INFO160
Byte
8 bits (binary digits)
CPU activates BIOS → POST runs → BIOS loads OS → Registry configuration is checked → Desktop appears
8) Assuming that all steps are successfully completed, which of the following sequences shows the correct order for the boot process?
Bit
A ____ is short for binary digit. Each bit represents a 1 or a 0, or a single binary digit.
beta
A ________ version is free software that developers release hoping that users report errors they find before the commercial version is released.
virus
A computer program that attaches itself to another computer program and attempts to spread itself to other computers when files are exchanged is called a ________.
how does LCD work
A fluorescent panel at the back of the monitor generates light waves. When electric current passes through the solution the crystals move around, blocking light waves generated or letting them shine through, creating images on the screen.
false
A macro is a software tool that offers a step-by-step guide through complicated tasks.
ethernet
A network interface card (NIC) gives you access to which type of port?
virtual desktops
A new feature in Windows 10 that is used to organize open windows into task-specific groups is called
D
All of the following types of files can be removed by the Disk Cleanup utility EXCEPT ________. temporary Windows files Recycle Bin files temporary Internet files files that have not been backed up
how to choose an LCD
Consider aspect ratio and resolution. The aspect ratio is the width-to-height proportion of a monitor. The higher the resolution, the sharper and clearer the image will be. In general, the larger the LCD panel, the larger number of pixels it can display.
USB 3.0
Currently, which type of port has the fastest data transfer speed?
2
Do I face any risks when I install or download beta versions and freeware from the Internet? 1.Freeware contains up-to-date virus protection, and beta products are generally developed by reliable developers. As such, there aren't really any risks. 2.You must exercise caution when downloading freeware and beta versions as they may contain bug or viruses. 3.Freeware is associated with the risk of bugs or viruses, whereas beta products have built-in virus protection and are generally developed by reliable developers. Hence, it's important that you exercise caution with freeware. 4.The whole concept of freeware and beta versions assumes ethics and therefore they are thoroughly safe.
sniffers
Hackers can use packet ________ to capture valuable information, then sell or use the information illegally.
new folder, new group (on the home tab)
How do you create a new folder in File Explorer?
3
I've heard some friends talking about software that they got for free. Can you tell me more about free software? 1.Software you can use for free is called freeware or beta ware, but it prevents you from using the product once the initial trial period is over. 2.You can use freeware, which is software that can be used free for a limited time. Alpha versions, software still under development, are also available for free. 3.You can use freeware, software that is available for free, and beta versions, free software that is still under development. 4.Copyleft is the only free software.
start menu
In Windows 10, what feature is used to locate and launch software or applications installed on your device?
true
In the first step of the boot process, the CPU activates the BIOS, a program that manages the exchange of data between the OS and the input and output devices attached to the system. BIOS is stored on ROM so that its data does not get erased when the power is turned off.
Central Dogma of Info
Input data ->Processing data -> Output information
2
Is web page-authoring software the same type of software I would use if I wanted to design a brochure or newsletter? 1.Yes, you can easily use web page-authoring programs to design newsletters and brochures. 2.Actually, to design newsletters and brochures, you would need special software, such as Adobe InDesign. 3.Actually, you need special graphics software, like Adobe Premiere, to design newsletters and brochures. 4.Actually, Peachtree is the best software for designing newsletters and brochures.
bluetooth
Outsiders might try to infect your system through all of the following, EXCEPT
Saas (Software as a service)
Software that is available on demand via the Internet is called
ROM chip
The BIOS is stored in the ________.
third party verification
The Better Business Bureau seal on a website indicates _______
both
The Internet was created to provide.. a secure form of communications. a common communication means for all computers. both A and B neither A or B
left click
To add a tile to a group, ________ it and drag it into that group
drag the tile to the left or the right of any existing tile group and release the mouse button
To create a new tile group, ________. (1 point) right-click tile, and select New Group from the menu (not) drag the tile to the left or the right of any existing tile group and release the mouse button drag the tile to the New Group tile and release the mouse button (not) double-click tile, and select New Group from the menu (not)
disk cleanup
To remove unnecessary files from your hard drive, you would use the ________ Windows utility.
URL
Uniform Resource Locator
packet filter
Using a ________, you can screen data coming into the logical ports to see if it comes from a trusted source.
logical ports
Virtual communications gateways that allow a computer to accept requests for information from other networks or computers are called ________.
web based email account
What do you need if you want to read, send, and organize e-mail from any computer connected to the Internet?
breadcrumb trail
What is the navigation aid that shows users the path they have taken to get to a web page located within a website?
1
What kind of software will be needed for taking courses over the Internet? 1.Online classes are run through course management software programs. 2.Online classes are run through test preparation software. 3.Online classes are run through project management software. 4.Online classes are run through simulation programs.
3
What software do I need to create 3D graphics? 1.You need mapping programs to help you with this. 2.You need DTP software for this purpose. 3.You need CAD programs to create flowcharts. 4.You need simulation software for this purpose.
