the two major types of system software programs are utility programs and
operating software
_______ of the operating system enables users to communicate with the computer system
user interface
OS X is the operating system developed by
Apple
All of the following are examples of network operating systems except
MS DOS
UNIX was developed by Ken Thompson and Dennis Richie, who worked at
AT and T's Bell Labs
Most supercomputers use the ________ operating system.
Linux
Which of the following operating systems are used on most tablets?
Android and iOS
Most smartphones use operating systems developed by ________.
Google and Apple
Which operating system is used by most desktop and laptop computers?
Windows
Windows 8 uses a(n) ________ account for easy access and storage of online files.
OneDrive
The latest version of the Mac OS X is ________.
Mavericks
Which of the following is NOT a user interface?
application programming interface (API)
Using hard disk space to temporarily store data or instructions from RAM is referred to as ________.
virtual memory
Each device attached to your computer comes with a special program called a(n) ________ that enables the device and operating system to communicate with each other.
device driver
Which of the following is the first step in the boot process?
The BIOS is activated by turning on the computer.
The basic input/output system (BIOS) is stored on a ________ chip.
ROM
All of the following are terms related to part of the boot process EXCEPT ________.
USB
Errors in computer software are called ________.
bugs
C: denotes a ________ directory that is at the top of the filing structure of a computer.
root
When using Windows 8 File Explorer, which view provides the most information at a glance?
Details
All of the following can be used in an OS X file name EXCEPT ________.
:
The location of a file is specified by its ________.
file path
C:WindowsSystem32driversetcprotocol is an example of a file ________.
path
Which of the following is the name of a Microsoft Excel file?
inventory.xlsx
Deleted files on a Mac computer are moved to the ________.
Trash
Which of the following Windows utility programs arranges pieces of files on your hard drive to allow for faster access?
Disk Defragmenter
Which of the following is NOT a Windows utility program?
Desktop
Which utility removes redundancies in a file to reduce the file size?
File Compression
You can use the Windows ________ to check on a nonresponsive program.
Task Manager
Mac OS X includes a backup utility called ________.
Time Machine
Every computer has an operating system.
true
Gaming consoles, such as Xbox 360 and iPods, do not need an operating system.
false
Windows 8 has a new interface that is optimized for touch-screen devices.
true
A personal computer can only have one operating system installed on it.
false
About 90% of desktop and laptop computers run some version of Windows.
true
Android is an open source operating system for personal computers and as a network OS.
false
When your computer runs out of RAM, the operating system borrows space from the CPU.
false
Installing a device driver can sometimes cause system instability.
true
CMOS is a special kind of memory that uses a great deal of power.
false
Preemptive multitasking is the term used when the operating system processes higher-priority tasks before lower-priority tasks.
True
Windows 7's File Explorer has been replaced by Windows 8's Windows Explorer.
False
You can use System Restore to restore your system's settings back to a specific date when everything was working properly.
true
File names in Windows are case-sensitive.
false
The High Contrast accessibility feature enables you to select a color scheme setting in which you control the contrast between text and background.
True
You can return to the Start screen in Windows 8 by pressing the Windows key on the computer keyboard.
true
The rule of thumb that predicts that CPU capacity will double every 2 years is called ________ Law.
Moore's
The processor market for desktop and laptop computers is dominated by ________.
Intel
Which of the following does NOT determine processor power?
speed of the motherboard
Which of the following activities is carried out by the ALU?
perform arithmetic calculations
All of the following are part of the machine cycle EXCEPT ________.
encode
The CPU consists of which two parts?
the control unit and the arithmetic logic unit
The control unit is one component of the ________.
CPU
Running the CPU at a faster speed than the manufacturer recommends is called ________.
Overclocking
There are ________ levels of cache memory.
Three
________ provides high-speed information processing by enabling a new set of instructions to start before the previous set is finished.
Hyperthrading
The speed of a level of cache memory is impacted by ________.
the chip's proximity to the CPU
RAM is an example of ________ storage.
volatile
The amount of RAM storage is measured in ________.
GB
In most current systems, ________ is the type of RAM used.
DDR3
Windows uses a memory-management technique known as ________ to monitor which applications you frequently use and preloads them into your system memory.
