Save
Upgrade to remove ads
Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.
focusNode
Didn't know it?
click below
 
Knew it?
click below
Don't Know
Remaining cards (0)
Know
0:00
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

Computers exam 2

QuestionAnswer
a files location is defined by the file______ which includes the drive letter, folder, filename, and extension a)path B)extension C)name D)letter Path
a _____ further describes the file contents and often lets you know which application can be used to open the file A) flie extension B) Folder C) drive letter D) drive map file extension
the main hard drive is usually referred to as drive ____ or local disk A B c D C
use the _____ command to specify a name and storage device for a file and then store it on a storage medium A) save as B) new folder C) open D) select save as
which of the following is not a valid default folder supplied with windows A)document B)pictures C)budgets D)music budgets
which of the following companies is a major manufacturer of computer chips A)yahoo B)apple C)intel D)google intel
the ______ number system represents numeric data as a series of 0s and 1s A)integrated B)decimal C)binary D)singular binary
______ data is text numbers, graphics, sounds, and video that has been converted into discrete digits such as 0s and 1s A)digital B)number C)multimedia D)internet digital
which of the following is not a valid term A) bigabyte B)petabyte C)exabyte D)terabyte bigabyte
a series of 8 bits is referred to as a A) word B) byte C)mega byte D)kilobyte byte
the terms computer chip, microchip, and chip are all synonyms with the term ________ circuit A) digital B)chip C)integrated D)silicon integrated
the _____ size refers to the number of bits that a processor can manipulate at a time A) cpu B) bit C) cycle D) word word
the chip ____ is what protects the chip and connects the chip to the motherboard A) word size B) packaging C)power D)circuitry packaging
a single processor that contains circuitry for more than one processing unit is called a _______ processor A) AMD B) semiconductor C) intel D) multicore multicore
______ is a temporary holding area for data, application programming instructions in the operating system A) EEPROM B) ROM C) virtual memory D) RAM RAM
the decimal number 4 is represented as ______ in the binary number system A) 40 B) 1876 C) 1 D) 100 100
a computer specification with 2 GB dual channel DDR2 SDRAM at 16,000 MHz max 4GB currently has ______ of random access memory installed A) 2 GB B) 1600 MHZ C) 4 D) 2ddr 4 gb
if a program exceeds the allocated space in RAM the operating system uses an area in the hard drive to called ____ to store parts of a program or data file until they are needed A) EE PROM B) virtual memory C) ROM D)RAM virtual memory
a(N) is a device that provides a continuous supply of power during a power failure and prevents spikes surges from reaching your computer A) power strip B)surge protecter C)surge supressor D)ups ups
a(n) _____ contains multiple outlets but cannot filter out power spikes and surges A) UPS B) power strip C) surge supressor D)surge protector power strip
a(n) _____ is a series of character that a user creates to verify their user Id A) protocol B) username C) password D)code username
_____ is a malicious code designed to disrupt a computers normal operation A) spam B) malware C) phishing D) router malware
a method of personal id called _____ basis id on a physical trait A) authentication B) metrics C) biometrics D) scanning authentication
a ____ is software or hardware designed to filter out suspicious data attempting to enter or leave a computer A) firewall B) virus C) encryptor D) spam filter firewall
a computer _____ is a program that reproduces and attaches itself to a file so it can spread from file to file A) encryption B) bug C)firewall D)virus virus
a spam filter will help you avoid unwanted _____ A) bugs B) emails C)software D)virus emails
the ____ browsing feature in internet explorer keeps the browser from storing any data A) antispam B) antiphishing C) history D) in privite in privite
a _____ attack floods network servers with useless traffic A) spam B) denial of service C) mass mailing D) antivirus denial of service
a _____ is a message containing information about the user sent from a web server and stored on the hard drive A) bot B) cracker C) cookie D)bug cookie
a computer controlled by a bad bot is called a A) zombie B) spy C)bot net D) server zombie
a ___ is software that can automate a task when giving a command A) rat B) port probe C) key logger D) intelligent agent intelligent agent
power ____ can damage sensitive computer parts A) strips B) surges C) centers D) back ups surges
a password uses a combination of letters and number, but a ____ uses numbers only A) bot B) rat C) pin D) user id pin
virus experts use ____ threat to describe threats that combine more than one type of malicious program A) blended B) houx C) port D) zombie blended
a virus ___ is a section of program code used to identify a known malicious program A) definition B) biometrics C) filter D)signiture signiture
____ is an email based or im scam designed to persuade you to reveal confidential information A) pharming B)phishing C) cyber terrorism D) encryption phishing
a ____ is a removable storage medium containing the files needed to start your computer without accessing your hard drive A) cd B) bot master C) restore point D) boot disc boot disk
a ____ back up contains a copy of every program, data, and system file on a computer A) incrimental B) restore C)full D)protocol full
In a word processing environment, to move a block of text you must first select the block
Assume that A1 contains 12, B1 contains 10, A2 contains 15, B2 contains 5 and C1 contains = A1 + B1; then if C1 is copied to C2, C2 will display 22
In a relational database, another name for a field is a/an: column
In a relational database, another name for a record is a/an: row
In a DBMS environment, a query to find all the states different from New Jersey is <>"NJ"
Which of the following is the markup language commonly used by Web authors? HTML
Which of the following would put ``This is my web page'' in the title bar of a web page? A) </title> This is my web page <title/>
Assume that A1 contains 12, B1 contains 10, A2 contains 15, B2 contains 5 and C1 contains = A1 + B1; then if C1 is copied to C2, which formula will be in C2 A) = A1 + B1
Which of the following is NOT one of the function a computer can perform C) design solutions to problems
Which of the following are used as units of storage capacity in the computer? ) KB, byte
Machine language: A) is transferable from one computer to another.
Which of the following is NOT a basic structure in programming languages? Decision
A gigabyte is approximately equal to _______________ bytes. ) 1000,000,000
Which of the following are characteristics of RAM? ) Once you have turned off the computer, RAM disappears
A modem is necessary for the computer to perform Connecting Peripherals
The dots that make up a graphic screen display are called? ) pixels
When you launch a program on a stand-alone computer, it is copied from your hard disk into D) ROM
When you RENAME a file, you will ) replace the old name of a file with a new name
A computer network Is characterized by both B) and C)
The big difference between folders and subfolders is: Subfolders are created inside a folder
____ refers to the electronic and mechanical parts of the computer All of the above.
GUI stands for graphical user ____. ) interface
A(n) ____ is a data communications network that connects PCs within a limited area. ) LAN
The purpose of ____ is to make it easy to upload and download computer files without having to deal directly with the operating system or file management system of the remote computer ) FTP
. The Office ____ is a temporary storage area on your computer that holds objects such as text or graphics until you need them. E) Clipboard
Created by: azizm4
 

 



Voices

Use these flashcards to help memorize information. Look at the large card and try to recall what is on the other side. Then click the card to flip it. If you knew the answer, click the green Know box. Otherwise, click the red Don't know box.

When you've placed seven or more cards in the Don't know box, click "retry" to try those cards again.

If you've accidentally put the card in the wrong box, just click on the card to take it out of the box.

You can also use your keyboard to move the cards as follows:

If you are logged in to your account, this website will remember which cards you know and don't know so that they are in the same box the next time you log in.

When you need a break, try one of the other activities listed below the flashcards like Matching, Snowman, or Hungry Bug. Although it may feel like you're playing a game, your brain is still making more connections with the information to help you out.

To see how well you know the information, try the Quiz or Test activity.

Pass complete!
"Know" box contains:
Time elapsed:
Retries:
restart all cards