Deck 1: Understanding Essential Computer

ملء الشاشة (f)
exit full mode
سؤال
Which of the following is the smallest unit of measurement?

A) a terabyte
B) a gigabyte
C) a megabyte
D) a kilobyte
استخدم زر المسافة أو
up arrow
down arrow
لقلب البطاقة.
سؤال
The physical components of a computer are referred to as ____.

A) operating systems
B) specifications
C) configurations
D) hardware
سؤال
Which of the following is a personal computer?

A) supercomputer
B) mainframe
C) desktop
D) all of the above
سؤال
The computer needs additional components called ____ to accomplish its input, output, and storage functions.

A) mice
B) peripheral devices
C) architecture
D) ports
سؤال
You are running two programs at once that require 10 megabytes each on a computer that only has 16 megabytes of RAM. What makes this possible?

A) CMOS
B) ROM
C) cache
D) virtual memory
سؤال
Personal computers commonly use the ____ code system to represent character data.

A) KB
B) LAN
C) ASCII
D) COBOL
سؤال
A file that tells a computer how to perform a specific task is called a(n) ____ file.

A) executable
B) instruction
C) data
D) configuration
سؤال
A hard copy is another name for a file that you ____.

A) saved on a floppy disk
B) sent as an email
C) backed up on a flash drive
D) printed on a printer
سؤال
Special high-speed memory reserved for the microprocessor's use is called ____.

A) ROM
B) storage
C) virtual memory
D) cache memory
سؤال
Which of the following dot pitches gives you the sharpest picture?

A) .45
B) .38
C) .32
D) .26
سؤال
Megahertz is a measurement of ____.

A) the speed of the microprocessor
B) the amount of RAM
C) RAM speed
D) cache memory
سؤال
An example of an output device is a ____.

A) printer
B) keyboard
C) mouse
D) touch pad
سؤال
Which of the following is NOT an example of optical storage?

A) CD
B) hard disk
C) Blu-ray
D) DVD
سؤال
Dot pitch is the ____.

A) number of pixels a monitor displays
B) distance between pixels in a graphics display
C) number of rectangles in a character-based display grid
D) the speed at which pixels travel
سؤال
What termporarily holds programs and data while the computer is on and allows the computer to access that information randomly?

A) cache
B) RAM
C) ROM
D) CMOS
سؤال
RAM is often referred to as ____ memory.

A) permanent
B) semipermanent
C) volatile
D) none of the above
سؤال
Expansion cards plug into electrical connectors on the motherboard called ____.

A) ports
B) outlets
C) slots
D) buses
سؤال
Which of the following is NOT a personal computer?

A) laptop
B) desktop
C) mainframe
D) all of the above
سؤال
Processing tasks occur on the ____.

A) mouse
B) keyboard
C) motherboard
D) operating system
سؤال
The speed of a dot matrix printer is measured in ____.

A) pages per minute
B) pages per second
C) characters per minute
D) characters per second
سؤال
A device driver is a computer program that makes communication possible between your computer and one of its peripherals.
سؤال
The seamless nature of OLE among some applications is referred to as ____.

A) user interface
B) integration
C) GUI
D) source symmetry
سؤال
Database management software allows you to create illustrations, diagrams, graphs, and charts that can be projected before a group, printed out for quick reference, or transmitted to remote computers.
سؤال
An interface card could be plugged into an expansion slot on the main board of a computer.
سؤال
____ allocate system resources, manage storage space, maintain security, detect equipment failure, and control basic input and output.

A) Database management software
B) Utilities
C) Firewalls
D) Operating systems
سؤال
Protocols in data communication establish the countries with which data can be exchanged.
سؤال
Delphi, Visual Basic, C, C++, and Java are all examples of computer programming ____________________.
سؤال
DVD+Rs are rewritable.
سؤال
A system resource is any part of the computer system, including memory, storage devices, and the microprocessor, that can be used by a computer program.
سؤال
A hard disk is a type of magnetic storage device.
سؤال
The operating system is the set of instructions that direct the computer to accomplish specific tasks such as document production and spreadsheet calculations.
سؤال
Antivirus software protects against which of the following types of malware?

A) Viruses
B) Trojan horses
C) Worms
D) all of the above
سؤال
The communication path between a microprocessor, RAM, and peripherals is called the data bus.
سؤال
Utilities are another category of system software that augment the operating system by taking over some of its responsibility for allocating hardware resources.
سؤال
If you are working on a budget and save the spreadsheet on your hard drive, it is called an executable file .
سؤال
Technical information about components on a computer are called configurations .
سؤال
The practice of sending e-mails to customers or potential customers of a legitimate Web site asking them to click a link in the e-mail is called ____.

A) spoofing
B) phishing
C) pharming
D) spaming
سؤال
A network with a file server is called a client/server network.
سؤال
PS/2 ports are another standard for transferring information between digital devices similar to USB.
سؤال
Phishing is a broad term that describes any program that is intended to cause harm or convey information to others without the owner's permission.
سؤال
You have been chosen to upgrade the computer system for the local volunteer association. You want to purchase a system that will be useful for several years. You want to be able to allow volunteers to copy certain files and carry them with them when they leave. What is a good choice for something that can store files, is transportable, and is small enough to fit in a pocket?
سؤال
Match between columns
Intangible components of a computer system.
ROM
Intangible components of a computer system.
software
Intangible components of a computer system.
USB
Intangible components of a computer system.
ASCII
Intangible components of a computer system.
spyware
Programs that track a computer user's Internet usage and send this data back to the company or person that created it without the computer user's permission or knowledge.
ROM
Programs that track a computer user's Internet usage and send this data back to the company or person that created it without the computer user's permission or knowledge.
software
Programs that track a computer user's Internet usage and send this data back to the company or person that created it without the computer user's permission or knowledge.
USB
Programs that track a computer user's Internet usage and send this data back to the company or person that created it without the computer user's permission or knowledge.
ASCII
Programs that track a computer user's Internet usage and send this data back to the company or person that created it without the computer user's permission or knowledge.
spyware
The permanent storage location for a set of instructions the computer uses when turned on.
ROM
The permanent storage location for a set of instructions the computer uses when turned on.
software
The permanent storage location for a set of instructions the computer uses when turned on.
USB
The permanent storage location for a set of instructions the computer uses when turned on.
ASCII
The permanent storage location for a set of instructions the computer uses when turned on.
spyware
A high-speed serial port which allows multiple connections at the same port.
ROM
A high-speed serial port which allows multiple connections at the same port.
software
A high-speed serial port which allows multiple connections at the same port.
USB
A high-speed serial port which allows multiple connections at the same port.
ASCII
A high-speed serial port which allows multiple connections at the same port.
spyware
Used by personal computers to represent character data.
ROM
Used by personal computers to represent character data.
software
Used by personal computers to represent character data.
USB
Used by personal computers to represent character data.
ASCII
Used by personal computers to represent character data.
spyware
سؤال
A(n) ____________________ prevents other computers on the Internet from accessing a computer and prevents programs on a computer from accessing the Internet without the computer user's permission.
سؤال
Special high-speed memory built into the microprocessor for the microprocessor's use is called ____________________.
سؤال
What type of software should Christina purchase to help her create and track expenses?
سؤال
____________________ is the flow of data from the microprocessor to memory to peripherals and back again .
سؤال
Processing data is also referred to as ____________________ data.
سؤال
You have been chosen to upgrade the computer system for the local volunteer association. You want to purchase a system that will be useful for several years. The desk on which the computer will sit is somewhat small.What is the best type of monitor to purchase?
سؤال
Operating systems, utilities, device drivers, and programming languages are the four types of ____________________ software.
سؤال
Christina is a salon owner in Baltimore, Maryland. She decided to create a list of all her clients in order to send them information about new promotions at the salon. She needs to purchase software to help her accomplish this. She also needs to track monthly expenses for her salon and needs software to do this as well. What type of software should Christina purchase to create and manage her collection of customer data?
سؤال
You have been chosen to upgrade the computer system for the local volunteer association. You want to purchase a system that will be useful for several years. You want the computer to be able to perform faster. What is the easiest way to make the computer run quickly?
سؤال
____________________ memory is created and used by most computers when the amount of RAM needed exceeds the RAM available.
سؤال
Explain the differences between a kilobyte, a megabyte, a gigabyte, and a terabyte.
سؤال
Explain the differences between RAM, ROM, CMOS, cache, and virtual memory.
فتح الحزمة
قم بالتسجيل لفتح البطاقات في هذه المجموعة!
Unlock Deck
Unlock Deck
1/54
auto play flashcards
العب
simple tutorial
ملء الشاشة (f)
exit full mode
Deck 1: Understanding Essential Computer
1
Which of the following is the smallest unit of measurement?

