Computer Input, Computer Storage, Computer Output, Computer Security, Hardware, Networking and Connecting to the Internet, Buying a Computer

Ace your homework & exams now with Quizwiz!

The art and science of creating output that provides information in the most useful manner is called _____.

Ergonomics

Hardware or software used to keep a computer secure from outside threats such as hackers and viruses by allowing or blocking Internet traffic is called a _____.

Firewall

A person who gains unauthorized access to networks in order to steal and corrupt information and data is called a _____.

Hacker

Firewall software used to block a user's access to specific Internet content is called a(n) _____ filter.

Internet

Which of these browsers was developed by Microsoft?

Internet Explorer

The ___ cache is located directly on the processor itself.

L1

The 2 most common audio file formats are WAV and ____.

MP4

Broadband is measured in

Mbps

A commonly-used short range wireless technology used for data transfer and electronic payments is called

NFC (near field communication)

What manages hardware and software, supports the computer's basic functions, and runs programs?

Operating system

Using reflective material to store data that can be read using a laser is called _____ media storage.

Optical

An input, output, or storage device connected to a computer is known as a(n) ____.

Peripheral

The smallest controllable element of an image is called a(n) _____.

Pixel

Which type of touchscreen uses a single metallic-coated panel and uses electricity to calculate touch points?

Projective capacitive

____ is actually storage since it retains data and information when the power has been turned off.

ROM (read only memory)

RFID stands for which of the following.

Radio Frequency Identification

In general, the _____ the access time, the faster the hard drive.

Shorter

Increased data transfer will be less likely to have errors if you use a _____ USB cord.

Shorter

An unsolicited email message is called ____.

Spam

What group determines the standards for the World Wide Web?

The World Wide Web Consortium (W3C)

A kilobyte is equal to approximately one ____ bytes.

Thousand

The World Wide Web was created through a collaboration led by

Tim Berners-Lee

Laser printers are popular in offices because they use relatively inexpensive _____.

Toner

A terabyte equals approximately one _____ bytes.

Trillion

What type of port do most digital devices use to attach peripherals?

USB port

URL stands for ____ Resource Locator.

Uniform

Persistent cookies store information about _____.

User preferences

Software that infects a computer and is created using computer code is called a computer _____.

Virus

The original wireless network privacy and protection standard for WiFi was known as

WEP

Non-malicious computer security experts that test the security measures of an organization's information systems to ensure they are protected against malicious intrusions are called ____.

White Hat Hackers

The protocol for wireless networks is called ___

WiFi

Many cellular ISPs offer modem/router combination devices that can create a ____ wherever there's adequate cell service.

WiFi hotspot

WWW stands for

World Wide Web

A destructive program that replicates itself throughout a single computer or across a network is called a _____.

Worm

A computer controlled by a hacker is called a ____.

Zombie

Smartphone cameras work by focusing incoming light onto what type of array that captures images?

active pixel scanner

When discussing digital cameras or smartphone cameras with APS CMOS, APS stands for

active pixel sensor

What 3 items are needed to install a home WiFi network?

an Internet signal, a modem, a router

The volume of data that can be carried on an Internet transmission media in an amount of time is called

bandwidth

Represented as either a 0 or 1, a ____ is the smallest unit of data a computer can process.

bit

An Internet signal that has enough bandwidth to allow multiple computers to be connected to the same router is called a ____ signal.

broadband

Software applications that allow users to access and surf the World Wide Web are called

browsers

The two major factors that impact processor speed are clock speed and _____ .

bus width

Data flows between different parts of the computer via _____ .

buses

Which might be a choice for Internet service in your area?

cable Internet

In addition to the RAM, modern processors temporarily keep frequently accessed data in a _____.

cache

Magnetic Ink Recognition (MICR) is a technology that is most commonly seen on

checks

Screensize is measured by the ___ across the monitor

diagonal

Screen size is measured by the ___.

diagonal distance between the upper right and lower left of the screen

A ____ name identifies a server site on the Internet.

domain

Routers that can send Internet signals over 2 distinct frequencies are called ____ routers.

