How can we help?

You can also find more resources in our Help Center.

50 terms

Computer Science Exam 1

STUDY
PLAY
An end user license agreement is...
displayed on screen when you first install
ACME Widget Company is concerned it may have a ..... which is a self replicating program designed to carry out some unauthorized activity on a victim's computer
worm
to avoid security threats a user can
avoid opening suspicious email attachments
the main component of a typical desktop computer is the ..... which contains the processor, memory, some storage devices and display and sound circuitry
system unit
an example of an old form of convergence is
clock radio
a good computer maintenance routine would include doing which of the following?
all of the above
a great example of convergence in modern technology is
cell phones
all of the following are utility software except...
Windows
a service patch...
fixes and updates the operating system
Which of the following would not be true of computers priced higher then US $2,000
these computers have to be replaced fairly frequently
If Paul wants to buy an inexpensive, compact monitor, he should by a ..... monitor
LCD
A ..... displays the options associated with a command
dialog box
Security experts stress that using "strong" passwords can reduce identity theft and help keep your computer files secure. Which of the following is likely to be most secure?
I12baomw because it is a nonsense word with numbers
Gaming computers typically include
All of the above
RAM can be thought of as the .... for the computer's processor
waiting room
In an advertisement, a speed specification, such as 2.66 GHz, indicates the speed of the microprocessor....
clock
...... is the ability of a device to "jump" directly to the requested data
random access
Power ..... can originate from a number of sources: downed power lines, power grid switching by electric company, faulty wiring and large appliances powering on and off
surges
which of the following is NOT a good file management tip
group similar files into the root directory
an operating system's .... capability supports a division of labor among all the processing units
multiprocessing
if you wanted to create, manipulate and print graphics, which of the following would you use?
photo editing software
A ...... is the primary pointing device for a computer
mouse
A hacker posing as a legitimate representative of an official organization such as your bank to acquire information from you is an example of
phishing
A computation intensive program runs on a ...?
super computer
In terms of an authentication protocol, the phrase "something a person is" refers to?
biometrics
the first digital computers were built during WWII for...?
code breaking
after you purchase software, it is illegal to do the following except
copy and keep as back up
Using Microsoft windows products, to select files and folders which are not listed consecutively...?
click on each file while holding down the ctrl key
Sam is worried about something happening to his data. He owns a business and if something happens, he might not be able to survive. Where should he keep his backups?
In a location away from his business
Problems a hacker can cause after breaking into your computer includes
all of the above
A computer is a multiple purpose device that
all of the above
Which of the following system requirements are important in determining if a software program will work on a computer?
all of the above
Software designed to generate unique musical compositions simply by selecting the musical style, instrument, key and temp is...?
computer aided music
If karen were looking for voice communications, full qwerty keypad, text messaging, email, removeable storage, camera, radio and a digital music player, she might consider a...?
smart phone
Charlie wants to know what the term is for making a copy of all his files. Charlie has a Windows machine. You tell him the correct term is..
full back up
The user interface that uses menus and icons is...
GUI
Tom sends andy an email attachment named OurProject.tif. Andy tries to open the attachment but can't. His problem may be that...?
all of the above
Laura wants to make sure her computer is fast enough for her every day use. Which of the listed features is the most important?
Amount of RAM
Cindy wants to know if she ever has to interact with the operating system. you tell her yes if she wants to...
all of the above
Which is the best portable storage medium for storing three databases, each of which is approximately 500 MB?
USB flash drive
Karen needs a simple appointment book and is considering one that is digital. You suggest she consider a...
PDA
..... is the process of converting text, numbres, sound, photos and video into data that can be processed by digital devices
digitizing
Solid state storage, also called flash memory storage, .....
provides faster access to data than optical storage technology
Five people in Tom's company use a web design software. You advice Tom to get a license for a specific number of users. He needs a ..... license.
multiple user
To delete data from a disk in such a way that no one can ever read it, you should...
use special shredder software
.... is a type of application software designed to help several people collaborate
groupware
the difference between the Save and the Save As command is that...
all of the above
In the figure above, Raggae is an example of...
secondary folder
A ..... is any software that can automate a task or automatically execute a task
bot
In the most obvious responsibility of your computer's operating system is to ...
monitor activities that take place within a computer system