CSC Test 1 Flashcards

Unlock all answers in this set

Unlock answers
question
T/F Electronic components in computers process data using instructions, which are the steps that tell the computer how to perform a particular task
answer
True
question
T/F Screens for desktops cannot yet support touch
answer
False
question
T/F Smaller applications, such as home, typically use a powerful, expensive server to support their daily operations
answer
False
question
T/F Smartphones typically communicate wirelessly with other devices or computers
answer
True
question
T/F Data conveys meaning to users, and information is a collection of unprocessed items, which can include text, numbers, images, audio, and video
answer
False
question
T/F As widespread as computers appear to be, most daily activities do not involve the use of or depend on information from them
answer
False
question
T/F A scanner is a light-sensing output device
answer
False
question
T/F Because it contains moving parts, flash memory is less durable and shock resistant than other types of media
answer
False
question
T/F The terms, web, and Internet, are interchangeable
answer
False
question
T/F One way to protect your computer from malware is to scan any removable media before using it
answer
True
question
T/F Operating systems are a widely recognized example of system software
answer
True
question
T/F You usually do not need to install web apps before you can run them
answer
True
question
A(n) _____ is any hardware component that allows you to enter data and instructions into a computer or mobile device
answer
input device
question
Which of the following is NOT and example of an out put device. a) scanner b)printer c) display d)speaker
answer
scanner
question
consists of electronic components that store instructions waiting to be executed and the data needed by those instructions
answer
memory
question
removable flash memory; usually no bigger than 1.5 inches in height or width, that you inset in and remove from a slot in a computer, mobile device, or card reader/writer
answer
memory card
question
a computer that delivers requested webpages to your computer or mobile device
answer
web server
question
software consists of programs designed to make users more productive and/or assist them with personal tasks
answer
application
question
uses the cellular network to enable high-speed Internet connections to devices with built-in compatible technology, such as smart phones
answer
cellular radio
question
a collaborative website that allows users to create, add to, modify, or delete the content via their browser
answer
wiki
question
T/F No single person or government agency controls or owns the Internet
answer
True
question
T/F The W3C is responsible for maintaining all networks and content on the Internet
answer
False
question
T/F Users typically pay additional fees for mobile hot spot and tethering servicesf
answer
True
question
T/F a gigabyte (GB) is the basic storage unit on a computer or mobile device and represents a single character
answer
False
question
T/F Visitors to a dynamic webpage can customize some or all of the viewed content, such as desired stock quotes, weather, or ticket availability for flights
answer
True
question
T/F Browsers usually are no included by default with mobile devices and smartphones
answer
False
question
T/F Mobile apps sometimes have fewer feature than a web app
answer
True
question
T/F a subject directory is software that finds websites, webpages, images, videos, news, maps, and other information related to a specific topic
answer
False
question
T/F one technique you can use to improve search results is to use specific nouns
answer
True
question
T/F the term, blogosphere, refers to the worldwide collections of blogs
answer
True
question
T/F unregistered wiki users can review the content, as well as edit it and add comments
answer
False
question
T/F tethering is the process of transferring data in a continuous and even flow, which allows users to access and use a file while it is transmitting
answer
False
question
any computer that provides services and connections to other computers on a network
answer
host
question
_____ access takes place when a modem in a computer connects to the Internet via a standard telephone line that transmits data and information using an analog signal
answer
dial-up
question
is a sequence of numbers that uniquely identifies the location of each computer or device connected to the Internet
answer
IP address
question
you register a domain name through a ___, which is an organization that sells and manages domain names
answer
registrar
question
one way to protects your identity while browsing is to use a ____, which is another computer that screens all your incoming and outgoing messages
answer
proxy server
question
a set of rules that defines how webpages transfer on the Internet
answer
Hypertext Transfer Protocol
question
_____ website contains factual information, such as libraries, encyclopedias, dictionaries, directories, guides, and other types of reference
answer
informational
question
consists of a number sign followed by a keyword, describes and categorizes a Tweet
answer
hashtag
question
T/F malware authors focus on social media, with the goal of stealing personal information
answer
true
question
T/F although they can save space, all-in-one desktops usually are more expensive than a system unit and monitor purchased separately
answer
False
question
T/F most traditional and ultrathin laptop and ultrabook screens range in size from 7-10 inches, and most tablet and netbook screens range in size from 11-18 inches
answer
False
question
T/F dedicated servers typically require a faster processor, more memory. and additional storage
answer
True
question
T/F most computers and electronic devices are analog, which use only two discrete states: on and off
answer
False
question
T/F some mobile devices allow you to transfer photos using wireless technologies such as Bluetooth and Wi-Fi
answer
True
question
T/F most smartphones also can function as portable media players and digital cameras
answer
True
question
T/F because embedded computers are components in larger products, they usually are small and have limited hardware
answer
True
question
T/F instead of the term, port, the term, connector, sometimes it used to identify audio and video ports
answer
False
question
