Deck 19: Concepts Unit A: Understanding Essential Computer Concepts

Full screen (f)
exit full mode
Question
The physical components of a computer are referred to as ____.

A) software
B) hardware
C) configurations
D) specifications
Use Space or
up arrow
down arrow
to flip the card.
Question
A file that tells a computer how to perform a specific task is called a(n) ____ file.

A) executable
B) instruction
C) data
D) configuration
Question
A hard copy of a file you created on your computer would be ____.

A) saved on a floppy disk
B) printed on a printer
C) backed up on a tape drive
D) sent as an e-mail
Question
<strong>      Which of the following is NOT shown in the figure above?</strong> A) keyboard B) mouse C) touch pad D) trackball <div style=padding-top: 35px> <strong>      Which of the following is NOT shown in the figure above?</strong> A) keyboard B) mouse C) touch pad D) trackball <div style=padding-top: 35px> <strong>      Which of the following is NOT shown in the figure above?</strong> A) keyboard B) mouse C) touch pad D) trackball <div style=padding-top: 35px> Which of the following is NOT shown in the figure above?

A) keyboard
B) mouse
C) touch pad
D) trackball
Question
<strong>  Another name for the CPU pictured above is ____.</strong> A) microprocessor B) RAM cache C) clock speed D) megahertz <div style=padding-top: 35px> Another name for the CPU pictured above is ____.

A) microprocessor
B) RAM cache
C) clock speed
D) megahertz
Question
An example of an output device is a ____.

A) keyboard
B) monitor
C) mouse
D) touch pad
Question
Special high-speed memory reserved for the microprocessor's use is called ____.

A) ROM
B) storage
C) virtual memory
D) cache memory
Question
Megahertz is a measurement of ____.

A) the amount of memory
B) the amount of RAM
C) the speed of the microprocessor
D) cache memory
Question
Where is program and data that is being used temporarily stored by your computer?

A) cache
B) RAM
C) ROM
D) CMOS
Question
Processing tasks occur on the ____.

A) motherboard
B) keyboard
C) control panel
D) operating system
Question
The speed of a laser printer is measured in ____.

A) pages per minute
B) pages per second
C) characters per minute
D) characters per second
Question
Personal computers commonly use the ____ code system to represent character data.

A) KB
B) LAN
C) ASCII
D) COBOL
Question
The computer needs additional components called ____ to accomplish its input, output, and storage functions.

A) mice
B) specifications
C) architecture
D) peripheral devices
Question
Which of the following dot pitches gives you the sharpest picture?

A) .26
B) .32
C) .38
D) .45
Question
Resolution is the ____.

A) number of pixels a monitor displays
B) distance between pixels in a graphics display
C) number of rectangles in a character-based display grid
D) dot pitch in a graphics display
Question
You are running two programs at once that require 8 megabytes each on a computer that only has 12 megabytes of RAM. What makes this possible?

A) virtual memory
B) ROM
C) cache
D) CMOS
Question
<strong>      The devices shown in the figure above are all ____ devices.</strong> A) input B) pointing C) storage D) all of the above <div style=padding-top: 35px> <strong>      The devices shown in the figure above are all ____ devices.</strong> A) input B) pointing C) storage D) all of the above <div style=padding-top: 35px> <strong>      The devices shown in the figure above are all ____ devices.</strong> A) input B) pointing C) storage D) all of the above <div style=padding-top: 35px> The devices shown in the figure above are all ____ devices.

A) input
B) pointing
C) storage
D) all of the above
Question
Which of the following is the largest unit of measurement?

A) a terabyte
B) a gigabyte
C) a megabyte
D) a kilobyte
Question
Which of the following is NOT a personal computer?

A) desktop
B) laptop
C) notebook
D) mainframe
Question
Which of the following is a personal computer?

A) desktop
B) mainframe
C) terminal
D) all of the above
Question
Expansion cards plug into electrical connectors on the motherboard called ____.

