________ tools enable groups of people to connect and exchange ideas. A. DebuggingB. Social NetworkingC. Affective ComputingD. Computer ForesicsSocial Networking
The gap between those who have easy access to the Internet and technology those who do not is known as the ________ divideA. digitalB. technologyC. webD. InternetDigital
Using the Internet to get small donations from many people to start a business is called ________. A. kickstartingB. crowd fundingC. crowd sourcingD. collaboratingCrowd funding
Sharing products rather than owning them individually is known as ________. (1 point)crowdfundingcollaborative consumptionsocial networkingcrowdsourcingCollaborative consumption
A popular Voice over Internet Protocol (VoIP) service is ________. (1 point)Social NetworkMobile bridgeTabletSkypeSkpye
The term computer ________ is used to describe someone who is familiar enough with computers to understand their capabilities and limitations. (1 point)hawkerwebmastermasterliterateLiterate
________ refers to the commands that instruct a computer what to do. (1 point)Data miningSpamSoftwareHardwaresoftware
________ is a field of study focused on handling and automatic retrieval of information. (1 pointInformation technologyComputer forensicsRFIDCrisis mappinginformation technology
The process of searching huge amounts of data seeking a pattern is called data ________. (1 point)diving
warehousing
searching
data mining
data mining
Which of the following is an example of the results of data mining? (1 point)An Excel spreadsheet listing all employees and their annual salaries in a random order
A printout of all sales taken from the register at the end of the day
Raw data from questionnaires given at the mall
Netflix providing you with a list of videos you might enjoy
Netflix providing you with a list of videos you might enjoy
`The goal of ________ research is to provide technological solutions to physical and health-related problems. (1 point)crisis-mapping
computer forensics
biomedical
RFID ““
biomedical
One potential application of ________ is to provide sight to the blind. (1 point)patient simulators
Bluetooth technology
biomedical chip implants
RFID tags
bio medical chip implants
Analyzing computer systems to gather potential legal evidence is computer ________. (1 point)forensics
enforcement
analysis
detectives
forensics
________ tools gather information from sources such as e-mails, text messages, and tweets and make the information instantly and publicly available for use in emergencies. (1 point)Affective computing
Crisis-mapping
Social networking
Crowdsourcing
Crisis-mapping
Mastery is defined as ________. (1 point)working for something largerfeeling confident and excited about learning new skillsworking without continual direction and controlcombining leisure time with the tools to be creativefeeling confident and excited about learning new skills
Computers use ________ language consisting of 0s and 1s. (1 point)byte
system
binary
symbol
binary
In binary language, each letter of the alphabet, each number, and each special symbol is made up of a unique combination of eight ________. (1 point)kilobytes
bits
bytes
characters
bits
Which of the following is the smallest unit of measure? megabyte
Apple’s OS X and Microsoft Windows are examples of ________ software. operating system
Which of the following computers supports many simultaneous users and manages large amounts of data? mainframe computer
________ computers are specially designed computer chips that reside inside other devices such as a car. embedded
A keyboard and mouse are examples of ________ devices. input
Which of the following is NOT a system used with touch screens? induction
the number of pixels displayed on the screen is known as ________. screen resolution
The most common type of monitor is a(n) ________. LCD
Inkjet printers and laser printers are examples of ________ printers. nonimpact
______ printers have tiny hammer-like keys that strike the paper through an inked ribbonimpact
The ________ contains the central electronic components of the computer. motherboard
A ________ enables your computer to connect to other computers or to the Internet. network inference card NIC
________ is the abbreviation for the place in the computer where the programs and data the computer is currently using are temporarily stored. RAM
RAM is a ________ storage location. volatile
The area that holds all the instructions the computer needs to start up when it is powered on is ________. ROM
A(n)________ CPU has two processing paths, allowing it to process more than one instruction at a time. dual-processing
The concept of the Internet was developed in response to the ________ War. Cold
The World Wide Web was based on a protocol developed by ________. Tim Burners Lee
Software that enables you to display and interact with text and other media on the web is a web ________. broswer
The web is based on the ________ Protocol. hypertext protocol
A computer connected to the Internet that asks for data is a ________. client
The unique identification number assigned to your computer when you connect to the Internet is known as all of the following EXCEPT ________. path
A(n) ________ system requires a program, such as Microsoft Outlook, to be installed on your computer, and when the program is opened, your e-mail is downloaded to your computer. email client
Which of the following are personal video journal entries posted on the web? VLOGS
A ________ is a personal journal posted on the web. BLOGS
Podcasts enable you to ________. deliver audio/video files via RSS
A(n) ________ is a usually a live broadcast of audio or video content. webcast
Adobe Reader, Flash Player, and QuickTime Player are examples of software programs called ________. plug ins
________ media are continuously fed to your browser so you do not have to wait for the entire file to completely download before listening to or watching it. streaming
All of the following are types of e-commerce business EXCEPT ________. C2B
The ________ is responsible for the Internet’s domain name system and the allocation of IP addresses. ICANN
The main path of the Internet along which data travel the fastest is known as the Internet ________. backbone
High-speed ________ communication lines use fiber-optics. OC
Individual Internet users connect to ISPs through a(n) ________. POP point of preference
The main suite of protocols used on the Internet is ________. TCP/IP
________ uses a dedicated connection between two points with the connection remaining active for the duration of the transmission. circuit switching
Which of the following information is NOT contained in a packet? the size (in bytes) of the packet
A(n) ________ address is a unique number that identifies a computer, server, or device connected to the Internet. IP
A(n) ________ address is a temporary IP address that is assigned from an available pool of IP addresses. dynamic
An IP address that does not change and is usually assigned manually by a network administrator is called a ________ address. static
When checking to see whether a particular name is registered on the Internet, your computer accesses a database that is kept on a(n) ________ server. DNS
An IP address in the form 197. 169. 100. 1 is called a(n) ________. dotted quad
In http://www. pearsonhighered. com, which of the following is the top-level domain? com
By adding a network prefix to an IP address, supernetting or ________ lets a single IP address represent multiple unique IP addresses. classless inter domain routing CIDR
Which of the following is NOT a language used in developing websites? KML
Which of the following was created for the transfer of hypertext documents across the Internet? HTTP
< b > is an example of an HTML ________. tag
Text such as < b > This should be bolded.< /b > is an example of an HTML ________. element
________ defines the content in terms of the data that is being described rather than how it is to be displayed. XML