Ch 3 Flashcards

1
Q

A _________ sometimes called a system board, is the main circuit board of a personal computer.

A

motherboard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

CPU is another name for a ____________ which is the electronic component that interprets and carries out the basic instructions that operate a computer.

A

Processor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Security experts recommend using a sticker to cover a ___________ when you are not using it and inserting a dummy plug in a microphone port when you are not using it.

A

webcam

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A ___________ is a device that combines features of a smartphone and tablet. It usually has a screen that measures 5 to 7 inches.

A

Phablet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A _________ is a computer dedicated to providing one or more services to other devices on a network.

A

Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A ________ is a computer, usually with limited processing power, that enables users to send data to and or receive information a server or host computer.

A

Terminal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A self service __________ is a freestanding terminal that usually has a touch screen for user interaction.

A

Kiosk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A ____________ is the fastest, most powerful and most expensive computer.

A

Super computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A __________ is the smallest element in an electronic image.

A

Pixel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

___________ is the number of horizontal and vertical pixels in a display.

A

Resolution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

An __________ computer is a special purpose computer that functions as a component in a larger product such a scar or television.

A

Embedded

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The ___________ describes an environment where processors are embedded in every product imaginable allowing the products to communicate.

A

Internet of things

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A ___________ is the point at which a peripheral device attaches to or communicates with a device.

A

Port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A ___________ joins a cable to a port.

A

Connector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A USB port an connect up to _________ different peripheral devices together with a single connector.

A

127

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Bluetooth devices have to be within about ________ feet of each other.

A

33

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Wifi uses radio signals that conform to 802.11 standards that were developed by the ________________.

A

Institute of electrical and electronics engineers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A ___________ is a prolonged under voltage that may cause loss of data.

A

Brownout

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A ____________ is a momentary over voltage that occurs when the increase in power lasts for less than one millisecond.

A

Spike

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A ____________ uses electrical components to provide a stable current flow and minimize the risk of an over voltage.

A

Surge protector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Excel may change how the groups and buttons within the groups appear on the ribbon, depending on the computer or mobile devices_____________.

A

Screen resolution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

The _________ may be used to fill in a data series rather than typing and formatting all the entries.

A

Fill handle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

A formula using __________ cell reference instructs Excel to adjust cell reference as it is copied to a destination area.

A

Relative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

To keep a cell reference constant when you are copying, Excel uses a technique called __________ cell referencing.

A

Absolute

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Use an _________ function to determine the value of a cell based on a logical test.

A

IF

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

____________ is an Excel feature that looks for patterns in data and automatically fills or formats data in remaining cells.

A

Flash fill

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

A ___________ consists of cell references, numbers, and arithmetic operators that instruct Excel to perform a calculation.

A

Formula

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

A formula in a cell that contains a reference back to itself is called a _____________.

A

Circular reference

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

In Excel as n algebra, you can always use __________ to override the order of operations.

A

Parenthesis

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

___________ allows you to select cells for use in a formula by using the pointer.

A

Point mode

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

The _________ function displays the highest value of a range.

A

Max

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

____________ functions ignore blank cells.

A

Statistical

33
Q

___________ checks which cells are referenced in the formula assigned to the active cell.

A

Range finder

34
Q

__________ Format button assigns a fixed dollar sign to a number and rounds the figure to the nearest 100th.

A

Accounting number

35
Q

__________ allows the user to automatically change how a cell appears based on the value of the cell.

A

Conditionally formatting

36
Q

A _________ is a dot on the screen the contains a color.

A

Pixel

37
Q

Click on the __________ tab on the ribbon to open Backstage view.

A

File

38
Q

A __________ is the intersection of a column and a row.

A

Cell

39
Q

Each workbook has 16,384 columns and 1,048576 rows for a total of ____________.

A

17179869184

40
Q

A cell _________ is the coordinates of the intersection of a column and a row.

A

Reference

41
Q

The cell in which you canister data is called the _________ cell.

