sponsored links
- The ability to recover and read deleted or damaged files from a criminal’s computer is an example of a law enforcement specialty called:
- robotics.
- simulation.
- computer forensics.
- animation.
- None of these
- All of the following are examples of real security and privacy risks EXCEPT:
- A process known as ____________ is used by large retailers to study trends.
- data mining
- data selection
- POS
- data conversion
- None of these
- ____________terminals (formerly known as cash registers) are often connected to complex inventory and sales computer systems.
- ____________ tags, when placed on an animal, can be used to record and track in a database all of the animal's movements.
- POS
- RFID
- PPS
- GPS
- None of these
- A(n) ____________ system is a small, wireless handheld computer that scans an item's tag and pulls up the current price (and any special offers) as you shop.
- PSS
- POS
- inventory
- data mining
- None of these
- Which of the following is NOT one of the four major data processing functions of a computer ?
- gathering data
- processing data into information
- analyzing the data or information
- storing the data or information
- None of these
- ____________ is the study of molecules and structures whose size ranges from 1 to 100 nanometers.
- Nanoscience
- Microelectrodes
- Computer forensics
- Artificial intelligence
- None of these
- ____________ is data that has been organized or presented in a meaningful fashion.
- A process
- Software
- Storage
- Information
- None of these
- The name for the way that computers manipulate data into information is called:
- programming.
- processing.
- storing.
- organizing.
- None of these
- ____________ is the science that attempts to produce machines that display the same type of intelligence that humans do.
- Nanoscience
- Nanotechnology
- Simulation
- Artificial intelligence (AI)
- None of these
- After a picture has been taken with a digital camera and processed appropriately, the actual print of the picture is considered as
- data.
- output.
- input.
- the process.
- None of these
- Computers use the ____________ language to process data.
- processing
- kilobyte
- binary
- representational
- None of these
- Computers process data into information by working exclusively with:
- multimedia.
- words.
- characters.
- numbers.
- None of these
- In the binary language each letter of the alphabet, each number and each special character is made up of a unique combination of:
- eight bytes.
- eight kilobytes.
- eight characters.
- eight bits.
- None of these
- Computers gather data, which means that they allow users to ____________ data.
- present
- input
- output
- store
- None of these
- Technology no longer protected by copyright, available to everyone, is considered to be :
- proprietary.
- open.
- experimental.
- in the public domain.
- None of these
- A string of eight 0s and 1s is called a:
- megabyte.
- byte.
- kilobyte
- gigabyte.
- None of these
- The term bit is short for:
- megabyte.
- binary language.
- binary digit.
- binary number.
- None of these
- Surgeons can perform delicate operations by manipulating devices through computers instead of manually. This technology is known as
- robotics.
- computer forensics.
- simulation.
- forecasting.
- None of these
sponsored links
0 Responses:
Post a Comment