183 terms

Bus 100

STUDY
PLAY

Terms in this set (...)

interface
The _____ of the operating system allows the user to communicate with the computer system
operating system
The ______ coordinates the flow of data and information through the computer system by coordinating the hardware, software, user interface, processor, and systems memory
platform
The combination of operating system and processor in a computer is referred to as a computer's:
scientific instruments
Real-time operating systems can be found in:
Mac OS
Which of the following is a single-user, multitask operating system?
C
Which of the following statements about Apple Mac OS is TRUE? A) There are more software applications available for the Mac OS than for Windows-based PCs. B) Mac systems are less expensive than Windows-based PCs. C) Mac OS was the first OS to use a graphical user interface. D) Mac OS can be used on Windows-based PCs
C
Which of the following statements about a graphical user interface is FALSE? A) A GUI uses menus, which are lists of commands that appear on the screen. B)Icons represent an object such as a software application, a file, or a folder. C)A GUI is a command-driven interface. D)A GUI uses windows, which are rectangular boxes displayed on the screen.
kernel
The __________ is responsible for managing the processor and all other components of the computer system, and is an essential part of the operating system.
Device Manager
When your computer is in Safe mode, you can use the __________ to view and change the properties of all devices attached to the computer.
The BIOS is activated by powering on the CPU
Which of the following is the first step in the boot process?
BIOS
The __________ is a program that manages the data between the operating system and all input and output devices attached to the system.
A
Which of the following is NOT a step in the boot process? A)The antivirus program checks all files for viruses. B)The operating system is loaded into RAM. C) The BIOS is activated by powering on the CPU. D) Configuration and customization settings are checked.
ROM
The basic input/output system is stored on a _______chip
D
Which of the following is NOT a function of the operating system. A) It manages the processor. B) It provides a way for software applications to work with the CPU. C) It provides a user interface D) It manages the removal of spyware
Device driver
Each device attached to your computer comes with a special program called a ________ that facilitates communication between the device and the OS.
D
Which of the following does NOT occur during the power-on self-test? A) The BIOS is identified B) The video card and video memory are tested. C) Memory is tested. D) The OS is moved into RAM
Registry
The __________ contains all of the different configurations used by the OS and by other applications.
B
All of the following are terms related to part of the boot process EXCEPT: A) BIOS B) USB C) ROM D) RAM
Data files
Before upgrading your OS, your should back up your:
File path
The location of a file is specified by its:
File path
C:\Documents\Spring 2007\CIS 101\Term Paper\Computer Technology is an example of a:
Internet backbone
the main pathway of high-speed communications lines through which all Internet traffic flows
spider, indexer, and search engine software
Search engines have which three parts?
B
The internet2 is a project: A) to expand URLs B) to develop new internet technologies C) to protect internet users D) to improve podcasts
Advanced Research Projects Agency
The agency that first began funding the Internet was called the:
protocol
In the URL http://www.prenhall.com, the portion labeled http is the:
Uniform Resource Locator (URL)
The text version of a Web site's Internet address is called the:
the Cold War crisis
The concept of the Internet developed from:
Web 2.0
_______ describes a trend of new Web applications that combine the functionality of multiple applications.
wiki
A Web site that allows anyone to add or edit content is called a:
Tim Bernes-Lee at CERN
The World Wide Web was invented by:
plug-ins
Adobe Reader, Flash Player, and QuickTime Player are all examples of special software programs called:
top level domain
In the URL http://www.prenhall.com, the portion labeled .com is the:
Really Simple Syndication
RSS stands for:
a large network of networks
The Internet is:
Task Scheduler
If you want to automatically defragment your hard drive every week, you can set a predetermined time using the:
false
The primary use for the Internet is searching
true
The Internet is the largest computer network in the world.
true
The Web is simply a means of accessing information over the Internet.
true
The Internet can be said to be a result of the Cold War.
false
The Internet and the World Wide Web are the same thing.
false
The Internet was developed to ensure faster delivery of communications such as mail.
true
The user interface is part of a computer's operating system.
true
All computers have operating systems.
false
CMOS is a special kind of memory that uses a great deal of power.
false
Safe Boot is a special diagnostic mode designed for troubleshooting errors that occur during the boot process.
true
In Safe mode, only the essential devices of the system function.