A) ports
B) cables
C) slots
D) buses
Question
A network with a file server is called a client/server network.
Question
<strong>  (a)   (b)   (c)   (d) In the above figure, which screen shows software used for numerical analysis?</strong> A) a B) b C) c D) d <div style=padding-top: 35px> (a) <strong>  (a)   (b)   (c)   (d) In the above figure, which screen shows software used for numerical analysis?</strong> A) a B) b C) c D) d <div style=padding-top: 35px> (b) <strong>  (a)   (b)   (c)   (d) In the above figure, which screen shows software used for numerical analysis?</strong> A) a B) b C) c D) d <div style=padding-top: 35px> (c) <strong>  (a)   (b)   (c)   (d) In the above figure, which screen shows software used for numerical analysis?</strong> A) a B) b C) c D) d <div style=padding-top: 35px> (d) In the above figure, which screen shows software used for numerical analysis?

A) a
B) b
C) c
D) d
Question
The seamless nature of OLE among some applications is referred to as ____.

A) operation success
B) source symmetry
C) GUI
D) integration
Question
A device driver is a computer program that makes communication possible between your computer and one of its peripherals.
Question
A tape drive is a type of magnetic storage device.
Question
<strong>  The network shown in the figure above is a ____ network.</strong> A) peer-to-peer B) client/server C) wireless D) Bluetooth <div style=padding-top: 35px> The network shown in the figure above is a ____ network.

A) peer-to-peer
B) client/server
C) wireless
D) Bluetooth
Question
The practice of sending e-mails to customers or potential customers of a legitimate Web site asking them to click a link in the e-mail is called ____.

A) spoofing
B) phishing
C) pharming
D) swishing
Question
CD-ROMs are rewritable.
Question
Polycarbonate discs coated with a reflective metal on which data is recorded using laser technology as a trail of tiny pits or dark spots in the surface of the disc are ____ storage devices.

A) magnetic
B) optical
C) flash
D) USB
Question
Antivirus software protects against which of the following types of malware?

A) Viruses
B) Trojan horses
C) Worms
D) all of the above
Question
CMOS is often referred to as ____ memory.

A) permanent
B) semipermanent
C) volatile
D) none of the above
Question
A parallel port is relatively slow, as it transmits data one bit at a time.
Question
The communication path between a microprocessor, RAM, and peripherals is called the data bus.
Question
An interface card could be plugged into an expansion slot on the main board of a computer.
Question
<strong>  Each of the components connected by wires in the above figure is called a ____.</strong> A) client B) node C) workstation D) server <div style=padding-top: 35px> Each of the components connected by wires in the above figure is called a ____.

A) client
B) node
C) workstation
D) server
Question
  Each of the items labeled workstation in the above figure must have a network intercommunication card installed.<div style=padding-top: 35px> Each of the items labeled workstation in the above figure must have a network intercommunication card installed.
Question
____ allocate system resources, manage storage space, maintain security, detect equipment failure, and control basic input and output.

