-
One file storage metaphor that is based on a hierarchical diagram is sometimes referred to as a ____ structure.
tree
-
The most obvious responsibility of your computer’s operating system is to
provide an environment for running software
-
____ is based on a system of “cards” that represents applications in a multitasking environmen
Palm WebOS
-
A(n) ____ backup makes a copy of only those files that were added or changed since your last backup.
incremental
-
A(n) ____ backup contains any files that have changed since the last full backup.
differential
-
c:\music\reggae\marleyonelove.mp3
In the accompanying figure, mp3 is an example of a
file extension
-
An extension of .wav designates a ____ type of file.
sound
-
The strengths of Microsoft Windows include all of the following EXCEPT
reliability
-
Microsoft Windows is installed on more than ____ of the world’s personal computers.
80%
-
Using Microsoft Windows products, like the one in the accompanying figure, to select files and folders which are listed consecutively
click on the first and last file while holding down the Shift key
-
In the accompanying figure, the Computer is an example of a(n
icon
-
A file ____, in the context of Windows, is a piece of information that describes a file
tag
-
Activities associated with resource management include all of the following EXCEPT
installing new memory
-
The file system used by Mac OS is
HFS+
-
An extension of .ocx designates a ____ type of file
support
-
A device used for backup, that is convenient and durable but expensive in high-capacity models, is a(n)
USB flash drive
-
c:\music\reggae\marleyonelove.mp3
In the accompanying figure, Music is an example of a
primary folder
-
For backup purposes, a fast, limited capacity device that can be locked in a secure location is a(n)
removable hard disk
-
Using Microsoft Windows products, like the one in the accompanying figure, to select files and folders which are not listed consecutively
click on each file while holding down the Ctrl key
-
Files stored in noncontiguous clusters are
fragmented
-
File endings with .exe are ____ files.
executable
-
In the accompanying figure, the word "Calculator" appears in
the Start menu
-
The file system used by Windows Vista is
NTFS
-
A device used for backup, whose capacity depends on the space allocated to each user and is fast and convenient, is a(n)
network server
-
Microsoft offers different desktop editions of its Microsoft Windows for various markets; these editions include all of the following EXCEPT _
Mobile
-
In the accompanying figure, Reggae is an example of a _
secondary folder
-
File management capabilities available from application software include ____ files.
all of the above
-
The first versions of Windows were referred to as operating environments rather than operating systems because
they required DOS to supply the operating system kernel
-
All of the following are examples of resources EXCEPT
a file
-
Current versions of Windows support file names up to ____ characters long
255
-
In the Mac OS, the resource ____ stores information about the data
fork
-
In the Mac OS, the data ____ contains data or the commands for a program
fork
-
A(n) ____ backup includes every file from the computer’s primary storage device
full system
-
the term ____ is a technical term for the region of memory that holds data waiting to be transferred from one device to another
buffer
-
A description of what actually happens on the disk and in the circuits is represented by a
physical storage model
-
for backup purposes, a fast, inexpensive, and convenient device that, if damaged, all backups will be lost is a(n
external hard disk
-
to delete data from a disk in such a way that no one can ever read it, you should
use special file shredder software
-
A(n) ____ disk is a bootable CD, DVD, or other media that contains a complete copy of your computer’s hard disk as it existed when shipped from the manufacturer
recovery
-
A ____ displays the options associated with a command
dialog box
-
was developed by a Finnish student. It continues to gain popularity as an operating system for personal computers. It is distributed under the terms of a GP
LINUX
-
A ____ is an additional set of commands that the computer displays after you make a selection from the main menu
submenu
-
__ provides process and memory management services that allow two or more tasks, jobs, or programs to run simultaneously
Multitasking
-
Utilities, like the one shown in the accompanying figure, often use some sort of storage metaphor to help you visualize and mentally organize the files on your disks. The metaphors are called ____ storage models
logical
-
A disk ____ is a bit-by-bit copy of the data from all sectors of a disk
-
An operating system’s ____ capability supports a division of labor among all the processing units
multiprocessing
-
