Exam 1 Set 2 – Flashcards
Unlock all answers in this set
Unlock answersquestion
The first digital computers were built during World War II for ____.
answer
code breaking
question
The modern definition and use of the term computer emerged in the ____
answer
1940s
question
An electronic component that can be programmed to perform tasks is a ____.
answer
CPU
question
A named collection of data that exists on a storage medium is known as (a) ____.
answer
file
question
The master controller for all activities that take place within a computer is ____.
answer
the operating system
question
An ordinary personal computer that is connected to a network is a ____.
answer
workstation
question
A compute-intensive problem runs on a ____.
answer
supercomputer
question
Digital devices can use ____ as a code to represent character data
answer
ASCII, extended ASCII, or Unicode
question
You might represent ____ using character codes.
answer
Social Security numbers
question
1,024 bytes is a ____.
answer
kilobyte
question
The ____ in machine language is a command word for an operation such as add, compare, or jump.
answer
op code
question
The ____ from an instruction specifies the data.
answer
operand
question
The ____ is the part of the microprocessor that performs arithmetic operations, as shown in the accompanying figure.
answer
ALU
question
A ____ is a series of characters that becomes a person's unique identifier
answer
PIN code, password, or User ID
question
In terms of an authentication protocol, the phrase 'something a person possesses' could refer to ____.
answer
biometrics
question
A problem a hacker can cause after breaking into your computer might be ____.
answer
applying for credit in your name, applying for a mortgage using your data, and sending embarrassing e-mails
question
Password management functions include all of the following EXCEPT ____.
answer
recording keystrokes
question
The ____ is the case that holds the computer's main circuit boards, microprocessor, memory, power supply, and storage devices.
answer
system unit
question
Gaming computers typically include ____.
answer
very fast processors, lots of memory, and state of the art sound capabilities
question
A technology called ____ allows the processor to begin executing another instruction before it completes the previous instruction.
answer
pipelining
question
RAM can be thought of as the ____ for the computer's processor
answer
waiting room
question
The ____ is the amount of data that a storage device can move from the storage medium to the computer per second.
answer
data transfer rate
question
Storage capacity usually is measured in ____.
answer
gigabytes or terabytes
question
Hard disk storage technology can be classified as ____ storage.
answer
magnetic
question
A hard disk ____ is a flat, rigid disk made of aluminum or glass and coated with magnetic iron oxide particles.
answer
platter
question
Which of the following is an example of a rerecordable optical storage medium? BD-RE, CD-RW, DVD+RW or all of the above?
answer
all of the above
question
Which is the highest resolution? SXGA, VGA, WQXGA, or SVGA?
answer
WQXGA
question
A(n) ____ printer can print on both sides of the paper
answer
duplex
question
Which of the following is tracking and recovery software? LoJack for Laptops, WebAngel, STOP, or Laptop Location System?
answer
LoJack for Laptops
question
A ____ is a device that not only provides surge protection, but also furnishes your computer with battery backup power during a power outage.
answer
UPS
question
Which of the following would NOT be true of computers priced higher than $1,200? These computers contain one or more fast processors,These computers have a generous amount of RAM, These computers do not adequately support video editing tasks, or These computers are likely required by anyone working extensively with video editing
answer
These computers are likely required by anyone working extensively with video editing
question
System software is designed to accomplish ____ tasks.
answer
computer-centric
question
Software considered to be utility software is ____.
answer
the Windows operating system
question
Adobe Reader works with files stored in standard ____ format.
answer
PDF
question
____ utilities alter a user's interface to create an accessible environment.
answer
Adaptive
question
An example of software most commonly associated with productivity software is ____.
answer
word processing software
question
In the accompanying figure, the items marked C represent ____
answer
records
question
To find a particular record or group of records in a database, you use a(n) ____.
answer
query
question
Popular presentation software products include all of the following EXCEPT ____.
answer
Movie Maker
question
All the following are examples of portable applications EXCEPT ____. Firefox, Filezilla, Thunderbird, or Microsoft Internet Explorer.
answer
Microsoft Internet Explorer
question
A service pack ____.
