How JustAnswer Works:
  • Ask an Expert
    Experts are full of valuable knowledge and are ready to help with any question. Credentials confirmed by a Fortune 500 verification firm.
  • Get a Professional Answer
    Via email, text message, or notification as you wait on our site.
    Ask follow up questions if you need to.
  • 100% Satisfaction Guarantee
    Rate the answer you receive.
Ask Viet - Computer Tech Your Own Question
Viet - Computer Tech
Viet - Computer Tech, Computer Support Specialist
Category: Computer
Satisfied Customers: 37491
Experience:  Ten years of computer support. Microsoft MCP & CompTIA A+ certifications. Windows 10 8 7 Vista XP etc.
Type Your Computer Question Here...
Viet - Computer Tech is online now
A new question is answered every 9 seconds

Question 1 1 points Save The control unit is o

Customer Question

Question 1 1 points Save
The control unit is one component of the:
front side bus.

Question 2 1 points Save
________ are lists of statements that use a single location to specify how to display HTML/XHTML elements.
HTML tags
Key pairs
Cascading style sheets (CSS)

Question 3 1 points Save
Which of the following was the first widely used operating system installed in personal computers?
Symbian OS
Microsoft Windows

Question 4 1 points Save
As defined by the NSA and the Office of Homeland Security, a set of measures intended to protect and defend information and information systems is referred to as:
quality information assurance.
information safety assurance.
information quality control.
information assurance.

Question 5 1 points Save
Which of the following activities is carried out by the ALU?
movement of read/write heads
coordination of all other computer components
creation of virtual memory
completion of all arithmetic calculations

Question 6 1 points Save
A computer network is defined as two or more computers connected with ________ so that they can communicate with each other.
Ethernet cable
the Internet
at least one server
software and hardware

Question 7 1 points Save
The location of a file is specified by its:
drive letter.
file extension.
file type.
file path.

Question 8 1 points Save
Which of the following is the first step in the boot process?
The BIOS checks that all devices are in place.
The OS is loaded into RAM.
Configuration and customization settings are checked.
The BIOS is activated by powering on the CPU.

Question 9 1 points Save
The Internet is:
a large network of networks.
the same as the Web.
a communication system for the U.S. government.
an internal communication system for a business.

Question 10 1 points Save
CPU speed is measured in:
bytes per second

Question 11 1 points Save
Which of the following are personal video journal entries posted on the Web?

Question 12 1 points Save
A ________ is where a peripheral device can attach to a computer so that data can be exchanged between it and the operating system.
expansion bus

Question 13 1 points Save
________ is data that has been organized or presented in a meaningful fashion.
A character
A symbol
A number

Question 14 1 points Save
All of the following are examples of multimedia EXCEPT:
MP3 music files.
streaming video.

Question 15 1 points Save
.com and .org are examples of:
HTML tags.
second-level domains.
network prefixes.
top-level domains.

Question 16 1 points Save
________ is the set of computer programs that enables the hardware to perform different tasks.
Binary data

Question 17 1 points Save
Windows 7 incorporates ________, which enables you to migrate files and settings from a Windows Vista system to a Windows 7 system via a network connection.
Upgrade Companion
Migrate Easy
Easy Transfer
Easy Sync

Question 18 1 points Save
Adobe Reader, Flash Player, and QuickTime Player are all examples of special software programs called:

Question 19 1 points Save
With regard to computer protection, quarantining is defined as:
deleting the infected file.
updating your antivirus software.
repairing the infected file.
placing a found virus in a secure area on the hard drive.

Question 20 1 points Save
Using a ________, hackers can access and delete all files on your computer, send e-mail, run programs, and do just about anything else you can do with your computer.
packet sniffer
Trojan horse
backdoor program

Question 21 1 points Save
Computers gather data, which means that they allow users to ________ data.

Question 22 1 points Save
________ occurs when a hacker takes control of a Bluetooth-enabled device to make phone calls, read phonebook entries, send and receive text messages, and more.

Question 23 1 points Save
To make sure your computer performs reliably, you can do all of the following EXCEPT:
clear out unnecessary files.
clean out your Startup folder.
run the Disk Defragmenter.
increase the front side bus speed.

Question 24 1 points Save
________ are electronic mailing lists of e-mail addresses of people who are interested in a certain topic or an area of interest.
Social networking sites

Question 25 1 points Save
The amount of RAM recommended for most systems today is measured in:

Question 26 1 points Save
Which of the following statements about cookies is NOT true?
Cookies are text files.
Some companies sell the personal information found in cookies to other companies.
Cookies obtain your personal information by searching your hard drive.
Cookies help companies determine the traffic flow through their Web site.

