CIS ch. 1 – Flashcards

Unlock all answers in this set

Unlock answers
question
Modems
answer
Two of the most common types of communications hardware are ____ and network adapters.
question
Microprocessor
answer
A personal computer (PC) or ____ is a small computer system designed to be used by one person at a time.
question
False
answer
Abbreviations or acronyms, such as BTW for "between the words," are commonly used to save time in all types of communications today. _________________________
question
Ultrabooks
answer
Ultraportables conforming to Intel's standards can be marketed as ____.
question
False
answer
Communications hardware includes modems, which are used to connect a computer to the Internet and network projectors, which are used to connect a computer to a computer network. _________________________
question
False
answer
The slide rule is considered by many to be the earliest recorded calculating device.
question
Identity Theft
answer
One online security problem is ____, in which someone else uses your identity, typically to purchase goods or services.
question
Address Bar
answer
To navigate to a new Web page for which you know the URL, type that URL in the browser's ____ and press Enter.
question
Application Software
answer
____ consists of programs designed to allow people to perform specific tasks using a computer, such as creating letters, preparing budgets, and managing inventory.
question
Mouse
answer
Common input devices include the keyboard and ____.
question
True
answer
There are application programs that help users write their own programs using a programming language.
question
Smart Appliances
answer
Computing technologies make it possible to have ____, traditional appliances with some type of built-in computer or communications technology.
question
Hotspots
answer
A growing number of college campuses have wireless ____ on campus that allow students to use their PCs to connect wirelessly to the college network and the Internet from anywhere on campus.
question
False
answer
In addition to hardware, software, data, and procedures, the fifth major component of a computer system are codes.
question
Scientists
answer
Fifty years ago, computers were used primarily by researchers and ____.
question
Internet Addresses
answer
____ are unique numeric or text-based addresses used to identify resources accessible through the Internet, such as computers, Web pages, and people.
question
False
answer
A computer does not always do whatever the instructions, or program, tell it to do.
question
Biometric Access Systems
answer
____ identify users by a particular unique biological characteristic.
question
Passwords
answer
____, the most commonly used type of possessed knowledge, are secret words or character combinations associated with an individual.
question
Firewall
answer
A ____ is a security system that essentially creates a wall between a computer or network and the Internet in order to protect against unauthorized access.
question
Pervasive Computing
answer
The idea that technology is everywhere, is in all aspects of life, and is all connected.
question
Computer
answer
A universal machine for processing data.
question
Data
answer
Raw factual things entered into a computer
question
Information
answer
Data that has been processed to be understandable and meaningful.
question
Input
answer
A way to insert data into a computer
question
Processing
answer
Turns data into information
question
Output
answer
A display of the information previously input into a computer
question
Server
answer
The term describes usage, NOT SIZE, of a particular computer
question
Computer Network
answer
System of two or more computers that communicate with each other
question
Protocol
answer
https://
question
Domain
answer
www.google.com
question
Folders
answer
/drive/
question
Web Page
answer
example_example.example
question
virtual private network (VPN)
answer
A network that is constructed using public wires, usually the Internet, to connect to a private network, such as a company's internal network. There are a number of systems that enable you to create networks using the Internet as the medium for transporting data.
question
Primary Software
answer
Responsible for starting up a computer
question
Cloud Software
answer
Software that can be run directly from the internet without being installed on your computer
question
Internet
answer
What is the largest and most well known computer network in the world?
question
Uniform Research Locator
answer
What is URL short for?
question
URL
answer
What is this? http://www.microsoft.com
question
False
answer
Dr. Herman Hollerith's Punch Card Tabulating Machine and Sorter was the first electromechanical machine that could read slide rules.
question
Netiquette
answer
____ refers to guidelines for online behavior.
question
Web-based e-mail
answer
is typically free and provided by virtually all ISPs used with personal computers.
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New