Chapter 2, 3, 4, 5, and 6

¡Supera tus tareas y exámenes ahora con Quizwiz!

TLS

(Transport Layer Security) Successor to Secure Sockets Layer (SSL), a security technique that provides encryption of all data that passes between a client and an Internet server.

AUP

(acceptable use policy)

Zombie army

(also called Botnet) groups of bots

Virus signature

(also called a Virus definition) a known specific pattern of virus code.

Dos Attack

(also called denial of service attack) An assault whose purpose is to disrupt computer access to an internet service such as the web or e-mail.

CA

(Certificate Authority) Authorized person or company that issues and verifies digital certificates.

CAPTCHA

(Completely automated public turing test to tell computers and humans apart)

RTLS

(Real time location system) track and identify the location of high-risk or high-value items.

SSL

(Secure Sockets Layer) Security technique that provides encryption of all data that passes between a client and an Internet server.

PaaS (platform as a service)

Cloud computing service that allows developers to create, test, and run their solutions on a cloud platform without having to purchase or configure the underlying hardware and software.

platform as a service (PaaS)

Cloud computing service that allows developers to create, test, and run their solutions on a cloud platform without having to purchase or configure the underlying hardware and software.

DaaS (data as a service)

Cloud computing service that allows users and applications to access a company's data.

IaaS (infrastructure as a service)

Cloud computing service that uses software to emulate hardware capabilities, enabling companies to scale, or adjust up or down, storage, processing power, or bandwidth as needed.

infrastructure as a service (IaaS)

Cloud computing service that uses software to emulate hardware capabilities, enabling companies to scale, or adjust up or down, storage, processing power, or bandwidth as needed.

Coding Scheme

Combination of 0s and 1s that represent uppercase and lowercase letters, numbers, and special symbols that are defined by patterns

2 Features of Read-Only Memory (ROM)

Data on these chips cannot be modified Nonvolatile - contents are not lost when power is removed from the computer

Input

Data that a computer accepts and processes is called _____.

Decrypt

Decipher into a readable form

Cellular Seizure Investigation (CSI) stick

Device used by cyberthieves to download sensitive data from phones and other mobile devices.

A ____ backup copies only the files that have changed since the last backup

Differential

Digits that Can Represent 2 States of Electronic Devices

Digit 0 - the electronic state of off (absence of an electronic charge) Digit 1 - the electronic state of on (presence of an electronic charge)

When a Botnet is used to attack computers of networks it is called a ______ DoS attack

Distributive

2 Features of Slate Tablets

Does not include a physical keyboard, the case is behind the display Keyboard options include an on-screen keyboard, a wireless keyboard, or a keyboard that attaches to the slate via a clip or other mechanism

Nonvolatile Memory

Does not lose its contents when power is removed from the computer Permanent

USB Adapter

Dongle that plugs into a USB port, enhances functions of a mobile computer and / or provides connections to peripheral devices

2 Common Types of RAM

Dynamic RAM Static RAM

DIMMs used in servers can provide additional reliability if they use which of the following technologies?

ECC

Address

Each byte resides temporarily in a location of memory Unique number that identifies the location of a byte in memory

clock cycle

Each tick of the system clock.

3 Common Consumer Tasks of SaaS Applications

Editing documents or photos Sending email messages Managing finances

byte

Eight bits grouped together as a unit.

*Byte*

Eight bits grouped together.

Byte

Eight bits grouped together.

bus

Electrical channel that transfers electronic bits internally within the circuitry of a computer, allowing the devices both inside and attached to the system unit to communicate with each other.

*Bus*

Electrical channel that transfers electronic bits internally within the circuitry of the computer, allowing the devices both inside and attached to the system unit to communicate with each other.

eCycling

Electronic Recycling

*Memory*

Electronic components that store instructions waiting to be executed and the data needed by those instructions.

memory

Electronic components that store instructions waiting to be executed and the data needed by those instructions.

3 Features of Memory

Electronic components that store instructions waiting to be executed by the processor, data needed by those instructions, and the results of processing the data (information) Usually consists of 1 or more chips on the motherboard or some other circuit board in the computer Stores 3 basic categories of items

transistor

Element of an integrated circuit that can act as an electronic switch that opens or closes the circuit for electrical charges.

Sound Card

Enhances the sound-generating capabilities of a microphone and output through external speakers or headphones

Trillions

How many instructions are supercomputers capable of processing in a single second?

6 Ways in Which Processor Chips Include Technologies

Improve processing performance Track computer hardware and software Diagnose and resolve computer problems Secure computers from outside threats Optimize and extend battery life Integrate wireless capabilities

0, off

In a binary system, the digit _____ represents that electronic state of ______

Device

In the educational practice of BYOD, what does D stand for?

____ uses software to emulate hardware capabilities, enabling companies to scale, or adjust up or down, storage, processing power, or bandwidth as needed.

Infrastructure as a Service

Digital forensics

(computer forensics, network forensics, or cyberforensics) the discovery, collection, and analysis of evidence found on computers and networks. involves the examination of computer media, programs, data and log files on computers, servers, and networks.

DDos

(distributed Dos) attack, A zombie army is used to attack computers or computer networks. (A more devastating type of DoS attack)

Malware

(short for malicious software) programs that act without a user's knowledge and deliberately alter the computer's operations. other classes of malware include back doors and spyware.

word size

...number of bits the processor can interpret & execute at a given time • In most computers, this is the same as the bus width

Platform as a Service

...o Allows developers to create, test, & run their solutions on a cloud platform w/o having to purchase or configure the underlying hardware & software

Data as a Service

...o Allows users & apps to access a company's data

eCycling

...o Sustainable Materials Management Electronics Challenge- promotes responsible electronics recycling by using 3rd party certified recyclers

Infrastructure as a Service

...o Uses software to emulate hardware capabilities o Companies can scale storage, processing power, or bandwith

power supply

...o Wall outlets- supply alternating current of 115-120 volts o Computer/mobile devices need direct current of 5 to over 15 volts

digital

...on or off (0,1) • Computers

nanosecond

...one billionth of a second

clock speed

...pace of the system clock; measured by # of ticks per second

front side bus

...part of the motherboard & connects the processor to main memory

executing

...process of carrying out the commands

fetching

...process of obtaining a program or an application instruction or data item from memory

decoding

...process of translating the instruction into signals the computer can execute

ExpressCard module

...removable device (approx. 3 in) that fits in an ExpressCard slot

cooling pad

...rests below laptop & protects computer/user's lap from overheating

stored program concept

...role of memory to store both data & programs

multi-core processor

...single chip w/ 2 or more separate processor cores

L2 cache

...slightly slower than L1, larger capacity • Advanced transfer cache- built directly on the processor chip

heat sink

...small ceramic/metal component with fins on its surface that absorbs & disperses heat produced by electrical components o Many have fans o Packaged as part of chip or installed on top or side of chip

expansion slot

...socket on a desktop or server motherboard that can hold an adapter card

virtual desktop

...some companies specify applications, security settings, & computing resources available to employees on their desktop computers

data bus

...used to transfer actual data

address

...used to transfer info about where the data should reside in memory

liquid cooling technology

...uses continuous flow of fluids in a process that transfers the heated fluid away from the processor to a radiator type grill (which cools liquid) & then returns cooled fluid to processor

volatile

...when computer off, it loses its contents • Temporary • RAM

chip

...where functions are usually stored for CPU

adapter board

...• Circuit board that enhances the functions of a component of a desktop or server system unit and/or provides connections to peripheral devices

adapter card

...• Circuit board that enhances the functions of a component of a desktop or server system unit and/or provides connections to peripheral devices

expansion card

...• Circuit board that enhances the functions of a component of a desktop or server system unit and/or provides connections to peripheral devices

control unit

...• Component of the processor that directs & coordinates most of the operations in the computer • Interprets each instruction & initiates appropriate action to carry out instruction • Directs arithmetic logic unit, registers, & buses

Intel-compatible processors

...• Internal design similar to Intel wprocessors • Identify their processor chips by a model name or #

random access memory

...• Memory chips that can be read from & written to by the processor & other devices

binary system

...• Number system with 0 & 1, called bits (binary digits) o Smallest unit of data the computer can process

arithmetic logic unit

...• Performs arithmetic, comparison, & other operations

RAM

...• Random access memory/main memory • Memory chips that can be read from & written to by the processor & other devices

bus width

...• Size of a bus • Determines the number of bits that the computer can transmit at one time • 32 bit bus- 32 bits (4 bytes) at a time • Larger # means faster

memory module

...• Small circuit board on which RAM chips reisde

system clock

...• Small quartz crystal circuit • Controls timing of all computer operations • Generates regular electronic pulses that set the operating pace of components of the system unit

cache

...• Temporary storage area

flash memory

...• Type of nonvolatile memory that can be erased electronically & rewritten • Allows computer to update its contents easily • Chips store data & programs on many devices

gigahertz

..one billion ticks per second .

Nanosecond

1 billionth of a second

terabyte (TB)

1 trillion bytes.

How many bytes (exactly) are in a kilobyte?

1,024

What is the transfer rate of a 64-bit module running at 1600 MHz?

12800 MB/second

How many individual characters can byte represent?

256

DDR2

2nd generation of DDR Faster than DDR

DDR3

3rd generation of DDR Designed for computers with multi-core processors Faster than DDR2

DDR3

3rd generation of DDR; designed for computers with multi-core processors; faster than DDR2

Which type of cable is required by ATA/66 and above?

40 pins, 80 wires

DDR4

4th generation of DDR Faster than DDR3

DDR4

4th generation of DDR; faster than DDR3

How many bits are in one byte?

