final review Flashcards

1
Q

What are the two types of software?

A

system and application

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Software that allows the application software to interact with the computer is called _________

A

system software

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

The basic operations of a computer are managed by the __________.

A

operating system

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

A __________ is a named collection of data or a program that exists in a computer’s secondary storage.

A

file

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

User-interface features use _________ to facilitate a person’s interaction with the computer.

A

graphics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Keys found on the top or the left of the keyboard that are used to execute commands specific to the software being used are called __________.

A

function keys

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

Small pictures that are used with GUIs to represent programs, data files, or procedures are called __________.

A

icons

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Menus and icons representing frequently used options and commands are displayed across the top of a\the display window in an area known as the __________.

A

toolbar

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Application software is a basic component of system software used to support, enhance, or expand existing programs. True or False

A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Backup, data recovery, virus protection, disk cleanup, and data compression are utility programs. True or False

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Computer keyboards have special-purpose keys that are used to enter, delete, and edit data and to execute commands. TRUE or FALSE

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A rollover feature provides a small box explaining an icon’s function when the mouse pointer is rolled over the icon.
TRUE OR FALSE

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

DOS is a legacy system. TRUE FALSE

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Unix is a proprietary multitasking operating system for multiple users. TRUE FALSE

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

The operating systems used in small or specialized devices, such as mobile phones, are called open-source systems. FALSE TRUE

A

FALSE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

The tiny piece of silicon that houses millions of microminiature electronic circuits is called a __________.

A

chip

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The two digits used in the binary system are __________.

A

0 and 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

A byte represents ________

A

1 character

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

One billion cycles (ticks) of the system clock per second equal 1 __________.

A

gigahertz

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Electrical data roadways through which bits are transmitted within the CPU and other components of the motherboard are called _________.

A

buses

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which port is used to transmit slow data over long distances?

A

serial

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Which of these is a hard-disk technology for large computer systems?

A

RAID

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Cloud storage is ________ storage.

A

online

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

A circuit is a closed path followed or capable of being followed by an electric current. TRUE FALSE

