How can we help?

You can also find more resources in our Help Center.

75 terms

CS11 quiz 3 1-75

first 75
Current testing of ________ networks in two cities promises mobile connection speeds of up to 100 Mbps.
The language used to create Web documents that are shown on mobile devices is called ________.
Another name for short message service (SMS) is ________.
Text messaging
PMP stands for ________.
Portable media player
________ is the use of equipment to provide voice communications over a distance.
An advanced version of SMS is ________, which allows you to send video and pictures in addition to text to other phones or e-mail addresses
An analog-to-digital converter chip
A) converts the sound waves from a voice into digital signals
Symbian OS and Windows Mobile are ________ for cell phones or smartphones
Operating Systems
________ memory is nonvolatile memory used by most MP3 players to expand their storage.
T/F There are more virus attacks on cell phone and smartphones than there are on PCs.
Opera Mobile is an example of ________.
A) a microbrowser
T/F There are digital cameras on the market that can play both music and videos
T/F DRM-free music can legally be moved from system to system.
________ are rules that squeeze the same audio and video information into less space.
A(n) ________ is a lightweight, portable device that has no cell phone features, but allows you to carry files, music, and videos and provides Internet services.
Internet tablet
LogMeIn is an example of a ________.
B) remote access service for mobile devices
GPS stands for ________.
Global Positioning System
T/F When converting analog waves to digital waves, the higher the sampling rate, the more accurately the original wave can be re-created.
The ________ of a digital camera refers to the number of data points recorded for a captured image.
Which of the following statements is NOT true about the JPEG file format?
D) JPEGs are larger than raw files.
Cell phones do not require special service providers to connect to the Internet
Digital camera resolution is measured in ________.
A(n) ________ is included in a cell phone to handle the compression of data for it to be quickly transmitted to another phone.
C) digital signal processor
T/F Some cell phones come equipped with a keyboard for faster typing of e-mail and text messages
The most common file types supported by digital cameras are raw uncompressed (RAW) data and ________.
Which of the following uses radio waves to transmit data signals over short distances and does not need a direct line of sight?
A) Bluetooth
The newest cell/smartphone displays are ________, which allow bright, sharp imaging and draw less power.
Files saved in the Microsoft video file format have an extension of .avi or ________.
Text prediction ________ provide a list of popular words and save typing time when using text messaging.
B) algorithms
The Apple iPhone uses a version of ________ as an operating system.
C) Mac OS X
Connecting your cell phone to the Internet requires that you have a(n) ________.
Wireless Service Provider
Which of the following is the process of sharing files between two or more computers?
A) peer-to-peer (P2P) sharing
Ensuring that two devices, for example, a PC and a cell phone or smartphone, have the same files is the process of ________.
B) synchronizing
What is Symbian?
A) An operating system for cell/smartphones.
T/F Flash memory is volatile.
T/F WiFi is less susceptible to interference than EDGE or 3G is.
T/F VoIP can be considered an alternative to a traditional landline phone service.
T/F One of the advantages of VoIP is that an interruption in power does not interrupt the ability to make calls.
MMS stands for ________.
Multimedia Message Service
You can send messages that include text, sound, images, and video clips using SMS.
The conversion rate is the number of times per second music is measured and converted into a digital value.
A. a lightweight, nonvolatile storage device
B. type of memory in which data is NOT retained if the power source is lost
C. type of memory in which data is retained if the power source is lost
D. memory specifically used by Sony devices
Flash Memory A
Momory Stick D
Volatile memory B
Non volatile memory C
T/F DRM-free music is music that has been released without any digital rights management.
T/F MMS allows you to save all, none, or part of a message.
SMS stands for ________.
Short Message Service
Which of the following allows you to download and play music with restrictions enforced about its use?
B) tethered downloads
A portable media player can play files with all of the following file extensions EXCEPT ________.
A) .doc
MPEG-4, H.264, and DivX are all examples of ________.
D) codecs
The most full-featured and powerful cell phones are put in the category of ________.
A) smartphones
________ is a term used to refer to various licensing plans that enable copyright holders to grant certain rights to the work while retaining other rights.
Broadcasting your video to a live audience over the Web is referred to as ________.
D) webcasting
To synchronize a cell phone or smartphone to a desktop computer, you need a sync cable, Bluetooth, or a(n) ________.
T/F An attribution license allows anyone to use, modify, and copy your work, but only for noncommercial purposes.
Flash memory, used by most MP3 players, is a type of ________.
B) nonvolatile memory
Web content specially designed for viewing via a cell phone or smartphone is written in a format called ________.
D) WML (Wireless Markup Language)
Young, amateur hackers are often referred to as ________.
Script Kiddies
T/F Wireless networks are no more vulnerable to packet sniffers than are wired networks.
Many ________ sold for home use are also configured as firewalls and are capable of performing network address translation (NAT).
C) routers
A ________ is a virus that is triggered when certain conditions are met, such as a file opening or starting a program a certain number of times.
D) logic bomb
________ encourages Internet users to reveal sensitive information that could lead to identity theft by sending e-mails that look like they are from legitimate companies but are, in fact, fake.
C) Phishing
A ________ works independently of host file execution and is much more active in spreading itself than a virus is.
C) worm
A(n) ________ virus temporarily erases its code from the files where it resides and then hides in active memory of the computer.
________ is the act of tricking people into revealing sensitive information and is often associated with credit card fraud.
A ________ is a virus that is attached to documents such as Word or Excel files.
B) macro virus
________ occur when a Web site downloads harmful software onto your computer.
Drive-by Downloads
Using a ________, hackers can access and delete all files on your computer, send e-mail, run programs, and do just about anything else you can do with your computer.
C) backdoor program
The purpose of network address translation (NAT) is to ________.
D) hide user IP addresses from the Internet
When electrical current is supplied in excess of normal voltage, this results in a(n) ________.
Power Surge
Hackers who use their knowledge to break into systems just for the challenge of it refer to themselves as ________ hackers.
T/F Network address translation (NAT) is used to assign internal IP addresses on a network.
A(n) ________ is the portion of virus code that is unique to a particular computer virus.
B) virus signature
A. a program that renders your computer files unusable by compressing them
B. attempts to travel between systems through network connections to spread an infection
C. a virus that changes its own code to avoid detection
D. a program that attaches itself to another program and attempts to spread itself to other computers through the exchange of files
Worm B
Computer Virus D
Encryption Virus C
Polymorphic Virus A
All computers connected to the Internet have a unique address referred to as a(n) ________.
Internet Protocol Address
If your IP address is always the same, you have a(n) ________ address.
A(n) ________ backs up only the files on a computer that have changed since the last time a backup was performed.
Incremental backup