CST133 Exam Ch.1-4
____ tools cloak a person's identity online.
Anonymizer
In a computer most processing takes place in the
CPU
Technology ____ is a process by which several different technologies with distinct functionality evolve to form a single product
Convergence
To reboot a PC, hold down the ____ keys at the same time.
Ctrl, Alt, and Del
____ is typically available as a trial version.
Demoware
____ is the process of converting text, numbers, sound, photos, and video into data that can be processed by digital devices.
Digitization
A global computer network originally developed as a military project is the ____.
Internet
____ was developed by a Finnish student. It continues to gain popularity as an operating system for personal computers. It is distributed under the terms of a GPL.
LINUX
An operating system's ____ capability supports a division of labor among all the processing units
Multiprocessing
____ provides process and memory management services that allow two or more tasks, jobs, or programs to run simultaneously.
Multitasking
Within a single program, ___ allows multiple parts to run simultaneously.
Multithreading
Adobe Reader works with files stored in standard ____ format.
C:\Music\Reggae\Marley One Love.Mp3 Music is an example of _______.
Primary Folder
____ is a temporary holding area for data, application program instructions, and the operating system.
RAM
____ is typically copyrighted software that is marketed under a try-before-you buy policy.
Shareware
____ media are cloud-based applications designed for social interaction and consumer-generated content.
Social
____ compares the content of files on two devices and makes them the same.
Synchronization
An easy way to back up your important data is simply by copying selected files to a ____.
USB flash drive
Web applications are ____.
accessed and run on the Web
A good computer maintenance routine would include regularly ____. - running utilities like Disk Cleanup and Disk Defragmenter - scanning your computer for viruses and spyware - deleting your browser's history and cache files - all of the above
all of the above
A problem a hacker can cause after breaking into your computer might be ____. - applying for credit in your name - sending embarrassing e-mails - applying for a mortgage using your data - all of the above
all of the above
Gaming computers typically include ____. - very fast processors - lots of memory - state-of-the-art sound capabilities - all of the above
all of the above
If virus protection software identifies a virus, it can try to ____. - remove the infection - put the file in quarantine - delete the file - All of the above
all of the above
Mobile apps ____. - are usually small - typically are sold through an App store - often cost less than $5.00, or are even free - all of the above
all of the above
Overclocking is a technique for increasing the speed of a computer component, such as ____. It can be very risky. - the processor - a graphics card - memory - all of the above
all of the above
To avoid security threats, a user can ____.
avoid opening suspicious email attachments
A(n) ____ printer can print on both sides of the paper.
duplex
Most hard disks are formatted by the ____.
factory
A named collection of data that exists on a storage medium is known as (a) ____.
file
An optional file identifier that is separated from a main file name by a period is a ____.
file extension
C:\Music\Reggae\Marley One Love.Mp3 In the accompany figure, mp3 is an example of a ___.
file extension
The term ____ refers to the size and dimensions of a computer component.
form factor
Files stored in non-contiguous clusters are ____.
fragmented
A(n) ____ system backup includes a copy of every file stored on your computer's hard drive. In addition to data files, it includes copies of all installed programs, settings, and the operating system.
full
Software considered to be utility software is ____.
hard disk backup software
A(n) ____ backup makes a copy of only those files that were added or changed since your last backup.
incremental
Data becomes ____ when it is presented in a format that people can understand and use.
information
1,024 bytes is a ____.
kilobyte
An area of a computer that temporarily holds data waiting to be processed is ____.
memory
An electronic component that can be programmed to perform tasks is a ____.
microprocessor
A processor that includes circuitry for two or more processing units is called a ____ processor.
multi-core
A group of computers linked together to share data and resources is a(n) ____.
network
A laptop computer (also referred to as a ____ computer) is a small, lightweight portable computer that opens like a clamshell to reveal a screen and keyboard.
notebook
A shrink-wrap license goes into effect as soon as you ____.
open it
A(n) ____ system is a type of system software that acts as the master controller for all activities that take place within a computer system.
operating
The term ____ designates equipment that might be added to a computer system to enhance its functionality.
peripheral device
A(n) ____ is a microprocessor-based computing device designed to meet the computing needs of an individual.
personal computer
A hacker posing as a legitimate representative of an official organization such as your bank is an example of ____.
phishing
A technology called ____ allows the processor to begin executing another instruction before it completes the previous instruction.
pipelining
Dot pitch is the distance in millimeters between like-colored ____ —the small dots of light that form an image.
pixels
A(n) ____ computer is a small, lightweight personal computer with screen, keyboard, storage, and processing components integrated into a single unit.
portable
A ____ is a sudden increase or spike in electrical energy, affecting the current that flows to electrical outlets.
power surge
A service pack ____.
provides updates to the operating system
Application software is designed to accomplish ___ tasks.
real-world
The strengths of Microsoft Windows include all of the following EXCEPT ____. Question options: - number of applications - variety of hardware platforms on which it runs - large user community - reliability
reliability
The main directory maintained by your computer's operating system is the ____ directory.
root
To get rid of software you no longer want from a PC, you ____.
run an uninstall routine
____ intercepts information sent over computer networks.
sniffing
A ____ is an additional set of commands that the computer displays after you make a selection from the main menu.
submenu
A compute-intensive problem runs on a ____
supercomputer
The ____ is the case that holds the computer's main circuit boards, microprocessor, memory, power supply, and storage devices.
system unit
A set of computer programs that helps a computer monitor itself and function more efficiently is ____.
systerm software
A ____ computer is a handheld computer that is essentially a large version of an enhanced media player.
tablet
To delete data from a disk in such a way that no one can ever read it, you should ____.
use special file shredder software
Unlike disk storage, most RAM is ____.
volatile
Spreadsheets are particularly useful for ____.
what-if analysis
3-D graphics software provides a set of tools for creating ____ that represent three-dimensional objects.
wireframes
A powerful desktop computer used for high-performance tasks is a ____. An ordinary personal computer that is connected to a network is a ____.
workstation
Portable software is ____.
designed to run from removable storage
Productivity software that has sophisticated features to help you produce typeset-quality output is considered ____ software.
desktop publishing
A(n) ____ backup contains any files that were added or changed since the last full backup.
differential
For good basic performance, a computer running Windows 7 or 8 should have at least ____ of RAM.
1GB
The binary number 10 represents ____ in the decimal number system.
2
Current versions of Windows support file names up to ____ characters long.
255
Microsoft Windows is installed on more than ____ of the world's personal computers.
80%
The ____ indicates that the operating system has encountered an error from which it cannot recover, and the computer no longer accepts any commands.
blue screen of death
A security suite will typically include all of the following EXCEPT ____ software. - antivirus - firewall - anti-spyware - browser
browser
Storage is typically expressed as ____.
bytes
____ computing provides access to information, applications, communications, and storage over the Internet.
cloud
The first digital computers were built during World War II for ____.
code breaking
The number of colors a monitor can display is referred to as ____.
color depth
____ is typically sold in computer stores or at Web sites
commercial software
System software is designed to accomplish ____ tasks.
computer-centric
It is illegal to do all the following with software EXCEPT ____. - copy and sell to a friend - copy and give to a friend - copy and keep as backup - modify
copy and keep as backup