Flashcards on CGS FINAL

Unlock all answers in this set

Unlock answers
question
which of the following software is not usually included by an installed operating sytem
answer
spreadsheet
question
which of the following style of tablet does not contain a physical keyboard
answer
slate
question
which of the following is a colllection of unprocessed items which can include text, images, etx
answer
data
question
Which of the following is a collection of computers and devices connected together
answer
network
question
which of the following is a specification that enables web content to be distributed to subscribers
answer
RSS
question
which of the following is not an example of malware
answer
vaporware
question
collections, such as that pictured in the accompanying figure, allow computers to share.
answer
resources
question
Which of the following is the term known for a specific pattern of viruses
answer
virus signatures
question
What term is used to illustrate the gap between those with and those without access to technology
answer
digital divide
question
what consists of a series of related instructions that tells the computer what tasks to perform them
answer
software
question
what kind of desktop uses the same case to house the screen and processing circuitry
answer
all in one
question
you interact with a program through which of the following, thereby controlling how you enter data and instructions and how information is displayed on the screen
answer
user interface
question
which of the following is the spelling, disk, used
answer
magnetic media
question
Most e-commerce actually takes place between businesses. What is this called?
answer
business to business commerce
question
which of the following is equivalent to app. one million characters
answer
megabyte
question
Which of the following is a computer that allows users to upload and/or download files using FTP?
answer
ftp server
question
Which of the following is the use of computers to simulate a real or imagined environment that appears as three-dimensional (3-D) space?
answer
VR
question
What is the descriptor for a filter that warns or blocks you from potentially fraudulent or suspicious websites?
answer
phishing
question
Which of the following communicates with a satellite dish to provide high-speed Internet connections via satellite?
answer
satellite modem
question
what separates the components of a domain name
answer
periods
question
which of the following is a program that extends the capability of a browser
answer
plug in
question
Which of the following high-speed Internet connections use an antenna on a house or business to communicate with a tower location via radio signals?
answer
fixed wireless
question
Which of the following is true of VoIP?
answer
.It uses a slow speed dial-up connection. B.It uses the public switched telephone network. C.Skype is an example of VoIP software. D.All of the above. D.All of the above.
question
which of the following is a technology that provides high-speed internet connection using a telephone network
answer
DSL
question
Which of the following allows access to high-speed Internet services through the cable television network?
answer
cable modem
question
Which of the following defines FTP sites at which anyone can transfer some, if not all, available files?
answer
anonymous
question
Which of the following is a website like the one in the accompanying figure that offers a variety of Internet services from a single, convenient location? (MSN)
answer
portal
question
Which of the following is a business that provides individuals and companies access to the Internet for free or for a fee?
answer
access provider
question
what is the app. data usage for sending and receiving 100 messages with no attatchments
answer
.3-6mb
question
Which of the following is the development and maintenance of webpages?
answer
web publishing
question
The Internet has its roots in a network that became functional in 1969, linking scientific and academic researchers across the United States. What was the name of that network?
answer
ARPANET
question
What is the descriptor for a filter that warns or blocks you from potentially fraudulent or suspicious websites?
answer
phishing
question
What kind of server is another computer that screens all your incoming and outgoing messages?
answer
proxy
question
Which of the following oversees research for the internet?
answer
World Wide Web Consortium (W3C)
question
how many peripheral devices can you connect with a usb port
answer
up to 127
question
Which of the following are capable of processing many trillions of instructions in a single second?
answer
supercomputers
question
Short text messages sent via a text message service are typically fewer than how many characters?
answer
300
question
If a POS terminal is able to update inventory at geographically separate locations, what is the term for this ability?
answer
internet capable
question
Which of the following occurs when the incoming electrical supply or voltage increases, often defined as more than five percent, above the normal volts?
answer
undervoltage
question
what is the term for the smallest element in an electronic image
answer
pixel
question
Which of the following do most major corporations use for business activities like billing millions of customers, preparing payroll for thousands of employees, and managing millions of items in inventory?
answer
mainframes
question
The video clips that users of video message services send are typically how long?
answer
30 seconds
question
Which of the following is NOT a type of kiosk?
