An advantage of ____ software is its ability to run more than one operating system on a computer.

virtual machine (VM)
ROM is used for important programs like _____, which come(s) from the manufacturer.
firmware
Each programming language has a particular ____— rules that guide how programming statements are constructed.
syntax
Many businesses rely on ____ software to keep a competitive edge in today's marketplace.
custom-designed
Read-only memory differs from random access memory due to its ability to _____ store instructions.
permanently
With _____ memory, data is stored permanently with no moving parts or the need for electricity.
flash
With the help of ____, less experienced programmers can develop applications for mobile devices such as the iPhone.

SDKs
Through the use of _____, pilots can simulate flights without ever leaving the ground.
virtual reality
An integrated circuit may hold thousands, millions, or even billions of _____.
transistors
The purpose of the ____ is to store the boot process instructions for the computer to start up.
BIOs
Moore's Law states that the number of transistors on a chip will double about every _____ months.

24
It is the job of the ____ to oversee the removal of software programs on a computer.
operating system
The iPad and other tablets take advantage of _____, allowing the user to use more than one finger to manipulate a display.
multi-touch displays
Output that you can feel is called _____ output.
haptic
_____ was invented to standardize computer interfaces around one type of connection.
the usb port
Programmers create ____ and compilers turn it/them into ____.

source code/object code
Google Docs is classified as ____ software, which allows users to share and edit a document in real time on the web.
collaborative
One advantage of _____ printers is their ability to output realistic objects.
3D
A(n) ____ license can be used anywhere on a college campus.
site
____ software allows the user to copy, modify, and redistribute source code.

open-source
The _____ plays an important role in transforming data into useful information.
processor
The specifications of a computer usually include the speed of the _____ bus.
front-side
When you combine a system's hardware configuration and operating system, it is sometimes called the computer's ____.
platform
Windows cleaners maintain the ____ for more effective system operation.

registry
A ____ software package usually includes document production, numerical analysis, information management, and graphics.
productivity
An individual who illegally downloads copyright-protected software is referred to as a ____.
pirate
Speech recognition, handwriting recognition, and face recognition all fall under the AI category of ____ recognition.
pattern
Software companies rely on ____ to "fix" problems in their programs related to bugs and flaws.
updates
To protect your wireless devices and the information they hold, you should set up encryption such as ____.
WPA2
Criminals collect items such as credit card numbers without the user's knowledge through the use of ____.

spyware
A common form of authentication is a ____.
password
A ____ may be used to filter data that may be undesirable.
firewall
Facial recognition is used as a(n) ____ process in the Australian SmartGate system.
authentication
A strong advocate of the Singularity concept is ____.

Ray Kurzweil
Medical robots are built with ____ capabilities to perform sophisticated surgeries.
high-precision
An expert system relies on ____ to provide subject-specific knowledge.
human experts
The art and science of creating computer systems that simulate human thought and behavior are referred to as ____.
artificial intelligence
The https:// protocol in a URL indicates the use of a(n) ____ by the website.
SSL connection
An Internet-based crime is referred to as a(n) ____ crime.
cyber
You can protect yourself from identity theft by using ____ when transmitting information over network connections.