dual band

Using a stylus and touchpad to map the signature and also measure pressure, pen angle, pen up/down, speed, etc, is known as what type of signature recognition?

dynamic

The machine cycle consists of which four steps?

fetch, decode, execute, store

Software that limits the material that a browser fetches or that a search engine displays are called

filters

Typical SSD capacities for tablet computers or smartphones are measured in ____ .

gigabytes

The visual image output that a computer creates is known as ____ .

graphics

What is equal to one cycle per second?

hertz

The cost of an SSD is ____ than the cost of a traditional hard drive.

higher

When determining how much cell phone data you need it is important to consider

how much data you currently use

A television remote usually uses ___ waves.

infrared(IR)

These facilitate getting data and information into your computer.

input devices

The word modem stands for

modulator-demodulator

In photography, there are 2 ways to focus on distant objects, digital zoom and ____ zoom.

optical

With optical zoom, resolution ____ when focusing on distant objects.

remains the same

The number of pixels in an image is called the image's

resolution

A processor comprised of one control unit and one ALU is called a ____ .

single-core processor

Contact your ISP if your actual Internet speed is ____ than advertised.

slower

The average tablet computer has a ____ hard drive than the average desktop computer.

smaller

A combination input and output device that allows users to interact with large computer displays that is sometimes found in classrooms is called an interactive whiteboard or a

smartboard

The component of a computer that allows data to be retained after power is turned off is referred to as the _____.

storage

Because they're inexpensive and reliable ___ have become extremely popular storage devices.

thumbdrives (USB or flash drives)

Many computers today use _____ which is a coding scheme using at least 16 bits to represent a character.

unicode

If you buy a new computer game that emphasizes graphics, or new photo/video editing software for your desktop computer, you may want to purchase a new ___ card.

video

A camera that takes photos or streams video into a computer or over the Internet is called a

webcam

The maximum number of bits per instruction that a CPU can process during 1 machine cycle is called ___ .

word size

Select the domain name.

www.cnet.com

"Full HD" resolution is expressed as:

1920x1080

Most new laptop computers come with how much storage?

256 GB to 1 TB

FireWire connectors were developed for ___ computers.

Apple

One character of information, for example, a letter or a number, consists of one _____ of storage.

Byte

DVDs store data using _____: A. A magnetic coating that is sensed by a read/write head B. Electronic circuits C. A reflective coating that has pits and lands D.A blue spectrum laser beam

C

Emailing a file to yourself is an example of using ______ storage.

Cloud

A crime in which a computer is the object of the crime or is used to commit a crime or offense is called a _____.

Cybercrime

Which of the following might contain a traditional (magnetic) hard drive?

Dell desktop computer

Personal computer CPU clock speeds range between _______ .

2 to 4 gigahertz

SAGE was developed by the US Department of

Defense

What does DDoS stand for?

Distributed Denial of Service

A protocol commonly used to transfer large files from one server to another on the Internet is the

File Transfer Protocol

The ___ is a computer within your computer that creates images.

GPU

A separate processor (computer) in your computer that enhances your video is called the ___ .

Graphic processor (GPU)

Lower range tones generally require _____ speakers.

Larger

A million bytes of data equals approximately one ____.

Megabyte

The technology that uses the reflection of a laser of the graphite left by a #2 pencil to determine if a bubble has been filled in is called

OMR

Many manufacturers have made _____ optional equipment when purchasing a new laptop computer.

Optical drives

The standard for wireless network privacy and protection is known as

WPA2

The technology that allows any text, even handwritten scrawls, to be digitized is known as optical ____ recognition.

character

Devices with a separate system unit and a relatively large footprint are called _____ computers.

desktop

Memory is ___ and has no moving parts.

electronic (solid state)

Which transmission media has the largest bandwidth?

fiber optic

The actual number of pixels in a monitor is called ___ resolution.

native

Devices that allow for the retention of data when your computer has been shut down are called ___ devices.

storage

A security system separating 2 networks or even computers on the same network is called a

switch

Select the smartphone input device.

touchscreen or keyboard

The technology that uses cameras, microphones, displays, speakers and software to allow users to both see and hear each other is called

video conferencing

Most smartphones and tablets produced today use a ____ keyboard.

virtual

Blu-rays provide approximately ____ of storage space.

