




已阅读5页,还剩1页未读, 继续免费阅读
版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
1 Computer ownership increased at a gradual pace from the late 1970s until the mid 1990s and then it suddenly accelerated after the opened for commercial use 2 Online social such as MySpace and Frendster added a virtual dimension to the way people interact 3 is a term that refers to objects and entities that exist largely within computer network 4 is the process of converting text number sound animation photos and video into data that can be processed by digital devices 5 is a process by which several technologies with distinct functionalities evolve to form a single product 1 A computer accepts input processes data stores data and produces accotding to a series of instructions 2 The term microprocessor is a synonym for the term microcomputer True or false 3 The program concept enables computers to be multipurpose devices 4 A n specializes in compute intensive problems 5 A n is a special purpose microprocessor that is built into the machine it controls 1 Most computers are devices that work with discrete numbers such as 1s and 0s 2 The number system represents numeric data as a series of 0s and 1s 3 A computer uses codes to represent the numerals in your Social Security number and street address Whereas it uses numbers for numeric data such as your age 4 A n is approximately one billion bytes 5 A n circuit contains microscopic elements such as wires transistors and capacitors that ate packed onto a very small square of semiconducting material 1 The human readable version of a program created in a high level language by a programmer is called code 2 A compiler converts all the statements in a program in a single batch and the sesulting collection of instructions is called code 3 In a machine code instruction such as 00000100 00000001 the left most number is the op code and the remaining numbers are 4 The ALU in your computer s microprocessor performs and logical operations 5 The microprocessor s unit fetches each instruction 1 A n protocol is any method that confirms a person s identitu using something the person knows something the person possesses or something the person is 2 Two factor authentication methods Which verify identity using two elements of confirmation such as an ATM card and PIN are typically more secure than single0factor authentication 3 A n is software that secretly records a user s keystrokes and sends the information to a hacker 4 Tiered passwords have the advantage of reducing the number of passwords you have to remember however their disadvantage is that a hacker who discovers one of your passwords will be able to use it to access many of your accounts True or false 5 A n manager is utility software that generates secure passwords and stores them along with user ISs and their corresponding sites 1 Popular devices include printers digital cameras Scanners joysticks and speakers 2 The first popular personal computers were models and this style remains popular for offices schools and homes 3 Portable computers are classified as notebooks and ultra mobiles 4 Key components of a n PC include a remote control device TV tuner and Viiv technology 5 To assess whether two computers are you have to consider if they run the same software and use the same peripheral devices 1 A microprocessor s speed is provided in a specification such as 3 6GHz 2 Some chipmakers use a number such as 560 To differentiate microprocessors 3 A front side is circuitry that transport data to and from the processor at speeds ranging from 200MHz to 1250MHz 4 A dual processor allows a computer to execute multiple instructions at the same time to achieve parallel processing 5 RAM is which means that it cannot hold data when the computer power is off 6 A computer does not usually run out of RAM because it can use an area of the hard disk called memory 7 The instructions for loading the operating system into RAM when a computer is first turned on are stored in Hint Use the abbreviation 1 time is the average time it takes a computer to locate data on a storage medium and read it 2 A disk drive is a n access device whereas a tape drive is a n access device 3 Higher disk provides increased storage capacity 4 A magnetic storage device uses a read write to magnetize particles that represent data 5 Hard disks are susceptible to head so it is important to make backup copies 6 Data on an optical storage medium such as a DVD is stored as pits and 7 CD RW technology allows you to write data on a disk and then change that data True or false 8 A USB flash drive uses solid technology to store data and programs 1 Computer devices include mice trackpads trackballs and joysticks 2 In the context of computer displays rate refers to the speed at which the screen image is repainted 3 The number of dots that form an image on a monitor or printer is referred to as 4 A printer with printing capability can print on both sides of the paper 5 AGP PCI and ISA are types of expansion 6 A n port provides one of the fastest simplest ways to connect peripherals 1 The Kensington Security is an industry standard security mechanism that s factory installed on many personal computers 2 A power is a sudden increase or spike in electrical energy Affecting the current that flows to electrical outlets 3 Most UPSs have two types of sockets one type offers backup plus surge protection and the other offers only surge protection 4 Many seasoned users have encountered the blue screen of that suddenly replaces the usual graphical