A computer relies on the combination of _____ and _____ to turn input into output.
Answer: Hardware, softwa...
The most efficient way to share digital files within a home environment is to set up a(n) ____ network.
The most efficient way to share digital files within a home environment is to set up a(n) ____ network.
Answer: Ho...
As the amount of Internet ____ continue(s) to increase, streaming video and television are becoming commonplace.
As the amount of Internet ____ continue(s) to increase, streaming video and television are becoming commonplace.
Answer: Bandwid...
Linux is ____ software, which means users can manipulate the source code to customize their operating system to their needs.
Linux is ____ software, which means users can manipulate the source code to customize their operating system to their needs.
Answer: Open sour...
Why are LEDs used in green computing?
Why are LEDs used in green computing?
Answer: They reduce the energy used in displa...
Google relies on ____ to relay information related to its mapped software.
Google relies on ____ to relay information related to its mapped software.
Answer: Satellit...
Software companies rely on ____ to "fix" problems in their programs related to bugs and flaws.
Software companies rely on ____ to "fix" problems in their programs related to bugs and flaws.
Answer: Updat...
In the URL http://www.cengage.com/index.html, cengage.com is the ____.
In the URL http://www.cengage.com/index.html, cengage.com is the ____.
Answer: Domain na...
The Internet uses hardware, software, and ____ that allow(s) different types of networks to communicate.
The Internet uses hardware, software, and ____ that allow(s) different types of networks to communicate.
Answer: Protocol...
Cloud computing is not possible without _____.
Cloud computing is not possible without _____.
Answer: An internet connecti...
A _____ provides content that is accessible on the World Wide Web.
A _____ provides content that is accessible on the World Wide Web.
Answer: Web serv...
Typical _____ computing providers deliver common software online that is accessed from another web service or browser.
Typical _____ computing providers deliver common software online that is accessed from another web service or browser.
Answer: Clo...
Thanks to _____, voice and data traveling together through our telecommunications lines will be seamless.
Thanks to _____, voice and data traveling together through our telecommunications lines will be seamless.
Answer: Vo...
____ communication allows participants to leave messages for each other.
____ communication allows participants to leave messages for each other.
Answer: Asynchronous
...
Which of the following is one realistic way to promote Internet security?
Which of the following is one realistic way to promote Internet security?
Answer: Select strong passwords and change them regular...
AI applications are ways in which AI methodologies are applied to ____ and provide services.
AI applications are ways in which AI methodologies are applied to ____ and provide services.
Answer: Solve proble...
FBI reliance on citizen photographs to catch the Boston Marathon bombers is an example of ____.
FBI reliance on citizen photographs to catch the Boston Marathon bombers is an example of ____.
Answer: Web empowerme...
____ favor(s) an Internet that is open, with packets unexamined and unfiltered.
____ favor(s) an Internet that is open, with packets unexamined and unfiltered.
Answer: Network neutrali...
Thanks to ____, you can watch a movie as it is being downloaded from the Internet.
Thanks to ____, you can watch a movie as it is being downloaded from the Internet.
Answer: Streaming med...
Each person's digital shadow is ____
Each person's digital shadow is ____
Answer: The digital information generated about a person by organizations
...
____ computing refers to the ability to access information at any time and in any place.
____ computing refers to the ability to access information at any time and in any place.
Answer: Pervasi...
We rely on ____ as the dominant technology to provide wireless Internet access in our everyday lives.
We rely on ____ as the dominant technology to provide wireless Internet access in our everyday lives.
Answer: Wireless fideli...
Which of the following is an example of digital media?
Which of the following is an example of digital media?
Answer: Blu ray movi...
Through the use of a ____, users can freely express their views and opinions.
Through the use of a ____, users can freely express their views and opinions.
Answer: Bl...
Which of the following will protect intellectual property for the life of the holder plus 70 years?
Which of the following will protect intellectual property for the life of the holder plus 70 years?
Answer: Copyrig...
