• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/130

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

130 Cards in this Set

  • Front
  • Back
A ____ is a video camera that displays its output on a Web page.
Web cam
____ is the technology of authenticating a person s identity by verifying a personal characteristic.
Biometrics
The quality of an LCD depends primarily on its ____.
resolution
The refresh rate of a CRT is measured in ____.
hertz
A high-quality CRT refreshes itself ____ times a second.
68
Printer resolution is measured in ____.
dots per inch
A dot-matrix printer is a kind of ____ printer.
impact
Two output options for blind users are _____.
voice output and Braille printer
A ____ is a small, flat, rectangular pointing device that is sensitive to pressure and motion.
touchpad
A ____ is a vertical lever mounted on a base.
joystick
A ____ uses pressure to write text and draw lines.
digital pen
____ involves reading typewritten, computer-printed, or hand-printed characters from ordinary documents and translating the images into a form the computer can process.
OCR
A(n) ____ frequently is used by the banking industry for check processing.
MICR reader
A(n) ____ often is found in retail stores to record purchases, process credit or debit cards, and update inventory.
POS terminal
____ is the technology of authenticating a person’s identity by verifying a personal characteristic.
Biometrics
Which of the following is not a secondary storage medium?
RAM
A large business may require as much as ____ bytes of storage.
50 trillion
The term for 1 quadrillion is ____.
petabyte
Storage devices access data in ____ of a second.
thousandths
____ measures the amount of time it takes a storage device to locate an item on a storage medium.
Access time
Memory chips access data items in ____ of a second.
billionths
1 MB is equal to exactly ____ bytes.
1,048,576
Which is not a magnetic storage medium?
DVD
Which of the following is not a characteristic of a hard disk?
chip
Hard disks spin at 5,400 to ____ rpm.
15,000
A _____ occurs when a hard disk s read/write head touches the surface of a platter.
head crash
Which is not a type of disk controller?
CD-ROM
A(n) _____ stores items by using microscopic pits and lands in its middle layer and is read by a laser beam.
optical disc
A(n) _____ disc can be read, written to, and erased.
DVD+RW
A typical CD-ROM holds up to ____ of data.
1 GB
____ storage requires sequential access of data.
Tape
Experts predict that ____ will become the mobile user’s primary storage device.
USB flash drives
All of the following are examples of Solid State Storage devices except _____.
Zip disk
A large business, commonly referred to as a(n) ____, has hundreds or thousands of employees
enterprise
Which has the longest life expectancy?
microfilm
Which of the following is not an operating system function?
word processing
The operating system typically resides on the computer’s ____.
hard disk
The operating system a computer uses is called the ____.
platform
When turning on a computer that has been powered off completely, you are performing a ____.
cold boot
A(n) ____ computer continues to operate when one of its components fails.
fault-tolerant
____ is a concept in which the operating system allocates a portion of a storage medium to function as additional RAM.
Virtual memory
The operating system technique of swapping items between memory and storage is called ____.
paging
The process called ____ sends print jobs to a buffer instead of sending them immediately to the printer.
spooling
Multiple print jobs line up in a ____ within a buffer.
queue
To protect sensitive data and information as it travels over a network, a network operating system often ____ it.
encrypts
Which of the following is not a utility function?
controlling the keyboard
To defragment a disk means to ____.
reorganize it
New versions of an operating system usually are ____ compatible.
downward
Which of the following is not a type of operating system?
wireless
DOS was developed in the early ____.
1980s
Linux is ____ software, which means its code is available to the public for use, modification, and redistribution.
open source
Novell’s Netware is a(n) ____ operating system.
network
A ____ hides within or looks like a legitimate program such as a screen saver.
Trojan horse
____ is a program placed on a computer without the user’s knowledge that secretly collects information about the user.
Spyware
A ____ is the transmission media on which the data, instructions, or information travel.
communications channel
A(n) ____ connects a communications channel to a sending or receiving device such as a computer.
modem
____ is a real-time Internet communications service that allows you to exchange messages with one or more online users.
IM
Many mobile devices such as PDAs and smart phones have ____ capability built into the device or as an add-on feature.
GPS
A ____ is a network that connects computers and devices in ONE geographical area.
LAN
A ____ is a network that connects DIFFERENT geographical areas, such as businesses in different cities, or countries.
WAN
The Internet is the world’s largest _____.
WAN
Some servers, called _____, perform a specific task and can be replaced with other servers of the same type of perform multiple tasks.
dedicated servers
The design of computers, devices, and media in a network is called the _____.
network architecture
A P2P network sometimes is called a(n) _____ network.
file sharing
If a computer or device on a _____ network fails, all devices before the failed device are unaffected, but those after the failed device cannot function.
ring
_____ has been adopted as a network standard for Internet communications.
TCP/IP
Some computers and devices use the ____ specification to transmit data wirelessly to each other via infrared light waves.
IrDA
A(n) ____ is a temporary connection that uses one or more analog telephone lines for communications.
dial-up line
Which is the fastest type of line?
ATM
Which of the following are network topologies?
Ring
Star
Bus
A HomeRF network uses radio waves, instead of cables, to transmit data through the air over distances of up to _____ feet.
150
A Wi-Fi home network can send signals up to _____ feet.
1,500
Physical transmission media used in communications include _____ cable.
Coaxial
Twisted Pair
Fiber Optic
_____ is an electrical disturbance that can degrade communications.
Noise
Bluetooth, HomeRF, and Wi-Fi communications technology use _____.
broadcast radio signals
Hard Disk
It is a disk that uses a system of storage that uses magnetic particles to represent and store information. The information is stored in tracks and sectors.

