Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
39 Cards in this Set
- Front
- Back
T OR F
Human speech cannot be digitized. |
False
|
|
T OR F
Freedom of speech is a universal absolute. |
False
|
|
T OR F
Memory is the area where data can be left on a permanent basis when it is not immediately needed for processing. |
False
|
|
T OR F
A mainframe is a large and expensive computer, capable of simultaneously processing data for hundreds and thousands of users |
True
|
|
Micro controllers tend to be referred to as computers rather than as processors because in practice they used for dedicated applications, not as multipurpose devices.
|
False
|
|
the prefix tera-means trillion
|
True
|
|
Digital divide is a term that refers to entities that exist largely within computer networks
|
False
|
|
Myspace and Friendster are examples of ________.
|
Online Social Networks
|
|
In 2006 there were over ____
Websites |
80 million
|
|
____ refers to voice conversations that are routed over the internet, rather than landlines or cellular telephony
|
VoIP
|
|
What is considered intellectual property?
|
encryption
|
|
Nintendo Wii,Playstion, Microsoft are examples are
|
Video game consoles
|
|
A computer fall into the ___ Category if it is, at the time of construction, one of the fastest computers in the world
|
Supercomputer
|
|
most computers store data in a _______ format as a series of 1's and 0's
|
digital
|
|
___ provides codes for 256 characters, including letter, punctuation symbols,numerals, and characters like boxes, circles, and other graphical symbols.
|
Extended ASCII
|
|
a ___ is 1,024 bits.
|
Kilobit
|
|
the prefix ____ means billion.
|
giga
|
|
Which of the following is a synonym for a criminal hacker?
|
Black Hat
|
|
T or F
Device drivers usually run in the foreground, opening a widow on the screen. |
False
|
|
T or F
Word processing software gives you the ability to create, spell -check,edit,and format a document on the screen before you commit it to paper. |
True
|
|
T or F
All the applications in a suite are produced by different software publishers. |
False
|
|
T or F
BSD is slightly more restrictive than GPL b/c it requires derivative works to be licensed under a BSD |
False
|
|
T or F
A virus that does not really exist is referred to as a virus hoax. |
True
|
|
T or F
Fortunately, anti virus software is 100% reliable. |
False
|
|
T or F
A footer is text that you specify to automatically appear in the bottom margin of every page. |
True
|
|
T or F
Public domain software may be freely copied, distributed, and even resold. |
True
|
|
One Point is about 1/__ of an inch.
|
72
|
|
__ alignment refers to the horizontal position of text
|
Paragraph
|
|
A(n) __ language provides a set of commands fro location and manipulation data.
|
query
|
|
3-D graphics software provides a set of tools for creating ___, which represent three dimension object.
|
wireframes
|
|
A software ___ is a collection of application software sold as a single package
|
suite
|
|
A ___ licence is priced per copy and allows a specific number of copies to be used at the same time.
|
concurrent-use
|
|
___ is not protected by copyright b/c the copyright has expired,or the author has made the program available without restricion.
|
Public Domain software
|
|
A __ is designed to spread from computer to computer, and not from file to file
|
Worm
|
|
In addition to replication iself, a virus might deliver a__
|
Payload
|
|
Viruses that deliver their payloads on a specific date are somtimes referred to as
|
time Bombs
|
|
Trojan horses are notorious for sealing passwords using a ___
|
keylogger
|
|
patient management and billing software is an example of ___
|
Vertical market
|
|
___ are the biggest threat to computer security.
|
Bots
|