True/False Flashcards
Transcoding digital videos does not cause a loss of quality.
F
In digital video, a lower resolution reduces the bit rate.
T
Bitmap graphics are resolution dependent because each element is a discrete pixel.
Upgrade to remove ads
Only $1/month
T
All of the data stored and transmitted by digital devices is encoded as bits.
T
Regardless of sampling rate, digital audio file size can be reduced using audio compression techniques.
T
Instead of storing the color value for each pixel, a vector graphics file contains instructions that a computer uses to create the shape, size, position, and color for each object in an image.
T
An example of system software is a computer operating system.
T
A solid state drive can be used as a substitute for a hard disk drive.
T
The term instruction cycle refers to the process in which a computer executes a single instruction.
Upgrade to remove ads
Only $1/month
T
System software is a set of computer programs that helps a person carry out a task.
F
Smartphones evolved from basic cell phones and personal digital assistants (PDAs).
T
A slate tablet configuration is basically a screen in a narrow frame that lacks a physical keyboard.
T
Component systems are currently the most popular form factor for digital devices.
F
A hard disk drive is an example of magnetic storage.
T
Land-grid arrays (LGAs) have two rows of pins that connect the chip to a circuit board.
F
Random access memory (RAM) is volatile.
T
A desktop is a portable computing device featuring a touch-sensitive screen that can be used for input as well as for output.
F
ARM-based processors are not especially energy efficient.
Upgrade to remove ads
Only $1/month
F
Modern processors follow Intel’s original numbering sequence.
F
Processing is handled by the computer’s CPU.
T
Read-only memory (ROM) is temporary and volatile. RAM is more permanent and non-volatile.
F
Many RFID (radio-frequency identification) and NFC (near field communication) tags contain no power source of their own and depend on the receiving device to provide the power for data exchange.
T
A Web site cannot be accessed by its domain name until the name is added to the domain name server lists.
T
When connecting to the Internet, most Internet users connect to a Tier 1 network.
Upgrade to remove ads
Only $1/month
F
Mobile broadband can be used to access the Internet from a laptop or desktop computer.
T
The Internet is the world’s largest WAN.
T
LANs use many of the same network technologies as the Internet.
T
Most wireless LANs use licensed frequencies that require applying to the Federal Communications Commission (FCC) for permission.
F
Packet loss of less than 2% is required for acceptable streaming, gaming, Skype, and voice calls.
T
Most Internet connections are symmetrical.
F
Dropbox is an example of a file hosting service.
T
You may be able to bypass DNS outages by changing your DNS server.
T
When setting up a Wi-Fi network, the router you select should support the fastest device you’ll want to use on the network.
Upgrade to remove ads
Only $1/month
T
Wi-Fi signals may reach up to 300 feet from the router.
T
Domain name servers maintain lists of all domain names and their corresponding IP addresses.
T
Microwaves have more carrying capacity than radio waves.
T
When interference affects a wireless signal, data must be retransmitted.
T
With wired connections, such as Ethernet, the rated speed and range are usually quite different to actual performance.
F
The organization that supervises Internet addressing is ARPANET.
F
UDP (User Datagram Protocol) is faster than TCP (Transmission Control Protocol) but does not perform error checking.
T
You can access FTP servers with a browser.
T
You can use multiple browsers on a device.
T
You can think of HTTP as the system that browsers use to communicate with a Web server and ask for HTML documents.
T
An HTML document begins with the DOCTYPE and declarations.
F
Most search engines keep a record of users’ search history.
T
Web sites can be spread across multiple Web servers.
T
It is not possible to delete the contents of your browser cache.
F
URLs contain a domain name.
T
An HTML document consists of three sections: the head, the body, and the content.
F
Your search history is the same as your browser history.
F
HTML is the only markup language used on the Web.
F
In an HTML document, most tags are inserted as pairs.
T
Session cookies are stored on a disk or other permanent storage medium.
Upgrade to remove ads
Only $1/month
F
HTTP is the markup language used to specify the contents of a Web page.
F
In today’s Web, most Web pages have bidirectional links.
F
The file name of a specific Web page always appears first in the URL.
F
Public key encryption requires one key to encrypt data but a different key to decrypt it.
T
If you allow your browser to store passwords, you no longer need to worry about security for those passwords.
F
In Wikipedia, it is possible to edit the text of most articles.
T
Webmail is typically a free service.
T
By some estimates, nearly 40% of all online identities are fake.
Upgrade to remove ads
Only $1/month
T
Crowdsourcing is based on contributions from groups of individuals, but it differs from collaborative work.
T
On mobile devices, Voice over Internet Protocol (VoIP) uses the voice stream, not the data stream.
F
Geocoding is the process of adding location data to photos, Web sites, hypertext markup language (HTML) documents, audio files, blog posts, and text messages.
F
Webmail is configured so that incoming messages are stored in an Inbox on your local storage device.
F
IM technology offers a degree of anonymity because typed messages have no associated voice or video.
T
Private messages can be forwarded by recipients, so they do not necessarily remain private.
T
Privacy is only important if you have something to hide.
F
Wiki software provides a set of tools for creating and editing content.
T
Microsoft Windows is used exclusively on desktop systems.
F
There is a universal standard for categorizing software, and various categorization schemes have few similarities.
F
Most handheld devices can use either Web apps or mobile apps but not both.
Upgrade to remove ads
Only $1/month
F
If you wanted to run multiple operating systems simultaneously on one computer, you would use a virtual machine.
T
A formula, such as =B6+(C6*.1), does not contain cell references.
F
Every peripheral device connected to a computer is regarded as an input or output resource.
T
The term service pack usually applies to operating system updates.
T
Within a single program, multiprocessing allows multiple commands, or threads, to run simultaneously.
F
Partitions are created, modified, and deleted using Filezilla on Macs and Disk Partitioner on PCs.
F
Mobile devices tend to be populated by entertainment apps, games, and social media services.
T
You won’t find a desktop with application windows on an iOS device.
T
Some database software provides tools to work with more than one collection of records, as long as the records are somehow related to each other.
Upgrade to remove ads
Only $1/month
T
The kernel stays in random access memory (RAM) the entire time your computer is on.
T
Paragraph style includes the alignment of text within the margins and the space between each line of text.
T
Any data entering a digital device could be malware.
T
Blacklist and header filtering are usually performed by email clients and Webmail services.
F
The objective of a MITM attack is for a third party to block communications between two entities.
Upgrade to remove ads
Only $1/month
F
Most mass-mailing databases are legitimately compiled from customer lists.
F
Hackers can use ports to communicate with devices in botnets.
T
Heuristics may produce false positives that mistakenly identify a legitimate file as malware.
T
If a hacker intercepts encrypted data by way of a MITM attack, the contents of that data is not always secure.
T