CTA-100 Final
Help!
|
|
||||
---|---|---|---|---|---|
show | node
🗑
|
||||
Which transmission medium transmits data the fastest? | show 🗑
|
||||
___ is the maximum speed at which data can be transferred between two nodes. | show 🗑
|
||||
The current version of wireless Ethernet is | show 🗑
|
||||
Normal telephone cable is a type of | show 🗑
|
||||
A network used to communicate among devices close to one person is called a | show 🗑
|
||||
A peer-to-peer (P2P) network is an example of ___ administration. | show 🗑
|
||||
show | packets.
🗑
|
||||
Client/server networks are controlled by a central server that runs a specialized piece of software called a | show 🗑
|
||||
show | enable SSID broadcast.
🗑
|
||||
Which of the following is NOT a type of cable used in wired networks? | show 🗑
|
||||
All of the following are benefits of networks EXCEPT, | show 🗑
|
||||
The most popular transmission media option for wired Ethernet networks is | show 🗑
|
||||
Network architectures are classified according to | show 🗑
|
||||
show | radio waves.
🗑
|
||||
All of the following involve tasks for network administration, except | show 🗑
|
||||
SSID stands for | show 🗑
|
||||
show | screen size.
🗑
|
||||
An analog-to-digital converter chip | show 🗑
|
||||
show | reliability.
🗑
|
||||
SMS delivers messages to the appropriate mobile device using ___ technology. | show 🗑
|
||||
Images are a representation of light waves called ___ or continuous waves. | show 🗑
|
||||
show | ROM.
🗑
|
||||
Text messaging is also called | show 🗑
|
||||
An internet connectivity plan is also known a | show 🗑
|
||||
show | JPEGs are larger than raw files.
🗑
|
||||
show | An operating system for cell/smartphones.
🗑
|
||||
show | Bluetooth
🗑
|
||||
The choice communication mode for people aged 14 to 30 is | show 🗑
|
||||
show | microphone and touch pad.
🗑
|
||||
show | .doc.
🗑
|
||||
show | netbook
🗑
|
||||
show | Skype
🗑
|
||||
All of the following are technologies used to transfer digital information, except | show 🗑
|
||||
Almost all cell phones are designed with a ___ port. | show 🗑
|
||||
show | 21
🗑
|
||||
show | analog-to-digital converter chip
🗑
|
||||
show | HDMI
🗑
|
||||
You can send messages that include photos and videos between mobile devices using ___ technology. | show 🗑
|
||||
show | USB
🗑
|
||||
Social is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information. | show 🗑
|
||||
Using your computer for non-work activities while you are being paid to do your job is known as | show 🗑
|
||||
A ___ is a virus that is triggered on a certain date. | show 🗑
|
||||
show | FBI and National White Collar Crime Center
🗑
|
||||
You can block logical ports to invaders and make your computer invisible to others on the Internet by installing a | show 🗑
|
||||
___ is an unwanted piggyback program that usually downloads with software you are installing from the Internet. | show 🗑
|
||||
show | Polymorphic
🗑
|
||||
show | snakes.
🗑
|
||||
show | White-hat
🗑
|
||||
A ___ is the portion of virus code that is unique to a particular computer virus. | show 🗑
|
||||
show | pharming.
🗑
|
||||
show | logging into e-mail.
🗑
|
||||
show | Cookies obtain your personal information by searching you hard drive.
🗑
|
||||
show | child pornography
🗑
|
||||
With regard to computer protection, quarantining is defined as | show 🗑
|
||||
show | launch a denial of service (DoS) attack on your computer.
🗑
|
||||
show | assassinating all viruses.
🗑
|
||||
___ viruses are often transmitted by a flash drive left in a USB port. | show 🗑
|
||||
show | Cybercrime
🗑
|
||||
A ___ virus changes its own code or periodically rewrites itself to avoid detection. | show 🗑
|
||||
___ floods a computer with requests until it shuts down and refuses to answer any requests for information. | show 🗑
|
||||
show | keep your password written down and stored in an easy-to-remember location.
🗑
|
||||
All of the following are considered cybercrimes, except | show 🗑
|
||||
show | firewall
🗑
|
||||
Which statement about selecting the right programming language for a project is FALSE? | show 🗑
|
||||
Keywords in a programming language that redirect the flow of a program based on a decision are called | show 🗑
|
||||
show | logical
🗑
|
||||
show | Visual Basic
🗑
|
||||
The process by which program code is converted into machine language is called | show 🗑
|
||||
The capability of moving a completed programming solution easily from one type of computer to another is known as | show 🗑
|
||||
show | Programming
🗑
|
||||
show | Design
🗑
|
||||
___ is a text-based approach to documenting an algorithm. | show 🗑
|
||||
show | classes
🗑
|
||||
Which of the following statements about JAVA is false? | show 🗑
|
||||
show | Beta
🗑
|
||||
show | third
🗑
|
||||
Special symbols called tags are used in which of the following languages? | show 🗑
|
||||
show | top down designs
🗑
|
||||
show | algorithm
🗑
|
||||
show | test condition
🗑
|
||||
show | Describing the problem
🗑
|
||||
Translating an algorithm into a programming language is called | show 🗑
|
||||
show | fourth
🗑
|
||||
show | Source code
🗑
|
||||
Which statement does NOT describe fifth-generation languages? | show 🗑
|
||||
Which of the following provides a visual representation of patterns that an algorithm comprises? | show 🗑
|
||||
A ___ is a visual diagram of a process, including the decisions that need to be made along the way | show 🗑
|
||||
How many steps are there in the system development life cycle? | show 🗑
|
||||
The first-generation language is | show 🗑
|
||||
show | normalization
🗑
|
||||
show | query
🗑
|
||||
___ is the branch of computer science that deals with the attempt to create computers that think like humans. | show 🗑
|
||||
show |
🗑
|
Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
To hide a column, click on the column name.
To hide the entire table, click on the "Hide All" button.
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.
To hide a column, click on the column name.
To hide the entire table, click on the "Hide All" button.
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.
Normal Size Small Size show me how
Normal Size Small Size show me how
Created by:
StaciSisson
Popular Computers sets