Study your flashcards anywhere!

Download the official Cram app for free >

  • Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

How to study your flashcards.

Right/Left arrow keys: Navigate between flashcards.right arrow keyleft arrow key

Up/Down arrow keys: Flip the card between the front and back.down keyup key

H key: Show hint (3rd side).h key

A key: Read text to speech.a key

image

Play button

image

Play button

image

Progress

1/50

Click to flip

50 Cards in this Set

  • Front
  • Back
During a typical session, a computer may run on an average of 50 processors at one time
True
In a GUI, like the one in the accompanying figure, each graphical object represents a computer program
False
Today’s Windows operating systems do not require the DOS kernel.
True
One of the reasons Microsoft Windows suffers from the reputation for being the most vulnerable to viruses, worms, and other attacks is because of hackers with anti-establishment sentiments.
True
A General Purpose License, or GPL, allows anyone to make copies for their own use or to give or sell to others.
True
To be certain a file can be opened by the recipient, simply save it as an .exe; then anyone can open it.
False
File management utilities usually retain the files within a folder when that folder is deleted
False
Some systems streamline the backup process by restoring a computer’s operating system, device drivers, settings, and data in a single step--a process called restore pointing.
False
A process called handshaking allows two communications devices on a network to negotiate their communications protocols
True
In the accompanying figure, the item on the left simply plugs into a serial port on the outside of the system unit (flash drive)
False
Bluetooth is often used to connect workstations to a LAN.
False
All IP addresses are static
False
All IP addresses are dynamic
False
You may use an analog modem even if your phone service is digital.
True
Since older versions of software, like the kind shown in the accompanying figure, typically support new HTML features, it is not a good idea to upgrade when a new version of your browser becomes available (google-netscape navigator vs. mozilla)
False
A plug-in is sometimes called a browser add-on
True
An ActiveX control is a full-fledged program, which gives it the potential to include a routine that alters or deletes files from your hard drive
True
A C2C e-commerce transaction occurs when individual consumers purchase goods and services from online merchants
False
A conversion process called MIME provides a clever way of disguising digital photos, sounds, and other media as plain ASCII code that can travel over the Internet as e-mail attachments.
True
Netiquette is online jargon for Internet etiquette
True
E-mail is based on store-and-forward technology.
True
Whether you acquire an image from a digital camera or a scanner, bitmap graphics tend to require very little storage space
False
Individual objects in a vector graphic, like the one in the accompanying figure, cannot be easily stretched, shrunk, colored, moved, and deleted (stonehenge)
False
CDs with copy protection cannot be duplicated, and music that is ripped to another format does not play back correctly
True
Free file-sharing sites, popular in the 1990s, had a devastating effect on the recording industry
True
____ provides process and memory management services that allow two or more tasks, jobs, or programs to run simultaneously.
Multitasking
The accompanying figure is an example of a(n) ____ tool (computer file)
File Management
____ is the process of creating a CD, DVD, or BD by selecting all the files and then copying them in a single session.
Disk Mastering
You should consider making backups of your ____
All of the above
Tom and Andy are discussing file storage. They are working on a major project and want to be sure they can store their files in a way so they can easily be found and shared with others.

Tom sends Andy an e-mail attachment named OurProject.tif. Andy tries to open the attachment but can’t. His problem may be that ___
Any of the above
A(n) ____ server stores files and supplies them to workstations upon request.
File
A protocol known as ____ is designed to automatically distribute IP addresses.
DHCP
A wired network is one that uses ____ to connect network devices
Cables
The original Ethernet standard carried data over a coaxial cable bus topology at ____.
10 mbps
Wireless signal range can be limited by ____
The type of signal, Transmitting strength, physical environment
Esteban has decided to install a computer network in his home. He knows he can choose wired or wireless and that there are differences in transmission speed and security.

After additional research, Esteban decides that he wants to create a wired network using existing telephone wiring. What kind of network will he create?
HomePNA network
A communications ____ is described as a virtual device because it is not a physical circuit or mechanism.
Port
Some ISDN providers offer a service called ____, which remains connected to an ISP as long as the computer and terminal adapter are on.
A) AO/DI
B) DSL
C) VDSL
D) HDSL
AO/DI
he accompanying figure is a screenshot of FileZilla, in which the file to be ____ is indicated by box A.
A) uploaded
B) downloaded
C) reloaded
D) remastered
Uploading
The average “survival time” for an unprotected computer to remain uncompromised is only ____.
A) nine seconds
B) nine minutes
C) nine hours
D) nine days
Nine minutes
In the URL found in the accompanying figure, www.cnn.com is the ____.
A) Web protocol standard
B) Web server name
C) folder name
D) file extension
Web server name
____ is a protocol that works in conjunction with TCP/IP to get Web resources to your desktop.
A) HTML
B) URL
C) HTTP
D) FTP
HTTP
Before sending a large attachment in an e-mail, you can use a(n) ____ to shrink it.
A) crawler program
B) compression program
C) netiquette scanner
D) index utility
Compression Program
Incoming mail can be stored on a ____ server until it is downloaded to the inbox on your hard disk.
A) Webmail
B) POP3
C) IMAP
D) SMTP
POP3
In a classic Webmail configuration, messages are sent immediately and thus a(n) ____ is not needed.
A) server
B) client
C) Inbox
D) Outbox
Outbox
To avoid becoming a spam victim, you should ____.
A) reply to spam when you receive it
B) always click on the links in e-mail messages
C) provide your e-mail address to all sites that request it
D) use a disposable e-mail address when you register for online sites
Use a disposal e-mail address
Mark is interested in Internet e-commerce security issues. His friend Amelia runs a small B2C site that sells vintage clothing. He discusses the topic with Amelia, and he learns about ActiveX controls, and how browsers and Web servers communicate with each other.

To identify the creator of an ActiveX control, Amelia tells Mark that he should look at the control’s ____.
Digital Certificate
A ____ bit in a monochrome bitmap represents black.
A) 0
B) 1
C) 56
D) 255
0 bit
____ is a graphics format with built-in compression that stores True Color bitmap data very efficiently in a small file.
A) GIF
B) BMP
C) PCX
D) JPEG
JPEG
In 2009, Apple announced that the application shown in the accompanying figure would distribute ____-free music.
A) DRM
B) CSS
C) AACS
D) VoIP
DRM