Computer & Internet Basics

Ace your homework & exams now with Quizwiz!

Which area of the web browser window displays the URL of the current web page you are viewing?

Address Bar

A mainframe computer is _____.

An extremely fast, expensive computer with a large data capacity that is typically used by huge companies.

What type of software is used to scan for malicious programs that may be residing in your computer's hard disk or memory?

Antivirus

Software that allows you to do word processing, send e-mails, or play games is commonly referred to as _____.

Application Programs

At the lowest level of processing, computers represent data and instructions using a series of binary digits, 1s and 0s. An individual binary digit it known as a _____.

Bit

A string of 8 binary digits is known as a _____.

Byte

What piece of computer hardware is often referred to as the "brains" of the computer?

CPU

Which of the following protocols is NOT associated with the transmission or reception of email? - POP - IMAP - SMTP - DHCP

DCHP

Which protocol allows for the dynamic translation of a domain name into the correct IP address?

DNS

Two popular broadband Internet technologies include cable Internet access and:

DSL

What kind of cable is used to connect your cable/DSL modem to your broadband router or a computer to your broadband router?

Ethernet Patch Cable

Which unit of measurement is equivalent to one billion bytes?

Gigabyte (GB)

The Internet is best described as a:

Global network of networks.

Which protocol is used to securely transmit web page information between the client and the web server?

HTTPS

You know your mouse is hovering over a hyperlink when the mouse pointer changes shape to a _____.

Hand

Of the different types of computer storage, which would you expect to have the most capacity?

Hard Disk

Which term is used to refer to all of the physical parts of a computer system?

Hardware

The feature known as tabbed browsing allows you to _____.

Have multiple web pages open at the same time inside the same browser window.

What unit of measure is used when describing the speed of a computer's CPU?

Hertz

Text or images on a web page that when clicked on take you to another web page are called _____.

Hyperlinks

Much like a telephone needs a unique phone number in order to communicate, a computer must be assigned a unique ______ in order to communicate on the Internet.

IP Address

What term best describes a company who provides access to the Internet for their customers?

ISP

A network infrastructure that provides access to users and end devices in a limited area such as a home, school, office building, or campus is called a:

LAN

Adware is _____.

Malicious software that displays advertisements and messages when you use your computer.

Spyware is _____.

Malicious software that follows the actions you take and forwards the information to a third party.

Which of the following is an example of an operating system? - Microsoft Word - Internet Explorer - File Explorer - Microsoft Windows

Microsoft Windows

Which of the following is NOT considered an operating system? - Microsoft Windows - Linux - Microsoft Word - Mac OS

Microsoft Word

Which of the following components would NOT be considered a peripheral device? - Printer - Mouse - Monitor - Motherboard

Motherboard

Which of the following would be considered an input device? - Printer - Mouse - Monitor - Speakers

Mouse

What is the name for the piece of software that manages the hardware, application programs, and provides a graphical user interface to the user of the computer?

Operating System

A display monitor's screen is composed of tiny square units called _____.

Pixels

The set of communication rules that the browser will use when connecting with the web site you're trying to access is known as the _____.

Protocol Prefix

______ contain the rules that govern the communication process and define how messages will be transmitted and received.

Protocols

To increase the performance of your computer and the number of programs it can effectively run at one time, you may want to increase the size of the computer's _____.

RAM

Which type of memory stores any programs and data that are currently in use by the CPU that will be lost when the computer is switched off?

RAM

Which type of memory contains instructions necessary for the computer's basic input/output system (BIOS) which is used to load essential data when the computer is turned on?

ROM

Which of the following is NOT a good practice in combating being a victim of computer fraud? - Don't open suspect emails, click on links, or open attachments. - Send your username or password via email only when the request comes from your IT department. - Limit your web browsing to reputable sites. - Don't download pirated software or participate on P2P networks.

Send your username or password via email only when the request comes from your IT department.

A computer that serves other computers by running important software and storing important data is called a _____.

Server

The enclosure that contains most of the components of a computer is commonly called the _____.

System Unit

Malware is _____.

The general term used to describe malicious software that can cause damage to your computer system or data.

Phishing is _____.

The tactic of using a fake web site to imitate a site a user knows and trusts.

What is the top-level domain for the Uniform Resource Locator (URL) given as http://angel.irsc.edu?

.edu

A kilobyte is _____.

1024 Bytes

A removable USB flash drive with a capacity of 4096 megabytes has an equivalent storage capacity of _____.

4GB

What is the protocol prefix for the Uniform Resource Locator (URL) given as http://angel.irsc.edu?

http://

Which command can be typed in at a Window's command prompt to identify the computer's Internet address information?

ipconfig

Google and Bing are examples of what kind of software system?

Web Search Engine

How many digits is the binary language comprised of?

Two

A web address comprising of three parts, the protocol prefix, domain name, and top-level domain is often called a _____.

URL

Memory that requires electrical power to retain data is referred to as being _____.

Volatile


Related study sets

Programming Languages: Final Exam Review

View Set

intro to public speaking mid term

View Set

An Update on Demineralization/Remineralization CE

View Set

Chapter 19: Documenting and Reporting

View Set