Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

CGS1060C MIDTERM QUESTIONS WITH ACCURATE ANS, Exams of Nursing

CGS1060C MIDTERM QUESTIONS WITH ACCURATE ANS

Typology: Exams

2024/2025

Available from 07/07/2025

lisa-writer
lisa-writer 🇺🇸

815 documents

1 / 13

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
CGS1060C MIDTERM QUESTIONS
WITH ACCURATE ANSWERS
when an operating system employs memory,it swaps files to the hard disk. -
ANSWERSvirtual memory
the data stored in - is saved even when a computer has been powered off. -
ANSWERSRom
Flash memory is an example of - memory. - ANSWERSprogrammable memory.
when the computer is shut down, the information in - is erased. - ANSWERSRam
memory chips or modules hold data and programs as they are being processed by the
-, and are usually found on the motherboard. - ANSWERSCPU
USB flash drives and camera memory cards are types of -storage - ANSWERSsolid
state storage
CDs and DVDs are types of- storage - ANSWERSoptical storage
data stored on a tape is -, so it requires you to forward or rewind the tape to access
information - ANSWERSsequential
data stored on a hard disk uses - access, so you can go directly to the area of the drive
where the data is stored - ANSWERSrandom or direct
hard drives with read/write heads that move over the surface of platters are a type of-
storage - ANSWERSmagnetic storage
performs arithmetic and logic functions in the CPU - ANSWERSALU
the smallest unit of time a processor can measure - ANSWERScycle
sets the speed at which the CPU executes the instructions - ANSWERSprocessor clock
the " brain" of a computer - ANSWERSCPU
an electronic channel that transfers data in multiple directions - ANSWERSbus
pf3
pf4
pf5
pf8
pf9
pfa
pfd

Partial preview of the text

Download CGS1060C MIDTERM QUESTIONS WITH ACCURATE ANS and more Exams Nursing in PDF only on Docsity!

CGS1060C MIDTERM QUESTIONS

WITH ACCURATE ANSWERS

when an operating system employs memory,it swaps files to the hard disk. - ANSWERSvirtual memory the data stored in - is saved even when a computer has been powered off. - ANSWERSRom Flash memory is an example of - memory. - ANSWERSprogrammable memory. when the computer is shut down, the information in - is erased. - ANSWERSRam memory chips or modules hold data and programs as they are being processed by the -, and are usually found on the motherboard. - ANSWERSCPU USB flash drives and camera memory cards are types of -storage - ANSWERSsolid state storage CDs and DVDs are types of- storage - ANSWERSoptical storage data stored on a tape is -, so it requires you to forward or rewind the tape to access information - ANSWERSsequential data stored on a hard disk uses - access, so you can go directly to the area of the drive where the data is stored - ANSWERSrandom or direct hard drives with read/write heads that move over the surface of platters are a type of- storage - ANSWERSmagnetic storage performs arithmetic and logic functions in the CPU - ANSWERSALU the smallest unit of time a processor can measure - ANSWERScycle sets the speed at which the CPU executes the instructions - ANSWERSprocessor clock the " brain" of a computer - ANSWERSCPU an electronic channel that transfers data in multiple directions - ANSWERSbus

a processing technique, an operating system uses to process many parts of a single program - ANSWERSmultithreading part of the hard drive that the operating system uses as additional RAM - ANSWERSvirtual memory a processing technique an operating system uses to divide one task among many processors - ANSWERSparallel processing a processing technique an operating system can use if the computer has many processors - ANSWERSmultiprocessing a key task that operating systems perform to use RAM efficiently - ANSWERSmemory management the type of software that lets you copy, move, rename, and delete files and folders - ANSWERSfile management software the type of software you use most directly to perform tasks such as writing a screenplay

  • ANSWERSapplication software the software that runs a computer - ANSWERSsystem software the type of software that performs a specific, limited task usually related to managing or maintaining a computer system - ANSWERSutility software a collection of major operating system updates - ANSWERSservice pack the keys on your keyboard are sticky - ANSWERSclean the device your computer is running very slowly and you can no longer run your favorite program on your computer - ANSWERSremove unwanted files your wireless mouse is unresponsive,and the pointer is not moving - ANSWERSchange the batteries the monitor attached to your computer is blank and makes no sound when you turn it on
  • ANSWERSplug in power cord your desktop computer won't work at all even though it's plugged in and has been turned on - ANSWERScall a technician use cleaning products specifically meant for computer screens, such as a 50/50 solution of - and water - ANSWERSalcohol

the asterisk (*) and forward slash (/) are examples of this type of key - ANSWERSmathematical operator the right arrow key is an example of this type of key - ANSWERSnavigation using- software, you can edit and print digital images - ANSWERSgraphics you can create, edit, format, and print documents like letters and reports with - software

