Deck 6: Purchasing and Maintaining a Computer
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/75
Play
Full screen (f)
Deck 6: Purchasing and Maintaining a Computer
1
If you boot up your computer and it doesn't get past the startup screen, the problem might be with the hard drive.
True
2
Computers with the Intel i7 processors are best for gamers and heavy technical users.
True
3
You can back up your files to remote servers over the Internet, called surge backup.
False
4
New Windows OS computers start around $800 for a basic ultrabook.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
5
The longest battery life of a tablet on a single charge is around 4 hours.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
6
Many business people use scanning apps, turning their smartphones into portable scanners.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
7
A disadvantage of the all-in-one form factor is that the box is larger and takes up a significant amount of space.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
8
Heat is bad for electronics, but low temperatures are unlikely to damage a computer's mechanical and electronic components.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
9
Use passwords that are at least five characters with a combination of upper- and lowercase letters, numbers, and symbols.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
10
The amount of RAM you need is independent of what programs you intend to run.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
11
If you need Microsoft Office or other installed programs, keep in mind that not all tablets can run traditional programs.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
12
Advantages of the convertible form factor include that it is small and portable and often includes phone and text capabilities.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
13
Once you determine your budget, you can narrow your search to look for the best computer that fits your budget.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
14
If you have a restricted budget, buy a computer with a more powerful processor and less memory-you can add more memory to it later.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
15
File History is the backup and restore feature on a Windows 8.x computer.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
16
Magnets have a damaging effect on solid state storage devices.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
17
You should shut down your computer or disconnect it from the Internet if you are not using it for extended periods of time.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
18
Hard drive storage uses magnetic technology to arrange particles on the disk.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
19
Once you determine the form factor for your computer, the next decision you need to make is what operating system you will use.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
20
Often, the data on a computer is worth more than the computer itself.
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
21
A(n) ____ computer provides a detachable keyboard base that has extra ports or drives.
A) desktop
B) convertible
C) ultrabook
D) tablet
A) desktop
B) convertible
C) ultrabook
D) tablet
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
22
RAM is measured in terabytes . _________________________
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
23
The term Ultrabook is a registered trademark of the Intel Corporation. _________________________
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
24
A disk degragmentation utility removes unused files from your hard drive so the computer doesn't search through unneeded files. _________________________
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
25
Intel ____ processors are best for light use such as Microsoft Office, Web research, and email.
A) i3
B) i5
C) i7
D) i9
A) i3
B) i5
C) i7
D) i9
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
26
Disadvantages of a(n) ____ computer include that they are less powerful and offer less functionality than other types of computers.
A) tablet
B) ultrabook
C) notebook
D) desktop
A) tablet
B) ultrabook
C) notebook
D) desktop
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
27
Portable computers and peripherals may have an AC adapter as a(n) external power supply. _________________________
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
28
You can use a cable lock to secure a computer to a table or desk. _________________________
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
29
Cloud storage technology uses light in the form of a low-power laser beam to record and read a disk. _________________________
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
30
Because wires can get tangled, many add-on devices can connect wirelessly using Bluetooth technology. _________________________
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
31
The first consideration when planning a computer purpose should be ____.
A) budget
B) memory
C) peripheral devices
D) size and shape
A) budget
B) memory
C) peripheral devices
D) size and shape
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
32
One of the main operating systems for desktop and laptop computers is ____.
A) Blackberry
B) Apple iOS
C) Windows
D) Android
A) Blackberry
B) Apple iOS
C) Windows
D) Android
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
33
To prevent power fluctuations from damaging electronic components, you should always use a(n) power suppressor with your computer. _________________________
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
34
Utility programs can help return your computer to better working condition by scanning for viruses and spyware. _________________________
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
35
Adware poses a security risk because it can track and steal your personal information. _________________________
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
36
The ____ controls the computer's operations.
A) device driver
B) form factor
C) memory
D) processor
A) device driver
B) form factor
C) memory
D) processor
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
37
The ____ coordinates the functions of various hardware components and determines the types and brands of application software you can use.
