File History
Utility that automatically creates duplicates of your libraries, desktops, contacts and favorites to another storage location.

System RestoreTime CapsulesFile HistoryCarbonite

D. It is only for super computers
Which of the following capabilities of the UNIX is FALSE?A. It is a multiuserB. It is multitasking.C.

It is a network OS.D. It is only for super computers.

file path
C:WindowsSystem32driversetcprotocol is an example of a ___
OneDrive
Windows 10 uses a(n) ________ account for easy access and storage of online files.

iCloudChromeOneDriveeye OS

Disk Defragmenter
Windows utility programs that arranges pieces of files on your hard drive to allow for faster accessDisk CleanupDisk DefragmenterError-checkingTask Manager
Android and iOS
Which operating systems are used on most tablets?Windows and iOSWindows and AndroidAndroid and iOSBlackBerry and Windows
B. Desktop
Which of the following is NOT a Windows utility programA. Disk CleanupB. DesktopC. Disk DefragmenterD.

System Restore

A. :
All of the following can be used in an OS X file name EXCEPT ________.A. :B. #C. %D.

$

point and click technology
The Mac OS was the first commercially available OS to incorporatenetworkingcolor graphicssoundpoint and click technology
file path
The location of a file is specified by its ________.drive identifierfile pathfile typefile extension
bugs
In the late 1980s, computer specialists were concerned that proprietary software had too many ________, so they started working on open source projects. worms trojans bugs spiders
Windows
a proprietary OS for desktop and laptop computers Windows iOS Android Linux
User interface
The ________ of the operating system enables users to communicate with the computer system. window modem network adapter card user interface
Task Manager
You can use the Windows ________ to check on a nonresponsive program. System Restore Backup utility Error-checking Task Manager
Linus
the operating system most supercomputers use UNIX Linux Windows iOS
Details
When using Windows File Explorer, which view provides the most information at a glance? List Content Tiles Details
Trash
Deleted files on a Mac computer are moved to the ________.

The BIOS is activated by turning on the computer
What is the first step in the boot process? The BIOS is activated by turning on the computer. The BIOS checks that all devices are in place. The OS is loaded into RAM. Configuration and customization settings are checked
ROM
The basic input/output system (BIOS) is stored on a ________ chip ROM CPU RAM CMOS
File Compression
Utility that temporarily removes redundancies in a file to reduce the file size? Disk Cleanup File Compression Error-checking Disk Defragmenter
Apple
OS X is the operating system developed by ________.

Apple Microsoft Google Linux

Virtual memory
Using hard disk space to temporarily store data or instructions from RAM is referred to as the ________. spool interrupt sequencer compressor virtual memory
Google and Apple
Most smartphones use operating systems developed by ________.
B. application programming interface (API)
Which of the following is NOT a user interface?A.

Command-drivenB. application programming interface (API)C. menu-drivenD. graphical user interface (GUI)

D.

USB

All of the following are terms related to part of the boot process EXCEPT ________.A. ROMB. CMOSC. RAMD. USB
root
C: denotes a(n) ________ directory that is at the top of the filing structure of a computer.

top-level cluster root upper-level

A. inventory.xlsx
Which of the following is the name of a Microsoft Excel file?A. inventory.

xlsxB. inventory.wpdC. inventory.accdbD.

inventory.pdf

MS-DOS
All of the following are examples of network operating systems EXCEPT ________.A. Windows 10B. LinusC.

OS XD. MS-DOS

device driver
Each device attached to your computer has a special program called a(n) ________ that enables the device and operating system to communicate with each other. device driver translator interpreter device configurator
operating system
The two major types of system software programs are utility programs and the ________. charms application software user interface operating system
inside the CPU, itself
Some of the cache memory of a CPU is ________. inside the CPU, itself on the hard disk drive on a nearby SSD in cloud storage
A laser burns tiny pits onto a platter
How do optical discs store data? A laser burns tiny pits onto a platter. A magnet aligns iron particles on a platter.

