CS 104 Final

File History
Utility that automatically creates duplicates of your libraries, desktops, contacts and favorites to another storage location.
System Restore
Time Capsules
File History
Carbonite
D. It is only for super computers
Which of the following capabilities of the UNIX is FALSE?
A. It is a multiuser
B. It is multitasking.
C. It is a network OS.
D. It is only for super computers.
file path
C:WindowsSystem32driversetcprotocol is an example of a ___
OneDrive
Windows 10 uses a(n) ________ account for easy access and storage of online files.
iCloud
Chrome
OneDrive
eye OS
Disk Defragmenter
Windows utility programs that arranges pieces of files on your hard drive to allow for faster access
Disk Cleanup
Disk Defragmenter
Error-checking
Task Manager
Android and iOS
Which operating systems are used on most tablets?
Windows and iOS
Windows and Android
Android and iOS
BlackBerry and Windows
B. Desktop
Which of the following is NOT a Windows utility program
A. Disk Cleanup
B. Desktop
C. Disk Defragmenter
D. System Restore
A. :
All of the following can be used in an OS X file name EXCEPT ________.
A. :
B. #
C. %
D. $
point and click technology
The Mac OS was the first commercially available OS to incorporate
networking
color graphics
sound
point and click technology
file path
The location of a file is specified by its ________.
drive identifier
file path
file type
file extension
bugs
In the late 1980s, computer specialists were concerned that proprietary software had too many ________, so they started working on open source projects.
worms
trojans
bugs
spiders
Windows
a proprietary OS for desktop and laptop computers
Windows
iOS
Android
Linux
User interface
The ________ of the operating system enables users to communicate with the computer system.
window
modem
network adapter card
user interface
Task Manager
You can use the Windows ________ to check on a nonresponsive program.
System Restore
Backup utility
Error-checking
Task Manager
Linus
the operating system most supercomputers use
UNIX
Linux
Windows
iOS
Details
When using Windows File Explorer, which view provides the most information at a glance?
List
Content
Tiles
Details
Trash
Deleted files on a Mac computer are moved to the ________.
The BIOS is activated by turning on the computer
What is the first step in the boot process?
The BIOS is activated by turning on the computer.
The BIOS checks that all devices are in place.
The OS is loaded into RAM.
Configuration and customization settings are checked
ROM
The basic input/output system (BIOS) is stored on a ________ chip
ROM
CPU
RAM
CMOS
File Compression
Utility that temporarily removes redundancies in a file to reduce the file size?
Disk Cleanup
File Compression
Error-checking
Disk Defragmenter
Apple
OS X is the operating system developed by ________.
Apple
Microsoft
Google
Linux
Virtual memory
Using hard disk space to temporarily store data or instructions from RAM is referred to as the ________.
spool
interrupt sequencer
compressor
virtual memory
Google and Apple
Most smartphones use operating systems developed by ________.
B. application programming interface (API)
Which of the following is NOT a user interface?
A. Command-driven
B. application programming interface (API)
C. menu-driven
D. graphical user interface (GUI)
D. USB
All of the following are terms related to part of the boot process EXCEPT ________.
A. ROM
B. CMOS
C. RAM
D. USB
root
C: denotes a(n) ________ directory that is at the top of the filing structure of a computer.
top-level
cluster
root
upper-level
A. inventory.xlsx
Which of the following is the name of a Microsoft Excel file?
A. inventory.xlsx
B. inventory.wpd
C. inventory.accdb
D. inventory.pdf
MS-DOS
All of the following are examples of network operating systems EXCEPT ________.
A. Windows 10
B. Linus
C. OS X
D. MS-DOS
device driver
Each device attached to your computer has a special program called a(n) ________ that enables the device and operating system to communicate with each other.
device driver
translator
interpreter
device configurator
operating system
The two major types of system software programs are utility programs and the ________.
charms
application software
user interface
operating system
inside the CPU, itself
Some of the cache memory of a CPU is ________.
inside the CPU, itself
on the hard disk drive
on a nearby SSD
in cloud storage
A laser burns tiny pits onto a platter
How do optical discs store data?
A laser burns tiny pits onto a platter.
A magnet aligns iron particles on a platter.
Electronic memory records data on chips.
A digital spectrometer leaves grooves in a platter.
overclocking
Running the CPU at a faster speed than the manufacturer recommends
fetching
latency
overclocking
hyperthreading
8
How many channels are in a Dolby 7.1 Surround Sound System
USB
Which of the following ports is NOT used to connect to a video card?
A. HDMI
B. DVI
C. USB
D. DisplayPort
volatile
RAM is an example of ________ storage.
overwritten multiple times
To securely erase data, the U.S. Department of Defense suggests that data be ________.
overwritten multiple times
deleted
encoded
refactored
three
There are ________ levels of cache memory in the Intel i7 processor.
CPU
The control unit is one component of the ________.
CPU
cache
front side bus
clock
clear out unnecessary files
Running the Disk Cleanup utility is a quick way to ________.
defrag your hard drive
remove spyware programs
clear out unnecessary files
clean out your Startup folder
DDR3
In most current systems, ________ is the type of RAM used.
DDR2
DDR3
DRAM
SDRAM
An accumulation of temporary Internet files has not effect on your computer’s overall performance
Which statement pertaining to system reliability is FALSE?
A. Having the latest version of software products can make your system more reliable.
B. An accumulation of temporary Internet files has no effect on your computer’s overall performance.
C. You can clean out unnecessary programs from your Startup folder.
D. When you defrag your hard drive, it works more efficiently.
Speed of the motherboard
Which of the following does NOT determine processor power?
A. Clock speed
B. Number of cores
C. Amount of cache memory
D. Speed of the motherboard
SuperFetch
Windows uses a memory-management technique known as ________ to monitor which applications you use most frequently. It preloads them into your system memory.
SuperGet
SuperFetch
SuperTake
SuperRetrieve
The control unit and the arithmetic logic unit
The CPU consists of which two parts?
sound card
A ____ enables the computer to drive the speaker system
HDMI
display port
sound card
PCI bus
Performs arithmetic calculations
Which of the following activities is carried out by the ALU?
A. Moves read/write heads
B. Performs arithmetic calculations
C. Creates virtual memory
D. Renders video images
Random access memory
Which of the following is NOT a permanent storage option?
A. Optical drive
B. Random access memory
C. Internal hard drive
D.Memory stick
GB
The amount of RAM storage is measured in ___
Refresh
To remove all the changes made to your system, the Windows ________ utility returns your computer to the state it was in when it came from the factory.
Backup
Erase
Restore
Refresh
Hyper threading
________ provides high-speed information processing by enabling a new set of instructions to start before the previous set is finished.
Multitasking
Cache memory
Hyperthreading
Overclocking
solid-state drive
A ________ uses electronic memory and has no motors or moving parts.
mechanical hard drive
solid-state drive
Blu-ray disc
digital video disc
Tablet
Which is the lightest computer?
Moore’s
The rule of thumb that predicts that the number of transistors on a CPU will double every 2 years is called ________ Law.
GPU
To speed up the display of graphics, a(n) ______ is installed on some video cards
GPU
CPU
ALU
SSD
Make the hard drive work more efficiently
Running the Disk Defragmenter utility will ________.
detect and remove spyware
mark bad memory cells
make the hard drive work more efficiently
clean out your Startup folder
milliseconds
When referring to hard drives, access time is measured in ________.
mechanical hard drive
The ________ has the largest capacity of any storage device.
CD
SSD
DVD
mechanical hard drive
encode
All of the following are part of the machine cycle EXCEPT ________.
A. fetch
B. encode
C. execute
D. store
Intel
The processor market for desktop and laptop computers is dominated by ________.
IBM
Microsoft
Intel
Apple
radio waves
Wireless network devices use ________ to communicate with each other.
fiber optics
satellites
radio waves
DSL
Unix
All of the following operating systems support P2P networking EXCEPT ________.
A. Windows
B. OS X
C. Unix
D. Linux
network administrator
Some of the responsibilities of a(n) ________ are installing new hardware and software on the network and monitoring performance.
programmer analyst
IT manager
computer technician
network administrator
switch
On a network, a(n) ________ helps prevent data packets from colliding with each other.
access point
hub
adapter
switch
MAN
A large network designed to provide access to a specific geographic area, such as a large city, is a ________.
MAN
PAN
LAN
WAN
WAN
A network that spans a large physical distance is called a ________.