The _____ computer platform provides a lot of computing power, such as for gaming, at a single location.
The _____ computer platform provides a lot of computing power, such as for gaming, at a single location.
Answer: Deskt...
A popular term used to identify devices such as the iPad is _____
A popular term used to identify devices such as the iPad is _____
Answer: Tablet ...
Programs such as ____ support energy conservation for electronic devices.
Programs such as ____ support energy conservation for electronic devices.
Answer: ENER...
One thing to consider when choosing a mobile device is _____.
One thing to consider when choosing a mobile device is _____.
Answer: Battery li...
Using the web as a primary user interface to access such applications as Google Docs is an example of ____.
Using the web as a primary user interface to access such applications as Google Docs is an example of ____.
Answer: Cloud computi...
A web ____ can also be referred to as a customized web home page.
A web ____ can also be referred to as a customized web home page.
Answer: Port...
A popular encryption method used to protect data that travels over a wireless network is ____.
A popular encryption method used to protect data that travels over a wireless network is ____.
Answer: W...
____ technology may someday replace today's bar code system for identifying items in inventory.
____ technology may someday replace today's bar code system for identifying items in inventory.
Answer: RF...
Speech recognition, handwriting recognition, and face recognition all fall under the AI category of ____ recognition.
Speech recognition, handwriting recognition, and face recognition all fall under the AI category of ____ recognition.
Answer: Patte...
____ is an example of following good ergonomic practices.
____ is an example of following good ergonomic practices.
Answer: Adjusting the angle of a keyboard for comfo...
The digital ____ method of writing has made plagiarism easy and ever more common.
The digital ____ method of writing has made plagiarism easy and ever more common.
Answer: Cut and pas...
The challenge of ____ is keeping certain content from a subset of the population without encroaching upon the freedom of adults.
The challenge of ____ is keeping certain content from a subset of the population without encroaching upon the freedom of adults.
Answer: Censorsh...
A printer requires a ____ installed on the computer in order to operate.
A printer requires a ____ installed on the computer in order to operate.
Answer: Device driv...
You can protect yourself from identity theft by using ____ when transmitting information over network connections.
You can protect yourself from identity theft by using ____ when transmitting information over network connections.
Answer: Encrypti...
Signing up for a(n) ____ will automatically provide you with web content that is updated on a regular basis.
Signing up for a(n) ____ will automatically provide you with web content that is updated on a regular basis.
Answer: RSS fe...
____ technology enables you to connect to your cell phone through a display on your car's dashboard.
____ technology enables you to connect to your cell phone through a display on your car's dashboard.
Answer: Bluetoo...
Government agencies have not supported cloud computing due to the lack of _____
Government agencies have not supported cloud computing due to the lack of _____
Answer: Data securi...
A computer that manages data and produces information often uses a _____ to organize and deliver it.
A computer that manages data and produces information often uses a _____ to organize and deliver it.
Answer: Databa...
It is much easier for people to remember ____ than IP addresses of websites.
It is much easier for people to remember ____ than IP addresses of websites.
Answer: Domain nam...
Personal ethics deals with ____.
Personal ethics deals with ____.
Answer: The choices and behaviors made by individua...
____ operating systems are lightweight operating systems designed for mobile devices such as smart phones and tablets.
____ operating systems are lightweight operating systems designed for mobile devices such as smart phones and tablets.
Answer: Mobi...
A company called ____ provides digital certifications for web transactions.
A company called ____ provides digital certifications for web transactions.
Answer: VeriSi...
When evaluating information provided on the web, always consider the ____.
When evaluating information provided on the web, always consider the ____.
Answer: Sour...
____ is credited with the development of the web.
____ is credited with the development of the web.
Answer: Tim Berners-L...
A company may hire a ____ hacker to learn about vulnerabilities in its system.
A company may hire a ____ hacker to learn about vulnerabilities in its system.
Answer: White h...
In a(n) ____ relationship, multiple users are provided with access to a server at the same time.
In a(n) ____ relationship, multiple users are provided with access to a server at the same time.
Answer: Client/serv...
An area of a building where you can connect to the Internet wirelessly is often referred to as a ____.
An area of a building where you can connect to the Internet wirelessly is often referred to as a ____.
Answer: Hotsp...
When starting a new job, you may need to sign a(n) ____ that defines acceptable and unacceptable uses of computer and network resources.
When starting a new job, you may need to sign a(n) ____ that defines acceptable and unacceptable uses of computer and network resources.
Answer: Network...
A search engine attempts to catalog every webpage by topic through the use of a ____.
A search engine attempts to catalog every webpage by topic through the use of a ____.
Answer: Spid...
An icon on your desktop is a component of a ____ interface.
An icon on your desktop is a component of a ____ interface.
Answer: Graphical us...
A ____ computer is remotely controlled by a hacker to damage or corrupt a computer resource.
A ____ computer is remotely controlled by a hacker to damage or corrupt a computer resource.
Answer: Zomb...
An email with a subject heading "Urgent Security Update" that requests a username and password followed by a link to "re-login and resolve the issue" is a good example of a ____ scam.
An email with a subject heading "Urgent Security Update" that requests a username and password followed by a link to "re-login and resolve the issue"...
IT Access for Everyone is an initiative for increasing access to digital technology for ____.
IT Access for Everyone is an initiative for increasing access to digital technology for ____.
Answer: Developing natio...
___ can tell more about a person than all other kinds of electronic surveillance.
___ can tell more about a person than all other kinds of electronic surveillance.
Answer: Data mining
...
All of the following are examples of malware EXCEPT ___
All of the following are examples of malware EXCEPT ___
Answer: Updates (worms, viruses, spywar...
Users of iPods and iPhones are well acquainted with the process of _____ files.
Users of iPods and iPhones are well acquainted with the process of _____ files.
Answer: Synchronizi...
Online newspapers can be delivered through _____ to news readers.
Online newspapers can be delivered through _____ to news readers.
Answer: R...
Airlines take advantage of ____ technology to inform users of flight delays and itinerary changes.
Airlines take advantage of ____ technology to inform users of flight delays and itinerary changes.
Answer: Smart phone
...
Embedded systems can be found in all of the following EXCEPT _____
Embedded systems can be found in all of the following EXCEPT _____
Answer: Cloud compute...
The most popular search engines use ____ to store information about webpages.
The most popular search engines use ____ to store information about webpages.
Answer: A databa...
An act of ____ would be posting a story to a blog saying that a neighbor is selling drugs, when you know that it's not true.
An act of ____ would be posting a story to a blog saying that a neighbor is selling drugs, when you know that it's not true.
Answer: Lib...
In a practice called ____, someone may manipulate people into performing actions or divulging confidential information on the Internet.
In a practice called ____, someone may manipulate people into performing actions or divulging confidential information on the Internet.
Answer: Social...
Intranet content can be extended to specific individuals outside the network, such as customers, partners, or suppliers, in an arrangement called a(n) ____.
Intranet content can be extended to specific individuals outside the network, such as customers, partners, or suppliers, in an arrangement called a(n)...
The popularity of ____ has encouraged everyday users to share events of the day.
The popularity of ____ has encouraged everyday users to share events of the day.
Answer: Social media
...
Through the use of the ____ plug-in, a webpage can provide a user with an interactive experience.
Through the use of the ____ plug-in, a webpage can provide a user with an interactive experience.
Answer: Fla...
Embedded operating systems are hardwired into a computer component, such as ROM or flash memory, to control a ____ computer.
Embedded operating systems are hardwired into a computer component, such as ROM or flash memory, to control a ____ computer.
Answer: Special purp...
An advantage of ____ software is its ability to run more than one operating system on a computer.
An advantage of ____ software is its ability to run more than one operating system on a computer.
Answer: Virtual machi...