8

Address

A _____ bus is used to transfer information about where the data should reside in memory.

*Adapter Card*

A circuit board that enhances the functions of a component of a desk-top or server system unit and/or provides connections to peripheral devices.

adapter board

A circuit board that enhances the functions of a component of a desktop or server system unit and/or provides connections to peripheral devices.

adapter card

A circuit board that enhances the functions of a component of a desktop or server system unit and/or provides connections to peripheral devices. Also called adapter board or expansion card.

Zombie

A computer whose owner is unaware the computer is being controlled remotely by an outside.

USB adapter

A dongle that plugs into a USB port, enhances functions of a mobile computer and/or provides connections to peripheral devices.

*USB Adapter*

A dongle that plugs into a USB port, enhances the functions of a mobile computer and/or provides connections to peripheral devices.

what is an audit trail?

A file that records access attempts

Tower

A frame that houses the system unit on a desktop is called a ______

Manager

A password _____ is a service that stores all of your account information securely.

Virus

A potentially damaging computer program that affects, or infects, a computer negatively by altering the way the computer works without the user's knowledge or permission. Once the virus infects the computer, it can spread throughout and may damage files and system software, including the operating system.

Back Door

A program or set of instructions in a program that allow users to bypass security controls when accessing a program, computer, or network.

Back door=

A program or set of instructions that allows useres to bypass security controls when accessing a program, computer, or network

Bot

A program that performs a repetitive task on a network. Cybercriminals install malicous bots on unprotected computers to create a botnet.

2 Ways of How Seats in a Stadium are Similar to Addresses in Memory

A seat, which is identified by a unique seat number, holds 1 person at a time, and a location in memory, which is identified by a unique address, holds a single byte Both a seat, identified by a seat number and a byte, identified by an address, can be empty

Quarantine

A separate area of a hard disk that hods the infected file until the infection can be removed. This step ensures other files will not become infected.

real-time clock

A separate battery-backed chip that keeps track of the date and time in a computer.

Proxy server

A server outside the organization's network that controls which communications pass into the organization's network.

Multi-core

A single chip with two or more separate processor core.

*Multi-Core Processor*

A single chip with two or more separate processor cores.

multi-core processor

A single chip with two or more separate processor cores.

Cellular Seizure Investigation

A small device that a thief can plug into the phone and then download sensitive data in seconds

*Chip*

A small piece of semiconducting material, usually silicon, on which integrated circuits are etched.

chip

A small piece of semiconducting material, usually silicon, on which integrated circuits are etched.

*Expansion Slot*

A socket on a desktop or server motherboard that can hold an adapter card.

expansion slot

A socket on a desktop or server motherboard that can hold an adapter card.

Spoofing

A technique intruders use to make their network or internet transmission appear legitimate to a victim computer or netorks.

screen protector

A thin plastic film that adheres to the screen of your device.

Personal Firewall

A utility program that detects and protects a personal computer and its data from unauthorized intrusions.

Signature

A virus _____ is a known specific pattern of virus code that antivirus programs use to identify viruses.

Honeypots

A vulnerable computer that is set up to entice an intruder to break into it.

Cyberextortionist

A(n) _____ demands payment to stop an attack.

Differential

A(n) ______ backup copies only the files that have changed since the last full backup.

Convertible

A(n) ______ tablet has a screen in its lid and a keyboard in its base, with the lid and base connected by a swivel-type hinge.

main memory

AKA RAM; memory chips that can be read from & written to by the processor & other devices

system board

AKA motherboard; main circuit board of the computer

motherboard

AKA system board; main circuit board of the computer

The ______ is the component of the processor that performs arithmetic and comparison operations.

ALU

____ is the most widely used coding scheme to represent a set of characters.

ASCII

4 Reasons Why Home and Business Users Choose Cloud Computing

Accessibility Cost Savings Space Savings Scalability

graphics card

Adapter card that converts computer output into a video signal that travels through a cable to the monitor, which displays an image on the screen. Also called video card.

sound card

Adapter card that enhances the soundgenerating capabilities of a personal computer by allowing sound to be input through a microphone and output through external speakers or headphones.

Sharpness

Adjusting the ______ increases or decreases the crispness of objects in the photo.

An encryption_____ is a set of steps that converts readable text into unreadable text

Algorithm

Platform as a service (PaaS)

Allows developers to create, test, and run their solutions on a cloud platform without having to purchase or configure the underlying hardware and software.

Expansion Bus

Allows the processor to communicate with peripheral devices

Software as a service (SaaS)

Allows users and applications to access a company's data.

system bus

Also called the front side bus (FSB), is part of the motherboard and connects the processor to main memory.

ASCII

American Standard Code for Information Interchange; the most widely used coding scheme to represent a set of characters.

Access Time

Amount of time it takes the processor to read data, instructions, and information from memory Directly affects how fast the computer processes data

Trial

An ______ version is an application you can use at no charge for a limited time to see if it meets your needs.

Cloud computing

An environment of virtual servers that house and provide access to resources users access through the internet.

IP Spoofing

An intruder computer fools a network into believing its IP address is associated with a trusted source. Perpetrators of IP spoofing trick their victims into interacting with the phony web site.

Arithmetic Logic Unit

Another component of the processor Performs arithmetic, comparison, and other operations

Zombie

Another term for botnet is _____ army.

computer crime

Any illegal act involving a computer

Possessed objects

Any item that you must carry to gain access to a computer or computer facility. (examples : badges, cards, smart cards, and keys.

System Unit (Chassis)

Case on a desktop that contains and protects the motherboard, hard disk drive, memory, and other electronic components

Feature of Portable Media Players, Digital Cameras, and Handheld Game Devices

Case typically consumers the entire device and houses the display and input devices

Which Intel processor technology interconnects the processor, chipset, and wireless network adapter as a unit, improving laptop performance?

Centrino

COGNITIVE ASSESSMENT Which of the following is NOT true about processors?

Chip manufacturers rely on clock speed as the most important performance factor.

Static RAM (SRAM)

Chips are faster and more reliable than any variation of DRAM chips Chips do not have to be reenergized as often as DRAM Much more expensive than DRAM chips

Dynamic RAM (DRAM)

Chips must be reenergized constantly or they lose their contents

Adapter Card (Expansion Card)

Circuit board that enhances the functions of a component of a desktop or server system unit and / or provides connections to peripheral devices

integrated circuit

Circuit that contains many microscopic pathways capable of carrying electrical current.

cloud computing stack

Cloud Computing is often described as a stack consisting of a broad range of services built on top of one another, for example SaaS, PaaS, and IaaS

___ refers to an environment of servers that house and provide access to resources users access via the internet.

Cloud computing

2 Special Cases of Infrastructure as a Service (IaaS)

Storage as a Service Desktop as a Service

4 Functions of Registers

Storing the location from where an instruction was fetched Storing an instruction while the control unit decodes it Storing data while the ALU calculates it Storing the results of a calculation

SDRAM (Synchronous DRAM)

Synchronized to the system clock Much faster than DRAM

6 Factors of Computer Performance

System Clock Type of Processor Chip Amount of Cache Memory Access Time Bus Width Bus Clock Speed

*Plug and Play*

Technology that gives a computer the capability to recognize peripheral devices as you install them.

Plug and Play

Technology that gives a computer the capability to recognize peripheral devices as you install them.

Internet of things (IoT)

Term that describes an environment where processors are embedded in every product imaginable (things), and those 'things' communicate with each other via the Internet.

microprocessor

Term used by some computer and chip manufacturers to refer to a personal computer processor chip.

Control Unit

The ____ is the component of the processor that directs and coordinates most of the operations in the computer.

What should an AUP specify

The acceptable use of technology by employees for personal reasons

access time

The amount of time it takes a storage device (1) to locate an item on a storage medium or (2) to deliver an item from memory to the processor.

*Access Time*

The amount of time it takes the processor to read data, instructions, and information from memory and the time required to deliver an item from memory to the processor.

system unit

The case that contains and protects the motherboard, hard disk drive, memory, and other electronic components of the computer from damage. Also called chassis.

Coding scheme

The combinations of 0s and 1s that represent uppercase and lower case letters, numbers, and special symbols.

*Control Unit*

The component of the processor that directs and coordinates most of the operations in the computer.

control unit

The component of the processor that directs and coordinates most of the operations in the computer.

virtual desktop

The desktop and its applications appear to be installed on the user's own computer, desktop as a service

Payload

The destructive event or prank the program is intended to deliver.

*Central Processing Unit (CPU)*

The electronic component of a computer that interprets and carries out the basic instructions that operate a computer.

*Processor*

The electronic component of a computer that interprets and carries out the basic instructions that operate a computer.

central processing unit (CPU)

The electronic component of a computer that interprets and carries out the basic instructions that operate a computer. Also called processor.

Cost Savings

The expense of software and high-end hardware, such as fast processors and high-capability memory and storage devices, shifts away from the user

Motherboard

The main circuit board of a personal computer.

*Motherboard*

The main circuit board of the personal computer.

motherboard

The main circuit board of the personal computer. Also called a system board.

*Word Size*

The number of bits the processor can interpret and execute at a given time.

Word size

The number of bits the processor can interpret and execute at a given time.

word size

The number of bits the processor can interpret and execute at a given time.

3 Categories of Items Stored in Memory

The operating system and other programs that control or maintain the computer and its devices Applications that carry out a specific task, such as word processing The data being processed by the applications and the resulting information

Clock speed

The pace of a system clock.

