All of the following are features of the most popular Web browsers, EXCEPT ______.A.

tabbed browsingB. pinned browsingC. tacked browsingD. tear-off tabs

C.

tacked browsing

A subset of e-commerce that uses social networks to assist in marketing and purchasing products is known as _____.A. Social businessesB. social shoppingC. social enterpriseD.

social commerce

D. social commerce
______ is a Web-based universal chat service that lets you communicate with users on a variety of IM services from an computer without having to install a special program,A. TrillianB. DigsbyC. AIMD.

Meebo

D. Meebo
4. The internet is ______.A. an internal communication system for a businessB. a communication system for the U.

S. governmentC. the same as the WebD. A large network of networks

D. A large network of networks
5.

Podcasts enable you to ____.A. broadcast over the Internet using compressed audio and video files such as MP3s and MP4sB. post journal entries on the WebC. communicate with friends in real timeD.

edit video files over the Web

A. broadcast over the Internet using compressed audio and video files such as MP3s and MP4s
All of the following are a type of e-commerce business, EXPECT _____.A. B2CB. B2BC. C2CD.

C2B

D. C2B
The unique address for a particular Web site is the ______.A. protocolB.

domain nameC. pathD. URL

D. URL
A list of pages within a Web site that you have visited and that usually appears at the top of a page is referred to as an _____.

A. indexB. navigation barC. breadcrumb trailD. cookie trail

C. Breadcrumb Trail
Adobe Reader, Flash Player, and Quick time Player are all examples of special software programs called _____.

A. aggregatorsB. plug-insC. poddersD. browsers

B. plug-ins
Using the Web to communicate and share information with our friends and others is known as _____.

A. emailingB. friend networkingC. instant messagingD. social networking

D.

Social Networking

In the URL http://www.pearsonhighered.com/techinaction, the portion labeled "http" is the ______.A. protocolB. domain nameC.

pathD. top-level domain

A. protocol
Podcasts deliver their content using ______.A. Aggregator B.

Google ReaderC. Really Simple Syndication D. iTunes

C. Really Simple Syndication
13.

All of the following are examples of multimedia EXCEPT _______.A. streaming videoB. textC. MP3 music filesD.

graphics

B. text
A visual search engine that uses pictures from our smartphone to search the Web for more information is known as ______.A. Google GlassesB. Google GogglesC. Explorer EyesD.

Explorer Shades

B. Google Goggles
You can keep track of IM contacts by using a ______.A. buddy listB. people finderC.

search engineD. breadcrumb trail

A. buddy list
The "s" in "https" stands for _____.A.

secure socket lockB. secure socket layerC. secure socket linkD. secure socket line

B. secure socket layer
Which of the following are personal video journal entries posted on the web?A.

PodcastsB. NewsgroupsC. VlogsD. Blogs

C. Vlogs
The browser feature where tabs are independent of each other is known as ______.A.

Pinned tabsB. Tab isolationC. Tear off tabsD. Session tabs

B.

Tab Isolation

______ uses continuous audio and video feeds.A. PodcastsB. WikisC.

Instant messagingD. Webcasts

D. Webcasts
______ is a personal journal posted on the web.A. blogB. podcastC.

wikiD. webcast

A. Blog
In the URL http://www.pearsonhighered.com/techinaction, the portion labeled "techinaction" is theA. protocolB.

domain nameC. pathD. top-level domain

C. Path
Software that enables you to display and interact with text and other media on the Web is a _______.A. clientB.

serverC. client/server networkD. Web browser

D. Web browser
Web 2.0 is classified as the _____.A.

social WebB. social networkC. social pageD. social computer

A. Social Web
The concept of the Internet was developed in response to the ______ War.A.

KoreanB. VietnamC. ColdD. Big

C. Cold
The unique identification number assigned to your computer when you connect to the Internet is known by all of the following, EXCEPTA. dotted quadB.

dotted periodC. dotted decimalD. IP address

B. dotted period
The Web is based on the _________ Protocol.

A. Hypertext Transfer B. Hypertext TradeC. Hypertext TransmitD. Hypertext Translate

D. Hypertext Transfer
A _______ is a Website where anyone can add, remove, or edit its content.

A. blogB. podcastC. wikiD. webcast

C. Wiki
_______ is a social networking service that enables you to exchange short text messages with your friends or "followers.