  • ANSWERSword processing application software programs for mobile devices like smartphones and tablets are often called - ANSWERSapps you can perform numerical calculations enhanced with charts and tables using - software - ANSWERSspreadsheet businesses use - programs to maintain records on thousands, even millions, of customers or inventory items - ANSWERSdatabase a record is all the data for a single entity, like a customer or an order - ANSWERSgraphics sheet you can enter data in a database using a form - ANSWERScustomers forms a query retrieves data that you specify from selected tables and fields - ANSWERSa table databases store data in tables, where the data is organized in grids of rows and columns, much like a worksheet - ANSWERSworksheet a report is a well-designed layout of specified database content - ANSWERSparadigm orders report install a newer version of your current software program - ANSWERSupgrade when publishers load software on a computer before selling it - ANSWERSpreinstall start a software program - ANSWERSrun remove a software program from your computer - ANSWERSuninstall obtain a software program from an online app store - ANSWERSdownload create synthesized music files - ANSWERSMIDI talk into a microphone to " write" a report - ANSWERSspeech-to-text

listen to music files on your computer - ANSWERSwindows media player create a voice-over narrative from a written script - ANSWERStext-to-speech eliminate unwanted background noise from your sound file - ANSWERSaudio-editing software used by architects,scientists,designers,and engineers to create technical drawings - ANSWERSCAD type of graphic image where colors are assigned to individual screen pixels - ANSWERSbitmap type of graphic image based on simple objects that can be grouped and layered - ANSWERSvector device that converts a printed to each document into bitmap file and assigns colors to each cell - ANSWERSscanner type of compression used in JPEG files where some of the original file data is discarded

  • ANSWERSlossy popular presentation software that includes a video player - ANSWERSpowerpoint a digital video camera that captures video and sends it directly to a computer - ANSWERSweb cam method used in editing video,using separate tracks for video and sound - ANSWERStimeline technology that transfers only a segment of a video file at a time from the web to your computer - ANSWERSstreaming video a series of image frames displayed quickly enough for us to perceive them as continuous motion - ANSWERSdigital video many mobile apps are written by third-party programmers to sell through app - ANSWERSstores when you download a mobile app, the installation program installs an - for the app on your mobile desktop - ANSWERSicon the ability to - to the internet is a key feature shared by most mobile apps - ANSWERSconnect GPS and - apps help you get directions and avoid traffic jams - ANSWERSmapping

a communications device a laptop uses to connect to networks - ANSWERSwireless adapter type of network in which data travels from one device to another over cables - ANSWERSwired network wired - ANSWERSethernet wired - ANSWERSfiber optic wired - ANSWERScable wireless - ANSWERSWiMAX wireless - ANSWERS3G wireless - ANSWERSbluetooth enables several colleagues to to work together on a single document at the same time - ANSWERSgroupware chat groups, web conferencing, and VoiP are examples of this type of communication - ANSWERSsynchronous severs that provide centralized storage attached to the network - ANSWERSNAS internet-based delivery of computing services - ANSWERScloud computing in this type of communication, the communicators don't not have to be online at the same time - ANSWERSasynchronous standards that wireless fidelity devices use - ANSWERS802. technology that computers and devices use when communicating via radio waves across a medium distance - ANSWERSWi-Fi technology, also known as the 802.16 standard, that computers and devices use to communicate wirelessly across long distances - ANSWERSWiMAX a communications standard that specifies the method and speed that devices use to transmit data - ANSWERSprotocol network protocol that defines how to route data across a network - ANSWERSTCP/IP

posting hostile or insulting comments about another online participant is called - ANSWERSflaming a symbol of an emotional gesture that you create using keyboard characters is called a (n) - ANSWERSemoticon information others can find about you on the internet is called your - ANSWERSonline reputation a set of guidelines for acceptable online communications is called - ANSWERSnetiquette avoid revealing personal information in a (n) - ANSWERSchat room businesses participate in social networks to encourage - to post messages with questions, comments, and ratings - ANSWERSconsumers

  • is an example of a professional networking site where you keep in touch with business contacts - ANSWERSlinkedin on a social network, you create an online form to create a virtual identity, or - , which includes information you choose to describe yourself - ANSWERSprofile flicker,shutterfly, and photobucket are - social networks - ANSWERSphoto-sharing a social networking is a web site that links people to form a (n) - with shared interests and experiences - ANSWERSonline community type of e-mail that uses an e-mail client and an e-mail account provided by an ISP send and receive e-mail - ANSWERSlocal a computer that routes e-mail messages through a network - ANSWERSe-mail server components include a user ID, "at " symbol, and the name of the e-mail provider - ANSWERSe-mail address type of e-mail that uses a browser and an e-mail account provided through an online service to send and receive e-mail - ANSWERSwebmail an electronic document transmitted on a computer - ANSWERSe-mail message patented the first mouse in 1970 - ANSWERSDouglas Englebart agency that sets standards and guidelines for the web - ANSWERSW3C
  • is an organization that coordinates internet addresses and domain names around the world - ANSWERSICANN a - is an excellent resource for facts and immediate reactions to current and recent events - ANSWERSnews site a - includes information that's been written and researched thoroughly by exports, double-checked for accuracy, and reviewed by other experts - ANSWERSscholarly web sites on the - are freely available to the public - ANSWERSopen web restricted web sites are also known as the private web or the - - ANSWERSinvisible web set up - if you want to be notified when new online information about a topic becomes available - ANSWERSgoogle alerts search engines place the most relevant - on the first few pages of search results - ANSWERShits when preparing for a search, choose - that make the search term unique and specific - ANSWERSkey words to customize search results, you can change - , such as the number of results displayed per page - ANSWERSpreferences one way to refine a search term is to use a word base, or to broaden the search - ANSWERSword stem a - lets you search blogs, microblogs, comments, and conversations on social media sites - ANSWERSsocial search tool when you're looking for web pages containing specific words or phrases, use a - engine
  • ANSWERSgeneral search a - is a catalog of web pages organized by topic - ANSWERSsubject directory a - engine lets you search databases, news providers, or podcasts - ANSWERSspecialty search a - sends a query to many search engines at the same time - ANSWERSmetasearch engine you can encrypt specific files and folders in windows using - ANSWERSEFS

passwords, PINs, and - are the keys to your personal accounts with online retailers, banks, and social sites - ANSWERSusernames besides passwords and firewalls, you can add an additional layer of protection for your computer data by using - ANSWERSencryption you can back up your files to remote servers over the internet using - and you can then retrieve your data anytime from anywhere in the world - ANSWERScloud stroage real-time location systems, such as RFID tags, use - technology - ANSWERSGPS e-commerce vendors employ viruses to identify users and customize web pages - ANSWERSfalse bot attacks are very easy to detect on your computer - ANSWERSfalse a denial of service attack, or DoS, occurs when a hacker sends out service requests to overload a server - ANSWERStrue a cybercrime is an illegal act committed using a computer on a network or over the internet - ANSWERStrue your comments posted to a web site are never available to the general public - ANSWERSfalse identity theft occurs when thieves steal your personal information, such as your bank account number - ANSWERStrue often used in combination with a password to gain entry to a computer system - ANSWERSusername a system that verifies that user input is not computer-generated by having you type in distorted characters that appear on the screen - ANSWERSCAPTCHA technique used to scramble or code data that is transmitted over a network - ANSWERSencryption technology that authenticates identity by scanning a person's physical characteristics, like fingerprints - ANSWERSbiometrics creates a blockade between a corporate or personal network and the internet - ANSWERSfirewall

  • chemicals are released into the air or groundwater and soil when e-waste is burned or buried - ANSWERSharmful

crime usually committed by identity thieves - ANSWERSfinancial fraud steps you can take to protect personal information - ANSWERSshred documents and monitor accounts determine how a web site uses your browsing history - ANSWERSread the terms of use and privacy statements someone who repairs computer equipment so it can be sold or distributed to others is called a (n) - ANSWERSrefurbisher providing and storing information electronically instead of on paper are characteristics of a (n) - ANSWERSpaperless society computers and home electronics that draw power even when they are turned off are called - ANSWERSvampire devices when people make new objects from computer parts, they are practicing a form of recycling called - ANSWERScreative reuse using computers in environmentally responsive ways is called - ANSWERSgreen computing