Criminals collect items such as credit card numbers without the user's knowledge through the use of ____.
Criminals collect items such as credit card numbers without the user's knowledge through the use of ____.
Answer: Spywa...
Which of the following is an example of a repetitive stress injury?
Which of the following is an example of a repetitive stress injury?
Answer: Carpal tunnel syndrome
...
Personal music videos that combine user-generated photos with audio music are a good example of _____.
Personal music videos that combine user-generated photos with audio music are a good example of _____.
Answer: Digital convergen...
A ____ network is used when a user wants to make his or her computer and others' computers available for access.
A ____ network is used when a user wants to make his or her computer and others' computers available for access.
Answer: Peer to pe...
In the URL http://www.cengage.com/index.html, http: is the ____
In the URL http://www.cengage.com/index.html, http: is the ____
Answer: Domain na...
Searching the Web for the best deal on an airline flight is a good example of ____ at work.
Searching the Web for the best deal on an airline flight is a good example of ____ at work.
Answer: Intelligent age...
The ability of people with disabilities to interact with and make use of computer resources is known as ____.
The ability of people with disabilities to interact with and make use of computer resources is known as ____.
Answer: Accessibili...
Downloaded music may include ____ technology that prevents or limits the user's ability to make copies.
Downloaded music may include ____ technology that prevents or limits the user's ability to make copies.
Answer: DRM
...
A ____ provides everything that is accessible on the Internet.
A ____ provides everything that is accessible on the Internet.
A. computing platform
B. server
C. database
D. tablet
Answer: serv...
All of the following are models for cloud computing EXCEPT ____.
All of the following are models for cloud computing EXCEPT ____.
A. public
B. community
C. shared
D. hybrid
Answer: Shar...
All of the following are referred to as computing platforms EXCEPT ____.
All of the following are referred to as computing platforms EXCEPT ____.
A. cellular networks
B. operating systems
C. personal computers
D. input...
To connect multiple businesses from different locations, a _____ area network setup is required.
To connect multiple businesses from different locations, a _____ area network setup is required.
A. personal
B. home
C. local
D. wide
Answer: ...
Local area networks designed to serve an entire city are called ____ area networks.
Local area networks designed to serve an entire city are called ____ area networks.
A. urban
B. metropolitan
C. city
D. major
Answer: Metropol...
A(n) ____ expands the boundaries of a company's intranet to include networks outside of its local area network setting.
A(n) ____ expands the boundaries of a company's intranet to include networks outside of its local area network setting.
A. EPN
B. APN
C. EDI
D. VPN
Answer:...
Bluetooth is an example of a _____ area network.
Bluetooth is an example of a _____ area network.
A. local
B. personal
C. wide
D. metro
Answer: Person...
Global positioning system (GPS) ____ are primarily used to assist travelers in getting from one place to another.
Global positioning system (GPS) ____ are primarily used to assist travelers in getting from one place to another.
A. receivers
B. infrared waves
C....
___ technology may someday replace today's bar code system for identifying items in inventory.
___ technology may someday replace today's bar code system for identifying items in inventory.
A. VPN
B. RFID
C. SIM
D. WAP
Answer: RF...
____ technology enables you to connect to your cell phone through a display on your car's dashboard.
____ technology enables you to connect to your cell phone through a display on your car's dashboard.
A. Global positioning
B. Bluetooth
C. Narrowband
D....
An area of a building where you can connect to the Internet wirelessly is often referred to as a ____.
An area of a building where you can connect to the Internet wirelessly is often referred to as a ____.
A. GPS spot
B. hotspot
C. cell tower
D. signal
Answer:...
Many cities have adopted______ technology to provide faster Internet speed to their users.
Many cities have adopted______ technology to provide faster Internet speed to their users.
A. DSL
B. WiMAX
C. Wi-Fi
D. Bluetooth
Answer: WiM...
WIth the advent of _____ technology, broadband Internet services over cellular networks were made available.
WIth the advent of _____ technology, broadband Internet services over cellular networks were made available.
A. first-generation(1G)
B. second-generation(2G)
C....
A(n) ____ network includes transmission towers that connect to area handsets.
A(n) ____ network includes transmission towers that connect to area handsets.
A. Ethernet
B. local
C. metro
D. cellular
Answer: Cellul...
The internet has adopted the _____ set of protocols to define its format of communications between devices.
The internet has adopted the _____ set of protocols to define its format of communications between devices.
A. HTTP
B. FTP
C. TCP/IP
D. DNS
Answer:...
With the help of a _____, devices can modulate signals from one form to another to allow them to connect to the Internet.
With the help of a _____, devices can modulate signals from one form to another to allow them to connect to the Internet.
A. twisted-pair cable
B....
____ is a popular cable type used as network backbone by major telecommunications companies.
____ is a popular cable type used as network backbone by major telecommunications companies.
A. twisted pair
B. fiber optic
C. coaxial
D. FCC
Answer:...
In a ____ portal, a user can access information related to his or her specific company, including communications tools for collaboration.
In a ____ portal, a user can access information related to his or her specific company, including communications tools for collaboration.
A. vertical
B....
A search engine attempts to catalog every Web page by topic through the use of a _____.
A search engine attempts to catalog every Web page by topic through the use of a _____.
A. spider
B. petabyte
C. shield
D. tracker
Answer: Spi...
Signing up for a(n) ____ will automatically provide you with Web content that is updated on a regular basis.
Signing up for a(n) ____ will automatically provide you with Web content that is updated on a regular basis.
A. RSS feed
B. blog
C. XML tag
D. push...
Through the use of the plug-in, ____, a Web Page can provide a use with an interactive experience.
Through the use of the plug-in, ____, a Web Page can provide a use with an interactive experience.
A. Microsoft Word
B. Flash
C. internet Explorer
D....
Thanks to _____ files, a Web site can recognize you and cater to your individual tastes each time you visit.
Thanks to _____ files, a Web site can recognize you and cater to your individual tastes each time you visit.
A. FTP
B. Cookie
C. Server
D. protocol
Answer:...
Web developers use ____ to categorize and classify content when creating a Web page.
Web developers use ____ to categorize and classify content when creating a Web page.
A. HTML
B. Java
C. XML
D. Ajax
Answer: X...
In the URL http://www.cengage.com/index.html, cengage.com is the _____.
In the URL http://www.cengage.com/index.html, cengage.com is the _____.
A. protocol
B. domain name
C. Web server
D. location on the server
Answer:...
___ is commonly used to enable Web browsers to communicate with Web servers.
____ is commonly used to enable Web browsers to communicate with Web servers.
A. TCP
B. SMTP
C. HTTP
D. IP
Answer: HT...
A well-known range of ____ is reserved by convention to identify specific service types provided by host computers.
A well-known range of ____ is reserved by convention to identify specific service types provided by host computers.
A. IP addresses
B. sockets
C....
A _____ network is used when a user wants to make his or her computer and others' computers available for access.
A _____ network is used when a user wants to make his or her computer and others' computers available for access.
A. peer-to-peer
B. client-to-server
C....
In a(n) _____ relationship, multiple users are provided with access to multiple Web sites at the same time.
In a(n) _____ relationship, multiple users are provided with access to multiple Web sites at the same time.
A. NSP
B. Client/server
C. ISP
D. protocol
Answer:...
A(n) ____ is a company that provides a subscriber with access to the Internet.
A(n) ____ is a company that provides a subscriber with access to the Internet.
A. ISP
B. ASP
C. TCP
D. IP
Answer: I...
___ defines how information travels across the Internet.
___ defines how information travels across the Internet.
A. POP
B. TCP/IP
C. SMTP
D. NP
Answer: TCP/...
Updates are provided by software companies in order to ____.
Updates are provided by software companies in order to ____.