"A. FacebookB. TwitterC. MySpaceD. Yahoo! Text

B. Twitter
Live bookmarks is a feature in ___________ that adds the technology old RSS feeds to bookmarks.

A. SafariB. FirefoxC. Internet ExplorerD. Chrome

B.

Firefox

All the following are tips for professional e-mail etiquette EXCEPT:A. be concise to the pointB. use spell-checker and proofread before sendingC. use abbreviations such as "u", "r", and "BRB" to make the email shorter.D.

include a meaningful subject line

C. use abbreviations such as "u", "r", and "BRB" to make the email shorter
The "fathers" of the internet are Vinton Cerf and _______.A. Robert CailliauB.

Tim Berners-LeeC. Bill GatesD. Robert Kahn

D. Robert Kahn
In the URL http://www.pearsonhighered.

com/techinaction, the protion labeled ".com" is the _______.A. domain nameB.

hostC. top-level domainD. protocol

C. Top-level domain
_____ lines are high-speed, fiber-optic communications lines.A.

TB. OCC. DSLD. Cable

B. OC
A _____ server takes a pool of IP addresses and shares them with hosts on the network on an as-needed basis.A.

DOMB. DHCPC. CDIRD. CGI

B. DHCP
.

______ is the main suite of protocols used on the Internet.A. FTPB. TCP/IPC. SMTPD.

UDP

B. TCP/IP
The root servers know the location of all DNS servers that contain the master listings for an entire ______.A. IP addressB.

subdomainC. Web siteD. top-level domain

D. top-level domain
An ______ is a small program that resides on a server designed to be downloaded and run on a client computer.

A. CGI ScriptB. style sheetC. appletD. hypertext document

C.

applet

____ uses a dedicated connection between two points with the connection remaining active for the duration of the transmission.A. packet switchingB. An open circuitC.

Circuit switchingD. A closed circuit

C. circuit switching
_____ is the ability of two or more people to chat over the Internet in real time.A. VoIPB.

TextingC. Remote handshakingD. Instant messaging

D. Instant messaging
_____ provides a methodology by which a browser can request that a program file be run rather than just being delivered to the browser.A. PGPB.

ACKC. POPD. CGI

D. CGI
Computers that typically use special security protocols to protect personal, sensitive buyer information are known as ______ servers.A. point of saleB.

commerceC. businessD. Web

B. commerce
Which of the following is NOT an example of an instant messenger service?A. Google TalkB.

Windows Live MessengerC. JabberD. Google Docs

Google Docs
In public-key encryption, two keys, known as a ______ are created--one for coding--one for decoding.A. Code keysB. Public/private keysC.

KeytagsD. Key pair

D. Key Pair
Open system internet protocols replaced _____ system Internet protocols.A. RestrictedB.

ClosedC. ProprietaryD. Private

C. Proprietary
Sending a movie trailer over the Internet is most appropriate using the ______ protocol.

A. Real time transportB. Connection- orientedC. User datagramD. TCP/IP

A.

Real time transport

Which of the following information is NOT contained in a packet?A. The size (in bytes) of the packetB. The address to which the packet is sentC. The address from where the packet originatesD.

The data that are transmitted

A. The size (in bytes) of the packet
Text such as this should be bolded. is an example of an HTML ______.A. ElementB.

ScriptC. InstructionD. Marker

A. Element
Which of the following statements concerning IP addresses is TRUE?A. Static IP addresses change oftenB.

Dynamic IP addresses are assigned manually by a network administratorC. ISPs must maintain a pool of IP addresses for all their subscribersD. Dynamic addressing is normally handled by DHCP.

D. Dynamic addressing is normally handled by DHCP.
Transport Layer Security (TLS) and ______ are two protocols that provide data integrity and security for internet transmissionA.

Secure sockets layer SSLB. Pretty good Privacy (PGP)C. Hypertext Transfer Protocol (HTTP)D. Public-key encryption

A.

Secure sockets layer SSL

_______ allow developers to create formatting templates that organize and combine the attributes of objects on a Web page.A. HTML tagsB. AppletsC.

Key pairsD. Cascading style sheets

D. Cascading style sheets
A(n) ______ address is a unique number that identifies a computer, server, or device connected to the Internet.A. TCPB. IPC.

