Deck 1: Computers and Digital Basics

Full screen (f)
exit full mode
Question
The number 9 can be considered a character.
Use Space or
up arrow
down arrow
to flip the card.
Question
Because most digital devices are electronic,bits take the form of electrical pulses.
Question
The operand is a command word for an operation.
Question
Privacy advocates fear that digital technologies are fundamentally changing our expectation of what is private and what is not.
Question
The op code in a machine language instruction specifies the data.
Question
The digital revolution became a significant factor in the 1980s but ended in the 1990s when the "dot com" bubble burst.
Question
All computers are case sensitive.
Question
Prior to 1940,the word computer was defined as a person who performs calculations.
Question
To ensure you can remember your password it is a good idea to base it on information you can easily remember such as your birthday.
Question
Semiconductor materials are substances with properties between those of a conductor and an insulator.
Question
The purpose of a server is to serve computers on a network.
Question
In the binary number system,2 is used to represent the value 2.
Question
The first digital computer was developed for conducting the census.
Question
An interpreter converts and executes one statement at a time.
Question
Because of increased versatility,a videogame console is now considered a personal computer.
Question
Facebook and Twitter are examples of social networking options.
Question
An operating system is an example of application software.
Question
  A compiler like the one shown in the accompanying figure converts all statements in a program to machine language in a single batch.<div style=padding-top: 35px>
A compiler like the one shown in the accompanying figure converts all statements in a program to machine language in a single batch.
Question
You should always use a different password for every account.
Question
Trojans are computer programs that seem to perform one function while actually doing something else.
Question
In the past,minicomputers were used for small businesses._________________________
Question
An area where data can be left on a permanent basis is memory._________________________
Question
A(n)microcomputer specializes in compute-intensive problems._________________________
Question
Digital technology has made it easy to produce copies of music with no loss of quality from the original._________________________
Question
A(n)supercomputer is a large and expensive computer capable of simultaneously processing data for hundreds or thousands of users._________________________
Question
DIPs and PGAs are both shapes of integrated circuits._________________________
Question
The set of instructions that tells a computer how to carry out processing tasks is a computer program._________________________
Question
The term server can refer to a combination of hardware and software._________________________
Question
A(n)account manager stores user IDs with their corresponding passwords and automatically fills in login forms._________________________
Question
A(n)keylogger is a form of malicious code._________________________
Question
Initially sales were slow for the personal computer because of ____.

A) price
B) size
C) lack of software
D) lack of availability
Question
A light switch is like a(n)analog device._________________________
Question
The ALU uses registers to hold data that is being processed._________________________
Question
A set of machine language instructions for a program is called source code._________________________
Question
____ software refers to any software that is installed on a computer's hard disk.

A) Local
B) Proprietary
C) Cloud
D) Digital
Question
____ is the process of converting text,numbers,sound,photos,and video into data that can be processed by digital devices.

A) Digitization
B) Analog conversion
C) Scanning
D) Rasterization
Question
Free source projects promote copying,free distribution,peer review,and user modifications._________________________
Question
The results of statements that have been compiled are called object code._________________________
Question
The first digital computers were built during World War II for ____.

A) census taking
B) code breaking
C) communication
D) troop placement
Question
In 1982,the percentage of households that had a computer was closest to ____ percent.

A) 10
B) 30
C) 50
D) 70
Question
____ media are cloud-based applications designed for social interaction and consumer-generated content.

A) Sharing
B) Wiki
C) Blogging
D) Social
Question
____ computing provides access to information,applications,communications,and storage over the Internet.

A) Distance
B) Disparate
C) Cloud
D) Local
Question
An area of a computer that temporarily holds data waiting to be processed is ____.

A) the CPU
B) memory
C) storage
D) a file
Question
The master controller for all activities that take place within a computer is ____.

A) application software
B) system software
C) the operating system
D) the CPU
Question
A set of computer programs that helps a computer monitor itself and function more efficiently is ____.