Electronic memory records data on chips. A digital spectrometer leaves grooves in a platter.

overclocking
Running the CPU at a faster speed than the manufacturer recommends fetching latency overclocking hyperthreading
8
How many channels are in a Dolby 7.1 Surround Sound System
USB
Which of the following ports is NOT used to connect to a video card?A. HDMIB. DVIC.

USBD. DisplayPort

volatile
RAM is an example of ________ storage.
overwritten multiple times
To securely erase data, the U.S. Department of Defense suggests that data be ________. overwritten multiple times deleted encoded refactored
three
There are ________ levels of cache memory in the Intel i7 processor.

CPU
The control unit is one component of the ________. CPU cache front side bus clock
clear out unnecessary files
Running the Disk Cleanup utility is a quick way to ________. defrag your hard drive remove spyware programs clear out unnecessary files clean out your Startup folder
DDR3
In most current systems, ________ is the type of RAM used. DDR2 DDR3 DRAM SDRAM
An accumulation of temporary Internet files has not effect on your computer's overall performance
Which statement pertaining to system reliability is FALSE?A.

Having the latest version of software products can make your system more reliable.B. An accumulation of temporary Internet files has no effect on your computer's overall performance.C.

You can clean out unnecessary programs from your Startup folder.D. When you defrag your hard drive, it works more efficiently.

Speed of the motherboard
Which of the following does NOT determine processor power?A. Clock speedB. Number of coresC.

Amount of cache memoryD. Speed of the motherboard

SuperFetch
Windows uses a memory-management technique known as ________ to monitor which applications you use most frequently. It preloads them into your system memory. SuperGet SuperFetch SuperTake SuperRetrieve
The control unit and the arithmetic logic unit
The CPU consists of which two parts?
sound card
A ____ enables the computer to drive the speaker system HDMI display port sound card PCI bus
Performs arithmetic calculations
Which of the following activities is carried out by the ALU?A.

Moves read/write headsB. Performs arithmetic calculationsC. Creates virtual memoryD. Renders video images

Random access memory
Which of the following is NOT a permanent storage option?A. Optical driveB.

Random access memoryC. Internal hard driveD.Memory stick

GB
The amount of RAM storage is measured in ___
Refresh
To remove all the changes made to your system, the Windows ________ utility returns your computer to the state it was in when it came from the factory. Backup Erase Restore Refresh
Hyper threading
________ provides high-speed information processing by enabling a new set of instructions to start before the previous set is finished.

Multitasking Cache memory Hyperthreading Overclocking

solid-state drive
A ________ uses electronic memory and has no motors or moving parts. mechanical hard drive solid-state drive Blu-ray disc digital video disc
Tablet
Which is the lightest computer?
Moore's
The rule of thumb that predicts that the number of transistors on a CPU will double every 2 years is called ________ Law.
GPU
To speed up the display of graphics, a(n) ______ is installed on some video cards GPU CPU ALU SSD
Make the hard drive work more efficiently
Running the Disk Defragmenter utility will ________. detect and remove spyware mark bad memory cells make the hard drive work more efficiently clean out your Startup folder
milliseconds
When referring to hard drives, access time is measured in ________.

mechanical hard drive
The ________ has the largest capacity of any storage device. CD SSD DVD mechanical hard drive
encode
All of the following are part of the machine cycle EXCEPT ________.A. fetchB. encodeC.

executeD. store

Intel
The processor market for desktop and laptop computers is dominated by ________. IBM Microsoft Intel Apple
radio waves
Wireless network devices use ________ to communicate with each other. fiber optics satellites radio waves DSL
Unix
All of the following operating systems support P2P networking EXCEPT ________.A.

WindowsB. OS XC. UnixD. Linux

network administrator
Some of the responsibilities of a(n) ________ are installing new hardware and software on the network and monitoring performance. programmer analyst IT manager computer technician network administrator
switch
On a network, a(n) ________ helps prevent data packets from colliding with each other. access point hub adapter switch
MAN
A large network designed to provide access to a specific geographic area, such as a large city, is a ________.

