Hard drives have been growing in storage capacity by about 50% each year. TrueDesktop computer systems are less reliable than laptop computers. FalseThe use of multiple cores on one CPU chip allows the execution of two or more sets of instructions at the same time. TrueAccessing data from the hard drive to send to the CPU is faster than accessing data from RAM. FalseThe heads of a hard disk drive touch the surface of the platter to read or write the data. FalseOptical discs store data using tiny pits and lands. TrueVideo cards include their own RAM. TrueWhen using multiple monitors, you must have multiple video cards. FalseIf you reformat the hard drive on a computer, it erases all personal information from your computer and makes it safe to donate. FalseLimiting your signal range does not help increase wireless network security. FalseThe Internet is a WAN. TrueIn a peer-to-peer network, one computer acts as the central computer. FalseMost computers today come with Ethernet adapters already installed. TrueWireless network connections are slower than wired broadband connections. TrueWireless networks are more vulnerable to attack than wired networks. TrueVoIP stands for Voice over Internet Protocol. TrueA tablet uses a full traditional operating system. FalseEvery new cell/smartphone has to include a GPS chip. TrueiPhones let you add SD flash cards. FalseThere are more virus attacks on cell phone and smartphones than there are on PCs. FalseWith Skype software installed on your phone, you can call any phone number for free. FalseWhen converting analog waves to a series of numerical values, the higher the sampling rate, the more accurately the original wave can be re-created. TrueThe conversion rate is the number of times per second that the analog signal is measured and converted into a digital value. FalseSmartphones all use the Android operating system. FalseRaw files are larger than JPEG files. TrueDRM-free music can legally be moved from system to system. TrueAn encryption virus replicates itself onto a hard drive’s master boot record. FalseA stealth virus is designed to infect multiple file types to fool the antivirus software. FalseTo create a secure password, you should use a mixture of uppercase letters, lowercase letters, and symbols. TrueEthical hackers are also known as white-hat hackers. TrueCreating and spreading online viruses is a cybercrime. TrueAll viruses cause serious destruction of computer data. FalseA macro virus is a virus that is attached to a file such as a Word document or Excel workbook. TrueA virus signature is a portion of virus code that is unique to a particular computer virus. TrueA zombie is another person’s computer controlled by a hacker. TrueThe tag informs a browser that the text that follows the tag should be italicized. TrueThe United States government is in charge of the Internet. FalseClient-side programs run on a web server rather than on your computer. FalseMost instant messaging services provide a high level of encryption for their messages. FalseAn applet is a small application that resides on a server but is downloaded to, and run on, the client computer. TrueFTP enables files to be downloaded or uploaded between computers. TrueWhen using packet switching, packets are always sent over the same route. FalseLinkedIn is one the most popular instant messaging services. False ONCIS120 T/F TEST #2 SPECIFICALLY FOR YOUFOR ONLY$13. 90/PAGEOrder NowTags: