Chapter 1 Essential Computer Concepts

Total Flash Cards » 26
Text Size » S M L
1. The intangible components of a computer system, including the programs, are called software
2. keyboards, monitors, and printers are all examples of which of the following? peripheral devices
3.
Which of the following is a pointing device that allows you to control the pointer by moving the entire device around on a desk?
mouse
4.
To display graphics, a computer needs a monitor and a ___________.
graphics card
5.
What part of the computer is responsible for executing instructions to process information?
processor
6.
What do you call each 1 or 0 used in the representation of computer data?
a bit
7.
What is a megabyte?

about a million bytes
8. What temporarily stores data and programs while you are using them? RAM
9.
Which of the following permanently stores the set of instructions that the computer uses to activate the software that controls the processing function when you turn the computer on?
CPU cache
10.
What do you call a named collection of data stored on a disk?
a file
11.
Which of the following storage media is not a magnetic storage device?
DVD
12.
The transmission protocol between a computer and its peripheral devices is
handled by a
data bus
13.
What telecommunications hard ware is needed to convert digital signals to analog signals?
modem
14.
Which of the following acts as a locked door on a computer?
firewall
15.
_____________ are the technical details about each hardware component.
specifications
16.
Modifying data is referred to as____________.
processing
17.
A printed copy of computer output is called __________.
hard copy
18.
A(n) __________ is a series if eight bits
byte
19.
The type of memory that temporarily holds data and programs while the computer is on is called ___________.
RAM
20.
A(n)____________ is magnetic storage media usually sealed in a case inside the computer.
hard disk (hard drive)
21.
________________ is similar to ROM except that it can be written to more than once.
flash memory
22.
Each computer that is part of the network must have a(n) ________.
network interface card (NIC)
23.
A computer on a network that acts as the central storage location for programs and data used on the network is a(n)____________.
server
24.
A program that tracks a user’s internet usage without the user’s permission is called ___________.
spyware
25.
_________ is the practice of sending e-mail messages to customers or potential customers of a legitimate web site asking them to click a link in the e-mail message to bring them at a spoofed web site.
phishing
26.
A(n)______________ is system software that acts as a liaison between the user and the computer’s hardware and software.
graphical user interface (GUI)