Computer Concepts Midterm
Memory chips or modules hold data and programs as they are being processed by the ____, and are usually found on the motherboard.
CPU
the "brain" of computer
CPU
Storage media are volatile.
False
A display device is the most common form of output device
True
Type of e-mail that uses a browser and an e-mail account provided through an online service to send and receive e-mail
Webmail
technology that computers and devices use when communicating via radio waves across a medium distance
Wi-Fi
Technology, also known as the 802.16 standard, that computers and devices use to communicate wirelessly across long distances
WiMAX
Use cleaning products specifically meant for computer screens, such as a 50/50 solution of _______and water.
alcohol
Replace _____ regularly on wireless mice and keyboards so the power does not run out when you need it most
batteries
Number system that consists of only two digits
binary
the word "bit" is short for this
binary digit
an electronic channel that transfers data in multiple directions
bus
Avoid revealing personal information in a(n) _________.
chat room
Unicode and ASCII are examples of this
coding scheme
Companies streamline production and perform tasks too dangerous or monotonous for humans using _____ manufacturing.
computer-aided
A ___ is a small text file that a Web page stores on your computer to identify you when you visit the Web site
cookie
The use of Web technologies to humiliate, torment, or badger an individual
cyberbullying
the smallest unit of time a processor con measure
cycle
In practice, the difference between system and application software is not always straightforward.
true
Perform arithmetic and logic functions in the CPU
ALU
a gigabyte equals this many bytes
1 billion
a byte consists of this many bits
8
Standards that wireless fidelity devices use
802.11
When you issue the command for your computer to store a document on your hard drive, the application software must make sure that the specified hard drive exists.
False
mages need to be scanned at a lower resolution if the image will be enlarged significantly.
False
Hosted ad on a Web site
How a third-party cookie can end up on your computer
when the computer is shut down, the information in _____ is erased
RAM
the data stored in _______ is saved even when the computer has been powered off
ROM
Network protocol that defines how to route data across a network
TCP/IP
The gap between people who can access digital information and those who cannot is called the _____.
digital divide
components include a user ID, the "at" symbol, and the name of the e-mail provider
e-mail address
an electronic document transmitted on a computer network
e-mail message
A computer that routes e-mail messages through a network
e-mail server
a(n) ________ is a tiny special-purpose computer included as a component in a larger product
embedded computer
A symbol of an emotional gesture that you create using keyboard characters is called a(n) ________________.
emoticon
the computer network a business uses to let employees communicate with customers, vendors, and other employees is referred as ________.
enterprise computing
As a hard drive begins to get full, it takes less time to locate the data stored on the hard drive.
false
Most operating systems today use a text-based user interface
false
The development rights of a software program specify the allowable use of the program.
false
The process of representing data in a form that can be understood by a digital computer is called decimal byte representation
false
With a DVD, the storage medium and the storage device are permanently sealed together to form one piece of hardware called a fixed-media storage system
false
Crime usually committed by identity thieves
financial fraud
Posting hostile or insulting comments about another online participant is called ________________.
flaming
a self-driving car uses a rooftop sensor and a(n) _______ system to navigate.
global positioning
The ___ page appears when you first open a browser
home
controlling systems such as heating, cooling, and security to increase comfort and quality of life is called ____.
home automation
Restricted Web sites are also known as the Private Web or the ____________.
invisible web
an airport or hotel might provide a (n) ___________ you can use to check in or find travel information.
kiosk
in ______________, blog members post eye-witness accounts of events
live blogging
Type of e-mail that uses an e-mail client and an e-mail account provided by an ISP to send and receive e-mail
local
Your browser is using a secure connection when it displays a _____ icon and "https://" in the Address bar.
lock
when you use wireless mobile devices to make retail purchases, you are engaging in ________.
m-commerce
A company's computers monitor assembly lines and equipment with _____ communications.
machine-to-machine
hard drives with read/ write heads that move over the surface of platters are a type of ____ storage
magnetic
Store the _____ cards from your digital camera in their cases when not in the camera.
memory
a set of guidelines for acceptable online communications is called ____.
netiquette
a _____________ is an excellent resource for facts and immediate reactions to current and recent events
news site
with ________, you can view or listen to online content at any time rather than according to a set schedule
on-demand media
with _________, you can buy and sell stocks and bonds without using a broker
online investing
Information others can find about you on the Internet is called your ___________.
online reputation
web sites on the ________________ are freely available to the public
open web
When publishers load software on a computer before selling it
preinstall
In ___ mode, you can surf the Web without leaving history, temporary Internet files, or cookies.
private browsing
Sets the speed at which the CPU executes instructions
processor clock
flash memory is an example of ________ memory
programmable
a communications standard that specifies the method and speed that devices use to transmit data
protocol
Determine how a Web site uses your browsing history
read the Terms of Use and Privacy statements
a _______________ includes information that's been written and researched thoroughly by experts, double-checked for accuracy, and reviewed by other experts
scholarly site
Steps you can take to protect personal information.
shred documents and monitor accounts
Store backup discs for DVDs and other optical media in _____ or protective cases to keep them safe from scratches and dirt.
sleeves
On a mass transit system, you can use a(n) ____________ instead of a ticket or token
smart card
__________ -state drives, which have no moving parts, are less likely to be damaged by dirt and impact, but should still be treated with care
solid
in _________ online education, the instructor holds a class that students attend virtually and at the same time
synchronous
you can use ___ browsing to access several Web pages in the same browser window
tabbed
an arrangement that employees who need flexible work schedules use to work from home is called _______.
telecommuting
Obtain a software program from an online app store
to download
Start a software program
to run
As you work on your computer, the operating system continuously manages your computer's resources and makes them available to devices and programs when they are needed
true
Computer literacy is knowing about and understanding computers and their uses
true
In addition to a keyboard, most computers today are used in conjunction with some type of pointing device.
true
Just as you can learn to drive a car without knowing much about car engines, you can learn to use a computer without understanding the technical details of how a computer works.
true
Notebook and netbook computers usually have a keyboard that is similar to a desktop keyboard, but it is typically smaller.
true
SSDs are not subject to mechanical failures like magnetic hard drives, and are more resistant to shock and vibration.
true
Storage devices can be internal (located inside the system unit), external (plugged into an external port on the system unit), or remote (located on another computer).
true
The binary numbering system uses only two symbols—the digits 0 and 1—to represent all possible numbers.
true
The number of bits being transmitted at one time is dependent on the bus width
true
Users do not have to be concerned with how files are physically stored on a storage medium.
true
Web browsers maintain a History list, which is a record of all Web pages visited during the period of time specified in the browser settings
true
Remove a software program from your computer
uninstall
Install a newer version of your current software program
upgrade
when an operating system employs ______ memory, it swaps files to the hard disk
virtual