CGID. NetBIOS

B. IP
______ is a consortium of organizations that develops Web protocols and sets standards.A. IETFB. ISOCC.

Internet Society D. W3C

D. W3C
Which protocol transfers HTML data from servers to browsers?A. UDPB. FTPC. HTTPD.

TCP

C. HTTP
Which of the following was created especially for the transfer of hypertext documents across the Internet?A. SSLB. HTTPC. TLSD. HTML
B.

HTTP

Which protocol is used to transmit e-mail over the Internet?A. FTPB. SMTPC. HTTPD. VolP
B. SMTP
The main path, analogous to the interstate highway system, of the Internet along which data travel the fastest is known as the Internet _______.

A. open systemB. highwayC. backboneD. cache

C.

backbone

The majority of Internet communications follow the ______ model of network communications.A. client/serverB. peer-to-peerC. circuit switchingD.

IXP

A. client/server
Which of the following statements concerning IPv4 addresses is FALSE?A. The addresses are 16-bit numbers.B. IPv4 is the original IP addressing scheme.

C. The addresses contain four octets.D. In binary, each octet of an IP address contains eight positions filled by either a 1 or 0.

A. The addresses are 16-bit numbers.

Which of the following has the greatest bandwidth?A. OC-768B. T1-linesC. OC-48D. T-3 lines
A. OC-768
An IP address that does not change and is usually assigned manually by a network administrator is called a _________.

A. dynamic addressB. static addressC. fixed addressD. stationary address

B. static address
The small, touch-sensitive area at the base of the keyboard on a notebook computer is known as a ________.

A. stylusB. touch padC. game controlD. trackball

B.

touch pad

Individual Internet users enter an ISP through a(n) _________.A. NAPB. T lineC. Optical Carrier (oc line)D. Point of Presence (POP)
D.

Point of Presence (POP)

The _____ provides leadership for the orderly growth and development of the Internet.A. W3CB. Internet Society C. ICANND.

IEEE

B. Internet Society
Which of the following is NOT a cascading style sheet layer?A. ExternalB. Referenced C. Embedded D.

Inline

B. Referenced
A typical ________ is made up of one or more network switches to which ISPs connect.A. Internet Exchange PointB. Router PointC. Gateway InferenceD.

Point of Preference

A. Internet Exchange Point
A(n) ________ address is a temporary IP address that is assigned from an available pool of IP addresses.A. DynamicB. StaticC. AssignedD.

Mobile

A. Dynamic
IPv4 allows for approximately________ different IP addresses.A. 4 millionB. 400 millionC. 4 billionD.

40 billion

A. 4 million
When checking to see whether a particular name is registered on the internet, your computer consults a database that is maintained on a(n) __________ server.A. DNSB.

URLC. InternetD. Web

A. DNS
Which protocol prepares data for transmission but has no resending capabilities?A. UDPB.

TelnetC. HTTPD. TCP

A. UDP
A set of rules for exchanging electronic information is called ______.A. handshakingB.

a computer protocolC. DHCPD. an open system protocol

B. A Computer Protocol
_______ is an IP addressing scheme that uses 128-bit addressing.

A. IPSB. IP128C. IPv4D. IPv6

D. IPv6
Which of the following is NOT one of the four major data processing functions of a computer?A.

Gathering dataB. Processing data into informationC. Analyzing the data or informationD. Storing the data or information

C. Analyzing the data or information
Display screens that respond to commands initiated with your finger or a stylus are called ______.A.

touch padsB. track pointsC. touch screensD. track screens

C. touch screens
Inkjet printers and laser printer are examples of ________ printers.A.

nonimpactB. impactC. dot-matrixD. thermal

A.

nonimpact

The most common type of monitor is a ________.A. liquid crystal display (LCD)B. light-emitting diode (LED)C. organic light-emitting diode (OLED)D.

cathode ray tube (CRT)

A. Liquid crystal display (LCD)
Large, expensive computers that support hundreds of users simultaneously are called ______.A. supercomputersB. maxicomputersC. mainframesD.

powercomputers

C. mainframes
The four functions of the computer include input, process, output, and ______.A. storageB.

calculatingC. retrievalD. saving

A. storage
An _________ is a specially designed computer that can perform complex calculations extremely fast.A.

desktop computerB. supercomputerC. mainframe computerD. embedded computer

B.

supercomputer

The area that holds all the instructions the computer needs to start up when it is powered on is ______.A. RAMB. ROMC. USBD. CPU
B.

