Digital Information Technology:
Semester 1 Course Review
Digital Information Technology:
Semester 1 Course Review
What type of memory is found on secondary storage devices? - ✔✔Long-term memory.
What is the term for
...
Digital Information Technology:
Semester 1 Course Review
Digital Information Technology:
Semester 1 Course Review
What type of memory is found on secondary storage devices? - ✔✔Long-term memory.
What is the term for the instructions that tell a computer what to do? - ✔✔Software.
Why is binary code made up of a series of ones and zeroes? - ✔✔To turn the electrical
switches in the CPU on and off. 0 = off 1 = on.
A person uses a scanner to send an image to a computer. What basic function is being
performed? - ✔✔Input function.
During the processing stage, what does the computer do? - ✔✔Use information.
Where would the information needed to start a computer be stored? - ✔✔BIOS (Basic
Input Output System)
In which basic function does the computer save information? - ✔✔Storage.
What type of device are speakers and headphones? - ✔✔Output.
Where is most of the information processed in a computer? - ✔✔CPU (Central
Processing Unit)
What type of software maintains a computer? - ✔✔Utility Software.
What's it called when you take care of a computer? - ✔✔Maintenance.
How do you properly care for a CD? - ✔✔Keep it in a hard case, grab by the edges.
Why should anti-virus and anti-spyware software be updated often? - ✔✔To keep pace
with newly created viruses and spyware.
What should be used to clean the keyboard keys? - ✔✔Compressed air, cotton swab.
What should be used to save a computer from damage by sudden increases in voltage?
- ✔✔Surge protector.
What program secretly monitors a user's computer activities? - ✔✔Spyware.Gina uses an internet service to store copies of her photos on "the cloud." What kind of
maintenance is this? - ✔✔Back-up maintenance.
Scott receives an email from someone he doesn't recognize. What should he do? -
✔✔Delete and don't open it.
About how often should the components inside the computer case be checked and
cleaned? - ✔✔Every 6 to 12 months.
What location should be used to secure computer equipment? - ✔✔A locked cabinet.
How should a USB flash drive be handled? - ✔✔1. Keeping the cover on the connector
when not in use.
2. Make sure device has properly stopped before removing it.
3. Keeping it away from drinks and other liquids.
Why is it a good idea to set up a schedule for maintenance tasks? - ✔✔It is more likely
the tasks will get done at regular times.
If your computer screen goes black, what is the trouble shooting process you should
complete to get the screen to function again? - ✔✔Check the monitor cables, cords, and
power outlet.
What is a computer hacker? - ✔✔Someone with unauthorized permission that breaks
into your computer.
What is the term for the principles that people use to guide all their decisions? -
✔✔Ethical.
What is the combination of hardware and software that checks all information coming
through a network server? - ✔✔Firewall.
Which part of an e-mail holds the data needed to send the message, including the To:
Box? - ✔✔Header.
What is the host in the e-mail address: < Mr.
[email protected] >? - ✔✔SHS.
What command would you use to add a file to an e-mail message? - ✔✔Attach.
What is the name of the computer through which e-mail messages are sent and
received? - ✔✔Mail server.
[Show More]