cosc Flashcards

1
Q

A byte’s ______is a unique number that identifies the location of a byte in memory.

A

address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

true or false: Flash memory is a type of nonvolatile memory that can be erased electronically and rewritten.

A

true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

true or false: The speed of the system clock has no effect on peripheral devices.

A

true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

true or false: If your computer requires that you install memory in pairs, it doesn’t matter if the two memory modules are the same type, size, or speed

A

false

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Why is fiash memory considered nonvolatile?

A

It retains data even when it is not receiving power.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

an ____ bus is used to transfer information about where the data should reside in memory

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

true or false: DRAM chips are faster and more reliable than SRAM chips.

A

false

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The system generates regular electronic pulses that set the operating pace of the system unit.
clock

A

clock

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

true or false :A front side bus is part of the motherboard and connects the processor to main memory.

A

true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

CPU stands for central____ unit

A

processing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

true or false: Many newer mobile devices and computers, such as some ultrathin laptops, do not have removable batteries

A

true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Flash memory is a type of

A

EEPROM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The motherboard is sometimes called a(n)____
board.

A

system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which cache level uses ATC?

A

L2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

DaaS stands for
as a service.

A

data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

true or false: The Internet of Things can help to streamline a company’s production and manufacturing processes.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A(n) _____bus connects the processor to cache.

A

backside

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

true or false: RAM is an example of nonvolatile memory

A

false

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Peripheral devices normally occupy space inside of the system unit.

A

false

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

true or false: A session cookie stores user names and/or passwords so that users do not need to enter this information every time they sign in to the website.

A

false

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

true or false Piracy is the most common form of software theft

A

true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

PiN ____ stands for personal identification

A

number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

true or false: With a credit card purchase, when users sign their name on a signature capture pad using a stylus, the retailer uses a signature verification system to authenticate the use

A

false

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is the name for a device infected with malware that an attacker uses to control the device remotely?

A

zombie

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Secure websites_____
information before sending it between computers

A

encrypt

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

true or false: The website for GERT/CC provides information about internet security breaches

A

true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

A(n)
or allowed/not allowed
Is a written guideline that helps determine whether a specification is ethical/unethical

A

code of conduct

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

An)
is a tool hackers use to record your keystrokes

A

keylogger

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

true or false:common digital security risks include information theft and system failure

A

true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

true or false: Software used to fight cybercriminals is called crimeware.

A

false

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

true or false: A hand geometry system measures the size and shape of a person’s hand

A

true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

malware is short for ____ software

A

malicious

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

true or false: Unusually high drive activity or a slower than normal Internet activity are signs that your computer or mobile device may be a zombie

A

true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

When creating passwords for online accounts.
you should

A

use a different password for each account

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

true or false: a rootkit can be a backdoor

A

true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Which of the following is not recommended to protect against hardware failure?

A

cables and locks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

How does Windows Hello work to authenticate you?

A

It scans and verifies your fingerprnt, face, or its

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

an ____ was originally a complimentary work for a computer enthusiast

A

hacker

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Passcode is another term for a(n)

A

PIN

40
Q

true or false: A smartphone is an Internet-capable phone that usually also includes a calendar, an address book, a calculator, a notepad, games, brows

A

true

41
Q

true or false : If you are purchasing a new desktop, chances are it will include the latest version of your preferred operating system.

A

true

42
Q

true or false : Malware creators are targeting smartphones, particularly those using the Android operating system.

A

true

43
Q

Lighting. HDMI, and Thunderbolt are all types of

A

ports

44
Q

true or false : A mainframe is a network of several servers together in a single location.

A

false

45
Q

true or false : A point-and-shoot camera is a high-end digital camera that has interchangeable lenses.

A

false

46
Q

true or false: Once example of the trend called the Internet of Things is if your refrigerator sends your phone a message that you need milk
Selected Answer:

A

true

47
Q

Which of the following components most affects a computer’s speed?

A

cpu

48
Q

_____is the process of initiating contact between two Bluetooth devices.

A

pairing

49
Q

true or false : An ATM asks you to enter a numeric password, called a PIN, which stands for Private Identity Name.

A

false

50
Q

true or false: A docking station has less functionality than a port replicator.

A

false

51
Q

true or false: Smartphones and other mobile devices often can function as a portable media player.

A

true

52
Q

Fitness games often communicate with a(n)|
board, which is shaped like a weight scale and contains sensors.

A

balance

53
Q

With
voice mail, users can view message details, and in some cases read message contents without listening to them

A

visual

54
Q

true or false : Many handheld computers are industry-specific, such as for parcel delivery peopie.

A

true

55
Q

A frame that houses the system unit on a desktop is called a(n)

A

tower

56
Q

true or false: keyboard, mouse, and microphone ali are exampies of peripheral devices

A

true

57
Q

Which of the following server types is in the form of a single circuit board?

A

blade

58
Q

true or false: Most computers and electronic devices are analog, which uses only two discrete states, on and off

A

false

59
Q

Which of the following best describes an ultrabook?

A

A thin laptop that uses a low-power processor

60
Q

What is a blog?

A

a website organized by biog posts, or individual news stories

61
Q

an ____ site, such as Pinterest, is a website that enables members to organize, tag, and share links to media and other online content

A

bookmarking

62
Q

GPS stands for

A

global positioning system

63
Q

_____an abusive or insulting message in online communication,

A

flame

64
Q

Why might you want to set up a personal hotspot?

A

Security a personal hotspot is more secure than a public network.

65
Q

DSL and FTTP are examples of wired_____
Internet service technologies.

A

boardband

66
Q

Which of the following is NOT true about public Wi-Fi hot spot safety?

A

Always keep your wireless connection on

67
Q

Which of the following is not a way cybercriminals try to gather your personal information on social media sites?

A

blocking your friend requests

68
Q

With an all-in-one computer the display device is separate from the tower.

A

false

69
Q

true or false : A gigabyte is equal to approximately a million characters:

A

false

70
Q

What part of http://www.nps.gov/history/preserve-places.html is the protocol?

A

http://

71
Q

true or false : ICANN currently manages domain names.

A

false

72
Q

A result from a search engine search is called a(n).

A

hit

73
Q

true or false: Using a subject directory, you locate a particular topic by clicking links through different levels

A

true

74
Q

When attackers use third-party ads to infect your computer with malware, it is called

A

malvertising

75
Q

Skype is an example of
software,

A

VolP

76
Q

The major carriers of network traffic are known collectively as the internet

A

backdone

77
Q

true or false :A web feed contains links to or information about updated or changed content on a website.

A

true

78
Q

if you use an asterisk (*) in a search engine query, what are you trying to do?

A

Substitute characters.

79
Q

Cable and DSL internet connections are called

A

broadband

80
Q

an ____network is a system that attempts to intiate the behavior of the human brain

A

neural

81
Q

true or false flash memory has many moving parts, making it less durable and shock resistant than other types of media

A

false

82
Q

which internet communication service can you use to transfer items to and from other computers in the internet

A

FTP

83
Q

which of the following is not a basic function of a computer
- accept data
- store information
- process data
- produce input

A

produce input

84
Q

www.cengagebrain.com is an example of a valid web _____

A

address

85
Q

true or false - a password is a unique combination of characters that identifies one specific user

A

false

86
Q

a collection of related instructions organized for a common purpose is referred to as ___

A

software

87
Q

activity trackers and smartwatches are two types of _____ devices

A

wearables

88
Q

by subscribing to an isp, you can connect to the internet through your computers and mobile devices

A

true

89
Q

true or false :engineers, scientists, architects, game designers, and graphic artists are examples of power users

A

true

90
Q

an _______ is a set of program that coordinates all the activities among computers or mobile devices

A

operating system

91
Q

digital device ______is the trend of computers and devices with technologies that overlap

A

convergence

92
Q

____ consist of electronic components that store instructions and data waiting to be executed

A

memory

93
Q

a common way to display a shortcut menu using a mouse is to ___

A

right click

94
Q

true of false- storage consists of electronic components that store instructions and data waiting to be executed

A

false

95
Q

compressed files sometimes are called ___ files

A

zipped

96
Q

true or false - because the are compressed you usaully cannot use backup files in their backup from

A

true

97
Q

sales, marketing, and manufacturing are all types of software typically used by

A

enterprise