CPSC 100
TRUE
laser printer images are generally considered high quality
FALSE
prank malware does not cause harm to the computer system
capactive screen
a touch screen that uses the conductance of human body to change state of screen
FALSE
a touchpad is most commonly used on hand-held devices, like smarphones
FALSE
a typical home WLAN requires a separate wireless Ethernet bridge to allow wired devices to be connected
FALSE
a web crawler is someone who used the WWW extensively for research
web portal
a web page that provides a unified view of diverse resources is called a
TRUE
a web portal is often used by companies to provide controlled access to corporate resources with a consistent look and feel
FALSE
a web portal is the connection between your home network and the internet
evaluating (and correcting) logical errors in the file system
checking a disk refers to
a reliable model of data delivery between two hosts
circuit switching refers to
-a wireless access point or hotspot -you ISP at home -your company or business at work -your college or university at school
all of your internet traffic passes through your connection to the internet. This could be which of the following
FALSE
all personal area networks are wireless
FALSE
all shareware is provided with a time period after which the software will not work (without purchase)
FALSE
all software is copyrighted
FALSE
all web servers use the designation "www" for the hostname in a URL
TRUE
consider a person receiving driving directions from a smartphone. In this system, the user would be the driver
-a bridge -a hub -network attached storage (file server) -a printer or print server
examples of client devices in a home network include which of the following
-smartphones -PCs -internet phones
examples of client devices in a home network include which of the following
-email server software -database software
examples of enterprise infrastructure software include which of the following
FALSE
experts suggest that you should never use multiple AV programs
FALSE
external computer speakers contain an amplifier and require an AC power adapter
TRUE
external ports may be either integrated or made available on a circuit board plugged into the motherboard
FALSE
eye tracking refers to the use of technology to spy on where users are looking for the purpose of advertising
TRUE
firmware extends the functionality of hardware
TRUE
flash (thumb)drive technology is based on ROM chip technology
TRUE
flash memory sticks are a good choice for backing up user data
TRUE
flash memory sticks need to be "ejected" before removal
TRUE
mobile applications are often distributed through a specific network, such as Android's Marketplace or Apple's Appstore
TRUE
mobile broadband provides reasonable alternative to cable and DSL in urban areas
FALSE
moore's law indicates there will be a significant increase in CPU speed each year
TRUE
open source software always makes the source code available
FALSE
hyperlinks in a web page are in binary format
FALSE
in the peer-to-peer model, one of the peers is selected to be in charge
-time management -email -resource management -spreadsheet
information worker software includes which of the following
mod 3 unit 6
snapchat- THEBEST5711
TRUE
social engineering could be described as tricking users into providing information that can be used to fraud or to gain system access
TRUE
social networking sites are structured to limit anonymity
FALSE
the QWERTY computer keyboard is named after its inventor
FALSE
the client-server model fits Web 2.0 better than Web 1.0
TRUE
the concept of the motherboard described applies to any general purpose computer
TRUE
the majority of all web sites are vulnerable to "cross-site scripting" attacks
TRUE
web applications generally run on any computer platform
TRUE
webcasts are generally not interactive
planning
wikipedia is suggested as practical for which of the follow steps
Mod 3 unit 2
Snapchat- THEBEST5711
QUIZ 5 MOD 2 UNIT 5
Snapchat- THEBEST5711
module 2 chapter quiz
Snapchat- THEBEST5711
FALSE
Supercomputers today are relatively small devices
FALSE
Supercomputers were introduced in the 60s and have not changed much since
FALSE
WEP encryption, with a reasonable pass phrase, provides adequate security for WLANs
TRUE
WLANs are inherently less secure than wired LANs
TRUE
WPA2 encryption, with a reasonable pass phrase, provides adequate security for WLANs
FALSE
Web 1.0 refers to web requests that are for a single page only
TRUE
A (legacy) VGA connector is typically used to connect a computer monitor or other video equipment
TRUE
AV software can negatively impact the computer by slowing it down
TRUE
AV software cannot protect you against pharming attacks
TRUE
AV software looks for where the hacker signed his or her work
FALSE
AV software that performs on an on-access scan checks for viruses each time you logon
TRUE
AV software that uses a heuristic approach looks for software that appears similar to malware
TRUE
Cache memory is most like very fast RAM
TRUE
a (legacy) parallel port was most commonly used to connect a printer
4 gigabytes
a 32-bit system can directly address how much RAM
-supercomputer=scientist running a simulation -workstation=engineer designing a tool -personal computer=office worker creating a memo -mainframe=the IRS processing tax forms -smartphone= anyone getting driving directions
Matching
TRUE
a DVD device can generally read CDs
1,000,000 times
a Gbps network is how much faster than a Kbps network
TRUE
a MAC address is a unique identifier assigned to a network adapter
FALSE
a RAID array is considered a portable device
provide short-term power when power failure occurs
a UPS unit is intended primarily to
random access memory
RAM is an acronym that means
1,000 times
RAM is approximately how much faster than a traditional hard disk
FALSE
RAM is wired to (integrated on) the motherboard
TRUE
RFID can be used to identify individual products, like a serial number, as well as product brand and type
FALSE
RFID tags use a laser to scan the tag for a product number
TRUE
a WUSB hub (DWA) allows current USB 2.0 devices to connect wirelessly to a host
a means of bypassing normal authentication
a backdoor refers to
TRUE
a ball mouse measures the movement of the device in two directions using a ball that contacts a surface underneath
8
a byte contains how many bits
tier 1
a carrier that can access any part of the world-wide internet without having to using a higher-level ISP is called
TRUE
a chord keyboard is a computer input device
TRUE
a clock helps synchronize all the activity in a computer
TRUE
a cloud license can be more flexible, based on actual use of the application software
TRUE
clock speed is the rate at which groups of 32 (or 64( bits at a time are presented to the CPU
FALSE
cloud applications (software) are always free
FALSE
coaxial cable is an unshielded medium
FALSE
commercialization of the internet began in the mid-1980s
TRUE
common data rates for CAT 5 ethernet are 10 or 100 Mbps
FALSE
computer gaming and entertainment were the only reasons cited for researching new computer I/O techniques
TRUE
computer hardware is limited in the tasks it can perform
FALSE
computer uses Morse code to represent characters
TRUE
computers that use cloud computing can have less hardware and software than normal PC
FALSE
connecting to and using someone else's WLAN requires explicit action by the interloper
TRUE
consider a person receiving driving directions form a smartphone. In this system, software includes phone operating system, mapping, and location services
FALSE
consider a person receiving driving directions from a smartphone. in this system, the hardware would be the car
media development software
desktop publishing, digital animation editors, and video composition software are examples of
FALSE
devices connected to a network switch share their connection with other devices
TRUE
dial-up modem access to the internet requires a lengthy connection process
TRUE
elementary haptic interfaces are in common use today
TRUE
encryption software may be used to protect your information even if someone has broke into your system
TRUE
every CPU has an arithmetic and logic unit
TRUE
evolving a search query refers to changing the keywords based on earlier results
FALSE
