Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
130 Cards in this Set
- Front
- Back
A ____ is a video camera that displays its output on a Web page.
|
Web cam
|
|
____ is the technology of authenticating a person s identity by verifying a personal characteristic.
|
Biometrics
|
|
The quality of an LCD depends primarily on its ____.
|
resolution
|
|
The refresh rate of a CRT is measured in ____.
|
hertz
|
|
A high-quality CRT refreshes itself ____ times a second.
|
68
|
|
Printer resolution is measured in ____.
|
dots per inch
|
|
A dot-matrix printer is a kind of ____ printer.
|
impact
|
|
Two output options for blind users are _____.
|
voice output and Braille printer
|
|
A ____ is a small, flat, rectangular pointing device that is sensitive to pressure and motion.
|
touchpad
|
|
A ____ is a vertical lever mounted on a base.
|
joystick
|
|
A ____ uses pressure to write text and draw lines.
|
digital pen
|
|
____ involves reading typewritten, computer-printed, or hand-printed characters from ordinary documents and translating the images into a form the computer can process.
|
OCR
|
|
A(n) ____ frequently is used by the banking industry for check processing.
|
MICR reader
|
|
A(n) ____ often is found in retail stores to record purchases, process credit or debit cards, and update inventory.
|
POS terminal
|
|
____ is the technology of authenticating a person’s identity by verifying a personal characteristic.
|
Biometrics
|
|
Which of the following is not a secondary storage medium?
|
RAM
|
|
A large business may require as much as ____ bytes of storage.
|
50 trillion
|
|
The term for 1 quadrillion is ____.
|
petabyte
|
|
Storage devices access data in ____ of a second.
|
thousandths
|
|
____ measures the amount of time it takes a storage device to locate an item on a storage medium.
|
Access time
|
|
Memory chips access data items in ____ of a second.
|
billionths
|
|
1 MB is equal to exactly ____ bytes.
|
1,048,576
|
|
Which is not a magnetic storage medium?
|
DVD
|
|
Which of the following is not a characteristic of a hard disk?
|
chip
|
|
Hard disks spin at 5,400 to ____ rpm.
|
15,000
|
|
A _____ occurs when a hard disk s read/write head touches the surface of a platter.
|
head crash
|
|
Which is not a type of disk controller?
|
CD-ROM
|
|
A(n) _____ stores items by using microscopic pits and lands in its middle layer and is read by a laser beam.
|
optical disc
|
|
A(n) _____ disc can be read, written to, and erased.
|
DVD+RW
|
|
A typical CD-ROM holds up to ____ of data.
|
1 GB
|
|
____ storage requires sequential access of data.
|
Tape
|
|
Experts predict that ____ will become the mobile user’s primary storage device.
|
USB flash drives
|
|
All of the following are examples of Solid State Storage devices except _____.
|
Zip disk
|
|
A large business, commonly referred to as a(n) ____, has hundreds or thousands of employees
|
enterprise
|
|
Which has the longest life expectancy?
|
microfilm
|
|
Which of the following is not an operating system function?
|
word processing
|
|
The operating system typically resides on the computer’s ____.
|
hard disk
|
|
The operating system a computer uses is called the ____.
|
platform
|
|
When turning on a computer that has been powered off completely, you are performing a ____.
|
cold boot
|
|
A(n) ____ computer continues to operate when one of its components fails.
|
fault-tolerant
|
|
____ is a concept in which the operating system allocates a portion of a storage medium to function as additional RAM.
|
Virtual memory
|
|
The operating system technique of swapping items between memory and storage is called ____.
|
paging
|
|
The process called ____ sends print jobs to a buffer instead of sending them immediately to the printer.
|
spooling
|
|
Multiple print jobs line up in a ____ within a buffer.
|
queue
|
|
To protect sensitive data and information as it travels over a network, a network operating system often ____ it.
|
encrypts
|
|
Which of the following is not a utility function?
|
controlling the keyboard
|
|
To defragment a disk means to ____.
|
reorganize it
|
|
New versions of an operating system usually are ____ compatible.
|
downward
|
|
Which of the following is not a type of operating system?
|
wireless
|
|
DOS was developed in the early ____.
|
1980s
|
|
Linux is ____ software, which means its code is available to the public for use, modification, and redistribution.
|
open source
|
|
Novell’s Netware is a(n) ____ operating system.
|
network
|
|
A ____ hides within or looks like a legitimate program such as a screen saver.
|
Trojan horse
|
|
____ is a program placed on a computer without the user’s knowledge that secretly collects information about the user.
|
Spyware
|
|
A ____ is the transmission media on which the data, instructions, or information travel.
|
communications channel
|
|
A(n) ____ connects a communications channel to a sending or receiving device such as a computer.
|
modem
|
|
____ is a real-time Internet communications service that allows you to exchange messages with one or more online users.
|
IM
|
|
Many mobile devices such as PDAs and smart phones have ____ capability built into the device or as an add-on feature.
|
GPS
|
|
A ____ is a network that connects computers and devices in ONE geographical area.
|
LAN
|
|
A ____ is a network that connects DIFFERENT geographical areas, such as businesses in different cities, or countries.
|
WAN
|
|
The Internet is the world’s largest _____.
|
WAN
|
|
Some servers, called _____, perform a specific task and can be replaced with other servers of the same type of perform multiple tasks.
|
dedicated servers
|
|
The design of computers, devices, and media in a network is called the _____.
|
network architecture
|
|
A P2P network sometimes is called a(n) _____ network.
|
file sharing
|
|
If a computer or device on a _____ network fails, all devices before the failed device are unaffected, but those after the failed device cannot function.
|
ring
|
|
_____ has been adopted as a network standard for Internet communications.
|
TCP/IP
|
|
Some computers and devices use the ____ specification to transmit data wirelessly to each other via infrared light waves.
|
IrDA
|
|
A(n) ____ is a temporary connection that uses one or more analog telephone lines for communications.
|
dial-up line
|
|
Which is the fastest type of line?
|
ATM
|
|
Which of the following are network topologies?
|
Ring
Star Bus |
|
A HomeRF network uses radio waves, instead of cables, to transmit data through the air over distances of up to _____ feet.
|
150
|
|
A Wi-Fi home network can send signals up to _____ feet.
|
1,500
|
|
Physical transmission media used in communications include _____ cable.
|
Coaxial
Twisted Pair Fiber Optic |
|
_____ is an electrical disturbance that can degrade communications.
|
Noise
|
|
Bluetooth, HomeRF, and Wi-Fi communications technology use _____.
|
broadcast radio signals
|
|
Hard Disk
|
It is a disk that uses a system of storage that uses magnetic particles to represent and store information. The information is stored in tracks and sectors.
Capacity = 160GB. - 1.5TB |
|
Opitical
CDs & DVDs |
They are made from metal, plastic, or lacquer. Information is stored in pits and lands. A laser creates these indentions and less powerful one reads them.
Blue Ray = 100 - 200GB. CD = 65MB. - 1GB. DVD = 4GB. - 17GB. |
|
Magnetic Disk
|
Uses magnetic particles to store information.
|
|
Floppy Disk
|
A kind of magnetic storage.
Capacity - 500KB. - 2MB. |
|
Solid State Storage
|
It uses flash memory to store information. They have a faster access time than Hard Drives.
|
|
Flash Drive
|
A kind of solid state storage.
USB = 512MB. - 64GB. Flash memory = 512MB. - 100GB. |
|
Storage
|
Holds information for future use.
|
|
Tape
|
Magnetic ribbon that is capable of storing large amounts of sequential information.
|
|
Starting a computer
|
Turning on the computer is called booting. You can do a cold boot or a warm boot.
|
|
User Interface
|
It controls how you enter data into the computer and how it is displayed.
|
|
GUI
|
Graphical User Interface. It allows you to interact with the computer through graphics, icons, etc...
|
|
Command Line
|
It is an older, more secure, complicated interface. A user enters precise data into the computer.
|
|
Managing Programs
|
Multitasking - Process that most computers use. It allows you to have more than one applications open and that appear to be running simultaneously.
Multiprocessing - It is a process that not all computers use. It allows you to have more than one application open and running simultaneously. It uses more than one processor. |
|
Managing Files
|
A file manager allows you to organize files. It displays them, organizes them into folders, and allows you to copy, rename, more, etc... the files.
|
|
The functions of an Operating System
|
Starting a computer
Providing an interface Managing programs, files, and memory Scheduling jobs Monitoring performance |
|
Managing Memory
|
Memory management's job is to make the best use of RAM, cache, and virtual memory. It holds, organizes, and transmits information.
|
|
Virtual Memory
|
It is a type of storage that can work as additional RAM. It is temporary storage and it can be expanded.
|
|
Scheduling Jobs
|
It involves the way a computer arranges things in order to process them. When multiple tasks are given, a buffer is created, which is memory that the tasks are placed on. Mutliple jobs line up in a queue on the buffer.
|
|
Configuring Devices
|
One kind of a configuring device is a driver. It is a program that tells a computer how to communicate with a device.
|
|
Establishing an Internet Connection
|
An operating system provides a way to connect to the internet. It provides a unique IP address. Some operating systems already have a browser installed.
|
|
Monitoring Performance
|
A performance monitor inspects and reports information concerning a computer's resources and devices. This helps uses to identify and resolve problems.
|
|
Utility Programs
|
AIt is a program that allows a user to perform maintenance jobs. Searching for files, cleaning disks, unistalling programs, etc...
|
|
Describe a Network Operation System
|
A network operating system, also called a platform, is the system that determines how a network functions. It allows you to manage and maintain connections.
