Busy. Please wait.
or

show password
Forgot Password?

Don't have an account?  Sign up 
or

Username is available taken
show password

why


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
We do not share your email address with others. It is only used to allow you to reset your password. For details read our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

Remove Ads
Don't know
Know
remaining cards
Save
0:01
To flip the current card, click it or press the Spacebar key.  To move the current card to one of the three colored boxes, click on the box.  You may also press the UP ARROW key to move the card to the "Know" box, the DOWN ARROW key to move the card to the "Don't know" box, or the RIGHT ARROW key to move the card to the Remaining box.  You may also click on the card displayed in any of the three boxes to bring that card back to the center.

Pass complete!

"Know" box contains:
Time elapsed:
Retries:
restart all cards




share
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how

Intro to Computers

Study Guide

QuestionAnswer
1. Collectively, the four operations of input, process, output and storage is considered to be the _____. Information Processing Cycle
2. _____ conveys meaning and is useful to one or more people. Information
3. Any hardware component used to enter data is a(n) _____. Input Device
4. A stylus is a small device, resembling a _____, used to input data. Pen
5. The main circuitboard of the system unit is the _____. Motherboard
6. A kilobyte represents approximately _____ memory locations. One Thousand
7. A gigabyte represents approximately _____ memory locations. One Billion
8. _____ make information resulting from processing available for use. Output Devices
9. A printer that produces photo-quality pictures is considered to be a(n) _____. Photo Printer
10. ___________ is used to create, edit, format, and print documents. Word Processing Software
11. ___________ allows the user to create slides for use in a presentation. Presentation Graphical Software
12. The ____________ is the world's largest network. Internet
13. ___________ is the communications standard used to transfer pages on the Web. Hypertext Transfer Protocol
14. ______________ is a collection of unprocessed items. Data
15. People who use the computer or the information that it provides are called _____ User
16. The case that contains electronic components of the computer used to process data is a __________. System Unit
17. The reduction of electricity consumed and the environmental waste generated when using a computer is called _____________. Green Computing
18. ___________ is an Internet service that provides hard disk storage online to computer users. Cloud Storage
19. A Utility Program will allow you to complete: Managing disk drives, printers, and other media
20. ___________ is an online community that encourages members to share their interests, ideas, photos, videos, etc. with other users. Social Networking
21. A gigabyte represents approximately one million memory locations. False
22. A monitor is a display device that is packaged as a separate unit. True
23. A storage device is used to store data when the data is not being used in memory. True
24. A smart band is a narrow band that forms a circle on the disk surface. False
25. When a read/write head touches a platter it is considered to be a platter crash and results in loss of memory. False
26. CD-R discs are erasable optical discs that you can write on multiple times. False
27. A DVD-ROM is a high capacity optical disc. True
28. Flash memory cards are solid-state media with no moving parts. True
29. Magnetic Disks use magnetic particles to store items on the disk's surface. True
30. A rootkit is a collective name for malicious software that is secretly added to a users computer that act without the user's knowledge and deliberately alter the computer's operations. False
Created by: 604920250