Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
125 Cards in this Set
- Front
- Back
Moore's Law is a rule that predicts ________.
|
the access time of the read/write head
|
|
CPU speed, also called clock speed, is currently measured in ________.
|
gigahertz
|
|
The amount of memory your video card needs depends on what you want to display on your monitor.
|
True
|
|
Video cards often include their own RAM.
|
True
|
|
Upgrading your operating system to the newest version might help increase system reliability.
|
True
|
|
External hard drives are an ideal solution when you need more storage than a flash drive can provide.
|
True
|
|
Which of the following activities is carried out by the ALU?
|
completion of all arithmetic calculations
|
|
The CPU consists of which two parts?
|
the control unit and the arithmetic logic unit
|
|
The amount of RAM recommended for most systems today is measured in ________.
|
GB
|
|
The amount of RAM that is actually on the memory modules in your computer is the ________ memory.
|
physical
|
|
An expansion card that translates binary data into images is a(n) ________.
|
video card
|
|
A video card is an expansion card installed inside your ________.
|
system unit
|
|
Which statement pertaining to system reliability is FALSE?
|
An accumulation of temporary Internet files has no effect on your computer's overall performance.
|
|
Which of the following is NOT a main characteristic associated with desktop computers as compared to notebooks?
|
A desktop computer is more expensive.
|
|
A(n) ________ uses the same kind of memory that flash drives use and have no spinning platters or motors.
|
SSD
|
|
Moore's Law predicts that the number of transistors inside a CPU will triple every 18 months.
|
False
|
|
Hard drives have been growing in storage capacity by about 50 percent each year.
|
True
|
|
The CPU is located on the motherboard.
|
True
|
|
The use of multiple cores on one CPU chip allows the execution of two or more sets of instructions at the exact same time.
|
True
|
|
Temporary data and instructions are not stored on the hard drive because it is faster to retrieve data from RAM.
|
True
|
|
RAM is your computer's permanent storage space for data that is entered from the keyboard.
|
False
|
|
RAM is stored directly on the CPU.
|
False
|
|
Every computer is designed with a maximum limit on the amount of RAM it can support.
|
True
|
|
Hard drives have the largest capacity of any storage device.
|
True
|
|
A Blu-ray burner will most likely record both CDs and DVDs.
|
True
|
|
Which of the following network adapters is most likely to be preinstalled in a typical notebook computer today?
|
both a wireless and wired network adapter
|
|
Twisted-pair cable is made up of plastic or glass fibers that transmit data at extremely fast speeds.
|
False
|
|
A wireless network uses which of the following as its transmission medium?
|
laser waves
|
|
Client/server networks are controlled by a central server that runs a specialized piece of software called ________.
|
a network operating system (NOS)
|
|
A network that has 10 or more nodes is usually configured as a ________.
|
client/server network
|
|
Normal telephone wire is ________.
|
twisted-pair cable
|
|
Wireless networks are more vulnerable to attack than wired networks.
|
True
|
|
All desktop and notebook systems sold today are network ready.
|
True
|
|
Limiting your signal range does not help increase wireless network security.
|
False
|
|
A single computer can function as both a client and a server, but performance will be degraded.
|
True
|
|
The ________ is the maximum speed at which data can be transmitted between two nodes on a network.
|
data transfer rate
|
|
Which transmission medium is able to transmit data the fastest?
|
fiber-optic cable
|
|
One way to increase security on a network is by installing a ________.
|
firewall
|
|
MAN stands for mobile area network.
|
False
|
|
The Mac OS does NOT support P2P networking.
|
False
|
|
Most computers today come with Ethernet adapters already installed.
|
True
|
|
A firewall can come in either software or hardware form.
|
True
|
|
WPA stands for ________.
|
WiFi Protected Access
|
|
Due to the expansion of media files on home computers, ________ options are now being marketed; however, they are not as full featured as their business-world counterparts.