Capacity = 160GB. - 1.5TB
Opitical
CDs & DVDs
They are made from metal, plastic, or lacquer. Information is stored in pits and lands. A laser creates these indentions and less powerful one reads them.

Blue Ray = 100 - 200GB.
CD = 65MB. - 1GB.
DVD = 4GB. - 17GB.
Magnetic Disk
Uses magnetic particles to store information.
Floppy Disk
A kind of magnetic storage.

Capacity - 500KB. - 2MB.
Solid State Storage
It uses flash memory to store information. They have a faster access time than Hard Drives.
Flash Drive
A kind of solid state storage.

USB = 512MB. - 64GB.
Flash memory = 512MB. - 100GB.
Storage
Holds information for future use.
Tape
Magnetic ribbon that is capable of storing large amounts of sequential information.
Starting a computer
Turning on the computer is called booting. You can do a cold boot or a warm boot.
User Interface
It controls how you enter data into the computer and how it is displayed.
GUI
Graphical User Interface. It allows you to interact with the computer through graphics, icons, etc...
Command Line
It is an older, more secure, complicated interface. A user enters precise data into the computer.
Managing Programs
Multitasking - Process that most computers use. It allows you to have more than one applications open and that appear to be running simultaneously.

Multiprocessing - It is a process that not all computers use. It allows you to have more than one application open and running simultaneously. It uses more than one processor.
Managing Files
A file manager allows you to organize files. It displays them, organizes them into folders, and allows you to copy, rename, more, etc... the files.
The functions of an Operating System
Starting a computer
Providing an interface
Managing programs, files, and memory
Scheduling jobs
Monitoring performance
Managing Memory
Memory management's job is to make the best use of RAM, cache, and virtual memory. It holds, organizes, and transmits information.
Virtual Memory
It is a type of storage that can work as additional RAM. It is temporary storage and it can be expanded.
Scheduling Jobs
It involves the way a computer arranges things in order to process them. When multiple tasks are given, a buffer is created, which is memory that the tasks are placed on. Mutliple jobs line up in a queue on the buffer.
Configuring Devices
One kind of a configuring device is a driver. It is a program that tells a computer how to communicate with a device.
Establishing an Internet Connection
An operating system provides a way to connect to the internet. It provides a unique IP address. Some operating systems already have a browser installed.
Monitoring Performance
A performance monitor inspects and reports information concerning a computer's resources and devices. This helps uses to identify and resolve problems.
Utility Programs
AIt is a program that allows a user to perform maintenance jobs. Searching for files, cleaning disks, unistalling programs, etc...
Describe a Network Operation System
A network operating system, also called a platform, is the system that determines how a network functions. It allows you to manage and maintain connections.
List three kinds of security.
Logging in
Firewall - built in program that detects and protects a computer from attacks
File Security - determines who has access to files
What is a network?
It is a group of two or more computers that are connected and share resources and that are uniquely identified by an IP address.
Describe 3 examples of Networking Communications Applications, as described in the book.
Web - gigantic collection of documents
Blogs - online journals
Fax - transfers and receives information over telephone lines
What is a network?
It is a group of two or more computers that are connected and share resources and that are uniquely identified by an IP address.
How can you classify networks?
According to their scope, architecture, and topology.
Describe 3 examples of Networking Communications Applications, as described in the book.
Web - gigantic collection of documents
Blogs - online journals
Fax - transfers and receives information over telephone lines
Describe a LAN
Local Area Network. It connects computers on one location.
How can you classify networks?
According to their scope, architecture, and topology.
Describe a WAN
Wide Area Network. It connects computer on more than one location.
Describe a Peer-to-Peer network.
It is a network that usually connects fewer than ten computers. Each computer has equal capabilities and they share the same resources.
Describe a LAN
Local Area Network. It connects computers on one location.
Describe a Client/Server network.
It is a larger network that usually connects ten or more computers. Each computer is connected to a server that provides resources.
Describe a WAN
Wide Area Network. It connects computer on more than one location.
Describe 3 Network topologies.
Star - the computers directly and seperately connect to a central device. They are easy to maintian and if one computer shuts down, the rest continue to function.

