Which is not a way a mouse might connect to the


1. _______ is the "domain name" part of this url: https://www.devry.edu/programs/overview.jsp.
http
https://www.devry.edu
programs/overview.jsp
www.devry.edu

2.  _______ is the most popular network architecture used today.
Ethernet
Local area network (LAN)
TCP/IP
Wireless

3. _______ is the "host name" part of this url: https://www.devry.edu/programs/overview.jsp.

httpprograms
www
www.devryu.edu

4.  __________ is a set of standards used to represent music in a digital format storing each note played by each instument individually.
MP3
MIDI
JPEG
MP4

5. Music being played directly from _____ is an example of "streaming audio."
a CD-R
a DVD
an MP3 player
the Internet

6. Which is not a way a mouse might connect to the computer?
FireWire
Serial port
USB port
Wireless

7. If a newly installed I/O device is not working, you should:
remove the card while the computer is powered up.
remove the card while the computer is plugged in.
automatically suspect that the I/O port may be faulty.
exchange a known good device for the one that is not working.

8. A whine eminating from a fan at the rear of a computer case may indicate:
the motherboard is failing.
the power supply fan is failing.
a memory chip is failing.
the hard drive is failing.

9.  When troubleshooting memory problems, you should:
run msconfig.
perform a loop back ping.
remove all memory modules add and test one at a time.
run the memory configuration utility.

1.  Most input/output devices communicate with components inside the computer case through a wireless connection or through cables attached to the case at a connection called a(n) ____.
port
slot
interface
socket

2.  One ____ is the work or energy required to produce one watt of power in one second.
Volt
joule
Ohm
Watt

3. A power ____ is a box inside a computer case that supplies power to the motherboard and other installed devices.
unit
supply
distributor
activator

4. A ____ is an electronic device that can hold an electrical charge for a period of time and can smooth the uneven flow of electricity through a circuit.
transistor
diode
capacitor
resistor

5. The ____ card, also called a graphics card, provides one or more ports for a monitor.
video
interface
input
output

6.  A(n) ____ is a general-purpose tool that can measure several characteristics of electricity in a variety of devices.
voltmeter
ohmeter
multimeter
ammeter

7.  A ____ case sits upright on the floor or a desk and can be as high as two feet and has room for several drives.
compact
tower
desktop
low-profile

8.  Everything in a computer is ____.
decimal
binary
hexadecimal
integers

9. USB ____ drives are compact, easy to use, and currently hold up to 64 GB of data.
worm
optical
hard
flash

10. Which of the following CPUs has the highest processor speed among those listed?
Celeron
Pentium II
Pentium 4
Pentium Pro

11.  What is/are the motherboard's primary purpose(s)?
Accept input from users
House the CPU
Enable communication between devices and the CPU
All but A

12. In what way can a notebook PC NOT receive power?
AC Adapter
Battery
DC adapter
Wirelessly with RF signal

13. What services must an OS provide for a PC card to work?
Expansion port
Socket service
Pigtail
Hot swappable service

14.  A good scheduled maintenance plan for Windows includes _____________.
updating BIOS
reinstalling Windows once a year
checking for drive errors
reinstalling Windows once every other year

15. When files are spread across many segments of a drive in an unoptimized fashion the disk is known as a(n) ___________.
broken disk
fragmented disk
unoptimized disk
segmented disk

16.  A hidden partition on a hard drive used to reinstall Windows is known as a(n) ____________.
upgrade disk
disk clone
factory recovery partition
recovery disk

17. A server that has a Windows DVD shared to other computers on a network to facilitate installing Windows is known as a(n) ____________.
enhanced server
distribution server
workstation server
client

18.  One job of a firewall is to block ______ from the PC.
e-mails
spyware
unsolicited communications
viruses

19.  When you open an encrypted file with an application, Windows decrypts the file for the application to use. While the application is working on the file, data written to the virtual memory file, ____, might contain decrypted data from your file.
hiberfil.sys
himem.sys
msdos.sys
Pagefile.sys

20. Three principle components of an operating system are:
the shell, user interface, and icons.
the task bar, desktop, and start button.
the shell, kernel, and configuration data.
Win32 subsytem, Win32 security system, and the registry.

Solution Preview :

Prepared by a verified Expert
Basic Computer Science: Which is not a way a mouse might connect to the
Reference No:- TGS01222794

Now Priced at $15 (50% Discount)

Recommended (92%)

Rated (4.4/5)