CGS 2060 (Gaitros) Midterm Spring 2018
"Full HD" resolution is expressed as
1920 x 1080
FireWire was developed for ___ computers
Apple
Which optical drive media stores approximately 700 MBs of data?
CD
What is the major question that ARPAnet wanted to solve?
Could a network be built that would continue to work even if multiple parts collapsed
An attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests is called a _____ attack
DDos
Though it could theoretically hold terabytes of data for thousands of years in microscopic space, ____ storage using genetic maerical, is a distant storage option.
DNA
Which of the following would be considered a cybercrime?
Data manipulation
SAGE was developed by the US Department of ____
Defense
a DDoS attack is when computers that have been infected by a virus act as "zombies" and work together to send out illegitimate messages creating huge volumes of network traffic. The acronym DDos stands for
Distributed Denial of Service
A protocol commonly used to transfer large files from one server to another on the Internet is the ____
File Transfer Protocol
The ___ is a computer within your computer that creates images
GPU
A separate processor (computer) in your computer that enhances your video is called ___
Graphic processor (GPU)
Which is true regarding the length of a USB cord?
In general, the more data being transmitted, the shorter the cord should be.
The ___ cache is located directly on the processor itself
L1
A switch distinguishes between various devices within a network by their____
MAC
Connecting digital musical devices to computers is accomplished by using ___ ports
MIDI
Broadband is measured in ____
Mbps
An electronic element that stores data by changing its resistance based on the current that has passed through it (similar to RRAM) is called a ____
Memristor
Which of the following might be risky to uninstall from a Window's PC laptop
Microsoft Works 6-9 Converter
A commonly-used short range wireless technology used for data transfrer and electronic payments is called
NFC
Though currently expensive, curved and paper-thin displays are possible using ____ display technology
OLED
Printer speed is described using which acronym
PPM
The place in a digital device where the data and programs that device is currently using are accessible by the processor is called
RAM
The instructions needed to boot-up a computer, such as the BIOS, are typically stored in ____
ROM
RFID stands for which of the following
Radio Frequency Identification
Because they have no mechanically moving parts, ___ provide extremely fast and efficient storage
SSD
A signal transmitted every few seconds by a wireless router so that users' computers can find the Wi-Fi hotspot is called a ____
SSID
The Word Wide Web was created through a collaboration led by ____
Tim Berners-Lee
Many computers today use ___ which is a coding scheme using at least 16 bits to represent a character
Unicode
URL stands for ____ Resource Locator
Universal
The original wireless network privacy and protection standard for Wi-Fi was known as ___
WEP
The standard for wireless network privacy and protection is known as __
WPA2
DVDs store data using
a magnetic coating that is sensed by a read/write head
Smartphone cameras work by focusing incoming light onto what type of array that captures images?
active pixel scanner
When discussing digital cameras or smartphone cameras with APS CMOS, APS stands for
active pixel sensor
software that collects the user's web browsing history and uses the data collected to create unsolicited targeted pop-up advertisements is calld
adware
What 3 items are needed to install a home WiFi network?
an internet signal a modem a router
The capacity of a particular transmission medium is called its ___
bandwidth
inkjet printers are often sold ____ their production cost
below
A gigabyte equals approximately one ___ byte
billion
Represented as either a 0 or a 1, a ___ is the smallest unit of data a computer can process
bit
A short-range wireless transmission protocol is known as
bluetooth
A group of compromised computers controlled by a hacker is called a
botnet
The two major factors that impact processor speed are clock speed and ____
bus width
Most touchpad use _____ to sense when a finger has moved across the pad
capacitance
The number of instructions the CPU can process per second is dictated by the ___ speed of the processor
clock
Clockspeed, also referred to as ___, is the speed at which the processor performs the operations required to run a digital device and instructions executed by the digital device
clock rate
The fact that data on servers is nearly always backed up onto other servers gives ____ storage a major advantage over other storage data methods
cloud
The amount of data that defines each color in a pixel is called
color depth
The number of bits of data describing each pizel in a display is referred to as
color depth
A digital device that accepts input, processes and stores the input, and provides output is a ____
computer
A description of the difference in the luminance of a display's white pixels compared to the black pixels is called ___
contrast ratio
The two main components of a processor are the arithmetic logic unit (ALU) and the ___ unit
control
A small text file of information created by websites you visit that your web browser stores on your hard disk is called a _____
cookie
A person who uses a computer and the Internet to launch attacks against computer systems for political or ideological reasons is called a ___
cyberterrorist
Screensize is measured by the ___ across the monitor
diagonal
Using a stylus and touchpad to map the signature and also measure pressure, pen angle, pen up/down, etc. is known as what type of signature ecognition?
