CS11 quiz 3 1-75

Created by DolleeRttn 

Upgrade to
remove ads

75 terms · first 75

Current testing of ________ networks in two cities promises mobile connection speeds of up to 100 Mbps.

4G

The language used to create Web documents that are shown on mobile devices is called ________.

WML

Another name for short message service (SMS) is ________.

Text messaging

PMP stands for ________.

Portable media player

________ is the use of equipment to provide voice communications over a distance.

Telephony

An advanced version of SMS is ________, which allows you to send video and pictures in addition to text to other phones or e-mail addresses

MMS

An analog-to-digital converter chip

A) converts the sound waves from a voice into digital signals

Symbian OS and Windows Mobile are ________ for cell phones or smartphones

Operating Systems

________ memory is nonvolatile memory used by most MP3 players to expand their storage.

Flash

T/F There are more virus attacks on cell phone and smartphones than there are on PCs.

False

Opera Mobile is an example of ________.

A) a microbrowser

T/F There are digital cameras on the market that can play both music and videos

True

T/F DRM-free music can legally be moved from system to system.

True

________ are rules that squeeze the same audio and video information into less space.

Codecs

A(n) ________ is a lightweight, portable device that has no cell phone features, but allows you to carry files, music, and videos and provides Internet services.

Internet tablet

LogMeIn is an example of a ________.

B) remote access service for mobile devices

GPS stands for ________.

Global Positioning System

T/F When converting analog waves to digital waves, the higher the sampling rate, the more accurately the original wave can be re-created.

True

The ________ of a digital camera refers to the number of data points recorded for a captured image.

Resolution

Which of the following statements is NOT true about the JPEG file format?

D) JPEGs are larger than raw files.

Cell phones do not require special service providers to connect to the Internet

False

Digital camera resolution is measured in ________.

Megapixels

A(n) ________ is included in a cell phone to handle the compression of data for it to be quickly transmitted to another phone.

C) digital signal processor

T/F Some cell phones come equipped with a keyboard for faster typing of e-mail and text messages

True

The most common file types supported by digital cameras are raw uncompressed (RAW) data and ________.

JPEG

Which of the following uses radio waves to transmit data signals over short distances and does not need a direct line of sight?

A) Bluetooth

The newest cell/smartphone displays are ________, which allow bright, sharp imaging and draw less power.

B) OLED

Files saved in the Microsoft video file format have an extension of .avi or ________.

.wmv

Text prediction ________ provide a list of popular words and save typing time when using text messaging.

B) algorithms

The Apple iPhone uses a version of ________ as an operating system.

C) Mac OS X

Connecting your cell phone to the Internet requires that you have a(n) ________.

Wireless Service Provider

Which of the following is the process of sharing files between two or more computers?

A) peer-to-peer (P2P) sharing

Ensuring that two devices, for example, a PC and a cell phone or smartphone, have the same files is the process of ________.

B) synchronizing

What is Symbian?

A) An operating system for cell/smartphones.

T/F Flash memory is volatile.

False

T/F WiFi is less susceptible to interference than EDGE or 3G is.

False

T/F VoIP can be considered an alternative to a traditional landline phone service.

True

T/F One of the advantages of VoIP is that an interruption in power does not interrupt the ability to make calls.

False

MMS stands for ________.

Multimedia Message Service

You can send messages that include text, sound, images, and video clips using SMS.

False

The conversion rate is the number of times per second music is measured and converted into a digital value.

False

A. a lightweight, nonvolatile storage device
B. type of memory in which data is NOT retained if the power source is lost
C. type of memory in which data is retained if the power source is lost
D. memory specifically used by Sony devices

Flash Memory A
Momory Stick D
Volatile memory B
Non volatile memory C

T/F DRM-free music is music that has been released without any digital rights management.

True

T/F MMS allows you to save all, none, or part of a message.

True

SMS stands for ________.

Short Message Service

Which of the following allows you to download and play music with restrictions enforced about its use?

B) tethered downloads

A portable media player can play files with all of the following file extensions EXCEPT ________.

A) .doc

MPEG-4, H.264, and DivX are all examples of ________.

D) codecs

The most full-featured and powerful cell phones are put in the category of ________.

A) smartphones

________ is a term used to refer to various licensing plans that enable copyright holders to grant certain rights to the work while retaining other rights.

Copyleft

Broadcasting your video to a live audience over the Web is referred to as ________.

D) webcasting

To synchronize a cell phone or smartphone to a desktop computer, you need a sync cable, Bluetooth, or a(n) ________.

Cradle

T/F An attribution license allows anyone to use, modify, and copy your work, but only for noncommercial purposes.

False

Flash memory, used by most MP3 players, is a type of ________.

B) nonvolatile memory

Web content specially designed for viewing via a cell phone or smartphone is written in a format called ________.

D) WML (Wireless Markup Language)

Young, amateur hackers are often referred to as ________.

Script Kiddies

T/F Wireless networks are no more vulnerable to packet sniffers than are wired networks.

False

Many ________ sold for home use are also configured as firewalls and are capable of performing network address translation (NAT).

C) routers

A ________ is a virus that is triggered when certain conditions are met, such as a file opening or starting a program a certain number of times.

D) logic bomb

________ encourages Internet users to reveal sensitive information that could lead to identity theft by sending e-mails that look like they are from legitimate companies but are, in fact, fake.

C) Phishing

A ________ works independently of host file execution and is much more active in spreading itself than a virus is.

C) worm

A(n) ________ virus temporarily erases its code from the files where it resides and then hides in active memory of the computer.

Stealth

________ is the act of tricking people into revealing sensitive information and is often associated with credit card fraud.

Phishing

A ________ is a virus that is attached to documents such as Word or Excel files.

B) macro virus

________ occur when a Web site downloads harmful software onto your computer.

Drive-by Downloads

Using a ________, hackers can access and delete all files on your computer, send e-mail, run programs, and do just about anything else you can do with your computer.

C) backdoor program

The purpose of network address translation (NAT) is to ________.

D) hide user IP addresses from the Internet

When electrical current is supplied in excess of normal voltage, this results in a(n) ________.

Power Surge

Hackers who use their knowledge to break into systems just for the challenge of it refer to themselves as ________ hackers.

White-hat

T/F Network address translation (NAT) is used to assign internal IP addresses on a network.

True

A(n) ________ is the portion of virus code that is unique to a particular computer virus.

B) virus signature

A. a program that renders your computer files unusable by compressing them
B. attempts to travel between systems through network connections to spread an infection
C. a virus that changes its own code to avoid detection
D. a program that attaches itself to another program and attempts to spread itself to other computers through the exchange of files

Worm B
Computer Virus D
Encryption Virus C
Polymorphic Virus A

All computers connected to the Internet have a unique address referred to as a(n) ________.

Internet Protocol Address

If your IP address is always the same, you have a(n) ________ address.

Static

A(n) ________ backs up only the files on a computer that have changed since the last time a backup was performed.

Incremental backup

Please allow access to your computer’s microphone to use Voice Recording.

Having trouble? Click here for help.

We can’t access your microphone!

Click the icon above to update your browser permissions above and try again

Example:

Reload the page to try again!

Reload

Press Cmd-0 to reset your zoom

Press Ctrl-0 to reset your zoom

It looks like your browser might be zoomed in or out. Your browser needs to be zoomed to a normal size to record audio.

Please upgrade Flash or install Chrome
to use Voice Recording.

For more help, see our troubleshooting page.

Your microphone is muted

For help fixing this issue, see this FAQ.

Star this term

You can study starred terms together

NEW! Voice Recording

Create Set