MAN PAN LAN WAN

WAN
A network that spans a large physical distance is called a ________. MAN LAN PAN WAN
unshielded twisted-pair (UTP)
The most popular transmission media option for wired home Ethernet networks is ________ cable. fiber-optic power-line unshielded twisted-pair (UTP) coaxial
Cat 7B
Which of the following is NOT a type of UTP cable you would use in a wired Ethernet network?A. Cat 5EB. Cat 6C. Cat 6AD.

Cat 7B

Throughput
________ is the actual speed of data transfer that is achieved and is always less than or equal to the data transfer rate. Benchmark Broadband Bandwidth Throughput
node
A ________ is any device connected to a network such as a computer, printer, or game console.packetnodeNOSNIC
Fiber-optic cable
Which transmission medium transmits data the fastest? Twisted-pair cable Coaxial cable Wireless Fiber-optic cable
local
A peer-to-peer (P2P) network is an example of ________ administration. local wide area central corporate
HAN
A ________ is a network located in your residence that connects to all your digital devices. MAN WAN HAN LAN
network
A computer ________ is two or more computers connected using software and hardware so that they can communicate with each other. network switch broadband node
Bandwidth
________ is the maximum speed at which data can be transferred between two nodes.

Throughput Bandwidth Broadband Through speed

central
A client/server network is an example of ________ administration. local wide area central remote
twisted-pair cable
Normal telephone cable is a type of ________. fiber-optic cable twisted-pair cable coaxial cable Ethernet cable
Routers and switches
Sophisticated networks generally use which of the following hardware devices to ease the flow of data through the network Routers and switches USB ports Firewalls Firmware
NAS
A(n) ________ device facilitates file sharing and data backup. NAS WAN UTP NOS
Dial-up
Which of the following is NOT a wired broadband Internet connection option?A.

CableB. Dial-upC. DSLD. Fiber-optic

network operating system (NOS)
Client/server networks are controlled by a central server that runs specialized software called a(n) ________. information management system (ISM) network operating system (NOS) digital subscriber line (DSL) service set identifier (SSID)
802.11ab
Which of the following is NOT a standard for wireless fidelity Ethernet networks?a.

802.11nb. 802.11gc. 802.

11abd. 802.11ac

piggybacking
Using a network without the network owner's permission is known as ________. hijacking spamming piggybacking phishing
enable SSID broadcast
All of the following are extra precautions you can take to secure a wireless network EXCEPT ________.

a. change your network name (SSID)b. enable SSID broadcastc. turn on security protocolsd. create a passphrase

router
To transfer data packets between two or more networks, a ________ is used. router hub firewall switch
network adapter
For the nodes on a network to communicate with each other and access the network, each node needs a ________.

DSL modem network adapter hub router

Unshielded coaxial
Which of the following is NOT a type of cable used in wired networks?a. Unshielded twisted-pairb. Coaxialc. Fiber-opticd.

Unshielded coaxial

MAC
The unique number assigned to a network adapter by the manufacturer is referred to as the ________ address. MAC IP SSID network
intraoffice area network (IAN)
Which of the following is NOT a common network architecture type?a. local area network (LAN)b. home area network (HAN)c. intraoffice area network (IAN)d.

personal area network (PAN)

packets
Data are sent through a network in bundles called ________. packages pouches packets nodes
analog-to-digital converter
A(n) ________ chip converts sound waves from a voice into digital signal. analog-to-digital converter digital convergence digital signal processor telephony
.jpg
Which of the following is NOT a video file extension?a. .jpgb.

.mpgc. .avid.

