CGS midterm quizlet

Pataasin ang iyong marka sa homework at exams ngayon gamit ang Quizwiz!

Place the steps of the Program Development Life Cycle in the correct order.

1. Defining the problem 2. Creating a plan 3. Writing the code 4. debugging the code 5. testing the code

Which of the following could have a traditional (magnetic) hard drive? 1. Dell desktop computer 2. Samsung Galaxy S6 3. Apple iPad 4. Apple iPhone six

1. Dell Desktop computer

Identify the characteristics of a desktop computer.

1. Desktops allow for relatively easy upgrade and expansion. 2. Desktops are often used in offices since they don't need to be mobile. 3. Desktops are full OS

What is true about packet sniffers?

1. Legitimate sniffers are used for routine examination and problem detection. 2. Unauthorized sniffers are used to steal information.

In which order should you delete cookies in Internet Explorer (Microsoft Edge)?

1. On the Start screen, tap or click Internet Explorer to open Internet Explorer. 2. Swipe in from the right edge of the screen, and then tap Settings. (If you're using a mouse, point to the lower-right corner of the screen, move the mouse pointer up, and then click Settings). 3. Tap or click Options, and then, under History, tap or click Select. 4. Select the Cookies check box, then tap or click Delete.

what's true about utility programs?

1. Program that performs a specific maintenance type of task 2. included in both Windows and Mac OS 3. common examples include disk formatting, disk cleanup, and disk defragmenting

What three stages are included in the SDLC process's system design phase?

1. Purchasing necessary software 2. Purchasing needed hardware 3. Setting up, installing, and testing the system.

What are some output devices?

1. Televisions 2. Printers

What are some reasons for buying a tablet computer?

1. You need a computer that you can use while walking 2. You need a highly mobile computer that works well for e books and gaming.

what is true about script kiddies?

1. are amateur computer hackers with little programming expertise 2. illegally gain access to computer systems using programs (scripts) that others have written

What statements describe a computer programmer's algorithm?

1. written in the form of a flowchart so that it will be more easily converted into a programming language 2. used to train the program's users 3. Written in a natural language, like English

Some computers use _______ to represent characters in a binary format.

ASCII

What are the input devices often found at a point-of-sale station?

Barcode or UPC reader Keypad UPC scanning wand

A wireless short-range transmission protocol is called ________.

Bluetooth

Select the true statements regarding an LED display.

Can be extremely thin Extremely energy efficient Great for well-lit areas

Most touch pads use ________ to sense when a finger has moved across the pad.

Capacitance

A program that checks the source code for errors, and converts it into machine language is a ________.

Complier

Antivirus software is a computer program used to scan files to identify and remove ________ and ________.

Computer viruses, other malicious programs

On a cable, the connector is the end that connects to a port.

Connector

The three stages to be completed in the SDLC's inquiry phase include

Defining the problem Examining alternatives Reporting your findings

Which statements refer to a display's contrast ratio?

Describes the difference in brightness Luminescence of white pixels compared to black pixels

Which device carries a relatively large footprint and separate system unit?

Desktop

What flowchart symbol is for the decision point?

Diamond

Common symptoms of a computer virus include?

Documents wont save Computer runs extremely slow Programs launch on their own

The distance between two adjacent sub-pixels on a display is referred to as ________.

Dot Pitch

What is the acronym for End-User Licensing Agreement?

EULA

This version of the HTML set of protocols designed to display documents on the web provides a smooth interface between natural language and machine language by wrapping data for web display in "tags".

Extensible Markup Language

A type of thunderbolt port, found on apple computers

FireWire

The ________ step in software development is: What should this program do?

First

What are some characteristics of a 2-in-1 computer?

Full operating system More storage than a traditional laptop Touch screen monitor

The ________ is a separate processor (computer) on your computer that enhances your video.

Graphic Processor (GPU)

MEMS chips are used in what?

Hearing Aids Smartphones

A program that can be used to turn a single line of C# into a machine language without the complete program being compiled is called a C# ________.

Interpretor

To speed up the programming process while producing dynamic web pages, select the program that utilizes tiny programs called scripts.

JavaScript

The processor directly houses the ________ cache.

L1

Memory located on the processor itself

L1 Cache

Memory located adjacent to the processor

L3 cache

Most laptops, tablets, and smartphones use a(n) ________ display.

LCD

The method used in the development and maintenance of an IT scheme is called the SDLC. SDLC stands for System Development ________ Cycle.

Life

The technology (chips) that allow cell phone microphones and hearing aids to be so small is the ________ chip.

MEMS

All of the following are common ports that are included with laptop computers except ________. 1. MIDI ports 2. USB ports 3. Ethernet Ports 4. HDMI ports

MIDI ports

Common types of servers include

Network Server File server Web server

The technology that uses the reflection of a laser of the graphite left by a #2 pencil to determine if a bubble has been filled in is called

OMR

What manages hardware and software, supports the computer's basic functions, and runs programs?

Operating system

In photography, there are two ways to focus on distant objects, digital zoom and ________ zoom.