facebook is open to anyone who registers
TRUE
fiber-based internet often does not use fiber all the way to the home
TRUE
file systems are typically hierarchical
TRUE
files on a network file server can generally be accessed using the file manager, once the drive is mounted
FALSE
firesheep is a browser add-on that destroys tracking cookies
FALSE
firewalls are expensive, specialized devices that are used in a corporate setting to protect their LAN
TRUE
firewalls are generally available on most laptops and PCs
TRUE
firewalls are generally available on most network routers
FALSE
firmire is high-level programming thats used to solve difficult user problems
TRUE
firmware is generally considered permanent
TRUE
for a web page to be returned as a hit it must already have been indexed by the search
-including a photo of someone that does not want their picture posted -connecting a person's image with their name -connecting a person with a location or event
for photographs posted on a website, like facebook, which of the following can impact privacy of a subject in the photo
FALSE
freeware is software that is not copyrighted
TRUE
from a consumer perspective, the primary advantage to purchasing software pre-installed is that it is usually offered at a reduced cost
TRUE
games and web browsers are both examples of content access software
FALSE
generally, discussion boards allow anyone to post messages
TRUE
generally, discussion boards allow anyone to read messages
FALSE
generally, discussion boards are more loosely controlled than newsgroups
TRUE
haptic interfaces refer to use of the sense of touch
FALSE
hard disk drives are built to standards such that the platters are all the same size and spin at the same speed
TRUE
hardware includes any part of a computer system you can touch, except the "user"
TRUE
a computer is a machine that manipulates data according to a list of instructions called a program
TRUE
a computer may be part of a more complex device
TRUE
a computer platform is the combination of operating system and hardware running on a computer
thrashing
a condition in which the system spends an inordinate amount of time moving pages back and forth between RAM and the hard disk, is called
FALSE
a cookie saved by a web site can only be read by that web site
codec
a device that converts from analog to digital (and then back again) is called a
FALSE
a distributor cannot charge you for public domain software
TRUE
a docking station allows rapid connection of a laptop to many peripherals normally associated with a desktop PC
FALSE
a docking station always provides power to recharge connected laptop
TRUE
a driver is a program written and distributed by the device manufacturer
FALSE
a dual core processor operates at least twice as fast as a single core processor
FALSE
a facebook third party, server side application is created by Facebook
FALSE
a false positive refers to the situation where a virus is detected, but cannot be removed by the AV software
TRUE
a file pathname that refers to the server's file system, may be added to the end of a URL to specify a particular folder or file
FALSE
a file server moves all of your files to your local computer when you log on
FALSE
a file type is determined by the icon that the file manager displays
TRUE
a firewall can block unauthorized access to your PC or network, while allowing legitimate communications through
FALSE
a firewall determines what communications to block by analyzing the data for malware or hacker activity
TRUE
a fragmented file is one which could not be stored all in one piece on the disk drive
FALSE
a good definition for "computer hardware" would be : any device inside the computer casing (tower)
web directory
a hierarchical listing of resources by subject area is called a
TRUE
a home area network is a small LAN that is managed by a non-IT professional
-file sharing -printer sharing
a home group allows which of the following
access
a home user that wants to connect to internet resources uses a ___ ISP
FALSE
a host wire adapter allows wireless devices to be connected by wire
TRUE
a hub is the same thing as a repeater, except with multiple ports
FALSE
a hub only relays messages to the device (port) that it is addressed to
FALSE
a killer application is one that allows the user to stop applications that have quit responding to user input
TRUE
a killer application is one that is so popular that it increases sales for the platform it runs on
FALSE
a metasearch engine is used to research esoteric topics, such as the "reincarnation of thetans"
TRUE
a modern PCs have a video adapter integrated onto the motherboard
TRUE
a multi-core machine has more than one processor on the integrated circuit
TRUE
a network adapter is necessary to connect a PC or Laptop to a LAN
virtual private network
a network that is built upon the public internet, but is secured by encryption is called
TRUE
a passive RFID tag does nothing; it must be read like a barcode
someone that uses someone else's wireless internet connection
a piggybacker is
TRUE
a podcast generally refers to a scheduled download of a recorded event
TRUE
a pointing device is used to control a graphical user interface
TRUE
a pointing device provides the user with a means of selecting objects on the screen
FALSE
a pointing stick is generally more accurate than touchpad
TRUE
a primary reason for most home networks is to share broadband internet access
TRUE
a properly designed workstation (area) will promote increased productivity
storage local to the CPU
a register is
TRUE
a repeater is essentially a relay device
FALSE
a router is a device that connects different segments of the same network
FALSE
a server typically handles most of the data processing for its clients
FALSE
a single conversation in a discussion board is called a tree
TRUE
a single motherboard may have level 1, level 2 and level 3 cache memory
FALSE
a spare battery should be purchased when you buy your laptop
TRUE
a stylus uses a pen-like device allowing the user both to select and create strokes, like hand writing
TRUE
a surge protector may need to be replaced after being subjected to a surge
TRUE
a surge protector's clamping voltage refers to the highest voltage the unit will allow
TRUE
a swap ( page) file is a file on the hard disk that contains programs or data that does not currently fit into RAM
-targeted -an attempt to further understanding
according to the definition of research, your efforts should be which of the following
google chrome
according to the notes/text, which of the five major browsers listed below is the most widely used
FALSE
an application server is a computer dedicated to a single task, like word processing
TRUE
an application suite is a set of applications that are designed to work together
-accept email from other servers -store email for users -forward email to other servers -deliver email to user
an email server performs which of the following tasks
TRUE
an embedded system is one where the entire "computer" may exist on a circuit board
TRUE
an enclosure is designed for a specific kind of device
TRUE
an ergonomic keyboard is one whose physical design is altered to more appropriately match human anatomy (or use)
1800s
assuming we are only interested in programmable computes, in what century were computers first described
FALSE
assuming your WLAN is setup to use encryption, the only way someone can gain unauthorized access is by cracking the system
FALSE
authentication is making sure that malware has not been substituted for the software you want
TRUE
avoiding system bottlenecks is one reason you might choose not to build your own system
TRUE
bridges connect different segments of the same network
FALSE
buffer overflow attacks are generally caught by AV programs
FALSE
building your own system should only be attempted by the very knowledgeable
dead links
hyperlinks that no longer point to the intended resources are called
TRUE
hypertext links to other resources that display on a web page are included when the server responds to the initial request for a page
FALSE
hypertext markup language is the rules for transmitting a web page between hosts
TRUE
if a software license restricts use of the software to a single computer, you may not install both at work and at home
FALSE
