Advanced Computer Science Chapter 1

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

The __________ is the part of the microprocessor that performs arithmetic operations.

ALU

The type of code that uses only seven bits for each character is ____________.

ASCII

Digital devices can use ____________ as a code to represent character data.

ASCII, Extended ASCII, and EBCDIC

In terms of an authentication protocol, the phrase 'something a person possesses' could refer to _____________.

An ID card

The type of data that is represented using an infinite scale of values is ____________.

Analog

______________ tools cloak a person's identity online.

Anonymizer

A set of computer programs that helps a person carry out a task is ___________.

Application software

A problem a hacker can cause after breaking into your computer might be _____________.

Applying for credit in your name, sending embarrassing e-mails, applying for a mortgage using your data

In terms of an authentication protocol, the phrase 'something a person is' refers to a(n) __________.

Biometrics device

Data transmission speeds are typically expressed as ___________.

Bits

A term which can refer to a person who manipulates computers with malicious intent is _____________.

Black hat, cracker, hacker

A _____________ attack uses password-cracking software.

Brute force

Storage is typically expressed as ___________.

Bytes

____________ computing provides access to information, applications, communications, and storage over the Internet.

Cloud

The first digital computers were built during World War II for __________.

Code breaking

A(n) ____________ converts all the statements in a program in a single batch; the resulting collection of instructions is placed in a new file.

Compiler

The ____________ fetches each instruction.

Control unit

Technology ___________ is a process by which several different technologies with distinct functionality evolve to form a single product.

Convergence

The type of data where text, numbers, graphics, sound, and video have been converted into discrete digits is ____________.

Digital

__________ is the process of converting text, numbers, sound, photos, and video into data that can be processed by digital devices.

Digitization

The third step of the instruction cycle is ____________.

Execute instruction

The type of code that uses eight bits for each character is ___________.

Extended ASCII

All computers are case sensitive.

False

An operating system is an example of application software.

False

Because of increased versatility, a video game console is now considered a personal computer.

False

In the binary system, 2 is used to represent the value 2.

False

The digital revolution became a significant factor in the 1980s but ended in the 1990s when the "dot com" bubble burst.

False

The first digital computer was developed for conducting the census.

False

The op code in a machine language instruction specifies the data.

False

The operand is a command word for an operation.

False

To ensure you can remember your password, it is a good idea to base it on information you can easily remember such as your birthday.

False

You should always use a different password for every account.

False

A light switch is like a(n) ANALOG device.

False; digital

A set of machine language instructions for a program is called SOURCE code.

False; machine

A SUPERCOMPUTER is a large and expensive computer capable of simultaneously processing data for hundreds or thousands of users.

False; mainframe computer

FREE source projects promote copying, free distribution, peer review, and user modifications.

False; open

A(n) ACCOUNT manager stores user IDs with their corresponding passwords and automatically fills in login forms.

False; password

An area where data can be left on a permanent basis is MEMORY.

False; storage

A MICROCOMPUTER specializes in compute-intensive problems.

False; supercomputer

The first step of the instruction cycle is ____________.

Fetch instruction

A named collection of data that exists on a storage medium is known as (a) ____________.

File

1,073,741,824 bytes is a __________.

Gigabyte

C, BASIC, COBOL, and Java are examples of ____________ programming languages.

High-level

The fourth step of the instruction cycle is ___________.

Increment pointer

Data becomes ____________ when it is presented in a format that people can understand and use.

Information

A collection of preprogrammed activities such as addition, subtraction, counting, and comparison is called a(n) ____________.

Instruction set

A super-thin slice of semiconducting material packed with microscopic circuit elements is a(n) ____________.

Integrated circuit, computer chip, microchip

A global computer network originally developed as a military project is the ____________.

Internet

When restrictions on commercial use of the __________ were lifted in 1995, companies such as AOL and CompuServe became popular services.

Internet

The second step of the instruction cycle is ___________.

Interpret instruction

A(n) ___________ converts and executes one statement at a time.