A) virtual memory
B) device driver
C) platform
D) form factor
A) virtual memory
B) device driver
C) platform
D) form factor
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
38
____ is temporary storage used to store data and operate programs while the computer is running.
A) Random Access Memory (RAM)
B) Virtual memory
C) Flash memory
D) Encrypting File System (EFS)
A) Random Access Memory (RAM)
B) Virtual memory
C) Flash memory
D) Encrypting File System (EFS)
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
39
An advantage of a(n) ____ computer is that internal system components and electronics are integrated into the back of the monitor.
A) desktop
B) notebook
C) laptop
D) All-in-One
A) desktop
B) notebook
C) laptop
D) All-in-One
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
40
The ____ is the size and shape of the computer.
A) device driver
B) form factor
C) platform
D) operating system
A) device driver
B) form factor
C) platform
D) operating system
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
41
To prevent power fluctuations from damaging your computer, you should always use a(n) ____ with your computer.
A) uninterruptible power supply
B) virtual memory system
C) solid state drive
D) surge suppressor
A) uninterruptible power supply
B) virtual memory system
C) solid state drive
D) surge suppressor
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
42
More damaging than power outages are power ____.
A) sinks
B) crashes
C) fluctuations
D) platforms
A) sinks
B) crashes
C) fluctuations
D) platforms
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
43
____ automatically protects all of the data on your computer.
A) Virtual memory
B) Optical storage
C) A firewall
D) Full data encryption
A) Virtual memory
B) Optical storage
C) A firewall
D) Full data encryption
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
44
____ are short number sequences, kept secret and frequently used by banks, used to access accounts.
A) Usernames
B) Passwords
C) Bytes
D) PINs
A) Usernames
B) Passwords
C) Bytes
D) PINs
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
45
____ tags are one type of real-time location system.
A) UPS
B) RFID
C) EFS
D) FDE
A) UPS
B) RFID
C) EFS
D) FDE
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
46
Your best protection against data loss is to ____ your files to an external storage location.
A) convert
B) extend
C) process
D) back up
A) convert
B) extend
C) process
D) back up
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
47
You can avoid data loss by installing a(n) ____ to prevent power loss to your computer.
A) solid state drive
B) surge suppressor
C) firewall
D) uninterruptible power supply
A) solid state drive
B) surge suppressor
C) firewall
D) uninterruptible power supply
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
48
You can use a personal storage device such as ____ to back up your files.
A) DVDs
B) cloud drives
C) firewalls
D) tablets
A) DVDs
B) cloud drives
C) firewalls
D) tablets
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
49
____ devices store files permanently so you can retrieve them later.
A) Encrypting
B) Storage
C) Firewall
D) Platform
A) Encrypting
B) Storage
C) Firewall
D) Platform
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
50
Power is supplied by either ____ current from a wall outlet or from a battery.
A) SSD
B) EFS
C) AC
D) DC
A) SSD
B) EFS
C) AC
D) DC
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
51
Using ____ technology and real-time location systems, you can install computer-tracking software on your laptop.
A) global positioning system
B) encrypting file system
C) uninterruptible power supply
D) personal identification number
A) global positioning system
B) encrypting file system
C) uninterruptible power supply
D) personal identification number
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
52
A ____ inspects data being transmitted by your computer to external recipients to prevent unsolicited data exchanges.
Form factor
A) driver
B) firewall
C) form factor
D) platform
Form factor
A) driver
B) firewall
C) form factor
D) platform
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
53
____ are useful is you are not familiar with computers, or if you feel your computer might need replacement parts due to wear and tear.
A) Extended warranties
B) Surge suppressors
C) Encrypting file systems
D) Optical storage technologies
A) Extended warranties
B) Surge suppressors
C) Encrypting file systems
D) Optical storage technologies
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
54
You can store your documents, pictures, videos, and music using cloud computing technologies such as ____.
A) Bluetooth
B) CNET
C) DropBox
D) Chrome
A) Bluetooth
B) CNET
C) DropBox
D) Chrome
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
55
Storage capacity is measured in ____.
A) meters
B) volts
C) bytes
D) hertz
A) meters
B) volts
C) bytes
D) hertz
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
56
____ are words determined by users to identify themselves in the digital world.
A) Usernames
B) Passwords
C) Bytes
D) PINs
A) Usernames
B) Passwords
C) Bytes
D) PINs
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
57
Hard drive storage uses ____ technology to arrange particles on the disk.
