How can we help?
You can also find more resources in our
Select a category
Something is confusing
Something is broken
I have a suggestion
What is your email?
What is 1 + 3?
Unwanted e-mail is called ________.
Being ________ means being familiar enough with computers that you understand their capabilities and limitations.
biomedical chip research
The goal of ________ is to provide solutions to physical problems, such as providing sight to the blind.
________ tags, when placed on a car, can be used to record and track in a database all of the vehicle's movements.
The ability to recover and read deleted or damaged files from a criminal's computer is an example of a law enforcement specialty called ________.
By studying the data produced by ________, scientists hope to improve the prediction of weather phenomena.
________ is a wearable device that hangs around your neck consisting of a camera, a projector, and a mirror that can communicate with the Internet over wireless Bluetooth technology.
quick response codes
A technology named ________ lets any piece of print in the real world host a live link to online information and video content.
________ is described as the ability of the world's populace to volunteer and collaborate on large projects.
One proposed answer to close the digital divide is to promote ________ as a means for low-income families to access the Internet.
Blackboard or Moodle
Many online courses are designed to use management software like ________ so that students can communicate outside of class, take quizzes online, and find their class materials easily.
When a job is sent to other countries, as many programming jobs have been, it is said to have been ________.
The process of searching huge amounts of data with the hope of finding a pattern is called ________.
________ is a field of study focused on information handling and retrieval of information automatically.
being able to build a computer
Which of the following is NOT necessarily part of being computer literate?
As engineers work to create computers that can understand us emotionally, ________ are also evolving toward a more human appearance.
________ computing relates to emotion or deliberately tries to influence emotion.
________ is the gathering together of groups of people using online tools to connect and exchange ideas.
the Internet, computers
Children who do not have access to ________ and ________ won't be prepared for future employment
certain Microsoft operating systems and Office software
The Microsoft Authorized Refurbisher program supports refurbishers by allowing ________ to be installed for free on refurbished systems.
The difference between people with access to computers and the Internet and those without this access is known as the ________.
The emotional-social prosthesis (ESP) device, developed by a group at the MIT Media Lab, is targeted at helping people who have ________.
biomedical chip implants
One potential application of ________ is to provide sight to the blind.
Joining together as a group to use a specific product more efficiently is called ________.
People who are ________ make the Internet a powerful tool and know how to find the information that they want effectively.
A crisis mapping tool such as ________ can collect information to make instantly and publicly available for use in emergencies.
use the Internet and Web wisely,are able to maintain, upgrade, and troubleshoot your computer, and avoid hackers and viruses
Being computer savvy means you ________.
The ________ lets information be created, distributed, and filtered by users themselves in real time.
Next Einstein Initiative
The ________ is a strategic plan to focus on the young, talented, mathematical minds of Africa
The Witness Project uses the power of video and a grassroots movement to advocate for ________.
________ binary digits (or bits) combine to create one byte.
________ is the place in a computer where the programs and data the computer is currently using are stored.
The S-video and the ________ ports on a computer facilitate connecting the computer to multimedia devices such as TVs and DVD players.
The hard drive is a ________ storage device, meaning that it stores data permanently even when the computer is turned off.
Flash drives plug into a(n) ________.
network interface card (NIC)
A ________ enables your computer to connect to other computers or to the Internet.
External drive bays
________ are a form of permanent storage that can be seen and accessed from outside the system unit and are typically used for CD and DVD drives.
________ plug into slots on the motherboard and provide additional functionality for your computer.
A(n) ________ is where a peripheral device can attach to a computer so that data can be exchanged between it and the operating system.
Universal serial bus (USB)
________ ports are now the most common ports for connecting input and output devices to the computer.
________ is a power mode that allows the computer to save an image of the desktop to the hard drive and enter a state of reduced power consumption to save energy.
RAM is considered volatile storage, which means it is ________.
