Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

CGS1060C MID-TERM REVIEW 100% SOLVED 2025., Exams of Computer Science

The process of copying files from a network server to your own computer is referred to as _____ - ANSWERdownloading Which of the following is a type of computer memory that holds the operating system? - ANSWERRAM When you start a program, it is loaded from a disk into _____? - ANSWERRAM Computer _____ is whatever is typed into, submitted to, or transmitted to a computer system. - ANSWERinput Which of the following pointing devices is the most similar to a mouse? - ANSWERtrackball Which of the following keys is used in conjunction with other keys to invoke keyboard shortcuts? - ANSWERctrl

Typology: Exams

2024/2025

Available from 07/14/2025

luckyexams
luckyexams 🇺🇸

3

(2)

2.1K documents

1 / 7

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
CGS1060C MID-TERM REVIEW 100%
SOLVED 2025.
pf3
pf4
pf5

Partial preview of the text

Download CGS1060C MID-TERM REVIEW 100% SOLVED 2025. and more Exams Computer Science in PDF only on Docsity!

CGS1060C MID-TERM REVIEW 100%

SOLVED 2025.

The process of copying files from a network server to your own computer is referred to as _____ - ANSWERdownloading Which of the following is a type of computer memory that holds the operating system? - ANSWERRAM When you start a program, it is loaded from a disk into _____? - ANSWERRAM Computer _____ is whatever is typed into, submitted to, or transmitted to a computer system. - ANSWERinput Which of the following pointing devices is the most similar to a mouse? - ANSWERtrackball Which of the following keys is used in conjunction with other keys to invoke keyboard shortcuts? - ANSWERctrl What technology is used by most mice? - ANSWERoptical technology A _____ is a device that not only provides surge protection, but also furnishes desktop computers and network devices with battery backup power during a power outage. - ANSWERUPS What is the color depth for True Color? - ANSWER24-bit What is the most obvious computer malfunction? - ANSWERfailure to power up Android is a mobile operating system developed by _____. - ANSWERa company purchased from Google Ethan is preparing a lecture about the software available for working with photos, videos, music, and other media. He asks James, who is an expert in computers, some questions. Choose the best aswer to each question. Ethan asks James what is the correct term used for movies, photos, music, and other content that is stored digitally? - ANSWERdigital media All of the following are Linux operating system distributions, except _____. - ANSWERUnix _____ software is designed to automate specialized tasks in a specific market or business. - ANSWERvertical market

_____ can be used to keep track of the pages you view at a site, the merchandise you select, and other profile information. - ANSWERcookies Which of the following is a major online privacy threat today? - ANSWERspyware What is the name of the process that changes the firmware? - ANSWERflashing Which of the following provides the fastest access to data? - ANSWERsolid-state drive Most ink jet printers use _____ color. - ANSWERCMYK Windows includes troubleshooters for all of the following, except _____. - ANSWERexternal hard drives Which of the following helps to classify the person, organization, or business that is responsible for a Web site? - ANSWERtop-level domain If your browser is properly configured, when you move the pointer over a link, the link's URL is displayed in the _____. - ANSWERstatus bar Which of the following can raise the quality rating of a Web site? - ANSWERinformation originates at the site Which of the following is the opposite of a gateway? - ANSWERfirewall Modern antivirus software attempts to locate viruses by watching for a virus _____. - ANSWERsignature A(n) _____ worm makes use of information on an infected computer to mail itself to everyone listed in your e-mail address book. - ANSWERmass-mailing Encryption utilities scramble the data in a file by using a _____ key. - ANSWERmulti- digit The original wireless encryption was called _____ because it was designed to provide a level of confidentiality similar to that of a wired network. - ANSWERWEP Typically, infected attachments look like _____ files, and they infect your computer when you open them. - ANSWERexecutable A surge protector cannot protect your equipment from _____. - ANSWERdust and dirt Which of the following technologies produces on-screen images by manipulating light within a layer of liquid crystal cells? - ANSWERLCD

All of the following are vector graphics file types, except _____. - ANSWERPNG Which of the following types of video files is used by QuickTime? - ANSWERMOV GPL stands for _____. - ANSWERgeneral public license LibreOffice Writer is _____ software. - ANSWERword-processing got a message "Access to online application denied." Which of the following is the most frequent reason for that? - ANSWERYour user ID and password do not match the one stored in your account information. Search for _____ to determine which version of Windows is installed on your computer.

  • ANSWERsystem _____ uses a command-line interface to communicate with users by default. - ANSWERMicrosoft DOS In _____, a young Finnish student named Linus Torvalds developed the Linux operating system. - ANSWER The software configuration process is handled by the installer, and it adds information about the new application to the _____. - ANSWERWindows Registry Using an application's _____ settings, you can select how you want to handle updates. - ANSWERpreferences Which one of the following has restrictions on its use that are delineated by copyright, patent, or license agreement? - ANSWERproprietary software Early communications networks, such as the telephone system, used a technology called _____ switching, which essentially established a dedicated, private link between two telephones for the duration of a call. - ANSWERcircuit Packets can originate from _____ sources. - ANSWERseveral Which of the following links devices within an organization? - ANSWERintranet All of the following are organizational activities offered by e-mail clients, EXCEPT _____. - ANSWERpromote All of the following are contained in an e-mail header EXCEPT the _____. - ANSWERsender's signature Which of the following contains defensive tools that block Web-based exploits? - ANSWERanti-virus software

When software is uninstalled or removed from the system, the _____ files have to be modified accordingly. - ANSWERregistry Which of the following is another term for a network license? - ANSWERvolume license Which of the following devices is NOT limited to a single app store? - ANSWERAndroid Most software is distributed under a(n) _____ license. - ANSWERsingle user A router's wired _____ port can connect to a modem for Internet access. - ANSWERuplink A virtual private network (VPN) is a type of _____ that allows remote users to connect to a private network using a public communications system such as the Internet. - ANSWERextranet Some versions of Windows also include an encryption utility called _____. - ANSWEREFS Which of the following organizations works to stop illegal software distribution? - ANSWERSIIA Which of the following is the domain name of the following Web address: www.msu.edu/infotech? - ANSWERmsu.edu SSID stands for _____. - ANSWERservice set identifier Fast Internet connections, called broadband, blaze away at _____ or more. - ANSWER100 Mbps When you sign up for a Webmail account, you should create a password. A password _____ helps you to select a strong password. - ANSWERmeter Another name for a Web bug is a _____. - ANSWERclear gif Some Trojan horses contain a virus or a worm, which can replicate and spread. Virus experts call this a(n) _____ threat because it combines more than one type of malicious code. - ANSWERblended