• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/370

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

370 Cards in this Set

  • Front
  • Back
The digital revolution became a significant factor in the 1980s but ended in the 1990s with the dot com bubble burst.
False
The first digital computer was developed for conducting the census.
False
Technology may help us develop a better appreciation for privacy.
True
Prior to 1940, the word computer was defined as a person who performs calculations.
true
An operating system is an example of application software.
false
(An operating system is a master controller for all the activities that take place within a computer)
Because of increased versatility, a videogame console is now considered a personal computer.
false
The purpose of a server is to serve computers on a network.
true
In the binary number system, 2 is used to represent the value 2.
true
(2 represents 10)
The number 9 can be considered a character.
true
Because most digital devices are electronic, bytes take the form of electrical pulses
false
Semiconductor materials are substances with properties between those of a conductor and an insulator.
true
An interpreter converts and executes one statement at a time.
true
The op code specifies the data.
false
The operand is a command word for an operation.
false
All computers are case sensitive
false
Trojans are computer programs that seem to perform one function while actually doing something else.
true
Digital technology has made it easy to produce copies of music with no loss of quality from the original.
true
Free source projects promote copying, free distribution, peer review, and user modifications.
true
An area where data can be left on a permanent basis is memory.
false
The set of instructions that tells a computer how to carry out processing tasks is a computer program.
true
Minicomputers were used for small businesses.
false
A(n) supercomputer is a large and expensive computer capable of simultaneously processing data for hundreds or thousands of users.
false
The term server can refer to a combination of hardware and software.
true
A(n) mainframe specializes in compute-intensive problems.
false
A light switch is like a(n) analog device.
false
DIPs and PGAs are both shapes of integrated circuits.
true
The results of statements that have been compiled are called object code.
true
A set of machine language instructions for a program is called source code.
false
The ALU uses registers to hold data that is being processed.
true
A(n) keylogger is a form of malicious code.
true
A(n) account manager stores user IDs with their corresponding passwords and automatically fills in login forms.
false
Digital electronics use electronic ____ to represent data.
circuits
Key factors in making electronic devices increasingly smaller and less expensive include ____.
Integrated circuits and transistors
The first digital computers were built during World War II for ____.
code breaking
Initially sales were slow for the personal computer because of ____.
lack of software
In 1982, the percentage of households that had a computer was fewer than ____ percent.
10
A global computer network originally developed as a military project is the ____.
internet
____ allow members to post comments and questions that can be read and responded to by others.
bulletin boards
____ are where people exchange typed messages in real time.
chat groups
____ provide a space for interacting with friends or friends of those friends.
online social networks
A group of computers linked by wired or wireless technology is a(n) ____.
network
The ____ is a collection of linked documents, graphics, and sounds.
web
____ is a term that refers to entities that exist largely within computer networks.
cyberspace
____ is the process of converting text, numbers, sound, photos, and video into data that can be processed by digital devices.
digitalization
Technology ____ is a process by which several different technologies with distinct functionality evolve to form a single product.
convergence
More than ____ percent of cameras sold today are digital.
99
Digital imaging has had an effect in the following areas: ____.
photo processing, video, medicine
____ tools cloak a person’s identity online.
anonymizer
A computer is a multiple purpose device that can do all of the following EXCEPT ____.
think independently
In a computer, most processing takes place in ___
the CPU
An electronic component that can be programmed to perform tasks is a ____.
microprocessor
A named collection of data that exists on a storage medium is known as (a) ____.
file
An area of a computer that temporarily holds data waiting to be processed is ____.
memory
A set of computer programs that helps a person carry out a task is ____.
app software
A set of computer programs that helps a computer monitor itself and function more efficiently is ____.
system sofware
The master controller for all activities that take place within a computer is ____.
OS
A(n) ____ is a microprocessor-based computing device designed to meet the computing needs of an individual.
personal computer
An ordinary personal computer that is connected to a network is a ____.
workstation
A compute-intensive problem runs on a ____.
supercomputer
Data becomes ____ when it is presented in a format that people can understand and use.
information
The type of data where text, numbers, graphics, sound, and video have been converted into discrete digits as represented in the accompanying figure is ____.
digital
The type of data that is represented using an infinite scale of values as represented in the accompanying figure is ____.
analog
The binary number 10 represents ____ in the decimal number system.
2
The type of code that uses only seven bits for each character is ____.
ASCII
The type of code that uses eight bits for each character is ____.
extended ASCII
Digital devices can use ____ as a code to represent character data.
(all of the above)
You might represent ____ using character codes.
soc sec #s
Data transmission speeds are typically expressed as ____.
bits
Storage is typically expressed as ____.
bytes
1,024 bytes is a ____.
kilobyte
1,048,576 bytes is a ____.
megabyte
1,073,741,824 bytes is a ____.
gigabyte
A super-thin slice of semiconducting material packed with microscopic circuit elements is a(n) ____.
integrated circuit
The ____ houses all essential chips and provides connecting circuitry between them.
system board
C, BASIC, COBOL, and Java are examples of ____ programming languages.
high level
The human-readable version of a program is called ____.
source code
A(n) ____ converts all the statements in a program in a single batch and the resulting collection of instructions is placed in a new file.
compiler
A(n) ____ converts and executes one statement at a time.
interpreter
A collection of preprogrammed activities such as addition, subtraction, counting and comparison is called a(n) ____.
instruction set
____, as shown in the accompanying figure can be directly executed by the processors’s circuitry.
Machine language
The ____ is a command word for an operation such as add, compare, or jump.
op code
The ____ from an instruction specifies the data
operand
The ____ is the part of the microprocessor that performs arithmetic operations.
ALU
The ____ fetches each instruction.
control unit
In terms of an authentication protocol, the phrase ‘something a person knows’ refers to ____.
password
A ____ is a series of characters that becomes a person’s unique identifier.
user I.D.
In terms of an authentication protocol, the phrase ‘something a person possesses’ could refer to ____.
I.D. card
In terms of an authentication protocol, the phrase ‘something a person is’ refers to a(n) ____.
biometric device
A problem a hacker can cause after breaking into your computer include(s) ____.
(all of the above)
A term which can refer to a person who manipulates computers with malicious intent is a ____.
(all of the above)
A ____ attack uses password-cracking software.
brute force
____ intercepts information sent over computer networks.
sniffling
A hacker posing as a legitimate representative of an official organization such as your bank is an example of ____.
phising
Password management functions include all of the following EXCEPT ____.
recording keystrokes
The system unit is the case that holds the main circuit boards, microprocessor, memory, power supply, and storage devices of a personal computer system.
true
The term “form factor” refers to the size and dimensions of a component, such as a system board.
true
Currently, there are three personal computer platforms: PC, Mac, and Linux.
true
You can easily identify the microprocessor when looking inside a computer, as it is the only chip on the motherboard.
false
A microprocessor’s clock speed is equal to the number of instructions it can execute in one second.
false
Processors with a smaller word size can process more data during each processor cycle.
false
A fast front side bus moves data quickly and allows the processor to work at full capacity.
true
All other things being equal, a computer with a 933 MHz processor is faster than a computer with a 3.3 GHz processor.
false
A RISC processor has a complex instruction set, each requiring several clock cycles for execution.
false
Most processors in today’s personal computers use RISC technology.
false
RAM is volatile, which means it must constantly receive electric power to hold data.
true
Currently, hard drive capacity is measured in gigabytes (GB) or terabytes (TB).
true
The speed of CD, DVD and Blu-ray drives are all measured on the same scale, based upon the original 1.2 megabits per second data transfer rate of the first CD drives.
false
DVD-RW technology allows you to write data to a disc, and then later change that data.
true
A card reader is a storage device that is used to read from and write to solid state storage cards, like SecureDigital (SD) and CompactFlash cards.
