Principles of Computing final
Programs and their data must reside in the computer's ________ when programs run
Memory
________ write the instructions for a computer.
Programmers
The ________ public key cryptosystem, invented by Rivest, Shamir, and Adelman, is one of the popular PKC algorithms.
RSA129
The ability to control when ________ do and don't conduct electricity is the main process used in computer construction
Semiconductors
) Data Fetch gets the values, called _______, from memory that the ALU needs to perform operations like ADD and MULTIPLY.
Sources operands
A company can place a cookie on your computer even if you've never visited its Web site.
True
A field effect transistor is a connector between two wires that can be controlled to allow a charge to flow between the wires (conduct) or not.
True
Android, an open source OS, and Apple's iOS are examples of operating systems for mobile devices.
True
Computers only execute instructions; therefore, rerunning a program with the same data produces exactly the same result every time
True
Cookies can be used to track ad placement on Web sites
True
Each byte in memory is limited in size.
True
Every memory location in the computer is numbered, starting at 0.
True
Information is generated when buying goods and services at a store
True
Starting a computer is called booting.
True
The ADD instruction adds the values, not the address numbers of the memory locations.
True
The United States has not adopted the OECD principles
True
The United States provides limited enforcement of OECD privacy principles.
True
The ability to store different values in its memory locations makes the computer a flexible tool.
True
The laws protecting the information of individuals place more limits on the government than on business.
True
Viruses are often distributed through email attachments.
True
Americans' access to a free credit check to learn their "credit score" and check for errors applies the Fair Information Practices of Purpose and Security.
false
In the United States, the protection of an individual's privacy is the responsibility of the government
false
Opt-in" means the business can use it unless the person explicitly prohibits the new use.
false
Personal computers can only be backed up to another hard disk.
false
The difference between a worm and a virus is that the worm program "rides along" with other software, while the virus can actually send itself to other devices on the Internet.
false
A(n) ________ is a force one object can have on another without touching it.
field effect
A(n) ________ is a barrier between two computers on a network, or between the Internet and a personal computer.
firewall
Recovery after a disaster involves installing the most recent ________ backup copy.
full
________ is the crime of posing as someone else for fraudulent purposes.
identity theft
Computer scientists have not yet proved the invincibility of the RSA scheme, but it can be "made more secure" simply by ________ the size of the key
increasing
The process of executing a program is also called ________.
instruction interpretation
IC is short for ________.
integrated circuit
Spreadsheet columns are labeled with ________.
letters
________ is software intended to do harm to a computer connected to the Internet.
malware
The common name for an integrated circuit is a computer ________.
microchip
A(n) ________ starts the computer, manages memory, and controls the peripherals.
operating system
________ is the choice of approving to a use of information.
opt-in
________ is the choice of disapproving to a use of information.
opt-out
________ refers to the relationship between computers that are communicating over the Internet where each of the computers—yours and someone else's—is a "file server" for the other.
p2p
A(n) ________ is a light-sensitive material used to make a chip.
photoresist
The ________ limits the government's ability to interfere with people's privacy.
privacy act of 1974
A(n) ________ is published by the receiver and used by the sender to encrypt messages.
public key
The ________ principle of the OECD Fair Information Practices states that personal data gathered should be relevant to the purposes for which it is used, and should be accurate, complete, and up-to-date
quality
Malware that directly manipulates operating system tables to hide its presence is known as ________.
rootkit
________ communication involves message exchange in which the content is encrypted to keep it private.
secure
________, the practice of a Web site automatically sending details about your visit to other content providers, is an emerging problem of concern to privacy experts.
tracking
Computers have instructions for both transforming and ________ information
transferring
A(n) ________ is a connector between two wires that controls whether they are electrically connected.
transistor
Emptying the trash is no guarantee that the data has been erased.
true
Hyperlinks have two parts: the part you read and the part the computer reads—the actual place you will go to when you click the link.
true
Identity theft is the crime of posing as someone else for fraudulent purposes
true
In contrast to the "omnibus" solution of adopting the OECD list, the United States uses an approach called "sectoral," meaning that it passes laws to deal with specific industries (business sectors) or practices.
true
Laws in Hong Kong controlling the use of transaction information are stricter than those in the United States.
true
Modern browsers let you control the cookie policy for your computer.
true
Non-EU countries that want information on EU citizens must show that they have privacy laws consistent with the OECD principles.
true
Partial backups should be made more often than full backups.
true
The purpose of encryption is to allow private transmission and storage of sensitive information.
true
The method by which malware gets into your computer is known as ________ of attack.
vector
In computer security, compromised computers that act under the direction of an external master computer, often to send spam, are called ________.
zombies
An example of conditional formatting is: A) applying a font color, e.g., green, to values over 500 B) applying currency format to cells that refer to money values C) applying italics to one column and bold to another column D) formatting a spreadsheet with alternate colors for each row
A
Suppose cell B4 has an entry. If the data in cell A4 is too wide to fit in the cell, it: A) is truncated B) is abbreviated C) is hyphenated D) cannot be entered into a cell
A
5) ALU is short for ________.
Arithmetic/logic unit
Spreadsheets are used primarily in: A) education B) business C) government D) the home
B
The main purpose of a spreadsheet is to: A) display numerical results B) process numerical data C) organize factual data D) graphically present data
B
To select a range of cells: A) double-click the first and last cells B) drag the cursor across the cells C) click Select on the Edit menu D) click the Add icon
B
Which of the following is used for computing common, summary applications in a spreadsheet? A) formulas B) functions C) tables D) formatting
B
In Microsoft Excel, all of the contents of the spreadsheet's cells, including the formulas, can be displayed by using the keyboard shortcut: A) Ctrl+Alt+Tab B) Ctrl+F1 C) Ctrl+` Note: grave accent is on the key with tilde (~) D) Ctrl+C
C
The basic unit of a spreadsheet is a: A) box B) cube C) cell D) grid
C
We can see spreadsheet results graphically by creating: A) complex formulas B) hidden columns C) charts D) absolute cell references
C
Modern computers are developed with ________, the most widely used integrated circuit technology.
CMOS
A(n) ________ is an "instruction execution engine, " cycling through a series of operations, performing an instruction on each round.
Computer
The ________ is the part of the computer that gets instructions from memory and carries them out
Control Unit
A(n) ________ is information stored on a Web client computer by an HTTP server computer
Cookie
) A range of cells can include: A) cells from more than one row B) cells from more than one column C) the entire spreadsheet D) all of the above
D
A formula reference begins with: A) f() B) a cell reference C) any number D) the equals sign (=)
D
A spreadsheet feature that allows the user to enter a series of numbers or dates into a range of cells is called a(n): A) date copy B) auto-increment C) conditional fill D) series fill
D
Spreadsheets: A) can only be sorted by column A B) can be sorted by any column provided the column is named C) are sorted by rows then columns D) can be sorted by any column
D
Every peripheral communicates with the computer through a(n) ________.
Device Driver
3) ________, considered by many to be the world's first electronic computer, was created by J. Presper Eckert and John Mauchly of the University of Pennsylvania.
ENIAC
A megabyte is exactly one million bytes
False
A passage is the path in a semiconductor where electricity travels.
False
A single device driver will generally work with several different peripheral devices.
False
A third-party cookie is initiated by a direct request by the user
False
American privacy laws are much stricter than European laws.
False
Computer memory is divided into bytes of 9 bits
False
Due to its simplistic design, Microsoft's Vista operating system reportedly contained fewer than 4,000 lines of program code when it was released in 2007.
False
Messages encrypted using a public key RSA129 cryptosystem code have not yet been cracked.
False
Miniaturization is the biggest achievement of microchip technology.
False
The Do-Not-Call List was so successful that it has now been applied to email.
False
The fear of computers taking over the world has died down since the 1950s and 1960s.
False
The vast majority of business transactions are anonymous.
False
The ________ Cycle consists of getting the instruction, figuring out what to do, gathering the data needed to do it, doing it, saving the result, and repeating.
Fetch/execute
) The ability to create software by combining other software is known as ________.
Functional composition
________ and ________ entities are the two biggest threats to privacy.
Government and business
C, C++, and Java are all examples of a(n) ________ programming language.
High level
Most Americans wrongly assume that their privacy regarding business information is restricted to ________.
Internal/ private use
________ is simply an alternative form of machine language expressed using letters and normal numbers so people can understand it.
assembly language
The rate of the Fetch/Execute Cycle is determined by the computer's ________.
clock
Programs written in a high-level language are ________, i.e., translated, into assembly language programs, which are then assembled into binary.
compiled
________ is the process of recovering encrypted cipher text.
decryption