CS120 Practice Cards
Data is given to the computer through _______ devices. Internet CPU Input Output
Input
A(n)_____ is a narrow opening in the motherboard that allows for insertion of an expansion board. system slot expansion slot extension slot bus slot
expansion slot
________ expands compressed files. Disk caching File decompression Data caching File compression
file decompression
A ________ acts as a security buffer between a corporation's private network and all external networks. password virus checker firewall disaster recovery plan
firewall
The _____ is the highest display mode an LCD monitor can support. polarization amplification maximum resolution lumen value
maximum resolution
A computer's _____ temporarily stores data by holding a 1 and 0 value in each transistor and then reporting it when requested to do so. register CPU memory pipeline
memory
Which term refers to the viewable area of any display device? port screen output bus
screen
A byte is formed by a group of _______. Select one: a. 4 bits b. 8 bits c. 12 bits d. 16 bits
8 bits
Which of the following is not malware? worms Ad-Aware Trojan horses viruses
Ad-Aware
Specialized devices with a large display connected to a computer projector and are widely used in classrooms and corporate boardrooms. scanners E-books HDTV digital or interactive whiteboards
Digital or interactive whiteboards
The windows troubleshooting utility that identifies and eliminates nonessential files is called ________. Disk Cleanup Storage File History Disk Defragmenter
Disk Cleanup
The process of coding information to make it unreadable except to those who have a special piece of information known as a key. restriction protection security encryption
Encryption
________ is the process of coding information to make it unreadable except to those who have a special piece of information known as a key. Decryption Restriction Prevention Encryption
Encryption
Before sending a large file over the Internet, you might want to use one of these programs. Uninstaller Disk cleanup program File compression program Disk defragmenter
File compression program
A ________ is an example of an IoT device. Fitbit land line telephone bicycle railway car
FitBit
A ________ is someone who gains unauthorized access to computer systems. hacker cracker logger cookie
Hacker
The continuing development of the Internet that allows everyday objects embedded with electronic devices to send and receive data over the Internet. IoT IoW Web 3.0 cloud
IoT
Which of the following is a function of the control unit? It uses the logic to compare two pieces of data. It provides pathways that support communication among the various electronic components. It performs fundamental math operations like addition, subtraction, and so on. It directs the movement of electronic signals between memory and the arithmetic-logic unit.
It directs the movement of electronic signals between memory and the arithmetic-logic unit.
What does an audio port on a sound usually look like? It's a small, circular hole with a 3.5-millimeter connector plugged into it. It resembles the port used for a telephone jack but is a little wider. It's a small, round port that is either orange or purple. It looks like a 25-pin female D-sub connector.
It's a small, circular hole with a 3.5-millimeter connector plugged into it.
This reading device is used in banks to read the numbers on the bottom of checks and deposit slips. OMR OCR UPC MICR
MICR
________ operating systems are used to control and coordinate computers that are linked together. Stand-alone Real-time Embedded Network
Network
A _____ computer is a PC that's designed for people who frequently move about in their work. notebook mainframe desktop supercomptuer
Notebook
Which part of an information system consists of the rules or guidelines for people to follow? data Internet people procedures
Procedures
The set of instructions that controls a computer is called a processor program database chip
Program
This computer component holds the program and data that is currently being processed.
