COSC111 Shirin

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

------------ occurs when cyberthieves exploit Bluetooth devices that have been paired a. Bluebugging b. IP hijacking c. Capping d. Throttling

A

A --------------- is someone who demands payment to stop an attack on an organization's technology infrastructure. lifecycle? (page 252) a. Cyberextortionist b. Script kiddie c. Cracker d. Cyberterrorist

A

A(n) is an internal network that uses Internet technologies. (page 488) a. Intranet b. Extranet c. Router d. Communication Channel

A

Enterprise storage often uses ---------- technology as the interface that connects the devices to the network because it has much faster transmission rates than SCSI (Small Computer System Interface) a. Fiber Channel (FC) b. Serial Transfer c. SATA (Serial Advanced Technology Attachment) d. SAS (Serial Attached Small Computer System Interface)

A

In the machine cycle, the -------------operation obtains a program or application instruction or data item from memory (page 281). a. fetching b. executing c. decoding d. storing

A

The term ---------- describes a computing environment where everyday objects are connected to the Internet. (for example, a wireless chip attached to your medicine bottle can send text messages to remind you to take your medication and then contact your pharmacy to refill the prescription when it is due for a refill)a. IoT (Internet of Things) a. IoT (Internet of Things) b. DaaS (Data as a Service) c. IaaS (Infrastructure as a Service) d. ASCII (American Standard Code for Information Interchange)

A

What program is used to start and shut down a computer or mobile device, provide a user interface, manage programs and memory, and provide file management, among other functions? a. an operating system b. a file utility c. application software d. a system utility

A

Which of the following storage devices typically has the fastest transfer rate? (page 371) a. Hard disk a. USB flash drive b. Memory card c. optical disc

A

Which of the following terms is the time it takes a signal to travel from one location to another on a network? (page 476) a. latency b. symmetry c. delay register d. frequency

A

A typical enterprise consists of a wide variety of departments, centers, and divisions — collectively known as functional units. a. True b. False

A. True

In addition to managing applications, an operating system manages other processes. a. True b. False

A. True

It is good practice to back up and wipe all data before turning over your computer or device to an IT or computer repair technician. a. True b. False

A. True

RAM is volatile. a. True b. False

A. True

ROM is nonvolatile. a. True b. False

A. True

Reading is the process of transferring data, instructions, and information from a storage medium (i.e. hard disk, USB flash memory, CD etc.) to memory. a. True b. False

A. True

Some parts of the operating system are resident; that is, these instructions remain on the memory until they are needed. a. True b. False

A. True

When a user issues a command to run an application, the operating system locates the application in storage and loads it into memory. a. True b. False

A. True

Writing is the process of transferring data, instructions, and information from memory into a storage medium (i.e. hard disk, USB flash memory, CD etc.) a. True b. False

A. True

What is the definition of software? (Page 318) a. a collection of unprocessed text, numbers, images, audio, and video b. a series of related instructions that tells a computer or mobile device the tasks to perform and how to perform them c. an instruction issued by replying to a question that is displayed d. an instruction that causes a single specific action to be performed

B

What is the purpose of memory management? a. To store data in the most efficient manner b. To optimize the use of RAM c. To start the computer and operating system quickly d. To allocate system resources stored in ROM

B

What is the term for a network that connects computers and devices in a limited geographical area, such as a home, school, office building, or closely positioned group of buildings.? (page 453) a. PAN (Personal Area Network) b. LAN (Local Area Network) c. MAN (Metropolitan Area Network) d. WAN (Wide Area Network)

B

Which one is not needed for a successful communication over a network or Internet? (page 450) a. Sending device b. transponder c. communication channel d. receiving device

B

A dual-core processor doubles the processing speed of a single-core processor. a. True b. False

B. False

Computers process information (output) into data (input). a. True b. False

B. False

RFID requires line-of-site transmission. a. True b. False

B. False

Reading is the process of transferring data, instructions, and information from memory to a storage medium. a. True b. False

B. False

Some parts of the operating system are resident; that is, these instructions remain on the hard disk until they are needed. a. True b. False

B. False

Storage devices can be categorized as input or output devices. a. True b. False

B. False

The system clock keeps track of the date and time in a computer. a. True b. False

