CS 104 Final
Unlock all answers in this set
Unlock answersquestion
Utility that automatically creates duplicates of your libraries, desktops, contacts and favorites to another storage location. System Restore Time Capsules File History Carbonite
answer
File History
question
Which of the following capabilities of the UNIX is FALSE? A. It is a multiuser B. It is multitasking. C. It is a network OS. D. It is only for super computers.
answer
D. It is only for super computers
question
C:WindowsSystem32driversetcprotocol is an example of a ___
answer
file path
question
Windows 10 uses a(n) ________ account for easy access and storage of online files. iCloud Chrome OneDrive eye OS
answer
OneDrive
question
Windows utility programs that arranges pieces of files on your hard drive to allow for faster access Disk Cleanup Disk Defragmenter Error-checking Task Manager
answer
Disk Defragmenter
question
Which operating systems are used on most tablets? Windows and iOS Windows and Android Android and iOS BlackBerry and Windows
answer
Android and iOS
question
Which of the following is NOT a Windows utility program A. Disk Cleanup B. Desktop C. Disk Defragmenter D. System Restore
answer
B. Desktop
question
All of the following can be used in an OS X file name EXCEPT ________. A. : B. # C. % D. $
answer
A. :
question
The Mac OS was the first commercially available OS to incorporate networking color graphics sound point and click technology
answer
point and click technology
question
The location of a file is specified by its ________. drive identifier file path file type file extension
answer
file path
question
In the late 1980s, computer specialists were concerned that proprietary software had too many ________, so they started working on open source projects. worms trojans bugs spiders
answer
bugs
question
a proprietary OS for desktop and laptop computers Windows iOS Android Linux
answer
Windows
question
The ________ of the operating system enables users to communicate with the computer system. window modem network adapter card user interface
answer
User interface
question
You can use the Windows ________ to check on a nonresponsive program. System Restore Backup utility Error-checking Task Manager
answer
Task Manager
question
the operating system most supercomputers use UNIX Linux Windows iOS
answer
Linus
question
When using Windows File Explorer, which view provides the most information at a glance? List Content Tiles Details
answer
Details
question
Deleted files on a Mac computer are moved to the ________.
answer
Trash
question
What is the first step in the boot process? The BIOS is activated by turning on the computer. The BIOS checks that all devices are in place. The OS is loaded into RAM. Configuration and customization settings are checked
answer
The BIOS is activated by turning on the computer
question
The basic input/output system (BIOS) is stored on a ________ chip ROM CPU RAM CMOS
answer
ROM
question
Utility that temporarily removes redundancies in a file to reduce the file size? Disk Cleanup File Compression Error-checking Disk Defragmenter
answer
File Compression
question
OS X is the operating system developed by ________. Apple Microsoft Google Linux
answer
Apple
question
Using hard disk space to temporarily store data or instructions from RAM is referred to as the ________. spool interrupt sequencer compressor virtual memory
answer
Virtual memory
question
Most smartphones use operating systems developed by ________.
answer
Google and Apple
question
Which of the following is NOT a user interface? A. Command-driven B. application programming interface (API) C. menu-driven D. graphical user interface (GUI)
answer
B. application programming interface (API)
question
All of the following are terms related to part of the boot process EXCEPT ________. A. ROM B. CMOS C. RAM D. USB
answer
D. USB
question
C: denotes a(n) ________ directory that is at the top of the filing structure of a computer. top-level cluster root upper-level
answer
root
question
Which of the following is the name of a Microsoft Excel file? A. inventory.xlsx B. inventory.wpd C. inventory.accdb D. inventory.pdf
answer
A. inventory.xlsx
question
All of the following are examples of network operating systems EXCEPT ________. A. Windows 10 B. Linus C. OS X D. MS-DOS
answer
MS-DOS
question
Each device attached to your computer has a special program called a(n) ________ that enables the device and operating system to communicate with each other. device driver translator interpreter device configurator
answer
device driver
question
The two major types of system software programs are utility programs and the ________. charms application software user interface operating system
answer
operating system
question
Some of the cache memory of a CPU is ________. inside the CPU, itself on the hard disk drive on a nearby SSD in cloud storage
answer
inside the CPU, itself
question
How do optical discs store data? A laser burns tiny pits onto a platter. A magnet aligns iron particles on a platter. Electronic memory records data on chips. A digital spectrometer leaves grooves in a platter.
