Computer Exam- Volume 1

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

A(n) ________ performs the same kind of computational work that a CPU performs but is specialized to handle 3-D graphics and image and video processing. GPU image engine accelerator SSD drive

GPU

A browser's ________ shows webpages users visited over a certain period of time.

History list

_______ is characterized by someone using personal information about you (such as your name or Social Security number) for the purpose of defrauding others.

Identity theft

_____ are often used to perform legitimate functions on websites, such as collecting names and addresses of customers, but some can be malicious and can infect your computer with a virus.

Scripts

________ is the default browser for Mac computers. Safari Apple Mozilla Firefox

Safari

Google ________ is a specialized search tool that searches scholarly literature such as peer-reviewed papers, theses, and publications from academic organizations.

Scholar

A mini-program that is executed without your awareness when you visit a website is called a(n) _______.

Script

What is a specialty search engine? A collection of bookmarks on a topic Fee-based search engines with human assistants A metasearch engine Searches only sites deemed appropriate to an interest or industry

Searches only sites deemed appropriate to an interest or industry

____ is a subcategory of e-commerce that uses social networks to help in marketing and purchasing products.

Social commerce

Which of the following is NOT routinely scanned by antivirus software? E-mail attachments Downloaded images Macros Spam

Spam

_____ makes the audio appear to come from all directions.

Surround Sound

Using a ________, you can screen data coming into the logical ports to see if it comes from a trusted source. DDoS token packet filter packet sniffer

packet filter

In the URL https://www.senate.gov/general, general is the ________. domain protocol top-level domain path or subdirectory

path or subdirectory

A firewall designed specifically for home networks is called a ________ firewall. personal static home logical

personal

The amount of RAM that is actually sitting on memory modules in your computer is referred to as _____ memory.

physical

Which of the following is an example of a subdirectory in a URL? .com prenhall.com/tia HTTP:// aol.com

prenhall.com/tia

The first part of a URL, such as http:, indicates the set of rules, or ________, used to retrieve the specified document. browser path protocol domain

protocol

If you are looking for a particular set of keywords in an exact order enclose your keywords in ________.

quotes

A ________ is a small program that executes without your knowledge when you enter a website. script worm macro keystroke logger

script

Response time refers to the amount of time it takes ________. to adjust the settings on a monitor for your computer to boot up to begin printing once you have clicked Print for a pixel to change color

for a pixel to change color

How do metasearch engines work? They suggest alternative search terms. They use wild cards, extensively. They search other search engines' results. They operate in a Boolean string.

They search other search engines' results.

Which of the following parts of a URL indicates the type of organization a host is? Domain name Path Top-level domain Protocol

Top-level domain

A game or screen saver that appears desirable or useful but when it runs does something malicious is called a(n) ____

Trojan horse

A(n) _____ is a program that appears to be something useful or desirable but does something malicious in the background without your knowledge.

Trojan horse

Which of the following ports has the fastest data transfer rate? DVI SVGA FireWire 800 USB 3.0

USB 3.0

A(n) ________ is a website's address.

Uniform Resource Location (URL)

Which is NOT an example of a keyword search strategy to get more specific results? Searching within a specific website Using a metasearch engine Using wild cards Using quotation marks around key words or phrases

Using a metasearch engine

Which of the following is NOT a good method to evaluate a website as appropriate for research? Using an ecommerce website Looking for clues of bias such as a specific agenda Paying attention to the URL to make sure it's from a respected source Using specialized search tools such as Google Scholar

Using an ecommerce website

Which of the following are considered slightly different from viruses as they can run independently of host file execution? Spam E-mail viruses Worms Keystroke logger

Worms

When evaluating the validity of information found on websites, which of the following is FALSE? You should assess that all web pages contain at least some valid information. You should verify information with other online and non-web sources. You should see if the site has the date when it was published. You should determine whether the information is biased.

You should assess that all web pages contain at least some valid information.

