CSC Test 1

Flashcard maker : Brandon Ruffin
True
T/F Electronic components in computers process data using instructions, which are the steps that tell the computer how to perform a particular task
False
T/F Screens for desktops cannot yet support touch
False
T/F Smaller applications, such as home, typically use a powerful, expensive server to support their daily operations
True
T/F Smartphones typically communicate wirelessly with other devices or computers
False
T/F Data conveys meaning to users, and information is a collection of unprocessed items, which can include text, numbers, images, audio, and video
False
T/F As widespread as computers appear to be, most daily activities do not involve the use of or depend on information from them
False
T/F A scanner is a light-sensing output device
False
T/F Because it contains moving parts, flash memory is less durable and shock resistant than other types of media
False
T/F The terms, web, and Internet, are interchangeable
True
T/F One way to protect your computer from malware is to scan any removable media before using it
True
T/F Operating systems are a widely recognized example of system software
True
T/F You usually do not need to install web apps before you can run them
input device
A(n) _____ is any hardware component that allows you to enter data and instructions into a computer or mobile device
scanner
Which of the following is NOT and example of an out put device. a) scanner b)printer c) display d)speaker
memory
consists of electronic components that store instructions waiting to be executed and the data needed by those instructions
memory card
removable flash memory; usually no bigger than 1.5 inches in height or width, that you inset in and remove from a slot in a computer, mobile device, or card reader/writer
web server
a computer that delivers requested webpages to your computer or mobile device
application
software consists of programs designed to make users more productive and/or assist them with personal tasks
cellular radio
uses the cellular network to enable high-speed Internet connections to devices with built-in compatible technology, such as smart phones
wiki
a collaborative website that allows users to create, add to, modify, or delete the content via their browser
True
T/F No single person or government agency controls or owns the Internet
False
T/F The W3C is responsible for maintaining all networks and content on the Internet
True
T/F Users typically pay additional fees for mobile hot spot and tethering servicesf
False
T/F a gigabyte (GB) is the basic storage unit on a computer or mobile device and represents a single character
True
T/F Visitors to a dynamic webpage can customize some or all of the viewed content, such as desired stock quotes, weather, or ticket availability for flights
False
T/F Browsers usually are no included by default with mobile devices and smartphones
True
T/F Mobile apps sometimes have fewer feature than a web app
False
T/F a subject directory is software that finds websites, webpages, images, videos, news, maps, and other information related to a specific topic
True
T/F one technique you can use to improve search results is to use specific nouns
True
T/F the term, blogosphere, refers to the worldwide collections of blogs
False
T/F unregistered wiki users can review the content, as well as edit it and add comments
False
T/F tethering is the process of transferring data in a continuous and even flow, which allows users to access and use a file while it is transmitting
host
any computer that provides services and connections to other computers on a network
dial-up
_____ access takes place when a modem in a computer connects to the Internet via a standard telephone line that transmits data and information using an analog signal
IP address
is a sequence of numbers that uniquely identifies the location of each computer or device connected to the Internet
registrar
you register a domain name through a ___, which is an organization that sells and manages domain names
proxy server
one way to protects your identity while browsing is to use a ____, which is another computer that screens all your incoming and outgoing messages
Hypertext Transfer Protocol
a set of rules that defines how webpages transfer on the Internet
informational
_____ website contains factual information, such as libraries, encyclopedias, dictionaries, directories, guides, and other types of reference
hashtag
consists of a number sign followed by a keyword, describes and categorizes a Tweet
true
T/F malware authors focus on social media, with the goal of stealing personal information
False
T/F although they can save space, all-in-one desktops usually are more expensive than a system unit and monitor purchased separately
False
T/F most traditional and ultrathin laptop and ultrabook screens range in size from 7-10 inches, and most tablet and netbook screens range in size from 11-18 inches
True
T/F dedicated servers typically require a faster processor, more memory. and additional storage
False
T/F most computers and electronic devices are analog, which use only two discrete states: on and off
True
T/F some mobile devices allow you to transfer photos using wireless technologies such as Bluetooth and Wi-Fi
True
T/F most smartphones also can function as portable media players and digital cameras
True
T/F because embedded computers are components in larger products, they usually are small and have limited hardware
False
T/F instead of the term, port, the term, connector, sometimes it used to identify audio and video ports
False
T/F Newer versions of USB are backward compatible, which means they support only new USB devices, not older ones
True
T/F because the processor in a computer is particularly sensitive to current fluctuations, you always should use a surge protector
False
T/F an offline UPS always runs off the battery
peripheral
examples of a ____ device include keyboard, mouse, microphone, monitor, printer, USB flash drive, scanner, webcam, and speakers
system unit
some people use this term to refer to the case that contains and protects the motherboard, hard disk drive, memory, and other electronic components of the computer from damage
all-in-one desktop
some desktops called a ___, do not have a tower and instead house the screen and system unit in the same case
workstation
power users may work with a high-end desktop, sometimes called a ______, that is designed to handle intense calculations and powerful graphics
servers
services provided by _____ include storing content and controlling access to hardware, software, and other resources on a network
backup server
a dedicated server that backs up and restores files, folders, and media
CSC
a four or five-digit number assigned to a specific content or mobile service provider
USB port
can connect up to 127 different peripheral devices together with a single connector
False
T/F applications software serves as the interface between the user, the apps, and the computer’s or mobile device’s hardware
True
T/F each time you start a computer or mobile device, the system software is loaded from storage into memory
False
T/F open source software is mass-produced, copyrighted software that meets the needs of a wide variety of users
true
T/F when downloading shareware, freeware, or public-domain software, it is a good practice to seek websites with ratings for and reviews of products
true
T/F while a computer or mobile device is running, the operating system remains in memory
False
T/F with database software, users run functions to retrieve data
True
T/F software suites offer three major advantages: lower cost, ease of use, and integration
True
T/F a PDF file can be viewed and printed without the software that created the original document
True
T/F the military and airlines might use CBT simulations to train pilots to fly in various conditions and environments
False
T/F an antivirus program automatically deletes quarantined files
True
T/F one of the fastest growing threats in mobile apps is toll fraud malware
False
T/F cookies typically are considered a type of spyware
tools or utilities
programs called ____ enable you to perform maintenance-type tasks usually related to managing devices, media, and programs used by computers and mobile devices
custom
___ software performs functions specific to a business or industry
license agreement
a ____ is the right to use a program or app
spreadsheet
___ software is an application that allows users to organize data in rows and columns and perform calculations on the data
CAD software
____ is a type of application that assists professionals and designers in creating engineering, architectural, and scientific designs and models
compress
refers to decreasing a photo’s file size
trojan horse
is a destructive program disguised as a real program
virus signature
a known, specific pattern of virus code
False
T/F any illegal act involving the use of a computer or related devices generally is referred to as crimeware
True
T/F some malware contains elements of a virus, worm, and trojan horse
False
T/F a rootkit displays an online advertisement in a banner or pop-up window on webpages, email, or other Internet services
True
T/F an audit trail records in a file both successful and unsuccessful access attempts
True
T/F it is good practice to change your password frequently
False
T/F a typical license agreement allows you to rent or lease the software
False
T/ F unencrypted, readable data is called ciphertext
false
T/F private key encryption also is called asymmetric key encryption
True
T/F VPNs encrypt data to help ensure that the data is safe from being intercepted by unauthorized people
True
T/F although wireless access provides many conveniences to users, it also poses additional security risks
False
T/F it is impossible to detect if someone is accessing your wireless home network
True
T/F before recycling, refurbishing, or discarding your old computer, you should erase, remove, or destroy its hard disk so that the information it stored remains private
cyberextortionist
someone who demands payment to stop an attack on an organizations’s technology infrastructure
spyware
a type of malware that is placed on a computer without the user’s knowledge that secretly collects information about the user
unauthorized access and use
an employee using an organization’s computer to send personal email messages might be an example of _____
passphrase
a private combination of words, often up to 100 characters in length and containing mixed capitalization and punctuation, associated with a user name that allows access to certain computer resources
expansion
____ encryption algorithm inserts characters between existing characters
public key
a set of characters that the originator of the data uses to encrypt the text and the recipient of the data uses to decrypt the text
continuous data protection
a _____ backup method is the only real-time back up, providing very fast recovery of data
session cookie
online shopping websites generally use a ____ to keep track of items in a user’s shopping cart

Get instant access to
all materials

Become a Member