Standards used to represent music in a digital format

Assignment Help Basic Computer Science
Reference no: EM13919891

1. _______ is the "domain name" part of this url: https://www.devry.edu/programs/overview.jsp.
http
https://www.devry.edu
programs/overview.jsp
www.devry.edu

2.  _______ is the most popular network architecture used today.
Ethernet
Local area network (LAN)
TCP/IP
Wireless

3. _______ is the "host name" part of this url: https://www.devry.edu/programs/overview.jsp.

httpprograms
www
www.devryu.edu

4.  __________ is a set of standards used to represent music in a digital format storing each note played by each instument individually.
MP3
MIDI
JPEG
MP4

5. Music being played directly from _____ is an example of "streaming audio."
a CD-R
a DVD
an MP3 player
the Internet

6. Which is not a way a mouse might connect to the computer?
FireWire
Serial port
USB port
Wireless

7. If a newly installed I/O device is not working, you should:
remove the card while the computer is powered up.
remove the card while the computer is plugged in.
automatically suspect that the I/O port may be faulty.
exchange a known good device for the one that is not working.

8. A whine eminating from a fan at the rear of a computer case may indicate:
the motherboard is failing.
the power supply fan is failing.
a memory chip is failing.
the hard drive is failing.

9.  When troubleshooting memory problems, you should:
run msconfig.
perform a loop back ping.
remove all memory modules add and test one at a time.
run the memory configuration utility.

1.  Most input/output devices communicate with components inside the computer case through a wireless connection or through cables attached to the case at a connection called a(n) ____.
port
slot
interface
socket

2.  One ____ is the work or energy required to produce one watt of power in one second.
Volt
joule
Ohm
Watt

3. A power ____ is a box inside a computer case that supplies power to the motherboard and other installed devices.
unit
supply
distributor
activator

4. A ____ is an electronic device that can hold an electrical charge for a period of time and can smooth the uneven flow of electricity through a circuit.
transistor
diode
capacitor
resistor

5. The ____ card, also called a graphics card, provides one or more ports for a monitor.
video
interface
input
output

6.  A(n) ____ is a general-purpose tool that can measure several characteristics of electricity in a variety of devices.
voltmeter
ohmeter
multimeter
ammeter

7.  A ____ case sits upright on the floor or a desk and can be as high as two feet and has room for several drives.
compact
tower
desktop
low-profile

8.  Everything in a computer is ____.
decimal
binary
hexadecimal
integers

9. USB ____ drives are compact, easy to use, and currently hold up to 64 GB of data.
worm
optical
hard
flash

10. Which of the following CPUs has the highest processor speed among those listed?
Celeron
Pentium II
Pentium 4
Pentium Pro

11.  What is/are the motherboard's primary purpose(s)?
Accept input from users
House the CPU
Enable communication between devices and the CPU
All but A

12. In what way can a notebook PC NOT receive power?
AC Adapter
Battery
DC adapter
Wirelessly with RF signal

13. What services must an OS provide for a PC card to work?
Expansion port
Socket service
Pigtail
Hot swappable service

14.  A good scheduled maintenance plan for Windows includes _____________.
updating BIOS
reinstalling Windows once a year
checking for drive errors
reinstalling Windows once every other year

15. When files are spread across many segments of a drive in an unoptimized fashion the disk is known as a(n) ___________.
broken disk
fragmented disk
unoptimized disk
segmented disk

16.  A hidden partition on a hard drive used to reinstall Windows is known as a(n) ____________.
upgrade disk
disk clone
factory recovery partition
recovery disk

17. A server that has a Windows DVD shared to other computers on a network to facilitate installing Windows is known as a(n) ____________.
enhanced server
distribution server
workstation server
client

18.  One job of a firewall is to block ______ from the PC.
e-mails
spyware
unsolicited communications
viruses

19.  When you open an encrypted file with an application, Windows decrypts the file for the application to use. While the application is working on the file, data written to the virtual memory file, ____, might contain decrypted data from your file.
hiberfil.sys
himem.sys
msdos.sys
Pagefile.sys

20. Three principle components of an operating system are:
the shell, user interface, and icons.
the task bar, desktop, and start button.
the shell, kernel, and configuration data.
Win32 subsytem, Win32 security system, and the registry.