screen display with an enigmatic error message written in white text against a bright blue background 5 Mode is a stripped down version of Windows designed for troubleshooting 1 The two main software categories are software and application software 2 Software can be defined as any type of application software that has the potential to help people do their work more efficiently 3 A type of application software that is called is designed to help several people collaborate on a single project using local networks or internet connections 4 A type of system software referred to as software is designed to help you monitor and configure settings for your computer system equipment the operating system or application software 5 A device is software usually run in the background without opening a window and is designed to help a peripheral device establish communication with a computer 1 various kinds of production software provide tools for creating and formatting printed and Web based materials 2 a spelling checker will find an error in The sailor tied a complex not True or false 3 software provides a sort of blank canvas on which you can create numeric models by simply painting values labels and formulas 4 software stores data as a series of records and allows you to establish series of records and allows you to establish relationships between different types of records 5 CD software transfers files from an audio CD to your computer s hard disk 6 Authoring software allows you to add Hollywood style menus to digital videos 1 One advantage of a software is that each application tends to have a similar user interface and it is usually easy to transport data from one application to another 2 System specify the operating system and minimum hardware capacities required for software to work correctly 3 If the opening screen of a software application contains no copyright notice it is not protected by copyright law True or false 4 Domain software is not copyrighted making it available for use without restriction except that you cannot apply for a copyright on it 5 A use license is priced per copy and allows a specific number of copies to be used ai the same time 6 Source software is distributed with its source code so that it can be legally modified and redistributed 1 At least one of the files included in a software package is an file designed to be started by users 2 A application is software that is designed to reside on a computer s hard disk 3 Usually all the files for downloaded software are zipped to consolidate them into one large file True or false 4 software is designed to run from removable storage such as a CD or USB flash drive 5 A software is a small section of program code that replaces part of the software you currently have installed 1 The term threat describes malware that combines more than one type of malicious program 2 A key characteristic of is their ability to lurk in a computer for days or months quietly replicating themselves 3 Unlike a a Trojan is not designed to spread itself to other computers 4 The term refers to software tools used to conceal malware and backdoors that have been installed on a victim s computer 5 When antivirus software finds a virus signature it typically the file by encrypting it and moving it to an isolated folder 1 An operating system manages a computer s such as RAM storage and peripherals 2 To run more than one program at a time the operating system must allocate a specific area of for each program 3 The core part of an operating system is called its 4 A n program stored in ROM tells the hard disk to load the operating system into RAM 5 A user encompasses the hardware and software that helps people and computers communicate with each other 1 The Windows operating system was designed to run on Motorola and IBM processors True or false 2 A n compatible operating system should run application software designed for the operating system s prior generations 3 A n boot computer could boot into Windows and then reboot into Mac OS 4 A computer configured with the correct set of machines could run Windows in a window on the Mac desktop 5 A resource is a companion file created by Mac OS to store information about the file and its data 6 is an open source operating system that can run on the desktop but tends to used for server applications instead 7 Windows Mobile Palm and Symbian are examples of operating systems used for handheld devices True or false 1 Windows file naming are different than for Linux 2 When using windows you cannot use a reserved word such as Aux as a file name True or false 3 On a computer running windows the hard disk letter is usually designated as 4 The root directory of a disk can be divided into smaller lists called that are depicted as folders 5 A file s location is defined by a file path which includes the drive letter one or more file name and extension 6 A file s can be important information when you are planning to transmit it to another computer over a network 7 A file is a sect
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 2025年社区医学社区卫生服务管理考试答案及解析
- 2025年皮肤科疑难疾病鉴别诊断试卷答案及解析
- 2025年妇科妊娠期高血压并发症处理方法判断题答案及解析
- 民族团结材料的课件模板
- 2025年眼科验光验配常见眼镜配制模拟考试卷答案及解析
- 2025年急重症抢救急救技术检测答案及解析
- 2025年康复治疗计划制定考核答案及解析
- 创新驱动:新质生产力的核心引擎
- 发展农业新质生产力的措施
- 2025年肿瘤学肿瘤生物学基础考核答案及解析
- 反三违培训课件
- 数据中心供配电设施建设工程施工方案与技术措施
- 宝安妇幼保健医院医用气体监理工作细则
- 严重创伤急救护理
- 校园设备投放管理制度
- 2026届新高考语文热点复习小说阅读
- 2024年中国大唐集团有限公司招聘考试真题
- JG/T 433-2014建筑幕墙用平推窗滑撑
- 机房日常巡检管理制度
- 家庭养老床位管理制度
- 2025-2030年中国水利工程行业市场发展分析及前景趋势与投融资研究报告
评论
0/150
提交评论