The process of searching huge amounts of data seeking a pattern
Miming Mining

What information is contained in a packet
1. An address to which the packet is being sent
2. The address from where the packet originates
3. Reassembly instructions, if the original data is split between packets
4. The data thats being transmitted

Is the standard communication protocol used on most client/server networks
Ethernet

Crisis Mapping
Tools gather information from sources such as emails, txt messages, and tweets and make the information instantly publicly available for us in emergencies.

ICANN
Is responsible for the Internets domain name system and the allocation of IP addresses.

Purpose, Mastering, autonomy
Lead to greater motivation

Network
Is a group of two or more computers, or nodes, designed to share information and resources.

_______results when leisure time and tools allow us to engage in creative acts?
Cognitive Surplus

What is a common network topology
Ring Topology, Star, Bus

What are examples of being computer literate?
1. Understanding the real risks
2. Use the web wisely
3. Avoid online annoyances
4. Protect your identity
5. Avoiding viruses/hackers
6. Diagnosing the problem
7. Using web efficitly
8. Avoiding Spam

A______ uses the internet communications infrastructure to build a secure and private network
VPN

Unwanted or junk email is called?
Spam

______ permits two or more people to communicate over the Internet in real time?
Instant Message

Mastery is defined as?
confidence and excitement about learning new skills

Skype
A popular Voice over internet protocol (VoIP) service is?

Which Language was created for the transfer
HTTP

Ring Networks use the _____ method to avoid data collisions?
Token

______ is a personal identification chip that is about the size of a grain of rice and implanted under the skin?
Varamed/Veramev

The ______ is an organization of musicians performing together from different locations all over the globe?
Virtual choir

____Solicits online input from consumers?
Crowd Survey

Analyzing computer systems to gather potential legal evidence is computer______?
Fronsics

______refers to the instructions that tell a computer what to do?
software

A_______ server tracks who is logging on to the network as well as which services on the network are available to each user?
Authethication server

______ tools enable groups of people to connect and exchange ideas?
Social networking

Which is the most commonly used client/server network topology?
Star Network

The term computer____ is used to describe someone who is familiar enough with computers to understand their capabilities and limitaions?
Literate

QR stands for?
Quick Response

The gap between those who have easy access to the internet and technology and this who do not?
Digital divide

A_____ network can contain servers as well as individual computers?
Client Server

____is out normal sense of the world around us enhanced with digital information?
augmentation realityrelality

______is the amount of data that can be transmitted across a transmission medium in a certain amount of time?
Bandwif

The ______ initiative is rallying the support of the world to identify mathematical genius?
next Einstein

Autonomy is defined as?
working without continual direction or control

Using the Internet to get small donations from many people to start a business is called?
Crowd Funding

Configuring an account to disable itself after a set number of login attempts using invalid passwords is a method of countering a ______?
Brute force attack

Sharing products rather than owning them individually is known as?
Collaborative consumption

The _____ hopes to stop human rights abuses throughout the world?
witness project

The worlds population combined has an estimated _____ hours a year of free time?
1 trillion

A _____ address is the address that external entities use when communicating with your network?
IP

Affective computing... developing systems that can______?
Recognize and stimulate human emotions

In a _____ network, each node connected to the network communicates directly with every other node?
Peer to Peer

A _____ is an input device that looks like a pen?
Stylis

The ____ contains the central electronic components of the computer?
Mother board

Is the abbreviation for the place in the computer where the programs and data the computer is currently using are temporarily stored?
The Ram

Sends data between two networks
router

In binary language, each letter of the alphabet, each number, and each special symbol is made up of a unique combination of eight___?
bit

Computer use_____ consisting of Os and Is?
Binary language

Is concerned with the design and arrangement of machines and furniture to avoid uncomfortable or unsafe experiences?
Ergonomics

Apple's OS X and Microsoft windows are examples of?
operating software

A _____ CPU has two processing paths, allowing it to process more than one instruction at a time?
Dual Core

A Apple iPad and samsung galaxy tab and a Microsoft surface are examples of____ computer?
Tablet

Which computer port can transmit uncompressed audio and video?
HDMI

Which computers supports many simultaneous users and manages large amounts of data?
Main frame

What is a system used with touch screen?
Capacitive, resistive, surface, acoustic wave system

Flash drives plug into?
USB Drive

What optical storage media has the greatest storage capacity?
Blu Ray (dual Layer), 50 GB, BDs

A ___ is where a peripheral device can attach to a computer so that data can be exchanges between it an the operating system?
port

The number of pixels displayed on the screen is known as?
screen resolution

A_____ keeps your computer safe by determining who is trying to access it?
Firewall