|
home network server
|
|
Which of the following is NOT an example of a network node?
|
a mouse
|
|
Which of the following devices translates electronic data into radio waves?
|
a transceiver
|
|
Although 802.11n will work with 802.11g adapters, you will not achieve 802.11n data transfer rates unless all adapters are 802.11n.
|
True
|
|
In a peer-to-peer network, one computer acts as the server.
|
False
|
|
Most ________ allow you to connect wireless and wired computers to the same network.
|
wireless routers
|
|
A(n) ________ allows sharing of a broadband Internet connection.
|
router
|
|
Images are a representation of light waves called ________ or continuous waves.
|
analog
|
|
The operating system of a cell phone is stored in ________.
|
ROM
|
|
The newest cell/smartphone displays are ________, which allow bright, sharp imaging and draw less power.
|
OLED
|
|
A(n) ________ is included in a cell phone to handle the compression of data for it to be quickly transmitted to another phone.
|
digital signal processor
|
|
Which of the following uses radio waves to transmit data signals over short distances and does not need a direct line of sight?
|
Bluetooth
|
|
Text messaging is also called ________.
|
short message service (SMS)
|
|
Which of the following is specialized software made to display Web pages on a cell phone?
|
microbrowser
|
|
________ is a form of voice-based Internet communication that turns a standard Internet connection into a means to place phone calls, including long-distance calls.
|
VoIP
|
|
An iPod is an example of a ________.
|
portable media player (PMP)
|
|
A portable media player can play files with all of the following file extensions EXCEPT:
|
.doc.
|
|
Flash memory, used by most MP3 players, is a type of ________.
|
nonvolatile memory
|
|
Which of the following describes the number of times an analog wave is measured each second during an analog-to-digital conversion?
|
sampling rate
|
|
Which of the following statements is NOT true about the JPEG file format?
|
JPEGs are larger than raw files.
|
|
MPEG-4, H.264, and DivX are all examples of ________.
|
codecs
|
|
A ________ runs a full-featured operating system and weighs less than two pounds.
|
netbook
|
|
A virtual phone number can be assigned to your cell phone or smartphone to keep your true number private.
|
True
|
|
Cell phones can fall victim to viruses.
|
True
|
|
DRM-free music can legally be moved from system to system.
|
True
|
|
Flash memory is volatile.
|
False
|
|
Current cell phones and smartphones feature cameras that are just as powerful as stand-alone digital cameras.
|
False
|
|
Raw files are larger than JPEG files.
|
True
|
|
Saving a file as a JPEG actually means that you will lose a bit of detail.
|
True
|
|
With video editing software, you can review video clips frame by frame.
|
True
|
|
Cell phones do not require special service providers to connect to the Internet.
|
False
|
|
Netbooks are more powerful than cell phones and smartphones because they run a full-featured operating system.
|
True
|
|
Using a ________, hackers can access and delete all files on your computer, send e-mail, run
programs, and do just about anything else you can do with your computer. |
backdoor program
|
|
A(n) ________ virus runs a program that searches for common data files, compresses them, and
makes them unusable. |
encryption
|
|
Which of the following classifications of viruses can change its own code to avoid detection?
|
polymorphic
|
|
A(n) ________ virus temporarily erases its code from the files where it resides and then hides
in the computer's active memory. |
stealth
|
|
With regard to computer protection, quarantining is defined as ________.
|
placing a found virus in a secure area on the hard drive
|
|
A packet sniffer is a program that can enable a hacker to do all of the following EXCEPT:
|
launch a denial of service (DoS) attack on your computer.
|
|
The most likely method a hacker would use to access a computer is ________.
