Save
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

COMPUTER SCI m1

COMPUTER SCI FINAL

QuestionAnswer
nar009-1.jpg In the figure above, Reggae is an example of a ____. secondary folder
If you wanted to create, manipulate, and print graphics, which of the following would you use? photo editing software
In terms of an authentication protocol, the phrase 'something a person is' refers to ____. biometrics
Five people in Tom’s company use a web design software. You advise Tom to get a license for a specific number of users. He needs a ____license. multiple user
The most obvious responsibility of your computer’s operating system is to ____. provide an environment for running software
Activities associated with resource management include ____. all the above
Gaming computers typically include ____. all the above
____ is the ability of a device to "jump" directly to the requested data. random access
After you purchase software, it is illegal to do the following EXCEPT ____. copy and keep as backup
If Karen were looking for voice communications, full-qwerty keypad, text messaging, email, removable storage, camera, radio and a digital music player, she might consider a ____. smart phone
The main component of a typical desktop computer is the ____, which contains the processor, memory, some storage devices, and display and sound circuitry. system unit
To avoid security threats a user can ____. avoid opening suspicious email attachments
An operating system’s ____ capability supports a division of labor among all the processing units. multiprocessing
Sam is worried about something happening to his data. He owns a business and if something happens, he might not be able to survive. Where should he keep his back ups? in a location away from his business
ACME Widget Company is concerned it may have a ____ which is a self-replicating program designed to carry out some unauthorized activity on a victim’s computer. worm
If Paul wants to buy an inexpensive, compact monitor, he should buy a(n) ____ monitor. LCD
To delete data from a disk in such a way that no one can ever read it, you should ____. use special shredder software
The first digital computers were built during World War II for ____. code breaking
Solid state storage, also called flash memory storage, ____. provides faster access to data than optical storage technology
A(n) ____ disk is a bootable CD, DVD, or other media that contains a complete copy of your computer’s hard disk as it existed when shipped from the manufacturer. recovery
A ____ is any software that can automate a task or automatically execute a task BOT
The difference between the Save and the Save As command is that____. all the above
Power ____ can originate from a number of sources: downed power lines, power grid switching by the electric company, faulty wiring, and large appliances powering on and off. surges
All of the following are utility software EXCEPT ____ windows
In an advertisement, a speed specification, such as 2.66 GHz, indicates the speed of the microprocessor ____. clock
____is a type of application software designed to help several people collaborate. groupware
Cindy wants to know if she ever has to interact with the operating system. You tell her yes if she wants to ____. all the above
An end user license agreement is ____. displayed on-screen when you first install
An example of an old form of convergence is ____. clockradio
Tom sends Andy an e-mail attachment named OurProject.tif. Andy tries to open the attachment but can’t. His problem may be that ___. any of the above
Which of the following would NOT be true of computers priced higher than US$2,000? these computers have to be replaced frequently
A great example of convergence in modern technology is ____. cellphones
Karen needs an appointment book and is considering one that is digital. You suggest she consider a ____. PDA
RAM can be thought of as the ____ for the computer’s processor. waiting room
A hacker posing as a legitimate representative of an official organization such as your bank to acquire information from you is an example of ____. phishing
A service patch ____. fixes and updates the operating system
Software designed to generate unique musical compositions simply by selecting the musical style, instrument, key and temp is ____. computer-aided music
A problem(s) a hacker can cause after breaking into your computer include(s) ____. all the above
Which of the following system requirements are important in determining if a software program will work on a computer? all the above
What is the best portable storage medium for storing three databases, each of which is approximately 500 MB? USB FLASHDRIVE
____ is the process of converting text, numbers, sound, photos, and video into data that can be processed by digital devices. Digitalizing
A ____ displays the options associated with a command. dialog box
Using Microsoft Windows products, to select files and folders which are not listed consecutively, ____. click on each file while holding down the ctrl key
A _________ is the primary pointing device for a computer. mouse
A computation-intensive problem runs on a ____. super computer
Which of the following computer types CANNOT be configured to perform the work of a server? any of the above are possible
Laura wants to make sure her computer is fast enough for her everyday use. Which of the listed features is the most important? amount of RAM
Charlie wants to know what the term is for making a copy of all his files. Charlie has a Windows machine. You tell him the correct term is ____. full backup
Created by: deardenm
 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards