50 terms

Test 3


Terms in this set (...)

Ensuring that two devices--for example, a PC and a PDA/smartphone--have the same data is the process of
A graphics processing unit is specialized to handle
3D graphics
Clock speed is measured in
The base-10 number system is also called
decimal notation
The most common type of network is
a peer to peer network
Most computers today contain network adapters installed inside as expansion cards. Such adapters are referred to as
netwrok interface cards
Which of the following allows you to carry media files?
The ___________________ of the CPU manages the on/off switches inside the CPU.
control unit
ROM is
nonvolitile memory
CPU stands for
central processing unit
The most likely method a hacker would use to access a computer is
entering throught the internet
Your cell phone call may be disconnected or dropped if
a distance between the base stations is too large
Which of the following types of memory is optional on most computers?
level 3 cache
A combination of a phone and a PDA is referred to as a
In a 64-bit processor, the 64 refers to the _______________ size.
The CPU is considered to be the _________________ of the computer.
In a CPU, the purpose of the ALU is to:
calculate and perform logical operations
Hyperthreading _____________ than multi-core technology.
is slower
Which programming language uses a string of 1s and 0s?
machine language
Which of the following terms refers to the amount of space on a desk or table that a computer uses?
The proper sequence of actions in a machine cycle is
fetch- decode- execute- store.
Which of the following is a new program being tested by Apple and Starbucks that will allow iPhone users to identify, purchase, and download a song they are currently listening to at a Starbucks?
Now playing
The most powerful type of computer is a
super computer
Which of the following allows users to send text, sound, images, and video clips to other phones or e-mail addresses?
A category of notebook computers that weigh less than two pounds is the
ultramobile computer
The ____________ consists of just two numbers: 0 and 1.
binary langauge
______________________ refers to the time it takes to locate instructions and make them available to the CPU.
access time
Which of the following allows you to connect a monitor, printer, and so on to a notebook computer via one connection as opposed to connecting individual devices?
a docking station
Ethernet networks are named for
the type of NIC installed in every node
If a mobile device can access the Internet through a wireless network, it is considered
Web- enabled
An analog-to-digital converter chip
converts the sound waves froma voice into a digital signal
The use of multiple processors working together on one large problem is called
parallel processing
The base-16 number system is also called
hexadecimal notation
A fully charged, high-performance notebook battery can last up to
5 hours
SMS delivers messages to the appropriate mobile device using _________________ technology.
store and forward
Client/server networks are controlled by a central server that runs a specialized piece of software called
a netwrok opetating system
When setting up a network, you should set up any computers running the Microsoft Vista operating system
NRAM uses ___________ to store data.
carbon nanotubes
LogMeIn is an example of a
remote access service for mobile devices
A smartphone is the result of _________________, which is a combination of the tools found in more than one portable device.
Which of the following tools is used to make entries into a handheld device via a touch-sensitive screen?
a stylus
In a client/server network, there are usually many more _________________ than ____________________.
clients, servers
The number of bits that a bus can carry at one time is referred to as the bus
Access time is measured in billionths of a second, or
The new standard for expansion slots on PCs is called
All of the commands in an instruction set are written in a language that is easier for humans to work with, called
Assembley lanuage
Many high-end server systems employ a ____________ design, in which there are two completely separate CPU chips on one motherboard.
Which of the following is a program that appears to be something useful or desirable but at the same time does something malicious in the background?
a Trojan horse
An iPod is an example of a
ALU stands for
Arithmetic logic unit