CGS 1060 Final

¡Supera tus tareas y exámenes ahora con Quizwiz!

Communication speeds between you and your ISP are measured in:

bps

Logs

files that record activities and events

___ are discussion boards where individuals can ask questions and reply to each other.

forums

___ robots are those that are created to imitate the appearance or capabilities of humans.

humanoid robots

Data ___ is the discovery of new patterns or relationships between data.

mining

A ___ is a powerful computer with special software and equipment that enables it to function as the primary computer in a network.

network Server

One of the most famous ___ licenses is the GNU General Public License (GPL), which ensures that a particular program and any of its derivatives remain free to distribute.

open source

Gigabyte (GB)

over 1 billion bytes

Terabyte (TB)

over 1 trillion bytes

Which type of software enables users to create electronic slideshows that contain a combination of text, images, charts, videos, and other elements?

presentation

___ is the ability of a computer to perform actions based on instructions from the user or a program.

processing

Sleep VS Hibernate

sleep uses only enough electricity to keep contents on your RAM active. Hibernate save more electricity by copying the content of RAM to your hard drive. RAM can now be powered off because the hard drive does not require power to remember its content.

CPU clock rate

the frequency or speed at which CPUs process instructions.

Netiquette

the set of online behavior that are considered polite and proper

One popular test of a machine's ability to think is known as the __ test.

turing

Wifi 6

802.11ax supports more simultaneous data streams

Wifi G

802.11g: up yo 54 Mbps

Wifi n

802.11n up to 600 Mbps

Which of the following is NOT one of the specifications of Wi-Fi technology?

802.11z

A popular type of network attack, known as a(n) ___ attack, allows hackers to shut down or block access to websites and other network resources by overwhelming them with requests.

DDos

Most desktop operating systems include a(n) ___ utility that is dedicated to examining and blocking internet traffic.

Firewall

There are three general strategies used to authenticate individuals. Which of the following is NOT one of them?

Who you know

Typically measured in Mbps or Gbps, ___ is the amount of data that can be transmitted over a given amount of time.

bandwidth

It is common to use ___ when sending email to a large group of people, especially if you want to protect the privacy of the recipients' email address.

bcc

A(n) ___ is a short, unique sequence of characters located after the file's name that indicate the file type.

file extension

If your smartphone is set up as a mobile ___, it can offer Wi-Fi access to devices near it

hotspot

The creation or manipulation of matter at the smallest possible scale is known as:

nanotechnology

Acquiring or exchanging copies of protected Digital creations without payment to or permission from their creator is known as:

piracy

___ is a set of rules or standards that must be followed by computers that wish to communicate over a network.

protocols

Download

receive data

A modern monitor might have a(n) ___ of 1920x1080 pixels.

resolution

When users type specific keywords into a ___, they will receive an organized list of matching sites, images, and news articles that contain those keywords.

search engine

You should run a(n) ___ if you want to run one operating system on top of another operating system.

virtual machine

Which type of malware is attached to a host file and has the ability to replicate or copy, itself?

virus

Which type of software provides tools for creating and editing all kinds of text-based documents?

word processing

Which of the following is a document that contains an organization's policies for the ethical, secure, and appropriate use of computing resources?

acceptable use policy

A(n) ___ is a series of steps that describe exactly what each portion of a computer program is supposed to do.

algorithm

Cache

also known as temporary internet files, the browser cache stores every single page, image, and video for all the web pages you have recently retrieved.

The ratio of monitor's width to its height is known as the

aspect ratio

Authentication VS Authorization

authentication is when an individual must confirm his or her identity. Authorization give individuals a certain level of access based on who they are.

What is the latest version of Windows?

10

Which type of printer is most likely to be used by an engineer who needs to create a small, plastic model?

3D

Copyright protection lasts for ___ years after the death of the author.

70

____ is a set of instructions that directs the computer to perform a variety of tasks.

A computer program

Which of the following units is represented as an on(1) or off(0) value?

Bit

Which type of malware disguises itself as an interesting, useful, or desirable program in order to gain access to your system?

Trojen Horse

The ___ port is used to connect almost all of today's external devices.

USB

A popular way for both individuals and businesses to increase the security of a network connection (via tunneling) is by using a(n):

VPN

All nodes connect to a wireless ___ in order to communicate wirelessly.

access point

The ___ part of an email contains any file(s) included with the message.

attachments

Most Creative Commons license require, at a minimum, that the user provide ___ to the author wherever the work is used.

attribution

Using robotic arms (instead of people) during certain phases of car manufacturing is referred to as:

automation

Which term refers to the large volumes of data that are constantly being generated by out devices and digital transactions?

big data

A page or website that contains chronological posts and comments from individuals or organizations is known as a(n):

blog

A(n) ___ utility can scramble your data or storage devices to make them unreadable by anyone who doesn't have the proper key.

encryption

Today, the term ___ generally refers to an individual who uses a computer and/or network to commit a variety of crimes.

hacker

The magnetic ___ often serves as the primary storage device of a personal computer.

hard drive

The term ___ refers to "smart" devices that have the ability to connect to wireless networks and the Internet.

loT

Employers can check ___ periodically to determine whether there was inappropriate computer use by an employee.

logs

The purpose of a(n) ___ is to manage the flow of data between hardware components and allow the user to communicate with the computer.

operating system

When companies engage in ___ they are essentially transferring some aspect(s) of their business to a third party.

outsourcing

The wireless access points that are used in homes contain integrated ___, as do the devices that ISPs typically provide for internet connectivity.

routers

___ is a form of hacking that focuses on deceiving individuals into giving away the information that the thief needs.

social engineering

Which type of malware is designed to report activity on your computer to another party?

spyware

Which device can guard connected equipment against large power spikes or surged that may infrequently occur?

surge protector

Which license allows companies to install software on multiple machines?

volume

A(n)____ is a collaboration information site that encourages people with subject knowledge to contribute at their own convenience, adding to or fixing pages where information is missing or incorrect.

wiki

Which type of malware consists of a fully-contained program that self-replicates and spreads through computers and networks?

worm

Browser Extension

a program used to add a variety of useful feature to the web browser.

An approach to artificial intelligence that allows a machine to learn a new skill via the repeated analysis of large quantities of data is known as:

Neural Networks

Information VS Data

-Information describes concepts, facts, and ideas that people find useful. -Data is the raw materials that we use in the creation of information

An ___ is a car, truck, or other mode of transportation that is capable of performing a variety of driving maneuvers without human intervention.

Autonomous vehicles

Making copies of important files to the cloud or to an external storage device is known as:

Backing up

___ is an early version of a computer program used to test the software in real-world conditions.

Beta version

___ is any Digital data connection that can transmit information faster than standard dial-up by using a wider band of frequencies.

Broadband

The ___, or microprocessor, is the main processor of a computer.

CPU

With the ___ operating system, you will be fully immersed in Google's ecosystem.

Chrome

Chrome OS

Chrome browser will be running your computer. Therefore, an internet connection is required to get the most of this operating system. You will fully be immersed in Google's ecosystem.

___ services, where your files can be stored online and accessed from any Internet connected device. (plus examples)

Cloud Storage -dropbox -google drive -microsoft onedrive -apple iCloud

___ allows you to store your files and use various applications in an online account.

Cloud computing

What is the name of the legal concept that grants rights and control to the owner of any published work?

Copyright

___ websites, such as Kickstarter, allow any organization or individual to solicit funds from the general public in exchange for a future good or service.

Crowdfunding

___ consists of individual facts or pieces of information.

Data

____ is the use of modeling software and statistics to extract knowledge from large volumes of data.

Data analytics

___ are instructions placed on a chip that contain device-specific information

Firmware

online social interactions that exhibit anger and/or insults are called:

Flaming

A list of every website you have listed, key by your web browser is called:

History

___, where many household activities are being automated or controlled from a distance (often using mobile devices or remote controls)

Home Automation

A type of printer that creates an image directly on the paper by spraying ink through tiny nozzles

Inkjet printers

___ is a generic term to describe various kinds of malicious programs created to harm a computer or steal valuable information.

Malware

Windows Server

Microsoft's server operating system, security has improved over time, today windows server operating system is widely used in businesses of all sized.

Megabyte (MB)

Over a million bytes

a scam that threatens to delete or publicly expose a victim's stolen data unless money is paid to the thief is called:

Ransomware

___ is a device that connects your home's network to the internet

Residential gateway

Which category of software is created for the operation, maintenance, and security of a computer?

System

The main component of a desktop computer is the ___, which is the case that houses the computer's critical parts, such as the processing and storage devices.

System unit

Higher RAM: Why?

The higher the overall capacity, the more programs and files you can open and work on at once.

What is the intermediary device between the CPU and the monitor that contains a processor video-dedicated memory, and other circuitry?

Video card

Connects single or multiple PCs in the wireless environment

Wireless access point (WAP)

A(n) ___ is an error in a computer program.

bug

CC

carbon copy, is used to send a copy of you message to individuals other than the primary recipient.

A fast, high quality printer that creates output by using a laser that is aimed at a rotating drum is called:

Laser Printers

IOS

Mobile OS created by Apple to run the iPhone and iPad.

The video cards microprocessor is called:

Graphics processing unit (GPU)

Hacktivism

Hacking with a social or political agenda.

___ file sharing uses a distributed network of individual users instead of a central server to transfer files.

P2P

___ is a computers ability to recognize human speech

Speech recognition. Siri, Googles assistant, Microsoft Cortana

Which type of software is used for entering, calculating, and analyzing sets of numbers?

Spreadsheet

Devices that add computer-generated information on top of the real world that a user sees offer a(n) ___ experience.

Argumented reality

Involves the development of intelligent systems or machines that possess capabilities such as learning, problem solving, and communication.

Artificial intelligence (AI)

______ is generally any part of the computer you can touch.

Hardware

Which microblogging service famously restricts posts to 280 characters?

Twitter

A(n) ___ is another name for the full address that is used to locate a web page on the Internet.

URL

___ is a feature that requires two forms of identification, such as a password and possession of your phone, to log into an account.

Two-factor authentication

Wifi ac

802.11ac can exceed 1 Gbps (>1000 Mbps)

Solid State Drives (SSDs)

A small and fast type of hard drive that uses flash memory instead of the more traditional magnetic technology.

Android

Although Google owns Android, it allows any manufacturer to use and modify the operating system for its device. This is why you see Android-based smartphones and tablets from companies like Samsung, Motorola, and HTC.

All the cloud applications below would allow you to share and collaborate on documents and lists EXCEPT

Amazon cloud

A(n) ___ input device authenticates you based on patterns or characteristics found in the human body. (Plus examples)

Biometric -Fingerprint scanners -Facial recognition

The use of living organisms to manufacture new products or improve existing ones is called:

Biotechnology

With capacities starting at 25 GB, the ___ is the optical media with the most storage.

Blue-Ray disc

Using a short-range wireless technology known as ___, users can make hands-free calls in some cars.

Bluetooth

Many navigation and traffic apps rely on ___ to determine which roads have accidents/construction and which gas stations have the lowest prices.

Crowdsourcing

The unit of memory or storage that represents eight bits. It's the amount of space required to store a single character, such as a letter or number.

Byte

___ is a way to interact with computers that requires users to memorize and type a series of commands.

Command line

What are programs that allow operating systems to communicate with hardware?

Device drivers

___ are digital books that are stored on a computing device.

Electronic books (e-books)

Which keyboards are designed to be comfortable and tailored for the human body?

Ergonomic

What is the name given to the limited set of circumstances where others can use portions of copyrighted material without first obtaining permission?

Fair use

Which type of cable consists of a thin strand of glass that transmits pulsating beams of light rather than electric current?

Fiber-optic

A high-speed cable that consists of a thin strand of glass that transmits pulsating beams of light rather than electric current.

Fiber-optic cable

Employee Monitoring

Good so employees aren't getting distracted

Although ___ owns Android and manages the store for apps, it allows any manufacturer to use and modify this operating system for their devices.

Google

A basic network device that provides multiple ports for connecting nodes is called:

Hub

HTML

Hypertext markup language. It is used to create web pages

HTTP

Hypertext transfer protocols. It helps web servers deliver a requested page to a user's computer.

A unique set of numbers and/or letters that uniquely identifies every computer or device on the internet.

IP address

___ refers to user entries or activities that tell the computer what to do.

Input

CPU name and model.

Intel and AMD dominate the market for desktop and laptop computers. example of a series and model: Intel's i7-3630QM or AMD's A8-4500M.

Which of the following units is the smallest?

Kilobyte

Which of the following is an open-source operating system that has distributions for both desktop and servers?

Linux

A data communication system consisting of multiple devices that are relatively near each other and are connected using cables or wireless media.

Local Area Network (LAN)

What is it called when services can give you certain information based on where you are physically located?

Location-based services (LBS)

A(n) ___ uniquely identified every network-connected device in the world.

MAC address

As the largest circuit board in a personal computer, the ___ contains a variety of slots, connectors, and plugs for hooking up all other parts of a computer>

Motherboard

A wireless technology that lets your mobile device communicate over very short distances, such as when paying for goods on wireless payment devices.

NFC

Android Pay and Apple Pay rely on __ to make the smartphone payments in stores.

NFC

Which of the following is a government agency that had the capability to monitor the internet and mobile activities of individuals?

NSA

A computer component that translates and transmits network packets

Network Interface Card (NIC)

___ allow us to communicate and share information between computers.

Networks

The processed results that a computer sends out to you is known as _____

Output

___ is a model whereby advertisers pay for their ads only when a website visitor clicks on the ad.

Pay-per-click

___ software is designed to keep individuals organized via management of contacts, appointments, to-do lists, and email.

Personal Information Manager (PMI) Microsoft outlook

Which strategy involves luring individuals into entering personal information into a website that is controlled by a hacker?

Phishing

Tiny dots on a display screen, each with its own unique address that the computer uses to locate it and control its appearance are called:

Pixels

Which of the following is used by many online companies to describe what information is collected from users and what is done with what information?

Privacy Policy

Which browser feature will delete your history and cookies the moment you close the special window?

Private browsing

Which type of memory temporarily holds the programs and files that you are actively working on?

RAM

A(n) ___ scanner uses radio frequencies to read the date stored in special tags.

RFID

The number of pixels that are displayed on the screen is called:

Resolution

UNIX

Runs many of the worlds most powerful servers. Not as easy to use but very stable and powerful.

One or more computer programs that are packaged together for a unified purpose are known as ____

Software

___ is the ability of a computer to hold or remember information it processes.

Storage

___ are small, affordable devices that can add many "smart" features to almost and TV.

Streaming media players

The portion of a URL that usually indicates a specific subdivision or server within a large site is called:

Subdomain

A ___payment method for software that has users pay a fixed amount of money per month in order to use the software.

Subscription model

___, used by large organizations such a NASA, are the largest and most powerful computers in the world.

Supercomputer

Which network divide provides multiple ports for connecting nodes and is aware of the exact address or identity of all the nodes attached to it?

Switch

The protocols at the heart of Internet communication are known as:

TCP/IP

Internet Service Provider (ISP)

Telecommunications company that offers Internet access to homes and businesses.

The term ___ describes a wide variety of remote work practices, from working at home occasionally to living in different country than the company.

Telecommuting

A(n) ___ contains a rechargeable battery, allowing it to run a computer system for a given amount of time if the power fails.

UPS

Central Processing Unit (CPU)

The main processor of a computer. Its responsible for organizing and carrying out instructions to produce a desired output.

Upload

To send data

A type of social interaction where a user acts in an annoying and antagonistic manner.

Trolling

Which of the following displays a form of artificial intelligence with its astounding capability to understand complex questions and quickly find the answers using large databases of information?

Watson

Which of the following is a global system of linked, hypertext documents?

World Wide Web

___, is the ability to view, edit, and share documents online.

cloud collaboration -evernote -google docs -Microsoft office online

___ is a program that translated a specific programming language into machine language that can be processed by the CPU.

complier

____ utilities use a variety of techniques that can "squeeze" one or more file into a smaller file, such as a ZIP.

compression

The small data file known as ___ are used by websites to remember users and their preferences.

cookies

The gathering of information from a large group of people is called:

crowdsourcing

Bitcoin is an example of:

cryptocurrency

Which part of a URL uniquely identifies a site and a brand on the web?

domain name

doing business online is called

e-commerce

Firewall

examines and blocks internet traffic in order to protect your private network


Conjuntos de estudio relacionados

Autodesk Inventor Certification STUDY GUIDE

View Set

Inbound Marketing Cert Study Guide

View Set

Physical and Chemical Properties of Matter

View Set

Lecture 3- Joint play assessment and joint mobilization

View Set

10年文法不白學48-was和were的否定句

View Set

Topic 1 - Introduction to Finance

View Set

Chapter 1: Introduction to Management and Organizations

View Set

Pathophysiology of Celiac Disease

View Set

Sociology Chapter 5: Self and Identity

View Set