.mov

screen size
A main difference between the tablet and the smartphone is the ________. operating system touch-screen interface screen size Internet connectivity
a cloud service
What is the easiest way to synch your phone wirelessly? A cloud service HDMI Bluetooth A secure digital transmission
cell
A ________ is a geographical area with a base transceiver station at its center. wave cell port hot-spot
Bluetooth
Which of the following uses radio waves to transmit data signals over short distances? VoIP Infrared Wireless access protocol Bluetooth
microphone and touch screen
The primary input devices for smartphones are ________. keyboard and mouse microphone and touch screen microphone and mouse touch screen and digital camera
resin
Some 3d printers work by controlling the exact locations where a liquid ________ will be exposed to oxygen and become solid. silicon peptides polymer resin
A specific operating system for mobile devices
What is iOS? A specific operating system for mobile devices A type of application software A utility program for all mobile digital devices A form of antivirus software
digital
VoIP uses ________ technology similar to email to transmit voice over the Internet.

digital analog binary IP

.accdb
Which of the following is not an example of a digital music file format?a. .wavb.

.mp3c. .aacd. .accdb

USB
Many mobile devices include a mini- ________ port.

USB parallel serial coaxial

data
A cellular Internet connectivity plan is also known as a ________ plan. text data mobile network
multimedia message service (MMS)
You can send messages that include photos and videos between mobile devices using ________ technology. short message service (SMS) multimedia message service (MMS) delivery multimedia service (DMS) multimedia delivery service (MDS)
Sampling rate
Which of the following describes the number of times an analog wave is measured each second during an analog-to-digital conversion? Converting rate Conversion rate Simplifying rate Sampling rate
JPEG
Which of the following digital image formats compresses the image file? PDF WAV JPEG MPEG
E-text
________ is digital textual information that can be stored, manipulated, and transmitted by electronic devices. Short message service SMTP E-text Digital rights management
short message service (SMS)
Text messaging is also called ________. text messaging system (TMS) sending messages shortly (SMS) short text messaging (STM) short message service (SMS)
Tablet
Which of the following mobile devices has the largest display? Phablet Smartphone Tablet Feature phone
Play
Google ________ is an online store that delivers software for Android devices.FunGames PlaySport
ROM
The operating system of a cell phone is stored in ________.

RAM the CPU ROM an SD card

digital convergence
The term ________ refers to the use of a single unifying device that handles media, Internet, entertainment, and telephone needs. multimedia message service telephony mobile switching center digital convergence
digital signal processor chip
A(n) ________ is included in a cell phone to handle the compression of data for it to be quickly transmitted to another phone. analog-to-digital converter digital signal processor chip modem compression utility
excellent reliability during Internet outages or power outages
All of the following are advantages of VoIP EXCEPT ________.a. low or free costb portabilityc. excellent reliability during Internet outages or power outagesd.

the ability to make calls on a computer from any Wi-Fi hotspot

Digital rights management
________ allows only limited use of media that have been legally purchased. Digital rights management Copyright Copyleft Synchronizing
1.5 inches
The distance between two near field communication (NFC) devices is` limited to about ________. 1.5 inches 1.

5 feet 1.5 meters 10 meters

They can only contain a limited number of characters
Which is true of SMS messages? They can contain pictures and videos. They can only contain a limited number of characters. They are no longer used. They are used in web page development.
satellites
The global positioning system is a network of 21 ________ plus 3 working spares.

transponders satellites base stations communicators

They are always PDF file formate
Which of the following is NOT true about e-books?a. You can borrow them from the library.b. They are always PDF file format.c.

You can annotate them with your own notes.d. They weigh less than physical books.

HDMI
A(n) ________ cable carries all audio and video information from devices to a connected TV.

HDMI S component Ethernet RJ11

theft of services
All of the following were top cybercrime reported to the ICS EXCEPTa. identity theftb. non-auction scamc. advance free fraudd. theft of services
phraming
When malicious code is planted on your computer and alters your browser's ability to find web addresses, it is known as _____. phishing pharming pretexting polymorphing
launch a denial of service (DoS) attack on your computer
A packet analyzer is a program that can enable a hacker to do all of the following EXCEPTa.

use your debit card information to purchase items illegallyb. assume your identityc. steal your logons and passwords for various accountsd. launch a denial of service (DoS) attack on your computer

engineering
Social ______ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive info engineering theft pretexting pharming
FBI and National White Collar Crime Center
The Internet Crime Complaint Center (IC3) is a partnership between the ________. FBI and local police departments FBI and National Defense Department FBI and National White Collar Crime Center National White Collar Crime Center and U.S.

