Hard drives have been growing in storage capacity by about 50% each year.
True
Desktop computer systems are less reliable than laptop computers.
False
The use of multiple cores on one CPU chip allows the execution of two or more sets of instructions at the same time.
True
Accessing data from the hard drive to send to the CPU is faster than accessing data from RAM.
False
The heads of a hard disk drive touch the surface of the platter to read or write the data.
False
Optical discs store data using tiny pits and lands.
True
Video cards include their own RAM.
True
When using multiple monitors, you must have multiple video cards.
False
If you reformat the hard drive on a computer, it erases all personal information from your computer and makes it safe to donate.
False
Limiting your signal range does not help increase wireless network security.
False
The Internet is a WAN.
True
In a peer-to-peer network, one computer acts as the central computer.
False
Most computers today come with Ethernet adapters already installed.
True
Wireless network connections are slower than wired broadband connections.
True
Wireless networks are more vulnerable to attack than wired networks.
True
VoIP stands for Voice over Internet Protocol.
True
A tablet uses a full traditional operating system.
False
Every new cell/smartphone has to include a GPS chip.
True
iPhones let you add SD flash cards.
False
There are more virus attacks on cell phone and smartphones than there are on PCs.
False
With Skype software installed on your phone, you can call any phone number for free.
False
When converting analog waves to a series of numerical values, the higher the sampling rate, the more accurately the original wave can be re-created.
True
The conversion rate is the number of times per second that the analog signal is measured and converted into a digital value.
False
Smartphones all use the Android operating system.
False
Raw files are larger than JPEG files.
True
DRM-free music can legally be moved from system to system.
True
An encryption virus replicates itself onto a hard drive's master boot record.
False
A stealth virus is designed to infect multiple file types to fool the antivirus software.
False
To create a secure password, you should use a mixture of uppercase letters, lowercase letters, and symbols.
True
Ethical hackers are also known as white-hat hackers.
True
Creating and spreading online viruses is a cybercrime.
True
All viruses cause serious destruction of computer data.
False
A macro virus is a virus that is attached to a file such as a Word document or Excel workbook.
True
A virus signature is a portion of virus code that is unique to a particular computer virus.
True
A zombie is another person's computer controlled by a hacker.
True
The tag informs a browser that the text that follows the tag should be italicized.
True
The United States government is in charge of the Internet.
False
Client-side programs run on a web server rather than on your computer.
False
Most instant messaging services provide a high level of encryption for their messages.
False
An applet is a small application that resides on a server but is downloaded to, and run on, the client computer.
True
FTP enables files to be downloaded or uploaded between computers.
True
When using packet switching, packets are always sent over the same route.
False
LinkedIn is one the most popular instant messaging services.
False