T/F Newer versions of USB are backward compatible, which means they support only new USB devices, not older ones
answer
False
question
T/F because the processor in a computer is particularly sensitive to current fluctuations, you always should use a surge protector
answer
True
question
T/F an offline UPS always runs off the battery
answer
False
question
examples of a ____ device include keyboard, mouse, microphone, monitor, printer, USB flash drive, scanner, webcam, and speakers
answer
peripheral
question
some people use this term to refer to the case that contains and protects the motherboard, hard disk drive, memory, and other electronic components of the computer from damage
answer
system unit
question
some desktops called a ___, do not have a tower and instead house the screen and system unit in the same case
answer
all-in-one desktop
question
power users may work with a high-end desktop, sometimes called a ______, that is designed to handle intense calculations and powerful graphics
answer
workstation
question
services provided by _____ include storing content and controlling access to hardware, software, and other resources on a network
answer
servers
question
a dedicated server that backs up and restores files, folders, and media
answer
backup server
question
a four or five-digit number assigned to a specific content or mobile service provider
answer
CSC
question
can connect up to 127 different peripheral devices together with a single connector
answer
USB port
question
T/F applications software serves as the interface between the user, the apps, and the computer's or mobile device's hardware
answer
False
question
T/F each time you start a computer or mobile device, the system software is loaded from storage into memory
answer
True
question
T/F open source software is mass-produced, copyrighted software that meets the needs of a wide variety of users
answer
False
question
T/F when downloading shareware, freeware, or public-domain software, it is a good practice to seek websites with ratings for and reviews of products
answer
true
question
T/F while a computer or mobile device is running, the operating system remains in memory
answer
true
question
T/F with database software, users run functions to retrieve data
answer
False
question
T/F software suites offer three major advantages: lower cost, ease of use, and integration
answer
True
question
T/F a PDF file can be viewed and printed without the software that created the original document
answer
True
question
T/F the military and airlines might use CBT simulations to train pilots to fly in various conditions and environments
answer
True
question
T/F an antivirus program automatically deletes quarantined files
answer
False
question
T/F one of the fastest growing threats in mobile apps is toll fraud malware
answer
True
question
T/F cookies typically are considered a type of spyware
answer
False
question
programs called ____ enable you to perform maintenance-type tasks usually related to managing devices, media, and programs used by computers and mobile devices
answer
tools or utilities
question
___ software performs functions specific to a business or industry
answer
custom
question
a ____ is the right to use a program or app
answer
license agreement
question
___ software is an application that allows users to organize data in rows and columns and perform calculations on the data
answer
spreadsheet
question
____ is a type of application that assists professionals and designers in creating engineering, architectural, and scientific designs and models
answer
CAD software
question
refers to decreasing a photo's file size
answer
compress
question
is a destructive program disguised as a real program
answer
trojan horse
question
a known, specific pattern of virus code
answer
virus signature
question
T/F any illegal act involving the use of a computer or related devices generally is referred to as crimeware
answer
False
question
T/F some malware contains elements of a virus, worm, and trojan horse
answer
True
question
T/F a rootkit displays an online advertisement in a banner or pop-up window on webpages, email, or other Internet services
answer
False
question
T/F an audit trail records in a file both successful and unsuccessful access attempts
answer
True
question
T/F it is good practice to change your password frequently
answer
True
question
T/F a typical license agreement allows you to rent or lease the software
answer
False
question
T/ F unencrypted, readable data is called ciphertext
answer
False
question
T/F private key encryption also is called asymmetric key encryption
answer
false
question
T/F VPNs encrypt data to help ensure that the data is safe from being intercepted by unauthorized people
answer
True
question
T/F although wireless access provides many conveniences to users, it also poses additional security risks
answer
True
question
T/F it is impossible to detect if someone is accessing your wireless home network
answer
False
question
T/F before recycling, refurbishing, or discarding your old computer, you should erase, remove, or destroy its hard disk so that the information it stored remains private
answer
True
question
someone who demands payment to stop an attack on an organizations's technology infrastructure
answer
cyberextortionist
question
a type of malware that is placed on a computer without the user's knowledge that secretly collects information about the user
answer
spyware
question
an employee using an organization's computer to send personal email messages might be an example of _____
answer
unauthorized access and use
question
a private combination of words, often up to 100 characters in length and containing mixed capitalization and punctuation, associated with a user name that allows access to certain computer resources
answer
passphrase
question
____ encryption algorithm inserts characters between existing characters
answer
expansion
question
a set of characters that the originator of the data uses to encrypt the text and the recipient of the data uses to decrypt the text
answer
public key
question
a _____ backup method is the only real-time back up, providing very fast recovery of data
answer
continuous data protection
question
online shopping websites generally use a ____ to keep track of items in a user's shopping cart
answer
session cookie
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New