Saas
When a vendor hosts software on a website and you don't need to install the software on your device, this is known as:
color depth
When buying a monitor, which factor is NOT important to consider?
c (TIFF have higher compression)
When discussing image file types, which of the following is NOT true? (1 point) JPEG and TIFF are the two main file formats used by digital cameras. JPEG files are used for images in web pages. TIFF files have a higher compression ratio than JPEG files do. Incorrect answer Information is lost every time the file is saved in JPEG format.
You should assess that all web pages contain at least some valid information.
When evaluating the validity of information found on websites, which of the following is FALSE?
setup.exe
When installing new downloaded software, if the setup program doesn't automatically launch, you would _______: find the setup files where you downloaded them and run setup.exe open the Run Program dialog box open a command window and type run insert the CD/DVD in your DVD drive
restore
When installing new software on a Windows computer, it is a good idea to create a ________ point so that if problems arise, you can return your system back to how it was before you started.
details
When you are sorting files and folders in File Explorer, use ________ view to get the most interactive view available.
true
When you buy software, you can only use it as specified in the EULA.
zoom
Which editing tool would you use to enlarge an area of an image?
Amazon.com was one of the first websites on the Internet.
Which is NOT an event associated with the beginning of the Internet?
using a metasearch engine
Which is NOT an example of a keyword search strategy to get more specific results?
Edge (Microsoft)
Which of the following browsers was introduced with Windows 10?
monitor
Which of the following can be both an input and an output device?
all
Which of the following describes an IP address? It is referred to as a dotted quad. It identifies any computer connecting to the Internet. It identifies a website.
a
Which of the following describes copyleft? (1 point) terms enabling redistributing open source software terms restricting free use of software content terms enabling redistributing proprietary software terms enabling free use of software content
A, not alphabetical order
Which of the following is NOT an advantage of organizing files? It stores all files in alphabetical order. It separates users' data when using a shared computer. It allows for file sharing between users. It allows for quicker backup of important data.
adobe acrobat
Which of the following is NOT an image editing program? (1 point) Adobe Acrobat Photoshop Elements Windows Photo Gallery Paint-Shop Pro
optical mouse
Which of the following is NOT an output device? (1 point) touch-screen monitor laser printer speakers optical mouse
hard drive
Which of the following is NOT found on a motherboard?
displays files and folders as small icons and file names
Which of the following is NOT true about the Details view? (answer in full text) Its contents can be sorted by the date last modified. It displays files and folders as small icons and file names. It is the most interactive view. It provides the most information regarding its contents.
Barnes and Noble
Which of the following is an example of a click-and-brick business? (1 point) Amazon eBay Barnes and Noble Yahoo!
WAV
Which of the following is an uncompressed audio file format?
ARPANET
Which of the following is not an Internet protocol?
thunderbolt
Which of the following is the fastest data transfer port?
B
Which of the following is true about open source software? The program code is subject to copyright protection. The program can be changed and is freely distributed. The program code is confidential. The program can be freely distributed as long as the program code is not changed.
speech recognition
Which of the following is typically NOT found in web page-authoring software?
free versions are not available
Which of the following statements about image editing software is FALSE? (1 point) It can create photo montages. It can crop unwanted details. It can remove red eye. Free versions are not available.
C (Browsers will)
Which of the following statements is FALSE regarding safety and e-commerce? (1 point) Illegitimate sites can use security symbols illegally. A closed padlock on your screen indicates a secure connection. Browsers will alert you if you are processing a transaction on an unsafe site. Privacy policies indicate how your data will be used by a company.
instant messaging
Which of the following would be best for synchronous text-based communication?
fashion
Which of these is NOT a specialty search on Google?
dvd
Which of these is an example of optical storage media?
RAM
Which of these is considered volatile storage?
RAM
Which of these is located on the motherboard? (1 point) DVD drive RAM SSD drive Hard drive
Restart
Which power control option performs a warm boot?
wiki
Which technology is being used in creating a document on Google Drive?
crop
Which tool allows you to remove part of a picture?
social bookmarking
Which type of website would StumbleUpon be classified as?
2
Which web-authoring software enables users to create sophisticated web pages without knowing any HTML code? 1.A program like QuarkXPress allows you to create sophisticated web pages without knowing HTML code. 2.A program like Adobe Dreamweaver allows you to create sophisticated web pages without knowing HTML code. 3.A computer-aided design (CAD) program helps users create sophisticated web pages without knowing HTML code. 4.A desktop publishing program like Adobe InDesign helps users create sophisticated web pages without knowing HTML code.
false
Windows Firewall will detect or disable viruses and worms that are already on your computer.
true
You should use the Uninstall Program feature in the Control Panel to remove a software application from your computer.
USB
____ can store up to 256 GB's
open source
_____ _______ is free software that is distributed with few licensing and copyright restrictions.
jpeg
________ is a lossy image format.
desktop publishing
_________ ___________ software allows users to design and layout complex documents such as brochures and newsletters.
track
a "ring" around a disk
sector
a "wedge" around a disk
group
a collection of Tiles on the Start Menu
computer
a data processing device that performs four major functions, including processing data into information.
