M5, M6, M7 Introduction to computing

¡Supera tus tareas y exámenes ahora con Quizwiz!

circuit

Just as vehicles travel on a highway, bits travel on a(n) ______.

UPC

Kind of bar code used by retail and grocery stores

malicious

Malware is short for ______ software.

Converts a scanned image into a text file that can be edited, such as with a word processing application

Many scanners include OCR software. What does OCR software do?

clock speed

Measured in ticks per second

flat-panel

Most current displays are a type of ______ display.

binary

Number system that has just two unique digits

convertible

On a(n) ______ tablet, the case is positioned below a keyboard, attached by a hinge that enables the user to fold the display down over the keyboard.

gigahertz

One billion ticks of a system clock per second

Number

PIN stands for personal identification ______.

PIN

Passcode is another term for a(n) ______.

firmware

ROM chips called ______ contain permanently written instructions, or information, such as start-up instructions.

processor

The ______ interprets and carries out the basic instructions that operate a computer.

ALU

The ______ is the component of the processor that performs arithmetic and comparison operations.

MICR

The banking industry almost exclusively uses ______ for check processing.

rom

The data on most of this type of chip cannot be modified

cmos

The flash memory chips that store a computer's startup information frequently use this kind of technology

motherboard

The main circuit board

ascii

The most widely used coding scheme to represent a set of characters

system

The motherboard is sometimes called a(n) ______ board.

word size

The number of bits a processor can interpret and execute at a given time

clock

The system ______ generates regular electronic pulses that set the operating pace of the system unit.

cybercrime

The term ______ refers to online or Internet-based illegal acts.

multi-core

This kind of processor is a single chip with two or more processor cores

dynamic, static

Two commons types of RAM are ______ RAM and ______ RAM.

nonvolatile

Type of memory that can keep its contents when the power is removed from the computer

audio

VoIP is a type of ______ output.

Creates software registration numbers.

What does a keygen do?

A file that records access attempts.

What is an audit trail?

distributed

When a botnet is used to attack computers or networks, it is called a(n) ______ DoS attack.

Can execute more than one instruction per clock cycle

Which of the following best defines superscalar, as it pertains to processors?

A program or set of instructions that allows user to bypass security controls when accessing a program, computer, or network.

Which of the following best describes a back door?

When you enter your name into one account and you are automatically signed into other accounts and services.

Which of the following best describes a single sign on account?

You can rent or lease the software.

Which of the following is NOT a part of a typical single-user license agreement?

CAPTCHAs were developed to verify input is coming from computer programs, not humans.

Which of the following is NOT true about CAPTCHAs?

If the QR code directs you to a website displaying a form, enter your personal information to ensure your safety.

Which of the following is NOT true about QR codes?

The processor and memory are built into the motherboard.

Which of the following is NOT true about motherboards?

Today's personal computer processors often require additional cooling beyond the capability of the power supply's main fan.

Which of the following is NOT true about processor cooling?

Security experts recommend placing each of your credit cards in separate locations, rather than stacking them.

Which of the following is NOT true about protecting your credit cards from scanning devices?

The case on a smartphone often is in front of the display.

Which of the following is NOT true about system units?

When a system sends an authentication code, it typically does not expire.

Which of the following is NOT true about two-step verification?

Voice recognition is also called talk recognition.

Which of the following is NOT true about voice input?

cables and locks

Which of the following is not recommended to protect against hardware failure?

control unit and ALU

Which two components work together to perform processing operations?

comparison

You have been studying processors. Your instructor has asked you to help prepare a lecture for introductory students learning about processors. You explain that when payroll software determines which employees should receive overtime based on hours worked, it is a result of a(n) ______ operation.

executing

You have been studying processors. Your instructor has asked you to help prepare a lecture for introductory students learning about processors. You explain that when the ALU performs calculations on data, it is part of the ______ process in the machine cycle.

rootkit

You realize your computer has been infected with malware. It seems as if someone is controlling your computer from a remote location. What type of malware might you have?

worm

You realize your computer has been infected with malware. The program has been copying itself repeatedly, using up resources. What type of malware might you have?

always stay connected to the Internet

You recently purchased a new laptop for home. You want to ensure that you are safe from malware. You should make sure to do all of the following EXCEPT ______.

laser beams

You recently started working part-time in a retail store, and are learning about the reading devices your store uses. Your store uses a bar code reader to process items during checkout. What type of technology does the bar code reader use?

QR

You recently started working part-time in a retail store, and are learning about the reading devices your store uses. Your store uses a type of 2-D bar code. What is another term for this type of code?

Broadcast the SSID.

You want to ensure your wireless network is secure. Which of the following should you NOT do?

thermal

You work in a medical lab that requires high-quality dye-sublimation printers. What type of printer do you use?

Diagonally, from one corner to another

Your friend Margo is considering what type of display to purchase with her new desktop computer and she asks you for advice. How do you tell Margo to measure the screens she is considering?

encryption

______ is the process of converting data that is readable by humans into encoded characters.

Decoding

______ refers to the process of translating instructions into signals the computer can execute.

Word

______ size is the number of bits the processor can interpret and execute at a given time.

Morphing

______ transforms one video image into another image over the course of several frames of video.

Zombie

compromised computer or device whose owner is unaware the computer or device is being controlled remotely by an outsider

Script kiddie

hacker who doesnt have the technical skills and knowledge of a cracker

Technology ethics

moral guidelines that govern the use of computers, mobile devices, information systems, and related technologies

Digital certificate

notice that guarantees a user or website is legitimate

Keygen

program that creates software registration numbers and sometimes activation codes

Disc burning software

program that writes text, graphics, audio files on a recordable or rewritable disc

Phishing

scam in which a perpetrator sends a message in an attempt to obtain personal or financial information

Access control

security measure that defines who can access a computer, device, or network, when they can access it, and what actions they can take while accessing it

Cookie

small text that a web server stores on your computer

virtual

​You are an IT consultant. A small business client wants to explore cloud computing services as a way to save money and space. The business wants to provide a common work environment of applications, security settings, and computing resources, without requiring all of these to reside on users' computers. You recommend a(n) ______ desktop.

byte

8 bits

address

A byte's ______ is a unique number that identifies the location of a byte in memory.

certificate

A digital ______ is a notice that guarantees a user or website is legitimate.

differential

A(n) ______ backup copies only the files that have changed since the last full backup.

expansion

A(n) ______ bus allows the processor to communicate with peripheral devices.

backside

A(n) ______ bus connects the processor to cache.

address

A(n) ______ bus is used to transfer information about where the data should reside in memory.

transistor

A(n) ______ can act as an electronic switch that opens or closes the circuits for electrical charges.

cyberextortionist

A(n) ______ demands payment to stop an attack.

cracker

A(n) ______ has a goal of destroying data or stealing information.

Virus

A(n) ______ is a potentially damaging program that affects, or infects, a computer or mobile device negatively by altering the way the computer or device works without the user's knowledge or permission.

bot

A(n) ______ is a program that performs a repetitive task on a network.

Code of Conduct

A(n) ______ is a written guideline that helps determine whether a specification is ethical/unethical or allowed/not allowed.

MIDI

A(n) ______ is a written guideline that helps determine whether a specification is ethical/unethical or allowed/not allowed. Which of the following adapter cards connects to musical instruments?

bit

A(n) ______ is the smallest unit of data a computer can process.

script kiddie

A(n) ______ often uses prewritten hacking and cracking programs.

lock

A(n) ______ screen restricts access to a computer or mobile device until a user performs a certain action.

hacker

A(n) ______ was originally a complimentary work for a computer enthusiast.

Key

An encryption ______ is a set of characters that the originator of the data uses to encrypt, and the recipient of the data uses to decrypt.

Retina Display

An encryption ______ is a set of characters that the originator of the data uses to encrypt, and the recipient of the data uses to decrypt. Which display technology was developed by Apple, produces vibrant colors, and supports viewing from all angles?

algorithm

An encryption ______ is a set of steps that converts readable text into unreadable text.

nanosecond

An extremely fast unit of time

eye

An iris recognition system uses technology to read patterns in the user's ______.

Zombie

Another term for botnet is ______ army.

possessed

Badges, cards, smart cards, and keys are examples of _____ objects.

processing

CPU stands for central ______ unit.

data

DaaS stands for ______ as a service.

spoofing

IP ______ occurs when an intruder computer fools a network into believing its IP address is associated with a trusted source.

It is secure.

If the web address of a website begins with https instead of http, what do you know about the website?

touch

If you sweep your thumb on the mouse to scroll pages, you likely are using what type of mouse?

0, off

In a binary system, the digit ______ represents that electronic state of ______.


Conjuntos de estudio relacionados

MKT494: Data Driven Marketing Final

View Set

Module 9 - Concept and Knowledge Representation

View Set

Business Continuity and Disaster Recovery Planning

View Set

TCI lesson 15: early societies in west africa

View Set