Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
24 Cards in this Set
- Front
- Back
What is the purpose of removable hard drives?
Select one: a. Backups b. Archives c. Portable storage d. All of these |
d. All of these
|
|
What is the name of the files used by Microsoft Windows to operate the computer?
Select one: a. System files b. Process files c. Program files d. User files |
a. System files
|
|
Which of the following maintenance tools gathers information scattered across the hard drive and reorganizes the data?
Select one: a. Defrag b. Archive c. Check Disk d. Windows Updates |
a. Defrag
|
|
Which of the following should be performed as part of routine computer maintenance?
Select one: a. Delete temporary files b. Back up system files c. Back up program files d. Test UPC |
a. Delete temporary files
|
|
Which of the following protects the computer from unexpected spikes in power?
Select one: a. Power strip b. Defrag c. Surge protector d. Dust removal |
c. Surge protector
|
|
Which of the following is the name of a computer program that copies itself and propagates from one computer to another?
Select one: a. Hoax b. Virus c. Trojan d. Hijacker |
b. Virus
|
|
Fill in the blanks for the following sentence: A keyboard is an _________ device and a printer is an ________ device.
Select one: a. Outgoing, incoming b. Incoming, outgoing c. Input, output d. Output, input |
c. Input, output
|
|
What is the appropriate device used to back up computer data?
Select one: a. Both flash/thumb drive and removable hard drive b. Removable hard drive c. Neither flash/thumb drives nor removable hard drive d. Flash/thumb drive |
a. Both flash/thumb drive and removable hard drive
|
|
Which of the following is NOT a type of computer memory?
Select one: a. CPU b. ROM c. Flash d. RAM |
a. CPU
|
|
What is the name of an apparently legitimate computer program that also contains computer code intended to disrupt your computer's processes or send information about your computer to someone else?
Select one: a. Hijacker b. Adware c. Trojan d. Virus |
c. Trojan
|
|
ONE BYTE = _________ BITS
|
8
|
|
1 KILOBYTE = _____ BYTES
|
1024 BYTES
|
|
The unit of measure most commonly used to describe current computer hard-drive capacity is ________________
|
gigabytes (or “gigs”).
|
|
__________________ is the most common form of removable data storage.
|
flash memory
|
|
___________________ are a form of flash memory.
|
USB thumb drives
|
|
A computer program that copies itself, disrupting computer systems and damaging data
|
Virus
|
|
A computer program that sends information stored on your computer to someone else
|
Spyware
|
|
Technique to gain unauthorized access using an address from a trusted source
|
IP Spoofing
|
|
An apparently legitimate computer program that is really intended to disrupt a computer ’s performance or transmit information stored on a computer
|
Trojans
|
|
Software that causes advertisements to appear randomly on your screen
|
Adware
|
|
Software that takes control of your web browser and directs you to specific websites
|
Hijackers
|
|
Individuals that gain unauthorized access to your computer
|
Hackers
|
|
Emails purporting to come from reliable sources that trick users into divulging passwords, personal and/or financial information
|
Phishing
|
|
Chain letters, scams, false alarms
|
Hoaxes
|