1,658
8
Essay, 14 pages (3500 words)

Cs 104 final

File HistoryUtility that automatically creates duplicates of your libraries, desktops, contacts and favorites to another storage location.
System Restore
Time Capsules
File History
Carbonite

D. It is only for super computersWhich of the following capabilities of the UNIX is FALSE?
A. It is a multiuser
B. It is multitasking.
C. It is a network OS.
D. It is only for super computers.

file pathC: WindowsSystem32driversetcprotocol is an example of a ___

OneDriveWindows 10 uses a(n) ________ account for easy access and storage of online files.
iCloud
Chrome
OneDrive
eye OS

Disk DefragmenterWindows utility programs that arranges pieces of files on your hard drive to allow for faster access
Disk Cleanup
Disk Defragmenter
Error-checking
Task Manager

Android and iOSWhich operating systems are used on most tablets?
Windows and iOS
Windows and Android
Android and iOS
BlackBerry and Windows

B. DesktopWhich of the following is NOT a Windows utility program
A. Disk Cleanup
B. Desktop
C. Disk Defragmenter
D. System Restore

A. : All of the following can be used in an OS X file name EXCEPT ________.
A. :
B. #
C. %
D. $

point and click technologyThe Mac OS was the first commercially available OS to incorporate
networking
color graphics
sound
point and click technology

file pathThe location of a file is specified by its ________.
drive identifier
file path
file type
file extension

bugsIn the late 1980s, computer specialists were concerned that proprietary software had too many ________, so they started working on open source projects.
worms
trojans
bugs
spiders

Windowsa proprietary OS for desktop and laptop computers
Windows
iOS
Android
Linux

User interfaceThe ________ of the operating system enables users to communicate with the computer system.
window
modem
network adapter card
user interface

Task ManagerYou can use the Windows ________ to check on a nonresponsive program.
System Restore
Backup utility
Error-checking
Task Manager

Linusthe operating system most supercomputers use
UNIX
Linux
Windows
iOS

DetailsWhen using Windows File Explorer, which view provides the most information at a glance?
List
Content
Tiles
Details

TrashDeleted files on a Mac computer are moved to the ________.

The BIOS is activated by turning on the computerWhat is the first step in the boot process?
The BIOS is activated by turning on the computer.
The BIOS checks that all devices are in place.
The OS is loaded into RAM.
Configuration and customization settings are checked

ROMThe basic input/output system (BIOS) is stored on a ________ chip
ROM
CPU
RAM
CMOS

File CompressionUtility that temporarily removes redundancies in a file to reduce the file size?
Disk Cleanup
File Compression
Error-checking
Disk Defragmenter

AppleOS X is the operating system developed by ________.
Apple
Microsoft
Google
Linux

Virtual memoryUsing hard disk space to temporarily store data or instructions from RAM is referred to as the ________.
spool
interrupt sequencer
compressor
virtual memory

Google and AppleMost smartphones use operating systems developed by ________.

B. application programming interface (API)Which of the following is NOT a user interface?
A. Command-driven
B. application programming interface (API)
C. menu-driven
D. graphical user interface (GUI)

D. USBAll of the following are terms related to part of the boot process EXCEPT ________.
A. ROM
B. CMOS
C. RAM
D. USB

rootC: denotes a(n) ________ directory that is at the top of the filing structure of a computer.
top-level
cluster
root
upper-level

A. inventory. xlsxWhich of the following is the name of a Microsoft Excel file?
A. inventory. xlsx
B. inventory. wpd
C. inventory. accdb
D. inventory. pdf

MS-DOSAll of the following are examples of network operating systems EXCEPT ________.
A. Windows 10
B. Linus
C. OS X
D. MS-DOS

device driverEach device attached to your computer has a special program called a(n) ________ that enables the device and operating system to communicate with each other.
device driver
translator
interpreter
device configurator

operating systemThe two major types of system software programs are utility programs and the ________.
charms
application software
user interface
operating system

inside the CPU, itselfSome of the cache memory of a CPU is ________.
inside the CPU, itself
on the hard disk drive
on a nearby SSD
in cloud storage

A laser burns tiny pits onto a platterHow do optical discs store data?
A laser burns tiny pits onto a platter.
A magnet aligns iron particles on a platter.
Electronic memory records data on chips.
A digital spectrometer leaves grooves in a platter.

overclockingRunning the CPU at a faster speed than the manufacturer recommends
fetching
latency
overclocking
hyperthreading

8How many channels are in a Dolby 7. 1 Surround Sound System

USBWhich of the following ports is NOT used to connect to a video card?
A. HDMI
B. DVI
C. USB
D. DisplayPort

volatileRAM is an example of ________ storage.

overwritten multiple timesTo securely erase data, the U. S. Department of Defense suggests that data be ________.
overwritten multiple times
deleted
encoded
refactored

threeThere are ________ levels of cache memory in the Intel i7 processor.

CPUThe control unit is one component of the ________.
CPU
cache
front side bus
clock

clear out unnecessary filesRunning the Disk Cleanup utility is a quick way to ________.
defrag your hard drive
remove spyware programs
clear out unnecessary files
clean out your Startup folder

DDR3In most current systems, ________ is the type of RAM used.
DDR2
DDR3
DRAM
SDRAM

An accumulation of temporary Internet files has not effect on your computer’s overall performanceWhich statement pertaining to system reliability is FALSE?
A. Having the latest version of software products can make your system more reliable.
B. An accumulation of temporary Internet files has no effect on your computer’s overall performance.
C. You can clean out unnecessary programs from your Startup folder.
D. When you defrag your hard drive, it works more efficiently.

Speed of the motherboardWhich of the following does NOT determine processor power?
A. Clock speed
B. Number of cores
C. Amount of cache memory
D. Speed of the motherboard

SuperFetchWindows uses a memory-management technique known as ________ to monitor which applications you use most frequently. It preloads them into your system memory.
SuperGet
SuperFetch
SuperTake
SuperRetrieve

The control unit and the arithmetic logic unitThe CPU consists of which two parts?

sound cardA ____ enables the computer to drive the speaker system
HDMI
display port
sound card
PCI bus

Performs arithmetic calculationsWhich of the following activities is carried out by the ALU?
A. Moves read/write heads
B. Performs arithmetic calculations
C. Creates virtual memory
D. Renders video images

Random access memoryWhich of the following is NOT a permanent storage option?
A. Optical drive
B. Random access memory
C. Internal hard drive
D. Memory stick

GBThe amount of RAM storage is measured in ___

RefreshTo remove all the changes made to your system, the Windows ________ utility returns your computer to the state it was in when it came from the factory.
Backup
Erase
Restore
Refresh

Hyper threading________ provides high-speed information processing by enabling a new set of instructions to start before the previous set is finished.
Multitasking
Cache memory
Hyperthreading
Overclocking

solid-state driveA ________ uses electronic memory and has no motors or moving parts.
mechanical hard drive
solid-state drive
Blu-ray disc
digital video disc

TabletWhich is the lightest computer?

Moore’sThe rule of thumb that predicts that the number of transistors on a CPU will double every 2 years is called ________ Law.

GPUTo speed up the display of graphics, a(n) ______ is installed on some video cards
GPU
CPU
ALU
SSD

Make the hard drive work more efficientlyRunning the Disk Defragmenter utility will ________.
detect and remove spyware
mark bad memory cells
make the hard drive work more efficiently
clean out your Startup folder

millisecondsWhen referring to hard drives, access time is measured in ________.

mechanical hard driveThe ________ has the largest capacity of any storage device.
CD
SSD
DVD
mechanical hard drive

encodeAll of the following are part of the machine cycle EXCEPT ________.
A. fetch
B. encode
C. execute
D. store

IntelThe processor market for desktop and laptop computers is dominated by ________.
IBM
Microsoft
Intel
Apple

radio wavesWireless network devices use ________ to communicate with each other.
fiber optics
satellites
radio waves
DSL

UnixAll of the following operating systems support P2P networking EXCEPT ________.
A. Windows
B. OS X
C. Unix
D. Linux

network administratorSome of the responsibilities of a(n) ________ are installing new hardware and software on the network and monitoring performance.
programmer analyst
IT manager
computer technician
network administrator

switchOn a network, a(n) ________ helps prevent data packets from colliding with each other.
access point
hub
adapter
switch

MANA large network designed to provide access to a specific geographic area, such as a large city, is a ________.
MAN
PAN
LAN
WAN

WANA network that spans a large physical distance is called a ________.
MAN
LAN
PAN
WAN

unshielded twisted-pair (UTP)The most popular transmission media option for wired home Ethernet networks is ________ cable.
fiber-optic
power-line
unshielded twisted-pair (UTP)
coaxial

Cat 7BWhich of the following is NOT a type of UTP cable you would use in a wired Ethernet network?
A. Cat 5E
B. Cat 6
C. Cat 6A
D. Cat 7B

Throughput________ is the actual speed of data transfer that is achieved and is always less than or equal to the data transfer rate.
Benchmark
Broadband
Bandwidth
Throughput

nodeA ________ is any device connected to a network such as a computer, printer, or game console.
packet
node
NOS
NIC

Fiber-optic cableWhich transmission medium transmits data the fastest?
Twisted-pair cable
Coaxial cable
Wireless
Fiber-optic cable

localA peer-to-peer (P2P) network is an example of ________ administration.
local
wide area
central
corporate

HANA ________ is a network located in your residence that connects to all your digital devices.
MAN
WAN
HAN
LAN

networkA computer ________ is two or more computers connected using software and hardware so that they can communicate with each other.
network
switch
broadband
node

Bandwidth________ is the maximum speed at which data can be transferred between two nodes.
Throughput
Bandwidth
Broadband
Through speed

centralA client/server network is an example of ________ administration.
local
wide area
central
remote

twisted-pair cableNormal telephone cable is a type of ________.
fiber-optic cable
twisted-pair cable
coaxial cable
Ethernet cable

Routers and switchesSophisticated networks generally use which of the following hardware devices to ease the flow of data through the network
Routers and switches
USB ports
Firewalls
Firmware

NASA(n) ________ device facilitates file sharing and data backup.
NAS
WAN
UTP
NOS

Dial-upWhich of the following is NOT a wired broadband Internet connection option?
A. Cable
B. Dial-up
C. DSL
D. Fiber-optic

network operating system (NOS)Client/server networks are controlled by a central server that runs specialized software called a(n) ________.
information management system (ISM)
network operating system (NOS)
digital subscriber line (DSL)
service set identifier (SSID)

802. 11abWhich of the following is NOT a standard for wireless fidelity Ethernet networks?
a. 802. 11n
b. 802. 11g
c. 802. 11ab
d. 802. 11ac

piggybackingUsing a network without the network owner’s permission is known as ________.
hijacking
spamming
piggybacking
phishing

enable SSID broadcastAll of the following are extra precautions you can take to secure a wireless network EXCEPT ________.
a. change your network name (SSID)
b. enable SSID broadcast
c. turn on security protocols
d. create a passphrase

routerTo transfer data packets between two or more networks, a ________ is used.
router
hub
firewall
switch

network adapterFor the nodes on a network to communicate with each other and access the network, each node needs a ________.
DSL modem
network adapter
hub
router

Unshielded coaxialWhich of the following is NOT a type of cable used in wired networks?
a. Unshielded twisted-pair
b. Coaxial
c. Fiber-optic
d. Unshielded coaxial

MACThe unique number assigned to a network adapter by the manufacturer is referred to as the ________ address.
MAC
IP
SSID
network

intraoffice area network (IAN)Which of the following is NOT a common network architecture type?
a. local area network (LAN)
b. home area network (HAN)
c. intraoffice area network (IAN)
d. personal area network (PAN)

packetsData are sent through a network in bundles called ________.
packages
pouches
packets
nodes

analog-to-digital converterA(n) ________ chip converts sound waves from a voice into digital signal.
analog-to-digital converter
digital convergence
digital signal processor
telephony

. jpgWhich of the following is NOT a video file extension?
a. . jpg
b. . mpg
c. . avi
d. . mov

screen sizeA main difference between the tablet and the smartphone is the ________.
operating system
touch-screen interface
screen size
Internet connectivity

a cloud serviceWhat is the easiest way to synch your phone wirelessly?
A cloud service
HDMI
Bluetooth
A secure digital transmission

cellA ________ is a geographical area with a base transceiver station at its center.
wave
cell
port
hot-spot

BluetoothWhich of the following uses radio waves to transmit data signals over short distances?
VoIP
Infrared
Wireless access protocol
Bluetooth

microphone and touch screenThe primary input devices for smartphones are ________.
keyboard and mouse
microphone and touch screen
microphone and mouse
touch screen and digital camera

resinSome 3d printers work by controlling the exact locations where a liquid ________ will be exposed to oxygen and become solid.
silicon
peptides
polymer
resin

A specific operating system for mobile devicesWhat is iOS?
A specific operating system for mobile devices
A type of application software
A utility program for all mobile digital devices
A form of antivirus software

digitalVoIP uses ________ technology similar to email to transmit voice over the Internet.
digital
analog
binary
IP

. accdbWhich of the following is not an example of a digital music file format?
a. . wav
b. . mp3
c. . aac
d. . accdb

USBMany mobile devices include a mini- ________ port.
USB
parallel
serial
coaxial

dataA cellular Internet connectivity plan is also known as a ________ plan.
text
data
mobile
network

multimedia message service (MMS)You can send messages that include photos and videos between mobile devices using ________ technology.
short message service (SMS)
multimedia message service (MMS)
delivery multimedia service (DMS)
multimedia delivery service (MDS)

Sampling rateWhich of the following describes the number of times an analog wave is measured each second during an analog-to-digital conversion?
Converting rate
Conversion rate
Simplifying rate
Sampling rate

JPEGWhich of the following digital image formats compresses the image file?
PDF
WAV
JPEG
MPEG

E-text________ is digital textual information that can be stored, manipulated, and transmitted by electronic devices.
Short message service
SMTP
E-text
Digital rights management

short message service (SMS)Text messaging is also called ________.
text messaging system (TMS)
sending messages shortly (SMS)
short text messaging (STM)
short message service (SMS)

TabletWhich of the following mobile devices has the largest display?
Phablet
Smartphone
Tablet
Feature phone

PlayGoogle ________ is an online store that delivers software for Android devices.
Fun
Games
Play
Sport

ROMThe operating system of a cell phone is stored in ________.
RAM
the CPU
ROM
an SD card

digital convergenceThe term ________ refers to the use of a single unifying device that handles media, Internet, entertainment, and telephone needs.
multimedia message service
telephony
mobile switching center
digital convergence

digital signal processor chipA(n) ________ is included in a cell phone to handle the compression of data for it to be quickly transmitted to another phone.
analog-to-digital converter
digital signal processor chip
modem
compression utility

excellent reliability during Internet outages or power outagesAll of the following are advantages of VoIP EXCEPT ________.
a. low or free cost
b portability
c. excellent reliability during Internet outages or power outages
d. the ability to make calls on a computer from any Wi-Fi hotspot

Digital rights management________ allows only limited use of media that have been legally purchased.
Digital rights management
Copyright
Copyleft
Synchronizing

1. 5 inchesThe distance between two near field communication (NFC) devices is` limited to about ________.
1. 5 inches
1. 5 feet
1. 5 meters
10 meters

They can only contain a limited number of charactersWhich is true of SMS messages?
They can contain pictures and videos.
They can only contain a limited number of characters.
They are no longer used.
They are used in web page development.

satellitesThe global positioning system is a network of 21 ________ plus 3 working spares.
transponders
satellites
base stations
communicators

They are always PDF file formateWhich of the following is NOT true about e-books?
a. You can borrow them from the library.
b. They are always PDF file format.
c. You can annotate them with your own notes.
d. They weigh less than physical books.

HDMIA(n) ________ cable carries all audio and video information from devices to a connected TV.
HDMI
S component
Ethernet
RJ11

theft of servicesAll of the following were top cybercrime reported to the ICS EXCEPT
a. identity theft
b. non-auction scam
c. advance free fraud
d. theft of services

phramingWhen malicious code is planted on your computer and alters your browser’s ability to find web addresses, it is known as _____.
phishing
pharming
pretexting
polymorphing

launch a denial of service (DoS) attack on your computerA packet analyzer is a program that can enable a hacker to do all of the following EXCEPT
a. use your debit card information to purchase items illegally
b. assume your identity
c. steal your logons and passwords for various accounts
d. launch a denial of service (DoS) attack on your computer

engineeringSocial ______ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive info
engineering
theft
pretexting
pharming

FBI and National White Collar Crime CenterThe Internet Crime Complaint Center (IC3) is a partnership between the ________.
FBI and local police departments
FBI and National Defense Department
FBI and National White Collar Crime Center
National White Collar Crime Center and U. S. Department of Defense

graywareAdware and spyware are referred to collectively as ________.
viruses
grayware
alertware
firmware

Boot-sector________ viruses are often transmitted by a flash drive left in a USB port.
Logic bomb
Boot-sector
Macro
Time bomb

firewallA ________ is named after a housing construction feature that slows the spread of fires from house to house.
firehouse
firebreak
firewall
fire extinguisher

macro virusA ________ is a virus that is attached to documents such as Word or Excel files.
script virus
macro virus
polymorphic virus
Trojan horse

time bombA ________ is a virus that is triggered on a certain date.
worm
macro
logic bomb
time bomb

printing a documentAll of the following activities may infect your computer with a virus EXCEPT ________.
a. sharing flash drives
b. downloading video files from peer-to-peer sites
c. downloading or running an e-mail attachment file
d. printing a document

White-hate________ hackers break into systems for non-malicious reasons such as to test system security vulnerabilities.
Black-hat
Gray-hat
White-hat
Green-hat

Spyware_______ is a program that gathers information about your surfing habits without your knowledge.
Adware
Ghostware
Shareware
Spyware

