CPSC 100

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

TRUE

laser printer images are generally considered high quality

FALSE

prank malware does not cause harm to the computer system

capactive screen

a touch screen that uses the conductance of human body to change state of screen

FALSE

a touchpad is most commonly used on hand-held devices, like smarphones

FALSE

a typical home WLAN requires a separate wireless Ethernet bridge to allow wired devices to be connected

FALSE

a web crawler is someone who used the WWW extensively for research

web portal

a web page that provides a unified view of diverse resources is called a

TRUE

a web portal is often used by companies to provide controlled access to corporate resources with a consistent look and feel

FALSE

a web portal is the connection between your home network and the internet

evaluating (and correcting) logical errors in the file system

checking a disk refers to

a reliable model of data delivery between two hosts

circuit switching refers to

-a wireless access point or hotspot -you ISP at home -your company or business at work -your college or university at school

all of your internet traffic passes through your connection to the internet. This could be which of the following

FALSE

all personal area networks are wireless

FALSE

all shareware is provided with a time period after which the software will not work (without purchase)

FALSE

all software is copyrighted

FALSE

all web servers use the designation "www" for the hostname in a URL

TRUE

consider a person receiving driving directions from a smartphone. In this system, the user would be the driver

-a bridge -a hub -network attached storage (file server) -a printer or print server

examples of client devices in a home network include which of the following

-smartphones -PCs -internet phones

examples of client devices in a home network include which of the following

-email server software -database software

examples of enterprise infrastructure software include which of the following

FALSE

experts suggest that you should never use multiple AV programs

FALSE

external computer speakers contain an amplifier and require an AC power adapter

TRUE

external ports may be either integrated or made available on a circuit board plugged into the motherboard

FALSE

eye tracking refers to the use of technology to spy on where users are looking for the purpose of advertising

TRUE

firmware extends the functionality of hardware

TRUE

flash (thumb)drive technology is based on ROM chip technology

TRUE

flash memory sticks are a good choice for backing up user data

TRUE

flash memory sticks need to be "ejected" before removal

TRUE

mobile applications are often distributed through a specific network, such as Android's Marketplace or Apple's Appstore

TRUE

mobile broadband provides reasonable alternative to cable and DSL in urban areas

FALSE

moore's law indicates there will be a significant increase in CPU speed each year

TRUE

open source software always makes the source code available

FALSE

hyperlinks in a web page are in binary format

FALSE

in the peer-to-peer model, one of the peers is selected to be in charge

-time management -email -resource management -spreadsheet

information worker software includes which of the following

mod 3 unit 6

snapchat- THEBEST5711

TRUE

social engineering could be described as tricking users into providing information that can be used to fraud or to gain system access

TRUE

social networking sites are structured to limit anonymity

FALSE

the QWERTY computer keyboard is named after its inventor

FALSE

the client-server model fits Web 2.0 better than Web 1.0

TRUE

the concept of the motherboard described applies to any general purpose computer

TRUE

the majority of all web sites are vulnerable to "cross-site scripting" attacks

TRUE

web applications generally run on any computer platform

TRUE

webcasts are generally not interactive

planning

wikipedia is suggested as practical for which of the follow steps

Mod 3 unit 2

Snapchat- THEBEST5711

QUIZ 5 MOD 2 UNIT 5

Snapchat- THEBEST5711

module 2 chapter quiz

Snapchat- THEBEST5711

FALSE

Supercomputers today are relatively small devices

FALSE

Supercomputers were introduced in the 60s and have not changed much since

FALSE

WEP encryption, with a reasonable pass phrase, provides adequate security for WLANs

TRUE

WLANs are inherently less secure than wired LANs

TRUE

WPA2 encryption, with a reasonable pass phrase, provides adequate security for WLANs

FALSE

Web 1.0 refers to web requests that are for a single page only

TRUE

A (legacy) VGA connector is typically used to connect a computer monitor or other video equipment

TRUE

AV software can negatively impact the computer by slowing it down

TRUE

AV software cannot protect you against pharming attacks

TRUE

AV software looks for where the hacker signed his or her work

FALSE

AV software that performs on an on-access scan checks for viruses each time you logon

TRUE

AV software that uses a heuristic approach looks for software that appears similar to malware

TRUE

Cache memory is most like very fast RAM

TRUE

a (legacy) parallel port was most commonly used to connect a printer

4 gigabytes

a 32-bit system can directly address how much RAM

-supercomputer=scientist running a simulation -workstation=engineer designing a tool -personal computer=office worker creating a memo -mainframe=the IRS processing tax forms -smartphone= anyone getting driving directions

Matching

TRUE

a DVD device can generally read CDs

1,000,000 times

a Gbps network is how much faster than a Kbps network

TRUE

a MAC address is a unique identifier assigned to a network adapter

FALSE

a RAID array is considered a portable device

provide short-term power when power failure occurs

a UPS unit is intended primarily to

random access memory

RAM is an acronym that means

1,000 times

RAM is approximately how much faster than a traditional hard disk

FALSE

RAM is wired to (integrated on) the motherboard

TRUE

RFID can be used to identify individual products, like a serial number, as well as product brand and type

FALSE

RFID tags use a laser to scan the tag for a product number

TRUE

a WUSB hub (DWA) allows current USB 2.0 devices to connect wirelessly to a host

a means of bypassing normal authentication

a backdoor refers to

TRUE

a ball mouse measures the movement of the device in two directions using a ball that contacts a surface underneath

8

a byte contains how many bits

tier 1

a carrier that can access any part of the world-wide internet without having to using a higher-level ISP is called

TRUE

a chord keyboard is a computer input device

TRUE

a clock helps synchronize all the activity in a computer

TRUE

a cloud license can be more flexible, based on actual use of the application software

TRUE

clock speed is the rate at which groups of 32 (or 64( bits at a time are presented to the CPU

FALSE

cloud applications (software) are always free

FALSE

coaxial cable is an unshielded medium

FALSE

commercialization of the internet began in the mid-1980s

TRUE

common data rates for CAT 5 ethernet are 10 or 100 Mbps

FALSE

computer gaming and entertainment were the only reasons cited for researching new computer I/O techniques

TRUE

computer hardware is limited in the tasks it can perform

FALSE

computer uses Morse code to represent characters

TRUE

computers that use cloud computing can have less hardware and software than normal PC

FALSE

connecting to and using someone else's WLAN requires explicit action by the interloper

TRUE

consider a person receiving driving directions form a smartphone. In this system, software includes phone operating system, mapping, and location services

FALSE

consider a person receiving driving directions from a smartphone. in this system, the hardware would be the car

media development software

desktop publishing, digital animation editors, and video composition software are examples of

FALSE

devices connected to a network switch share their connection with other devices

TRUE

dial-up modem access to the internet requires a lengthy connection process

TRUE

elementary haptic interfaces are in common use today

TRUE

encryption software may be used to protect your information even if someone has broke into your system

TRUE

every CPU has an arithmetic and logic unit

TRUE

evolving a search query refers to changing the keywords based on earlier results

FALSE

facebook is open to anyone who registers

TRUE

fiber-based internet often does not use fiber all the way to the home

TRUE

file systems are typically hierarchical

TRUE

files on a network file server can generally be accessed using the file manager, once the drive is mounted

FALSE

firesheep is a browser add-on that destroys tracking cookies

FALSE

firewalls are expensive, specialized devices that are used in a corporate setting to protect their LAN

TRUE

firewalls are generally available on most laptops and PCs

TRUE

firewalls are generally available on most network routers

FALSE

firmire is high-level programming thats used to solve difficult user problems

TRUE

firmware is generally considered permanent

TRUE

for a web page to be returned as a hit it must already have been indexed by the search

-including a photo of someone that does not want their picture posted -connecting a person's image with their name -connecting a person with a location or event

for photographs posted on a website, like facebook, which of the following can impact privacy of a subject in the photo

FALSE

freeware is software that is not copyrighted

TRUE

from a consumer perspective, the primary advantage to purchasing software pre-installed is that it is usually offered at a reduced cost

TRUE

games and web browsers are both examples of content access software

FALSE

generally, discussion boards allow anyone to post messages

TRUE

generally, discussion boards allow anyone to read messages

FALSE

generally, discussion boards are more loosely controlled than newsgroups

TRUE

haptic interfaces refer to use of the sense of touch

FALSE

hard disk drives are built to standards such that the platters are all the same size and spin at the same speed

TRUE

hardware includes any part of a computer system you can touch, except the "user"

TRUE

a computer is a machine that manipulates data according to a list of instructions called a program

TRUE

a computer may be part of a more complex device

TRUE

a computer platform is the combination of operating system and hardware running on a computer

thrashing

a condition in which the system spends an inordinate amount of time moving pages back and forth between RAM and the hard disk, is called

FALSE

a cookie saved by a web site can only be read by that web site

codec

a device that converts from analog to digital (and then back again) is called a

FALSE

a distributor cannot charge you for public domain software

TRUE

a docking station allows rapid connection of a laptop to many peripherals normally associated with a desktop PC

FALSE

a docking station always provides power to recharge connected laptop

TRUE

a driver is a program written and distributed by the device manufacturer

FALSE

a dual core processor operates at least twice as fast as a single core processor

FALSE

a facebook third party, server side application is created by Facebook

FALSE

a false positive refers to the situation where a virus is detected, but cannot be removed by the AV software

TRUE

a file pathname that refers to the server's file system, may be added to the end of a URL to specify a particular folder or file

FALSE

a file server moves all of your files to your local computer when you log on

FALSE

a file type is determined by the icon that the file manager displays

TRUE

a firewall can block unauthorized access to your PC or network, while allowing legitimate communications through

FALSE

a firewall determines what communications to block by analyzing the data for malware or hacker activity

TRUE

a fragmented file is one which could not be stored all in one piece on the disk drive

FALSE

a good definition for "computer hardware" would be : any device inside the computer casing (tower)

web directory

a hierarchical listing of resources by subject area is called a

TRUE

a home area network is a small LAN that is managed by a non-IT professional

-file sharing -printer sharing

a home group allows which of the following

access

a home user that wants to connect to internet resources uses a ___ ISP

FALSE

a host wire adapter allows wireless devices to be connected by wire

TRUE

a hub is the same thing as a repeater, except with multiple ports

FALSE

a hub only relays messages to the device (port) that it is addressed to

FALSE

a killer application is one that allows the user to stop applications that have quit responding to user input

TRUE

a killer application is one that is so popular that it increases sales for the platform it runs on

FALSE

a metasearch engine is used to research esoteric topics, such as the "reincarnation of thetans"

TRUE

a modern PCs have a video adapter integrated onto the motherboard

TRUE

a multi-core machine has more than one processor on the integrated circuit

TRUE

a network adapter is necessary to connect a PC or Laptop to a LAN

virtual private network

a network that is built upon the public internet, but is secured by encryption is called

TRUE

a passive RFID tag does nothing; it must be read like a barcode

someone that uses someone else's wireless internet connection

a piggybacker is

TRUE

a podcast generally refers to a scheduled download of a recorded event

TRUE

a pointing device is used to control a graphical user interface

TRUE

a pointing device provides the user with a means of selecting objects on the screen

FALSE

a pointing stick is generally more accurate than touchpad

TRUE

a primary reason for most home networks is to share broadband internet access

TRUE

a properly designed workstation (area) will promote increased productivity

storage local to the CPU

a register is

TRUE

a repeater is essentially a relay device

FALSE

a router is a device that connects different segments of the same network

FALSE

a server typically handles most of the data processing for its clients

FALSE

a single conversation in a discussion board is called a tree

TRUE

a single motherboard may have level 1, level 2 and level 3 cache memory

FALSE

a spare battery should be purchased when you buy your laptop

TRUE

a stylus uses a pen-like device allowing the user both to select and create strokes, like hand writing

TRUE

a surge protector may need to be replaced after being subjected to a surge

TRUE

a surge protector's clamping voltage refers to the highest voltage the unit will allow

TRUE

a swap ( page) file is a file on the hard disk that contains programs or data that does not currently fit into RAM

-targeted -an attempt to further understanding

according to the definition of research, your efforts should be which of the following

google chrome

according to the notes/text, which of the five major browsers listed below is the most widely used

FALSE

an application server is a computer dedicated to a single task, like word processing

TRUE

an application suite is a set of applications that are designed to work together

-accept email from other servers -store email for users -forward email to other servers -deliver email to user

an email server performs which of the following tasks

TRUE

an embedded system is one where the entire "computer" may exist on a circuit board

TRUE

an enclosure is designed for a specific kind of device

TRUE

an ergonomic keyboard is one whose physical design is altered to more appropriately match human anatomy (or use)

1800s

assuming we are only interested in programmable computes, in what century were computers first described

FALSE

assuming your WLAN is setup to use encryption, the only way someone can gain unauthorized access is by cracking the system

FALSE

authentication is making sure that malware has not been substituted for the software you want

TRUE

avoiding system bottlenecks is one reason you might choose not to build your own system

TRUE

bridges connect different segments of the same network

FALSE

buffer overflow attacks are generally caught by AV programs

FALSE

building your own system should only be attempted by the very knowledgeable

dead links

hyperlinks that no longer point to the intended resources are called

TRUE

hypertext links to other resources that display on a web page are included when the server responds to the initial request for a page

FALSE

hypertext markup language is the rules for transmitting a web page between hosts

TRUE

if a software license restricts use of the software to a single computer, you may not install both at work and at home

FALSE

if a software license restricts use of the software to a single person, others can use it, but only one at a time

TRUE

if you allow your computer (browser) to remember passwords for you, it should require authorization to use it

bps

if you are using a typical wireless or home broadband network to access the internet, you are probably using a speed measured in

FALSE

if you laptop/PC does not have enough USB ports, you need to upgrade

hosting

if you wanted to create your own web site, you would probably be using ______ ISP

FALSE

images that display on a web page are included when the server responds to the initial requests for a page

TRUE

most PC's and laptops have an internal hard disk drive

TRUE

most PCs now provide audio integrated on the motherboard

TRUE

most UPS unites include surge protection

TRUE

most adware is relatively benign

FALSE

most applications software can be used on any computing platform

TRUE

most commercial software has a license that allows installation on only one computer (at a time)

FALSE

most consider Mac OS more wasteful of system resources than Microsoft Windows

TRUE

most current cameras are digital i.e. they record a digital image

HTTPS

most e-commerce on the web uses

FALSE

most experts recommend completely discharging a lithium-ion battery before recharging it

FALSE

most free, open source software is not yet good enough to depend on

TRUE

most laptops and cell phones include a digital camera

FALSE

most networks, including internet service providers, measure speeds in bytes per seconds to match units reported by most browsers

TRUE

most of the loss of anonymity on the internet is caused by spying on our internet transactions

TRUE

most software is developed for a particular platform and will not run on other platforms

FALSE

most traditional media have been unaffected by the internet

TRUE

most traditional tablet computers run a slightly modified version of windows or linux

TRUE

most traditional tablets use virtual (on screen) keyboards and a stylus with a resistive touch screen

TRUE

most users are either not aware of or do not use privacy settings in facebook

TRUE

most utility software is very focused, dealing with only one, or a few, task(s)

-the author has forfeited all intellectual property rights -you can use in any way, and for anything, that you want -you make copies and distribute it -you may modify it and distribute it

regarding software in the public domain, we can say

TRUE

one reason that Mac OS has been able to provide customers with a consistent, reliable system is Apple's vertical integration model

TRUE

one reason to be concerned about a hacker gaining access to your computer is that it could then be used to launch attacks against others

TRUE

one use for a backup is to recover a file that has since purposely been deleted

FALSE

open source software is not copyrighted

TRUE

operating systems, as we know them , didn't become available until the 1960s

FALSE

opinion has no place in research

FALSE

optical fiber media is subjected to interference from electromagnetic signals

TRUE

optical fiber media uses light to transmit data

TRUE

originally, email allowed only text to be sent and received

sending data in parts, each of which may follow a different path, and reassembling them at the other end

packet switching refers to

FALSE

passive RFID tags can only be read if they are within a couple inches of the reader

TRUE

passwords should be changed regularly

FALSE

podcasts are "streamed"

TRUE

print-only resources can be more difficult to use for research than the internet

spyware

privacy-invasive software is another term for

TRUE

public domain software is not copyrighted

FALSE

public domain software may have a license that restricts what you can do with it

TRUE

servers are used to allow applications and-/or data to be centralized

TRUE

shareware is generally intended as software that you can try before buying

FALSE

shareware is software that you may not do anything you wish with i.e. it is in the public domain

FALSE

simulation software is an example of product engineering software

FALSE

since USB is a connection standard, all USB ports are shaped the same

FALSE

since a determined hacker will (probably) eventually break into your system anyway, a good password is not necessary

FALSE

since a parallel ports send multiple data bits at the same time, compared to serial ports that send one at a time, parallel busses are always faster interface than serial busses

internet telephony

skype is a company that provides free (under some circumstances) ____ services

FALSE

in a cellular network, the term cell refers the hand-held device being used

TRUE

in a mobile cellular network, switching control of a call from one cell to another is handled by a base station

TRUE

in a wireless distribution system, all of the base stations use the same encryption (type and key) and the same channel

FALSE

in a wireless distribution system, the base stations need to be connected by wired ethernet

TRUE

in general, a Mac is more expensive than a PC

TRUE

in general, a desktop PC system can be expanded or upgraded more easily than a laptop

FALSE

in general, a desktop computer is more expensive than a laptop

FALSE

in general, it is easier to maintain (system administration) a PC than a Mac

TRUE

in general, it is easier to upgrade a desktop PC than a laptop

TRUE

in general, schools and businesses tend to use Microsoft Windows

TRUE

in general, there are more applications available for a PC than for a MAc

TRUE

in order for a web request to work, the server must already be running and waiting for requests

FALSE

in order to rule a resource out, you have to read it

TRUE

in the U.S. privacy laws depend on whether you had a reasonable expectation of privacy

FALSE

in the client-server model, the client shares its resources with the server

TRUE

in the client-server model, the server is a program on a host that waits for requests from clients

FALSE

in the client-server model, the server makes a request of the client, which then responds to the server

TRUE

in the media, and generally outside the computing community, all hackers are thought of as criminals

TRUE

in the peer-to-peer model, each of the peers shares resources with other participants

FALSE

including EXIF data in a photo you post is a violation of your privacy

TRUE

individual countries have shut down the internet within their borders

FALSE

infrared light can be used for communication to line-of-sight devices miles away

-identification of a topic -creation of a research plan -an evaluation of sources of information

inherent in the definition of research was which of the following

FALSE

initially, "PC" referred to any personal computer. Today, it's used to distinguish windows computers from Mac OS computers

FALSE

inkjet printers use solid ink that is transferred to paper

TRUE

internet privacy is concerned with control over access to personal information

FALSE

microcontroller is another name for a personal computer

TRUE

microcontrollers often have little or no interaction with the user

TRUE

microsoft windows is considered by many to be harder to use and manage than Mac OS

FALSE

when setting up a new PC, all you need do for security is make sure an AV program is running (and create a normal user account)

TRUE

when typing in a URL, the capitalization of the host/domain name does not matter

FALSE

when using cloud computing, your computer connects to a specific server in the internet

TRUE

when you combine disks in one of the RAID schemes, they appear as one hard disk to the system

FALSE

whether or not a workstation (area) is to be ergonomically designed is a personal decision

-application software -system software

which are "major classes" of software

-headphones -network -classroom (computer) projector

which are considered computer output devices

-monitor -mouse/keyboard -motherboard

which are examples of computer hardware

-flexible -has a stable image because displays refreshed at lower rate than LCD monitors -has contrast ratio similar to newspaper

which are true for electronic paper display

-both input and output -common on hand-held devices

which are true regarding touch screens

-brain -microchip -CPU

which cna be applied to the computer's processor

is limited to certain specific tasks

which does NOT apply to software

-ball mouse -stylus -optical mouse -active pen

which is more accurate than a touchpad for input

-mozilla firefox -google chrome -apple safari -opera

which of the five major browsers listed below are free

-is also called a residential gateway -connects the home network to the broadband modem -allows the various home devices to share an internet connection

which of the following applies to a broadband router

-forms permanent storage -sometimes called secondary memory

which of the following applies to mass storage devices

-smaller -less computing power -lighter weight -less expensive

which of the following apply to netbooks as compared to laptops and notebooks

-patriot act -electronic communications privacy act -children's online privacy protections

which of the following are among the U.S. laws discussed that affect internet privacy

-HTTPS -PGP -IPsec

which of the following were mentioned as useful for securing communications between hosts on the internet

-what resources does school (or work) provide me -what software is available for me to use at school (or work) -do i need a portable system

which of the following would be good initial questions to answer to help decide your requirements

-ethernet -IP

which two common, low-level network communications protocols were mentioned

TRUE

while speaker quality varies widely, most built-in speakers are low-quality

TRUE

wi-fi protected access (v2) is the currently recommended encryption standard for home

FALSE

wired equivalent privacy is the currently recommended encryption standard for home WLANs

FALSE

wireless LAN technology has always been designed primarily for the home market

TRUE

wireless LANs use radio technology to connect a wireless access point to devices with wireless transceivers

automatic discovery and connection v security

wireless PANs have the conflicting goals of

TRUE

wireless USB provides a high bandwidth connection at short distances

TRUE

wireless broadband bandwidth is comparable to ADSL and cable

FALSE

wireless broadband is available only in rural areas

FALSE

wireless intrusion prevention systems are available in most home wireless routers

FALSE

wireless media tends to be more secure and private than wired

TRUE

smartphones and other hand-held devices use an embedded operating system

-media players -personal digital assistants -gps -video recorder

smartphones exhibit functionality that used to be sold as separate devices, including which of the following

TRUE

smartphones have begun to replace laptops as a mobile platform in business for some people

TRUE

smartphones runs a complete mobile operating system

MOD 3 TEST

snapchat- THEBEST5711

mod 3 unit 3

snapchat- THEBEST5711

mod 3 unit 4

snapchat- THEBEST5711

mod 3 unit 1

snapchat- thebest5711

MOD 5 TEST

snapchat-THEBEST5711

spying on network traffic

sniffing refers to

TRUE

software is converted to binary code before it can be ran on computers

TRUE

software is generally written in a high-level programming language

TRUE

software is useless without computer hardware

TRUE

software purchased with a new system is generally cheaper than software purchased later

TRUE

software tasks are often more complex than hardware tasks

enterprise software

software that addresses the needs of an organization or business is called

FALSE

software that comes with a computer that you have purchased actually is purchased, not licensed

shareware

software that has been made available for free, but with limited functionality unless you purchase it, is called

TRUE

software that is available for free, but asks for an optional donation, is called freeware

content access software

software used primarily to access information without changing it are called

simulation software

software used to model abstract systems or physical phenomena is called

TRUE

solid ink printers have a long warm-up period

FAlSE

solid ink printers use red, green, and blue wax that is melted and transferred to a drum and then to paper

TRUE

some UPS units monitor and correct a variety of power conditions

TRUE

some believe that WLANs should be open (unsecured) by default for technical and social reasons

TRUE

some believe that the internet (and ISPs) should be treated as "common carriers"

TRUE

some cable TV/internet systems use fiber optics

FALSE

some commercial software is available for free

TRUE

some discussion boards are moderated, i.e. messages must be approved before they appear

TRUE

some good AV software is available for free

TRUE

some operating systems allow you to pick the user interface you want to use

-wi-fi capability -mobile broadband access -the ability to run many third-party applications

some typical smartphone features include which of the following

TRUE

some utility software is intended to allow the user to manage the computer system

script kiddie

someone that breaks into systems for fun using instructions found on a hacker web site would be called an

white-hat hacker

someone that works for a security firm, finding and patching security holes would be called a

FALSE

surge protection applies only to electrical power connections

FALSE

surge protectors are only intended to protect equipment from lightning

TRUE

system software works with applications so they can perform their intended tasks

FALSE

tablet computers typically offer an optional touch screen

TRUE

tablets are considered to be fully functional personal computers

FALSE

the delay while waiting for data to be read (or written) on a hard disk is called the data transfer rate

network interface card

the device in your computer that allows it to physically connect to a network is called a

what are my requirements

the first question you should consider when purchasing a computer is

identify the topic and what kind of research is needed

the first step in research should be

FALSE

the format of text email has changed dramatically from what it was in the early days of the internet

FALSE

the internet corporation for assigned names and numbers is in charge of the global internet

FALSE

the internet governance forum is in charge of the global internet

TRUE

the internet has created/enabled new modes of human interaction

FALSE

the joules rating of a surge protector should be as low as possible

TRUE

the kernel is a part of the operating system that most users never "see"

TRUE

the level of cache memory tells us both how close it is to the CPU and the order in which it is searched

TRUE

the license for open source software may restrict what you can do with it after you modify the source code

TRUE

the longer the response time of a surge protector, the more likely your equipment will be damaged

twisted-pair wire

the most widely used medium for networking is

the word size

the number of bits that the CPU can read simultaneously is called

2 to the 8th power, or 256

the number of unique values possible for one byte is

FALSE

the only way to run more than one operating system on the same computer is to dual-boot

FALSE

the operating system is stored on the ROM chip

TRUE

the operating system provides a user interface so user's can communicate directly with it

FALSE

the power supply only needs to be replaced if it burns out

FALSE

the primary changes that enable Web 2.0 are new functionality available from the web server

FALSE

the primary changes that enable Web2.0 are new functionality available from the web server

communication

the primary goal of the internet has always been

-a radio antenna -an integrated circuit

the primary parts of an RFID tag are which of the following

TRUE

the primary reason for brain-computer interface is as an assistive technology, including prosthetics

TRUE

the process of fetching, decoding, and executing an instruction is often called the CPU's instruction cycle

TRUE

the process of recharging your laptop battery and then removing it, while leaving the unit plugged in for continued use, might be "best practice"

FALSE

the protocols used always makes sure that all of your data arrives (undamaged)

FALSE

the smaller the word size, the faster we would expect the computer to run (complete its task)

TRUE

the system monitor (task manager) can be used to determine if your system needs more RAM

TRUE

the system monitor (task manager) can be used to stop an individual process (like a virus or spyware) running on the computer

TRUE

the system monitor (task manager) can be user to stop applications that are not responding

virtual memory

the technique of using a file on the disk to temporarily hold pages that do not fit into RAM, and then swapping them as necessary is called

system and application

the two broad categories of software are

TRUE

the two most common input devices for PCs are the keyboard and mouse

-twister-pair -wireless

the two most common media used to connect nodes in home networks are which of the following

coaxial cable

the type of networking media that is also used for cable TV is called

328 feet

the typical distance allowed for CAT 5 ethernet cables is

FALSE

the typical range of a bluetooth network is 100m (330 feet)

bits per second

the units "bps" stand for

FALSE

the user can pick whether circuit or packet switching is used

FALSE

the world wide web is the internet

TRUE

there are a number of free tools available to assist internet users in gaining a degree of anonymity

TRUE

there are legitimate uses for tracking or profiling web use

FALSE

there is no (technical) way to prevent your ISP from scanning the content of your internet traffic

TRUE

thermal printers are commonly used for point-of-sale devices, like gas pumps and ATMs

TRUE

thermal printers use a special paper that reacts to heat

FALSE

thermal printers use a waxy ink that is melted before being transferred to the paper

FALSE

to be sure your session cannot be hijacked when using a wireless hotspot, you need only ensure that the hotspot uses encryption

TRUE

to date, no one has released a cell phone that is truly 4G

TRUE

to read newsgroups, the client computer hd to have newsreader software

FALSE

today, circuit switching is rarely used in the internet

TRUE

today, the term personal computer refers to a general purpose computer used for everything from productivity software to entertainment

TRUE

toner-based printers typically use xerographic process to scan an image onto a print drum before fusing the ink to the paper

TRUE

traditional bar code generally represents numbers that identify a product

TRUE

twisted-pair copper wires, like CAT 5 and CAT 6, may be either shielded or unshielded

-wired -radio

two generic types of media discussed were which of the following

TRUE

two or more networks that are connected are an internet

40-56 kbps

typical download speeds for a dial-up connection are in the range of

TRUE

typically, DSL service provides different upload and download speeds

TRUE

typically, in a mobile network, only communication between the phone or PCS device and the local tower use radio

FALSE

web browsers and word processors are both examples of content access software

FALSE

web browsers are an example of educational software

TRUE

web-based vulnerabilities out number traditional computer security concerns

FALSE

webmail servers download and store the email on your (client) computer

FALSE

when a file or folder is specified as part of a URL, capitalization is irrelevant

FALSE

when an HTTP request is sent, it uses the underlying UDP protocol

internet protocol

when communicating on the internet, at some level, machines are talking to machines. They use the ___ protocol

FALSE

when evaluating a resource, the most important criterion is that the web page looks good, i.e. professional

FALSE

when files are deleted from a flash memory stick, they move to the trash bin

TRUE

when making changes to your system, like installing software, you should make sure that a restore point is created

TRUE

when possible you should use the advanced search features of the search engine

TRUE

when presented with a set of keywords, a search engines attempts to determine which web pages, that it knows about, best match your query

FALSE

when presented with a set of keywords, a search engines goes out into the WWW looking for pages that match

FALSE

malware does not affect hand-held devices, like smartphones

MOD 6 A

SNAPCHAT- THEBEST5711

MOD 6 A UNIT 2

SNAPCHAT- THEBEST5711

MOD 6 A UNIT 3

SNAPCHAT- THEBEST5711

MOD 6 B UNIT 4

SNAPCHAT- THEBEST5711

MOD 6 B UNIT 6

SNAPCHAT- THEBEST5711

MOD 7 TEST

SNAPCHAT- THEBEST5711

MOD 7 UNIT 1

SNAPCHAT- THEBEST5711

MOD 8 UNIT 1

SNAPCHAT- THEBEST5711

MOD 8 UNIT 2

SNAPCHAT- THEBEST5711

MOD 8 UNIT 3

SNAPCHAT- THEBEST5711

MOD 8 UNIT 4

SNAPCHAT- THEBEST5711

MOD 8 UNIT 5

SNAPCHAT- THEBEST5711

MOD 8 UNIT 6

SNAPCHAT- THEBEST5711

MOD 8 UNIT TEST

SNAPCHAT- THEBEST5711

MODULE 6 B TEST

SNAPCHAT- THEBEST5711

MOD 7 UNIT 2

SNAPCHAT-THEBEST5711

a web application

an application (in the Web) that you run using a browser is called

TRUE

supercomputers are used for complex calculations, like weather simulations

FALSE

the defragmentation process is short and should be done often

FALSE

creating normal user accounts on a PC is a waste of time

-windows -OS X -Linux

which of the following are considered operating systems

TRUE

"bit" is a contraction for binary digit

FALSE

2 dimensional barcodes are used only to represent product serial numbers

FALSE

A kindle (e-book) is not a computer

TRUE

Adding an audio cord may improve sound quality

TRUE

An IP address is the actual designation for a computer in the internet

TRUE

Any device that sends data into the computer can be considered an input device

TRUE

BD, DVD, and CD devices are considered to be random access device despite storing their data sequentially

FALSE

Because Blu-ray makes a physical change on the optical disk to store data. BDs are write-once or read only devices

TRUE

CD is an optical storage device that is rapidly being replaced by other media (DVD and BD)

FALSE

Commands typed into a computer are not considered data

TRUE

D2L is an example of educational software

TRUE

DSL requires a connection and login phase

FALSE

DSL would be a good choice for P2P applications, like music sharing

TRUE

DVDs are available that allow the user to reuse the disc

FALSE

HTTPS and PGP cannot be used in a secured (encrypted) WLAN

TRUE

Hacktivism refers to hacking for an activist cause

online chat

IM is a form of

Kbps

If you are using a dial-up modem to access the internet, you are probably using a speed measured in (modern modems attempt to connect at 56Kbps)

TRUE

If you install a new BD player/recorder in your PC, replacing the DVD unit you can still use the DVD device in an enclosure

FALSE

If your system is running sluggishly, there is nothing you can do except scan for malware

TRUE

Initial research on the internet was funded as a U.S. military project

FALSE

Level 1 cache memory is near the CPU

- 3G = 0.5 to 2 mbps - WiMax = 6 to 15 mbps - LTE = 16 to 25 mbps - 3.5G = 3 to 7 mbps

MATCH

- HTML = a way to describe the layout of a web document -hypertext = a web document that links to other resources - HTTP = a protocol for transmitting web documents - hyperlink = a way to navigate between web resources

MATCH

-CD= 700 MB -dual layer BD= 50 GB -floppy disk= 1.44 MB -double-sided DVD= 9 GB

MATCH

-LAN = a network covering a small area -WAN = a network covering a very large area -MAN = a city-sized network

MATCH

-aspect ratio= a comparison of the height to width -refresh rate=frequency at which the image is redrawn -dot pitch=distance between pixels -luminance=over all brightness -power consumption=wattage

MATCH

-byte= sms text message -kilobytes= word processed report -megabytes= digital photo (assume a good camera) -gigabytes= a feature length movie

MATCH

-intranet = a network that does not allow "outsiders" to use it -extranet = a network that allows "outsiders" access to specific resources -virtual private network = a technique that restricts access to communication over the internet -internet = any group of connect networks

MATCH

-resolution=number of pixels -viewable size=diagonal measure -viewing angle-measure of image degradation for users to the side -response time=how long the monitor takes to react to change -contrast ratio=comparison of luminosity for white and black

MATCH

-track= a complete circle of data -cluster= (part of) a file that spans more than one segment -cylinder= all of the tracks that lie one above the other -segment= an arc of a track (the part within a sector)

MATCH

Bytes- SMS text message Kilobytes- word processed report megabytes - digital photo (assume a good camera) gigabytes - a feature length movie

MATCH

RAM= hardware that is called temporary memory ROM= hardware that is also called permanent memory Volatile= implies data is lost without power Non-Volatile = implies data is NOT lost without power

MATCH

TRUE

MIME allows non-text information to be attached to an email

TRUE

Many enclosures include power, circuitry for multiple interface, sometimes cooling

TRUE

Non-volatile storage devices retain their data even without power

1,000,000,000 (billion)

One GB (gigabyte) is approximately how many bytes

1000 (thousand)

One KB (kilobyte) is approximately how many bytes

FALSE

RAID 0 decreases the speed at which you can write data because it has to be written to multiple disks

TRUE

RAID 0 increases the likelihood of data loss due to a failed device

FALSE

RAID 1 decreases the speed at which you can write data because it has to be written to multiple disks

FALSE

RAID 1 increases the likelihood of data loss due to a failed device

FALSE

ROM chips are only needed to boot computers that use the windows operating system

TRUE

S/MIME provided a means of securing email attachments, like pictures

TRUE

SCSI connections are now considered legacy devices, because of their relatively low speed and inability to collect more than one device

TRUE

SDDs can only be written to a limited number of times

MOD 5 UNIT 3

SNAPCHAT - THEBEST5711

MOD 5 UNIT 5

SNAPCHAT - THEBEST5711

MOD 6 B UNIT 5

SNAPCHAT - THEBEST5711

MOD 6A TEST

SNAPCHAT- THEBEST 5711

MOD 4 TEST

SNAPCHAT- THEBEST5711

MOD 4 UNIT 1

SNAPCHAT- THEBEST5711

MOD 4 UNIT 2

SNAPCHAT- THEBEST5711

MOD 5 UNIT 2

SNAPCHAT- THEBEST5711

MOD 5 UNIT 4

SNAPCHAT- THEBEST5711

FALSE

Smartphones are not computers

QUIZ 4 MOD 2 UNIT 4

Snap - THEBEST5711

QUIZ 1 MOD 2 UNIT 1

Snap- THEBEST5711

QUIZ 3 MOD 2 UNIT 3

Snap- THEBEST5711

Quiz 2 Mod 2 Unit 2

Snap- THEBEST5711

TRUE

TCP/IP is the underlying protocol for much of the internet

-storage -input -output

The CPU has its own

FALSE

The CPU performs complex tasks, like sorting a list of names

FALSE

The current (fastest) standard for USN ports is V2, supporting speeds up to 480 Mbps

FALSE

When buying an external disk drive, it should be a RAID array

-may represent a 0 or 1 -may represent a true or a false -is the smallest unit of data in a computer

Which apply to a bit

-mouse and keyboard -motherboard -monitor

Which of the following are examples of computer hardware?

-tend to be used for processing large amounts of data -tend to be used by large companies -they are often used for critical applications

Which of the following are true for a mainframe computer?

-they are always wired directly to the motherboard -they are used to connect devices inside the system unit -they connect devices outside the system unit -they are (generally) visible as group of ports on the back of the system unit

Which of the following are true for integrated ports

-PS/2 -Serial

Which of the following would be considered legacy- now little used- ports?

-have all of the keywords -the keywords are near one another -the keywords are in the order specified -the keywords are near the beginning of the document

With regard to the keywords entered, typical search engines try to find documents that meet which of the following conditions

on a social media site

a third party, server side application is an application

TABLET

a touchpad is most like a

FALSE

a touchpad requires separate buttons for selecting

TRUE

a trackball is essentially a ball mouse turned upside down

TRUE

a tracking cookie is one that is used to monitor your web browsing habits

TRUE

a web server is a file server that accepts requests for files from the internet

TRUE

a webcast refers to distributing sound and/or video to many receiving hosts

TRUE

a wiki can be used for collaborative writing projects

TRUE

a wireless PAN is usually limited to about 10m or 33 feet

TRUE

a wireless access point is needed to connect devices that are not part of the wired network

TRUE

a wireless bridge connects two different networks using radio as the connection

FALSE

a wireless hotspot in a coffee shop that uses encryption provides customers with a secured communications channel

TRUE

a wireless network interface card use radio to connect to a wi-fi network

TRUE

access control at the access point level refers to efforts to create a "closed network"

FALSE

access time for a random piece of data on tape is comparable to hard disk drives

-seek time -latency

access time is the sum of which of the following

FALSE

acts of hacktivism are not considered to be illegal

FALSE

adding or upgrading RAM is difficult

TRUE

after booting the computer, the operating system is always in RAM

TRUE

all (wired) external peripherals connect to the system through ports

FALSE

all adware is considered a type of malware

TRUE

all commercial software is copyrighted and licensed

TRUE

all crackers are thought of as criminals

TRUE

all files contain binary data

TRUE

all input devices provide data to the computer in digital form

FALSE

all keyboards use the same layout for keys

-using OR and NOT -using exact phrases -searching by date

among common search modifiers are which of the following

-popularity of the resource -political -economic -social

among the possible biases reflected by search engines were which of the following

-typical search returns too many hits -verifying the expertise of authors is difficult -search tools can be biased

among the problems listed for using the internet for research were which of the following

a wireless network

an 802.11 network is

TRUE

an HTTP request is a short message requesting a particular file from a particular host

TRUE

an ISP customer being able to access any resource on the internet without penalty (slower access or additional cost) is a form of net neutrality

transit

an ISP that needs to connect to more internet resources uses a ____ ISP

TRUE

an IrDA PAN requires devices to have direct line of sight to one another

FALSE

an IrDA PAN uses infrared light to reach typical distances of 10 m (33 feet)

FALSE

an IrDA PAN uses wireless technology to reach typical distances of 1 m (3 feet)

TRUE

an administrator account should only be used when necessary

TRUE

an optical mouse has no moving parts

TRUE

anti-spyware software is generally included in AV programs

TRUE

anti-virus software helps to detect and remove malware on your system

FALSE

any data stored in an applications temporary file is lost when the power goes out

FALSE

any pen-like implement can be used as a stylus

FALSE

any software that monitors user activity and reports on it is considered spyware

FALSE

any wireless router (standard: a, b, g, n, ....) may be user

TRUE

apple's entry in the netbook field is actually a notebook called the MacBook Air

TRUE

application software helps the user accomplish some specific, user oriented task

FALSE

application software helps the user manage their computer system

helps the user accomplish a specific task

application software is software that

TRUE

applications make use of the system software to accomplish their tasks

TRUE

applications that are designed for a specific field or part of a company are called vertical applications

TRUE

applications that are used by a broad range of people in different fields are called horizontal applications

FALSE

backing up your computer refers to saving copies of everything on your hard disk

FALSE

backups must be done manually

TRUE

ball mouse measures the movement of devices in 2 directions using the ball underneath it

FALSE

because Blue-ray makes a physical change on the optical disk to store data, BDs are write-once or read-only device

FALSE

because DSL uses the existing phone line, it prevents normal telephone use while connected to the internet

TRUE

because blu-ray is new, it is a likely candidate for adding an external device

FALSE

blocking broadcast of a WLANs ESSID prevents hackers from finding the network

FALSE

blogs are no more likely to reflect bias than newsgroups or discussion boards

FALSE

blogs typically do not allow readers to post

TRUE

bluetooth can provide a secure network

FALSE

bluetooth networks are connected with twisted-pair wiring

FALSE

cable internet access requires significant additional infrastructure (in urban areas)

FALSE

cache memory is entirely different from RAM

TRUE

cache memory is used to store data the CPU might need soon

TRUE

creating a new wireless network using a wireless access point device requires that the WAP be connected by wire to the wireless router

FALSE

current computers have clock speeds in the kilohertz (or thousands of cycles per second) range

TRUE

current netbooks tend to offer Windows as the OS

TRUE

currently, a Mac is much less likely to be attacked by a virus

TRUE

default-allow is a firewall policy that allows all communication that has not been specifically blocked

FALSE

default-deny is a firewall policy that blocks all communication

FALSE

defragmenting a hard drive has an insignificant impact on overall access time

TRUE

defragmenting a solid state drive has an insignificant impact on overall access time

TRUE

departmental software is just a sub category of enterprise software

TRUE

discussion boards store messages, allow various readers to view them, and possibly, post replies

FALSE

docking stations are built to standard specifications, so they all connect to the same

FALSE

dual core means that you have two completely separate processors

FALSE

dye-sublimation printers are considered too expensive for home use

TRUE

dye-sublimation printers are not recommended for text

TRUE

dye-sublimation printing typically builds a color image by successively printing with different colors

FALSE

eSATA is designed for disk drives and is clearly superior to USB and Firewire

TRUE

each router decides which interface (direction) a message should be sent to

1940s

early electronic computers, as we know them, were developed in which decade

TRUE

early personal computers were sold primarily for home use

TRUE

educational software includes software for managing grades

FALSE

it is generally necessary to add a network interface card to modern PCs

FALSE

it is not possible for the CPU to include an error, like "division by zero"

companies monitoring employees

keyloggers are most commonly used by

FALSE

keylogging refers to malware that affects the use of the system keyboard

TRUE

keylogging refers to software or hardware that monitors the use of the system keyboard

TRUE

laptops are difficult to add devices to internally

TRUE

laptops often provide an ExpressCard slot allowing devices to added externally

TRUE

laser printers use a toner-based technology

FALSE

light pens are still commonly used for high-end applications

TRUE

lighting and glare considered part of ergonomics of a workstation

FALSE

like a barcode, RFID will have no impact on your privacy

TRUE

line-of-sight is often required for wireless broadband

TRUE

liquid ink printers are more appropriate for legal documents

TRUE

lithium-ion batteries degrade more rapidly when hot

TRUE

lithium-ion batteries have an expected life range of 3 to 5 years

FALSE

lithium-ion battery life isn't affected by numbers of discharge-charge cycles

FALSE

location services, like Google latitude and facebook places, are not a privacy concern because your location is public - anyone there can see you

the fact that hardware only understands binary encoded data

machine language refers to

TRUE

magnetic media are considered permanent, although they actually aren't

TRUE

magnetic media works by reading or changing the polarity of a spot on the surface of the medium

FALSE

mainframe computers are called "dumb" because they only input and output information

TRUE

mainframe computers handle all processing in one central location

FALSE

maintaining privacy is no more difficult now, than it was 20 years ago

TRUE

malware designed to delete data files more than three years old would be considered intentionally harmful malware

TRUE

malware for indirect profit is often installed by the user

TRUE

malware includes any software that purposely harms your computer system

TRUE

malware that allows someone else to use your computer to send out advertising would be considered malware for profit

FALSE

malware that causes your browser to show pop-up ads would be considered prank malware

TRUE

malware that spies on user activity is considered malware for indirect profit

TRUE

malware, written as a test of skill, that does not intentionally harm a computer system is considered prank malware

TRUE

many antivirus software suites include firewall protection

TRUE

many device drivers are distributed pre-installed on a new computer

FALSE

many small computers do not have an operating system

TRUE

many times, malware is intentionally harmful

TRUE

messages in a discussion board are organized hierarchically

FALSE

net neutrality means that the government should not regulate ISPs

TRUE

netbooks are intended primarily for internet applications

FALSE

network address translation refers to redirecting your web page requests to another server

FALSE

newsgroup articles were kept for a maximum of one year before being deleted

TRUE

noticing search results that are missing can be an important search skill

FALSE

old videos (VHS or Super8) can be read directly into the computer for storage or manipulation

FALSE

once an application is started, it takes over all management of its data files

FALSE

once it is agreed that a particular pattern of bits means something (say, the letter "A"), no one can use that pattern for anything else

1,000,000 (million)

one MB = how many bytes

1,000,000,000,000 (trillion)

one TB (terabyte) = how many Bytes

TRUE

one advantage provided by a docking station is the availability of additional ports

TRUE

one advantage to ad hoc networks is how quickly they can be set up

TRUE

one concern with social networking sites is that they may claim the right to use content provided by individuals

TRUE

one example of product engineering software is computer aided design software

TRUE

one means of providing controlled access by guests to a WLAN is to force all user to go through a portal that authenticates the user

TRUE

one of the ways suggested to deal with the increasing number of phishing attacks is increased public awareness

TRUE

one problem that cable internet has that is not shared by DSL is that the "last mile" is shared by everyone in the neighborhood

TRUE

one proposed solution to the current vulnerabilities of the Web is to allow several large companies to provide network security for all

TRUE

one proposed solution to the current vulnerabilities of the web is to allow each user to protect their own computing resources

TRUE

one reason businesses use cloud computing is cost savings

TRUE

personal computers are often referred to as "workstations"

TRUE

personal computers are often referred to as workstations

FALSE

pharming refers to developing a zombie network or botnet

attempting to gain information through subterfuge

phishing refers to

FALSE

restore points must be created manually

TRUE

search engines attempt to pre-index all the WWW content to later match against queries

FALSE

speakers are not considered output devices because there is no hard copy

TRUE

specialty search tools are intended to find resources in the invisible web

TRUE

speech recognition can be used to enter commands to the computer

TRUE

speech recognition is often used for text entry now

TRUE

speech recognition is rapidly becoming a normal method of computer input

FALSE

spyware is used to collect innocuous information with the goal of improved targeting of ads

archival storage of data (backups)

tape drives are generally used for

rootkit

techniques used to hide a virus or to resurrect it when its process is killed are called

TRUE

telecommunications satellites use microwave radio for signal transmission

TRUE

telephone modems, and modem ports, are becoming legacy devices

30

terrestrial microwave relay towers can be ___ miles apart

FALSE

terrestrial microwaves are used to relay signals because they bend to follow the Earth's surface

TRUE

the CPU in most modern computers is a single microchip

TRUE

the CPU receives input, processes data, generates output, and has its own storage

FALSE

the MacBook Air does not perform as well as typical netbooks

TRUE

the WWW relies on the services of domain name servers

TRUE

the ability to download new data without a full page reload is key to Web 2.0

TRUE

the audio input system has to convert analog sound to digital

FALSE

the ball mouse has been largely replaced because of the lack of accuracy

FALSE

the deep web refers to subjects areas that return so many results that it is hard to narrow them down

TRUE

unlike newsgroups and discussion boards, blogs tend to focus on the posts of an individual

FALSE

use of a desktop PC, as opposed to a laptop, ensures proper ergonomics

FALSE

usenet newsgroups have been virtually supplanted by WWW discussion forums

TRUE

using HTTPS throughout your session in a wireless hotspot virtually assures that your session cannot be hijacked

TRUE

using a normal account, instead of administrator, means that malware may have to ask for increased permissions (thus warning you) before it is installed

TRUE

using external speakers disables built-in speakers

digging for answers

using the search modifiers would apply in which step

TRUE

utility software is concerned with managing the infrastructure of the computer

FALSE

utility software is intended for use only by advanced users

FALSE

vertical applications refers to widgets

TRUE

virtualization refers to running some other operating system, e.g. linux or windows, or windows on OS X

looking for open wireless networks

war driving refers to

NOT -restrict access by mac address -dont broadcast the network SSID NOT (.75) -restrict access by mac address -dont broadcast the network SSID -use HTTPS for secure web transactions NOT (.50) -use wpa2 with a good passphrase -restrict access by mac address -dont broadcast the network SSID -use HTTPS for secure web transactions NOT (.50) -dont broadcast the network SSID -use a VPN for office to office connections

which of the following are among the instructors recommendations for securing your small office WLAN

-more efficient use of system resources -ability to choose a GUI -availability of "power tools"

which of the following are among the reasons one might choose the Linux OS, rather than Windows or OS X

-too expensive to replace -current system performs adequately -plan to buy a new system too soon anyway -don't want to have to learn a new system

which of the following are among the reasons to continue to use a legacy system

-controls the order in which process are run -receives and interprets informations from the network -controls information sent to the monitor

which of the following are among the tasks performed by the OS kernel

-manages other programs running of the computer -provide common services to the user

which of the following are among the tasks performed by the operating system

-use a mobile OS, rather than Windows -typically use a capacitive touch screen -sometimes use a different architecture (chipset)

which of the following are characteristic of a nontraditional (non-wintel platform) tablet

-it is more interactive -it allows users to contribute data to the site -it is more dynamic

which of the following are characteristics that differentiate Web 2.0 from Web 1.0

-DVD -RAM -flash memory stick -hard disk

which of the following are considered storages devices

-allows the user to create a profile -allows the user to send private messages -allows users to post messages for anyone to see -allows users to join groups

which of the following are features of FaceBook

-often appears as a small graphical tool that stays on your desktop -has a simple user interface -run continuously or update periodically

which of the following are generally true for widgets

-hardware -user -software

which of the following are major elements of a computer-based system

-provide the necessary data and operation to be performed to the ALU -tell the ALU to perform the operation -save the result of the ALU operation -update the program counter (location of next instruction)

which of the following are normal operations for the control unit to perform

-adding a new device -adding or replacing RAM -adding a second disk drive

which of the following are the most common additions to (upgrades for) a computer system

-they are sealed to protect the device -they generally have multiple platters -the plattes must rotate to read the data -a read/write arm moves the "head" to the correct (radial) location

which of the following are true for hard disk drives

-they are always wired directly to the motherboard -they are used to connect devices inside the system unit -they connect devices outside the system unit -they are (generally) visible as group of ports on the back of the system unit

which of the following are true for integrated ports

-intended for a single user -initially were sold mostly as kits that users had to put together -also called a microcomputer

which of the following are true for personal computers

-use optical technology -are a permanent storage medium

which of the following are true with regard to Blu-ray disks

-has been compared to a web-based email client -is a form of microblogging -restricts message to 140 characters -uses SMS to send or receive tweets on cell phone

which of the following are true with regard to Twitter

-they provide a way for the web site to remember who are between clicks -they provide a means of remembering your purchase selections (shopping cart) -can be used to track your online activity

which of the following are true with regard to cookies

-news groups are organized hierarchically by subject -administration is based on consensual rules -users are expected to stick to the topic for the group

which of the following are true with regard to newsgroups

-no moving parts -lower access time than hard disk drives

which of the following are true with regard to solid state disk drives

-it generally provides slots for daughter boards -it provides connections (ports) for other devices

which of the following can be said of the motherboard

-it is an electronic circuit board -all of the system hardware attaches to it -the CPU is located on it

which of the following can be said of the motherboard

-united states -russia -china

which of the following countries were identified as the top three for hosting web-based attacks on users

-speed -cost -image quality

which of the following is a property that should be considered when buying a home printer

it helps run the computer hardware and system itself

which of the following is the MOST true for system software

-involves a collection of servers -data is stored in the cloud

which of the following is true with regard to cloud computing

-it is a collection of interconnected documents and resources -it is a service that runs on the internet -it connects documents with hyperlinks and URLs

which of the following is true with regard to the World Wide Web

dial-up

which of the following means of connecting to the internet interferes with normal telephone service

-shop at well-known sites -use a credit card or online payment service (like paypal) -use https

which of the following were among the safe shopping tips provided

-location of the access point and intervening structures -radio interference from household appliances -radio interference from nearby wireless networks

wireless networking range and data rates are affected by which of the following environmental factors

TRUE

wireless networks following the 802.11a,b, or g standard all have a practical indoor range of less than 150 feet

TRUE

with an insufficient amount of RAM, your system will run poorly

FALSE

with dual-band wireless (802.11n) you can expect approximately 600 Mbps in the home

TRUE

with dual-band wireless (802.11n) you effectively double the range of 802.11a, b, or g networks

it does not retain data without power

with regard to volatile memory, we can say

FALSE

with regard to web search engines, search modifiers refers to changing the keywords

FALSE

within the computing community, all hackers are thought of as criminals

TRUE

without an anonymizing service, your ISP will at least be able to tell what IP address you are sending from and to

TRUE

without programs, computer hardware would be useless

FALSE

without the use of special tools, normal users of the internet have no anonymity

TRUE

work on developing the internet began in the 1970s

FALSE

work stations are computers that are typically shared by multiple users

TRUE

workstations are more expensive than standard PCs

TRUE

you can start an application without a data file using the file manager

TRUE

you can usually tell if you are using integrated video (or audio) by the external port you plug into

FALSE

you should backup your file at the first sign of malware

FALSE

your files on a network file server are copied to your computer so you can access them locally

TRUE

zip disks had 70 to 500 times the storage capacity of a floppy disk


संबंधित स्टडी सेट्स

Astronomy Homework Questions (Ch. 6-14)

View Set

Unit 6: The Enlightenment and French Revolution

View Set

Geography CH 14: Northern Europe

View Set

PSYC336_Chapter 14 - Cognitive Development in Adolescence

View Set

Pathophysiology Porth's ch. 15 Disorders of the Immune Response

View Set