ROM

A _____ was the first device with touch-screen capabilities.A. tablet PCB. notebookC.

pocket PCD. desktop

A. Tablet PC
the computer port that is used to connect televisions and DVD players is the _____.A. VGAB. DVIC.

HDMID. LCD

B. DVI
Any part of the computer that you can touch is called _____.A. HardwareB. SoftwareC.

Operating systemD. Input

A. Hardware
A(n) _____ is where a peripheral device can attach to a computer so that data can be exchanged between it and the operating systemA. PortB. DriveC. SlotD.

Expansion bus

A. Port
A _______ enables your computer to connect to other computers or to the InternetA. Video cardB. Network interface card (NIC)C.

Sound cardD. Controller card

B. Network interface card (NIC)
Flash drive plug into a(n)______.A. USB PortB. Serial portC.

Expansion slotD. Drive bay

A. USB Port
RAM is a ______ storage locationA. PermanentB. VolatileC.

NonvolatileD. Network

B. Volatile
All of the following are names for a flash drive, EXCEPT ______.A. Jump driveB. USB driveC. Thumb driveD. Hard drive
D. Hard drive
In binary language, each letter of the alphabet, each number, and each special character is made up of a unique combination of _______.A. Eight bytesB. Eight kilobytesC. Eight charactersD. Eight bits
D. Eight Bits
_______ is applied science concerned with designing and arranging machines and furniture so that people use so that the people using them aren't subjected to an uncomfortable or unsafe experience.A. ErgonomicsB. PositioningC. Occupational safetyD. Repetitive strain prevention
A. Ergonomics
A(n) ______ is an input device that looks like a pen.A. joystickB. e-penC. pointerD. stylus
D. stylus
_______ are shortcut keys that you press to perform special tasks; each software application has its own set of tasks assigned to these keys. A. Alt keysB. Function keysC. Control (Ctrl) keysD. Windows keys
B. Function Keys
Which of the following is the largest unit of measure for the size of a computer file?A. MegabyteB. GigabyteC. Petabyte D. Terabyte
C. Petabyte
Which of the following is NOT true about data?A. It represents a fact, a figure, or an idea.B. It can be a number, a word, or a picture.C. It can be a recording of sound.D. It has been organized or presented in a meaningful way.
D. It has been organized or presented in a meaningful way.
______ computers are specially designed computer chips that reside inside other devices such as your car or the electronic thermostat in your home.A. MainframeB. DesktopC. Embedded D. Internal
C. Embedded
What type of computer is the Apple iPad?A. NotebookB. NetbookC. Tablet PCD. Tablet computer
D. Tablet Computer
______ keyboards can be rolled up and put in your backpack.A. Virtual laserB. FlexibleC. Elastic D. Dvorak
B. Flexible
The ______ is used in combination with other keys to perform shortcuts and special tasks. A. Toggle keyB. Function keyC. Control (Ctrl) keyD. Windows key
C. Control (Ctrl) key
After a picture has been taken with a digital camera and processed appropriately, the actual print of the picture is considered ________.A. dataB. outputC. inputD. a process
B. output
The most common way to connect devices to a computer is to use the ______ port.A. Universal serial bus (USB)B. FireWire 400C. FireWire 800D. Ethernet
A. Universal serial bus (USB)
______ keyboards can be rolled up and put in your backpack. A. Virtual laser B. FlexibleC. ElasticD. Dvorak
B. Flexible
Processing performance is affected by the number of processing paths called ______.A. speedB. chipsC. coresD. stars
C. cores
The term "bit" is short for ______.A. megabyteB. binary languageC. binary digit D. binary number
C. binary digit
A ________ is approximately 1 million bytes.A. gigabyteB. kilobyteC. megabyteD. terabyte
C. megabyte
________ is the abbreviation for the place in the computer where the programs and data the computer is currently using are stored.A. ROMB. CPUC. RAMD. USB
C. RAM
All of the following are examples of permanent storage, EXCEPT ________.A. hard drive diskB. DVDC. RAMD. USB Drive
C. RAM
The ________ contains the central electronic components of the computer.A. motherboardB. system unitC. peripheral unitD. input unit
A. motherboard
Computers gather data, which means that they allow users to ________ data.A. presentB. InputC. outputD. Store
B. Input
Computer use the _____ language consisting of 0's and 1's. A. symbolB. binaryC. byteD. system
B. binary
All of the following are ways to avoid injuries when working on computers, EXCEPT ______.A. place monitor at least 10" from eyesB. purchase an adjustable chairC. ensure proper lightingD. take breaks
