Introduction to Computers
"Full HD" resolution is expressed as:
1920 x 1080
Twitter recommends using no more than ___ hashtags per Tweet.
2
CPU clock speeds of a personal computer range between
2 to 4 Gigahertz
Tweets can be a maximum of ___________ characters.
280
What is the minimum amount of RAM you should have on a laptop?
4 GB
Some computers use ____________ to represent characters in binary format.
ASCII
OS X Sierra is owned and maintained by ___________.
Apple
A wireless short-range transmission protocol is called ________.
Bluetooth
What was the major question that ARPAnet wanted to solve?
Could a network be built that would continue to work even if multiple parts collapsed?
A ________ attack on a network is created to stop or interrupt traffic by saturating it with too many requests.
DDos
The protocol used for transmitting large files from one server to another over the internet is known as the ____________ Protocol (FTP).
File Transfer
A protocol commonly used to transfer large files from one server to another on the Internet is the ___.
File Transfer Protocol
Which is not considered an e-commerce transaction?
G2B
MC Android OS is owned and maintained by _________.
Google (Alphabet)
Letting computer users drag images and documents across their computers' monitors made the ___ User Interface very popular.
Graphical
Today, the standard port for video and auto input on TV is the ___________ port.
HDMI
which chip and manufacturing company is the largest in the world?
Intel
ISP stands for
Internet Service Provider
The processor directly houses the _________ cache.
L1
All of the following are common ports that are included with laptop computers except
MIDI ports
Windows OS is owned and maintained by _____ .
Microsoft
____________ runs the processor faster than recommended by the manufacturer. This can increase performance and speed, but will also void the manufacturer warranty.
Overclocking
Unlike phishing that uses fake e-mails to gain personal information about a user. __________ uses fake websites to gain personal information.
Pharming
Software comes in various categories. One category is system software, which provides the instructions that hardware needs to operate (iOS, Android, Windows, etc.). Another category is game software (League of Legends, Hearthstone, Angry Birds, etc.). Another category of software includes applications such as Office 365, iWork, QuickBooks, Googledocs, etc. This software is referred to as ___ software.
Productivity
The information in ____________ is dumped when a computer is shut down.
RAM
system BIOS (basic input/output system) is stored in ______.
ROM
Most tablets and phones use _____ as their main storage device.
SSD
A signal transmitted every few seconds by a wireless router so that users' computers can find the WI-FI hotspot is called a(n)
SSID
An unwelcome e-mail message is called ___________.
Spam
You need to uninstall a program in Windows 10. Where would you click first?
Start Button
The World Wide Web was created through a collaboration led by______.
Tim Berners-Lee
The highest level of in the domain name hierarchy is known as the ____________.
Top Level Domain
The Federal ________ Commission is the main government organization that oversees Internet privacy.
Trade
This type of connector is the most common type of connection to a computer for peripherals (printers, monitors, storage devices, etc.)
USB
Today, many computers use ___________, a coding scheme that uses at least 16 bits to represent a character.
Unicode
URL stands for ___ Resource Locator.
Uniform
The capacity of a particular transmission medium is called it _______.
bandwidth
The capacity of a particular transmission medium is called its
bandwidth
Software applications that allow users to access and surf the World Wide Web are called ___________.
browsers
The two main factors that affect the speed of the processor are clock speed and ___________.
bus width
In ASCII 8 bits are combined to create a ______.
byte
Including RAM, modern processors keeps frequent and temporary accessed data in _____________ .
cache
Clock speed, also known as ________, is the speed at which the processor performs the operations required to run a digital device and the digital device's instructions.
clock rate
A site on the Windows operating system where you can uninstall programs, adjust settings, and manage tasks is the _____.
control panel
The most popular web browsers have a private browsing mode (incognito). While browsing in Incognito mode your browser will not store ________.
cookies
Repeated and deliberate harassment or harassment of a person or group of people through information technology and networks is called?
cyberbullying
A person who uses computers and the internet to launch attacks against computer systems for political or ideological reasons is called a _______________.
