comp 5 chp: 4,5,and 6

1 July 2023
4.4 (235 reviews)
90 test answers

Unlock all answers in this set

Unlock answers (86)
question
chasis
answer
another term for the system unit
question
system unit
answer
is a case on a desktop
question
system board
answer
is the main circuit board of the system unit
question
computer chip
answer
is a small piece of semiconducting material, usually silicon, on which integrated circuits are etched
question
clock speed
answer
is measured by the number of ticks per second
question
one gigahertz GHz
answer
one billion
question
RAM
answer
most common type of volatile memory
question
Flash memory
answer
type of nonvolatile memory that can be erased electronically and rewritten
question
Plug and Play
answer
mans the computer automatically can configure cards like the one in the accompanying figure and other peripherals as users install them
question
hertz
answer
unit of measurement for the clock speed
question
usage
answer
battery life depends
question
It is a single chip with two or more separate processor cores
answer
What is unique about a multi-core processor.
question
Intel and AMD
answer
The two leading manufactures of personal computer processor chips
question
binary system
answer
numbering system uses only the numbers 0 and 1
question
terabyte (TB)
answer
largest amount of memory storage
question
the type of software you plan to use
answer
When determining the amount of RAM necessary for a computer you wish to purchase, what should you consider?
question
digital security risk
answer
is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability
question
script kiddie
answer
has the same intent as a cracker, but does not gave the technical skills and knowledge
question
cyberterrorist
answer
someone who uses the Internet or network to destroy or damage computers for political reasons.
question
malware
answer
computer viruses, worms, Trojan horses, and rootkits
question
bot
answer
term for a program that performs a repetitive task on a network
question
password
answer
users entering a private combination of characters associated with a user name that allows access to certain computer resources.
question
decryption
answer
to read encrypted data, the recipient must decipher into a readable form
question
secure site
answer
website that uses encryption techniques to protect its data
question
backing up
answer
making a copy of a file
question
They restore the files
answer
In the case of system failure or the discovery of corrupted files, what do users do to the backed-up files when they bring the files o their original location on a computer?
question
intellectual property
answer
the rights to which creators are entitled for their work
question
cookie
answer
a small text file that a web server stores on a user's computer
question
phishing
answer
a scam in which a perpetrator sends an official looking email that attempts to obtain a user's personal and financial information
question
spyware
answer
Internet advertising uses to collect information about users web browsing habits
question
Electronic Communications Privacy Act (ECPA)
answer
laws that provides the same protection that covers mail and telephone communications to electronic communications such as voice mail
question
content filtering
answer
the process of restricting access to certain material on the web
question
cracker
answer
someone who access a computer or network illegally with the intent of malicious action
question
Information kept on an organization's premises has a higher security risk than information transmitted over networks
answer
Statement not true about Internet and network attacks
question
a worm
answer
term that describe a program that copies itself repeatedly, using up resources and possibly shutting down the computer or network
question
a rootkit
answer
term that describes a program that hides in a computer and allows someone from a remote location to take full control of the computer
question
Malware
answer
general term for programs that act without a user's knowledge and deliberately alter the computer's operations
question
The term payload, as it pertains to computer crime, is define as
answer
the destructive event or prank the program is intended to deliver
question
the term, botnet, means
answer
a group of compromised computers connected to a network that attacks other networks
question
the term back door, as it refers to computer crime is
answer
a program or set of instructions that allows users to bypass security controls when accessing a program, computer, or network
question
The term firewall is
answer
hardware and/or software that protects a network's resources from intrusion
question
digital forensics
answer
describe the discovery, collection, and analysis of evidence found on computers and networks
question
product activation
answer
You have just provided the identification number that associates your new software purchase with the mobile device on which you installed the software
question
content filtering
answer
the process of restricting access to certain material on the web
question
PDF
answer
kind of file that Adobe Reader allow you to view
question
adware
answer
program that displays an online advertisement in a banner or a pop-up window on webpages, email, or other Internet service
question
Instagram
answer
example of sharing app
question
Define retail software
answer
is mass-produced, copyrighted software that meets the needs of a wide variety of users, not just a single user or company. You can buy retail software from local stores and on the web.
question
Define custom software
answer
performs functions specific to a business or industry.
question
Define web application
answer
application store on a web server that you access through a browser
question
Define open source software
answer