*Clock Speed*

The pace of the system clock.

clock speed

The pace of the system clock.

E-mail Spoofing

The sender's address or other other componets of the e-mail header are altered so that it appears the e-mail originated from a different sender.

bus width

The size of a bus, which determines the number of bits that a computer can transmit at one time.

binary digit

The smallest unit of data the computer can process. Also called bit.

*Bit*

The smallest unit of data the computer can process. Short for binary digit.

Unauthorized access

The use of a computer or network without permission

Screen Protector

Thin plastic film that adheres to the screen of your device

COGNITIVE ASSESSMENT Which of the following is NOT true about processor cooling?

Today's personal computer processors often require additional cooling beyond the capability of the power supply's main fan.

DDR SDRAM (Double Data Rate DRAM)

Transfers data twice, instead of once, for each clock cycle Faster than SDRAM

A USB flash drive provides additional storage capability when it is plugged in.

True

A byte provides enough different combinations of 0s and 1s to represent 256 different characters.

True

Flash memory is a type of nonvolatile memory that can be erased electronically and rewritten.

True

RAM also is called main memory.

True

Trash cans that send a signal when they need to be emptied is an example of the Internet of Things.

True

True or False: Key words are case sensitive

True

When a user runs an application, its instructions transfer from a storage device to memory.

True

False

True of False? A stick computer has a large amount of storage space.

True

True of False? Applications that carry out a specific task are store in memory.

True

True of False? CTS is inflammation of the nerve that connects the forearm to the palm of your hand.

False

True of False? Older USB devices run faster in a new USB port.

False

True of False? The power supply coverts the wall outlet DC power into AC power.

False

True of False? Two users can have the same email address.

False

True of False? Users of website authoring software must have advanced HTML skills.

False

True or False? A brownout is a complete power failure.

False

True or False? A dual-core processor doubles the processing speed of a single-core processor.

False

True or False? A format checker identifies passive voice and run-on sentences.

False

True or False? A segment of a video is called a slide.

True

True or False? Cyberterrorism and cyberwarfare usually require a team of highly skilled individuals, millions of dollars, and several years of planning.

False

True or False? Email spoofing rarely is used in virus hoaxes and spam.

True

True or False? Encryption is one safeguard against information theft.

True

True or False? If you are purchasing a new desktop, chances are it will include the latest version of your preferred operating system.

True

True or False? Malware creators are targeting smartphones, particularly those using he Android operating system.

True

True or False? Mobile payment providers state that the use of their payment apps is more secure than using a credit card.

False

True or False? Most computers and electronic devices are analog, which uses only two discrete states: on and off.

False

True or False? Passphrases are less secure than passwords.

False

True or False? Public key encryption is also called asymmetric key encryption.

True

True or False? Smartphones and other mobile devices often can function as a portable media player.

True

True or False? The Lightning connector, developed by Apple for the iPhone 5, is compatible with prior iPhone models.

True

True or False? The speed of the system clock has no effect on peripheral devices.

False

True or False? The voice command "OK, Google" will activate your device's search engine.

False

True or False? Users of websites authoring software must have advanced HTML skills.

True

True or False? With CDP, all data is back up whenever a change is made.

True

True or False? You should disable GPS tracking on your mobile device unless you need to use it.

False

True or False? You should run multiple antivirus programs on your computer or mobile device.

False

True or false? A mail server stores and manages email lists.

advanced transfer cache (ATC)

Type of L2 cache built directly on the processor chip, which increases processor speed.

Advanced Transfer Cache (ATC)

Type of L2 cache built directly on the processor chips Processors that use them perform at much faster rates than those that do not use it

Flash Memory

Type of nonvolatile memory that can be erased electronically and rewritten

*Flash Memory*

Type of nonvolatile memory that can be erased electronically and rewritten.

flash memory

Type of nonvolatile memory that can be erased electronically and rewritten.

a dongle that plugs into a USB port, enhances functions of a mobile computer and / or provides connections to peripheral devices

USB adapter

Productivity

Under what category of programs and apps do databases and enterprise computing fall?

address

Unique number that identifies the location of a byte in memory.

How do manufacturers such as Intel and AMD help consumers evaluate various processors?

Use a numbering scheme that more accurately reflects the processing speed of their chips

Feature of USB Adapters and ExpressCard Modules

Used to add memory, communications, multimedia, security, and storage capabilities to mobile computers

Data Bus

Used to transfer actual data

data bus

Used to transfer actual data.

Address Bus

Used to transfer information about where the data should reside in memory

4 Types of Services Available on Cloud Computing

Infrastructure as a Service (Manage IT infrastructure) Software as a Service (Provide Applications) Data as a Service (Access Online Data) Platform as a Service (Create Applications Using Web-Based Development Platforms)

Feature of Game Consoles

Input and output devices, such as controllers and a television, reside outside the case

2 Ways Data Needed by Programs and Applications Enter Memory

Input device Storage device

Result When User Runs an Application

Instructions are transferred from a storage device to memory

the leading manufacturers of personal computer processor chips are ____ and AMD.

Intel

Processor or the Central Processing Unit (CPU)

Interprets and carries out the basic instructions that operate a computer Significantly impacts overall computing power and manages most of a computer's operations

Purpose of Control Unit

Interprets and executes instructions in a memory

Circuit

Just as vehicles travel on a highway, bits travel on a ____.

Real-Time Clock

Keeps track of the date and time in a computer

AN ecrytion ____ is a set of characters that the originator of the data used to encrypt and the recipient of the data used to decrypt

Key

2 Features of Most Laptops, Including Ultrathin Laptops

Keyboard and pointing device often occupy the area on top of the case Display attaches to the case by hinges

4 Steps in How the Processor Needs an Instruction or Data from the Memory

L1 Cache (Fastest Access) L2 Cache (Slower than L1 Access) L3 Cache (If exists) (Separate chip between processor and RAM) (Slower Access than L1 and L2 Cache) Storage Medium (Hard Disk or Optimal Disk)

2 Features of Bus Width

Larger the number of bits handled by the bus, the faster the computer transfers data The wider the bus, the fewer the number of transfer steps required and the faster transfer of data

Activation

Lately, with all of the concerns about copyright infringement, friends have started to ask you about categories of application software and what each kind permits. You tell your friends that product ____ is a technique that some manufacturers use to ensure you do not install software on more computers than legally licensed.

This is not true about cloud data privacy

Law enforcement officials can not access email messages stored on the cloud without informing the user first

Alphanumeric Characters

Letters and numbers

alphanumeric characters

Letters and numbers.

2 Types of Memory Cache that Most Personal Computers Have

Level 1 (L1) Cache Level 2 (L2) cache

Which type of processor memory is located on the processor chip (processor die)?

Level 1 cache

A(n) _____ screen restricts acess to a computer or mobile device until a user perfors acertain action

Lock

Volatile Memory

Loses its contents Temporary

Volatile

Loses its contents when the power is removed from the computer

master file

MDM links and synchronizes all critical data from those disparate systems into one file, called a master file, that provides a common point of reference

Which of the following adapter cards connects to musical instruments?

MIDI

Motherboard (System Board)

Main circuit board of the computer

A password ____ is a service that stores all of your account info securly

Manager

AMD

Manufacture Intel-compatible processors. Have similar internal design, preform the same functions, can be as powerful, but less expensive. Leading manufacturer of processors including Intel.

2 Common Types of Cache

Memory Cache Disk Cache

Read-Only Memory (ROM)

Memory chips storing permanent data and instructions

*RAM*

Memory chips that can be read from and written to by the processor and other devices.

random access memory (RAM)

Memory chips that can be read from and written to by the processor and other devices. Also called main memory.

*Read-Only Memory (ROM)*

Memory chips that store permanent data and instructions.

ROM (read-only memory)

Memory chips that store permanent data and instructions.

Read-only memory (ROM)

Memory chips that store permanent data and instructions.

read-only memory (ROM)

Memory chips that store permanent data and instructions.

Nonvolatile

Memory that does not lose its contents when power is removed from the computer.

nonvolatile memory

Memory that does not lose its contents when power is removed from the computer.

volatile memory

Memory that loses its contents when the computer's power is turned off.

goal seeking

Model that starts with the desired outcome (goal) and a set of variables that impact that outcome, which are used to calculate how that outcome could be achieved and whether it's feasible to achieve that desired outcome

4 Steps on How a Letter is Converted to Binary Form and Back

Press a key on a keyboard, a chip in the keyboard converts the key's electronic signal into a special code, called a scan code Scan code is sent to the electronic circuitry in the computer Electronic circuitry in the computer converts the scan code into its ASCII binary form and stores it as a byte value in its memory for processing When processing is finished, the computer converts the byte into a human-recognizable number, letter of the alphabet, or special character that is displayed on a screen or is printed

PGP

Pretty good privacy

Executing

Process of carrying out the commands

Saving

Process of copying data, instructions, and information from RAM to a storage device such as a hard disk

Fetching

Process of obtaining a program or an application instruction or data item from memory

Decoding

Process of translating the instruction into signals the computer can execute

CPU stands for central ______ unit.

Processing

The ______ interprets and carries out the basic instructions that operate a computer.

Processor

liquid cooling technology

Processor cooling method that uses a continuous flow of fluid(s), such as water and glycol, in a process that transfers the heated fluid away from the processor to a radiator-type grill, which cools the liquid, and then returns the cooled fluid to the processor.

executing

Processor operation in the machine cycle that carries out the commands.

fetching

Processor operation in the machine cycle that obtains a program or an application instruction or data item from memory.

decoding

Processor operation in the machine cycle that translates the instruction into signals the computer can execute.

storing

Processor operation in the machine cycle that writes the result to memory (not to a storage medium).

Intel-compatible processors

Processors manufactured by AMD that have an internal design similar to Intel processors, perform the same functions, and can be as powerful, but often are less expensive.

superscalar

Processors that can execute more than one instruction per clock cycle.

Storage as a Service

Providers offer file management services such as storing files online, system backup, and archiving earlies versions of files

Scalability

Provides the flexibility to increase or decrease computing requirements as needed

Most Common Type of Volatile Memory

RAM

When a program runs on a computer, it is stored in

RAM

____, also called main memory, consists of memory chips that can be read from and written to by the processor and other devices.

RAM

files remain in ____ as long as the computer or mobile devices has continuous power.

RAM

static RAM (SRAM)

RAM chips that are faster and more reliable than and do not have to be reenergized as often as DRAM chips.

Dynamic RAM

RAM chips that must be reenergized constantly or they lose their contents. Also called DRAM.

Which memory technology that is no longer used has a 32-bit data bus, 232 pins and requires a placeholder in empty slots?

RIMM

____ refers to memory chips storing permanent data and instructions.

ROM

3 Examples of Nonvolatile Memory

ROM Flash Memory CMOS

true

ROM chips also car called firmware

*Firmware*

ROM chips or flash memory chips that store permanent instructions, such as a computer or mobile device's start-up instructions.

Firmware

ROM chips that contain permanently written data, instructions, or information such as a computer or mobile device's start-up instructions

firmware

ROM chips that contain permanently written data, instructions, or information.

firmware

ROM chips that obtain permanently written data, instructions or information.

RDRAM

Rambus DRAM; much faster than SDRAM

Digital

Recognizes only 2 discrete states: on and off Example: most computers since they are electronic devices powered by electricity, which also has only 2 states - on and off

Audit trail

Records in a file both successful and unsuccessful access attempts.

ExpressCard Module

Removable device, about 75 mm long (approximately 3 inches) and 34 mm wide (approximately 1.3 inches) or L-shaped with a width of 54 mm (approximately 2 inches), that fits in an ExpressCard slot

RSI

Repetitive strain injury

*Digital*

Representation of data using only two discrete states: on (1) and off (0).

digital

Representation of data using only two discrete states: on (1) and off (0).

Cooling Pad

Rests below a laptop and protects the computer from overheating and also the user's lap from excessive heat

Stored Program Concept

Role of memory to store both data and programs

You realize your computer has been affected by malware, it seems as if someone is controlling your computer from a remote location what type of malware might you have?

Rootkit

Which hard drive technology is used to predict when a drive is likely to fail?

S.M.A.R.T.

Which of the following is true about DIMM technologies?

SDRAM runs synchronized with system clock

What technology in a DIMM informs the BIOS of the module's size, speed, voltage, and data path width?

SPD

Index

Search tools typically use a ______ which stores a variety of information about a file.

2 Features of Resulting Information Stored in Memory

Sent to an output device for future access Sent to a storage device for future access

machine cycle

Set of four basic operations that a processor repeats for every instruction: (1) fetching, (2) decoding, (3) executing, and, if necessary, (4) storing.

*eCycling*

Short for electronics recycling.

Multi-Core Processor

Single chip with 2 or more separate processor cores

Bus Width

Size of a bus, which determines the number of bits that the computer can transmit at 1 time

L2 Cache

Slightly slower than L1 cache but has a much larger capacity Current processors include Advanced Transfer Cache (ATC)

*Memory Slots*

Slots on the motherboard that hold memory modules.

Heat Sink

Small ceramic or metal component with fins on its surface that absorbs and disperses heat produced by electrical components, such as a processor

heat sink

Small ceramic or metal component with fins on its surface that absorbs and disperses heat produced by electrical components, such as a processor.

*Memory Module*

Small circuit board that houses RAM chips and is held in a memory slot on the motherboard.

*System Clock*

Small quartz crystal circuit that controls the timing of all computer operations.

system clock

Small quartz crystal circuit that controls the timing of all computer operations.

System Clock

Small quartz crystal circuit which the processor relies on to control the timing of all computer operations Generates regular electronic pulses, or ticks, that set the operating pace of components of the system unit

Registers

Small, high-speed storage locations that temporarily hold data and instructions Part of the processor, not part of memory or a permanent storage device

registers

Small, high-speed storage locations that temporarily hold data and instructions.

Bit (Short for Binary Digit)

Smallest unit of data the computer can process

Expansion Slot

Socket on a desktop or server motherboard that can hold an adapter card

___ describes a computing environment where an Internet server hosts and deploys applications

Software as a Service

an aspect of cloud computing that describes a computing environment where an Internet server hosts and deploys applications is known as ____.

Software as a Service (SaaS)

Predictive

Some smartphones use ______ text, where you press one key on the keyboard or keypad for each letter in a word, and software on the phone suggests words you may want.

2 Popular Adapter Cards

Sound Cards Video Cards

Scan Code

Special code in which a chip in the keyboard is converted into the key's electronic signal

2 Types of Memory in Which Computer and Mobile Devices Contain

Volatile Nonvolatile

online transaction processing (OLTP)

Volatile systems that are designed to process and store transaction data

Web 2.0

Web sites that provide a means for users to share personal info, allow users to modify web site content, and have application software built into the site for visitors to use

Virtual Desktop

What Desktop as a Service is also known as because the desktop and its applications appear to be installed on the user's own computer

Creates software registration numbers

What does a keygen do?

Clock Cycle

What each tick is equal to

The right to use a program or app

What is an EULA?

Cache

What most of today's computers use to improve their processing times Temporary storage area

Eyes

What part of the body does CVS impact?

Superscalar

What processors today are called since they can execute more than 1 instruction per clock cycle

The acceptable use of technology by employees for personal reasons.

What should an AUP specify?

Complementary Metal-Oxide Semiconductor (CMOS)

What some RAM chips, flash memory chips, and other memory chips use because it provides high speeds and consumes little power Uses battery power to retain information even when the power to the computer is off

Byte

When 8 bits are grouped together as a unit Provides enough different combinations of 0s and 1s to represent 256 different characters

This is not true about 2 step verification

When a system sends an authentication code it typically does not expire

The availability of ports is not important because you can always add ports.

When purchasing a mobile computer, which of the following is NOT recommended?

Which of the following best describes a single sign on account

When you enter your name into one account and you are automatically signed into other accounts and services

Which of the following is true about installing a processor on a motherboard?

after placing the processor in the socket, you need to lock down the lever

link/hyperlink

allow you to obtain information on a website in a non-linear way

You recently purchased a new laptop for home you want to ensure that you are safe from malware so you should not do this

always stay connected to the internet

Which of the following is NOT a feature of a processor?

amount of CMOS

A programmable language allows us to express

an algorithm

Paas

an aspect of cloud computing that allows developers to create, test, and run their solutions on a cloud platform without having to purchase or configure the underlying hardware and software is known as ______.

Cyberwarfare

an attack whose goal ranges from disabling a government's computer network to crippling a country. (usually require a team of highly skilled individuals, millions of dollars, and several years of planning)

Virus hoax

an e-mail message that warns user of a nonexistent virus or other malware. These hoaxes are in the form of a chain letter that requests the user to send a copy of the e-mail message to as many people as possible.

executive information system (EIS)

an information system specifically designed to support senior management

At each step of its operation, the input to a Central Processing Unit is

an instruction

ad hoc report

an unplanned report that is generated to a mobile device or computer on demand as needed

Human speech is ____ because it uses continuous (wave form) signals that vary in strength and quality

analog

touchpoint

any action or interaction with a customer, such as email, text, direct mail, phone call social media message, and so on

Computer security risk

any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability.

Processors contain a control unit and a(n) ___ unit.

arithmetic logic

the ___ unit of the processor performs arithmetic, comparison , and other operations.

arithmetic logic

true

as with processors, manufacturers state the clock speed for a bus in hertz

Biometric Devices

authenticates a person's identity by translating a personal characteristic, such as a fingerprint, into a digital code that is compared with a digital code stored in the computer verifying a physical or behavioral characteristic.

the ___ system is a number system that has just two unique digits, 0 and 1

binary

A ___ is the smallest unit of the data the computer can process.

bit

A(n) ______ is the smallest unit of data a computer can process.

bit

What is the most likely result of correctly installed processor, but an incorrectly installed cooler?

boot process begins, but system suddenly turns off after a short period

You want to ensure your wireless network is secure you don't do this

broadcast the SSID

allows various devices both inside and attached to the system unit to communicate with each other

bus

The size of a bus, called the ___, determines the number of bits that the computer can transmit at one time.

bus width

customer-centric

business models strive to create the best solution or experience for the customer. In contrast, product-centric models are internally focused on creating the best product

When 8 bits are group together as a unit, they form a ___.

byte

when an application's instructions and data are transferred to memory from storage devices, the instructions and data exist as ____.

bytes

This is not recomended to protect against hardware failure

cables and locks

most of today's computers improve their processing times with ____, which is a temporary storage area.

cache

transistor

can act as an electronic switch that opens or closes the circuit for electrical charges

On personal computers, the circuitry for the processor, memory, and other components reside on a computer ___.

chip

small piece of semiconducting materials, usually silicon, on which integrated circuits are etched.

chip

An integrated ___ contains many microscopic pathways capable of carrying electrical current.

circuit

the processor relies on a small quartz crystal circuit called the system ____ to control the timing of all computer operations.

