Introduction to Computers

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

"Full HD" resolution is expressed as:

1920 x 1080

Twitter recommends using no more than ___ hashtags per Tweet.

2

CPU clock speeds of a personal computer range between

2 to 4 Gigahertz

Tweets can be a maximum of ___________ characters.

280

What is the minimum amount of RAM you should have on a laptop?

4 GB

Some computers use ____________ to represent characters in binary format.

ASCII

OS X Sierra is owned and maintained by ___________.

Apple

A wireless short-range transmission protocol is called ________.

Bluetooth

What was the major question that ARPAnet wanted to solve?

Could a network be built that would continue to work even if multiple parts collapsed?

A ________ attack on a network is created to stop or interrupt traffic by saturating it with too many requests.

DDos

The protocol used for transmitting large files from one server to another over the internet is known as the ____________ Protocol (FTP).

File Transfer

A protocol commonly used to transfer large files from one server to another on the Internet is the ___.

File Transfer Protocol

Which is not considered an e-commerce transaction?

G2B

MC Android OS is owned and maintained by _________.

Google (Alphabet)

Letting computer users drag images and documents across their computers' monitors made the ___ User Interface very popular.

Graphical

Today, the standard port for video and auto input on TV is the ___________ port.

HDMI

which chip and manufacturing company is the largest in the world?

Intel

ISP stands for

Internet Service Provider

The processor directly houses the _________ cache.

L1

All of the following are common ports that are included with laptop computers except

MIDI ports

Windows OS is owned and maintained by _____ .

Microsoft

____________ runs the processor faster than recommended by the manufacturer. This can increase performance and speed, but will also void the manufacturer warranty.

Overclocking

Unlike phishing that uses fake e-mails to gain personal information about a user. __________ uses fake websites to gain personal information.

Pharming

Software comes in various categories. One category is system software, which provides the instructions that hardware needs to operate (iOS, Android, Windows, etc.). Another category is game software (League of Legends, Hearthstone, Angry Birds, etc.). Another category of software includes applications such as Office 365, iWork, QuickBooks, Googledocs, etc. This software is referred to as ___ software.

Productivity

The information in ____________ is dumped when a computer is shut down.

RAM

system BIOS (basic input/output system) is stored in ______.

ROM

Most tablets and phones use _____ as their main storage device.

SSD

A signal transmitted every few seconds by a wireless router so that users' computers can find the WI-FI hotspot is called a(n)

SSID

An unwelcome e-mail message is called ___________.

Spam

You need to uninstall a program in Windows 10. Where would you click first?

Start Button

The World Wide Web was created through a collaboration led by______.

Tim Berners-Lee

The highest level of in the domain name hierarchy is known as the ____________.

Top Level Domain

The Federal ________ Commission is the main government organization that oversees Internet privacy.

Trade

This type of connector is the most common type of connection to a computer for peripherals (printers, monitors, storage devices, etc.)

USB

Today, many computers use ___________, a coding scheme that uses at least 16 bits to represent a character.

Unicode

URL stands for ___ Resource Locator.

Uniform

The capacity of a particular transmission medium is called it _______.

bandwidth

The capacity of a particular transmission medium is called its

bandwidth

Software applications that allow users to access and surf the World Wide Web are called ___________.

browsers

The two main factors that affect the speed of the processor are clock speed and ___________.

bus width

In ASCII 8 bits are combined to create a ______.

byte

Including RAM, modern processors keeps frequent and temporary accessed data in _____________ .

cache

Clock speed, also known as ________, is the speed at which the processor performs the operations required to run a digital device and the digital device's instructions.

clock rate

A site on the Windows operating system where you can uninstall programs, adjust settings, and manage tasks is the _____.

control panel

The most popular web browsers have a private browsing mode (incognito). While browsing in Incognito mode your browser will not store ________.

cookies

Repeated and deliberate harassment or harassment of a person or group of people through information technology and networks is called?

cyberbullying

A person who uses computers and the internet to launch attacks against computer systems for political or ideological reasons is called a _______________.

cyberterrorist

Devices with a separate system unit and a relatively large footprint are called _____ computers.

desktop

RAM is ________ and has no moving parts.

electronic (solid state)

E-commerce is short for _____________.

electronic commerce

The machine cycle consists of which four steps?

fetch, decode, execute, store

Which transmission media has the largest bandwidth?

fiber optic

The risks of downloading a file from the Internet includes all except

fileware

A security system separating two networks or even computers on the same network is called a ___________.

firewall

Which of the following is a strength of the Linux platform?

free to download and use

Typical tablet or smartphone SSD capabilities are measured in __________.

gigabytes

A person with unlawful access to networks to steal and corrupt information and data is called a

hacker

Breaking into a computer system (hacking), for politically or socially purposes is called _____________.

hacktivism

The SSD cost is ________ than the traditional hard drive cost.

higher

All of the following should be taken into account when using Twitter, except

if a Twitter user has been blocked you can file a formal complaint through Twitter.

