CGS final part 2

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

microsoft surface pro 4

by upgrading to its maximum capacity of 16 GB of RAM and 1 TB of storage, the ________________ tablet could be an extremely powerful computer

.wav and .mp3 and .M4A

common audio file formats

slower

if your actual internet speed is _____________ than your ISP's advertised speed, you should contact your ISP

analog

in order to change sound waves into digital signals, smartphones contain _____________ -digital converters

icon

in windows, a file is represented by a symbol that tells you which type of file it is. this symbol is called an _______________

broadcasts weak microwave signals to create "cells" of mobile coverage; connected to a cell tower; sends phone signals to the cellular provider's Mobile Switching Station (MSS)

what are the characteristics of a base transceiver station?

adjust your web browser's security settings to allow browsing only on trusted sites; never bypass your browser's built in security features

what can help prevent a virus infection?

wifi only tablets do not require a data plan

what is an advantage of a wi-fi only tablet over a cellular-enabled tablet?

-a device that isn't positioned properly can cause weak signals and system issues -check to make sure the cables are not damaged and that all cables are plugged in properly -a poor signal can also be an indicator that the hardware may be old or improperly positioned

what is true about troubleshooting a network?

-an SSID is the wi-fi's name -in home networks, after all the legitimate devices have connected to SSID once, transmitting the SSID is unnecessary -most routers transmit the SSID every few seconds so roaming devices can find the signal

what is true regarding a wi-fi's SSID?

-transmission connections are known as "hot spots" -transmit internet signals via radio waves -multiple devices can be connected to one signal

what is true regarding wi-fi?

US-CERT

what organization should you contact if you receive a phishing message?

wi-fi and cellular capable or wi-fi only

when it comes to connecting to the internet, a tablet computer can be:

a secure wireless network, a home wi-fi network, a public wi-fi network

cellular-enabled tablets can increase data plan usage, but there are several ways to connect to the Internet that will not result in increased data charges. some of these methods include:

roaming

if you're in an area where your home network doesn't have any cell coverage, but you're still able to make a call, you're probably ______________

WAN (wide access network)

when two or more LANs (local area networks) have been connected using a public network a _____________ is created

.exe

which of these extensions, if you open it, will probably install software onto your computer?

7

while theres no industry standard, a tablet computer typically has a screen size of at least __________ inches

OneDrive

Microsoft offers free cloud storage for everyone who has a microsoft email account. this is microsoft

right-click

One way to create a folder in Windows is to __________________ on any area in the Contents pane, and then click "new" and "folder"

PaaS

a programming environment used to develop, test, and disseminate web apps via the internet

File Transfer Protocol (FTP)

a protocol commonly used to transfer large files from one server to another on the internet is the _____________

rootkit

a type of malware that is triggered each time you boot your computer is called a

email

a virus that is attached in a file in and sent via email message is called an _________ virus

macro

a virus written in a specific language and placed within a document or spreadsheet is called a ______________ virus

dual

a wireless router that transmits wi-fi signals on 2 separate frequencies is a _____________-band router

hosted

an IP address is determined by the network on which it is

broadband

an internet signal that has enough bandwidth to allow multiple computers to be connected to the same router is called a ______________ signal

laaS

an organization uses servers in the cloud instead of buying and maintaining storage servers for their day-to-day business operations. this helps to reduce costs associated with hardware, software, and support employees

ipad mini series, ipad air series, ipad pro series

apple tablet offerings

antivirus

because smartphones are computers and have many of the same security risks as computers, you should have _____________ software on your smartphone

documents will not save; programs launch on their own

common symptoms of a computer virus

.docx and .odt

common word processing file extensions

use legitimate looking email messages to con a user into giving up private information; the illegitimate use of an email message that appears to be from an established organization such as a bank

descriptions of phishing

keystrokes, account numbers, passwords

examples of spyware

more

fiber optic cable is ___________ expensive than coaxial (television) cable to install

anti-malware apps

help protect against malware

anti-virus programs

help protect against viruses

firewalls

helps protect against worms and hackers

prepaid

if you don't want to sign a long-term contract, you might choose to purchase a ________________ phone.

3G

if you just need a phone for calling and texting, a ___________ phone can save you money

safe

if you notice you are receiving fake anti-virus messages, power down your computer and reboot your computer in ___________ mode

trojan horse

often accompanying downloaded music or apps, programs that appear to be legitimate, but executes unwanted activity when activated is called a _____________

CTRL + V

one way to copy a file to a new location is to click on the file and press CTRL + C and then move your cursor to the new site and press ________________.

Top Level Domains (TLD)

refers to the highest level in the domain name hierarchy

browsers

software applications that allow users to access and surf the world wide web are called _____________

plug ins

software, such as Java Runtime or Java Script, adds functionality to your browser. these types of software are called ____________

hacker

someone who attempts to gain unauthorized access to a network

switching

sometimes called an MSC server, the mobile _________________ station identifies your phone's signal so that you can receive calls

UBE (Unsolicited Bulk Email)

spam messages are sometimes called ___________ and are used for a variety of marketing purposes including selling products and services

session

stored in temporary memory, ______________ cookies are used to analyze and measure traffic on a web page

SaaS

the distribution of computer applications over the internet. commonly referred to as web apps

file servers, web servers, email servers

the internet includes a very large variety of servers including:

ethernet

the most popular network standard for LANs is ______________

signal

the small computer within your phone that enhances the sound quality of your call is called a digital _______________ processor

command

to change your folder's appearance, first click on the folder and then go to the ____________ bar and click

search

to look for a file or folder in windows 10, just type the file name in the ______________ box

CTRL + X

to remove a file from one folder and place it in another, click on the item and press ________________, then move your cursor to the new location and press CTRL + V

packet switching

unlike circuit switching, data transfer with ____________ doesn't rely on a dedicated physical path


Kaugnay na mga set ng pag-aaral

Fundamentals of Management - Motivation

View Set

COMP3322 Software Engineering Mid-term study guide

View Set

verb to be present ant past tenses

View Set

BIOL2107H Chapter 8: Cellular Respiration

View Set

NCLEX Passpoint: Endocrine and Metabolic Disorders

View Set