A. place monitor at least 10" from eyes
The number of pixels displayed on the screen is known as _____.A. contrast ratioB. aspect ratioC. brightness resolutionD. screen resolution
D. Screen Resolution
The CPU consists of which two parts?A. The arithmetic logic unit and the front side busB. The control unit and the arithmetic logic unit C. The control unit and the front side busD. The control unit and cache memory
B. The control unit and the arithmetic logic unit
Which of the following activities is carried out by the arithmetic logic unit (ALU)?A. Movement of read/write headsB. Completion of all arithmetic calculations C. Creation of virtual memoryD. Coordination of all other computer components
B. Completion of all arithmetic calculations
Two types of video memory are _______.A. GDDR3 and GDDR5 B. SRAM and DRAMC. IrDA and IDED. 4-bit and 8-bit
A. GDDR3 and GDDR5
In most current systems ______ is the type of RAM used. A. DDR2B. DDR3C. DDR4D. DDR5
B. DDR3
RAM is an example of _______.A. volatile B. nonvolatile C. permanent D. mobile
A. volatile
The small circuit boards that hold a series of RAM chips are called _______.A. flash memory cardsB. expansion cardsC. virtual memory D. memory modules
D. memory modules
The rule of thumb that predicts that CPU capacity will double every two years is called ______.A. CPU RuleB. Moore's LawC. Intel's LawD. Express Rule
B. Moore's Law
A(n) ________ enables the computer to drive the speaker system.A. video cardB. surround cardC. sound cardD. speaker card
C. sound card
On a Windows 7 system, you can determine the amount of RAM by looking in the ______ window. A. Performance B. MemoryC. System Properties D. Utilities
C. System Properties
Running the Disk Cleanup utility is a quick way to ______.A. defrag your hard driveB. remove spyware programsC. clear out unnecessary filesD. clean out your Startup folder
C. clear out unnecessary files
A video card is an expansion card installed inside your ______.A. MonitorB. VGA hookupC. system unitD. video memory
C. system unit
Which statement pertaining to system reliability is FALSE?A. Having the latest version of software products can make your system more reliableB. An accumulation of temporary Internet files has no effect on your computer's overall performance.C. You can clean out unnecessary programs from your Startup folder.D. When you defrag your hard drive, it works more efficiently
B. An accumulation of temporary Internet files has no effect on your computer's overall performance.
Cache memory levels are defined by ______.A. the amount of storage space on chipB. the physical size of the chipC. the speed of the chipD. the chip's proximity to the CPU
D. the chip's proximity to the CPU
Which program provides a seven layer overwrite for the Mac operating system?A. File shredderB. Shredlt XC. EraserD. Wipe
B. Shredlt X
There are ____ levels of cache memory.A. 5B. 2C. 3D. 4
C. 3
Running the CPU at a faster speed than the manufacturer recommends is called _____.A. fetchingB. clock speedC. overclockingD. hyperthreading
C. overclocking
A _____ uses electronic memory and has no motors or moving parts.A. Mechanical hard driveB. Solid state driveC. Blu-ray discD. Digital video disc
B. Solid state drive
All of the following are procedures you can follow ensure your system performs reliably, EXCEPT ____.A. Run the Disk DefragmenterB. Run spyware and adware removal programsC. Install a reliable antivirus packageD. Run key utilities only when you can observe the process
D. Run key utilities only when you can observe the process
All of the following are part of the machine cycle, EXCEPT _____.A. FetchB. EncodeC. ExecuteD. Store
B. Encode
Running the Disk Defragmenter utility will ______.A. Detect and remove spywareB. Clear out temporary Internet filesC. Make the hard drive work more efficientlyD. Clean out your Startup folder
C. Make the hard drive work more efficiently
All of the following are types of computer users, EXCEPT ______.A. mobile userB. typical userC. power userD. casual user
B. typical user
All of the following are parts of the machine cycle, EXCEPT ______.A. fetchB. encodeC. executeD. store
B. encode
The maximum memory you can install using the 64-bit version of Windows 8 Pro is ____ GB. A. 4B. 16C. 176D. 192
D. 192
The amount of RAM recommended for most systems today is measured in _______.A. KBB. gigahertzC. GBD. megahertz
C. GB
All of the following are examples of optical drives, EXCEPT ______.A. solid-state discB. compact discC. digital video discD. Blu-ray disc
