Deck 5: Computing and Communications Resources

Full screen (f)
exit full mode
Question
A small computer program that monitors what you are doing with your computer resources is called:

A)spyware.
B)antivirus software.
C)off- the- shelf software.
D)pop- ups.
Use Space or
up arrow
down arrow
to flip the card.
Question
In the Open Systems Interconnect Reference Model which layer routes data from one network address to another?

A)network layer
B)transport layer
C)physical layer
D)data link layer
Question
Which of the following statements is false regarding user- friendly software?

A)The software has been carefully engineered to accommodate a wide range of users.
B)User- friendly programs are easy to write.
C)The software is simple and intuitive to use.
D)The software has gained widespread use.
Question
The PDA that gained its popularity by being one of the first to effectively utilize seamless communications roaming across the United States, Europe, and Asia was the:

A)Nokia.
B)Handspring.
C)Palm.
D)BlackBerry.
Question
What is a common standard for encrypting data over a wireless home network?

A)Spyware
B)Java
C)ASP
D)WEP
Question
A group of computers and other devices that are connected together by a common medium is called a:

A)WAN.
B)MAN.
C)HUB.
D)LAN.
Question
Which protocol is important for packet switching?

A)peer- to- peer
B)open protocol
C)Token Ring
D)TCP/IP
Question
The type of connection that is used for authorized users of a network outside the boundaries of the firm is called a(n):

A)intranet.
B)internet.
C)extranet.
D)Internet.
Question
Which processor speed refers to millions of cycles per second?

A)megabyte
B)gigahertz
C)terahertz
D)megahertz
Question
The type of modem that connects most home computers to the Internet is the:

A)DSL.
B)telephone modem.
C)cable modem.
D)ISDN.
Question
Which is not an advantage of ink- jet printers?

A)They are mechanically small.
B)They generally cost less than laser printers.
C)They produce color output at a relatively low cost.
D)They produce copier quality pages.
Question
Which storage type is rewritable?

A)DVD
B)CD- RW
C)CD
D)CD- R
Question
Which storage type holds the most data?

A)DVD
B)Zip disk
C)CD
D)3½ inch floppy
Question
Which computer device is not an input/output device?

A)zip disk
B)floppy disk
C)touch- screen
D)printer
Question
Which is not a common feature of personal digital assistants?

A)word processing
B)contact lists
C)notes
D)calendars
Question
A network that has a physical distance limit of roughly 30 miles is known as a(n):

A)Internet.
B)MAN.
C)LAN.
D)WAN.
Question
People who try to break into computer systems in order to gather information, deny the owner access to his or her computer resources, delete files, or otherwise disrupt the use of the microcomputer by its owner are called:

A)hackers.
B)trackers.
C)slackers.
D)smackers.
Question
Which of the following types of storage is fixed?

A)hard drive
B)zip disk
C)CD
D)tape
Question
Which of the following is not a characteristic of personal computing devices?

A)ability to synchronize data files with other computer resources
B)small, but functional display screen
C)wireless network access
D)short battery life between recharging
Question
Which Internet connection provides the fastest speed?

A)telephone modem
B)ISDN
C)DSL
D)cable modem
Question
is data captured by an electronic or mechanical device.
Question
Which is not considered a human- captured data device?

A)bar code
B)touching a monitor
C)speaking into a microphone
D)clicking a mouse
Question
are self- contained files or programs.
Question
Which type of communications line is the least expensive?

A)dedicated line
B)private line
C)leased line
D)virtual private network
Question
A _ is the specifications for formatting data to be transferred between communications equipment.
Question
are people who try to break into computer systems in order to gather information, deny the owner access to his or her computer resources, delete files, or otherwise disrupt the use of the microcomputer by its owner.
Question
Which of the following is not a major computer component?

A)storage
B)memory
C)CPU
D)bus
Question
Which computer component is a device that captures data by a manual or electronic method and transmits the data to storage or memory?