answer
A laser burns tiny pits onto a platter
question
Running the CPU at a faster speed than the manufacturer recommends fetching latency overclocking hyperthreading
answer
overclocking
question
How many channels are in a Dolby 7.1 Surround Sound System
answer
8
question
Which of the following ports is NOT used to connect to a video card? A. HDMI B. DVI C. USB D. DisplayPort
answer
USB
question
RAM is an example of ________ storage.
answer
volatile
question
To securely erase data, the U.S. Department of Defense suggests that data be ________. overwritten multiple times deleted encoded refactored
answer
overwritten multiple times
question
There are ________ levels of cache memory in the Intel i7 processor.
answer
three
question
The control unit is one component of the ________. CPU cache front side bus clock
answer
CPU
question
Running the Disk Cleanup utility is a quick way to ________. defrag your hard drive remove spyware programs clear out unnecessary files clean out your Startup folder
answer
clear out unnecessary files
question
In most current systems, ________ is the type of RAM used. DDR2 DDR3 DRAM SDRAM
answer
DDR3
question
Which statement pertaining to system reliability is FALSE? A. Having the latest version of software products can make your system more reliable. B. An accumulation of temporary Internet files has no effect on your computer's overall performance. C. You can clean out unnecessary programs from your Startup folder. D. When you defrag your hard drive, it works more efficiently.
answer
An accumulation of temporary Internet files has not effect on your computer's overall performance
question
Which of the following does NOT determine processor power? A. Clock speed B. Number of cores C. Amount of cache memory D. Speed of the motherboard
answer
Speed of the motherboard
question
Windows uses a memory-management technique known as ________ to monitor which applications you use most frequently. It preloads them into your system memory. SuperGet SuperFetch SuperTake SuperRetrieve
answer
SuperFetch
question
The CPU consists of which two parts?
answer
The control unit and the arithmetic logic unit
question
A ____ enables the computer to drive the speaker system HDMI display port sound card PCI bus
answer
sound card
question
Which of the following activities is carried out by the ALU? A. Moves read/write heads B. Performs arithmetic calculations C. Creates virtual memory D. Renders video images
answer
Performs arithmetic calculations
question
Which of the following is NOT a permanent storage option? A. Optical drive B. Random access memory C. Internal hard drive D.Memory stick
answer
Random access memory
question
The amount of RAM storage is measured in ___
answer
GB
question
To remove all the changes made to your system, the Windows ________ utility returns your computer to the state it was in when it came from the factory. Backup Erase Restore Refresh
answer
Refresh
question
________ provides high-speed information processing by enabling a new set of instructions to start before the previous set is finished. Multitasking Cache memory Hyperthreading Overclocking
answer
Hyper threading
question
A ________ uses electronic memory and has no motors or moving parts. mechanical hard drive solid-state drive Blu-ray disc digital video disc
answer
solid-state drive
question
Which is the lightest computer?
answer
Tablet
question
The rule of thumb that predicts that the number of transistors on a CPU will double every 2 years is called ________ Law.
answer
Moore's
question
To speed up the display of graphics, a(n) ______ is installed on some video cards GPU CPU ALU SSD
answer
GPU
question
Running the Disk Defragmenter utility will ________. detect and remove spyware mark bad memory cells make the hard drive work more efficiently clean out your Startup folder
answer
Make the hard drive work more efficiently
question
When referring to hard drives, access time is measured in ________.
