True/False Flashcards

1
Q

Transcoding digital videos does not cause a loss of quality.

A

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

In digital video, a lower resolution reduces the bit rate.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Bitmap graphics are resolution dependent because each element is a discrete pixel.
Upgrade to remove ads
Only $1/month

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

All of the data stored and transmitted by digital devices is encoded as bits.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Regardless of sampling rate, digital audio file size can be reduced using audio compression techniques.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Instead of storing the color value for each pixel, a vector graphics file contains instructions that a computer uses to create the shape, size, position, and color for each object in an image.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

An example of system software is a computer operating system.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A solid state drive can be used as a substitute for a hard disk drive.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The term instruction cycle refers to the process in which a computer executes a single instruction.
Upgrade to remove ads
Only $1/month

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

System software is a set of computer programs that helps a person carry out a task.

A

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Smartphones evolved from basic cell phones and personal digital assistants (PDAs).

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A slate tablet configuration is basically a screen in a narrow frame that lacks a physical keyboard.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Component systems are currently the most popular form factor for digital devices.

A

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A hard disk drive is an example of magnetic storage.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Land-grid arrays (LGAs) have two rows of pins that connect the chip to a circuit board.

A

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Random access memory (RAM) is volatile.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A desktop is a portable computing device featuring a touch-sensitive screen that can be used for input as well as for output.

A

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

ARM-based processors are not especially energy efficient.
Upgrade to remove ads
Only $1/month

A

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Modern processors follow Intel’s original numbering sequence.

A

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Processing is handled by the computer’s CPU.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Read-only memory (ROM) is temporary and volatile. RAM is more permanent and non-volatile.

A

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Many RFID (radio-frequency identification) and NFC (near field communication) tags contain no power source of their own and depend on the receiving device to provide the power for data exchange.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

A Web site cannot be accessed by its domain name until the name is added to the domain name server lists.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

When connecting to the Internet, most Internet users connect to a Tier 1 network.
Upgrade to remove ads
Only $1/month

A

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Mobile broadband can be used to access the Internet from a laptop or desktop computer.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

The Internet is the world’s largest WAN.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

LANs use many of the same network technologies as the Internet.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Most wireless LANs use licensed frequencies that require applying to the Federal Communications Commission (FCC) for permission.

A

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Packet loss of less than 2% is required for acceptable streaming, gaming, Skype, and voice calls.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Most Internet connections are symmetrical.

A

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Dropbox is an example of a file hosting service.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

You may be able to bypass DNS outages by changing your DNS server.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

When setting up a Wi-Fi network, the router you select should support the fastest device you’ll want to use on the network.
Upgrade to remove ads
Only $1/month

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Wi-Fi signals may reach up to 300 feet from the router.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Domain name servers maintain lists of all domain names and their corresponding IP addresses.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Microwaves have more carrying capacity than radio waves.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

When interference affects a wireless signal, data must be retransmitted.

A

T

38
Q

With wired connections, such as Ethernet, the rated speed and range are usually quite different to actual performance.

A

F

39
Q

The organization that supervises Internet addressing is ARPANET.

A

F

40
Q

UDP (User Datagram Protocol) is faster than TCP (Transmission Control Protocol) but does not perform error checking.

A

T

41
Q

You can access FTP servers with a browser.

A

T

42
Q

You can use multiple browsers on a device.

A

T

43
Q

You can think of HTTP as the system that browsers use to communicate with a Web server and ask for HTML documents.

A

T

44
Q

An HTML document begins with the DOCTYPE and declarations.

A

F

45
Q

Most search engines keep a record of users’ search history.

A

T

46
Q

Web sites can be spread across multiple Web servers.

A

T

47
Q

It is not possible to delete the contents of your browser cache.

A

F

48
Q

URLs contain a domain name.

A

T

49
Q

An HTML document consists of three sections: the head, the body, and the content.

A

F

50
Q

Your search history is the same as your browser history.

A

F

51
Q

HTML is the only markup language used on the Web.

A

F

52
Q

In an HTML document, most tags are inserted as pairs.

A

T

53
Q

Session cookies are stored on a disk or other permanent storage medium.
Upgrade to remove ads
Only $1/month

A

F

54
Q

HTTP is the markup language used to specify the contents of a Web page.

A

F

55
Q

In today’s Web, most Web pages have bidirectional links.

A

F

56
Q

The file name of a specific Web page always appears first in the URL.

A

F

57
Q

Public key encryption requires one key to encrypt data but a different key to decrypt it.

A

T

58
Q

If you allow your browser to store passwords, you no longer need to worry about security for those passwords.

A

F

59
Q

In Wikipedia, it is possible to edit the text of most articles.

A

T

60
Q

Webmail is typically a free service.

A

T

61
Q

By some estimates, nearly 40% of all online identities are fake.
Upgrade to remove ads
Only $1/month

A

T

62
Q

Crowdsourcing is based on contributions from groups of individuals, but it differs from collaborative work.

A

T

63
Q

On mobile devices, Voice over Internet Protocol (VoIP) uses the voice stream, not the data stream.

A

F

64
Q

Geocoding is the process of adding location data to photos, Web sites, hypertext markup language (HTML) documents, audio files, blog posts, and text messages.

A

F

65
Q

Webmail is configured so that incoming messages are stored in an Inbox on your local storage device.

A

F

66
Q

IM technology offers a degree of anonymity because typed messages have no associated voice or video.

A

T

67
Q

Private messages can be forwarded by recipients, so they do not necessarily remain private.

A

T

68
Q

Privacy is only important if you have something to hide.

A

F

69
Q

Wiki software provides a set of tools for creating and editing content.

A

T

70
Q

Microsoft Windows is used exclusively on desktop systems.

A

F

71
Q

There is a universal standard for categorizing software, and various categorization schemes have few similarities.

A

F

72
Q

Most handheld devices can use either Web apps or mobile apps but not both.
Upgrade to remove ads
Only $1/month

A

F

73
Q

If you wanted to run multiple operating systems simultaneously on one computer, you would use a virtual machine.

A

T

74
Q

A formula, such as =B6+(C6*.1), does not contain cell references.

A

F

75
Q

Every peripheral device connected to a computer is regarded as an input or output resource.

A

T

76
Q

The term service pack usually applies to operating system updates.

A

T

77
Q

Within a single program, multiprocessing allows multiple commands, or threads, to run simultaneously.

A

F

78
Q

Partitions are created, modified, and deleted using Filezilla on Macs and Disk Partitioner on PCs.

A

F

79
Q

Mobile devices tend to be populated by entertainment apps, games, and social media services.

A

T

80
Q

You won’t find a desktop with application windows on an iOS device.

A

T

81
Q

Some database software provides tools to work with more than one collection of records, as long as the records are somehow related to each other.
Upgrade to remove ads
Only $1/month

A

T

82
Q

The kernel stays in random access memory (RAM) the entire time your computer is on.

A

T

83
Q

Paragraph style includes the alignment of text within the margins and the space between each line of text.

A

T

84
Q

Any data entering a digital device could be malware.

A

T

85
Q

Blacklist and header filtering are usually performed by email clients and Webmail services.

A

F

86
Q

The objective of a MITM attack is for a third party to block communications between two entities.
Upgrade to remove ads
Only $1/month

A

F

87
Q

Most mass-mailing databases are legitimately compiled from customer lists.

A

F

88
Q

Hackers can use ports to communicate with devices in botnets.

A

T

89
Q

Heuristics may produce false positives that mistakenly identify a legitimate file as malware.

A

T

90
Q

If a hacker intercepts encrypted data by way of a MITM attack, the contents of that data is not always secure.

A

T