A) a terabyte
B) a gigabyte
C) a megabyte
D) a kilobyte
D
2
The physical components of a computer are referred to as ____.

A) operating systems
B) specifications
C) configurations
D) hardware
D
3
Which of the following is a personal computer?

A) supercomputer
B) mainframe
C) desktop
D) all of the above
C
4
The computer needs additional components called ____ to accomplish its input, output, and storage functions.

A) mice
B) peripheral devices
C) architecture
D) ports
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 54 في هذه المجموعة.
فتح الحزمة
k this deck
5
You are running two programs at once that require 10 megabytes each on a computer that only has 16 megabytes of RAM. What makes this possible?

A) CMOS
B) ROM
C) cache
D) virtual memory
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 54 في هذه المجموعة.
فتح الحزمة
k this deck
6
Personal computers commonly use the ____ code system to represent character data.

A) KB
B) LAN
C) ASCII
D) COBOL
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 54 في هذه المجموعة.
فتح الحزمة
k this deck
7
A file that tells a computer how to perform a specific task is called a(n) ____ file.

A) executable
B) instruction
C) data
D) configuration
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 54 في هذه المجموعة.
فتح الحزمة
k this deck
8
A hard copy is another name for a file that you ____.

A) saved on a floppy disk
B) sent as an email
C) backed up on a flash drive
D) printed on a printer
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 54 في هذه المجموعة.
فتح الحزمة
k this deck
9
Special high-speed memory reserved for the microprocessor's use is called ____.

A) ROM
B) storage
C) virtual memory
D) cache memory
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 54 في هذه المجموعة.
فتح الحزمة
k this deck
10
Which of the following dot pitches gives you the sharpest picture?

A) .45
B) .38
C) .32
D) .26
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 54 في هذه المجموعة.
فتح الحزمة
k this deck
11
Megahertz is a measurement of ____.

A) the speed of the microprocessor
B) the amount of RAM
C) RAM speed
D) cache memory
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 54 في هذه المجموعة.
فتح الحزمة
k this deck
12
An example of an output device is a ____.

A) printer
B) keyboard
C) mouse
D) touch pad
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 54 في هذه المجموعة.
فتح الحزمة
k this deck
13
Which of the following is NOT an example of optical storage?

A) CD
B) hard disk
C) Blu-ray
D) DVD
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 54 في هذه المجموعة.
فتح الحزمة
k this deck
14
Dot pitch is the ____.

A) number of pixels a monitor displays
B) distance between pixels in a graphics display
C) number of rectangles in a character-based display grid
D) the speed at which pixels travel
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 54 في هذه المجموعة.
فتح الحزمة
k this deck
15
What termporarily holds programs and data while the computer is on and allows the computer to access that information randomly?

A) cache
B) RAM
C) ROM
D) CMOS
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 54 في هذه المجموعة.
فتح الحزمة
k this deck
16
RAM is often referred to as ____ memory.

A) permanent
B) semipermanent
C) volatile
D) none of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 54 في هذه المجموعة.
فتح الحزمة
k this deck
17
Expansion cards plug into electrical connectors on the motherboard called ____.

A) ports
B) outlets
C) slots
D) buses
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 54 في هذه المجموعة.
فتح الحزمة
k this deck
18
Which of the following is NOT a personal computer?

A) laptop
B) desktop
C) mainframe
D) all of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 54 في هذه المجموعة.
فتح الحزمة
k this deck
19
Processing tasks occur on the ____.

