Encryption correct answers The process of coding information to make it unreadable except to those who have a special piece of information known as a key.
access speed correct answers Which of the following measures the amount of time required by the storage device to retrieve data and programs?...
CIS 2010 Placement Test || GUARANTEED PASS!!
Encryption correct answers The process of coding information to make it unreadable except
to those who have a special piece of information known as a key.
access speed correct answers Which of the following measures the amount of time required
by the storage device to retrieve data and programs?
IoT (Internet of Things) correct answers The continuing development of the internet that
allows everyday objects imbedded with electronic devices to send and receive data over the
internet
Multitasking correct answers Most operating systems support the ability to switch between
different applications. This is called _______.
VPN correct answers Remote users can connect to an organization's network through this
type of secure private connection.
Ad-Aware correct answers Which of the following is not malware?
Computer Fraud and Abuse Act correct answers the ___________ punishes computer
criminals that create and spread viruses
Database correct answers the electronic equivalent of a file cabinet is a ___________.
cookies correct answers Small data files that are deposited on a user's hard disk when they
visit a website are called _______.
It directs the movement of electronic signals between memory and the arithmetic-logic unit.
correct answers which of the following is a function of the control unit
Packetization correct answers ______ is the process of breaking down information sent or
transmitted across the internet into small parts.
CISC (Complex Instruction Set Computer) correct answers Which of the following is not a
character encoding standard?
B2C e-commerce correct answers online banking is an example of what type of e-commerce?
cloud storage correct answers this allows you to upload and store documents on the internet.
flash memory card correct answers smartphones use which of these storage technologies?
active display area correct answers the size, or _____ is measured by the diagonal length of a
monitors viewing area.
trojan horses correct answers ______ can typically be found in free computer games and free
screen saver programs.
, Cryptoprocessor correct answers A _______ is type of speciality processor devoted
exclusively to protecting the users privacy..
application correct answers This type of software can be described as end user software and
is used to accomplish a variety of tasks.
broadband correct answers using this type of communications channel, several users can
simultaneously use a single connection for high speed data transfer.
mobile correct answers this type of embedded operating system is used by smartphones.
chips correct answers tiny circuit boards etched onto squares of sand like material called
silicon are called ______.
FTP (File Transfer Protocol) correct answers this method of file transfer has been used for
decades and its frequently used for uploading changes to a website hosted by an internet
service provider.
Mac OS correct answers this operating system is designed to run only with apple computers
Ultra-high-definition television (UHDTV) correct answers what kind of specialized monitor
is especially useful for graphic artists, designers, and publishers?
Blue-ray disc correct answers the large capacity, high-definition optical discs designed to
store hi def video and video games are _________.
Providing Internet access correct answers which of the following is not a function of the
operating system?
Illustration programs correct answers these programs are used to create and edit vector
images.
DSL (digital subscriber line) correct answers ___________ uses existing phone lines to
provide high speed connections.
External hard disks and flash drives are often used for data protection, backup, DR and long-
term retention purposes. Ta correct answers which of the following is true of external hard
disks?
tree correct answers when the central node is connected to two or more subordinate nodes are
also connected to other subordinate nodes, we call this a ______________ network topology.
ISP (Internet Service Provider) correct answers the most common way to access the internet
is through _________.
Windows correct answers the most widely used personal computer operating system
disk caching, RAID, and file compression correct answers three ways to improve the
performance of a hard disk include _________.
Voordelen van het kopen van samenvattingen bij Stuvia op een rij:
Verzekerd van kwaliteit door reviews
Stuvia-klanten hebben meer dan 700.000 samenvattingen beoordeeld. Zo weet je zeker dat je de beste documenten koopt!
Snel en makkelijk kopen
Je betaalt supersnel en eenmalig met iDeal, creditcard of Stuvia-tegoed voor de samenvatting. Zonder lidmaatschap.
Focus op de essentie
Samenvattingen worden geschreven voor en door anderen. Daarom zijn de samenvattingen altijd betrouwbaar en actueel. Zo kom je snel tot de kern!
Veelgestelde vragen
Wat krijg ik als ik dit document koop?
Je krijgt een PDF, die direct beschikbaar is na je aankoop. Het gekochte document is altijd, overal en oneindig toegankelijk via je profiel.
Tevredenheidsgarantie: hoe werkt dat?
Onze tevredenheidsgarantie zorgt ervoor dat je altijd een studiedocument vindt dat goed bij je past. Je vult een formulier in en onze klantenservice regelt de rest.
Van wie koop ik deze samenvatting?
Stuvia is een marktplaats, je koop dit document dus niet van ons, maar van verkoper ProPerfomer. Stuvia faciliteert de betaling aan de verkoper.
Zit ik meteen vast aan een abonnement?
Nee, je koopt alleen deze samenvatting voor €10,90. Je zit daarna nergens aan vast.