IT Terminology Definitions

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to Lesson

Podcast

Play an AI-generated podcast conversation about this lesson
Download our mobile app to listen on the go
Get App

Questions and Answers

A USB device containing software licenses that must be plugged into the system for software to run is known as a(n) _______________.

  • extender
  • bridge
  • firewall
  • dongle (correct)

A combination of using a mouse, touchpad, or finger movements and mouse clicks to perform a function is known as a(n) _______________.

  • operating system call
  • kernel process
  • gesture (correct)
  • macro

A complete copy of a hard drive volume on which an operating system and any desired application software programs have been pre-installed is known as a(n) _______________.

  • disk image (correct)
  • executable file
  • snapshot
  • system restore point

A corrective program meant to fix a problem is called a(n) _______________.

<p>patch (C)</p> Signup and view all the answers

A counter tracks specific information about a(n) ________________.

<p>computer's performance (C)</p> Signup and view all the answers

A list of things you need before you can run software are known as the software's _______________.

<p>prerequisites (C)</p> Signup and view all the answers

A named group of functions that defines what you can do with an object is called a ________________.

<p>interface (A)</p> Signup and view all the answers

A password _______________ policy forces users to select a new password periodically.

<p>expiration (A)</p> Signup and view all the answers

A small, hidden partition to the primary hard drive containing an image of the factory-fresh version of Windows is known as a _______________.

<p>recovery partition (C)</p> Signup and view all the answers

A strong password is at least _______________ characters long and contains letters, numbers, and punctuation symbols.

<p>14 (B)</p> Signup and view all the answers

A type of installation that is very popular for re-creating standard configurations is a(n) _______________.

<p>unattended installation (D)</p> Signup and view all the answers

A(n) _______________ enables you to use your existing folders to store more data that can fit on a single drive or partition/volume.

<p>mount point (A)</p> Signup and view all the answers

A(n) _______________ volume is similar to a primary partition, but in fact, is not a primary partition.

<p>logical (C)</p> Signup and view all the answers

Actions or schedules that start a program are called _______________ in Task Scheduler.

<p>triggers (A)</p> Signup and view all the answers

All basic hard drive partition tables support up to _______________ partitions.

<p>4 (B)</p> Signup and view all the answers

An 8×4×32× CD-RW drive reads at a speed of _______________.

<p>8x (D)</p> Signup and view all the answers

An MBR has four different operating systems installed. What is this setup called?

<p>Multi-booting (A)</p> Signup and view all the answers

An entire physical drive can be added to another drive as a folder by creating a _______________.

<p>mount point (A)</p> Signup and view all the answers

An unpopular, but necessary, security feature introduced in Windows Vista was _______________.

<p>User Account Control (UAC) (D)</p> Signup and view all the answers

Authorization for Windows' files and folders is controlled by the _______________ file system, which assigns permissions to users and groups.

<p>NTFS (A)</p> Signup and view all the answers

Because both CD-R and CD-RW drives require a powerful _______________, making a drive that could burn CD-Rs and CD-RWs became a simple process, and plain CD-R drives disappeared almost overnight.

<p>laser (D)</p> Signup and view all the answers

By default, Windows creates a ___________ every time new software is installed.

<p>system restore point (B)</p> Signup and view all the answers

By default, all new user accounts are automatically added to the _______________ group.

<p>Users (C)</p> Signup and view all the answers

By default, what is the maximum partition size NTFS supports on a dynamic disk?

<p>It is dependent on the amount of free space available on the disk (A)</p> Signup and view all the answers

By default, who has complete control over a folder or file?

<p>The creator (D)</p> Signup and view all the answers

CDs store data by using _______________ pits burned into a glass master CD with a powerful laser.

<p>non-reflective (D)</p> Signup and view all the answers

Created automatically by Windows, _______________ give local administrators access to resources whether they log on locally or remotely.

<p>administrative shares (C)</p> Signup and view all the answers

DVD-ROM is the DVD-equivalent of the standard _______________ data format.

<p>CD-ROM (A)</p> Signup and view all the answers

Destroying data on a hard drive while still allowing the hard drive to function is known as _______________.

<p>wiping (A)</p> Signup and view all the answers

Digital cameras plug directly into a(n) _______________ port.

<p>USB (C)</p> Signup and view all the answers

During installation, one may decide to go with the default drivers because they _______________.

<p>are typically tested and stable (A)</p> Signup and view all the answers

Each released version of an OS will pass through a few phases that we call its ________________.

<p>lifecycle (C)</p> Signup and view all the answers

External optical drives often use USB or _______________ connections.

<p>eSATA (B)</p> Signup and view all the answers

Feature updates in Windows are controlled by what ________________ you are on.

<p>channel (B)</p> Signup and view all the answers

How do you install a macOS application bundle (.app) file?

<p>Drag the .app file to the Applications folder (D)</p> Signup and view all the answers

How is the Registry organized?

<p>Hierarchical database (D)</p> Signup and view all the answers

How many GB of RAM does Windows 10 Home support?

<p>128 GB (B)</p> Signup and view all the answers

How many devices can a single USB host controller theoretically support?