true
A jump drive is a portable storage device featuring a built-in connector that plugs directly into a computer’s USB port.
true
A keyboard is an example of a pointing device.
false
A touch screen, also known as a touch-sensitive screen, can serve as both an input and output device.
true
The microprocessor is the most important component of a computer, and usually the most expensive single component.
true
RAM circuitry holds “hard-wired” instructions that are a permanent part of the circuitry.
false
RAM speed is often expressed in nanoseconds (ns) or megahertz (MHz).
true
The more data and programs that can fit into EEPROM, the less time your computer will spend moving data to and from virtual memory.
false
Access time is the amount of data a storage device can move each second from the storage medium to the computer.
false
Sequential access is the ability of a device to “jump” directly to requested data.
false
Storage mass is the maximum amount of data that can be stored on a storage medium.
false
EIDE, Ultra ATA, SCSI and DMA refer to the different types of controllers used by hard disk drives.
true
CDs and DVDs are examples of magnetic storage media.
false
Internal drive bays provide access from outside the system unit.
false
On a display device, the refresh rate is the distance in millimeters between like-colored pixels, and is a measure of picture clarity.
false
The term ____ designates equipment that might be added to a computer system to enhance its functionality.
peripheral device
The main component of a typical desktop computer is the ____, which houses the processor, memory, some storage devices, and display and sound circuitry.
system unit
____ are the form factor of choice for computer owners who might want to upgrade components in the future because it is easy to get inside the case and swap out parts.
Tower units
The term ____ refers to the size and dimensions of a computer component.
form factor
A ____ computer is a small, lightweight personal computer with screen, keyboard, storage, and processing components integrated into a single unit.
portable
A ____ offers more portability than a standard notebook.
netbook
A ____ computer is a portable computing device featuring a touch-sensitive screen that can be used as a writing or drawing pad.
tablet
A(n) ____ tablet configuration resembles a high-tech clipboard and lacks a built-in keyboard.
slate
A ____ computer is also referred to as a laptop computer.
notebook
Gaming computers typically include ____.
(all of the above)
In the context of computing, a(n) ____ is a custom, hand-built modification to a computer system component.
mod
____ means a billion cycles per second.
gigahertz
In an advertisement, a speed specification, such as 2.66 GHz, indicates the speed of the microprocessor ____.
clock
____ refers to the number of bits that a microprocessor can manipulate at one time.
word size
A technology called ____ allows the processor to begin executing another instruction before it completes the previous instruction.
pipelining
A microprocessor whose instruction set includes a limited set of simple instructions uses ____ technology.
RISC
A processor that includes circuitry for two or more processing units is called a ____ processor.
multicore
____ is used to enhance processor performance.
Pipelining and parallel processing
Many of today’s microprocessors perform ____, in which multiple instructions are executed at the same time.
parallel processing
____ are the results of a series of tests used to gauge overall microprocessor speed and are useful in comparing microprocessor performance.
benchmarks
Overclocking is a technique for increasing the speed of a computer component, such as ____. It can be very risky.
(all of the above)
____ is a temporary holding area for data, application program instructions, and the operating system.
RAM
RAM can be thought of as the ____ for the computer’s processor.
waiting room
Unlike disk storage, most RAM is ____.
volatile
If the system runs out of RAM, the operating system uses an area of the hard disk called ____ to store parts of a program or data file until they are needed.
virtual memory
RAM speed is often expressed in ____.
nanoseconds
____ is used by most of today's personal computers because it is fast and relatively inexpensive.
SDRAM
____ is a type of memory circuitry that holds the computer's startup routine.
ROM
ROM BIOS is a small set of instructions that tells the computer ____.
(all of the above)
A(n) ____ chip is a type of non-volatile memory chip that does not require power to hold data.
EEPROM
____ time is the average time it takes a computer to locate and read data on the storage medium.
Access
____ is the ability of a device to "jump" directly to the requested data.
Random access
The ____ is the amount of data that a storage device can move from the storage medium to the computer per second.
data transfer rate
Hard disk storage technology can be classified as ____ storage.
magnetic
A hard disk ____ is a flat, rigid disk made of aluminum or glass and coated with magnetic iron oxide particles.
platter
Personal computer hard disk platters typically have storage capacities ranging from 40 GB to ____.
2 TB
Hard disk drive capacities are measured in ____.
gigabytes or terabytes
CD and DVD storage technologies can be classified as ____ storage.
optical
Which of the following is an example of a rerecordable optical storage medium?
(all of the above)
A built-in ____ in your personal computer can make it simpler to transfer photos from a solid state memory card used in your digital camera.
card reader
Solid state storage, also called flash memory storage, ____.
provides fairly fast access to data
USB Flash drives can have capacities ranging from ____.
16 MB to 64 GB
A ____ is an example of a pointing device.
joystick, trackpad, mouse
A ____ is a touch-sensitive surface on which you can slide your fingers to move the on-screen pointer.
trackpad
Tablet computers, many PDAs, retail store self checkouts, and information kiosks collect input from a ____.
touch screen
A(n) ____ is standard equipment on notebook computers.
LCD
Dot pitch is the distance in millimeters between like-colored ____ —the small dots of light that form an image.
pixels
____ have a faster response rate than standard LCD screens.
OLED's
The number of colors a monitor can display is referred to as ____.
color depth
Which is the highest resolution?
WQXGA
A printer’s ____ determines how many pages a printer is able to churn out.
duty cycle
A(n) ____ printer can print on both sides of the paper.
duplex
____ is the most widely used language for communication between computers and printers.
PCL
Hot plugging is allowed with what kind of devices?
USB & firewire
The ____ is a security mechanism that is factory-installed on many personal computers.
Kensington security slot
A ____ is a sudden increase or spike in electrical energy, affecting the current that flows to electrical outlets.
power surge
It takes 800 pounds of force to remove a ____ plate, which contains a unique ID number, a warning message, and an 800 number to report a stolen computer.
STOP
Which of the following is tracking and recovery software?
lojack for laptops
A ____ is a device that not only provides surge protection, but also furnishes your computer with battery backup power during a power outage.
UPS
A(n) ____ strip monitors the electrical current that passes from the outlet to all the devices plugged into the strip.
surge
The ____ indicates that the operating system has encountered an error from which it cannot recover, and the computer no longer accepts any commands.
black screen of death
A good computer maintenance routine would include regularly ____.
(all of the above)
____ is a limited version of Windows that allows you to use your mouse, monitor, and keyboard, but no other peripheral devices.
safe mode
Productivity software is designed to make the operating system run more effectively.
false
Utility software includes diagnostics that track down and fix disk errors.
true
Spreadsheets have built-in formulas.
true
CAD software is designed to be used by architects.
true
Payroll software is an example of vertical market software.
false
Third-party vendors offer utilities designed for the same tasks as those packaged with operating systems.
true
If you purchase software, it belongs to you and you can do what you want, including copying it.
false
There are no advantages to purchasing software in a box rather than downloading.
false
Open source software is copyrighted.
true
Files that are zipped contain consolidated files that are compressed and ready to execute.
false
Product activation and registration represent the same function with different names.
false
A zombie is a computer under the control of a bad bot.
true
A virus signature is a digitally signed certificate that certifies the file is virus free.
false
Antivirus software does not require any updates.
false
A quarantined file is generally encrypted before storing.
true
Utilities are an example of application software.
false
Production software refers to any type of application software that has the potential to help people do their work more efficiently.
false
A device driver is software that helps a peripheral device establish communication with a computer.
true
You can automatically create personalized letters by using templates.
false
CD ripper software is designed to pull a track off an audio CD and store it in a coded digital format.
false
Vertical market software is designed to automate specialized tasks in a specific market or business.
true
A trademark is a form of legal protection that grants the author of the original work exclusive rights to copy, distribute, sell, and modify.
false
A software license defines the way you may use a computer program.
true
Public domain software has restrictions on its use.
false
A typical software package contains one file.
false
A startup file is designed to be started by users or automatically launched by the operating system.
false
Some Web applications such as Google Earth require a client-side program to be installed on your local computer.
true
Hackers can use rootkits to hide their work.
true
A virus hoax usually arrives as an attachment
false
A security package integrates several security modules to protect against malware.
false
System software is designed to accomplish ____ tasks.
computer centric
Application software is designed to accomplish ____ tasks.
real world
Application software includes ____.
statistical software
Software most commonly associated with productivity software is ____.
word processing software
____ is a type of application software designed to help several people collaborate.
Groupware
Software considered utility software is ____.
setup wizard
The type of system software designed to help you monitor and configure settings for your computer system equipment is ____ software.
utility
Adobe Reader works with files stored in standard ____ format.
PDF
Desktop widgets include all of the following EXCEPT ____.
icons
Productivity software that provides you with the ability to create, spell-check, edit, and format is considered ____ software.
word processing
Productivity software that has sophisticated features to help you produce professional-quality output is considered ____ software.
desktop publishing
When using word processing software to analyze the reading level of your document you should use a ____.
readability formula
The paragraph style that is used to assure paragraphs are aligned evenly on both the right and left is ____.
fully justified
A page layout includes ____.
(all of the above)
The intersection of a column and a row on a spreadsheet is called a ____.
cell
Spreadsheets are particularly useful for ____.
what if analysis
A formula can contain ____ and mathematical operators.
cell references
To find a particular record or group of records in a database you use a ____.
query
You can use the results from a search on a database in all of these ways EXCEPT to ____.
create records
3-D graphics software provides a set of tools for creating ____ that represents three-dimensional objects.
wireframes
Popular presentation software products includes all of the following EXCEPT ____.
movie maker
The type of software that targets musicians and music students who want to develop musical skills is ____.
ear training
Software that is the musician’s equivalent to a word processor is ____.
notation
Software designed to generate unique musical compositions simply by selecting the musical style, instrument, key, and tempo is ____.
computer aided music
All of the following are examples of utility software EXCEPT ____.
windows
System requirements that are important in determining if a software program will work on a computer are ____.
(all of the above)
You can purchase software at a variety of locations such as ____.
(all of the above)
In order for software to work on a given computer, it must meet ____.
system requirements
It is illegal to do all the following with software EXCEPT ____.
copy and keep as a backup
A ____ is a legal contract that defines the ways in which you may use a computer program.
software license
An end-user license agreement is ____.
displayed on-screen when you first install software
Indicators of pirated software includes all of the following EXCEPT software that ____.
is downloaded
A shrink-wrap license goes into effect as soon as you ____.
open it
____ is typically sold in a store or online.
commercial software
____ is typically available as a trial version.
Demoware
Software that is available without restriction is ____.
public domain
____ is typically commercial software that is marketed under try-before-you buy policy.
Shareware
____ may be sold or distributed free of charge in compiled form but almost always includes the source code.
Open source software
Support programs have a ____ extension.
.dll
Software requires many files because ____.
It allows flexibility and efficiency
Data files supplied with a software package support ____ file extensions.
.hlp
____ applications are software that is designed to reside on a computer’s hard disk.
Local
If you are installing a local application from a distribution CD and it does not automatically run, you should ____
look for a file called setup.exe
When installing software, you should ____.
select custom when you don’t need all the features
A protection of software from illegal copying is ____.
product activation
Product validation can create a(n) ____ based on your validation code and your computer’s internal serial number.
hash value
Downloadable software can be provided in different formats such as ____.
