Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
370 Cards in this Set
- Front
- Back
The digital revolution became a significant factor in the 1980s but ended in the 1990s with the dot com bubble burst.
|
False
|
|
The first digital computer was developed for conducting the census.
|
False
|
|
Technology may help us develop a better appreciation for privacy.
|
True
|
|
Prior to 1940, the word computer was defined as a person who performs calculations.
|
true
|
|
An operating system is an example of application software.
|
false
(An operating system is a master controller for all the activities that take place within a computer) |
|
Because of increased versatility, a videogame console is now considered a personal computer.
|
false
|
|
The purpose of a server is to serve computers on a network.
|
true
|
|
In the binary number system, 2 is used to represent the value 2.
|
true
(2 represents 10) |
|
The number 9 can be considered a character.
|
true
|
|
Because most digital devices are electronic, bytes take the form of electrical pulses
|
false
|
|
Semiconductor materials are substances with properties between those of a conductor and an insulator.
|
true
|
|
An interpreter converts and executes one statement at a time.
|
true
|
|
The op code specifies the data.
|
false
|
|
The operand is a command word for an operation.
|
false
|
|
All computers are case sensitive
|
false
|
|
Trojans are computer programs that seem to perform one function while actually doing something else.
|
true
|
|
Digital technology has made it easy to produce copies of music with no loss of quality from the original.
|
true
|
|
Free source projects promote copying, free distribution, peer review, and user modifications.
|
true
|
|
An area where data can be left on a permanent basis is memory.
|
false
|
|
The set of instructions that tells a computer how to carry out processing tasks is a computer program.
|
true
|
|
Minicomputers were used for small businesses.
|
false
|
|
A(n) supercomputer is a large and expensive computer capable of simultaneously processing data for hundreds or thousands of users.
|
false
|
|
The term server can refer to a combination of hardware and software.
|
true
|
|
A(n) mainframe specializes in compute-intensive problems.
|
false
|
|
A light switch is like a(n) analog device.
|
false
|
|
DIPs and PGAs are both shapes of integrated circuits.
|
true
|
|
The results of statements that have been compiled are called object code.
|
true
|
|
A set of machine language instructions for a program is called source code.
|
false
|
|
The ALU uses registers to hold data that is being processed.
|
true
|
|
A(n) keylogger is a form of malicious code.
|
true
|
|
A(n) account manager stores user IDs with their corresponding passwords and automatically fills in login forms.
|
false
|
|
Digital electronics use electronic ____ to represent data.
|
circuits
|
|
Key factors in making electronic devices increasingly smaller and less expensive include ____.
|
Integrated circuits and transistors
|
|
The first digital computers were built during World War II for ____.
|
code breaking
|
|
Initially sales were slow for the personal computer because of ____.
|
lack of software
|
|
In 1982, the percentage of households that had a computer was fewer than ____ percent.
|
10
|
|
A global computer network originally developed as a military project is the ____.
|
internet
|
|
____ allow members to post comments and questions that can be read and responded to by others.
|
bulletin boards
|
|
____ are where people exchange typed messages in real time.
|
chat groups
|
|
____ provide a space for interacting with friends or friends of those friends.
|
online social networks
|
|
A group of computers linked by wired or wireless technology is a(n) ____.
|
network
|
|
The ____ is a collection of linked documents, graphics, and sounds.
|
web
|
|
____ is a term that refers to entities that exist largely within computer networks.
|
cyberspace
|
|
____ is the process of converting text, numbers, sound, photos, and video into data that can be processed by digital devices.
|
digitalization
|
|
Technology ____ is a process by which several different technologies with distinct functionality evolve to form a single product.
|
convergence
|
|
More than ____ percent of cameras sold today are digital.
|
99
|
|
Digital imaging has had an effect in the following areas: ____.
|
photo processing, video, medicine
|
|
____ tools cloak a person’s identity online.
|
anonymizer
|
|
A computer is a multiple purpose device that can do all of the following EXCEPT ____.
|
think independently
|
|
In a computer, most processing takes place in ___
|
the CPU
|
|
An electronic component that can be programmed to perform tasks is a ____.
