CSCI exam 2 true and false

48 terms by assuminations

Create a new folder

Advertisement Upgrade to remove ads

T

During a typical computing session, your computer might run an average of 50 processes.

F

During the boot process, the operating system is totally loaded into the kernal.

T

A sequence of events that occurs between the time that you turn on a computer and the time that it is ready for you to issue commands is referred to as the boot process.

T

Today's Windows operating system do not require the DOS kernel.

T

One of the reasons Microsoft Windows suffers from the reputation for being the most vulnerable to viruses, worms, and other attacks is because of hackers with anti-establishment sentiments.

T

Ina dual boot system, you must select which operating system to use.

T

A General Purpose License or GPL allows anyone to make copies for their own ise to give to others or to sell.

F

The D drive must refer to a CD or DVD drive

T

When you use Windows, Mac OS, or a Linux graphical file manager, each sub-directory is depicted as a folder

F

When creating a file, you must keep up with the size of the file manually.

F

A file extension is always the same as a file format

F

To be a certain a file can be opened by the recipient, simply save it as an .exe and then anyone can open it.

T

Often file management is represented by a tree metaphor

F

File management utilities usually retain the files within a folder when that folder is deleted.

T

Viruses can damage files to the point that your computer cant't access any data on its hard disk.

F

With remote backups, the speed for backing up and restoring data is independent of the speed of your Internet connection

F

Some systems streamline the backup process by restoring a computer's operating system, devices drivers, settings, and data in a single step-a process called restore pointing

F

A WAN provides connectivity within a limited geographical area, often within a single building.

T

In a client/ server network, a server provides services to other computers called clients.

T

A bus topology connects all devices to a common backbone, which functions as a shared communications link.

T

The device use to connect you home LAN to Internet is a type of gateway.

T

A process called handshaking allows two communications devices on a network to negotiate their communications protocols.

F

The wave on the bottom in the accompanying figure depicts a digital.

F

The wave on the top in the accompanying figure depicts an analog signal.

T

MAC addresses are used for some low-level network functions and can also be employed to establish network security.

F

A packet always travels from the source directly to the destination, never traveling through intermediate routing devices.

T

IP addresses can be assigned by ISPs or system managers

F

In the accompanying figure, the item on the left simply plugs into a serial port on the outside of the system unit.

F

Microwaves cannot be aimed in a single direction and have less carrying capacity than radio waves.

T

A transceiver is a combination of a transmitter and a receiver.

F

Bluetooth is often used to connect workstations to LAN.

T

WPA2 makes sure that packets have not been intercepted or tampered with in any way.

F

A crytographic algorithm is word, number, or phrase that must be known to encrypt or decrypt a message

F

The octets in an IP address correspond to a Web site address.

F

The www in a URL is part of domain name.

T

You must pay for a domain name.

F

All IP address are dynamic

T

Television and data signals are carried over the same cable

F

Internet anywhere technology is now considered a standard.

F

You can use a hot spot for mobile Internet access.

T

To use portable satellite technology you must take your satellite with you.

F

You can use a USB port to connect your wireless modem card to your laptop

F

Cloud computing is the term given to analyzing cloud patterns and with the help of the computer predicting the weather.

T

P2p file sharing allows users to obtain files from other users on the Internet.

T

Bit-Torrent uses P2P technology

T

One of the most common ways of gaining unauthorized access to a network is by looking for open ports.

F

Accessing Internet mobility is possible with most of today's wired or wireless Internet technologies

T

Most firewall software is prefigured to block only unnecessarily open ports targeted by hackers.

Please allow access to your computer’s microphone to use Voice Recording.

Having trouble? Click here for help.

We can’t access your microphone!

Click the icon above to update your browser permissions above and try again

Example:

Reload the page to try again!

Reload

Press Cmd-0 to reset your zoom

Press Ctrl-0 to reset your zoom

It looks like your browser might be zoomed in or out. Your browser needs to be zoomed to a normal size to record audio.

Please upgrade Flash or install Chrome
to use Voice Recording.

For more help, see our troubleshooting page.

Your microphone is muted

For help fixing this issue, see this FAQ.

Star this term

You can study starred terms together

NEW! Voice Recording

Create Set