Busy. Please wait.
Log in with Clever
or

show password
Forgot Password?

Don't have an account?  Sign up 
Sign up using Clever
or

Username is available taken
show password


Make sure to remember your password. If you forget it there is no way for StudyStack to send you a reset link. You would need to create a new account.
Your email address is only used to allow you to reset your password. See our Privacy Policy and Terms of Service.


Already a StudyStack user? Log In

Reset Password
Enter the associated with your account, and we'll email you a link to reset your password.

CTA-100 Final

Quiz yourself by thinking what should be in each of the black spaces below before clicking on it to display the answer.
        Help!  

Question
Answer
A ___is a device connected to network such as a computer or a game console.   node  
🗑
Which transmission medium transmits data the fastest?   Twisted-pair cable  
🗑
___ is the maximum speed at which data can be transferred between two nodes.   Bandwidth  
🗑
The current version of wireless Ethernet is   802.11n  
🗑
Normal telephone cable is a type of   twisted-pair cable.  
🗑
A network used to communicate among devices close to one person is called a   PAN.  
🗑
A peer-to-peer (P2P) network is an example of ___ administration.   local  
🗑
Data is sent through a network on bundles called   packets.  
🗑
Client/server networks are controlled by a central server that runs a specialized piece of software called a   network operating system (NOS)  
🗑
All of the following are extra precautions you can take to secure a wireless network, except   enable SSID broadcast.  
🗑
Which of the following is NOT a type of cable used in wired networks?   Router cable  
🗑
All of the following are benefits of networks EXCEPT,   Sharing an operating system.  
🗑
The most popular transmission media option for wired Ethernet networks is   unshielded twisted-pair (UTP) cable.  
🗑
Network architectures are classified according to   the way in which they are managed and the distance between their nodes.  
🗑
Wireless Internet is available using   radio waves.  
🗑
All of the following involve tasks for network administration, except   purchasing initial equipment for the network.  
🗑
SSID stands for   Service Set Identifier.  
🗑
The main difference between the tablet and smartphone is the   screen size.  
🗑
An analog-to-digital converter chip   converts the sound waved from a voice into digital signals.  
🗑
All of the following are advantages of VoIP except   reliability.  
🗑
SMS delivers messages to the appropriate mobile device using ___ technology.   store-and-forward  
🗑
Images are a representation of light waves called ___ or continuous waves.   analog  
🗑
The operating system of a cell phone is stored in   ROM.  
🗑
Text messaging is also called   Short message service (SMS)  
🗑
An internet connectivity plan is also known a   data plan.  
🗑
Which of the following statements in NOT true about the JPEG file format?   JPEGs are larger than raw files.  
🗑
What is Android?   An operating system for cell/smartphones.  
🗑
Which of the following uses radio waves to transmit data signals over short distances.   Bluetooth  
🗑
The choice communication mode for people aged 14 to 30 is   texting.  
🗑
The primary input devices for smartphones are   microphone and touch pad.  
🗑
A portable media player can play files with all of the following file extensions, except   .doc.  
🗑
A ___ runs a traditional desktop operating system and is lightweight.   netbook  
🗑
___ is a very well known free VoIP provider.   Skype  
🗑
All of the following are technologies used to transfer digital information, except   5G  
🗑
Almost all cell phones are designed with a ___ port.   USB  
🗑
The global positioning system is a network of___ satellites plus 3 working spares.   21  
🗑
An converts your voices sound waves into digital signals.   analog-to-digital converter chip  
🗑
___ is a single cable that carries all audio and video information from devices connected to a TV to the TV itself.   HDMI  
🗑
You can send messages that include photos and videos between mobile devices using ___ technology.   multimedia message service (MMS)  
🗑
To transfer files from your computer to your music device use a ___ port.   USB  
🗑
Social is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information.   engineering  
🗑
Using your computer for non-work activities while you are being paid to do your job is known as   cyperloafing.  
🗑
A ___ is a virus that is triggered on a certain date.   time bomb  
🗑
IC3 is a partnership between the   FBI and National White Collar Crime Center  
🗑
You can block logical ports to invaders and make your computer invisible to others on the Internet by installing a   firewall.  
🗑
___ is an unwanted piggyback program that usually downloads with software you are installing from the Internet.   Spyware  
🗑
Which of the following classifications of viruses can change its own code to avoid detection.   Polymorphic  
🗑
All of the following are categories of viruses, except   snakes.  
🗑
___hackers break into systems for mon-malicious reasons such as to test system security vulnerabilities.   White-hat  
🗑
A ___ is the portion of virus code that is unique to a particular computer virus.   virus signature  
🗑
When malicious code is planted on your computer and alters your browser’s ability to find Web addresses it is known as   pharming.  
🗑
All of the following are ways that can infect your computer with a virus, except   logging into e-mail.  
