How can we help?

You can also find more resources in our Help Center.

CSCI exam 2 true and false

STUDY
PLAY
T
During a typical computing session, your computer might run an average of 50 processes.
F
During the boot process, the operating system is totally loaded into the kernal.
T
A sequence of events that occurs between the time that you turn on a computer and the time that it is ready for you to issue commands is referred to as the boot process.
T
Today's Windows operating system do not require the DOS kernel.
T
One of the reasons Microsoft Windows suffers from the reputation for being the most vulnerable to viruses, worms, and other attacks is because of hackers with anti-establishment sentiments.
T
Ina dual boot system, you must select which operating system to use.
T
A General Purpose License or GPL allows anyone to make copies for their own ise to give to others or to sell.
F
The D drive must refer to a CD or DVD drive
T
When you use Windows, Mac OS, or a Linux graphical file manager, each sub-directory is depicted as a folder
F
When creating a file, you must keep up with the size of the file manually.
F
A file extension is always the same as a file format
F
To be a certain a file can be opened by the recipient, simply save it as an .exe and then anyone can open it.
T
Often file management is represented by a tree metaphor
F
File management utilities usually retain the files within a folder when that folder is deleted.
T
Viruses can damage files to the point that your computer cant't access any data on its hard disk.
F
With remote backups, the speed for backing up and restoring data is independent of the speed of your Internet connection
F
Some systems streamline the backup process by restoring a computer's operating system, devices drivers, settings, and data in a single step-a process called restore pointing
F
A WAN provides connectivity within a limited geographical area, often within a single building.
T
In a client/ server network, a server provides services to other computers called clients.
T
A bus topology connects all devices to a common backbone, which functions as a shared communications link.
T
The device use to connect you home LAN to Internet is a type of gateway.
T
A process called handshaking allows two communications devices on a network to negotiate their communications protocols.
F
The wave on the bottom in the accompanying figure depicts a digital.
F
The wave on the top in the accompanying figure depicts an analog signal.
T
MAC addresses are used for some low-level network functions and can also be employed to establish network security.
F
A packet always travels from the source directly to the destination, never traveling through intermediate routing devices.
T
IP addresses can be assigned by ISPs or system managers
F
In the accompanying figure, the item on the left simply plugs into a serial port on the outside of the system unit.
F
Microwaves cannot be aimed in a single direction and have less carrying capacity than radio waves.
T
A transceiver is a combination of a transmitter and a receiver.
F
Bluetooth is often used to connect workstations to LAN.
T
WPA2 makes sure that packets have not been intercepted or tampered with in any way.
F
A crytographic algorithm is word, number, or phrase that must be known to encrypt or decrypt a message
F
The octets in an IP address correspond to a Web site address.
F
The www in a URL is part of domain name.
T
You must pay for a domain name.
F
All IP address are dynamic
T
Television and data signals are carried over the same cable
F
Internet anywhere technology is now considered a standard.
F
You can use a hot spot for mobile Internet access.
T
To use portable satellite technology you must take your satellite with you.
F
You can use a USB port to connect your wireless modem card to your laptop
F
Cloud computing is the term given to analyzing cloud patterns and with the help of the computer predicting the weather.
T
P2p file sharing allows users to obtain files from other users on the Internet.
T
Bit-Torrent uses P2P technology
T
One of the most common ways of gaining unauthorized access to a network is by looking for open ports.
F
Accessing Internet mobility is possible with most of today's wired or wireless Internet technologies
T
Most firewall software is prefigured to block only unnecessarily open ports targeted by hackers.