MAN
LAN
PAN
WAN
unshielded twisted-pair (UTP)
The most popular transmission media option for wired home Ethernet networks is ________ cable.
fiber-optic
power-line
unshielded twisted-pair (UTP)
coaxial
Cat 7B
Which of the following is NOT a type of UTP cable you would use in a wired Ethernet network?
A. Cat 5E
B. Cat 6
C. Cat 6A
D. Cat 7B
Throughput
________ is the actual speed of data transfer that is achieved and is always less than or equal to the data transfer rate.
Benchmark
Broadband
Bandwidth
Throughput
node
A ________ is any device connected to a network such as a computer, printer, or game console.
packet
node
NOS
NIC
Fiber-optic cable
Which transmission medium transmits data the fastest?
Twisted-pair cable
Coaxial cable
Wireless
Fiber-optic cable
local
A peer-to-peer (P2P) network is an example of ________ administration.
local
wide area
central
corporate
HAN
A ________ is a network located in your residence that connects to all your digital devices.
MAN
WAN
HAN
LAN
network
A computer ________ is two or more computers connected using software and hardware so that they can communicate with each other.
network
switch
broadband
node
Bandwidth
________ is the maximum speed at which data can be transferred between two nodes.
Throughput
Bandwidth
Broadband
Through speed
central
A client/server network is an example of ________ administration.
local
wide area
central
remote
twisted-pair cable
Normal telephone cable is a type of ________.
fiber-optic cable
twisted-pair cable
coaxial cable
Ethernet cable
Routers and switches
Sophisticated networks generally use which of the following hardware devices to ease the flow of data through the network
Routers and switches
USB ports
Firewalls
Firmware
NAS
A(n) ________ device facilitates file sharing and data backup.
NAS
WAN
UTP
NOS
Dial-up
Which of the following is NOT a wired broadband Internet connection option?
A. Cable
B. Dial-up
C. DSL
D. Fiber-optic
network operating system (NOS)
Client/server networks are controlled by a central server that runs specialized software called a(n) ________.
information management system (ISM)
network operating system (NOS)
digital subscriber line (DSL)
service set identifier (SSID)
802.11ab
Which of the following is NOT a standard for wireless fidelity Ethernet networks?
a. 802.11n
b. 802.11g
c. 802.11ab
d. 802.11ac
piggybacking
Using a network without the network owner’s permission is known as ________.
hijacking
spamming
piggybacking
phishing
enable SSID broadcast
All of the following are extra precautions you can take to secure a wireless network EXCEPT ________.
a. change your network name (SSID)
b. enable SSID broadcast
c. turn on security protocols
d. create a passphrase
router
To transfer data packets between two or more networks, a ________ is used.
router
hub
firewall
switch
network adapter
For the nodes on a network to communicate with each other and access the network, each node needs a ________.
DSL modem
network adapter
hub
router
Unshielded coaxial
Which of the following is NOT a type of cable used in wired networks?
a. Unshielded twisted-pair
b. Coaxial
c. Fiber-optic
d. Unshielded coaxial
MAC
The unique number assigned to a network adapter by the manufacturer is referred to as the ________ address.
MAC
IP
SSID
network
intraoffice area network (IAN)
Which of the following is NOT a common network architecture type?
a. local area network (LAN)
b. home area network (HAN)
c. intraoffice area network (IAN)
d. personal area network (PAN)
packets
Data are sent through a network in bundles called ________.
packages
pouches
packets
nodes
analog-to-digital converter
A(n) ________ chip converts sound waves from a voice into digital signal.
analog-to-digital converter
digital convergence
digital signal processor
telephony
.jpg
Which of the following is NOT a video file extension?
a. .jpg
b. .mpg
c. .avi
d. .mov
screen size
A main difference between the tablet and the smartphone is the ________.
operating system
touch-screen interface
screen size
Internet connectivity
a cloud service
What is the easiest way to synch your phone wirelessly?
A cloud service
HDMI
Bluetooth
A secure digital transmission
cell
A ________ is a geographical area with a base transceiver station at its center.
wave
cell
port
hot-spot
Bluetooth
Which of the following uses radio waves to transmit data signals over short distances?