A)CPU
B)input device
C)output device
D)RAM
Question
support hundreds or thousands of simultaneous users and operations.
Question
are small computer programs that replicate by inserting themselves into computer resources such as programs or files.
Question
Which of the following performs certain fundamental tasks that all users of a particular computer require?

A)system software
B)translator program
C)utility program
D)application software
Question
Which computer is today's fastest computer?

A)Blue Gene/L
B)Earth Simulator
C)Deep Blue
D)Flight Simulator
Question
The type of printer that sprays ink onto the surface of the paper is a(n):

A)laser printer.
B)dot- matrix printer.
C)ink- jet printer.
D)plotter.
Question
A cell phone is considered to be a _ when it performs tasks typically associated with microcomputers.
Question
Worms are:

A)protocols for accessing the Internet.
B)self- contained files or programs.
C)SIMM.
D)read- only memory.
Question
M is the most widely adopted protocol in Europe, Asia, Africa, and Australia.
Question
is produced by suppliers and sold to users.
Question
Which of the following is not important for today's computers to achieve their remarkable growth of power?

A)storage capacity
B)word size
C)circuitry improvement
D)processor speed
Question
is software anyone can use for free and change it to meet their particular needs.
Question
Which protocol is referred to as the Token Ring?

A)open protocol
B)peer- to- peer
C)OSI
D)system Network Architecture
Question
performs certain fundamental tasks that all users of a particular computer require.
Question
A cell phone is considered to be a smart phone when it performs tasks typically associated with microcomputers.
Question
When the first computers were developed, there were no programming languages.
Question
A is a device to connect computers over standard telephone lines.
Question
Digital video disks hold from 5 GB to 20 GB of data.
Question
Ethernet is a proprietary network for peer- to- peer communications.
Question
ISDN stands for Integrated Services Digital Network.
Question
The real importance of point- of- sale terminals is their technological sophistication.
Question
Today's personal computing devices do not include the personal computer.
Question
The operating system manages the computer's processes, functioning as an interface connecting the user, the application software, and the hardware.
Question
Processor speeds were originally expressed in gigahertz.
Question
Ethernet networks use a star topology.
Question
User- friendly software is also programmer- friendly.
Question
The ISO consists of a seven- layer model for network connections.
Question
The key feature of today's personal computing devices is their mobility.
Question
The main evolution of input and output devices is in the direction of , the use of more than one medium at a time.
Question
Mainframe computers support hundreds or thousands of simultaneous users and operations.
Question
began as computers used by one person.
Question
refers to input captured by a person typing on a keyboard, clicking a mouse, touching a monitor, speaking into a microphone, or a similar interaction.
Question
Word size determines how many characters can be moved in a single cycle of the processor.
Question
Retail stores have the option of placing bar codes on every product sold.
Question
T- 3 lines are generally available for home use.
Question
To route packets through the Internet, an IP address is used.
Question
Laser printers essentially act as copier machines.
Question
Define multimedia and explain how it has provided access to a group of users that may never have had computer access before.
Question
List the characteristics of software that is said to be user friendly.
Question
A packet is a piece of the total data to be communicated, combined with the address of the destination computer, the sending computer, and other control information.
Question
Asynchronous transfer mode requires smaller packets than earlier protocols and increases the speed of transmission.
Question
When a business has its own programmers to write application software, the software is called custom application software.
Question
A peer- to- peer protocol allows each computer to act as its own controller.
Question
The hard drive is fixed storage because it is permanently installed in the computer.
Question
Protocols for the public telephone systems were established to meet the minimum criteria of digital transmissions.
Question
Name the major computer components and provide a brief description of each.
Question
A cable modem connects to the fiber optics cable provided by a cable TV provider to a computer for Internet access.
Question
What are the benefits of having prewritten software?
Question
An intranet limits accessibility to computer resources to a select group of persons beyond the boundaries of the firm.
Question
Describe the three different sizes of networks.
Question
The Internet is a collection of networks that can be joined together.
Question
If two peer computers try to send data at the same time, a data transmission crash occurs.
Question
An open protocol is open to the public and allowed to be used without cost.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/80
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 5: Computing and Communications Resources
1
A small computer program that monitors what you are doing with your computer resources is called:

A)spyware.
B)antivirus software.
C)off- the- shelf software.
D)pop- ups.
A
2
In the Open Systems Interconnect Reference Model which layer routes data from one network address to another?