What are examples of nonvolatile, storage?
USB, Hard Disk, DVD, ROM, Tape, Cloud

The main suite of protocols used on the Internet is?
TCP/IP

The most common type of monitor is?
LCD monitor

Inkjet printers and laser printers are examples of printers?
Thermal

A ___ address is a unique number that identifies a computer, server, or device connected to the Internet?
IP

Dropbox is an example of?
iCloud storage

A _____ enables your computer to connect to other computers or to the internet?
network interface

What are ways to avoid injuries when working on computers?
Take breaks
Ensure the lighting is adequate
assume proper position
purchase adjustable chair
position your monitor correctly

The "brains" of the computer is?
CPU

A address is temporary IP address that is assigned from an available pool of IP addresses?
Dynamics

Have tiny hammer like keys that stake the paper through an inked ribbon?
Impact printer

An IP address that does not change and is usually assigned manually by a network administrator is called _____ address?
Static

Is a representation of a fact, a figure or an idea and can be a number, a word, a picture, or even recording of sound?
Data

When using a spreadsheet, the expression =D8-D17 is called a?
Formula

Using applications on smartphones and tablets to buy and sell products is known?
Mobile commerce

Web-based application software is software that is stored completely on web server instead of you?
Hard drive/computer

____ helps run the computer and coordinates instructions between other software and the hardware devices?
System Software

An example of a software suites?
Microsoft office, apple, work, apache, open office

The appropriate software to use for creating research papers if?
Word processing software

______software installation copies all the most commonly used files and programs that distribution disc to your computers hard drive?
Full Installtion

When checking to see whether a particular name is registered on the internet, your computer accesses a database that is kept on a ____ server?
BNS

____ defines the content in terms of the data that is being described rather than how it is to be displayed?
XML

To remove red eye from a digital image, you would use software such as?
image editing software/photoshop

A____ is a small program that resides on a server and is designed to be downloaded and run on a client computer?
Ad Lid

You can obtain software through______ in which a vendor hosts the software online over the internet and you don not have to install it?
Software as a service

Which protocol is used when sending files as attachments by e-mail?
MIME/Multiply Internet Mail Extension

Unwanted or unelected software included by manufacturers on new computers is called?
Bloatware

The main path of the Internet along which data travels the fastest is known as the internet?
Internet Back Bone

The two main types of software are system software and________?
Application software

Strong encryption now requires____ bit keys?
256

In the databases a category of data is called?
Field

Is used to perform calculation and numerical analyses?
Spread Sheet software

The most common audio compression format is?
MP3

_____enables you to decide which features you want to install on the hard drive?
A custom installation

Quark Xpress is an example of
Desktop publishing software

Tips for a great presentation?
Be careful with color
use bullets
Images
Font size

_____computing allows you to store date, files, and applications on the web and access and manipulate those files and applications from any device connected to the internet?
Cloud

Types of multimedia and entertainment software?
Digital video
Drawing
Audio
Video editing
app creation
gaming
education

Blackboard is an example of?
Oracle, myself, Microsoft Access

QuickBooks is an example of?
Accounting software

Dreamweaver is an example?
Web authoring software/web design

EULA stands for
End User License Agreement

A ____ version is an application that is still under development?
Beta

The processor market for desktop and laptop computers is dominated by
Intel

Which performance activités are carried out by the ALU?
Arithmetic logic unit

There are _____ levels of cache memory
3

________predicts that the capacity of a CPU will double every 2 years?
Mor's Law

Running the CPU at a faster speed than the manufacturer recommended is called?
Over clocking

ram is an example?
Volatile storage

Which is the lightest computer?
Tablet?ultrabook

The audio subsystem consists of the speakers and
audio/soundcards

The CPU consists of which two parts?
control unit/artithemtic unit

The amount of RAM Storage is measured in?
Gigibytes

In most current systems______ is the types of RAM used?
DDR3

A video card can diveler output to multiple?
monitors

______provides high speed information processing by enabling a new set of instructions to start before the previous set is finished?
Hyper threading

Running the Disk Cleanup utility is a quick way to clear out?
unnecessarily files

The speed of a level of cache is impacted by?
Proximity to the CPU

______is a feature of a CPU that allows it to begins to fetch the next instruction before it has finished executing the current one?
Hyper-Threading

Which of the ports are used to connect to a video card?
DUI Port, HDMI Ports, Display Port

Optical drives use a ______ to read and write data
Laser

When referring to hard dries, access time is measured in?
milliseconds

To speed up the display of graphics a ____ is installed on some video card?
CPU

In Dolby Digital 7.1, the .1 indicates a?
subwoofer speaker

Running the Disk Defragmenter utility will make the ____ work more _____
Hard Drive
Efficacy