A(n) _____ program prevents unwanted malicious programs from being installed on your computer.

antivirus, anti-virus, anti-malware, or anti-spyware

For security reasons, you should be extremely wary of opening e-mail _____ such as an Excel file.

attachments

A program installed by hackers that allows them to take almost complete control of your computer without your knowledge is called a(n) ______ program.

backdoor or rootkit

A program that executes whenever a computer starts up, ensuring that the virus will be loaded into memory immediately, even before some virus protection programs can load is called a ________. multipartite virus boot-sector virus time bomb logic bomb

boot-sector virus

A large group of software programs that runs autonomously on zombie computers is called a(n) _______

botnet

A website's URL can identify all of the following things EXCEPT the ________. protocol used to retrieve a web document browser required to view the website file path for additional pages within the website website's domain name

browser required to view the website

Anyone who unlawfully breaks into an individual computer or a computer network is called a(n) ______

hacker

The list of results returned to you when you search for information on the web is called a list of ________. keywords strikes hits queries

hits

Which of the following is the correct way to indicate a URL? https://www.microsoft.com http:\www.microsoft.com http:/www.microsoft.com http:\\www.microsoft.com

https://www.microsoft.com

Data that has been organized is called ________. bytes information binary digits output

information

Your computer can get a virus by booting it with an infected ______ left in a USB port.

jump drive, flash drive, thumb drive, or USB drive

The individual words you use as search terms when using a search engine are referred to as ________. queries keywords wildcards hits

keywords

In reference to units of measurement, KB stands for _______

kilobyte

A(n) ________ printer uses toner rather than wet ink.

laser

LCD stands for ______

liquid crystal display

Flat-panel monitors are also called ______ monitors.

liquid crystal display (LCD) or light emitting diode (LED)

A virus that is triggered when certain logical conditions are met, such as opening a file or starting a program a certain number of times is called a ________. worm time bomb logic bomb macro virus

logic bomb

You can increase the number of USB ports on your computer by adding a(n) ________. jump drive repeater gateway expansion hub

expansion hub

A single forward slash and additional text following the domain name in a URL, specifies a particular ________. file or path domain host web page outside of the existing website

file or path

A good way to keep hackers out of a computer is to install a(n) ______

firewall

Virtual communications gateways that allow a computer to accept requests for information from other networks or computers are called ________. open ports logical ports a botnet e-mails

logical ports

The sequence of stages which process a single computer instruction is called the ________. kernel memory control cycle ALU machine cycle

machine cycle

A(n) ______ is a short series of commands that are usually used to automate repetitive tasks.

macro

Processor speeds are measured in units of ______

megahertz

Dogpile is an example of a(n) ________ engine.

metasearch

A(n) _______ searches other search engines rather than individual websites.

metasearch engine

An inkjet printer sprays ink onto the page and is an example of a(n) ______ printer.

nonimpact

Blu-ray and DVDs are referred to as _____ media.

optical and storage

In the URL https://www.senate.gov/committees/committees_home.htm, .gov is the ________. domain top-level domain protocol folder on domain

top-level domain

In a URL, two- or three-letter designations such as .edu or .uk are known as ________.

top-level domains (TLDs?)

URL stands for _________.

uniform resource locator

Flash drives plug into a(n) ________ port on a computer.

universal serial bus (USB)

The most common ports used to connect input and output devices are _______ ports.

universal serial bus (USB)

ShieldsUP and LeakTest are software programs you can use to test whether ________. your firewall is working correctly you have a memory leak your computer is a zombie packets arrive at their intended destinations

your firewall is working correctly

si.edu- Exhibitions- https://- .edu-

- domain - folder or subdirectory - protocol - top-level domain

The current surround sound standard is from _____

Dolby

A computer program that attaches itself to another computer program and attempts to spread itself to other computers when files are exchanged is called a ________. worm bug spam virus

virus

The * (asterisk) symbol is an example of a(n) _________ , which can used in performing searches with some search engines.

wild card

One byte is equal to ________. 8 characters 1 word 100 bits of data 8 bits of data