A)network layer
B)transport layer
C)physical layer
D)data link layer
A
3
Which of the following statements is false regarding user- friendly software?

A)The software has been carefully engineered to accommodate a wide range of users.
B)User- friendly programs are easy to write.
C)The software is simple and intuitive to use.
D)The software has gained widespread use.
B
4
The PDA that gained its popularity by being one of the first to effectively utilize seamless communications roaming across the United States, Europe, and Asia was the:

A)Nokia.
B)Handspring.
C)Palm.
D)BlackBerry.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
5
What is a common standard for encrypting data over a wireless home network?

A)Spyware
B)Java
C)ASP
D)WEP
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
6
A group of computers and other devices that are connected together by a common medium is called a:

A)WAN.
B)MAN.
C)HUB.
D)LAN.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
7
Which protocol is important for packet switching?

A)peer- to- peer
B)open protocol
C)Token Ring
D)TCP/IP
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
8
The type of connection that is used for authorized users of a network outside the boundaries of the firm is called a(n):

A)intranet.
B)internet.
C)extranet.
D)Internet.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
9
Which processor speed refers to millions of cycles per second?

A)megabyte
B)gigahertz
C)terahertz
D)megahertz
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
10
The type of modem that connects most home computers to the Internet is the:

A)DSL.
B)telephone modem.
C)cable modem.
D)ISDN.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
11
Which is not an advantage of ink- jet printers?

A)They are mechanically small.
B)They generally cost less than laser printers.
C)They produce color output at a relatively low cost.
D)They produce copier quality pages.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
12
Which storage type is rewritable?

A)DVD
B)CD- RW
C)CD
D)CD- R
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
13
Which storage type holds the most data?

A)DVD
B)Zip disk
C)CD
D)3½ inch floppy
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
14
Which computer device is not an input/output device?

A)zip disk
B)floppy disk
C)touch- screen
D)printer
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
15
Which is not a common feature of personal digital assistants?

A)word processing
B)contact lists
C)notes
D)calendars
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
16
A network that has a physical distance limit of roughly 30 miles is known as a(n):

A)Internet.
B)MAN.
C)LAN.
D)WAN.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
17
People who try to break into computer systems in order to gather information, deny the owner access to his or her computer resources, delete files, or otherwise disrupt the use of the microcomputer by its owner are called:

A)hackers.
B)trackers.
C)slackers.
D)smackers.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
18
Which of the following types of storage is fixed?

A)hard drive
B)zip disk
C)CD
D)tape
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
19
Which of the following is not a characteristic of personal computing devices?

A)ability to synchronize data files with other computer resources
B)small, but functional display screen
C)wireless network access
D)short battery life between recharging
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
20
Which Internet connection provides the fastest speed?

A)telephone modem
B)ISDN
C)DSL
D)cable modem
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
21
is data captured by an electronic or mechanical device.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
22
Which is not considered a human- captured data device?

A)bar code
B)touching a monitor
C)speaking into a microphone
D)clicking a mouse
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
23
are self- contained files or programs.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
24
Which type of communications line is the least expensive?

A)dedicated line
B)private line
C)leased line
D)virtual private network
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
25
A _ is the specifications for formatting data to be transferred between communications equipment.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
26
are people who try to break into computer systems in order to gather information, deny the owner access to his or her computer resources, delete files, or otherwise disrupt the use of the microcomputer by its owner.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
27
Which of the following is not a major computer component?

A)storage
B)memory
C)CPU
D)bus
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
28
Which computer component is a device that captures data by a manual or electronic method and transmits the data to storage or memory?

A)CPU
B)input device
C)output device
D)RAM
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
29
support hundreds or thousands of simultaneous users and operations.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
30
are small computer programs that replicate by inserting themselves into computer resources such as programs or files.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
31
Which of the following performs certain fundamental tasks that all users of a particular computer require?