A) mouse
B) keyboard
C) motherboard
D) operating system
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 54 في هذه المجموعة.
فتح الحزمة
k this deck
20
The speed of a dot matrix printer is measured in ____.

A) pages per minute
B) pages per second
C) characters per minute
D) characters per second
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 54 في هذه المجموعة.
فتح الحزمة
k this deck
21
A device driver is a computer program that makes communication possible between your computer and one of its peripherals.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 54 في هذه المجموعة.
فتح الحزمة
k this deck
22
The seamless nature of OLE among some applications is referred to as ____.

A) user interface
B) integration
C) GUI
D) source symmetry
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 54 في هذه المجموعة.
فتح الحزمة
k this deck
23
Database management software allows you to create illustrations, diagrams, graphs, and charts that can be projected before a group, printed out for quick reference, or transmitted to remote computers.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 54 في هذه المجموعة.
فتح الحزمة
k this deck
24
An interface card could be plugged into an expansion slot on the main board of a computer.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 54 في هذه المجموعة.
فتح الحزمة
k this deck
25
____ allocate system resources, manage storage space, maintain security, detect equipment failure, and control basic input and output.

A) Database management software
B) Utilities
C) Firewalls
D) Operating systems
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 54 في هذه المجموعة.
فتح الحزمة
k this deck
26
Protocols in data communication establish the countries with which data can be exchanged.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 54 في هذه المجموعة.
فتح الحزمة
k this deck
27
Delphi, Visual Basic, C, C++, and Java are all examples of computer programming ____________________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 54 في هذه المجموعة.
فتح الحزمة
k this deck
28
DVD+Rs are rewritable.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 54 في هذه المجموعة.
فتح الحزمة
k this deck
29
A system resource is any part of the computer system, including memory, storage devices, and the microprocessor, that can be used by a computer program.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 54 في هذه المجموعة.
فتح الحزمة
k this deck
30
A hard disk is a type of magnetic storage device.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 54 في هذه المجموعة.
فتح الحزمة
k this deck
31
The operating system is the set of instructions that direct the computer to accomplish specific tasks such as document production and spreadsheet calculations.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 54 في هذه المجموعة.
فتح الحزمة
k this deck
32
Antivirus software protects against which of the following types of malware?

A) Viruses
B) Trojan horses
C) Worms
D) all of the above
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 54 في هذه المجموعة.
فتح الحزمة
k this deck
33
The communication path between a microprocessor, RAM, and peripherals is called the data bus.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 54 في هذه المجموعة.
فتح الحزمة
k this deck
34
Utilities are another category of system software that augment the operating system by taking over some of its responsibility for allocating hardware resources.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 54 في هذه المجموعة.
فتح الحزمة
k this deck
35
If you are working on a budget and save the spreadsheet on your hard drive, it is called an executable file .
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 54 في هذه المجموعة.
فتح الحزمة
k this deck
36
Technical information about components on a computer are called configurations .
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 54 في هذه المجموعة.
فتح الحزمة
k this deck
37
The practice of sending e-mails to customers or potential customers of a legitimate Web site asking them to click a link in the e-mail is called ____.