|
microprocessor
|
|
A named collection of data that exists on a storage medium is known as (a) ____.
|
file
|
|
An area of a computer that temporarily holds data waiting to be processed is ____.
|
memory
|
|
A set of computer programs that helps a person carry out a task is ____.
|
app software
|
|
A set of computer programs that helps a computer monitor itself and function more efficiently is ____.
|
system sofware
|
|
The master controller for all activities that take place within a computer is ____.
|
OS
|
|
A(n) ____ is a microprocessor-based computing device designed to meet the computing needs of an individual.
|
personal computer
|
|
An ordinary personal computer that is connected to a network is a ____.
|
workstation
|
|
A compute-intensive problem runs on a ____.
|
supercomputer
|
|
Data becomes ____ when it is presented in a format that people can understand and use.
|
information
|
|
The type of data where text, numbers, graphics, sound, and video have been converted into discrete digits as represented in the accompanying figure is ____.
|
digital
|
|
The type of data that is represented using an infinite scale of values as represented in the accompanying figure is ____.
|
analog
|
|
The binary number 10 represents ____ in the decimal number system.
|
2
|
|
The type of code that uses only seven bits for each character is ____.
|
ASCII
|
|
The type of code that uses eight bits for each character is ____.
|
extended ASCII
|
|
Digital devices can use ____ as a code to represent character data.
|
(all of the above)
|
|
You might represent ____ using character codes.
|
soc sec #s
|
|
Data transmission speeds are typically expressed as ____.
|
bits
|
|
Storage is typically expressed as ____.
|
bytes
|
|
1,024 bytes is a ____.
|
kilobyte
|
|
1,048,576 bytes is a ____.
|
megabyte
|
|
1,073,741,824 bytes is a ____.
|
gigabyte
|
|
A super-thin slice of semiconducting material packed with microscopic circuit elements is a(n) ____.
|
integrated circuit
|
|
The ____ houses all essential chips and provides connecting circuitry between them.
|
system board
|
|
C, BASIC, COBOL, and Java are examples of ____ programming languages.
|
high level
|
|
The human-readable version of a program is called ____.
|
source code
|
|
A(n) ____ converts all the statements in a program in a single batch and the resulting collection of instructions is placed in a new file.
|
compiler
|
|
A(n) ____ converts and executes one statement at a time.
|
interpreter
|
|
A collection of preprogrammed activities such as addition, subtraction, counting and comparison is called a(n) ____.
|
instruction set
|
|
____, as shown in the accompanying figure can be directly executed by the processors’s circuitry.
|
Machine language
|
|
The ____ is a command word for an operation such as add, compare, or jump.
|
op code
|
|
The ____ from an instruction specifies the data
|
operand
|
|
The ____ is the part of the microprocessor that performs arithmetic operations.
|
ALU
|
|
The ____ fetches each instruction.
|
control unit
|
|
In terms of an authentication protocol, the phrase ‘something a person knows’ refers to ____.
|
password
|
|
A ____ is a series of characters that becomes a person’s unique identifier.
|
user I.D.
|
|
In terms of an authentication protocol, the phrase ‘something a person possesses’ could refer to ____.
|
I.D. card
|
|
In terms of an authentication protocol, the phrase ‘something a person is’ refers to a(n) ____.
|
biometric device
|
|
A problem a hacker can cause after breaking into your computer include(s) ____.
|
(all of the above)
|
|
A term which can refer to a person who manipulates computers with malicious intent is a ____.
|
(all of the above)
|
|
A ____ attack uses password-cracking software.
|
brute force
|
|
____ intercepts information sent over computer networks.
|
sniffling
|
|
A hacker posing as a legitimate representative of an official organization such as your bank is an example of ____.
|
phising
|
|
Password management functions include all of the following EXCEPT ____.
|
recording keystrokes
|
|
The system unit is the case that holds the main circuit boards, microprocessor, memory, power supply, and storage devices of a personal computer system.
|
true
|
|
The term “form factor” refers to the size and dimensions of a component, such as a system board.
|
true
|
|
Currently, there are three personal computer platforms: PC, Mac, and Linux.
