IT Quiz

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

built-in memory or primary storage is referred to as

RAM (Random Access Memory)

access points or other stations in a wireless network will ignore data packets that are not labeled with their

SSID

an identifier attached to data packets that functions as a password for a wireless network

Service Set Identifier (SSID)

SCSI stands for

Small Computer Systems Interface

the unique hardware address of a network connection

Media Access Control (MAC) Address

the technology that recognizes individual characters on a page so they can be stored and eventually edited

OCR (Optical Character Recognition)

a hand held computer

PDA (Personal Digital Assistant)

the IEEE 802.11 family of wireless Ethernet standards

Wi-Fi

WWW stands for

World Wide Web

a chip on the motherboard where BIOS typically is stored

a ROM BIOS chip

both an input and an output device

a bar-code scanner

a computer connected to 2 networks

a gateway

a data network connection that connects unlike networks

a gateway

can have a storage capacity of 800MB

a generic CD ROM

can have a storage capacity of 4.7GB

a generic DCD ROM

a specialized server that acts as a post office for a particular Internet host

a mail server

a point of light on a monitor or a picture element

a pixel

creates a digital representation of a printed digital image

a scanner

a computer intended to provide software, as well as other resources to computers over a network

a server

a website designed to be a first stop for a web browser with a wide variety of options to consider

an Internet Portal

a unique address on the Internet is called

an URL (Uniform Resource Locator)

a wireless LAN transmitter/receiver that connects between wireless devices and wired networks

an access point

designed to search for viruses, notify users when they're found, and remove them from infected files or disks

antivirus software

normally measured in megabits per second (Mbps)

bandwidth

the total amount of data that can be transmitted in certain period of time

bandwidth

uses measurement of individual body characteristics such as a voice print, fingerprint, retinal scan, or facial feature scan

biometrics

a wireless technology used for voice and data links over short ranges (10 meters)

bluetooth

wires that move data from 1 component to another inside a computer

buses

a faster type of internal memory

cache

a process that experts use special software to scan criminal suspects' hard drives for digital "fingerprints"

computer forensics

eg. CD-ROM drive, printer, and monitor

computer peripherals

are destructive because they use computer hosts to reproduce themselves

computer worms

small programs that enable input/output devices to communicate with the computer

device drivers

the display size of a monitor is measured

diagonally

broadband connection

eg. DSL, cable modem, high-speed wireless, satellite

keep internal networks secure while enabling communication with the rest of the Internet

firewalls

the process of preparing a disk for reading and writing by defining how files will be organized on the disk

formatting

unauthorized access to computer systems

hacking

a secondary storage for a computer

hard disk

the physical parts of a computer are known as

hardware

also known as spam

junk email

when a bank clerk transfers money into your account, the actual transaction is probably being stored in a

mainframe computer

a measure of clock speed that equals one million cycles per second

megahertz (MHz)

the time for the processor to retrieve data from memory is measured in

nanoseconds

when a message is sent across the Internet, it is sent in

packets

when 2 processors are employed in a computer

parallel processing

accept instructions from a wide variety of software

personal computers

used to identify a program or service running on a computer in order to communicate over the network

port number

the process to steal passwords which mimics the mainframe's login on an unattended computer terminal

spoofing

the primary difference between a local-area network and a wide-area network is

the distance that the network spans

the portion of an email address after the at sign (@)

the hostname

the powdered ink used in laser printers

toner

Information stored in RAM is considered

volatile

not held permanently, only temporarily.

volatile

a technique to allow Bluetooth and Wi-Fi devices to co-operate without interference

Adaptive Frequency Hopping (AFH)

data and programs used to start up a computer

BIOS (Basic Input/Output System)

CPU stands for

Central Processing Unit

a protocol used in man operating systems, including Windows XP, that automatically issues network information such as IP address to a device as it connects to the network

Dynamic Host Configuration Protocol (DHCP)

a short-distance network that used to link a group of computers and other devices such as printers over distances typically up to 500 meters

Local Area Network (LAN)

glass fiber that transmits voice of data signals via light pulses

Fiber Optics

ISP stands for

Internet Service Providers

used to protect computers against loss during a power failure

UPS (Uninterruptible Power Supply)

an external peripheral interface standard for communication between a computer and external peripherals over a cable using bi-serial transmission.

USB

USB stands for

Universal Serial Bus

a private data network that uses the public telecoms network but preserves privacy by encrypting data

Virtual Private Network (VPN)

the transmission of phone calls over the Internet

Voice over Internet Protocol (VoIP)


संबंधित स्टडी सेट्स

Ch. 19 Exam Questions (Life/Health)- Oklahoma Life and Health Insurance Laws and Rules

View Set

CONSUMER BEHAVIOR TEST 2 11-13, 2, 6 & 7

View Set

Comply with Drinking Water Regulations, Additional Practice Questions

View Set

MH Chapter 21 Impulse Control AQ

View Set

PREPU Ch 35: Assessment of Musculoskeletal Function

View Set

ATI RN Maternal Newborn Online Practice 2019 A with NGN

View Set