if a software license restricts use of the software to a single person, others can use it, but only one at a time
TRUE
if you allow your computer (browser) to remember passwords for you, it should require authorization to use it
bps
if you are using a typical wireless or home broadband network to access the internet, you are probably using a speed measured in
FALSE
if you laptop/PC does not have enough USB ports, you need to upgrade
hosting
if you wanted to create your own web site, you would probably be using ______ ISP
FALSE
images that display on a web page are included when the server responds to the initial requests for a page
TRUE
most PC's and laptops have an internal hard disk drive
TRUE
most PCs now provide audio integrated on the motherboard
TRUE
most UPS unites include surge protection
TRUE
most adware is relatively benign
FALSE
most applications software can be used on any computing platform
TRUE
most commercial software has a license that allows installation on only one computer (at a time)
FALSE
most consider Mac OS more wasteful of system resources than Microsoft Windows
TRUE
most current cameras are digital i.e. they record a digital image
HTTPS
most e-commerce on the web uses
FALSE
most experts recommend completely discharging a lithium-ion battery before recharging it
FALSE
most free, open source software is not yet good enough to depend on
TRUE
most laptops and cell phones include a digital camera
FALSE
most networks, including internet service providers, measure speeds in bytes per seconds to match units reported by most browsers
TRUE
most of the loss of anonymity on the internet is caused by spying on our internet transactions
TRUE
most software is developed for a particular platform and will not run on other platforms
FALSE
most traditional media have been unaffected by the internet
TRUE
most traditional tablet computers run a slightly modified version of windows or linux
TRUE
most traditional tablets use virtual (on screen) keyboards and a stylus with a resistive touch screen
TRUE
most users are either not aware of or do not use privacy settings in facebook
TRUE
most utility software is very focused, dealing with only one, or a few, task(s)
-the author has forfeited all intellectual property rights -you can use in any way, and for anything, that you want -you make copies and distribute it -you may modify it and distribute it
regarding software in the public domain, we can say
TRUE
one reason that Mac OS has been able to provide customers with a consistent, reliable system is Apple's vertical integration model
TRUE
one reason to be concerned about a hacker gaining access to your computer is that it could then be used to launch attacks against others
TRUE
one use for a backup is to recover a file that has since purposely been deleted
FALSE
open source software is not copyrighted
TRUE
operating systems, as we know them , didn't become available until the 1960s
FALSE
opinion has no place in research
FALSE
optical fiber media is subjected to interference from electromagnetic signals
TRUE
optical fiber media uses light to transmit data
TRUE
originally, email allowed only text to be sent and received
sending data in parts, each of which may follow a different path, and reassembling them at the other end
packet switching refers to
FALSE
passive RFID tags can only be read if they are within a couple inches of the reader
TRUE
passwords should be changed regularly
FALSE
podcasts are "streamed"
TRUE
print-only resources can be more difficult to use for research than the internet
spyware
privacy-invasive software is another term for
TRUE
public domain software is not copyrighted
FALSE
public domain software may have a license that restricts what you can do with it
TRUE
servers are used to allow applications and-/or data to be centralized
TRUE
shareware is generally intended as software that you can try before buying
FALSE
shareware is software that you may not do anything you wish with i.e. it is in the public domain
FALSE
simulation software is an example of product engineering software
FALSE
since USB is a connection standard, all USB ports are shaped the same
FALSE
since a determined hacker will (probably) eventually break into your system anyway, a good password is not necessary
FALSE
since a parallel ports send multiple data bits at the same time, compared to serial ports that send one at a time, parallel busses are always faster interface than serial busses
internet telephony
skype is a company that provides free (under some circumstances) ____ services
FALSE
in a cellular network, the term cell refers the hand-held device being used
TRUE
in a mobile cellular network, switching control of a call from one cell to another is handled by a base station
TRUE
in a wireless distribution system, all of the base stations use the same encryption (type and key) and the same channel
FALSE
in a wireless distribution system, the base stations need to be connected by wired ethernet
TRUE
in general, a Mac is more expensive than a PC
TRUE
in general, a desktop PC system can be expanded or upgraded more easily than a laptop
FALSE
in general, a desktop computer is more expensive than a laptop
FALSE
in general, it is easier to maintain (system administration) a PC than a Mac
TRUE
in general, it is easier to upgrade a desktop PC than a laptop
TRUE
in general, schools and businesses tend to use Microsoft Windows
TRUE
in general, there are more applications available for a PC than for a MAc
TRUE
in order for a web request to work, the server must already be running and waiting for requests
FALSE
in order to rule a resource out, you have to read it
TRUE
in the U.S. privacy laws depend on whether you had a reasonable expectation of privacy
FALSE
in the client-server model, the client shares its resources with the server
TRUE
in the client-server model, the server is a program on a host that waits for requests from clients
FALSE
in the client-server model, the server makes a request of the client, which then responds to the server
TRUE
in the media, and generally outside the computing community, all hackers are thought of as criminals
TRUE
in the peer-to-peer model, each of the peers shares resources with other participants
FALSE
including EXIF data in a photo you post is a violation of your privacy
TRUE
individual countries have shut down the internet within their borders
FALSE
infrared light can be used for communication to line-of-sight devices miles away
-identification of a topic -creation of a research plan -an evaluation of sources of information
inherent in the definition of research was which of the following
FALSE
initially, "PC" referred to any personal computer. Today, it's used to distinguish windows computers from Mac OS computers
FALSE
inkjet printers use solid ink that is transferred to paper
TRUE
internet privacy is concerned with control over access to personal information
FALSE
microcontroller is another name for a personal computer
TRUE
microcontrollers often have little or no interaction with the user
TRUE
microsoft windows is considered by many to be harder to use and manage than Mac OS
FALSE
when setting up a new PC, all you need do for security is make sure an AV program is running (and create a normal user account)
TRUE
when typing in a URL, the capitalization of the host/domain name does not matter
FALSE
when using cloud computing, your computer connects to a specific server in the internet
TRUE
when you combine disks in one of the RAID schemes, they appear as one hard disk to the system
FALSE
whether or not a workstation (area) is to be ergonomically designed is a personal decision
-application software -system software
which are "major classes" of software
-headphones -network -classroom (computer) projector
which are considered computer output devices
-monitor -mouse/keyboard -motherboard
which are examples of computer hardware
-flexible -has a stable image because displays refreshed at lower rate than LCD monitors -has contrast ratio similar to newspaper
which are true for electronic paper display
-both input and output -common on hand-held devices
which are true regarding touch screens
-brain -microchip -CPU
which cna be applied to the computer's processor
is limited to certain specific tasks
which does NOT apply to software
-ball mouse -stylus -optical mouse -active pen
