1. A process known as ___________ is used by large retailers to study trends.
A. Data mining
2.The ability to recover and read deleted or damaged files from a criminal’s computer is an example of a law enforcement specialty called:
A. computer forensics
3. ____ tags, when placed on an animal, can be used to record and track in a database all of the animal’s movements.
A : RFID
4. _______ is the study of molecules and structures whose size ranges from 1 to 100 nanometers.
A. Nanoscience
5. ______ is data that has been organized or presented in a meaningful fashion.
A. Information
6. The name for the way that computers manipulate data into information is called:
A. Processing.
7. _____ is the science that attempts to produce machines that display the same type of intelligence that humans do.
A. Artificial intelligence (AI)
8. The term bit is short for:
A. binary digit.
9. A string of eight 0s and 1s is called a:
A. Byte.
10. ______ is any part of the computer that you can physically touch.
A. Hardware
11. The CPU and memory are located on the:
A. motherboard.
12. The ____, also called the “brain” of the computer, is responsible for processing
data.
A. CPU
13_______ is a set of computer programs used on a computer to help perform tasks.
A.Software
14. System software is the set of programs that enables your computer’s hardware devices and ______ software to work together.
A. application
15. Servers are computers that provide resources to other computers connected to a:
A. network.
More Questions >>
No comments:
Post a Comment