(all of the above)
During product activation you must ____.
enter a product key
Portable software is ____.
designed to run from removable storage
Web applications are ____.
accessed and run on the Web
A service pack ____.
provides updates to the operating system
To get rid of software you no longer want, you ____.
run an uninstall routine
A ____ is any software that can automate a task or autonomously execute a task when commanded to do so.
bot
The term rootkit refers to ____.
software tools used to conceal malware and backdoors
To avoid security threats, a user can ____.
avoid opening suspicious email attachments
A security suite will typically include all of the following EXCEPT ____.
anti-adware
Security suites can be ____.
(all of the above)
A virus signature is a(n) ____.
Unique series of instructions
If a virus protection software identifies a virus, it can try to take all of the following actions except ____.
highlight the file in Windows Explorer
During a typical computing session, your computer might run an average of 50 processes.
true
In a GUI like the one in the accompanying figure, each graphical object represents a computer program.
true
A combo button allows you to select one item from several options.
true
During the boot process, the operating system is totally loaded into the kernel.
false
A sequence of events that occurs between the time that you turn on a computer and the time that it is ready for you to issue commands is referred to as the boot process
true
Today’s Windows operating systems do not require the DOS kernel.
true
One of the primary strengths of Windows is security.
false
One of the reasons Microsoft Windows suffers from the reputation for being the most vulnerable to viruses, worms and other attacks is because of hackers with anti-establishment sentiments.
true
In a dual boot system, you must select which operating system to use.
true
A General Purpose License or GPL allows anyone to make copies for their own use to give to others or to sell.
true
The D drive must refer to a CD or DVD drive.
false
When you use Windows, Mac OS, or a Linux graphical file manager, each subdirectory is depicted as a folder.
true
When creating a file, you must keep up with the size of the file manually.
false
A file extension is always the same as a file format
false
To be certain a file can be opened by the recipient, simply save it as an .exe and then anyone can open it.
false
Often file management is represented by a tree metaphor.
true
File management utilities usually retain the files within a folder when that folder is deleted.
false
Viruses can damage files to the point that your computer can't access any data on its hard disk.
true
With remote backups, the speed for backing up and restoring data is independent of the speed of your Internet connection.
false
Some systems streamline the backup process by restoring a computer’s operating system, device drivers, settings, and data in a single step--a process called restore pointing.
false
A desktop operating system is designed for a personal computer.
true
A window user interface provides a way to point and click a mouse to select menu options and manipulate graphical objects displayed on the screen.
false
Upward compatibility refers to the ability to work with products designed for prior-generation hardware or software.
false
UNIX is rather unique because it is distributed along with its source code under the terms of a GPL (General Public License).
false
Windows Mobile OS is an open source operating system designed for mobile devices, and is based on the Linux kernel.
false
DOS and Windows 3.1 limited file names to twelve characters.
false
A file type is an optional file identifier that is separated from the main file name by a period.
false
The section of data at the beginning of a file that contains information about a file is the file format.
false
When formatting a disk, the disk is divided into tracks.
true
When formatting a disk, tracks are divided into sectors.
true
Tracks and sectors are numbered to provide addresses for each data storage bin.
true
A(n) operating-system disk is a removable storage medium containing the operating system files needed to boot your computer without accessing the hard disk.
false
A restore point is a snapshot of your computer settings.
true
When selecting a backup device, your selection should depend upon the value of your data, your current equipment, and your budget.
true
File synchronization is typically used to backup all data files.
false
Most personal computers today are sold with preinstalled operating systems including all of the following EXCEPT ____.
HP
A program called ____ is an example of Windows software.
microsoft word
The most obvious responsibility of your computer’s operating system is to ____.
