CS120 Practice Cards

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Data is given to the computer through _______ devices. Internet CPU Input Output

Input

A(n)_____ is a narrow opening in the motherboard that allows for insertion of an expansion board. system slot expansion slot extension slot bus slot

expansion slot

________ expands compressed files. Disk caching File decompression Data caching File compression

file decompression

A ________ acts as a security buffer between a corporation's private network and all external networks. password virus checker firewall disaster recovery plan

firewall

The _____ is the highest display mode an LCD monitor can support. polarization amplification maximum resolution lumen value

maximum resolution

A computer's _____ temporarily stores data by holding a 1 and 0 value in each transistor and then reporting it when requested to do so. register CPU memory pipeline

memory

Which term refers to the viewable area of any display device? port screen output bus

screen

A byte is formed by a group of _______. Select one: a. 4 bits b. 8 bits c. 12 bits d. 16 bits

8 bits

Which of the following is not malware? worms Ad-Aware Trojan horses viruses

Ad-Aware

Specialized devices with a large display connected to a computer projector and are widely used in classrooms and corporate boardrooms. scanners E-books HDTV digital or interactive whiteboards

Digital or interactive whiteboards

The windows troubleshooting utility that identifies and eliminates nonessential files is called ________. Disk Cleanup Storage File History Disk Defragmenter

Disk Cleanup

The process of coding information to make it unreadable except to those who have a special piece of information known as a key. restriction protection security encryption

Encryption

________ is the process of coding information to make it unreadable except to those who have a special piece of information known as a key. Decryption Restriction Prevention Encryption

Encryption

Before sending a large file over the Internet, you might want to use one of these programs. Uninstaller Disk cleanup program File compression program Disk defragmenter

File compression program

A ________ is an example of an IoT device. Fitbit land line telephone bicycle railway car

FitBit

A ________ is someone who gains unauthorized access to computer systems. hacker cracker logger cookie

Hacker

The continuing development of the Internet that allows everyday objects embedded with electronic devices to send and receive data over the Internet. IoT IoW Web 3.0 cloud

IoT

Which of the following is a function of the control unit? It uses the logic to compare two pieces of data. It provides pathways that support communication among the various electronic components. It performs fundamental math operations like addition, subtraction, and so on. It directs the movement of electronic signals between memory and the arithmetic-logic unit.

It directs the movement of electronic signals between memory and the arithmetic-logic unit.

What does an audio port on a sound usually look like? It's a small, circular hole with a 3.5-millimeter connector plugged into it. It resembles the port used for a telephone jack but is a little wider. It's a small, round port that is either orange or purple. It looks like a 25-pin female D-sub connector.

It's a small, circular hole with a 3.5-millimeter connector plugged into it.

This reading device is used in banks to read the numbers on the bottom of checks and deposit slips. OMR OCR UPC MICR

MICR

________ operating systems are used to control and coordinate computers that are linked together. Stand-alone Real-time Embedded Network

Network

A _____ computer is a PC that's designed for people who frequently move about in their work. notebook mainframe desktop supercomptuer

Notebook

Which part of an information system consists of the rules or guidelines for people to follow? data Internet people procedures

Procedures

The set of instructions that controls a computer is called a processor program database chip

Program

This computer component holds the program and data that is currently being processed.

RAM

Which of the following is not an example of secondary storage? RAID RAM external hard drives flash drives

RAM

_____ is the type of memory people typically mean when they refer to computer "memory." Read-only memory (ROM) Hard Disk Drive (HDD) Random-access memory (RAM) CPU

RAM

A ________ Wi-Fi hotspot imitates a legitimate free Wi-Fi hotspot in order to capture personal information. worm phishing rogue viral

Rogue

A ________ engine is a specialized program that assists you in locating information on the web and the Internet. wiki micro cloud search

Search

________ software consists of operating systems, utilities, device drivers, and language translators. System Suite Mobile Device

System

"Background" software that helps the computer manage its own internal resources is called ________. system software application software shareware desktop

System Software

This hardware houses most of the electronic components that make up a computer system. secondary storage communication input/output devices system unit