Superfetch
When referring to hard drives, access time is measured in ________.
milliseconds
A ________ uses electronic memory and has no motors or moving parts.
solid state drive
Which optical disc has the greatest storage capacity?
Blu-Ray
Which of the following is NOT an optical disc format?
Read erasable RE
The ________ has the largest capacity of any storage device.
mechanical hard drive
Which of the follow ports is NOT used to connect to a video card?
USB
To speed up the display of graphics, a(n) ________ is installed on some video cards.
GPU
A ________ enables the computer to drive the speaker system.
sound card
In Dolby Digital 7.1, the 1 indicates a ________ speaker.
subwoofer
Running the Disk Defragmenter utility will ________.
make the hard drive work more efficiently
Running the Disk Cleanup utility is a quick way to ________.
clear out unnecessary files
To remove all the changes made to your system, the Windows ________ utility returns your computer to the state it was in when it came from the factory.
refresh
Which statement pertaining to system reliability is FALSE?
An accumulation of temporary Internet files has no effect on your computer's overall performance.
To securely erase data, the U.S. Department of Defense suggests that the data be overwritten ________ times.
seven
Hard drives have been growing in storage capacity by about 50% each year.
true
Desktop computer systems are less reliable than laptop computers.
false
Level 3 cache memory is faster than the other cache memory levels.
false
The use of multiple cores on one CPU chip allows the execution of two or more sets of instructions at the same time.
true
Cache memory is a form of ROM.
false
Level 1 cache contains the least amount of storage of the cache memory levels.
true
Accessing data from the hard drive to send to the CPU is faster than accessing data from RAM.
false
The heads of a hard disk drive touch the surface of the platter to read or write the data.
false
Optical discs store data using tiny pits and lands.
true
Video cards include their own RAM.
true
When using multiple monitors, you must have multiple video cards.
false
3-D sound is different from surround-sound.
true
RAID 0 automatically duplicates your data and saves it on two identical drives.
false
Thunderbolt can carry three channels of information on the same connector.
false
If you reformat the hard drive on a computer, it erases all personal information from your computer and makes it safe to donate.
false
A computer ________ is two or more computers connected using software and hardware so that they can communicate with each other.
natwork
A ________ is a device connected to a network such as a printer or a game console.
node
________ is the actual speed of data transfer that is achieved and is always less than or equal to the data transfer rate.
throughput
All of the following are tasks for network administration of a large organization EXCEPT ________.
purchasing initial equipment for the network
Which of the following is NOT used to classify network architectures?
sped of the network
________ is the maximum speed at which data can be transferred between two nodes.
bandwidth
A ________ is a network located in your residence that connects to all your digital devices.
HAN
A network that spans a large physical distance is called a ________.
WAN
A large network designed to provide access to a specific geographic area, such as a large city, is a ________.
MAN
Which transmission medium transmits data the fastest?
fiber optic cable
Normal telephone cable is a type of ________.
twister pair cable
A client/server network is an example of ________ administration
central
A peer-to-peer (P2P) network is an example of ________ administration.
local
The fastest version of wireless Ethernet is ________.
802.11ac
Which of the following is NOT a type of cable used in wired networks?
unshielded coaxial
Which of the following is NOT a type of UTP cable you would use in a wired Ethernet network?
CAT 7B
The most popular transmission media option for wired home Ethernet networks is ________ cable.
unshielded twisted pair UTP
Wireless network devices use ________ to communicate with each other.
Radio waves
For the nodes on a network to communicate with each other and access the network, each node needs a ________.
network adapter
On a network, a(n) ________ helps prevent data packets from colliding with each other.
switch
Sophisticated networks generally use which of the following hardware devices to ease the flow of data through the network?
routers and switches
To transfer data packets between two or more networks, a ________ is used.
router
Data are sent through a network in bundles called ________.
Packets
All of the following operating systems support P2P networking EXCEPT ________.
unix
Client/server networks are controlled by a central server that runs specialized software called a(n) ________.
Network operating system NOS
Which of the following is NOT a wired broadband Internet connection option?
dial up
A(n) ________ device facilitates file sharing and data backup.