clock

A ____ is a written guidline that helps determing wether a specification is ethicle/ unethical or allowed/ not allowed

code of conduct

In object-oriented programming a method is

code that allows access to an objects attributes or that carries out some other action for the object

____ map a set of alphanumeric characters and special symbols to a sequence of numeric values that a computer can process.

coding schemes

batch processing

collects all transaction for a day, shift, or other time period, and then processes the data and updates the data stores

Which of the following is true about DIMM slots?

color coding is used to identify the channel

CMOS

complementary metal oxide semiconductor; used by memory chips; uses battery power to retain info even when the power to the computer is off

control unit

component of the computer that directs and coordinates most of the operations in the computer.

purpose of the system bus

connects the processor to main memory

IP address

consist of 4 groups of numbers, each separated by a period. First portion identifies the network and the last portion identifies the specific computer

memory

consists of electronic components that store instructions waiting to be executed and data needed by those instructions

enterprise architecture (EA)

the way IT systems and processes are structured. EA is an ongoing process of creating, maintaining, and leveraging IT. It helps to solve two critical challenges: where an organization is going and how it will get there

DDR SDRAM

double data rate SDRAM; transfers data twice for each clock cycle; faster than SDRAM

DIMM

dual inline memory module; • Pins on opposite sides of the circuit board do not connect & thus form 2 sets of contacts e;

____ RAM chips must be reenergized constantly or they lose their contents.

dynamic

screen protector

thin plastic film that adheres to the screen of your device

For what purpose was the BSA formed

to promote understanding of software piracy

_____ can help conserve natural resources because precious metals, glass, and solid waste are removed before the shell is taken to landfills

eCycling

EGMPSMS

embedded computer, game console, mobile devices, personal computer, server, mainframe, supercomputer

An organization creates a disaster recovery plan which part would include return procedures ( who can enter the facility and what actions they are to perform?)

emergency plan

data as a service (DaaS)

enables data to be shared among clouds, systems, apps, and so on regardless of the data source or where they are stored (elimination of third party could provider)

Social ___ is defined as gaining unauthorised access to or obtaining confidential information by taking advantage of another person

engineering

In a machine cycle, ___ is the process of carrying out the commands

executing

cross-sell

to sell additional complimentary products or services

up-sell

to sell more expensive models or features

A(n) ____ is a socket on a desktop or server motherboard that can hold an adapter card.

expansion slot

a socket on a desktop or server motherboard that can hold an adapter card

expansion slot

Flash drives, CD's, and external disks are all examples of

external memory

A iris recognition system uses technology to read patterns n the users

eye

A session cookie stores user names and or passwords so that users do not need to enter this information every time they sign in to the website

false

Email spoofing rarely is used in virus hoaxes and spam

false

If your computers opperating system provides a personal firewall ypu do not need to disable it if you are using a third party firewall

false

Software used to fight cyber criminals is called crimeware

false

To protect files on your devices hard drive from hackers turn on file and printer sharing

false

True or False: An algorithm allows ambiguity

false

True or False: Indentifiers may start with a number

false

True or False: machine languages can be used to write programs that can run on any macine

false

True or False: main is a reserved word

false

Two users can have the same email address

false

Viruses worms and trojan horses replicate themselves to other computers or devices

false

intentionally erasing software is not an example of software theft

false

public key encryption is also called asymettric key encryption

false

with a credit card purchase when users sign their name on a signature capture pad using a stilus the retailer uses a signature verification system to authenticat the user

false

Paraphrases are less secure than passwords

falsee

A ROOTkit can be a backdoor

true

Common digital security risks include information theft and system failure

true

Content filterining is the process of restricting acess to certain material

true

ROM chips that contain permanently written data, instructions, or information.

firmware

____ is a type of nonvolatile memory that can be erased electronically and rewritten

flash memory

Cyber terrrorism in cyber warfare usually require a team of highly skilled individuals, million dollars, and several years of planning

true

Piracy is the most common form of software theft

true

Security experts recommend using different user names and passwords for every account

true

True or False: int is a reserved word

true

True or False: public is a reserved word

true

True or False: static is a reserved word

true

True or False: void is a reserved word

true

Unusually high drive activity or a slower than normal internet activity are signs that your computer or mobile device may be a zombie

true

User ID's are also called usernames, log on names, and sign in names.

true

a Hand geometry sytem measures the size and shape of a persons hand

true

employers can use firewalls to restrict employees access to sensative data

true

encryption is one safegaurd against information theft

true

the website for cert/cc provides information about internet security breaches

true

with CDP all data is backed up whenever a change is made

true

you should disable GPS tracking on your mobile device unless you need to use it

true

A location in memory used for storing data and given a name in a computer program that can be changed is called a

variable

exception report

generated only when something is outside the norm, either higher or lower than expected. More likely to be read because workers know that some unusual event or deviation has occurred

A ___ equals approximately 1 billion bytes.

gigabyte

one ___ equals one billion ticks of the system clock per second

gigahertz

Botnets

group of compromised computers connected to a network such as the internet that are used as part of a network that attacks other networks usually for nefarious purposes.

Script kiddie

has the same intent as a cracker but does not have the technical skills and knowledge. Script kiddies often use pre-written hacking and cracking programs to break into computer.

A ___ is a small ceramic or metal component with fins on its surface that absorbs and disperses heat produced by electrical components, such as a processor.

heat sink

____ allows you to insert and remove a device while the computer is running.

hot plugging

Which of the following statements is NOT true when setting up dual channeling?

if you have two pairs installed in two channels, all four DIMMs must match

false

in binary system, the digit I represents the absence of an electronic charge

true

in cloud computing, the back end consists of ht servers and storage devices that manage and store devices that manage and store the resources accessed by users.

false

in general, multi core processors are less energy efficient than separate multiple processors.

fetching

in the machine cycle, the _____ operation obtains a program or application instruction or data item from memory.

Mice, trackpads, keyboards, scanners, and joysticsks are all examples of _______ devices

input

Macros

instructions saved in software such as a word processing or spreadsheet program.

transistor

integrated circuit component that acts as an electronic switch that opens or closes the circuit for electrical charges

when a computer's power is turned off, ____ memory loses its contents.

volatile

decision support system (DSS)

interactive applications that support decision making

processor/CPU

interprets and carries out the basic instructions that operate a computer; significantly impacts th overall computing power and manages most of the computers operations.

what does a Keygen do?

it creates software registation numbers

if the web address begins with https instead of http what do you know about the website

it is secure

Words that have a special meaning in a programming language are called

key words

Not a recommended practice for gaming safety

look for games that use active X or java script as they are always safe

Which process writes sector markings to a hard drive?

low-level formatting

For every instruction, a processor repeats a set of four basic operations, which comprise a ___ cycle.

machine

motherboard

main circuit board of system unit. Many electronic components attach to it, others are built into it.

Malware is short for ______ software

malicious

___ are applications that incorporate data from multiple providers into a new application.

mashups

____ consists of electronic components that store instructions waiting to be executed by the processor, data needed by those instructions, and the results of processing the data.

memory

helps speed the processes of the computer because it stores frequently used instructions and data

memory cache

small circuit board

memory module

motherboard hold memory modules

memory slots

An operating system allocates resources like _____ to _______

memory.....programs that are running

term used by some computer manufacturers to refer to a personal computer chip

microprocessor

Which of the following memory configurations definitely will not work when populating a motherboard with DIMMs?

mixing unbuffered with registered

false

most RAM is nonvolatile

the ___ is the main circuit of the computer

motherboard

A(n) ___ processor is a single chip with two or more separate processor cores

multi-core

What is the general name of the processor feature that AMD calls HyperTransport?

multithreading

What unit of measurement is used for DIMM read and write times?

nanoseconds

examples of ___ memory include ROM, flash memory, and CMOS.

nonvolatile

Pin stands for personal identification _______

number

word size

number of bits the processor can interpret and execute at a given time

true

on a personal computer, all functions of the processor usually are on a single chip.

Because computers are electronic devices powered by electricity, they have only two states:

on and off

hertz

one cycle per second

Cybercrime

online or internet-based illegal acts

When a user starts a computer, portions of the __________load into memory from the computer's hard disk

operating system

three categories of items stored in computer memory

operating system and other programs; applications; data being processed

Trusted Source

organization or person you believe will not send a virus infected file knowingly.

