Principles of Computing final

¡Supera tus tareas y exámenes ahora con Quizwiz!

Programs and their data must reside in the computer's ________ when programs run

Memory

________ write the instructions for a computer.

Programmers

The ________ public key cryptosystem, invented by Rivest, Shamir, and Adelman, is one of the popular PKC algorithms.

RSA129

The ability to control when ________ do and don't conduct electricity is the main process used in computer construction

Semiconductors

) Data Fetch gets the values, called _______, from memory that the ALU needs to perform operations like ADD and MULTIPLY.

Sources operands

A company can place a cookie on your computer even if you've never visited its Web site.

True

A field effect transistor is a connector between two wires that can be controlled to allow a charge to flow between the wires (conduct) or not.

True

Android, an open source OS, and Apple's iOS are examples of operating systems for mobile devices.

True

Computers only execute instructions; therefore, rerunning a program with the same data produces exactly the same result every time

True

Cookies can be used to track ad placement on Web sites

True

Each byte in memory is limited in size.

True

Every memory location in the computer is numbered, starting at 0.

True

Information is generated when buying goods and services at a store

True

Starting a computer is called booting.

True

The ADD instruction adds the values, not the address numbers of the memory locations.

True

The United States has not adopted the OECD principles

True

The United States provides limited enforcement of OECD privacy principles.

True

The ability to store different values in its memory locations makes the computer a flexible tool.

True

The laws protecting the information of individuals place more limits on the government than on business.

True

Viruses are often distributed through email attachments.

True

Americans' access to a free credit check to learn their "credit score" and check for errors applies the Fair Information Practices of Purpose and Security.

false

In the United States, the protection of an individual's privacy is the responsibility of the government

false

Opt-in" means the business can use it unless the person explicitly prohibits the new use.

false

Personal computers can only be backed up to another hard disk.

false

The difference between a worm and a virus is that the worm program "rides along" with other software, while the virus can actually send itself to other devices on the Internet.

false

A(n) ________ is a force one object can have on another without touching it.

field effect

A(n) ________ is a barrier between two computers on a network, or between the Internet and a personal computer.

firewall

Recovery after a disaster involves installing the most recent ________ backup copy.

full

________ is the crime of posing as someone else for fraudulent purposes.

identity theft

Computer scientists have not yet proved the invincibility of the RSA scheme, but it can be "made more secure" simply by ________ the size of the key

increasing

The process of executing a program is also called ________.

instruction interpretation

IC is short for ________.

integrated circuit

Spreadsheet columns are labeled with ________.

letters

________ is software intended to do harm to a computer connected to the Internet.

malware

The common name for an integrated circuit is a computer ________.

microchip

A(n) ________ starts the computer, manages memory, and controls the peripherals.

operating system

________ is the choice of approving to a use of information.

opt-in

________ is the choice of disapproving to a use of information.

opt-out

________ refers to the relationship between computers that are communicating over the Internet where each of the computers—yours and someone else's—is a "file server" for the other.

p2p

A(n) ________ is a light-sensitive material used to make a chip.

photoresist

The ________ limits the government's ability to interfere with people's privacy.

privacy act of 1974

A(n) ________ is published by the receiver and used by the sender to encrypt messages.

public key

The ________ principle of the OECD Fair Information Practices states that personal data gathered should be relevant to the purposes for which it is used, and should be accurate, complete, and up-to-date

quality

Malware that directly manipulates operating system tables to hide its presence is known as ________.

rootkit

________ communication involves message exchange in which the content is encrypted to keep it private.

secure

________, the practice of a Web site automatically sending details about your visit to other content providers, is an emerging problem of concern to privacy experts.

tracking

Computers have instructions for both transforming and ________ information

transferring

A(n) ________ is a connector between two wires that controls whether they are electrically connected.

transistor

Emptying the trash is no guarantee that the data has been erased.

true

Hyperlinks have two parts: the part you read and the part the computer reads—the actual place you will go to when you click the link.

true

Identity theft is the crime of posing as someone else for fraudulent purposes

true

In contrast to the "omnibus" solution of adopting the OECD list, the United States uses an approach called "sectoral," meaning that it passes laws to deal with specific industries (business sectors) or practices.

true

Laws in Hong Kong controlling the use of transaction information are stricter than those in the United States.

true

Modern browsers let you control the cookie policy for your computer.

true

Non-EU countries that want information on EU citizens must show that they have privacy laws consistent with the OECD principles.

true

Partial backups should be made more often than full backups.

true

The purpose of encryption is to allow private transmission and storage of sensitive information.

true

The method by which malware gets into your computer is known as ________ of attack.

vector

In computer security, compromised computers that act under the direction of an external master computer, often to send spam, are called ________.

zombies

An example of conditional formatting is: A) applying a font color, e.g., green, to values over 500 B) applying currency format to cells that refer to money values C) applying italics to one column and bold to another column D) formatting a spreadsheet with alternate colors for each row

A

Suppose cell B4 has an entry. If the data in cell A4 is too wide to fit in the cell, it: A) is truncated B) is abbreviated C) is hyphenated D) cannot be entered into a cell

A

5) ALU is short for ________.