|
true
|
|
You can easily identify the microprocessor when looking inside a computer, as it is the only chip on the motherboard.
|
false
|
|
A microprocessor’s clock speed is equal to the number of instructions it can execute in one second.
|
false
|
|
Processors with a smaller word size can process more data during each processor cycle.
|
false
|
|
A fast front side bus moves data quickly and allows the processor to work at full capacity.
|
true
|
|
All other things being equal, a computer with a 933 MHz processor is faster than a computer with a 3.3 GHz processor.
|
false
|
|
A RISC processor has a complex instruction set, each requiring several clock cycles for execution.
|
false
|
|
Most processors in today’s personal computers use RISC technology.
|
false
|
|
RAM is volatile, which means it must constantly receive electric power to hold data.
|
true
|
|
Currently, hard drive capacity is measured in gigabytes (GB) or terabytes (TB).
|
true
|
|
The speed of CD, DVD and Blu-ray drives are all measured on the same scale, based upon the original 1.2 megabits per second data transfer rate of the first CD drives.
|
false
|
|
DVD-RW technology allows you to write data to a disc, and then later change that data.
|
true
|
|
A card reader is a storage device that is used to read from and write to solid state storage cards, like SecureDigital (SD) and CompactFlash cards.
|
true
|
|
A jump drive is a portable storage device featuring a built-in connector that plugs directly into a computer’s USB port.
|
true
|
|
A keyboard is an example of a pointing device.
|
false
|
|
A touch screen, also known as a touch-sensitive screen, can serve as both an input and output device.
|
true
|
|
The microprocessor is the most important component of a computer, and usually the most expensive single component.
|
true
|
|
RAM circuitry holds “hard-wired” instructions that are a permanent part of the circuitry.
|
false
|
|
RAM speed is often expressed in nanoseconds (ns) or megahertz (MHz).
|
true
|
|
The more data and programs that can fit into EEPROM, the less time your computer will spend moving data to and from virtual memory.
|
false
|
|
Access time is the amount of data a storage device can move each second from the storage medium to the computer.
|
false
|
|
Sequential access is the ability of a device to “jump” directly to requested data.
|
false
|
|
Storage mass is the maximum amount of data that can be stored on a storage medium.
|
false
|
|
EIDE, Ultra ATA, SCSI and DMA refer to the different types of controllers used by hard disk drives.
|
true
|
|
CDs and DVDs are examples of magnetic storage media.
|
false
|
|
Internal drive bays provide access from outside the system unit.
|
false
|
|
On a display device, the refresh rate is the distance in millimeters between like-colored pixels, and is a measure of picture clarity.
|
false
|
|
The term ____ designates equipment that might be added to a computer system to enhance its functionality.
|
peripheral device
|
|
The main component of a typical desktop computer is the ____, which houses the processor, memory, some storage devices, and display and sound circuitry.
|
system unit
|
|
____ are the form factor of choice for computer owners who might want to upgrade components in the future because it is easy to get inside the case and swap out parts.
|
Tower units
|
|
The term ____ refers to the size and dimensions of a computer component.
|
form factor
|
|
A ____ computer is a small, lightweight personal computer with screen, keyboard, storage, and processing components integrated into a single unit.
|
portable
|
|
A ____ offers more portability than a standard notebook.
|
netbook
|
|
A ____ computer is a portable computing device featuring a touch-sensitive screen that can be used as a writing or drawing pad.
|
tablet
|
|
A(n) ____ tablet configuration resembles a high-tech clipboard and lacks a built-in keyboard.
|
slate
|
|
A ____ computer is also referred to as a laptop computer.
|
notebook
|
|
Gaming computers typically include ____.
|
(all of the above)
|
|
In the context of computing, a(n) ____ is a custom, hand-built modification to a computer system component.
|
mod
|
|
____ means a billion cycles per second.
|
gigahertz
|
|
In an advertisement, a speed specification, such as 2.66 GHz, indicates the speed of the microprocessor ____.
|
clock
|
|
____ refers to the number of bits that a microprocessor can manipulate at one time.
|
word size
|
|
A technology called ____ allows the processor to begin executing another instruction before it completes the previous instruction.
