Current testing of ________ networks in two cities promises mobile connection speeds of up to 100 Mbps.
An advanced version of SMS is ________, which allows you to send video and pictures in addition to text to other phones or e-mail addresses
A(n) ________ is a lightweight, portable device that has no cell phone features, but allows you to carry files, music, and videos and provides Internet services.
T/F When converting analog waves to digital waves, the higher the sampling rate, the more accurately the original wave can be re-created.
The ________ of a digital camera refers to the number of data points recorded for a captured image.
Which of the following statements is NOT true about the JPEG file format?
D) JPEGs are larger than raw files.
A(n) ________ is included in a cell phone to handle the compression of data for it to be quickly transmitted to another phone.
C) digital signal processor
T/F Some cell phones come equipped with a keyboard for faster typing of e-mail and text messages
The most common file types supported by digital cameras are raw uncompressed (RAW) data and ________.
Which of the following uses radio waves to transmit data signals over short distances and does not need a direct line of sight?
The newest cell/smartphone displays are ________, which allow bright, sharp imaging and draw less power.
Text prediction ________ provide a list of popular words and save typing time when using text messaging.
Connecting your cell phone to the Internet requires that you have a(n) ________.
Wireless Service Provider
Which of the following is the process of sharing files between two or more computers?
A) peer-to-peer (P2P) sharing
Ensuring that two devices, for example, a PC and a cell phone or smartphone, have the same files is the process of ________.
T/F One of the advantages of VoIP is that an interruption in power does not interrupt the ability to make calls.
The conversion rate is the number of times per second music is measured and converted into a digital value.
A. a lightweight, nonvolatile storage device
B. type of memory in which data is NOT retained if the power source is lost
C. type of memory in which data is retained if the power source is lost
D. memory specifically used by Sony devices
Flash Memory A
Momory Stick D
Volatile memory B
Non volatile memory C
Which of the following allows you to download and play music with restrictions enforced about its use?
B) tethered downloads
A portable media player can play files with all of the following file extensions EXCEPT ________.
________ is a term used to refer to various licensing plans that enable copyright holders to grant certain rights to the work while retaining other rights.
To synchronize a cell phone or smartphone to a desktop computer, you need a sync cable, Bluetooth, or a(n) ________.
T/F An attribution license allows anyone to use, modify, and copy your work, but only for noncommercial purposes.
Web content specially designed for viewing via a cell phone or smartphone is written in a format called ________.
D) WML (Wireless Markup Language)
Many ________ sold for home use are also configured as firewalls and are capable of performing network address translation (NAT).
A ________ is a virus that is triggered when certain conditions are met, such as a file opening or starting a program a certain number of times.
D) logic bomb
________ encourages Internet users to reveal sensitive information that could lead to identity theft by sending e-mails that look like they are from legitimate companies but are, in fact, fake.
A ________ works independently of host file execution and is much more active in spreading itself than a virus is.
A(n) ________ virus temporarily erases its code from the files where it resides and then hides in active memory of the computer.
________ is the act of tricking people into revealing sensitive information and is often associated with credit card fraud.
Using a ________, hackers can access and delete all files on your computer, send e-mail, run programs, and do just about anything else you can do with your computer.
C) backdoor program
The purpose of network address translation (NAT) is to ________.
D) hide user IP addresses from the Internet
When electrical current is supplied in excess of normal voltage, this results in a(n) ________.
Hackers who use their knowledge to break into systems just for the challenge of it refer to themselves as ________ hackers.
A(n) ________ is the portion of virus code that is unique to a particular computer virus.
B) virus signature
A. a program that renders your computer files unusable by compressing them
B. attempts to travel between systems through network connections to spread an infection
C. a virus that changes its own code to avoid detection
D. a program that attaches itself to another program and attempts to spread itself to other computers through the exchange of files
Computer Virus D
Encryption Virus C
Polymorphic Virus A
All computers connected to the Internet have a unique address referred to as a(n) ________.
Internet Protocol Address