cosc Flashcards
A byte’s ______is a unique number that identifies the location of a byte in memory.
address
true or false: Flash memory is a type of nonvolatile memory that can be erased electronically and rewritten.
true
true or false: The speed of the system clock has no effect on peripheral devices.
true
true or false: If your computer requires that you install memory in pairs, it doesn’t matter if the two memory modules are the same type, size, or speed
false
Why is fiash memory considered nonvolatile?
It retains data even when it is not receiving power.
an ____ bus is used to transfer information about where the data should reside in memory
true or false: DRAM chips are faster and more reliable than SRAM chips.
false
The system generates regular electronic pulses that set the operating pace of the system unit.
clock
clock
true or false :A front side bus is part of the motherboard and connects the processor to main memory.
true
CPU stands for central____ unit
processing
true or false: Many newer mobile devices and computers, such as some ultrathin laptops, do not have removable batteries
true
Flash memory is a type of
EEPROM
The motherboard is sometimes called a(n)____
board.
system
Which cache level uses ATC?
L2
DaaS stands for
as a service.
data
true or false: The Internet of Things can help to streamline a company’s production and manufacturing processes.
True
A(n) _____bus connects the processor to cache.
backside
true or false: RAM is an example of nonvolatile memory
false
Peripheral devices normally occupy space inside of the system unit.
false
true or false: A session cookie stores user names and/or passwords so that users do not need to enter this information every time they sign in to the website.
false
true or false Piracy is the most common form of software theft
true
PiN ____ stands for personal identification
number
true or false: With a credit card purchase, when users sign their name on a signature capture pad using a stylus, the retailer uses a signature verification system to authenticate the use
false
What is the name for a device infected with malware that an attacker uses to control the device remotely?
zombie
Secure websites_____
information before sending it between computers
encrypt
true or false: The website for GERT/CC provides information about internet security breaches
true
A(n)
or allowed/not allowed
Is a written guideline that helps determine whether a specification is ethical/unethical
code of conduct
An)
is a tool hackers use to record your keystrokes
keylogger
true or false:common digital security risks include information theft and system failure
true
true or false: Software used to fight cybercriminals is called crimeware.
false
true or false: A hand geometry system measures the size and shape of a person’s hand
true
malware is short for ____ software
malicious
true or false: Unusually high drive activity or a slower than normal Internet activity are signs that your computer or mobile device may be a zombie
true
When creating passwords for online accounts.
you should
use a different password for each account
true or false: a rootkit can be a backdoor
true
Which of the following is not recommended to protect against hardware failure?
cables and locks
How does Windows Hello work to authenticate you?
It scans and verifies your fingerprnt, face, or its
an ____ was originally a complimentary work for a computer enthusiast
hacker