Interpreter

1,024 bytes is a ___________.

Kilobyte

Initially sales were slow for the personal computer because of ____________.

Lack of software

____________ software refers to any software that is installed on a computer's hard disk.

Local

_____________ can be directly executed by the processor's circuitry.

Machine language

1,048,576 bytes is a ____________.

Megabyte

An area of a computer that temporarily holds data waiting to be processed is ____________.

Memory

An electronic component that can be programmed to perform tasks is a ___________.

Microprocessor

A group of computers linked together to share data and resources is a(n) ___________.

Network

The ______________ in machine language is a command word for an operation such as add, compare, or jump.

Op code

The ___________ from an instruction specifies the data.

Operand

A(n) ___________ is a microprocessor-based computing device designed to meet the computing needs of an individual.

Personal computer

___________ media are cloud-based applications designed for social interaction and consumer-generated content.

Social

You might represent ___________ using character codes

Social Security numbers

The human-readable version of a program is called ____________.

Source code

A compute-intensive problem runs on a __________.

Supercomputer

The ____________ houses all essential chips and provides connecting circuitry between them.

System board

A set of computer programs that helps a computer monitor itself and function more efficiently is ____________.

System software

In a computer, most processing takes place in ___________.

The CPU

According to the text, a key aspect of __________ is that it adds content and substance to __________.

The Web, the Internet

The master controller for all activities that take place within a computer is ___________.

The operating system

The ___________ phase of the digital revolution materialized in the 1900s when the Internet was opened to public use.

Third

A KEYLOGGER is a form of malicious code.

True

A compiler converts all statements in a program to machine language in a single batch.

True

An interpreter converts and executes one statement at a time

True

At one time, MINICOMPUTERS were smaller, less expensive, and less powerful computers that were able, nevertheless, to support multiple users and run business software.

True

Because most digital devices are electronic, bits take the form of electrical pulses.

True

DIGITAL technology has made it easy to produce copies of music with no loss of quality from the original.

True

DIPs and PGAs are both shapes of integrated circuits.

True

Facebook and Twitter are examples of social networking options.

True

Prior to 1940, the word computer was defined as a person who performs calculations.

True

Privacy advocates fear that digital technologies are fundamentally changing our expectation of what is private and what is not.

True

Semiconductor materials are substances with properties between those of a conductor and an insulator.

True

The ALU uses REGISTERS to hold data that is being processed.

True

The number 9 can be considered a character.

True

The purpose of a server is to serve computers on a network.

True

The results of statements that have been compiled are called OBJECT code.

True

The set of instructions that tells a computer how to carry out processing tasks is a computer PROGRAM.

True

The term SERVER can refer to a combination of hardware and software.

True

Trojans are computer programs that seem to perform one function while actually doing something else.

True

A ___________ is a series of characters that becomes a person's unique identifier.

User ID

The ___________ is a collection of linked documents, graphics, and sounds.

Web

A powerful desktop computer used for high-performance tasks is a ____________.

Workstation

An ordinary personal computer that is connected to a network is a ___________.

Workstation

In 1982, the percentage of households that had a computer was closest to ____________ percent.

10

The modern definition and use of the term computer emerged in the ____________.

1940s

During the period from ___________, computing was characterized by the Web, e-mail, multiplayer games, music downloads, and enormous software applications.

1995-2010

The binary number 10 represents ___________ in the decimal number system.

2

Myspace lost steam in ___________, but Facebook and Twitter marched ahead by attracting millions of users.

2008

In terms of an authentication protocol, the phrase 'something a person knows' refers to _____________.

A password


Ensembles d'études connexes

Human Nutrition and Wellness Exam Ch 1-4

View Set

Ag. Econ Chapter 1 Review Questions

View Set

skt174(test one)( not the full test only word questions, pictures go to actual test)

View Set

Chapter 28 The Structure of Space and Time

View Set

Topic 4 Lesson 6 The Spanish-American War

View Set

TEST: HUMAN ANATOMY AND PHYSIOLOGY

View Set