8 bits of data

________ services allow you to keep your files on the Internet so you can access your files from any computer.

Cloud

Because displaying graphics demands a lot of the CPU, a video card also comes with its own ________

Graphics Processing Unit

Which of the following ports do you need to use with a home theater system? FireWire DVI SVGA HDMI

HDMI

________ usually have the largest storage capacity of any storage device inside the computer. Flash memory cards Hard drives DVD drives Blu-ray drives

Hard drives

.com- .edu- .mil- .gov- .org-

- Chevrolet - Harvard University - U.S. Army - IRS - Alzheimer's Association

worm- Trojan horse- logic bomb- encryption virus- polymorphic virus-

- attempts to travel between systems through network connections to spread an infection - appears to be something useful but does something malicious in the background - executes when a certain condition is met - a program that renders your computer files unusable by compressing them - a virus that changes its own code to avoid detection

packet filtering- zombie- firewall- network address translation- packet sniffer-

- method for selectively allowing certain requests to access a port - a computer controlled by a hacker - hardware or software for protecting computers from hackers - technique of assigning hidden internal IP addresses to protect a network against hackers - program used by hackers to look at individual packets as they travel on the Internet

firewall- hacker- packet- botnet- virus-

- prevents intrusion into your computer - a person who poses a threat to your computer - small piece of data that travels through the Internet - group of software programs that usually run independently on a large number of zombie computers - a small program that can compromise a computer system

alternative search engine- specialty search engine- search strategies- keyword- quotation marks-

- search engines other than Google - searches only sites that are relevant to the particular subject - skills used to optimize search engine results - used by search engines to determine what to look for - enclose words or phrases to get exact hits

B2C- e-commerce- C2C- https- social commerce-

- transaction performed between a customer and an online store - business conducted online - transaction between two people at an online auction site - secure sockets layer protocol prefix - uses social networks to assist in marketing and purchasing products

Edge- Chrome- Firefox- Safari-

-Microsoft -Google -Mozilla -Apple

The top-level domain for the White House would be _____.

.gov

Which of the following is NOT an approved top-level domain? .net .uk .org .htm

.htm

________ floods a computer with requests until it shuts down denying access to legitimate users. An encryption virus A DoS attack A polymorphic virus Port blocking

A DoS attack

Which of the following is a program that appears to be something useful or desirable but does something malicious in the background? A zombie A Trojan horse A virus A worm

A Trojan horse

Which of the following is a program that appears to be something useful or desirable but does something malicious in the background? A zombie A Trojan horse A worm A bot

A Trojan horse

________ is the e-commerce term for transactions that take place between a business and other businesses. Brick-and-mortar C2C B2B Point-and-click

B2B

When a customer makes an online purchase from a store such as walmart.com, the transaction is referred to as a(n) _____ transaction.

B2C

Which of the following is an example of a click-and-brick business? Yahoo! Barnes and Noble Amazon eBay

Barnes and Noble

Which of the following statements is FALSE regarding safety and e-commerce? Privacy policies indicate how your data will be used by a company. A closed padlock on your screen indicates a secure connection. Browsers will alert you if you are processing a transaction on an unsafe site. Illegitimate sites can use security symbols illegally.

Browsers will alert you if you are processing a transaction on an unsafe site.

Craigslist is an example of a(n) ________ site.

C2C

The web browser created by Google is ________.

Chrome

Which of the following virus types uses the address book in the victim's e-mail system for distribution? Multipartite virus Macro Polymorphic E-mail virus

E-mail virus

Which of the following virus types infects your computer by running a program that searches for common types of data files (such as a Microsoft file) and compresses them using a complex encryption key that renders your files unusable? Stealth Macro Encryption Polymorphic

Encryption

Which of these is NOT a specialty search on Google? Scholar Finance Fashion Patent Search

Fashion

All of the following are web browsers EXCEPT ________. Firefox Chrome Linux Safari

Linux

The term ______ refers to businesses that have physical store locations as well as a website for online purchases.