Computers gather data, which means that they allow users to ________ data.
parallel and serial
USB ports are fast replacing traditional ________ ports because of their ability to transfer data quickly.
________ displays use organic compounds that produce light when exposed to an electric current.
After a picture has been taken with a digital camera and processed appropriately, the actual print of the picture is considered ________.
The ________ language consists of just two digits: 0 and 1.
________ is data that has been organized or presented in a meaningful fashion.
analyzing the data or information
Which of the following is NOT one of the four major data processing functions of a computer?
The term ________ describes computing devices or peripherals that use techniques, parts, and methods from an earlier time that are no longer popular.
Monitor screen grids are made up of millions of pixels, with each pixel containing ________ subpixels of colors.
The ________, housed inside the system unit, transforms the wall voltage to the voltages required by the computer chips.
Inkjet printers and laser printers are examples of ________ printers.
a warm boot
Restarting a computer when it is already powered on is called ________.
________ printers have tiny hammerlike keys that strike the paper through an inked ribbon.
The small, touch-sensitive area at the base of the keyboard on a notebook computer is known as a ________.
________ microphones pick up sound from only one direction.
________ are shortcut keys that you press to perform special tasks; each software application has its own set of tasks assigned to these keys.
A(n) ________ is a device that looks like a skinny pen but has no ink.
Control (Ctrl) key
The ________ is used in combination with other keys to perform shortcuts and special tasks.
A(n) ________ enables you to enter data (text, images, and sound) and instructions (user responses and commands) into the computer.
A ________ was the first devices with touch screen capabilities.
________ software is the set of programs that enables the computer's hardware devices and application software to work together.
A ________ is approximately 1 million bytes.
The ________ contains the central electronic components of the computer.
Computers process data into information by working exclusively with ________.
________ is the applied science concerned with designing and arranging things that people use so that the people and things interact most efficiently and safely.
Devices such as monitors and printers that are connected to the computer are called ________.
All the following are examples of input devices EXCEPT a ________.
________ computers are specially designed computer chips that reside inside other devices such as your car or the electronic thermostat in your home.
Any computer parts that you can actually touch are considered to be ________.
In binary language, each letter of the alphabet, each number, and each special character is made up of a unique combination of ________.
________ is the set of computer programs that enables the hardware to perform different tasks.
The term "bit" is short for ________.
3D printing, cloud printing, and inkless printing
boundaries of printing include ________.
New technologies pushing the boundaries of printing include ________.
A ________ is approximately 1 billion bytes.
________ is a form of permanent memory that holds all the instructions the computer needs to start up.
Large, expensive computers that support hundreds of users simultaneously are called ________.
Really Simple Syndication
RSS stands for ________.
broadcast over the Internet using compressed audio and video files such as MP3s and MP4s
Podcasts enable you to ________.
Podcasts use which of the following technologies?
to develop new Internet technologies
The Internet2 is a project ________.
________ is a social networking service that enables you to exchange short text messages with your friends or "followers."
a trend of new Web applications that combine the functionality of multiple applications
What does Web 2.0 describe?
a spider, an indexer, and search engine software
Search engines have which three parts?
A set of programs that searches the Web to find information is called a ________.
the Cold War crisis
The concept of the Internet developed from ________.
A Web site that allows anyone to add or edit content is called a ________.
Which of the following are personal video journal entries posted on the Web?
If you wanted to keep a written online journal, you would use ________.
You can keep track of IM contacts by using a ________.
communicate in real time with others who are online
Instant messaging (IM) services are programs that enable you to ________.
NOT, AND, OR
Boolean operators include such words as ________.
social networking Web sites
Facebook and MySpace are considered to be ________.
the main pathway of high-speed communications lines through which all Internet traffic flows
The Internet backbone refers to ________.
Tim Berners-Lee at CERN
The World Wide Web was invented by ________.