System Unit

_____ is also known as primary storage and random access memory (RAM). Hardware Software Main storage Temporary storage

Temporary Storage

________ speed is the measure of the amount of time required by a storage device to retrieve data and programs. Ethernet Access Pixel Bit rate

access

Which of the following measures the amount of time required by the storage device to retrieve data and programs? nonvolatile media capacity RAM access speed

access speed

The processing speed of a microprocessor is typically represented by its ________. control unit bus line clock speed ALU

clock speed

Storing data files on a(n) _____ keeps them safe, because their existence doesn't depend on the health of your computer's own hardware. optical disc attached storage device hard disk drive cloud drive

cloud drive

This allows you to upload and store documents on the Internet. flash drive hard disk drive solid-state storage cloud storage

cloud storage

Which of these is not an example of solid-state storage? USB drives digital versatile disc SSDs flash memory cards

digital versatile disc

The category of operating system used for handheld devices. open source network stand-alone embedded

embedded

Most large organizations store data through a strategy called a(n) ________ to promote efficient and safe use of data across the networks within their organizations. organizational cloud mass storage device storage area network enterprise storage system

enterprise storage system

Which of the following allows a computer to run two or more operations simultaneously? binary system coprocessors multicore processors multiplexing

multicore processor

Which of the following allows a computer to run two or more operations simultaneously? coprocessors multicore processors binary system multiplexing

multicore processors

These screens can be touched with more than one finger, which allows for interactions such as rotating graphical objects on the screen with your hand or zooming in and out by pinching and stretching your fingers. LCD multitouch touch CRT

multitouch

The most widely used handheld computers are ________. tablets smartphones laptops notebooks and laptops

smartphones

Identify the four basic categories of hardware in a personal computer system. system unit, input/output, secondary storage, and primary storage hard disk, modem, RAM, and microprocessor system unit, input/output, secondary storage, and communication hard disk, input/output, secondary storage, and display device

system unit, input/output, secondary storage, and communication

This type of computer is a thin slab that is almost all monitor with the system unit located behind the monitor. laptop smartphone tablet desktop

tablet

For browsers to connect to resources on the Internet, the location of the resources must be specified through addresses called ________. hyperlinks Hypertext Markup Language (HTML) uniform resource locators (URLs) top-level domains (TLDs)

uniform resource locations (URLs)

Suppose you have installed drivers on your laptop for a new printer and are prompted to restart the computer before continuing to work. Restarting in this situation is called a root boot warm boot cold boot hard boot

warm boot

Knowledge of HTML and CSS is considered essential for the job of a ________. browser manager blogger podcaster webmaster

webmaster

Most modern desktop systems have a 64-bit CPU, which means the _____ is 64 bits. pipeline byte word size system clock

word size

Which of the following is not an example of a search engine? Google Amazon Bing Yahoo!

Amazon

Which of the following is not a popular desktop operating system? Android Linux macOS X Windows 10

Android

Online banking is an example of what type of e-commerce? B2C B2B C2C C2B

B2C

This method of file transfer distributes file transfers across many different computers. Dropbox.com SSP BitTorrent FTP

BitTorrent

The hi-def largest capacity format for optical discs is the ________ disc. Blu-ray HD DVD DVD-RAM HD CD

Blu-Ray

Which of the following can store the least amount of data? a digital versatile disc (DVD) a Blu-ray disc (BD) a rewriteable digital versatile disc (DVD+R) a compact disc (CD)

CD

Which of the following is not a character encoding standard? CISC ASCII EBCDIC Unicode

CISC

Which of the following are files inserted into an HTML document that control the appearance of web pages including layout, colors, and fonts? Javascript Applets AJAX CSS

CSS

________ computing provides access to software, programs, and data from anywhere through an Internet connection. Client Three-way Cloud Service provider

Cloud

This is a legal concept that gives content creators the right to control use and distribution of their work. copyright piracy privacy ethics

Copyright

A computer can become infected with viruses in all the following ways, except by ________. downloading software from the Internet opening attachments to email messages creating a new folder on your computer downloading files from the web

Creating a new folder on your computer

________ are malicious programs that come into a computer system disguised as something else such as a free computer game or screen saver. Scams Rogues Zombies Trojan horses

Trojan Horses

Which of the following can be used to connect several devices to the system unit and are widely used to connect keyboards, mice, printers, storage devices, and a variety of specialty devices? Firewire bus SATA USB port Parallel port

USB port

Which of the following is not a popular mobile operating system? Android UNIX iOS Windows 10 Mobile

Unix

________ is an operating system widely used by servers on the web, mainframe computers, and very powerful personal computers. macOS Windows UNIX Lotus

Unix

________ encrypt connections between company networks and remote users, such as workers connecting from home, creating a secure virtual connection to a company LAN across the Internet. Loggers Virtual private networks Biometrics Web bugs

Virtual Private Networks

________ are programs that migrate through networks and operating systems and attach themselves to various other programs and databases. Zombies Web bugs Viruses DoS

Viruses


Ensembles d'études connexes

Oddyseyware English 4 Sem 2 Writings

View Set

ELNEC Pallative Care Nursing. End of LIfe Nursing Education Consortium. Module 2: Communication in Palliative Care. Section 2: Communication Techniques

View Set

LL Practice Quiz (150 questions)

View Set

ATI Nurse Logic 2.0 Knowledge and Clinical Judgment Beginner

View Set

A&P: Chapter 11 Practice Questions

View Set