Files maintained by the Macintosh operating system can have two parts, called
forks
-
n extension of .sys designates a ____ type of file
configuration
-
Weaknesses of Mac OS include
limited applications
-
In the accompanying figure, the Notification area appears in the
taskbar
-
In the accompanying figure, Marley One Love is an example of a
file name
-
The accompanying figure is an example of a(n) ____ tool
file management
-
Most personal computers today are sold with preinstalled operating systems, including all of the following EXCEPT
HP
-
A program called ____ is an example of Windows software
Microsoft Word for Windows
-
An optional file identifier that is separated from a main file name by a period is a
-
The strengths of Mac OS include
security
-
_ is the process of creating a CD, DVD, or BD by selecting all the files and then copying them in a single session
Disc mastering
-
The file system used by Windows 7 is
NTFS
-
In the accompanying figure, C: is an example of a(n)
drive
-
Information kept about a file includes
-
In relation to disks, ____ is a recording technology that lets you record in multiple sessions
packet writing
-
The difference between the Save and the Save As commands is that
all of the above
-
A computer file’s location is defined by a
file specification
-
VMWare and Parallels Desktop software are examples of
virtual machine software
-
OS is a popular handheld operating system used on Ericsson and Nokia smart phones
Symbian
-
Most hard disks are formatted by the
factory
-
A group of sectors is called a _
cluster
-
The operating system that was developed in 1969 by AT&T’s Bell Labs and gained a good reputation for its dependability is
UNIX
-
Within a single program, ____ allows multiple parts to run simultaneously
multithreading
-
Two devices on a network might have to negotiate their communications protocols through a process called
handshaking
-
Which of the following is NOT a type of network device
workstation
-
Today, most networks, like the one in the accompanying figure, are configured with ____ technology
Ethernet
-
A ____ is a generic term for any device or software code used to join two networks
gateway
-
The most popular wireless LAN technology is
Wi-Fi
-
Dial-up Internet access is an example of a(n) ____ communications system
narrowband
-
software may be used by personal computer users when they want to encrypt e-mail or other documents
PGP
-
Computers may break a code by using a(n) ____, which consists of trying all possible keys
brute force attack
-
Wi-Fi encompasses all of the following standards EXCEPT
802.11p
-
encryption uses one key to encrypt a message but another key to decrypt the message
Public key
-
_ transforms a message in such a way that its contents are hidden from unauthorized readers
Encryption
-
A message that has not been encrypted is referred to as _
plaintext
-
With PGP, to whom do you send the private key?
-
High-bandwidth communications systems are sometimes referred to as
broadband
-
A Wi-Fi network transmits data as radio waves over ____ frequencies.
2.4 GHz or 5.8 GHz
-
The original Ethernet standard carried data over a coaxial cable bus topology at ___
10 Mbps
-
Most wired networks in homes, schools, and businesses use Ethernet technology that is defined by ____ standards
IEEE 802.3
-
Which of the following is NOT an advantage of using a wired network
limited mobility
-
On an Ethernet, a ____ is broadcast to every device but is accepted only by the device to which it is addressed
packet
-
Which of the following is NOT true about the speed of Ethernet routers
If you have a 10/100 Mbps router and several of the network computers have Gigabit Ethernet adapters, the Gigabit adapters will receive data at the Gigabit rate.
-
Most wireless networks transport data as ____ signals
RF (radio frequency)
-
A printer with built-in networking does not have to be attached to a workstation or a print server because it has its own
network adapter
-
The type of network shown in the accompanying figure is known as a
LAN
-
is a crucial technology for e-commerce and e-mail.
Public key encryption
-
On Macs, you can view the number of packets sent, received, and dropped from your network connection using the ____ application.
Network Utility
-
To configure a file server, open a browser from any workstation, enter the file server’s ____ address, and provide the administrator ID and password
IP
-
The telephone network uses a technology called ____, which establishes a dedicated, private link between telephones for the duration of a call.
circuit switching
-
Current Ethernet standards allow extensive flexibility in network ____ to meet the needs of small and large installationS
topology
-
An encrypted message is referred to as
ciphertext
-
Which of the following is NOT true about Wi-Fi standards
All of the standards are cross compatible.