A

Active

42
Q

The horizontal and vertical lines on the worksheet are called __________.

A

Gridlines

43
Q

When you type contents into a cell, Excel displays the entry in the _________ bar.

A

Formula

44
Q

Excel displays the active cell reference in the ________ box on the left side of the formula bar.

A

Name

45
Q

A __________ is a visual representation of data.

A

Chart

46
Q

A ___________ is a series of two or more adjacent cells in a column or row or rectangular group of cells.

A

Range

47
Q

Excel provides predefined formulas which are called_________.

A

Functions

48
Q

The _________ is the small green square located in the lower right corner of the heavy border around the active cell. It may be used to copy formulas to adjacent cells.

A

Fill handle

49
Q

Use the __________ button to center contents over several columns.

A

Merge and center

50
Q

The __________ number format causes numbers to be displayed with tow decimal places and to align vertically with a $ before the number.

A

Accounting

51
Q

The ________ format causes numbers to be displayed with two decimal places and commas as thousands separators.

A

Comma style

52
Q

A ___________ chart shows the contribution of each piece of data to the whole, or total, of the data.

A

Pie

53
Q

A key logger is a type of _________ software that has the capability to record eery keystroke made to a log file.

A

Surveillance

54
Q

A key logger recorder can record __________ email, and any other information you type at any time using your keyboard.

A

Instant messages

55
Q

Key loggers can be embedded in __________ allowing your information to be transmitted to an unknown third party.

A

Spyware

56
Q

How do some employers use key loggers on the machines used by their employees?

A

Make sure employees use work computers for business purposes only

57
Q

Spyware is software that _________ gathers user information through a users Internet connection without his or her knowledge.

A

Covertly

58
Q

Spyware applications are typically bundled as a hidden component of _________ or shareware.

A

Free ware

59
Q

Spyware can also gather information about email addresses and even passwords and____________.

A

Credit card number

60
Q

Spyware is similar to a ___________ in that users unwittingly install the product when they install something else.

A

Trojan horse

61
Q

Rootlets are difficult to detect because they are activated before your systems __________ has completely booted up.

A

Operating system

62
Q

Rootlets are able to intercept data from ____________ , ___________, and the ____________.

A

Terminals, network connect, key board

63
Q

ICANN is short for _______________.

A

Internet corporation for Assigned names and numbers

64
Q

IANA is short for ______________.

A

Internet Assigned Numbers Authority

65
Q

IETF is short for______________.

A

Internet Engineering Task Force

66
Q

______________ was founded and run by Jon Postel, who is considered by many to be the father of the Internet.

A

IANA

67
Q

The daily oversight of assigning IP addresses is handled by__________.

A

IANA

68
Q

_________ was created as a non profit organization to take control away from the U.S. government.

A

ICANN

69
Q

The __________ develops internet standards and protocols, such as TCP.

A

IETF

70
Q

A temporary internet file is a file that is located on your hard drive and is used by __________ to store Web site data for every Web page or Url address the you visit.

A

Browser

71
Q

Loading a Website from a temporary Internet file is called_________.

A

Caching

72
Q

What is an advantage of having a temporary internet file stored on a device?

A

You can view the cached versions of recently visited web pages while offline.

73
Q

When you press the delete key in Windows, only ___________ to the files are moved.

A

Remove the short cuts

74
Q

____________ software allows anyone to reinstate data that has been deleted from a hard rive.

A

System recovery

75
Q

The disk wiping process will actually __________ your entire hard drive with data, several times.

A

Overwrite

76
Q

The government standard DoD 5520.22M, considered a medium security level, specifies _____________ iterations to completely overwrite a computer __________ times.

A

3,6

77
Q

Cookies are used by a Web server to keep track of what?

A

Users activity on a specific website

78
Q

Can a virus be spread with a cookie or access the hard drive of a computer?

A

No

79
Q

Can cookies read a computers hard drive?

A

No