1.
A process known as ____________ is used by large retailers to study trends.
Ans:- data mining
2.
All of the following are examples of real security and privacy risks EXCEPT:
Ans:- spam.
3.
____________terminals (formerly known as cash registers) are often connected to
complex inventory and sales computer systems. Ans:- Point-of-sale (POS)
4. A(n) ____________ system is a small,
wireless handheld computer that scans an item”s tag and pulls up the current
price (and any special offers) as you shop. Ans:- PSS
5.
The ability to recover and read deleted or damaged files from a criminal”s
computer is an example of a law enforcement specialty called: Ans:- computer
forensics.
6.
Which of the following is NOT one of the four major data processing functions
of a computer? Ans:- analyzing the data or information
7.
____________ tags, when placed on an animal, can be used to record and track in
a database all of the animal”s movements. Ans:- RFID
8.
Surgeons can perform delicate operations by manipulating devices through
computers instead of manually. This technology is known as: Ans:- robotics.
9. Technology no longer protected by
copyright, available to everyone, is considered to be: Ans:- proprietary.
10.
________is the study of molecules and structures whose size ranges from 1 to
100 nanometers. Ans:- Nanoscience
11.
____________ is the science that attempts to produce machines that display the
same type of intelligence that humans do. Ans:- Artificial intelligence (AI)
12.
____________ is data that has been organized or presented in a meaningful
fashion. Ans:- Information
13.
The name for the way that computers manipulate data into information is called:
Ans:- processing.
14.
Computers gather data, which means that they allow users to ____________ data. Ans:-
input
15. After a picture has been taken with a
digital camera and processed appropriately, the actual print of the picture is
considered: Ans:- output.
16.
Computers use the ____________ language to process data. Ans:- binary
17.
Computers process data into information by working exclusively with: Ans:- numbers.
18.
In the binary language each letter of the alphabet, each number and each
special character is made up of a unique combination of: Ans:- eight bits.
19.
The term bit is short for: Ans:- binary digit.
20.
A string of eight 0s and 1s is called a: Ans:- byte.
21.
A ____________ is approximately one billion bytes. Ans:- gigabyte
22.
A ____________ is approximately a million bytes. Ans:- megabyte
23.
____________ is any part of the computer that you can physically touch. Ans:- Hardware
24.
The components that process data are located in the: Ans:- system unit.
26.
Which of the following is an example of an input device? Ans:- scanner
27.
All of the following are examples of storage devices EXCEPT: Ans:- printers.
28.
The ________, also called the “brains†of the computer, is responsible for
processing data. Ans:- (CPU)
29.
The CPU and memory are located on the: Ans:- motherboard.
30.
Word processing, spreadsheet, and photo-editing are examples of: application
software.
31.
____________ is a set of computer programs used on a computer to help perform
tasks. Software
32.
System software is the set of programs that enables your computer”s hardware
devices and ____________ software to work together.application
33.
The PC (personal computer) and the Apple Macintosh are examples of two
different: platforms.
34.
Apple Macintoshes (Macs) and PCs use different ______ to process data and
different operating systems. CPUs
35.
Servers are computers that provide resources to other computers connected to a:
network.
36. Smaller and less expensive PC-based
servers are replacing ____________ in many businesses. Ans:- mainframes
37.
_______ are specially designed computers that perform complex calculations
extremely rapidly. Ans:- Supercomputers
38.
DSL is an example of a(n) ____________ connection. Ans:- broadband
39.
The difference between people with access to computers and the Internet and
those without this access is known as the: Ans:- digital divide.
40.
____________ is the science revolving around the use of nanostructures to build
devices on an extremely small scale. Ans:- Nanotechnology
42.
____________ bits equal one byte.. Ans:- Eight
43.
The binary language consists of ____________ digit(s). Ans:- 2
44. A byte can hold one ____________ of data.
Ans:- character
45.
____________ controls the way in which the computer system functions and
provides a means by which users can interact with the computer.. Ans:- The
operating system
46.
The operating system is the most common type of ____________ software.. Ans:- system
47. ____________ are specially designed
computer chips that reside inside other devices, such as your car or your
electronic thermostat. Ans:- Embedded computers
48.
The steps and tasks needed to process data, such as responses to questions or
clicking an icon, are called: Ans:- instructions.
49.
The two broad categories of software are: Ans:- system and application.
50.
The metal or plastic case that holds all the physical parts of the computer is
the: Ans:- system unit.
Thanks! It helps alot.
ReplyDelete