This will be your 50 point quiz covering the various computer aspects presented during the class Power Point presentations.
G.hn
HANs
ALPHANET
ARPANET
School
Military
Government
University
Radio waves only
Infrared signals only
Radio waves and infrared signals
Gravitational wave signal and radio waves
SLS Protocol
TSS Protocol
HBO Protocol
SSL Protocol
A lock
A monitor
A fan
A Keyboard
Worms
Adware
Spyware
Pop-Ups
E-Bay
E-Distribution
E-Commerce
E-Commercial
Large Accessible Network
Local Area Network
Legalized Apple Nectar
Linguistic Aptitude Neo-Service
Internet Protocol Address, made of letters and numbers.
Intranet Perfunctory Address, made of numbers and decimals.
Internet Protocol Address, made of numbers and decimals.
Interned Pillar Address made of symbols and octahedrons.
To identify the hacker and the host.
To locate the host and address the location.
To pinpoint the first and last.
To locate the beginning and end.
A bundle of cables to connect you to the internet
A net for working
Group of interconnected computers
A system to keep in touch with others
Hub, Cable, NIC(Computer B), NIC (Computer A)
NIC(Computer A), Hub, Cable, NIC(Computer B)
Protocol, NIC(Computer A), Cable, Hub, NIC(Computer B)
Defragmentation
Registry Cleaning
Deleting Cache files
All of above
A software utility that attempt to remove configuration data from the Windows Registry that is no longer in use or that is unwanted on the system.
The process of locating the noncontiguous fragments of data into which a computer file may be divided as it is stored on a hard disk, and rearranging the fragments and restoring them into fewer fragments or into the whole file.
Deleting files that are not necessary for the computer.
Untangling all the wires on the inside of the computer case.
Pressure Washer
Use a product like Windex
Spray compressed air into it
Use a damp cloth
Secret listening device planted in your computer
Is a type of malware that is installed on computers and that collects information about users without their knowledge
The latest fashion trend in the spy world
A type of Trojan that infiltrates your system via unsecured connections
A program that attacks viruses and catches them before they do any damage.
A product that protects your computer from overheating
A device that guards the entrance to a private network and keeps out unauthorized or unwanted traffic
Something to hide behind in case there is a fire
Linux, Windows, Ubuntu
Windows, Apple, Lanux
Snow Leopard, DOS, Linux
Windows, Apple, Linux
True
False
Windows 2010
Microsoft Infinity
Windows 7
Windows Professional
Winux
Unix
Seanix
Zenith
ATI
Microsoft
Dell
HP
Headphones
Stereo
Speaker
Microphone
True
False
Braille
MIDI
Musical
Synthesizer