Malware is designed to do all of the following except

improve data

A TV remote usually uses ________ waves.

infrared (IR)

Although it sound ironic, searching the _________ in your area is an efficient way to search for an ISP.

internet

Megahertz is the same as a ________ cycles (or instruction) per second

million

A laptop typically has __ RAM than a smartphone

more

Fiber-optic cable is _____________ expensive than coaxial cable to install.

more

Electronic etiquette is also known as ______.

netiquette

Linux is owned by______.

no one

Avoiding viruses include all of the following except

only visit trusted sites

All of the following are protected by intellectual property laws against unauthorized use or distribution, except

open educational resources

What manages hardware and software, supports the computer's basic functions, and runs programs?

operating system

The three most common types of email viruses include all except

password savers

The BitTorrent protocol is often called ____________ file sharing.

peer-to-peer

Once you accept a Facebook friend request, you have access to their ____________ Facebook page.

personal

A request for an electronic "echo" or response from another computer or server is called a ____.

ping

The smallest image element is a(n)

pixel

A point in a computer (hole or slot) that accepts a specific connector is called a

port

Apps designed to make individuals or businesses more efficient are categorized as___________ software

productivity

Your _____________ on Facebook is a collection of photos and stories telling people about you and your experiences.

profile

If antivirus software cannot delete an infected virus, it will send the file to a hard disk area called __________.

quaratine

what is the primary purpose of defragmenting your hard drive?

reduces the time it takes to find files on your hard drive.

The device that connects two networks is a _______.

router

Because they are both apple products, the browser that works the smoothest with Macintosh OS X is

safari

Amateur computer hackers with little programming expertise, who illegally access computer systems by the means of programs (scripts) written by others, are called _____ .

script kiddies

Privacy and ________ are the two main factors related to your digital identity.

security

WhatsApp messenger is a cross-platform messaging app that allows you to ____________ and receive messages without having to pay for SMS (text messaging).

send

Resolution refers to the __________ and clarity of an image.

sharpness

A processor that consists of one control unit and one ALU is called a ___________.

single-core processor

Contact your ISP if your actual Internet speed is _____ than advertised.

slower

The average tablet has a ____ hard drive compared to the average desktop computer.

smaller

Taken and shared photos or videos on Snapchat are called

snaps

Programs that offer the structure and hardware control necessary to run the computer and its peripheral devices are called _____ software.

system

Which has the most storage capacity?

terabyte

Which of the following is true (strength) of the Android platform?

the OS used in most smartphones and tablets.

One of the main differences between free and fee-based antivirus software is ________________.

the number of features

Since they are low-priced and reliable, _________ storage devices are extremely popular.

thumb drives (USB or flash drives)

Wyatt has purchased a new laptop and found it came with many programs that he does not want. He should _____ the programs from his device so they do not take up storage space.

uninstall

Cookies stored on a computer store information about ________.

user preferences

Software that infects a computer and is created by a computer code is called a

virus

A hacker has control over your computer and can now use it to launch attacks on other computers and systems. Your computer is known as a ___________ computer.

zombie


Set pelajaran terkait

Networking + Post-Assessment Quiz cert

View Set

Dental Laws and Infection Control for North Carolina Dental Board Examination

View Set

Design Principles and Python Knowledge

View Set

Media Law Chapter 5: Invasion of Privacy

View Set

Test 1 Pediatric Nursing NCLEX Practice | Quiz #2: 50 Questions

View Set

ECON Lowdown Insurance: Managing Risk and Balancing Responsibility with Affordability

View Set

physics ch 1 and 2 hw and physics primer things to know

View Set

Functional Organization of Nervous Tissue

View Set

Module 2.01 ETHICAL DECISION MAKING PROCESS

View Set