Which of the following operating systems is used primarily with mainframes as a network operating system?
The ________ is a program that manages the data between the operating system and all input and output devices attached to the system.
When an operating system receives an interrupt from the printer and pauses the CPU, it is performing which of the following functions?
The ________ manages the flow of data and information through the computer system by coordinating the hardware, software, user interface, processor, and system memory.
The ________ is responsible for managing the processor and all other components of the computer system, and is an essential part of the operating system.
The OS allows you to organize the contents of your computer in a hierarchical structure of ________.
Which of the following statements concerning the Windows Recycle Bin is TRUE?
You can restore files that have been moved to the Recycle Bin.
Which of the following is the first step in the boot process?
The BIOS is activated by powering on the CPU
The combination of operating system and processor in a computer is referred to as a computer's ________.
software that does " back office " operations and processing function such as billing, production, inventory management, and human resources management is called ____________.
enterprise resource planning software
which type of software is used to keep track of appointments, to-do lists, and telephone numbers?
personal information manager (PIM) software
which type of software stores client information in one central database for use by sales professionals?
customer relationship management software
Which of the following statements is true about optical media?
A Blu-ray burner will most likely burn both CDs and DVDs.
The amount of RAM that is actually on the memory modules in your computer is the ________ memory.
Which of the following activities is carried out by the ALU?
completion of all arithmetic calculations
When referring to hard drives, seek time and latency are the two factors that make up ________.
Windows 7 incorporates ________, which enables you to migrate files and settings from a Windows Vista system to a Windows 7 system via a network connection.
Windows Easy Transfer
A computer network is defined as two or more computers connected with ________ so that they can communicate with each other.
software and hardware
When setting up a network, you should set up any computers running the Microsoft Windows 7 operating system ________.
A ________ is a network located in your home that is used to connect all of your digital devices.
A switch is a network navigation device that merely retransmits a signal to all other nodes attached to it.
The most popular transmission media option for wired Ethernet networks is ________.
unshielded twisted-pair (UTP) cable
during the process of ________ the antivirus software records key attributes about the files on your computer and keeps these statistics in a safe place on your hard drive.
the purpose of network address translation (NAT) is to _________.
hide user ip addresses from the internet
a worm infects a host file and waits for that file to be executed on another computer to replicate.
using a _____, hackers can access and delete all files on your computer, send email, run programs, and do just about anything else u can do with your computer.
a packet sniffer is a program that can enable a hacker to do all of the following except:
launch a denial of service (DoS) attack on your computer
______ occurs when a hacker takes control of a Bluetooth enabled device to make phone calls, read phone book entries, send and receive text messages, and more.
which of the following classifications of viruses can change its own code to avoid detection
many photocopies have hard drive just as computers do, which makes them a potential target for identity thieves.
blue snarfing involves the process of taking control of a Bluetooth device and performing actions such as sending text messages or establishing an internet connection.
social _______ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information.