CGS 2060 MIDTERM
mouse was developed by
APPLE
Which is true regarding the length of a USB cord?
In general, the more data being transmitted, the shorter the cord should be.
The WWW was created through a collar led by
Tim Berners Lee
NEXTS
apple
firewire
apple
The capacity of a particular transmission medium is called its
bandwidth
The two major factors that impact the processor speed are clock speed and ...
bandwidth
The smallest unit of data storage is a __
bit
SHORT DISTANCE WIRELESS COMMUNICATION
bluetooth
a short range wireless transmission protocol is known as
bluetooth
bc its radio waves pass through walls or desktops, ____ capable devices are popualr
bluetooth
an internet signal that has enough bandwidth to allow multiple computers to be connected to the same router is called a ______ signal
broadband
software applications that allow users to access and surf the www are called
browsers
The act of hacking, or breaking into a computer system, for a politically or socially motivated purposes is called _____.
hacktivism
To allow hard disk drive platters to spin more smoothly and cooler, some manufacturers seal the platters in ___ instead of air.
helium
what is equal to once cycle per second
hertz
cost of a SSD is ______ than a hard drive
higher
a tv remote usually uses _______ waves
infrared
domain name
mheducation.com
The term that describes how fast each pixel in a display is updated is ___
refresh rate
most phones and tablets produced today use a _______ keyboard
virtual
wireless network
wifi
Software that collects the user's web browsing history and uses the data collected to create unsolicited targeted pop-up advertisements is called _____ .
adware
in addition to ram, modern processors temporarily keep frequently accessed data in a
cache
most touchpad use
capacitance
Which optical drive media stores approximately 700 MBs of data?
cd
the technology that allows any text to be digitized is known as optical______ recognition
character
Magnetic Ink Recognition is most commonly seen on
checks
Paul Baran developed a technology called _____ switching that made the internet possible
circuit
Emailing a file to yourself is an example of using ___ storage.
cloud
The number of bits of data describing each pixel in a display is referred to as ___ .
color depth
the amount of data that defies each color in a pixel is called
color depth
the visual image output that a computer creates is known as
color depth
traditional magnetic hard drive
dell desktop computer
devices with a separate system unit and a large footprint are called
desktop computers
routers that can send internet signals over 2 distinct frequencies are called _____ routers
dual band
using a stylus and touchpad to map signatures and measure pressure is what type of recongiton
dynamic
largest bandwidth
fiberoptic
A url identifies a particular _____ address on the www
file
ISP stands doe
internet service provider
A form of spyware that records all actions typed on a keyboard is called a _____ logger.
keystroke
sage was developed during the
korean war
The volume of data that can be carried on an internet transmission media in an amount of time is called
latency
What is the name of a virus written in a macro language and placed within a document or spreadsheet.
macro virus
the actual number of pixels in a monitor is called _____ resolution
native
A group of compromised computers controlled by a hacker is called a _____.
network
Using reflective material to store data that can be read using a laser is called ___ media storage.
optical
Using refracted laser light to store data on a photoreceptive substrate is essentially how ___ storage works. Theoretically this could store gigabytes of data within a cubic millimeter
optical
A type of phishing that seeks to obtain personal information through malicious software that is inserted on a victim's computer is called _______ .
pharming
a security system separating 2 networks or even computers on the same network is called
ping
electronic echo
ping
a processor comprised of one control unit and one ALU is called a
single core processor
Specialized hardware or software that capture packets transmitted over a network are called packet _____.
sniffer
Because they have no mechanically moving parts, ___ provide extremely fast, efficient storage. Multiple
ssd
To create an image with a laser printer ___ is(are) drawn to the drum.
toner
the highest level in the domain name hierarchy is known as the _____
top level domain
URL
universal resource locaator
when discussing digital or smartphone cameras with APS CMOS APS stands for
active pixel sensor
Harming or harassing a person or group of people via information technology and networks in a repeated and deliberate manner is called _____.
cyber bullying
A crime in which a computer is the object of the crime or is used to commit a crime or offense is called _____.
cyber crime
Non-malicious computer security experts that test the security measures of an organization's information systems to ensure they are protected against malicious intrusions are called ___.
cyber security specialists
A person who uses computers and the Internet to launch attacks against computer systems for political or ideological reasons is called a ___.
cyber terrorist
memory is _______ and has no moving parts
electronic solid state
The fact that data on servers is nearly always backed up onto other servers gives ___ storage a major advantage over other data storage methods.
external
Cookies stored on a computer's hard drive and used to collect and store information about user preferences, password and username information, IP address, and/or data on web surfing behavior are called ___ cookies.
persistent
signal transmitted by wireless router
ping
personal computer CPU clock speeds range between ...