which is more accurate than a touchpad for input
-mozilla firefox -google chrome -apple safari -opera
which of the five major browsers listed below are free
-is also called a residential gateway -connects the home network to the broadband modem -allows the various home devices to share an internet connection
which of the following applies to a broadband router
-forms permanent storage -sometimes called secondary memory
which of the following applies to mass storage devices
-smaller -less computing power -lighter weight -less expensive
which of the following apply to netbooks as compared to laptops and notebooks
-patriot act -electronic communications privacy act -children's online privacy protections
which of the following are among the U.S. laws discussed that affect internet privacy
-HTTPS -PGP -IPsec
which of the following were mentioned as useful for securing communications between hosts on the internet
-what resources does school (or work) provide me -what software is available for me to use at school (or work) -do i need a portable system
which of the following would be good initial questions to answer to help decide your requirements
-ethernet -IP
which two common, low-level network communications protocols were mentioned
TRUE
while speaker quality varies widely, most built-in speakers are low-quality
TRUE
wi-fi protected access (v2) is the currently recommended encryption standard for home
FALSE
wired equivalent privacy is the currently recommended encryption standard for home WLANs
FALSE
wireless LAN technology has always been designed primarily for the home market
TRUE
wireless LANs use radio technology to connect a wireless access point to devices with wireless transceivers
automatic discovery and connection v security
wireless PANs have the conflicting goals of
TRUE
wireless USB provides a high bandwidth connection at short distances
TRUE
wireless broadband bandwidth is comparable to ADSL and cable
FALSE
wireless broadband is available only in rural areas
FALSE
wireless intrusion prevention systems are available in most home wireless routers
FALSE
wireless media tends to be more secure and private than wired
TRUE
smartphones and other hand-held devices use an embedded operating system
-media players -personal digital assistants -gps -video recorder
smartphones exhibit functionality that used to be sold as separate devices, including which of the following
TRUE
smartphones have begun to replace laptops as a mobile platform in business for some people
TRUE
smartphones runs a complete mobile operating system
MOD 3 TEST
snapchat- THEBEST5711
mod 3 unit 3
snapchat- THEBEST5711
mod 3 unit 4
snapchat- THEBEST5711
mod 3 unit 1
snapchat- thebest5711
MOD 5 TEST
snapchat-THEBEST5711
spying on network traffic
sniffing refers to
TRUE
software is converted to binary code before it can be ran on computers
TRUE
software is generally written in a high-level programming language
TRUE
software is useless without computer hardware
TRUE
software purchased with a new system is generally cheaper than software purchased later
TRUE
software tasks are often more complex than hardware tasks
enterprise software
software that addresses the needs of an organization or business is called
FALSE
software that comes with a computer that you have purchased actually is purchased, not licensed
shareware
software that has been made available for free, but with limited functionality unless you purchase it, is called
TRUE
software that is available for free, but asks for an optional donation, is called freeware
content access software
software used primarily to access information without changing it are called
simulation software
software used to model abstract systems or physical phenomena is called
TRUE
solid ink printers have a long warm-up period
FAlSE
solid ink printers use red, green, and blue wax that is melted and transferred to a drum and then to paper
TRUE
some UPS units monitor and correct a variety of power conditions
TRUE
some believe that WLANs should be open (unsecured) by default for technical and social reasons
TRUE
some believe that the internet (and ISPs) should be treated as "common carriers"
TRUE
some cable TV/internet systems use fiber optics
FALSE
some commercial software is available for free
TRUE
some discussion boards are moderated, i.e. messages must be approved before they appear
TRUE
some good AV software is available for free
TRUE
some operating systems allow you to pick the user interface you want to use
-wi-fi capability -mobile broadband access -the ability to run many third-party applications
some typical smartphone features include which of the following
TRUE
some utility software is intended to allow the user to manage the computer system
script kiddie
someone that breaks into systems for fun using instructions found on a hacker web site would be called an
white-hat hacker
someone that works for a security firm, finding and patching security holes would be called a
FALSE
surge protection applies only to electrical power connections
FALSE
surge protectors are only intended to protect equipment from lightning
TRUE
system software works with applications so they can perform their intended tasks
FALSE
tablet computers typically offer an optional touch screen
TRUE
tablets are considered to be fully functional personal computers
FALSE
the delay while waiting for data to be read (or written) on a hard disk is called the data transfer rate
network interface card
the device in your computer that allows it to physically connect to a network is called a
what are my requirements
the first question you should consider when purchasing a computer is
identify the topic and what kind of research is needed
the first step in research should be
FALSE
the format of text email has changed dramatically from what it was in the early days of the internet
FALSE
the internet corporation for assigned names and numbers is in charge of the global internet
FALSE
the internet governance forum is in charge of the global internet
TRUE
the internet has created/enabled new modes of human interaction
FALSE
the joules rating of a surge protector should be as low as possible
TRUE
the kernel is a part of the operating system that most users never "see"
TRUE
the level of cache memory tells us both how close it is to the CPU and the order in which it is searched
TRUE
the license for open source software may restrict what you can do with it after you modify the source code
TRUE
the longer the response time of a surge protector, the more likely your equipment will be damaged
twisted-pair wire
the most widely used medium for networking is
the word size
the number of bits that the CPU can read simultaneously is called
2 to the 8th power, or 256
the number of unique values possible for one byte is
FALSE
the only way to run more than one operating system on the same computer is to dual-boot
FALSE
the operating system is stored on the ROM chip
TRUE
the operating system provides a user interface so user's can communicate directly with it
FALSE
the power supply only needs to be replaced if it burns out
FALSE
the primary changes that enable Web 2.0 are new functionality available from the web server
FALSE
the primary changes that enable Web2.0 are new functionality available from the web server
communication
the primary goal of the internet has always been
-a radio antenna -an integrated circuit
the primary parts of an RFID tag are which of the following
TRUE
the primary reason for brain-computer interface is as an assistive technology, including prosthetics
TRUE
the process of fetching, decoding, and executing an instruction is often called the CPU's instruction cycle
TRUE
the process of recharging your laptop battery and then removing it, while leaving the unit plugged in for continued use, might be "best practice"
FALSE
the protocols used always makes sure that all of your data arrives (undamaged)
FALSE
the smaller the word size, the faster we would expect the computer to run (complete its task)
TRUE
the system monitor (task manager) can be used to determine if your system needs more RAM
TRUE
the system monitor (task manager) can be used to stop an individual process (like a virus or spyware) running on the computer
TRUE
the system monitor (task manager) can be user to stop applications that are not responding
