1,516
9
Essay, 5 pages (1100 words)

Intro to comp chapter 1,2,3, & 13

________ tools enable groups of people to connect and exchange ideas. A. DebuggingB. Social NetworkingC. Affective ComputingD. Computer ForesicsSocial Networking

The gap between those who have easy access to the Internet and technology those who do not is known as the ________ divideA. digitalB. technologyC. webD. InternetDigital

Using the Internet to get small donations from many people to start a business is called ________. A. kickstartingB. crowd fundingC. crowd sourcingD. collaboratingCrowd funding

Sharing products rather than owning them individually is known as ________. (1 point)crowdfundingcollaborative consumptionsocial networkingcrowdsourcingCollaborative consumption

A popular Voice over Internet Protocol (VoIP) service is ________. (1 point)Social NetworkMobile bridgeTabletSkypeSkpye

The term computer ________ is used to describe someone who is familiar enough with computers to understand their capabilities and limitations. (1 point)hawkerwebmastermasterliterateLiterate

________ refers to the commands that instruct a computer what to do. (1 point)Data miningSpamSoftwareHardwaresoftware

________ is a field of study focused on handling and automatic retrieval of information. (1 pointInformation technologyComputer forensicsRFIDCrisis mappinginformation technology

The process of searching huge amounts of data seeking a pattern is called data ________. (1 point)diving

warehousing

searching

data mining

data mining

Which of the following is an example of the results of data mining? (1 point)An Excel spreadsheet listing all employees and their annual salaries in a random order

A printout of all sales taken from the register at the end of the day

Raw data from questionnaires given at the mall

Netflix providing you with a list of videos you might enjoy

Netflix providing you with a list of videos you might enjoy

`The goal of ________ research is to provide technological solutions to physical and health-related problems. (1 point)crisis-mapping

computer forensics

biomedical

RFID ““

biomedical

One potential application of ________ is to provide sight to the blind. (1 point)patient simulators

Bluetooth technology

biomedical chip implants

RFID tags

bio medical chip implants

Analyzing computer systems to gather potential legal evidence is computer ________. (1 point)forensics

enforcement

analysis

detectives

forensics

________ tools gather information from sources such as e-mails, text messages, and tweets and make the information instantly and publicly available for use in emergencies. (1 point)Affective computing

Crisis-mapping

Social networking

Crowdsourcing

Crisis-mapping

Mastery is defined as ________. (1 point)working for something largerfeeling confident and excited about learning new skillsworking without continual direction and controlcombining leisure time with the tools to be creativefeeling confident and excited about learning new skills

Computers use ________ language consisting of 0s and 1s. (1 point)byte

system

binary

symbol

binary

In binary language, each letter of the alphabet, each number, and each special symbol is made up of a unique combination of eight ________. (1 point)kilobytes

bits

bytes

characters

bits

Which of the following is the smallest unit of measure? megabyte

Apple’s OS X and Microsoft Windows are examples of ________ software. operating system

Which of the following computers supports many simultaneous users and manages large amounts of data? mainframe computer

________ computers are specially designed computer chips that reside inside other devices such as a car. embedded

A keyboard and mouse are examples of ________ devices. input

Which of the following is NOT a system used with touch screens? induction

the number of pixels displayed on the screen is known as ________. screen resolution

The most common type of monitor is a(n) ________. LCD

Inkjet printers and laser printers are examples of ________ printers. nonimpact

______ printers have tiny hammer-like keys that strike the paper through an inked ribbonimpact

The ________ contains the central electronic components of the computer. motherboard

A ________ enables your computer to connect to other computers or to the Internet. network inference card NIC

________ is the abbreviation for the place in the computer where the programs and data the computer is currently using are temporarily stored. RAM

RAM is a ________ storage location. volatile

The area that holds all the instructions the computer needs to start up when it is powered on is ________. ROM

A(n)________ CPU has two processing paths, allowing it to process more than one instruction at a time. dual-processing

The concept of the Internet was developed in response to the ________ War. Cold

The World Wide Web was based on a protocol developed by ________. Tim Burners Lee

Software that enables you to display and interact with text and other media on the web is a web ________. broswer

The web is based on the ________ Protocol. hypertext protocol

A computer connected to the Internet that asks for data is a ________. client

The unique identification number assigned to your computer when you connect to the Internet is known as all of the following EXCEPT ________. path