Advanced Research Projects Agency Network
The agency that first began funding the Internet was called the ________.
a large network of networks
The Internet is ________.
personal information manager (PIM) software
Which type of software is used to keep track of appointments, to-do lists, and telephone numbers?
In the URL http://www.prenhall.com, the portion labeled http is the ________.
Hypertext Transfer Protocol
HTTP is the abbreviation for ________.
Uniform Resource Locator (URL)
The text version of a Web site's Internet address is called the ________.
The name of the free Internet browser from Mozilla is ________.
that the address bar is green-colored,that a closed padlock appears in the toolbar,that the beginning URL changes from http:// to https://
When purchasing items over the Internet, be sure to check ________.
secure socket layer
The "s" in https stands for ________.
E-commerce that involves businesses buying and selling goods and services to other businesses is called ________.
All of the following are examples of multimedia EXCEPT:
are not updated automatically
Webcasts differ from podcasts in that webcasts ________.
Adobe Reader, Flash Player, and QuickTime Player are all examples of special software programs called ________.
the broadcast of audio or video content over the Internet
A webcast is ________.
A(n) ________ is a keyword or term that is assigned to a piece of information such as a Web page, digital image, or video and describes the site so that it can be found again by browsing or searching.
use Favorites or Bookmarks
One way to mark a Web site so that you can return to it later without typing the address is to ________.
A list of pages within a Web site that you have visited and that usually appears at the top of a page is referred to as a(n) ________.
What protocol allows files to be transferred from a Web server so that you can view them on your computer using a browser?
In the URL http://www.prenhall.com, the portion labeled .com is the ________.
WWW.the protocol.and the domain name.
What are the three parts of a URL.
Software you can use to create a budget is called ________.
word processing software
Microsoft Word and OpenOffice.org Writer are examples of ________.
its ability to automatically recalculate formulas and functions
The primary benefit of a spreadsheet program is ________.
In a spreadsheet, equations you build yourself using values and cell references are called ________.
In a spreadsheet, the columns and rows form individual boxes called ________.
help run the computer,coordinate instructions between application software and the computer's hardware devices, and helps manage system resources.
what does the System software do?
Software that lets you do tasks at home, school, and work is called ________.
is at column C, row 5 of the worksheet
The cell address C5 indicates that the cell ________.
Software refers to a set of instructions that tells the computer what to do. These instruction sets are called ________.
Which type of software is used to make a slide show?
themes, transitions, animation effects
What features does the Presentation software include?
digital image editing
Adobe Photoshop and Corel PaintShop Photo Pro are examples of ________ software.
audio editing software, image editing software, and animation software.
Multimedia software includes _______.
Which file format enables users to share, view, and print any file as long as they have the appropriate program installed?
Custom software, developed to address the needs of a specific company, is known as ________ software.
locate restaurants, airports, and points of interest
GPS software allows users to ________.
enterprise resource planning software
Software that does "back office" operations and processing functions such as billing, production, inventory management, and human resources management is called ________.
Software designed for a specific industry is known as ________ software.
customer relationship management software
Which type of software stores client information in one central database for use by sales professionals?
engineers to create models
Computer-aided design software is used primarily by ________.
In which 2010 Office suite will you find Microsoft Access?
project management software
Which type of software helps managers with tasks such as scheduling charts?
QuickBooks and Peachtree are examples of ________.
Microsoft ________ is software that allows students who have tablet PCs to write their notes directly onto the tablet, using it as an electronic notebook.
Which type of software is used at colleges to keep track of student records?
A(n) ________ software installation allows you to decide which features you want to install on the hard drive.
use the application's uninstall program
When available, the best way to remove an unwanted software application is to ________.
Web page authoring software
Adobe Dreamweaver is an example of ________.
QuarkXPress and Adobe InDesign are examples of ________ software.
An example of software that includes electronic checkbook registers and automatic bill payment tools is ________.
Which suite is installed by computer manufacturers and replaced Works?