answer
provides updates for the operating system
question
To get rid of software you no longer want from a PC, you ____.
answer
uninstall
question
Indicators of pirated software include all of the following EXCEPT software that ____. 1.has photocopied software manuals 2.has CD-ROMs with handwritten labels 3.is downloaded 4.is marked as an "academic" product, but not purchased through an authorized dealer
answer
is downloaded
question
A shrink-wrap license goes into effect as soon as you ____.
answer
open it
question
As shown in the accompanying figure, a(n) ____ is a legal contract that defines the ways in which you may use a computer program.
answer
software license
question
The item shown in the accompanying figure is ____.
answer
displayed onscreen when you first install software
question
During product activation, you must ____.
answer
enter a product key
question
A ____ is any software that can automate a task or autonomously execute a task when commanded to do so.
answer
bot
question
The term rootkit refers to ____.
answer
software tools used to conceal malware and backdoors
question
A virus signature is a ____.
answer
section of program code used to identify a known malicious program
question
Tom owns a small company and is purchasing a software license for his company. He originally had to purchase a copy of each piece of software for each of his employees. However, one of his friends told him there were other types of license agreements. Tom has come to you and asked for help in deciding what kind of license is right for his company One of Tom's employees told him about a ____ license that goes into effect as soon as you open the packaging.
answer
shrink-wrap
question
Network service providers include ____. at&t,verizon, sprint, or all of the above.
answer
all of the above
question
The accompanying figure represents the connection of your computer to the Internet; the router marked A should belong to a(n) ____.
answer
ISP
question
The octets in an IP address correspond to a ____.
answer
Network Class
question
____ is a valid top-level domain.
answer
.ca
question
DNS cache ____ has been used by governments to keep citizens away from Web sites that supply politically or culturally inflammatory information.
answer
poisoning
question
You need your own domain name if ____.
answer
you have your own website
question
Technical management of the Internet's Domain Name System is coordinated by ____.
answer
ICANN
question
DSL uses ____ to transmit data.
answer
phone lines
question
____ currently offers the fastest Internet access speeds.
answer
cable
question
Cable Internet service needs ____.
answer
circuitry to handle Ethernet protocols and a cable modem
question
____ wireless Internet service is designed to offer Internet access to homes and businesses by broadcasting data signals over areas large enough to cover most cities and outlying areas
answer
WiFi
question
____ computing depends on a grid of servers, storage devices, and protocols that offer Internet-accessible computing services ranging from consumer-level media sharing to office productivity applications and complex corporate data processing.
answer
Cloud
question
To set up free VoIP, you and the people you communicate with can install free VoIP clients such as ____.
answer
Blink
question
The accompanying figure is a screenshot of FileZilla, in which the ____ file will go to the location pointed to by box B.
answer
uploaded
question
With BitTorrent, as more computers request the file, they become part of a ____ that uses peer-to-peer technology to exchange file pieces with each other.
answer
swarm
question
Network services such as the Web, ftp, and e-mail operate from ____
answer
ports
question
____ are intended to work within LANs to monitor and direct packets being transported from one device to another.
answer
Routers
question
The accompanying figure represents a virtual private network. In this figure, A points to ____ data.
answer
encrypted
question
One important security precaution when connecting your computer to public networks is to install a(n) ____.
answer
office suite
question
Tom is currently using dial-up for his Internet connection but he believes it is too slow for his needs and ties up his phone line. He is looking for an alternative and has come to you for help. Tom wants to know what kind of service to opt for if cable Internet service is not available, or proves slower or less dependable than expected. You tell him the next choice would be ____.
answer
cable
question
Sally often travels for her business. She needs a way to access the Internet while away from home. She has come to you for help. You describe WiMAX to Sally. You tell her ____. you can use the same provider for home and mobile use, you must get a "day pass" to use WiMAX if you are outside your home, it is great and that there is wide coverage,or all of the above
answer
all of the above
question
Sally often travels for her business. She needs a way to access the Internet while away from home. She has come to you for help. Sally has heard that cellular data service has poor quality. You tell her ____.
