1/38
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
|---|
No study sessions yet.
What type of memory is found on secondary storage devices?
Long Term Memory
What is the term for the instructions that tell the computer what to do?
Software
Why is binary code made up of a series of ones and zeros?
To turn the electrical switches in the CPU on and off
A person uses a scanner to send an image to a computer. What basic function is being performed?
Input
During the processing stage, what does the computer do?
Uses Information
Where would the information needed to start a computer be stored?
In the Input/Output connectors
In which basic function does the computer save information?
Storage
What type of device are speakers and headphones?
Output
Where is most of the information processed in a computer?
CPU (Central Processing Unit)
What type of software maintains a computer?
Utility Software
What's it called when you take care of a computer
Performing Maintanence
How do you properly care for a CD?
Storing the disk in a closed case
Why should anti-virus and anti-spyware software be updated?
To keep pace with newly created viruses and spyware
Why should be used to clean the keyboard keys?
Pressurized Air
What should be used to save a computer from damage by sudden increases in voltage?
Surge protectors
What program secretly monitors a user's computer activities?
Spyware
Gina uses an Internet service to store copies of her photos on "the cloud." What kind of maintenance is this?
Back-up files
Scott receives an e-mail from someone he doesn't recognize. What should he do?
Delete the e-mail without opening it
About how often should the components inside the computer case be checked and cleaned?
Yearly
What location should be used to secure computer equipment?
A locked cabinet
How should a USB flash drive be handled?
Keeping the cover on the connector when not in use. Make sure device has property stopped before removing it.
Why is it a good idea to set up a schedule for maintenance tasks?
It is proactive and keeps your computer running smoothly.
What is a computer hacker?
Someone who has malicious intent for your computer and attempts to take your information.
If your computer screen goes blank, what is the trouble shooting process you should complete to get the screen to function again?
Check all plugs, changes in monitor input and restart.
What is the term for the principles that people use to guide all their decisions?
Ethics
What is the combination of hardware and software that checks all information coming through a network server?
Firewall
Which part of an e-mail holds the data needed to send the message, including the To: box?
message header
What is the host in this e-mail address: Mr. Thompson@SHS.edu?
SHS
What command would you use to add a file to an e-mail message?
Attachment
What is the name of the computer through which e-mail messages are sent and received?
E-mail Server
If your connectivity to the Internet stops working, what is the trouble shooting process you should complete to get it functioning again?
Check if plugged in. Check if you have connection in operating system's control panel, network connection. Check if your IP Address starts with 169 (then invalid).
Purpose of each domain type:
.com
.edu
.gov
.org
commercial
educational
governmental
organizational
File extension for each document type:
Excel
PowerPoint
Word
.xlsx
.pptx
.docx
What is telecommunications?
Communications via telephone or internet
What item sends inforation to and recieves information from other networks?
Computers, phones, fax machines
What type of network connects computers in a large geographic area?
WAN (Wide Area Network)
In a computer network, what type of computer controls the resources?
Server has resources clients use
Facebook, Twitter, and LinkedIn are examples of what type of online community?
Social Media
What is the term for a real-time conservation on a computer?
Chat