To remove all the changes made to your system, the windows _____ utility returns your computer to the state it was when it came from the factory?
refresh

To securely erase data, the U.S Department of Defense suggest that the data be overwritten
7 times/multiple

_______automatically duplicates your data and saves it
RAID 1

Data______ ensures that the data contained in a database is accurate and reliable?
Data Integrity

______breaks down a problem into a series of high-level tasks and continues to break each task into successively more detailed subtasks
Top Down Design

The set of specific sequential steps that describes exactly what a computer programs must do to complete the work is called?
algorithm

A small Java based program is called?
Java Applit

The keywords used in programming languages that use decisions to redirect the flow of a program are called?
controlled structure

If a school keeps two lists one for students registration and one for student financial information both containing name and address information this is an example of data?
Redundancy

What provides a visual representation of the patterns of an algorithm?
Flow Chart

______ is a combination of natural language and programming language that is used to document an algorithm
Pseudo Code

A data______ is a large scale electronic respority of data that contains and organizes all of an organization data in one place
warehouses

In object oriented programing____ allows a new class to automatically use all the data and methods of its parent class
Inheritance

An example of a first generation language?
machine language

The capability of moving a completed programming solution easily from one type of computer to another is known as
portability

Translating an algorithm into a programming language is called?
Coding

Before its final commercial release______ version of software may be offered to certain test sites to to interested user free or at reduced cost?
Beta

______database are the most commonly used electronic databases
Relational

_____ is used to ensure that data is organized most efficiently?
normalization

nontraditional data such as audio clips, videoclips, pictures, and very large documents are called
unstructured data

You would use a ____ to temporarily display records of residents of the city of Boston
Filter

A____ is a way of retrieving information from one ore more tables that defines a particular subset of data
Query

A display a subset if data from table based on the specified criteria
Selected

Data Staging consists of which steps
Data
Extraction

In a transaction processing system if the TPs database van be queried and updated while the transaction is taking place is called?
real time processing

______ is the branch of computer science that attempts to create computers that think like humans
AI/ Artfical intelligence

Big data analytics is usually associated with ____ services
Data warehouse

_________the ability to law a single device to meet all of our media, internet, entertainment, and telephone needs
Digital Convergence

______they illustrate the loudness of a sound or the brightness of the colors in an image a given moment in time
Analog/continuous waves

_______a form of a voice based Internet communication that turns a standard Internet connection into a means to place phone calls, including long distance calls. Uses technology similar to that used in email to transmit your voice data digitally over the internet
NoIP(Voice over Internet Protocol)

______ some people regard sound quality and reliability issues as VIPs primary disadvantages when using VoIP at home. There is loss of service if power interrupted
Drawbacks of VoIP

_____a network of 21 satellites that constantly orbit earth. It uses an antenna to pick up the signals from these satellites and use special software to transform those signals into latitude and longitude
GPS (global positioning system)

______the federal communications commission mandated a GPS chip into every cellphone and smartphone to enable this program
Enhanced 911 program

_______the process of updating your data so your files are the same
Synchronizing/syncing

WIRED: use a micro SD card or a USB cable to directly transfer data
WIRELESS: use a wireless connection to transfer data
Two ways to transfer information between your phone and computer

How does a wired transfer of data work?
Almost all phones designed to support USB once connected

How does a wireless transfer of data work?
The easiest way is to use a wireless connection to a cloud service. You can synchronize these services to your email.

_______ a technology that lets you send short text messages over cellular network to transmit messages
SMS (short message service)

_____ an extension of sms that lets you send messages that include text, sound, images, and video clips to other phones or email addresses
Multimedia message service(MMS)

_____enables you to use your phones cellular network to create a wireless network to create a wireless network to access the internet
Tethering

_____ textual information captures digitally so that it can be stored, manipulated and transmitted by electronic devices
E-text )electronic text)

_______devices that can display e-text and have supporting tools, like note taking, bookmarks, and integrated dictionaries
E-readers

_______intergrated dictionaries pull up a definition just by your highlighting a word. helps read foreign works
E-reader features

Signals such as sound and temperature, which continuously vary in strength and quality are said to be
Analog

Ist generation______ consisted of extruded plastic printing, melting plastic down and then pushing it into a mold to shape it
3-D printers

_______ the use of a single unifying device that handles media, Internet entertainment and telephone needs
Digital Convergence

______ chip converts sound waves from a voice into digital signals
Analog to digital

_____ the number of times that an analog wave is measured each second in an analog to digital conversion
Sampling rate

______ devices that communicate with each other with a single top
NFC ( Near field communications)

_____allows only limited use of media that have been legally purchased
DRM (digital rights management)

_____a term used to refer to various licensing plans that enable copyright holders to grant certain rights to the work while retaining other rights
Copy Left

