q

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Which of the following is not a function of the operating system?

Create and edit a spreadsheet

An organization's IT department reports that their web server is receiving an abnormally high number of web page requests from different locations simultaneously. What type of security attack is occurring?

DDoS

Which of the following is an example of application software?

Word

Which of the following language is used to write web pages?

HTML

What are the main components of the CPU?

Hard Disk, RAM, and Motherboard

Device drivers are:

Necessary for hardware to communicate with the operating system

What is the role of the BIOS in ROM when the computer is turned on?

Test all the hardware and locate and load the operating system into the main memory

Which of the following statements is true about registers?

They are high-speed memory areas used to perform operations on data.

When describing malware, what is a difference between a virus and a worm?

A virus replicates itself by attaching to another file, whereas a worm can replicate itself to different computers in the network

___ is the process of copying all the critical data from all devices, endpoints, and nodes and transmitting it to a server.

Backup

___ controls the working of RAM

CPU

Which type of memory is used to store frequently used data and instructions to speed up the CPU?

Cache

the following is system software

Compiler Operating system Utilities

Which of the following is a type of system software?

Device driver

What does the CU do in the CPU?

Directs ALU, input/output devices, and the memory

Which is not an application software?

Driver

Mesh topology do all the computers connect with the help of a central unit.

False

A ___ broadcasts all the received messages

Hub

Which topology combines two or more than two topologies?

Hybrid

What is the best way to avoid getting spyware on a machine?

Install software only from trusted websites

Which type of malware is designed to secretly monitor and record keystrokes on a computer or device?

Keylogger

In which topology the network consists direct link between two computers?

Mesh

Which toplogy has the highest installation cost?

Mesh

Utility software is designed to:

Perform specific tasks that enhance and support the overall functionality of a computer system

In which type a malicious party sends a fraudulent email disguised as being from a legitimate, trusted source

Phishing

The BIOS (Basic Input Output System) is typically stored in:

ROM

The Basic Input Output System (BIOS) resides in

ROM

Which memory is used to store data permanently and cannot be easily modified?

ROM

Which type of malware encrypts a victim's files and demands a ransom for their release?

Ransomware

Which memory is known for being the fastest, smallest, and closest to the CPU?

Registers

____signifies the ability of a network to minimize the scope and frequency of network incidents, continue operations while under pressure and recover as quickly as possible.

Reliability

What type of memory is used to permanently store data and has a high storage capacity compared to RAM?

Secondary Storage

Which type of software is specifically designed to help manage and control computer hardware?

System software

Which of the following is a function of the CPU?

erform arithmetic calculations and logical operations


Ensembles d'études connexes

Ch. 26 Connecting Classification to Phylogeny

View Set

AP Calculus AB Unit 8 AP Classroom

View Set

real numbers and their subsets (94.11%)

View Set

Chapter 1: Introduction to Managerial Accounting

View Set

Pathophysiology term 1 Questions

View Set