A) a software suite
B) system software
C) application software
D) processing software
Question
A global computer network originally developed as a military project is the ____.

A) World Wide Web
B) Internet
C) Wide-area network
D) Local-area network
Question
A named collection of data that exists on a storage medium is known as (a)____.

A) memory
B) file
C) file name
D) none of the above
Question
When restrictions on commercial use of the ____ were lifted in 1995,companies such as AOL and CompuServe became popular services.

A) World Wide Web
B) Internet
C) Wide-area network
D) Local-area network
Question
Technology ____ is a process by which several different technologies with distinct functionality evolve to form a single product.

A) evolution
B) rotation
C) convergence
D) diversification
Question
The ____ is a collection of linked documents,graphics,and sounds.

A) network
B) Web
C) cyberspace
D) Internet
Question
The ____ phase of the digital revolution materialized in the 1990s when the Internet was opened to public use.

A) first
B) second
C) third
D) fourth
Question
A computer is a multiple purpose device that can do all of the following EXCEPT ____.

A) store data
B) process data
C) accept input
D) think independently
Question
By 2011,Facebook had ____ million users.

A) 200
B) 350
C) 750
D) 950
Question
During the period from ____,computing was characterized by the Web,e-mail,multiplayer games,music downloads,and enormous software applications.

A) 1982-1985
B) 1985-1990
C) 1990-1995
D) 1995-2010
Question
An electronic component that can be programmed to perform tasks is a ____.

A) CPU
B) microprocessor
C) transistor
D) none of the above
Question
In a computer,most processing takes place in ____.

A) memory
B) RAM
C) the CPU
D) the motherboard
Question
A set of computer programs that helps a person carry out a task is ____.

A) an operating system
B) system software
C) application software
D) Windows
Question
A group of computers linked together to share data and resources is a(n)____.

A) network
B) Web
C) cyberspace
D) Internet
Question
According to the text,a key aspect of ____ is that it adds content and substance to ____.

A) the Web, the Internet
B) convergence, the cloud
C) the Internet, the Web
D) the cloud, local applications
Question
____ tools cloak a person's identity online.

A) Anonymizer
B) Free ID
C) ID free
D) Cloaking
Question
<strong>  The type of data where text,numbers,graphics,sound,and video have been converted into discrete digits as represented in the accompanying figure is ____.</strong> A) information B) analog C) digital D) none of the above <div style=padding-top: 35px>
The type of data where text,numbers,graphics,sound,and video have been converted into discrete digits as represented in the accompanying figure is ____.

A) information
B) analog
C) digital
D) none of the above
Question
The human-readable version of a program is called ____.

A) source code
B) program code
C) human code
D) system code
Question
The ____ houses all essential chips and provides connecting circuitry between them.

A) system board
B) housing structure
C) circuit breaker
D) chip set
Question
A super-thin slice of semiconducting material packed with microscopic circuit elements is a(n)____.

A) integrated circuit
B) computer chip
C) microchip
D) all of the above
Question
Data transmission speeds are typically expressed as ____.

A) bits
B) bytes
C) hertz
D) none of the above
Question
<strong>  The binary number 10 represents ____ in the decimal number system.</strong> A) 1 B) 2 C) 10 D) 100 <div style=padding-top: 35px>
The binary number 10 represents ____ in the decimal number system.

A) 1
B) 2
C) 10
D) 100
Question
A powerful desktop computer used for high-performance tasks is a ____.

A) mainframe
B) workstation
C) server
D) console
Question
<strong>  The type of code that uses only seven bits for each character is ____.</strong> A) ASCII B) Extended ASCII C) EBCDIC D) all of the above <div style=padding-top: 35px>
The type of code that uses only seven bits for each character is ____.

A) ASCII
B) Extended ASCII
C) EBCDIC
D) all of the above
Question
You might represent ____ using character codes.