is software provided for use, modification, and redistribution. This software has no restrictions from the copyrighted
question
Define shareware
answer
is copyrighted software that is distributed at no cost for a trial period.
question
spyware
answer
a program has been placed on your smartphone without your knowledge and it is collecting personal information about you
question
open source software
answer
has no restrictions from the copyright holder regarding modification of the software's internal instructions and its redistribution.
question
pop-up blocker
answer
filtering program that stops pop-up ads from displaying on web pages
question
uninstaller
answer
utility that removes a program, as any associated entries in the system files
question
a worm
answer
a program that copies itself repeatedly, using resources and possibly shutting down the computer or network
question
personal firewall
answer
utility that detects and protects a computer from unauthorized instructions
question
software suite
answer
a collection of individual programs sold as a unit
question
word processing
answer
software that allows users to create and manipulate documents containing mostly text and sometimes graphics
question
file compression
answer
utilities shrink the size of a file
question
product activation
answer
a technique to ensure software is not installed on more computers than legally licensed
question
presentation
answer
software that allows users to create visual aids for presentation to communicate ideas, messages, and other information to a group
question
database
answer
a collection of data organized in a manner that allows access, retrieval, and use of that data
question
disk cleanup
answer
tool that researches for and removes unnecessary files
question
paint
answer
software that allows users to draw pictures, shapes, and other graphical images with various on-screen tools such as a pen, brush, and eyedropper
question
virus signature
answer
antivirus programs look for a specific pattern of virus code.
question
application
answer
software that consist of programs designed to make users more productive and/or assist them with personal task
question
Define virus
answer
is a potentially damaging program that affect, or infects, a computer negatively by altering the way the computer works without the user's knowledge or permission.
question
Define worm
answer
resides in active memory and replicates itself over a network to infect computers and devices, using up the system resources and possibly shutting down the system
question
Define Trojan horse
answer
is a destructive program disguised as real program, such as a screen saver.
question
Define rootkit
answer
is a program that easily can hide and allow someone to take full control of your computer from remote location, often for nefarious purposes.
question
public-domain
answer
software that can be distributed by anyone to others at no cost
question
DTP
answer
is a software that enables professional designers to create sophisticated documents contain text, graphics, and many colors
question
CAD
answer
programs that allows designers to rotate designs of 3-D objects to view them from any angle
question
6 sing of virus infection
answer
a program of file suddenly is missing, a file becomes corrupted, system properties change, a program or file does not work properly, the available memory is less than what should be available, the computer operates much slower than usual.
question
How should schools deal with Internet Plagarism
answer
By discuss the consequences with the students and make them relies that plagiarism is a form of cheating. Make a honest environment and give students tools to make their own work
question
clip art
answer
a collection of electronic drawings, photos, and other images that can be inserted into documents
question
defragmenting
answer
improve your computer performance by storing all related for a particular program together.
question
synchronization
answer
capability that allows your new calendar application to make sure that your mobile device and your corporation's server both have the latest version of any updated information.
question
educational
answer
application that teaches a particular skill.
question
8 tips to safeguard personal information
answer
Install firewall, do not reply spam, purchase goods with cash, install a cookie manager, limit the amount of information you provide to websites, clear your history file when finish browsing, request in writing to be remove of mailing list, do not preprint your phone number or Social Security number on personal checks.
question
measures you can take to safe guard your computer
answer
use routers and firewalls, disable macros security settings, keep software updated, stay informed.
question
four types of software theft
answer
physically stealing software, intentionally erasing software, illegal registration/activation, illegal copying.
question
threats in cloud storage
answer
malware, attempt to gain access to passwords, data interception, law enforcement's access to data
question
tips for safety cloud computing
answer
build a strong password and change it often. website address begins with https. data is encrypted
question
Why a home business might use cloud computing
answer
accessibility, cost savings, space savings, scalability
question
services of cloud computing
answer
storage as a service, software as a service, data as a service, platform as a service,
question
methods to conserve battery life
answer
when battery is new charge it completely, do not turn device on and off multiple times, do not unplug battery until is completely full, charge battery only when is completely drain.
question
machine cycle
answer
fetching: obtaining a program from memory, decoding: translating instructions into signals the computer can execute, executing: carrying out the commands, storing: writing the results in memory