B. False

When a user issues a command to run an application, the operating system locates the application in memory and loads it into storage medium. a. True b. False

B. False

When storage devices write data on storage media, they are creating input. a. True b. False

B. False

Writing is the process of transferring data, instructions, and information from a storage medium into memory. a. True b. False

B. False

A ----------- application is an application that runs the same on multiple operating systems. a. Stand-alone b. Device driver c. Cross-platform d. Multitaksing

C

A group of two or more integrated hard disks is referred to as which of the following? (page 380) a. SSD (Solid State Drive) b. HDD (Hard Disk Drive) c. RAID (Redundant array of Independent Disks) d. EIDE (Enhanced integrated drive electronics)

C

A(n) ------- Operating system allows two or more programs or apps to reside in memory at the same time. a. Foreground b. Background c. Multitasking d. Multiuser

C

As shown in the accompanying figure, what is the term for a network that covers a large geographic area, such as a city, country, or the world, using a variety of wired and wireless transmission media? (455) a. local area network (LAN) b. metropolitan area network (MAN) c. wide area network (WAN) d. variable area network (VAN)

C

The -----------------------is the main circuit board of the computer. (page 278) a. ALU b. CPU c. motherboard d. system chassis

C

What type of information is error free? (page 554) a. timely b. verifiable c. accurate d. organized

C

Which of the following is a set of hardware, software, data, people, and procedures that work together to produce information? (page 554) a. Production process b. Timely info c. Information system d. Information set

C

Which of the following options contains data about each file in a database and each filed in those files (page 510)? a. Query b. form c. data dictionary d. data mart

C

A(n) ------------- is a circuit board that enhances the functions of a component of a desktop or server system unit and/or provides connections to peripheral devices. a. Expansion slot b. USB adaptor c. Front side bus d. Adapter card

D

What does the booting process do? a. Starts the computer in safe mode b. Sends the computer to idle mode c. Shuts down the computer d. Starts or restarts the computer

D

What is the definition of a command? (page 318) a. a collection of unprocessed text, numbers, images, audio, and video b. a series of instructions that tells a computer what to do and how to do it c. an instruction issued by replying to a question that is displayed d. an instruction that causes a program or app to perform a specific action

D

What is the definition of a protocol, as it applies to networks? (page 460) a. The language used to translate analog signals into digital signals b. A method for connecting nodes on a network c. The rules governing acceptable network use by employees or other users d. A standard that outlines characteristics of how two network devices communicate

D

Which method/s is a safeguard against internet and network attacks (page 218) a. use antivirus software and backup regularly. b. Be suspicious of unsolicited email attachments (spam) c. Scan removable media (USB flash drives, CDs, DVDs etc.) before using it d. All the above solutions

D

Which of the following activities is a process running by a computer as data is entered? (page 558) a. Batch processing b. Rooting processing c. Inference rules processing d. Online transaction processing

D

Which of the following is not an advantage of SSD (solid state disks)? (page 378) a. Faster transfer time b. Lighter weight c. More durable d. Higher storage capacity

D

Which of the following options are common functionalities among all types of operating systems (page 410)? a. Starting and shutting down the computers and mobile devices b. Providing a user interface so that a user can interact (running programs, locate files etc.) with the computer or device c. Establishing an Internet connection and file management task d. All the above options

D

Which security measures organizations and individuals perform to prevent information theft. a. Access control techniques or user identification and authentication control b. Encryption, a process of converting data that is readable by human into encoded characters to prevent authorized access. c. Digital signature and certificate; the former is an encrypted code that a person, website, or organization attached to an electronic document (contains information) to verify the identity of the message sender, the latter is a notice that guaranteed a user, or a website is legitimate. d. All the above options

D


संबंधित स्टडी सेट्स

Entrep Lesson 4 - Business Model

View Set

MKGT 3650 Final UNT Strutton Marketing

View Set

8.05 Quiz: Einstein and the Gravitational Field

View Set

Chapter 33: The Child with Musculoskeletal or Articular Dysfunction

View Set

Chapter 4 nutrition guidelines - tyler banks

View Set

Chapter 16: Outcome Identification and Planning

View Set