A) color dots
B) bank balances
C) Social Security numbers
D) none of the above
Question
<strong>  The accompanying figure represents two types of chip carriers.The one on the right is a ____.</strong> A) PGA B) DIP C) PID D) GAP <div style=padding-top: 35px>
The accompanying figure represents two types of chip carriers.The one on the right is a ____.

A) PGA
B) DIP
C) PID
D) GAP
Question
<strong>  The accompanying figure represents two types of chip carriers.The one on the left is a ____.</strong> A) PGA B) DIP C) PID D) GAP <div style=padding-top: 35px>
The accompanying figure represents two types of chip carriers.The one on the left is a ____.

A) PGA
B) DIP
C) PID
D) GAP
Question
An ordinary personal computer that is connected to a network is a ____.

A) mainframe
B) workstation
C) server
D) console
Question
A(n)____ is a microprocessor-based computing device designed to meet the computing needs of an individual.

A) personal computer
B) mainframe
C) ALU
D) server
Question
Data becomes ____ when it is presented in a format that people can understand and use.

A) information
B) processed
C) graphs
D) presentation
Question
Digital devices can use ____ as a code to represent character data.

A) ASCII
B) Extended ASCII
C) EBCDIC
D) all of the above
Question
<strong>  The type of data that is represented using an infinite scale of values as represented in the accompanying figure is ____.</strong> A) information B) analog C) digital D) none of the above <div style=padding-top: 35px>
The type of data that is represented using an infinite scale of values as represented in the accompanying figure is ____.

A) information
B) analog
C) digital
D) none of the above
Question
<strong>  The type of code that uses eight bits for each character is ____.</strong> A) ASCII B) Extended ASCII C) EBCDIC D) all of the above <div style=padding-top: 35px>
The type of code that uses eight bits for each character is ____.

A) ASCII
B) Extended ASCII
C) EBCDIC
D) all of the above
Question
Storage is typically expressed as ____.

A) bits
B) bytes
C) hertz
D) none of the above
Question
C,BASIC,COBOL,and Java are examples of ____ programming languages.

A) low-level
B) computer
C) system
D) high-level
Question
A compute-intensive problem runs on a ____.