|
pipelining
|
|
A microprocessor whose instruction set includes a limited set of simple instructions uses ____ technology.
|
RISC
|
|
A processor that includes circuitry for two or more processing units is called a ____ processor.
|
multicore
|
|
____ is used to enhance processor performance.
|
Pipelining and parallel processing
|
|
Many of today’s microprocessors perform ____, in which multiple instructions are executed at the same time.
|
parallel processing
|
|
____ are the results of a series of tests used to gauge overall microprocessor speed and are useful in comparing microprocessor performance.
|
benchmarks
|
|
Overclocking is a technique for increasing the speed of a computer component, such as ____. It can be very risky.
|
(all of the above)
|
|
____ is a temporary holding area for data, application program instructions, and the operating system.
|
RAM
|
|
RAM can be thought of as the ____ for the computer’s processor.
|
waiting room
|
|
Unlike disk storage, most RAM is ____.
|
volatile
|
|
If the system runs out of RAM, the operating system uses an area of the hard disk called ____ to store parts of a program or data file until they are needed.
|
virtual memory
|
|
RAM speed is often expressed in ____.
|
nanoseconds
|
|
____ is used by most of today's personal computers because it is fast and relatively inexpensive.
|
SDRAM
|
|
____ is a type of memory circuitry that holds the computer's startup routine.
|
ROM
|
|
ROM BIOS is a small set of instructions that tells the computer ____.
|
(all of the above)
|
|
A(n) ____ chip is a type of non-volatile memory chip that does not require power to hold data.
|
EEPROM
|
|
____ time is the average time it takes a computer to locate and read data on the storage medium.
|
Access
|
|
____ is the ability of a device to "jump" directly to the requested data.
|
Random access
|
|
The ____ is the amount of data that a storage device can move from the storage medium to the computer per second.
|
data transfer rate
|
|
Hard disk storage technology can be classified as ____ storage.
|
magnetic
|
|
A hard disk ____ is a flat, rigid disk made of aluminum or glass and coated with magnetic iron oxide particles.
|
platter
|
|
Personal computer hard disk platters typically have storage capacities ranging from 40 GB to ____.
|
2 TB
|
|
Hard disk drive capacities are measured in ____.
|
gigabytes or terabytes
|
|
CD and DVD storage technologies can be classified as ____ storage.
|
optical
|
|
Which of the following is an example of a rerecordable optical storage medium?
|
(all of the above)
|
|
A built-in ____ in your personal computer can make it simpler to transfer photos from a solid state memory card used in your digital camera.
|
card reader
|
|
Solid state storage, also called flash memory storage, ____.
|
provides fairly fast access to data
|
|
USB Flash drives can have capacities ranging from ____.
|
16 MB to 64 GB
|
|
A ____ is an example of a pointing device.
|
joystick, trackpad, mouse
|
|
A ____ is a touch-sensitive surface on which you can slide your fingers to move the on-screen pointer.
|
trackpad
|
|
Tablet computers, many PDAs, retail store self checkouts, and information kiosks collect input from a ____.
|
touch screen
|
|
A(n) ____ is standard equipment on notebook computers.
|
LCD
|
|
Dot pitch is the distance in millimeters between like-colored ____ —the small dots of light that form an image.
|
pixels
|
|
____ have a faster response rate than standard LCD screens.
|
OLED's
|
|
The number of colors a monitor can display is referred to as ____.
|
color depth
|
|
Which is the highest resolution?
|
WQXGA
|
|
A printer’s ____ determines how many pages a printer is able to churn out.
|
duty cycle
|
|
A(n) ____ printer can print on both sides of the paper.
|
duplex
|
|
____ is the most widely used language for communication between computers and printers.
|
PCL
|
|
Hot plugging is allowed with what kind of devices?
|
USB & firewire
|
|
The ____ is a security mechanism that is factory-installed on many personal computers.
|
Kensington security slot
|
|
A ____ is a sudden increase or spike in electrical energy, affecting the current that flows to electrical outlets.
|
power surge
|
|
It takes 800 pounds of force to remove a ____ plate, which contains a unique ID number, a warning message, and an 800 number to report a stolen computer.
|
STOP
|
|
Which of the following is tracking and recovery software?
|
lojack for laptops
|
|
A ____ is a device that not only provides surge protection, but also furnishes your computer with battery backup power during a power outage.
|
UPS
|
|
A(n) ____ strip monitors the electrical current that passes from the outlet to all the devices plugged into the strip.
|
surge
|
|
The ____ indicates that the operating system has encountered an error from which it cannot recover, and the computer no longer accepts any commands.
|
black screen of death
|
|
A good computer maintenance routine would include regularly ____.
|
(all of the above)
|
|
____ is a limited version of Windows that allows you to use your mouse, monitor, and keyboard, but no other peripheral devices.
|
safe mode
|
|
Productivity software is designed to make the operating system run more effectively.
|
false
|
|
Utility software includes diagnostics that track down and fix disk errors.
|
true
|
|
Spreadsheets have built-in formulas.
|
true
|
|
CAD software is designed to be used by architects.
|
true
|
|
Payroll software is an example of vertical market software.
|
false
|
|
Third-party vendors offer utilities designed for the same tasks as those packaged with operating systems.
|
true
|
|
If you purchase software, it belongs to you and you can do what you want, including copying it.
|
false
|
|
There are no advantages to purchasing software in a box rather than downloading.
|
false
|
|
Open source software is copyrighted.
|
true
|
|
Files that are zipped contain consolidated files that are compressed and ready to execute.
|
false
|
|
Product activation and registration represent the same function with different names.
|
false
|
|
A zombie is a computer under the control of a bad bot.
|
true
|
|
A virus signature is a digitally signed certificate that certifies the file is virus free.
|
false
|
|
Antivirus software does not require any updates.
|
false
|
|
A quarantined file is generally encrypted before storing.
|
true
|
|
Utilities are an example of application software.
|
false
|
|
Production software refers to any type of application software that has the potential to help people do their work more efficiently.
|
false
|
|
A device driver is software that helps a peripheral device establish communication with a computer.
|
true
|
|
You can automatically create personalized letters by using templates.
|
false
|
|
CD ripper software is designed to pull a track off an audio CD and store it in a coded digital format.
|
false
|
|
Vertical market software is designed to automate specialized tasks in a specific market or business.
|
true
|
|
A trademark is a form of legal protection that grants the author of the original work exclusive rights to copy, distribute, sell, and modify.
|
false
|
|
A software license defines the way you may use a computer program.
|
true
|
|
Public domain software has restrictions on its use.
|
false
|
|
A typical software package contains one file.
|
false
|
|
A startup file is designed to be started by users or automatically launched by the operating system.
|
false
|
|
Some Web applications such as Google Earth require a client-side program to be installed on your local computer.
|
true
|
|
Hackers can use rootkits to hide their work.
|
true
|
|
A virus hoax usually arrives as an attachment
|
false
|
|
A security package integrates several security modules to protect against malware.
|
false
|
|
System software is designed to accomplish ____ tasks.
|
computer centric
|
|
Application software is designed to accomplish ____ tasks.
|
real world
|
|
Application software includes ____.
|
statistical software
|
|
Software most commonly associated with productivity software is ____.
|
word processing software
|
|
____ is a type of application software designed to help several people collaborate.
|
Groupware
|
|
Software considered utility software is ____.
|
setup wizard
|
|
The type of system software designed to help you monitor and configure settings for your computer system equipment is ____ software.
|
utility
|
|
Adobe Reader works with files stored in standard ____ format.
|
PDF
|
|
Desktop widgets include all of the following EXCEPT ____.
|
icons
|
|
Productivity software that provides you with the ability to create, spell-check, edit, and format is considered ____ software.
|
word processing
|
|
Productivity software that has sophisticated features to help you produce professional-quality output is considered ____ software.
|
desktop publishing
|
|
When using word processing software to analyze the reading level of your document you should use a ____.
|
readability formula
|
|
The paragraph style that is used to assure paragraphs are aligned evenly on both the right and left is ____.
|
fully justified
|
|
A page layout includes ____.
|
(all of the above)
|
|
The intersection of a column and a row on a spreadsheet is called a ____.