Optical

Playing a Spotify song is an example of

Output

What flowchart symbol is for the star/finish point?

Oval

________ runs the processor faster than recommended by the manufacturer. This can increase performance and speed, but will also void the manufacturer warranty.

Overclocking

What flowchart symbol is for the input/output point?

Parallelogram

The smallest image element is a(n) ________.

Pixel

A point in a computer (a hole or a slot) that accepts a specific connector is called a ________.

Port

A slot or hole that matches the cord or expansion card being connected to the port

Port

Select the peripherals. 1. Printers 2. Smartphones 3. Monitor 4. Tablet

Printers Monitor

Converting a task into commands that a computer can use to perform the task is called ________.

Programming

The type of storage that retains data and information when the power is turned off is called ________.

ROM

system BIOS (basic input/output system) is stored in

ROM (Read Only Memory)

What flowchart symbol is for the process or procedure?

Rectangle

Most tablets and phones use ________ as their main storage device.

SSD

The accuracy of a digital recording is determined by the device's ________ rate.

Sampling

Which devices use a virtual keyboard? 1. Laptop 2. Smartphone 3. Tablet 4. Desktop

Smartphone Tablet

Which of the following is not a presentation software term? 1. Speaker notes 2. Slide 3. Speaker Image 4. Slide Master

Speaker Image

Saving photos to a USB drive is an example of

Storage

You can minimize your risk of computer damage by using a ________ or a ________.

Surge Protector, UPS (uninterruptable power supply)

What program would you would be using if you would like to write iPhone applications?

Swift

The term "native resolution" refers to

The number of pixels in a display

The term "native resolution" refers to?

The number of pixels in a display

What is the input device for smartphones?

Touch screen or keyboard

Which of the following are true regarding high-definition displays?

Typically have aspect ratios of 16:9 Typically have 1080 horizontal lines of pixels Typically have frame rates of 1920 FPS

Sometimes spam messages are referred to as ________.

UBE

This type of connector is the most common type of connection to a computer for peripherals (printers, monitors, storage devices, etc.).

USB

allows for data transfer between devices and for devices to be electrically charged

USB

What are some characteristics of a projector?

Usually required a darkened environment Allows large audiences to view digital output Usually used with a screen

Most smartphones and tablets produced today use a ________ keyboard.

Virtual

________ Basic is a programming language of the third generation that enables BASIC to be used with the benefits of a graphical user interface.

Visual

Firewalls help protect against ________ and ________.

Worms, Hackers

Although not a programming language technically, ________ pertains to the protocols that enable content to be displayed on the Internet.

XML

Software that collects the web browsing history of the user and uses the collected data to create unwanted pop-up ads is called ________.

adware

Entering text in a word document is an example of

an input

The second step of the SDLC phase is to collect information on current hardware and software, analyze this information, and prepare system requirements. This is called the phase of the ________ scheme.

analysis

A collection of hacker-controlled computers is called a ________.

botnet

Avoiding viruses would not include

bypassing your browser's built-in security.

A description of the difference in the luminance of a display's white pixels compared to the black pixels is called ________.

contrast ratio

A small text file of information created by websites that your web browser stores on your hard drive is called a ________.

cookie

The malevolent use of computer code to change a computer or network's normal operations is called a ________.

cyberattack

A person who uses computers and the Internet to launch attacks against computer systems for political or ideological reasons is called a ________.

cyberterrorist

Memory used to increase a hard drive's efficiency

disk cache

RAM is ________ and has no moving parts.

electronic (solid state)

A process's graphical representation is called a ________.

flowchart

A person with unlawful access to networks to steal and corrupt information and data is called a ________.

hacker

A ________ logger is a form of spyware that records your keyboard strokes.

keystroke

An initial value process, a process and a test condition which can potentially return to the initial value is called a ________.

loop

There are two stages of the final step in the SDLC, one system audit and one assessment stage. This final step is called ________ the system.

maintaining

A megabyte equals approximately one ________ bytes?

million

A laptop typically has ________ RAM than a smartphone.

more

Single events and a(n) ________ series of events are two common cybercrime categories.

on-going

Factors that damage computer hardware include?

power surges overheating humidity magnetic fields

Amateur computer hackers with little programming expertise, who illegally access computer systems by means of programs (scripts) written by others, are called ________.

script kiddies

The average tablet has a ________ hard drive compared to the average desktop.

smaller

The maximum number of bits per CPU instruction during one machine cycle is

word size

A damaging program duplicating itself on a single computer or over a network is called a ________.

worm


Kaugnay na mga set ng pag-aaral

Lesson 12: Resistance in a DC Parallel circuit

View Set

AP World Chapter 9 and 10 Questions

View Set

Chapter 3: Plate Tectonics Lesson 2: Sea-Floor Spreading

View Set

Power to Regulate Interstate Commerce

View Set

HvacR Commercial Refrigeration Midterm Unit 25/26/quiz's

View Set

EC 515 Managerial Economics Module 1, EC 515 Managerial Economics Module 2, EC 515 Managerial Economics Module 3

View Set