Review Questions
1
. 
  
  
  
        
        
        
    What nineteenth-century invention laid the foundation for future developments in computing?
  - 
                Jacquard’s loom
- 
                Apple’s Macintosh computer
- 
                Programma 101
- 
                TRS-80
2
. 
  
  
  
        
        
        
    What is the main operating system for iPhone mobile devices?
  - 
                Android
- 
                Google
- 
                iOS
- 
                SMS
3
. 
  
  
  
        
        
        
    What are direct deposit, high-speed printers/copiers, and automated inventory systems all examples of?
  - 
                outdated technology
- 
                future developments in technology
- 
                early-stage developments in technology
- 
                advances in technology
4
. 
  
  
  
        
        
        
    What is VR?
  - 
                a mostly live, real environment with some digital elements embedded
- 
                a computerized game for trying out a new product
- 
                a robot that can perform mundane tasks
- 
                a mostly simulated environment that allows the user to interact in the space
5
. 
  
  
  
        
        
        
    The autopilot features on an airplane are an example of ________.
  - 
                VR
- 
                AI
- 
                AR
- 
                machine learning
6
. 
  
  
  
        
        
        
    ________ is referred to as "the brains of the computer system."
  - 
                Printer
- 
                Mainframe
- 
                Microprocessor
- 
                Router
7
. 
  
  
  
        
        
        
    ________ allows the computer to operate and process information quickly.
  - 
                ROM
- 
                RAM
- 
                HTTP
- 
                WAN
8
. 
  
  
  
        
        
        
    What is a network adapter card that organizes information into small packets for movement in the network or over the internet?
  - 
                TCP (transmission control protocol)
- 
                HTTP (hypertext transfer protocol)
- 
                UDP (user datagram protocol)
- 
                STP (standard transfer protocol)
9
. 
  
  
  
        
        
        
    Microsoft 365 is an example of ________.
  - 
                HTTP
- 
                LAN
- 
                a Web application
- 
                an e-commerce site
10
. 
  
  
  
        
        
        
    ________ is  the language used behind the scenes for website formatting.
  - 
                HTTP
- 
                HTML
- 
                URL
- 
                IP address
11
. 
  
  
  
        
        
        
    What is Wikipedia?
  - 
                an internet service provider
- 
                a web browser on mobile phones
- 
                a domain name
- 
                a free source of information
12
. 
  
  
  
        
        
        
    ________ is  the protocol used to connect computers together in a LAN.
  - 
                HTML
- 
                Ethernet
- 
                IP address
- 
                Web application
13
. 
  
  
  
        
        
        
    Which operator is used to search partial words on the internet?
  - 
                *
- 
                |
- 
                +
- 
                –
14
. 
  
  
  
        
        
        
    ________ refers  to a private network meant for internal company use.
  - 
                Cloud
- 
                Cloud computing
- 
                Internet
- 
                Intranet
15
. 
  
  
  
        
        
        
    Cloud computing was first introduced in what year?
  - 
                1982
- 
                2002
- 
                1996
- 
                2016
16
. 
  
  
  
        
        
        
    ________ is a set of principles and best practices designed to prevent unauthorized access to a system.
  - 
                Two-factor authentication
- 
                Biometrics
- 
                Data masking
- 
                Password management
17
. 
  
  
  
        
        
        
    Corporate  espionage refers to ________.
  - 
                trespassing on a competitor’s property
- 
                wiretapping a competitor’s office
- 
                domain hacking
- 
                all of the above
18
. 
  
  
  
        
        
        
    Cookies are defined as ________.
  - 
                the practice of protecting digital information from unauthorized access, corruption, or theft
- 
                small data files from websites that are deposited on a user’s hard disk
- 
                a list of web pages a user visits, stored on a computer’s browser
- 
                ads that entice users to click on them
19
. 
  
  
  
        
        
        
    ________ encrypts  information on your computer, making it inaccessible until you give the hacker something valuable.
  - 
                Phishing
- 
                Data masking
- 
                Spoofing
- 
                Ransomware