A

TRUE

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
A tiny electrically operated switch that can turn on and off many millions of times per second is a microchip. TRUE FALSE
FALSE
26
A microprocessor contains the miniaturized circuitry of a computer processor. TRUE FALSE
TRUE
27
All data and instructions that go into a computer, are processed by it, and come out of it are represented as binary numbers signaling only two states: on and off. TRUE FALSE
TRUE
28
The binary code widely used with microcomputers is EBCDIC. TRUE FALSE
FALSE
29
Mainframe computers use the binary code EBCDIC. TRUE FALSE
TRUE
30
Unicode uses 2 bytes for each character, rather than 1 byte; ASCII uses 1 byte. TRUE FALSE
TRUE
31
What are devices called that translate data into a form the computer can process
input hardware
32
Which of the following is NOT an input device? A. lightpen B. webcam C. scanner D. monitor
D. monitor
33
Which of the following is NOT an output device? A. monitor B. printer C. microphone D. speaker
C. microphone
34
Which of these pointing devices is used most often on microcomputers? A. touchpad B. mouse C. stylus D. joy stick
B. mouse
35
What kind of computer is a touchpad most often used for?
laptop
36
What do you call a video display screen that can receive input from the touch of a finger?
touch screen
37
Which device uses light-sensing (optical) equipment to convert images of text, drawings, and photos into digital form? A. lightpen B. scanner C. digitizer D. pointing stick
B. scanner
38
A webcam can be used to send a document to another location over the Internet. TRUE FALSE
FALSE
39
Information technology includes technologies that measure and analyze human body characteristics for the purpose of maintaining security. TRUE FALSE
TRUE
40
Many laptops can be fingerprint-protected instead of just password-protected. TRUE FALSE
TRUE
41
One of the trends of future input technology is the increased use of source data entry. TRUE FALSE
TRUE
42
Data that is displayed on a screen or stored on a disk is called a hardcopy. TRUE FALSE
FALSE
43
Video cards (also graphics cards, video adapters) are the devices that display images on the screen. They have their own memory called video RAM, or VRAM. TRUE FALSE
TRUE
44
Thermal printers are often used to print cash register receipts. TRUE FALSE
TRUE
45
What wired communications medium consists of dozens or hundreds of thin strands of glass plastic?
fiber-optic
46
A ________ is a fixed-length block of data for transmission.
packet
47
In the ________ network topology, communications devices are connected to a single cable with two endpoints.
bus
48
To create larger networks, a bridge connects the same types of networks, and a ________ connects dissimilar networks.
gateway
49
A virtual private network may include ________. A. a company intranet B. a company extranet C. a company LAN D. any of these
D. any of these
50
A network that operates without relying on a server is the ________ network. A. peer-to-peer B. client/server C. host-to-host D. master/slave
A. peer-to-peer
51
A network that covers a wide geographical area is called a ________.
WAN
52
A ________ is a system of interconnected computers, telephones, or communications devices that can communicate and share resources. A. terminal B. router C. network D. server
C. network
53
The ________ is a device that converts digital computer signals into analog signals so that they can be sent over a telephone line. A. printer B. scanner C. modem D. digitizer
C. modem
54
Each zero and one signal represents a ________.
bit
55
Impact printers are the only desktop printers that can use multilayered forms to print many copies at once. TRUE FALSE
TRUE
56
Multifunction printers can also fax, but not scan. TRUE FALSE
FALSE
57
Ergonomics involves the relationship between workers and their environments, including workers' health. TRUE FALSE
TRUE
58
Virtual private networks (VPNs) are private networks that use a public network (usually the Internet) instead of private, leased (expensive) lines to connect remote sites. TRUE FALSE
TRUE
59
In a network, communications protocols specify the type of electrical connections, the timing of message exchanges, and error-detection techniques. TRUE FALSE
TRUE
60
Ethernet is a long-distance wireless communications connection. TRUE FALSE
FALSE
61
The two general classes of bandwidth are long and short. TRUE FALSE
FALSE
62
Because of the excellence of satellite technology, GPS location IDs are 100% accurate. TRUE FALSE
FALSE
63
Cellphones are basically two-way radios. TRUE FALSE
TRUE
64
Which of these is NOT a level of the data storage hierarchy? A. bit B. byte C. record D. metadata
D. metadata
65
The ________ uniquely identifies a record.
Key field
66
Wi-Fi connections are always secure; no one can steal your data when you are online. TRUE FALSE
FALSE
67
What is the software that controls the structure of a database and access to the data?
database management system
68
A file (table) is a collection of related ________.
records
69
A record (row) is a collection of related ________.
fields
70
Which of these is NOT an example of a computer crime? A. theft of time and services B. entering incorrect data C. pirating software D. online service fraud
B. entering incorrect data
71
Sending emails that appear to come from a trusted source, which direct you to a website where you're asked to reveal personal information is called _________.
phishing
72
Which of the following is NOT a method in which a security system tries to authenticate a user's identity? A. What you have—cards, keys, signatures, badges B. What you need—the kind of information you are asking for C. Who you are—physical traits, or biometrics D. What you know—PINs, passwords, and digital signatures
B. What you need—the kind of information you are asking for
73
_______ is a system of safeguards for protecting information technology against disasters, system failures, and unauthorized access.
Security
74
Which of the following is NOT a function of the U.S. Computer Emergency Response Team (CERT)? A. Counseling the party under attack. B. Helping to thwart the intruder. C. Evaluating the system afterward against future break-ins. D. Prosecuting those caught.
D. Prosecuting those caught.
75
In 2009 a cracker stole more than 500,000 patient records from a state-run database and demanded ransom for the return of the records. This crime is called ________.
theft of information
76
A software bug is an error in a program that causes it not to work properly. TRUE FALSE
TRUE
77
A computer crime can be an illegal act perpetrated against computers/telecommunications, or it can be the use of computers/telecommunications to accomplish an illegal act. TRUE FALSE
TRUE
78
Software obtained illegally is called open-source software. TRUE FALSE
FALSE
79
When people at work play online games or do online shopping on their employer's time, this is called theft of information. TRUE FALSE
FALSE
80
Internet users purchasing products on the Internet should enter private information only on sites that show a padlock icon at the top or bottom of the page, which indicates that encryption technology is being used. TRUE FALSE
TRUE
81
Which of these is NOT a type of malware? A. worm B. virus C. Trojan horse D. denial-of-service attack
D. denial-of-service attack
82
What short-distance wireless standard is used to link cell phones, computers, and peripherals at distances of up to about 33 feet?
Bluetooth
83
BluetoothWhat form of wireless transmission sends data to an AM or FM receiver? A. broadcast radio
broadcast radio
84
What set of rules is used to link nearly all mobile devices to a telecommunications carrier's wireless network and content providers?
WAP
85
A type of wired communications technology used to connect equipment in a home network is the following: A. Ethernet B. HomePNA C. HomePlug D. any of these
D. any of these
86
What kind of topology (layout) is used by a network that connects all its computers and communications devices to a central server?
star
87
Which of these is NOT a network topology? A. ring B. bus C. hub D. star
C. hub
88
A(n) ________ is a system of hardware and/or software that protects a computer or a network from intruders.
firewall
89
A virtual private network may include _______ A. a company intranet B. a company extranet C. a company LAN D. any of these
D. any of these