CSCI mutiple choice

100 terms by assuminations

Create a new folder

Advertisement Upgrade to remove ads

Provide an environment for running software

The most obvious responsibility of your computer's operating system is to ______.

a file

All of the following are examples of resources EXCEPT ______.

Multitasking

_______ provides process and memory management services that allow two or more tasks, jobs, programs to tun simultaneously.

Multiprocessing

An operating's system's _______ capability supports a division of labor among all the processing units.

buffer

The term ______ is a technical term for the region of memory that holds data waiting to be transferred from one device to another.

submenu

A _____ is an additional set of commands that the computer displays after you make a selection from the main menu.

reliability

The strengths of Microsoft Windows include all of the following EXCEPT _______.

fork

In the Mac OS, the data _____ contains data or the commands for a program.

UNIX

The operating system that was devolped in 1969 by AT&T's Bell Labs and gained a good reputation for its dependability is_____.

LINUX

______ was developed by a Finnish student. It continues to gain popularity as an operating system for personal computers. It is distributed under the terms of a GPL.

Garnet

The Palm OS ______ is currently used for popular Palm brand PDAs and smart phones

Symbian

____OS is a multitasking operating system used on Ericsson and Nokia smart phones.

255

Current versions of Windoes support file names to ____ characters long.

size

Information kept about a file includes _____.

file specification

A computer file's location is defined by a ______.

drive

C:/Music/Reggar/Marley One Love.mp3
In the accompanying figure, C: is an example of a(n) ____.

file name

C:/Music/Reggar/Marley One Love.mp3
In the accompanying figure, Marley One Love is an exapmle of a _____.

file extension

C:/Music/Reggar/Marley One Love.mp3
In the accompanying figure, mp3 is an example of _____/

configuration

An extension of .sys designates a ______ type of file.

support

An extension of .ocx designates a ____ type of file.

all of the above

The difference between the Save and the Save As command is the ______.

physical storage model

A description of what actuall happens on the disk ain the circuits is represented by a ______.

factory

Most floppy and hard disks are formattted by the ____.

Disc mastering

_____ is the process of creating a CD or DVD by selecting all the files and then copying them in a single sessionl

packet writing

In relation to disks, ____ is a recoreding technology that lets you record in multiple sessions.

cluster

A group of sectors is called a ______.

HFS+

The file system used by Mac OS is ____.

use special shredder software

To delete data from a disk in such a way that no one can ever read it, you should _____.

fragmented

Files stored in noncontinugous cluster are ____.

network server

A device used for backup whose capacity depends on the space allocated to each user, and is fast and convient is a(n) _____.

all of the above

You should consider making backups of

full system

A(n) _____backup includes every file from the computer's primary storage device

differential

A(n) _____ backup contains any files that have changed since the last full backup.

incremental

A(n) backup makes a copy of only those files that were added or changed since your last backup.

recovery

A(n) _____disk is a bootable CD, DVD or other media that contains a complete copy of your computer's hard disk as it existed when shipped from the manufacturer.

image

A disk _____ is a bit-by-bit copy of the data from all the sectors of a disk.

.doc or .docx

Tom and Andy are discussing file storage. They are working on a major project and want to be sure they can store their files in a way that they can easily find and share the files.

Tom and Andy both have Microsoft Word. It would be best to store their files in its native format with an extension of ________.

any of the above

Tom and Andy are discussing file storage. They are working on a major project and want to be sure they can store their files in a way that they can easily find and share the files.

Tom sends Andy an email attachment named OurProject.tif. Andy tries to open the attachment but can't. His problem may be that ______.

open it in Photoshop and convert it

Tom and Andy are discussing file storage. They are working on a major project and want to be sure they can store their files in a way that they can easily find and share the files.

Andy sent Tom a picture file as JPEG. Tom opens it and want to conver it to a GIF. To do that Tom should ___.

RAM

Cindy wants to know how a computer can run more than one program at a time. You explain to her that when you want to run more than one program at a time, the operating system has to allocate specific areas of memory for each program. This memory is called _____.

LAN

The type of network shown in the accompanying figure is known as a_______.

Ethernet

Today, most networks like the one in the accompanying figure are configured with ______ technology.

Peer-to-peer

In _____ mode, workstations can share responsibility for processing, sharing, printing, and communications tasks.

ring

In a _____ topology, network nodes are connected in closed circle.

A tree topology

Consists of multiple star networks connected into a bus configuration by a backbone

mesh

In the accompanying figure, which physical toplogy is not represented?

narrowband

Dial-up Internet acess is an example of a(n) _____ communications system.

Limited mobility

Which of the following is NOT an advantage of using a wired network?

NICs

To form a HomePNA network, workstations are equipped with HomePNA ____, which are connected to telephone wall jacks.

HomePNA

A ______network makes use of a building's existing telephone cables to connect network devices.

powerline

A _____ network uses a premises' electrical wiring to form the infrastructure for a LAN.

IEEE 802.3z

What is the IEEE designation for the Gigabit Ethernet standard?

