Ch 3 Flashcards

1
Q

A _________ sometimes called a system board, is the main circuit board of a personal computer.

A

motherboard

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

CPU is another name for a ____________ which is the electronic component that interprets and carries out the basic instructions that operate a computer.

A

Processor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Security experts recommend using a sticker to cover a ___________ when you are not using it and inserting a dummy plug in a microphone port when you are not using it.

A

webcam

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A ___________ is a device that combines features of a smartphone and tablet. It usually has a screen that measures 5 to 7 inches.

A

Phablet

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

A _________ is a computer dedicated to providing one or more services to other devices on a network.

A

Server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

A ________ is a computer, usually with limited processing power, that enables users to send data to and or receive information a server or host computer.

A

Terminal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

A self service __________ is a freestanding terminal that usually has a touch screen for user interaction.

A

Kiosk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A ____________ is the fastest, most powerful and most expensive computer.

A

Super computer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

A __________ is the smallest element in an electronic image.

A

Pixel

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

___________ is the number of horizontal and vertical pixels in a display.

A

Resolution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

An __________ computer is a special purpose computer that functions as a component in a larger product such a scar or television.

A

Embedded

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

The ___________ describes an environment where processors are embedded in every product imaginable allowing the products to communicate.

A

Internet of things

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

A ___________ is the point at which a peripheral device attaches to or communicates with a device.

A

Port

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A ___________ joins a cable to a port.

A

Connector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A USB port an connect up to _________ different peripheral devices together with a single connector.

A

127

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Bluetooth devices have to be within about ________ feet of each other.

A

33

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Wifi uses radio signals that conform to 802.11 standards that were developed by the ________________.

A

Institute of electrical and electronics engineers

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A ___________ is a prolonged under voltage that may cause loss of data.

A

Brownout

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A ____________ is a momentary over voltage that occurs when the increase in power lasts for less than one millisecond.

A

Spike

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A ____________ uses electrical components to provide a stable current flow and minimize the risk of an over voltage.

A

Surge protector

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Excel may change how the groups and buttons within the groups appear on the ribbon, depending on the computer or mobile devices_____________.

A

Screen resolution

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

The _________ may be used to fill in a data series rather than typing and formatting all the entries.

A

Fill handle

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

A formula using __________ cell reference instructs Excel to adjust cell reference as it is copied to a destination area.

A

Relative

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

To keep a cell reference constant when you are copying, Excel uses a technique called __________ cell referencing.

A

Absolute

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Use an _________ function to determine the value of a cell based on a logical test.
IF
26
____________ is an Excel feature that looks for patterns in data and automatically fills or formats data in remaining cells.
Flash fill
27
A ___________ consists of cell references, numbers, and arithmetic operators that instruct Excel to perform a calculation.
Formula
28
A formula in a cell that contains a reference back to itself is called a _____________.
Circular reference
29
In Excel as n algebra, you can always use __________ to override the order of operations.
Parenthesis
30
___________ allows you to select cells for use in a formula by using the pointer.
Point mode
31
The _________ function displays the highest value of a range.
Max
32
____________ functions ignore blank cells.
Statistical
33
___________ checks which cells are referenced in the formula assigned to the active cell.
Range finder
34
__________ Format button assigns a fixed dollar sign to a number and rounds the figure to the nearest 100th.
Accounting number
35
__________ allows the user to automatically change how a cell appears based on the value of the cell.
Conditionally formatting
36
A _________ is a dot on the screen the contains a color.
Pixel
37
Click on the __________ tab on the ribbon to open Backstage view.
File
38
A __________ is the intersection of a column and a row.
Cell
39
Each workbook has 16,384 columns and 1,048576 rows for a total of ____________.
17179869184
40
A cell _________ is the coordinates of the intersection of a column and a row.
Reference
41
The cell in which you canister data is called the _________ cell.
Active
42
The horizontal and vertical lines on the worksheet are called __________.
Gridlines
43
When you type contents into a cell, Excel displays the entry in the _________ bar.
Formula
44
Excel displays the active cell reference in the ________ box on the left side of the formula bar.
Name
45
A __________ is a visual representation of data.
Chart
46
A ___________ is a series of two or more adjacent cells in a column or row or rectangular group of cells.
Range
47
Excel provides predefined formulas which are called_________.
Functions
48
The _________ is the small green square located in the lower right corner of the heavy border around the active cell. It may be used to copy formulas to adjacent cells.
Fill handle
49
Use the __________ button to center contents over several columns.
Merge and center
50
The __________ number format causes numbers to be displayed with tow decimal places and to align vertically with a $ before the number.
Accounting
51
The ________ format causes numbers to be displayed with two decimal places and commas as thousands separators.
Comma style
52
A ___________ chart shows the contribution of each piece of data to the whole, or total, of the data.
Pie
53
A key logger is a type of _________ software that has the capability to record eery keystroke made to a log file.
Surveillance
54
A key logger recorder can record __________ email, and any other information you type at any time using your keyboard.
Instant messages
55
Key loggers can be embedded in __________ allowing your information to be transmitted to an unknown third party.
Spyware
56
How do some employers use key loggers on the machines used by their employees?
Make sure employees use work computers for business purposes only
57
Spyware is software that _________ gathers user information through a users Internet connection without his or her knowledge.
Covertly
58
Spyware applications are typically bundled as a hidden component of _________ or shareware.
Free ware
59
Spyware can also gather information about email addresses and even passwords and____________.
Credit card number
60
Spyware is similar to a ___________ in that users unwittingly install the product when they install something else.
Trojan horse
61
Rootlets are difficult to detect because they are activated before your systems __________ has completely booted up.
Operating system
62
Rootlets are able to intercept data from ____________ , ___________, and the ____________.
Terminals, network connect, key board
63
ICANN is short for _______________.
Internet corporation for Assigned names and numbers
64
IANA is short for ______________.
Internet Assigned Numbers Authority
65
IETF is short for______________.
Internet Engineering Task Force
66
______________ was founded and run by Jon Postel, who is considered by many to be the father of the Internet.
IANA
67
The daily oversight of assigning IP addresses is handled by__________.
IANA
68
_________ was created as a non profit organization to take control away from the U.S. government.
ICANN
69
The __________ develops internet standards and protocols, such as TCP.
IETF
70
A temporary internet file is a file that is located on your hard drive and is used by __________ to store Web site data for every Web page or Url address the you visit.
Browser
71
Loading a Website from a temporary Internet file is called_________.
Caching
72
What is an advantage of having a temporary internet file stored on a device?
You can view the cached versions of recently visited web pages while offline.
73
When you press the delete key in Windows, only ___________ to the files are moved.
Remove the short cuts
74
____________ software allows anyone to reinstate data that has been deleted from a hard rive.
System recovery
75
The disk wiping process will actually __________ your entire hard drive with data, several times.
Overwrite
76
The government standard DoD 5520.22M, considered a medium security level, specifies _____________ iterations to completely overwrite a computer __________ times.
3,6
77
Cookies are used by a Web server to keep track of what?
Users activity on a specific website
78
Can a virus be spread with a cookie or access the hard drive of a computer?
No
79
Can cookies read a computers hard drive?
No