VoIP
Infrared
Wireless access protocol
Bluetooth
microphone and touch screen
The primary input devices for smartphones are ________.
keyboard and mouse
microphone and touch screen
microphone and mouse
touch screen and digital camera
resin
Some 3d printers work by controlling the exact locations where a liquid ________ will be exposed to oxygen and become solid.
silicon
peptides
polymer
resin
A specific operating system for mobile devices
What is iOS?
A specific operating system for mobile devices
A type of application software
A utility program for all mobile digital devices
A form of antivirus software
digital
VoIP uses ________ technology similar to email to transmit voice over the Internet.
digital
analog
binary
IP
.accdb
Which of the following is not an example of a digital music file format?
a. .wav
b. .mp3
c. .aac
d. .accdb
USB
Many mobile devices include a mini- ________ port.
USB
parallel
serial
coaxial
data
A cellular Internet connectivity plan is also known as a ________ plan.
text
data
mobile
network
multimedia message service (MMS)
You can send messages that include photos and videos between mobile devices using ________ technology.
short message service (SMS)
multimedia message service (MMS)
delivery multimedia service (DMS)
multimedia delivery service (MDS)
Sampling rate
Which of the following describes the number of times an analog wave is measured each second during an analog-to-digital conversion?
Converting rate
Conversion rate
Simplifying rate
Sampling rate
JPEG
Which of the following digital image formats compresses the image file?
PDF
WAV
JPEG
MPEG
E-text
________ is digital textual information that can be stored, manipulated, and transmitted by electronic devices.
Short message service
SMTP
E-text
Digital rights management
short message service (SMS)
Text messaging is also called ________.
text messaging system (TMS)
sending messages shortly (SMS)
short text messaging (STM)
short message service (SMS)
Tablet
Which of the following mobile devices has the largest display?
Phablet
Smartphone
Tablet
Feature phone
Play
Google ________ is an online store that delivers software for Android devices.
Fun
Games
Play
Sport
ROM
The operating system of a cell phone is stored in ________.
RAM
the CPU
ROM
an SD card
digital convergence
The term ________ refers to the use of a single unifying device that handles media, Internet, entertainment, and telephone needs.
multimedia message service
telephony
mobile switching center
digital convergence
digital signal processor chip
A(n) ________ is included in a cell phone to handle the compression of data for it to be quickly transmitted to another phone.
analog-to-digital converter
digital signal processor chip
modem
compression utility
excellent reliability during Internet outages or power outages
All of the following are advantages of VoIP EXCEPT ________.
a. low or free cost
b portability
c. excellent reliability during Internet outages or power outages
d. the ability to make calls on a computer from any Wi-Fi hotspot
Digital rights management
________ allows only limited use of media that have been legally purchased.
Digital rights management
Copyright
Copyleft
Synchronizing
1.5 inches
The distance between two near field communication (NFC) devices is` limited to about ________.
1.5 inches
1.5 feet
1.5 meters
10 meters
They can only contain a limited number of characters
Which is true of SMS messages?
They can contain pictures and videos.
They can only contain a limited number of characters.
They are no longer used.
They are used in web page development.
satellites
The global positioning system is a network of 21 ________ plus 3 working spares.
transponders
satellites
base stations
communicators
They are always PDF file formate
Which of the following is NOT true about e-books?
a. You can borrow them from the library.
b. They are always PDF file format.
c. You can annotate them with your own notes.
d. They weigh less than physical books.
HDMI
A(n) ________ cable carries all audio and video information from devices to a connected TV.
HDMI
S component
Ethernet
RJ11
theft of services
All of the following were top cybercrime reported to the ICS EXCEPT
a. identity theft
b. non-auction scam
c. advance free fraud
d. theft of services
phraming
When malicious code is planted on your computer and alters your browser’s ability to find web addresses, it is known as _____.
phishing
pharming
pretexting
polymorphing
launch a denial of service (DoS) attack on your computer
A packet analyzer is a program that can enable a hacker to do all of the following EXCEPT
a. use your debit card information to purchase items illegally
b. assume your identity
c. steal your logons and passwords for various accounts
d. launch a denial of service (DoS) attack on your computer
engineering
Social ______ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive info
engineering
theft
pretexting
pharming
FBI and National White Collar Crime Center
The Internet Crime Complaint Center (IC3) is a partnership between the ________.
FBI and local police departments
FBI and National Defense Department
FBI and National White Collar Crime Center
National White Collar Crime Center and U.S. Department of Defense
grayware
Adware and spyware are referred to collectively as ________.
viruses
grayware
alertware
firmware
Boot-sector
________ viruses are often transmitted by a flash drive left in a USB port.
Logic bomb
Boot-sector
Macro
Time bomb
firewall
A ________ is named after a housing construction feature that slows the spread of fires from house to house.
firehouse
firebreak
firewall
fire extinguisher
macro virus
A ________ is a virus that is attached to documents such as Word or Excel files.
script virus
macro virus
polymorphic virus
Trojan horse
time bomb
A ________ is a virus that is triggered on a certain date.
worm
macro
logic bomb
time bomb
printing a document
All of the following activities may infect your computer with a virus EXCEPT ________.
a. sharing flash drives
b. downloading video files from peer-to-peer sites
c. downloading or running an e-mail attachment file
d. printing a document
White-hate
________ hackers break into systems for non-malicious reasons such as to test system security vulnerabilities.
Black-hat
Gray-hat
White-hat
Green-hat
Spyware
_______ is a program that gathers information about your surfing habits without your knowledge.
Adware
Ghostware
Shareware
Spyware
Cookies obtain your personal info by searching your hard drive
Which of the following statements about cookies is NOT true?
a. Cookies obtain your personal information by searching your hard drive.
b. Cookies are text files.
c. Cookies help companies determine the traffic flow through their website.
d. Some companies sell the personal information found in cookies to other companies.
polymorphic
Which of the following classifications of viruses can change its own code to avoid detection?
Stealth
Multipartite
Polymorphic
Worm
Cybercrime
Which of the following is formally defined as any criminal action perpetrated primarily through the use of a computer?
Social networking
Cybercrime
Phishing
Hacking
the wavy hard-to-read letter and number sequence that you type to prove that you are human to a website
CAPTCHA is ________.
antivirus software
password method
the wavy hard-to-read letter and number sequence
that you type to prove that you are human to a
website
a rootkit virus
uses a dictionary to find a lengthy word that is easy to remember
Rules for creating passwords include all of the following EXCEPT ________.
a. keep your password a secret
b. change your password frequently
c. use a dictionary to find a lengthy word that is easy to remember
d. use letters, numbers and symbols in your passwords
cyberloafing
Using your computer for non-work activities while you are being paid to work is known as ________.
cyberloafing
cybersleeping
cyberlazing
cyberbreaking
virus signature
A(n) ________ is the portion of virus code that is unique to a particular computer virus.
virus signature
encryption code
compression code
virus pattern
placing a found virus in a secure area on the hard drive
With regard to computer protection, quarantining is defined as ________.
updating your antivirus software
placing a found virus in a secure area on the hard drive
repairing an infected file
deleting an infected file
a time bomb
Which type of virus was the famous Michelangelo virus?
A worm
A time bomb
A script virus
An e-mail virus
people pretending to represent official organizations such as the Dept. of Homeland Security or IRS
FBI-related scams involve ________.
A. people pretending to represent official organizations such as the Dept. of Homeland Security or IRS
B. running auctions that do not exist
C. convincing people to send money as a “good faith” gesture
D. collecting funds and not delivering the goods
computer viruses
Creating and distributing ________ is one of the most widespread types of cybercrime.
spam
computer viruses
cookies
zombies
a firewall
You can block logical ports from invaders and make your computer invisible to others on the Internet by installing ________.
a packet sniffer
a firewall
a packet filter
antivirus software
charming
Which of the following is NOT a virus category?
a. worm
b. logic bomb
c. macro
d. pharming
A DDoS attack
________ floods a computer with requests until it shuts down and refuses to answer any requests for information.
A Trojan horse
A polymorphic virus
A DDoS attack
Pretexting
rootkit
A ________ allows a hacker to gain access to your computer and take almost complete control of it without your knowledge.
denial of service (DoS)
zombie
logic bomb
rootkit
worm
A(n) ________ takes advantage of file transport methods to spread on its own.
worm
script virus
encryption virus
macro virus
logical port blocking
Configuring a firewall to ignore all incoming packets that request access to a specific port is known as ________.
packet filtering
packet switching
static addressing
logical port blocking