NAS
Using a network without the network owner's permission is known as ________.
piggy backing
All of the following are extra precautions you can take to secure a wireless network EXCEPT ________.
enable SSID bro
The unique number assigned to a network adapter by the manufacturer is referred to as the ________ address.
MAC
A printer connected to a wireless network is considered to be a node on that network.
true
Sharing files is a benefit of a network.
true
In a peer-to-peer network, one computer acts as the central computer.
false
P2P networks are most commonly used in home networks.
true
The Internet is a WAN.
true
Current wired Ethernet networks in the United States are based on the IEEE 802.11ac standard.
False
Ethernet networks are always connected using twisted-pair cable technology.
false
Wireless network connections are slower than wired broadband connections.
true
The most popular transmission media option for wired Ethernet networks is UTP cable.
true
Most computers today come with Ethernet adapters already installed.
true
A router acts like a traffic signal on a network.
false
A P2P network needs network operating system software installed on every node.
false
Wireless networks are more vulnerable to attack than wired networks.
true
WEP is a stronger form of security than WPA.
false
Limiting your signal range does not help increase wireless network security.
false
The Form 1 3D printer founders used the crowdfunding site ________ to ask for $100,000 in pledges.
kickstarter
The term ________refers to the use of a single unifying device that handles media, Internet, entertainment, and telephone needs.
digital convergence
What is iOS?
an operating system for mobile devices
The operating system of a cell phone is stored in ________.
ROM
The primary input devices for smartphones are ________.
microphones and touch pad
A(n) ________ chip converts sound waves from a voice into digital signal.
analog-to-digital converter
A(n) ________ is included in a cell phone to handle the compression of data for it to be quickly transmitted to another phone.
digital signal processor chip
A(n) ________ converts your voice's sound waves into digital signals.
analog-to-digital converter chip
Which of the following uses radio waves to transmit data signals over short distances?
Bluetooth
Many mobile devices include a micro ________ port.
USB
Text messaging is also called ________.
short message service SMS
SMS messages are limited to a maximum of ________ characters.
160
You can send messages that include photos and videos between mobile devices using ________ technology.
multimedia message service MMS
An Internet connectivity plan is also known as a ________ plan.
data
All of the following are advantages of VoIP EXCEPT ________.
excellent reliability during during internet or power outages
________ is a very well-known free VoIP provider.
Skype
The global positioning system is a network of 21 ________ plus 3 working spares.
satellites
A main difference between the tablet and the smartphone is the ________.
screen size
The distance between two near field communication (NFC) devices is limited to about ________.
1.5 inches
In the United States, e-books account for about ________ of all book sales.
20-30%
________ is digital textual information that can be stored, manipulated, and transmitted by electronic devices.
E-Text
Your mobile device files can be synchronized using ________.
cloud service
A portable media player can play files with all of the following file extensions EXCEPT ________.
accdb
________ allows only limited use of media that have been legally purchased.
digital rights management
Which of the following describes the number of times an analog wave is measured each second during an analog-to-digital conversion?
sampling rate
Which of the following digital image formats compresses the image file?
jpeg
Which of the following is NOT a video file extension?
jpg
A(n) ________ cable carries all audio and video information from devices to a connected TV.
HDMI
Inexpensive phones with modest processors and simple interfaces are called feature phones.
true
Smartphones all use the Android operating system.
false
iPhones let you add SD flash cards.
false
SMS messages are limited to a maximum of 160 words.
false
A tablet uses a full traditional operating system.
true
SMS technology sends both text and pictures.
false
There are more virus attacks on cell phone and smartphones than there are on PCs.
false
VoIP can be considered an alternative to a traditional landline phone service.
true
DRM-free music can legally be moved from system to system.
true
The conversion rate is the number of times per second that the analog signal is measured and converted into a digital value.
False
When converting analog waves to a series of numerical values, the higher the sampling rate, the more accurately the original wave can be re-created.
true
Raw files are larger than JPEG files.
true
Cellular networks offer faster data-transfer speed than WiFi offers.
false
With Skype software installed on your phone, you can call any phone number for free.
false
VoIP stands for Voice over Internet Protocol.
true
Every new cell/smartphone has to include a GPS chip.
true