-
A wired network is one that uses ____ to connect network devices
cables
-
To set up a print server, connect it to the printer’s ____ port and access the configuration settings using your browser
USB
-
A ____ is a physical path or a frequency used for signal transmission
communications channel
-
A network ____ sends data only to the devices specified as the destination
switch
-
The process of converting ciphertext into plaintext is called _
decryption
-
Ethernet networks ____.
use a nonproprietary technology, making Ethernet equipment available from a variety of vendors
-
____, also referred to as personal mode, is a type of WPA used on most home networks.
PSK
-
In ____ key encryption, the key used to encrypt a message is also used to decrypt the message
symmetric
-
_ takes care of situations in which two network devices attempt to transmit packets at the same time
CSMA/CD
-
In a ____ topology, network nodes are connected in a closed circle
ring
-
Which of the following is NOT true?
LANs are less vulnerable than standalone computers to malicious code.
-
Which of the following is true about Bluetooth?
It forms networks automatically when two or more devices are within range.
-
In the technology referred to as ____, a message is divided into several parcels that can be routed independently to their destination.
packet switching
-
Wireless ____ scrambles the data transmitted between wireless devices and then unscrambles the data only on devices that have a valid key.
encryption
-
In a peer-to-peer mode, a network ____.
allows workstations to share resources, like files and applications
-
The physical arrangement of devices in a network is referred to as its physical
topology
-
(n) ____ server stores files and supplies them to workstations upon request.
FIle
-
A ____ server is a computer whose primary purpose is to be a repository for files that can be accessed by network workstations.
file
-
A network, like the one in the accompanying figure, would be used to __
connect personal computers within a very limited geographical area, such as a single building
-
If Windows displays the ____ icon and indicates the network is connected, it is ready for use
Local Area Connection
-
In a wireless ____ network, devices broadcast directly to each other.
ad-hoc
-
Symptoms of network problems include which of the following?
all of the above
-
A(n) ____ is the basis for scrambling and unscrambling the data transmitted between wireless devices.
wireless network key
-
What is the IEEE designation for the Gigabit Ethernet standard?
IEEE 802.3z
-
Which of the following can serve as a node on the network in a LAN?
all of the above
-
Which of the following does NOT impact signal strength on a wireless network?
encryption
-
___ technology improves the speed and range of a LAN by using two or more antennae to essentially send multiple sets of signals between network devices.
MIMO
-
In the accompanying figure, which physical topology is NOT represented
mesh
-
In ____ mode, workstations can share responsibility for processing, storage, printing, and communications taskS
peer-to-peer
-
A tree topology __
consists of multiple star networks connected into a bus configuration by a backbone
-
The original wireless encryption was called
WEP
-
____ is a word, number, or phrase that must be known to encrypt or decrypt a message
cryptographic key
-
A protocol known as ____ is designed to automatically distribute IP addresses
DHCP
-
Wireless signal range can be limited by
all of the above
-
A ____ topology features a central connection point for all workstations and peripherals
star
-
A ____ is a procedure for encrypting or decrypting a message
cryptographic algorithm
-
____ occurs when hackers intercept signals by cruising through a business district or neighborhood with a Wi-Fi enabled notebook computer
LAN jacking
-
Which of the following is NOT true?
Purchasing a single software copy for an entire LAN is always allowed under the terms of a single-user license agreement.
-
In the accompanying figure, the item marked B is a(n)
label
-
An example of mathematical modeling software is _
Mathcad
-
When installing software, you should _
select custom when you don’t need all the features
-
in the accompanying figure, the file marked A is a(n)
data file
-
__ is typically available as a trial version.
Demoware
-
Software designed to generate unique musical compositions simply by selecting the musical style, instrument, key, and tempo is
computer-aided music
-
When using word processing software to analyze the reading level of your document, you should use a
Readability formula
-
A service pack ____
provides updates to the operating system
-
All of the following are examples of utility software EXCEPT
Windows
-
A security suite will typically include all of the following EXCEPT ____software
anti-adware
-
is typically commercial software that is marketed under a try-before-you buy policy.
Shareware
-
Popular presentation software products include all of the following EXCEPT
Movie Maker
-
System software is designed to accomplish ____ tasks
computer-centric
-
It is illegal to do all the following with software EXCEPT
copy and keep as backup
-
Adobe Reader works with files stored in standard ____ formaT
PDF
-
Security suites can be __
all of the above
-
A virus signature is a ____.
unique series of instructions
-
To get rid of software you no longer want, you __
run an uninstall routine
-
Spreadsheets are particularly useful for
what-if analysis
-
Downloadable software can be provided in different formats, such as
all of the above
-
You can use the results from a search on a database in all of these ways EXCEPT to
create records
-
An example of software most commonly associated with productivity software is
word processing software
-
Data files supplied with a software package support ____ file extensions
.hlp
-
is typically sold in a store or online
is typically sold in a store or online
-
Software requires many files because ____
it allows flexibility and efficiency
-
If you are installing a local application from a distribution CD, and it does not automatically run, you should ___
look for a file called setup.exe
-
Web applications are ___
accessed and run on the Web
-
In the accompanying figure, the index card represents a single database
record
-
In the accompanying figure, the item marked C is a(n)
value
-
The paragraph style that is used to assure paragraphs are aligned evenly on both the right and left is
fully justified
-
The type of software that targets musicians and music students who want to develop musical skills is
ear training
-
To find a particular record or group of records in a database, you use a(n) _
query
-
A ____ is any software that can automate a task or autonomously execute a task when commanded to do so
bot
-
IN the accompanying figure, the files marked C is a(n)
support program file
-
Software considered to be utility software is _
setup wizard
-
In the accompanying figure, the file marked B is aN
executable file
-
Support programs have a(n) ____ extension.
.dll
-
In the accompanying figure, the item marked B represents
(INDEX CARD)
a record
-
A shrink-wrap license goes into effect as soon as you __
open it
-
The term rootkit refers to __
software tools used to conceal malware and backdoors
-
In the accompanying figure, the item marked A is a
active cell
-
In order for software to work on a given computer, it must meet
system requirements
-
In the accompanying figure, the items marked C represent
(INDEX CARD)
Fields
-
Productivity software that has sophisticated features to help you produce professional-quality output is considered ____ software.
desktop publishing
-
A formula can contain ____ and mathematical operators.
cell references
-
During product activation, you must __
enter a product key
-
___ is a type of application software designed to help several people collaborate.
Groupware
-
You can purchase software at a variety of locations, such as __
all of the above
-
If virus protection software identifies a virus, it can try to take all of the following actions except
highlight the file in Windows Explorer
-
An end-user license agreement, like the one in the accompanying figure, is
displayed on-screen when you first install software
-
An example of a system requirement that is important in determining if a software program will work on a computer is _
all of the above
-
Productivity software that provides you with the ability to create, spell-check, edit, and format is considered ____ software.
word processing
-
To avoid security threats, a user can ___
avoid opening suspicious email attachments
-
The type of system software designed to help you monitor and configure settings for your computer system equipment is ____ software.
utility
-
As shown in the accompanying figure, a ____ is a legal contract that defines the ways in which you may use a computer program.
software license
-
Product validation can create a(n) ____ based on your validation code and your computer’s internal serial number.
hash value
-
Application software includes ___
statistical software
-
Application software is designed to accomplish ____ tasks.
real-world
-
_ applications are software that is designed to reside on a computer’s hard disk.
Local
-
Indicators of pirated software include all of the following EXCEPT software that ____
is downloaded
-
may be sold or distributed free of charge in compiled form but must always include the source code.
Open source software
-
In the accompanying figure, the item marked A represents __
(INDEX CARD)
data
-
The intersection of a column and a row on a spreadsheet is called a
cell
-
Software that is the musician’s equivalent to a word processor is
notation
-
Desktop widgets include all of the following EXCEPT __
icons
|
|