Exam 5: Computing and Communications Resources

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

People who try to break into computer systems in order to gather information, deny the owner access to his or her computer resources, delete files, or otherwise disrupt the use of the microcomputer by its owner are called:

(Multiple Choice)
4.9/5
(40)

The key feature of today's personal computing devices is their mobility.

(True/False)
4.9/5
(42)

A cell phone is considered to be a smart phone when it performs tasks typically associated with microcomputers.

(True/False)
4.9/5
(36)

When a business has its own programmers to write application software, the software is called custom application software.

(True/False)
4.8/5
(36)

Which computer component is a device that captures data by a manual or electronic method and transmits the data to storage or memory?

(Multiple Choice)
4.9/5
(42)

____________performs certain fundamental tasks that all users of a particular computer require.

(Essay)
4.9/5
(31)

A cable modem connects to the fiber optics cable provided by a cable TV provider to a computer for Internet access.

(True/False)
4.8/5
(28)

Which Internet connection provides the fastest speed?

(Multiple Choice)
4.9/5
(36)

Name the major computer components and provide a brief description of each.

(Essay)
4.8/5
(38)

Which computer device is not an input/output device?

(Multiple Choice)
4.9/5
(29)

A packet is a piece of the total data to be communicated, combined with the address of the destination computer, the sending computer, and other control information.

(True/False)
5.0/5
(40)

The type of modem that connects most home computers to the Internet is the:

(Multiple Choice)
4.7/5
(30)

Word size determines how many characters can be moved in a single cycle of the processor.

(True/False)
4.8/5
(38)

Describe the three different sizes of networks.

(Essay)
4.9/5
(36)

A small computer program that monitors what you are doing with your computer resources is called:

(Multiple Choice)
4.9/5
(42)

____________is software anyone can use for free and change it to meet their particular needs.

(Essay)
4.8/5
(35)

Which of the following is not a major computer component?

(Multiple Choice)
4.7/5
(35)

What is a common standard for encrypting data over a wireless home network?

(Multiple Choice)
4.9/5
(38)

Mainframe computers support hundreds or thousands of simultaneous users and operations.

(True/False)
4.9/5
(37)

If two peer computers try to send data at the same time, a data transmission crash occurs.

(True/False)
4.9/5
(36)
Showing 21 - 40 of 80
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)