Cookies obtain your personal info by searching your hard driveWhich of the following statements about cookies is NOT true?
a. Cookies obtain your personal information by searching your hard drive.
b. Cookies are text files.
c. Cookies help companies determine the traffic flow through their website.
d. Some companies sell the personal information found in cookies to other companies.

polymorphicWhich of the following classifications of viruses can change its own code to avoid detection?
Stealth
Multipartite
Polymorphic
Worm

CybercrimeWhich of the following is formally defined as any criminal action perpetrated primarily through the use of a computer?
Social networking
Cybercrime
Phishing
Hacking

the wavy hard-to-read letter and number sequence that you type to prove that you are human to a websiteCAPTCHA is ________.
antivirus software
password method
the wavy hard-to-read letter and number sequence
that you type to prove that you are human to a
website
a rootkit virus

uses a dictionary to find a lengthy word that is easy to rememberRules for creating passwords include all of the following EXCEPT ________.
a. keep your password a secret
b. change your password frequently
c. use a dictionary to find a lengthy word that is easy to remember
d. use letters, numbers and symbols in your passwords

cyberloafingUsing your computer for non-work activities while you are being paid to work is known as ________.
cyberloafing
cybersleeping
cyberlazing
cyberbreaking

virus signatureA(n) ________ is the portion of virus code that is unique to a particular computer virus.
virus signature
encryption code
compression code
virus pattern

placing a found virus in a secure area on the hard driveWith regard to computer protection, quarantining is defined as ________.
updating your antivirus software
placing a found virus in a secure area on the hard drive
repairing an infected file
deleting an infected file

a time bombWhich type of virus was the famous Michelangelo virus?
A worm
A time bomb
A script virus
An e-mail virus

people pretending to represent official organizations such as the Dept. of Homeland Security or IRSFBI-related scams involve ________.
A. people pretending to represent official organizations such as the Dept. of Homeland Security or IRS
B. running auctions that do not exist
C. convincing people to send money as a ” good faith” gesture
D. collecting funds and not delivering the goods

computer virusesCreating and distributing ________ is one of the most widespread types of cybercrime.
spam
computer viruses
cookies
zombies

a firewallYou can block logical ports from invaders and make your computer invisible to others on the Internet by installing ________.
a packet sniffer
a firewall
a packet filter
antivirus software

charmingWhich of the following is NOT a virus category?
a. worm
b. logic bomb
c. macro
d. pharming

A DDoS attack________ floods a computer with requests until it shuts down and refuses to answer any requests for information.
A Trojan horse
A polymorphic virus
A DDoS attack
Pretexting

rootkitA ________ allows a hacker to gain access to your computer and take almost complete control of it without your knowledge.
denial of service (DoS)
zombie
logic bomb
rootkit

wormA(n) ________ takes advantage of file transport methods to spread on its own.
worm
script virus
encryption virus
macro virus

logical port blockingConfiguring a firewall to ignore all incoming packets that request access to a specific port is known as ________.
packet filtering
packet switching
static addressing
logical port blocking

ONCS 104 FINAL SPECIFICALLY FOR YOUFOR ONLY$13. 90/PAGEOrder NowTags:

  • Android
  • Bluetooth
  • Digital Camera
  • iOS
  • Smartphone

Thank's for Your Vote!
Cs 104 final. Page 1
Cs 104 final. Page 2
Cs 104 final. Page 3
Cs 104 final. Page 4
Cs 104 final. Page 5
Cs 104 final. Page 6
Cs 104 final. Page 7
Cs 104 final. Page 8
Cs 104 final. Page 9

This work, titled "Cs 104 final" was written and willingly shared by a fellow student. This sample can be utilized as a research and reference resource to aid in the writing of your own work. Any use of the work that does not include an appropriate citation is banned.

If you are the owner of this work and don’t want it to be published on AssignBuster, request its removal.

Request Removal
Cite this Essay

References

AssignBuster. (2022) 'Cs 104 final'. 21 September.

Reference

AssignBuster. (2022, September 21). Cs 104 final. Retrieved from https://assignbuster.com/cs-104-final/

References

AssignBuster. 2022. "Cs 104 final." September 21, 2022. https://assignbuster.com/cs-104-final/.

1. AssignBuster. "Cs 104 final." September 21, 2022. https://assignbuster.com/cs-104-final/.


Bibliography


AssignBuster. "Cs 104 final." September 21, 2022. https://assignbuster.com/cs-104-final/.

Work Cited

"Cs 104 final." AssignBuster, 21 Sept. 2022, assignbuster.com/cs-104-final/.

Get in Touch

Please, let us know if you have any ideas on improving Cs 104 final, or our service. We will be happy to hear what you think: [email protected]