<p>127 (B)</p> Signup and view all the answers

How many extended partitions can be created in a hard drive?

<p>1 (C)</p> Signup and view all the answers

How many master boot records can exist on an MBR disk?

<p>1 (C)</p> Signup and view all the answers

How many notification levels of UAC did Microsoft include in modern Windows versions?

<p>4 (C)</p> Signup and view all the answers

How many partitions can be active at any given point in time?

<p>1 (A)</p> Signup and view all the answers

How many root keys are in the Registry?

<p>5 (D)</p> Signup and view all the answers

How much data can a dual-layer Blu-ray disc store?

<p>50 GB (A)</p> Signup and view all the answers

If you are using an administrator account during a software installation and you get prompted by the UAC, you should _______________.

<p>carefully read the prompt and confirm the installation (B)</p> Signup and view all the answers

If you move a dynamic disk from one computer to another, how will this drive be displayed in Disk Manager?

<p>Foreign drive (B)</p> Signup and view all the answers

In Windows, each _______________ is assigned a drive letter from C: to Z:.

<p>volume (D)</p> Signup and view all the answers

Flashcards

Dongle

A USB device that contains software licenses and must be plugged in for the software to run.

Gesture

Using mouse, touchpad, or finger movements combined with clicks to perform a function.

Image

A complete copy of a hard drive volume with the OS and desired applications pre-installed.

Patch

A corrective program designed to fix a specific problem or bug in software.

Signup and view all the flashcards

Counter

Tracks specific data about a hardware or software component's performance, for monitoring purposes.

Signup and view all the flashcards

System requirements

A list of the requirements that must be met before software can be run.

Signup and view all the flashcards

Class

A named group of functions that defines what you can do with an object within a programming context.

Signup and view all the flashcards

Password Expiration

A policy requiring users to change their passwords regularly to enhance security.

Signup and view all the flashcards

Recovery Partition

A small, hidden partition on the primary hard drive that stores an image of the original factory-fresh Windows installation.

Signup and view all the flashcards

Strong Password

A password that is difficult to crack, containing a mix of letters, numbers, and symbols, and is at least a certain length.

Signup and view all the flashcards

Image Deployment

A type of installation used to quickly replicate standardized system configurations across multiple computers.

Signup and view all the flashcards

Mount Point

A feature that enables you to add an entire physical drive to another drive as a folder.

Signup and view all the flashcards

Logical Drive

A volume that acts like a primary partition but is not actually one, allowing for more flexibility in disk management.

Signup and view all the flashcards

Triggers

Predefined events or schedules that automatically start a program in Task Scheduler.

Signup and view all the flashcards

Four

A maximum limit of four partitions that the basic hard drive partition tables support.

Signup and view all the flashcards

96x

CD drive speed.

Signup and view all the flashcards

Multiboot

Having multiple operating systems to choose from.

Signup and view all the flashcards

Mount Point

Adds one drive to another as a folder.

Signup and view all the flashcards

User Account Control (UAC)

Security feature in Windows.

Signup and view all the flashcards

NTFS Permission

Authorization for Windows' files and folders.

Signup and view all the flashcards

Powerful laser

Laser is needed for CD.

Signup and view all the flashcards

System Restore Point

Occurs when new software is installed.

Signup and view all the flashcards

Users group

For ease of use and accessibility.

Signup and view all the flashcards

Unlimited

No limit on dynamic drives.

Signup and view all the flashcards

Creator

Has more control over the machine.

Signup and view all the flashcards

Tiny Pits

Technology to burn data.

Signup and view all the flashcards

Built-in Local Groups

Automatically created by Windows.

Signup and view all the flashcards

CD-ROM

Data format.

Signup and view all the flashcards

Wiping

Erasing the data, permanently.

Signup and view all the flashcards

USB

For quick camera uploads.

Signup and view all the flashcards

Work

During software installation.

Signup and view all the flashcards

Life cycle

Will determine compatibility.

Signup and view all the flashcards

Firewire

Connection for extra drives.

Signup and view all the flashcards

Channel

Install cadence.