Ring - the computers are connected to a cable that forms a closed loop. They are rarely used and if one computer fails, all the computers before it continue to function, but all the computers after it fail.

Bus - the computers are connected to a single cable. It is an older system. All devices continue to function if one fails, but if the bus fails...they all fail.
Describe a Peer-to-Peer network.
It is a network that usually connects fewer than ten computers. Each computer has equal capabilities and they share the same resources.
Describe TCP/IP protocol.
It stands for Transmission Control Protocol/Internet Protocol. It is a standard that determines how information is sent from one network to another. It divides information into small groups and determines the best path to send them on.
Describe a Client/Server network.
It is a larger network that usually connects ten or more computers. Each computer is connected to a server that provides resources.
Describe 3 Network topologies.
Star - the computers directly and seperately connect to a central device. They are easy to maintian and if one computer shuts down, the rest continue to function.

Ring - the computers are connected to a cable that forms a closed loop. They are rarely used and if one computer fails, all the computers before it continue to function, but all the computers after it fail.

Bus - the computers are connected to a single cable. It is an older system. All devices continue to function if one fails, but if the bus fails...they all fail.
Describe 3 types of transmission media.
Twisted Pair Cable - made of wires that are twisted together. It is easy to maintain and affordable.

Coaxial Cable - It is made from one wire that is insulated by three layers. It is an older type and more expensive.

Fiber-Optic Cable - It is made from hundreds of glass strands that use light to transmit information. It is the most expensive, but it is the best.
Describe TCP/IP protocol.
It stands for Transmission Control Protocol/Internet Protocol. It is a standard that determines how information is sent from one network to another. It divides information into small groups and determines the best path to send them on.
Describe 3 types of transmission media.
Twisted Pair Cable - made of wires that are twisted together. It is easy to maintain and affordable.

Coaxial Cable - It is made from one wire that is insulated by three layers. It is an older type and more expensive.

Fiber-Optic Cable - It is made from hundreds of glass strands that use light to transmit information. It is the most expensive, but it is the best.
What is input and output?
Input - data that is entered into the computer
Output - data that the computer produces
RAID
Redundant Array of Independent Disks. RAID connects small storage disks into a single unit.
NAS
Network Attached Storage. A device that is connected to server to provide storage.
Recordable and Rewritable DVDs
DVD-RW, DVD+RW, & DVD+RAM
System Software
Progams that maintain the operations of a computer and its devices. Divided into Operating Systems and Utility Programs.
Spooling
The process by which documents are sent to a buffer instead of to the printer.
Stand-alone Operating Systems
Complete operating system that works on a desktop computer. Windows Vista, Mac OS X, UNIX, Linux.
Embedded Operating Systems
Located on mobile devices and electronics. It resides on a ROM chip.
Groupware
Helps people to work together on projects and share information over a network.
Network Card
Enables computers that do not have networking capabilities to connect to a network.
Routers
A communications device that connects multiple computers together.