WPA
uses encryption to safeguard a network
adapter
enables individual nodes to communicate in a network
repeater
amplifies signals to prevent degradation on long cables
wireless transceiver
converts digital signals to radio waves
WAP
provides wireless nodes with the ability to connect to a network
fiber-optic
made up of plastic or glass and transmits data at extremely fast speed
twisted pair
made up of copper wires
LAN
network that is confines to a small geographic location
peer-to-peer
each node can communicate directly with every other node on the network
WAN
a network that covers a great distance
server
provides information and/or resources to the client computers on a network
client
the computer on which users accomplish specific tasks and made specific requests
network
two or more computers connected together via software so they can communicate
node
can be a computer, peripheral, or communication device on a network
false
It is not possible to configure a client/server network for home use.
false
Twisted pair cable is made up of plastic or glass fibers that transmit data at extremely fast speeds.
true
The CPU is located on the motherboard
false
Notebook and desktop processors are basically the same and therefore interchangeable
false
The percentage of time that your CPU is working is referred to as processing time
completion of all arithmetic calculations
Which activity is carried out by the ALU?
the pace at which CPUs improve
Moore's Law is a rule that predicts:
front side bus
The CPU is connected to the system memory by the:
RAM memory used by the OS
Kernel memory is:
hyperthreading
__________ provides high speed information processing by enabling a new set of instructions to start before the previous set has been finished.
gigahertz
CPU speed is measured in:
usage
The percentage of time your CPU is working is referred to as CPU:
the control unit and the arithmetic logic unit
The CPU consists of which two parts?
CPU
The control unit is one component of the:
GB
The amount of RAM recommended for most systems today is measured in:
access time
When referring to hard drives, seek time and latency are the two factors that make up:
C
Which is the fastest type of optical drive on the market? A) DVD drives B) CD drives C) Blu-ray drives D) flash drives
firewall
One way to increase security on a network is by installing a:
radio waves
A wireless network uses which of the following as its transmission medium?
twisted pair cable
Normal telephone wire is:
the way they are controlled and the distance between their nodes.
Network architectures are classified according to:
data transfer rate
The __________ is the maximum speed at which data can be transmitted between two nodes on a network.
MAC
The unique number assigned to a network adapter by the manufacturer is referred to as the __________ address.
router
A(n) __________ allows sharing of a broadband Internet connection.
fiber-optic cable
Which transmission medium is able to transmit data the fastest?
less than the data transfer rate.
Throughput, the actual speed of data transfer that is achieved in a network, is usually:
CPU
processor
ALU
performs arithmetic calculations
hetz
machine cycles per second
microbrowser
Which of the following is specialized software made to display Web pages on a cell phone?
store-are-forward
SMS delivers messages to the appropriate mobile device using __________ technology.
ROM
The operating system of a cell phone is stored in:
analog
Images are a representation of sound and light waves called __________ or continuous waves.
mobile switching center
A base transceiver station receives a request for cellular service and passes that request to a central location called a:
a long string of numbers
Digital formats are descriptions of signals as:
WML
Web content specially designed for viewing via a cell/smartphone is written in a format called:
algorithms
Text prediction __________ provide a list of popular words and save typing time when using text messaging.
analog-to-digital converter chip
An_____converts the sound waves from a voice into a digital signal.
nonvolatile memory
Flash memory, used by most MP3 players, is a type of:
True
Cell phones can fall victim to viruses.
True
A digital camera's resolutions in measured in megapixels
encryption virus
a program that renders your computer files unusable
polymorphic virus
a virus that changes its own code to avoid detection
packet filtering
method for selectively allowing certain requests to access ports
IP address
a computers identity on the internet
firewall
hardware or software for protecting computers from hackers
network address translation
the technique of assigning hidden internal IP addresses procted from hackers
script kiddie
a hacker who reuses hacking tools written by someone else
black hat hacker
an unethical hacker
phishing
sending an e-mail containing false information to obtain personal information
social engineering
techniques used to manipulate people into performing actions or divulging confidential information
white hat hacker
an "ethical" hacker
logic bomb
a virus that executes based on specified conditions
trojan horse
a program that appears to do useful work but does harm in the background
backdoor program
software that allows hackers to take control of a computer
DDoS
transmits simultaneous requests from multiple zombie computers
time bomb
an infection program that is triggered on a certain date
grayware
adware and spyware are referred to collectively as
DDoS attack
______ floods a computer with requests until it shuts down and refuses to answer any requests for information
A
A packet sniffer is a program that can enable a hacker to do all of the following EXCEPT: A)launch a denial of service (DoS) attack on your computer. B)use your debit card information to purchase items illegally.C) assume your identity.D) steal your logon and passwords for various accounts.