Department of Defense

grayware
Adware and spyware are referred to collectively as ________. viruses grayware alertware firmware
Boot-sector
________ viruses are often transmitted by a flash drive left in a USB port. Logic bomb Boot-sector Macro Time bomb
firewall
A ________ is named after a housing construction feature that slows the spread of fires from house to house. firehouse firebreak firewall fire extinguisher
macro virus
A ________ is a virus that is attached to documents such as Word or Excel files. script virus macro virus polymorphic virus Trojan horse
time bomb
A ________ is a virus that is triggered on a certain date. worm macro logic bomb time bomb
printing a document
All of the following activities may infect your computer with a virus EXCEPT ________.

a. sharing flash drivesb. downloading video files from peer-to-peer sitesc. downloading or running an e-mail attachment filed. printing a document

White-hate
________ hackers break into systems for non-malicious reasons such as to test system security vulnerabilities.

Black-hat Gray-hat White-hat Green-hat

Spyware
_______ is a program that gathers information about your surfing habits without your knowledge. Adware Ghostware Shareware Spyware
Cookies obtain your personal info by searching your hard drive
Which of the following statements about cookies is NOT true? a. Cookies obtain your personal information by searching your hard drive.b. Cookies are text files.c.

Cookies help companies determine the traffic flow through their website.d. Some companies sell the personal information found in cookies to other companies.

polymorphic
Which of the following classifications of viruses can change its own code to avoid detection? Stealth Multipartite Polymorphic Worm
Cybercrime
Which of the following is formally defined as any criminal action perpetrated primarily through the use of a computer? Social networking Cybercrime Phishing Hacking
the wavy hard-to-read letter and number sequence that you type to prove that you are human to a website
CAPTCHA is ________. antivirus software password method the wavy hard-to-read letter and number sequence that you type to prove that you are human to a website a rootkit virus
uses a dictionary to find a lengthy word that is easy to remember
Rules for creating passwords include all of the following EXCEPT ________.a.

keep your password a secretb. change your password frequentlyc. use a dictionary to find a lengthy word that is easy to rememberd. use letters, numbers and symbols in your passwords

cyberloafing
Using your computer for non-work activities while you are being paid to work is known as ________. cyberloafing cybersleeping cyberlazing cyberbreaking
virus signature
A(n) ________ is the portion of virus code that is unique to a particular computer virus. virus signature encryption code compression code virus pattern
placing a found virus in a secure area on the hard drive
With regard to computer protection, quarantining is defined as ________.

updating your antivirus software placing a found virus in a secure area on the hard drive repairing an infected file deleting an infected file

a time bomb
Which type of virus was the famous Michelangelo virus? A worm A time bomb A script virus An e-mail virus
people pretending to represent official organizations such as the Dept. of Homeland Security or IRS
FBI-related scams involve ________.A. people pretending to represent official organizations such as the Dept. of Homeland Security or IRSB.

running auctions that do not existC. convincing people to send money as a "good faith" gestureD. collecting funds and not delivering the goods

computer viruses
Creating and distributing ________ is one of the most widespread types of cybercrime. spam computer viruses cookies zombies
a firewall
You can block logical ports from invaders and make your computer invisible to others on the Internet by installing ________. a packet sniffer a firewall a packet filter antivirus software
charming
Which of the following is NOT a virus category?a.

wormb. logic bombc. macrod. pharming

A DDoS attack
________ floods a computer with requests until it shuts down and refuses to answer any requests for information.

A Trojan horse A polymorphic virus A DDoS attack Pretexting

rootkit
A ________ allows a hacker to gain access to your computer and take almost complete control of it without your knowledge. denial of service (DoS) zombie logic bomb rootkit
worm
A(n) ________ takes advantage of file transport methods to spread on its own. worm script virus encryption virus macro virus
logical port blocking
Configuring a firewall to ignore all incoming packets that request access to a specific port is known as ________. packet filtering packet switching static addressing logical port blocking