Create an account
Which of the following is the process of sharing files between two or more computers?
peer-to-peer (P2P) sharing
Which of the following uses radio waves to transmit data signals over short distances and does not need a direct line of sight?
Which of the following describes the number of times an analog wave is measured each second during an analog-to-digital conversion?
Which of the following statements is NOT true about the JPEG file format?
JPEG's are larger than raw files
______ is a single cable that carries all audio and video information from devices connected to a TV to the TV itself
Text prediction ______ provide a list of popular words and save typing time when using text messaging.
Ensuring that two devices, for example, a PC and a cell phone or smartphone, have the same files is the process of _______
The newest cell/smartphone displays are ____, which allow bright, sharp imaging and draw less power.
A base transceiver station receives a request for cellular service and passes that request to a central location called a _____
mobile switching center
Web content specially designed for viewing via a cell phone or smartphone is written in a format called _____
WML (Wireless Markup Language)
A _____ is included in a cell phone to handle the compression of data for it to be quixkly transmitted to another phone
digital signal processor
An analog-to=digital converter chip _____
converts the sound waves from a voice into digital signals
You can block logical ports to invaders and make your computer invisible to others on the internet by installing ______
Which of the following classifications of viruses can change its own code to avoid detection?
A ____ works independently of host file execution and is much more active in spreading itself than a virus is.
Which of the following statements about cookies is NOT true?
Cookies obtain your personal information by searching your hard drive
_____ encourages internet users to reaveal sensitive information that could lead to identity theft by sending e-mails that lok like they are from legitimate companies but are, in fact, fake
Devices that use a unique personal characteristic, such as a fingerprint, in place of a password are called _____ authentication devices
Which of the following is a program that appears to be something useful or desirable but does something malicious in the background?
a Trojan horse
Please allow access to your computer’s microphone to use Voice Recording.
Having trouble? Click here for help.
We can’t access your microphone!
Click the icon above to update your browser permissions and try again
Reload the page to try again!Reload
Press Cmd-0 to reset your zoom
Press Ctrl-0 to reset your zoom
It looks like your browser might be zoomed in or out. Your browser needs to be zoomed to a normal size to record audio.
Please upgrade Flash or install Chrome
to use Voice Recording.
For more help, see our troubleshooting page.
Your microphone is muted
For help fixing this issue, see this FAQ.
Star this term
You can study starred terms together