Digital Information Technology Semester 1 Review
41 Questions
100 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What type of memory is found on secondary storage devices?

Long-term memory.

What is the term for the instructions that tell a computer what to do?

Software.

Why is binary code made up of a series of ones and zeroes?

To turn the electrical switches in the CPU on and off. 0 = off, 1 = on.

What basic function is being performed when a person uses a scanner to send an image to a computer?

<p>Input function.</p> Signup and view all the answers

During the processing stage, what does the computer do?

<p>Use information.</p> Signup and view all the answers

Where would the information needed to start a computer be stored?

<p>BIOS (Basic Input Output System).</p> Signup and view all the answers

In which basic function does the computer save information?

<p>Storage.</p> Signup and view all the answers

What type of device are speakers and headphones?

<p>Output.</p> Signup and view all the answers

Where is most of the information processed in a computer?

<p>CPU (Central Processing Unit).</p> Signup and view all the answers

What type of software maintains a computer?

<p>Utility Software.</p> Signup and view all the answers

What's it called when you take care of a computer?

<p>Maintenance.</p> Signup and view all the answers

How do you properly care for a CD?

<p>Keep it in a hard case, grab by the edges.</p> Signup and view all the answers

Why should anti-virus and anti-spyware software be updated often?

<p>To keep pace with newly created viruses and spyware.</p> Signup and view all the answers

What should be used to clean the keyboard keys?

<p>Compressed air, cotton swab.</p> Signup and view all the answers

What should be used to save a computer from damage by sudden increases in voltage?

<p>Surge protector.</p> Signup and view all the answers

What program secretly monitors a user's computer activities?

<p>Spyware.</p> Signup and view all the answers

What kind of maintenance is Gina performing when she uses an internet service to store copies of her photos on 'the cloud'?

<p>Back-up maintenance.</p> Signup and view all the answers

What should Scott do when he receives an email from someone he doesn't recognize?

<p>Delete and don't open it.</p> Signup and view all the answers

About how often should the components inside the computer case be checked and cleaned?

<p>Every 6 to 12 months.</p> Signup and view all the answers

What location should be used to secure computer equipment?

<p>A locked cabinet.</p> Signup and view all the answers

How should a USB flash drive be handled?

<p>Keep the cover on the connector when not in use. Make sure the device has properly stopped before removing it. Keep it away from drinks and other liquids.</p> Signup and view all the answers

Why is it a good idea to set up a schedule for maintenance tasks?

<p>It is more likely the tasks will get done at regular times.</p> Signup and view all the answers

If your computer screen goes black, what is the troubleshooting process you should complete to get the screen to function again?

<p>Check the monitor cables, cords, and power outlet.</p> Signup and view all the answers

What is a computer hacker?

<p>Someone with unauthorized permission that breaks into your computer.</p> Signup and view all the answers

What is the term for the principles that people use to guide all their decisions?

<p>Ethical.</p> Signup and view all the answers

What is the combination of hardware and software that checks all information coming through a network server?

<p>Firewall.</p> Signup and view all the answers

Which part of an email holds the data needed to send the message, including the To: box?

<p>Header.</p> Signup and view all the answers

What is the host in the email address: < [email protected] >?

<p>SHS.</p> Signup and view all the answers

What command would you use to add a file to an email message?

<p>Attach.</p> Signup and view all the answers

What is the name of the computer through which email messages are sent and received?

<p>Mail server.</p> Signup and view all the answers

If your connectivity to the internet stops working, what is the troubleshooting process you should complete to get it functioning again?

<p>Check the internet cables, cords, and power cords/outlet. Restart your computer. Call tech support.</p> Signup and view all the answers

List the purpose of each domain type: a. ___, b. ___, c. ___, d. ___

<p>a. .com - commercial, b. .edu - education, c. .gov - government, d. .org - non-profit organization.</p> Signup and view all the answers

List the file extension for each document type: a. Excel - ____, b. Powerpoint - ____, c. Word - ____

<p>a. Excel - .xls, b. Powerpoint - .ppt, c. Word - .doc.</p> Signup and view all the answers

What is telecommunications?

<p>Transmitting information electronically by wires or radio signals with integrated encoding and decoding equipment.</p> Signup and view all the answers

What item sends information to and receives information from other networks?

<p>Router.</p> Signup and view all the answers

What type of network connects computers in a large geographic area?

<p>WAN (Wide Area Network).</p> Signup and view all the answers

In a computer network, what type of computer controls the resources?

<p>Server.</p> Signup and view all the answers

Facebook, Twitter, and LinkedIn are examples of what type of online community?

<p>Social Media.</p> Signup and view all the answers

What is the term for real-time conversation on a computer?

<p>Chat.</p> Signup and view all the answers

List ergonomic techniques relating to each item that help improve productivity and avoid injury: a. Posture, b. Typing, c. Workspace.

<p>a. Posture - Sit up straight, feet flat on the floor, arms at a 90° angle. b. Typing - Wrists relaxed, fingers curled, elbows bent. c. Workspace - Clean and organized.</p> Signup and view all the answers

What fingers go on each home key in the traditional keyboarding technique: LEFT - Pinkie: ____, Ring Finger: ____, Middle Finger: ____, Index Finger: ____, Thumb: ____; RIGHT - Pinkie: ____, Ring Finger: ____, Middle Finger: ____, Index Finger: ____, Thumb: ____

<p>LEFT - Pinkie: A, Ring Finger: S, Middle Finger: D, Index Finger: F, Thumb: Space; RIGHT - Pinkie: ; or :, Ring Finger: L, Middle Finger: K, Index Finger: J, Thumb: Space.</p> Signup and view all the answers

Study Notes

Memory and Storage

  • Secondary storage devices provide long-term memory for data retention.
  • BIOS (Basic Input Output System) contains essential information to start a computer.

Software and Processing

  • Software refers to the set of instructions guiding computer operations.
  • During the processing stage, the computer utilizes the provided information.

Input and Output Devices

  • Input functions, like scanners, allow users to send data to a computer.
  • Output devices, such as speakers and headphones, convey processed information to users.

Maintenance and Care

  • Utility software is essential for maintaining computer health.
  • Regular maintenance involves checking and cleaning components every 6 to 12 months.
  • Proper care for CDs includes storing them in hard cases and handling them by the edges.

Security and Protection

  • Anti-virus and anti-spyware software require frequent updates to counter new threats.
  • Surge protectors shield computers from voltage spikes.
  • Suspicious emails from unknown senders should be deleted without opening.

Data Management and Back-up

  • Back-up maintenance involves using cloud storage solutions for data preservation.
  • Secure storage for computer equipment is best done in locked cabinets.

USB Drive Handling

  • USB flash drives should be protected with covers when not in use and handled carefully to avoid damage.

Network and Connectivity

  • Firewalls combine hardware and software to monitor network data flow.
  • Routers facilitate communication between networks by sending and receiving information.

Internet and Email Basics

  • Email headers contain crucial information for message delivery, including the recipient's address.
  • The domain types serve specific purposes, with .com indicating commercial sites, .edu for educational institutions, .gov for government bodies, and .org for non-profits.

Telecommunications and Networks

  • Telecommunications involves electronic information transmission via wires or radio signals.
  • WAN (Wide Area Network) connects computers over large geographic distances.

Ergonomics and Keyboarding

  • Ergonomic practices enhance productivity and reduce injury risks: maintain proper posture, ensure relaxed typing posture, and keep workspaces organized.
  • Home keys for traditional keyboarding include specific finger placements for efficient typing.

Social Media and Communication

  • Platforms like Facebook, Twitter, and LinkedIn represent social media communities.
  • Real-time conversations on computers are referred to as chat sessions.

Troubleshooting

  • To troubleshoot a black screen, check monitor connections and power supplies.
  • Internet connectivity issues may require checking cables, restarting the device, or contacting tech support.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

Description

This quiz covers fundamental concepts from the Digital Information Technology semester 1 course. Topics include memory types, software definitions, and binary code functions. Enhance your understanding and prepare for assessments with these flashcards.

More Like This

Use Quizgecko on...
Browser
Browser