Monitors, printers, and status lights are all examples of ________ devices

output

arithmetic logic unit (ALU)

performs arithmetic, comparison, and other operations

microprocessor

personal computer processor chip

A slate tablet typically does not include a

physical keyboard

Passcode is another term for a

pin

____ means the computer automatically can recognize peripheral devices as you install them

plug and play

The ability of a language to let a programmer develop a program on computer system that can be run on other systems is called

portability

(laptop AC) adapter converts the wall outlet AC power into DC power

power supply

The ____ or laptop AC adapter converts the wall outlet AC power into DC power.

power supply

Encryption

process of converting readable data into unreadable characters to prevent unauthorized access

real time processing

processing of data or transactions as they occur

the ___ interprets and carries out the basic instructions that operate a computer

processor

What are the two main components of the motherboard?

processor and memory

Anti-virus program

protects a computer against viruses by identifying and removing any computer viruses found in memory, on storage media or on incoming files.

this is not a green computing recomendation

purchase low efficiency equipment

ROM

read only memory; memory chips storing permanent data & instructions

storage device

records (writes) and/or retrieves (reads) items to and from storage media

what-if analysis

refers to changing assumptions or data in the model to see the impacts of those changes on the outcome

A DIMM that holds data and amplifies a signal before the data is written to the module uses which technology?

registers

A processor contains small, high-speed storage locations, called ___, that temporarily hold data and instructions.

registers

small, high-speed storage locations contained in a processor

registers

An identifier that cannot be used as a variable name is known as a

reserved word

The purpose of running a program with different combinations of data is to expose ______ errors and ______ errors.

run-time......logical

processor

same as CPU

A(n)____ often uses prewritten hacking and cracking programs

script kiddie

the pace of the system clock, called clock speed, is measured by the number of ticks per

second

DDR2

second generation of DDR; faster than DDR

real-time clock

separate battery-backed chip that keeps track of the date & time in a computer; battery runs on this even when the computer is off

Online Service Provider (OSP)

similar to an ISP, in addition to providing Internet access, they also posess many other memers-only features, such as instant messaging or their own customized version of the web. ie: AOL and MSN

On a personal computer, all functions of the processor usually are on a

single chip

SIMM

single inline memory module;• Pins on opposite sides of the circuit board that connect together to form a single set of contact

memory ____ on the motherboard hold memory modules

slots

chip

small piece of semiconducting materials, usually silicon, on which integrated circuits are etched.

registers

small, high speed storage locations contained in a processor

registers

small, high speed storage locations in a processor

Which of the following is NOT true about hard disk drives?

sold state drives are less expensive than magnetic hard drives

hacker

someone who accesses a computer or network illegally (has advanced computer and network skills)

cracker

someone who accesses a computer or network illegally but has the intent of destroying data, stealing information, or other malicious action (has advanced computer and network skills)

cyberextortionist

someone who uses e-mail as a vehicle for extortion. these perpetrators send organization a threatening e-mail message indicating they will expose confidential information, exploit a security flaw, or launch an attack that will compromise the organization's network- if they are not paid a sum of money.

Cyberterrorist

someone who uses the internet or network to destroy or damage computers for political reasons.

The code that a programmer writes is called

source code

A compiler translates

source code into executable code

data silo

stand-alone data stores available for a specific function or department, but not accessible by other ISs

the role of memory to store both data and programs is known as the ___ concept.

stored program

CMOS

stores date, time, all device settings

FERPA regulates the confididentiality of

students educational recorrds

processors today typically are ___, which means they can execute more than one instruction per clock cycle.

superscalar

Application Software is any software that runs with the

support of the operating system

master data management (MDM)

synchronizes all business critical data from disparate systems into a master file, which provides a trusted data source

SDRAM

synchronous DRAM; synchronized to the system clock; much faster than DRAM

The rules that govern the correct order and usage of the elements of a language are called the

syntax

The motherboard is sometimes called a(n) ______ board.

system

the processor relies on a small quartz crystal circuit called the ___ to control the timing of all computer operations

system clock

the term, ___, refers to the case on a desktop that contains and protects the motherboard, hard disk drive, memory, and other electronic components.

system unit

Which of the following is NOT a necessary precaution when installing memory modules?

test the motherboard for residual electrical charges

motherboard

the ______ is the main circuit board of the computer.

control unit

the component of the processor that directs and coordinates most of the operations in the computer; it interprets each instruction issued by a program and then initiates the appropriate action to carry out the instruction

data governance

the control of enterprise data through formal policies and procedures to help ensure that data can be trusted and are accessible

Supercomputers

the fastest, most powerful type of computer-and the most expensive

top-level domain (TLD)

the last section of a domain name, identifies the type of organization associated with the domain. ie: ".com", ".edu", ".net"

Internet backbone

the major carriers of network traffic on the Internet

true

the motherboard also is called a system board

true

the power supply converts the wall outlet AC power into DC power

false

the processor interprets and executes a program or application's instructions while the program or application is in nonvolatile memory.

data

the raw material from which information is produced; and the quality, reliability, and integrity of the data must be maintained for the information to be useful

bit

the smallest unit of data the computer can process

false

the system clock keeps track of the date and time in a computer

IoT

the term, ______ describes a computing environment where everyday objects are connected to the internet.

domain name

the text version of an IP address

information management

the use of IT tools and methods to collect, process, consolidate, store, and secure data from sources that are often fragmented and inconsistent

Unauthorized use

the use of a computer or its data fro unapproved or possibly illegal activites

IaaS

the use of software to emulate hardware capabilities, enabling computer to scale or adjust up or down, storage, processing power, or bandwidth as needed.

Online security service

website that evaluates your computer to check for internet and e-mail vulnerabilities. (Service then provides recommendations of how to address the vulnerabilities)

volatile

when turned off, is gone. ie: RAM (random access memory)

non-volatile

when turned off, remains. ie: ROM (read-only memory)

storage media

where a computer keeps data, instructions, and information

ASCII

widely used coding scheme to represent a set of characters

the number of bits the processor can interpret and execute at a given time

word size

storing

writing the result to memory; part of the machine cycle

RAM, random-access memory, is called that because

you can pick any two random locations and it will take the same time to access the data

Liquid Cooling Technology

Uses a continuous flow of fluid(s), such as water and glycol, in a process that transfers the heated fluid away from the processor to a radiator-type grill, which cools the liquid, and then returns the cooled fluid to the processor

Analog

Uses continuous (wave form) signals that vary in strength and quality Example: Human speech

Infrastructure as a Service (IaaS)

Uses software to emulate hardware capabilities, enabling companies to scale, or adjust up or down, storage, processing power, or bandwidth as needed

2 Ways that Mobile Computers and Devices Can Run

Using a power supply Using batteries

Badges cards, smart cards. ans keys are examples of ____ objects

Possesed

bus width

determines the number of bits that the computer can transmit at one time

Which of the following is NOT a component of a processor?

device driver

When a program is not running, it is stored on a

disk

alphanumeric characters

...letters & numbers

inoculate

(to inoculate a program file) the antivirus program records information such as the file size and file creation date in a separate inoculation file. The antivirus program then uses this information to detect if a virus tampers with the data describing the inoculated program file.

gigabyte

...(billion)- 500,000 pages of text, 600 photos, etc.

backside bus

...- connects processor to cache

L3 cache

...- on the motherboard; separate from the processor chip; exists only on computers that use L2 advanced transfer cache

terabyte

...1 trillion bytes

machine cycle

...4 basic operations: fetching, decoding, executing, storing

system bus

...AKA front side bus (FSB); part of the motherboard & connects the processor to main memory

video card

...AKA graphics card; converts computer output into a video signal that travels through a cable to the monitor, which displays an image on the screen

graphics card

...AKA video card; converts computer output into a video signal that travels through a cable to the monitor, which displays an image on the screen

ASCII

...Amer. Stand. Code for Info. Exchange- most widely used coding scheme to represent a set of characters

firmware

...ROM chips that contain permanently written data, instructions, or information (such as a computer's startup instructions)

expansion bus

...allows processor to communicate with peripheral devices

hot plugging

...allows you to insert & remove a device while computer is running

access time

...amount of time it takes the processor to read data, instructions, & information from memory • Directly affects how fast the computer processes data

mashups

...apps that incorporate data from multiple providers into a new app

arithmetic operations

...basic calculations such as addition, subtraction, multiplication, division

byte

...basic storage unit in memory • Each byte resides in a location in memory that has an address

bit

...binary digits o Smallest unit of data the computer can process

antistatic wristband

...bracelet designed to protect electronics from an electrostatic discharge by preventing a buildup of static electricity on a user

advanced transfer cache

...built directly on the processor chip

L1 cache

...built directly on the processor chip; small capacity

superscalar

...can execute more than one instruction per clock cycle

system unit

...case on a desktop that contains & protects the motherboard, hard disk drive, memory, & other electronic components

chassis

...case on a desktop that contains & protects the motherboard, hard disk drive, memory, & other electronic components (system unit)

bus

...channel through which bits are transferred along

address bus

...channel through which bits are transferred along; used to transfer info about where the data should reside in memory

static RAM

...chips are faster & more reliable; do not have to be reenergized as often; much more expensive

dynamic RAM (DRAM)

...chips must be reenergized constantly or they lose their contents; variations exist

comparison operations

...comparing one item with another o Result det. What actions occur

plug & play

...computer automatically can recognize peripheral devices as you install them

analog

...continuous, wave form signals that vary in strength & quality • Human speech

nonvolatile memory

...doesn't lose contents when power is removed • Permanent • ROM, flash memory, CMOS

USB adapter

...dongle that plugs into a USB port; enhances functions of a mobile computer and/or provides connections to peripheral devices

clock cycle

...each tick on system clock

memory

...electronic components that store instructions waiting to be executed by the processor, data needed by those instructions, & the results of processing the data

sound card

...enhances the sound generating capabilities of a personal computer by allowing sound to be input through a microphone & output through external speakers or headphones

memory cache

...helps speed the processes of the computer b/c it stores frequently used instructions & data

memory slots

...hold memory modules; on motherboard

Cellular Seizure Investigation stick

...inserted into cell phone to download sensitive data

central processing unit

...interprets & carries out the basic instructions that operate a computer

Platform as a Service (PaaS)

Application developers need to maintain computers running specific hardware, operating systems, development tools, databases, and other software Allows developers to create, test, and run their solutions on a cloud platform without having to purchase or configure the underlying hardware and software

Mashups

Applications that incorporate data from multiple providers into a new application

Mashup

Applications that incorporate data from multiple providers into a new application.

mashups

Applications that incorporate data from multiple providers into a new application.

*Cache*

Area of memory that stores the contents of frequently used data or instructions.

cache

Area of memory that stores the contents of frequently used data or instructions.

