Final Flashcards

1
Q

The ________ is(are) the group of programs that controls how your computer functions.

A

operating system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The ________ of the operating system enables the user to communicate with the computer system.

A

user interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Windows 8 is the operating system developed by ________.

A

Microsoft

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A(n) ________ is a small program that performs general housekeeping tasks for your computer.

A

utility program

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The most essential software in your computer system is the ________.

A

operating system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

All of the following are true about real-time operating systems (RTOS), EXCEPT ________.

A

they require significant user interaction

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

All of the following are examples of network operating systems, EXCEPT ________.

A

OS X Mountain Cougar

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Robotic cameras used by television stations for sports events require a ________ operating system

A

real-time

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Which of the following operating systems is used primarily with mainframes as a network operating system?

A

UNIX

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Most supercomputers use the ________ operating system

A

Linux

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Which of the following statements about a graphical user interface is FALSE?

A

A GUI is a command-driven interface

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

More than 50% of smartphones use an operating system developed by ________.

A

Google

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Each device attached to your computer comes with a special program called a ________ that facilitates communication between the device and the OS.

A

device driver

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The most popular tablet operating system was developed by

A

Apple

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Which of the following is the first step in the boot process?

A

The BIOS is activated by turning on the computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The top three operating systems for personal computers are ________.

A

Microsoft Windows, Mac OS X, and Linux

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The basic input/output system is stored on a ________ chip

A

ROM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which of the following is an open source operating system for personal computers?

A

Linux

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

The latest version of the Mac OS X is the ________.

A

Mountain Lion

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

The OS enables you to organize the contents of your computer in a hierarchical structure of ________.

A

directories

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Errors in computer software are called

A

bugs

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

All of the following can be used in a Windows file name, EXCEPT ________.

A

*

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

The location of a file is specified by its ________.

A

file path

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

The process of optimizing RAM storage by borrowing hard drive space is called ________.

A

virtual memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
For performing common tasks, Windows 8 has special shortcuts called ________.
charms
26
Which of the following Windows utility programs arranges pieces of files on your hard drive in sequential order?
Disk Defragmenter
27
Which of the following types of programs help manage system resources such as the hard drive?
Utility programs
28
You can use the Windows ________ to check on a nonresponsive program
Task Manager
29
Which utility takes out redundancies in a file to reduce the file size?
File Compression
30
Mac OS X includes a backup utility called ________.
Time Machine
31
The rule of thumb that predicts that CPU capacity will double every two years is called ________.
Moore's Law
32
All of the following are types of computer users, EXCEPT ________.
typical user
33
The dominant system processors on the market are made by ________.
Intel
34
Which of the following activities is carried out by the arithmetic logic unit (ALU)?
Completion of all arithmetic calculations
35
The CPU consists of which two parts?
The control unit and the arithmetic logic unit
36
The control unit is one component of the ________.
CPU
37
Running the CPU at a faster speed than the manufacturer recommends is called ________.
overclocking
38
There are ________ levels of cache memory
3
39
________ provides high-speed information processing by enabling a new set of instructions to start before the previous set is finished
Hyperthreading
40
Cache memory levels are defined by ________.
the chip's proximity to the CPU
41
The amount of RAM recommended for most systems today is measured in ________.
GB
42
RAM is an example of ________.
volatile
43
In most current systems ________ is the type of RAM used.
DDR3
44
The amount of RAM that is actually on the memory modules in your computer is the ________ memory.
physical
45
Windows uses a memory-management technique known as ________ to monitor which applications you use the most and preloads them into your system memory.
SuperFetch
46
When referring to hard drives, access time is measured in ________.
milliseconds
47
The maximum memory you can install using the 64-bit version of Windows 8 Pro is ________ GB
192
48
Which is the fastest type of optical drive on the market?
Blu-ray drives
49
The ________ has the largest capacity of any storage device.
mechanical hard drive
50
A ________ uses electronic memory and has no motors or moving parts
solid state drive
51
Two types of video memory are ________.
GDDR3 and GDDR5
52
All of the following are examples of optical drives, EXCEPT ________.
solid-state disc
53
Running the Disk Defragmenter utility will ________.
make the hard drive work more efficiently
54
Running the Disk Cleanup utility is a quick way to ________.
clear out unnecessary files
55
A(n) ________ is an expansion card that's installed inside the system unit to translate data into images
video card
56
Which statement pertaining to system reliability is FALSE?
An accumulation of temporary Internet files has no effect on your computer's overall performance
57
Which of the following is NOT a main characteristic associated with desktop computers as compared to notebooks?
A desktop computer is more expensive
58
Laptops are often equipped with a(n) ________ slot that allows you to read flash memory cards such as CompactFlash, memory sticks, and secure digital cards
ExpressCard
59
A(n) ________ enables the computer to drive the speaker system
sound card
60
All of the following are procedures you can follow to ensure your system performs reliably, EXCEPT ________.
run key utilities only when you can observe the process
61
______ is software that takes an existing Internet connection and turns it into a wireless hotspot
Connectify
62
A computer network is defined as two or more computers connected via ________ so that they can communicate with each other
software and hardware
63
A(n) ________ is a device connected to a network such as a computer or a game console.
node
64
All of the following are benefits of networks EXCEPT,
sharing an operating system
65
Network architectures are classified according to ________.
the way in which they are managed and the distance between their nodes
66
All of the following involve tasks for network administration, EXCEPT ________.
purchasing initial equipment for the network
67
________ is the maximum speed at which data can be transferred between two nodes.
Bandwidth
68
All of the following are used to classify network architectures, EXCEPT ________.
the number of nodes on the network
69
A ________ is a network located in your home that connects to all your digital devices
HAN
70
A network used to communicate among devices close to one person is called a ________.
PAN
71
A large network designed to provide access to a specific geographic area, such as a large city is a ________.
MAN
72
Which transmission medium transmits data the fastest?
Fiber-optic cable
73
A client/server network is an example of ________ administration
central
74
Normal telephone cable is a type of ________.
twisted-pair cable
75
A peer-to-peer network is an example of ________ administration
local
76
Network adapters ________.
enable nodes in a network to communicate with each other
77
The current version of wireless Ethernet is ________.
802.11n
78
Sophisticated networks generally use which of the following hardware devices to ease the flow of data through the network?
Routers and switches
79
Which of the following is NOT a type of cable used in wired networks?
Router cable
80
Client/server networks are controlled by a central server that runs a specialized piece of software called ________.
a network operating system (NOS)
81
Which of the following is NOT a type of UTP cable you would use in a wired Ethernet home network?
Cat7B
82
For the nodes on a network to communicate with each other and access the network, each node needs a ________.
network adapter
83
Data are sent through a network on bundles called ________.
packets
84
The most popular transmission media option for wired Ethernet networks is ________.
unshielded twisted-pair (UTP) cable
85
Wireless Internet is available using ________.
radio waves
86
All of the following operating systems support P2P networking, EXCEPT ________.
Unix
87
Using a network without the network owner's permission is known as ________.
piggybacking
88
SSID stands for ________.
service set identifier
89
All of the following are extra precautions you can take to secure a wireless network, EXCEPT ________.
