Deck 1: Understanding Essential Computer

Full screen (f)
exit full mode
Question
Which of the following is the smallest unit of measurement?

A) a terabyte
B) a gigabyte
C) a megabyte
D) a kilobyte
Use Space or
up arrow
down arrow
to flip the card.
Question
The physical components of a computer are referred to as ____.

A) operating systems
B) specifications
C) configurations
D) hardware
Question
Which of the following is a personal computer?

A) supercomputer
B) mainframe
C) desktop
D) all of the above
Question
The computer needs additional components called ____ to accomplish its input, output, and storage functions.

A) mice
B) peripheral devices
C) architecture
D) ports
Question
You are running two programs at once that require 10 megabytes each on a computer that only has 16 megabytes of RAM. What makes this possible?

A) CMOS
B) ROM
C) cache
D) virtual memory
Question
Personal computers commonly use the ____ code system to represent character data.

A) KB
B) LAN
C) ASCII
D) COBOL
Question
A file that tells a computer how to perform a specific task is called a(n) ____ file.

A) executable
B) instruction
C) data
D) configuration
Question
A hard copy is another name for a file that you ____.

A) saved on a floppy disk
B) sent as an email
C) backed up on a flash drive
D) printed on a printer
Question
Special high-speed memory reserved for the microprocessor's use is called ____.

A) ROM
B) storage
C) virtual memory
D) cache memory
Question
Which of the following dot pitches gives you the sharpest picture?

A) .45
B) .38
C) .32
D) .26
Question
Megahertz is a measurement of ____.

A) the speed of the microprocessor
B) the amount of RAM
C) RAM speed
D) cache memory
Question
An example of an output device is a ____.

A) printer
B) keyboard
C) mouse
D) touch pad
Question
Which of the following is NOT an example of optical storage?

A) CD
B) hard disk
C) Blu-ray
D) DVD
Question
Dot pitch is the ____.

A) number of pixels a monitor displays
B) distance between pixels in a graphics display
C) number of rectangles in a character-based display grid
D) the speed at which pixels travel
Question
What termporarily holds programs and data while the computer is on and allows the computer to access that information randomly?

A) cache
B) RAM
C) ROM
D) CMOS
Question
RAM is often referred to as ____ memory.

A) permanent
B) semipermanent
C) volatile
D) none of the above
Question
Expansion cards plug into electrical connectors on the motherboard called ____.

A) ports
B) outlets
C) slots
D) buses
Question
Which of the following is NOT a personal computer?

A) laptop
B) desktop
C) mainframe
D) all of the above
Question
Processing tasks occur on the ____.

A) mouse
B) keyboard
C) motherboard
D) operating system
Question
The speed of a dot matrix printer is measured in ____.

A) pages per minute
B) pages per second
C) characters per minute
D) characters per second
Question
A device driver is a computer program that makes communication possible between your computer and one of its peripherals.
Question
The seamless nature of OLE among some applications is referred to as ____.

A) user interface
B) integration
C) GUI
D) source symmetry
Question
Database management software allows you to create illustrations, diagrams, graphs, and charts that can be projected before a group, printed out for quick reference, or transmitted to remote computers.
Question
An interface card could be plugged into an expansion slot on the main board of a computer.
Question
____ allocate system resources, manage storage space, maintain security, detect equipment failure, and control basic input and output.

A) Database management software
B) Utilities
C) Firewalls
D) Operating systems
Question
Protocols in data communication establish the countries with which data can be exchanged.
Question
Delphi, Visual Basic, C, C++, and Java are all examples of computer programming ____________________.
Question
DVD+Rs are rewritable.
Question
A system resource is any part of the computer system, including memory, storage devices, and the microprocessor, that can be used by a computer program.
Question
A hard disk is a type of magnetic storage device.
Question
The operating system is the set of instructions that direct the computer to accomplish specific tasks such as document production and spreadsheet calculations.
Question
Antivirus software protects against which of the following types of malware?

A) Viruses
B) Trojan horses
C) Worms
D) all of the above
Question
The communication path between a microprocessor, RAM, and peripherals is called the data bus.
Question
Utilities are another category of system software that augment the operating system by taking over some of its responsibility for allocating hardware resources.
Question
If you are working on a budget and save the spreadsheet on your hard drive, it is called an executable file .
Question
Technical information about components on a computer are called configurations .
Question
The practice of sending e-mails to customers or potential customers of a legitimate Web site asking them to click a link in the e-mail is called ____.

A) spoofing
B) phishing
C) pharming
D) spaming
Question
A network with a file server is called a client/server network.
Question
PS/2 ports are another standard for transferring information between digital devices similar to USB.
Question
Phishing is a broad term that describes any program that is intended to cause harm or convey information to others without the owner's permission.
Question
You have been chosen to upgrade the computer system for the local volunteer association. You want to purchase a system that will be useful for several years. You want to be able to allow volunteers to copy certain files and carry them with them when they leave. What is a good choice for something that can store files, is transportable, and is small enough to fit in a pocket?
Question
Match between columns
Intangible components of a computer system.
ROM
Intangible components of a computer system.
software
Intangible components of a computer system.
USB
Intangible components of a computer system.
ASCII
Intangible components of a computer system.
spyware
Programs that track a computer user's Internet usage and send this data back to the company or person that created it without the computer user's permission or knowledge.
ROM
Programs that track a computer user's Internet usage and send this data back to the company or person that created it without the computer user's permission or knowledge.
software
Programs that track a computer user's Internet usage and send this data back to the company or person that created it without the computer user's permission or knowledge.
USB
Programs that track a computer user's Internet usage and send this data back to the company or person that created it without the computer user's permission or knowledge.
ASCII
Programs that track a computer user's Internet usage and send this data back to the company or person that created it without the computer user's permission or knowledge.
spyware
The permanent storage location for a set of instructions the computer uses when turned on.
ROM
The permanent storage location for a set of instructions the computer uses when turned on.
software
The permanent storage location for a set of instructions the computer uses when turned on.
USB
The permanent storage location for a set of instructions the computer uses when turned on.
ASCII
The permanent storage location for a set of instructions the computer uses when turned on.
spyware
A high-speed serial port which allows multiple connections at the same port.
ROM
A high-speed serial port which allows multiple connections at the same port.
software
A high-speed serial port which allows multiple connections at the same port.
USB
A high-speed serial port which allows multiple connections at the same port.
ASCII
A high-speed serial port which allows multiple connections at the same port.
spyware
Used by personal computers to represent character data.
ROM
Used by personal computers to represent character data.
software
Used by personal computers to represent character data.
USB
Used by personal computers to represent character data.
ASCII
Used by personal computers to represent character data.
spyware
Question
A(n) ____________________ prevents other computers on the Internet from accessing a computer and prevents programs on a computer from accessing the Internet without the computer user's permission.
Question
Special high-speed memory built into the microprocessor for the microprocessor's use is called ____________________.
Question
What type of software should Christina purchase to help her create and track expenses?
Question
____________________ is the flow of data from the microprocessor to memory to peripherals and back again .
Question
Processing data is also referred to as ____________________ data.
Question
You have been chosen to upgrade the computer system for the local volunteer association. You want to purchase a system that will be useful for several years. The desk on which the computer will sit is somewhat small.What is the best type of monitor to purchase?
Question
Operating systems, utilities, device drivers, and programming languages are the four types of ____________________ software.
Question
Christina is a salon owner in Baltimore, Maryland. She decided to create a list of all her clients in order to send them information about new promotions at the salon. She needs to purchase software to help her accomplish this. She also needs to track monthly expenses for her salon and needs software to do this as well. What type of software should Christina purchase to create and manage her collection of customer data?
Question
You have been chosen to upgrade the computer system for the local volunteer association. You want to purchase a system that will be useful for several years. You want the computer to be able to perform faster. What is the easiest way to make the computer run quickly?
Question
____________________ memory is created and used by most computers when the amount of RAM needed exceeds the RAM available.
Question
Explain the differences between a kilobyte, a megabyte, a gigabyte, and a terabyte.
Question
Explain the differences between RAM, ROM, CMOS, cache, and virtual memory.
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/54
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 1: Understanding Essential Computer
1
Which of the following is the smallest unit of measurement?

A) a terabyte
B) a gigabyte
C) a megabyte
D) a kilobyte
D
2
The physical components of a computer are referred to as ____.

A) operating systems
B) specifications
C) configurations
D) hardware
D
3
Which of the following is a personal computer?

A) supercomputer
B) mainframe
C) desktop
D) all of the above
C
4
The computer needs additional components called ____ to accomplish its input, output, and storage functions.