A) Operating systems
B) Utilities
C) Programming languages
D) Database management software
Question
Protocols in data communication establish the countries with which data can be exchanged.
Question
A PC card slot could contain a hard disk drive.
Question
The operating system is the set of instructions that direct the computer to accomplish specific tasks such as document production and spreadsheet calculations.
Question
BASIC, Visual Basic, C, C++, and COBOL are all examples of computer programming ____________________.
Question
Antivirus software is a broad term that describes any program that is intended to cause harm or convey information to others without the owner's permission.
Question
  The integrated circuit, or chip, in the figure above is known as a(n) _________________________ and is responsible for executing instructions to process data.<div style=padding-top: 35px> The integrated circuit, or chip, in the figure above is known as a(n) _________________________ and is responsible for executing instructions to process data.
Question
____________________ instruct the computer on how to process data.
Question
Special high-speed memory built into the microprocessor for the microprocessor's use is called ____________________.
Question
A(n) ____________________ prevents other computers on the Internet from accessing a computer and prevents programs on a computer from accessing the Internet without the computer user's permission.
Question
Operating systems, utilities, device drivers, and programming languages are the four types of ____________________ software.
Question
If you type a paper for a class and save it on the hard drive, it is called an executable file .
Question
A modem converts the digital signals your computer outputs to analog signals.
Question
Technical details about components on a computer are called architecture .
Question
Explain the differences between RAM, ROM, CMOS, cache, and virtual memory.
Question
  (a)   (b)   (c)   (d) Define system software and application software, and give a general example of each type, referring to the screens shown in the above figure as applicable.<div style=padding-top: 35px> (a)   (a)   (b)   (c)   (d) Define system software and application software, and give a general example of each type, referring to the screens shown in the above figure as applicable.<div style=padding-top: 35px> (b)   (a)   (b)   (c)   (d) Define system software and application software, and give a general example of each type, referring to the screens shown in the above figure as applicable.<div style=padding-top: 35px> (c)   (a)   (b)   (c)   (d) Define system software and application software, and give a general example of each type, referring to the screens shown in the above figure as applicable.<div style=padding-top: 35px> (d) Define system software and application software, and give a general example of each type, referring to the screens shown in the above figure as applicable.
Question
Database management software allows you to create illustrations, diagrams, graphs, and charts that can be projected before a group, printed out for quick reference, or transmitted to remote computers.
Question
  The printer in the above figure is considered a node.<div style=padding-top: 35px> The printer in the above figure is considered a node.
Question
A system resource is any part of the computer system, including memory, storage devices, and the microprocessor, that can be used by a computer program.
Question
Modifying data is referred to as ____________________.
Question
Explain the differences between mainframes and supercomputers.
Question
  (a)   (b)   (c)   (d) The screens labeled (a), (b), and (d) in the above figure are examples of system software.<div style=padding-top: 35px> (a)   (a)   (b)   (c)   (d) The screens labeled (a), (b), and (d) in the above figure are examples of system software.<div style=padding-top: 35px> (b)   (a)   (b)   (c)   (d) The screens labeled (a), (b), and (d) in the above figure are examples of system software.<div style=padding-top: 35px> (c)   (a)   (b)   (c)   (d) The screens labeled (a), (b), and (d) in the above figure are examples of system software.<div style=padding-top: 35px> (d) The screens labeled (a), (b), and (d) in the above figure are examples of system software.
Question
____________________ memory is created and used by most computers when the amount of RAM needed exceeds the RAM available.
Question
Match between columns
The physical components of a computer.
ROM
The physical components of a computer.
spyware
The physical components of a computer.
I/O
The physical components of a computer.
hardware
The physical components of a computer.
SCSI
The flow of data from the microprocessor to memory to peripherals and back again.
ROM
The flow of data from the microprocessor to memory to peripherals and back again.
spyware
The flow of data from the microprocessor to memory to peripherals and back again.
I/O
The flow of data from the microprocessor to memory to peripherals and back again.
hardware
The flow of data from the microprocessor to memory to peripherals and back again.
SCSI
Programs that track a computer user's Internet usage and send this data back to the company or person that created it without the computer user's permission or knowledge.
ROM
Programs that track a computer user's Internet usage and send this data back to the company or person that created it without the computer user's permission or knowledge.
spyware
Programs that track a computer user's Internet usage and send this data back to the company or person that created it without the computer user's permission or knowledge.
I/O
Programs that track a computer user's Internet usage and send this data back to the company or person that created it without the computer user's permission or knowledge.
hardware
Programs that track a computer user's Internet usage and send this data back to the company or person that created it without the computer user's permission or knowledge.
SCSI
Small computer system interface.
ROM
Small computer system interface.
spyware
Small computer system interface.
I/O
Small computer system interface.
hardware
Small computer system interface.
SCSI
The permanent storage location for a set of instructions the computer uses when turned on.
ROM
The permanent storage location for a set of instructions the computer uses when turned on.
spyware
The permanent storage location for a set of instructions the computer uses when turned on.
I/O
The permanent storage location for a set of instructions the computer uses when turned on.
hardware
The permanent storage location for a set of instructions the computer uses when turned on.
SCSI
Question
What type of software should Mary Ann purchase to help her create and track budgets?
Question
You have been chosen to upgrade the computer system for your homeowner's association. You want to purchase a system that will be useful for several years. Because the spot where the computer will be located is somewhat cramped, what is the best type of monitor to purchase?
Question
You have been chosen to upgrade the computer system for your homeowner's association. You want to purchase a system that will be useful for several years. You want the computer to be able to perform quickly. What is the easiest way to make the computer run faster?
Question
Mary Ann Costello is a wedding planner in Austin, Texas. She decided to create a list of all the resources she uses--halls, florists, bands, etc.--when planning a wedding. She needs to purchase software to help her accomplish this. She also needs to track the total expenses for each wedding and needs software to help her do this as well. What type of software should Mary Ann purchase to create and manage her collection of data?
Question
You have been chosen to upgrade the computer system for your homeowner's association. You want to purchase a system that will be useful for several years. You want to be able to allow members to copy certain files and carry them with them when they leave. What is a good choice for something that can store files, is transportable, and is small enough to fit in a member's pocket or on a key chain?
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/66
auto play flashcards
Play
simple tutorial
Full screen (f)
exit full mode
Deck 19: Concepts Unit A: Understanding Essential Computer Concepts
1
The physical components of a computer are referred to as ____.