answer
media
question
Which of the following is the practice of sharing computing resources, such as servers, like those in the accompanying figure?
answer
virtualization
question
what percent of e waste is recylced
answer
20%
question
which of the following are the fastest, most powerful computers - and the most expensive
answer
supercomputers
question
if a POS terminal is able to update inventory at geographically seperate locations, what is the term for this ability
answer
internet capable
question
Which of the following exists in the form of a single circuit board?
answer
blade server
question
Which of the following kinds of UPS runs off a battery?
answer
online ups
question
which of the following is housed in a bay within a metal frame
answer
rack server
question
What is the electronic component that interprets and carries out the basic instructions that operate the computer?
answer
processor
question
Which of the following is an external device that provides connections to peripheral devices through ports built into the device?
answer
port replicator
question
Which of the following are large, expensive, powerful computers that can handle hundreds or thousands of connected users simultaneously and store tremendous amounts of data, instructions, and information?
answer
mainframes
question
Which of the following is a four- or five-digit number assigned to a specific content or mobile service provider, for example, to vote for a television program contestant or donate to a charity?
answer
CSC
question
It is estimated by one publisher that, on average, libraries replace a print book after how many checkouts?
answer
26
question
Which of the following is a collection of individual programs sold as a unit
answer
software suite
question
Which of the following kinds of programs displays an online advertisement in a banner or pop-up window on webpages, email, or other Internet service?
answer
adware
question
Many worksheet cells like those in the accompanying figure contain a number that can be used in a calculation. What is the name for this?
answer
value
question
Designers and graphic artists can print finished publications on a color printer, take them to a professional printer, or post them on the web in a format that can be viewed by those without what kind of software?
answer
DTP
question
Which of the following programs allow designers to rotate designs of 3-D objects to view them from any angle?
answer
CAD
question
Which of the following warns that the computer is infected and needs immediate attention?
answer
virus hoax
question
A single point as shown in the accompanying figure is about what fraction of an inch in height?
answer
1/72
question
Which of the following is a request for specific data from a database?
answer
query
question
Which of the following is a scam in which a perpetrator sends an official looking e-mail that attempts to obtain a user's personal and financial information?
answer
phishing
question
An alternative to e-mail filtering is to purchase which of the following kinds of program that attempts to remove a message before it reaches a user's inbox?
answer
anti spam
question
What kind of software helps users of all skill levels create web pages that include graphics, video, audio, animation, and other special effects?
answer
website authoring
question
Which of the following is a utility that detects and protects a computer from unauthorized intrusions?
answer
personal firewall
question
Which of the following kinds of software is software that enables professional designers to create sophisticated documents that contain text, graphics, and many colors?
answer
DTP
question
Which of the following kinds of malware is a malicious mobile app that uses a variety of fraudulent schemes to charge unsuspecting users for premium messaging services?
answer
toll fraud
question
What is the term for a square-shaped coded graphic that corresponds to a web address or other information?
answer
QR Code
question
What kind of software consists of programs designed to make users more productive and/or assist them with personal tasks?
answer
application
question
What kind of software allows users to combine text, graphics, audio, video, and animation into an interactive application?
answer
multimedia authoring
question
Which of the following is, as shown in the accompanying figure, a small text file that a web server stores on a user's computer?
answer
cookie
question
One study found that a certain percentage of wireless connections like the kind in the accompanying figure are unsecured, leaving them susceptible to hackers. What was that percentage?
answer
25%
question
Which kind of license is a legal agreement that allows multiple users to access the software on the server simultaneously?
answer
network
question
Which of the following is a federally funded Internet security research and development center?
answer
CERT/CC
question
In which particularly devastating type of DoS attack are multiple unsuspecting computers used to attack multiple computer networks?
answer
Distributed
question
Which of the following replaces each character in the plaintext with a different letter by shifting the alphabet a certain number of positions?
answer
caesar cipher
question
Which law states that it is not illegal to intercept or access an electronic communication made through an electronic communication system that is configured so that such electronic communication is readily accessible to the general public?