click-and-brick

C2C stands for ______

consumer to consumer

The representation of a fact, figure, or idea is called ________. byte data input information

data

Attacks that are launched from multiple zombie computers at the same time are called ________. distributed denial-of-service attacks (DDoS) script kiddies worms Trojan horses

distributed denial-of-service attacks (DDoS)

The process of conducting business online is called ____

e-commerce

Which of the following is a popular example of a C2C site? Google Amazon.com Yahoo! eBay

eBay

A specialty search engine is a(n) ________. spider program which collects hits over time search engine that searches only sites that are relevant to a particular topic launch style search engine internal website search

search engine that searches only sites that are relevant to a particular topic

A metasearch engine is different than a regular search engine because it ________. searches for several keywords simultaneously is much faster than a regular search engine is a service that charges a fee for use, due to its superiority searches other search engines instead of individual websites

searches other search engines instead of individual websites

Hackers can use packet ________ to capture valuable information, then sell or use the information illegally. sniffers interceptors filters intruders

sniffers

A virus that is triggered by the passage of time is called a ________. logic bomb macro virus worm time bomb

time bomb

A virus that is triggered on a certain date is called a(n) _____.

time bomb

Images are created on an LCD monitor using millions of tiny dots known as _______ .

pixels

USB- Ethernet- DVI- VGA- HDMI-

-commonly used for connecting input and output devices - used to connect a computer to a network -commonly used to connect projectors to a computer system - commonly used to connect CRT monitors in older systems -used for home theater systems

GPU- video adapter- DVI- HDMI- eSATA-

-special processor for images and 3-D graphics -expansion card used to translate binary data into images -port used for digital LCD connection -port used for connecting gaming consoles -can be used to connect an external hard drive

random access memory- nonvolatile storage- ALU- motherboard- physical memory-

-temporary storage space - permanent storage - performs calculations and makes logic and comparison decisions - primary circuit board - the amount of RAM sitting on memory modules

Which of the following statements about flash memory is FALSE? A flash drive is needed to read a flash memory card. Some flash memory can be plugged directly into a USB port. Flash memory cards are often used in smartphones. Some flash memory cards can store 256 GB of data.

A flash drive is needed to read a flash memory card.

Which of the following is NOT an example of data? A word A picture A sound A report

A report

Which of the following statements is FALSE? When referring to computers, every number, letter, or special character consists of a unique combination of 8 bits. A single bit can represent a single letter. Everything a computer does is broken down into a series of 0s and 1s. Bit is short for binary digit.

A single bit can represent a single letter.

Which of the following CANNOT be represented by a single byte? A special character such as @ A number such as 45 A letter of the alphabet such as Y A word such as Tom

A word such as Tom

Which of the following does NOT determine CPU performance? Speed of the front side bus Amount of cache on the CPU Processor speed Amount of nonvolatile memory

Amount of nonvolatile memory

With a liquid crystal display (LCD) monitor, what causes images to be displayed on the screen? Static electricity Up and down movement of light Light surrounding the images An electric current passing through the liquid crystal solution and moving the crystals to either block the fluorescent light or let the light shine through

An electric current passing through the liquid crystal solution and moving the crystals to either block the fluorescent light or let the light shine through

Which of the following optical storage devices holds the most high-definition video? BD DVD Hard drive CD

BD

The ____ optical disc has the largest storage capacity.

Blu-Ray

Which of the following is NOT an optical storage device? Flash drive CD Blu-ray DVD

Flash drive

Which of the following statements about your computer's primary hard drives is FALSE? Some hard drives hold up to 8 TB of information. Hard drives are nonvolatile storage devices. Internal hard drives use a laser to read and write data. Internal hard drives are enclosed in the system unit.

Internal hard drives use a laser to read and write data.

Which of the following statements about assessing website security is TRUE? A website's information policy ensures that confidential information is kept secure. Just because a website has a return policy, it does not mean online transactions are secure. Websites that conduct online sales are required to take special precautions to ensure all transactions are secure. The URL of a secure website begins with shttps://.