Question 27 8 points Save
Each question has one answer.
- A. B. C. D. Which html tag starts the Web Page and ends the Web Page?
- A. B. C. D. Which html tag contains everything that shows up on the browser view of the Web Page?

- A. B. C. D. Which html tag contains the tag?
- A. B. C. D. Which html tag shows up on both the title bar of the browser view, as well as the tab of the browser page?

D. <title

Question 28 1 points Save
Which of the following is NOT a step in the boot process?
The operating system is loaded into RAM.
The BIOS is activated by powering on the CPU.
Configuration and customization settings are checked.
The antivirus program checks all files for viruses.

Question 29 1 points Save
Flash drives plug into a(n):
serial port.
USB port.
expansion slot.
drive bay.

Question 30 1 points Save
________ floods a computer with requests until it shuts down and refuses to answer any requests for information.
A Trojan horse
Port blocking
A polymorphic virus
A DDoS attack

Question 31 1 points Save
The unique number assigned to a network adapter by the manufacturer is referred to as the ________ address.

Question 32 1 points Save
The most essential software in your computer system is the:
security software.
productivity software.
antivirus software.
operating system software.

Question 33 1 points Save
Kernel memory is:
permanent memory.
the amount of memory in the memory modules.
RAM memory used by the operating system.
faster than RAM.

Question 34 1 points Save
________ uses a dedicated connection between two points that remains active for the duration of transmission.
Circuit switching
Packet switching
An open circuit
A closed circuit

Question 35 1 points Save
The CPU consists of which two parts?
the control unit and the arithmetic logic unit
the arithmetic logic unit and the front side bus
the control unit and cache memory
the control unit and the front side bus

Question 36 1 points Save
The ________ language consists of just two digits: 0 and 1.
base 10
data processing

Question 37 1 points Save
The ________ is a program that manages the data between the operating system and all input and output devices attached to the system.
Device Manager
Configuration Utility

Question 38 1 points Save
Facebook and MySpace are considered to be:
business-to-business Web sites.
phishing Web sites.
social networking Web sites.
e-commerce Web sites.

Question 39 1 points Save
For complete protection when backing up your files, you should use a program that creates a(n) ________ of your entire system.
disk backup
full backup
image backup
incremental backup

Question 40 1 points Save
The text version of a Web site's Internet address is called the:
Uniform Resource Locator (URL).
home page.
IP address.

Question 41 1 points Save
The OS allows you to organize the contents of your computer in a hierarchical structure of ________.

Question 42 1 points Save
Due to the expansion of media files on home computers, ________ options are now being marketed; however, they are not as full featured as their business-world counterparts.
external hard drive
home server
online storage

Question 43 1 points Save
________ software is the set of programs that enables the computer's hardware devices and application software to work together.

Question 44 1 points Save
One or more network switches to which ISPs connect are referred to as:
points of presence.
Internet exchange points (IXPs).
router points.
gateway interfaces.

Question 45 1 points Save
The most common type of home network is:
a peer-to-peer (P2P) network.
a client/server network.
a token ring LAN.
a WAN.

Question 46 1 points Save
Any computer parts that you can actually touch are considered to be:

Question 47 1 points Save
In the URL, the portion labeled http is the:
domain name.
top-level domain.

Question 48 1 points Save
Which of the following classifications of viruses can change its own code?

Question 49 1 points Save
By using a(n) ________, individual Internet users are able to connect to their ISP.
point of presence (POP)
OC line
T line

Question 50 1 points Save
Devices such as monitors and printers that are connected to the computer are called:
system devices.
input devices.
peripheral devices.
processing devices.

Question 51 1 points Save
When data is broken into smaller chunks to be sent over various routes at the same time, it is called:
packet switching.
circuit switching.

Question 52 1 points Save
________ provides high speed information processing by enabling a new set of instructions to start before the previous set has been finished.
Cache memory

Question 53 1 points Save
Sophisticated networks generally use which of the following hardware devices to ease the flow of data packets throughout the network?
routers and switches
network interface cards (NICs)
USB ports

Question 54 1 points Save
The name of the free Internet browser from Mozilla is:
Internet Explorer.

Question 55 1 points Save
A set of rules for exchanging electronic information is called a:
style guide.
communication guide.
connectivity scheme.

Question 56 1 points Save
Moore's Law is a rule that predicts:
the speed of the front side bus.
the pace at which CPUs improve.
the data transfer rate for a hard drive.
the access time of the read/write head.

