CSC Test 1 Flashcards

Flashcard maker : Brandon Ruffin
T/F Electronic components in computers process data using instructions, which are the steps that tell the computer how to perform a particular task
T/F Screens for desktops cannot yet support touch
T/F Smaller applications, such as home, typically use a powerful, expensive server to support their daily operations
T/F Smartphones typically communicate wirelessly with other devices or computers
T/F Data conveys meaning to users, and information is a collection of unprocessed items, which can include text, numbers, images, audio, and video
T/F As widespread as computers appear to be, most daily activities do not involve the use of or depend on information from them
T/F A scanner is a light-sensing output device
T/F Because it contains moving parts, flash memory is less durable and shock resistant than other types of media
T/F The terms, web, and Internet, are interchangeable
T/F One way to protect your computer from malware is to scan any removable media before using it
T/F Operating systems are a widely recognized example of system software
T/F You usually do not need to install web apps before you can run them
input device
A(n) _____ is any hardware component that allows you to enter data and instructions into a computer or mobile device
Which of the following is NOT and example of an out put device. a) scanner b)printer c) display d)speaker
consists of electronic components that store instructions waiting to be executed and the data needed by those instructions
memory card
removable flash memory; usually no bigger than 1.5 inches in height or width, that you inset in and remove from a slot in a computer, mobile device, or card reader/writer
web server
a computer that delivers requested webpages to your computer or mobile device
software consists of programs designed to make users more productive and/or assist them with personal tasks
cellular radio
uses the cellular network to enable high-speed Internet connections to devices with built-in compatible technology, such as smart phones
a collaborative website that allows users to create, add to, modify, or delete the content via their browser
T/F No single person or government agency controls or owns the Internet
T/F The W3C is responsible for maintaining all networks and content on the Internet
T/F Users typically pay additional fees for mobile hot spot and tethering servicesf
T/F a gigabyte (GB) is the basic storage unit on a computer or mobile device and represents a single character
T/F Visitors to a dynamic webpage can customize some or all of the viewed content, such as desired stock quotes, weather, or ticket availability for flights
T/F Browsers usually are no included by default with mobile devices and smartphones
T/F Mobile apps sometimes have fewer feature than a web app
T/F a subject directory is software that finds websites, webpages, images, videos, news, maps, and other information related to a specific topic
T/F one technique you can use to improve search results is to use specific nouns
T/F the term, blogosphere, refers to the worldwide collections of blogs
T/F unregistered wiki users can review the content, as well as edit it and add comments
T/F tethering is the process of transferring data in a continuous and even flow, which allows users to access and use a file while it is transmitting
any computer that provides services and connections to other computers on a network
_____ access takes place when a modem in a computer connects to the Internet via a standard telephone line that transmits data and information using an analog signal
IP address
is a sequence of numbers that uniquely identifies the location of each computer or device connected to the Internet
you register a domain name through a ___, which is an organization that sells and manages domain names
proxy server
one way to protects your identity while browsing is to use a ____, which is another computer that screens all your incoming and outgoing messages
Hypertext Transfer Protocol
a set of rules that defines how webpages transfer on the Internet
_____ website contains factual information, such as libraries, encyclopedias, dictionaries, directories, guides, and other types of reference
consists of a number sign followed by a keyword, describes and categorizes a Tweet
T/F malware authors focus on social media, with the goal of stealing personal information
T/F although they can save space, all-in-one desktops usually are more expensive than a system unit and monitor purchased separately
T/F most traditional and ultrathin laptop and ultrabook screens range in size from 7-10 inches, and most tablet and netbook screens range in size from 11-18 inches
T/F dedicated servers typically require a faster processor, more memory. and additional storage
T/F most computers and electronic devices are analog, which use only two discrete states: on and off
T/F some mobile devices allow you to transfer photos using wireless technologies such as Bluetooth and Wi-Fi
T/F most smartphones also can function as portable media players and digital cameras
T/F because embedded computers are components in larger products, they usually are small and have limited hardware
T/F instead of the term, port, the term, connector, sometimes it used to identify audio and video ports
T/F Newer versions of USB are backward compatible, which means they support only new USB devices, not older ones
T/F because the processor in a computer is particularly sensitive to current fluctuations, you always should use a surge protector
T/F an offline UPS always runs off the battery
examples of a ____ device include keyboard, mouse, microphone, monitor, printer, USB flash drive, scanner, webcam, and speakers
system unit
some people use this term to refer to the case that contains and protects the motherboard, hard disk drive, memory, and other electronic components of the computer from damage
all-in-one desktop
some desktops called a ___, do not have a tower and instead house the screen and system unit in the same case
power users may work with a high-end desktop, sometimes called a ______, that is designed to handle intense calculations and powerful graphics
services provided by _____ include storing content and controlling access to hardware, software, and other resources on a network
backup server
a dedicated server that backs up and restores files, folders, and media
a four or five-digit number assigned to a specific content or mobile service provider
USB port
can connect up to 127 different peripheral devices together with a single connector
T/F applications software serves as the interface between the user, the apps, and the computer’s or mobile device’s hardware
T/F each time you start a computer or mobile device, the system software is loaded from storage into memory
T/F open source software is mass-produced, copyrighted software that meets the needs of a wide variety of users
T/F when downloading shareware, freeware, or public-domain software, it is a good practice to seek websites with ratings for and reviews of products
T/F while a computer or mobile device is running, the operating system remains in memory
T/F with database software, users run functions to retrieve data
T/F software suites offer three major advantages: lower cost, ease of use, and integration
T/F a PDF file can be viewed and printed without the software that created the original document
T/F the military and airlines might use CBT simulations to train pilots to fly in various conditions and environments
T/F an antivirus program automatically deletes quarantined files
T/F one of the fastest growing threats in mobile apps is toll fraud malware
T/F cookies typically are considered a type of spyware
tools or utilities
programs called ____ enable you to perform maintenance-type tasks usually related to managing devices, media, and programs used by computers and mobile devices
___ software performs functions specific to a business or industry
license agreement
a ____ is the right to use a program or app
___ software is an application that allows users to organize data in rows and columns and perform calculations on the data
CAD software
____ is a type of application that assists professionals and designers in creating engineering, architectural, and scientific designs and models
refers to decreasing a photo’s file size
trojan horse
is a destructive program disguised as a real program
virus signature
a known, specific pattern of virus code
T/F any illegal act involving the use of a computer or related devices generally is referred to as crimeware
T/F some malware contains elements of a virus, worm, and trojan horse
T/F a rootkit displays an online advertisement in a banner or pop-up window on webpages, email, or other Internet services
T/F an audit trail records in a file both successful and unsuccessful access attempts
T/F it is good practice to change your password frequently
T/F a typical license agreement allows you to rent or lease the software
T/ F unencrypted, readable data is called ciphertext
T/F private key encryption also is called asymmetric key encryption
T/F VPNs encrypt data to help ensure that the data is safe from being intercepted by unauthorized people
T/F although wireless access provides many conveniences to users, it also poses additional security risks
T/F it is impossible to detect if someone is accessing your wireless home network
T/F before recycling, refurbishing, or discarding your old computer, you should erase, remove, or destroy its hard disk so that the information it stored remains private
someone who demands payment to stop an attack on an organizations’s technology infrastructure
a type of malware that is placed on a computer without the user’s knowledge that secretly collects information about the user
unauthorized access and use
an employee using an organization’s computer to send personal email messages might be an example of _____
a private combination of words, often up to 100 characters in length and containing mixed capitalization and punctuation, associated with a user name that allows access to certain computer resources
____ encryption algorithm inserts characters between existing characters
public key
a set of characters that the originator of the data uses to encrypt the text and the recipient of the data uses to decrypt the text
continuous data protection
a _____ backup method is the only real-time back up, providing very fast recovery of data
session cookie
online shopping websites generally use a ____ to keep track of items in a user’s shopping cart

Get instant access to
all materials

Become a Member