CS Test 2 – Space – Flashcards

Unlock all answers in this set

Unlock answers
question
The ________ is(are) the group of programs that controls how your computer functions.
answer
operating system
question
The ________ of the operating system enables the user to communicate with the computer system.
answer
user interface
question
Windows 8 is the operating system developed by ________.
answer
Microsoft
question
1. A(n) ________ is a small program that performs general housekeeping tasks for your computer.
answer
utility program
question
The most essential software in your computer system is the ________.
answer
operating system
question
All of the following are true about real-time operating systems (RTOS), EXCEPT ________.
answer
they require significant user interaction
question
All of the following are examples of network operating systems, EXCEPT ________.
answer
OS X Mountain Cougar
question
Which of the following is an open source operating system for personal computers?
answer
Linux
question
The latest version of the Mac OS X is the ________.
answer
Mountain Lion
question
Robotic cameras used by television stations for sports events require a ________ operating system.
answer
real-time
question
Which of the following operating systems is used primarily with mainframes as a network operating system?
answer
UNIX
question
Most supercomputers use the ________ operating system.
answer
Linux
question
Which of the following statements about a graphical user interface is FALSE?
answer
A GUI is a command-driven interface.
question
More than 50% of smartphones use an operating system developed by ________.
answer
Google
question
Each device attached to your computer comes with a special program called a ________ that facilitates communication between the device and the OS.
answer
device driver
question
The most popular tablet operating system was developed by ________.
answer
Apple
question
Which of the following is the first step in the boot process?
answer
The BIOS is activated by turning on the computer.
question
The top three operating systems for personal computers are ________.
answer
Microsoft Windows, Mac OS X, and Linux
question
The basic input/output system is stored on a ________ chip.
answer
ROM
question
The OS enables you to organize the contents of your computer in a hierarchical structure of ________.
answer
directories
question
Errors in computer software are called ________.
answer
bugs
question
All of the following can be used in a Windows file name, EXCEPT ________.
answer
*
question
The location of a file is specified by its ________.
answer
file path
question
The process of optimizing RAM storage by borrowing hard drive space is called ________.
answer
virtual memory
question
For performing common tasks, Windows 8 has special shortcuts called ________.
answer
charms
question
Which of the following Windows utility programs arranges pieces of files on your hard drive in sequential order?
answer
Disk Defragmenter
question
Which of the following types of programs help manage system resources such as the hard drive?
answer
Utility programs
question
You can use the Windows ________ to check on a nonresponsive program.
answer
Task Manager
question
Which utility takes out redundancies in a file to reduce the file size?
answer
File Compression
question
Mac OS X includes a backup utility called ________.
answer
Time Machine
question
All of the following are types of computer users, EXCEPT ________.
answer
typical user
question
The dominant system processors on the market are made by ________.
answer
Intel
question
Which of the following activities is carried out by the arithmetic logic unit (ALU)?
answer
Completion of all arithmetic calculations
question
The CPU consists of which two parts?
answer
The control unit and the arithmetic logic unit
question
The control unit is one component of the ________.
answer
CPU
question
Running the CPU at a faster speed than the manufacturer recommends is called ________.
answer
overclocking
question
There are ________ levels of cache memory.
answer
3
question
________ provides high-speed information processing by enabling a new set of instructions to start before the previous set is finished.
answer
Hyperthreading
question
Cache memory levels are defined by ________.
answer
the chip's proximity to the CPU
question
The amount of RAM recommended for most systems today is measured in ________.
answer
GB
question
RAM is an example of ________.
answer
volatile
question
In most current systems ________ is the type of RAM used.
answer
DDR3
question
The amount of RAM that is actually on the memory modules in your computer is the ________ memory.
answer
physical
question
Windows uses a memory-management technique known as ________ to monitor which applications you use the most and preloads them into your system memory
answer
SuperFetch
question
When referring to hard drives, access time is measured in ________.
answer
milliseconds
question
The maximum memory you can install using the 64-bit version of Windows 8 Pro is ________ GB.
answer
192
question
Which is the fastest type of optical drive on the market?
answer
Blu-ray drives
question
The ________ has the largest capacity of any storage device.
answer
mechanical hard drive
question
A ________ uses electronic memory and has no motors or moving parts.
answer
solid state drive
question
Two types of video memory are ________.
answer
GDDR3 and GDDR5
question
All of the following are examples of optical drives, EXCEPT ________.
answer
solid-state disc
question
Running the Disk Defragmenter utility will ________.
answer
make the hard drive work more efficiently
question
Running the Disk Cleanup utility is a quick way to ________.
answer
clear out unnecessary files
question
A(n) ________ is an expansion card that's installed inside the system unit to translate data into images.
