Final Flashcards

1
Q

The ________ is(are) the group of programs that controls how your computer functions.

A

operating system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The ________ of the operating system enables the user to communicate with the computer system.

A

user interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Windows 8 is the operating system developed by ________.

A

Microsoft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A(n) ________ is a small program that performs general housekeeping tasks for your computer.

A

utility program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The most essential software in your computer system is the ________.

A

operating system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

All of the following are true about real-time operating systems (RTOS), EXCEPT ________.

A

they require significant user interaction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

All of the following are examples of network operating systems, EXCEPT ________.

A

OS X Mountain Cougar

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Robotic cameras used by television stations for sports events require a ________ operating system

A

real-time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following operating systems is used primarily with mainframes as a network operating system?

A

UNIX

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Most supercomputers use the ________ operating system

A

Linux

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following statements about a graphical user interface is FALSE?

A

A GUI is a command-driven interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

More than 50% of smartphones use an operating system developed by ________.

A

Google

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Each device attached to your computer comes with a special program called a ________ that facilitates communication between the device and the OS.

A

device driver

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The most popular tablet operating system was developed by

A

Apple

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following is the first step in the boot process?

A

The BIOS is activated by turning on the computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The top three operating systems for personal computers are ________.

A

Microsoft Windows, Mac OS X, and Linux

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The basic input/output system is stored on a ________ chip

A

ROM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which of the following is an open source operating system for personal computers?

A

Linux

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

The latest version of the Mac OS X is the ________.

A

Mountain Lion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

The OS enables you to organize the contents of your computer in a hierarchical structure of ________.

A

directories

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Errors in computer software are called

A

bugs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

All of the following can be used in a Windows file name, EXCEPT ________.

A

*

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

The location of a file is specified by its ________.

A

file path

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

The process of optimizing RAM storage by borrowing hard drive space is called ________.

A

virtual memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

For performing common tasks, Windows 8 has special shortcuts called ________.

A

charms

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Which of the following Windows utility programs arranges pieces of files on your hard drive in sequential order?

A

Disk Defragmenter

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Which of the following types of programs help manage system resources such as the hard drive?

A

Utility programs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

You can use the Windows ________ to check on a nonresponsive program

A

Task Manager

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Which utility takes out redundancies in a file to reduce the file size?

A

File Compression

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Mac OS X includes a backup utility called ________.

A

Time Machine

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

The rule of thumb that predicts that CPU capacity will double every two years is called ________.

A

Moore’s Law

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

All of the following are types of computer users, EXCEPT ________.

A

typical user

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

The dominant system processors on the market are made by ________.

A

Intel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Which of the following activities is carried out by the arithmetic logic unit (ALU)?

A

Completion of all arithmetic calculations

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

The CPU consists of which two parts?

A

The control unit and the arithmetic logic unit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

The control unit is one component of the ________.

A

CPU

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

Running the CPU at a faster speed than the manufacturer recommends is called ________.

A

overclocking

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

There are ________ levels of cache memory

A

3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

________ provides high-speed information processing by enabling a new set of instructions to start before the previous set is finished

A

Hyperthreading

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Cache memory levels are defined by ________.

A

the chip’s proximity to the CPU

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

The amount of RAM recommended for most systems today is measured in ________.

A

GB

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

RAM is an example of ________.

A

volatile

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

In most current systems ________ is the type of RAM used.

A

DDR3

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

The amount of RAM that is actually on the memory modules in your computer is the ________ memory.

A

physical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

Windows uses a memory-management technique known as ________ to monitor which applications you use the most and preloads them into your system memory.

A

SuperFetch

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

When referring to hard drives, access time is measured in ________.

A

milliseconds

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

The maximum memory you can install using the 64-bit version of Windows 8 Pro is ________ GB

A

192

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

Which is the fastest type of optical drive on the market?

A

Blu-ray drives

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

The ________ has the largest capacity of any storage device.

A

mechanical hard drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

A ________ uses electronic memory and has no motors or moving parts

A

solid state drive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

Two types of video memory are ________.

A

GDDR3 and GDDR5

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

All of the following are examples of optical drives, EXCEPT ________.

A

solid-state disc

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Running the Disk Defragmenter utility will ________.

A

make the hard drive work more efficiently

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Running the Disk Cleanup utility is a quick way to ________.

A

clear out unnecessary files

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

A(n) ________ is an expansion card that’s installed inside the system unit to translate data into images

A

video card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

Which statement pertaining to system reliability is FALSE?

A

An accumulation of temporary Internet files has no effect on your computer’s overall performance

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

Which of the following is NOT a main characteristic associated with desktop computers as compared to notebooks?

A

A desktop computer is more expensive

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

Laptops are often equipped with a(n) ________ slot that allows you to read flash memory cards such as CompactFlash, memory sticks, and secure digital cards

A

ExpressCard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

A(n) ________ enables the computer to drive the speaker system

A

sound card

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

All of the following are procedures you can follow to ensure your system performs reliably, EXCEPT ________.

A

run key utilities only when you can observe the process

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

______ is software that takes an existing Internet connection and turns it into a wireless hotspot

A

Connectify

62
Q

A computer network is defined as two or more computers connected via ________ so that they can communicate with each other

A

software and hardware

63
Q

A(n) ________ is a device connected to a network such as a computer or a game console.

A

node

64
Q

All of the following are benefits of networks EXCEPT,

A

sharing an operating system

65
Q

Network architectures are classified according to ________.

A

the way in which they are managed and the distance between their nodes

66
Q

All of the following involve tasks for network administration, EXCEPT ________.

A

purchasing initial equipment for the network

67
Q

________ is the maximum speed at which data can be transferred between two nodes.

A

Bandwidth

68
Q

All of the following are used to classify network architectures, EXCEPT ________.

A

the number of nodes on the network

69
Q

A ________ is a network located in your home that connects to all your digital devices

A

HAN

70
Q

A network used to communicate among devices close to one person is called a ________.

A

PAN

71
Q

A large network designed to provide access to a specific geographic area, such as a large city is a ________.

A

MAN

72
Q

Which transmission medium transmits data the fastest?

A

Fiber-optic cable

73
Q

A client/server network is an example of ________ administration

A

central

74
Q

Normal telephone cable is a type of ________.

A

twisted-pair cable

75
Q

A peer-to-peer network is an example of ________ administration

A

local

76
Q

Network adapters ________.

A

enable nodes in a network to communicate with each other

77
Q

The current version of wireless Ethernet is ________.

A

802.11n

78
Q

Sophisticated networks generally use which of the following hardware devices to ease the flow of data through the network?

A

Routers and switches

79
Q

Which of the following is NOT a type of cable used in wired networks?

A

Router cable

80
Q

Client/server networks are controlled by a central server that runs a specialized piece of software called ________.

A

a network operating system (NOS)

81
Q

Which of the following is NOT a type of UTP cable you would use in a wired Ethernet home network?

A

Cat7B

82
Q

For the nodes on a network to communicate with each other and access the network, each node needs a ________.

A

network adapter

83
Q

Data are sent through a network on bundles called ________.

A

packets

84
Q

The most popular transmission media option for wired Ethernet networks is ________.

A

unshielded twisted-pair (UTP) cable

85
Q

Wireless Internet is available using ________.

A

radio waves

86
Q

All of the following operating systems support P2P networking, EXCEPT ________.

A

Unix

87
Q

Using a network without the network owner’s permission is known as ________.

A

piggybacking

88
Q

SSID stands for ________.

A

service set identifier

89
Q

All of the following are extra precautions you can take to secure a wireless network, EXCEPT ________.

A

enable SSID broadcast

90
Q

The unique number assigned to a network adapter by the manufacturer is referred to as the ________ address

A

MAC

91
Q

A customizable watch that connects to your smartphone using Bluetooth is called _______

A

Pebble e-paper watch

92
Q

Images are a representation of light waves called ________ or continuous waves

A

analog

93
Q

What is Android?

A

An operating system for cell/smartphones

94
Q

A new Asus device that combines the features of a phone and a tablet is a ________.

A

Padfone

95
Q

The operating system of a cell phone is stored in ________

A

ROM

96
Q

An analog-to-digital converter chip ________.

A

converts the sound waves from a voice into digital signals

97
Q

A(n) ________ is included in a cell phone to handle the compression of data for it to be quickly transmitted to another phone

A

digital signal processor chip

98
Q

The primary input devices for smartphones are ________.

A

microphone and touch pad

99
Q

Which of the following uses radio waves to transmit data signals over short distances?

A

Bluetooth

100
Q

Google ________ is an online store that delivers software for mobile devices

A

play

101
Q

Text messaging is also called ________.

A

short message service (SMS)

102
Q

SMS delivers messages to the appropriate mobile device using ________ technology

A

store-and-forward

103
Q

A(n) ________ converts your voice’s sound waves into digital signals

A

analog-to-digital converter chip

104
Q

An Internet connectivity plan is also known as a ________.

A

data plan

105
Q

Almost all cell phones are designed with a ________ port

A

USB

106
Q

The choice communication mode of people aged 14 to 30 is ________

A

texting

107
Q

You can send messages that include photos and videos between mobile devices using ________ technology

A

multimedia message service (MMS)

108
Q

All of the following are advantages of VoIP, EXCEPT ________.

A

reliability

109
Q

All of the following are technologies used to transfer digital information, EXCEPT ________.

A

5G

110
Q

________ is a very well known free VoIP provider

A

Skype

111
Q

A portable media player can play files with all of the following file extensions, EXCEPT ________.

A

.doc

112
Q

The global positioning system is a network of ________ satellites plus 3 working spares

A

21

113
Q

To transfer files from your computer to your music device use a(n) ________ port

A

USB

114
Q

Which of the following describes the number of times an analog wave is measured each second during an analog-to-digital conversion?

A

Sampling rate

115
Q

The main difference between the tablet and smartphone is the ________.

A

screen size

116
Q

Which of the following statements is NOT true about the JPEG file format?

A

JPEGs are larger than raw files

117
Q

Devices that display textual information captured digitally are called ________.

A

e-readers

118
Q

________ is a single cable that carries all audio and video information from devices connected to a TV to the TV itself

A

HDMI

119
Q

All of the following are advantages of e-readers over paper books, EXCEPT ________.

A

common digital formats

120
Q

A ________ runs a traditional desktop operating system and is lightweight

A

netbook

121
Q

IC3 is a partnership between the ________.

A

FBI and National White Collar Crime Center

122
Q

All of the following are top cybercrimes reported to the IC3 in 2011, EXCEPT ________.

A

child pornography

123
Q

Which of the following is formally defined as any criminal action perpetrated primarily through the use of a computer?

A

Cybercrime

124
Q

All of the following are considered cybercrimes, EXCEPT ________.

A

theft of a cell phone

125
Q

Which of the following classifications of viruses can change its own code to avoid detection?

A

Polymorphic

126
Q

Creating and disseminating ________ is one of the most widespread types of cybercrimes.

A

computer viruses

127
Q

With regard to computer protection, quarantining is defined as ________.

A

placing a found virus in a secure area on the hard drive

128
Q

All of the following are ways that can infect your computer with a virus, EXCEPT ________.

A

logging into e-mail

129
Q

A(n) ________ is the portion of virus code that is unique to a particular computer virus.

A

virus signature

130
Q

One virus called ________ is used to trick users into downloading an infected file to their phone, which steals online banking information

A

Spyeye Mobile Banking

131
Q

A packet sniffer is a program that can enable a hacker to do all of the following, EXCEPT ________.

A

launch a denial of service (DoS) attack on your computer

132
Q

All of the following are categories of viruses, EXCEPT ________.

A

snakes

133
Q

You can block logical ports to invaders and make your computer invisible to others on the Internet by installing ________.

A

a firewall

134
Q

________ viruses are often transmitted by a flash drive left in a USB port

A

Boot-sector

135
Q

A ________ is a virus that is triggered on a certain date

A

time bomb

136
Q

________ floods a computer with requests until it shuts down and refuses to answer any requests for information

A

A DDoS attack

137
Q

A(n) ________ takes advantage of file transport methods to spread on their own

A

worm

138
Q

Configuring a firewall to ignore all incoming packets that request access to a specific port is known as ________.

A

logical port blocking

139
Q

A ________ virus changes its own code or periodically rewrites itself to avoid detection

A

polymorphic

140
Q

Rules for creating passwords include all of the following, EXCEPT _______

A

keep your password written down and stored in any easy-to-remember location

141
Q

Adware and spyware are referred to collectively as ________.

A

grayware

142
Q

All of the following are the main functions of antivirus software, EXCEPT ________.

A

assassinating all viruses

143
Q

________ is an unwanted piggyback program that usually downloads with software you are installing from the Internet

A

Spyware

144
Q

________ hackers break into systems for non-malicious reasons such as to test system security vulnerabilities

A

White-hat

145
Q

Which of the following statements about cookies is NOT true?

A

Cookies obtain your personal information by searching your hard drive

146
Q

A ________ is named after a housing construction feature that slows the spread of fires from house to house

A

firewall

147
Q

Social ________ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information

A

engineering

148
Q

The protocol using port 53 is ________.

A

DNS

149
Q

Which of these statements about physically protecting your computer is FALSE?

A

Power surges can be blocked by using a computer surround

150
Q

When malicious code is planted on your computer and alters your browser’s ability to find Web addresses it is known as ________.

A

pharming