Midterm Flashcards

(50 cards)

1
Q

SMTP and POP3 can be used interchangeably to send e-mail.
True or False

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Packets always arrive at the destination in the order they were sent
True or False

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Hardware is the sequence of instructions that tells the computer what to do.
True or False

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Which is not a measure of printer performance?

  1. DPI
  2. Refresh Rate
  3. PPM
  4. All of the above
A

Refresh Rate

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Public domain software is usually expensive, but worth the cost..
True or False

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Speech recognition software enables a computer to produce human sounds.
True or False

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

The programs that control the activity of the hardware and control the internal workings of the computer are called _____ software.

  1. Business
  2. Personal
  3. Application
  4. Systems
A

Systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A client would be assigned what type of IP address.

  1. Static
  2. Dynamic
  3. Status
  4. None of the Above
A

Dynamic

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The primary function of the BIOS is to prepare the machine so that the operating system can take over control of the hardware. This process is known as booting up.
True or False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

What software always remains in memory whenever a computer is on?

  1. Operating System
  2. Web Browser
  3. Word Processor
  4. Database
  5. Photoshop
A

Operating System

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Think of a packet as an _____________________ that contains data and is transported from server to server until it reaches its destination.

  1. Postage Stamp
  2. Router
  3. Electronic Envelope
  4. Signal Switcher
  5. Circuit Switcher
A

Electronic Envelope

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

ROM (Read-Only Memory) cannot easily be written to and its main uses are the distribution of firmware (software that is very closely related to hardware).
True or False

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

When a file is saved to the hard drive, the operating system tries to keep everything in the same area. Over time files will be deleted, leaving blank areas between files. When new programs are installed or large files saved, the hard drive tries to fill the holes, thus breaking up the program or file into blocks. This situation is known as _______________________.

  1. Disk Defragmentation
  2. Memory Leak
  3. Data Redundancy
  4. Storage Overload
A

Disk Defragmentation

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

The CPU is comprised of:

  1. control unit and CPU
  2. COBOL and control unit
  3. GUI and ALU
  4. ALU and control unit
  5. CUI and ALU
A

ALU and control unit

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

A widely used internet communication device is a _____.

  1. Modem
  2. CD drive
  3. USB flash drive
  4. Zip disk
A

Modem

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Open source software _____.

  1. is provided for use, modification, and redistribution
  2. has no restrictions from the copyright holder
  3. usually can be downloaded from the Web at no cost
  4. all of the above
A

All of the above

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

The rate in cycles per second (measured in hertz) at which a computer performs its most basic operations such as adding two numbers or transferring a value from one register to another is known as the _____________________________.

  1. clock speed
  2. actual speed
  3. machine time
  4. fetch cycle
  5. decode speed
A

Clock Speed

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Memory ______________ is the time between the processor initiating a request for a byte (eight bits) or word (usually 16 bits) in memory until it is retrieved.

  1. pipelining
  2. clock wait time
  3. latency
  4. reflection
  5. data absorption
A

Latency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

A _____ is a device that provides a central point for cables in a network.

  1. Hub
  2. Node
  3. Packet
  4. Router
A

Hub

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

A communications media:

  1. carries the data signal
  2. is always visible
  3. is always costly
  4. is of one type
  5. works in one direction
A

carries the data signal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Which of the following transmission media is able to support mobile communications?

  1. Twisted-wire pair
  2. Satellite
  3. Fiber optics
  4. Coaxial cable
22
Q

You interact with a program through its _____, which controls how you enter data and instructions and how information is displayed 1. on the screen.