|
cell
|
|
Spreadsheets are particularly useful for ____.
|
what if analysis
|
|
A formula can contain ____ and mathematical operators.
|
cell references
|
|
To find a particular record or group of records in a database you use a ____.
|
query
|
|
You can use the results from a search on a database in all of these ways EXCEPT to ____.
|
create records
|
|
3-D graphics software provides a set of tools for creating ____ that represents three-dimensional objects.
|
wireframes
|
|
Popular presentation software products includes all of the following EXCEPT ____.
|
movie maker
|
|
The type of software that targets musicians and music students who want to develop musical skills is ____.
|
ear training
|
|
Software that is the musician’s equivalent to a word processor is ____.
|
notation
|
|
Software designed to generate unique musical compositions simply by selecting the musical style, instrument, key, and tempo is ____.
|
computer aided music
|
|
All of the following are examples of utility software EXCEPT ____.
|
windows
|
|
System requirements that are important in determining if a software program will work on a computer are ____.
|
(all of the above)
|
|
You can purchase software at a variety of locations such as ____.
|
(all of the above)
|
|
In order for software to work on a given computer, it must meet ____.
|
system requirements
|
|
It is illegal to do all the following with software EXCEPT ____.
|
copy and keep as a backup
|
|
A ____ is a legal contract that defines the ways in which you may use a computer program.
|
software license
|
|
An end-user license agreement is ____.
|
displayed on-screen when you first install software
|
|
Indicators of pirated software includes all of the following EXCEPT software that ____.
|
is downloaded
|
|
A shrink-wrap license goes into effect as soon as you ____.
|
open it
|
|
____ is typically sold in a store or online.
|
commercial software
|
|
____ is typically available as a trial version.
|
Demoware
|
|
Software that is available without restriction is ____.
|
public domain
|
|
____ is typically commercial software that is marketed under try-before-you buy policy.
|
Shareware
|
|
____ may be sold or distributed free of charge in compiled form but almost always includes the source code.
|
Open source software
|
|
Support programs have a ____ extension.
|
.dll
|
|
Software requires many files because ____.
|
It allows flexibility and efficiency
|
|
Data files supplied with a software package support ____ file extensions.
|
.hlp
|
|
____ applications are software that is designed to reside on a computer’s hard disk.
|
Local
|
|
If you are installing a local application from a distribution CD and it does not automatically run, you should ____
|
look for a file called setup.exe
|
|
When installing software, you should ____.
|
select custom when you don’t need all the features
|
|
A protection of software from illegal copying is ____.
|
product activation
|
|
Product validation can create a(n) ____ based on your validation code and your computer’s internal serial number.
|
hash value
|
|
Downloadable software can be provided in different formats such as ____.
|
(all of the above)
|
|
During product activation you must ____.
|
enter a product key
|
|
Portable software is ____.
|
designed to run from removable storage
|
|
Web applications are ____.
|
accessed and run on the Web
|
|
A service pack ____.
|
provides updates to the operating system
|
|
To get rid of software you no longer want, you ____.
|
run an uninstall routine
|
|
A ____ is any software that can automate a task or autonomously execute a task when commanded to do so.
|
bot
|
|
The term rootkit refers to ____.
|
software tools used to conceal malware and backdoors
|
|
To avoid security threats, a user can ____.
|
avoid opening suspicious email attachments
|
|
A security suite will typically include all of the following EXCEPT ____.
|
anti-adware
|
|
Security suites can be ____.
|
(all of the above)
|
|
A virus signature is a(n) ____.
|
Unique series of instructions
|
|
If a virus protection software identifies a virus, it can try to take all of the following actions except ____.
|
highlight the file in Windows Explorer
|
|
During a typical computing session, your computer might run an average of 50 processes.
|
true
|
|
In a GUI like the one in the accompanying figure, each graphical object represents a computer program.
|
true
|
|
A combo button allows you to select one item from several options.
|
true
|
|
During the boot process, the operating system is totally loaded into the kernel.
|
false
|
|
A sequence of events that occurs between the time that you turn on a computer and the time that it is ready for you to issue commands is referred to as the boot process
|
true
|
|
Today’s Windows operating systems do not require the DOS kernel.