Predesigned forms that provide the basic structure for a particular kind of document are known as ________.
records, fields, tables
In databases, information is organized in ________.
Software that is distributed for free, but often with the condition that you pay for it if you like and intend to use it, is called ________.
Which of the following is software that you can use for an unlimited time at no charge?
educational versions of software
Which of the following is an example of discounted software?
is stored completely on a Web server instead of your hard drive
Web-based application software is software that ________.
Which Microsoft program is used to create technical drawings, map basic block diagrams, and more?
course management software
Moodle and Blackboard are examples of ________.
The distribution of audio files over the Internet is called ________.
encoding CDs to MP3 format
CD ripping refers to ________.
Every software program has a set of ________ that specify the minimum recommended standards for the operating system, processor, RAM, and hard drive capacity
graphical user interface
What is a user interface based on graphics (icons and pictures and menus) instead of text
The location of a file is specified by its ________.
symbols like this *.
What can't be used in a Windows file name.
One Laptop per Child
XO is the name of the computer being provided by the ________ project.
During the virtual memory process, the operating system moves data to a temporary storage area on the hard drive called the ________ file.
The ________ is responsible for managing the processor and all other components of the computer system, and is an essential part of the operating system.
Mac OS X includes a backup utility called ________.
In a Windows folder, to display files and folders as icons in list form, use ________ view.
Windows 7 introduces the concept of ________, which are folders that gather files from different locations and display the files as if they were all saved in a single folder.
The OS allows you to organize the contents of your computer in a hierarchical structure of ________.
In the Windows operating system, the hard drive is represented as the ________.
________ are easy-to-use mini desktop programs that give you information at a glance or quick access to frequently used tools including weather information, calendar items, or games.
The ________ of the operating system allows the user to communicate with the computer system.
The ________ manages the flow of data and information through the computer system by coordinating the hardware, software, user interface, processor, and system memory.
Windows 7 Ultimate
The version of Windows 7 that is most appropriate for high-end PC users, gamers, and multimedia professionals is ________.
operating system software
The most essential software in your computer system is the ________.
It manages the removal of spyware.
Which of the following is NOT a function of the operating system?
Which of the following was the first widely used operating system installed in personal computers?
Which of the following is a single-user, multitask operating system?
network operating systems
What are Microsoft Windows, Linux,and UNIX?
The combination of operating system and processor in a computer is referred to as a computer's ________.
Some video games require a ________ operating system.
Which of the following operating systems is used primarily with mainframes as a network operating system?
Microsoft Windows and Mac OS use a ________ interface.
In Windows, which character is used as a path separator?
RAM, BIOS, ROM.
What are some terms related to part of the boot process?
The ________ contains all of the different configurations used by the OS and by other applications.
The OS is moved into RAM.
Which of the following does NOT occur during the power-on self-test?
The antivirus program checks all files for viruses.
Which of the following is NOT a step in the boot process?
The basic input/output system is stored on a ________ chip
The ________ is a program that manages the data between the operating system and all input and output devices attached to the system.
The BIOS is activated by powering on the CPU.
Which of the following is the first step in the boot process?
If you want to automatically defragment your hard drive every week, you can set a predetermined time using the ________.
Each device attached to your computer comes with a special program called a ________ that facilitates communication between the device and the OS.
In Windows, you can create ________ to reset your system in the case of a malfunction.
You can use the Windows ________ to check on a nonresponsive program.
Which of the following types of programs help manage system resources such as the hard drive?
Which of the following Windows utility programs arranges files on your hard drive in sequential order?
rename files, copy files, open files
With Windows Explorer, you can perform what kind of file management actions?
Can you restore files that have been moved to the Recycle Bin?
Which of the following would be a name of a Microsoft Access file?
If Microsoft Word 2010 is used to create a file, which file extension is added automatically?
In Windows, a file path starts with a ________.
C:\Documents\Spring 2012\CIS 101\Term Paper\Computer Technology is an example of a ________.