Ethernet networks

use a non proprietary technology, making Ethernet equipment available from a variety of vendors

switch

A network ______ sends data only to the devices specified as the destination.

radio frequency

Most wireless transport data as ____ signals.

all of the above

Which of the following is a disadvantage of using a wireless network when compared to a wired network?

all of the above

Wireless signal ranger can be limited by ____.

encryption

Which of the following does NOT impact signal strength on a wireless network?

MIMO

_____ technology improves the speed and range of LAN by using two or more antennae to essentially send multile sets of signals between network devices.

USB

To set up a print sever, connect it to the printer's _____ port and access the configuration settings using your browser.

all of the above

Symptoms of network problems include which of the following?

encryption

Wireless _____ scrambles the data transmitted between wireless devices and then unscrambles the data only on devices that have a valid key.

WEP

The original wireless encryption was called____.

plaintext

A message that has not been encrypted is referred to as ______.

decryption

The process of converting ciphertext into plaintext is called _____.

crytographic key

A ______ is a word, number, or phrase that must be known to encrypt or decrypt a message

brute-force attack

Computers may break a code by using a(n) ______, which consits of trying all possible keys.

Public key encryption

is a crucial technology for e-commerce and e-mail.

MANs

Thomas is a network expert, having mastered the finer points of network structure, topogy, and geographical scope. He has built many different types of networks at home, school, and work.

Thomas has taken a freelance job working for a local ISP and he wants to review the technologies relevant to the work he will do for this enterprise. GIven the following geographic scopes, which would be the most relevant to Thomas's efforts?

mesh topology

Thomas is a network expert, having mastered the finer points of network structure, topogy, and gepgraphical scope. He has built many different types of networks at home, school, and work.

Thomas has been asked by a friend to overhaul an existing networks so that it is more robust. She wants each device on the netowork to connect to all of the other devices on the network. Which network top will Thomas most likely use?

Wi-Fi

Esteban has decided to install a computer network in his home. He knows he can choose wired or wireless, and that there are differences in transmission speed and security.

Esteban decides to install a wireless network. Which LAN technology will he most likely choose?

ARPANET

THe Internet began with a project called _____.

all of the above

An ISP may provide _____ services.

Protocols

Prefixes such as http://,, www, and ftp: correspond to _______.

port

A ______ is described as a virtual device because it is not a physical circuit or mechanism.

ICANN

Domain names are assigned by _____.

uptream speed

The rate of data that is transmitted from your computer to the Internet is _____.

downstream speed

The rate of data arriving at your computer is ______.

digital signal

In the accompanying figure, the type of signal represented by A is a(n) _______.

phone lines

DSL uses _____ to transmit data.

A statelite dish and a modem

Satellite Internet sercive and TX service requires ___________.

cellular

Portable Internet access includes all of the following EXCEPT_______.

Mobile WiMAX

_______is an up-and-comming stardard destined to be deployed by ISPs and cell phone carriers to allow seamless hand-offs between one tower and another.

2.5G

Data transport rates depend on the technology of the cellular system. The generation of cellular technology that was first associated with always-on data transfers _____.

EDGE

____is a 3G technology that works on GSM and GPRS cellular networks.

cell phones as a modem

With a data service plan, you can use _____ to take advantage of mobile broadband.

screen size

The disadvantage of WAP-enabled devices is their ______.

skweezer

You can use a service called ____ to reformat Web pages to fit on a small screen.

buddies

For instant messaging, _____ are the people in a participant's list who are currently online.

all of the above

Messaging systems that require client software includes____.

viruses and spyware

Instant messaging is vulnerable to malware such as _____.

A cable phone

To use VoIP you must use any of the following EXCEPT ____.

downloaded

The accompanying figure is a screenshot of FileZilla, in which the ____ file will go to the location pointed to by box A.

downloaded

The accompanying figure is a screenshot of FileZilla, in which the file to be ____ is indicated by box B.

ports

Network services sich as the Web,ftp, and e-mail operate from _____.

Probe

The use of automated software to locate computers that are vulnerable to unauthorized access is a port _____.

9 minutes

The average "survial time" for an unprotected computer to remain uncompromised is only ____.

turn off the computer

In order to ensure your ports are inactive you should _____.

DSL and ISDN

Tom is currently using dial-up for his Internet connection but he believes it is too slow for his needs and ties up his phone line. He is looking for an alternative and has come to you for help.

Tom wants to know which of the services uses his existing telephone lines. You tell him ______.

cable

Tom is currently using dial-up for his Internet connection but he believes it is too slow for his needs and ties up his phone line. He is looking for an alternative and has come to you for help.

Tom wants to know which service has the overall lower costs. You tell him, on a monthly basis, it it _____.

Please allow access to your computer’s microphone to use Voice Recording.

Having trouble? Click here for help.

We can’t access your microphone!

Click the icon above to update your browser permissions above and try again

Example:

Reload the page to try again!

Reload

Press Cmd-0 to reset your zoom

Press Ctrl-0 to reset your zoom

It looks like your browser might be zoomed in or out. Your browser needs to be zoomed to a normal size to record audio.

Please upgrade Flash or install Chrome
to use Voice Recording.

For more help, see our troubleshooting page.

Your microphone is muted

For help fixing this issue, see this FAQ.

Star this term

You can study starred terms together

NEW! Voice Recording

Create Set