dynamic
Memory is ___ and has no moving parts
electronic (solid state)
Solid start drives store data using ____
electronic circuits
The art and science of creating output that provides information in the ost useful manner is called ___
ergonomics
The machine cycle consists of which 4 steps
fetch, decode, execute, and store
which transmission media has the largest bandwidth
fiber optic
Software that limits the material that a browser fetches or that a search engine displays are called ___
filters
Typical SSD capacities for tablet computers or smartphones are measured in ___
gigabytes
The visual image output that the computer creates is known as ____
graphics
The act of hacking or breaking into a computer system for politically or socially motivated purposes is called ___
hacktivism
To allow hard disk drive platters to spin more smoothly and cooler, some manufacturers seal the platters in ____ instead of air
helium
What is equal to one cycle per second
hertz
The cost of an SSD is ___ than the cost of a traditional hard drive
higher
Using refracted laser light to store data on a photoreceptive substrate is essentially how ___ storage works. Theoretically this could store gigabytes of data within a cubic millimeter
holographic
A television remote usually uses ___ waves
infrared (IR)
a form of spyware that records all actions typed on a keyboard is called a ____ logger
keystroke
Which of the following represents the least amount of storage
kilobyte
lower range tones generally require ___ speakers
larger
Because a metal platter is physically spinning, hard drive have ____ access time than solid state hard drives
longer
What is the name of a virus written in macro language and placed within a document or spreadsheet
macro virus
One of the largest data requirements in the future will likely be ____
mapping patients' genomes
A million bytes of data equals approximately one
megabyte
Megahertz is equal to one ___ cycles (or instructions) per second
million
The word modem stands for ___
modulator-demodulator
The actual number of pixels in a monitor is called ___ resolution
native
Using reflective material to store data that can be read using a laser is called ____ media storage
optical
The technology that allows any text, even handwritten scrawls, to be digitized is known as ____
optical character recognition
A storage device that uses lasers to read CDs, DVDs, or Blu-ray discs is referred to as an _____
optical drive
Running the processor faster than recommended is called ____. This can increase performance and speed but will also void the manufacturer warranty
overclocking
Paul Baran developed a technology called ____ switching that made the Internet possible and reliable
packet
An input, output or storage device connected to a computer is known as a ____`
peripheral
Cookies stored on a computer's hard drive and used to collect and store information about user preferences, passwords and username information, IP address, and/or data on web surfing behavior are called ____ cookies
persistant
A type of phishing that seeks to obtain personal information through malicious software that is inserted on a victim's computer is called ___
pharming
A request for an electronic "echo" or response from another computer or server is called a ____
ping
Blu-ray stores data using ____
pits and lands the are read by a blue spectrum laser beam
Using cells of ionized gas to create images, _____ displays are actually becoming less popular
plasma
A type of printer that is used to print large graphic images such as an architechtural drawning by mechanically moving a pen over a large sheet of paper is known as a ____
plotter
When referring to digital storage, RAID stands for ___
redundant array of independent discs
With optical zoom, resolution ____ when focusing on distant objects
remains the same
your ___ can provide hardware firewall protection for your home network where it connects to the ISP's network, just as ISP networks have firewalls where they connect to the internet
router
The accuracy of a digital recording is determined by the device's ____
sampling rate
In general, the ___ the access time, the faster the hard drive
shorter
A processor comprised of one control unit and one ALU is called a
single-core processor
The average tablet computer has a ____ hard drive than the average desktop computer
smaller
specialized hardware or software that captures packets transmitted over a network are called packet ___
sniffers
An unsolicited email message is called
spam
Devices that allow for the retention of data when our computer has been shut down are called ____ devices
storage
A thousand gigabytes equals one
terabyte
Because they're inexpensive and reliable ___ have become extremely popular storage devices
thumb drives (USB or flash drives)
laser printers are popular in the offices because they use relatively inexpensive ___
toner
to create an image with a laser printer ___ is drawn to the drum
toner
a terabyte equals one ___ bytes
trillion
If you buy a new computer game that emphasizes graphics, or new photo/video editing software for your desktop computer, you may want to purchase a new ____ card
video
software that infects a computer and is created using computer code is called a computer ___
virus
The maximum number of bits per instruction that a CPU can process during 1 machine cycle is called
word size
A destructive program that replicates itself throughout a single computer or across a network is called a
worm