A) server
B) miniframe
C) supercomputer
D) super PC
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/147
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 1: Computers and Digital Basics
1
The number 9 can be considered a character.
True
2
Because most digital devices are electronic,bits take the form of electrical pulses.
True
3
The operand is a command word for an operation.
False
4
Privacy advocates fear that digital technologies are fundamentally changing our expectation of what is private and what is not.
Unlock Deck
Unlock for access to all 147 flashcards in this deck.
Unlock Deck
k this deck
5
The op code in a machine language instruction specifies the data.
Unlock Deck
Unlock for access to all 147 flashcards in this deck.
Unlock Deck
k this deck
6
The digital revolution became a significant factor in the 1980s but ended in the 1990s when the "dot com" bubble burst.
Unlock Deck
Unlock for access to all 147 flashcards in this deck.
Unlock Deck
k this deck
7
All computers are case sensitive.
Unlock Deck
Unlock for access to all 147 flashcards in this deck.
Unlock Deck
k this deck
8
Prior to 1940,the word computer was defined as a person who performs calculations.
Unlock Deck
Unlock for access to all 147 flashcards in this deck.
Unlock Deck
k this deck
9
To ensure you can remember your password it is a good idea to base it on information you can easily remember such as your birthday.
Unlock Deck
Unlock for access to all 147 flashcards in this deck.
Unlock Deck
k this deck
10
Semiconductor materials are substances with properties between those of a conductor and an insulator.
Unlock Deck
Unlock for access to all 147 flashcards in this deck.
Unlock Deck
k this deck
11
The purpose of a server is to serve computers on a network.
Unlock Deck
Unlock for access to all 147 flashcards in this deck.
Unlock Deck
k this deck
12
In the binary number system,2 is used to represent the value 2.
Unlock Deck
Unlock for access to all 147 flashcards in this deck.
Unlock Deck
k this deck
13
The first digital computer was developed for conducting the census.
Unlock Deck
Unlock for access to all 147 flashcards in this deck.
Unlock Deck
k this deck
14
An interpreter converts and executes one statement at a time.
Unlock Deck
Unlock for access to all 147 flashcards in this deck.
Unlock Deck
k this deck
15
Because of increased versatility,a videogame console is now considered a personal computer.
Unlock Deck
Unlock for access to all 147 flashcards in this deck.
Unlock Deck
k this deck
16
Facebook and Twitter are examples of social networking options.
Unlock Deck
Unlock for access to all 147 flashcards in this deck.
Unlock Deck
k this deck
17
An operating system is an example of application software.
Unlock Deck
Unlock for access to all 147 flashcards in this deck.
Unlock Deck
k this deck
18
  A compiler like the one shown in the accompanying figure converts all statements in a program to machine language in a single batch.
A compiler like the one shown in the accompanying figure converts all statements in a program to machine language in a single batch.
Unlock Deck
Unlock for access to all 147 flashcards in this deck.
Unlock Deck
k this deck
19
You should always use a different password for every account.
Unlock Deck
Unlock for access to all 147 flashcards in this deck.
Unlock Deck
k this deck
20
Trojans are computer programs that seem to perform one function while actually doing something else.
Unlock Deck
Unlock for access to all 147 flashcards in this deck.
Unlock Deck
k this deck
21
In the past,minicomputers were used for small businesses._________________________
Unlock Deck
Unlock for access to all 147 flashcards in this deck.
Unlock Deck
k this deck
22
An area where data can be left on a permanent basis is memory._________________________
Unlock Deck
Unlock for access to all 147 flashcards in this deck.
Unlock Deck
k this deck
23
A(n)microcomputer specializes in compute-intensive problems._________________________
Unlock Deck
Unlock for access to all 147 flashcards in this deck.
Unlock Deck
k this deck
24
Digital technology has made it easy to produce copies of music with no loss of quality from the original._________________________
Unlock Deck
Unlock for access to all 147 flashcards in this deck.
Unlock Deck
k this deck
25
A(n)supercomputer is a large and expensive computer capable of simultaneously processing data for hundreds or thousands of users._________________________
Unlock Deck
Unlock for access to all 147 flashcards in this deck.
Unlock Deck
k this deck
26
DIPs and PGAs are both shapes of integrated circuits._________________________
Unlock Deck
Unlock for access to all 147 flashcards in this deck.
Unlock Deck
k this deck
27
The set of instructions that tells a computer how to carry out processing tasks is a computer program._________________________
Unlock Deck
Unlock for access to all 147 flashcards in this deck.
Unlock Deck
k this deck
28
The term server can refer to a combination of hardware and software._________________________
Unlock Deck
Unlock for access to all 147 flashcards in this deck.
Unlock Deck
k this deck
29
A(n)account manager stores user IDs with their corresponding passwords and automatically fills in login forms._________________________
Unlock Deck
Unlock for access to all 147 flashcards in this deck.
Unlock Deck
k this deck
30
A(n)keylogger is a form of malicious code._________________________
Unlock Deck
Unlock for access to all 147 flashcards in this deck.
Unlock Deck
k this deck
31
Initially sales were slow for the personal computer because of ____.

A) price
B) size
C) lack of software
D) lack of availability
Unlock Deck
Unlock for access to all 147 flashcards in this deck.
Unlock Deck
k this deck
32
A light switch is like a(n)analog device._________________________
Unlock Deck
Unlock for access to all 147 flashcards in this deck.
Unlock Deck
k this deck
33
The ALU uses registers to hold data that is being processed._________________________
Unlock Deck
Unlock for access to all 147 flashcards in this deck.
Unlock Deck
k this deck
34
A set of machine language instructions for a program is called source code._________________________
Unlock Deck
Unlock for access to all 147 flashcards in this deck.
Unlock Deck
k this deck
35
____ software refers to any software that is installed on a computer's hard disk.

