Upgrade to remove ads
Digital Information Technology: Semester 1 Course Review
Terms in this set (41)
What type of memory is found on secondary storage devices?
What is the term for the instructions that tell a computer what to do?
Why is binary code made up of a series of ones and zeroes?
To turn the electrical switches in the CPU on and off. 0 = off 1 = on.
A person uses a scanner to send an image to a computer. What basic function is being performed?
During the processing stage, what does the computer do?
Where would the information needed to start a computer be stored?
BIOS (Basic Input Output System)
In which basic function does the computer save information?
What type of device are speakers and headphones?
Where is most of the information processed in a computer?
CPU (Central Processing Unit)
What type of software maintains a computer?
What's it called when you take care of a computer?
How do you properly care for a CD?
Keep it in a hard case, grab by the edges.
Why should anti-virus and anti-spyware software be updated often?
To keep pace with newly created viruses and spyware.
What should be used to clean the keyboard keys?
Compressed air, cotton swab.
What should be used to save a computer from damage by sudden increases in voltage?
What program secretly monitors a user's computer activities?
Gina uses an internet service to store copies of her photos on "the cloud." What kind of maintenance is this?
Scott receives an email from someone he doesn't recognize. What should he do?
Delete and don't open it.
About how often should the components inside the computer case be checked and cleaned?
Every 6 to 12 months.
What location should be used to secure computer equipment?
A locked cabinet.
How should a USB flash drive be handled?
1. Keeping the cover on the connector when not in use.
2. Make sure device has properly stopped before removing it.
3. Keeping it away from drinks and other liquids.
Why is it a good idea to set up a schedule for maintenance tasks?
It is more likely the tasks will get done at regular times.
If your computer screen goes black, what is the trouble shooting process you should complete to get the screen to function again?
Check the monitor cables, cords, and power outlet.
What is a computer hacker?
Someone with unauthorized permission that breaks into your computer.
What is the term for the principles that people use to guide all their decisions?
What is the combination of hardware and software that checks all information coming through a network server?
Which part of an e-mail holds the data needed to send the message, including the To: Box?
What is the host in the e-mail address: < Mr. Thompson@SHS.edu >?
What command would you use to add a file to an e-mail message?
What is the name of the computer through which e-mail messages are sent and received?
If your connectivity to the internet stops working, what is the trouble shooting process you should complete to get it functioning again?
1. Check the internet cables, cords, and power cords/outlet.
2. Restart your computer.
3. Call tech support.
List the purpose of each domain type:
a. .com - commercial
b. .edu - education
c. .gov - government
d. .org - non-profit organization
List the file extension for each document type:
a. Excel - .xls
b. Powerpoint - .ppt
c. Word - .doc
What is telecommunications?
Transmitting information electronically by wires or radio signals with integrated encoding and decoding equipment.
What item sends information to and receives information from other networks?
What type of network connects computers in a large geographic area?
WAN (Wide Area Network)
In a computer network, what type of computer controls the resources?
Facebook, Twitter, and LinkedIn are examples of what type of online community?
Wht is the term for real-time conversation on a computer?
List ergonomic techniques relating to each item that help improve productivity and avoid injury.
a. Posture- Sit up straight, feet flat on the floor, arms at a 90° angle.
b. Typing- Writs relaxed, fingers curled, elbows bent.
c. Workspace- clean and organized.
What fingers go on each home key in the traditional keyboarding technique?
Ring Finger: S
Middle Finger: D
Index Finger: F
Pinkie: ; or :
Ring Finger: L
Middle Finger: K
Index Finger: J
THIS SET IS OFTEN IN FOLDERS WITH...
Computing for college and Career
Digital Information Technology (FLVS) Module 1
Digital Information Technology Test
Chemistry semester 1 course review
YOU MIGHT ALSO LIKE...
online computer terminology