• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/125

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

125 Cards in this Set

  • Front
  • Back
Moore's Law is a rule that predicts ________.
the access time of the read/write head
CPU speed, also called clock speed, is currently measured in ________.
gigahertz
The amount of memory your video card needs depends on what you want to display on your monitor.
True
Video cards often include their own RAM.
True
Upgrading your operating system to the newest version might help increase system reliability.
True
External hard drives are an ideal solution when you need more storage than a flash drive can provide.
True
Which of the following activities is carried out by the ALU?
completion of all arithmetic calculations
The CPU consists of which two parts?
the control unit and the arithmetic logic unit
The amount of RAM recommended for most systems today is measured in ________.
GB
The amount of RAM that is actually on the memory modules in your computer is the ________ memory.
physical
An expansion card that translates binary data into images is a(n) ________.
video card
A video card is an expansion card installed inside your ________.
system unit
Which statement pertaining to system reliability is FALSE?
An accumulation of temporary Internet files has no effect on your computer's overall performance.
Which of the following is NOT a main characteristic associated with desktop computers as compared to notebooks?
A desktop computer is more expensive.
A(n) ________ uses the same kind of memory that flash drives use and have no spinning platters or motors.
SSD
Moore's Law predicts that the number of transistors inside a CPU will triple every 18 months.
False
Hard drives have been growing in storage capacity by about 50 percent each year.
True
The CPU is located on the motherboard.
True
The use of multiple cores on one CPU chip allows the execution of two or more sets of instructions at the exact same time.
True
Temporary data and instructions are not stored on the hard drive because it is faster to retrieve data from RAM.
True
RAM is your computer's permanent storage space for data that is entered from the keyboard.
False
RAM is stored directly on the CPU.
False
Every computer is designed with a maximum limit on the amount of RAM it can support.
True
Hard drives have the largest capacity of any storage device.
True
A Blu-ray burner will most likely record both CDs and DVDs.
True
Which of the following network adapters is most likely to be preinstalled in a typical notebook computer today?
both a wireless and wired network adapter
Twisted-pair cable is made up of plastic or glass fibers that transmit data at extremely fast speeds.
False
A wireless network uses which of the following as its transmission medium?
laser waves
Client/server networks are controlled by a central server that runs a specialized piece of software called ________.
a network operating system (NOS)
A network that has 10 or more nodes is usually configured as a ________.
client/server network
Normal telephone wire is ________.
twisted-pair cable
Wireless networks are more vulnerable to attack than wired networks.
True
All desktop and notebook systems sold today are network ready.
True
Limiting your signal range does not help increase wireless network security.
False
A single computer can function as both a client and a server, but performance will be degraded.
True
The ________ is the maximum speed at which data can be transmitted between two nodes on a network.
data transfer rate
Which transmission medium is able to transmit data the fastest?
fiber-optic cable
One way to increase security on a network is by installing a ________.
firewall
MAN stands for mobile area network.
False
The Mac OS does NOT support P2P networking.
False
Most computers today come with Ethernet adapters already installed.
True
A firewall can come in either software or hardware form.
True
WPA stands for ________.
WiFi Protected Access
Due to the expansion of media files on home computers, ________ options are now being marketed; however, they are not as full featured as their business-world counterparts.
home network server
Which of the following is NOT an example of a network node?
a mouse
Which of the following devices translates electronic data into radio waves?
a transceiver
Although 802.11n will work with 802.11g adapters, you will not achieve 802.11n data transfer rates unless all adapters are 802.11n.
True
In a peer-to-peer network, one computer acts as the server.
False
Most ________ allow you to connect wireless and wired computers to the same network.
wireless routers
A(n) ________ allows sharing of a broadband Internet connection.
router
Images are a representation of light waves called ________ or continuous waves.
analog
The operating system of a cell phone is stored in ________.
ROM
The newest cell/smartphone displays are ________, which allow bright, sharp imaging and draw less power.
OLED
A(n) ________ is included in a cell phone to handle the compression of data for it to be quickly transmitted to another phone.
digital signal processor
Which of the following uses radio waves to transmit data signals over short distances and does not need a direct line of sight?
Bluetooth
Text messaging is also called ________.
short message service (SMS)
Which of the following is specialized software made to display Web pages on a cell phone?
microbrowser
________ is a form of voice-based Internet communication that turns a standard Internet connection into a means to place phone calls, including long-distance calls.
VoIP
An iPod is an example of a ________.
portable media player (PMP)
A portable media player can play files with all of the following file extensions EXCEPT:
.doc.
Flash memory, used by most MP3 players, is a type of ________.
nonvolatile memory
Which of the following describes the number of times an analog wave is measured each second during an analog-to-digital conversion?
sampling rate
Which of the following statements is NOT true about the JPEG file format?
JPEGs are larger than raw files.
MPEG-4, H.264, and DivX are all examples of ________.
codecs
A ________ runs a full-featured operating system and weighs less than two pounds.
netbook
A virtual phone number can be assigned to your cell phone or smartphone to keep your true number private.
True
Cell phones can fall victim to viruses.
True
DRM-free music can legally be moved from system to system.
True
Flash memory is volatile.
False
Current cell phones and smartphones feature cameras that are just as powerful as stand-alone digital cameras.
False
Raw files are larger than JPEG files.
True
Saving a file as a JPEG actually means that you will lose a bit of detail.
True
With video editing software, you can review video clips frame by frame.
True
Cell phones do not require special service providers to connect to the Internet.
False
Netbooks are more powerful than cell phones and smartphones because they run a full-featured operating system.
True
Using a ________, hackers can access and delete all files on your computer, send e-mail, run
programs, and do just about anything else you can do with your computer.
backdoor program
A(n) ________ virus runs a program that searches for common data files, compresses them, and
makes them unusable.
encryption
Which of the following classifications of viruses can change its own code to avoid detection?
polymorphic
A(n) ________ virus temporarily erases its code from the files where it resides and then hides
in the computer's active memory.
stealth
With regard to computer protection, quarantining is defined as ________.
placing a found virus in a secure area on the hard drive
A packet sniffer is a program that can enable a hacker to do all of the following EXCEPT:
launch a denial of service (DoS) attack on your computer.
The most likely method a hacker would use to access a computer is ________.
entering through its Internet connection
________ floods a computer with requests until it shuts down and refuses to answer any requests for information.
A DDoS attack
Devices that use a unique personal characteristic, such as a fingerprint, in place of a
password are called ________ authentication devices.
biometric
Spyware programs that monitor keystrokes with the intent of stealing passwords, login IDs, or
credit card information are referred to as ________.
keystroke loggers
________ is doing non-work-related activities with a computer while you are being paid to do
your job.
Cyberloafing
For complete protection when backing up your files, you should use a program that creates a(n)
________ of your entire system.
image backup
Social ________ is any technique that uses social skills to generate human interaction that
entices individuals to reveal sensitive information.
engineering
A cyberspace ________ is an attempt to make someone believe something that is untrue.
hoax
All of the following approaches can be taken to protect your notebook computer from theft
EXCEPT:
installing an external hard drive.
Theft of a computer is considered cybercrime.
false
The master boot record executes every time a computer boots up.
true
A macro virus is a virus that is attached to a document such as a Word or Excel file.
true
A virus signature is a portion of virus code that is unique to a particular computer virus.
true
Hackers most often obtain access to someone's computer via direct access.
false
A zombie is another person's computer controlled by a hacker.
true
You are more vulnerable to a hacker attack on a Linux system than you are on a Windows system.
false
To create a secure password, you should use both uppercase and lowercase letters.
true
You should use the same password for each system or Web site you need to access.
false
An incremental backup backs up the files on a computer that have changed since the last time a
backup was performed.
true
Which of the following was created especially for the transfer of hypertext documents across the Internet?
HTTP
A(n) ________ is a unique number that identifies a computer, server, or device connected to the Internet.
IP adress
At a minimum, what content must all data packets contain?
recipient's address, sender's address, reassembling instructions, and data
A set of rules for exchanging electronic information is called ________.
a computer protocol
________ uses a dedicated connection between two points with the connection remaining active for the duration of the transmission.
Circuit switching
________ funded the development of technologies that would eventually become the Internet.
The United States government
The main path, analogous to an interstate highway system, of the Internet along which data travels the fastest is known as the Internet ________.
backbone
Like e-mail, VoIP uses packet switching as the method of transferring data.
True
The majority of Internet communications follow the peer-to-peer network model.
false
An IP address that does not change and is usually assigned manually by a network administrator is called a(n) ________.
static address
There is no way to see the HTML code of a Web page.
false
If you regularly download and upload files, chances are that you are using ________.
FTP
________ is the organization responsible for the Internet's domain name system and IP address allocation.
ICANN
Text such as <b>This should be bolded.</b> is an example of an HTML ________.
element
When checking to see if a particular name is registered on the Internet, your computer consults a database that is maintained on a(n) ________ server.
DNS
It is estimated that ________ percent of e-mail is spam.
97
Most instant messaging services provide a high level of encryption for their messages.
false
File servers provide remote storage space.
true
Packet switching is the communications methodology where data is broken into smaller chunks that are sent over various routes at the same time.
true
A(n) ________ is an IP address that is assigned from an available pool of IP addresses.
dynamic address
The majority of Internet communications follow the ________ model of network communications.
client/server
Computers that typically use special security protocols to protect personal, sensitive buyer information are known as ________ servers.
commerce
When you enter a URL in your browser, the URL is converted to an IP address.
True
________ are lists of statements that use a single location to specify how to display HTML/XHTML elements.
Cascading style sheets (CSS)
There are no real benefits to using dynamic IP addressing versus static IP addressing.
False