cyberterrorist
Devices with a separate system unit and a relatively large footprint are called _____ computers.
desktop
RAM is ________ and has no moving parts.
electronic (solid state)
E-commerce is short for _____________.
electronic commerce
The machine cycle consists of which four steps?
fetch, decode, execute, store
Which transmission media has the largest bandwidth?
fiber optic
The risks of downloading a file from the Internet includes all except
fileware
A security system separating two networks or even computers on the same network is called a ___________.
firewall
Which of the following is a strength of the Linux platform?
free to download and use
Typical tablet or smartphone SSD capabilities are measured in __________.
gigabytes
A person with unlawful access to networks to steal and corrupt information and data is called a
hacker
Breaking into a computer system (hacking), for politically or socially purposes is called _____________.
hacktivism
The SSD cost is ________ than the traditional hard drive cost.
higher
All of the following should be taken into account when using Twitter, except
if a Twitter user has been blocked you can file a formal complaint through Twitter.
Malware is designed to do all of the following except
improve data
A TV remote usually uses ________ waves.
infrared (IR)
Although it sound ironic, searching the _________ in your area is an efficient way to search for an ISP.
internet
Megahertz is the same as a ________ cycles (or instruction) per second
million
A laptop typically has __ RAM than a smartphone
more
Fiber-optic cable is _____________ expensive than coaxial cable to install.
more
Electronic etiquette is also known as ______.
netiquette
Linux is owned by______.
no one
Avoiding viruses include all of the following except
only visit trusted sites
All of the following are protected by intellectual property laws against unauthorized use or distribution, except
open educational resources
What manages hardware and software, supports the computer's basic functions, and runs programs?
operating system
The three most common types of email viruses include all except
password savers
The BitTorrent protocol is often called ____________ file sharing.
peer-to-peer
Once you accept a Facebook friend request, you have access to their ____________ Facebook page.
personal
A request for an electronic "echo" or response from another computer or server is called a ____.
ping
The smallest image element is a(n)
pixel
A point in a computer (hole or slot) that accepts a specific connector is called a
port
Apps designed to make individuals or businesses more efficient are categorized as___________ software
productivity
Your _____________ on Facebook is a collection of photos and stories telling people about you and your experiences.
profile
If antivirus software cannot delete an infected virus, it will send the file to a hard disk area called __________.
quaratine
what is the primary purpose of defragmenting your hard drive?
reduces the time it takes to find files on your hard drive.
The device that connects two networks is a _______.
router
Because they are both apple products, the browser that works the smoothest with Macintosh OS X is
safari
Amateur computer hackers with little programming expertise, who illegally access computer systems by the means of programs (scripts) written by others, are called _____ .
script kiddies
Privacy and ________ are the two main factors related to your digital identity.
security
WhatsApp messenger is a cross-platform messaging app that allows you to ____________ and receive messages without having to pay for SMS (text messaging).
send
Resolution refers to the __________ and clarity of an image.
sharpness
A processor that consists of one control unit and one ALU is called a ___________.
single-core processor
Contact your ISP if your actual Internet speed is _____ than advertised.
slower
The average tablet has a ____ hard drive compared to the average desktop computer.
smaller
Taken and shared photos or videos on Snapchat are called
snaps
Programs that offer the structure and hardware control necessary to run the computer and its peripheral devices are called _____ software.
system
Which has the most storage capacity?
terabyte
Which of the following is true (strength) of the Android platform?
the OS used in most smartphones and tablets.
One of the main differences between free and fee-based antivirus software is ________________.
the number of features
Since they are low-priced and reliable, _________ storage devices are extremely popular.
thumb drives (USB or flash drives)
Wyatt has purchased a new laptop and found it came with many programs that he does not want. He should _____ the programs from his device so they do not take up storage space.
uninstall
Cookies stored on a computer store information about ________.
user preferences
Software that infects a computer and is created by a computer code is called a
virus
A hacker has control over your computer and can now use it to launch attacks on other computers and systems. Your computer is known as a ___________ computer.
zombie