Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password

Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

CTA-100 Final

        Help!  

Question
Answer
show node  
🗑
Which transmission medium transmits data the fastest?   show
🗑
___ is the maximum speed at which data can be transferred between two nodes.   show
🗑
The current version of wireless Ethernet is   show
🗑
Normal telephone cable is a type of   show
🗑
A network used to communicate among devices close to one person is called a   show
🗑
A peer-to-peer (P2P) network is an example of ___ administration.   show
🗑
show packets.  
🗑
Client/server networks are controlled by a central server that runs a specialized piece of software called a   show
🗑
show enable SSID broadcast.  
🗑
Which of the following is NOT a type of cable used in wired networks?   show
🗑
All of the following are benefits of networks EXCEPT,   show
🗑
The most popular transmission media option for wired Ethernet networks is   show
🗑
Network architectures are classified according to   show
🗑
show radio waves.  
🗑
All of the following involve tasks for network administration, except   show
🗑
SSID stands for   show
🗑
show screen size.  
🗑
An analog-to-digital converter chip   show
🗑
show reliability.  
🗑
SMS delivers messages to the appropriate mobile device using ___ technology.   show
🗑
Images are a representation of light waves called ___ or continuous waves.   show
🗑
show ROM.  
🗑
Text messaging is also called   show
🗑
An internet connectivity plan is also known a   show
🗑
show JPEGs are larger than raw files.  
🗑
show An operating system for cell/smartphones.  
🗑
show Bluetooth  
🗑
The choice communication mode for people aged 14 to 30 is   show
🗑
show microphone and touch pad.  
🗑
show .doc.  
🗑
show netbook  
🗑
show Skype  
🗑
All of the following are technologies used to transfer digital information, except   show
🗑
Almost all cell phones are designed with a ___ port.   show
🗑
show 21  
🗑
show analog-to-digital converter chip  
🗑
show HDMI  
🗑
You can send messages that include photos and videos between mobile devices using ___ technology.   show
🗑
show USB  
🗑
Social is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information.   show
🗑
Using your computer for non-work activities while you are being paid to do your job is known as   show
🗑
A ___ is a virus that is triggered on a certain date.   show
🗑
show FBI and National White Collar Crime Center  
🗑
You can block logical ports to invaders and make your computer invisible to others on the Internet by installing a   show
🗑
___ is an unwanted piggyback program that usually downloads with software you are installing from the Internet.   show
🗑
show Polymorphic  
🗑
show snakes.  
🗑
show White-hat  
🗑
A ___ is the portion of virus code that is unique to a particular computer virus.   show
🗑
show pharming.  
🗑
show logging into e-mail.  
🗑
show Cookies obtain your personal information by searching you hard drive.  
🗑
show child pornography  
🗑
With regard to computer protection, quarantining is defined as   show
🗑
show launch a denial of service (DoS) attack on your computer.  
🗑
show assassinating all viruses.  
🗑
___ viruses are often transmitted by a flash drive left in a USB port.   show
🗑
show Cybercrime  
🗑
A ___ virus changes its own code or periodically rewrites itself to avoid detection.   show
🗑
___ floods a computer with requests until it shuts down and refuses to answer any requests for information.   show
🗑
show keep your password written down and stored in an easy-to-remember location.  
🗑
All of the following are considered cybercrimes, except   show
🗑
show firewall  
🗑
Which statement about selecting the right programming language for a project is FALSE?   show
🗑
Keywords in a programming language that redirect the flow of a program based on a decision are called   show
🗑
show logical  
🗑
show Visual Basic  
🗑
The process by which program code is converted into machine language is called   show
🗑
The capability of moving a completed programming solution easily from one type of computer to another is known as   show
🗑
show Programming  
🗑
show Design  
🗑
___ is a text-based approach to documenting an algorithm.   show
🗑
show classes  
🗑
Which of the following statements about JAVA is false?   show
🗑
show Beta  
🗑
show third  
🗑
Special symbols called tags are used in which of the following languages?   show
🗑
show top down designs  
🗑
show algorithm  
🗑
show test condition  
🗑
show Describing the problem  
🗑
Translating an algorithm into a programming language is called   show
🗑
show fourth  
🗑
show Source code  
🗑
Which statement does NOT describe fifth-generation languages?   show
🗑
Which of the following provides a visual representation of patterns that an algorithm comprises?   show
🗑
A ___ is a visual diagram of a process, including the decisions that need to be made along the way   show
🗑
How many steps are there in the system development life cycle?   show
🗑
The first-generation language is   show
🗑
show normalization  
🗑
show query  
🗑
___ is the branch of computer science that deals with the attempt to create computers that think like humans.   show
🗑
show  
🗑


   

Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
 
To hide a column, click on the column name.
 
To hide the entire table, click on the "Hide All" button.
 
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
 
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.

 
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how
Created by: StaciSisson
Popular Computers sets