25 GB

According to YouTube, approximately how much video is uploaded to its site every minute?

300 hours

Sometimes used to create prototype models for casting, ___ printing is also known as additive printing.

3D

When you buy a new laptop, how much RAM should it come with?

4-8 GB

CDs provide approximately ______ of storage space.

700 MB

All of the following are common ports that are included with laptop computers except: A. MIDI ports B. Ethernet ports C. HDMI ports D. USB ports

A

Blu-ray stores data using: A. Pits and lands that are read by a blue spectrum laser beam B. A metal platter with a reflective coating C. A magnetic coating that is sensed by a read/write head D. Electronic circuits

A

One type of storage device is a: A. USB drive B. RAM C. Microphone D. CPU

A

Which of the following is a strength of the Android platform? A. Most widely used OS for smartphones and tablets B. Used on most iPhones C. Most widely used OS for desktops and laptops D. Owned by Microsoft corporation

A

Which of the following might be risky to uninstall from a Windows PC laptop? A. Microsoft Works 6-9 Converter B. Cisco WebEx Meetings C. Angry Birds D. Apple Software Update

A

Which of the following represents the highest amount of storage? A. Terabyte B. Kilobyte C. Megabyte D. Gigabyte

A

Which of the following represents the least amount of storage: A. kilobyte B. megabyte C. gigahertz D. gigabyte

A

Software that collects the user's web browsing history and uses the data collected to create unsolicited targeted pop-up advertisements is called ____.

Adware

The mouse was developed by which company?

Apple

One disadvantage of cloud storage is that: A. When a DVD gets scratched, data can be irretrievably lost B. Data is only available when you're online C. Over time, data stored on the cloud deteriorates D. Because of their small size, thumb drives can be easily lost

B

Solid state drives store data using _____: A. Laser markings B. Electronic circuits C. Reflective coatings D. Magnetically charged particles

B

Inkjet printers are often sold _____ their production cost.

Below

A gigabyte equals approximately one ____ bytes.

Billion

The smallest unit of data storage is a _____.

Bit

This technology provides short-distance wireless communication between electronic devices using extremely low power radio signals.

Bluetooth

A group of compromised computers controlled by a hacker is called a ____.

Botnet

One of the largest data requirements of the future will likely be _____: A. Retinal scans B. Storing fingerprints C. Mapping patients' genomes D. Facial recognition data

C

Which is true regarding the length of a USB cord? A. Cord length has nothing to do with data transmission amounts B. In general, the more data being transmitted, the longer the cord should be C. In general, the more data being transmitted, the shorter the cord should be D. A USB 1.0 cord has more bandwidth than a USB 2.0 cord

C

Which of the following would be considered a cybercrime? A. Spam B. Adware C. Data manipulation D. Third-party cookies

C

Which optical drive media stores approximately 700 MBs of data?

CD

Because it allows their files to be accessed from any device on the Internet, many users like to back-up their files using ____ storage.

Cloud

The fact that data on servers is nearly always backed up onto other servers gives ____ storage a major advantage over other storage methods.

Cloud

Sage was developed during the ____ war.

Cold

The number of bits of data describing each pixel in a display is referred to as ____.

Color depth

A digital device that accepts input, processes and stores the input, and provides output is a _____.

Computer

A description of the difference in the luminescence of a display's black and white pixels is called ____.

Contrast ratio

A site on the Windows operating system where you can uninstall programs, adjust settings, and manage tasks is the ______.

Control panel

A small text file of information created by websites you visit that your web browser stores on your hard disk is called a(n) _____.

Cookie

What was the major question that ARPAnet wanted to solve?

Could a network be built that would continue to work even if multiple parts collapsed?

The first commercially available computer with a graphical user interface was NeXT's ____ computer.

Cube

The malicious use of a computer code to modify the normal operations of a computer or network is called a _____.

Cyberattack

Harming or harassing a person or group of people via information technology and networks in a repeated and deliberate manner is called _____.