3 Types of Internal Components that the Control Unit Directs

Arithmetic logic unit Registers Buses

Intrusion detection software

Automattically analyzes all network traffic, assesses system bulnerabilities, identifies any unauthorized intrusions, and notifies network administrators of suspicious behavior patterns or system breaches.

Arithmetic Operations

Basic calculations such as addition, subtraction, multiplication, and division

Bus

Bits transfer internally within the circuitry of the computer along electric channels Each channel allows the various devices both inside and attached to the system unit to communicate with each other

Antistatic Wristband

Bracelet designed to protect electronics from an electrostatic discharge by preventing a buildup of static electricity on a user Has an attached clip that you connect to any bare metal surface, which acts as a ground

antistatic wristband

Bracelet designed to protect electronics from an electrostatic discharge by preventing a buildup of static electricity on a user.

L1 Cache

Built directly on the processor chip Usually has a very small capacity

expansion bus

Bus that allows the processor to communicate with peripheral devices.

backside bus (BSB)

Bus that connects the processor to cache.

front side bus (FSB)

Bus that is part of the motherboard and connects the processor to main memory.

This is not true about CAPTCHAs

CAPTCHAs were developed to verify input, is coming from computer programs not humans

When a program runs on a computer, the part of the computer that carries out the instructions is called the

CPU

Processing

CPU stands for central _____ unit.

L1 cache

Cache built directly on the processor chip.

L3 Cache

Cache on the motherboard that is separate from the processor chip Exists only on computers that use L2 advanced transfer cache

L3 cache

Cache on the motherboard that is separate from the processor chip.

*Memory Cache*

Cache that helps speed the processes of a computer by storing frequently used instructions and data.

memory cache

Cache that helps speed the processes of a computer by storing frequently used instructions and data.

L2 cache

Cache that is slightly slower than L1 cache but has a much larger capacity.

False

Cambria and Calibri are examples of font styles.

Transistor

Can act as an electronic switch that opens or closes the circuit for electrical charges

Feature of a Smartphone

Case is often behind the display

2 Features of Convertible Tablets

Case is positioned below a keyboard, providing functionality similar to a laptop Display attaches to the case with a swivel-type hinge, enabling the user to rotate the display and fold it down over the keyboard to look like a slate tablet

Desktop as a Service

Companies specifying the applications, security settings, and computing resources available to employees on their desktop computers Images, or configurations, provide a common desktop work environment available to employees across an entire organization Also known as virtual desktop

Comparison Operations

Comparing one data item with another to determine whether the 1st item is greater than, equal to, or less than the other item

CMOS

Complementary metal-oxide semiconductor; technology used by some RAM chips, flash memory chips, and other types of memory chips that provides high speeds and consumes little power by using battery power to retain information even when the power to a computer is off.

Control Unit

Component of the processor that directs and coordinates most of the operations in the computer Has a role much like a traffic officer: it interprets each instruction issued by a program or an application and then initiates the appropriate action to carry out the instruction

*Arithmetic Logic Unit (ALU)*

Component of the processor that performs arithmetic, comparison, and other operations.

arithmetic logic unit

Component of the processor that performs arithmetic, comparison, and other operations. Also called ALU.

*Power Supply*

Component of the system unit that converts wall outlet AC power to the DC power that is used by a computer.

power supply

Component of the system unit that converts wall outlet AC power to the DC power that is used by a computer.

Zipped

Compressed files sometimes are called _____ files.

Cert/CC

Computer Emergency Response Team Coordination Center (A federally funded internet security research and development center)

Plug and Play

Computer can automatically recognize peripheral devices as you install them Can plug in a device and then immediately begin using it

Software as a Service (SaaS)

Computing environment where an Internet server hosts and deploys (utilize) applications Examples: Google Docs

software as a service (SaaS)

Computing environment where an Internet server hosts and deploys applications.

stored program concept

Concept of using memory to store both data and programs.

Hot Plugging

Concept that you can change a removable flash memory device without having to open the system unit or restart the computer Allows you to insert and remove a device while the computer is running

Backside Bus (BSB)

Connects the processor to cache

RAM (Random Access Memory) (Main Memory)

Consists of memory chips that can be read from and written to by the processor and other devices

3 Features of Cases

Contains and protects the electronics of the computer or mobile device from damage Made out of metal or plastic Available in a variety of shapes and sizes

Integrated Circuit

Contains many microscopic pathways capable of carrying electrical current Can contain millions of elements such as resistors, capacitors, and transistors

Processor Core (Core)

Contains the circuitry necessary to execute instructions

*Analog*

Continuous (wave form) signals.

analog

Continuous (wave form) signals.

The ______ is the component of the processor that directs and coordinates most of the operations in the computer.

Control Unit

2 Components of Processors

Control Unit Arithmetic Logic Unit (ALU)

Video Card (Graphics Card)

Converts computer output into a video signal that travels through a cable to the monitor, which displays an image on the screen

Power Supply (Laptop AC Adapter)

Converts the wall outlet AC power into DC power

Fan

Cooling device in computers that are meant to be quiet and can be regulated by temperature.

Which type of memory can support quad, triple, and dual channels?

DDR3

Accessibility

Data and/or applications are available worldwide from any computer or device with an Internet connection

2 Components of a Bus

Data bus Address Bus

Memory Cache

Helps speed the processes of the computer because it stores frequently used instructions and data

4 Features of Cloud Computing

Environment of servers that house and provide access to resources users access via the Internet Consists of a front and back end, connected to each other through a network Front end includes the hardware and software with which a user interacts to access the cloud Back end consists of servers and storage devices that manage and store the resources accessed by users

Terabyte (TB)

Equal to approximately 1 trillion bytes

Gigabyte (GB)

Equals approximately 1 billion bytes

Gigahertz (GHz)

Equals to one billion ticks of the system clock per second

A dual-core processor doubles the processing speed of a single-core processor.

False

Each processor core on a multi-core processor generally runs faster than a single-core processor.

False

If your computer requires that you install memory in pairs, it doesn't matter if the two memory modules are the same type, size, or speed.

False

RAM is an example of nonvolatile memory.

False

The power supply coverts the wall outlet DC power into AC power.

False

Virtual desktop

Feature of cloud computing in which the desktop and its applications appear to be installed on the user's own computer.

hot plugging

Feature that allows you to insert or remove a removable flash memory device and other devices while the computer is running.

___ is the process of obtaining a program or an application instruction or data item from memory.

Fetching

4 Types in the Machine Cycle

Fetching Decoding Executing Storing

You should install a personal ______ a program that protects your computer from unauthorized access by blocking certain types of communications

Firewall

Which type of memory is the main memory installed as DIMMs on a motherboard?

Flash RAM

Space Savings

Floor space required for servers, storage devices, and other hardware shifts away from the user

Points

Font size is gauged by a measurement system called ______.

To promote understanding of software piracy.

For what purpose was the BSA formed?

4 Ways Buses Can Transfer Bits

From input devices to memory From memory to the processor From the processor to memory From memory to output or storage devices

management information system (MIS)

General-purpose reporting systems. objective is to provide reports to managers for tracking operations, monitoring, and control

Data as a Service (DaaS)

Government agencies, companies, and social media sites make data available for developers to incorporate in applications or to use when making business decisions and plans Allows users and application to access a company's data

A(n) ___ was originally a complimentary work for a computer enthusiast

Hacker

Firewall

Hardware and/or software that protects a networks resources from intrusion by users on another network such as the internet.

SIMM (Single Inline Memory Module)

Has pins on opposite sides of the circuit board that connect together to form a single set of contacts

Intel-Compatible Processor

Have an internal design similar to Intel processors, perform the same functions, and can be as powerful, but often are less expensive

3 Types of Technology That Help to Further Dissipate Processor Heat

Heat Sinks Liquid Cooling Technologies Cooling mats

2 Features of Flash Memory

Most computers use it to hold their start-up instructions because it allows the computer to update its contents easily Store data and programs on many mobile devices and peripheral devices, such as smartphones, portable media players, printers, digital cameras, automotive devices, and digital voice recorders

ASCII (American Standard Code for Information Interchange)

Most widely used coding scheme to represent a set of characters

Memory Slots

Motherboard that holds memory modules

RDRAM (Rambus DRAM)

Much faster than SDRAM

Is HTML a programmable language?

No

Word Size

Number of bits the processor can interpret and execute at a given time

Binary System

Number system that has just 2 unique digits, 0 and 1, called bits

*Binary System*

Number system that has just two unique digits, 0 and 1, called bits.

Binary

Number system that has just two unique digits, 0 and 1, called bits.

binary system

Number system that has just two unique digits, 0 and 1, called bits.

4 Types of Characters That Can Be Used to Represent a Byte

Numbers Uppercase and lowercase letters of the alphabet Punctuation marks Other keyboard symbols, such as an asterisk (*), ampersand (&), and dollar sign ($)

gigabyte (GB)

One billion characters.

Gigahertz (GHz)

One billion ticks of the system clock per minute.

*Gigahertz (GHz)*

One billion ticks of the system clock per second.

gigahertz (GHz)

One billion ticks of the system clock per second.

Nanosecond

One billionth of a second.

nanosecond (ns)

One billionth of a second.

hertz

One clock cycle per second.

Hertz

One cycle per second

arithmetic operations

Operations that involve basic calculations such as addition, subtraction, multiplication, and division.

comparison operations

Operations that involve comparing one data item with another to determine whether the first item is greater than, equal to, or less than the other item.

Which of the following is true about disk drive interfaces?

