| |||||||||||||||||||||||||||||
2)
|
| ||||||||||||||||||||||||||||
3)
|
| ||||||||||||||||||||||||||||
4)
|
| ||||||||||||||||||||||||||||
5)
|
| ||||||||||||||||||||||||||||
6)
|
| ||||||||||||||||||||||||||||
7)
|
| ||||||||||||||||||||||||||||
8)
|
| ||||||||||||||||||||||||||||
9)
|
| ||||||||||||||||||||||||||||
10)
|
| ||||||||||||||||||||||||||||
11)
|
| ||||||||||||||||
12)
|
| ||||||||||||||||
13)
|
| ||||||||||||||||
14)
|
| ||||||||||||||||
15)
|
| ||||||||||||||||
Chapter 2
1)
|
| ||||||||||||||||||||||||||||
2)
|
| ||||||||||||||||||||||||||||
3)
|
| ||||||||||||||||||||||||||||
4)
|
| ||||||||||||||||||||||||||||
5)
|
| ||||||||||||||||||||||||||||
6)
|
| ||||||||||||||||||||||||||||
7)
|
| ||||||||||||||||||||||||||||
8)
|
| ||||||||||||||||||||||||||||
9)
|
| ||||||||||||||||||||||||||||
10)
|
| ||||||||||||||||||||||||||||
11)
|
| ||||||||||||||||
12)
|
| ||||||||||||||||
13)
|
| ||||||||||||||||
14)
|
| ||||||||||||||||
15)
|
|
Chapter 3
)
|
| ||||||||||||||||||||||||||||
2)
|
| ||||||||||||||||||||||||||||
3)
|
| ||||||||||||||||||||||||||||
4)
|
| ||||||||||||||||||||||||||||
5)
|
| ||||||||||||||||||||||||||||
6)
|
| ||||||||||||||||||||||||||||
7)
|
| ||||||||||||||||||||||||||||
8)
|
| ||||||||||||||||||||||||||||
9)
|
| ||||||||||||||||||||||||||||
10)
|
| ||||||||||||||||||||||||||||
11)
|
| ||||||||||||||||
12)
|
| ||||||||||||||||
13)
|
| ||||||||||||||||
14)
|
| ||||||||||||||||
15)
|
|
Chapter 4
1)
|
| ||||||||||||||||||||||||||||
2)
|
| ||||||||||||||||||||||||||||
3)
|
| ||||||||||||||||||||||||||||
4)
|
| ||||||||||||||||||||||||||||
5)
|
| ||||||||||||||||||||||||||||
6)
|
| ||||||||||||||||||||||||||||
7)
|
| ||||||||||||||||||||||||||||
8)
|
| ||||||||||||||||||||||||||||
9)
|
| ||||||||||||||||||||||||||||
10)
|
| ||||||||||||||||||||||||||||
11)
|
| ||||||||||||||||
12)
|
| ||||||||||||||||
13)
|
| ||||||||||||||||
14)
|
| ||||||||||||||||
15)
|
|
Chapter 5
1) Which is not an example of a smartphone operating system?
Android
Snow Leopard
Symbian
webOS
2) Which OS does not have a user interface that incorporates point-and-click technology?
Linux
Windows 7
MS-DOS
Mac OS X
3) Which is the correct order of the boot process?
Check settings, load OS into RAM, activate BIOS, conduct POST
Conduct POST, load OS into RAM, activate BIOS, check settings
Activate BIOS, conduct POST, load OS into RAM, check settings
Load OS into RAM, check settings, conduct POST, activate BIOS
4) You can determine the location of a file by its
name.
extension.
path.
type.
5) Which is not a function of the operating system?
Providing a means for the user to interact with the computer
Carefully shutting the system down when RAM limits have been reached
Facilitating installation of peripheral devices with the inclusion of drivers
Enabling the processor to handle multiple operations, seemingly at the same time
6) The term that defines excessive swapping of files between RAM and virtual memory is:
multitasking.
thrashing.
paging.
caching.
7) Which term describes the pictures that represent an object such as a software application or a folder?
Widget
Gadget
Icon
Taskbar
8) Which statement about using APIs is not true?
APIs allow application software to interact with the OS.
APIs make it easier for developers to respond to OS changes.
APIs prevent redundancies in software code.
APIs make it possible to close non-responding software and restart the computer.
9) Which utility eliminates the inefficiencies of the computer hard drive?
File Compression
Disk Cleanup
Disk Defragmenter
System Restore
10) Which utility is not a system tools utility?
System Restore
Windows Explorer
Disk Defragmenter
File Compression
11) Only personal computers need some form of operating system software.
