• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/57

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

57 Cards in this Set

  • Front
  • Back
The operating system
is the program that controls how computer system functions including the processor, memory, storage devices, and peripheral devices
Provides user interface
user interface
Part of the operating system that enables you to interact with your computer.
utility programs
small programs that perform many of the general housekeeping tasks for the computer, such as system maintenance and file compression.
Real-time operating systems
don’t require the intervention of any users at all
A real-time operating system guarantees
certain response times for particular computing tasks, or the machine’s application is useless
Single-user, single-task operating systems
are proprietary systems developed specifically for the devices they manage (PDA- pocket pc's)
Single-user, multitask operating systems
available commercially, for personal and business use
platform
The combination of the operating system and the processor
Virtual memory is
the space on the hard drive where the operating system begins to store data when it becomes memory-bound.
Macro viruses
attach themselves to documents such as Word and Excel
adding more RAM
improves battery life
firewall
a common method for maximizing computer security used is blocking access to logical ports
BIOS
looks for the system files during the boot process
architecture
The design of the network is called the network
firewall
a common method for maximizing computer security used is blocking access to logical ports
BIOS
looks for the system files during the boot process
architecture
The design of the network is called the network
volatile storage
info gets erased when you turn of comp
Flash memory cards are
nonvolatile
Verification of a login name and password is known as
authentication
The terms megahertz and gigahertz refer to the number of
machine cycles per second that a CPU can perform
CPU
responsible for data processing
but does not store data
zombie
the name given to a computer that is controlled by hackers through the installation of a backdoor program and used to flood a target computer with bogus requests.
A wireless network uses
radio waves as its transmission media
not steps involved in the boot process
load application programs
CRT and LCD are types of
monitors
The portion of the CPU that coordinates the activities of all the other computer components is the
control unit
The operating system does all of the following EXCEPT
enable users to perform a specific task such as document editing
The number of pixels displayed on a screen is known as the screen
resolution
Windows and Macintosh operating systems
are the most commonly used single-user
examples of a network node
printer
computer
modem
worms
are viruses that can run independently of host file execution and are much more active in spreading themselves
connecting your PDA to the Internet requires that you have a
wireless ISP
The operating system of a cell phone is stored in
ROM.
windows are not
an example of a command-driven environment
quarantining
places the virus in a secure area of the hard drive so that it won't spread infection to other files
PDAs do not include
an internal hard drive
A computer virus attaches itself to and attempts to hide within
the code of a host program.
The time it takes a CPU to retrieve data from RAM is measured in
nanoseconds
logic bombs
are viruses that are triggered when certain logical conditions are met
files are not stored
in RAM
The speed of a hard drive is measured in
milliseconds
Ethernet
is most likely to be preinstalled in a typical home computer
video card
converts binary data into the images that display on the monitor
MS-DOS is a ________ operating system
command driven
The network architecture used in most home networks is
peer-to-peer LAN
personal information management (PIM)
software that stores daily schedules and contact lists.
firewalls
Software programs or hardware devices designed to prevent unauthorized access to computers or networks.
Moore’s Law
predicts that the number of transistors inside a CPU will increase so fast that CPU capacity will double every 18 months.
IDE refers to a type of
harddrive
router
between networks
switches
send to intended node on same network
hub
send to all nodes on same network
Graphic user interface
point and click technology
POST process
Power-on self test
The first job the basic input/output system (BIOS) performs, ensuring that essential peripheral devices are attached and operational. This process consists of a test on the video card and video memory, a BIOS identification process (during which the BIOS version, manufacturer, and data are displayed on the monitor), and a memory test to ensure memory chips are working properly.
exapansion cards
Circuit boards with specific functions that augment the computer’s basic functions as well as provide connections to other devices.
Symbian
A popular operating system for full-featured cell phones.