1.
All of the following are examples of real
security and privacy risks EXCEPT:
A. 
B. 
C. 
D. 
2.
A process known as ____________ is used by
large retailers to study trends.
A. 
B. 
C. 
D. 
3.
____________terminals (formerly known as cash registers) are often
connected to complex inventory and sales computer systems.
A. 
B. 
C. 
D. 
4.
A(n) ____________ system is a small, wireless
handheld computer that scans an item’s tag and pulls up the current price (and
any special offers) as you shop.
A. 
B. 
C. 
D. 
5.
The ability to recover and read deleted or damaged files from a criminal’s computer
is an example of a law enforcement specialty called:
A. 
B. 
C. 
D. 
6.
Which of the following is NOT one of the
four major data processing functions of a computer?
A. 
B. 
Processing data into information
C. 
Analyzing the data or information
D. 
Storing the data or information
7.
____________ tags, when placed on an animal,
can be used to record and track in a database all of the animal’s movements.
A. 
B. 
C. 
D. 
8.
Surgeons can perform delicate operations by
manipulating devices through computers instead of manually. This technology is
known as:
A. 
B. 
C. 
D. 
9.
Technology no longer protected by copyright,
available to everyone, is considered to be:
A. 
B. 
C. 
D. 
10.
____________ is the study of molecules and
structures whose size ranges from 1 to 100 nanometers
A. 
B. 
C. 
D. 
11.
____________ is the science that attempts to
produce machines that display the same type of intelligence that humans do.
A. 
B. 
C. 
D. 
Artificial intelligence (AI)
12.
____________
is data that has been organized or presented in a meaningful fashion.
A. 
B. 
C. 
D. 
13.
The name for the way that computers
manipulate data into information is called:
A. 
B. 
C. 
D. 
14.
Computers gather data, which means that they
allow users to ____________ data.
A. 
B. 
C. 
D. 
15.
After a picture has been taken with a digital
camera and processed appropriately, the actual print of the picture is
considered:
A. 
B. 
C. 
D. 
16.
Computers use the ____________ language to
process data.
A. 
B. 
C. 
D. 
17.
Computers process data into information by
working exclusively with:
A. 
B. 
C. 
D. 
18.
In the binary language each letter of the
alphabet, each number and each special character is made up of a unique
combination of:
A. 
B. 
C. 
D. 
19.
The term bit is short for:
A. 
B. 
C. 
D. 
20.
A string of eight 0s and 1s is called a:
A. 
B. 
C. 
D. 
21.
A ____________ is approximately one billion
bytes.
A. 
B. 
C. 
D. 
22.
A ____________ is approximately a million
bytes.
A. 
B. 
C. 
D. 
23.
____________ is any part of the computer that
you can physically touch.
A. 
B. 
C. 
D. 
24.
The components that process data are located
in the:
A. 
B. 
C. 
D. 
25.
All of the following are examples of input
devices EXCEPT a:
A. 
B. 
C. 
D.