Review For Exam I 1) 2) 3) 4) 5) 6) 7) 8) 9) 10) 11) 12) 13) 14) 15) 16) 17) 18) 19) 20) 21) 22) 23) 24) 25) 26) 27) 28) 29) 30) 31) 32) 33) Courses are designed to use management software like __________ so that students can communicate outside of class, take quizzes online, and find their class materials easily. There are simulations and instructional __________ on the Web that serve as incredible learning tools. In the automotive industry, computerized __________ measure temperature, emissions, and throttle position. The ability to recover and read deleted or damaged files from a criminal’s computer is an example of a law enforcement specialty called __________ is the application of computer systems and techniques to gather potential legal evidence. __________ are extremely detailed re-creations that are generated with computers and based on forensic evidence, depositions of witnesses, and the opinions of experts. __________ tags, when placed on an animal, can be used to record and track in a database all of the animal’s movements. __________ tags are small versions of the roadway electronic toll system used in many states to automate paying tolls as you pass through the toll station. __________ are used to automatically analyze information about time and temperature and to control water pumps for cranberry crops. Surgeons use __________ to perform delicate operations by manipulating devices through computers instead of manually. Technology no longer protected by copyright, available to everyone, is considered to be Medical students can train on __________ and experience firsthand how a human would react to a particular treatment. __________ translates a patient’s thoughts into commands to a robotic limb. The __________ is a global effort in which bioengineers are creating realistic computer simulations of all systems and features of the human anatomy. The goal of __________ is to provide technological solutions to physical problems and to provide a means for positively identifying individuals. __________ microphones pick up sound from only one direction. A __________ is an output device that creates hard copies. A printer's __________ determines how many pages it can print per minute. Color laser printers have __________ separate toner cartridges. The type of monitor that looks like a traditional television set is called a __________ monitor. __________ printers have tiny hammer-like keys that strike the paper through an inked ribbon. Inkjet printers and laser printers are examples of __________ printers. __________ are large printers used to produce oversize pictures that require precise continuous lines, such as maps and architectural plans. Restarting a computer when it is already powered on is called __________ is what happens when the computer saves an image of the desktop and enters a state of reduced power consumption to save energy. The hard disk drive is a __________ storage device, meaning that it stores data permanently. Hard disk drives are considered __________ storage. __________ are essentially hard drives that have been made portable and are quite often used to back up the data on an internal hard drive in case a problem develops or data needs to be recovered. Flash drives plug into a(n) __________ ports are now the most popular ports for connecting input and output devices to the computer All of the following are indications that a Web site is secure EXCEPT All of the following programs provide some control over spam EXCEPT Small text files that can be automatically stored on your computer when you visit an Internet site are called 34) 35) 36) 37) 38) 39) 40) 41) 42) 43) 44) 45) 46) 47) 48) 49) 50) 51) 52) 53) 54) An intrusive program that transmits information about your Internet surfing habits is called If you receive an e-mail asking for personal information, it may be part of a scam called Internet Explorer and Safari are examples of The name of the free Internet browser from Mozilla is The text version of an Internet address of a Web site is called the HTTP is the abbreviation for In the URL http://www.prenhall.com, the portion labeled http is the Microsoft Office and Corel WordPerfect Office are examples of Microsoft Works is an example of a(n) Which type of software lets you dictate letters, e-mails, and voice commands? An example of software that includes electronic checkbook registers and automatic bill payment tools is Multimedia software includes all of the following EXCEPT __________ software is used to modify digital images, such as removing red eye. Apple QuickTime and Microsoft Media Player are examples of __________ software. CD ripping refers to The organization responsible for rating computer games is the Moodle and Blackboard are examples of Because the operating system coordinates the flow of information, your textbook describes the OS as a When an operating system receives an interrupt from the printer and pauses the CPU, it is performing which of the following functions? Microsoft Windows and Mac OS use a __________ interface. Which of the following statements is FALSE? A GUI uses menus, which are lists of commands that appear on the screen. A GUI uses windows, which are rectangular boxes displayed on the screen. A GUI is a command-driven interface. Icons represent an object such as a software application, a file, or a folder. 55) What part of the boot process determines whether the peripheral devices are working properly? 56) When your computer is in safe mode, you can use the __________ to view and change the properties of all devices attached to the computer. 57) Which of the following is the first step in the boot process?