1. All of the following are examples of real security and privacy risks EXCEPT ?






2. A process known as ____________ is used by large retailers to study trends.






3. ____________terminals (formerly known as cash registers) are often connected to complex inventory and sales computer systems.






4. A(n) ____________ system is a small, wireless handheld computer that scans an item’s tag and pulls up the current price (and any special offers) as you shop.






5. The ability to recover and read deleted or damaged files from a criminal’s computer is an example of a law enforcement specialty called:






6. Which of the following is NOT one of the four major data processing functions of a computer?






7. ____________ tags, when placed on an animal, can be used to record and track in a database all of the animal’s movements.






8. Surgeons can perform delicate operations by manipulating devices through computers instead of manually. This technology is known as:






9. Technology no longer protected by copyright, available to everyone, is considered to be:






10. ____________ is the study of molecules and structures whose size ranges from 1 to 100 nanometers.






11. ____________ is the science that attempts to produce machines that display the same type of intelligence that humans do.






12. ____________ is data that has been organized or presented in a meaningful fashion.






13. The name for the way that computers manipulate data into information is called:






14. Computers gather data, which means that they allow users to ____________ data.






15. After a picture has been taken with a digital camera and processed appropriately, the actual print of the picture is considered:






16. Computers use the ____________ language to process data.






17. Computers process data into information by working exclusively with:






18. In the binary language each letter of the alphabet, each number and each special character is made up of a unique combination of:






19. The term bit is short for:






20. A string of eight 0s and 1s is called a:






21. A ____________ is approximately one billion bytes.






22. A ____________ is approximately a million bytes.






23. ____________ is any part of the computer that you can physically touch.






24. The components that process data are located in the:






25. All of the following are examples of input devices EXCEPT a:








2 thoughts on “Question Set / Online Test”

Leave a Reply