A)system software
B)translator program
C)utility program
D)application software
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
32
Which computer is today's fastest computer?

A)Blue Gene/L
B)Earth Simulator
C)Deep Blue
D)Flight Simulator
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
33
The type of printer that sprays ink onto the surface of the paper is a(n):

A)laser printer.
B)dot- matrix printer.
C)ink- jet printer.
D)plotter.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
34
A cell phone is considered to be a _ when it performs tasks typically associated with microcomputers.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
35
Worms are:

A)protocols for accessing the Internet.
B)self- contained files or programs.
C)SIMM.
D)read- only memory.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
36
M is the most widely adopted protocol in Europe, Asia, Africa, and Australia.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
37
is produced by suppliers and sold to users.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
38
Which of the following is not important for today's computers to achieve their remarkable growth of power?

A)storage capacity
B)word size
C)circuitry improvement
D)processor speed
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
39
is software anyone can use for free and change it to meet their particular needs.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
40
Which protocol is referred to as the Token Ring?

A)open protocol
B)peer- to- peer
C)OSI
D)system Network Architecture
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
41
performs certain fundamental tasks that all users of a particular computer require.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
42
A cell phone is considered to be a smart phone when it performs tasks typically associated with microcomputers.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
43
When the first computers were developed, there were no programming languages.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
44
A is a device to connect computers over standard telephone lines.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
45
Digital video disks hold from 5 GB to 20 GB of data.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
46
Ethernet is a proprietary network for peer- to- peer communications.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
47
ISDN stands for Integrated Services Digital Network.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
48
The real importance of point- of- sale terminals is their technological sophistication.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
49
Today's personal computing devices do not include the personal computer.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
50
The operating system manages the computer's processes, functioning as an interface connecting the user, the application software, and the hardware.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
51
Processor speeds were originally expressed in gigahertz.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
52
Ethernet networks use a star topology.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
53
User- friendly software is also programmer- friendly.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
54
The ISO consists of a seven- layer model for network connections.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
55
The key feature of today's personal computing devices is their mobility.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
56
The main evolution of input and output devices is in the direction of , the use of more than one medium at a time.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
57
Mainframe computers support hundreds or thousands of simultaneous users and operations.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
58
began as computers used by one person.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
59
refers to input captured by a person typing on a keyboard, clicking a mouse, touching a monitor, speaking into a microphone, or a similar interaction.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
60
Word size determines how many characters can be moved in a single cycle of the processor.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
61
Retail stores have the option of placing bar codes on every product sold.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
62
T- 3 lines are generally available for home use.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
63
To route packets through the Internet, an IP address is used.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
64
Laser printers essentially act as copier machines.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
65
Define multimedia and explain how it has provided access to a group of users that may never have had computer access before.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
66
List the characteristics of software that is said to be user friendly.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
67
A packet is a piece of the total data to be communicated, combined with the address of the destination computer, the sending computer, and other control information.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
68
Asynchronous transfer mode requires smaller packets than earlier protocols and increases the speed of transmission.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
69
When a business has its own programmers to write application software, the software is called custom application software.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
70
A peer- to- peer protocol allows each computer to act as its own controller.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
71
The hard drive is fixed storage because it is permanently installed in the computer.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
72
Protocols for the public telephone systems were established to meet the minimum criteria of digital transmissions.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
73
Name the major computer components and provide a brief description of each.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
74
A cable modem connects to the fiber optics cable provided by a cable TV provider to a computer for Internet access.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
75
What are the benefits of having prewritten software?
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
76
An intranet limits accessibility to computer resources to a select group of persons beyond the boundaries of the firm.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
77
Describe the three different sizes of networks.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
78
The Internet is a collection of networks that can be joined together.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
79
If two peer computers try to send data at the same time, a data transmission crash occurs.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
80
An open protocol is open to the public and allowed to be used without cost.
Unlock Deck
Unlock for access to all 80 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 80 flashcards in this deck.