which of the following is not a video file extension quizlet

# which of the following is not a video file extension quizlet

S
9.9k points
Apache OpenOffice is an example of a(n) __________productivity suite
QuickBooks is an example of _________ software.accounting
Multimedia software includes all of the following EXCEPT _________.utility software
An example of ethical uses of computer and social media is the coordination of relief efforts after a natural disaster.True
All of the following are types of multimedia and entertainment software EXCEPT ________.productivity software
Web-based application software is software that ________.is stored completely on a web server instead of your hard drive
QuarkXPress is an example of _________ software....
All of the following can be used in an OS X file name EXCEPT ________.:
All of the following are tips for a great presentation EXCEPT _________.use a variety of animations on most slides to keep your audience's attention
A(n) ________ software installation installs all the most commonly used files to your computer's hard drive....
Which of the following is the most common audio compression format?MP3
________ software helps run the computer and coordinates instructions between other software and the hardware devices.System
Grace Hopper coined the term computer bug when the Harvard Mark 1 malfunctioned when a moth flew into it. T or FTrue
The _________ of the operating system enables users to communicate with the computer system.user interface
Software that manages "back office functions such as billing, production, inventory management, and human resources management is called __________ software.enterprise resource planning
When using Windows 8 File Explorer, which view provides the most information at a glance?Details
Anti-cyberbullying detection is done mostly by police. T or F?False
________ is the theory that holds that actions that generated greater happiness are judged to be better than actions that lead to unhappiness....
A CD stores the same number of songs in uncompressed format as in MP3 format. T or F?False
Cyberbullying is harassing, threatening, humiliating, embarrassing, or tormenting individuals by means of technology. T or FTrue
OpenOffice is an example of open source software. T or F?True
The intersection of a row and column in a spreadsheet program is known as a _______.cell
Facebook allows you to determine the extent to which your information can be shared. T or F?True
The Alto computer, built by _________, was the first to use a graphical user interface (GUI)....
________ tools enable groups of people to connect and exchange ideas.Social networking
____________ tools gather information from sources such as e-mails, text messages, and tweets and make the information instantly and publicly available for use in emergencies.Crisis-mapping
Which of the following is NOT a proprietary instant messaging (IM) service?LinkedIn Messenger
Many hospitals use nonimplant versions of identity chips on the wristbands of patients. T or F?True
Faculty at universities often use course management software such as _______ so that students can communicate outside of class and have easy access to class materials.Blackboard
Flash drives plug into a(n) _______.USB port
A metasearch engine searches other search engines. T or F?True
The unique identification number assigned to your computer when you connect to the Internet is known as all of the following EXCEPT _________.path
Wikipedia is a good reference for a research paper. T or F?False
All popular social networking sites have privacy policies but you still need to follow certain precautions when using their sites. T or F?True
A browser's bookmark feature makes it easy to return to a specific web page. T or F?True
A(n) _______ is an input device that looks like a pen.stylus
A(n) ________ is usually a live broadcast of audio or video content....
A universal chat client allows you to chat with users who use a differ IM service than you use. T or F?True
Which of the following is a feature of Live bookmarks?Adds RSS technology to bookmarks
Computer forensics analyzes computer systems in gathering potential legal evidence. T or F?True
In the URL http://www.microsoft.com/surface, the portion labeled "surface" is the _________.subdirectory
A(n) _______ is a navigation aid that shows the path you have taken to get to a web page or where the page is located within the website....
The number of pixels displayed on the screen is known as ________.screen resolution
Autonomy is the feeling of confidence and excitement from seeing your own skills progress. T or F?False
________ provides the instructions that tell a computer what to do.Software
All of the following are examples of nonvolatile storage EXCEPT ________.RAM
Which of the following are personal video journal entries posted on the web?Vlogs
Today's CPUs run at speeds measured in kilohertz. T or F?False
The area that holds all the startup instructions the computer needs to start is the _______.ROM
Nontraditional data such as audio clips, video clips, pictures, and very large documents are called ________ data.unstructured
XML technologies allow web pages to change after they have been loaded. T or F?False
Data staging consists of all of the following steps, EXCEPT _________....
__________ enables interactive functionality beyond the simple display of information on a web page by providing a platform which can execute a program to do things like collect data from the user....
Bottom-up design is a systematic approach in which a problem is broken into a series of high-level tasks. T or F?False
Most instant messaging services provide a high level of encryption for their messages. T or F?False
What is the first step of the system development life cycle (SDLC)?Problem and opportunity identification
________ is the branch of computer science that attempts to create computers that think like humans.Artificial intelligence
A(n) ________ is a way of retrieving information from one or more tables that defines a particular subset of data.query
An IP address that does not change and is usually assigned manually by a network administrator is called a ________ address.static
A ______ relationship indicates that for each record in a table, there is only a single corresponding record in a related table.one-to-one
The Siri personal assistant application on Apple's iPhone 5s is an example of a _______.natural language processing (NLP) system
Which of the following is an example of an instant messaging service?Yahoo Messenger
The capability of moving a completed programming solution easily from one type of computer to another is known as ________.portability
Dynamic IP addressing is accomplished using a DHCP server. T or F?True
When using Access, the text of the Gettysburg Address would be stored in a short text field. T or F?False
The process that converts program code into machine language is called ________.compilation
A(n) ________ server tracks who is logging on to the network as well as which services on the network are available to each user.authentication
In a database, a group of related records is referred to as a(n) _______....
________ is a combination of natural language and programming language that is used to document an algorithm.Pseudocode
Ring networks use the ________ method to avoid data collisions....
To boldface text in HTMML, you would enclose your text in ______ and ________. and
_______ uses a dedicated connection between two points with the connection remaining active for the duration of the transmission.Circuit switching
In public-key encryption, the two keys - one for coding and one for decoding - are known as _______....
A survey by informatioWeek reveals that the average U.S. IT staff person worked fewer hours than the average U.S. worker. T or F?False
Adware and spyware are referred to collectively as ________.grayware
When malicious code is planted on your computer and alters your browser's ability to find web addresses, it is known as ________....
A tablet uses a full traditional operating system. T or F?False
You should use the same password for each system or website you need to access T or F?False
Which of the following classifications of viruses can change its own code to avoid detection?...
According to projections by the Bureau of Labor Statistics, computer-related jobs are expected to be among the slowest-growing occupations through 2022. T or F?False
A __________ is named after a housing construction feature that slows the spread of fires from house to house.firewall
A stealth virus is designed to infect multiple file types to fool the antivirus software. T or F?False
A(n) _________ converts your voice's sound waves into digital signals.analog-to-digital converter chip
The terms virus and worm actually mean the same thing. T or F?False
A virus signature is a portion of virus code that is unique to a particular computer virus. T or F?True
Which of the following describes the number of times an analog wave is measured each second during an analog-to-digital conversion?Sampling rate
With regard to computer protection, quarantining is defined as __________.placing a found virus in a secure area on the hard drive
All IT positions require a high degree of mathematical skills. T or F?False
A macro virus is a virus that is attached to a file such as a Word document or Excel workbook. T or F?True
VoIP can be considered an alternative to a traditional landline phone service. T or F?True
ComputerJobs.com and ComputerWork.com are websites that can be used to search for IT jobs. T or F?True
You can block logical ports from invaders and make your computer invisible to others on the Internet by installing __________.a personal firewall
DRM-free music can legally be moved from system to system. T or F?True
Which of the following is NOT a video file extension?.jpg
Every new cell/smartphone has to include a GPS chip. T or F?True
Which of the following is NOT true about e-books?They are always PDF file format.
Web social media directors need to understand HTML, Perl, and JavaScript. T or F?False
A time bomb virus can be triggered on a certain date. T or F?True
________ is the semiconductor material used to make transistors.Silicon
The CPU consists of which two parts?The control unit and the arithmetic logic unit
P2P networks are most commonly used in home networks. T or F?True
If you reformat the hard drive on a computer, it erases all personal information from your computer and makes it safe to donate. T or F?False
The unique number assigned to a network adapter by the manufacturer is referred to as the _________ address.MAC
Some of the cache memory of a CPU is __________.on the hard disk drive
3-D sound is different from surround-sound. T or F?True
When referring to hard drives, access time is measured in ________....
Client/server networks are controlled by a central server that runs specialized software called a(n) __________.network operating system (NOS)
The use of multiple cores on one CPU chip allows the execution of two or more sets of instructions at the same time. T or F?True
A peer-to-peer (P2P) network is an example of __________ administration.local
A semiconductor is any material that can be controlled to either conduct electricity or prohibit the flow of electricity. T or F?True
Which of the following is NOT used to classify network architectures?...
The special memory storage areas built into the CPU are called. _________.registers
Current wired Ethernet networks in the United States are based on the IEEE 802.11ac standard. T or F?False
Which transmission medium transmits data the fastest?Fiber-optic cable
A _________ is a network located in your residence that connects to all our digital devices....
RAM is an example of _________ storage.volatile
Which of the following is NOT a wired broadband Internet connection option?Dial-up
The earliest generation of electronic computers used _________ as switches.vacuum tubes
some of the responsibilities of a(n) _________ are installing new hardware and software on the network and monitoring performance.network administrator.
To transfer data packets between two or more networks, a ________ is used....
Limiting your signal range does not help increase wireless network security. T or F?False
Thunderbolt can carry three channels of information on the same connector. T or F?False
which of
studybud

Surround your text in *italics* or **bold**, to write a math equation use, for example, $x^2+2x+1=0$ or $$\beta^2-1=0$$

Use LaTeX to type formulas and markdown to format text. See example.