A) spoofing
B) phishing
C) pharming
D) spaming
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 54 في هذه المجموعة.
فتح الحزمة
k this deck
38
A network with a file server is called a client/server network.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 54 في هذه المجموعة.
فتح الحزمة
k this deck
39
PS/2 ports are another standard for transferring information between digital devices similar to USB.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 54 في هذه المجموعة.
فتح الحزمة
k this deck
40
Phishing is a broad term that describes any program that is intended to cause harm or convey information to others without the owner's permission.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 54 في هذه المجموعة.
فتح الحزمة
k this deck
41
You have been chosen to upgrade the computer system for the local volunteer association. You want to purchase a system that will be useful for several years. You want to be able to allow volunteers to copy certain files and carry them with them when they leave. What is a good choice for something that can store files, is transportable, and is small enough to fit in a pocket?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 54 في هذه المجموعة.
فتح الحزمة
k this deck
42
Match between columns
Intangible components of a computer system.
ROM
Intangible components of a computer system.
software
Intangible components of a computer system.
USB
Intangible components of a computer system.
ASCII
Intangible components of a computer system.
spyware
Programs that track a computer user's Internet usage and send this data back to the company or person that created it without the computer user's permission or knowledge.
ROM
Programs that track a computer user's Internet usage and send this data back to the company or person that created it without the computer user's permission or knowledge.
software
Programs that track a computer user's Internet usage and send this data back to the company or person that created it without the computer user's permission or knowledge.
USB
Programs that track a computer user's Internet usage and send this data back to the company or person that created it without the computer user's permission or knowledge.
ASCII
Programs that track a computer user's Internet usage and send this data back to the company or person that created it without the computer user's permission or knowledge.
spyware
The permanent storage location for a set of instructions the computer uses when turned on.
ROM
The permanent storage location for a set of instructions the computer uses when turned on.
software
The permanent storage location for a set of instructions the computer uses when turned on.
USB
The permanent storage location for a set of instructions the computer uses when turned on.
ASCII
The permanent storage location for a set of instructions the computer uses when turned on.
spyware
A high-speed serial port which allows multiple connections at the same port.
ROM
A high-speed serial port which allows multiple connections at the same port.
software
A high-speed serial port which allows multiple connections at the same port.
USB
A high-speed serial port which allows multiple connections at the same port.
ASCII
A high-speed serial port which allows multiple connections at the same port.
spyware
Used by personal computers to represent character data.
ROM
Used by personal computers to represent character data.
software
Used by personal computers to represent character data.
USB
Used by personal computers to represent character data.
ASCII
Used by personal computers to represent character data.
spyware
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 54 في هذه المجموعة.
فتح الحزمة
k this deck
43
A(n) ____________________ prevents other computers on the Internet from accessing a computer and prevents programs on a computer from accessing the Internet without the computer user's permission.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 54 في هذه المجموعة.
فتح الحزمة
k this deck
44
Special high-speed memory built into the microprocessor for the microprocessor's use is called ____________________.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 54 في هذه المجموعة.
فتح الحزمة
k this deck
45
What type of software should Christina purchase to help her create and track expenses?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 54 في هذه المجموعة.
فتح الحزمة
k this deck
46
____________________ is the flow of data from the microprocessor to memory to peripherals and back again .
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 54 في هذه المجموعة.
فتح الحزمة
k this deck
47
Processing data is also referred to as ____________________ data.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 54 في هذه المجموعة.
فتح الحزمة
k this deck
48
You have been chosen to upgrade the computer system for the local volunteer association. You want to purchase a system that will be useful for several years. The desk on which the computer will sit is somewhat small.What is the best type of monitor to purchase?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 54 في هذه المجموعة.
فتح الحزمة
k this deck
49
Operating systems, utilities, device drivers, and programming languages are the four types of ____________________ software.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 54 في هذه المجموعة.
فتح الحزمة
k this deck
50
Christina is a salon owner in Baltimore, Maryland. She decided to create a list of all her clients in order to send them information about new promotions at the salon. She needs to purchase software to help her accomplish this. She also needs to track monthly expenses for her salon and needs software to do this as well. What type of software should Christina purchase to create and manage her collection of customer data?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 54 في هذه المجموعة.
فتح الحزمة
k this deck
51
You have been chosen to upgrade the computer system for the local volunteer association. You want to purchase a system that will be useful for several years. You want the computer to be able to perform faster. What is the easiest way to make the computer run quickly?
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 54 في هذه المجموعة.
فتح الحزمة
k this deck
52
____________________ memory is created and used by most computers when the amount of RAM needed exceeds the RAM available.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 54 في هذه المجموعة.
فتح الحزمة
k this deck
53
Explain the differences between a kilobyte, a megabyte, a gigabyte, and a terabyte.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 54 في هذه المجموعة.
فتح الحزمة
k this deck
54
Explain the differences between RAM, ROM, CMOS, cache, and virtual memory.
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 54 في هذه المجموعة.
فتح الحزمة
k this deck
locked card icon
فتح الحزمة
افتح القفل للوصول البطاقات البالغ عددها 54 في هذه المجموعة.