Just because a website has a return policy, it does not mean online transactions are secure.

Which of the following is the smallest unit of measure? Terabyte Megabyte Gigabyte Petabyte

Megabyte

Which of the following is the largest unit of measure? Megabyte Terabyte Petabyte Kilobyte

Petabyte

The colors displayed by an LCD monitor are made by combining which of the following colors? Green, blue, and yellow Red, magenta, and blue Cyan, yellow, magenta, and black Red, blue, and green

Red, blue, and green

Which of the following does NOT indicate that a website is secure? The Microsoft seal displayed on the toolbar. A closed padlock appears in the toolbar. The URL begins with https://. The address bar is colored in green.

The Microsoft seal displayed on the toolbar.

The CPU includes which two sections? The arithmetic logic unit and the associative memory The control unit and the front side bus The control unit and the arithmetic logic unit The arithmetic logic unit and the front side bus

The control unit and the arithmetic logic unit

Which of the following is NOT a suggested way to protect yourself when shopping online? You should save a copy of the order. You should use a debit card. You should look for third-party verification. You should make sure the company has a phone number and street address.

You should use a debit card.

Bit is short for ________. megabyte kilobyte byte binary digit

binary digit

Computers work only with ________. binary numbers letters and symbols hexadecimal numbers decimal numbers

binary numbers

A CPU's ______ determines how quickly the processor can work.

clock speed

A monitor's ________ is a measure of the difference in light intensity between the brightest white and the darkest black colors. aspect ratio resolution brightness contrast ratio

contrast ratio

Which of the following is NOT a type of optical media? eSATA BD-ROM CD-R DVD-RW

eSATA

How many bits does it take to spell the word yes? 30 8 3 24

24

The fastest USB port currently available is using the new standard USB ____

3.1

Which of the following storage devices has the most capacity? BD DVD CD Cache

BD

Computers use ________ language to process data at the most basic level. computer C++ English binary

binary

Optical drives use a(n) ______ to store and read data on a CD or DVD.

laser

Cache memory is ________. a type of read-only memory slower than RAM permanent memory a type of random access memory that is more accessible to the CPU than regular RAM

a type of random access memory that is more accessible to the CPU than regular RAM

Two of the most important factors to consider when choosing an LCD monitor are its resolution and ________. dot pitch contrast refresh rate aspect ratio

aspect ratio

A high-capacity _______ hard drive is a viable, portable option for backing up the data on your computer's primary hard drive.

external

The _______ connects the CPU to the system memory.

front side bus and FSB

Which of the following ports are used to connect a computer to a cable modem or to a network? Ethernet DVI HDMI FireWire

Ethernet

Which of the following statements about CPU speed is FALSE? It is not the only indicator of a computer's speed. It is also called kernel speed. It can be determined by looking at the System Properties window. It is measured in gigahertz.

It is also called kernel speed.

________ are the places that peripheral devices attach to the computer. Gateways Repeaters Ports Hubs

Ports

______ remembers everything the computer needs to process data into information, but only while the computer is on.

RAM

The primary circuit board of a computer system is the ____

motherboard

Computer systems always include ________ devices for permanent storage of instructions and data. volatile storage nonvolatile storage kernel memory flash memory

nonvolatile storage

bit- byte- hertz- megabyte- terabyte-

- 0 or 1 - 8 binary digits -machine cycles per second -greater than a kilobyte, smaller than a gigabyte -more than one trillion bytes

USB 3.0 transfer rate- DVD storage capacity- Blu-ray storage capacity- eSATA transfer rate- USB 2.0 transfer rate-

- 5 Gbps - 7 GB of data - 50 GB of data - 3 Gbps - 400 Mbps

printer speed- printer resolution- inkjet printers- all-in-one- laser printers-

- measured in ppm - measured in dpi - affordable and produce photo-quality images - combines the functions of a printer, scanner, copier, and fax into a single machine - generally produce the highest quality printouts

