Exam 1: Computers and Digital Basics

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

____ is a type of password cracking software.

Free
(Multiple Choice)
4.8/5
(30)
Correct Answer:
Verified

D

The ____________________ is a global computer network originally developed as a military project, then handed over to the National Science Foundation for research and academic use.

Free
(Short Answer)
4.9/5
(26)
Correct Answer:
Verified

Internet

The term ____ refers to the practice of copying a file from a remote computer to a local computer.

Free
(Multiple Choice)
4.7/5
(37)
Correct Answer:
Verified

C

Identify the letter of the choice that best matches the phrase or definition.
Premises:
A sequence of letters, numbers, and special characters that require a full qwerty keyboard for entry
Responses:
password
cyberspace
password manager
Correct Answer:
Verified
Premises:
Responses:
A sequence of letters, numbers, and special characters that require a full qwerty keyboard for entry
password
(Matching)
4.8/5
(29)

A ____ computer is a type of microprocessor-based computing device that is designed to meet the needs of an individual.

(Multiple Choice)
4.8/5
(36)

Storage is the area of a computer that temporarily holds data that is waiting to be processed, stored, or output.

(True/False)
4.9/5
(34)

The term workstation cannot be applied to ordinary personal computers that are connected to a network.

(True/False)
4.9/5
(27)

Just about any personal computer can be configured to perform the work of a server.

(True/False)
4.9/5
(37)

The microprocessor's ____ unit fetches each instruction.

(Multiple Choice)
4.8/5
(32)

Digital divide is a term that refers to entities that exist largely within computer networks.

(True/False)
4.7/5
(27)

What is the digital revolution?

(Essay)
4.9/5
(39)

A(n) ____ device works with discrete data or digits, such as 1 or 0.

(Multiple Choice)
4.7/5
(31)

Describe four different strategies in which hackers get your password, including some primitive ways and some more technological advanced methods.

(Essay)
4.8/5
(38)

____ protocols that use more than one means of identification are more secure than others.

(Multiple Choice)
4.8/5
(29)
Identify the letter of the choice that best matches the phrase or definition.
Premises:
One of the first online social scenes
Responses:
personal computer
supercomputer
password
Correct Answer:
Verified
Premises:
Responses:
One of the first online social scenes
personal computer
(Matching)
4.9/5
(38)

____ projects that promote copying, free distribution, peer review, and user modification.

(Multiple Choice)
4.9/5
(28)

A ____ is a named collection of data that exists on a storage medium.

(Multiple Choice)
4.9/5
(30)

____ data consists of numbers that might be used in arithmetic operations.

(Multiple Choice)
5.0/5
(38)

An iPAQ, a Blackberry, and an Axim are examples of a ____ computer.

(Multiple Choice)
4.9/5
(32)

A ____ is one or more collaborative documents posted on the Web that can be viewed and changed by users.

(Multiple Choice)
4.8/5
(36)
Showing 1 - 20 of 170
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)