A data file contains instructions for a computer on how to perform a specific task.
An ergonomic keyboard is one that has been designed to fit the ntural placement of your hands
An external peripheral device must have a cable that connects it to the computer
Any USB device can use any USB port, and for most devices power is supplied via the port so there is no need for extra power cable.
Flash memory is similar to ROM except that it can be written to more than once.
The five essential components of data communications are a sender, a receiver, a channel, a protocol, and a medium.
The Internet is the largest newtork in the world.
A firewall can be either hardwae or software.
Operating environments, provide a textual user (TUI) that acts as a liaison between the user and all of the computer’s hardware and software.
_____ is/are the intangible components of a computer system.
_____ are instructions to a computer on how to process data.
The ___ is mounted on the motherboard and is responsible for executing instructons to process data.
____ are removable circuit boards that are inserted into slots on the motherboard to expand the capabilities of the motherboard.
Monitors are divided into a matrix of samll dots called.
An inkjet printer’s speed is measured in
For most USB devices, power is supplied via
A computer interprets every signal as either “or” or “off” using numbers known as
Because a computer can access _____ memory more quickly than RAM, frequently and recently accessed data and commands are stored there instead of in RAM
____ is the set of instructions tht tells a computer to initialize the motherboard, how to recognize devices connected to the coomputer, and to start the boot process.
A(n) _____ file contains the instructions that tell a computer how to perform a specific task.
A ______ connects devices on a network so all the devices can access network components.
The Internet is the largest example of a
____ is a program that tracks a computer user’s Internet usage and sends this data back to the company or person who created it, without the user’s knowledge.
A(n) ___ is like a locked door on your computer.
Sending an e-mail message to custumers or potential or potential customers of a legitimate website asking them to click a link that leads to a spoofed site is known as
Software can be divided into two major categories
system and application
____ is a computer’s ability to start and run more than one program at a time
____ means that data, applications, and even resources are stored on servers accessed over the Internet rather than on users’ computers.