A) software
B) hardware
C) configurations
D) specifications
B
2
A file that tells a computer how to perform a specific task is called a(n) ____ file.

A) executable
B) instruction
C) data
D) configuration
A
3
A hard copy of a file you created on your computer would be ____.

A) saved on a floppy disk
B) printed on a printer
C) backed up on a tape drive
D) sent as an e-mail
B
4
<strong>      Which of the following is NOT shown in the figure above?</strong> A) keyboard B) mouse C) touch pad D) trackball <strong>      Which of the following is NOT shown in the figure above?</strong> A) keyboard B) mouse C) touch pad D) trackball <strong>      Which of the following is NOT shown in the figure above?</strong> A) keyboard B) mouse C) touch pad D) trackball Which of the following is NOT shown in the figure above?

A) keyboard
B) mouse
C) touch pad
D) trackball
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
5
<strong>  Another name for the CPU pictured above is ____.</strong> A) microprocessor B) RAM cache C) clock speed D) megahertz Another name for the CPU pictured above is ____.

A) microprocessor
B) RAM cache
C) clock speed
D) megahertz
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
6
An example of an output device is a ____.

A) keyboard
B) monitor
C) mouse
D) touch pad
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
7
Special high-speed memory reserved for the microprocessor's use is called ____.

A) ROM
B) storage
C) virtual memory
D) cache memory
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
8
Megahertz is a measurement of ____.

A) the amount of memory
B) the amount of RAM
C) the speed of the microprocessor
D) cache memory
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
9
Where is program and data that is being used temporarily stored by your computer?

A) cache
B) RAM
C) ROM
D) CMOS
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
10
Processing tasks occur on the ____.

A) motherboard
B) keyboard
C) control panel
D) operating system
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
11
The speed of a laser printer is measured in ____.

A) pages per minute
B) pages per second
C) characters per minute
D) characters per second
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
12
Personal computers commonly use the ____ code system to represent character data.

A) KB
B) LAN
C) ASCII
D) COBOL
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
13
The computer needs additional components called ____ to accomplish its input, output, and storage functions.

A) mice
B) specifications
C) architecture
D) peripheral devices
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
14
Which of the following dot pitches gives you the sharpest picture?

A) .26
B) .32
C) .38
D) .45
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
15
Resolution is the ____.

A) number of pixels a monitor displays
B) distance between pixels in a graphics display
C) number of rectangles in a character-based display grid
D) dot pitch in a graphics display
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
16
You are running two programs at once that require 8 megabytes each on a computer that only has 12 megabytes of RAM. What makes this possible?

A) virtual memory
B) ROM
C) cache
D) CMOS
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
17
<strong>      The devices shown in the figure above are all ____ devices.</strong> A) input B) pointing C) storage D) all of the above <strong>      The devices shown in the figure above are all ____ devices.</strong> A) input B) pointing C) storage D) all of the above <strong>      The devices shown in the figure above are all ____ devices.</strong> A) input B) pointing C) storage D) all of the above The devices shown in the figure above are all ____ devices.

A) input
B) pointing
C) storage
D) all of the above
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
18
Which of the following is the largest unit of measurement?

A) a terabyte
B) a gigabyte
C) a megabyte
D) a kilobyte
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
19
Which of the following is NOT a personal computer?

A) desktop
B) laptop
C) notebook
D) mainframe
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
20
Which of the following is a personal computer?

A) desktop
B) mainframe
C) terminal
D) all of the above
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
21
Expansion cards plug into electrical connectors on the motherboard called ____.

