Use LEFT and RIGHT arrow keys to navigate between flashcards;
Use UP and DOWN arrow keys to flip the card;
H to show hint;
A reads text to speech;
50 Cards in this Set
- Front
- Back
During a typical session, a computer may run on an average of 50 processors at one time
|
True
|
|
In a GUI, like the one in the accompanying figure, each graphical object represents a computer program
|
False
|
|
Today’s Windows operating systems do not require the DOS kernel.
|
True
|
|
One of the reasons Microsoft Windows suffers from the reputation for being the most vulnerable to viruses, worms, and other attacks is because of hackers with anti-establishment sentiments.
|
True
|
|
A General Purpose License, or GPL, allows anyone to make copies for their own use or to give or sell to others.
|
True
|
|
To be certain a file can be opened by the recipient, simply save it as an .exe; then anyone can open it.
|
False
|
|
File management utilities usually retain the files within a folder when that folder is deleted
|
False
|
|
Some systems streamline the backup process by restoring a computer’s operating system, device drivers, settings, and data in a single step--a process called restore pointing.
|
False
|
|
A process called handshaking allows two communications devices on a network to negotiate their communications protocols
|
True
|
|
In the accompanying figure, the item on the left simply plugs into a serial port on the outside of the system unit (flash drive)
|
False
|
|
Bluetooth is often used to connect workstations to a LAN.
|
False
|
|
All IP addresses are static
|
False
|
|
All IP addresses are dynamic
|
False
|
|
You may use an analog modem even if your phone service is digital.
|
True
|
|
Since older versions of software, like the kind shown in the accompanying figure, typically support new HTML features, it is not a good idea to upgrade when a new version of your browser becomes available (google-netscape navigator vs. mozilla)
|
False
|
|
A plug-in is sometimes called a browser add-on
|
True
|
|
An ActiveX control is a full-fledged program, which gives it the potential to include a routine that alters or deletes files from your hard drive
|
True
|
|
A C2C e-commerce transaction occurs when individual consumers purchase goods and services from online merchants
|
False
|
|
A conversion process called MIME provides a clever way of disguising digital photos, sounds, and other media as plain ASCII code that can travel over the Internet as e-mail attachments.
|
True
|
|
Netiquette is online jargon for Internet etiquette
|
True
|
|
E-mail is based on store-and-forward technology.
|
True
|
|
Whether you acquire an image from a digital camera or a scanner, bitmap graphics tend to require very little storage space
|
False
|
|
Individual objects in a vector graphic, like the one in the accompanying figure, cannot be easily stretched, shrunk, colored, moved, and deleted (stonehenge)
|
False
|
|
CDs with copy protection cannot be duplicated, and music that is ripped to another format does not play back correctly
|
True
|
|
Free file-sharing sites, popular in the 1990s, had a devastating effect on the recording industry
|
True
|
|
____ provides process and memory management services that allow two or more tasks, jobs, or programs to run simultaneously.
|
Multitasking
|
|
The accompanying figure is an example of a(n) ____ tool (computer file)
|
File Management
|
|
____ is the process of creating a CD, DVD, or BD by selecting all the files and then copying them in a single session.
|
Disk Mastering
|
|
You should consider making backups of your ____
|
All of the above
|
|
Tom and Andy are discussing file storage. They are working on a major project and want to be sure they can store their files in a way so they can easily be found and shared with others.
Tom sends Andy an e-mail attachment named OurProject.tif. Andy tries to open the attachment but can’t. His problem may be that ___ |
Any of the above
|
|
A(n) ____ server stores files and supplies them to workstations upon request.
|
File
|
|
A protocol known as ____ is designed to automatically distribute IP addresses.
|
DHCP
|
|
A wired network is one that uses ____ to connect network devices
|
Cables
|
|
The original Ethernet standard carried data over a coaxial cable bus topology at ____.
|
10 mbps
|
|
Wireless signal range can be limited by ____
|
The type of signal, Transmitting strength, physical environment
|
|
Esteban has decided to install a computer network in his home. He knows he can choose wired or wireless and that there are differences in transmission speed and security.
After additional research, Esteban decides that he wants to create a wired network using existing telephone wiring. What kind of network will he create? |
HomePNA network
|
|
A communications ____ is described as a virtual device because it is not a physical circuit or mechanism.
|
Port
|
|
Some ISDN providers offer a service called ____, which remains connected to an ISP as long as the computer and terminal adapter are on.
A) AO/DI B) DSL C) VDSL D) HDSL |
AO/DI
|
|
he accompanying figure is a screenshot of FileZilla, in which the file to be ____ is indicated by box A.
A) uploaded B) downloaded C) reloaded D) remastered |
Uploading
|
|
The average “survival time” for an unprotected computer to remain uncompromised is only ____.
A) nine seconds B) nine minutes C) nine hours D) nine days |
Nine minutes
|
|
In the URL found in the accompanying figure, www.cnn.com is the ____.
A) Web protocol standard B) Web server name C) folder name D) file extension |
Web server name
|
|
____ is a protocol that works in conjunction with TCP/IP to get Web resources to your desktop.
A) HTML B) URL C) HTTP D) FTP |
HTTP
|
|
Before sending a large attachment in an e-mail, you can use a(n) ____ to shrink it.
A) crawler program B) compression program C) netiquette scanner D) index utility |
Compression Program
|
|
Incoming mail can be stored on a ____ server until it is downloaded to the inbox on your hard disk.
A) Webmail B) POP3 C) IMAP D) SMTP |
POP3
|
|
In a classic Webmail configuration, messages are sent immediately and thus a(n) ____ is not needed.
A) server B) client C) Inbox D) Outbox |
Outbox
|
|
To avoid becoming a spam victim, you should ____.
A) reply to spam when you receive it B) always click on the links in e-mail messages C) provide your e-mail address to all sites that request it D) use a disposable e-mail address when you register for online sites |
Use a disposal e-mail address
|
|
Mark is interested in Internet e-commerce security issues. His friend Amelia runs a small B2C site that sells vintage clothing. He discusses the topic with Amelia, and he learns about ActiveX controls, and how browsers and Web servers communicate with each other.
To identify the creator of an ActiveX control, Amelia tells Mark that he should look at the control’s ____. |
Digital Certificate
|
|
A ____ bit in a monochrome bitmap represents black.
A) 0 B) 1 C) 56 D) 255 |
0 bit
|
|
____ is a graphics format with built-in compression that stores True Color bitmap data very efficiently in a small file.
A) GIF B) BMP C) PCX D) JPEG |
JPEG
|
|
In 2009, Apple announced that the application shown in the accompanying figure would distribute ____-free music.
A) DRM B) CSS C) AACS D) VoIP |
DRM
|