Reference no: EM13919891

Questions Cloud

Form of budgeting and its advantages and disadvantages : There are several approaches that may be used to develop the budget. Managers typically prefer an approach known as participative budgeting. Discuss this form of budgeting and identify its advantages and disadvantages.
What are some practical limits to economies of scale : Is it possible to achieve zero inventories? Why or why not? Why does JIT manufacturing require a stable schedule? What are some technological advances that support the goals of JIT? Will JIT work in service environments? Why or why not?
Method to establish the master production schedule : The VP of Operations has decided that a far greater focus on vendor quality and internal process improvements must be taken. The VP of Procurement, prior to your coming on board, had already met with the CEO's of ABC's 4 major vendors and alerted ..
Publish a pilot study regarding a new coffee : A study from a Colombian research center is about to publish a pilot study regarding a new coffee plant that they believe can reduce total cholesterol in humans. They gave increasing doses (cups of coffee) to a test patient over several weeks and ..
Standards used to represent music in a digital format : Which is not a way a mouse might connect to the computer?
Positive and negative effects that peace and war : Assess the positive and negative effects that peace and war, respectively, have on the distribution of foreign aid in the developing country that you have selected. Support your response with concrete examples of each of the results that you have ..
Which is not basic activities of a manager : Hall Company's standards call for 750 direct labor-hours to produce 500 units. During May 400 units were produced. The company worked 650 direct labor-hours. The standard hours allowed for May production would be: ?
Explain the concepts of reliability and validity : Explain the concepts of reliability and validity? Explain a framework to describe tasks and approaches for gathering episode information?
Employer''s matching contributions : Because Alex considers his employer's matching contributions "free money," he wants to maximize the amount of LANL's contributions. What is the least amount Alex can contribute and still maximize LANL's contribution?Least amount contributed.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Prepare disaster recovery plan for organization

Prepare a Disaster Recovery (DR) Plan for following organization; Company; Widget Works Electronics, Employees; 250, Infrastructure; 1 Central Office building housing primary datacenter. 10 satellite sales branches.

  Why are file system permissions so important in the linux

Why are file system permissions so important in the Linux DAC model? How they relate or map to the concept of subject "subject-action-object" transactions?

  Virtual organization

Consider how the information presented in each assignment applies to your chosen Virtual Organization.

  What is the ownership cost of the vehicle

If her interest rate is 7% compounded annually, what is the ownership cost of the vehicle over 3 years? Six years

  What are professional codes of ethics

What are professional codes of ethics and what function do they server? Explain Gotterbarn's threefold distinction: codes of ethics, codes of conduct and codes of practice

  Print the list after each value is inserted into the list

Generate 10 random numbers between in the range of 25 to 50. Insert them into a list, keeping the list in order as each value is inserted. Print the list after each value is inserted into the list.

  Discuss the merits of unified architectures vs. proprietary

Discuss the merits of unified architectures vs. proprietary technologies in ensuring standards compliance and cybersecurity?

  Possibly liscense cub or act as a service provider

What is your opinion on whether CenterPoint should possibly liscense CUB or act as a service provider?

  Risk assessment tools

Risk assessment tools.

  Describe a file system

Theory-long answer question. Describe how a file system could be implemented using a collection of inodes and some variant of a B tree. 500-1000 words. Be sure to consider: unallocated space, bad allocations, lost and found, root directories, s..

  Writing a program to maintain the student database

Writing a program to maintain the student database

  Overload the operator >> and the operator << for a class

Self-test exercise 17 asked you to overload the operator >> and the operator

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd