INFO160

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Byte

8 bits (binary digits)

CPU activates BIOS → POST runs → BIOS loads OS → Registry configuration is checked → Desktop appears

8) Assuming that all steps are successfully completed, which of the following sequences shows the correct order for the boot process?

Bit

A ____ is short for binary digit. Each bit represents a 1 or a 0, or a single binary digit.

beta

A ________ version is free software that developers release hoping that users report errors they find before the commercial version is released.

virus

A computer program that attaches itself to another computer program and attempts to spread itself to other computers when files are exchanged is called a ________.

how does LCD work

A fluorescent panel at the back of the monitor generates light waves. When electric current passes through the solution the crystals move around, blocking light waves generated or letting them shine through, creating images on the screen.

false

A macro is a software tool that offers a step-by-step guide through complicated tasks.

ethernet

A network interface card (NIC) gives you access to which type of port?

virtual desktops

A new feature in Windows 10 that is used to organize open windows into task-specific groups is called

D

All of the following types of files can be removed by the Disk Cleanup utility EXCEPT ________. temporary Windows files Recycle Bin files temporary Internet files files that have not been backed up

how to choose an LCD

Consider aspect ratio and resolution. The aspect ratio is the width-to-height proportion of a monitor. The higher the resolution, the sharper and clearer the image will be. In general, the larger the LCD panel, the larger number of pixels it can display.

USB 3.0

Currently, which type of port has the fastest data transfer speed?

2

Do I face any risks when I install or download beta versions and freeware from the Internet? 1.Freeware contains up-to-date virus protection, and beta products are generally developed by reliable developers. As such, there aren't really any risks. 2.You must exercise caution when downloading freeware and beta versions as they may contain bug or viruses. 3.Freeware is associated with the risk of bugs or viruses, whereas beta products have built-in virus protection and are generally developed by reliable developers. Hence, it's important that you exercise caution with freeware. 4.The whole concept of freeware and beta versions assumes ethics and therefore they are thoroughly safe.

sniffers

Hackers can use packet ________ to capture valuable information, then sell or use the information illegally.

new folder, new group (on the home tab)

How do you create a new folder in File Explorer?

3

I've heard some friends talking about software that they got for free. Can you tell me more about free software? 1.Software you can use for free is called freeware or beta ware, but it prevents you from using the product once the initial trial period is over. 2.You can use freeware, which is software that can be used free for a limited time. Alpha versions, software still under development, are also available for free. 3.You can use freeware, software that is available for free, and beta versions, free software that is still under development. 4.Copyleft is the only free software.

start menu

In Windows 10, what feature is used to locate and launch software or applications installed on your device?

true

In the first step of the boot process, the CPU activates the BIOS, a program that manages the exchange of data between the OS and the input and output devices attached to the system. BIOS is stored on ROM so that its data does not get erased when the power is turned off.

Central Dogma of Info

Input data ->Processing data -> Output information

2

Is web page-authoring software the same type of software I would use if I wanted to design a brochure or newsletter? 1.Yes, you can easily use web page-authoring programs to design newsletters and brochures. 2.Actually, to design newsletters and brochures, you would need special software, such as Adobe InDesign. 3.Actually, you need special graphics software, like Adobe Premiere, to design newsletters and brochures. 4.Actually, Peachtree is the best software for designing newsletters and brochures.

bluetooth

Outsiders might try to infect your system through all of the following, EXCEPT

Saas (Software as a service)

Software that is available on demand via the Internet is called

ROM chip

The BIOS is stored in the ________.

third party verification

The Better Business Bureau seal on a website indicates _______

both

The Internet was created to provide.. a secure form of communications. a common communication means for all computers. both A and B neither A or B

left click

To add a tile to a group, ________ it and drag it into that group

drag the tile to the left or the right of any existing tile group and release the mouse button

To create a new tile group, ________. (1 point) right-click tile, and select New Group from the menu (not) drag the tile to the left or the right of any existing tile group and release the mouse button drag the tile to the New Group tile and release the mouse button (not) double-click tile, and select New Group from the menu (not)

disk cleanup

To remove unnecessary files from your hard drive, you would use the ________ Windows utility.

URL

Uniform Resource Locator

packet filter

Using a ________, you can screen data coming into the logical ports to see if it comes from a trusted source.

logical ports

Virtual communications gateways that allow a computer to accept requests for information from other networks or computers are called ________.

web based email account

What do you need if you want to read, send, and organize e-mail from any computer connected to the Internet?

breadcrumb trail

What is the navigation aid that shows users the path they have taken to get to a web page located within a website?

1

What kind of software will be needed for taking courses over the Internet? 1.Online classes are run through course management software programs. 2.Online classes are run through test preparation software. 3.Online classes are run through project management software. 4.Online classes are run through simulation programs.

3

What software do I need to create 3D graphics? 1.You need mapping programs to help you with this. 2.You need DTP software for this purpose. 3.You need CAD programs to create flowcharts. 4.You need simulation software for this purpose.

Saas

When a vendor hosts software on a website and you don't need to install the software on your device, this is known as:

color depth

When buying a monitor, which factor is NOT important to consider?

c (TIFF have higher compression)

When discussing image file types, which of the following is NOT true? (1 point) JPEG and TIFF are the two main file formats used by digital cameras. JPEG files are used for images in web pages. TIFF files have a higher compression ratio than JPEG files do. Incorrect answer Information is lost every time the file is saved in JPEG format.

You should assess that all web pages contain at least some valid information.

When evaluating the validity of information found on websites, which of the following is FALSE?

setup.exe

When installing new downloaded software, if the setup program doesn't automatically launch, you would _______: find the setup files where you downloaded them and run setup.exe open the Run Program dialog box open a command window and type run insert the CD/DVD in your DVD drive

restore

When installing new software on a Windows computer, it is a good idea to create a ________ point so that if problems arise, you can return your system back to how it was before you started.

details

When you are sorting files and folders in File Explorer, use ________ view to get the most interactive view available.

true

When you buy software, you can only use it as specified in the EULA.

zoom

Which editing tool would you use to enlarge an area of an image?

Amazon.com was one of the first websites on the Internet.

Which is NOT an event associated with the beginning of the Internet?

using a metasearch engine

Which is NOT an example of a keyword search strategy to get more specific results?

Edge (Microsoft)

Which of the following browsers was introduced with Windows 10?

monitor

Which of the following can be both an input and an output device?

all

Which of the following describes an IP address? It is referred to as a dotted quad. It identifies any computer connecting to the Internet. It identifies a website.

a

Which of the following describes copyleft? (1 point) terms enabling redistributing open source software terms restricting free use of software content terms enabling redistributing proprietary software terms enabling free use of software content

A, not alphabetical order

Which of the following is NOT an advantage of organizing files? It stores all files in alphabetical order. It separates users' data when using a shared computer. It allows for file sharing between users. It allows for quicker backup of important data.

adobe acrobat

Which of the following is NOT an image editing program? (1 point) Adobe Acrobat Photoshop Elements Windows Photo Gallery Paint-Shop Pro

optical mouse

Which of the following is NOT an output device? (1 point) touch-screen monitor laser printer speakers optical mouse

hard drive

Which of the following is NOT found on a motherboard?

displays files and folders as small icons and file names

Which of the following is NOT true about the Details view? (answer in full text) Its contents can be sorted by the date last modified. It displays files and folders as small icons and file names. It is the most interactive view. It provides the most information regarding its contents.

Barnes and Noble

Which of the following is an example of a click-and-brick business? (1 point) Amazon eBay Barnes and Noble Yahoo!

WAV

Which of the following is an uncompressed audio file format?

ARPANET

Which of the following is not an Internet protocol?

thunderbolt

Which of the following is the fastest data transfer port?

B

Which of the following is true about open source software? The program code is subject to copyright protection. The program can be changed and is freely distributed. The program code is confidential. The program can be freely distributed as long as the program code is not changed.

speech recognition

Which of the following is typically NOT found in web page-authoring software?

free versions are not available

Which of the following statements about image editing software is FALSE? (1 point) It can create photo montages. It can crop unwanted details. It can remove red eye. Free versions are not available.

C (Browsers will)

Which of the following statements is FALSE regarding safety and e-commerce? (1 point) Illegitimate sites can use security symbols illegally. A closed padlock on your screen indicates a secure connection. Browsers will alert you if you are processing a transaction on an unsafe site. Privacy policies indicate how your data will be used by a company.

instant messaging

Which of the following would be best for synchronous text-based communication?

fashion

Which of these is NOT a specialty search on Google?

dvd

Which of these is an example of optical storage media?

RAM

Which of these is considered volatile storage?

RAM

Which of these is located on the motherboard? (1 point) DVD drive RAM SSD drive Hard drive

Restart

Which power control option performs a warm boot?

wiki

Which technology is being used in creating a document on Google Drive?

crop

Which tool allows you to remove part of a picture?

social bookmarking

Which type of website would StumbleUpon be classified as?

2

Which web-authoring software enables users to create sophisticated web pages without knowing any HTML code? 1.A program like QuarkXPress allows you to create sophisticated web pages without knowing HTML code. 2.A program like Adobe Dreamweaver allows you to create sophisticated web pages without knowing HTML code. 3.A computer-aided design (CAD) program helps users create sophisticated web pages without knowing HTML code. 4.A desktop publishing program like Adobe InDesign helps users create sophisticated web pages without knowing HTML code.

false

Windows Firewall will detect or disable viruses and worms that are already on your computer.

true

You should use the Uninstall Program feature in the Control Panel to remove a software application from your computer.

USB

____ can store up to 256 GB's

open source

_____ _______ is free software that is distributed with few licensing and copyright restrictions.

jpeg

________ is a lossy image format.

desktop publishing

_________ ___________ software allows users to design and layout complex documents such as brochures and newsletters.

track

a "ring" around a disk

sector

a "wedge" around a disk

group

a collection of Tiles on the Start Menu

computer

a data processing device that performs four major functions, including processing data into information.

In an LCD

a fixed grid of pixels, or tiny dots, that create the images you see. Each pixel is comprised of three subpixels of the colors red, blue, and green.

Processor Speed

a measure of how many tasks the main chip in the computer can perform in one second. The "best" processor will depend on your particular needs and is not always the processor with the highest processor speed (GHz). Other factors, such as the number of cores in the CPU, additional memory, and how fast data is exchanged between the CPU and RAM, should be considered.

polymorphic virus

a virus that changes its own code to avoid detection

DTP (Desktop Publishing Software)

allows users to design and lay out complex publications. Programs such as QuarkExpress and Adobe InDesign offer a variety of tools with which you can format text and graphics.

trojan horse

appears to be useful but destroying stuff

CAD (Computer aided design)

are a form of 3D modeling that engineers use to create automated designs, technical drawings, and model visualizations.

worm

attempts to travel between systems through network connections to spread an infection

freeware

copyrighted software that is distributed without cost

Angel

course management software

firewall

creates a barrier between your computer and the Internet

Information

data that has been organized or presented in a meaningful fashion. Here, the data supplied to the computer (name, phone number, address, photo) has been processed appropriately so that it could be printed on an ID card.

QuarkXPress

desktop publishing software

distros

different version of Linux are called

full installation

does not allow you to select specific features

desktop

first seen when logging onto Windows

sectors and tracks

formatting divides disks into

botnet

group of software programs that usually run independently on a large number of zombie computers

directory

hierarchical structure that includes files, folders, and drives

firewire

high-speed port for hard drives and digital video devices

nonvolatile storage device

holds the data and instructions your computer needs permanently, even after the computer is turned off.

personal

home firewall

protocol

indicates the set of rules used to retrieve a specified document.

CMOS

is a type of memory that uses almost no power and is never erased. CMOS EPROM RAM VRAM

LCD (liquid crystal display)

light and energy efficient computer monitors-most popular type

extension

n c:\cis\400\proj3.docx, the docx is a(n)

thunderbolt

newest input/output technology on the market. It uses fiber optic technology and can achieve extremely fast transfer speeds- up to 40Gbps

keystroke logging

not a feature of security software

antivirus

prevents unwanted, malicious programs from being installed on your computer

how to choose a printer

printing speed (ppm), resolution (ppi), color output, and the cost of consumables.

alt (ernative search engine/meta)

search engines other than Google

specialty search engines

search only sites that are deemed relevant to the particular subject.

metasearch engines

search other search engines and generate results that are common to all or that have a high priority.

worms

slightly different from viruses as they can run independently of host file execution?

packet

small piece of data that travels through the Internet

script

small program that executes without your knowledge when you enter a website.

laser printer

static electricity to signal to the printer where to print ink. They offer faster printout times and higher quality printouts than inkjet printers.

ROM

stores computer start up instructions

RAM

stores information as long as the computer is on

cache

stores instructions and data used most often

CPU

the "brains" of the computer

binary language

the language of computers that consists of two digits

desktop

the primary working area in Windows 10

machine cycle

the process of the CPU getting the data or information from RAM and decoding the instructions into something the computer can understand. After decoding, the CPU executes and stores the results back into system memory as the last step of this.

Data

the representation of a fact, a figure, or an idea. Can be a number, a word, a picture, or even a recording of sound. Computers are excellent at processing this into information.

0 and 1

two digits of binary language

Hertz

unit of measure for processing speed. means "machine cycles per second."

ethernet, 10,000

used to connect a computer to a DSL or cable modem, or a network. This port transfers data at speeds up to _ _, _ _ _ Mbps.

programs and features

used to delete programs in Windows

Adobe Dreamware

web page-authoring software

word

what file tends to compress well?

domain name

what follows the http:// and consist of two parts: the first part indicates the site's host and the other part indicates the kind of organization the host is.

platter

what part of the disk has a magnetically sensitive coating

start menu

where you access installed applications in Windows 10

GB (gigabyte)

1 Billion bytes

MB (megabyte)

1 million bytes

TB (Terabyte)

1 trillion bytes - personal computers

PB (Petabyte)

1,000 Terabytes (so, 1,000 x 1 trillion)

KB (Kilobyte)

1,000 bytes

true

(T/F) A typical CPU can complete billions of machine cycles in one second.

false

(t/f) Downloaded software doesn't require a software license.

top level domain

.gov .edu .com are all examples of

loading the operating system

The power-on self-test does all of the following EXCEPT ________. (1 point) load the operating system identify the BIOS test the video card and video memory test memory chips

disk cleanup, error checking, disk defrag(mentor)

The schedule in the Sound Byte suggests running the system tools in the order ________.

access

The time it takes to select the correct platter and move the read/write head to the right track and sector is called the ________ time.


Set pelajaran terkait

women's gender sexuality midterm

View Set

Descubre 1 Lección 8 Pronunciación p271 ll, ñ, c, and z

View Set

AP Gov- UNIT 5: Political Participation

View Set

Topic 3 Interest Groups: Organizing for Influence

View Set

AGEC FINAL P1, AGEC 3413 test 3 (chapter 6 done and half of 7), agec test 3 (just 10 for now)

View Set

BFOR 203 Final - Hashing-Symmetric-Asymmetric

View Set

Management Information Systems Chapter 4 Ethics and Information Security: MIS Business Concerns

View Set

Countries and Bodies of Water that Border France

View Set