Provide an environment for running software
All of the following are examples of resources EXCEPT ____.
a file
Activities associated with resource management include all of the following EXCEPT ____.
installing new memory
____ provides process and memory management services that allow two or more tasks, jobs, or programs to run simultaneously.
multitasking
Within a single program, ____ allows multiple parts to run simultaneously.
multithreading
An operating system’s ____ capability supports a division of labor among all the processing units.
multiprocessing
The term ____ is a technical term for the region of memory that holds data waiting to be transferred from one device to another.
buffer
The Recycle Bin is an example of a(n) ____.
icon
The words "Start Search" appear in ____.
the start menu
The button labeled "Tips – Paint" appears in the ____.
task bar
Windows Photo Gallery appears in a(n) ____.
window
A ____ is an additional set of commands that the computer displays after you make a selection from the main menu.
sub menu
A ____ displays the options associated with a command.
dialog box
Microsoft Windows is installed on more than ____ of the world’s personal computers.
80%
The first versions of Windows were referred to as operating environments rather than operating systems because ____.
they required DOS to supply the operating system kernel
The strengths of Microsoft Windows include all of the following EXCEPT ____.
reliability
Microsoft offers different desktop editions of its Microsoft Windows for various markets; these editions include all of the following EXCEPT ____.
mobile
The strengths of Mac OS include ____.
security
VMWare and Parallels Desktop software are examples of ____.
Virtual machine software
Weaknesses of Mac OS include ____.
Limited applications
Files maintained by the Macintosh operating system can have two parts called ____.
forks
In the Mac OS, the data ____ contains data or the commands for a program.
fork
In the Mac OS, the resource ____ stores information about the data.
fork
The operating system that was developed in 1969 by AT&T’s Bell Labs and gained a good reputation for its dependability is ____.
UNIX
____ was developed by a Finnish student. It continues to gain popularity as an operating system for personal computers. It is distributed under the terms of a GPL.
LINUX
The Palm OS ____ is currently used for popular Palm brand PDAs and smart phones.
garnet
____ OS is a multitasking, multithreading operating system used on Ericsson and Nokia smart phones.
symbian
Current versions of Windows support file names up to ____ characters long.
255
An optional file identifier that is separated from a main file name by a period is a ____.
file extension
File endings with .exe are ____ files.
executable
Information kept about a file includes ____.
size
A computer file’s location is defined by a ____.
file specification
An extension of .sys designates a ____ type of file.
configuration
An extension of .ocx designates a ____ type of file.
support
An extension of .wav designates a ____ type of file.
sound
File management capabilities available from application software include ____ files.
(all of the above)
A file ____ in the context of Windows is a piece of information that describes a file.
tag
The difference between the Save and the Save As command is that ____.
(all of the above)
A description of what actually happens on the disk and in the circuits is represented by a ____.
physical storage model
Most floppy and hard disks are formatted by the ____.
factory
____ is the process of creating a CD or DVD by selecting all the files and then copying them in a single session.
disc mastering
In relation to disks, ____ is a recording technology that lets you record in multiple sessions.
packet writing
A group of sectors is called a ____.
cluster
The file system used by Mac OS is ____.
HFS+
The file system used by Windows XP and Vista is ____.
NTFS
The file system used by Windows 95, 98, and Me is ____.
FAT32
To delete data from a disk in such a way that no one can ever read it, you should ____.
Use special shredder software
Files stored in noncontiguous clusters are ____.
fragmented
For backup purposes, a fast, inexpensive and convenient device that if damaged all backups will be lost is a(n) ____.
external hard disks
For backup purposes, a fast, limited capacity device that can be locked in a secure location is a(n) ____.
removable hard disk
A device used for backup whose capacity depends on the space allocated to each user, and is fast and convenient is a(n) ____.
network server
A device used for backup that is convenient and durable but which in high-capacity models are expensive is ____.
USB flash drive
You should consider making backups of ____.
(all of the above)
A(n) ____ backup includes every file from the computer’s primary storage device.
full system
A(n) ____ backup contains any files that have changed since the last full backup.
differential
A(n) ____ backup makes a copy of only those files that were added or changed since your last backup.
incremental
A(n) ____ disk is a bootable CD, DVD, or other media that contains a complete copy of your computer’s hard disk as it existed when shipped from the manufacturer.
recovery
A disk ____ is a bit-by-bit copy of the data from all sectors of a disk.
image