70 terms

CCSF CNIT Study #1

In a Windows folder, to display files and folders as icons in list form, use ________ view.
Some video games require a ________ operating system.
The type of processor in the computer dictates which operating system a desktop uses.
All of the following can be considered to be network operating systems EXCEPT:
Symbian OS.
Real-time operating systems can be found in ________.
scientific instruments
Which of the following operating systems is used primarily with mainframes as a network operating system?
The ________ is a program that manages the data between the operating system and all input and output devices attached to the system.
The basic input/output system is stored on a ________ chip.
When an operating system receives an interrupt from the printer and pauses the CPU, it is performing which of the following functions?
processor management
Which of the following does NOT occur during the power-on self-test?
The OS is moved into RAM.
When virtual memory is in use, the condition of excessive paging is called swapping.
Which of the following is a single-user, multitask operating system?
Mac OS
Tiles view is the most interactive view of a Windows folder.
The ________ manages the flow of data and information through the computer system by coordinating the hardware, software, user interface, processor, and system memory.
operating system
The ________ is responsible for managing the processor and all other components of the computer system, and is an essential part of the operating system.
The OS allows you to organize the contents of your computer in a hierarchical structure of ________.
Which of the following statements concerning the Windows Recycle Bin is TRUE?
You can restore files that have been moved to the Recycle Bin.
Which of the following is the first step in the boot process?
The BIOS is activated by powering on the CPU
The combination of operating system and processor in a computer is referred to as a computer's ________.
software that does " back office " operations and processing function such as billing, production, inventory management, and human resources management is called ____________.
enterprise resource planning software
which type of software is used to keep track of appointments, to-do lists, and telephone numbers?
personal information manager (PIM) software
which type of software stores client information in one central database for use by sales professionals?
customer relationship management software
software designed for specific industry is known as ________ software.
vertical market
in a database, a field is a group of related records.
in a database, a table can be defined as a data category.
most web-based software products have some type of formal technical support for customers.
angel and blackboard are examples of _______.
course management software
software that lets you do task at home, school, and work is called ________.
application software
3D sound cards are bidirectional.
Which of the following statements is true about optical media?
A Blu-ray burner will most likely burn both CDs and DVDs.
The amount of RAM that is actually on the memory modules in your computer is the ________ memory.
Cache memory is a form of ROM.
Which of the following activities is carried out by the ALU?
completion of all arithmetic calculations
When referring to hard drives, seek time and latency are the two factors that make up ________.
access time
Which is the fastest type of optical drive on the market?
Blu-ray drives
Upgrading your CPU can increase how quickly data can move to or from the CPU.
Level 1 cache memory always contains more storage area than Level 2 cache.
The CPU consists of which two parts?
the control unit and the arithmetic logic unit
Kernel memory is ________.
RAM memory used by the operating system
Windows 7 incorporates ________, which enables you to migrate files and settings from a Windows Vista system to a Windows 7 system via a network connection.
Windows Easy Transfer
3D sound is the same as surround sound.
RAM is your computer's permanent storage space for data that is entered from the keyboard.
Cache memory levels are determined by ________.
the chip's proximity to the CPU
The most common type of home network is ________.
a peer-to-peer (P2P) network
A computer network is defined as two or more computers connected with ________ so that they can communicate with each other.
software and hardware
When setting up a network, you should set up any computers running the Microsoft Windows 7 operating system ________.
A ________ is a network located in your home that is used to connect all of your digital devices.
A P2P network needs network operating system software installed on every node.
A switch is a network navigation device that merely retransmits a signal to all other nodes attached to it.
A network that has 10 or more nodes is usually configured as a ________.
client/server network
The most popular transmission media option for wired Ethernet networks is ________.
unshielded twisted-pair (UTP) cable
Limiting your signal range does not help increase wireless network security.
P2P networks are more commonly used in small businesses than in homes.
Which type of virus was the famous Michelangelo virus?
a time bomb
during the process of ________ the antivirus software records key attributes about the files on your computer and keeps these statistics in a safe place on your hard drive.
the purpose of network address translation (NAT) is to _________.
hide user ip addresses from the internet
video files cannot transmit viruses.
cookies obtain your personal information by searching your hard drive.
a worm infects a host file and waits for that file to be executed on another computer to replicate.
using a _____, hackers can access and delete all files on your computer, send email, run programs, and do just about anything else u can do with your computer.
backdoor program
a logic bomb is normally triggered by the passage of time or on a a certain date.
a packet sniffer is a program that can enable a hacker to do all of the following except:
launch a denial of service (DoS) attack on your computer
______ occurs when a hacker takes control of a Bluetooth enabled device to make phone calls, read phone book entries, send and receive text messages, and more.
a denial of service attack can be used to deny hackers access to a computer system
which of the following classifications of viruses can change its own code to avoid detection
many photocopies have hard drive just as computers do, which makes them a potential target for identity thieves.
blue snarfing involves the process of taking control of a Bluetooth device and performing actions such as sending text messages or establishing an internet connection.
photocopies do not present any vulnerability for potential hackers.
social _______ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information.
the windows operating system has built-in password protection of files as well as the entire desktop.