IT Quiz
built-in memory or primary storage is referred to as
RAM (Random Access Memory)
access points or other stations in a wireless network will ignore data packets that are not labeled with their
SSID
an identifier attached to data packets that functions as a password for a wireless network
Service Set Identifier (SSID)
SCSI stands for
Small Computer Systems Interface
the unique hardware address of a network connection
Media Access Control (MAC) Address
the technology that recognizes individual characters on a page so they can be stored and eventually edited
OCR (Optical Character Recognition)
a hand held computer
PDA (Personal Digital Assistant)
the IEEE 802.11 family of wireless Ethernet standards
Wi-Fi
WWW stands for
World Wide Web
a chip on the motherboard where BIOS typically is stored
a ROM BIOS chip
both an input and an output device
a bar-code scanner
a computer connected to 2 networks
a gateway
a data network connection that connects unlike networks
a gateway
can have a storage capacity of 800MB
a generic CD ROM
can have a storage capacity of 4.7GB
a generic DCD ROM
a specialized server that acts as a post office for a particular Internet host
a mail server
a point of light on a monitor or a picture element
a pixel
creates a digital representation of a printed digital image
a scanner
a computer intended to provide software, as well as other resources to computers over a network
a server
a website designed to be a first stop for a web browser with a wide variety of options to consider
an Internet Portal
a unique address on the Internet is called
an URL (Uniform Resource Locator)
a wireless LAN transmitter/receiver that connects between wireless devices and wired networks
an access point
designed to search for viruses, notify users when they're found, and remove them from infected files or disks
antivirus software
normally measured in megabits per second (Mbps)
bandwidth
the total amount of data that can be transmitted in certain period of time
bandwidth
uses measurement of individual body characteristics such as a voice print, fingerprint, retinal scan, or facial feature scan
biometrics
a wireless technology used for voice and data links over short ranges (10 meters)
bluetooth
wires that move data from 1 component to another inside a computer
buses
a faster type of internal memory
cache
a process that experts use special software to scan criminal suspects' hard drives for digital "fingerprints"
computer forensics
eg. CD-ROM drive, printer, and monitor
computer peripherals
are destructive because they use computer hosts to reproduce themselves
computer worms
small programs that enable input/output devices to communicate with the computer
device drivers
the display size of a monitor is measured
diagonally
broadband connection
eg. DSL, cable modem, high-speed wireless, satellite
keep internal networks secure while enabling communication with the rest of the Internet
firewalls
the process of preparing a disk for reading and writing by defining how files will be organized on the disk
formatting
unauthorized access to computer systems
hacking
a secondary storage for a computer
hard disk
the physical parts of a computer are known as
hardware
also known as spam
junk email
when a bank clerk transfers money into your account, the actual transaction is probably being stored in a
mainframe computer
a measure of clock speed that equals one million cycles per second
megahertz (MHz)
the time for the processor to retrieve data from memory is measured in
nanoseconds
when a message is sent across the Internet, it is sent in
packets
when 2 processors are employed in a computer
parallel processing
accept instructions from a wide variety of software
personal computers
used to identify a program or service running on a computer in order to communicate over the network
port number
the process to steal passwords which mimics the mainframe's login on an unattended computer terminal
spoofing
the primary difference between a local-area network and a wide-area network is
the distance that the network spans
the portion of an email address after the at sign (@)
the hostname
the powdered ink used in laser printers
toner
Information stored in RAM is considered
volatile
not held permanently, only temporarily.
volatile
a technique to allow Bluetooth and Wi-Fi devices to co-operate without interference
Adaptive Frequency Hopping (AFH)
data and programs used to start up a computer
BIOS (Basic Input/Output System)
CPU stands for
Central Processing Unit
a protocol used in man operating systems, including Windows XP, that automatically issues network information such as IP address to a device as it connects to the network
Dynamic Host Configuration Protocol (DHCP)
a short-distance network that used to link a group of computers and other devices such as printers over distances typically up to 500 meters
Local Area Network (LAN)
glass fiber that transmits voice of data signals via light pulses
Fiber Optics
ISP stands for
Internet Service Providers
used to protect computers against loss during a power failure
UPS (Uninterruptible Power Supply)
an external peripheral interface standard for communication between a computer and external peripherals over a cable using bi-serial transmission.
USB
USB stands for
Universal Serial Bus
a private data network that uses the public telecoms network but preserves privacy by encrypting data
Virtual Private Network (VPN)
the transmission of phone calls over the Internet
Voice over Internet Protocol (VoIP)