A) ports
B) cables
C) slots
D) buses
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
22
A network with a file server is called a client/server network.
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
23
<strong>  (a)   (b)   (c)   (d) In the above figure, which screen shows software used for numerical analysis?</strong> A) a B) b C) c D) d (a) <strong>  (a)   (b)   (c)   (d) In the above figure, which screen shows software used for numerical analysis?</strong> A) a B) b C) c D) d (b) <strong>  (a)   (b)   (c)   (d) In the above figure, which screen shows software used for numerical analysis?</strong> A) a B) b C) c D) d (c) <strong>  (a)   (b)   (c)   (d) In the above figure, which screen shows software used for numerical analysis?</strong> A) a B) b C) c D) d (d) In the above figure, which screen shows software used for numerical analysis?

A) a
B) b
C) c
D) d
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
24
The seamless nature of OLE among some applications is referred to as ____.

A) operation success
B) source symmetry
C) GUI
D) integration
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
25
A device driver is a computer program that makes communication possible between your computer and one of its peripherals.
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
26
A tape drive is a type of magnetic storage device.
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
27
<strong>  The network shown in the figure above is a ____ network.</strong> A) peer-to-peer B) client/server C) wireless D) Bluetooth The network shown in the figure above is a ____ network.

A) peer-to-peer
B) client/server
C) wireless
D) Bluetooth
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
28
The practice of sending e-mails to customers or potential customers of a legitimate Web site asking them to click a link in the e-mail is called ____.

A) spoofing
B) phishing
C) pharming
D) swishing
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
29
CD-ROMs are rewritable.
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
30
Polycarbonate discs coated with a reflective metal on which data is recorded using laser technology as a trail of tiny pits or dark spots in the surface of the disc are ____ storage devices.

A) magnetic
B) optical
C) flash
D) USB
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
31
Antivirus software protects against which of the following types of malware?

A) Viruses
B) Trojan horses
C) Worms
D) all of the above
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
32
CMOS is often referred to as ____ memory.

A) permanent
B) semipermanent
C) volatile
D) none of the above
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
33
A parallel port is relatively slow, as it transmits data one bit at a time.
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
34
The communication path between a microprocessor, RAM, and peripherals is called the data bus.
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
35
An interface card could be plugged into an expansion slot on the main board of a computer.
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
36
<strong>  Each of the components connected by wires in the above figure is called a ____.</strong> A) client B) node C) workstation D) server Each of the components connected by wires in the above figure is called a ____.

A) client
B) node
C) workstation
D) server
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
37
  Each of the items labeled workstation in the above figure must have a network intercommunication card installed. Each of the items labeled workstation in the above figure must have a network intercommunication card installed.
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
38
____ allocate system resources, manage storage space, maintain security, detect equipment failure, and control basic input and output.

