Introduction To Information Technology Module 2

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/74

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

75 Terms

1
New cards

The two primary types of system software programs are utility programs and the .

operating system

2
New cards

Which of the following is not a Windows utility program?

Desktop Cleanup

3
New cards

The basic input/output system (BIOS) is stored on a chip.

ROM

4
New cards

Use the Windows to check on an unresponsive program.

Task Manager

5
New cards

Which of the following is the first step in the boot process?

The BIOS is activated.

6
New cards

Which of the following Windows utility programs arranges pieces of files on your hard drive to allow for faster access?

Defragment and Optimize Drives

7
New cards

Most smartphones use operating systems developed by .

Google and Apple

8
New cards

C:\Windows\System32\drivers\etc\protocol is an example of a file .

path

9
New cards

Which of the following will not be affected if you switch to Dark Mode?

Screensaver

10
New cards

C: denotes a directory that is at the top of the filing structure of a computer.

root

11
New cards

The Windows utility automatically creates duplicates of your libraries, desktops, contacts, and favorites to another storage device.

File History

12
New cards

Deleted files on a Mac computer are moved to the .

Trash

13
New cards

Which of the following is a web-based OS?

Chrome OS

14
New cards

Which of the following is not a type of user interface?

Application programming interface (API)

15
New cards

When you need notifications to be quieted, use the feature in the Alarms & Clock app.

Focus Assist

16
New cards

Using hard disk space to temporarily store data or instructions from RAM is referred to as the .

virtual memory

17
New cards

The of the operating system enables users to communicate with the computer system.

user interface

18
New cards

File provides an organizational structure to the files and folders on your storage device.

management

19
New cards

Which of the following is not true about UNIX?

It is only for supercomputers.

20
New cards

When using Windows File Explorer, which view provides the most specific information?

Details

21
New cards

All of the following are terms related to part of the boot process except .

JSON

22
New cards

Which operating system interface uses point-and-select technology?

GUI

23
New cards

Which utility temporarily removes redundancies in a file to reduce the file size?

File Compression

24
New cards

Which of the following two operating systems are used most frequently on tablets?

Android and iOS

25
New cards

Every keystroke and every mouse click creates an action, or , in the respective device.

event

26
New cards

The rule of thumb that predicts that the number of transistors on a CPU will double every two years is called Law.

Moore's

27
New cards

All of the following are part of the machine cycle except .

encode

28
New cards

RAM is an example of storage.

volatile

29
New cards

The processor market for desktop and laptop computers is dominated by .

Intel

30
New cards

Which of the following is not true about 3D sound cards?

They provide surround sound.

31
New cards

According to the book, if your CPU usage levels are greater than during most of your work session, a faster CPU can greatly increase your computer's performance.

90%

32
New cards

Level 1 cache usually contains the least amount of storage of the cache memory levels.

True

33
New cards

The heads of a mechanical hard disk drive touch the surface of the platter to read or write the data.

False

34
New cards

During low-level formatting, pie-shaped wedges called tracks, are created.

False

35
New cards

A CPU's benchmarks can help you decide between the various processors that are on the market.

True

36
New cards

The hard drive's seek time is the time it takes a storage device to locate its stored data and make it available for processing,

False

37
New cards

If you are a power user, try to get as few cores as possible in the CPU.

False

38
New cards

Which of the following refers to the name of your wireless network?

SSID

39
New cards

You can find out which network adapters are installed in your system by using the Windows Manager utility.

Device

40
New cards

For the nodes on a network to communicate with each other and access the network, each node needs a .

network adapter

41
New cards

Which of the following is not a home operating system that supports P2P networking?

NOS

42
New cards

Data is sent through a network in bundles called .

packets

43
New cards

When setting up a home network, make sure each node .

has a network adapter

44
New cards

Most wired home networks use Cat 7 cable.

False

45
New cards

Limiting your signal range does not help increase wireless network security.

False

46
New cards

The Internet is technically a WAN.

True

47
New cards

P2P networks are most commonly used in home networks.

True

48
New cards

A printer connected to a wireless network is a node on that network.

True

49
New cards

An access point connects to the main router wirelessly.

False

50
New cards

Current wired Ethernet networks in the United States are based on the IEEE 802.11ac standard.

False

51
New cards

When information has been converted to a stream of numeric values, that information has been .

digitized

52
New cards

is digital textual information that can be stored, manipulated, and transmitted by electronic devices.

E-text

53
New cards

What does the Digital Living Network Alliance standardize?

The convergence of devices.

54
New cards

Which of the following digital formats compress an image file?

JPEG

55
New cards

One app used to access the Dark Web is the Browser.

Tor

56
New cards

Which of the following is not true about E-readers?

Only the higher priced devices include integrated dictionaries.

57
New cards

A copyright holder cannot loan, rent, or give away the work.

False

58
New cards

You should always check the terms of use document before using any copyrighted material on a website.

True

59
New cards

Facts cannot be copyrighted.

True

60
New cards

The dark web is a well-concealed part of the deep web.

True

61
New cards

In terms of video resolution, HD stands for highly digitized.

False

62
New cards

Hot wallets are much safer than cold wallets.

False

63
New cards

Regarding computer protection, quarantining is defined as .

placing a found virus in a secure area on the hard drive

64
New cards

You can block logical ports from invaders and make your computer virtually invisible to others on the Internet by installing .

a firewall

65
New cards

Which of the following is not true about your surge protector?

Having individual surge protectors is better than installing a whole-house protector.

66
New cards

Which of the following is formally defined as any criminal action perpetrated primarily using a computer?

Cybercrime

67
New cards

Which type of virus was the famous Michelangelo virus?

A time bomb

68
New cards

Which of the following statements about cookies is not true?

Cookies obtain your personal information by searching your hard drive.

69
New cards

Multi-factor authentication requires three of four possible authentication factors.

False

70
New cards

A worm does not require human interaction to spread to other computers.

True

71
New cards

Gray-hat hackers are not doing anything illegal.

False

72
New cards

A stealth virus is designed to infect multiple file types to fool the antivirus software.

False

73
New cards

A full backup and an image backup are the same thing.

False

74
New cards

Ethical hackers are also known as white-hat hackers.

True

75
New cards

An image backup is the same as a system backup.

True