Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Question 13 Which of the following refers to a measurement of the number of inst

ID: 3726594 • Letter: Q

Question

Question 13

Which of the following refers to a measurement of the number of instructions that a CPU can process per second?

Clock speed

Hard disk space

RAM capacity

Run time

1.5 points

Question 14

A computer _____ is the amount of data that a CPU can manipulate at one time.

word

memory

register

process

1.5 points

Question 15

The buses in a computer that connect peripheral (typically input and output) devices to the motherboard are often called _____.

expansion buses

backside buses

cache buses

power buses

1.5 points

Question 16

A _____ is the smallest colorable area in an electronic image.

system unit

file

pixel

bit unit

1.5 points

Question 17

The accompanying image shows a(n) _____ that is the hardware located in a system unit.

memory slot

expansion card

drive bay

read-only memory (ROM)

1.5 points

Question 18

Case 2-2

Victor, an accounts manager at a firm, has drafted the financial report for the financial year. He needs to submit the hard copy of this report to his firm next week.

Victor sent the report to his office printer for printing. While taking out the prints from the printer, his hands were stained by flakes of powdered ink from the toner. Identify the printer Victor used.

Ink-jet printer

Impact printer

Laser printer

Thermal printer

1.5 points

Question 19

Pico projectors typically create a display up to about 10 feet wide in order to easily share information stored on the device without everyone having to crowd around a tiny screen.

True

False

1.5 points

Question 20

_____ built into the Windows operating system can check a hard drive for errors and optimize it.

File management utilities

Disk management utilities

Backup and recovery programs

Security programs

1.5 points

Question 21

Which of the following statements is true of virtual memory?

It stores some of the program during program execution.

It uses the whole of the hard drive as additional RAM.

It lets programs run faster than when they use the RAM.

It can store the information saved on it permanently.

1.5 points

Question 22

A computer cannot function without a(n) _____.

pointing device

application suite

operating system

optical drive

1.5 points

Question 23

When the amount of random access memory (RAM) required exceeds the amount of RAM available in a system, the operating system moves portions of data or programs from RAM to an external hard drive.

True

False

1.5 points

Question 24

Sound recorder software is used to capture sound from a microphone and _____ is used to capture sound from a CD.

authoring software

burning software

tracing software

ripping software

1.5 points

Question 25

Pages of programs or data are copied from random access memory (RAM) to the virtual memory area of the hard drive.

True

False

1.5 points

Question 26

Microsoft Access is a spreadsheet software.

True

False

1.5 points

Question 27

A computer's operating system is loaded into memory during the eviction process.

True

False

1.5 points

Question 28

Which of the following devices uses application software different from those in desktop computers?

Notebook

Laptop

Netbook

Mobile phone

1.5 points

Question 29

The amount of data that is actually transferred under real-life conditions is called _____.

latency

jitter

throughput

interplay data

1.5 points

Question 30

Identify a protocol that is used to retrieve emails.

Post Office Protocol (POP3)

Address Resolution Protocol (ARP)

File Transfer Protocol (FTP)

Simple Mail Transfer Protocol (SMTP)

1.5 points

Question 31

The amount of data that is actually transferred under real-life conditions is called cardinality.

True

False

1.5 points

Question 32

Video data requires the most amount of bandwidth when compared to text data.

True

False

1.5 points

Question 33

Which of the following statements is true of a network adapter?

It is built into a device as a bridged card.

It is independent of the type of Internet access being used.

It prevents the conversion of signals from digital to analog, and vice versa.

It needs to support the type of cabling or signals being used.

1.5 points

Question 34

Most networking media send data using _____ in which data is represented by only two discrete states: 0s and 1s.

ramp signals

digital signals

contiguous signals

exponential signals

1.5 points

Question 35

In a client-server network, network clients provide access to software, files, and other resources that are being shared via the network.

True

False

1.5 points

Question 36

Which of the following is one of the key enhancements of Bluetooth 4.0?

Energy efficiency

Large-range connectivity

Use of Wi-Fi signals

Need of cables between devices for data transfer

1.5 points

Question 37

Which of the following statements is true of the global positioning system (GPS)?

It uses satellite technology to schedule meetings with clients.

It is used to avail work from home facilities.

It provides medical information and services worldwide.

It is used in determining exact geographic locations.

1.5 points

Question 38

_____ is an example of an online payment service.

E-portfolio

Fotki

Vonage

PayPal

1.5 points

Question 39

The type of device used, the type of Internet connection and service wanted, and the geographical location determine the Internet service provider (ISP) options.

True

False

1.5 points

Question 40

The biggest advantage of Voice over Internet Protocol (VoIP) is _____.

voice clarity

high-quality streaming of movies and television shows

cost savings

0% downtime

1.5 points

Question 41

Mobile wireless Internet access requires a DSL modem and is available only to users who are relatively close to a telephone switching station and who have telephone lines capable of handling DSL.

True

False

1.5 points

Question 42

Instant messaging is commonly referred to as _____.

chat

post

tweet

pin

1.5 points

Question 43

According to the online version of the Merriam-Webster Dictionary, the term _____ means "to steal and pass off the ideas or words of another as one's own."

peptonize

dualism

plagiarize

journalism

1.5 points

Question 44

To avoid plagiarizing Web page content, one should credit Web page sources when they are used in papers, on Web pages, or in other documents.