|
entering through its Internet connection
|
|
________ floods a computer with requests until it shuts down and refuses to answer any requests for information.
|
A DDoS attack
|
|
Devices that use a unique personal characteristic, such as a fingerprint, in place of a
password are called ________ authentication devices. |
biometric
|
|
Spyware programs that monitor keystrokes with the intent of stealing passwords, login IDs, or
credit card information are referred to as ________. |
keystroke loggers
|
|
________ is doing non-work-related activities with a computer while you are being paid to do
your job. |
Cyberloafing
|
|
For complete protection when backing up your files, you should use a program that creates a(n)
________ of your entire system. |
image backup
|
|
Social ________ is any technique that uses social skills to generate human interaction that
entices individuals to reveal sensitive information. |
engineering
|
|
A cyberspace ________ is an attempt to make someone believe something that is untrue.
|
hoax
|
|
All of the following approaches can be taken to protect your notebook computer from theft
EXCEPT: |
installing an external hard drive.
|
|
Theft of a computer is considered cybercrime.
|
false
|
|
The master boot record executes every time a computer boots up.
|
true
|
|
A macro virus is a virus that is attached to a document such as a Word or Excel file.
|
true
|
|
A virus signature is a portion of virus code that is unique to a particular computer virus.
|
true
|
|
Hackers most often obtain access to someone's computer via direct access.
|
false
|
|
A zombie is another person's computer controlled by a hacker.
|
true
|
|
You are more vulnerable to a hacker attack on a Linux system than you are on a Windows system.
|
false
|
|
To create a secure password, you should use both uppercase and lowercase letters.
|
true
|
|
You should use the same password for each system or Web site you need to access.
|
false
|
|
An incremental backup backs up the files on a computer that have changed since the last time a
backup was performed. |
true
|
|
Which of the following was created especially for the transfer of hypertext documents across the Internet?
|
HTTP
|
|
A(n) ________ is a unique number that identifies a computer, server, or device connected to the Internet.
|
IP adress
|
|
At a minimum, what content must all data packets contain?
|
recipient's address, sender's address, reassembling instructions, and data
|
|
A set of rules for exchanging electronic information is called ________.
|
a computer protocol
|
|
________ uses a dedicated connection between two points with the connection remaining active for the duration of the transmission.
|
Circuit switching
|
|
________ funded the development of technologies that would eventually become the Internet.
|
The United States government
|
|
The main path, analogous to an interstate highway system, of the Internet along which data travels the fastest is known as the Internet ________.
|
backbone
|
|
Like e-mail, VoIP uses packet switching as the method of transferring data.
|
True
|
|
The majority of Internet communications follow the peer-to-peer network model.
|
false
|
|
An IP address that does not change and is usually assigned manually by a network administrator is called a(n) ________.
|
static address
|
|
There is no way to see the HTML code of a Web page.
|
false
|
|
If you regularly download and upload files, chances are that you are using ________.
|
FTP
|
|
________ is the organization responsible for the Internet's domain name system and IP address allocation.
|
ICANN
|
|
Text such as <b>This should be bolded.</b> is an example of an HTML ________.
|
element
|
|
When checking to see if a particular name is registered on the Internet, your computer consults a database that is maintained on a(n) ________ server.
|
DNS
|
|
It is estimated that ________ percent of e-mail is spam.
|
97
|
|
Most instant messaging services provide a high level of encryption for their messages.
|
false
|
|
File servers provide remote storage space.
|
true
|
|
Packet switching is the communications methodology where data is broken into smaller chunks that are sent over various routes at the same time.
|
true
|
|
A(n) ________ is an IP address that is assigned from an available pool of IP addresses.
|
dynamic address
|
|
The majority of Internet communications follow the ________ model of network communications.
|
client/server
|
|
Computers that typically use special security protocols to protect personal, sensitive buyer information are known as ________ servers.
|
commerce
|
|
When you enter a URL in your browser, the URL is converted to an IP address.
|
True
|
|
________ are lists of statements that use a single location to specify how to display HTML/XHTML elements.
|
Cascading style sheets (CSS)
|
|
There are no real benefits to using dynamic IP addressing versus static IP addressing.
|
False
|