enable SSID broadcast
90
The unique number assigned to a network adapter by the manufacturer is referred to as the ________ address
MAC
91
A customizable watch that connects to your smartphone using Bluetooth is called _______
Pebble e-paper watch
92
Images are a representation of light waves called ________ or continuous waves
analog
93
What is Android?
An operating system for cell/smartphones
94
A new Asus device that combines the features of a phone and a tablet is a ________.
Padfone
95
The operating system of a cell phone is stored in ________
ROM
96
An analog-to-digital converter chip ________.
converts the sound waves from a voice into digital signals
97
A(n) ________ is included in a cell phone to handle the compression of data for it to be quickly transmitted to another phone
digital signal processor chip
98
The primary input devices for smartphones are ________.
microphone and touch pad
99
Which of the following uses radio waves to transmit data signals over short distances?
Bluetooth
100
Google ________ is an online store that delivers software for mobile devices
play
101
Text messaging is also called ________.
short message service (SMS)
102
SMS delivers messages to the appropriate mobile device using ________ technology
store-and-forward
103
A(n) ________ converts your voice's sound waves into digital signals
analog-to-digital converter chip
104
An Internet connectivity plan is also known as a ________.
data plan
105
Almost all cell phones are designed with a ________ port
USB
106
The choice communication mode of people aged 14 to 30 is ________
texting
107
You can send messages that include photos and videos between mobile devices using ________ technology
multimedia message service (MMS)
108
All of the following are advantages of VoIP, EXCEPT ________.
reliability
109
All of the following are technologies used to transfer digital information, EXCEPT ________.
5G
110
________ is a very well known free VoIP provider
Skype
111
A portable media player can play files with all of the following file extensions, EXCEPT ________.
.doc
112
The global positioning system is a network of ________ satellites plus 3 working spares
21
113
To transfer files from your computer to your music device use a(n) ________ port
USB
114
Which of the following describes the number of times an analog wave is measured each second during an analog-to-digital conversion?
Sampling rate
115
The main difference between the tablet and smartphone is the ________.
screen size
116
Which of the following statements is NOT true about the JPEG file format?
JPEGs are larger than raw files
117
Devices that display textual information captured digitally are called ________.
e-readers
118
________ is a single cable that carries all audio and video information from devices connected to a TV to the TV itself
HDMI
119
All of the following are advantages of e-readers over paper books, EXCEPT ________.
common digital formats
120
A ________ runs a traditional desktop operating system and is lightweight
netbook
121
IC3 is a partnership between the ________.
FBI and National White Collar Crime Center
122
All of the following are top cybercrimes reported to the IC3 in 2011, EXCEPT ________.
child pornography
123
Which of the following is formally defined as any criminal action perpetrated primarily through the use of a computer?
Cybercrime
124
All of the following are considered cybercrimes, EXCEPT ________.
theft of a cell phone
125
Which of the following classifications of viruses can change its own code to avoid detection?
Polymorphic
126
Creating and disseminating ________ is one of the most widespread types of cybercrimes.
computer viruses
127
With regard to computer protection, quarantining is defined as ________.
placing a found virus in a secure area on the hard drive
128
All of the following are ways that can infect your computer with a virus, EXCEPT ________.
logging into e-mail
129
A(n) ________ is the portion of virus code that is unique to a particular computer virus.
virus signature
130
One virus called ________ is used to trick users into downloading an infected file to their phone, which steals online banking information
Spyeye Mobile Banking
131
A packet sniffer is a program that can enable a hacker to do all of the following, EXCEPT ________.
launch a denial of service (DoS) attack on your computer
132
All of the following are categories of viruses, EXCEPT ________.
snakes
133
You can block logical ports to invaders and make your computer invisible to others on the Internet by installing ________.
a firewall
134
________ viruses are often transmitted by a flash drive left in a USB port
Boot-sector
135
A ________ is a virus that is triggered on a certain date
time bomb
136
________ floods a computer with requests until it shuts down and refuses to answer any requests for information
A DDoS attack
137
A(n) ________ takes advantage of file transport methods to spread on their own
worm
138
Configuring a firewall to ignore all incoming packets that request access to a specific port is known as ________.
logical port blocking
139
A ________ virus changes its own code or periodically rewrites itself to avoid detection
polymorphic
140
Rules for creating passwords include all of the following, EXCEPT _______
keep your password written down and stored in any easy-to-remember location
141
Adware and spyware are referred to collectively as ________.
grayware
142
All of the following are the main functions of antivirus software, EXCEPT ________.
assassinating all viruses
143
________ is an unwanted piggyback program that usually downloads with software you are installing from the Internet
Spyware
144
________ hackers break into systems for non-malicious reasons such as to test system security vulnerabilities
White-hat
145
Which of the following statements about cookies is NOT true?
Cookies obtain your personal information by searching your hard drive
146
A ________ is named after a housing construction feature that slows the spread of fires from house to house
firewall
147
Social ________ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information
engineering
148
The protocol using port 53 is ________.
DNS
149
Which of these statements about physically protecting your computer is FALSE?
Power surges can be blocked by using a computer surround
150
When malicious code is planted on your computer and alters your browser's ability to find Web addresses it is known as ________.
pharming