______a rule that squeezes the same audio and video information into less space
Codect

When using a cell phone, a base transceiver station picks up a request for service and then passes the request to a central location called?
Mobile switching center

it has low to free cost, portability, make calls on a laptop or tablet, through a hotspot or network
Advantages of VoIP

____helps to ensure data integrity by maintaining information in only one place
Data centralization

______ a programming language that can be used to create a wide range of windows applications
Visual Basic

uses relational algebra to extract records from a database by using english like expressions that have variables and operation
SQL

The process that converts program code into machine language?
Compilation

The internet is?
A large network of networks

The concepts of the internet was developed by the U.S Department of Defense as a network that_______ in event of an attack?
would not be disrupted easily

The world wide web was based on a protocol developed by?
Tim berners-lee

The "fathers of the Internet" are Vinton Cerf and?
robert Kahn

Software that enables you to display and interact with text and other media on the web is a web_____?
Browser

The Web is based on the______ protocol?
Hypertext transfer

All of the following are tips for professional email etiquette except?
Use abbreviation such as BRB to keep the email message shorter

Which of the following is not a proprietary instant messaging (IM) service)
LikedIn messenger

____ allows visitors to add, remove, to edit its content?
Wiki

Which of the following are personal video journal entires posted on the web?
Blogs

_____ is a personal journal posted on the web
Blog

Podcasts enable you to?
deliver audio/video files via RSS

____ is usually a live broadcast of audio or video content
Webcast

Multimedia is anything that involves one or more of the following except?
browsers

______media are continuously fed to your browser so you don't have to wait for the entire file to completely download before listening to or watch it
Streaming

All of the following are types of e-commerce business except
C2B

A subset of e-commerce that uses social networks to assist in marketing and purchasing in marketing and purchasing products is known as
social commerce

Which of the following is NOT a precaution to take when shopping online
Pay with a debit card, not a credit card

The "s" in https stands for______ socket layer
secure

The browser feature which allows tabs to work independently from one another so if one crashes, the others may continue to work is known as
tab isolation

The unique address for a particular website is the
URL

The URL the portion labeled .com is the
top level domain

In the URL the portion labeled /surface is the
subdirectory

in the URL labeled http is the
protocol

which of the following domains identifies a degrees granting institution
.edu

Which of the following is a feature of Live bookmarks?
adds RSS technology to bookmarks

AND, OR, and NOT are examples of_____ operators
Boolean

The two major types software programs are utility programs and the
operating system

The______ of the operating enables users to communicate with the computer system?
User interface

OS x is the operating system developed by?
Apple

All of the following are examples of network operating systems except?
MS-DOS

Which of the following capabilities of UNIX is false?
It is only for super computers

Most supercomputers use the_____ operating system?
Linux

Which of the following operating system are used on most tablets?
Android and iOS

Most smartphones use operating systems developed by?
Google and Apple

Which of the following i a proprietary OS for desktop and laptop computers?
Windows

Windows 10 uses____ account for easy access and storage of online files
OneDrive

The Mac OS was the first commercially available OS to incopertae
point and clock technology

Which of the following is NOT a user interface?
application programming interface (API

Using hard disk space to temporarily store data or instructions from RAM is referred to as the
virtual memory

Each device attached to your computer has a special program called a(n) ________ that enables the device and operating system to communicate with each other
device driver

Which of the following is the first step in the boot process?
The BIOS is activated by turning on the computer

The basic input/output system (BIOS) is stored on a ________ chip
ROM

All of the following are terms related to part of the boot process EXCEPT
USB

In the late 1980s, computer specialists were concerned that proprietary software had too many ________, so they started working on open source projects.
bugs

C: denotes a(n) ________ directory that is at the top of the filing structure of a computer.
root

All of the following can be used in an OS X file name EXCEPT
:

The location of a file is specified by its
file path

Which of the following is the name of a Microsoft Excel file?
Inventory.xlsx

Deleted files on a Mac computer are moved to the
trash

Which of the following Windows utility programs arranges pieces of files on your hard drive to allow for faster access?
Disk Defragmenter

Which of the following is NOT a Windows utility program?
Desktop

You can use the Windows ________ to check on a nonresponsive program.
Task Manager

The ________ utility automatically creates duplicates of your libraries, desktops, contacts and favorites to another storage location.
File History

WE WILL WRITE A CUSTOM ESSAY SAMPLE ON
CIT 15 SPECIFICALLY FOR YOU
FOR ONLY $13.90/PAGE