Computer & Internet Basics
Which area of the web browser window displays the URL of the current web page you are viewing?
Address Bar
A mainframe computer is _____.
An extremely fast, expensive computer with a large data capacity that is typically used by huge companies.
What type of software is used to scan for malicious programs that may be residing in your computer's hard disk or memory?
Antivirus
Software that allows you to do word processing, send e-mails, or play games is commonly referred to as _____.
Application Programs
At the lowest level of processing, computers represent data and instructions using a series of binary digits, 1s and 0s. An individual binary digit it known as a _____.
Bit
A string of 8 binary digits is known as a _____.
Byte
What piece of computer hardware is often referred to as the "brains" of the computer?
CPU
Which of the following protocols is NOT associated with the transmission or reception of email? - POP - IMAP - SMTP - DHCP
DCHP
Which protocol allows for the dynamic translation of a domain name into the correct IP address?
DNS
Two popular broadband Internet technologies include cable Internet access and:
DSL
What kind of cable is used to connect your cable/DSL modem to your broadband router or a computer to your broadband router?
Ethernet Patch Cable
Which unit of measurement is equivalent to one billion bytes?
Gigabyte (GB)
The Internet is best described as a:
Global network of networks.
Which protocol is used to securely transmit web page information between the client and the web server?
HTTPS
You know your mouse is hovering over a hyperlink when the mouse pointer changes shape to a _____.
Hand
Of the different types of computer storage, which would you expect to have the most capacity?
Hard Disk
Which term is used to refer to all of the physical parts of a computer system?
Hardware
The feature known as tabbed browsing allows you to _____.
Have multiple web pages open at the same time inside the same browser window.
What unit of measure is used when describing the speed of a computer's CPU?
Hertz
Text or images on a web page that when clicked on take you to another web page are called _____.
Hyperlinks
Much like a telephone needs a unique phone number in order to communicate, a computer must be assigned a unique ______ in order to communicate on the Internet.
IP Address
What term best describes a company who provides access to the Internet for their customers?
ISP
A network infrastructure that provides access to users and end devices in a limited area such as a home, school, office building, or campus is called a:
LAN
Adware is _____.
Malicious software that displays advertisements and messages when you use your computer.
Spyware is _____.
Malicious software that follows the actions you take and forwards the information to a third party.
Which of the following is an example of an operating system? - Microsoft Word - Internet Explorer - File Explorer - Microsoft Windows
Microsoft Windows
Which of the following is NOT considered an operating system? - Microsoft Windows - Linux - Microsoft Word - Mac OS
Microsoft Word
Which of the following components would NOT be considered a peripheral device? - Printer - Mouse - Monitor - Motherboard
Motherboard
Which of the following would be considered an input device? - Printer - Mouse - Monitor - Speakers
Mouse
What is the name for the piece of software that manages the hardware, application programs, and provides a graphical user interface to the user of the computer?
Operating System
A display monitor's screen is composed of tiny square units called _____.
Pixels
The set of communication rules that the browser will use when connecting with the web site you're trying to access is known as the _____.
Protocol Prefix
______ contain the rules that govern the communication process and define how messages will be transmitted and received.
Protocols
To increase the performance of your computer and the number of programs it can effectively run at one time, you may want to increase the size of the computer's _____.
RAM
Which type of memory stores any programs and data that are currently in use by the CPU that will be lost when the computer is switched off?
RAM
Which type of memory contains instructions necessary for the computer's basic input/output system (BIOS) which is used to load essential data when the computer is turned on?
ROM
Which of the following is NOT a good practice in combating being a victim of computer fraud? - Don't open suspect emails, click on links, or open attachments. - Send your username or password via email only when the request comes from your IT department. - Limit your web browsing to reputable sites. - Don't download pirated software or participate on P2P networks.
Send your username or password via email only when the request comes from your IT department.
A computer that serves other computers by running important software and storing important data is called a _____.
Server
The enclosure that contains most of the components of a computer is commonly called the _____.
System Unit
Malware is _____.
The general term used to describe malicious software that can cause damage to your computer system or data.
Phishing is _____.
The tactic of using a fake web site to imitate a site a user knows and trusts.
What is the top-level domain for the Uniform Resource Locator (URL) given as http://angel.irsc.edu?
.edu
A kilobyte is _____.
1024 Bytes
A removable USB flash drive with a capacity of 4096 megabytes has an equivalent storage capacity of _____.
4GB
What is the protocol prefix for the Uniform Resource Locator (URL) given as http://angel.irsc.edu?
http://
Which command can be typed in at a Window's command prompt to identify the computer's Internet address information?
ipconfig
Google and Bing are examples of what kind of software system?
Web Search Engine
How many digits is the binary language comprised of?
Two
A web address comprising of three parts, the protocol prefix, domain name, and top-level domain is often called a _____.
URL
Memory that requires electrical power to retain data is referred to as being _____.
Volatile