Deck 5: Essential: Understanding Essential Computer Concepts

ملء الشاشة (f)
exit full mode
سؤال
____ refers to the number of bits that are processed at one time.

A) Characters per second
B) Quad core
C) Clock speed
D) Word size
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
One of the most important components of personal computer hardware is ____, which stores instructions and data.

A) the processor
B) optical storage
C) the cloud
D) memory
سؤال
You are running two programs at once that each require 10 megabytes on a computer that only has 16 megabytes of RAM. What makes this possible?

A) CMOS
B) ROM
C) cache
D) virtual memory
سؤال
Processing tasks occur on the ____.

A) mouse
B) keyboard
C) motherboard
D) operating system
سؤال
Special high-speed memory located on or near the microprocessor's is called ____.

A) ROM
B) storage
C) virtual memory
D) cache memory
سؤال
<strong>      Which of the following is NOT shown in the accompanying figures?</strong> A) touch screen B) trackball C) touch pad D) mouse <div style=padding-top: 35px> <strong>      Which of the following is NOT shown in the accompanying figures?</strong> A) touch screen B) trackball C) touch pad D) mouse <div style=padding-top: 35px>
<strong>      Which of the following is NOT shown in the accompanying figures?</strong> A) touch screen B) trackball C) touch pad D) mouse <div style=padding-top: 35px>
Which of the following is NOT shown in the accompanying figures?

A) touch screen
B) trackball
C) touch pad
D) mouse
سؤال
The physical components of a computer are referred to as ____.

A) operating systems
B) specifications
C) configurations
D) hardware
سؤال
The computer needs additional components called ____ to accomplish its input, output, and storage functions.

A) mice
B) peripheral devices
C) architecture
D) ports
سؤال
Which of the following is NOT a personal computer?

A) laptop
B) desktop
C) mainframe
D) All of the above.
سؤال
RAM is often referred to as ____ memory.

A) permanent
B) semipermanent
C) volatile
D) None of the above.
سؤال
A file that tells a computer how to perform a specific task is called a(n) ____ file.

A) executable
B) instruction
C) data
D) configuration
سؤال
____ are thin computers that do not have an external keyboard or mouse.

A) Laptops
B) Desktops
C) Tablets
D) Mainframes
سؤال
A(n) ____ is based on flash memory, but is intended as a replacement for traditional hard disk drives.

A) CMOS
B) SSD
C) GUI
D) RAM cache
سؤال
Megahertz is a measurement of ____.

A) the speed of the microprocessor
B) the amount of RAM
C) RAM speed
D) cache memory
سؤال
What temporarily holds programs and data while the computer is on and allows the computer to access that information randomly?

A) cache
B) RAM
C) ROM
D) CMOS
سؤال
____ memory is a chip on the motherboard that stores the date, time, and system parameters.

A) ROM
B) RAM
C) CPU
D) CMOS
سؤال
Most ____ devices, like keyboards, for example, connect to a computer either with cables or wirelessly.

A) storage
B) touch
C) recording
D) input
سؤال
____ computers are used by large businesses, government agencies, and in science and education to provide centralized storage and processing and to manipulate tremendous amounts of data.

A) Subnotebook
B) Optical
C) External
D) Mainframe
سؤال
Which of the following is a personal computer?

A) supercomputer
B) mainframe
C) desktop
D) All of the above.
سؤال
Which of the following is NOT an example of optical storage?

A) CD
B) hard disk
C) Blu-ray
D) DVD
سؤال
An example of an output device is a ____.

A) printer
B) keyboard
C) mouse
D) touch pad
سؤال
<strong>      The devices shown in the accompanying figure are all ____ devices.</strong> A) output B) pointing C) recording D) storage <div style=padding-top: 35px> <strong>      The devices shown in the accompanying figure are all ____ devices.</strong> A) output B) pointing C) recording D) storage <div style=padding-top: 35px>
<strong>      The devices shown in the accompanying figure are all ____ devices.</strong> A) output B) pointing C) recording D) storage <div style=padding-top: 35px>
The devices shown in the accompanying figure are all ____ devices.

