Encryption correct answers The process of coding information to make it unreadable except to those who have a special piece of information known as a key.
access speed correct answers Which of the following measures the amount of time required by the storage device to retrieve data and programs?...
CIS 2010 Placement Test || GUARANTEED PASS!!
Encryption correct answers The process of coding information to make it unreadable except
to those who have a special piece of information known as a key.
access speed correct answers Which of the following measures the amount of time required
by the storage device to retrieve data and programs?
IoT (Internet of Things) correct answers The continuing development of the internet that
allows everyday objects imbedded with electronic devices to send and receive data over the
internet
Multitasking correct answers Most operating systems support the ability to switch between
different applications. This is called _______.
VPN correct answers Remote users can connect to an organization's network through this
type of secure private connection.
Ad-Aware correct answers Which of the following is not malware?
Computer Fraud and Abuse Act correct answers the ___________ punishes computer
criminals that create and spread viruses
Database correct answers the electronic equivalent of a file cabinet is a ___________.
cookies correct answers Small data files that are deposited on a user's hard disk when they
visit a website are called _______.
It directs the movement of electronic signals between memory and the arithmetic-logic unit.
correct answers which of the following is a function of the control unit
Packetization correct answers ______ is the process of breaking down information sent or
transmitted across the internet into small parts.
CISC (Complex Instruction Set Computer) correct answers Which of the following is not a
character encoding standard?
B2C e-commerce correct answers online banking is an example of what type of e-commerce?
cloud storage correct answers this allows you to upload and store documents on the internet.
flash memory card correct answers smartphones use which of these storage technologies?
active display area correct answers the size, or _____ is measured by the diagonal length of a
monitors viewing area.
trojan horses correct answers ______ can typically be found in free computer games and free
screen saver programs.
, Cryptoprocessor correct answers A _______ is type of speciality processor devoted
exclusively to protecting the users privacy..
application correct answers This type of software can be described as end user software and
is used to accomplish a variety of tasks.
broadband correct answers using this type of communications channel, several users can
simultaneously use a single connection for high speed data transfer.
mobile correct answers this type of embedded operating system is used by smartphones.
chips correct answers tiny circuit boards etched onto squares of sand like material called
silicon are called ______.
FTP (File Transfer Protocol) correct answers this method of file transfer has been used for
decades and its frequently used for uploading changes to a website hosted by an internet
service provider.
Mac OS correct answers this operating system is designed to run only with apple computers
Ultra-high-definition television (UHDTV) correct answers what kind of specialized monitor
is especially useful for graphic artists, designers, and publishers?
Blue-ray disc correct answers the large capacity, high-definition optical discs designed to
store hi def video and video games are _________.
Providing Internet access correct answers which of the following is not a function of the
operating system?
Illustration programs correct answers these programs are used to create and edit vector
images.
DSL (digital subscriber line) correct answers ___________ uses existing phone lines to
provide high speed connections.
External hard disks and flash drives are often used for data protection, backup, DR and long-
term retention purposes. Ta correct answers which of the following is true of external hard
disks?
tree correct answers when the central node is connected to two or more subordinate nodes are
also connected to other subordinate nodes, we call this a ______________ network topology.
ISP (Internet Service Provider) correct answers the most common way to access the internet
is through _________.
Windows correct answers the most widely used personal computer operating system
disk caching, RAID, and file compression correct answers three ways to improve the
performance of a hard disk include _________.
The benefits of buying summaries with Stuvia:
Guaranteed quality through customer reviews
Stuvia customers have reviewed more than 700,000 summaries. This how you know that you are buying the best documents.
Quick and easy check-out
You can quickly pay through credit card or Stuvia-credit for the summaries. There is no membership needed.
Focus on what matters
Your fellow students write the study notes themselves, which is why the documents are always reliable and up-to-date. This ensures you quickly get to the core!
Frequently asked questions
What do I get when I buy this document?
You get a PDF, available immediately after your purchase. The purchased document is accessible anytime, anywhere and indefinitely through your profile.
Satisfaction guarantee: how does it work?
Our satisfaction guarantee ensures that you always find a study document that suits you well. You fill out a form, and our customer service team takes care of the rest.
Who am I buying these notes from?
Stuvia is a marketplace, so you are not buying this document from us, but from seller ProPerfomer. Stuvia facilitates payment to the seller.
Will I be stuck with a subscription?
No, you only buy these notes for $11.09. You're not tied to anything after your purchase.