CGS final part 2
microsoft surface pro 4
by upgrading to its maximum capacity of 16 GB of RAM and 1 TB of storage, the ________________ tablet could be an extremely powerful computer
.wav and .mp3 and .M4A
common audio file formats
slower
if your actual internet speed is _____________ than your ISP's advertised speed, you should contact your ISP
analog
in order to change sound waves into digital signals, smartphones contain _____________ -digital converters
icon
in windows, a file is represented by a symbol that tells you which type of file it is. this symbol is called an _______________
broadcasts weak microwave signals to create "cells" of mobile coverage; connected to a cell tower; sends phone signals to the cellular provider's Mobile Switching Station (MSS)
what are the characteristics of a base transceiver station?
adjust your web browser's security settings to allow browsing only on trusted sites; never bypass your browser's built in security features
what can help prevent a virus infection?
wifi only tablets do not require a data plan
what is an advantage of a wi-fi only tablet over a cellular-enabled tablet?
-a device that isn't positioned properly can cause weak signals and system issues -check to make sure the cables are not damaged and that all cables are plugged in properly -a poor signal can also be an indicator that the hardware may be old or improperly positioned
what is true about troubleshooting a network?
-an SSID is the wi-fi's name -in home networks, after all the legitimate devices have connected to SSID once, transmitting the SSID is unnecessary -most routers transmit the SSID every few seconds so roaming devices can find the signal
what is true regarding a wi-fi's SSID?
-transmission connections are known as "hot spots" -transmit internet signals via radio waves -multiple devices can be connected to one signal
what is true regarding wi-fi?
US-CERT
what organization should you contact if you receive a phishing message?
wi-fi and cellular capable or wi-fi only
when it comes to connecting to the internet, a tablet computer can be:
a secure wireless network, a home wi-fi network, a public wi-fi network
cellular-enabled tablets can increase data plan usage, but there are several ways to connect to the Internet that will not result in increased data charges. some of these methods include:
roaming
if you're in an area where your home network doesn't have any cell coverage, but you're still able to make a call, you're probably ______________
WAN (wide access network)
when two or more LANs (local area networks) have been connected using a public network a _____________ is created
.exe
which of these extensions, if you open it, will probably install software onto your computer?
7
while theres no industry standard, a tablet computer typically has a screen size of at least __________ inches
OneDrive
Microsoft offers free cloud storage for everyone who has a microsoft email account. this is microsoft
right-click
One way to create a folder in Windows is to __________________ on any area in the Contents pane, and then click "new" and "folder"
PaaS
a programming environment used to develop, test, and disseminate web apps via the internet
File Transfer Protocol (FTP)
a protocol commonly used to transfer large files from one server to another on the internet is the _____________
rootkit
a type of malware that is triggered each time you boot your computer is called a
a virus that is attached in a file in and sent via email message is called an _________ virus
macro
a virus written in a specific language and placed within a document or spreadsheet is called a ______________ virus
dual
a wireless router that transmits wi-fi signals on 2 separate frequencies is a _____________-band router
hosted
an IP address is determined by the network on which it is
broadband
an internet signal that has enough bandwidth to allow multiple computers to be connected to the same router is called a ______________ signal
laaS
an organization uses servers in the cloud instead of buying and maintaining storage servers for their day-to-day business operations. this helps to reduce costs associated with hardware, software, and support employees
ipad mini series, ipad air series, ipad pro series
apple tablet offerings
antivirus
because smartphones are computers and have many of the same security risks as computers, you should have _____________ software on your smartphone
documents will not save; programs launch on their own
common symptoms of a computer virus
.docx and .odt
common word processing file extensions
use legitimate looking email messages to con a user into giving up private information; the illegitimate use of an email message that appears to be from an established organization such as a bank
descriptions of phishing
keystrokes, account numbers, passwords
examples of spyware
more
fiber optic cable is ___________ expensive than coaxial (television) cable to install
anti-malware apps
help protect against malware
anti-virus programs
help protect against viruses
firewalls
helps protect against worms and hackers
prepaid
if you don't want to sign a long-term contract, you might choose to purchase a ________________ phone.
3G
if you just need a phone for calling and texting, a ___________ phone can save you money
safe
if you notice you are receiving fake anti-virus messages, power down your computer and reboot your computer in ___________ mode
trojan horse
often accompanying downloaded music or apps, programs that appear to be legitimate, but executes unwanted activity when activated is called a _____________
CTRL + V
one way to copy a file to a new location is to click on the file and press CTRL + C and then move your cursor to the new site and press ________________.
Top Level Domains (TLD)
refers to the highest level in the domain name hierarchy
browsers
software applications that allow users to access and surf the world wide web are called _____________
plug ins
software, such as Java Runtime or Java Script, adds functionality to your browser. these types of software are called ____________
hacker
someone who attempts to gain unauthorized access to a network
switching
sometimes called an MSC server, the mobile _________________ station identifies your phone's signal so that you can receive calls
UBE (Unsolicited Bulk Email)
spam messages are sometimes called ___________ and are used for a variety of marketing purposes including selling products and services
session
stored in temporary memory, ______________ cookies are used to analyze and measure traffic on a web page
SaaS
the distribution of computer applications over the internet. commonly referred to as web apps
file servers, web servers, email servers
the internet includes a very large variety of servers including:
ethernet
the most popular network standard for LANs is ______________
signal
the small computer within your phone that enhances the sound quality of your call is called a digital _______________ processor
command
to change your folder's appearance, first click on the folder and then go to the ____________ bar and click
search
to look for a file or folder in windows 10, just type the file name in the ______________ box
CTRL + X
to remove a file from one folder and place it in another, click on the item and press ________________, then move your cursor to the new location and press CTRL + V
packet switching
unlike circuit switching, data transfer with ____________ doesn't rely on a dedicated physical path