Question 57 1 points Save
________ are high-speed, fiber-optic communications lines.
T lines
OC lines
DSL lines
Cable lines

Question 58 1 points Save
Spyware programs that monitor keystrokes with the intent of stealing passwords, login IDs, or credit card information are referred to as:
information recorders.
spy loggers.
keystroke loggers.
keystroke spies

Question 59 1 points Save
HTTP is the abbreviation for:
Hyper Transmission Protocol.
Hypertext Transfer Protocol.
Hypertext Protocol.
Hypertext Transmission Protocol.

Question 60 1 points Save
A cyberspace ________ is an attempt to make someone believe something that is untrue.

Question 61 1 points Save
Which of the following is NOT one of the four major data-processing functions of a computer?
gathering data
analyzing the data or information
processing data into information
storing the data or information

Question 62 8 points Save
There is one answer for each statement.
- A. B. C. D. This html tag(s) will show an animated image on the browser view of the Web Page.
- A. B. C. D. This html tag(s) will show a hyperlink on the browser view of the Web Page.
- A. B. C. D. This html tag(s) will show a list on the browser view of the Web Page.
- A. B. C. D. This html tag(s) will show a personal link on the browser view of the Web Page.
  • books
  • paper

B. click here
C. sport image
D. click here

Question 63 1 points Save
A computer system becomes memory bound when:
there is not enough RAM installed.
the arithmetic logic unit (ALU) becomes overloaded with data.
there is not enough virtual memory.
the front side bus (FSB) is too fast.

Question 64 1 points Save
The ________ contains all of the different configurations used by the OS and by other applications.

Question 65 1 points Save
When your computer is using virtual memory, the operating system builds a file called the ________ on the hard drive that allows processing to continue.
swap file
page file
RAM file
cache file

Question 66 1 points Save
________ are easy-to-use mini desktop programs that give you information at a glance or quick access to frequently used tools including weather information, calendar items, or games.

Question 67 1 points Save
The hard disk drive is a ________ storage device, meaning that it stores data permanently.

Question 68 1 points Save
Cache memory levels are determined by:
the speed of the chip.
the chip's proximity to the CPU.
the amount of storage space on the chip.
the physical size of the chip.

Question 69 8 points Save
Each statement has one answer.
- A. B. C. D. This html tag(s) will show up in the code and not on the Web Page.
- A. B. C. D. This html tag(s) will create a line across the browser view of a Web Page.
- A. B. C. D. This html tag(s) will change the text color to green.
- A. B. C. D. This html tag(s) will create an email link on a Web Page.
A. click here

D. family

Question 70 1 points Save
Which of the following is NOT a function of the operating system?
It provides a user interface.
It provides a way for software applications to work with the CPU.
It manages the removal of spyware.
It manages the processor.

Question 71 1 points Save
For Ethernet cables that run more than 100 meters, you can use ________ to boost the signal.

Question 72 1 points Save
What protocol allows files to be transferred from a Web server so that you can view them on your computer using a browser?

Question 73 1 points Save
The agency that first began funding the Internet was called the:
Science Research Projects Agency.
Advanced Research Computing Agency.
National Science Foundation.
Advanced Research Projects Agency.

Question 74 1 points Save
A packet sniffer is a program that can enable a hacker to do all of the following EXCEPT:
launch a denial of service (DoS) attack on your computer.
steal your logon and passwords for various accounts.
use your debit card information to purchase items illegally.
assume your identity.

Question 75 1 points Save
Network architectures are classified according to:
the speed at which the processor runs.
the bandwidth supplied by the connection.
the distance between the hub and the router.
the way they are controlled and the distance between their nodes.

Question 76 1 points Save
A ________ is a virus that is attached to documents such as Word or Excel files.
macro virus
polymorphic virus
script virus

Question 77 1 points Save
One way to increase security on a network is by installing a:
network adapter.
security policy.

Question 78 1 points Save
The ________ contains all of the central electronic components of the computer.
peripheral unit.
input unit.
system unit.

Question 79 1 points Save
________ binary digits (or bits) combine to create one byte.

Question 80 1 points Save
All the following are examples of input devices EXCEPT a:

Question 81 1 points Save
A(n) ________ keeps track of data packets and, in conjunction with network interface cards, helps the data packets find their destination without running into each other on an Ethernet network.

Question 82 1 points Save
An expansion card that translates binary data into images is a(n):
video card.
audio card.
game card.
sound card.

Question 83 1 points Save
The main paths of the Internet along which data travels the fastest are known collectively as the Internet ________.