🗑
Which of the following statements about cookies is NOT true.   Cookies obtain your personal information by searching you hard drive.  
🗑
All of the following are top cybercrimes reported to the IC3 in 2011 except   child pornography  
🗑
With regard to computer protection, quarantining is defined as   placing a found virus in a secure area on the hard drive.  
🗑
A packet sniffer is a program that can enable a hacker to do all of the following, EXCEPT   launch a denial of service (DoS) attack on your computer.  
🗑
All of the following are the main functions of antivirus software, except   assassinating all viruses.  
🗑
___ viruses are often transmitted by a flash drive left in a USB port.   Boot-sector  
🗑
Which of the following is formally defined as any criminal action perpetrated primarily through the use of a computer.   Cybercrime  
🗑
A ___ virus changes its own code or periodically rewrites itself to avoid detection.   polymorphic  
🗑
___ floods a computer with requests until it shuts down and refuses to answer any requests for information.   A DDoS attack  
🗑
Rules for creating passwords include all of the following, except   keep your password written down and stored in an easy-to-remember location.  
🗑
All of the following are considered cybercrimes, except   theft of a cell phone.  
🗑
A ___ is named after a housing construction feature that slows the spread of fires from house to house.   firewall  
🗑
Which statement about selecting the right programming language for a project is FALSE?   Programming languages require the same amount of time to execute.  
🗑
Keywords in a programming language that redirect the flow of a program based on a decision are called   control structures.  
🗑
A ___ error is caught when the program executes.   logical  
🗑
___ is a powerful programming language used to build a wide range of Windows applications.   Visual Basic  
🗑
The process by which program code is converted into machine language is called   compilation.  
🗑
The capability of moving a completed programming solution easily from one type of computer to another is known as   portability.  
🗑
___ is the process of translating a task into a series of commands that a computer will use to perform the task.   Programming  
🗑
During which phase of the system development life cycle are flowcharts and data-flow diagrams developed?   Design  
🗑
___ is a text-based approach to documenting an algorithm.   pseudocode  
🗑
With object-oriented analysis, programmers identify categories of input that are part of the problem into   classes  
🗑
Which of the following statements about JAVA is false?   Java can run only on a Windows operating system  
🗑
Before its final commercial release, software is often provided free or at a reduced cost in a ___ version to certain test sites or to interested users.   Beta  
🗑
FORTRAN, C++, and Java are all ___ generation languages.   third  
🗑
Special symbols called tags are used in which of the following languages?   HTML/XHTML  
🗑
The method of algorithm creation used when a programmer breaks down a problem into a series of high-level tasks and continues to break each task into successively more detailed subtasks is called   top down designs  
🗑
The set of specific, sequential steps that describe exactly wheat a copter program must do to complete the work is called an   algorithm  
🗑
The loop decision point consists of three features: an initial value, a set of actions to be performed, and a   test condition  
🗑
Which of the following is the first stage of the program development life cycle (PDLC)?   Describing the problem  
🗑
Translating an algorithm into a programming language is called   coding.  
🗑
SQL is an example of a ___ generation language.   fourth  
🗑
___ is the instructions programmers have written in a higher-level language.   Source code  
🗑
Which statement does NOT describe fifth-generation languages?   They use a set of short, English-based commands (such as SUB) that speak directly to the CPU  
🗑
Which of the following provides a visual representation of patterns that an algorithm comprises?   flowchart  
🗑
A ___ is a visual diagram of a process, including the decisions that need to be made along the way   flowchart  
🗑
How many steps are there in the system development life cycle?   6  
🗑
The first-generation language is   machine language  
🗑
___ is the process of reducing data redundancy by recording data only once.   normalization  
🗑
A ___ is a way of retrieving information from one or more tables that defines a particular subset of data.   query  
🗑
___ is the branch of computer science that deals with the attempt to create computers that think like humans.   artificial intelligence  
🗑
   
🗑


   

Review the information in the table. When you are ready to quiz yourself you can hide individual columns or the entire table. Then you can click on the empty cells to reveal the answer. Try to recall what will be displayed before clicking the empty cell.
 
To hide a column, click on the column name.
 
To hide the entire table, click on the "Hide All" button.
 
You may also shuffle the rows of the table by clicking on the "Shuffle" button.
 
Or sort by any of the columns using the down arrow next to any column heading.
If you know all the data on any row, you can temporarily remove it by tapping the trash can to the right of the row.

 
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.

  Normal Size     Small Size show me how
Created by: StaciSisson
Popular Computers sets