A) Local
B) Proprietary
C) Cloud
D) Digital
Unlock Deck
Unlock for access to all 147 flashcards in this deck.
Unlock Deck
k this deck
36
____ is the process of converting text,numbers,sound,photos,and video into data that can be processed by digital devices.

A) Digitization
B) Analog conversion
C) Scanning
D) Rasterization
Unlock Deck
Unlock for access to all 147 flashcards in this deck.
Unlock Deck
k this deck
37
Free source projects promote copying,free distribution,peer review,and user modifications._________________________
Unlock Deck
Unlock for access to all 147 flashcards in this deck.
Unlock Deck
k this deck
38
The results of statements that have been compiled are called object code._________________________
Unlock Deck
Unlock for access to all 147 flashcards in this deck.
Unlock Deck
k this deck
39
The first digital computers were built during World War II for ____.

A) census taking
B) code breaking
C) communication
D) troop placement
Unlock Deck
Unlock for access to all 147 flashcards in this deck.
Unlock Deck
k this deck
40
In 1982,the percentage of households that had a computer was closest to ____ percent.

A) 10
B) 30
C) 50
D) 70
Unlock Deck
Unlock for access to all 147 flashcards in this deck.
Unlock Deck
k this deck
41
____ media are cloud-based applications designed for social interaction and consumer-generated content.

A) Sharing
B) Wiki
C) Blogging
D) Social
Unlock Deck
Unlock for access to all 147 flashcards in this deck.
Unlock Deck
k this deck
42
____ computing provides access to information,applications,communications,and storage over the Internet.

A) Distance
B) Disparate
C) Cloud
D) Local
Unlock Deck
Unlock for access to all 147 flashcards in this deck.
Unlock Deck
k this deck
43
An area of a computer that temporarily holds data waiting to be processed is ____.

A) the CPU
B) memory
C) storage
D) a file
Unlock Deck
Unlock for access to all 147 flashcards in this deck.
Unlock Deck
k this deck
44
The master controller for all activities that take place within a computer is ____.

A) application software
B) system software
C) the operating system
D) the CPU
Unlock Deck
Unlock for access to all 147 flashcards in this deck.
Unlock Deck
k this deck
45
A set of computer programs that helps a computer monitor itself and function more efficiently is ____.

A) a software suite
B) system software
C) application software
D) processing software
Unlock Deck
Unlock for access to all 147 flashcards in this deck.
Unlock Deck
k this deck
46
A global computer network originally developed as a military project is the ____.

A) World Wide Web
B) Internet
C) Wide-area network
D) Local-area network
Unlock Deck
Unlock for access to all 147 flashcards in this deck.
Unlock Deck
k this deck
47
A named collection of data that exists on a storage medium is known as (a)____.

A) memory
B) file
C) file name
D) none of the above
Unlock Deck
Unlock for access to all 147 flashcards in this deck.
Unlock Deck
k this deck
48
When restrictions on commercial use of the ____ were lifted in 1995,companies such as AOL and CompuServe became popular services.

A) World Wide Web
B) Internet
C) Wide-area network
D) Local-area network
Unlock Deck
Unlock for access to all 147 flashcards in this deck.
Unlock Deck
k this deck
49
Technology ____ is a process by which several different technologies with distinct functionality evolve to form a single product.

A) evolution
B) rotation
C) convergence
D) diversification
Unlock Deck
Unlock for access to all 147 flashcards in this deck.
Unlock Deck
k this deck
50
The ____ is a collection of linked documents,graphics,and sounds.

A) network
B) Web
C) cyberspace
D) Internet
Unlock Deck
Unlock for access to all 147 flashcards in this deck.
Unlock Deck
k this deck
51
The ____ phase of the digital revolution materialized in the 1990s when the Internet was opened to public use.

A) first
B) second
C) third
D) fourth
Unlock Deck
Unlock for access to all 147 flashcards in this deck.
Unlock Deck
k this deck
52
A computer is a multiple purpose device that can do all of the following EXCEPT ____.

