lOMoAR cPSD| 6561460
test-may-2018-questions-and-answers
Downloaded by aamir quraishi ()
test-may-2018-questions-and-answers
, lOMoAR cPSD| 6561460
Quiz Submissions - Exam Studying
point
Being means being familiar enough with computers that you understand their capabilities and
limitations.
1) computer savvy
2) technology literate
3) computer literate
4) computer competent
Question 2 point
Unwanted e-mail is called .
1) spam
2) spyware
3) adware
4) software
Question 3 point
Which of the following is NOT necessarily part of being computer literate?
1) avoiding hackers and viruses
2) protecting your privacy
3) being able to build a computer
4) using the Internet wisely
Question 4 point
is a field of study focused on information handling and retrieval of information automatically.
1) Computer forensics
2) Database mining
3) RFID
4) Information technology
Question 5 point
The process of searching huge amounts of data with the hope of finding a pattern is called .
1) data mining
2) data searching
3) data warehousing
4) data retrieval
Question 6 point
is a wearable device that hangs around your neck consisting of a camera, a projector, and a
mirror that can communicate with the Internet over wireless Bluetooth technology.
1) FastSCAN
2) Data mining
3) ESP
4) SixthSense
Downloaded by aamir quraishi ()
, lOMoAR cPSD| 6561460
Question 7 point
When a job is sent to other countries, as many programming jobs have been, it is said to have been
.
1) offshored
2) resourced
3) exported
4) imported
Question 8 point
Many online courses are designed to use management software like so that students can
communicate outside of class, take quizzes online, and find their class materials easily.
1) Blackboard or Moodle
2) Microsoft Access
3) Adobe Photoshop
4) CAD or Visio
Question 9 point
The ability to recover and read deleted or damaged files from a criminal's computer is an example of a law
enforcement specialty called .
1) robotics
2) RFID simulation
3) computer forensics
4) HALO animation
Question 10 point
tags, when placed on a car, can be used to record and track in a database all of the vehicle's
movements.
1) RFID
2) POS
3) PPS
4) GPS
Question
point
11
The goal of is to provide solutions to physical problems, such as providing sight to the blind.
1) 3D animations
2) computer forensics
3) biomedical chip research
4) RFID technology
Question 12 point
One potential application of is to provide sight to the blind.
1) RFID tags
2) patient simulators
3) biomedical chip implants
4) VeriChips
Downloaded by aamir quraishi ()
, lOMoAR cPSD| 6561460
Question 13 point
By studying the data produced by , scientists hope to improve the prediction of weather
phenomena.
1) GPS
2) simulations
3) VeriChips
4) PSSs
Question 14 point
computing relates to emotion or deliberately tries to influence emotion.
1) Affective
2) Personal
3) Psychological
4) Emotional
Question 15 point
As engineers work to create computers that can understand us emotionally, are also evolving
toward a more human appearance.
1) affecting computing techniques
2) RFIDs
3) computer systems
4) ESP systems
Question 16 point
The emotional-social prosthesis (ESP) device, developed by a group at the MIT Media Lab, is targeted at
helping people who have .
1) paralysis
2) diabetes
3) autism
4) brain damage
Question 17 point
The difference between people with access to computers and the Internet and those without this access is
known as the .
1) Web divide
2) Internet divide
3) digital divide
4) broadband divide
Question 18 point
The Microsoft Authorized Refurbisher program supports refurbishers by allowing to be installed
for free on refurbished systems.
1) certain Microsoft operating systems and Office software
2) certain gaming software packages
3) antivirus software
4) specific operating system utilities
Downloaded by aamir quraishi ()
test-may-2018-questions-and-answers
Downloaded by aamir quraishi ()
test-may-2018-questions-and-answers
, lOMoAR cPSD| 6561460
Quiz Submissions - Exam Studying
point
Being means being familiar enough with computers that you understand their capabilities and
limitations.
1) computer savvy
2) technology literate
3) computer literate
4) computer competent
Question 2 point
Unwanted e-mail is called .
1) spam
2) spyware
3) adware
4) software
Question 3 point
Which of the following is NOT necessarily part of being computer literate?
1) avoiding hackers and viruses
2) protecting your privacy
3) being able to build a computer
4) using the Internet wisely
Question 4 point
is a field of study focused on information handling and retrieval of information automatically.
1) Computer forensics
2) Database mining
3) RFID
4) Information technology
Question 5 point
The process of searching huge amounts of data with the hope of finding a pattern is called .
1) data mining
2) data searching
3) data warehousing
4) data retrieval
Question 6 point
is a wearable device that hangs around your neck consisting of a camera, a projector, and a
mirror that can communicate with the Internet over wireless Bluetooth technology.
1) FastSCAN
2) Data mining
3) ESP
4) SixthSense
Downloaded by aamir quraishi ()
, lOMoAR cPSD| 6561460
Question 7 point
When a job is sent to other countries, as many programming jobs have been, it is said to have been
.
1) offshored
2) resourced
3) exported
4) imported
Question 8 point
Many online courses are designed to use management software like so that students can
communicate outside of class, take quizzes online, and find their class materials easily.
1) Blackboard or Moodle
2) Microsoft Access
3) Adobe Photoshop
4) CAD or Visio
Question 9 point
The ability to recover and read deleted or damaged files from a criminal's computer is an example of a law
enforcement specialty called .
1) robotics
2) RFID simulation
3) computer forensics
4) HALO animation
Question 10 point
tags, when placed on a car, can be used to record and track in a database all of the vehicle's
movements.
1) RFID
2) POS
3) PPS
4) GPS
Question
point
11
The goal of is to provide solutions to physical problems, such as providing sight to the blind.
1) 3D animations
2) computer forensics
3) biomedical chip research
4) RFID technology
Question 12 point
One potential application of is to provide sight to the blind.
1) RFID tags
2) patient simulators
3) biomedical chip implants
4) VeriChips
Downloaded by aamir quraishi ()
, lOMoAR cPSD| 6561460
Question 13 point
By studying the data produced by , scientists hope to improve the prediction of weather
phenomena.
1) GPS
2) simulations
3) VeriChips
4) PSSs
Question 14 point
computing relates to emotion or deliberately tries to influence emotion.
1) Affective
2) Personal
3) Psychological
4) Emotional
Question 15 point
As engineers work to create computers that can understand us emotionally, are also evolving
toward a more human appearance.
1) affecting computing techniques
2) RFIDs
3) computer systems
4) ESP systems
Question 16 point
The emotional-social prosthesis (ESP) device, developed by a group at the MIT Media Lab, is targeted at
helping people who have .
1) paralysis
2) diabetes
3) autism
4) brain damage
Question 17 point
The difference between people with access to computers and the Internet and those without this access is
known as the .
1) Web divide
2) Internet divide
3) digital divide
4) broadband divide
Question 18 point
The Microsoft Authorized Refurbisher program supports refurbishers by allowing to be installed
for free on refurbished systems.
1) certain Microsoft operating systems and Office software
2) certain gaming software packages
3) antivirus software
4) specific operating system utilities
Downloaded by aamir quraishi ()