Question 84 1 points Save
Throughput, the actual speed of data transfer that is achieved in a network, is usually:
the same as the data transfer rate.
at least the same as the data transfer rate, but often less.
less than the data transfer rate.
more than the data transfer rate.

Question 85 1 points Save
The CPU is connected to the system memory by the:
expansion card.
cache memory.
expansion hub.
front side bus.

Question 86 1 points Save
Before upgrading your OS, you should back up your:
data files.
system files.

Question 87 1 points Save
You can block logical ports to invaders and make your computer invisible to others on the Internet by installing:
a packet filter.
a firewall.
a packet sniffer.
antivirus software.

Question 88 1 points Save
Which of the following UTP cable types is the cheapest and often used in home networks?
Cat 5E
Cat 4
Cat 6
Cat 7

Question 89 1 points Save
Computers running specialized operating systems that enable them to host Web pages and other information are called:
file servers.
Web servers.
commerce servers.
DNS servers.

Question 90 1 points Save
At a minimum, what content must all data packets contain?
recipient's address, reassembling instructions, packet size, and data
sender's address, packet type, packet size, and data
sender's address, packet size, reassembling instructions, and data
recipient's address, sender's address, reassembling instructions, and data

Question 91 1 points Save
Podcasts enable you to
communicate with friends in real time.
post journal entries on the Web.
broadcast over the Internet using compressed audio files such as MP3s and MP4s.
edit video files over the Web.

Question 92 1 points Save
A Webcast is:
a device needed for podcast.
a podcast that is updated automatically.
another name for a podcast.
the broadcast of audio or video content over the Internet.

Question 93 1 points Save
________ switching has been used since the early days of the telephone for establishing communication.

Question 94 1 points Save
A ________ is a virus that is triggered when certain conditions are met, such as a file opening or starting a program a certain number of times.
time bomb
Trojan horse
boot-sector virus
logic bomb

Question 95 1 points Save
Which of the following is necessary if you want your Ethernet network to connect to the Internet through a DSL or cable modem?
a hub
a DSL/cable router
a switch
a cable

Question 96 1 points Save
The basic input/output system is stored on a ________ chip.

Question 97 1 points Save
Many ________ sold for home use are also configured as firewalls and are capable of performing network address translation (NAT).
network interface cards (NICs)

Question 98 1 points Save
Which of the following has the greatest bandwidth?
OC lines
T-1 lines
conventional telephone lines
T-3 lines

Question 99 1 points Save
The purpose of network address translation (NAT) is to:
dynamically assign IP addresses via an ISP.
translate IP addresses from the Internet.
convert logical ports to physical port configurations.
hide user IP addresses from the Internet.

Question 100 1 points Save
Which of the following network adapters is most likely to be preinstalled in a typical notebook computer today?
a power-line adapter
a modem
both a wireless and wired network adapter
a transceiver

Question 101 1 points Save
The small circuit boards that hold a series of RAM chips are called:
flash memory cards.
expansion cards.
virtual memory.
memory modules.

Question 102 1 points Save
Most ________ allow you to connect wireless and wired computers to the same network.
wireless routers

Question 103 1 points Save
An IP address that is assigned from an available pool of IP addresses is called a(n):
assigned address.
static address.
mobile address.
dynamic address.

Question 104 1 points Save
Which of the following statements about Apple Mac OS is TRUE?
Mac OS was the first OS to use a graphical user interface.
Mac systems are less expensive than Windows-based PCs.
There are more software applications available for the Mac OS than for Windows-based PCs.
Mac OS can be used on Windows-based PCs.

Question 105 1 points Save
An IP address that does not change and is usually assigned manually by a network administrator is called a(n):
stationary address.
dynamic address.
fixed address.
static address.

Question 106 1 points Save
All of the following are reasons for using a power-line network instead of an Ethernet network EXCEPT:
you are experiencing interference with a wireless Ethernet network.
power-line networks cost less.
power-line networks can be easier to install.
you don't need to run new wires with a power-line network.

Question 107 1 points Save
The protocol that transfers HTML data from servers to browsers is:

Question 108 1 points Save
The amount of RAM that is actually on the memory modules in your computer is the ________ memory.

Question 109 1 points Save
Who funded the development of technologies that would eventually become the Internet?
the United Nations
the United States government

Question 110 1 points Save
Computers that host software that enables users to purchase goods and services over the Internet are called ________ servers.

Question 111 1 points Save
You can keep track of IM contacts by using a:
breadcrumb trail.
search engine.
people finder.
buddy list.