|
true
|
|
One of the primary strengths of Windows is security.
|
false
|
|
One of the reasons Microsoft Windows suffers from the reputation for being the most vulnerable to viruses, worms and other attacks is because of hackers with anti-establishment sentiments.
|
true
|
|
In a dual boot system, you must select which operating system to use.
|
true
|
|
A General Purpose License or GPL allows anyone to make copies for their own use to give to others or to sell.
|
true
|
|
The D drive must refer to a CD or DVD drive.
|
false
|
|
When you use Windows, Mac OS, or a Linux graphical file manager, each subdirectory is depicted as a folder.
|
true
|
|
When creating a file, you must keep up with the size of the file manually.
|
false
|
|
A file extension is always the same as a file format
|
false
|
|
To be certain a file can be opened by the recipient, simply save it as an .exe and then anyone can open it.
|
false
|
|
Often file management is represented by a tree metaphor.
|
true
|
|
File management utilities usually retain the files within a folder when that folder is deleted.
|
false
|
|
Viruses can damage files to the point that your computer can't access any data on its hard disk.
|
true
|
|
With remote backups, the speed for backing up and restoring data is independent of the speed of your Internet connection.
|
false
|
|
Some systems streamline the backup process by restoring a computer’s operating system, device drivers, settings, and data in a single step--a process called restore pointing.
|
false
|
|
A desktop operating system is designed for a personal computer.
|
true
|
|
A window user interface provides a way to point and click a mouse to select menu options and manipulate graphical objects displayed on the screen.
|
false
|
|
Upward compatibility refers to the ability to work with products designed for prior-generation hardware or software.
|
false
|
|
UNIX is rather unique because it is distributed along with its source code under the terms of a GPL (General Public License).
|
false
|
|
Windows Mobile OS is an open source operating system designed for mobile devices, and is based on the Linux kernel.
|
false
|
|
DOS and Windows 3.1 limited file names to twelve characters.
|
false
|
|
A file type is an optional file identifier that is separated from the main file name by a period.
|
false
|
|
The section of data at the beginning of a file that contains information about a file is the file format.
|
false
|
|
When formatting a disk, the disk is divided into tracks.
|
true
|
|
When formatting a disk, tracks are divided into sectors.
|
true
|
|
Tracks and sectors are numbered to provide addresses for each data storage bin.
|
true
|
|
A(n) operating-system disk is a removable storage medium containing the operating system files needed to boot your computer without accessing the hard disk.
|
false
|
|
A restore point is a snapshot of your computer settings.
|
true
|
|
When selecting a backup device, your selection should depend upon the value of your data, your current equipment, and your budget.
|
true
|
|
File synchronization is typically used to backup all data files.
|
false
|
|
Most personal computers today are sold with preinstalled operating systems including all of the following EXCEPT ____.
|
HP
|
|
A program called ____ is an example of Windows software.
|
microsoft word
|
|
The most obvious responsibility of your computer’s operating system is to ____.
|
Provide an environment for running software
|
|
All of the following are examples of resources EXCEPT ____.
|
a file
|
|
Activities associated with resource management include all of the following EXCEPT ____.
|
installing new memory
|
|
____ provides process and memory management services that allow two or more tasks, jobs, or programs to run simultaneously.
|
multitasking
|
|
Within a single program, ____ allows multiple parts to run simultaneously.
|
multithreading
|
|
An operating system’s ____ capability supports a division of labor among all the processing units.
|
multiprocessing
|
|
The term ____ is a technical term for the region of memory that holds data waiting to be transferred from one device to another.
|
buffer
|
|
The Recycle Bin is an example of a(n) ____.
|
icon
|
|
The words "Start Search" appear in ____.
|
the start menu
|
|
The button labeled "Tips – Paint" appears in the ____.
|
task bar
|
|
Windows Photo Gallery appears in a(n) ____.
|
window
|
|
A ____ is an additional set of commands that the computer displays after you make a selection from the main menu.
|
sub menu
|
|
A ____ displays the options associated with a command.
|
dialog box
|
|
Microsoft Windows is installed on more than ____ of the world’s personal computers.