A. fix bugs
B. improve functionality
C. Patch security holes
D. All of the above
Answer:...
A _____ license can be used anywhere on a college campus.
A _____ license can be used anywhere on a college campus.
A. multiuser
B. site
C. concurrent user
D. campus user
Answer: Si...
Personal Software can assist you in accomplishing all of the following task EXCEPT _____.
Personal Software can assist you in accomplishing all of the following task EXCEPT _____.
A. balancing your budget
B. monitoring your diet
C. finding...
Typing the word "DEL" on a prompt line to remove unwanted files on your computer is an example of a ______ user interface.
Typing the word "DEL" on a prompt line to remove unwanted files on your computer is an example of a ______ user interface.
A. prompt
B. command-based
C....
Performing a system ____ utility rearranges your files on disk in an orderly fashion resulting in faster access.
Performing a system ____ utility rearranges your files on disk in an orderly fashion resulting in faster access.
A. defragmentation
B. diagnostic
C....
Embedded operating systems are hardwired into a computer component, such as ROM or flash memory, to control a ____ computer.
Embedded operating systems are hardwired into a computer component, such as ROM or flash memory, to control a ____ computer.
A. Laptop
B. server-based
C....
An advantage of _____ software is ability to run more than one operating system on a computer.
An advantage of _____ software is ability to run more than one operating system on a computer.
A. BIOS
B. RAM
C. POST
D. VM
Answer: ...
Linux is ____ software, which means users can manipulate the source code to customize their operating system to their needs.
Linux is ____ software, which means users can manipulate the source code to customize their operating system to their needs.
A. Concurrent
B. licensed
C....
A recent version of the Windows operating system is ____.
A recent version of the Windows operating system is ____.
A. WIndows Me
B. WIndows NT
C. Windows 10
D. Windows Vista
Answer: Windows ...
An icon on your desktop represents a ____ interface.
An icon on your desktop represents a ____ interface.
A. command-based
B. BIOS
C. Task-based
D. graphical
Answer: graphic...
The purpose of the ____ is to store the boot process instructions for the computer to start up.
The purpose of the ____ is to store the boot process instructions for the computer to start up.
A. FIOS
B. POST
C. BIOS
D. I/O
Answer: ...
When you combine a system's hardware configuration and operating system, it is defined as the computer's ____.
When you combine a system's hardware configuration and operating system, it is defined as the computer's ____.
A. system
B. platform
C. interface
D....
Each programming language has a particular ____-the rules that guide how programming statements are constructed.
Each programming language has a particular ____-the rules that guide how programming statements are constructed.
A. Syntax
B. vocabulary
C. toolbox
D....
Making changes to a software program after it has been released is referred to as the ____ stage of the development cycle.
Making changes to a software program after it has been released is referred to as the ____ stage of the development cycle.
A. implementation
B. verification
C....
A ____ is a set of instructions or statements to the computer.
A ____ is a set of instructions or statements to the computer.
A. filename
B. Computer program
C. supportive tool
D. Programming Language
Answer:...
Through the use of ____, pilots can simulate flights without ever leaving the ground.
Through the use of ____, pilots can simulate flights without ever leaving the ground.
A. haptic output
B. screen readers
C. mobile devices
D. virtual...
All of the following are examples of special-purpose input devices EXCEPT _____.
All of the following are examples of special-purpose input devices EXCEPT _____.
A. MICR
B. OMR
C. OCR
D. CRT
Answer: C...
Music speakers are classified as ____ devices.
Music speakers are classified as ____ devices.
A. external
B. internal
C. output
D. input
Answer: Outp...
Two types of ____ are voice commands and marks on paper.
Two types of ____ are voice commands and marks on paper.
A. software
B. output
C. input
D. flash
Answer: Input
...
On political storage media, a ____ in a specified location represents a 0 (zero).
On political storage media, a ____ in a specified location represents a 0 (zero).
A. bit
B. Land
C. pit
D. charge
Answer: P...
