1/74
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
|---|
No study sessions yet.
The two primary types of system software programs are utility programs and the .
operating system
Which of the following is not a Windows utility program?
Desktop Cleanup
The basic input/output system (BIOS) is stored on a chip.
ROM
Use the Windows to check on an unresponsive program.
Task Manager
Which of the following is the first step in the boot process?
The BIOS is activated.
Which of the following Windows utility programs arranges pieces of files on your hard drive to allow for faster access?
Defragment and Optimize Drives
Most smartphones use operating systems developed by .
Google and Apple
C:\Windows\System32\drivers\etc\protocol is an example of a file .
path
Which of the following will not be affected if you switch to Dark Mode?
Screensaver
C: denotes a directory that is at the top of the filing structure of a computer.
root
The Windows utility automatically creates duplicates of your libraries, desktops, contacts, and favorites to another storage device.
File History
Deleted files on a Mac computer are moved to the .
Trash
Which of the following is a web-based OS?
Chrome OS
Which of the following is not a type of user interface?
Application programming interface (API)
When you need notifications to be quieted, use the feature in the Alarms & Clock app.
Focus Assist
Using hard disk space to temporarily store data or instructions from RAM is referred to as the .
virtual memory
The of the operating system enables users to communicate with the computer system.
user interface
File provides an organizational structure to the files and folders on your storage device.
management
Which of the following is not true about UNIX?
It is only for supercomputers.
When using Windows File Explorer, which view provides the most specific information?
Details
All of the following are terms related to part of the boot process except .
JSON
Which operating system interface uses point-and-select technology?
GUI
Which utility temporarily removes redundancies in a file to reduce the file size?
File Compression
Which of the following two operating systems are used most frequently on tablets?
Android and iOS
Every keystroke and every mouse click creates an action, or , in the respective device.
event
The rule of thumb that predicts that the number of transistors on a CPU will double every two years is called Law.
Moore's
All of the following are part of the machine cycle except .
encode
RAM is an example of storage.
volatile
The processor market for desktop and laptop computers is dominated by .
Intel
Which of the following is not true about 3D sound cards?
They provide surround sound.
According to the book, if your CPU usage levels are greater than during most of your work session, a faster CPU can greatly increase your computer's performance.
90%
Level 1 cache usually contains the least amount of storage of the cache memory levels.
True
The heads of a mechanical hard disk drive touch the surface of the platter to read or write the data.
False
During low-level formatting, pie-shaped wedges called tracks, are created.
False
A CPU's benchmarks can help you decide between the various processors that are on the market.
True
The hard drive's seek time is the time it takes a storage device to locate its stored data and make it available for processing,
False
If you are a power user, try to get as few cores as possible in the CPU.
False
Which of the following refers to the name of your wireless network?
SSID
You can find out which network adapters are installed in your system by using the Windows Manager utility.
Device
For the nodes on a network to communicate with each other and access the network, each node needs a .
network adapter
Which of the following is not a home operating system that supports P2P networking?
NOS
Data is sent through a network in bundles called .
packets
When setting up a home network, make sure each node .
has a network adapter
Most wired home networks use Cat 7 cable.
False
Limiting your signal range does not help increase wireless network security.
False
The Internet is technically a WAN.
True
P2P networks are most commonly used in home networks.
True
A printer connected to a wireless network is a node on that network.
True
An access point connects to the main router wirelessly.
False
Current wired Ethernet networks in the United States are based on the IEEE 802.11ac standard.
False
When information has been converted to a stream of numeric values, that information has been .
digitized
is digital textual information that can be stored, manipulated, and transmitted by electronic devices.
E-text
What does the Digital Living Network Alliance standardize?
The convergence of devices.
Which of the following digital formats compress an image file?
JPEG
One app used to access the Dark Web is the Browser.
Tor
Which of the following is not true about E-readers?
Only the higher priced devices include integrated dictionaries.
A copyright holder cannot loan, rent, or give away the work.
False
You should always check the terms of use document before using any copyrighted material on a website.
True
Facts cannot be copyrighted.
True
The dark web is a well-concealed part of the deep web.
True
In terms of video resolution, HD stands for highly digitized.
False
Hot wallets are much safer than cold wallets.
False
Regarding computer protection, quarantining is defined as .
placing a found virus in a secure area on the hard drive
You can block logical ports from invaders and make your computer virtually invisible to others on the Internet by installing .
a firewall
Which of the following is not true about your surge protector?
Having individual surge protectors is better than installing a whole-house protector.
Which of the following is formally defined as any criminal action perpetrated primarily using a computer?
Cybercrime
Which type of virus was the famous Michelangelo virus?
A time bomb
Which of the following statements about cookies is not true?
Cookies obtain your personal information by searching your hard drive.
Multi-factor authentication requires three of four possible authentication factors.
False
A worm does not require human interaction to spread to other computers.
True
Gray-hat hackers are not doing anything illegal.
False
A stealth virus is designed to infect multiple file types to fool the antivirus software.
False
A full backup and an image backup are the same thing.
False
Ethical hackers are also known as white-hat hackers.
True
An image backup is the same as a system backup.
True