1/87
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced | Call with Kai |
|---|
No analytics yet
Send a link to your students to track their progress
True
Any illegal act involving the use of a computer or related devices generally is referred to as a crimewave.
False
A rootkit displays an online advertisement in a banner or pop-up window on webpages, email, or other Internet services.
True
Viruses, worms, and other malware can be hidden in downloaded game files and mobile apps.
True
An audit trail records in a file both successful and unsuccessful access attempts.
True
It is good practice to change your password frequently.
True
Intentionally erasing software would be considered software theft.
True
A typical license agreement allows you to rent or lease the software.
False
Unencrypted, readable data is called ciphertext.
False
Private key encryption is also called asymmetric key encryption.
True
VPNs encrypt data to help ensure that the data is safe from being intercepted by unauthorized people.
True
When data is traveling to or from a computer to a cloud service, it is subject to interception.
True
Full backups are made at regular intervals on removable media in a grandparent-parent-child backup scheme.
access control
security measure that defines who can access a computer, device, or network; when they can access it; and what actions they can take while accessing it
bot
program that performs a repetitive task on a network
cookie
small text file that a web server stores on your computer
digital certificate
notice that guarantees a user or website is legitimate
disc burning software
program that writes text, graphics, audio, and video files on a recordable or rewritable disc
keygen
program that creates software registration numbers and sometimes activation codes
phishing
scam in which a perpetrator sends a message in an attempt to obtain personal or financial information
script kiddie
hacker who does not have the technical skills and knowledge of a cracker
technology ethics
moral guidelines that govern the use of computers, mobile devices, information systems, and related technologies
zombie
compromised computer or device whose owner is unaware
True
The motherboard also is called a system board.
False
A single-board computer often is more expensive than a traditional desktop computer.
False
A dual-core processor doubles the processing speed of a single-core processor.
True
In general, multi-core processors are less energy efficient than separate multiple processors.
False
The system clock keeps track of the date and time in a computer.
True
In cloud computing, the back end consists of the servers and storage devices that manage and store the resources accessed by users.
False
In the binary system, the digit 1 represents the absence of an electronic charge.
False
Most RAM is nonvolatile.
True
The processor interprets and executes a program or application's instructions while the program or application is in nonvolatile memory.
True
ROM chips also are called firmware.
True
As with processors, manufacturers state the clock speed for a bus in hertz.
True
The power supply converts the wall outlet AC power into DC power.
ASCII
widely used coding scheme to represent a set of characters
bus width
number of bits the processor can interpret and execute at a given time
chip
small piece of semiconducting materials, usually silicon, on which integrated circuits are etched
control unit
component of the computer that directs and coordinates most of the operations in the computer
firmware
ROM chips that contain permanently written data, instructions, or information
IaaS
the use of software to emulate hardware capabilities, enabling computers to scale, or adjust up or down, storage, processing power, or bandwidth as needed
motherboard
the main circuit board of the computer
registers
small, high-speed storage locations contained in a processor
transistor
integrated circuit component that acts as an electronic switch that opens or closes the circuit for electrical charges
word size
determines the number of bits that the computer can transmit at one time
True
CAPS LOCK and NUM LOCK are two examples of toggle keys.
True
Keylogging software runs undetected and stores every keystroke in a file for later retrieval.
True
Wearable devices mainly rely upon touch input.
False
A smaller frame rate results in a smaller file size for a video, as well as a smoother playback.
False
Optical character recognition (OCR) and optical mark recognition (OMR) are two technologies used by QR code readers.
False
A magstripe reader reads the preprinted characters on the bottom of a check.
True
LCD stands for liquid crystal display.
True
In terms of response time, the lower the number, the faster the response time.
False
Contrast ratio defines a display's width relative to its height.
False
A 3-D printer creates an object by using ink cartridges.
False
Printer resolution is measured by the number of pixels per inch a printer can print.
True
A dye-sublimation printer uses heat to transfer colored dye to specially coated paper.
command
instruction that causes a program or app to perform a specific action
drone
aircraft that operates by an onboard computer and GPS, a remote control device, and/or an app on a computer or mobile device
headset
device that functions as both headphones and a microphone
interactive whiteboard
touch-sensitive device that displays the image on a connected computer screen, usually via projector
keyboard shortcut
one or more keyboard keys that you press to perform an operating system or application-related task
multi-touch
touch screen capability of recognizing more than one point of contact at the same time
scanner
light-sensing input device that reads printed text and graphics and then translates the result into a form the computer can process
stylus
small metal or plastic device that looks like a tiny ink pen but uses pressure instead of ink
touchpad
small, flat, rectangular pointing device that is sensitive to pressure and motion
voice recognition
computer or mobile device's capability of distinguishing spoken word
False
Storage devices can be categorized as input or output devices.
True
A storage medium is volatile; that is, items stored on it remain intact even when you turn off a computer or mobile device.
True
Compared with the access time of memory, the access time of storage devices is slow.
False
On storage media, a higher density means less storage capacity.
False
Because of current standards, head crashes no longer occur.
False
The access time of a hard disk can be more than 100 times faster than an SSD.
False
While encrypted files offer greater security than unencrypted files, an operating system may require more time to open and access encrypted files.
True
While each program may use a different method of encrypting files, they all use the process of cryptography.
True
A group of two or more integrated hard drives is called a RAID.
True
When you are finishing a USB flash drive, simply remove it from the USB port.
True
Mini discs require a separate mini disc drive; that is, they do not work in standard-sized optical disc drives.
False
An active RFID tag contains a battery that runs the chip's circuitry and broadcasts a signal to the RFID reader; because they are so small, they can be embedded in skin.
capacity
the number of bytes a storage medium can hold
controller
special-purpose chip and electronic circuits that control the transfer of data, instructions, and information from a drive to and from the system bus and other components in the computer
longitudinal recording
storage method in which the magnetic particles are aligned horizontally around a disk's surface
network attached storage
server whose sole purpose is providing storage to users, computers, and devices attached to the network
reading
process of transferring data, instructions, and information from a storage medium into memory
ripping
process of copying audio and/or video data from a purchased disc and saving it on your own media
sequential access
storage technique that reads or writes data consecutively
solid-state media
flash memory chip type that consists entirely of electronic components, such as integrated circuits, and contains no moving parts
thumb drive
flash memory storage device that plugs in a USB port on a computer or mobile device
writing
process of transferring data, instructions, and information from memory to a storage medium