)Home servers
D)Home modulators
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
72
Explain the importance of green computing.
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
73
The problem of overusing, or being unable to stop using, the Internet is known as _________.
A)Internet insomnia
B)Internet triviality
C)Internet addiction
D)Internet indifference
A)Internet insomnia
B)Internet triviality
C)Internet addiction
D)Internet indifference
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck
74
Susan, an archeological research student, browses sources online for her thesis. To conduct a search, she types one or more words into the search box on a search site, and a list of links to Web pages matching her search criteria is displayed. The words Susan uses are referred to as _________.
A)keywords
B)snippets
C)codewords
D)passwords
A)keywords
B)snippets
C)codewords
D)passwords
Unlock Deck
Unlock for access to all 74 flashcards in this deck.
Unlock Deck
k this deck