Like this study set? Create a free account to save it.

Sign up for an account

Already have a Quizlet account? .

Create an account

In a Windows folder, to display files and folders as icons in list form, use ________ view.


Some video games require a ________ operating system.


The type of processor in the computer dictates which operating system a desktop uses.


All of the following can be considered to be network operating systems EXCEPT:

Symbian OS.

Real-time operating systems can be found in ________.

scientific instruments

Which of the following operating systems is used primarily with mainframes as a network operating system?


The ________ is a program that manages the data between the operating system and all input and output devices attached to the system.


The basic input/output system is stored on a ________ chip.


When an operating system receives an interrupt from the printer and pauses the CPU, it is performing which of the following functions?

processor management

Which of the following does NOT occur during the power-on self-test?

The OS is moved into RAM.

When virtual memory is in use, the condition of excessive paging is called swapping.


Which of the following is a single-user, multitask operating system?

Mac OS

Tiles view is the most interactive view of a Windows folder.


The ________ manages the flow of data and information through the computer system by coordinating the hardware, software, user interface, processor, and system memory.

operating system

The ________ is responsible for managing the processor and all other components of the computer system, and is an essential part of the operating system.


The OS allows you to organize the contents of your computer in a hierarchical structure of ________.


Which of the following statements concerning the Windows Recycle Bin is TRUE?

You can restore files that have been moved to the Recycle Bin.

Which of the following is the first step in the boot process?

The BIOS is activated by powering on the CPU

The combination of operating system and processor in a computer is referred to as a computer's ________.


software that does " back office " operations and processing function such as billing, production, inventory management, and human resources management is called ____________.

enterprise resource planning software

which type of software is used to keep track of appointments, to-do lists, and telephone numbers?

personal information manager (PIM) software

which type of software stores client information in one central database for use by sales professionals?

customer relationship management software

software designed for specific industry is known as ________ software.

vertical market

in a database, a field is a group of related records.


in a database, a table can be defined as a data category.


most web-based software products have some type of formal technical support for customers.


angel and blackboard are examples of _______.

course management software

software that lets you do task at home, school, and work is called ________.

application software

3D sound cards are bidirectional.


Which of the following statements is true about optical media?

A Blu-ray burner will most likely burn both CDs and DVDs.

The amount of RAM that is actually on the memory modules in your computer is the ________ memory.


Cache memory is a form of ROM.


Which of the following activities is carried out by the ALU?

completion of all arithmetic calculations

When referring to hard drives, seek time and latency are the two factors that make up ________.

access time

Which is the fastest type of optical drive on the market?

Blu-ray drives

Upgrading your CPU can increase how quickly data can move to or from the CPU.


Level 1 cache memory always contains more storage area than Level 2 cache.


The CPU consists of which two parts?

the control unit and the arithmetic logic unit

Kernel memory is ________.

RAM memory used by the operating system

Windows 7 incorporates ________, which enables you to migrate files and settings from a Windows Vista system to a Windows 7 system via a network connection.

Windows Easy Transfer

3D sound is the same as surround sound.


RAM is your computer's permanent storage space for data that is entered from the keyboard.


Cache memory levels are determined by ________.

the chip's proximity to the CPU

The most common type of home network is ________.

a peer-to-peer (P2P) network

A computer network is defined as two or more computers connected with ________ so that they can communicate with each other.

software and hardware

When setting up a network, you should set up any computers running the Microsoft Windows 7 operating system ________.


A ________ is a network located in your home that is used to connect all of your digital devices.


A P2P network needs network operating system software installed on every node.


A switch is a network navigation device that merely retransmits a signal to all other nodes attached to it.


A network that has 10 or more nodes is usually configured as a ________.

client/server network

The most popular transmission media option for wired Ethernet networks is ________.

unshielded twisted-pair (UTP) cable

Limiting your signal range does not help increase wireless network security.


P2P networks are more commonly used in small businesses than in homes.


Which type of virus was the famous Michelangelo virus?

a time bomb

during the process of ________ the antivirus software records key attributes about the files on your computer and keeps these statistics in a safe place on your hard drive.


the purpose of network address translation (NAT) is to _________.

hide user ip addresses from the internet

video files cannot transmit viruses.


cookies obtain your personal information by searching your hard drive.


a worm infects a host file and waits for that file to be executed on another computer to replicate.


using a _____, hackers can access and delete all files on your computer, send email, run programs, and do just about anything else u can do with your computer.

backdoor program

a logic bomb is normally triggered by the passage of time or on a a certain date.


a packet sniffer is a program that can enable a hacker to do all of the following except:

launch a denial of service (DoS) attack on your computer

______ occurs when a hacker takes control of a Bluetooth enabled device to make phone calls, read phone book entries, send and receive text messages, and more.


a denial of service attack can be used to deny hackers access to a computer system


which of the following classifications of viruses can change its own code to avoid detection


many photocopies have hard drive just as computers do, which makes them a potential target for identity thieves.


blue snarfing involves the process of taking control of a Bluetooth device and performing actions such as sending text messages or establishing an internet connection.


photocopies do not present any vulnerability for potential hackers.


social _______ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information.


the windows operating system has built-in password protection of files as well as the entire desktop.


Please allow access to your computer’s microphone to use Voice Recording.

Having trouble? Click here for help.

We can’t access your microphone!

Click the icon above to update your browser permissions and try again


Reload the page to try again!


Press Cmd-0 to reset your zoom

Press Ctrl-0 to reset your zoom

It looks like your browser might be zoomed in or out. Your browser needs to be zoomed to a normal size to record audio.

Please upgrade Flash or install Chrome
to use Voice Recording.

For more help, see our troubleshooting page.

Your microphone is muted

For help fixing this issue, see this FAQ.

Star this term

You can study starred terms together

Voice Recording