answer
Electronic Communication Privacy Act
question
internet advertising firms often use which of the following to collect information about users web browsing habits
answer
spyware
question
which of the following is a scam in which a perpetrator sends an official looking email that attempts to obtain a user's personal and financial information?
answer
phishing
question
which of the following laws provides the same protection that covers mail and telephone communications to electronic communications such as voice mail
answer
Electronic Communications Privacy Act
question
Which encryption algotrithm inserts characters between existing characters
answer
expansion
question
which of the following is someone who demands payment in order to stop an attack on an organizations technology infrastructure
answer
cyber extortionist
question
Which of the following is a federally funded internet security research and development center
answer
CERT/CC
question
Which of the following provides the mobile user with a secure connection to the company network server
answer
VPN
question
Which of the following is a case on a desktop that contains and protects the item shown in the accompanying figure and other electronic components
answer
system unit
question
which of the following allows the processor to communicate with peripheral devices
answer
expansion bus
question
which of the following is a small piece of semiconducting material, usually silicon on which integrated circuits are etched
answer
computer chip
question
in the accompanying picture, what on the motherboard holds the memory modules
answer
memory slots
question
which of the following interprets and carries out basic instructions that operate a computer
answer
CPU
question
Which of the following is a kind of ROM chip that contains permanently written data, instructions, or information that is recorded when the chip is manufactured
answer
firmware
question
which of the following is a register function
answer
storing the location from where an instruction was fetched
question
Double data rate SDRAM (DDR SDRAM) chips are even faster than SDRM chips because which of the following is true
answer
they transfer data twice for each cycle
question
as shown in the accompanying picture, which of the following kinds of card is a circuit board that enhances functions of a component system and or provides connections to peripherals
answer
adapter
question
which of the following is the component of the processor that performs arithmetic, comparison, and other operations
answer
ALU
question
what is the unit of measurement for the clock speed for the channel shown in the accompanying figure
answer
hertz
question
which of the following is another term for the system unit
answer
chassis
question
some computer and chip manufacturers use which of the following terms to refer to a personal computer processor chip
answer
microproccesor
question
Which of the following refers to the right of individuals and companies to deny or restrict the collection and use of information about them?
answer
information privacy
question
Websites use which of the following to keep track of items in a user's shopping cart?
answer
session cookie
question
What is another name for public key encryption?
answer
assymetric key encryption
question
Which of the following are used to record, save, an then execute a set of keystrokes and instructions repeatedly?
answer
macros
question
which of the following is a duplicate file, program, or disk that can be used if the original is lost, damaged, or destroyed
answer
backup
question
How much do fingerprint readers typically cost?
answer
less than 100
question
how long can digital certificates be valid
answer
2 years
question
Which of the following has the same intent as a cracker, but does not have the technical skills and knowledge?
answer
script kiddie
question
Which of the following is true of synchronous DRAM (SDRAM) chips?
answer
they are synchronized to the system clock
question
Which of the following is another term for the system unit?
answer
chassis
question
Which of the following is the most common type of volatile memory?
answer
RAM
question
Which of the following means the computer automatically can configure cards like the one in the accompanying figure and other peripherals as users install them?
answer
plug and play
question
How many fans are typically in a desktop case?
answer
at least three
question
The role of memory to store both data and programs is known as which of the following concepts?
answer
stored program
question
Which of the following circuits contains many microscopic pathways capable of carrying electrical current?
answer
integrated
question
Which of the following is a cache separate from the processor chip on the item shown in the accompanying figure?
answer
L3 Cache
question
Within the circuitry of a computer, each channel along which bits transfer allows the various devices both inside and attached to the system unit to communicate with each other. What are these channels, shown in the accompanying figure, called?
answer
busses
question
Which of the following is the main circuit board of the system unit?
answer
system board
question
Which of the following is the component of the system unit that converts the wall outlet AC power into the DC power a computer requires?
answer
power supply
question
Which of the following is measured by the number of ticks per second?
answer
clock speed
question
The processor relies on which of the following to control the timing of all computer operations?
answer
system clock
question
What is the process of copying items from RAM to a storage device?
answer
saving
question
Current processors include advanced transfer cache, a type of cache built directly on a processor chip. Which type of cache is this?
answer
l2 cache
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New