True/False Flashcards

(90 cards)

1
Q

Transcoding digital videos does not cause a loss of quality.

A

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

In digital video, a lower resolution reduces the bit rate.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Bitmap graphics are resolution dependent because each element is a discrete pixel.
Upgrade to remove ads
Only $1/month

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

All of the data stored and transmitted by digital devices is encoded as bits.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Regardless of sampling rate, digital audio file size can be reduced using audio compression techniques.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Instead of storing the color value for each pixel, a vector graphics file contains instructions that a computer uses to create the shape, size, position, and color for each object in an image.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

An example of system software is a computer operating system.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A solid state drive can be used as a substitute for a hard disk drive.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The term instruction cycle refers to the process in which a computer executes a single instruction.
Upgrade to remove ads
Only $1/month

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

System software is a set of computer programs that helps a person carry out a task.

A

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Smartphones evolved from basic cell phones and personal digital assistants (PDAs).

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

A slate tablet configuration is basically a screen in a narrow frame that lacks a physical keyboard.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Component systems are currently the most popular form factor for digital devices.

A

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

A hard disk drive is an example of magnetic storage.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Land-grid arrays (LGAs) have two rows of pins that connect the chip to a circuit board.

A

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Random access memory (RAM) is volatile.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

A desktop is a portable computing device featuring a touch-sensitive screen that can be used for input as well as for output.

A

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

ARM-based processors are not especially energy efficient.
Upgrade to remove ads
Only $1/month

A

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Modern processors follow Intel’s original numbering sequence.

A

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Processing is handled by the computer’s CPU.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Read-only memory (ROM) is temporary and volatile. RAM is more permanent and non-volatile.

A

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Many RFID (radio-frequency identification) and NFC (near field communication) tags contain no power source of their own and depend on the receiving device to provide the power for data exchange.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

A Web site cannot be accessed by its domain name until the name is added to the domain name server lists.

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

When connecting to the Internet, most Internet users connect to a Tier 1 network.
Upgrade to remove ads
Only $1/month

A

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Mobile broadband can be used to access the Internet from a laptop or desktop computer.
T
26
The Internet is the world's largest WAN.
T
27
LANs use many of the same network technologies as the Internet.
T
28
Most wireless LANs use licensed frequencies that require applying to the Federal Communications Commission (FCC) for permission.
F
29
Packet loss of less than 2% is required for acceptable streaming, gaming, Skype, and voice calls.
T
30
Most Internet connections are symmetrical.
F
31
Dropbox is an example of a file hosting service.
T
32
You may be able to bypass DNS outages by changing your DNS server.
T
33
When setting up a Wi-Fi network, the router you select should support the fastest device you'll want to use on the network. Upgrade to remove ads Only $1/month
T
34
Wi-Fi signals may reach up to 300 feet from the router.
T
35
Domain name servers maintain lists of all domain names and their corresponding IP addresses.
T
36
Microwaves have more carrying capacity than radio waves.
T
37
When interference affects a wireless signal, data must be retransmitted.
T
38
With wired connections, such as Ethernet, the rated speed and range are usually quite different to actual performance.
F
39
The organization that supervises Internet addressing is ARPANET.
F
40
UDP (User Datagram Protocol) is faster than TCP (Transmission Control Protocol) but does not perform error checking.
T
41
You can access FTP servers with a browser.
T
42
You can use multiple browsers on a device.
T
43
You can think of HTTP as the system that browsers use to communicate with a Web server and ask for HTML documents.
T
44
An HTML document begins with the DOCTYPE and declarations.
F
45
Most search engines keep a record of users' search history.
T
46
Web sites can be spread across multiple Web servers.
T
47
It is not possible to delete the contents of your browser cache.
F
48
URLs contain a domain name.
T
49
An HTML document consists of three sections: the head, the body, and the content.
F
50
Your search history is the same as your browser history.
F
51
HTML is the only markup language used on the Web.
F
52
In an HTML document, most tags are inserted as pairs.
T
53
Session cookies are stored on a disk or other permanent storage medium. Upgrade to remove ads Only $1/month
F
54
HTTP is the markup language used to specify the contents of a Web page.
F
55
In today's Web, most Web pages have bidirectional links.
F
56
The file name of a specific Web page always appears first in the URL.
F
57
Public key encryption requires one key to encrypt data but a different key to decrypt it.
T
58
If you allow your browser to store passwords, you no longer need to worry about security for those passwords.
F
59
In Wikipedia, it is possible to edit the text of most articles.
T
60
Webmail is typically a free service.
T
61
By some estimates, nearly 40% of all online identities are fake. Upgrade to remove ads Only $1/month
T
62
Crowdsourcing is based on contributions from groups of individuals, but it differs from collaborative work.
T
63
On mobile devices, Voice over Internet Protocol (VoIP) uses the voice stream, not the data stream.
F
64
Geocoding is the process of adding location data to photos, Web sites, hypertext markup language (HTML) documents, audio files, blog posts, and text messages.
F
65
Webmail is configured so that incoming messages are stored in an Inbox on your local storage device.
F
66
IM technology offers a degree of anonymity because typed messages have no associated voice or video.
T
67
Private messages can be forwarded by recipients, so they do not necessarily remain private.
T
68
Privacy is only important if you have something to hide.
F
69
Wiki software provides a set of tools for creating and editing content.
T
70
Microsoft Windows is used exclusively on desktop systems.
F
71
There is a universal standard for categorizing software, and various categorization schemes have few similarities.
F
72
Most handheld devices can use either Web apps or mobile apps but not both. Upgrade to remove ads Only $1/month
F
73
If you wanted to run multiple operating systems simultaneously on one computer, you would use a virtual machine.
T
74
A formula, such as =B6+(C6*.1), does not contain cell references.
F
75
Every peripheral device connected to a computer is regarded as an input or output resource.
T
76
The term service pack usually applies to operating system updates.
T
77
Within a single program, multiprocessing allows multiple commands, or threads, to run simultaneously.
F
78
Partitions are created, modified, and deleted using Filezilla on Macs and Disk Partitioner on PCs.
F
79
Mobile devices tend to be populated by entertainment apps, games, and social media services.
T
80
You won't find a desktop with application windows on an iOS device.
T
81
Some database software provides tools to work with more than one collection of records, as long as the records are somehow related to each other. Upgrade to remove ads Only $1/month
T
82
The kernel stays in random access memory (RAM) the entire time your computer is on.
T
83
Paragraph style includes the alignment of text within the margins and the space between each line of text.
T
84
Any data entering a digital device could be malware.
T
85
Blacklist and header filtering are usually performed by email clients and Webmail services.
F
86
The objective of a MITM attack is for a third party to block communications between two entities. Upgrade to remove ads Only $1/month
F
87
Most mass-mailing databases are legitimately compiled from customer lists.
F
88
Hackers can use ports to communicate with devices in botnets.
T
89
Heuristics may produce false positives that mistakenly identify a legitimate file as malware.
T
90
If a hacker intercepts encrypted data by way of a MITM attack, the contents of that data is not always secure.
T