CST133 Exam Ch.1-4

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

____ tools cloak a person's identity online.

Anonymizer

In a computer most processing takes place in the

CPU

Technology ____ is a process by which several different technologies with distinct functionality evolve to form a single product

Convergence

To reboot a PC, hold down the ____ keys at the same time.

Ctrl, Alt, and Del

____ is typically available as a trial version.

Demoware

____ is the process of converting text, numbers, sound, photos, and video into data that can be processed by digital devices.

Digitization

A global computer network originally developed as a military project is the ____.

Internet

____ was developed by a Finnish student. It continues to gain popularity as an operating system for personal computers. It is distributed under the terms of a GPL.

LINUX

An operating system's ____ capability supports a division of labor among all the processing units

Multiprocessing

____ provides process and memory management services that allow two or more tasks, jobs, or programs to run simultaneously.

Multitasking

Within a single program, ___ allows multiple parts to run simultaneously.

Multithreading

Adobe Reader works with files stored in standard ____ format.

PDF

C:\Music\Reggae\Marley One Love.Mp3 Music is an example of _______.

Primary Folder

____ is a temporary holding area for data, application program instructions, and the operating system.

RAM

____ is typically copyrighted software that is marketed under a try-before-you buy policy.

Shareware

____ media are cloud-based applications designed for social interaction and consumer-generated content.

Social

____ compares the content of files on two devices and makes them the same.

Synchronization

An easy way to back up your important data is simply by copying selected files to a ____.

USB flash drive

Web applications are ____.

accessed and run on the Web

A good computer maintenance routine would include regularly ____. - running utilities like Disk Cleanup and Disk Defragmenter - scanning your computer for viruses and spyware - deleting your browser's history and cache files - all of the above

all of the above

A problem a hacker can cause after breaking into your computer might be ____. - applying for credit in your name - sending embarrassing e-mails - applying for a mortgage using your data - all of the above

all of the above

Gaming computers typically include ____. - very fast processors - lots of memory - state-of-the-art sound capabilities - all of the above

all of the above

If virus protection software identifies a virus, it can try to ____. - remove the infection - put the file in quarantine - delete the file - All of the above

all of the above

Mobile apps ____. - are usually small - typically are sold through an App store - often cost less than $5.00, or are even free - all of the above

all of the above

Overclocking is a technique for increasing the speed of a computer component, such as ____. It can be very risky. - the processor - a graphics card - memory - all of the above

all of the above

To avoid security threats, a user can ____.

avoid opening suspicious email attachments

A(n) ____ printer can print on both sides of the paper.

duplex

Most hard disks are formatted by the ____.

factory

A named collection of data that exists on a storage medium is known as (a) ____.

file

An optional file identifier that is separated from a main file name by a period is a ____.

file extension

C:\Music\Reggae\Marley One Love.Mp3 In the accompany figure, mp3 is an example of a ___.

file extension

The term ____ refers to the size and dimensions of a computer component.

form factor

Files stored in non-contiguous clusters are ____.

fragmented

A(n) ____ system backup includes a copy of every file stored on your computer's hard drive. In addition to data files, it includes copies of all installed programs, settings, and the operating system.

full

Software considered to be utility software is ____.

hard disk backup software

A(n) ____ backup makes a copy of only those files that were added or changed since your last backup.

incremental

Data becomes ____ when it is presented in a format that people can understand and use.

information

1,024 bytes is a ____.

kilobyte

An area of a computer that temporarily holds data waiting to be processed is ____.

memory

An electronic component that can be programmed to perform tasks is a ____.

microprocessor

A processor that includes circuitry for two or more processing units is called a ____ processor.

multi-core

A group of computers linked together to share data and resources is a(n) ____.

network

A laptop computer (also referred to as a ____ computer) is a small, lightweight portable computer that opens like a clamshell to reveal a screen and keyboard.

notebook

A shrink-wrap license goes into effect as soon as you ____.

open it

A(n) ____ system is a type of system software that acts as the master controller for all activities that take place within a computer system.

operating

The term ____ designates equipment that might be added to a computer system to enhance its functionality.

peripheral device

A(n) ____ is a microprocessor-based computing device designed to meet the computing needs of an individual.

personal computer

A hacker posing as a legitimate representative of an official organization such as your bank is an example of ____.

phishing

A technology called ____ allows the processor to begin executing another instruction before it completes the previous instruction.

pipelining

Dot pitch is the distance in millimeters between like-colored ____ —the small dots of light that form an image.

pixels

A(n) ____ computer is a small, lightweight personal computer with screen, keyboard, storage, and processing components integrated into a single unit.

portable

A ____ is a sudden increase or spike in electrical energy, affecting the current that flows to electrical outlets.

power surge

A service pack ____.

provides updates to the operating system

Application software is designed to accomplish ___ tasks.

real-world

The strengths of Microsoft Windows include all of the following EXCEPT ____. Question options: - number of applications - variety of hardware platforms on which it runs - large user community - reliability

reliability

The main directory maintained by your computer's operating system is the ____ directory.

root

To get rid of software you no longer want from a PC, you ____.

run an uninstall routine

____ intercepts information sent over computer networks.

sniffing

A ____ is an additional set of commands that the computer displays after you make a selection from the main menu.

submenu

A compute-intensive problem runs on a ____

supercomputer

The ____ is the case that holds the computer's main circuit boards, microprocessor, memory, power supply, and storage devices.

system unit

A set of computer programs that helps a computer monitor itself and function more efficiently is ____.

systerm software

A ____ computer is a handheld computer that is essentially a large version of an enhanced media player.

tablet

To delete data from a disk in such a way that no one can ever read it, you should ____.

use special file shredder software

Unlike disk storage, most RAM is ____.

volatile

Spreadsheets are particularly useful for ____.

what-if analysis

3-D graphics software provides a set of tools for creating ____ that represent three-dimensional objects.

wireframes

A powerful desktop computer used for high-performance tasks is a ____. An ordinary personal computer that is connected to a network is a ____.

workstation

Portable software is ____.

designed to run from removable storage

Productivity software that has sophisticated features to help you produce typeset-quality output is considered ____ software.

desktop publishing

A(n) ____ backup contains any files that were added or changed since the last full backup.

differential

For good basic performance, a computer running Windows 7 or 8 should have at least ____ of RAM.

1GB

The binary number 10 represents ____ in the decimal number system.

2

Current versions of Windows support file names up to ____ characters long.

255

Microsoft Windows is installed on more than ____ of the world's personal computers.

80%

The ____ indicates that the operating system has encountered an error from which it cannot recover, and the computer no longer accepts any commands.

blue screen of death

A security suite will typically include all of the following EXCEPT ____ software. - antivirus - firewall - anti-spyware - browser

browser

Storage is typically expressed as ____.

bytes

____ computing provides access to information, applications, communications, and storage over the Internet.

cloud

The first digital computers were built during World War II for ____.

code breaking

The number of colors a monitor can display is referred to as ____.

color depth

____ is typically sold in computer stores or at Web sites

commercial software

System software is designed to accomplish ____ tasks.

computer-centric

It is illegal to do all the following with software EXCEPT ____. - copy and sell to a friend - copy and give to a friend - copy and keep as backup - modify

copy and keep as backup


संबंधित स्टडी सेट्स

Tema G: Gastroenterology + Gaskir

View Set

Combo with "Psych Lesson 1" and 15 others

View Set

Maternal Newborn ATI 2019 Practice B

View Set

Week 4-Skeletal systems and joints

View Set