Intro to computer final Flashcards
All of the following are examples of real security and privacy risks except :
B. Spam
Surgeons can perform delicate operations by manipulating devices through computers instead of manually . This technology is known as :
A. Robotics
_ is the science that attempts to produce machines that display the same type of intelligences that humans do .
D. Artificial intelligence
A _ is approximately one billion bytes
C.gigabyte
All of the following are examples of input devices except a :
D: printer
The CPU and memory are located on the :!
B. Motherboard
Word processing , spreadsheet , and photo -editing are examples of :
A. Application software
Any computer parts going to actually touch are considered to be :
A. Hardware
Most common input devices are the _ and the _
D. Keyboard and mouse
And I-beam or an arrow is known as the mouse
D. Pointer
The _ is the number of times per second the electron beam scans the monitor and recharges the illumination of each pixel
A . Refresh rate
__ is when the more power-hungry components ,such as a monitor and the hard drive , are put in idle
B. Standby mode
usb ports are fast replacing traditional __ and __ board because of their ability to transfer data quickly
A. Parallel , serial
The __,House inside the system unit , regulates the wall voltage to the voltages required by the computer chips
D. Power supply
Flash drives plug into a
A. USB port
__ design , install , configure , and maintain the network equipment and infrastructure
A. Network administrators
Which of the following job types requires that an employee report for work to the same location each day and maintain regular core hours of attendance?
A. Office based
The Internet has its roots in the project started by
A. The u.s . Military
All of the following are media players except
D. Indie podder
Personal logs or journal entries posted on the web Are known as
C. Blogs
An area on the web many people come together to communicate online Isa
D. Chat room
All of the following are examples of multimedia except
B.text
One way to mark a site so that you can return to it later is to
A. Use favorites or bookmark
The Internet has its roots in __ , a four node network , funded by the US government for the military in the late 1960s
A.arpanet
The __ Shows on the website and the pages that you have visited over a period of time
D. History list
__ Are small text files that some website automatically store on your computers hard drive when you visit the site
A.cookies
The ad ware programs that are more intrusive and transmit information about you that your knowledge are considered
B.spyware
When you are on the Internet , your browser Keeps track of the website you have visited in the__ let it download them faster.
D. Cache
All of the following are examples of the word processing software except;
A.microsoft
To save an existing file with a new name at your new location, Should you use the__command .
D. Save as
The cell address C5 indicates that the cell
B. Is at row 5 , column c of the worksheet
All of the following terms are associated with spreadsheet software except;
D. Virus detection
Software refers to a set of instructions that tell computer what to do . These instruction sets are called
A. Programs
Microsoft PowerPoint and Corel presentations are examples of__software
B. Presentation
A table is a collection of related;
D. Records
Computer - Aided design software can do all of the following except;
A. Design and create a web page
Custom software , developed to address the specific needs of a company ,is known as the__software
D. Proprietary
CAD software is most likely to be used by :
B. Engineers
Repair for a known software bug ,usually available at no charge on the Internet it’s called an;
B. Patch
forms that provide the basic structure for a particular kind of document are known as;
B. Templates
What is the most common type of compatibility a software manufacturer will provide for new versions of the software
C. Backward compatibility but not forward compatibility
When installing software , You must except the__agreement before you can continue with the installation
A. Software
When available , The best way to remove an unwanted software application is true;
A. Use the applications uninstall program
Quality of a digital camera is determined by its
A. Resolution
The ___ is like a traffic cop the coordinates the flow of data and information through the computer system and provide a way for the user to interact with the computer
B. Compute r
THe MS-DOS operating system is a;
C. Command -driven interface , Single task operating system
Linux is a__operating system
C. Open source
Operating system does all of the following except:
D. Enable users to perform a specific task such as document editing
During the boot process, the __ looks for the system files
B. Bios
___ are list of commands that appear on the screen
C. Menus
___ is the ability of an operating system to control the activities of multiple programs at the same time
A. Multitasking
The Blocks of code, included in the operating system , The software applications interact with unknown as;
A. Application programming interfaces .
MS-DOS is a __ operating system
C.command driven
A spooler is an
C. Program that coordinates the print jobs that are waiting to print
virtual memory is the position located;
D. in the hard drive
According to Moore’s law:
D. Cpu capacity will double every year
The CPU does all of the following except;
A. Store data
Dram , SRAM , DDR , RAM are all types of :
C. Random access memory
___Storage refers to storage loses its data when the power is turned off
B.volatile
The Number of pixels displayed on the screen is known as;
A. Resolution
Which of the following portable storage devices is likely to have the lease storage capacity
Which of the following portable storage devices is likely to have the lease storage capacityC. Floppy disk
Device that converts binary data into the images that display on the monitor is called and :
B. Video card
Which of the following can be connected to an RJ-45 jack
D. Network connections
___Ports are replacing traditional parallel and serial port .
B . Usb
The network architecture used in most home networks is;
B. Peer - to - peer LAN
Design of the network is called the network;
A. Architecture
___Are the navigation devices that act as the “ traffic cops “ of the network and forward package to Nagy on the same network ( not beetween two networks )
C. Switches
The Home network is connected to the Internet__is required to send data between the two networks
A. Router
CAT 5 , CAT5E , and CAT 6 are all types of :
C. Utp cables
A wireless network uses__as it’s transmission media
B. Radio waves