All of the following are examples of real security and privacy risks EXCEPT
B) spam.
__________ is a type of wireless communication used by UPS to transmit scanned data through radio waves to a terminal.
Bluetooth technology
Game programming requires an in-depth knowledge of
software animation tools.
There are simulations and instructional __________ on the Web that serve as incredible learning tools.
software
__________ tags are small versions of the roadway electronic toll system used in many states to automate paying tolls as you pass through the toll station.
RFID
Surgeons use __________ to perform delicate operations by manipulating devices through computers instead of manually.
robotics
One type of chip already being implanted in humans as a means of verifying a person's identity is called a
VeriChip
One potential application of __________ is to provide sight to the blind.
biomedical chip implants
By studying the data produced by __________, scientists hope to improve the prediction of weather phenomena.
simulations
__________ is the study of molecules and structures whose sizes range from 1 to 100 nanometers.
Nanoscience
True or false
When a job is sent to other countries, as many programming jobs have been, it is said to have been exported.
False
True or false
The process of searching huge amounts of data with the hope of finding a pattern is called data warehousing
False
True or false
Trend-spotting programs developed for business have been used to predict criminal activity.
true
True or false
Ranchers use VeriChips to track their cattle
False
True or false
Nanostructures represent the smallest human-made structures that can be built.
True
True or false
Employers have the right to monitor network traffic on employee systems used at work
True
True or false
Although the automotive industry has become more computerized in the last ten years, there is still not a great need for automotive technicians to be computer literate.
False
True or false
Being computer literate enables you to form educated opinions in today's digital society and to take a stand based on accurate information rather than media hype and misinformation
true
True or false
The discrepancy between the "haves" and "have nots" with regard to computer technology is commonly referred to as the digital society
false
True or false
A TV tuner allows your computer to receive television channels from a cable connection and display them on your computer monitor.
true
Being __________ means being familiar enough with computers to understand their capabilities and limitations and to know how to use them.
computer literate
The term __________ refers to the programs that give commands to the computer.
software
__________ is the set of techniques used in information handling and retrieval.
information technology
The discrepancy between the "haves" and the "have nots" with regard to computer technology is commonly referred to as the __________.
digital divide
Many employees don't know that employers have the right to monitor __________ and __________ traffic on the systems they use at work.
e-mail, network
Computers process data into information by working exclusively with______
numbers
In binary language, each letter of the alphabet, each number, and each special character is made up of a unique combination of
eight bits.
Any computer parts that you can actually touch are considered to be
hardware
A(n) __________ uses an internal sensor or laser to detect the mouse's movement.
optical mouse
__________ are large printers used to produce oversize pictures that require precise continuous lines, such as maps and architectural plans.
Plotters
__________ is what happens when the computer saves an image of the desktop and enters a state of reduced power consumption to save energy.
Hibernation
The __________ port resembles a standard phone jack.
modem
__________ plug into slots on the motherboard.
Expansion cards
__________ is a form of permanent memory that holds all the instructions the computer needs to start up.
ROM
__________ is the applied science concerned with designing and arranging things that people use so that the people and things interact most efficiently and safely.
Ergonomics
TRUE OR FALSE
One bit is equal to 8 bytes.
False
TRUE OR FALSE
The operating system provides the means for users to interact with a computer.
True
TRUE OR FALSE
You cannot connect a full-size keyboard to a notebook computer
False
TRUE OR FALSE
The leading alternative to the QWERTY keyboard is the virtual keyboard.
False
TRUE OR FALSE
All function keys on all keyboards work the same in all programs
False
TRUE OR FALSE
Thermal printers are specialty printers that melt wax-based ink onto ordinary paper or burn dots onto specially coated paper
True
TRUE OR FALSE
Speed, resolution, color output, and memory are factors to be considered when selecting a monitor
false
TRUE OR FALSE
Speakers connect to the VGA port
False
TRUE OR FALSE
External hard drives are often used to back up data that is contained on the internal hard drive
True
TRUE OR FALSE
Bluetooth is the latest incarnation of optical storage to hit the market
FALSE
__________ is data that has been organized or presented in a meaning fashion
Information
__________ bits equal one byte
Eight
__________ devices, such as monitors, modems, and printers, are externally connected to the computer
Peripheral
__________ is sometimes referred to as primary storage.
RAM
__________ are specially designed computers that can perform complex calculations extremely rapidly
Supercomputers
The concept of the Internet developed from
the cold war crisis.
The first Internet communication took place between which of the following locations?
Stanford and UCLA
If your professor wanted to have his/her lecture available over the Internet, he/she would use
a podcast
An Internet site that anyone can change is called a
wiki
Small text files that can be automatically stored on your computer when you visit an Internet site are called
cookies
If you receive an e-mail asking for personal information, it may be part of a scam called
phishing
HTTP is the abbreviation for
Hypertext Transfer Protocol
A set of programs that searches the Web to find information is called a
search engine
Which of the following is NOT a type of broadband Internet connection?
C) dial-up
The World Wide Web was invented by
Tim Berners-Lee at CERN
TRUE OR FALSE
The Internet is the largest computer network in the world
True
TRUE OR FALSE
Tim Berners-Lee is known as the father of the Internet
False
TRUE OR FALSE
The original Web browser built by Tim Berners-Lee was built to run on the Windows operating system
False
TRUE OR FALSE
ARPANET began as a three-node network
False
TRUE OR FALSE
All IM services are proprietary; there are none that let you talk with someone who is using a different IM service than you
False
TRUE OR FALSE
Most Webcasts are not updated automatically
True
TRUE OR FALSE
Weblogs or blogs are public, allowing anyone to view them
True
TRUE OR FALSE
The Internet and the World Wide Web are the same thing
False
TRUE OR FALSE
The Internet is referred to as a client/server network
True
TRUE OR FALSE
Most public Wi-fi hotspots are secured
False
The __________ is a worldwide computer network.
internet
__________ was the person who developed the basic architecture of the Web
Tim Berners-Lee
__________ is a broad term used to refer to software, such as viruses, worms, or Trojan horses, that has a malicious intent
Malware
The protocol used for file transfers is __________.
FTP
__________ is the U.S. government project that resulted in the invention the Internet