Signup and view all the flashcards

Study Notes

  • A USB device containing software licenses is a dongle.
  • Using a mouse, touchpad, or finger movements with mouse clicks is a gesture.
  • A complete copy of a hard drive volume with a pre-installed OS and software is a system image.
  • A corrective program for a problem is a patch.
  • A counter tracks specific information about a system.
  • A list of things required to run software are the software's minimum requirements.
  • A named group of functions that defines object interactions is a class object.
  • A password policy that enforces periodic changes is a password expiration.
  • A hidden partition with a factory-fresh Windows image is a recovery partition.
  • A strong password is at least 8 characters long and includes letters, numbers, and symbols.
  • A popular installation type for re-creating standard configurations is image deployment.
  • A mount point enables the use of existing folders to store more data than fits on a single drive or partition.
  • An extended volume is similar to a primary partition but is not one.
  • Actions or schedules that start a program are called triggers.
  • Basic hard drive partition tables support up to four partitions.
  • An 8×4×32× CD-RW drive reads at a speed of 32x.
  • Installing four OSes on an MBR is called multibooting.
  • Adding an entire physical drive to another as a folder creates a mount point.
  • An unpopular, but necessary, security feature in Windows Vista was User Account Control (UAC).
  • Authorization for Windows' files/folders is controlled by the NTFS file system.
  • CD-R/RW drives require a powerful laser, leading to the quick disappearance of plain CD-R drives.
  • Windows creates a restore point by default every time new software is installed.
  • New user accounts are automatically added to the Users group by default.
  • NTFS supports a maximum partition size of no limit on a dynamic disk by default.
  • The owner has complete control over a folder or file by default.
  • CDs store data using laser-etched pits.
  • Windows automatically creates well-known SIDs that give local administrators access to resources locally or remotely.
  • DVD-ROM is the DVD equivalent of the standard CD-ROM data format.
  • Destroying data while allowing the hard drive to function is data sanitization.
  • Digital cameras plug into a USB port.
  • Default drivers may be chosen during installation because they work.
  • An OS version goes through phases called its life cycle.
  • External optical drives use USB or FireWire connections.
  • Feature updates in Windows are controlled by the channel.
  • A macOS application bundle (.app) file is installed by dragging it to the Applications folder.
  • The Registry is organized hierarchically.
  • Windows 10 Home supports 128 GB RAM.
  • A single USB host controller can theoretically support 127 devices.
  • Only one extended partition can be created on a hard drive.
  • Only one MBR can exist on an MBR disk.
  • Microsoft included four notification levels of UAC in modern Windows versions.
  • Only one partition can be active at any given point in time.
  • There are five root keys in the Registry.
  • A dual-layer Blu-ray disc can store 50 GB of data.
  • If prompted by UAC during software installation with an administrator account, you should allow it.
  • A dynamic disk moved to another computer will be displayed in Disk Manager as foreign.
  • In Windows, each volume is assigned a drive letter from C: to Z:.
  • In macOS, login items are added to a user's account to set up auto-starting software.
  • The default UAC notification level in modern Windows versions is notify only when apps try to make changes to my computer.
  • A diagnostic startup with basic devices and services can be chosen in the General tab of the Windows System Configuration tool.
  • Installing an OS on top of an earlier version, inheriting settings, is an upgrade installation.
  • Installing an OS on a hard drive with no previous OS is a clean installation.
  • A drive structure created with a dynamic disk is called a volume by Microsoft.
  • Microsoft limits Windows to 128 partitions under a GPT scheme.
  • Microsoft often uses the term in-place upgrade to define an upgrade installation.
  • Most internal optical drives use SATA.
  • USB 1.1 and 2.0 A and B connectors use 4 pins.
  • Each record in an encrypted database of usernames and passwords is called a security identifier (SID).
  • Common CPU requirements focus on speed.
  • Once Windows is installed, you have 30 days to activate it.
  • Using the same username/password to sign on to any computer in a domain is known as single sign-on.
  • Opening a command line and running secpol.msc provides access to Local Security Policy.
  • Processes are usually referred to by their process ID (PID).
  • Since 2020, the names of feature updates have indicated the release year and month.
  • System Restore can be turned off through the System Protection tab of System properties.
  • The CD-RW format essentially creates the functional equivalent of a USB flash-media drive.
  • The System Information Tool in Windows can be used to view hardware and software configuration.
  • The System Restore tool creates a restore point, a snapshot of the computer's configuration.
  • The system partition stores the location of the OS boot files.
  • The Windows Boot Manager takes control of the boot process from the system BIOS.
  • The go-to command to open up the Registry editor is regedit.
  • The highest capacity DVD versions store roughly 17 GB of data.
  • The name of a process usually ends with the .exe file extension.
  • A special unique feature to Windows 10 Enterprise is called Direct Access.
  • The options in the Advanced tab on the Performance Options dialog box in Windows are Processor scheduling and Virtual memory.
  • The process of moving data and users to a new system is known as migration.
  • The purpose of Virtual memory option is to compensate for low RAM.
  • The tabs on the Performance Options dialog box are Visual Effects, Advanced, and Data Execution Prevention (DEP).
  • Thunderbolt 3 offers throughput up to 40 Gbps.
  • Thunderbolt 3 uses a USB Type-C connector.
  • Time Machine in macOS creates full system backups that are known as snapshots.
  • To boot from a network installation without PXE, you need to create bootable installation media.
  • Registry files are called hives.
  • Typing services.msc in the Start | Search bar opens the Services utility.
  • Typing perfmon in the Start | Search bar opens the Windows Performance Monitor.
  • The Trusted Platform Module (TPM) chip validates the integrity of the OS on boot.
  • The Import feature allows you to import a new or backup subkey.
  • A common reason to edit the specified Registry key is to manage startup programs.
  • An end-user license agreement (EULA) is a legal contract between the software user and the software publisher.
  • A major risk of editing the Registry is system instability.

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

More Like This

Computer Systems Concepts Quiz
5 questions

Computer Systems Concepts Quiz

LogicalSmokyQuartz844 avatar
LogicalSmokyQuartz844
UCertify CIW Practice Test C Flashcards
30 questions
Use Quizgecko on...
Browser
Browser