A) output
B) pointing
C) recording
D) storage
سؤال
Expansion cards plug into electrical connectors on the motherboard called expansion ____.

A) ports
B) outlets
C) slots
D) buses
سؤال
An input device is any hardware peripheral that communicates the results of data processing.
سؤال
  The printer in the accompanying figure is considered a client.<div style=padding-top: 35px>
The printer in the accompanying figure is considered a client.
سؤال
<strong>  In the accompanying figure, each of the components connected by wires is called a ____.</strong> A) client B) node C) workstation D) server <div style=padding-top: 35px> In the accompanying figure, each of the components connected by wires is called a ____.

A) client
B) node
C) workstation
D) server
سؤال
____ manage the system resources of a computer so programs can run properly.

A) Database management software
B) Utilities
C) Firewalls
D) Operating systems
سؤال
Antivirus software protects against which of the following types of malware?

A) viruses
B) firewalls
C) phishing scams
D) spoofed sites
سؤال
DVD+Rs are rewritable.
سؤال
The communication path between a microprocessor, RAM, and peripherals is called the data bus.
سؤال
Protocols in data communication establish the countries with which data can be exchanged.
سؤال
<strong>  In the accompanying figure, the network shown is a ____ network.</strong> A) WiMAX B) client/server C) WLAN D) Bluetooth <div style=padding-top: 35px> In the accompanying figure, the network shown is a ____ network.

A) WiMAX
B) client/server
C) WLAN
D) Bluetooth
سؤال
A network with a computers dependent on a server is called a client/server network.
سؤال
A hard disk is a type of magnetic storage device.
سؤال
  In the accompanying figure, each of the items labeled workstation  must have a network interface card installed.<div style=padding-top: 35px>
In the accompanying figure, each of the items labeled "workstation"  must have a network interface card installed.
سؤال
An interface card can be plugged into an expansion slot on the motherboard of a computer.
سؤال
A device driver is a computer program that makes communication possible between your computer and one of its peripherals.
سؤال
Which of the following is the smallest unit of measurement?

A) a terabyte
B) a gigabyte
C) a megabyte
D) a kilobyte
سؤال
The practice of sending e-mails to customers or potential customers of a legitimate website asking them to click a link in the e-mail is called ____.