A. solid-state disc
The control unit is one component of the ______.A. CPUB. RAMC. front side busD. clock
A. CPU
A ________ is an expansion card that's installed inside the system unit to translate data into images.A. graphic processing unitB. audio cardC. video cardD. memory card
C. video card
The amount of RAM that is actually on the memory modules in your computer is the _____ memory. A. virtualB. nonvolatileC. permanentD. physical
D. physical
Which of the following is NOT a main characteristic associated with desktop computers as compared to notebooks?A. A desktop computer requires more space.B. A desktop computer is harder to move around.C. A desktop computer is more expensive.D. A desktop computer is easier to expand.
C. A desktop computer is more expensive.
Laptops are often equipped with a(n) ________ slot that allows you to read flash memory cards such as CompactFlash, memory sticks, and secure digital cards.A. eSATAB. ExpressCardC. USBD. FireWire
B. ExpressCard
When referring to hard drives, access time is measuring in _______.A. hertzB. bpsC. millisecondsD. kilobytes
C. milliseconds
All of the following are examples of database software, EXCEPT _____.A. OracleB. OneNoteC. My SQLD. Access
B. OneNote
Presentation software includes all of the following features, EXPECT______.A. animation effectsB. formulasC. transitionsD. themes
B. formulas
The appropriate software to use for creating research paper is _____.A. spreadsheet softwareB. presentation softwareC. word processing softwareD. database software
C. word processing software
4. _____ software helps you manage e-mail, contacts, calendars, and tasks in one place.A. databaseB. Personal information managerC. spreadsheetD. word processing
B. Personal information manager
Software refers to a set of instructions that tells the computer what to do. These instructions set are called ______.A. databaseB. programsC. peripheralsD. Devices
B. Programs
All of the following are media management software used to organize music, video, and pictures, EXCEPT _____.A. Windows Media PlayerB. Sony Sound ForgeC. Apple ItunesD. Winamp
B. Sony Sound Forge
In databases, information is organized in _______.A. tablesB. recordsC. fieldsD. all of the above
D. all of the above
The cell address C5 indicates that the cell ______.A. contains a label values of "C5"B. is at row C, column 5 of the worksheetC. is used in a formula involving the value "C5"D. is at column C, row 5 of the worksheet
D. is at column C, row 5 of the worksheet
In a spreadsheet, equations you build yourself using values and cell references are called ______.A. functionsB. calculationsC. formulasD. values
C. formulas
Web-based application software is software that ______.A. enables you to create Web pagesB. is installed by the computer manufacturerC. is stored completely on a web server instead of your hard driveD. does not need an Internet connection
C. is stored completely on a web server instead of your hard drive
Computer-aided design software is used primarily by _______.A. engineers to create modelsB. airline pilots to navigateC. project managers to track tasksD. game makers to create games
A. engineers to create models
A ________ is a Microsoft office feature that walks you through steps to complete a complicated task.A. templateB. macroC. wizardD. function
C. wizard
Microsoft's _______ enables you to create a 3-D walkthrough of your favorite vacation places. A. Photostitch B. Photosynth C. PhotosyncD. Photosee
B. Photosynth
QuickBooks and Peachtree are examples of _______ software. A. educational B. accounting C. course management D. gaming
B. accounting
Adobe Photoshop and Corel PaintShop Photo Pro are examples of ______ software.A. image-editingB. paintingC. Web page authoring D. computer-aided desig
A. image-editing
The intersection of a row and a column in a spreadsheet program is known as a _______.A. labelB. formulaC. functionD. cell
D. cell
QuarkXPress and Adobe InDesign are examples of ______ software. A. image-editingB. word processingC. desktop publishing D. video-editing
C. desktop publishing
Software designed for specific industry is known as _____.A. multimediaB. general businessC. project managementD. vertical market
D. vertical market
The type of software that is best used to create a simple budget is ____.A. spreadsheet worksheetB. word processing softwareC. presentation softwareD. database software
A. spreadsheet worksheet
______ software is the software that helps run the computer and coordinate instructions between the computer and the hardware devices.A. ApplicationB. RecoveryC. BackupD. System
D. System