A(n) ________ system requires a program, such as Microsoft Outlook, to be installed on your computer, and when the program is opened, your e-mail is downloaded to your computer. email client

Which of the following are personal video journal entries posted on the web? VLOGS

A ________ is a personal journal posted on the web. BLOGS

Podcasts enable you to ________. deliver audio/video files via RSS

A(n) ________ is a usually a live broadcast of audio or video content. webcast

Adobe Reader, Flash Player, and QuickTime Player are examples of software programs called ________. plug ins

________ media are continuously fed to your browser so you do not have to wait for the entire file to completely download before listening to or watching it. streaming

All of the following are types of e-commerce business EXCEPT ________. C2B

The ________ is responsible for the Internet’s domain name system and the allocation of IP addresses. ICANN

The main path of the Internet along which data travel the fastest is known as the Internet ________. backbone

High-speed ________ communication lines use fiber-optics. OC

Individual Internet users connect to ISPs through a(n) ________. POP point of preference

The main suite of protocols used on the Internet is ________. TCP/IP

________ uses a dedicated connection between two points with the connection remaining active for the duration of the transmission. circuit switching

Which of the following information is NOT contained in a packet? the size (in bytes) of the packet

A(n) ________ address is a unique number that identifies a computer, server, or device connected to the Internet. IP

A(n) ________ address is a temporary IP address that is assigned from an available pool of IP addresses. dynamic

An IP address that does not change and is usually assigned manually by a network administrator is called a ________ address. static

When checking to see whether a particular name is registered on the Internet, your computer accesses a database that is kept on a(n) ________ server. DNS

An IP address in the form 197. 169. 100. 1 is called a(n) ________. dotted quad

In http://www. pearsonhighered. com, which of the following is the top-level domain? com

By adding a network prefix to an IP address, supernetting or ________ lets a single IP address represent multiple unique IP addresses. classless inter domain routing CIDR

Which of the following is NOT a language used in developing websites? KML

Which of the following was created for the transfer of hypertext documents across the Internet? HTTP

< b > is an example of an HTML ________. tag

Text such as < b > This should be bolded.< /b > is an example of an HTML ________. element

________ defines the content in terms of the data that is being described rather than how it is to be displayed. XML

Thank's for Your Vote!
Intro to comp chapter 1,2,3, & 13. Page 1
Intro to comp chapter 1,2,3, & 13. Page 2
Intro to comp chapter 1,2,3, & 13. Page 3
Intro to comp chapter 1,2,3, & 13. Page 4
Intro to comp chapter 1,2,3, & 13. Page 5
Intro to comp chapter 1,2,3, & 13. Page 6
Intro to comp chapter 1,2,3, & 13. Page 7
Intro to comp chapter 1,2,3, & 13. Page 8
Intro to comp chapter 1,2,3, & 13. Page 9

This work, titled "Intro to comp chapter 1,2,3, & 13" was written and willingly shared by a fellow student. This sample can be utilized as a research and reference resource to aid in the writing of your own work. Any use of the work that does not include an appropriate citation is banned.

If you are the owner of this work and don’t want it to be published on AssignBuster, request its removal.

Request Removal
Cite this Essay

References

AssignBuster. (2022) 'Intro to comp chapter 1,2,3, & 13'. 26 July.

Reference

AssignBuster. (2022, July 26). Intro to comp chapter 1,2,3, & 13. Retrieved from https://assignbuster.com/intro-to-comp-chapter-123-13/

References

AssignBuster. 2022. "Intro to comp chapter 1,2,3, & 13." July 26, 2022. https://assignbuster.com/intro-to-comp-chapter-123-13/.

1. AssignBuster. "Intro to comp chapter 1,2,3, & 13." July 26, 2022. https://assignbuster.com/intro-to-comp-chapter-123-13/.


Bibliography


AssignBuster. "Intro to comp chapter 1,2,3, & 13." July 26, 2022. https://assignbuster.com/intro-to-comp-chapter-123-13/.

Work Cited

"Intro to comp chapter 1,2,3, & 13." AssignBuster, 26 July 2022, assignbuster.com/intro-to-comp-chapter-123-13/.

Get in Touch

Please, let us know if you have any ideas on improving Intro to comp chapter 1,2,3, & 13, or our service. We will be happy to hear what you think: [email protected]