Understanding Essential Computer Concepts
LAN
A ________ consists of connected computers and peripheral devices that are located relatively close to each other.
SSD
A ________ is based on flash memory, but is intended as a replacement for traditional hard disk drives.
False
Operating software enables you to perform specific tasks such as writing letters, creating presentations, analyzing statistics, creating graphics, and enhancing photos.
Volatile
RAM is often referred to as _________ memory.
Spyware
Secretly gathers information from a computer and sends it without the users permission
Operating System
Software that allocates , manages storage space, maintains security, and controls I/O
Virtual memory
Space on the computers storage devices that simulates additional RAM
Cache memory
Special high-speed memory located on or near the microprocessor's is called _________.
RAM
Temporarily holds data and programs while the computer is on
Peripheral devices
The computer needs additional components called ___________ to accomplish its input, output, and storage functions.
Sender
The computer that originates a message to send to another computer is called the
Driver
The transmission protocol between a computer and its peripheral devices is handled by a
Graphics card or graphics processor
To display graphics, a computer needs a monitor and a:
Optical storage devices
Uses laser technology to store data in the form of tiny pits or bumps.
Specificiations
What are the technical details about each hardware component called?
A bit
What do you call each 1 or 0 used in the representation of computer data?
About a million bytes
What is a megabyte?
Processor
What part of the computer is responsible for executing instructions to process information?
Cloud computing
When data, applications, and resources are stored on serves rather than on users' computers, it is referred to as:
RAM
Which is not a permanent storage medium?
Data bus
Which is the data path between the microprocessor, RAM, and the peripherals?
Firewall
Which of the following acts as a locked door on a computer?
Mainframe
Which of the following is NOT a personal computer?
Mouse
Which of the following is a pointing device that allows you to control the pointer by moving the entire device around on a desk?
RAM
Which of the following is considered volatile or temporary memory?
Virtual memory
Which of the following is space on the computer's storage devices that simulates additional RAM?
ROM
Which of the following permanently stores the set of instructions that a imputed uses to activate the software that controls the processing function when you turn the computer on?
Mainframe
Which would not be considered a personal computer?
CMOS
________ memory is a chip on the motherboard that stores the date, time, and system parameters.
Tablets
_________ are thin computers that do not have an external keyboard or mouse.
Word size
_________ refers to the number of bits that are processed at one time.
Mainframe
___________ computers are used by large businesses, government agencies, and in science and education to provide centralized storage and processing and to manipulate tremendous amounts of data.
Slots
Expansion cards plug into electrical connectors on the motherboard called expansion _________.
False
If you are working on a budget and save the spreadsheet on your hard drive, it's called an executable file.
Commands
Input instructions that tell the computer how to process data
Peripheral devices
Keyboards, monitors, and printers are all examples of which of the following?
Expansion slot
Location on the motherboard into which a controller card for a peripheral device is inserted
Hard disk
Magnetic storage media that is usually sealed in a case inside the computer
The speed of the micro processor
Megahertz is a measurement of _________.
False
Most computers sold today come with 32-bit processors.
Database
A collection of information stored on one or more computers organized in a uniform format of records and fields
Server
A computer on a network that acts as the central storage location for programs and data used on the network
True
A device driver is a computer program that makes communication possible between your computer and one of its peripherals.
True
A hard disk is a type of magnetic storage device.
Spoofed
A website that's been set up to look exactly like another website, with the intentions of convincing customers to enter their personal information, is a ________ site.
Viruses
Antivirus software protects against which of the following types of malware?
Node
Any device connected to a network is called a
SSD
Based on flash memory and intended as a replacement for a traditional hard disk drive