All of the following are tips for a great presentation, EXCEPT ______.A. limit bullet points per slide to four to sixB. use images to convey a thought or illustrate a pointC. use a variety of animations on most slidesD. keep the font size large enough to be read from the back of the r
C. use a variety of animations on most slides
All of the following are examples of educational and reference software EXCEPT _____.A. Test PreparationB. Trip planningC. GenealogyD. EverQuest
D. EverQuest
Another way to obtain software is through ______, where a vendor hosts the software online over the Internet and you do not have to install it on your computer.A. Open Source as a serviceB. Proprietary as a serviceC. Software as a serviceD. Webware as a Service
C. Software as a service
System software does all of the following, EXCEPT ______.A. help run the computerB. coordinate instructions between application software and the company's hardware devicesC. add graphics and pictures to filesD. help manage system resource
C. add graphics and pictures to files
Multimedia software includes all of the following, EXCEPT _______.A. image-editing softwareB. animation softwareC. utility softwareD. audio-editing software
C. utility software
CD ripping refers to _______.A. stealing songs off the InternetB. encoding CDs to MP3 formatC. creating your own CDs from your MP3 collectionD. erasing content on a CD
B. encoding CDs to MP3 format
What is Google's first attempt at a netbook where all applications and files are stored on the Web?A. Google docsB. GmailC. ChromebooksD. Cloud Computing
C. Chromebooks
In a spreadsheet, equations you build yourself using values and cell references are called _____. A. functionsB. calculations C. formulas D. values
C. formulas
Every software program has a set of ______ that specify the minimum recommended standards for the operating system, processor, RAM, and the hard drive capacity.A. specificationsB. programming instructionsC. system requirements D. help files
C. system requirements
Google ______ is a popular application that lets you edit images and helps to organize and share your digital images. A. SnapfishB. ShutterflyC. Picaso D. Rembrand
C. Picaso
Moodle and Blackboard are examples of ________.A. utility softwareB. educational softwareC. course management softwareD. gaming software
C. course management software
A(n) ________ software installation enables you to decide which features you want to install on the hard drive.A. fullB. upgradeC. customD. new
C. custom
All of the following are types of multimedia and entertainment software, EXCEPT ______.A. digital audio softwareB. gaming softwareC. drawing softwareD. productivity software
D. productivity software
________ software helps you manage e-mail, contacts, calendars, and takes in one place. A. DatabaseB. Personal information managerC. SpreadsheetD. Word processing
B. Personal information manager
Errors in computer software are called _______.A. antsB. insects C. bugsD. spiders
C. bugs
C:DocumentsSpring 2012CIS 101Term PaperComputer Technology is an example of a _______.A. file extension B. file type C. file pathD. file list
C. file path
If Microsoft Word 2010 is used to create a file, which file extension is added automatically?A. .docxB. .docC. .docsD. .docf
A. .docx
Which of the following types of programs help manage system resources such as the hard drive?A. Application softwareB. Utility programsC. Productivity softwareD. Application programming interfaces
B. Utility programs
The most popular tablet operating system was developed by _______.A. MicrosoftB. AppleC. Google D. Symbian
B. Apple
A(n) _______ is a small program that performs general housekeeping tasks for your computer. A. operating systemB. user interface C. application softwareD. utility program
D. utility program
All of the following are true about real-time operating systems (RTOS), EXCEPT _______.A. they are also called embedded systemsB. they are programs with specific purposesC. they require significant user interactionD. they are written specifically for the needs of the de
C. they require significant user interaction
MS-DOS first used a(n) _______ interface.A. menu-drivenB. graphical-userC. event-drivenD. command-driven
D. command-driven
Which of the following does NOT occur during the power-on self-test?A. The video card and video memory are tested.B. The OS is moved into RAM.C. The BIOS is identified. D. Memory is tested
B. The OS is moved into RAM.
