The Internet
Operating Systems
Cybercrime
Software and System Applications
Computer Basics
100

The Internet was created to provide:

A secure form of communication

100

When an OS processes tasks in a priority order, it is known as

Preemptive multitasking

100

Viruses that compress files and then demand money to restore them are known as:


Encryption viruses



100

Which software application would you use to calculate and manipulate numerical data?

Microsoft Office Excel



100

What is a Terabyte?

One trillion bytes




200

Which of the following describes an IP address?


  • It is referred to as a dotted quad

  • It identifies any computer connecting to the Internet

  • It identifies a website

    All of the above




200

An example of an open source OS is:

Linux




200

Software designed to close logical ports in your computer is known as a(n):

Firewall




200

PowToon and HaikuDeck are alternatives to:

Microsoft PowerPoint




200

Monitor screens are made up of millions of tiny dots known as:

Pixels




300

What is an installed email client?

Outlook




300

Special programs that facilitate communication between a device and the OS are called:

Device drivers




300

Which tool do hackers use to gain access to and take control of your computer?

Backdoor programs




300

Calendars, tasks and email will be found in which application?

Outlook



300

Which of these is NOT located on the motherboard? 


  • CPU

  • ROM

  • RAM

    DVD drive







DVD drive

400

What web browser feature would be particularly useful when using public computers?

Privacy browsing



400

A feature in Windows 10 used to organize open windows into task-specific groups is called:

Virtual desktops

400

A computer that a hacker has gained control in order to launch DoS attacks is a ____ Computer.

Zombie




400

What is often distributed prior to a final release of software?

Beta version

400

Data and information are NOT interchangeable terms.

True

500

In the URL http//www.whitehouse.gov/blog, which part is considered the path or subdirectory?


/blog



500

Different versions of Linux are known as distros.

True

500

A backup of files that creates a snapshot of your computer at a point in time is known as a(an)

Image backup




500

What should you check first to ensure software will work on your computer?

The type of operating system




500

The operating system is a type of application software.

False