Cyberbullying

A person who uses computers and the Internet to launch attacks against computer systems for political or ideological reasons is called a ____.

Cyberterrorist

CDs store data using: A. Electronic circuits (transistors and capacitors) that store data B. A blue spectrum laser beam C. A magnetic coating that is sensed by a read/write head D. A reflective coating that has pits and lands

D

Which of the following is a strength of the Linux platform? A. Less susceptible to viruses than Mac OS B. Most widely used OS in smartphones and tablets C. Most widely used OS in desktops and laptops D. Free to download and use

D

An attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests is called a ____ attack.

DDoS

Though it could theoretically hold terabytes of data for thousands of years in microscopic space, _____ storage, using genetic material, is a distant storage option.

DNA

The Internet service that tends to provide the most consistent speeds is

DSL

An application that navigates all of the files and folders in your Mac is the _____.

Finder

The number of times per second a frame in a video is advanced is the definition of ______.

Frame rate

Relatively rugged, water-resistant video cameras that allow users to film high-definition video under harsh conditions, such as on ski mountains, in the ocean, or at high altitudes are called extreme-action video cameras or simply a

GoPro

Letting computer users drag images and documents across their computers' monitors made the ____ User Interface very popular.

Graphical

A port that allows the transfer of high quality video and audio signals is called a(n) _____ port.

HDMI

The standard port for video and audio input into televisions today is the ___ port.

HDMI

The act of hacking or breaking into a computer system for a politically or socially motivated purposes is called _____.

Hacktivism

To allow hard disk drive platters to spin more smoothly and cooler, some manufacturers seal the platters in ____ instead of air.

Helium

A refracted laser beam striking a photoreceptor from many different angles allows _____ storage to retain many bits of data in the same location.

Holographic

Using refracted laser light to store data on a photoreceptive substrate is essentially how ____ storage works. Theoretically this could store gigabytes of data within a cubic millimeter.

Holographic

For ____ it may be less expensive to add an existing cell phone data plan and to use the phone as a hotspot than to add wired Internet service.

Individual users

The largest chip designing and manufacturing company in the world is ____

Intel

Although it sounds ironic, searching the ____ in your area is an efficient way to search for an ISP.

Internet

ISP stands for:

Internet Service Provider

A form of spyware that records all actions typed on a keyboard is called a _____ logger.

Keystroke

A mobile hinged computer with an integrated keyboard that uses a full operating system is called a notebook or a ______ computer.

Laptop

A switch distinguishes between various devices within a network by their ____ addresses.

MAC

The technology (chips) that allow cell phone microphones and hearing aids to be so small is the ____ chip.

MEMS

The abbreviation for megahertz is ___ .

MHz

Connecting digital musical devices to computers is accomplished by using ___ ports.

MIDI

This technology allows musicians to create written sheet music simply by playing an instrument.

MIDI

What is the name of a virus written in a macro language and placed within a document or spreadsheet?

Macro virus

An electronic element that stores data by changing its resistance based on the current that has passed through it (similar to RRAM) is called a(n) _______.

Memristor

Windows OS is owned and maintained by _____.

Microsoft

A megabyte equals approximately one ____ bytes.

Million

Though currently expensive, curved and paper-thin displays are possible using ____ display technology.

OLED

A storage device that uses lasers to read CDs, DVDs, or Blu-ray discs is referred to as a(n) _______.

Optical drive

Printer speed is described using what acronym?

PPM

Cookies stored on a computer's hard drive and used to collect and store information about user preferences, password and username information, IP addresses, and/or data or web surfing behavior are called ______ cookies.

Persistent

A type of phishing that seeks to obtain personal information through malicious software that is inserted on a victim's computer is called _____.

Pharming

Using cells of ionized gas to create images, _____ displays are actually becoming less popular.

Plasma

A type of printer that is used to print large graphic images such as architectural drawings by mechanically moving a pen over a large sheet of paper is known as a _____.

Plotter

An output device that uses light to display video or image output on a surface is called a _____.

Projector

Because of their capability of storing data in multiple hard drives, data warehouses use _____ technology to ensure redundant data storage.

RAID

The place in a digital device where the data and programs that device is currently using are accessible by the processor is called the ___ .

RAM

The instructions needed to boot-up a computer, such as the BIOS, are typically stored in ___ .

ROM

When referring to digital storage, RAID stands for what?

Redundant Array of Independent Discs

The term that describes how fast each pixel in a display is updated is _____.

Refresh rate

The number of pixels in a display is called the display's _____.

Resolution

Most tablets and phones use _____ as their main storage device.

SSD

Because they have no mechanically moving parts, _____ provide extremely fast, efficient storage.

SSDs

A signal transmitted every few seconds by a wireless router so that users' computers can find the WiFi hotspot is called

SSID

Because they're both Apple products, the browser that works smoothest with Macintosh OS X is

Safari

The accuracy of a digital recording is determined by the device's ____ rate.

Sampling

Specialized hardware or software that capture packets transmitted over a network are called packet _____.

Sniffers

To improve the sound quality of their smartphones, many users purchase large external ____ to listen to music.

Speakers

Select the sites that offer Internet speed test services.

Speedtest.net, TestMy.net

A computer that is highly mobile, has a smaller OS, and uses a touchscreen as the primary input method is called a ____.

Tablet

A thousand gigabytes equals one ____.

Terabyte

To create an image with a laser printer, _____ is/are drawn to the drum.

Toner

The highest level in the domain name hierarchy is known as the

Top Level Domain

Used in a variety of devices including ATMs and point-of-sale terminals, ____ allow for the input of data with the use of a stylus or finger.

Touchscreens

This type of connector is the most common for connecting peripherals (printers, monitors, storage devices, etc.) to a [Windows] computer.

USB

The wireless network privacy standard that was introduced in 2003 but was quickly replaced (due to numerous vulnerabilities) was known as

WPA

In addition to activating ____ protection, it's a good idea to disable your router's SSID transmission once all your devices are connected.

WPA2

Combining the power of a desktop with a neat, clean, look ____ computers are popular with businesses. Their lack of expandability make them less popular with serious gamers though.

all-in-one

The capacity of a particular transmission medium is called its

bandwidth

A short-range wireless transmission protocol is known as _____ .

bluetooth

Because its radio waves pass through walls or desktops, ___ - capable devices are becoming very popular.

bluetooth

Most touchpads use ____ to sense when a finger has moved across the pad.

capacitance

The number of instructions the CPU can process per second is dictated by the ___ speed of the processor.

clock

Clockspeed, also referred to as _________, is the speed at which the processor performs the operations required to run a digital device and instructions executed by the digital device.

clock rate

The amount of data that defines each color in a pixel is called ____ .

color depth

The two main components of a processor are the arithmetic logic unit (ALU) and the _____ unit.

control

A URL identifies a particular ____ address on the World Wide Web.

file

Because of their compact size, touchpads are most often used with ____ computers.

laptop

Megahertz is equal to one _____ cycles (or instructions) per second

million

Fiber optic cable is ____ expensive than coaxial cable to install.

more

Running the processor faster than recommended by the manufacturer is called _____ . This can increase performance and speed, but will also void the manufacturer warranty.

overclocking

Paul Baran developed a technology called ____ switching that made the Internet possible and reliable.

packet

The BitTorrent protocol is often called ____ file sharing.

peer-to-peer

A request for an electronic "echo" or response from another computer or server is called a

ping

the smallest element of an image is called a(n) ___ .

pixel

Software that can be added to a browser to increase its functionality are called

plug-ins

A point (a hole or slot) in a computer, designed to accept a specific connector, is called a ___ .

port

The device that connects 2 networks is a

router

Your ____ can provide hardware firewall protection for your home network where it connects to the ISP's network, just as ISP networks have firewalls where they connect to the Internet.

router

With ____ recognition technologies, frequency, pitch, speech rhythms and other characteristics are charted and compared to existing records.

voice


Related study sets

The Supreme Court--Current Justices and Important Past Justices

View Set

Endocrine Glands and Types of Hormones

View Set