answer
that it depends on the generation of technology being used
question
Harry is concerned about Internet security. He knows very little about the subject but does know it has been in the news a great deal lately. He needs your advice. Harry's daughter has a personal VPN. He has decided he wants to be current and wants one also. You tell him
answer
that it would provide extra security if he intends to use public Wi-Fi hotspots
question
In the URL found in the accompanying figure, .htm is the ____.
answer
file extension
question
In the URL found in the accompanying figure, www.cnn.com is the ____.
answer
Web Server Name
question
All of the following are currently popular browsers EXCEPT ____.
answer
Netscape Navigator
question
A ____ enables a Web server to keep track of your activity and compile a list of your purchases.
answer
cookie
question
HTML ____ are used to display a question and a box into which you can enter an answer.
answer
forms
question
A search engine's ____ looks for your search terms in the search engine's indexed database and returns a list of relevant Web sites
answer
query processor
question
A(n) ____ keyword is entered into a header section of a Web page when it is created and is supposed to describe the page contents.
answer
meta
question
In addition to using search engines, you can also find Web-based information using a(n) ____ engine that searches a series of other search engines and compiles the search results
answer
metasearch
question
When you purchase a textbook online from a site like www.amazon.com, you are participating in ____ e-commerce
answer
B2C
question
____ e-commerce occurs when businesses sell to governments.
answer
B2G
question
____ is similar to POP3, but it leaves messages on the server until you specifically delete them.
answer
IMAP
question
To use local e-mail you must install e-mail ____ software on your computer.
answer
client
question
In a classic Webmail configuration, messages are sent immediately and thus a(n) ____ is not needed.
answer
client
question
Webmail allows you to use a(n) ____ to access and view your e-mail messages.
answer
browser
question
An e-mail message in ____ format can include graphics in addition to a wide variety of fonts and font colors
answer
HTML
question
When working with ____ mail, make sure your antivirus software is checking incoming messages
answer
HTML
question
____ may pose a threat to your computer's security and/or your privacy. Flash cookies, Ad-serving cookies,Web bugs, or all of the above
answer
all of the above
question
When you view a page infested with a(n) ____, an HTTP set-cookie request automatically goes to a third-party server, which may set a cookie on your computer for later retrieval or record your IP address.
answer
Web Bug
question
A tradeoff to the anonymity offered by anonymous ____ is that they tend not to operate at the same speed as your regular browser.
answer
proxies
question
A(n) ____ is a type of utility software that captures unsolicited e-mails before they reach your inbox.
answer
spam filter
question
Amelia tells Mark that when he enters a URL in his browser's Address box and presses the Enter key, a communications process begins. The domain name contained in the URL leads to a Web server that his browser contacts. The browser opens a socket and connects to a similar open socket at the Web server. Then the browser generates and sends an HTTP message through the socket. The server responds by sending back the requested HTML document through the open sockets. At this point, Amelia tells Mark, the final step in the process occurs. What is this last step?
answer
The server closes its socket and the browser closes its socket.
question
Jessica likes to participate in B2C e-commerce, but recently has had a number of friends who have had problems shopping online. She wonders if it is safe to shop online and just how much she is compromising her privacy by doing so. Jessica is justifiably worried about the security of the personal information and credit card information she regularly supplies while shopping on the Web. In addition, she knows that merchants who market goods and services over the Internet sometimes secretly gather information and provide it to advertisers or other interested parties. Jessica has an always-on connection to the Internet. She has read about IP addresses and knows that some Web sites can track them. She would like to surf the Internet anonymously to protect her privacy. How can she do this?
answer
use an anonymous proxy service
question
Melissa has decided to obtain an e-mail account. Although she plans to use the e-mail account to communicate with her many friends, her main purpose in establishing it is to aid in the search for a job. She has a list of e-mail addresses for a group of potential employers. Melissa intends to e-mail her resume, along with a general message, to each of them. She will use the same message for all recipients Melissa is planning to travel a great deal in the coming weeks. She will not be taking her computer with her, but knows that the hotels she will be staying at have business centers with Internet-enabled computers. She plans to access her e-mail account every day so that she can quickly respond should she be contacted by a prospective employer. Which one of the following account types should she use?
answer
WebMail