Magnetic disks are a _____ access storage medium.
Magnetic disks are a _____ access storage medium.
A. direct
B. consecutive
C. volatile
D. sequential
Answer: dire...
Random access memory is considered _____ storage.
Random access memory is considered _____ storage.
A. flash
B. solid-state
C. primary
D. secondary
Answer: Primary
...
Which of the following is NOT an example of solid-state technology?
Which of the following is NOT an example of solid-state technology?
A. Blu-ray disc
B. flash drive
C. media card
D. USB drive
Answer: Blu-ray ...
With____memory, data is stored permanently with no moving parts or the need for electricity.
With____memory, data is stored permanently with no moving parts or the need for electricity.
A. flash
B. optical
C. magnetic
D. compact disc
Answer:...
All of the following are examples of optical storage EXCEPT
All of the following are examples of optical storage EXCEPT
A. DVD
B. CD
C. Blu-ray
D. USB drive
Answer: USB dri...
ROM is used for important programs like the ____, which tells the computer how to start.
ROM is used for important programs like the ____, which tells the computer how to start.
A. RAM
B. Magnetic field
C. firmware
D. BIOS
Answer: ...
All of the following sequences are part of the machine cycle EXCEPT
All of the following sequences are part of the machine cycle EXCEPT
A. fetch
B. decode
C. merge
D. store
Answer: mer...
The size and shape of the ____ influences what a system component may look like.
The size and shape of the ____ influences what a system component may look like.
A. bus
B. motherboard
C. microprocessor
D. transistor
Answer:...
The ____ is the key, active component in practically all modern electronics.
The ____ is the key, active component in practically all modern electronics.
A. automator
B. concatenator
C. transistor
D. amplifier
Answer:...
Moore's Law states that the number of transistors on a chip will double about every ____ months.
Moore's Law states that the number of transistors on a chip will double about every ____ months.
A. 10
B. 12
C. 16
D. 24
Answer: ...
A multiprocessor system may combine a ___ with a graphics processor to accomplish a particular type of function.
A multiprocessor system may combine a ___ with a graphics processor to accomplish a particular type of function.
A. CPU
B. teraflop
C.cache
D. register
Answer:...
The speed of the ___ dictates how fast the processor can process data.
The speed of the ___ dictates how fast the processor can process data.
A. FSB bus
B. ALU
C. cache
D. internal clock
Answer: Internal clo...
A CPU component known as ___ carries out the instructions used for all mathematical and logical operations.
A CPU component known as ___ carries out the instructions used for all mathematical and logical operations.
A. control unit
B. ALU
C. register
D....
Digitizing our media and information has raised serious concerns about all of the following EXCEPT____
Digitizing our media and information has raised serious concerns about all of the following EXCEPT____
A. productivity
B. Privacy
C. Information...
What two digits represent the binary number system.
What two digits represent the binary number system.
A. 1 and 2
B. 0 and -1
C. 0 and 1
D. A and B
Answer: 0 and...
ASCII is the standard used to represent ___ in digital form.
ASCII is the standard used to represent ___ in digital form.
A. video
B. audio
C. keyboard characters
D. signals
Answer: Keyboard characte...
Personal music videos that combine user-generated photos with audio music is a good example of___.
Personal music videos that combine user-generated photos with audio music is a good example of___.
A. digitization
B. digital convergence
C. computer...
A computer uses___to display an image after it has been digitized.
A computer uses___to display an image after it has been digitized.
A. icons
B. bytes
C. bits
D. pixels
Answer: Pixe...
A___ can represent either a letter or a color.
A___ can represent either a letter or a color.
A. byte
B. decimal
C. digitization
D. information
Answer: By...
The term computer ____ best describes the level of technology skills needed in today's business.
The term computer ____ best describes the level of technology skills needed in today's business.
A. Knowledge
B.Fluency
C.Digitization
D. information
Answer:...
Subscribe to:
Posts (Atom)