Computer Systems

¡Supera tus tareas y exámenes ahora con Quizwiz!

a type of graphic file

.jpg

a document that lists guidelines and repercussions of use of the Internet and other digital company resources, including network storage, and email servers

AUP

portion of a URL that identifies one or more IP addresses

domain name

often contains toxic metals such as lead or mercury

e-waste

specifies the design and arrangement of items that you use so that you interact with the items effieciently and safely

ergonomics

A spool is an area of memory that stores data and information waiting to be sent to an input or output device.

false

A switch is a device that connects two or more networks and directs the flow of information along the networks.

false

Data travels in and out of the CPU through imbedded wires called a motherboard.

false

Input is information processed into a useful form, such as text, graphics, audio, video, or any combination of these.

false

Menus are windows with controls that let you tell the operating system how you want to complete a command.

false

Static webpages may contain customized content, such as the current date and time of day, desired stock quotes, weather for a region, or ticket availability for flights.

false

The "s" in https stands for standardized

false

To broaden a search, you can use a Boolean operator, which is the base of a word.

false

Two users can have the same email address.

false

Volatility is an electrical disturbance that can degrade communications.

false

iOS is an example of a desktop operating system

false

preferred websites that you can access with a click or selecting an icon from a folder

favorite

contains many microscopic pathways capable of carrying elecrtical current

integrated circuit

term used to refer to the major carriers of network traffic

internet backbone

an environment where processors are embedded in every product imaginable, and the products communicate with one another via the Internet or wireless networks

internet of things

game controller with a handheld vertical lever, mounted on a base, that you move in diffferent directions to control the actions of a simulated vehicle or player

joystick

a freestanding booth usually placed in a public area that can contain a display device used to show information to the public or event attendees

kiosk

a special folder that catalogues specific files and folders in a central location

library

a communications device that connects a communications channel, such as the Internet, to a sending or receiving device, such as a computer

modem

define who can access certain resources and when they can access those resources

permissions

a chip that contains a central processing unit

processor

the components required to perform work, including the processor, RAM, storage space, and connected devices

resources

a hard drive without moving parts

solid-state drive

used to defend equipment form spikes, surges, and noises

surge protector

thin, light-weight mobile computer that has a touch screen

tablet

descriptive text used to categorize media and invite comments

tag

technique that transforms a smartphone or Internet-capable tablet into a portable communications device that shares its Internet access with other computers and devices wirelessly

tethering

A benchmark is a test run by a laboratory or other organization to determine processor speed and other performance factors.

true

A copyright gives authors and artists the legal right to sell, publish, or distribute an original work.

true

A cycle is the smallest unit of time a process can measure.

true

A news or activity feed on a social media site provides a listing of the most recent content posted to the network.

true

A partition is a section of a hard disk that functions like a separate disk.

true

A program window displays the contents of a folder, drive, or device.

true

A surge suppressor is a device that maintains power to computer equipment in case of an interruption in the primary electrical source.

true

A tag is descriptive text used to categorize media and invite comments.

true

Before you can connect to the Internet, you must identify the network using its service set identifier (SSID).

true

Cloud storage involves storing electronic files on the internet, not on a local computer.

true

Crawlers comb the web to find webpages and add new data about them to the database.

true

Doxxing is a form of cyberbullying in which documents (doc) are shared digitally that give private or personal information about a people, such as their contact information or medical records.

true

Every program or app, including the operating system, requires RAM.

true

No single person or government agency controls or owns the Internet.

true

On a networked computer, such as at your school or workplace, you will not have access to the administrator account.

true

SaaS operating systems are distributed online for a monthly subscription or an annual fee.

true

System software is the software that runs a computer, including the operating system.

true

The four steps in the machine cycle are: fetching, decoding, executing, and storing.

true

When you save a file, the program or app assigns the file extension.

true

will run on newer versions of an operating system

upward compatible

allows an operating system to temporarily store data on a storage medium until it can be "swapped" into RAM

virtual memory

the practice of sharing computing resources, such as servers or storage devices, among computers and devices on a network

virtualization

memory that loses its power when power is removed

volatile

computer that delivers requested webpages to your computer or mobile device

web server

a collaborative website where you and your colleagues can modify and publish content on a webpage

wiki

Captioning software displays scrolling text for dialogue in a video.

True

The Internet makes it easier to pirate, or copy or use someone else's work and claim it as your own.

False

Use humorous or informal names for your account profiles, blog, or domain name.

False

With phishing, an attacker who presents to be from a legitimate research firm asks for personal information.

False

Netiquette includes the code of acceptable behaviors users should follow while on the Internet.

True

The basic premise of IoT is that objects can be tagged, tracked, and monitored through a local network or across the Internet.

True

in the 1980s, its source code was licensed to many hardware and software companies to customize for their devices and applications

UNIX

enables a computer or device to run another operating system in addition to the one installed

VM

type of desktop computer that does not contain a tower and instead uses the same case to house the display and the processing circuitry

all-in-one

series of related instructions, organized for a common purpose, that tells the computer what tasks to perform and how to perform them

app

characters, words, or symbols that refine a search

boolean operator

determines the speed at which data travels

buswidth

real-time typed conversations by two or more people who are online at the same time

chat

Linux-based operating system designed to work primarily with web apps

chrome OS

term that describes the trend of computers and devices with technologies that overlap

convergence

website or web app that gathers, organizes, and then distributes web content

curation website

raw facts, such as text or numbers

data

a policy enabling employees to use their personal devices to conduct business

BYOD

A company's computers monitor assembly lines and equipment using modem to modem (M2M) communications to communicate between machines, equipment, and devices to perform tasks.

False

Electronic components in computers process data using instructions, which are the steps that tell the computer how to perform a particular task.

False

web-based training site where students can check their progress in a course, take practice tests, and exchange messages with the instructor or other students

LMS

A computer is an electronic device, operating under the control of instructions stored in its own memory, that can accept data, process the data to produce information, and store the information for future use.

True

A user is anyone who interacts with a computer or mobile device, or utilizes the information it generates.

True


Conjuntos de estudio relacionados

NUR 332: cardio coursepoint pt. 2

View Set

PASSPOINT: Psychosocial Integrity

View Set

International Financial Management

View Set

Psychology in Everyday Life Chapter 1 3 4 and 5

View Set

History Final: The United States as a World Power

View Set