click below
click below
Normal Size Small Size show me how
CCS1 - Mod 5
Reviewer
| Question | Answer |
|---|---|
| In a ________ , a user types commands or presses special keys on the keyboard (such as function keys or key combinations) to enter data and instructions. | command-line interface |
| ________ means the operating system automatically configures new devices as users install them. | Plug and Play |
| A(n) ________ is a private combination of characters associated with a username that allows access to certain computer resources. | password |
| A(n) ________ program is a filtering program that attempts to remove spam before it reaches a user’s inbox. | anti-spam |
| Stand-alone utilities typically offer improvements over those features built into an operating system or provide features not included in an operating system. | True |
| ________ software, such as operating systems and utility programs, consists of the programs that control or maintain the operations of a computer and its devices. | System |
| A ________ does not replicate itself to other computers. | Trojan horse |
| Users today typically run multiple programs concurrently. | True |
| Microsoft has continually updated its Windows operating system, incorporating new features and functions with each subsequent version. | True |
| ________ software is privately owned software and limited to a specific vendor or computer model. | Proprietary |
| ________ software helps companies record and report their financial transactions. | Accounting |
| Which of the following is an example of photo editing software for the professional? | Adobe Photoshop |
| ________ software provides a means for sharing, distributing, and searching through documents by converting them into a format that can be viewed by any user. | Document management |
| A file is ________. | a named collection of stored data, instructions, or information |
| A(n) ________ is the intersection of a column and row in a worksheet. | cell |
| When computer users ________ a document, the computer transfers the document from memory to a storage medium. | save |
| ________ software consists of programs designed to make users more productive and/or assist them with personal tasks. | Application |
| ________ software allows users to create, access, and manage a database. | Database |
| A(n) ________ is application software that includes an appointment calendar, address book, notepad, and other features to help users organize personal information. | personal information manager (PIM) |
| ________ software enables users to enter typed text, handwritten comments, drawings, or sketches anywhere on a page and then save the page as part of a notebook. | Note taking |
| If the username and password entered match the username and password kept on file, a network operating system denies access to the user. | False |
| In the event a backup file is used, a(n) ________ program reverses the process and returns backed up files to their original form. | restore |
| Client operating systems can operate with or without a network. | True |
| Network administrators can set up a network to decrypt data as it travels over a network to prevent unauthorized users from reading the data. | False |
| With a ________, users interact with menus and visual images such as icons, buttons, and other objects to issue commands. | graphical user interface (GUI) |
| Linux is ________ software, which means its code is provided for use, modification, and redistribution. | open source |
| A(n) ________ is a unique combination of characters, such as letters of the alphabet or numbers, that identifies one specific user. | username |
| A(n) ________ utility allows users to copy selected files or an entire hard disk to another storage medium. | backup |
| When using spreadsheet software, the rows and columns collectively are called a(n) ________. | worksheet |
| Which of the following is an example of Web page authoring software? | Adobe Dreamweaver |
| Which of the following is an example of desktop publishing software for the professional? | Adobe InDesign |
| ________ software allows users to create and manipulate documents containing mostly text and sometimes graphics. | Word processing |
| A(n) ________ is a window that provides information, presents available options, or requests a response. | dialog box |
| Which of the following is an example of paint/image editing software for the professional? | Adobe Illustrator |
| It is a small program that tells the operating system how to communicate with a specific device? | device driver |
| It is the process of starting or restarting a computer | booting |
| It is a kind of boot process where you turn on your computer that has been powered off completely. | cold boot |
| Which of the following statements best describe sleep mode? | saves any open documents and programs to RAM, turns off all unneeded functions, and then places the computer in a low power state. |
| This refers to the drive from which your computer starts. | boot drive |
| What is the second step in the boot up process. | The processor finds the ROM that contains the BIOS |
| It is a multitasking operating system developed in the early 1970s | UNIX |
| In Windows Operating System, the Windows ________ feature protects your computer from malwares as well as spyware. | Defender |
| The kernel is memory ________, which means it remains in memory while the computer is running. | resident |
| A program called a print ________ intercepts documents to be printed from the operating system and places them in the queue. | spooler |
| The BIOS executes a series of tests, collectively called the ________, which check the various system components including the buses, system clock, adapter cards, RAM chips, mouse, keyboard, and drives. | POST |
| The ________ is the core of an operating system that maintains the computer’s clock, starts applications, and assigns the computer’s resources, such as devices, programs, data, and information. | kernel |
| ________ is the process of starting or restarting a computer. | Booting |
| The advantage of device-dependent operating systems is that users can retain existing application software and data even if they change computer models or vendors. | False (device independent dapat) |
| ________ software allows users to modify a segment of a video, called a clip. | Video editing |
| Word processing software includes a(n) ________, which reviews the spelling of individual words, sections of a document, or the entire document. | spelling checker |
| A(n) ________ contains a list of commands from which a user makes selections. | menu |
| A(n) ________ is a small image displayed on the screen that represents a program, a document, or some other object. | icon |
| ________ software is software that allows users to organize data in rows and columns and perform calculations on the data. | Spreadsheet |
| A(n) ________ viewer is a utility that allows users to display, copy, and print the contents of a graphics file. | image |
| Few operating systems include any utility programs. | False |
| A shortcut is an icon on the desktop or in a folder that provides a user with immediate access to a program or file. | True |
| A pop-up ________ is a filtering program that stops pop-up ads from displaying on Web pages. | blocker |
| A personal ________ is a utility that detects and protects a computer from unauthorized intrusions. | firewall |
| A(n) ________ is a rectangular area of the screen that displays data and information. | window |
| ________ software allows users to create visual aids for presentations to communicate ideas, messages, and other information to a group. | Presentation |
| A ________ is an instruction that causes a program to perform a specific action. | command |
| A(n) ________ is a specific named location on a storage medium that contains related documents. | folder |
| Application software is said to be downward compatible, meaning it will run on a new version of an operating system. | False |
| Because virtual memory is faster than RAM, users may notice the computer speeding up while it uses virtual memory. | False |
| The ________ is firmware that contains a computer’s startup instructions. | BIOS |
| A spyware ________ is a program that detects and deletes spyware and other similar programs. | remover |
| A(n) ________ interface controls how users enter data and instructions into a computer and how information is displayed on the screen. | user |
| To help organize a presentation, you can view ________ versions of all the slides similarly to how 35mm slides look on a photographer’s light table. | thumbnail |
| A(n) ________ program is a utility that protects a computer against viruses by identifying and removing any computer viruses found in memory, on storage media, or on incoming files. | antivirus |
| Operating systems rarely provide a means to establish Internet connections. | False |
| Some operating systems include a Web browser and an e-mail program, enabling users to begin accessing the Web and communicating with others as soon as they set up the Internet connection. | True |
| A(n) ________ is a collection of data organized in a manner that allows access, retrieval, and use of that data. | database |
| A software ________ is a collection of individual programs sold as a single package. | suite |
| A screen ________ causes a monitor’s screen to display a moving image or blank screen if no keyboard or mouse activity occurs for a specified period of time. | saver |
| Even if users are working on multiple programs simultaneously, it is impossible to run out of RAM. | False |
| With an operating system, ________ can include fixes to bugs, enhancements to security, modifications to devices drivers, and the like. | automatic updates |
| ________ software provides the capabilities of paint software and also includes the ability to enhance and modify existing images and pictures. | Image editing |
| ________ software assists people in becoming more effective and efficient while performing their daily business activities. | Business |
| Some personal computer maintenance utilities continuously monitor a computer while it is used and repair problems before they occur. | True |
| A warm boot is the process of using the operating system to restart a computer | True |
| A process called ___________ sends documents to a buffer instead of sending them immediately to the printer | spooling |
| With ______ memory, the operating system allocates a portion of a storage medium, usually the hard disk, to function as additional RAM. | virtual |
| A font ____, such as bold, italic, and underline adds emphasis to a font. | style |
| The nexus is the core of an operating system that manages memory and devices. | kernel |
| The ________ is a small symbol displayed on the screen that moves as a user moves the mouse. | pointer |
| Most personal finance software includes financial planning features, such as analyzing home and personal loans, preparing income taxes, and managing retirement savings. | True |
| One sign of a virus infection is that available memory is less than what should be available. | True |
| When you purchase a computer, it usually includes a boot disk. | True |
| Using tax preparation software, taxpayers can file their state and federal tax returns online, in a process called e-filing. | True |
| Regardless of the size of the computer, most operating systems provide similar functions. | True |
| Smart phones and other small computing devices often use a _____ operating system | single user/multitasking |
| A Trojan horse copies itself repeatedly in memory or over a network | False |
| Network, servers, mainframes, and supercomputers allow hundreds to thousands of users to connect at the same, and thus are ____________. | multiuser |
| Command-line interfaces give a user less control to manage detailed settings. | False |
| The tables or queries from which a query gets its data are referred to as its __________. | data source |
| When compared with a file processing system, a database offers all of the following except _________. | less required memory, storage, and processing power |