Review Questions
1
.
What nineteenth-century invention laid the foundation for future developments in computing?
-
Jacquard’s loom
-
Apple’s Macintosh computer
-
Programma 101
-
TRS-80
2
.
What is the main operating system for iPhone mobile devices?
-
Android
-
Google
-
iOS
-
SMS
3
.
What are direct deposit, high-speed printers/copiers, and automated inventory systems all examples of?
-
outdated technology
-
future developments in technology
-
early-stage developments in technology
-
advances in technology
4
.
What is VR?
-
a mostly live, real environment with some digital elements embedded
-
a computerized game for trying out a new product
-
a robot that can perform mundane tasks
-
a mostly simulated environment that allows the user to interact in the space
5
.
The autopilot features on an airplane are an example of ________.
-
VR
-
AI
-
AR
-
machine learning
6
.
________ is referred to as "the brains of the computer system."
-
Printer
-
Mainframe
-
Microprocessor
-
Router
7
.
________ allows the computer to operate and process information quickly.
-
ROM
-
RAM
-
HTTP
-
WAN
8
.
What is a network adapter card that organizes information into small packets for movement in the network or over the internet?
-
TCP (transmission control protocol)
-
HTTP (hypertext transfer protocol)
-
UDP (user datagram protocol)
-
STP (standard transfer protocol)
9
.
Microsoft 365 is an example of ________.
-
HTTP
-
LAN
-
a Web application
-
an e-commerce site
10
.
________ is the language used behind the scenes for website formatting.
-
HTTP
-
HTML
-
URL
-
IP address
11
.
What is Wikipedia?
-
an internet service provider
-
a web browser on mobile phones
-
a domain name
-
a free source of information
12
.
________ is the protocol used to connect computers together in a LAN.
-
HTML
-
Ethernet
-
IP address
-
Web application
13
.
Which operator is used to search partial words on the internet?
-
*
-
|
-
+
-
–
14
.
________ refers to a private network meant for internal company use.
-
Cloud
-
Cloud computing
-
Internet
-
Intranet
15
.
Cloud computing was first introduced in what year?
-
1982
-
2002
-
1996
-
2016
16
.
________ is a set of principles and best practices designed to prevent unauthorized access to a system.
-
Two-factor authentication
-
Biometrics
-
Data masking
-
Password management
17
.
Corporate espionage refers to ________.
-
trespassing on a competitor’s property
-
wiretapping a competitor’s office
-
domain hacking
-
all of the above
18
.
Cookies are defined as ________.
-
the practice of protecting digital information from unauthorized access, corruption, or theft
-
small data files from websites that are deposited on a user’s hard disk
-
a list of web pages a user visits, stored on a computer’s browser
-
ads that entice users to click on them
19
.
________ encrypts information on your computer, making it inaccessible until you give the hacker something valuable.
-
Phishing
-
Data masking
-
Spoofing
-
Ransomware