True
False
12) Symbian OS is a common OS for netbooks.
True
False
13) The type of processor helps to determine which OS a computer uses.
True
False
14) Paging is the process of optimizing RAM storage by borrowing hard drive space.
True
False
15) Windows 7 includes a compatibility feature that allows you to run software that is not compatible with Windows 7.
True
False
Chapter 7
1) All of the following are advantages of installing a home network except sharing
an Internet connection.
files.
MAC addresses.
peripherals.
2) Which of the following is not a reason client/server networks are generally not installed in homes?
Client/server networks can’t handle streaming media, which is often required in home networks.
Peer-to-peer networks are less expensive to install than client/server networks.
Client/server networks are more difficult to install than peer-to-peer networks.
Client/server networks provide more security than is needed for home networks.
3) Which of the following is not required on some simple networks?
Network navigation devices
Networking software
Transmission media
Network adapters
4) Which network navigation device is required to move data between two networks?
Switch
Router
Hub
Repeater
5) If you need very fast throughput in a home network, you should use
a wired Gigabit Ethernet connection.
an 802.11n wireless Ethernet connection.
a client/server network.
a wired power-line network.
6) Wireless range expanders:
turn devices with wired connections into wireless nodes.
are not needed with 802.11n networks.
are used to improve connectivity in remote areas of a home.
are never used for home networks.
7) Two or more networks connected over long geographic distances to form a single network is usually referred to as a:
LAN.
WAN.
HAN.
MAN.
8) The throughput of a network:
is usually higher on wireless networks.
is the same in all areas covered by a wireless network.
can vary depending upon the transmission media used.
is the same on all Ethernet networks.
9) The “name” of a particular wireless network is known as the
HAN-ID.
SSID.
NetID.
Wifi-ID.
10) The device used to move data around a single network is called a:
switch.
repeater.
router.
gateway.
11) Actual data throughput is usually higher on wireless networks.
True
False
12) Ethernet networks require each node on the network to be equipped with its own network adapter.
True
False
13) WEP and WPA are popular wired network security protocols.
True
False
14) MANs cover a larger geographic area than HANs.
True
False
15) 802.11n wireless networks provide faster throughput than wired gigabit Ethernet networks.
True
False
Chapter 9
1) Computer viruses that hide in memory to escape detection are known as
logic bombs.
Trojan horses.
multipartite viruses.
stealth viruses.
2) Viruses that feature a series of commands hidden on a web site are called
time bombs.
script viruses.
boot-sector viruses.
polymorphic viruses.
3) Antivirus software segregates infected files to prevent further spread in a process known as
disinfection.
inoculation.
eradication.
quarantine.
4) Hackers without sophisticated computer knowledge who use tools developed by others to break into systems are called
white-hat hackers.
script kiddies.
black-hat hackers.
amateur hackers.
5) Which are programs that pretend to be a useful program but do something malicious on your computer?
Trojan horses
Spyware
Zombies
Backdoor programs
6) Large groups of software programs that run automatically on many computers at the same time often to perpetrate DoS attacks are known as
Trojan horses.
botnets.
backdoor programs.
zombie webs.
7) When hackers use zombie computers to launch an attack on another computer or Web site, the attack is known as a
distributed denial-of-service attack.
phishing attack.
zombie infestation.
pharming plague.
8) Which are the virtual pathways into a computer that firewalls close?
Packet gateways
Logical ports
Data paths
IP addresses
9) Programs that download to your computer, usually without your knowledge, for the purpose of collecting information, is a type of cyber annoyance known as:
adware.
spyware.
bloatware.
pharmware.
10) A backup of the entire contents of your hard drive is known as a(n):
incremental backup.
differential backup.
normal backup.
system backup.
11) An incremental backup backs up all files on your computer in a specified location.
True
False
12) Even a properly installed surge protector may fail to protect a computer from all power surges.
True
False
13) Phishing is a form of social engineering.
True
False
14) When malicious code is planted on your computer that interferes with your browser’s ability to find Web addresses, this is known as phishing.
True
False
15) If a password includes numbers, symbols, and upper- and lowercase letters, it is considered to be a strong password.
True
False
Hello there! This is the fourth time visiting now and I personally just wanted to say I truley enjoy
ReplyDeletereading your site. I've decided to bookmark it at stumbleupon.com with the title: Blogger: College Brighten and your Website address: http://www.blogger.com/comment.g?blogID=2003111782156970541&postID=628568734787432547. I hope this is okay with you, I'm making an attempt
to give your fantastic blog a bit more publicity. Be back soon.
My homepage; linked web site