Chapter 1 Essential Computer Concepts

Total Flash Cards » 26
Text Size: S | M | L
The intangible components of a computer system, including the programs, are called software
keyboards, monitors, and printers are all examples of which of the following? peripheral devices

Which of the following is a pointing device that allows you to control the pointer by moving the entire device around on a desk?
mouse

To display graphics, a computer needs a monitor and a ___________.
graphics card

What part of the computer is responsible for executing instructions to process information?
processor

What do you call each 1 or 0 used in the representation of computer data?
a bit

What is a megabyte?

about a million bytes
What temporarily stores data and programs while you are using them? RAM

Which of the following permanently stores the set of instructions that the computer uses to activate the software that controls the processing function when you turn the computer on?
CPU cache

What do you call a named collection of data stored on a disk?
a file

Which of the following storage media is not a magnetic storage device?
DVD

The transmission protocol between a computer and its peripheral devices is
handled by a
data bus

What telecommunications hard ware is needed to convert digital signals to analog signals?
modem

Which of the following acts as a locked door on a computer?
firewall

_____________ are the technical details about each hardware component.
specifications

Modifying data is referred to as____________.
processing

A printed copy of computer output is called __________.
hard copy

A(n) __________ is a series if eight bits
byte

The type of memory that temporarily holds data and programs while the computer is on is called ___________.
RAM

A(n)____________ is magnetic storage media usually sealed in a case inside the computer.
hard disk (hard drive)

________________ is similar to ROM except that it can be written to more than once.
flash memory

Each computer that is part of the network must have a(n) ________.
network interface card (NIC)

A computer on a network that acts as the central storage location for programs and data used on the network is a(n)____________.
server

A program that tracks a user’s internet usage without the user’s permission is called ___________.
spyware

_________ is the practice of sending e-mail messages to customers or potential customers of a legitimate web site asking them to click a link in the e-mail message to bring them at a spoofed web site.
phishing

A(n)______________ is system software that acts as a liaison between the user and the computer’s hardware and software.
graphical user interface (GUI)