answer
video card
question
Which statement pertaining to system reliability is FALSE?
answer
An accumulation of temporary Internet files has no effect on your computer's overall performance.
question
Which of the following is NOT a main characteristic associated with desktop computers as compared to notebooks?
answer
A desktop computer is more expensive
question
Laptops are often equipped with a(n) ________ slot that allows you to read flash memory cards such as CompactFlash, memory sticks, and secure digital cards.
answer
ExpressCard
question
A(n) ________ enables the computer to drive the speaker system.
answer
sound card
question
All of the following are procedures you can follow to ensure your system performs reliably, EXCEPT ________.
answer
run key utilities only when you can observe the process
question
Two types of video memory are ________.
answer
GDDR3 and GDDR5
question
______ is software that takes an existing Internet connection and turns it into a wireless hotspot. (Hint: you can find the answer in "How Cool Is This?" Section)
answer
Connectify
question
A computer network is defined as two or more computers connected via ________ so that they can communicate with each other.
answer
software and hardware
question
A(n) ________ is a device connected to a network such as a computer or a game console.
answer
node
question
All of the following are benefits of networks EXCEPT, ________.
answer
sharing an operating system
question
Network architectures are classified according to ________.
answer
the way in which they are managed and the distance between their nodes
question
All of the following involve tasks for network administration, EXCEPT ________.
answer
purchasing initial equipment for the network
question
. ________ is the maximum speed at which data can be transferred between two nodes.
answer
Bandwidth
question
All of the following are used to classify network architectures, EXCEPT ________.
answer
the number of nodes on the network
question
A ________ is a network located in your home that connects to all your digital devices.
answer
HAN
question
A network used to communicate among devices close to one person is called a ________.
answer
PAN
question
A large network designed to provide access to a specific geographic area, such as a large city is a ________.
answer
MAN
question
Which transmission medium transmits data the fastest?
answer
Fiber-optic cable
question
A client/server network is an example of ________ administration
answer
Central
question
1. Normal telephone cable is a type of ________.
answer
twisted-pair cable
question
A peer-to-peer network is an example of ________ administration
answer
local
question
Network adapters ________.
answer
enable nodes in a network to communicate with each other
question
The current version of wireless Ethernet is ________.
answer
802.11n
question
Sophisticated networks generally use which of the following hardware devices to ease the flow of data through the network?
answer
Routers and switches
question
Which of the following is NOT a type of cable used in wired networks?
answer
Router cable
question
Client/server networks are controlled by a central server that runs a specialized piece of software called ________.
answer
a network operating system (NOS)
question
Which of the following is NOT a type of UTP cable you would use in a wired Ethernet home network?
answer
Cat 7B
question
For the nodes on a network to communicate with each other and access the network, each node needs a ________.
answer
network adapter
question
Data are sent through a network on bundles called ________.
answer
packets
question
The most popular transmission media option for wired Ethernet networks is ________.
answer
unshielded twisted-pair (UTP) cable
question
Wireless Internet is available using ________.
answer
radio waves
question
All of the following operating systems support P2P networking, EXCEPT ________.
answer
Unix
question
Using a network without the network owner's permission is known as ________.
answer
piggybacking
question
SSID stands for ________.
answer
service set identifier
question
All of the following are extra precautions you can take to secure a wireless network, EXCEPT
answer
enable SSID broadcast
question
The unique number assigned to a network adapter by the manufacturer is referred to as the ________ address.
answer
MAC
question
1. A customizable watch that connects to your smartphone using Bluetooth is called ________. (Section Ref: How Cool Is This?)
answer
Pebble e-paper watch
question
1. Images are a representation of light waves called ________ or continuous waves
answer
analog
question
1. What is Android?
answer
An operating system for cell/smartphones
question
1. A new Asus device that combines the features of a phone and a tablet is a ________.
answer
Padfone
question
1. The operating system of a cell phone is stored in ________.
answer
ROM
question
1. An analog-to-digital converter chip ________.
answer
converts the sound waves from a voice into digital signals
question
1. A(n) ________ is included in a cell phone to handle the compression of data for it to be quickly transmitted to another phone
answer
digital signal processor chip
question
1. The primary input devices for smartphones are ________.
answer
microphone and touch pad
question
1. Which of the following uses radio waves to transmit data signals over short distances?
answer
Bluetooth
question
1. Google ________ is an online store that delivers software for mobile devices.
answer
Play
question
1. Text messaging is also called ________.
answer
short message service (SMS)
question
short message service (SMS)
answer
store-and-forward
question
1. A(n) ________ converts your voice's sound waves into digital signals.
answer
analog-to-digital converter chip
question
1. An Internet connectivity plan is also known as a ________.
answer
data plan
question
1. Almost all cell phones are designed with a ________ port.
answer
USB
question
1. The choice communication mode of people aged 14 to 30 is ________.
answer
texting
question
1. You can send messages that include photos and videos between mobile devices using ________ technology.
answer
multimedia message service (MMS)
question
1. All of the following are advantages of VoIP, EXCEPT ________.
answer
reliability
question
1. All of the following are technologies used to transfer digital information, EXCEPT ________.
answer
5G
question
1. ________ is a very well known free VoIP provider.
