Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

CGS 1060 FINAL EXAM -with 100% verified solutions- -2024.docx, Exams of Advanced Education

CGS 1060 FINAL EXAM -with 100% verified solutions- -2024.docx

Typology: Exams

2023/2024

Available from 05/27/2024

studycamp
studycamp 🇺🇸

3.9

(27)

2.8K documents

1 / 6

Toggle sidebar

Related documents


Partial preview of the text

Download CGS 1060 FINAL EXAM -with 100% verified solutions- -2024.docx and more Exams Advanced Education in PDF only on Docsity!

CGS 1060 FINAL EXAM -with 100% verified

solutions- -

Which term is used to refer to all of the physical parts of a computer system? Hardware Software that allows you to do word processing, send e-mails, or play games is commonly referred to as. Application Programs Which of the following is an example of an operating system?

  • Microsoft Word
  • Internet Explorer
  • File Explorer
  • Microsoft Windows Microsoft Windows A mainframe computer is. An extremely fast, expensive computer with a large data capacity that is typically used by huge companies. A computer that serves other computers by running important software and storing important data is called a. Server What piece of computer hardware is often referred to as the "brains" of the computer? CPU Which of the following components would NOT be considered a peripheral device?
  • Printer
  • Mouse
  • Monitor
  • Motherboard Motherboard At the lowest level of processing, computers represent data and instructions using a series of binary digits, 1s and 0s. An individual binary digit it known as a. Bit

A kilobyte is. 1024 Bytes A string of 8 binary digits is known as a. Byte A removable USB flash drive with a capacity of 4096 megabytes has an equivalent storage capacity of. 4GB Which type of memory contains instructions necessary for the computer's basic input/output system (BIOS) which is used to load essential data when the computer is turned on? ROM Which type of memory stores any programs and data that are currently in use by the CPU that will be lost when the computer is switched off? RAM Which unit of measurement is equivalent to one billion bytes? Gigabyte (GB) What unit of measure is used when describing the speed of a computer's CPU? Hertz To increase the performance of your computer and the number of programs it can effectively run at one time, you may want to increase the size of the computer's. RAM Which of the following would be considered an input device?

  • Printer
  • Mouse
  • Monitor
  • Speakers Mouse A display monitor's screen is composed of tiny square units called. Pixels

Of the different types of computer storage, which would you expect to have the most capacity? Hard Disk What is the name for the piece of software that manages the hardware, application programs, and provides a graphical user interface to the user of the computer? Operating System Which of the following is NOT considered an operating system?

  • Microsoft Windows
  • Linux
  • Microsoft Word
  • Mac OS Microsoft Word How many digits is the binary language comprised of? Two What type of software is used to scan for malicious programs that may be residing in your computer's hard disk or memory? Antivirus The enclosure that contains most of the components of a computer is commonly called the. System Unit Memory that requires electrical power to retain data is referred to as being . Volatile What is the top-level domain for the Uniform Resource Locator (URL) given as http://angel.irsc.edu? .edu The Internet is best described as a: Global network of networks.

What is the protocol prefix for the Uniform Resource Locator (URL) given as http://angel.irsc.edu? http:// The set of communication rules that the browser will use when connecting with the web site you're trying to access is known as the . Protocol Prefix Text or images on a web page that when clicked on take you to another web page are called. Hyperlinks A network infrastructure that provides access to users and end devices in a limited area such as a home, school, office building, or campus is called a: LAN The feature known as tabbed browsing allows you to. Have multiple web pages open at the same time inside the same browser window. Which area of the web browser window displays the URL of the current web page you are viewing? Address Bar You know your mouse is hovering over a hyperlink when the mouse pointer changes shape to a. Hand Two popular broadband Internet technologies include cable Internet access and: DSL What kind of cable is used to connect your cable/DSL modem to your broadband router or a computer to your broadband router? Ethernet Patch Cable A web address comprising of three parts, the protocol prefix, domain name, and top-level domain is often called a. URL What term best describes a company who provides access to the Internet for their customers? ISP

contain the rules that govern the communication process and define how messages will be transmitted and received. Protocols Which protocol allows for the dynamic translation of a domain name into the correct IP address? DNS Much like a telephone needs a unique phone number in order to communicate, a computer must be assigned a unique in order to communicate on the Internet. IP Address Which command can be typed in at a Window's command prompt to identify the computer's Internet address information? Ipconfig Which protocol is used to securely transmit web page information between the client and the web server? HTTPS Which of the following protocols is NOT associated with the transmission or reception of email?

  • POP
  • IMAP
  • SMTP
  • DHCP DCHP Google and Bing are examples of what kind of software system? Web Search Engine Which of the following is NOT a good practice in combating being a victim of computer fraud?
  • Don’t open suspect emails, click on links, or open attachments.
  • Send your username or password via email only when the request comes from your IT department.
  • Limit your web browsing to reputable sites.
  • Don’t download pirated software or participate on P2P networks. Send your username or password via email only when the request comes from your IT department.

Adware is. Malicious software that displays advertisements and messages when you use your computer. Malware is. The general term used to describe malicious software that can cause damage to your computer system or data. Spyware is. Malicious software that follows the actions you take and forwards the information to a third party. Phishing is. The tactic of using a fake web site to imitate a site a user knows and trusts.