Computer Concepts Midterm

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Memory chips or modules hold data and programs as they are being processed by the ____, and are usually found on the motherboard.

CPU

the "brain" of computer

CPU

Storage media are volatile.

False

A display device is the most common form of output device

True

Type of e-mail that uses a browser and an e-mail account provided through an online service to send and receive e-mail

Webmail

technology that computers and devices use when communicating via radio waves across a medium distance

Wi-Fi

Technology, also known as the 802.16 standard, that computers and devices use to communicate wirelessly across long distances

WiMAX

Use cleaning products specifically meant for computer screens, such as a 50/50 solution of _______and water.

alcohol

Replace _____ regularly on wireless mice and keyboards so the power does not run out when you need it most

batteries

Number system that consists of only two digits

binary

the word "bit" is short for this

binary digit

an electronic channel that transfers data in multiple directions

bus

Avoid revealing personal information in a(n) _________.

chat room

Unicode and ASCII are examples of this

coding scheme

Companies streamline production and perform tasks too dangerous or monotonous for humans using _____ manufacturing.

computer-aided

A ___ is a small text file that a Web page stores on your computer to identify you when you visit the Web site

cookie

The use of Web technologies to humiliate, torment, or badger an individual

cyberbullying

the smallest unit of time a processor con measure

cycle

In practice, the difference between system and application software is not always straightforward.

true

Perform arithmetic and logic functions in the CPU

ALU

a gigabyte equals this many bytes

1 billion

a byte consists of this many bits

8

Standards that wireless fidelity devices use

802.11

When you issue the command for your computer to store a document on your hard drive, the application software must make sure that the specified hard drive exists.

False

mages need to be scanned at a lower resolution if the image will be enlarged significantly.

False

Hosted ad on a Web site

How a third-party cookie can end up on your computer

when the computer is shut down, the information in _____ is erased

RAM

the data stored in _______ is saved even when the computer has been powered off

ROM

Network protocol that defines how to route data across a network

TCP/IP

The gap between people who can access digital information and those who cannot is called the _____.

digital divide

components include a user ID, the "at" symbol, and the name of the e-mail provider

e-mail address

an electronic document transmitted on a computer network

e-mail message

A computer that routes e-mail messages through a network

e-mail server

a(n) ________ is a tiny special-purpose computer included as a component in a larger product

embedded computer

A symbol of an emotional gesture that you create using keyboard characters is called a(n) ________________.

emoticon

the computer network a business uses to let employees communicate with customers, vendors, and other employees is referred as ________.

enterprise computing

As a hard drive begins to get full, it takes less time to locate the data stored on the hard drive.

false

Most operating systems today use a text-based user interface

false

The development rights of a software program specify the allowable use of the program.

false

The process of representing data in a form that can be understood by a digital computer is called decimal byte representation

false

With a DVD, the storage medium and the storage device are permanently sealed together to form one piece of hardware called a fixed-media storage system

false

Crime usually committed by identity thieves

financial fraud

Posting hostile or insulting comments about another online participant is called ________________.

flaming

a self-driving car uses a rooftop sensor and a(n) _______ system to navigate.

global positioning

The ___ page appears when you first open a browser

home

controlling systems such as heating, cooling, and security to increase comfort and quality of life is called ____.

home automation

Restricted Web sites are also known as the Private Web or the ____________.

invisible web

an airport or hotel might provide a (n) ___________ you can use to check in or find travel information.

kiosk

in ______________, blog members post eye-witness accounts of events

live blogging

Type of e-mail that uses an e-mail client and an e-mail account provided by an ISP to send and receive e-mail

local

Your browser is using a secure connection when it displays a _____ icon and "https://" in the Address bar.

lock

when you use wireless mobile devices to make retail purchases, you are engaging in ________.

m-commerce

A company's computers monitor assembly lines and equipment with _____ communications.

machine-to-machine

hard drives with read/ write heads that move over the surface of platters are a type of ____ storage

magnetic

Store the _____ cards from your digital camera in their cases when not in the camera.

memory

a set of guidelines for acceptable online communications is called ____.

netiquette

a _____________ is an excellent resource for facts and immediate reactions to current and recent events

news site

with ________, you can view or listen to online content at any time rather than according to a set schedule

on-demand media

with _________, you can buy and sell stocks and bonds without using a broker

online investing

Information others can find about you on the Internet is called your ___________.

online reputation

web sites on the ________________ are freely available to the public

open web

When publishers load software on a computer before selling it

preinstall

In ___ mode, you can surf the Web without leaving history, temporary Internet files, or cookies.

private browsing

Sets the speed at which the CPU executes instructions

processor clock

flash memory is an example of ________ memory

programmable

a communications standard that specifies the method and speed that devices use to transmit data

protocol

Determine how a Web site uses your browsing history

read the Terms of Use and Privacy statements

a _______________ includes information that's been written and researched thoroughly by experts, double-checked for accuracy, and reviewed by other experts

scholarly site

Steps you can take to protect personal information.

shred documents and monitor accounts

Store backup discs for DVDs and other optical media in _____ or protective cases to keep them safe from scratches and dirt.

sleeves

On a mass transit system, you can use a(n) ____________ instead of a ticket or token

smart card

__________ -state drives, which have no moving parts, are less likely to be damaged by dirt and impact, but should still be treated with care

solid

in _________ online education, the instructor holds a class that students attend virtually and at the same time

synchronous

you can use ___ browsing to access several Web pages in the same browser window

tabbed

an arrangement that employees who need flexible work schedules use to work from home is called _______.

telecommuting

Obtain a software program from an online app store

to download

Start a software program

to run

As you work on your computer, the operating system continuously manages your computer's resources and makes them available to devices and programs when they are needed

true

Computer literacy is knowing about and understanding computers and their uses

true

In addition to a keyboard, most computers today are used in conjunction with some type of pointing device.

true

Just as you can learn to drive a car without knowing much about car engines, you can learn to use a computer without understanding the technical details of how a computer works.

true

Notebook and netbook computers usually have a keyboard that is similar to a desktop keyboard, but it is typically smaller.

true

SSDs are not subject to mechanical failures like magnetic hard drives, and are more resistant to shock and vibration.

true

Storage devices can be internal (located inside the system unit), external (plugged into an external port on the system unit), or remote (located on another computer).

true

The binary numbering system uses only two symbols—the digits 0 and 1—to represent all possible numbers.

true

The number of bits being transmitted at one time is dependent on the bus width

true

Users do not have to be concerned with how files are physically stored on a storage medium.

true

Web browsers maintain a History list, which is a record of all Web pages visited during the period of time specified in the browser settings

true

Remove a software program from your computer

uninstall

Install a newer version of your current software program

upgrade

when an operating system employs ______ memory, it swaps files to the hard disk

virtual


संबंधित स्टडी सेट्स

321 Exam 3 - Ch 48: Assessment/Management of Pts with Obesity

View Set

MRKT425- Ch. 2 Types of Retailers

View Set

AP Stat Unit 4 Progress Check: MCQ Part C

View Set