virtual memory
the technique of using a file on the disk to temporarily hold pages that do not fit into RAM, and then swapping them as necessary is called
system and application
the two broad categories of software are
TRUE
the two most common input devices for PCs are the keyboard and mouse
-twister-pair -wireless
the two most common media used to connect nodes in home networks are which of the following
coaxial cable
the type of networking media that is also used for cable TV is called
328 feet
the typical distance allowed for CAT 5 ethernet cables is
FALSE
the typical range of a bluetooth network is 100m (330 feet)
bits per second
the units "bps" stand for
FALSE
the user can pick whether circuit or packet switching is used
FALSE
the world wide web is the internet
TRUE
there are a number of free tools available to assist internet users in gaining a degree of anonymity
TRUE
there are legitimate uses for tracking or profiling web use
FALSE
there is no (technical) way to prevent your ISP from scanning the content of your internet traffic
TRUE
thermal printers are commonly used for point-of-sale devices, like gas pumps and ATMs
TRUE
thermal printers use a special paper that reacts to heat
FALSE
thermal printers use a waxy ink that is melted before being transferred to the paper
FALSE
to be sure your session cannot be hijacked when using a wireless hotspot, you need only ensure that the hotspot uses encryption
TRUE
to date, no one has released a cell phone that is truly 4G
TRUE
to read newsgroups, the client computer hd to have newsreader software
FALSE
today, circuit switching is rarely used in the internet
TRUE
today, the term personal computer refers to a general purpose computer used for everything from productivity software to entertainment
TRUE
toner-based printers typically use xerographic process to scan an image onto a print drum before fusing the ink to the paper
TRUE
traditional bar code generally represents numbers that identify a product
TRUE
twisted-pair copper wires, like CAT 5 and CAT 6, may be either shielded or unshielded
-wired -radio
two generic types of media discussed were which of the following
TRUE
two or more networks that are connected are an internet
40-56 kbps
typical download speeds for a dial-up connection are in the range of
TRUE
typically, DSL service provides different upload and download speeds
TRUE
typically, in a mobile network, only communication between the phone or PCS device and the local tower use radio
FALSE
web browsers and word processors are both examples of content access software
FALSE
web browsers are an example of educational software
TRUE
web-based vulnerabilities out number traditional computer security concerns
FALSE
webmail servers download and store the email on your (client) computer
FALSE
when a file or folder is specified as part of a URL, capitalization is irrelevant
FALSE
when an HTTP request is sent, it uses the underlying UDP protocol
internet protocol
when communicating on the internet, at some level, machines are talking to machines. They use the ___ protocol
FALSE
when evaluating a resource, the most important criterion is that the web page looks good, i.e. professional
FALSE
when files are deleted from a flash memory stick, they move to the trash bin
TRUE
when making changes to your system, like installing software, you should make sure that a restore point is created
TRUE
when possible you should use the advanced search features of the search engine
TRUE
when presented with a set of keywords, a search engines attempts to determine which web pages, that it knows about, best match your query
FALSE
when presented with a set of keywords, a search engines goes out into the WWW looking for pages that match
FALSE
malware does not affect hand-held devices, like smartphones
MOD 6 A
SNAPCHAT- THEBEST5711
MOD 6 A UNIT 2
SNAPCHAT- THEBEST5711
MOD 6 A UNIT 3
SNAPCHAT- THEBEST5711
MOD 6 B UNIT 4
SNAPCHAT- THEBEST5711
MOD 6 B UNIT 6
SNAPCHAT- THEBEST5711
MOD 7 TEST
SNAPCHAT- THEBEST5711
MOD 7 UNIT 1
SNAPCHAT- THEBEST5711
MOD 8 UNIT 1
SNAPCHAT- THEBEST5711
MOD 8 UNIT 2
SNAPCHAT- THEBEST5711
MOD 8 UNIT 3
SNAPCHAT- THEBEST5711
MOD 8 UNIT 4
SNAPCHAT- THEBEST5711
MOD 8 UNIT 5
SNAPCHAT- THEBEST5711
MOD 8 UNIT 6
SNAPCHAT- THEBEST5711
MOD 8 UNIT TEST
SNAPCHAT- THEBEST5711
MODULE 6 B TEST
SNAPCHAT- THEBEST5711
MOD 7 UNIT 2
SNAPCHAT-THEBEST5711
a web application
an application (in the Web) that you run using a browser is called
TRUE
supercomputers are used for complex calculations, like weather simulations
FALSE
the defragmentation process is short and should be done often
FALSE
creating normal user accounts on a PC is a waste of time
-windows -OS X -Linux
which of the following are considered operating systems
TRUE
"bit" is a contraction for binary digit
FALSE
2 dimensional barcodes are used only to represent product serial numbers
FALSE
A kindle (e-book) is not a computer
TRUE
Adding an audio cord may improve sound quality
TRUE
An IP address is the actual designation for a computer in the internet
TRUE
Any device that sends data into the computer can be considered an input device
TRUE
BD, DVD, and CD devices are considered to be random access device despite storing their data sequentially
FALSE
Because Blu-ray makes a physical change on the optical disk to store data. BDs are write-once or read only devices
TRUE
CD is an optical storage device that is rapidly being replaced by other media (DVD and BD)
FALSE
Commands typed into a computer are not considered data
TRUE
D2L is an example of educational software
TRUE
DSL requires a connection and login phase
FALSE
DSL would be a good choice for P2P applications, like music sharing
TRUE
DVDs are available that allow the user to reuse the disc
FALSE
HTTPS and PGP cannot be used in a secured (encrypted) WLAN
TRUE
Hacktivism refers to hacking for an activist cause
online chat
IM is a form of
Kbps
If you are using a dial-up modem to access the internet, you are probably using a speed measured in (modern modems attempt to connect at 56Kbps)
TRUE
If you install a new BD player/recorder in your PC, replacing the DVD unit you can still use the DVD device in an enclosure
FALSE
If your system is running sluggishly, there is nothing you can do except scan for malware
TRUE
Initial research on the internet was funded as a U.S. military project
FALSE
Level 1 cache memory is near the CPU
- 3G = 0.5 to 2 mbps - WiMax = 6 to 15 mbps - LTE = 16 to 25 mbps - 3.5G = 3 to 7 mbps
MATCH
- HTML = a way to describe the layout of a web document -hypertext = a web document that links to other resources - HTTP = a protocol for transmitting web documents - hyperlink = a way to navigate between web resources
MATCH
-CD= 700 MB -dual layer BD= 50 GB -floppy disk= 1.44 MB -double-sided DVD= 9 GB
MATCH
-LAN = a network covering a small area -WAN = a network covering a very large area -MAN = a city-sized network
MATCH
-aspect ratio= a comparison of the height to width -refresh rate=frequency at which the image is redrawn -dot pitch=distance between pixels -luminance=over all brightness -power consumption=wattage
MATCH
-byte= sms text message -kilobytes= word processed report -megabytes= digital photo (assume a good camera) -gigabytes= a feature length movie
MATCH
-intranet = a network that does not allow "outsiders" to use it -extranet = a network that allows "outsiders" access to specific resources -virtual private network = a technique that restricts access to communication over the internet -internet = any group of connect networks
MATCH
-resolution=number of pixels -viewable size=diagonal measure -viewing angle-measure of image degradation for users to the side -response time=how long the monitor takes to react to change -contrast ratio=comparison of luminosity for white and black
MATCH
-track= a complete circle of data -cluster= (part of) a file that spans more than one segment -cylinder= all of the tracks that lie one above the other -segment= an arc of a track (the part within a sector)
MATCH
Bytes- SMS text message Kilobytes- word processed report megabytes - digital photo (assume a good camera) gigabytes - a feature length movie
MATCH
RAM= hardware that is called temporary memory ROM= hardware that is also called permanent memory Volatile= implies data is lost without power Non-Volatile = implies data is NOT lost without power
MATCH
TRUE
MIME allows non-text information to be attached to an email
TRUE
Many enclosures include power, circuitry for multiple interface, sometimes cooling
TRUE
Non-volatile storage devices retain their data even without power
1,000,000,000 (billion)
One GB (gigabyte) is approximately how many bytes
1000 (thousand)
One KB (kilobyte) is approximately how many bytes
FALSE
RAID 0 decreases the speed at which you can write data because it has to be written to multiple disks
TRUE
RAID 0 increases the likelihood of data loss due to a failed device
FALSE
RAID 1 decreases the speed at which you can write data because it has to be written to multiple disks
FALSE
RAID 1 increases the likelihood of data loss due to a failed device
FALSE
ROM chips are only needed to boot computers that use the windows operating system
TRUE
S/MIME provided a means of securing email attachments, like pictures
TRUE
SCSI connections are now considered legacy devices, because of their relatively low speed and inability to collect more than one device
TRUE
SDDs can only be written to a limited number of times
MOD 5 UNIT 3
SNAPCHAT - THEBEST5711
MOD 5 UNIT 5
SNAPCHAT - THEBEST5711
MOD 6 B UNIT 5
SNAPCHAT - THEBEST5711
MOD 6A TEST
SNAPCHAT- THEBEST 5711
MOD 4 TEST
SNAPCHAT- THEBEST5711
MOD 4 UNIT 1
SNAPCHAT- THEBEST5711
MOD 4 UNIT 2
SNAPCHAT- THEBEST5711
MOD 5 UNIT 2
SNAPCHAT- THEBEST5711
MOD 5 UNIT 4
SNAPCHAT- THEBEST5711
FALSE
Smartphones are not computers
QUIZ 4 MOD 2 UNIT 4
Snap - THEBEST5711
QUIZ 1 MOD 2 UNIT 1
Snap- THEBEST5711
QUIZ 3 MOD 2 UNIT 3
Snap- THEBEST5711
Quiz 2 Mod 2 Unit 2
Snap- THEBEST5711
TRUE
TCP/IP is the underlying protocol for much of the internet
-storage -input -output
The CPU has its own
FALSE
The CPU performs complex tasks, like sorting a list of names
FALSE
The current (fastest) standard for USN ports is V2, supporting speeds up to 480 Mbps
FALSE
When buying an external disk drive, it should be a RAID array
-may represent a 0 or 1 -may represent a true or a false -is the smallest unit of data in a computer
Which apply to a bit
-mouse and keyboard -motherboard -monitor
Which of the following are examples of computer hardware?
-tend to be used for processing large amounts of data -tend to be used by large companies -they are often used for critical applications
Which of the following are true for a mainframe computer?
-they are always wired directly to the motherboard -they are used to connect devices inside the system unit -they connect devices outside the system unit -they are (generally) visible as group of ports on the back of the system unit
Which of the following are true for integrated ports
-PS/2 -Serial
Which of the following would be considered legacy- now little used- ports?
-have all of the keywords -the keywords are near one another -the keywords are in the order specified -the keywords are near the beginning of the document
With regard to the keywords entered, typical search engines try to find documents that meet which of the following conditions
on a social media site
a third party, server side application is an application
TABLET
a touchpad is most like a
FALSE
a touchpad requires separate buttons for selecting
TRUE
a trackball is essentially a ball mouse turned upside down
TRUE
a tracking cookie is one that is used to monitor your web browsing habits
TRUE
a web server is a file server that accepts requests for files from the internet
TRUE
a webcast refers to distributing sound and/or video to many receiving hosts
TRUE
a wiki can be used for collaborative writing projects
TRUE
a wireless PAN is usually limited to about 10m or 33 feet
TRUE
a wireless access point is needed to connect devices that are not part of the wired network
TRUE
a wireless bridge connects two different networks using radio as the connection
FALSE
a wireless hotspot in a coffee shop that uses encryption provides customers with a secured communications channel
TRUE
a wireless network interface card use radio to connect to a wi-fi network
TRUE
access control at the access point level refers to efforts to create a "closed network"
FALSE
access time for a random piece of data on tape is comparable to hard disk drives
-seek time -latency
access time is the sum of which of the following
FALSE
acts of hacktivism are not considered to be illegal
FALSE
adding or upgrading RAM is difficult
TRUE
after booting the computer, the operating system is always in RAM
TRUE
all (wired) external peripherals connect to the system through ports
FALSE
all adware is considered a type of malware
TRUE
all commercial software is copyrighted and licensed
TRUE
all crackers are thought of as criminals
TRUE
all files contain binary data
TRUE
all input devices provide data to the computer in digital form
FALSE
all keyboards use the same layout for keys
-using OR and NOT -using exact phrases -searching by date
among common search modifiers are which of the following
-popularity of the resource -political -economic -social
among the possible biases reflected by search engines were which of the following
-typical search returns too many hits -verifying the expertise of authors is difficult -search tools can be biased
among the problems listed for using the internet for research were which of the following
a wireless network
an 802.11 network is
TRUE
an HTTP request is a short message requesting a particular file from a particular host
TRUE
an ISP customer being able to access any resource on the internet without penalty (slower access or additional cost) is a form of net neutrality
transit
an ISP that needs to connect to more internet resources uses a ____ ISP
TRUE
an IrDA PAN requires devices to have direct line of sight to one another
FALSE
an IrDA PAN uses infrared light to reach typical distances of 10 m (33 feet)
FALSE
an IrDA PAN uses wireless technology to reach typical distances of 1 m (3 feet)
TRUE
an administrator account should only be used when necessary
TRUE
an optical mouse has no moving parts
TRUE
anti-spyware software is generally included in AV programs
TRUE
anti-virus software helps to detect and remove malware on your system
FALSE
any data stored in an applications temporary file is lost when the power goes out
FALSE
any pen-like implement can be used as a stylus
FALSE
any software that monitors user activity and reports on it is considered spyware
FALSE
any wireless router (standard: a, b, g, n, ....) may be user
TRUE
apple's entry in the netbook field is actually a notebook called the MacBook Air
TRUE
application software helps the user accomplish some specific, user oriented task
FALSE
application software helps the user manage their computer system
helps the user accomplish a specific task
application software is software that
TRUE
applications make use of the system software to accomplish their tasks
TRUE
applications that are designed for a specific field or part of a company are called vertical applications
TRUE
applications that are used by a broad range of people in different fields are called horizontal applications
FALSE
backing up your computer refers to saving copies of everything on your hard disk
FALSE
backups must be done manually
TRUE
ball mouse measures the movement of devices in 2 directions using the ball underneath it
FALSE
because Blue-ray makes a physical change on the optical disk to store data, BDs are write-once or read-only device
FALSE
because DSL uses the existing phone line, it prevents normal telephone use while connected to the internet
TRUE
because blu-ray is new, it is a likely candidate for adding an external device
FALSE
blocking broadcast of a WLANs ESSID prevents hackers from finding the network
FALSE
blogs are no more likely to reflect bias than newsgroups or discussion boards
FALSE
blogs typically do not allow readers to post
TRUE
bluetooth can provide a secure network
FALSE
bluetooth networks are connected with twisted-pair wiring
FALSE
cable internet access requires significant additional infrastructure (in urban areas)
FALSE
cache memory is entirely different from RAM
TRUE
cache memory is used to store data the CPU might need soon
TRUE
creating a new wireless network using a wireless access point device requires that the WAP be connected by wire to the wireless router
FALSE
current computers have clock speeds in the kilohertz (or thousands of cycles per second) range
TRUE
current netbooks tend to offer Windows as the OS
TRUE
currently, a Mac is much less likely to be attacked by a virus
TRUE
default-allow is a firewall policy that allows all communication that has not been specifically blocked
FALSE
default-deny is a firewall policy that blocks all communication
FALSE
defragmenting a hard drive has an insignificant impact on overall access time
TRUE
defragmenting a solid state drive has an insignificant impact on overall access time
TRUE
departmental software is just a sub category of enterprise software
TRUE
discussion boards store messages, allow various readers to view them, and possibly, post replies
FALSE
docking stations are built to standard specifications, so they all connect to the same
FALSE
dual core means that you have two completely separate processors
FALSE
dye-sublimation printers are considered too expensive for home use
TRUE
dye-sublimation printers are not recommended for text
TRUE
dye-sublimation printing typically builds a color image by successively printing with different colors
FALSE
eSATA is designed for disk drives and is clearly superior to USB and Firewire
TRUE
each router decides which interface (direction) a message should be sent to
1940s
early electronic computers, as we know them, were developed in which decade
TRUE
early personal computers were sold primarily for home use
TRUE
educational software includes software for managing grades
FALSE
it is generally necessary to add a network interface card to modern PCs
FALSE
it is not possible for the CPU to include an error, like "division by zero"
companies monitoring employees
keyloggers are most commonly used by
FALSE
keylogging refers to malware that affects the use of the system keyboard
TRUE
keylogging refers to software or hardware that monitors the use of the system keyboard
TRUE
laptops are difficult to add devices to internally
TRUE
laptops often provide an ExpressCard slot allowing devices to added externally
TRUE
laser printers use a toner-based technology
FALSE
light pens are still commonly used for high-end applications
TRUE
lighting and glare considered part of ergonomics of a workstation
FALSE
like a barcode, RFID will have no impact on your privacy
TRUE
line-of-sight is often required for wireless broadband
TRUE
liquid ink printers are more appropriate for legal documents
TRUE
lithium-ion batteries degrade more rapidly when hot
TRUE
lithium-ion batteries have an expected life range of 3 to 5 years
FALSE
lithium-ion battery life isn't affected by numbers of discharge-charge cycles
FALSE
location services, like Google latitude and facebook places, are not a privacy concern because your location is public - anyone there can see you
the fact that hardware only understands binary encoded data
machine language refers to
TRUE
magnetic media are considered permanent, although they actually aren't
TRUE
magnetic media works by reading or changing the polarity of a spot on the surface of the medium
FALSE
mainframe computers are called "dumb" because they only input and output information
TRUE
mainframe computers handle all processing in one central location
FALSE
maintaining privacy is no more difficult now, than it was 20 years ago
TRUE
malware designed to delete data files more than three years old would be considered intentionally harmful malware
TRUE
malware for indirect profit is often installed by the user
TRUE
malware includes any software that purposely harms your computer system
TRUE
malware that allows someone else to use your computer to send out advertising would be considered malware for profit
FALSE
malware that causes your browser to show pop-up ads would be considered prank malware
TRUE
malware that spies on user activity is considered malware for indirect profit
TRUE
malware, written as a test of skill, that does not intentionally harm a computer system is considered prank malware
TRUE
many antivirus software suites include firewall protection
TRUE
many device drivers are distributed pre-installed on a new computer
FALSE
many small computers do not have an operating system
TRUE
many times, malware is intentionally harmful
TRUE
messages in a discussion board are organized hierarchically
FALSE
net neutrality means that the government should not regulate ISPs
TRUE
netbooks are intended primarily for internet applications
FALSE
network address translation refers to redirecting your web page requests to another server
FALSE
newsgroup articles were kept for a maximum of one year before being deleted
TRUE
noticing search results that are missing can be an important search skill
FALSE
old videos (VHS or Super8) can be read directly into the computer for storage or manipulation
FALSE
once an application is started, it takes over all management of its data files
FALSE
once it is agreed that a particular pattern of bits means something (say, the letter "A"), no one can use that pattern for anything else
1,000,000 (million)
one MB = how many bytes
1,000,000,000,000 (trillion)
one TB (terabyte) = how many Bytes
TRUE
one advantage provided by a docking station is the availability of additional ports
TRUE
one advantage to ad hoc networks is how quickly they can be set up
TRUE
one concern with social networking sites is that they may claim the right to use content provided by individuals
TRUE
one example of product engineering software is computer aided design software
TRUE
one means of providing controlled access by guests to a WLAN is to force all user to go through a portal that authenticates the user
TRUE
one of the ways suggested to deal with the increasing number of phishing attacks is increased public awareness
TRUE
one problem that cable internet has that is not shared by DSL is that the "last mile" is shared by everyone in the neighborhood
TRUE
one proposed solution to the current vulnerabilities of the Web is to allow several large companies to provide network security for all
TRUE
one proposed solution to the current vulnerabilities of the web is to allow each user to protect their own computing resources
TRUE
one reason businesses use cloud computing is cost savings
TRUE
personal computers are often referred to as "workstations"
TRUE
personal computers are often referred to as workstations
FALSE
pharming refers to developing a zombie network or botnet
attempting to gain information through subterfuge
phishing refers to
FALSE
restore points must be created manually
TRUE
search engines attempt to pre-index all the WWW content to later match against queries
FALSE
speakers are not considered output devices because there is no hard copy
TRUE
specialty search tools are intended to find resources in the invisible web
TRUE
speech recognition can be used to enter commands to the computer
TRUE
speech recognition is often used for text entry now
TRUE
speech recognition is rapidly becoming a normal method of computer input
FALSE
spyware is used to collect innocuous information with the goal of improved targeting of ads
archival storage of data (backups)
tape drives are generally used for
rootkit
techniques used to hide a virus or to resurrect it when its process is killed are called
TRUE
telecommunications satellites use microwave radio for signal transmission
TRUE
telephone modems, and modem ports, are becoming legacy devices
30
terrestrial microwave relay towers can be ___ miles apart
FALSE
terrestrial microwaves are used to relay signals because they bend to follow the Earth's surface
TRUE
the CPU in most modern computers is a single microchip
TRUE
the CPU receives input, processes data, generates output, and has its own storage
FALSE
the MacBook Air does not perform as well as typical netbooks
TRUE
the WWW relies on the services of domain name servers
TRUE
the ability to download new data without a full page reload is key to Web 2.0
TRUE
the audio input system has to convert analog sound to digital
FALSE
the ball mouse has been largely replaced because of the lack of accuracy
FALSE
the deep web refers to subjects areas that return so many results that it is hard to narrow them down
TRUE
unlike newsgroups and discussion boards, blogs tend to focus on the posts of an individual
FALSE