A) store data
B) process data
C) accept input
D) think independently
Unlock Deck
Unlock for access to all 147 flashcards in this deck.
Unlock Deck
k this deck
53
By 2011,Facebook had ____ million users.

A) 200
B) 350
C) 750
D) 950
Unlock Deck
Unlock for access to all 147 flashcards in this deck.
Unlock Deck
k this deck
54
During the period from ____,computing was characterized by the Web,e-mail,multiplayer games,music downloads,and enormous software applications.

A) 1982-1985
B) 1985-1990
C) 1990-1995
D) 1995-2010
Unlock Deck
Unlock for access to all 147 flashcards in this deck.
Unlock Deck
k this deck
55
An electronic component that can be programmed to perform tasks is a ____.

A) CPU
B) microprocessor
C) transistor
D) none of the above
Unlock Deck
Unlock for access to all 147 flashcards in this deck.
Unlock Deck
k this deck
56
In a computer,most processing takes place in ____.

A) memory
B) RAM
C) the CPU
D) the motherboard
Unlock Deck
Unlock for access to all 147 flashcards in this deck.
Unlock Deck
k this deck
57
A set of computer programs that helps a person carry out a task is ____.

A) an operating system
B) system software
C) application software
D) Windows
Unlock Deck
Unlock for access to all 147 flashcards in this deck.
Unlock Deck
k this deck
58
A group of computers linked together to share data and resources is a(n)____.

A) network
B) Web
C) cyberspace
D) Internet
Unlock Deck
Unlock for access to all 147 flashcards in this deck.
Unlock Deck
k this deck
59
According to the text,a key aspect of ____ is that it adds content and substance to ____.

A) the Web, the Internet
B) convergence, the cloud
C) the Internet, the Web
D) the cloud, local applications
Unlock Deck
Unlock for access to all 147 flashcards in this deck.
Unlock Deck
k this deck
60
____ tools cloak a person's identity online.

A) Anonymizer
B) Free ID
C) ID free
D) Cloaking
Unlock Deck
Unlock for access to all 147 flashcards in this deck.
Unlock Deck
k this deck
61
<strong>  The type of data where text,numbers,graphics,sound,and video have been converted into discrete digits as represented in the accompanying figure is ____.</strong> A) information B) analog C) digital D) none of the above
The type of data where text,numbers,graphics,sound,and video have been converted into discrete digits as represented in the accompanying figure is ____.

A) information
B) analog
C) digital
D) none of the above
Unlock Deck
Unlock for access to all 147 flashcards in this deck.
Unlock Deck
k this deck
62
The human-readable version of a program is called ____.

A) source code
B) program code
C) human code
D) system code
Unlock Deck
Unlock for access to all 147 flashcards in this deck.
Unlock Deck
k this deck
63
The ____ houses all essential chips and provides connecting circuitry between them.

A) system board
B) housing structure
C) circuit breaker
D) chip set
Unlock Deck
Unlock for access to all 147 flashcards in this deck.
Unlock Deck
k this deck
64
A super-thin slice of semiconducting material packed with microscopic circuit elements is a(n)____.

A) integrated circuit
B) computer chip
C) microchip
D) all of the above
Unlock Deck
Unlock for access to all 147 flashcards in this deck.
Unlock Deck
k this deck
65
Data transmission speeds are typically expressed as ____.

A) bits
B) bytes
C) hertz
D) none of the above
Unlock Deck
Unlock for access to all 147 flashcards in this deck.
Unlock Deck
k this deck
66
<strong>  The binary number 10 represents ____ in the decimal number system.</strong> A) 1 B) 2 C) 10 D) 100
The binary number 10 represents ____ in the decimal number system.

A) 1
B) 2
C) 10
D) 100
Unlock Deck
Unlock for access to all 147 flashcards in this deck.
Unlock Deck
k this deck
67
A powerful desktop computer used for high-performance tasks is a ____.

