Create an account
The _____ of the operating system enables the user to communicate with the computer system.
The process of optimizing RAM storage by borrowing hard drive space is called ________.
Which of the following Windows utility programs arranges pieces of files on your hard drive to allow for faster access?
Which of the following is the first step in the boot process?
The BIOS is activated by turning on the computer.
________ provides high-speed information processing by enabling a new set of instructions to start before the previous set is finished.
______ is software that takes an existing Internet connection and turns it into a wireless hotspot.
The unique number assigned to a network adapter by the manufacturer is referred to as the ________ address.
Network architectures are classified according to ________.
the way in which they are managed and the distance between their nodes
Sophisticated networks generally use which of the following hardware devices to ease the flow of data through the network?
Routers and switches
A computer network is defined as two or more computers connected via ________ so that they can communicate with each other.
software and hardware
For the nodes on a network to communicate with each other and access the network, each node needs a ________.
An adaptive "network-ready" thermostat called ________ communicates with your mobile device to check or adjust your home temperature even when you are away.
The Pebble e-paper watch founders used the crowd-funding site ________ to ask for $100,000 in pledges.
A(n) ________ is included in a cell phone to handle the compression of data for it to be quickly transmitted to another phone.
An analog-to-digital converter chip ________.
converts the sound waves from a voice into digital signals
Each device attached to your computer comes with a special program called a ________ that facilitates communication between the device and the OS.
A(n) ________ is a small program that performs general housekeeping tasks for your computer.
Windows uses a memory-management technique known as ________ to monitor which applications you use the most and preloads them into your system memory.
On a Windows 7 system, you can determine the amount of RAM by looking in the ________ window.
A customizable watch that connects to your smartphone using Bluetooth is called ________.
Pebble e-paper watch
C:\Documents\Spring 2012\CIS 101\Term Paper\Computer Technology is an example of a ________.
Which of the following was the first widely used operating system installed in personal computers?
A special numerical code that prioritizes device requests from the operating systems is called ________.
A(n) ________ is an expansion card that's installed inside the system unit to translate data into images.
The rule of thumb that predicts that CPU capacity will double every two years is called ________.
Laptops are often equipped with a(n) ________ slot that allows you to read flash memory cards such as CompactFlash, memory sticks, and secure digital cards.
A large network designed to provide access to a specific geographic area, such as a large city is a ________.
________ is the maximum speed at which data can be transferred between two nodes.
data transfer rate
Please allow access to your computer’s microphone to use Voice Recording.
Having trouble? Click here for help.
We can’t access your microphone!
Click the icon above to update your browser permissions and try again
Reload the page to try again!Reload
Press Cmd-0 to reset your zoom
Press Ctrl-0 to reset your zoom
It looks like your browser might be zoomed in or out. Your browser needs to be zoomed to a normal size to record audio.
Please upgrade Flash or install Chrome
to use Voice Recording.
For more help, see our troubleshooting page.
Your microphone is muted
For help fixing this issue, see this FAQ.
Star this term
You can study starred terms together