A) spoofing
B) phishing
C) pharming
D) spaming
سؤال
Database management software allows you to create illustrations, diagrams, graphs, and charts that can be projected before a group, printed out for quick reference, or transmitted to remote computers.
سؤال
A(n) ____________________ is an electronic device that accepts information and instructions from a user, manipulates the information according to the instructions, displays the information in some way, and stores the information for later retrieval.
سؤال
If you are working on a budget and save the spreadsheet on your hard drive, it is called a(n) executable file. _________________________
سؤال
Operating software enables you to perform specific tasks such as writing letters, creating presentations, analyzing statistics, creating graphic, and enhancing photos..
سؤال
Explain the differences between a kilobyte, a megabyte, a gigabyte, and a terabyte.
سؤال
If a keyboard is _________________________, this means that is has been designed to fit the natural placement of your hands and may reduce the risk of repetitive-motion injuries.
سؤال
Critical Thinking Questions Case 1-2 You have been chosen to upgrade the computer system for the local volunteer association. You want to purchase a system that will still be useful for several years. You want the computer to be able to run faster. What is the easiest thing you can add to make this happen?
A. RAM
B. CMOS
C. motherboard
D. additional operating system
سؤال
Critical Thinking Questions Case 1-2 You have been chosen to upgrade the computer system for the local volunteer association. You want to purchase a system that will still be useful for several years. You want to allow volunteers to copy files and carry them with them when they leave. What is a good choice for something that can store files, is transportable, and is small enough to fit in a pocket?
A. motherboard
B. CMOS
C. flash drive
D. optical drive
سؤال
Technical information about hardware components on a computer are called configurations . _________________________
سؤال
____________________ memory is created and used by most computers when the amount of RAM needed exceeds the RAM available.
سؤال
Critical Thinking Questions Case 1-1 Christina is a salon owner in Baltimore, Maryland. She wants to create a list of all her clients in order to send them information about new promotions at the salon. She needs to purchase software to help her accomplish this. She also needs to track monthly expenses for her salon and needs software to do this as well. What type of software should Christina purchase to create and manage her collection of customer data?
A. indexing software
B. database management software
C. word processing software
D. operating system software
سؤال
Utility software helps analyze, optimize, configure, and maintain a computer. _________________________
سؤال
Critical Thinking Questions Case 1-1 Christina is a salon owner in Baltimore, Maryland. She wants to create a list of all her clients in order to send them information about new promotions at the salon. She needs to purchase software to help her accomplish this. She also needs to track monthly expenses for her salon and needs software to do this as well. What type of software should Christina purchase to help her track monthly expenses?
A. spreadsheet software
B. operating system software
C. database management software
D. word processing software
سؤال
Processing data is also referred to as ____________________ data.
سؤال
Discuss the use of the following ways to use the Web to get your work done: searching for information, communicating with others, telecommuting, and cloud computing.
سؤال
Special high-speed memory located on or near the microprocessor is called ____________________.
سؤال
Visual Basic, C, C++, and Java are all examples of computer programming ____________________.
سؤال
A(n) ____________________ prevents other computers on the Internet from accessing a computer and prevents programs on a computer from accessing the Internet without the computer user's permission.
سؤال
A(n) system resource is any part of the computer system, including memory, storage devices, and the microprocessor. _________________________
سؤال
Phishing is a broad term that describes any program that is designed to cause harm or transmit information to others without the computer owner's permission.  _________________________
سؤال
____________________ is the flow of data from the microprocessor to memory to peripherals and back again.
سؤال
____________________________   use laser technology to store data in the form of tiny pits or bumps.​
سؤال
​Most computers sold today come with 32-bit processors.
سؤال
Match between columns
Programs that track a computer user's Internet usage and send this data back to the company or person that created it without the computer user's permission or knowledge.
command
Programs that track a computer user's Internet usage and send this data back to the company or person that created it without the computer user's permission or knowledge.
spyware
Programs that track a computer user's Internet usage and send this data back to the company or person that created it without the computer user's permission or knowledge.
USB
Programs that track a computer user's Internet usage and send this data back to the company or person that created it without the computer user's permission or knowledge.
ROM
Programs that track a computer user's Internet usage and send this data back to the company or person that created it without the computer user's permission or knowledge.
software
سؤال
The most frequently used output device is a ___________.​
سؤال
Match between columns
An input instruction that tells the computer how to process data.
command
An input instruction that tells the computer how to process data.
spyware
An input instruction that tells the computer how to process data.
USB
An input instruction that tells the computer how to process data.
ROM
An input instruction that tells the computer how to process data.
software
سؤال
Match between columns
A high-speed serial port which allows multiple connections at the same port.
command
A high-speed serial port which allows multiple connections at the same port.
spyware
A high-speed serial port which allows multiple connections at the same port.
USB
A high-speed serial port which allows multiple connections at the same port.
ROM
A high-speed serial port which allows multiple connections at the same port.
software
سؤال
Match between columns
Intangible components of a computer system.
command
Intangible components of a computer system.
spyware
Intangible components of a computer system.
USB
Intangible components of a computer system.
ROM
Intangible components of a computer system.
software
سؤال
The Microsoft Edge browser will appear as an alert when a known spoofed site is visited.​

A) Yes
B) No
سؤال
​What is essentially a robot that deposits multiple layers of material (typically heated plastic) onto a surface?
سؤال
Match between columns
The permanent storage location for a set of instructions the computer uses when turned on.
command
The permanent storage location for a set of instructions the computer uses when turned on.
spyware
The permanent storage location for a set of instructions the computer uses when turned on.
USB
The permanent storage location for a set of instructions the computer uses when turned on.
ROM
The permanent storage location for a set of instructions the computer uses when turned on.
software
سؤال
Critical Thinking Questions Case 1-2 You have been chosen to upgrade the computer system for the local volunteer association. You want to purchase a system that will still be useful for several years. You want the volunteers to have access to the most energy efficient type of monitor available. What is the best type of monitor technology to purchase?
A. TEM
B. fluorescent backlight
C. LED
D. LCD
سؤال
​The motherboard is a circuit board.