|
80%
|
|
The first versions of Windows were referred to as operating environments rather than operating systems because ____.
|
they required DOS to supply the operating system kernel
|
|
The strengths of Microsoft Windows include all of the following EXCEPT ____.
|
reliability
|
|
Microsoft offers different desktop editions of its Microsoft Windows for various markets; these editions include all of the following EXCEPT ____.
|
mobile
|
|
The strengths of Mac OS include ____.
|
security
|
|
VMWare and Parallels Desktop software are examples of ____.
|
Virtual machine software
|
|
Weaknesses of Mac OS include ____.
|
Limited applications
|
|
Files maintained by the Macintosh operating system can have two parts called ____.
|
forks
|
|
In the Mac OS, the data ____ contains data or the commands for a program.
|
fork
|
|
In the Mac OS, the resource ____ stores information about the data.
|
fork
|
|
The operating system that was developed in 1969 by AT&T’s Bell Labs and gained a good reputation for its dependability is ____.
|
UNIX
|
|
____ was developed by a Finnish student. It continues to gain popularity as an operating system for personal computers. It is distributed under the terms of a GPL.
|
LINUX
|
|
The Palm OS ____ is currently used for popular Palm brand PDAs and smart phones.
|
garnet
|
|
____ OS is a multitasking, multithreading operating system used on Ericsson and Nokia smart phones.
|
symbian
|
|
Current versions of Windows support file names up to ____ characters long.
|
255
|
|
An optional file identifier that is separated from a main file name by a period is a ____.
|
file extension
|
|
File endings with .exe are ____ files.
|
executable
|
|
Information kept about a file includes ____.
|
size
|
|
A computer file’s location is defined by a ____.
|
file specification
|
|
An extension of .sys designates a ____ type of file.
|
configuration
|
|
An extension of .ocx designates a ____ type of file.
|
support
|
|
An extension of .wav designates a ____ type of file.
|
sound
|
|
File management capabilities available from application software include ____ files.
|
(all of the above)
|
|
A file ____ in the context of Windows is a piece of information that describes a file.
|
tag
|
|
The difference between the Save and the Save As command is that ____.
|
(all of the above)
|
|
A description of what actually happens on the disk and in the circuits is represented by a ____.
|
physical storage model
|
|
Most floppy and hard disks are formatted by the ____.
|
factory
|
|
____ is the process of creating a CD or DVD by selecting all the files and then copying them in a single session.
|
disc mastering
|
|
In relation to disks, ____ is a recording technology that lets you record in multiple sessions.
|
packet writing
|
|
A group of sectors is called a ____.
|
cluster
|
|
The file system used by Mac OS is ____.
|
HFS+
|
|
The file system used by Windows XP and Vista is ____.
|
NTFS
|
|
The file system used by Windows 95, 98, and Me is ____.
|
FAT32
|
|
To delete data from a disk in such a way that no one can ever read it, you should ____.
|
Use special shredder software
|
|
Files stored in noncontiguous clusters are ____.
|
fragmented
|
|
For backup purposes, a fast, inexpensive and convenient device that if damaged all backups will be lost is a(n) ____.
|
external hard disks
|
|
For backup purposes, a fast, limited capacity device that can be locked in a secure location is a(n) ____.
|
removable hard disk
|
|
A device used for backup whose capacity depends on the space allocated to each user, and is fast and convenient is a(n) ____.
|
network server
|
|
A device used for backup that is convenient and durable but which in high-capacity models are expensive is ____.
|
USB flash drive
|
|
You should consider making backups of ____.
|
(all of the above)
|
|
A(n) ____ backup includes every file from the computer’s primary storage device.
|
full system
|
|
A(n) ____ backup contains any files that have changed since the last full backup.
|
differential
|
|
A(n) ____ backup makes a copy of only those files that were added or changed since your last backup.
|
incremental
|
|
A(n) ____ disk is a bootable CD, DVD, or other media that contains a complete copy of your computer’s hard disk as it existed when shipped from the manufacturer.
|
recovery
|
|
A disk ____ is a bit-by-bit copy of the data from all sectors of a disk.
|
image
|