1.7: Chapter Review - Review Questions
-
- Last updated
- Save as PDF
Review Questions
1 .
What nineteenth-century invention laid the foundation for future developments in computing?
-
Jacquard’s loom
-
Apple’s Macintosh computer
-
Programma 101
-
TRS-80
2 .
What is the main operating system for iPhone mobile devices?
-
Android
-
Google
-
iOS
-
SMS
3 .
What are direct deposit, high-speed printers/copiers, and automated inventory systems all examples of?
-
outdated technology
-
future developments in technology
-
early-stage developments in technology
-
advances in technology
4 .
What is VR?
-
a mostly live, real environment with some digital elements embedded
-
a computerized game for trying out a new product
-
a robot that can perform mundane tasks
-
a mostly simulated environment that allows the user to interact in the space
5 .
The autopilot features on an airplane are an example of ________.
-
VR
-
AI
-
AR
-
machine learning
6 .
________ is referred to as "the brains of the computer system."
-
Printer
-
Mainframe
-
Microprocessor
-
Router
7 .
________ allows the computer to operate and process information quickly.
-
ROM
-
RAM
-
HTTP
-
WAN
8 .
What is a network adapter card that organizes information into small packets for movement in the network or over the internet?
-
TCP (transmission control protocol)
-
HTTP (hypertext transfer protocol)
-
UDP (user datagram protocol)
-
STP (standard transfer protocol)
9 .
Microsoft 365 is an example of ________.
-
HTTP
-
LAN
-
a Web application
-
an e-commerce site
10 .
________ is the language used behind the scenes for website formatting.
-
HTTP
-
HTML
-
URL
-
IP address
11 .
What is Wikipedia?
-
an internet service provider
-
a web browser on mobile phones
-
a domain name
-
a free source of information
12 .
________ is the protocol used to connect computers together in a LAN.
-
HTML
-
Ethernet
-
IP address
-
Web application
13 .
Which operator is used to search partial words on the internet?
-
*
-
|
-
+
-
–
14 .
________ refers to a private network meant for internal company use.
-
Cloud
-
Cloud computing
-
Internet
-
Intranet
15 .
Cloud computing was first introduced in what year?
-
1982
-
2002
-
1996
-
2016
16 .
________ is a set of principles and best practices designed to prevent unauthorized access to a system.
-
Two-factor authentication
-
Biometrics
-
Data masking
-
Password management
17 .
Corporate espionage refers to ________.
-
trespassing on a competitor’s property
-
wiretapping a competitor’s office
-
domain hacking
-
all of the above
18 .
Cookies are defined as ________.
-
the practice of protecting digital information from unauthorized access, corruption, or theft
-
small data files from websites that are deposited on a user’s hard disk
-
a list of web pages a user visits, stored on a computer’s browser
-
ads that entice users to click on them
19 .
________ encrypts information on your computer, making it inaccessible until you give the hacker something valuable.
-
Phishing
-
Data masking
-
Spoofing
-
Ransomware