  1. mouse
  2. storage
  3. user interface
  4. icon
A

user interface

23
Q

Because Bluetooth requires line-of-sight transmission, some industry experts predict that infrared technology will replace Bluetooth.
True or False

24
Q

Data communications errors

  1. Never occur
  2. Cannot be detected
  3. Are always ignored
  4. Can be corrected by a retransmission from the sender
A

Can be corrected by a retransmission from the sender

25
A topology is like a map of the network or LAN | True or False
True
26
Coaxial cable transmission is line of sight restricted | True or False
False
27
Which is NOT a type of communications media? 1. wire pair 2. satellite 3. ultra-violet 4. microwave 5. coaxial cable
ultra-violet
28
Channel capacity can be measured in bps. | True or False
True
29
The bandwidth of a channel relates to the channel's capacity to carry data. True or False
True
30
Which of the following is the largest computer network in the world? 1. Web server 2. Internet 3. Web browser 4. Centralized Network 5. Local Area Network
Internet
31
What is a device that modulates a carrier?s signal to encode a computer?s digital data, and later demodulates the signal to decode the data at the receiving end? 1. router 2. modem 3. bus 4. folder 5. network card
modem
32
A digital subscriber line allows voice and data to share the telephone line for Internet access. True or False
True
33
A browser is a _____________ program. 1. Server 2. Dense 3. Actuarial 4. Client 5. Database
Client
34
____________________ is the protocol for exchanging files over the Internet. 1. Data Security Protocol 2. General Data Exchange Protocol 3. File Transfer Protocol 4. Information Transfer System 5. Fast Telecopy Protocol
File Transfer Protocol
35
Internet Explorer uses a ______________ security framework, which means that sites are grouped based upon certain conditions. It allows the restriction of broad areas of functionality, and also allows specific functions to be restricted. 1. Micro-security 2. Firewall 3. Zone-based 4. Spyware blocker
Zone Based
36
When using a search engine, a minus sign is an example of what? 1. an exclusion operator 2. an addition operator 3. a mathematical operator 4. an inclusion operator
an exclusion operator
37
A wiki _____. 1. reflects the interests, opinions, and personalities of the authors 2. are usually open to modification by the general public 3. distributes, or feeds, the content to subscribers for free or a fee 4. is an informal site consisting of time-stamped articles, usually in a diary or journal format
are usually open to modification by the general public
38
Some mailing lists are called _____, named after a popular mailing list program. 1. LISTSERVs 2. MPEGs 3. ARPANETs 4. W3Cs
LISTSERVs
39
Like an IP address, the components of a domain name are separated by commas. True or False
False
40
Which of the following are examples of software piracy? 1. renting the original software to others 2. posting copies on the Internet for users to download 3. creating a copy and selling or giving it to someone 4. renting the original software to others 5. All of the above
All of the above
41
Copyrighted software which is marketed under a ?try before you buy? policy is known as _______. 1. Freeware 2. Shareware 3. Open source 4. Public Domain 5. Installation
Shareware
42
A(n) _____ protects a computer by identifying and removing any viruses found in memory, on media, or in files. 1. antivirus program 2. anti-spam program 3. pop-up blocker 4. Web filter
antivirus program
43
All files of the same type will have the same file extension. If you double click a file with extension DOCX, Word opens. Windows manages file _____________ automatically. 1. associations 2. connections 3. reflections 4. commands
associations
44
Using the _____ =SUM(B10:B14) totals the contents of cells B10 through B14 in a worksheet. 1. label 2. value 3. formula 4. function
formula
45
The special purpose program that translates computer source code to binary machine code is called a __________. 1. Compiler 2. Loom 3. Mainframe 4. COBOL 5. Network
Compiler
46
A computer stores its basic hardware settings in __________. 1. ROM 2. RAM 3. RIMM 4. CMOS
CMOS
47
To search for web pages that contain the phrase "these are the times", enter this query: _____ 1. these are the times 2. these are +the times 3. "these are the times" 4. these times
"these are the times"
48
A plug-in is a program that extends the capability of an add-on. True or False
True
49
Computer-aided design (CAD) software is a sophisticated type of application software that assists a professional user in creating engineering, architectural, and scientific designs. True or False
True
50
Which option below represents an absolute column and row? 1. $A$1 2. A$1 3. $A1 4. A1
$A$1