BTM 200 Final - Questions and Answers (Complete Solutions) In the late 1980s, computer specialists were concerned that proprietary software had too many
... [Show More] ________, so they started working on open source projects. A. spiders B. bugs C. trojans D. worms A packet analyzer is a program that can enable a hacker to do all of the following EXCEPT ________. A. launch a denial of service (DoS) attack on your computer B. use your debit card information to purchase items illegally C. assume your identity D. steal your logons and passwords for various accounts ________ computers are specially designed computer chips that reside inside other devices such as a car. A. Desktop B. Netbook C. Embedded D. Tablet Which of the following optical storage media has the greatest storage capacity? A. BD B. DVD DL C. CD D. DVD The terms virus and worm actually mean the same thing. False The terms data and information can be used interchangeably. True The processor market for desktop and laptop computers is dominated by ________. A. Microsoft B. Intel C. Apple D. IBM The two major types of system software programs are utility programs and the ________. A. user interface B. operating system C. application software D. charms Using hard disk space to temporarily store data or instructions from RAM is referred to as the ________. A. compressor B. virtual memory C. spool D. interrupt sequencer A _______ is the portion of virus code that is unique to a particular computer virus. A. compression code B. encryption code C. virus signature D. virus pattern The location of a file is specified by its ________. A. drive identifier B. file path C. file extension D. file type RAM is a ________ storage location. A. volatile B. permanent C. nonvolatile D. peripheral ________ is concerned with the design and arrangement of machines and furniture to avoid uncomfortable or unsafe experiences. A. Occupational safety B. Positioning C. Ergonomics D. Repetitive strain prevention A________ software installation installs all the most commonly used files to your computer's hard drive. A. custom B. new C. full D. upgrade CMOS is a special kind of memory that uses a great deal of power. False 3-D sound is different from surround-sound. True Data are sent through a network in bundles called ________. nodes packages pouches packets All of the following are names for a flash drive EXCEPT ________ drive. hard jump thumb USB The intersection of a row and column in a spreadsheet program is known as a ________. formula label function cell _______ provides high-speed information processing by enabling a new set of instructions to start before the previous set is finished. Cache memory Hyperthreading Overclocking Multitasking
A keyboard and mouse are examples of ________ devices. processing storage output input Which is true about web-based application software? It is installed by the computer manufacturer. It does not need an Internet connection. It is stored completely on a web server instead of your hard drive. It is always free. The terms data and information can be used interchangeably. True All of the following are examples of network operating systems EXCEPT ________. Windows 10 MS-DOS OS X Linux A________ software installation installs all the most commonly used files to your computer's hard drive. custom new full upgrade CAPTCHA is ________. A. a rootkit virus B. the wavy hard-to-read letter and number sequence that you type to prove that you are human to a website C. antivirus software D. password method The rule of thumb that predicts that the number of transistors on a CPU will double every 2 years is called ________ Law. Boyle's Moore's Charles's Intel's Game controllers are output devices. FALSE Inkjet printers and laser printers are examples of ________ printers. dot-matrix nonimpact thermal impact A denial-of-service attack can be used to deny hackers access to a computer system. FALSE Which of the following is NOT a virus category? Worm Pharming Macro Logic bomb When using multiple monitors, you must have multiple video cards. FALSE To remove red eye from a digital image, you would use software such as ________. Microsoft PowerPoint Adobe Photoshop Elements Apple Keynote Adobe Acrobat The Mac OS was the first commercially available OS to incorporate ________. point and click technology networking sound color graphics Adware and spyware are referred to collectively as ________. alertware viruses firmware grayware [Show Less]