A) mainframe
B) workstation
C) server
D) console
Unlock Deck
Unlock for access to all 147 flashcards in this deck.
Unlock Deck
k this deck
68
<strong>  The type of code that uses only seven bits for each character is ____.</strong> A) ASCII B) Extended ASCII C) EBCDIC D) all of the above
The type of code that uses only seven bits for each character is ____.

A) ASCII
B) Extended ASCII
C) EBCDIC
D) all of the above
Unlock Deck
Unlock for access to all 147 flashcards in this deck.
Unlock Deck
k this deck
69
You might represent ____ using character codes.

A) color dots
B) bank balances
C) Social Security numbers
D) none of the above
Unlock Deck
Unlock for access to all 147 flashcards in this deck.
Unlock Deck
k this deck
70
<strong>  The accompanying figure represents two types of chip carriers.The one on the right is a ____.</strong> A) PGA B) DIP C) PID D) GAP
The accompanying figure represents two types of chip carriers.The one on the right is a ____.

A) PGA
B) DIP
C) PID
D) GAP
Unlock Deck
Unlock for access to all 147 flashcards in this deck.
Unlock Deck
k this deck
71
<strong>  The accompanying figure represents two types of chip carriers.The one on the left is a ____.</strong> A) PGA B) DIP C) PID D) GAP
The accompanying figure represents two types of chip carriers.The one on the left is a ____.

A) PGA
B) DIP
C) PID
D) GAP
Unlock Deck
Unlock for access to all 147 flashcards in this deck.
Unlock Deck
k this deck
72
An ordinary personal computer that is connected to a network is a ____.

A) mainframe
B) workstation
C) server
D) console
Unlock Deck
Unlock for access to all 147 flashcards in this deck.
Unlock Deck
k this deck
73
A(n)____ is a microprocessor-based computing device designed to meet the computing needs of an individual.

A) personal computer
B) mainframe
C) ALU
D) server
Unlock Deck
Unlock for access to all 147 flashcards in this deck.
Unlock Deck
k this deck
74
Data becomes ____ when it is presented in a format that people can understand and use.

A) information
B) processed
C) graphs
D) presentation
Unlock Deck
Unlock for access to all 147 flashcards in this deck.
Unlock Deck
k this deck
75
Digital devices can use ____ as a code to represent character data.

A) ASCII
B) Extended ASCII
C) EBCDIC
D) all of the above
Unlock Deck
Unlock for access to all 147 flashcards in this deck.
Unlock Deck
k this deck
76
<strong>  The type of data that is represented using an infinite scale of values as represented in the accompanying figure is ____.</strong> A) information B) analog C) digital D) none of the above
The type of data that is represented using an infinite scale of values as represented in the accompanying figure is ____.

A) information
B) analog
C) digital
D) none of the above
Unlock Deck
Unlock for access to all 147 flashcards in this deck.
Unlock Deck
k this deck
77
<strong>  The type of code that uses eight bits for each character is ____.</strong> A) ASCII B) Extended ASCII C) EBCDIC D) all of the above
The type of code that uses eight bits for each character is ____.

A) ASCII
B) Extended ASCII
C) EBCDIC
D) all of the above
Unlock Deck
Unlock for access to all 147 flashcards in this deck.
Unlock Deck
k this deck
78
Storage is typically expressed as ____.

A) bits
B) bytes
C) hertz
D) none of the above
Unlock Deck
Unlock for access to all 147 flashcards in this deck.
Unlock Deck
k this deck
79
C,BASIC,COBOL,and Java are examples of ____ programming languages.

A) low-level
B) computer
C) system
D) high-level
Unlock Deck
Unlock for access to all 147 flashcards in this deck.
Unlock Deck
k this deck
80
A compute-intensive problem runs on a ____.

A) server
B) miniframe
C) supercomputer
D) super PC
Unlock Deck
Unlock for access to all 147 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 147 flashcards in this deck.