IT – College Essay

Unlock all answers in this set

Unlock answers
question
Storage Media
answer
Media, such as hard disks, solid-state drives, USB flash drives, memory cards, and optical discs, on which a computer keeps data, instructions, and information
question
Storage Device
answer
Device that records (writes) and/or retrieves (reads) items to and from storage media
question
Which of the following high-speed Internet connections use an antenna on a house or business to communicate with a tower location via radio signals?
answer
Fixed Wireless
question
Which of the following is a technology that provides high-speed Internet connection using the telephone network?
answer
DSL
question
Which of the following is equal to approximately one million characters?
answer
Megabyte
question
Which of the following is application software that allows users to access and view webpages?
answer
Browser
question
What kind of server is another computer that screens all your incoming and outgoing messages?
answer
Filter
question
A search engine displays a list of webpage names that contain the search text. What is the term for that list?
answer
Hits
question
Which of the following is the use of computers to simulate a real or imagined environment that appears as three-dimensional (3-D) space?
answer
VR
question
What is the term for the transmission of messages and files via a computer network?
answer
Email
question
As shown in the accompanying figure, which of the following is a real-time typed conversation that takes place on a computer?
answer
Chat
question
Which of the following identifies broadband Internet connections?
answer
DSL, WI-FI, Fixed wireless
question
Which of the following are criteria for evaluating a website's content?
answer
Affiliation and consumer consensus
question
Which of the following is NOT a media player?
answer
Safari
question
What are two elements found in an email address?
answer
User name and domain name
question
Which of the following is NOT an example of malware?
answer
vaporware
question
Which of the following is NOT an operating system used by today's computers and mobile devices?
answer
DOS
question
Which of the following is true about a computer?
answer
Its electronic components process data using instructions.
question
Most computers and many mobile devices, such as smartphones and portable media players, can connect to which kind of network?
answer
Wi-Fi
question
Multiple print jobs line up in a ____ within a buffer.
answer
queue
question
A file ____ utility, shrinks the size of a file.
answer
compression
question
A(n) ____ OS is an operating system that organizes and coordinates how multiple users access and share resources on a network.
answer
server
question
A(n) ____ is an operation the processor manages.
answer
task
question
A(n) ____ operating system is a complete operating system that works on a desktop computer, a notebook computer, or mobile computing device.
answer
stand-alone
question
Compressed files sometimes are called ____ files.
answer
zipped
question
The first version of Windows was developed in the early ____.
answer
1980s
question
To ____ a file, you restore a zipped file to its original form.
answer
Uncompressed
question
Which of the following is not an operating system function?
answer
word processing
question
With a(n) ____ interface, users interact with menus and visual images such as buttons and other graphical objects to issue commands.
answer
graphical user interface (GUI)
question
Someone who demands payment in order to stop an attack on an organization's technology infrastructure.
answer
cyberextortionist
question
Someone who uses the Internet or network to destroy or damage computers for political reasons
answer
cyberterrorist
question
Computer viruses, worms, Trojan horses, and rootkits are classified as which of the following?
answer
malware
question
In which particularly devastating type of DoS attack are multiple unsuspecting computers used to attack multiple computer networks?
answer
distributed
question
Online or Internet-based illegal acts
answer
cybercrime
question
Used to describe a program that copies itself repeatedly, using up resources and possibly shutting down the computer or network
answer
a worm
question
General term for programs that act without a user's knowledge and deliberately alter the computer's operations
answer
malware
question
A perpetrator is using a botnet. Which of the following is the least likely use of his botnet?
answer
authoring ActiveX scripts
question
What is an AUP intended to do?
answer
Outline computer activities for which the computer and network may or may not be used
question
Used to describe a set of steps that can convert readable plaintext into unreadable ciphertext?
answer
an encryption algorithm
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New