answer
Skype
question
1. A portable media player can play files with all of the following file extensions, EXCEPT ________.
answer
doc
question
he global positioning system is a network of ________ satellites plus 3 working spares.
answer
21
question
1. To transfer files from your computer to your music device use a(n) ________ port.
answer
USB
question
1. Which of the following describes the number of times an analog wave is measured each second during an analog-to-digital conversion?
answer
Sampling rate
question
1. The main difference between the tablet and smartphone is the ________.
answer
screen size
question
1. Which of the following statements is NOT true about the JPEG file format?
answer
JPEGs are larger than raw files
question
1. Devices that display textual information captured digitally are called ________.
answer
e-readers
question
1. ________ is a single cable that carries all audio and video information from devices connected to a TV to the TV itself.
answer
HDMI
question
1. All of the following are advantages of e-readers over paper books, EXCEPT ________.
answer
common digital formats
question
1. A ________ runs a traditional desktop operating system and is lightweight.
answer
netbook
question
1. IC3 is a partnership between the ________.
answer
FBI and National White Collar Crime Center
question
1. All of the following are top cybercrimes reported to the IC3 in 2011, EXCEPT ________.
answer
child pornography
question
1. Which of the following is formally defined as any criminal action perpetrated primarily through the use of a computer?
answer
Cybercrime
question
1. All of the following are considered cybercrimes, EXCEPT ________.
answer
theft of a cell phone
question
1. Which of the following classifications of viruses can change its own code to avoid detection?
answer
Polymorphic
question
1. Creating and disseminating ________ is one of the most widespread types of cybercrimes.
answer
computer viruses
question
1. With regard to computer protection, quarantining is defined as ________.
answer
placing a found virus in a secure area on the hard drive
question
1. All of the following are ways that can infect your computer with a virus, EXCEPT ________.
answer
logging into e-mail
question
1. A(n) ________ is the portion of virus code that is unique to a particular computer virus.
answer
virus signature
question
1. One virus called ________ is used to trick users into downloading an infected file to their phone, which steals online banking information.
answer
Spyeye Mobile Banking
question
1. A packet sniffer is a program that can enable a hacker to do all of the following, EXCEPT ________.
answer
launch a denial of service (DoS) attack on your computer
question
1. All of the following are categories of viruses, EXCEPT ________.
answer
snakes
question
1. You can block logical ports to invaders and make your computer invisible to others on the Internet by installing ________.
answer
a firewall
question
1. ________ viruses are often transmitted by a flash drive left in a USB port.
answer
Boot-sector
question
1. A ________ is a virus that is triggered on a certain date.
answer
time bomb
question
1. ________ floods a computer with requests until it shuts down and refuses to answer any requests for information.
answer
A DDoS attack
question
1. A(n) ________ takes advantage of file transport methods to spread on their own.
answer
worm
question
1. Configuring a firewall to ignore all incoming packets that request access to a specific port is known as ________.
answer
logical port blocking
question
1. A ________ virus changes its own code or periodically rewrites itself to avoid detection.
answer
polymorphic
question
1. Rules for creating passwords include all of the following, EXCEPT ________.
answer
keep your password written down and stored in any easy-to-remember location
question
1. Adware and spyware are referred to collectively as ________.
answer
grayware
question
1. All of the following are the main functions of antivirus software, EXCEPT ________.
answer
assassinating all viruses
question
1. ________ is an unwanted piggyback program that usually downloads with software you are installing from the Internet
answer
Spyware
question
1. ________ hackers break into systems for non-malicious reasons such as to test system security vulnerabilities.
answer
White-hat
question
1. Which of the following statements about cookies is NOT true?
answer
Cookies obtain your personal information by searching your hard drive.
question
1. A ________ is named after a housing construction feature that slows the spread of fires from house to house.
answer
firewall
question
1. Social ________ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information
answer
engineering
question
The protocol using port 53 is ________. (Section Ref: Knowing Your Computer Is Secure)
answer
DNS
question
1. Which of these statements about physically protecting your computer is FALSE?
answer
Power surges can be blocked by using a computer surround.
question
1. When malicious code is planted on your computer and alters your browser's ability to find Web addresses it is known as ________.
answer
pharming
question
1. Text messaging is also called ________.
answer
short message service
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New