Exam 6: Hardware and Software

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

A tablet PC screen is an example of an input device.

(True/False)
4.8/5
(37)

A macro-virus propagates using the internet or other computer network, and becomes so overwhelming that the network becomes unusable.

(True/False)
4.8/5
(40)

Business people who prefer to ignore technology and leave technology knowledge strictly to the technology professionals are giving the (a) ________ to others in the industry.

(Multiple Choice)
4.7/5
(31)

How are computer viruses different from worms?

(Essay)
4.7/5
(40)

Volatile memory means that

(Multiple Choice)
4.9/5
(31)

________ was developed by Bell Labs and is generally regarded as more difficult to use than Windows or Mac OS.

(Short Answer)
4.9/5
(29)

Volatile memory devices maintain their contents without the power being on.

(True/False)
4.8/5
(38)

Bytes consist of ________ bits of memory.

(Multiple Choice)
4.7/5
(35)

________ is the program code that is delivered by a virus to cause harmful actions.

(Short Answer)
5.0/5
(28)

Main memory is an example of

(Multiple Choice)
4.9/5
(38)

The most frequently used data is stored in cache memory.

(True/False)
4.8/5
(47)

What are the difference in functions between a client computer and a server computer?

(Essay)
4.9/5
(30)

Users employ ________ computers for work processing, spreadsheets, and database access.

(Multiple Choice)
4.9/5
(32)

Users of cloud computing ________ the usage of computers from third-party providers.

(Short Answer)
4.8/5
(35)

When multiple programs are running, the CPU uses memory swapping as each program is used.

(True/False)
4.9/5
(32)

A ________ is the smallest piece of data in this list.

(Multiple Choice)
4.7/5
(37)

Vertical market software refers to

(Multiple Choice)
4.8/5
(35)

Cloud computing may be more efficient because

(Multiple Choice)
4.7/5
(31)

The collection of instructions that a computer can process is called the computer's________.

(Short Answer)
4.8/5
(47)

Software vendors intentionally leave security holes in their software so they can charge for patches and fixes later.

(True/False)
4.8/5
(39)
Showing 21 - 40 of 147
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)