A) mice
B) peripheral devices
C) architecture
D) ports
Unlock Deck
Unlock for access to all 54 flashcards in this deck.
Unlock Deck
k this deck
5
You are running two programs at once that require 10 megabytes each on a computer that only has 16 megabytes of RAM. What makes this possible?

A) CMOS
B) ROM
C) cache
D) virtual memory
Unlock Deck
Unlock for access to all 54 flashcards in this deck.
Unlock Deck
k this deck
6
Personal computers commonly use the ____ code system to represent character data.

A) KB
B) LAN
C) ASCII
D) COBOL
Unlock Deck
Unlock for access to all 54 flashcards in this deck.
Unlock Deck
k this deck
7
A file that tells a computer how to perform a specific task is called a(n) ____ file.

A) executable
B) instruction
C) data
D) configuration
Unlock Deck
Unlock for access to all 54 flashcards in this deck.
Unlock Deck
k this deck
8
A hard copy is another name for a file that you ____.

A) saved on a floppy disk
B) sent as an email
C) backed up on a flash drive
D) printed on a printer
Unlock Deck
Unlock for access to all 54 flashcards in this deck.
Unlock Deck
k this deck
9
Special high-speed memory reserved for the microprocessor's use is called ____.

A) ROM
B) storage
C) virtual memory
D) cache memory
Unlock Deck
Unlock for access to all 54 flashcards in this deck.
Unlock Deck
k this deck
10
Which of the following dot pitches gives you the sharpest picture?

A) .45
B) .38
C) .32
D) .26
Unlock Deck
Unlock for access to all 54 flashcards in this deck.
Unlock Deck
k this deck
11
Megahertz is a measurement of ____.

A) the speed of the microprocessor
B) the amount of RAM
C) RAM speed
D) cache memory
Unlock Deck
Unlock for access to all 54 flashcards in this deck.
Unlock Deck
k this deck
12
An example of an output device is a ____.

A) printer
B) keyboard
C) mouse
D) touch pad
Unlock Deck
Unlock for access to all 54 flashcards in this deck.
Unlock Deck
k this deck
13
Which of the following is NOT an example of optical storage?

A) CD
B) hard disk
C) Blu-ray
D) DVD
Unlock Deck
Unlock for access to all 54 flashcards in this deck.
Unlock Deck
k this deck
14
Dot pitch is the ____.

A) number of pixels a monitor displays
B) distance between pixels in a graphics display
C) number of rectangles in a character-based display grid
D) the speed at which pixels travel
Unlock Deck
Unlock for access to all 54 flashcards in this deck.
Unlock Deck
k this deck
15
What termporarily holds programs and data while the computer is on and allows the computer to access that information randomly?

A) cache
B) RAM
C) ROM
D) CMOS
Unlock Deck
Unlock for access to all 54 flashcards in this deck.
Unlock Deck
k this deck
16
RAM is often referred to as ____ memory.

A) permanent
B) semipermanent
C) volatile
D) none of the above
Unlock Deck
Unlock for access to all 54 flashcards in this deck.
Unlock Deck
k this deck
17
Expansion cards plug into electrical connectors on the motherboard called ____.

A) ports
B) outlets
C) slots
D) buses
Unlock Deck
Unlock for access to all 54 flashcards in this deck.
Unlock Deck
k this deck
18
Which of the following is NOT a personal computer?

A) laptop
B) desktop
C) mainframe
D) all of the above
Unlock Deck
Unlock for access to all 54 flashcards in this deck.
Unlock Deck
k this deck
19
Processing tasks occur on the ____.

A) mouse
B) keyboard
C) motherboard
D) operating system
Unlock Deck
Unlock for access to all 54 flashcards in this deck.
Unlock Deck
k this deck
20
The speed of a dot matrix printer is measured in ____.

A) pages per minute
B) pages per second
C) characters per minute
D) characters per second
Unlock Deck
Unlock for access to all 54 flashcards in this deck.
Unlock Deck
k this deck
21
A device driver is a computer program that makes communication possible between your computer and one of its peripherals.
Unlock Deck
Unlock for access to all 54 flashcards in this deck.
Unlock Deck
k this deck
22
The seamless nature of OLE among some applications is referred to as ____.

A) user interface
B) integration
C) GUI
D) source symmetry
Unlock Deck
Unlock for access to all 54 flashcards in this deck.
Unlock Deck
k this deck
23
Database management software allows you to create illustrations, diagrams, graphs, and charts that can be projected before a group, printed out for quick reference, or transmitted to remote computers.
Unlock Deck
Unlock for access to all 54 flashcards in this deck.
Unlock Deck
k this deck
24
An interface card could be plugged into an expansion slot on the main board of a computer.
Unlock Deck
Unlock for access to all 54 flashcards in this deck.
Unlock Deck
k this deck
25
____ allocate system resources, manage storage space, maintain security, detect equipment failure, and control basic input and output.

A) Database management software
B) Utilities
C) Firewalls
D) Operating systems
Unlock Deck
Unlock for access to all 54 flashcards in this deck.
Unlock Deck
k this deck
26
Protocols in data communication establish the countries with which data can be exchanged.
Unlock Deck
Unlock for access to all 54 flashcards in this deck.
Unlock Deck
k this deck
27
Delphi, Visual Basic, C, C++, and Java are all examples of computer programming ____________________.
Unlock Deck
Unlock for access to all 54 flashcards in this deck.
Unlock Deck
k this deck
28
DVD+Rs are rewritable.
Unlock Deck
Unlock for access to all 54 flashcards in this deck.
Unlock Deck
k this deck
29
A system resource is any part of the computer system, including memory, storage devices, and the microprocessor, that can be used by a computer program.
Unlock Deck
Unlock for access to all 54 flashcards in this deck.
Unlock Deck
k this deck
30
A hard disk is a type of magnetic storage device.
Unlock Deck
Unlock for access to all 54 flashcards in this deck.
Unlock Deck
k this deck
31
The operating system is the set of instructions that direct the computer to accomplish specific tasks such as document production and spreadsheet calculations.
Unlock Deck
Unlock for access to all 54 flashcards in this deck.
Unlock Deck
k this deck
32
Antivirus software protects against which of the following types of malware?

A) Viruses
B) Trojan horses
C) Worms
D) all of the above
Unlock Deck
Unlock for access to all 54 flashcards in this deck.
Unlock Deck
k this deck
33
The communication path between a microprocessor, RAM, and peripherals is called the data bus.
Unlock Deck
Unlock for access to all 54 flashcards in this deck.
Unlock Deck
k this deck
34
Utilities are another category of system software that augment the operating system by taking over some of its responsibility for allocating hardware resources.
Unlock Deck
Unlock for access to all 54 flashcards in this deck.
Unlock Deck
k this deck
35
If you are working on a budget and save the spreadsheet on your hard drive, it is called an executable file .
Unlock Deck
Unlock for access to all 54 flashcards in this deck.
Unlock Deck
k this deck
36
Technical information about components on a computer are called configurations .
Unlock Deck
Unlock for access to all 54 flashcards in this deck.
Unlock Deck
k this deck
37
The practice of sending e-mails to customers or potential customers of a legitimate Web site asking them to click a link in the e-mail is called ____.