encryption
AI applications are ways in which AI methodologies are applied to ____ and provide services.
solve problems
Receiving a fraudulent email that closely resembles a legitimate website, such as one from your bank, is known as a(n) ____ attack.
phishing
When using a public Wi-Fi network, when is it safe to send private information over the network?
never
Communication and language are key elements in the ____.
turing test
____ proposed a test to determine whether a computer can be said to "think."
alan turing
Robots are used to perform jobs that involve the three Ds. Which of the following is NOT one of the three Ds?
disasters
The component of artificial intelligence that demonstrates the ability to learn from experience and continuously improve performance is called __________.
machine learning
Searching the Web for the best deal on an airline flight is a good example of ____ at work.
an intelligent agent
____ artificial intelligence is very popular in the programming of robots.
behavior-based
The concept of the Singularity predicts that computers will be ____.
superintelligent
Users can interact in a virtual reality environment through the use of
avatars
ASCII is the encoding standard used to represent _____ in digital form
keyboard characters
A popular term used to identify devices such as the iPad is _____.
tablet pc
one thing to consider when choosing a mobile device is ____.
battery life
A kindle ebook reader is an example of a ______ computer
special-purpose
personal music videos that combine user-generated photos with audio music are good examples of
digital convergence
a game console relies on fast _____ to handle the lively animations in a video game
microprocessor
the kindle is an example of an _____ device
eReader
Digital photography captures, stores, and manipulates photographs digitally as a series of _____.
1s and 0s
Computer _____ captures the essence of todays business expectations for knowledge workers within their organizations
fluency
online newpapers can be delivered through ____ to news readers
RSS
Typical ____ computing providers deliver common software online that is accessed from another web service or browser
cloud
apple, amazon, and google provide services that let users store their music ____, making it accessible to the owner from any internet-connected device
in the cloud
which of the following is a popular satellite radio service in the United states
SiriusXM
a computer relies on the combination of ____ and ____ to turn input into output
hardware/software
digital video ____ involves analyzing each frame of the video and storing only the pixels that change from frame to frame
compression
cloud computing is not possible without ____.
an internet connection
using analog-to-______ conversion, we are able to digitilize the things we see and hear
digital
a basic example of ____ is the use of graphs and charts to illustrate numeric data
visualization
the ______ system, which uses only two digits, 1 and 0, is commonly used for representing values in computers
binary
the prefix giga represents approximately one ____ units of information
billion
which of the following is an example of digital media?
blue-ray movies
____ software allows you to improve the look of your captured image
photo-editing
a ____ can represent a digit, a letter, or color
byte
which of the following is a social network with photo album capabilities
facebook
which of the following agencies played an important role in the birth of the internet?
department of defense
the popularity of ____ has encouraged every day users to share events of the day
social media
downloaded music may include ____ technology that prevents or limits the users ability to make copies
DRM
using the web as a primary user interface to access such applications as google docs is an example of
cloud computing
our e-textbook, emerge with computers, is an example of
online education
a unique feature of the semantic web is its ability to ____
figure out what the user is looking for
____ can be defined as systems that support electronically executed business transactions
ecommerce
a ____ payment system delivers mcommerce services to small devices through the use of short-range wireless data communications.
proximity
electronic communication that occurs in real time is called ____ communication
synchronous
in a ____ relationship, multiple users are provided with access to a server at the same time
client/server
a good example of an ecommerce site is ____
amazon
with the help of ____, four academic research institutions were connected to each other for the first time through ARPA's computer network
ARPANET
in the URL http://www.cengage.com/index.html, cengage.com is the ____
domain name
by combining geolocation, the image through your camera, and advanced ____ applications, you can review information in real time about businesses that surrounded you.
augmented reality
_____ defines how information travels across the internet
TCP/IP
government angencies have not supported cloud computing due to the lack of
data security
downloading apps, games, and media to your smartphone is an example of ____
mcommerce
one of the biggest roadblocks to ecash and ewallet technologies is ___
fear
in the ____ form of ecommerce, the web is used to connect individual consumers directly with retailers to purchase products
B2C
individual consumers use the _____ form of ecommerce to sell to other individuals on the web
C2C
A ____ is a website that allows visitors to browse through a wide variety of products from varying etailers.
cybermall
the new internet protocol that was recently implemented to identify the large amount of internet users is called ____
IPv6
the online retailer _____ is one of the largest suppliers of cloud services
amazon.com
google wallet suftware utilizes android phones with near field communication technology, such as ____ to allow shoppers to swipe their phone at checkout to pay
RFID
In the _____ form of ecommerce, transactions between businesses across private networks, the internet, and the web are supported
B2B