|
|
List three kinds of security.
|
Logging in
Firewall - built in program that detects and protects a computer from attacks File Security - determines who has access to files |
|
What is a network?
|
It is a group of two or more computers that are connected and share resources and that are uniquely identified by an IP address.
|
|
Describe 3 examples of Networking Communications Applications, as described in the book.
|
Web - gigantic collection of documents
Blogs - online journals Fax - transfers and receives information over telephone lines |
|
What is a network?
|
It is a group of two or more computers that are connected and share resources and that are uniquely identified by an IP address.
|
|
How can you classify networks?
|
According to their scope, architecture, and topology.
|
|
Describe 3 examples of Networking Communications Applications, as described in the book.
|
Web - gigantic collection of documents
Blogs - online journals Fax - transfers and receives information over telephone lines |
|
Describe a LAN
|
Local Area Network. It connects computers on one location.
|
|
How can you classify networks?
|
According to their scope, architecture, and topology.
|
|
Describe a WAN
|
Wide Area Network. It connects computer on more than one location.
|
|
Describe a Peer-to-Peer network.
|
It is a network that usually connects fewer than ten computers. Each computer has equal capabilities and they share the same resources.
|
|
Describe a LAN
|
Local Area Network. It connects computers on one location.
|
|
Describe a Client/Server network.
|
It is a larger network that usually connects ten or more computers. Each computer is connected to a server that provides resources.
|
|
Describe a WAN
|
Wide Area Network. It connects computer on more than one location.
|
|
Describe 3 Network topologies.
|
Star - the computers directly and seperately connect to a central device. They are easy to maintian and if one computer shuts down, the rest continue to function.
Ring - the computers are connected to a cable that forms a closed loop. They are rarely used and if one computer fails, all the computers before it continue to function, but all the computers after it fail. Bus - the computers are connected to a single cable. It is an older system. All devices continue to function if one fails, but if the bus fails...they all fail. |
|
Describe a Peer-to-Peer network.
|
It is a network that usually connects fewer than ten computers. Each computer has equal capabilities and they share the same resources.
|
|
Describe TCP/IP protocol.
|
It stands for Transmission Control Protocol/Internet Protocol. It is a standard that determines how information is sent from one network to another. It divides information into small groups and determines the best path to send them on.
|
|
Describe a Client/Server network.
|
It is a larger network that usually connects ten or more computers. Each computer is connected to a server that provides resources.
|
|
Describe 3 Network topologies.
|
Star - the computers directly and seperately connect to a central device. They are easy to maintian and if one computer shuts down, the rest continue to function.
Ring - the computers are connected to a cable that forms a closed loop. They are rarely used and if one computer fails, all the computers before it continue to function, but all the computers after it fail. Bus - the computers are connected to a single cable. It is an older system. All devices continue to function if one fails, but if the bus fails...they all fail. |
|
Describe 3 types of transmission media.
|
Twisted Pair Cable - made of wires that are twisted together. It is easy to maintain and affordable.
Coaxial Cable - It is made from one wire that is insulated by three layers. It is an older type and more expensive. Fiber-Optic Cable - It is made from hundreds of glass strands that use light to transmit information. It is the most expensive, but it is the best. |
|
Describe TCP/IP protocol.
|
It stands for Transmission Control Protocol/Internet Protocol. It is a standard that determines how information is sent from one network to another. It divides information into small groups and determines the best path to send them on.
|
|
Describe 3 types of transmission media.
|
Twisted Pair Cable - made of wires that are twisted together. It is easy to maintain and affordable.
Coaxial Cable - It is made from one wire that is insulated by three layers. It is an older type and more expensive. Fiber-Optic Cable - It is made from hundreds of glass strands that use light to transmit information. It is the most expensive, but it is the best. |
|
What is input and output?
|
Input - data that is entered into the computer
Output - data that the computer produces |
|
RAID
|
Redundant Array of Independent Disks. RAID connects small storage disks into a single unit.
|
|
NAS
|
Network Attached Storage. A device that is connected to server to provide storage.
|
|
Recordable and Rewritable DVDs
|
DVD-RW, DVD+RW, & DVD+RAM
|
|
System Software
|
Progams that maintain the operations of a computer and its devices. Divided into Operating Systems and Utility Programs.
|
|
Spooling
|
The process by which documents are sent to a buffer instead of to the printer.
|
|
Stand-alone Operating Systems
|
Complete operating system that works on a desktop computer. Windows Vista, Mac OS X, UNIX, Linux.
|
|
Embedded Operating Systems
|
Located on mobile devices and electronics. It resides on a ROM chip.
|
|
Groupware
|
Helps people to work together on projects and share information over a network.
|
|
Network Card
|
Enables computers that do not have networking capabilities to connect to a network.
|
|
Routers
|
A communications device that connects multiple computers together.
|