Computer

Created by Dakota993 

Upgrade to
remove ads

Computer Class

A(n) ____ is system software.

operating system

____ theft is the act of stealing computer equipment.

Hardware

A fingerprint reader is an example of a biometric system as shown in the accompanying figure.

True

____ computers are a good option if you work mostly in one place and have plenty of space in your work area.

Desktop

Most notebook computers come with a touch-pad, a small, flat, rectangular pointing device near the keyboard that allows you to move the pointer by sliding a fingertip on the surface of the pad. Such a device is shown in the accompanying figure.

True

If an antivirus program cannot remove an infection, it often ____.

quarantines the infected file

As shown in the accompanying figure, a ____ is hardware and/or software that protects a network's resources from intrusion by users on another network such as the Internet.

firewall

Which kind of monitor uses a liquid crystal display to produce images on the screen?

LCD

____ conveys meaning and is useful to one or more people.

Information

Software users with a EULA like the one in the accompanying figure may make as many backup copies of the software as they want.

False

People who use the computer directly or use the information it provides are called computer users, end users, or sometimes, just users.

True

Computers perform four basic operations — input, process, output, and communication.

False

Although CD's have large storage capacities, even a CD cannot hold many of today's complex programs.

True

A ____ is an icon on the desktop that provides a user with immediate access to a program or file.

shortcut

Which of the following buttons are contained on the Quick Access Toolbar by default?

All of the above

Which of the following is an example of a possessed object?

badges and keys

Which of the following is not an example of a biometric device?

smart card

Some operating systems, such as Windows, include personal firewalls like the ones shown in the accompanying figure.

True

Windows 7 is used to run ____ software.

application

Companies should review successful access attempts for irregularities.

True

Software ____ occurs when someone steals software media, intentionally erases programs, or illegally copies a program.

theft

Encrypted data is called plaintext.

False

A key advantage of word processing software is that users easily can make changes in documents, such as correcting spelling; changing margins; and adding, deleting, or relocating words, sentences, or entire paragraphs.

True

Most systems require that users select their own passwords, to be entered in forms such as the one shown in the accompanying figure.

True

A ____ is a program that hides in a computer and allows someone from a remote location to take full control of the computer.

root-kit

The system unit on most personal computers contains at least one hard disk, sometimes called an internal hard disk because it is not portable.

True

As shown in the accompanying figure, many Web sites require a user to enter a(n) ____, which is a private combination of characters associated with a user name that allows access to certain computer resources.

password

____ protects a computer against viruses by identifying and removing any computer viruses found in memory, on storage media, or on incoming files.

An antivirus program

A(n) ____ window is an open window hidden from view but that can be displayed quickly by clicking the window's program button on the task-bar

minimized

Screen resolution indicates the number of ____ that the computer uses to display the letters, numbers, graphics, and background you see on the screen.

pixels

All of the following are common ways computers become infected with malware, except ____.

installing a software package from a CD

If computer equipment is networked, a single power disturbance can damage multiple systems.

True

A ____ is a duplicate of a file, program, or disk that you can use in case the original is lost, damaged, or destroyed.

Backup

If your computer has a(n) modem, then you can access the Internet using a standard telephone line.

True

If you are required to log on to the computer, the ____ screen is displayed, which shows the user names of users on the computer.

Welcome

A(n) ____ is an injury or disorder of the muscles, nerves, tendons, ligaments, and joints.

RSI

If a shorter password were in use in the accompanying figure, it would provide greater security than a longer one.

False

One method of displaying the entire contents of a window is to ____ it.

maximize

Most antivirus programs do not provide updated virus signature files for users.

False

In applications that allow users to write ____, the security level should be set so the application warns users that a document they are attempting to open contains a macro.

Macros

The processor, memory, and storage devices are housed in a box-like case called the ____.

system unit

As shown in the accompanying figure, each ____ contains a collection of groups, each of which contains related functions.

Tabs

A computer ____ risk is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability.

security

____ is a full-featured word processing program that allows you to create many types of personal and business documents.

Word

Electrical power variation is one of the least common causes of system failure.

False

To protect themselves from software piracy, software manufacturers issue a(n) ____ agreement like the one shown in the accompanying figure, which gives users the right to use the software.

license

A(n) ____ is the destructive event or prank malware is intended to deliver.

payload

What type of device is shown in the accompanying figure?

input (Mouse)

With a(n) mouse, you control the movement of the pointer on the screen and make selections from the screen.

True

A Web page can contain text, graphics, audio, and video, and has built-in connections, or links, to other Web documents.

True

Please allow access to your computer’s microphone to use Voice Recording.

Having trouble? Click here for help.

We can’t access your microphone!

Click the icon above to update your browser permissions above and try again

Example:

Reload the page to try again!

Reload

Press Cmd-0 to reset your zoom

Press Ctrl-0 to reset your zoom

It looks like your browser might be zoomed in or out. Your browser needs to be zoomed to a normal size to record audio.

Please upgrade Flash or install Chrome
to use Voice Recording.

For more help, see our troubleshooting page.

Your microphone is muted

For help fixing this issue, see this FAQ.

Star this term

You can study starred terms together

NEW! Voice Recording

Create Set