Eight binary digits is equal to ________. 1 bit 1 byte 100 bytes 1 word

1 byte

To accommodate HD format video, new monitors have an aspect ratio of ________. 16:9 5:4 4:3 25:16

16:9

The resolution of a monitor has to be at least ________ to play a Blu-ray movie 1920 × 1080 1024 × 768 1366 × 768 1600 × 1200

1920 × 1080

_______ memory cards are removable storage devices that let you transfer digital data to a computer.

Flash

An LCD's viewing angle is measured in ________. refreshes megahertz degrees inches

degrees

A printer's resolution is measured in ________ ppm pixels pdf dpi

dpi

In reference to units of measurement, GB stands for ____

gigabyte

The amount of RAM recommended for most systems today is measured in ________. megahertz (MHz) megabytes (MB) gigabytes (GB) gigahertz (GHz)

gigabytes (GB)

A CPU's clock speed, is measured in ________. kilohertz (KHz) bytes per second (Bps) gigahertz (GHz) bits per second (bps)

gigahertz (GHz)

On secure websites, http changes to ________. shttp httpsecure https sws

https

The small circuit boards that hold RAM chips are known as ____

memory modules

The small circuit boards that hold a series of RAM chips are called ________. virtual memory expansion cards memory modules flash memory cards

memory modules

The CPU is located on the computer's ________. hard disk kernel motherboard flash memory

motherboard

If you want to be able to use a form of optical media (such as a CD or DVD) that you can write to as many times as you like, your media should be in _____ format.

read/write

A ________ drive has no moving parts. Blu-ray solid state compact disc hard disk

solid state

The sound in Dolby's eighth channel is sent to a(n) _____

subwoofer

RAM is an example of _______ storage because when the power is turned off, RAM is cleared out.

temporary

The percentage of time your CPU is working is referred to as CPU ________. throughput usage capacity latency

usage

An expansion card that translates binary data into images is a(n) ________ card. audio sound game video

video

Video cards include their own RAM, called ______

video memory

A megabyte holds approximately ________ bytes of data. 1,000,000,000,000 1,000,000,000,000,000 1,000,000,000 1,000,000

1,000,000

A kilobyte holds ________ bytes of data. 1,048,576 1,024 16 256

1,024

contrast ratio- brightness- viewing angle- response time- resolution-

-the difference in light intensity between the brightest white and the darkest black colors a monitor can produce -measured as candelas per square meter -tells how far you can move to the side, above, or below a monitor before the image quality degrades below acceptable levels - how long it takes a pixel to change color -number of pixels displayed on a screen

A bit consists of a ________. series of 0s and 1s such as 101 single letter such as R and B 0 or a 1 number such a 2 or 9

0 or a 1

An LCD screen is composed of a fixed grid of ________. rays organic materials pixels phosphors

pixels

Speed for printers is measured in ________. ppm Kps Mhz pps

ppm

A(n) ______ printer works either by melting wax-based ink onto ordinary paper or by burning dots onto specially coated paper.

thermal

The Better Business Bureau seal on a website indicates ________. a business to consumer (B2C) site a business to business (B2B) site purchases can only be done using credit cards third-party verification

third-party verification

A kilobyte contains approximately one ________ bytes of data. million thousand billion hundred

thousand

A(n) ______ is also referred to as a jump drive, USB drive, or flash drive.

thumb drive

The _______ of a monitor tells how far you can move to the side, above, or below the monitor before the image quality degrades to unacceptable levels.

viewing angle


Kaugnay na mga set ng pag-aaral

Module 7 - Point Of Care Testing And Laboratory Procedures

View Set

ATI Pharmacology 4.0 Hematologic System

View Set

NSG 170 lecture *EXAM 4 (sexuality/reproduction)

View Set

Topic 5: The Statement of Cash Flows

View Set

Aristotle's Ethics / The Golden Mean

View Set

CCNA Final Set 2, CCNA 2 Final set 1

View Set

Frankenstein Reading Questions Chapters 9-10

View Set