PATA allows for two connectors on a motherboard

Clock Speed

Pace of the system clock, which is measured by the number of ticks per second

cooling pad

Pad that rests below a laptop and protects the computer from overheating and also the user's lap from excessive heat.

System Bus (Front Side Bus) (FSB)

Part of the motherboard and connects the processor to main memory

Feature of Arithmetic Logic Unit

Performs calculations on the data in memory

Microprocessor

Personal computer processor chip

PIN

Personal identification number, a numeric password, either assigned by a company or selected by a user.

DIMM (Dual Inline Memory Module)

Pins on opposite sides of the circuit board do not connect and, thus, form 2 sets of contacts

Memory module

Place where RAM chips usually reside Small circuit board

Chip

Place where the circuitry for the processor, memory, and other components reside on personal computers Small piece of semiconducting material, usually silicon, on which integrated circuits are etched

___ allows developers to create, test, and run their solutions on a cloud platform without having to purchase or configure the underlying hardware and software.

Platform as a Service

5 Features of RAM (Random Access Memory)

When you turn on power to a computer or mobile device, certain operating system files are loaded into RAM from a storage device such as a hard disk Files remain in RAM as long as the computer or mobile device has continuous (Same thing occurs when additional applications are data are requested from storage into RAM) Processor interprets and executes a program or application's instructions while the program or application is in RAM Can accommodate multiple programs and applications simultaneously Most is volatile - must save any data, instructions, and information you may need in the future

L3

Which cache level is on the motherboard and is separate from the processor chip?

MIDI

Which of the following adapter cards connects to musical instruments?

Processor and memory

Which of the following are two main components on the motherboard?

When you enter your name into one account & you are automatically signed into other accounts and services.

Which of the following best describes a single sign on account?

Reorganizing the hard disk so that files are stored in contiguous sectors.

Which of the following best describes disk defragmentation?

To map characters to numeric values that a computer can process

Which of the following best describes the use of ASCII?

PaaS

Which of the following cloud services allows developers to create, test, and run solutions on a cloud platform without having to purchase the underlying hardware and software?

IaaS

Which of the following cloud services uses software to emulate hardware capabilities, such as to increase or decrease bandwidth or storage to meet changing needs?

Office

Which of the following is NOT an example of an operating system?

Presentations are viewed as clip shows

Which of the following is NOT true about presentation software?

The case on a smartphone often is in front of the display.

Which of the following is NOT true about system units?

Some software touted as offering malware protection actually installs more malware.

Which of the following is recommended to avoid malware infections?

Rack

Which of the following server types is housed in a slot on a metal frame?

Supercomputer

Which of the following would not fit on a desk or your hand?

4 Options for eCycling

Wireless carriers and big box retailers Not-for-profit organizations Secondary market EPA

You realize that your computer has been infected by malware, the program has been copying itself repeatedly using up resources, what type of malware might you have?

Worm

Storing

Writing the result to memory

Virtual

You are an IT consultant. A small business client wants to explore cloud computing services as a way to save money and space. The business wants to provide a common work environment of applications, security settings, and computing resources, without requiring all of these to reside on users' computers. You recommend a ______ desktop.

Law enforcement officials cannot access email messages stored on the cloud without informing the user first.

You are curious about cloud data privacy, so you do some research on the potential risks, as well as protection methods and regulations. Which of the following is NOT true about cloud data privacy?

Augmented reality

You are viewing a 3D graphic of a human body that you can use to visualize various muscles and organs by zooming in and out. What type of app are you likely using?

this is not a part of typically single user liscence agreement

You can rent or lease the software

Comparison

You have been studying processors. Your instructor has asked you to help prepare a lecture for introductory students learning about processors. You explain that when payroll software determines which employees should receive overtime based on hours worked, it is a result of a _______ operation.

Worm

You realize your computer has been infected with malware. The program has been copying itself repeatedly, sing up resources. What type of malware might you have?

Always stay connected to the Internet.

You recently purchased a new laptop for home. You want to ensure that you are safe from malware. You should make sure to do all of the following EXCEPT ______.

Cell

Your boss, Molly, asks you to create a spreadsheet for sales data for the store at which you both work. In a spreadsheet, B4 represents a _____.

Purchase software separately rather than having it bundled with the computer.

Your friend Marvin works weekends in an electronics store selling computers. You are in the market for a new desktop for your home. Which of the following does Marvin NOT recommend you do?

Count the cash immediately to ensure you receive the right amount.

Your school is in a safe neighborhood but there have been a few thefts at ATMs. You work part-time in your school's campus security office and have been asked to prepare tips for students about ATM safety. Which of the following will you NOT recommend?

Another term for Botnet is ______ army

Zombie

Word

_____ size is the number of bits the processor can interpret and execute at a given time.

Cloud

______ computing refers to an environment that provides resources and services accessed via the Internet

arithmetic operations

______ include basic calculations such as addition, subtraction, multiplication, and division.

mashups

_______are applications that incorporate data from multiple providers into a new application.

a multi core processor

a ______ is a single chip with two or more separate processor cores.

A bit is

a binary digit, like 0 or 1

system unit

a case that contains electronic components of the computer used to process data, they come in a variety of shapes and sizes.

volatility

a characteristic of databases that refers to the process by which databases are constantly in use or being updated

network

a collection of computers and devices connected together, often wirelessly, via communication devices and transmission media

desktop computer

a computer that is designed so the system unit, input devices, output devices, and many other devices fit entirely on or under a desk or table

What two components work together to perform processing operations inside a processor/CPU?

a control unit and an arithmetic logic unit (ALU)

false

a dual core processor doubles the processing sped of a single core processor.

cloud computing

a general term that refers to a style of computing in which IT services are delivered on-demand and accessible via the Internet. Common examples are Dropbox, Gmail, and GoogleDrive

data center

a location storing a large number of network servers used for the storage, processing, management, distribution, and archiving of data, systems, web traffic, services, and enterprise applications. Also refers to the building or facility that houses the servers and equipment

In object-oriented programming a class is

a model or template from which objects are created

Rootkit

a program that hides in a computer and allows someone from a remote location to take full control or the computer. Once the rootkit is installed, the rootkit author can execute programs, change settings, monitor activity, and access files on the remote computer. Although rootkits can have legitimate uses, such as in law enforcement, their use in nefarious and illegal activities is growing rapidly.

Trojan horse

a program that hides within or looks like a legitimate program. A certain condition or action usually triggers the trojan horse. trojan horse does not replicate itself to other computers.

database

a repository or data store that is organized for efficient access, search, retrieval, and update

operating system

a set of programs that coordinates all the activities among computer hardware devices

platform as a service (PaaS)

a set of tools and services that make coding and deploying these apps faster and more efficient

public cloud

a shared cloud architecture run over a public network, such as the Internet. It allows multiple clients to access the same virtualized services and utilize the same pool of servers across a public network

On a personal computer, all functions of the processor usually are on ___

a single chip

private cloud

a single-tenant environment with stronger security and control for regulated industries and critical data. A ________ ______ resides within an enterprise's own network and firewall

virtual machine (VM)

a software-created computer or operating system

transaction processing system (TPS)

a system designed to process specific types of data input from ongoing transactions

virtualization

a technique that creates multiple operating systems that run on a single physical machine

flash memory

a type of non-volatile memory that can be erased and electronically re-written

infrastructure as a service (IaaS)

a way of delivering cloud computing infrastucture as an on-demand service. Rather than purchasing servers...companies instead buy all computing resources as a fully outsources service

software as a service (SaaS)

a widely used model in which software is leased and available on demand instead of being owned or licensed from the vendor

Internet

a worldwide collection of networks that connects millions of businesses, government agencies, educational institutions, and individuals

adapter card

a(n)_______ is a circuit board that enhances the functions of a component of a desktop or servers system unit and/or provides connections to peripheral devices.

____ is the amount of time it takes the processor to read data, instructions, and information from memory.

access time

A(n) ____ is a circuit board that enhances the functions of a component of a desktop or server system unit and/ or provides connections to peripheral devices.

adapter card

A byte in memory is identified by a unique number called its

address

A(n) ___ is a unique number that identifies the location of a byte in memory.

address

System software

consists of the programs that control or maintain the operations of the computer and its devices. It serves as the interface between the user, the application software, and the computer's hardware.

integrated circuit

contains many microscopic pathways capable of carrying electrical current; can contain millions of resistors, capacitors, & transistors

The ___ is the component of the processor that directs and coordinates most of the operations in the computer

control unit

A ___ rests below a laptop and protects the computer from overheating and also the user's lap from excessive heat.

cooling pad

A(n)____ has a goal of destroying data or stealing information

cracker

A(n)____ demands payment to stop an attack

cyberextortionist

master data

data about the entities of importance to an enterprise, such as customers, products, accounts, and other business-critical data information that are needed for operations and business transactions

dirty data

data of such poor quality that they cannot be trusted or relied upon for decisions

information

data that have been processed, organized, or put into context so that it has meaning and value to the person receiving it

unstructured decisions

decisions that depend on human intelligence, knowledge, and/or experience- as well as data and models to solve them

structured decisions

decisions that have a well-defined method for solving and the data needed to rech a decision

Software as a Service

describes a computing environment where an internet server hosts & deploys applications (example: Salesforce)


Conjuntos de estudio relacionados

Temp. and Thirst - Practice Quizzes

View Set

CJ chapter 4 The Exclusionary Rule

View Set

UTM Krueger Bio 130 Mock Exam 4

View Set

Emergency Care and Transportation of the Sick and Injured 12th Edition - Chapter 24: Gynecologic Emergencies

View Set