answer
milliseconds
question
The ________ has the largest capacity of any storage device. CD SSD DVD mechanical hard drive
answer
mechanical hard drive
question
All of the following are part of the machine cycle EXCEPT ________. A. fetch B. encode C. execute D. store
answer
encode
question
The processor market for desktop and laptop computers is dominated by ________. IBM Microsoft Intel Apple
answer
Intel
question
Wireless network devices use ________ to communicate with each other. fiber optics satellites radio waves DSL
answer
radio waves
question
All of the following operating systems support P2P networking EXCEPT ________. A. Windows B. OS X C. Unix D. Linux
answer
Unix
question
Some of the responsibilities of a(n) ________ are installing new hardware and software on the network and monitoring performance. programmer analyst IT manager computer technician network administrator
answer
network administrator
question
On a network, a(n) ________ helps prevent data packets from colliding with each other. access point hub adapter switch
answer
switch
question
A large network designed to provide access to a specific geographic area, such as a large city, is a ________. MAN PAN LAN WAN
answer
MAN
question
A network that spans a large physical distance is called a ________. MAN LAN PAN WAN
answer
WAN
question
The most popular transmission media option for wired home Ethernet networks is ________ cable. fiber-optic power-line unshielded twisted-pair (UTP) coaxial
answer
unshielded twisted-pair (UTP)
question
Which of the following is NOT a type of UTP cable you would use in a wired Ethernet network? A. Cat 5E B. Cat 6 C. Cat 6A D. Cat 7B
answer
Cat 7B
question
________ is the actual speed of data transfer that is achieved and is always less than or equal to the data transfer rate. Benchmark Broadband Bandwidth Throughput
answer
Throughput
question
A ________ is any device connected to a network such as a computer, printer, or game console. packet node NOS NIC
answer
node
question
Which transmission medium transmits data the fastest? Twisted-pair cable Coaxial cable Wireless Fiber-optic cable
answer
Fiber-optic cable
question
A peer-to-peer (P2P) network is an example of ________ administration. local wide area central corporate
answer
local
question
A ________ is a network located in your residence that connects to all your digital devices. MAN WAN HAN LAN
answer
HAN
question
A computer ________ is two or more computers connected using software and hardware so that they can communicate with each other. network switch broadband node
answer
network
question
________ is the maximum speed at which data can be transferred between two nodes. Throughput Bandwidth Broadband Through speed
answer
Bandwidth
question
A client/server network is an example of ________ administration. local wide area central remote
answer
central
question
Normal telephone cable is a type of ________. fiber-optic cable twisted-pair cable coaxial cable Ethernet cable
answer
twisted-pair cable
question
Sophisticated networks generally use which of the following hardware devices to ease the flow of data through the network Routers and switches USB ports Firewalls Firmware
answer
Routers and switches
question
A(n) ________ device facilitates file sharing and data backup. NAS WAN UTP NOS
answer
NAS
question
Which of the following is NOT a wired broadband Internet connection option? A. Cable B. Dial-up C. DSL D. Fiber-optic
answer
Dial-up
question
Client/server networks are controlled by a central server that runs specialized software called a(n) ________. information management system (ISM) network operating system (NOS) digital subscriber line (DSL) service set identifier (SSID)
answer
network operating system (NOS)
question
Which of the following is NOT a standard for wireless fidelity Ethernet networks? a. 802.11n b. 802.11g c. 802.11ab d. 802.11ac
answer
802.11ab
question
Using a network without the network owner's permission is known as ________. hijacking spamming piggybacking phishing
answer
piggybacking
question
All of the following are extra precautions you can take to secure a wireless network EXCEPT ________. a. change your network name (SSID) b. enable SSID broadcast c. turn on security protocols d. create a passphrase
answer
enable SSID broadcast
question
To transfer data packets between two or more networks, a ________ is used. router hub firewall switch
answer
router
question
For the nodes on a network to communicate with each other and access the network, each node needs a ________. DSL modem network adapter hub router
answer
network adapter
question
Which of the following is NOT a type of cable used in wired networks? a. Unshielded twisted-pair b. Coaxial c. Fiber-optic d. Unshielded coaxial
answer
Unshielded coaxial
question
The unique number assigned to a network adapter by the manufacturer is referred to as the ________ address. MAC IP SSID network
answer
MAC
question
Which of the following is NOT a common network architecture type? a. local area network (LAN) b. home area network (HAN) c. intraoffice area network (IAN) d. personal area network (PAN)
answer
intraoffice area network (IAN)
question
Data are sent through a network in bundles called ________. packages pouches packets nodes