A) Yes
B) No
سؤال
The internet is a subset of the World Wide Web.​
سؤال
Bluetooth is an input device.​

A) Yes
B) No
سؤال
A computer sees the world as series of __________ digits or bits.​
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/75
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 5: Essential: Understanding Essential Computer Concepts
1
____ refers to the number of bits that are processed at one time.

A) Characters per second
B) Quad core
C) Clock speed
D) Word size
D
2
One of the most important components of personal computer hardware is ____, which stores instructions and data.

A) the processor
B) optical storage
C) the cloud
D) memory
D
3
You are running two programs at once that each require 10 megabytes on a computer that only has 16 megabytes of RAM. What makes this possible?

A) CMOS
B) ROM
C) cache
D) virtual memory
D
4
Processing tasks occur on the ____.

A) mouse
B) keyboard
C) motherboard
D) operating system
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
5
Special high-speed memory located on or near the microprocessor's is called ____.

A) ROM
B) storage
C) virtual memory
D) cache memory
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
6
<strong>      Which of the following is NOT shown in the accompanying figures?</strong> A) touch screen B) trackball C) touch pad D) mouse <strong>      Which of the following is NOT shown in the accompanying figures?</strong> A) touch screen B) trackball C) touch pad D) mouse
<strong>      Which of the following is NOT shown in the accompanying figures?</strong> A) touch screen B) trackball C) touch pad D) mouse
Which of the following is NOT shown in the accompanying figures?

A) touch screen
B) trackball
C) touch pad
D) mouse
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
7
The physical components of a computer are referred to as ____.

A) operating systems
B) specifications
C) configurations
D) hardware
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
8
The computer needs additional components called ____ to accomplish its input, output, and storage functions.

A) mice
B) peripheral devices
C) architecture
D) ports
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
9
Which of the following is NOT a personal computer?

A) laptop
B) desktop
C) mainframe
D) All of the above.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
10
RAM is often referred to as ____ memory.

A) permanent
B) semipermanent
C) volatile
D) None of the above.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
11
A file that tells a computer how to perform a specific task is called a(n) ____ file.

A) executable
B) instruction
C) data
D) configuration
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
12
____ are thin computers that do not have an external keyboard or mouse.

A) Laptops
B) Desktops
C) Tablets
D) Mainframes
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
13
A(n) ____ is based on flash memory, but is intended as a replacement for traditional hard disk drives.

A) CMOS
B) SSD
C) GUI
D) RAM cache
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
14
Megahertz is a measurement of ____.

A) the speed of the microprocessor
B) the amount of RAM
C) RAM speed
D) cache memory
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
15
What temporarily holds programs and data while the computer is on and allows the computer to access that information randomly?

A) cache
B) RAM
C) ROM
D) CMOS
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
16
____ memory is a chip on the motherboard that stores the date, time, and system parameters.

A) ROM
B) RAM
C) CPU
D) CMOS
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
17
Most ____ devices, like keyboards, for example, connect to a computer either with cables or wirelessly.

A) storage
B) touch
C) recording
D) input
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
18
____ computers are used by large businesses, government agencies, and in science and education to provide centralized storage and processing and to manipulate tremendous amounts of data.

A) Subnotebook
B) Optical
C) External
D) Mainframe
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
19
Which of the following is a personal computer?

A) supercomputer
B) mainframe
C) desktop
D) All of the above.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
20
Which of the following is NOT an example of optical storage?

A) CD
B) hard disk
C) Blu-ray
D) DVD
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
21
An example of an output device is a ____.

A) printer
B) keyboard
C) mouse
D) touch pad
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
22
<strong>      The devices shown in the accompanying figure are all ____ devices.</strong> A) output B) pointing C) recording D) storage <strong>      The devices shown in the accompanying figure are all ____ devices.</strong> A) output B) pointing C) recording D) storage
<strong>      The devices shown in the accompanying figure are all ____ devices.</strong> A) output B) pointing C) recording D) storage
The devices shown in the accompanying figure are all ____ devices.

A) output
B) pointing
C) recording
D) storage
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
23
Expansion cards plug into electrical connectors on the motherboard called expansion ____.

A) ports
B) outlets
C) slots
D) buses
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
24
An input device is any hardware peripheral that communicates the results of data processing.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
25
  The printer in the accompanying figure is considered a client.
The printer in the accompanying figure is considered a client.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
26
<strong>  In the accompanying figure, each of the components connected by wires is called a ____.</strong> A) client B) node C) workstation D) server In the accompanying figure, each of the components connected by wires is called a ____.

A) client
B) node
C) workstation
D) server
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
27
____ manage the system resources of a computer so programs can run properly.

A) Database management software
B) Utilities
C) Firewalls
D) Operating systems
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
28
Antivirus software protects against which of the following types of malware?

A) viruses
B) firewalls
C) phishing scams
D) spoofed sites
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
29
DVD+Rs are rewritable.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
30
The communication path between a microprocessor, RAM, and peripherals is called the data bus.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
31
Protocols in data communication establish the countries with which data can be exchanged.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
32
<strong>  In the accompanying figure, the network shown is a ____ network.</strong> A) WiMAX B) client/server C) WLAN D) Bluetooth In the accompanying figure, the network shown is a ____ network.

A) WiMAX
B) client/server
C) WLAN
D) Bluetooth
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
33
A network with a computers dependent on a server is called a client/server network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
34
A hard disk is a type of magnetic storage device.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
35
  In the accompanying figure, each of the items labeled workstation  must have a network interface card installed.
In the accompanying figure, each of the items labeled "workstation"  must have a network interface card installed.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
36
An interface card can be plugged into an expansion slot on the motherboard of a computer.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
37
A device driver is a computer program that makes communication possible between your computer and one of its peripherals.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
38
Which of the following is the smallest unit of measurement?

A) a terabyte
B) a gigabyte
C) a megabyte
D) a kilobyte
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
39
The practice of sending e-mails to customers or potential customers of a legitimate website asking them to click a link in the e-mail is called ____.

A) spoofing
B) phishing
C) pharming
D) spaming
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
40
Database management software allows you to create illustrations, diagrams, graphs, and charts that can be projected before a group, printed out for quick reference, or transmitted to remote computers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
41
A(n) ____________________ is an electronic device that accepts information and instructions from a user, manipulates the information according to the instructions, displays the information in some way, and stores the information for later retrieval.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
42
If you are working on a budget and save the spreadsheet on your hard drive, it is called a(n) executable file. _________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
43
Operating software enables you to perform specific tasks such as writing letters, creating presentations, analyzing statistics, creating graphic, and enhancing photos..
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
44
Explain the differences between a kilobyte, a megabyte, a gigabyte, and a terabyte.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
45
If a keyboard is _________________________, this means that is has been designed to fit the natural placement of your hands and may reduce the risk of repetitive-motion injuries.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
46
Critical Thinking Questions Case 1-2 You have been chosen to upgrade the computer system for the local volunteer association. You want to purchase a system that will still be useful for several years. You want the computer to be able to run faster. What is the easiest thing you can add to make this happen?
A. RAM
B. CMOS
C. motherboard
D. additional operating system
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
47
Critical Thinking Questions Case 1-2 You have been chosen to upgrade the computer system for the local volunteer association. You want to purchase a system that will still be useful for several years. You want to allow volunteers to copy files and carry them with them when they leave. What is a good choice for something that can store files, is transportable, and is small enough to fit in a pocket?
A. motherboard
B. CMOS
C. flash drive
D. optical drive
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
48
Technical information about hardware components on a computer are called configurations . _________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
49
____________________ memory is created and used by most computers when the amount of RAM needed exceeds the RAM available.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
50
Critical Thinking Questions Case 1-1 Christina is a salon owner in Baltimore, Maryland. She wants to create a list of all her clients in order to send them information about new promotions at the salon. She needs to purchase software to help her accomplish this. She also needs to track monthly expenses for her salon and needs software to do this as well. What type of software should Christina purchase to create and manage her collection of customer data?
A. indexing software
B. database management software
C. word processing software
D. operating system software
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
51
Utility software helps analyze, optimize, configure, and maintain a computer. _________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
52
Critical Thinking Questions Case 1-1 Christina is a salon owner in Baltimore, Maryland. She wants to create a list of all her clients in order to send them information about new promotions at the salon. She needs to purchase software to help her accomplish this. She also needs to track monthly expenses for her salon and needs software to do this as well. What type of software should Christina purchase to help her track monthly expenses?
A. spreadsheet software
B. operating system software
C. database management software
D. word processing software
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
53
Processing data is also referred to as ____________________ data.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
54
Discuss the use of the following ways to use the Web to get your work done: searching for information, communicating with others, telecommuting, and cloud computing.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
55
Special high-speed memory located on or near the microprocessor is called ____________________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
56
Visual Basic, C, C++, and Java are all examples of computer programming ____________________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
57
A(n) ____________________ prevents other computers on the Internet from accessing a computer and prevents programs on a computer from accessing the Internet without the computer user's permission.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
58
A(n) system resource is any part of the computer system, including memory, storage devices, and the microprocessor. _________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
59
Phishing is a broad term that describes any program that is designed to cause harm or transmit information to others without the computer owner's permission.  _________________________
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
60
____________________ is the flow of data from the microprocessor to memory to peripherals and back again.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
61
____________________________   use laser technology to store data in the form of tiny pits or bumps.​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
62
​Most computers sold today come with 32-bit processors.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
63
Match between columns
Programs that track a computer user's Internet usage and send this data back to the company or person that created it without the computer user's permission or knowledge.
command
Programs that track a computer user's Internet usage and send this data back to the company or person that created it without the computer user's permission or knowledge.
spyware
Programs that track a computer user's Internet usage and send this data back to the company or person that created it without the computer user's permission or knowledge.
USB
Programs that track a computer user's Internet usage and send this data back to the company or person that created it without the computer user's permission or knowledge.
ROM
Programs that track a computer user's Internet usage and send this data back to the company or person that created it without the computer user's permission or knowledge.
software
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
64
The most frequently used output device is a ___________.​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
65
Match between columns
An input instruction that tells the computer how to process data.
command
An input instruction that tells the computer how to process data.
spyware
An input instruction that tells the computer how to process data.
USB
An input instruction that tells the computer how to process data.
ROM
An input instruction that tells the computer how to process data.
software
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
66
Match between columns
A high-speed serial port which allows multiple connections at the same port.
command
A high-speed serial port which allows multiple connections at the same port.
spyware
A high-speed serial port which allows multiple connections at the same port.
USB
A high-speed serial port which allows multiple connections at the same port.
ROM
A high-speed serial port which allows multiple connections at the same port.
software
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
67
Match between columns
Intangible components of a computer system.
command
Intangible components of a computer system.
spyware
Intangible components of a computer system.
USB
Intangible components of a computer system.
ROM
Intangible components of a computer system.
software
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
68
The Microsoft Edge browser will appear as an alert when a known spoofed site is visited.​

A) Yes
B) No
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
69
​What is essentially a robot that deposits multiple layers of material (typically heated plastic) onto a surface?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
70
Match between columns
The permanent storage location for a set of instructions the computer uses when turned on.
command
The permanent storage location for a set of instructions the computer uses when turned on.
spyware
The permanent storage location for a set of instructions the computer uses when turned on.
USB
The permanent storage location for a set of instructions the computer uses when turned on.
ROM
The permanent storage location for a set of instructions the computer uses when turned on.
software
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
71
Critical Thinking Questions Case 1-2 You have been chosen to upgrade the computer system for the local volunteer association. You want to purchase a system that will still be useful for several years. You want the volunteers to have access to the most energy efficient type of monitor available. What is the best type of monitor technology to purchase?
A. TEM
B. fluorescent backlight
C. LED
D. LCD
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
72
​The motherboard is a circuit board.

A) Yes
B) No
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
73
The internet is a subset of the World Wide Web.​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
74
Bluetooth is an input device.​

A) Yes
B) No
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
75
A computer sees the world as series of __________ digits or bits.​
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 75 في هذه المجموعة.