A special numerical code that prioritizes device requests from the operating systems is called _______.A. eventB. interrupt handlerC. interrupt D. spooler
B. interrupt handler
UNIX was developed by Ken Thompson and Dennis Richie who worked at _____.A. IBMB. MicrosoftC. XeroxD. AT&T's Bell Labs
D. AT's Bell Labs
Each device attached to your computer comes with a special program called a _____ that facilitates communication between the device and the OS.A. device driverB. translatorC. communication utilityD. device configuraton
A. device driver
More than 50% of smartphones use an operating system developed by ____.A. GoogleB. AppleC. MicrosoftD. Symbian
A. Google
Which of the following Windows utility programs arranges pieces of files on your hard drive in sequential order?A. Disk cleanupB. Disk DefragmenterC. Error CheckingD. Task manager
B. Disk Defragmenter
XO is the name of the computer provided by the ______ initative.A. IT BetaB. Computers for AllC. DigikidD. One Laptop per Child
D. One Laptop per Child
The process of optimizing RAM storage by borrowing hard drive space is called _____.A. ThrashingB. swap fileC. virtual memoryD. page file
C. virtual memory
Which of the following is the name of Microsoft Access File?A. inventory.xlsxB. inventory.wpdC. inventory.accdbD. inventory.bm
C. inventory.accdb
The top three operating systems for personal computers are_____.A. Microsoft Windows, Mac OS X, and Android 3.0B. Mac OS X, Android 3.0, and UNIXC. Microsoft Windows, Android 3.0, and LinuxD. Microsoft Windows, Mac OS X. and Linux
D. Microsoft Windows, Mac OS X. and Linux
The latest version of the Mac OS X is the ______.A. Snow leopardB. Mountain LionC. Mountain CougarD. Snow Tiger
B. Mountain Lion
The _____ of the operating system enable the user to communicate with the computer system.A. WindowB. ModemC. Network adapter cardD. User interface
D. User interface
Which of the following was the first widely used operating system installed in personal computers?A. Symbian OSB. Microsoft WindowsC. MS-DOSD. Linux
C. MS-DOS
The basic input/output system is stored on a _____ chip.A. ROMB. CPUC. RAMD. CMOS
A. ROM
The location of a file is specified by its ______.a. drive letterb. file pathc. file typed. file extension
b. file path
The _______ is(are) the group of programs that controls how your computer functions.a. utility programsb. application softwarec. user interfaced. operating system
d. operating system
All of the following are examples of network operating systems, EXCEPT ________.a. Windows Serverb. Linuxc. UNIXd. OS X Mountain Cougar
d. OS X Mountain Cougar
Which of the following operating systems is used primarily with mainframes as a network operating system?a. UNIXb. Mac OSc. Symbian OSd. Windows Vista
a. UNIX
Windows 8 is offered in ______ versions.A. 1B. 2C. 3 D. 4
B. 2
All of the following are terms related to part of the boot process, EXCEPTA. ROMB. BIOSC. RAMD. USB
D. USB
Robotic cameras used by television stations for sports events require a ______ operating system. A. single-user, single-task B. single-user, multitaskC. multiuserD. real-time
D. real-time
You can use the Windows _______ to check on a nonresponsive program. A. System restoreB. Backup utilityC. Explorer D. Task Manager
D. Task Manager
What utility takes out redundancies in a file to reduce the file size?A. Disk cleanupB. File CompressionC. Error-checkingD. System restore
B. File Compression
. The most essential software in your computer system is the ________.A. securityB. antivirusC. operating systemD. productivity
C. operating system
Which of the following is the name of a Microsoft Access file?A. inventory.xlsxB. inventory.wpdC. inventory.accdbD. inventory.bmp
C. inventory.accdb
The OS enables you to organize the contents of your computer in a hierarchical structure of ________.A. filesB. librariesC. directoriesD. drives
C. directories
Most supercomputers use the ________ operating system. A. UNIXB. LinuxC. WindowsD. iOS 5
B. Linux
For performing common tasks, Windows 8 has special shortcuts called ______.A. braceletsB. pinsC. charmsD. apps
C. charms
The _____ of the operating system enables the user to communicate with the computer system. A. windowB. modemC. network adaptor cardD. user interface
D. user interface
Which of the following is the first step in the boot process?A. The BIOS is activated by turning on the computer.B. The BIOS checks that all devices are in place. C. The OS is loaded into the RAM.D. Configuration and customization settings are check
A. The BIOS is activated by turning on the computer