Question 112 1 points Save
The ________ is responsible for managing the processor and all other components of the computer system, and is an essential part of the operating system.

Question 113 1 points Save
Rules for creating passwords include all of the following EXCEPT:
change your password XXXXX
create a hard-to-guess password, with a combination of letters and numbers.
keep your password XXXXX down and stored in any easy-to-remember location.
keep your password XXXXX secret.

Question 114 1 points Save
The ________ is the maximum speed at which data can be transmitted between two nodes on a network.
data transfer rate
transmission speed
node speed

Question 115 1 points Save
Which of the following is formally defined as any criminal action perpetrated primarily through the use of a computer?
social networking

Question 116 1 points Save
Some video games require a ________ operating system.
single-user, multitask
single-user, single-task

Question 117 1 points Save
Which of the following devices is needed to share an Internet connection on a wireless network?
a modem
a fiber-optic cable
a wireless router
a wireless hub

Question 118 1 points Save
In the URL, the portion labeled .com is the:
domain name.
top-level domain.

Question 119 8 points Save
Each question has one answer.
- A. B. C. D. What are the points given for a Personal Link on the Final Web Assignment?
- A. B. C. D. What are the points given for all four images (including the alt tag) on the Final Web Page?
- A. B. C. D. What are the points given for the target/anchor on the Final Web Assignment?
- A. B. C. D. What are the points given for the Home Page on the Final Web Assignment?
A. 12 points
B. 5 points
C. 4 points
D. 10 points

Question 120 1 points Save
All of the following are terms related to part of the boot process EXCEPT:

Question 121 1 points Save
All of the following are parts of a URL (Web site address) EXCEPT:
the domain name.
the protocol.

Question 122 1 points Save
Running the Disk Defragmenter utility will:
make the hard drive work more efficiently.
detect and remove spyware.
clear out temporary Internet files.
clean out your Startup folder.

Question 123 1 points Save
A unique number that identifies a computer, server, or device connected to the Internet is called a(n):
TCP address.
CGI address.
NetBIOS address.
IP address.

Question 124 1 points Save
Running the Disk Cleanup utility is a quick way to:
remove spyware programs.
defrag your hard drive.
clear out unnecessary files.
clean out your Startup folder.

Question 125 1 points Save
Which of the following is NOT an example of a network node?
a printer
a computer
a modem
a mouse

Question 126 1 points Save
Restarting a computer when it is already powered on is called:
a cold boot.
a warm boot.
standby mode.

Question 127 1 points Save
The organization responsible for the Internet's domain name system and IP address allocation is:

Question 128 1 points Save
When an operating system receives an interrupt from the printer and pauses the CPU, it is performing which of the following functions?
user management
memory management
processor management
software application coordination

Question 129 1 points Save
All of the following can be used for backing up data files EXCEPT:
external hard drives.
flash drives.

Question 130 1 points Save
Each of the following is a computer subsystem EXCEPT the:
data subsystem.
memory subsystem.
storage subsystem.
CPU subsystem.

Question 131 1 points Save
Which of the following devices translates electronic data into radio waves?
a receiver
a modem
a fiber-optic cable
a transceiver

Question 132 1 points Save
During the virtual memory process, the operating system moves data to a temporary storage area on the hard drive called the ________ file.

Question 133 1 points Save
Adware and spyware are referred to collectively as:

Question 134 1 points Save
Used since the early days of the telephone, ________ uses a dedicated connection between two points that remains active during transmission.
packet routing
circuit switching
packet switching

Question 135 1 points Save
Podcasts use which of the following technologies?
an open source software application for 3D modeling
MSN Messenger

Question 136 1 points Save
Microsoft Windows and Mac OS use a ________ interface.
graphical user

Question 137 1 points Save
Windows 7 introduces the concept of ________, which are folders that gather files from different locations and display the files as if they were all saved in a single folder.

Question 138 1 points Save
The "s" in https stands for:
secure socket layer.
shop secure layer.
secure socket logon.
safety secured logon.

Question 139 1 points Save
A set of programs that searches the Web to find information is called a:
search engine.
breadcrumb list.
Submitted: 6 years ago.
Category: Computer
Expert:  Viet - Computer Tech replied 6 years ago.

Viet - Computer Tech :


Viet - Computer Tech :

Please see your previous question below:

Viet - Computer Tech :

as this question is still $16.

Viet - Computer Tech :

I will ask the moderator to go with the first question and ask you to increase the price.

Viet - Computer Tech :


Viet - Computer Tech :

Please do not reply to this question. Please reply to the previous question below: