







Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
CGS1060C MIDTERM QUESTIONS WITH ACCURATE ANS
Typology: Exams
1 / 13
This page cannot be seen from the preview
Don't miss anything!
when an operating system employs memory,it swaps files to the hard disk. - ANSWERSvirtual memory the data stored in - is saved even when a computer has been powered off. - ANSWERSRom Flash memory is an example of - memory. - ANSWERSprogrammable memory. when the computer is shut down, the information in - is erased. - ANSWERSRam memory chips or modules hold data and programs as they are being processed by the -, and are usually found on the motherboard. - ANSWERSCPU USB flash drives and camera memory cards are types of -storage - ANSWERSsolid state storage CDs and DVDs are types of- storage - ANSWERSoptical storage data stored on a tape is -, so it requires you to forward or rewind the tape to access information - ANSWERSsequential data stored on a hard disk uses - access, so you can go directly to the area of the drive where the data is stored - ANSWERSrandom or direct hard drives with read/write heads that move over the surface of platters are a type of- storage - ANSWERSmagnetic storage performs arithmetic and logic functions in the CPU - ANSWERSALU the smallest unit of time a processor can measure - ANSWERScycle sets the speed at which the CPU executes the instructions - ANSWERSprocessor clock the " brain" of a computer - ANSWERSCPU an electronic channel that transfers data in multiple directions - ANSWERSbus
a processing technique, an operating system uses to process many parts of a single program - ANSWERSmultithreading part of the hard drive that the operating system uses as additional RAM - ANSWERSvirtual memory a processing technique an operating system uses to divide one task among many processors - ANSWERSparallel processing a processing technique an operating system can use if the computer has many processors - ANSWERSmultiprocessing a key task that operating systems perform to use RAM efficiently - ANSWERSmemory management the type of software that lets you copy, move, rename, and delete files and folders - ANSWERSfile management software the type of software you use most directly to perform tasks such as writing a screenplay
the asterisk (*) and forward slash (/) are examples of this type of key - ANSWERSmathematical operator the right arrow key is an example of this type of key - ANSWERSnavigation using- software, you can edit and print digital images - ANSWERSgraphics you can create, edit, format, and print documents like letters and reports with - software
listen to music files on your computer - ANSWERSwindows media player create a voice-over narrative from a written script - ANSWERStext-to-speech eliminate unwanted background noise from your sound file - ANSWERSaudio-editing software used by architects,scientists,designers,and engineers to create technical drawings - ANSWERSCAD type of graphic image where colors are assigned to individual screen pixels - ANSWERSbitmap type of graphic image based on simple objects that can be grouped and layered - ANSWERSvector device that converts a printed to each document into bitmap file and assigns colors to each cell - ANSWERSscanner type of compression used in JPEG files where some of the original file data is discarded
a communications device a laptop uses to connect to networks - ANSWERSwireless adapter type of network in which data travels from one device to another over cables - ANSWERSwired network wired - ANSWERSethernet wired - ANSWERSfiber optic wired - ANSWERScable wireless - ANSWERSWiMAX wireless - ANSWERS3G wireless - ANSWERSbluetooth enables several colleagues to to work together on a single document at the same time - ANSWERSgroupware chat groups, web conferencing, and VoiP are examples of this type of communication - ANSWERSsynchronous severs that provide centralized storage attached to the network - ANSWERSNAS internet-based delivery of computing services - ANSWERScloud computing in this type of communication, the communicators don't not have to be online at the same time - ANSWERSasynchronous standards that wireless fidelity devices use - ANSWERS802. technology that computers and devices use when communicating via radio waves across a medium distance - ANSWERSWi-Fi technology, also known as the 802.16 standard, that computers and devices use to communicate wirelessly across long distances - ANSWERSWiMAX a communications standard that specifies the method and speed that devices use to transmit data - ANSWERSprotocol network protocol that defines how to route data across a network - ANSWERSTCP/IP
posting hostile or insulting comments about another online participant is called - ANSWERSflaming a symbol of an emotional gesture that you create using keyboard characters is called a (n) - ANSWERSemoticon information others can find about you on the internet is called your - ANSWERSonline reputation a set of guidelines for acceptable online communications is called - ANSWERSnetiquette avoid revealing personal information in a (n) - ANSWERSchat room businesses participate in social networks to encourage - to post messages with questions, comments, and ratings - ANSWERSconsumers
passwords, PINs, and - are the keys to your personal accounts with online retailers, banks, and social sites - ANSWERSusernames besides passwords and firewalls, you can add an additional layer of protection for your computer data by using - ANSWERSencryption you can back up your files to remote servers over the internet using - and you can then retrieve your data anytime from anywhere in the world - ANSWERScloud stroage real-time location systems, such as RFID tags, use - technology - ANSWERSGPS e-commerce vendors employ viruses to identify users and customize web pages - ANSWERSfalse bot attacks are very easy to detect on your computer - ANSWERSfalse a denial of service attack, or DoS, occurs when a hacker sends out service requests to overload a server - ANSWERStrue a cybercrime is an illegal act committed using a computer on a network or over the internet - ANSWERStrue your comments posted to a web site are never available to the general public - ANSWERSfalse identity theft occurs when thieves steal your personal information, such as your bank account number - ANSWERStrue often used in combination with a password to gain entry to a computer system - ANSWERSusername a system that verifies that user input is not computer-generated by having you type in distorted characters that appear on the screen - ANSWERSCAPTCHA technique used to scramble or code data that is transmitted over a network - ANSWERSencryption technology that authenticates identity by scanning a person's physical characteristics, like fingerprints - ANSWERSbiometrics creates a blockade between a corporate or personal network and the internet - ANSWERSfirewall
crime usually committed by identity thieves - ANSWERSfinancial fraud steps you can take to protect personal information - ANSWERSshred documents and monitor accounts determine how a web site uses your browsing history - ANSWERSread the terms of use and privacy statements someone who repairs computer equipment so it can be sold or distributed to others is called a (n) - ANSWERSrefurbisher providing and storing information electronically instead of on paper are characteristics of a (n) - ANSWERSpaperless society computers and home electronics that draw power even when they are turned off are called - ANSWERSvampire devices when people make new objects from computer parts, they are practicing a form of recycling called - ANSWERScreative reuse using computers in environmentally responsive ways is called - ANSWERSgreen computing