True

False

1.5 points

Question 45

Which of the following provides leadership in addressing issues that may impact the future of the Internet?

The Internet Society

The Internet Archive

The World Wide Web Consortium (W3C)

The Internet Standards Process

1.5 points

Question 46

Which of the following is a term used by individual providers for fiber-to-the-premises (FTTP)?

Netiquette

WiMAX

Verizon FOS

Podcast

1.5 points

Question 47

A sender's private key is used to acknowledge a document, and that key, along with the contents of the document, generates a unique _____.

digital signature

digital quotient

data report

business report

1.5 points

Question 48

_____ typically begins with online harassment, such as sending harassing or threatening email messages to a victim, posing as the victim to sign the victim up for pornographic or otherwise offensive email newsletters, publicizing the victim's home address and telephone number, or hacking into the victim's social media pages to alter the content.

Cyberstalking

Cybersquatting

Cybersailing

Cyberbonding

1.5 points

Question 49

The _____ grants additional authority to the FTC to help protect consumers from spam, spyware, and Internet fraud and deception.

Real WEB ID Act

U.S. SAFE WEB Act of 2006

Do Not Call Implementation Act

PROTECT Act of 2003

a.

Clock speed

b.

Hard disk space

c.

RAM capacity

d.

Run time

Explanation / Answer

13)Answer:

clock speed

Explanation:

clock speed a measurement of the number of instructions that a CPU can process per second.

14)Answer:

word

Explanation:

word is the amount of data (measured in bits or bytes) that a CPU can manipulate at one time.

15)Answer:

a.expansion buses

Explanation:

The buses that connect peripheral(typically input and output) devices to the motherboard are often called expansion buses.

16)Answer:

c.pixel

Explanation:

Pixel is the smallest colorable area in an electronic image

19)Answer:

True

Explanation:

Pico projectors typically create a display up to 10 feet wide in order to easily share information storedon the device with others on the go with- out having to crowd around a tiny screen. They can also be built into mobile devices.

20)Answer:

c.disk management utilities

Explanation:

Diagnostic and disk management utilities built into the Windows operating system include programs to check your hard drive for errors and programs to optimize your hard drive

22)Answer:

c.operating system

Explanation:

Without a(n) os a computer cannot function.

23)Answer:

True

Explanation:

when the amount of RAMS required exceeds the amount of RAM available, the operating system moves portions of data or programs the operating system over portions of data or programs from RAM to the virtual memory area of the hard drive which is called the page file or swap file

24)Answer:

d.ripping software

Explanation:

To capture sound from a CD ripping software is used.

26)Answer:

False

Explanation:

we would use a word-processing program(Microsoft Word), a spreadsheet program (Microsoft Excel), a database program (Microsoft Access), and a presentation program (Microsoft PowerPoint).

27)Answer:

False

Explanation:

The operating system is loaded into memory during the boot process.

29)Answer:

c.throughput

Explanation:

refers to the amount of data that can be transferred in a given time period and throughput is the amount of data that is actually transferred under real-life conditions (Text data requires leastamount; video data requires most)

30)Answer:

a.Post Office Protocol (POP3)

Explanation:

IMAP and POP3 are the two most commonly used Internet mail protocols for retrieving emails. Bothprotocols are supported by all modern email clients and web servers.

32)Answer:

True

Explanation:

Text data requires the least amount of bandwidth; video data requires the most.

34)Answer:

b.digital signals

Explanation:

Most networking media send data using. digital signals. using digital signals data is.represented by only two discrete states: 0s and 1s. represent data with continuous waves. Analog signals

36)Answer:

a. Energy efficiency

Explanation:

Energy efficiency is one of the key enhancements of Bluetooth 4.0

37)Answer:

d.It is used in determining exact geographic locations

Explanation:

global positioning system (GPS)  is used in determining exact geographic locations.

38)Answer:

d.paypal

Explanation:

PayPal is an example of an online payment service. Online shopping is commonly used to purchase both physical products—such as clothing, shoes, and furniture—as well as downloadable products—such as software, movies, and e-books—via Web pages like the L.L.Bean Web page.

41)Answer:

True

Explanation:

DSL Internet access requires a DSL modem and is available only to users who are relatively close(within three miles) to a telephone switching station and who have telephone lines capable ofhandling DSL Internet access.

42)Answer:

a.chat

Explanation:

Instant messaging is commonly referred to as chat

43)Answer:

c.plagiarize

Explanation:

According to the online version of the Merriam-Webster Dictionary, the term plagiarize means "to steal and pass off the ideas or words of another as one's own

44)Answer:

True

Explanation:

To avoid plagiarizing Web page content, you need to credit Web page sources—as well as anyother Internet resources—when you use them in papers, on Web pages, or in other documents.

45)Answer:

a.The Internet Society

Explanation:

the Internet Society provides leadership in addressing issues that may impact the future of the Internet

48)Answer:

a.Cyberstalking

Explanation:

cyberstalking typically begins with online harassment, such as sending harassing or threatening email messages to a victim, posing as the victim to sign the victim up for pornographic or otherwise offensive email newsletters, publicizing the victim's home address and telephone number, or hacking into the victim's social media pages to alter the content.

49)Answer:

b.U.S. SAFE WEB Act of 2006

Explanation:

The U.S. safeweb  Act of 2006 grants additional authority to the FTC to help protect consumers from spam, spyware, and Internet fraudand deception

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote