Standard 1 Final Prep
What computer was sold to US Census Bureau in 1951? UNIVAC ENIAC EDVAC Mark I
UNIVAC
Program or series of instruction that can replicate without the user's knowledge
Virus
Which is the physical aspect of the computer? operating system applications software software hardware
hardware
The following is an example of what? 8B542408 83FA0077 06B80000 machine code assembly language compiler code binary code
machine code
Which is not an input device? printer scanner digital camera microphone
printer
Which would be classified as a mobile computing device? mainframe desktop computer minicomputer tablet PC
tablet PC
How many states do the electrical circuits on an IC (integrated circuit) have? three: on, off, wait four: + - * / one: on two: on, off
two: on, off
What type of code is directly understood by the CPU? Machine Code Abstract Code Assembly Language C
Machine Code
__________ holds data for all applications that are currently running on your computer, but only while the power is on. RAM Memory processor ROM Cache
RAM
Requires government authorities have a subpoena, summons or search warrant to access an individual's financial records
Right to Financial Privacy Act of 1978
Gives Americans the freedom to use any type of encryption to protect their confidential information.
Safety and Freedom through Encryption Act of 1999 (SAFE)
What is the purpose of the Fair Credit Reporting Act of 1970? It is protection of digial information from illegal use or reproduction. It restricts the way in which personal data can be used by federal agencies. It requires that a government authority have a supoena, summons or search warrant to access an individual's financial records. To give individuals the right to see information collected about them for use by credit, insurance and employement agencies.
To give individuals the right to see information collected about them for use by credit, insurance and employement agencies.
Program or series of instruction that appears as something else
Trojan Horse
Digits in binary are also know as bits. False True
True
The binary number 10111 is ______ in decimal. none of the options 15 23 4
23
The binary number 1000110 equals ________ in hexadecimal. 46 12 16 D3
46
101 in base 2 equals ______ in decimal. 5 9 6 4
5
John Atanasoff Clifford Berry Invention
Atanasoff-Berry Computer
________ is another name for Decimal. Base 16 Base 2 Base 10 Base 8
Base 10
All of the following are high-level programming languages except: C# Java Basic Visual Basic
Basic
Second Step to the Programming Process
Design the Solution
The decimal number 10 is equal to ________ in binary? 0010 1010 1001 1111
1010
The hexadecimal number A41 is ________ in binary. 101001000001 None of the options. 10000100001 01100100001
101001000001
How many KB in 1 MB? 924KB 1024KB 1000KB 1KB
1024KB
The decimal number 15 equals ________ in binary. 0000 1110 1111 0111
1111
The F in hexadecimal is equal to 16 10 11 15
15
What base number system is also known as hexadecimal? none of the options 8 10 16
16
"This Code, consisting of 24 imperatives formulated as statements of personal responsibility, identifies the elements of such a commitment." American Computing Act Computing Professional Conduct Guidelines ACM Code of Ethics and Professional Conduct American Computing Professional Ethics Act
ACM Code of Ethics and Professional Conduct
Who is called the first programmer due to writing a program based on the design of the Analytical Machine? Charles Babbage Herman Hollerith Ada Byron Alan Turing
Ada Byron
Who wrote the first computer program? Herman Hollerith Charles Babbage Stephen Jobs Ada Byron
Ada Byron
Who wrote the first computer program? Stephen Jobs Herman Hollerith Ada Byron Charles Babbage
Ada Byron
Charles Babbage Invention
Analytical Engine and Difference Engine
Install on computers to detect and remove code before it can replicate or damage data
Antivirus programs
Which number system utilizes only two digits? Binary Octal Decimal Hexadecimal
Binary
All of the following were developed in the 1990's except: Java PHP C Python
C
What is the most closely related language to the CLI (Common Language Infrastructure) the backbone of the .Net Framework, and the first one developed specifically for it? C# C Visual Basic C++
C#
All of the following are second generation programming languages except: Basic COBOL Fortran C++
C++
Which processes data and controls the flow of data between the computer's other units? USB ROM CPU SRAM
CPU
Requires commercial websites that collect personal information from children under the age of 13 to obtain parental consent. Electronic Communications Privacy Act of 1986 Electronic Freedom of Information Act of 1996 Children's Online Privacy Protection Act of 1988 Safety and Freedom through Encryption Act of 1999
Children's Online Privacy Protection Act of 1988
Requires commercial websites that collect personal information from children under the age of 13 to obtain parental consent.
