cosc Flashcards

(97 cards)

1
Q

A byte’s ______is a unique number that identifies the location of a byte in memory.

A

address

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

true or false: Flash memory is a type of nonvolatile memory that can be erased electronically and rewritten.

A

true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

true or false: The speed of the system clock has no effect on peripheral devices.

A

true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

true or false: If your computer requires that you install memory in pairs, it doesn’t matter if the two memory modules are the same type, size, or speed

A

false

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Why is fiash memory considered nonvolatile?

A

It retains data even when it is not receiving power.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

an ____ bus is used to transfer information about where the data should reside in memory

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

true or false: DRAM chips are faster and more reliable than SRAM chips.

A

false

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

The system generates regular electronic pulses that set the operating pace of the system unit.
clock

A

clock

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

true or false :A front side bus is part of the motherboard and connects the processor to main memory.

A

true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

CPU stands for central____ unit

A

processing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

true or false: Many newer mobile devices and computers, such as some ultrathin laptops, do not have removable batteries

A

true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Flash memory is a type of

A

EEPROM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

The motherboard is sometimes called a(n)____
board.

A

system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Which cache level uses ATC?

A

L2

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

DaaS stands for
as a service.

A

data

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

true or false: The Internet of Things can help to streamline a company’s production and manufacturing processes.

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A(n) _____bus connects the processor to cache.

A

backside

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

true or false: RAM is an example of nonvolatile memory

A

false

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Peripheral devices normally occupy space inside of the system unit.

A

false

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

true or false: A session cookie stores user names and/or passwords so that users do not need to enter this information every time they sign in to the website.

A

false

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

true or false Piracy is the most common form of software theft

A

true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

PiN ____ stands for personal identification

A

number

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

true or false: With a credit card purchase, when users sign their name on a signature capture pad using a stylus, the retailer uses a signature verification system to authenticate the use

A

false

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

What is the name for a device infected with malware that an attacker uses to control the device remotely?

A

zombie

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Secure websites_____ information before sending it between computers
encrypt
26
true or false: The website for GERT/CC provides information about internet security breaches
true
27
A(n) or allowed/not allowed Is a written guideline that helps determine whether a specification is ethical/unethical
code of conduct
28
An) is a tool hackers use to record your keystrokes
keylogger
29
true or false:common digital security risks include information theft and system failure
true
30
true or false: Software used to fight cybercriminals is called crimeware.
false
31
true or false: A hand geometry system measures the size and shape of a person's hand
true
32
malware is short for ____ software
malicious
33
true or false: Unusually high drive activity or a slower than normal Internet activity are signs that your computer or mobile device may be a zombie
true
34
When creating passwords for online accounts. you should
use a different password for each account
35
true or false: a rootkit can be a backdoor
true
36
Which of the following is not recommended to protect against hardware failure?
cables and locks
37
How does Windows Hello work to authenticate you?
It scans and verifies your fingerprnt, face, or its
38
an ____ was originally a complimentary work for a computer enthusiast
hacker
39
Passcode is another term for a(n)
PIN
40
true or false: A smartphone is an Internet-capable phone that usually also includes a calendar, an address book, a calculator, a notepad, games, brows
true
41
true or false : If you are purchasing a new desktop, chances are it will include the latest version of your preferred operating system.
true
42
true or false : Malware creators are targeting smartphones, particularly those using the Android operating system.
true
43
Lighting. HDMI, and Thunderbolt are all types of
ports
44
true or false : A mainframe is a network of several servers together in a single location.
false
45
true or false : A point-and-shoot camera is a high-end digital camera that has interchangeable lenses.
false
46
true or false: Once example of the trend called the Internet of Things is if your refrigerator sends your phone a message that you need milk Selected Answer:
true
47
Which of the following components most affects a computer's speed?
cpu
48
_____is the process of initiating contact between two Bluetooth devices.
pairing
49
true or false : An ATM asks you to enter a numeric password, called a PIN, which stands for Private Identity Name.
false
50
true or false: A docking station has less functionality than a port replicator.
false
51
true or false: Smartphones and other mobile devices often can function as a portable media player.
true
52
Fitness games often communicate with a(n)| board, which is shaped like a weight scale and contains sensors.
balance
53
With voice mail, users can view message details, and in some cases read message contents without listening to them
visual
54
true or false : Many handheld computers are industry-specific, such as for parcel delivery peopie.
true
55
A frame that houses the system unit on a desktop is called a(n)
tower
56
true or false: keyboard, mouse, and microphone ali are exampies of peripheral devices
true
57
Which of the following server types is in the form of a single circuit board?
blade
58
true or false: Most computers and electronic devices are analog, which uses only two discrete states, on and off
false
59
Which of the following best describes an ultrabook?
A thin laptop that uses a low-power processor
60
What is a blog?
a website organized by biog posts, or individual news stories
61
an ____ site, such as Pinterest, is a website that enables members to organize, tag, and share links to media and other online content
bookmarking
62
GPS stands for
global positioning system
63
_____an abusive or insulting message in online communication,
flame
64
Why might you want to set up a personal hotspot?
Security a personal hotspot is more secure than a public network.
65
DSL and FTTP are examples of wired_____ Internet service technologies.
boardband
66
Which of the following is NOT true about public Wi-Fi hot spot safety?
Always keep your wireless connection on
67
Which of the following is not a way cybercriminals try to gather your personal information on social media sites?
blocking your friend requests
68
With an all-in-one computer the display device is separate from the tower.
false
69
true or false : A gigabyte is equal to approximately a million characters:
false
70
What part of http://www.nps.gov/history/preserve-places.html is the protocol?
http://
71
true or false : ICANN currently manages domain names.
false
72
A result from a search engine search is called a(n).
hit
73
true or false: Using a subject directory, you locate a particular topic by clicking links through different levels
true
74
When attackers use third-party ads to infect your computer with malware, it is called
malvertising
75
Skype is an example of software,
VolP
76
The major carriers of network traffic are known collectively as the internet
backdone
77
true or false :A web feed contains links to or information about updated or changed content on a website.
true
78
if you use an asterisk (*) in a search engine query, what are you trying to do?
Substitute characters.
79
Cable and DSL internet connections are called
broadband
80
an ____network is a system that attempts to intiate the behavior of the human brain
neural
81
true or false flash memory has many moving parts, making it less durable and shock resistant than other types of media
false
82
which internet communication service can you use to transfer items to and from other computers in the internet
FTP
83
which of the following is not a basic function of a computer - accept data - store information - process data - produce input
produce input
84
www.cengagebrain.com is an example of a valid web _____
address
85
true or false - a password is a unique combination of characters that identifies one specific user
false
86
a collection of related instructions organized for a common purpose is referred to as ___
software
87
activity trackers and smartwatches are two types of _____ devices
wearables
88
by subscribing to an isp, you can connect to the internet through your computers and mobile devices
true
89
true or false :engineers, scientists, architects, game designers, and graphic artists are examples of power users
true
90
an _______ is a set of program that coordinates all the activities among computers or mobile devices
operating system
91
digital device ______is the trend of computers and devices with technologies that overlap
convergence
92
____ consist of electronic components that store instructions and data waiting to be executed
memory
93
a common way to display a shortcut menu using a mouse is to ___
right click
94
true of false- storage consists of electronic components that store instructions and data waiting to be executed
false
95
compressed files sometimes are called ___ files
zipped
96
true or false - because the are compressed you usaully cannot use backup files in their backup from
true
97
sales, marketing, and manufacturing are all types of software typically used by
enterprise