quarantining
placing a found virus in a secure area on the hard drive
biometric
Devices that use a unique personal characteristic, such as a fingerprint, in place of a password are called __________ authentication devices.
stealth
A(n) __________ virus temporarily erases its code from the files where they reside and then hides in the computer's active memory.
backdoor program
Using a __________, hackers can access and delete all files on your computer, send e-mail, run programs, and do just about anything else you can do with your computer.
logic bomb
A _________ is a virus that is triggered when certain conditions are met, such as a file opening or starting a program a certain number of times.
polymorphic
Which of the following classifications of viruses can change its own code?
virus signature
A(n) __________ is the portion of virus code that is unique to a particular computer virus.
host program
A computer virus normally attaches itself to another computer program known as a:
keystroke loggers
Spyware programs that monitor keystrokes with the intent of stealing passwords, login IDs, or credit card information are referred to as:
phishing
__________ encourages Internet users to reveal sensitive information that could lead to identity theft by sending e-mails that look like they are from legitimate companies but are, in fact, fake.
Trojan horse
Which of the following is a program that appears to be something useful or desirable but does something malicious in the background?
cybercrime
Which of the following is formally defined as any criminal action perpetrated primarily through the use of a computer?
phishing
A majority of online credit card fraud results from:
worm
A __________ works independently of host file execution and is much more active in spreading itself than a virus is.
database schema
A data dictionary is also called a:
query
A database __________ instructs a database to search for particular pieces of data.
internal data
In a data warehouse, data gathered from sales, billing, and inventory departments are examples of __________ sources.
external data
Customer demographic data purchased from third parties or statistics compiled by the federal government would be considered:
field
A category of information stored in a column of a database is called a:
integrity
Data __________ means that the data contained in a database is accurate and reliable.
data centralization
By maintaining information in only one place, __________ helps to ensure data integrity.
category of information
In a database, a field is a:
group of related fields
In a database, a record is a:
warehouse
A large-scale electronic repository of data that contains and organizes all an organization's data in one place is called a data __________.
bus
network topology where computers are connected in sequence with a single cable
packet
small segment of data containing the address of the computer or peripheral device to which the data is being sent
ring
network topology where computers are connected in a loop
token
special type of data packet
star
network topology where nodes are connected to a central switch
FTP
used to upload and download files
SMTP
used for transmission of e-mail messages across the internet
HTTP
transfers data from serves tor browsers
TCP
prepares data for transmission and provides for error checking and resending lost data
IP
sends data between computers and the internet
true
Data redundancy results when duplicate information is entered into a database.
true
Databases provide for data centralization.
dynamic address
An IP address that is assigned from an available pool of IP addresses is called a(n):
open system
__________ protocols are standards that are made public for access by any interested party.
US Govt
Who funded the development of technologies that would eventually become the Internet?
backbone
The main paths of the Internet along which data travels the fastest are known collectively as the Internet __________.
ICANN
The organization responsible for the Internet's domain name system and IP address allocation is:
client/server
The majority of Internet communications follows the __________ model of network communications.
W3C
__________ is a consortium of more than 400 member organizations that develops Web protocols.
OC lines
__________ are high-speed, fiber-optic communications lines.
recipient's address, sender's address, reassembling instructions, and data
At a minimum, what content must all data packets contain?
top-level domains
.com and .org are examples of:
IP address
A unique number that identifies a computer, server, or device connected to the Internet is called a(n):
static address
An IP address that does not change and is usually assigned manually by a network administrator is called a(n):
telnet
The protocol that enables logging in to a remote computer and working on it as if you were sitting in front of it is:
fiber-optic
Which cable type has a glass or plastic core?
twisted pair
The traditional home telephone cable uses which type of wired transmission cable?
switch
The star topology uses a __________ to connect all network nodes.
authentication
A(n) __________ server keeps track of who is logging on to the network and which services on the network are available to each user.
fiber-optic
__________ cable is NOT subject to EMI (electromagnetic interference) and RFI (radio frequency interference).
protocol
A __________ is a set of rules that defines how information is exchanged on a network.
routers
Which of the following devices are used to send data between two networks?
fiber-optic
Which cable type is the most costly to install?
screening
Packet __________ is a form of protection for your computer that looks at each packet that comes into your computer network.
802.11
The Institute of Electrical and Electronics Engineers (IEEE) standard for Wi-Fi is the __________ standard.
True
There is no single entity in charge of the Internet.
false
Packet switching uses a dedicated connection between two points and is ideal for connecting to the Internet.
true
Today, most ISP's that form the backbone of the Internet typically connect with OC lines.