Children's Online Privacy Protection Act of 1998 (COPPA)
Addresses data collection by credit, insurance and employment agencies
Consumer Credit Reporting Reform Act of 1996
Which of the following would be part of an Acceptable Use Policy? There is more than one. Do not access, upload, download, or distribute inappropriate materials Use of the network for private business Use appropriate language Do not reveal personal information Accessing, uploading, downloading, or distributing inappropriate materials Do not access another's account
Do not access, upload, download, or distribute inappropriate materials Use appropriate language Do not reveal personal information Do not access another's account
Fifth Step to the Programming Process
Document and Maintain the Program
John Mauchly J. Presper Eckert John von Neumann Invention
EDVAC/EDSAC
Which of the first generation computers was a secret military project during WWII used to calculate trajectory of artillery shells? Atanasoff-Berry Computer ENIAC Mark I The Analytical Machine
ENIAC
John Mauchly J. Presper Eckert Invention
ENIAC/UNIVAC
What type of memory does a flash drive use? Electrically Programmable Read-Only Memory Cache Electrically Erasable Programmable Read-Only Memory Electrically Erasable Programmable Random Access Memory
Electrically Erasable Programmable Read-Only Memory
Makes it a crime to access electronic data without authorization
Electronic Communications Privacy Act of 1986 (ECPA)
Requires federal government agencies to make certain agency information available for public inspection
Electronic Freedom of Information Act of 1996
Issues with computers in the workplace
Employee monitoring
Which of the following deals with computers in the workplace? Invasion of privacy Copyright Employee monitoring Identity theft
Employee monitoring
Power & paper waste disposal of out-dated hardware
Environmental concerns
The science that studies safe work environments
Ergonomics
Requires federal agencies to develop, document and implement an agency-wide program to provide information security. Electronic Communications Privacy Act of 1986 Federal Information Security Management Act of 2002 Identity Theft Penalty Enhancement Act of 2004 Consumer Credit Reporting Reform Act of 1996
Federal Information Security Management Act of 2002
Requires federal agencies to develop, document and implement an agency-wide program to provide information security.
Federal Information Security Management Act of 2002 (FISMA)
Speeds are measured in _________ or throughput rate. GHz KHz MHz THz
GHz
Illegal act to gain access to large computer systems to perform acts of vandalism
Hacker
Which category of programming languages has the most abstraction from the hardware? High Level Low Level Assembly Language Machine Language
High Level
First Step to the Programming Process
Identify the Problem
Establishes penalties for aggravated identity theft
Identity Theft Penalty Enhancement Act of 2004
Identity Theft
Invasion of privacy
What is the purpose of the ALU? It is used to store data for quick retrieval. It process data and controls the flow of data. It determines the speed at which a CPU can execute instructions. It performs logic and arithmetic operations and makes comparisons.
It performs logic and arithmetic operations and makes comparisons.
Protects against copyright infringement
NET (No Electronic Theft) Act of 1997
If a zero is shown in binary, it represents: Both 0 and 1 Neither 0 nor 1 Off On
Off
Marketing technique where data is collected about customers visiting a website
Online Profiling
Blaise Pascal Invention
Pascaline
Act of sending an email to a user falsely claiming to be a legitimate business in an attempt to trick the user into revealing personal information that could be used for crimes like identity theft
Phishing
Illegal copies being distributed
Piracy
Which of the following does not deal with ergonomics? Safe work environments Repetitive stress injuries Eye strain Power & paper waste
Power & paper waste
Restricts the way in which personal data can be used by federal agencies
Privacy Act of 1974
Gives law enforcement the ability to monitor individual's email and web activity Provide Appropriate Tools Required to Intercept and Obstruct Terrorism (PATRIOT) Act of 2001 Electronic Freedom of Information Act of 1996 Safety and Freedom through Encryption Act of 1999 Right to Financial Privacy Act of 1978
Provide Appropriate Tools Required to Intercept and Obstruct Terrorism (PATRIOT) Act of 2001
Gives law enforcement the ability to monitor individual's email and web activity
Provide Aprropriate Tools Required to Intercept and Obstruct Terrorism Act of 2001 (PATRIOT)
Joseph Jacquard Invention
Punched Cards
Gottfried Wilhelm von Leibniz Invention
Stepped Reckoner
Herman Hollerith Invention
Tabulating Machine
Fourth Step to the Programming Process
Test the Program
What law protects against copyright infringement? The Financial Privacy Act of 1978 The Fair Credit Reporting act of 1970 The NET Act of 1997 The Privacy Act of 1974
The NET Act of 1997
This act restricts the way in which personal data can be used by federal agencies. The Financial Privacy Act of 1978 The Privacy Act of 1974 The NET Act of 1997 The Fair Credit Reporting Act of 1970
The Privacy Act of 1974
What sparked the beginning of third generation computers? The invention of the Integrated Circuit The invention of stored memory The invention of the transistor The invention of the first programming language
The invention of the Integrated Circuit
What sparked the second generation computers? The invention of the transistor The invention of machine language The invention of the Integrated Circuit The invention of the first computer language.
The invention of the transistor
What made it possible to build the microcomputer (PC)? The microprocessor The Integrated Circuit The development of stored memory The transistor
The microprocessor
Program that is able to reproduce itself over a network
Worm
Third Step to the Programming Process
Write the Program
A bit is a person's name stored in memory. a single 0 or 1 in the binary code. eight 0s or 1s. equal to 64K of RAM
a single 0 or 1 in the binary code.
00000000 01001101 represents the letter M in kilobytes. decimal. hexadecimal. binary.
binary
The number system used in computers is called hexadecimal. decimal. base. binary.
binary
Computer memory capacity and file size are measured in codes. bytes. inches. nanoseconds.
bytes
SRAM (Static RAM) is also referred to as clock rate. integrated circuits. ROM. cache.
cache
The _______________is high speed memory that stores frequently accessed instructions. cache random access memory processing unit memory controller
cache