In an LCD
a fixed grid of pixels, or tiny dots, that create the images you see. Each pixel is comprised of three subpixels of the colors red, blue, and green.
Processor Speed
a measure of how many tasks the main chip in the computer can perform in one second. The "best" processor will depend on your particular needs and is not always the processor with the highest processor speed (GHz). Other factors, such as the number of cores in the CPU, additional memory, and how fast data is exchanged between the CPU and RAM, should be considered.
polymorphic virus
a virus that changes its own code to avoid detection
DTP (Desktop Publishing Software)
allows users to design and lay out complex publications. Programs such as QuarkExpress and Adobe InDesign offer a variety of tools with which you can format text and graphics.
trojan horse
appears to be useful but destroying stuff
CAD (Computer aided design)
are a form of 3D modeling that engineers use to create automated designs, technical drawings, and model visualizations.
worm
attempts to travel between systems through network connections to spread an infection
freeware
copyrighted software that is distributed without cost
Angel
course management software
firewall
creates a barrier between your computer and the Internet
Information
data that has been organized or presented in a meaningful fashion. Here, the data supplied to the computer (name, phone number, address, photo) has been processed appropriately so that it could be printed on an ID card.
QuarkXPress
desktop publishing software
distros
different version of Linux are called
full installation
does not allow you to select specific features
desktop
first seen when logging onto Windows
sectors and tracks
formatting divides disks into
botnet
group of software programs that usually run independently on a large number of zombie computers
directory
hierarchical structure that includes files, folders, and drives
firewire
high-speed port for hard drives and digital video devices
nonvolatile storage device
holds the data and instructions your computer needs permanently, even after the computer is turned off.
personal
home firewall
protocol
indicates the set of rules used to retrieve a specified document.
CMOS
is a type of memory that uses almost no power and is never erased. CMOS EPROM RAM VRAM
LCD (liquid crystal display)
light and energy efficient computer monitors-most popular type
extension
n c:\cis\400\proj3.docx, the docx is a(n)
thunderbolt
newest input/output technology on the market. It uses fiber optic technology and can achieve extremely fast transfer speeds- up to 40Gbps
keystroke logging
not a feature of security software
antivirus
prevents unwanted, malicious programs from being installed on your computer
how to choose a printer
printing speed (ppm), resolution (ppi), color output, and the cost of consumables.
alt (ernative search engine/meta)
search engines other than Google
specialty search engines
search only sites that are deemed relevant to the particular subject.
metasearch engines
search other search engines and generate results that are common to all or that have a high priority.
worms
slightly different from viruses as they can run independently of host file execution?
packet
small piece of data that travels through the Internet
script
small program that executes without your knowledge when you enter a website.
laser printer
static electricity to signal to the printer where to print ink. They offer faster printout times and higher quality printouts than inkjet printers.
ROM
stores computer start up instructions
RAM
stores information as long as the computer is on
cache
stores instructions and data used most often
CPU
the "brains" of the computer
binary language
the language of computers that consists of two digits
desktop
the primary working area in Windows 10
machine cycle
the process of the CPU getting the data or information from RAM and decoding the instructions into something the computer can understand. After decoding, the CPU executes and stores the results back into system memory as the last step of this.
Data
the representation of a fact, a figure, or an idea. Can be a number, a word, a picture, or even a recording of sound. Computers are excellent at processing this into information.
0 and 1
two digits of binary language
Hertz
unit of measure for processing speed. means "machine cycles per second."
ethernet, 10,000
used to connect a computer to a DSL or cable modem, or a network. This port transfers data at speeds up to _ _, _ _ _ Mbps.
programs and features
used to delete programs in Windows
Adobe Dreamware
web page-authoring software
word
what file tends to compress well?
domain name
what follows the http:// and consist of two parts: the first part indicates the site's host and the other part indicates the kind of organization the host is.
platter
what part of the disk has a magnetically sensitive coating
start menu
where you access installed applications in Windows 10
GB (gigabyte)
1 Billion bytes
MB (megabyte)
1 million bytes
TB (Terabyte)
1 trillion bytes - personal computers
PB (Petabyte)
1,000 Terabytes (so, 1,000 x 1 trillion)
KB (Kilobyte)
1,000 bytes
true
(T/F) A typical CPU can complete billions of machine cycles in one second.
false
(t/f) Downloaded software doesn't require a software license.
top level domain
.gov .edu .com are all examples of
loading the operating system
The power-on self-test does all of the following EXCEPT ________. (1 point) load the operating system identify the BIOS test the video card and video memory test memory chips
disk cleanup, error checking, disk defrag(mentor)
The schedule in the Sound Byte suggests running the system tools in the order ________.
access
The time it takes to select the correct platter and move the read/write head to the right track and sector is called the ________ time.