Intro to Digital Technology Final Exam Study Guide
In HTML, the combination of Red, Green and Blue values from 0 to 255 gives a total of more than ____________ different colors to play with.
16 million
The ______________ of a computer can be modified.
BIOS
So computers use binary numbers, and therefore use ______________ in place of decimal digits.
Binary digits
When applications begin to be loaded into memory, they are loaded in _______________ determined by the operating system.
Block sizes
____________ is what is called a compiled language.
C
Which language is an extension of C?
C++
Becoming ____________ can increase your salary, enhance your skills and make your job more satisfying.
Certified
The purpose of ________________ is to search, preserve and analyze information on computer systems to find potential evidence for a trial.
Computer forensics techniques
All servers on the Internet also have human-readable names, called ______________.
Domain names
_____________ is the most popular and least expensive way information can travel through a network.
Ethernet
The shape and layout of a motherboard is called the ______________.
Form factor
In 1991, Congress passed the _______________ to create the National Research and Education Network.
Gore Bill
Learning ___________ is probably the single most important thing you'll ever do if you want to create your own personal Web site.
HTML
Search engines use your ____________ to index the structure and content of your web pages.
Headings
The ______________ is an amazing computing device and the fastest processor available right now.
Human brain
What does HTML stand for?
HyperText Markup Language
_______________ can point to any resource on the web: an HTML page, an image, a sound file, a movie, etc.
Hyperlinks
Every machine on the Internet has a unique identifying number, called a(n) _____________.
IP Address
The ___________ statement allows you to control if a program enters a section of code or not based on whether a given condition is true or false.
If
The spreading part of the virus is this ________________ phase of the virus.
Infection
The software that does all the _______________ and the _______________ with the user and with hardware devices is called the operating system.
Interrupt handling; communication
The basic development system for Java programming is usually referred to as the ________________.
Java Development Kit
LAN stands for _______________.
Local Area Network
A blog is normally a single page of entries. There may be archives of older entries, but the "________________" of a blog is all anyone really cares about.
Main page
Local area network technologies connect __________ devices that are relatively ___________ to each other, usually in the same building
Many; close
______________ includes information like when a file was created or last altered.
Metadata
A _____________ allows all the parts of your computer to receive power and communicate with one another.
Motherboard
In machine language, data can only be referred to by giving the ______________ of the location in memory where it is stored.
Numerical address
The first host-to-host connection, from UCLA to SRI, was made on ________________.
October 29, 1969
The _______________ is charged with managing the hardware and the distribution of its resources.
Operating system
With the right software, you can retrieve deleted files as long as they haven't been _____________.
Overwritten
What are the two basic types of LANs?
Peer-to-peer and client/server
The operating system's tasks, in the most general sense, fall into what six categories?
Processor management, memory management, device management, storage management, application interface, and user interface
____________ connect multiple Ethernet segments, listening to each segment and repeating the signal heard on one segment onto every other segment connected.
Repeaters
So how did the Internet really get started? Believe it or not, it all began with a ______________.
Satellite
To find information on the hundreds of millions of Web pages that exist, a _____________ employs special software robots, called _____________.
Search engine; spiders
Both ____________ and ____________ are often accompanied by a license agreement that sets forth the terms and conditions of use of that product.
Shareware; freeware
HTML works in a very ____________, very ____________, format. It reads like you do, top to bottom, left to right.
Simple; logical
Xerox PARC developed a program called ______________, and Bell Labs developed a language called '__________.'
Smalltalk; C
____________ is protected under the very same laws that govern music, literature, movies and other copyrighted content.
Software
The _____________ of the RAM connection directly controls how fast the computer can access instructions and data, and therefore has a big effect on system performance.
Speed
______________ collects personal information about you.
Spyware
Most HTML tags must have a ____________ and ____________ tag for the browser to recognize the command.
Start; end
Java was developed by ______________.
Sun Microsystems
____________ allows a network to maintain full-duplex Ethernet.
Switching
__________________, a non-profit group established in 1992, oversees the formation of the policies and protocols that define how we use and interact with the Internet.
The Internet Society
Computer viruses are called viruses because...?
They share some of the traits of biological viruses
What is the purpose of web browsers?
To read HTML documents and display them as web pages
In computer networking, ____________ refers to the layout of connected devices.
Topology
Being able to have your program repeatedly execute a block of code is one of the most basic but ____________ tasks in programming.
Useful