answer
packets
question
A(n) ________ chip converts sound waves from a voice into digital signal. analog-to-digital converter digital convergence digital signal processor telephony
answer
analog-to-digital converter
question
Which of the following is NOT a video file extension? a. .jpg b. .mpg c. .avi d. .mov
answer
.jpg
question
A main difference between the tablet and the smartphone is the ________. operating system touch-screen interface screen size Internet connectivity
answer
screen size
question
What is the easiest way to synch your phone wirelessly? A cloud service HDMI Bluetooth A secure digital transmission
answer
a cloud service
question
A ________ is a geographical area with a base transceiver station at its center. wave cell port hot-spot
answer
cell
question
Which of the following uses radio waves to transmit data signals over short distances? VoIP Infrared Wireless access protocol Bluetooth
answer
Bluetooth
question
The primary input devices for smartphones are ________. keyboard and mouse microphone and touch screen microphone and mouse touch screen and digital camera
answer
microphone and touch screen
question
Some 3d printers work by controlling the exact locations where a liquid ________ will be exposed to oxygen and become solid. silicon peptides polymer resin
answer
resin
question
What is iOS? A specific operating system for mobile devices A type of application software A utility program for all mobile digital devices A form of antivirus software
answer
A specific operating system for mobile devices
question
VoIP uses ________ technology similar to email to transmit voice over the Internet. digital analog binary IP
answer
digital
question
Which of the following is not an example of a digital music file format? a. .wav b. .mp3 c. .aac d. .accdb
answer
.accdb
question
Many mobile devices include a mini- ________ port. USB parallel serial coaxial
answer
USB
question
A cellular Internet connectivity plan is also known as a ________ plan. text data mobile network
answer
data
question
You can send messages that include photos and videos between mobile devices using ________ technology. short message service (SMS) multimedia message service (MMS) delivery multimedia service (DMS) multimedia delivery service (MDS)
answer
multimedia message service (MMS)
question
Which of the following describes the number of times an analog wave is measured each second during an analog-to-digital conversion? Converting rate Conversion rate Simplifying rate Sampling rate
answer
Sampling rate
question
Which of the following digital image formats compresses the image file? PDF WAV JPEG MPEG
answer
JPEG
question
________ is digital textual information that can be stored, manipulated, and transmitted by electronic devices. Short message service SMTP E-text Digital rights management
answer
E-text
question
Text messaging is also called ________. text messaging system (TMS) sending messages shortly (SMS) short text messaging (STM) short message service (SMS)
answer
short message service (SMS)
question
Which of the following mobile devices has the largest display? Phablet Smartphone Tablet Feature phone
answer
Tablet
question
Google ________ is an online store that delivers software for Android devices. Fun Games Play Sport
answer
Play
question
The operating system of a cell phone is stored in ________. RAM the CPU ROM an SD card
answer
ROM
question
The term ________ refers to the use of a single unifying device that handles media, Internet, entertainment, and telephone needs. multimedia message service telephony mobile switching center digital convergence
answer
digital convergence
question
A(n) ________ is included in a cell phone to handle the compression of data for it to be quickly transmitted to another phone. analog-to-digital converter digital signal processor chip modem compression utility
answer
digital signal processor chip
question
All of the following are advantages of VoIP EXCEPT ________. a. low or free cost b portability c. excellent reliability during Internet outages or power outages d. the ability to make calls on a computer from any Wi-Fi hotspot
answer
excellent reliability during Internet outages or power outages
question
________ allows only limited use of media that have been legally purchased. Digital rights management Copyright Copyleft Synchronizing
answer
Digital rights management
question
The distance between two near field communication (NFC) devices is` limited to about ________. 1.5 inches 1.5 feet 1.5 meters 10 meters
answer
1.5 inches
question
Which is true of SMS messages? They can contain pictures and videos. They can only contain a limited number of characters. They are no longer used. They are used in web page development.
answer
They can only contain a limited number of characters
question
The global positioning system is a network of 21 ________ plus 3 working spares. transponders satellites base stations communicators
answer
satellites
question
Which of the following is NOT true about e-books? a. You can borrow them from the library. b. They are always PDF file format. c. You can annotate them with your own notes. d. They weigh less than physical books.
answer
They are always PDF file formate
question
A(n) ________ cable carries all audio and video information from devices to a connected TV. HDMI S component Ethernet RJ11
answer
HDMI
question
All of the following were top cybercrime reported to the ICS EXCEPT a. identity theft b. non-auction scam c. advance free fraud d. theft of services
answer
theft of services
question
When malicious code is planted on your computer and alters your browser's ability to find web addresses, it is known as _____. phishing pharming pretexting polymorphing
answer
phraming
question
A packet analyzer is a program that can enable a hacker to do all of the following EXCEPT a. use your debit card information to purchase items illegally b. assume your identity c. steal your logons and passwords for various accounts d. launch a denial of service (DoS) attack on your computer
answer
launch a denial of service (DoS) attack on your computer
question
Social ______ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive info engineering theft pretexting pharming
answer
engineering
question
The Internet Crime Complaint Center (IC3) is a partnership between the ________. FBI and local police departments FBI and National Defense Department FBI and National White Collar Crime Center National White Collar Crime Center and U.S. Department of Defense
answer
FBI and National White Collar Crime Center
question
Adware and spyware are referred to collectively as ________. viruses grayware alertware firmware
answer
grayware
question
________ viruses are often transmitted by a flash drive left in a USB port. Logic bomb Boot-sector Macro Time bomb
answer
Boot-sector
question
A ________ is named after a housing construction feature that slows the spread of fires from house to house. firehouse firebreak firewall fire extinguisher
answer
firewall
question
A ________ is a virus that is attached to documents such as Word or Excel files. script virus macro virus polymorphic virus Trojan horse
answer
macro virus
question
A ________ is a virus that is triggered on a certain date. worm macro logic bomb time bomb
answer
time bomb
question
All of the following activities may infect your computer with a virus EXCEPT ________. a. sharing flash drives b. downloading video files from peer-to-peer sites c. downloading or running an e-mail attachment file d. printing a document
answer
printing a document
question
________ hackers break into systems for non-malicious reasons such as to test system security vulnerabilities. Black-hat Gray-hat White-hat Green-hat
answer
White-hate
question
_______ is a program that gathers information about your surfing habits without your knowledge. Adware Ghostware Shareware Spyware
answer
Spyware
question
Which of the following statements about cookies is NOT true? a. Cookies obtain your personal information by searching your hard drive. b. Cookies are text files. c. Cookies help companies determine the traffic flow through their website. d. Some companies sell the personal information found in cookies to other companies.
answer
Cookies obtain your personal info by searching your hard drive
question
Which of the following classifications of viruses can change its own code to avoid detection? Stealth Multipartite Polymorphic Worm
answer
polymorphic
question
Which of the following is formally defined as any criminal action perpetrated primarily through the use of a computer? Social networking Cybercrime Phishing Hacking
answer
Cybercrime
question
CAPTCHA is ________. antivirus software password method the wavy hard-to-read letter and number sequence that you type to prove that you are human to a website a rootkit virus
answer
the wavy hard-to-read letter and number sequence that you type to prove that you are human to a website
question
Rules for creating passwords include all of the following EXCEPT ________. a. keep your password a secret b. change your password frequently c. use a dictionary to find a lengthy word that is easy to remember d. use letters, numbers and symbols in your passwords
answer
uses a dictionary to find a lengthy word that is easy to remember
question
Using your computer for non-work activities while you are being paid to work is known as ________. cyberloafing cybersleeping cyberlazing cyberbreaking
answer
cyberloafing
question
A(n) ________ is the portion of virus code that is unique to a particular computer virus. virus signature encryption code compression code virus pattern
answer
virus signature
question
With regard to computer protection, quarantining is defined as ________. updating your antivirus software placing a found virus in a secure area on the hard drive repairing an infected file deleting an infected file
answer
placing a found virus in a secure area on the hard drive
question
Which type of virus was the famous Michelangelo virus? A worm A time bomb A script virus An e-mail virus
answer
a time bomb
question
FBI-related scams involve ________. A. people pretending to represent official organizations such as the Dept. of Homeland Security or IRS B. running auctions that do not exist C. convincing people to send money as a "good faith" gesture D. collecting funds and not delivering the goods
answer
people pretending to represent official organizations such as the Dept. of Homeland Security or IRS
question
Creating and distributing ________ is one of the most widespread types of cybercrime. spam computer viruses cookies zombies
answer
computer viruses
question
You can block logical ports from invaders and make your computer invisible to others on the Internet by installing ________. a packet sniffer a firewall a packet filter antivirus software
answer
a firewall
question
Which of the following is NOT a virus category? a. worm b. logic bomb c. macro d. pharming
answer
charming
question
________ floods a computer with requests until it shuts down and refuses to answer any requests for information. A Trojan horse A polymorphic virus A DDoS attack Pretexting
answer
A DDoS attack
question
A ________ allows a hacker to gain access to your computer and take almost complete control of it without your knowledge. denial of service (DoS) zombie logic bomb rootkit
answer
rootkit
question
A(n) ________ takes advantage of file transport methods to spread on its own. worm script virus encryption virus macro virus
answer
worm
question
Configuring a firewall to ignore all incoming packets that request access to a specific port is known as ________. packet filtering packet switching static addressing logical port blocking
answer
logical port blocking