Creado por Jorden Booth2181
hace más de 9 años
|
||
Pregunta | Respuesta |
The CPU is comprised of: | ALU and control unit |
Using the _____ =SUM(B10:B14) totals the contents of cells B10 through B14 in a worksheet. | formula |
Channel capacity can be measured in bps. | True |
The primary function of the BIOS is to prepare the machine so that the operating system can take over control of the hardware. This process is known as booting up. | True |
Which of the following transmission media is able to support mobile communications? | Satellite |
A _____ is a device that provides a central point for cables in a network. | hub |
Computer-aided design (CAD) software is a sophisticated type of application software that assists a professional user in creating engineering, architectural, and scientific designs. | True |
A client would be assigned what type of IP address | Dynamic |
Speech recognition software enables a computer to produce human sounds. | False |
Which is not a measure of printer performance? | Refresh rate |
A plug-in is a program that extends the capability of an add-on. | True |
ROM (Read-Only Memory) cannot easily be written to and its main uses are the distribution of firmware (software that is very closely related to hardware). | True |
Copyrighted software which is marketed under a ?try before you buy? policy is known as _______. | Shareware |
Data communications errors | Can be corrected by a retransmission from the sender |
A(n) _____ protects a computer by identifying and removing any viruses found in memory, on media, or in files. | antivirus program |
A topology is like a map of the network or LAN | True |
To search for web pages that contain the phrase "these are the times", enter this query: _____ | "these are the times" |
____________________ is the protocol for exchanging files over the Internet. | File Transfer Protocol |
Like an IP address, the components of a domain name are separated by commas. | False |
What software always remains in memory whenever a computer is on? | operating system |
Coaxial cable transmission is line of sight restricted | False |
A widely used internet communication device is a _____. | modem |
A browser is a _____________ program. | Client |
Internet Explorer uses a ______________ security framework, which means that sites are grouped based upon certain conditions. It allows the restriction of broad areas of functionality, and also allows specific functions to be restricted. | Zone-based |
A communications media: | carries the data signal |
Hardware is the sequence of instructions that tells the computer what to do. | False |
Which is NOT a type of communications media? | ultra-violet |
All files of the same type will have the same file extension. If you double click a file with extension DOCX, Word opens. Windows manages file _____________ automatically. | associations |
What is a device that modulates a carrier?s signal to encode a computer?s digital data, and later demodulates the signal to decode the data at the receiving end? | modem |
Some mailing lists are called _____, named after a popular mailing list program. | LISTSERVs |
The special purpose program that translates computer source code to binary machine code is called a __________. | Compiler |
When a file is saved to the hard drive, the operating system tries to keep everything in the same area. Over time files will be deleted, leaving blank areas between files. When new programs are installed or large files saved, the hard drive tries to fill the holes, thus breaking up the program or file into blocks. This situation is known as _______________________. | disk fragmentation |
A wiki _____. | are usually open to modification by the general public |
The rate in cycles per second (measured in hertz) at which a computer performs its most basic operations such as adding two numbers or transferring a value from one register to another is known as the _____________________________. | clock speed |
Think of a packet as an _____________________ that contains data and is transported from server to server until it reaches its destination. | electronic envelope |
Which option below represents an absolute column and row? | $A$1 |
SMTP and POP3 can be used interchangeably to send e-mail | False |
Because Bluetooth requires line-of-sight transmission, some industry experts predict that infrared technology will replace Bluetooth. | False |
A computer stores its basic hardware settings in __________. | CMOS |
The programs that control the activity of the hardware and control the internal workings of the computer are called _____ software. | systems |
Packets always arrive at the destination in the order they were sent | False |
Public domain software is usually expensive, but worth the cost. | False |
Open source software _____. | all of the above. |
Which of the following is the largest computer network in the world? | Internet |
A digital subscriber line allows voice and data to share the telephone line for Internet access. | True |
Which of the following are examples of software piracy? | all of the above |
When using a search engine, a minus sign is an example of what? | an exclusion operator |
The bandwidth of a channel relates to the channel's capacity to carry data. | True |
Memory ______________ is the time between the processor initiating a request for a byte (eight bits) or word (usually 16 bits) in memory until it is retrieved. | latency |
You interact with a program through its _____, which controls how you enter data and instructions and how information is displayed on the screen. | user interface |
¿Quieres crear tus propias Fichas gratiscon GoConqr? Más información.