use of a desktop PC, as opposed to a laptop, ensures proper ergonomics
FALSE
usenet newsgroups have been virtually supplanted by WWW discussion forums
TRUE
using HTTPS throughout your session in a wireless hotspot virtually assures that your session cannot be hijacked
TRUE
using a normal account, instead of administrator, means that malware may have to ask for increased permissions (thus warning you) before it is installed
TRUE
using external speakers disables built-in speakers
digging for answers
using the search modifiers would apply in which step
TRUE
utility software is concerned with managing the infrastructure of the computer
FALSE
utility software is intended for use only by advanced users
FALSE
vertical applications refers to widgets
TRUE
virtualization refers to running some other operating system, e.g. linux or windows, or windows on OS X
looking for open wireless networks
war driving refers to
NOT -restrict access by mac address -dont broadcast the network SSID NOT (.75) -restrict access by mac address -dont broadcast the network SSID -use HTTPS for secure web transactions NOT (.50) -use wpa2 with a good passphrase -restrict access by mac address -dont broadcast the network SSID -use HTTPS for secure web transactions NOT (.50) -dont broadcast the network SSID -use a VPN for office to office connections
which of the following are among the instructors recommendations for securing your small office WLAN
-more efficient use of system resources -ability to choose a GUI -availability of "power tools"
which of the following are among the reasons one might choose the Linux OS, rather than Windows or OS X
-too expensive to replace -current system performs adequately -plan to buy a new system too soon anyway -don't want to have to learn a new system
which of the following are among the reasons to continue to use a legacy system
-controls the order in which process are run -receives and interprets informations from the network -controls information sent to the monitor
which of the following are among the tasks performed by the OS kernel
-manages other programs running of the computer -provide common services to the user
which of the following are among the tasks performed by the operating system
-use a mobile OS, rather than Windows -typically use a capacitive touch screen -sometimes use a different architecture (chipset)
which of the following are characteristic of a nontraditional (non-wintel platform) tablet
-it is more interactive -it allows users to contribute data to the site -it is more dynamic
which of the following are characteristics that differentiate Web 2.0 from Web 1.0
-DVD -RAM -flash memory stick -hard disk
which of the following are considered storages devices
-allows the user to create a profile -allows the user to send private messages -allows users to post messages for anyone to see -allows users to join groups
which of the following are features of FaceBook
-often appears as a small graphical tool that stays on your desktop -has a simple user interface -run continuously or update periodically
which of the following are generally true for widgets
-hardware -user -software
which of the following are major elements of a computer-based system
-provide the necessary data and operation to be performed to the ALU -tell the ALU to perform the operation -save the result of the ALU operation -update the program counter (location of next instruction)
which of the following are normal operations for the control unit to perform
-adding a new device -adding or replacing RAM -adding a second disk drive
which of the following are the most common additions to (upgrades for) a computer system
-they are sealed to protect the device -they generally have multiple platters -the plattes must rotate to read the data -a read/write arm moves the "head" to the correct (radial) location
which of the following are true for hard disk drives
-they are always wired directly to the motherboard -they are used to connect devices inside the system unit -they connect devices outside the system unit -they are (generally) visible as group of ports on the back of the system unit
which of the following are true for integrated ports
-intended for a single user -initially were sold mostly as kits that users had to put together -also called a microcomputer
which of the following are true for personal computers
-use optical technology -are a permanent storage medium
which of the following are true with regard to Blu-ray disks
-has been compared to a web-based email client -is a form of microblogging -restricts message to 140 characters -uses SMS to send or receive tweets on cell phone
which of the following are true with regard to Twitter
-they provide a way for the web site to remember who are between clicks -they provide a means of remembering your purchase selections (shopping cart) -can be used to track your online activity
which of the following are true with regard to cookies
-news groups are organized hierarchically by subject -administration is based on consensual rules -users are expected to stick to the topic for the group
which of the following are true with regard to newsgroups
-no moving parts -lower access time than hard disk drives
which of the following are true with regard to solid state disk drives
-it generally provides slots for daughter boards -it provides connections (ports) for other devices
which of the following can be said of the motherboard
-it is an electronic circuit board -all of the system hardware attaches to it -the CPU is located on it
which of the following can be said of the motherboard
-united states -russia -china
which of the following countries were identified as the top three for hosting web-based attacks on users
-speed -cost -image quality
which of the following is a property that should be considered when buying a home printer
it helps run the computer hardware and system itself
which of the following is the MOST true for system software
-involves a collection of servers -data is stored in the cloud
which of the following is true with regard to cloud computing
-it is a collection of interconnected documents and resources -it is a service that runs on the internet -it connects documents with hyperlinks and URLs
which of the following is true with regard to the World Wide Web
dial-up
which of the following means of connecting to the internet interferes with normal telephone service
-shop at well-known sites -use a credit card or online payment service (like paypal) -use https
which of the following were among the safe shopping tips provided
-location of the access point and intervening structures -radio interference from household appliances -radio interference from nearby wireless networks
wireless networking range and data rates are affected by which of the following environmental factors
TRUE
wireless networks following the 802.11a,b, or g standard all have a practical indoor range of less than 150 feet
TRUE
with an insufficient amount of RAM, your system will run poorly
FALSE
with dual-band wireless (802.11n) you can expect approximately 600 Mbps in the home
TRUE
with dual-band wireless (802.11n) you effectively double the range of 802.11a, b, or g networks
it does not retain data without power
with regard to volatile memory, we can say
FALSE
with regard to web search engines, search modifiers refers to changing the keywords
FALSE
within the computing community, all hackers are thought of as criminals
TRUE
without an anonymizing service, your ISP will at least be able to tell what IP address you are sending from and to
TRUE
without programs, computer hardware would be useless
FALSE
without the use of special tools, normal users of the internet have no anonymity
TRUE
work on developing the internet began in the 1970s
FALSE
work stations are computers that are typically shared by multiple users
TRUE
workstations are more expensive than standard PCs
TRUE
you can start an application without a data file using the file manager
TRUE
you can usually tell if you are using integrated video (or audio) by the external port you plug into
FALSE
you should backup your file at the first sign of malware
FALSE
your files on a network file server are copied to your computer so you can access them locally
TRUE
zip disks had 70 to 500 times the storage capacity of a floppy disk