Arithmetic/logic unit

Spreadsheets are used primarily in: A) education B) business C) government D) the home

B

The main purpose of a spreadsheet is to: A) display numerical results B) process numerical data C) organize factual data D) graphically present data

B

To select a range of cells: A) double-click the first and last cells B) drag the cursor across the cells C) click Select on the Edit menu D) click the Add icon

B

Which of the following is used for computing common, summary applications in a spreadsheet? A) formulas B) functions C) tables D) formatting

B

In Microsoft Excel, all of the contents of the spreadsheet's cells, including the formulas, can be displayed by using the keyboard shortcut: A) Ctrl+Alt+Tab B) Ctrl+F1 C) Ctrl+` Note: grave accent is on the key with tilde (~) D) Ctrl+C

C

The basic unit of a spreadsheet is a: A) box B) cube C) cell D) grid

C

We can see spreadsheet results graphically by creating: A) complex formulas B) hidden columns C) charts D) absolute cell references

C

Modern computers are developed with ________, the most widely used integrated circuit technology.

CMOS

A(n) ________ is an "instruction execution engine, " cycling through a series of operations, performing an instruction on each round.

Computer

The ________ is the part of the computer that gets instructions from memory and carries them out

Control Unit

A(n) ________ is information stored on a Web client computer by an HTTP server computer

Cookie

) A range of cells can include: A) cells from more than one row B) cells from more than one column C) the entire spreadsheet D) all of the above

D

A formula reference begins with: A) f() B) a cell reference C) any number D) the equals sign (=)

D

A spreadsheet feature that allows the user to enter a series of numbers or dates into a range of cells is called a(n): A) date copy B) auto-increment C) conditional fill D) series fill

D

Spreadsheets: A) can only be sorted by column A B) can be sorted by any column provided the column is named C) are sorted by rows then columns D) can be sorted by any column

D

Every peripheral communicates with the computer through a(n) ________.

Device Driver

3) ________, considered by many to be the world's first electronic computer, was created by J. Presper Eckert and John Mauchly of the University of Pennsylvania.

ENIAC

A megabyte is exactly one million bytes

False

A passage is the path in a semiconductor where electricity travels.

False

A single device driver will generally work with several different peripheral devices.

False

A third-party cookie is initiated by a direct request by the user

False

American privacy laws are much stricter than European laws.

False

Computer memory is divided into bytes of 9 bits

False

Due to its simplistic design, Microsoft's Vista operating system reportedly contained fewer than 4,000 lines of program code when it was released in 2007.

False

Messages encrypted using a public key RSA129 cryptosystem code have not yet been cracked.

False

Miniaturization is the biggest achievement of microchip technology.

False

The Do-Not-Call List was so successful that it has now been applied to email.

False

The fear of computers taking over the world has died down since the 1950s and 1960s.

False

The vast majority of business transactions are anonymous.

False

The ________ Cycle consists of getting the instruction, figuring out what to do, gathering the data needed to do it, doing it, saving the result, and repeating.

Fetch/execute

) The ability to create software by combining other software is known as ________.

Functional composition

________ and ________ entities are the two biggest threats to privacy.

Government and business

C, C++, and Java are all examples of a(n) ________ programming language.

High level

Most Americans wrongly assume that their privacy regarding business information is restricted to ________.

Internal/ private use

________ is simply an alternative form of machine language expressed using letters and normal numbers so people can understand it.

assembly language

The rate of the Fetch/Execute Cycle is determined by the computer's ________.

clock

Programs written in a high-level language are ________, i.e., translated, into assembly language programs, which are then assembled into binary.

compiled

________ is the process of recovering encrypted cipher text.

decryption


Conjuntos de estudio relacionados

APUSH | Chapter 12 An Age Of Reform, 1820-1840

View Set

Microeconomics Terms and Definitions

View Set

Chapter 8: Organizational Culture, Structure, and Design: Building Blocks of the Organization ~ MGMT 320 ~ DR. TAMELA D. FERGUSON ~ ULL ~ WinterSession2020

View Set

Apush prior test questions, 1st semester final

View Set

Race and Ethnicity, Prejudice and Discrimination

View Set

Neurology - 602 Post Midterm Information

View Set

Chapter 14 Chapter Homework-Medical Terminology- The Reproductive System

View Set

HESI Prep: Medical-Surgical Drugs

View Set

Macro Equilibrium and Policy Part 2

View Set