RAM
Which of the following is not an example of secondary storage? RAID RAM external hard drives flash drives
RAM
_____ is the type of memory people typically mean when they refer to computer "memory." Read-only memory (ROM) Hard Disk Drive (HDD) Random-access memory (RAM) CPU
RAM
A ________ Wi-Fi hotspot imitates a legitimate free Wi-Fi hotspot in order to capture personal information. worm phishing rogue viral
Rogue
A ________ engine is a specialized program that assists you in locating information on the web and the Internet. wiki micro cloud search
Search
________ software consists of operating systems, utilities, device drivers, and language translators. System Suite Mobile Device
System
"Background" software that helps the computer manage its own internal resources is called ________. system software application software shareware desktop
System Software
This hardware houses most of the electronic components that make up a computer system. secondary storage communication input/output devices system unit
System Unit
_____ is also known as primary storage and random access memory (RAM). Hardware Software Main storage Temporary storage
Temporary Storage
________ speed is the measure of the amount of time required by a storage device to retrieve data and programs. Ethernet Access Pixel Bit rate
access
Which of the following measures the amount of time required by the storage device to retrieve data and programs? nonvolatile media capacity RAM access speed
access speed
The processing speed of a microprocessor is typically represented by its ________. control unit bus line clock speed ALU
clock speed
Storing data files on a(n) _____ keeps them safe, because their existence doesn't depend on the health of your computer's own hardware. optical disc attached storage device hard disk drive cloud drive
cloud drive
This allows you to upload and store documents on the Internet. flash drive hard disk drive solid-state storage cloud storage
cloud storage
Which of these is not an example of solid-state storage? USB drives digital versatile disc SSDs flash memory cards
digital versatile disc
The category of operating system used for handheld devices. open source network stand-alone embedded
embedded
Most large organizations store data through a strategy called a(n) ________ to promote efficient and safe use of data across the networks within their organizations. organizational cloud mass storage device storage area network enterprise storage system
enterprise storage system
Which of the following allows a computer to run two or more operations simultaneously? binary system coprocessors multicore processors multiplexing
multicore processor
Which of the following allows a computer to run two or more operations simultaneously? coprocessors multicore processors binary system multiplexing
multicore processors
These screens can be touched with more than one finger, which allows for interactions such as rotating graphical objects on the screen with your hand or zooming in and out by pinching and stretching your fingers. LCD multitouch touch CRT
multitouch
The most widely used handheld computers are ________. tablets smartphones laptops notebooks and laptops
smartphones
Identify the four basic categories of hardware in a personal computer system. system unit, input/output, secondary storage, and primary storage hard disk, modem, RAM, and microprocessor system unit, input/output, secondary storage, and communication hard disk, input/output, secondary storage, and display device
system unit, input/output, secondary storage, and communication
This type of computer is a thin slab that is almost all monitor with the system unit located behind the monitor. laptop smartphone tablet desktop
tablet
For browsers to connect to resources on the Internet, the location of the resources must be specified through addresses called ________. hyperlinks Hypertext Markup Language (HTML) uniform resource locators (URLs) top-level domains (TLDs)
uniform resource locations (URLs)
Suppose you have installed drivers on your laptop for a new printer and are prompted to restart the computer before continuing to work. Restarting in this situation is called a root boot warm boot cold boot hard boot
warm boot
Knowledge of HTML and CSS is considered essential for the job of a ________. browser manager blogger podcaster webmaster
webmaster
Most modern desktop systems have a 64-bit CPU, which means the _____ is 64 bits. pipeline byte word size system clock
word size
Which of the following is not an example of a search engine? Google Amazon Bing Yahoo!
Amazon
Which of the following is not a popular desktop operating system? Android Linux macOS X Windows 10
Android
Online banking is an example of what type of e-commerce? B2C B2B C2C C2B
B2C
This method of file transfer distributes file transfers across many different computers. Dropbox.com SSP BitTorrent FTP
BitTorrent
The hi-def largest capacity format for optical discs is the ________ disc. Blu-ray HD DVD DVD-RAM HD CD
Blu-Ray
Which of the following can store the least amount of data? a digital versatile disc (DVD) a Blu-ray disc (BD) a rewriteable digital versatile disc (DVD+R) a compact disc (CD)
CD
Which of the following is not a character encoding standard? CISC ASCII EBCDIC Unicode
CISC
Which of the following are files inserted into an HTML document that control the appearance of web pages including layout, colors, and fonts? Javascript Applets AJAX CSS
CSS
________ computing provides access to software, programs, and data from anywhere through an Internet connection. Client Three-way Cloud Service provider
Cloud
This is a legal concept that gives content creators the right to control use and distribution of their work. copyright piracy privacy ethics
Copyright
A computer can become infected with viruses in all the following ways, except by ________. downloading software from the Internet opening attachments to email messages creating a new folder on your computer downloading files from the web
Creating a new folder on your computer
________ are malicious programs that come into a computer system disguised as something else such as a free computer game or screen saver. Scams Rogues Zombies Trojan horses
Trojan Horses
Which of the following can be used to connect several devices to the system unit and are widely used to connect keyboards, mice, printers, storage devices, and a variety of specialty devices? Firewire bus SATA USB port Parallel port
USB port
Which of the following is not a popular mobile operating system? Android UNIX iOS Windows 10 Mobile
Unix
________ is an operating system widely used by servers on the web, mainframe computers, and very powerful personal computers. macOS Windows UNIX Lotus
Unix
________ encrypt connections between company networks and remote users, such as workers connecting from home, creating a secure virtual connection to a company LAN across the Internet. Loggers Virtual private networks Biometrics Web bugs
Virtual Private Networks
________ are programs that migrate through networks and operating systems and attach themselves to various other programs and databases. Zombies Web bugs Viruses DoS
Viruses
