click below
click below
Normal Size Small Size show me how
Computers exam 2
| Question | Answer |
|---|---|
| a files location is defined by the file______ which includes the drive letter, folder, filename, and extension a)path B)extension C)name D)letter | Path |
| a _____ further describes the file contents and often lets you know which application can be used to open the file A) flie extension B) Folder C) drive letter D) drive map | file extension |
| the main hard drive is usually referred to as drive ____ or local disk A B c D | C |
| use the _____ command to specify a name and storage device for a file and then store it on a storage medium A) save as B) new folder C) open D) select | save as |
| which of the following is not a valid default folder supplied with windows A)document B)pictures C)budgets D)music | budgets |
| which of the following companies is a major manufacturer of computer chips A)yahoo B)apple C)intel D)google | intel |
| the ______ number system represents numeric data as a series of 0s and 1s A)integrated B)decimal C)binary D)singular | binary |
| ______ data is text numbers, graphics, sounds, and video that has been converted into discrete digits such as 0s and 1s A)digital B)number C)multimedia D)internet | digital |
| which of the following is not a valid term A) bigabyte B)petabyte C)exabyte D)terabyte | bigabyte |
| a series of 8 bits is referred to as a A) word B) byte C)mega byte D)kilobyte | byte |
| the terms computer chip, microchip, and chip are all synonyms with the term ________ circuit A) digital B)chip C)integrated D)silicon | integrated |
| the _____ size refers to the number of bits that a processor can manipulate at a time A) cpu B) bit C) cycle D) word | word |
| the chip ____ is what protects the chip and connects the chip to the motherboard A) word size B) packaging C)power D)circuitry | packaging |
| a single processor that contains circuitry for more than one processing unit is called a _______ processor A) AMD B) semiconductor C) intel D) multicore | multicore |
| ______ is a temporary holding area for data, application programming instructions in the operating system A) EEPROM B) ROM C) virtual memory D) RAM | RAM |
| the decimal number 4 is represented as ______ in the binary number system A) 40 B) 1876 C) 1 D) 100 | 100 |
| a computer specification with 2 GB dual channel DDR2 SDRAM at 16,000 MHz max 4GB currently has ______ of random access memory installed A) 2 GB B) 1600 MHZ C) 4 D) 2ddr | 4 gb |
| if a program exceeds the allocated space in RAM the operating system uses an area in the hard drive to called ____ to store parts of a program or data file until they are needed A) EE PROM B) virtual memory C) ROM D)RAM | virtual memory |
| a(N) is a device that provides a continuous supply of power during a power failure and prevents spikes surges from reaching your computer A) power strip B)surge protecter C)surge supressor D)ups | ups |
| a(n) _____ contains multiple outlets but cannot filter out power spikes and surges A) UPS B) power strip C) surge supressor D)surge protector | power strip |
| a(n) _____ is a series of character that a user creates to verify their user Id A) protocol B) username C) password D)code | username |
| _____ is a malicious code designed to disrupt a computers normal operation A) spam B) malware C) phishing D) router | malware |
| a method of personal id called _____ basis id on a physical trait A) authentication B) metrics C) biometrics D) scanning | authentication |
| a ____ is software or hardware designed to filter out suspicious data attempting to enter or leave a computer A) firewall B) virus C) encryptor D) spam filter | firewall |
| a computer _____ is a program that reproduces and attaches itself to a file so it can spread from file to file A) encryption B) bug C)firewall D)virus | virus |
| a spam filter will help you avoid unwanted _____ A) bugs B) emails C)software D)virus | emails |
| the ____ browsing feature in internet explorer keeps the browser from storing any data A) antispam B) antiphishing C) history D) in privite | in privite |
| a _____ attack floods network servers with useless traffic A) spam B) denial of service C) mass mailing D) antivirus | denial of service |
| a _____ is a message containing information about the user sent from a web server and stored on the hard drive A) bot B) cracker C) cookie D)bug | cookie |
| a computer controlled by a bad bot is called a A) zombie B) spy C)bot net D) server | zombie |
| a ___ is software that can automate a task when giving a command A) rat B) port probe C) key logger D) intelligent agent | intelligent agent |
| power ____ can damage sensitive computer parts A) strips B) surges C) centers D) back ups | surges |
| a password uses a combination of letters and number, but a ____ uses numbers only A) bot B) rat C) pin D) user id | pin |
| virus experts use ____ threat to describe threats that combine more than one type of malicious program A) blended B) houx C) port D) zombie | blended |
| a virus ___ is a section of program code used to identify a known malicious program A) definition B) biometrics C) filter D)signiture | signiture |
| ____ is an email based or im scam designed to persuade you to reveal confidential information A) pharming B)phishing C) cyber terrorism D) encryption | phishing |
| a ____ is a removable storage medium containing the files needed to start your computer without accessing your hard drive A) cd B) bot master C) restore point D) boot disc | boot disk |
| a ____ back up contains a copy of every program, data, and system file on a computer A) incrimental B) restore C)full D)protocol | full |
| In a word processing environment, to move a block of text you must first | select the block |
| Assume that A1 contains 12, B1 contains 10, A2 contains 15, B2 contains 5 and C1 contains = A1 + B1; then if C1 is copied to C2, C2 will display | 22 |
| In a relational database, another name for a field is a/an: | column |
| In a relational database, another name for a record is a/an: | row |
| In a DBMS environment, a query to find all the states different from New Jersey is | <>"NJ" |
| Which of the following is the markup language commonly used by Web authors? | HTML |
| Which of the following would put ``This is my web page'' in the title bar of a web page? | A) </title> This is my web page <title/> |
| Assume that A1 contains 12, B1 contains 10, A2 contains 15, B2 contains 5 and C1 contains = A1 + B1; then if C1 is copied to C2, which formula will be in C2 | A) = A1 + B1 |
| Which of the following is NOT one of the function a computer can perform | C) design solutions to problems |
| Which of the following are used as units of storage capacity in the computer? | ) KB, byte |
| Machine language: | A) is transferable from one computer to another. |
| Which of the following is NOT a basic structure in programming languages? | Decision |
| A gigabyte is approximately equal to _______________ bytes. | ) 1000,000,000 |
| Which of the following are characteristics of RAM? | ) Once you have turned off the computer, RAM disappears |
| A modem is necessary for the computer to perform | Connecting Peripherals |
| The dots that make up a graphic screen display are called? | ) pixels |
| When you launch a program on a stand-alone computer, it is copied from your hard disk into | D) ROM |
| When you RENAME a file, you will | ) replace the old name of a file with a new name |
| A computer network | Is characterized by both B) and C) |
| The big difference between folders and subfolders is: | Subfolders are created inside a folder |
| ____ refers to the electronic and mechanical parts of the computer | All of the above. |
| GUI stands for graphical user ____. | ) interface |
| A(n) ____ is a data communications network that connects PCs within a limited area. | ) LAN |
| The purpose of ____ is to make it easy to upload and download computer files without having to deal directly with the operating system or file management system of the remote computer | ) FTP |
| . The Office ____ is a temporary storage area on your computer that holds objects such as text or graphics until you need them. | E) Clipboard |