A) spoofing
B) phishing
C) pharming
D) spaming
Unlock Deck
Unlock for access to all 54 flashcards in this deck.
Unlock Deck
k this deck
38
A network with a file server is called a client/server network.
Unlock Deck
Unlock for access to all 54 flashcards in this deck.
Unlock Deck
k this deck
39
PS/2 ports are another standard for transferring information between digital devices similar to USB.
Unlock Deck
Unlock for access to all 54 flashcards in this deck.
Unlock Deck
k this deck
40
Phishing is a broad term that describes any program that is intended to cause harm or convey information to others without the owner's permission.
Unlock Deck
Unlock for access to all 54 flashcards in this deck.
Unlock Deck
k this deck
41
You have been chosen to upgrade the computer system for the local volunteer association. You want to purchase a system that will be useful for several years. You want to be able to allow volunteers to copy certain files and carry them with them when they leave. What is a good choice for something that can store files, is transportable, and is small enough to fit in a pocket?
Unlock Deck
Unlock for access to all 54 flashcards in this deck.
Unlock Deck
k this deck
42
Match between columns
Intangible components of a computer system.
ROM
Intangible components of a computer system.
software
Intangible components of a computer system.
USB
Intangible components of a computer system.
ASCII
Intangible components of a computer system.
spyware
Programs that track a computer user's Internet usage and send this data back to the company or person that created it without the computer user's permission or knowledge.
ROM
Programs that track a computer user's Internet usage and send this data back to the company or person that created it without the computer user's permission or knowledge.
software
Programs that track a computer user's Internet usage and send this data back to the company or person that created it without the computer user's permission or knowledge.
USB
Programs that track a computer user's Internet usage and send this data back to the company or person that created it without the computer user's permission or knowledge.
ASCII
Programs that track a computer user's Internet usage and send this data back to the company or person that created it without the computer user's permission or knowledge.
spyware
The permanent storage location for a set of instructions the computer uses when turned on.
ROM
The permanent storage location for a set of instructions the computer uses when turned on.
software
The permanent storage location for a set of instructions the computer uses when turned on.
USB
The permanent storage location for a set of instructions the computer uses when turned on.
ASCII
The permanent storage location for a set of instructions the computer uses when turned on.
spyware
A high-speed serial port which allows multiple connections at the same port.
ROM
A high-speed serial port which allows multiple connections at the same port.
software
A high-speed serial port which allows multiple connections at the same port.
USB
A high-speed serial port which allows multiple connections at the same port.
ASCII
A high-speed serial port which allows multiple connections at the same port.
spyware
Used by personal computers to represent character data.
ROM
Used by personal computers to represent character data.
software
Used by personal computers to represent character data.
USB
Used by personal computers to represent character data.
ASCII
Used by personal computers to represent character data.
spyware
Unlock Deck
Unlock for access to all 54 flashcards in this deck.
Unlock Deck
k this deck
43
A(n) ____________________ prevents other computers on the Internet from accessing a computer and prevents programs on a computer from accessing the Internet without the computer user's permission.
Unlock Deck
Unlock for access to all 54 flashcards in this deck.
Unlock Deck
k this deck
44
Special high-speed memory built into the microprocessor for the microprocessor's use is called ____________________.
Unlock Deck
Unlock for access to all 54 flashcards in this deck.
Unlock Deck
k this deck
45
What type of software should Christina purchase to help her create and track expenses?
Unlock Deck
Unlock for access to all 54 flashcards in this deck.
Unlock Deck
k this deck
46
____________________ is the flow of data from the microprocessor to memory to peripherals and back again .
Unlock Deck
Unlock for access to all 54 flashcards in this deck.
Unlock Deck
k this deck
47
Processing data is also referred to as ____________________ data.
Unlock Deck
Unlock for access to all 54 flashcards in this deck.
Unlock Deck
k this deck
48
You have been chosen to upgrade the computer system for the local volunteer association. You want to purchase a system that will be useful for several years. The desk on which the computer will sit is somewhat small.What is the best type of monitor to purchase?
Unlock Deck
Unlock for access to all 54 flashcards in this deck.
Unlock Deck
k this deck
49
Operating systems, utilities, device drivers, and programming languages are the four types of ____________________ software.
Unlock Deck
Unlock for access to all 54 flashcards in this deck.
Unlock Deck
k this deck
50
Christina is a salon owner in Baltimore, Maryland. She decided to create a list of all her clients in order to send them information about new promotions at the salon. She needs to purchase software to help her accomplish this. She also needs to track monthly expenses for her salon and needs software to do this as well. What type of software should Christina purchase to create and manage her collection of customer data?
Unlock Deck
Unlock for access to all 54 flashcards in this deck.
Unlock Deck
k this deck
51
You have been chosen to upgrade the computer system for the local volunteer association. You want to purchase a system that will be useful for several years. You want the computer to be able to perform faster. What is the easiest way to make the computer run quickly?
Unlock Deck
Unlock for access to all 54 flashcards in this deck.
Unlock Deck
k this deck
52
____________________ memory is created and used by most computers when the amount of RAM needed exceeds the RAM available.
Unlock Deck
Unlock for access to all 54 flashcards in this deck.
Unlock Deck
k this deck
53
Explain the differences between a kilobyte, a megabyte, a gigabyte, and a terabyte.
Unlock Deck
Unlock for access to all 54 flashcards in this deck.
Unlock Deck
k this deck
54
Explain the differences between RAM, ROM, CMOS, cache, and virtual memory.
Unlock Deck
Unlock for access to all 54 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 54 flashcards in this deck.