A) Operating systems
B) Utilities
C) Programming languages
D) Database management software
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
39
Protocols in data communication establish the countries with which data can be exchanged.
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
40
A PC card slot could contain a hard disk drive.
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
41
The operating system is the set of instructions that direct the computer to accomplish specific tasks such as document production and spreadsheet calculations.
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
42
BASIC, Visual Basic, C, C++, and COBOL are all examples of computer programming ____________________.
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
43
Antivirus software is a broad term that describes any program that is intended to cause harm or convey information to others without the owner's permission.
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
44
  The integrated circuit, or chip, in the figure above is known as a(n) _________________________ and is responsible for executing instructions to process data. The integrated circuit, or chip, in the figure above is known as a(n) _________________________ and is responsible for executing instructions to process data.
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
45
____________________ instruct the computer on how to process data.
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
46
Special high-speed memory built into the microprocessor for the microprocessor's use is called ____________________.
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
47
A(n) ____________________ prevents other computers on the Internet from accessing a computer and prevents programs on a computer from accessing the Internet without the computer user's permission.
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
48
Operating systems, utilities, device drivers, and programming languages are the four types of ____________________ software.
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
49
If you type a paper for a class and save it on the hard drive, it is called an executable file .
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
50
A modem converts the digital signals your computer outputs to analog signals.
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
51
Technical details about components on a computer are called architecture .
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
52
Explain the differences between RAM, ROM, CMOS, cache, and virtual memory.
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
53
  (a)   (b)   (c)   (d) Define system software and application software, and give a general example of each type, referring to the screens shown in the above figure as applicable. (a)   (a)   (b)   (c)   (d) Define system software and application software, and give a general example of each type, referring to the screens shown in the above figure as applicable. (b)   (a)   (b)   (c)   (d) Define system software and application software, and give a general example of each type, referring to the screens shown in the above figure as applicable. (c)   (a)   (b)   (c)   (d) Define system software and application software, and give a general example of each type, referring to the screens shown in the above figure as applicable. (d) Define system software and application software, and give a general example of each type, referring to the screens shown in the above figure as applicable.
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
54
Database management software allows you to create illustrations, diagrams, graphs, and charts that can be projected before a group, printed out for quick reference, or transmitted to remote computers.
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
55
  The printer in the above figure is considered a node. The printer in the above figure is considered a node.
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
56
A system resource is any part of the computer system, including memory, storage devices, and the microprocessor, that can be used by a computer program.
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
57
Modifying data is referred to as ____________________.
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
58
Explain the differences between mainframes and supercomputers.
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
59
  (a)   (b)   (c)   (d) The screens labeled (a), (b), and (d) in the above figure are examples of system software. (a)   (a)   (b)   (c)   (d) The screens labeled (a), (b), and (d) in the above figure are examples of system software. (b)   (a)   (b)   (c)   (d) The screens labeled (a), (b), and (d) in the above figure are examples of system software. (c)   (a)   (b)   (c)   (d) The screens labeled (a), (b), and (d) in the above figure are examples of system software. (d) The screens labeled (a), (b), and (d) in the above figure are examples of system software.
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
60
____________________ memory is created and used by most computers when the amount of RAM needed exceeds the RAM available.
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
61
Match between columns
The physical components of a computer.
ROM
The physical components of a computer.
spyware
The physical components of a computer.
I/O
The physical components of a computer.
hardware
The physical components of a computer.
SCSI
The flow of data from the microprocessor to memory to peripherals and back again.
ROM
The flow of data from the microprocessor to memory to peripherals and back again.
spyware
The flow of data from the microprocessor to memory to peripherals and back again.
I/O
The flow of data from the microprocessor to memory to peripherals and back again.
hardware
The flow of data from the microprocessor to memory to peripherals and back again.
SCSI
Programs that track a computer user's Internet usage and send this data back to the company or person that created it without the computer user's permission or knowledge.
ROM
Programs that track a computer user's Internet usage and send this data back to the company or person that created it without the computer user's permission or knowledge.
spyware
Programs that track a computer user's Internet usage and send this data back to the company or person that created it without the computer user's permission or knowledge.
I/O
Programs that track a computer user's Internet usage and send this data back to the company or person that created it without the computer user's permission or knowledge.
hardware
Programs that track a computer user's Internet usage and send this data back to the company or person that created it without the computer user's permission or knowledge.
SCSI
Small computer system interface.
ROM
Small computer system interface.
spyware
Small computer system interface.
I/O
Small computer system interface.
hardware
Small computer system interface.
SCSI
The permanent storage location for a set of instructions the computer uses when turned on.
ROM
The permanent storage location for a set of instructions the computer uses when turned on.
spyware
The permanent storage location for a set of instructions the computer uses when turned on.
I/O
The permanent storage location for a set of instructions the computer uses when turned on.
hardware
The permanent storage location for a set of instructions the computer uses when turned on.
SCSI
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
62
What type of software should Mary Ann purchase to help her create and track budgets?
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
63
You have been chosen to upgrade the computer system for your homeowner's association. You want to purchase a system that will be useful for several years. Because the spot where the computer will be located is somewhat cramped, what is the best type of monitor to purchase?
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
64
You have been chosen to upgrade the computer system for your homeowner's association. You want to purchase a system that will be useful for several years. You want the computer to be able to perform quickly. What is the easiest way to make the computer run faster?
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
65
Mary Ann Costello is a wedding planner in Austin, Texas. She decided to create a list of all the resources she uses--halls, florists, bands, etc.--when planning a wedding. She needs to purchase software to help her accomplish this. She also needs to track the total expenses for each wedding and needs software to help her do this as well. What type of software should Mary Ann purchase to create and manage her collection of data?
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
66
You have been chosen to upgrade the computer system for your homeowner's association. You want to purchase a system that will be useful for several years. You want to be able to allow members to copy certain files and carry them with them when they leave. What is a good choice for something that can store files, is transportable, and is small enough to fit in a member's pocket or on a key chain?
Unlock Deck
Unlock for access to all 66 flashcards in this deck.
Unlock Deck
k this deck
locked card icon
Unlock Deck
Unlock for access to all 66 flashcards in this deck.