A) laser
B) magnetic
C) cloud
D) virtual memory
A) laser
B) magnetic
C) cloud
D) virtual memory
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
58
____ "scrambles" or encodes data so that even if unauthorized users somehow gain access to your files, they will not be able to read or understand what is in them.
A) Virtual memory
B) Optical storage
C) Data encryption
D) A firewall
A) Virtual memory
B) Optical storage
C) Data encryption
D) A firewall
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
59
____ are short words or phrases kept secret by a person and used to gain access to a site or data.
A) Usernames
B) Passwords
C) PINs
D) Bytes
A) Usernames
B) Passwords
C) PINs
D) Bytes
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
60
A(n) ____ drive has no moving parts and is therefore more durable and suitable for portable computers.
A) external
B) magnetic
C) real-time
D) solid state
A) external
B) magnetic
C) real-time
D) solid state
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
61
If you turn on your computer, and you don't see a pointer on the screen, you might have problems with your ____.
A) CPU
B) pointing device
C) flash drive
D) platform
A) CPU
B) pointing device
C) flash drive
D) platform
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
62
A computer ____ is malicious software that infects your computer without your knowledge or permission.
Cookie
A) virus
B) cookie
C) firewall
D) spike
Cookie
A) virus
B) cookie
C) firewall
D) spike
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
63
The best way to avoid spyware and adware is to install and run ____ software.
A) disk optimization
B) all-in-one
C) prevention
D) cloud storage
A) disk optimization
B) all-in-one
C) prevention
D) cloud storage
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
64
You can optimize the way files are stored by running a disk ____ utility.
A) processing
B) encryption
C) service
D) defragmentation
A) processing
B) encryption
C) service
D) defragmentation
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
65
If two monitors connected to your computer are blank, you may have a damaged ____.
A) video card
B) firewall
C) tablet
D) internal hard drive
A) video card
B) firewall
C) tablet
D) internal hard drive
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
66
A ____ drive is a small portable solid state storage device that plugs into a USB port.
A) convertible
B) soft
C) flash
D) virtual
A) convertible
B) soft
C) flash
D) virtual
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
67
If the head touches the platter, or if dirt gets on the disk, you can have a ____.
A) power spike
B) head crash
C) head flash
D) peripheral crash
A) power spike
B) head crash
C) head flash
D) peripheral crash
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
68
____ hard drives, mostly found in older desktop computers, are fragile and susceptible to damage.
A) Magnetic
B) Solid state
C) Optical
D) Convertible
A) Magnetic
B) Solid state
C) Optical
D) Convertible
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
69
When cleaning a computer screen, you can use a 50/50 solution of water and ____.
A) dish soap
B) baking soda
C) ammonia
D) alcohol
A) dish soap
B) baking soda
C) ammonia
D) alcohol
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
70
Some people choose a platform based on its ____, or "look and feel".
A) peripherals
B) control panel
C) device driver
D) user interface
A) peripherals
B) control panel
C) device driver
D) user interface
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
71
____ programs show you unsolicited advertisements and banners or pop-up windows.
A) Firewall
B) Cloudware
C) Spyware
D) Adware
A) Firewall
B) Cloudware
C) Spyware
D) Adware
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
72
When doing manual computer maintenance, wear a(n) ____ wristband to protect the components.
Anti-glare
A) antistatic
B) silicon
C) conductive
D)anti-glare
Anti-glare
A) antistatic
B) silicon
C) conductive
D)anti-glare
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
73
A ____ is software that helps peripheral devices communicate with a computer.
A) disk optimization utility
B) virtual memory utility
C) device driver
D) firewall
A) disk optimization utility
B) virtual memory utility
C) device driver
D) firewall
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
74
When a program needs more RAM than is currently available on the computer, it calls on the hard drive to create ____ memory.
A) convertible
B) backup
C) virtual
D) flash
A) convertible
B) backup
C) virtual
D) flash
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck
75
The Windows ____ utility can identify temporary Internet files and other others that can be safely rem o ved.
A) Disk Defragmentation
B) Firewall
C) Disk Cleanup
D) Defender
A) Disk Defragmentation
B) Firewall
C) Disk Cleanup
D) Defender
Unlock Deck
Unlock for access to all 75 flashcards in this deck.
Unlock Deck
k this deck