Ch 3 Flashcards
A _________ sometimes called a system board, is the main circuit board of a personal computer.
motherboard
CPU is another name for a ____________ which is the electronic component that interprets and carries out the basic instructions that operate a computer.
Processor
Security experts recommend using a sticker to cover a ___________ when you are not using it and inserting a dummy plug in a microphone port when you are not using it.
webcam
A ___________ is a device that combines features of a smartphone and tablet. It usually has a screen that measures 5 to 7 inches.
Phablet
A _________ is a computer dedicated to providing one or more services to other devices on a network.
Server
A ________ is a computer, usually with limited processing power, that enables users to send data to and or receive information a server or host computer.
Terminal
A self service __________ is a freestanding terminal that usually has a touch screen for user interaction.
Kiosk
A ____________ is the fastest, most powerful and most expensive computer.
Super computer
A __________ is the smallest element in an electronic image.
Pixel
___________ is the number of horizontal and vertical pixels in a display.
Resolution
An __________ computer is a special purpose computer that functions as a component in a larger product such a scar or television.
Embedded
The ___________ describes an environment where processors are embedded in every product imaginable allowing the products to communicate.
Internet of things
A ___________ is the point at which a peripheral device attaches to or communicates with a device.
Port
A ___________ joins a cable to a port.
Connector
A USB port an connect up to _________ different peripheral devices together with a single connector.
127
Bluetooth devices have to be within about ________ feet of each other.
33
Wifi uses radio signals that conform to 802.11 standards that were developed by the ________________.
Institute of electrical and electronics engineers
A ___________ is a prolonged under voltage that may cause loss of data.
Brownout
A ____________ is a momentary over voltage that occurs when the increase in power lasts for less than one millisecond.
Spike
A ____________ uses electrical components to provide a stable current flow and minimize the risk of an over voltage.
Surge protector
Excel may change how the groups and buttons within the groups appear on the ribbon, depending on the computer or mobile devices_____________.
Screen resolution
The _________ may be used to fill in a data series rather than typing and formatting all the entries.
Fill handle
A formula using __________ cell reference instructs Excel to adjust cell reference as it is copied to a destination area.
Relative
To keep a cell reference constant when you are copying, Excel uses a technique called __________ cell referencing.
Absolute
Use an _________ function to determine the value of a cell based on a logical test.
IF
____________ is an Excel feature that looks for patterns in data and automatically fills or formats data in remaining cells.
Flash fill
A ___________ consists of cell references, numbers, and arithmetic operators that instruct Excel to perform a calculation.
Formula
A formula in a cell that contains a reference back to itself is called a _____________.
Circular reference
In Excel as n algebra, you can always use __________ to override the order of operations.
Parenthesis
___________ allows you to select cells for use in a formula by using the pointer.
Point mode
The _________ function displays the highest value of a range.
Max
____________ functions ignore blank cells.
Statistical
___________ checks which cells are referenced in the formula assigned to the active cell.
Range finder
__________ Format button assigns a fixed dollar sign to a number and rounds the figure to the nearest 100th.
Accounting number
__________ allows the user to automatically change how a cell appears based on the value of the cell.
Conditionally formatting
A _________ is a dot on the screen the contains a color.
Pixel
Click on the __________ tab on the ribbon to open Backstage view.
File
A __________ is the intersection of a column and a row.
Cell
Each workbook has 16,384 columns and 1,048576 rows for a total of ____________.
17179869184
A cell _________ is the coordinates of the intersection of a column and a row.
Reference
The cell in which you canister data is called the _________ cell.
Active
The horizontal and vertical lines on the worksheet are called __________.
Gridlines
When you type contents into a cell, Excel displays the entry in the _________ bar.
Formula
Excel displays the active cell reference in the ________ box on the left side of the formula bar.
Name
A __________ is a visual representation of data.
Chart
A ___________ is a series of two or more adjacent cells in a column or row or rectangular group of cells.
Range
Excel provides predefined formulas which are called_________.
Functions
The _________ is the small green square located in the lower right corner of the heavy border around the active cell. It may be used to copy formulas to adjacent cells.
Fill handle
Use the __________ button to center contents over several columns.
Merge and center
The __________ number format causes numbers to be displayed with tow decimal places and to align vertically with a $ before the number.
Accounting
The ________ format causes numbers to be displayed with two decimal places and commas as thousands separators.
Comma style
A ___________ chart shows the contribution of each piece of data to the whole, or total, of the data.
Pie
A key logger is a type of _________ software that has the capability to record eery keystroke made to a log file.
Surveillance
A key logger recorder can record __________ email, and any other information you type at any time using your keyboard.
Instant messages
Key loggers can be embedded in __________ allowing your information to be transmitted to an unknown third party.
Spyware
How do some employers use key loggers on the machines used by their employees?
Make sure employees use work computers for business purposes only
Spyware is software that _________ gathers user information through a users Internet connection without his or her knowledge.
Covertly
Spyware applications are typically bundled as a hidden component of _________ or shareware.
Free ware
Spyware can also gather information about email addresses and even passwords and____________.
Credit card number
Spyware is similar to a ___________ in that users unwittingly install the product when they install something else.
Trojan horse
Rootlets are difficult to detect because they are activated before your systems __________ has completely booted up.
Operating system
Rootlets are able to intercept data from ____________ , ___________, and the ____________.
Terminals, network connect, key board
ICANN is short for _______________.
Internet corporation for Assigned names and numbers
IANA is short for ______________.
Internet Assigned Numbers Authority
IETF is short for______________.
Internet Engineering Task Force
______________ was founded and run by Jon Postel, who is considered by many to be the father of the Internet.
IANA
The daily oversight of assigning IP addresses is handled by__________.
IANA
_________ was created as a non profit organization to take control away from the U.S. government.
ICANN
The __________ develops internet standards and protocols, such as TCP.
IETF
A temporary internet file is a file that is located on your hard drive and is used by __________ to store Web site data for every Web page or Url address the you visit.
Browser
Loading a Website from a temporary Internet file is called_________.
Caching
What is an advantage of having a temporary internet file stored on a device?
You can view the cached versions of recently visited web pages while offline.
When you press the delete key in Windows, only ___________ to the files are moved.
Remove the short cuts
____________ software allows anyone to reinstate data that has been deleted from a hard rive.
System recovery
The disk wiping process will actually __________ your entire hard drive with data, several times.
Overwrite
The government standard DoD 5520.22M, considered a medium security level, specifies _____________ iterations to completely overwrite a computer __________ times.
3,6
Cookies are used by a Web server to keep track of what?
Users activity on a specific website
Can a virus be spread with a cookie or access the hard drive of a computer?
No
Can cookies read a computers hard drive?
No