2-4 gigahertz
Blu-rays provide approximately ___ of storage space.
25 gb
Sometimes used to create prototype models for casting, ___ printing is also known as additive manufacturing
3D
CDs provide approximately ___ of data storage space.
700 MB
Inkjet printers are often sold ____ their production cost.
Below
represented as either 0 or 1, a ___ is the smallest unit of data a computer can process
Bit
a separate processor (computer) in your computer that enhances your video is the
CPU
The internet service that tends to provide the most consistent speeds is
DSL
The acronym DDoS stands for ___ .
Developed Denial of Service
The art and science of creating output that provides information in the most useful manner is called ___ .
Ergonomics
typical sad capacities for tablet computers or smartphones are measured in
Gigabytes
A port that allows the transfer of high quality video and audio signals is called a(n) ___ port.
HDMI
The standard port for video and audio input into televisions today is the .... port
HDMI
largest chip company is
Intel
microsoft
Internet explorer
The _______ cache is located directly on the processor itself
L1
a switch distinguishes between various devices within a network by their _______ addresses
MAC
the technology (chips) that allow cell phone microphones and hearing aids to be so small is the _____ chip
MEMS
megahertz=
MHz
connecting digital music......
MIDI
this technology allows musicians to create written sheet music by playing an instrument
MIDI
broadband is measured in
Mbps
a commonly used short range wireless technology used for data transfer and electronic payments is called
NFC
Though currently expensive, curved and paper-thin displays are possible using ___ display technology.
OLED
the technology that uses the reflection of a laser of the graphite left by a # 2 pencil to determine if a bubble has been filled in is called
OMR
Printer speed is described using which acronym?
PPM
the place in a digital device where the data and programs that device is currently using are accessible by the processors is called the
RAM
Instructions needed to boot up a computer are stored in
ROM
____ is actually storage since it retains data and information when power is off
ROM
Because a metal platter is physically spinning, hard drives have ___ access times than solid state hard drives.
SHORTER
What group determines the standards for the WWW
The world wide web consortium (wc3)
Connector most common for connecting printers, monitors etc
USB
The original wireless network privacy and protection standard for wifi was known as
WEP
the standard for wireless network privacy and protection is known as
WEP
wireless network introduced then replaced in 2003
WPA
in addition to activating _____ protection, its a food idea to disable your routers said transmission
WPA 2
CDs store data using ___
a blue spectrum laser beam
Blu-ray stores data using ___
a magnetic coating that is sensed by a read/write head
DVDs store data using ___ .
a reflective coating that has pits and lands
smartphone camera work by focusing incoming light onto what type of array that captures images
active pixel scanner
_____ ARE POPULAR WITH BUSINESS
all in one
data flows between different parts of the computer via
busses
the number of instructions the cpu can process per second is dictated by the ______ speed
clock
clock speed is also referred to as
clock rate
Because it allows their files to be accessed from any device on the Internet, many users like to back-up their files using ___ storage.
cloud
Firewall software used to block a user's access to specific Internet content is called a(n) _____ filter.
content
A description of the difference in the luminance of a display's white pixels compared to the black pixels is called ___ .
contrast
TWO MAIN COMPONENTS OF A PROCESSOR ARE ALU AND ....... UNIT
control
The malicious use of computer code to modify the normal operations of a computer or network is called a ___
cyber attack
One disadvantage of cloud storage is that
data is only available when you're online.
Which of the following would be considered a cybercrime?
data manipulation
An attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests is called a _____ attack.
ddos
SAGE was developed by us department of
defense
Though it could theoretically hold terabytes of data for thousands of years in a microscopic space, ___ storage, using genetic material, is a distant storage option.`
dna
a ______ name identifies a server site on the internet
domain
Solid state drives store data using ___
electronic circuits
a protocol commonly used to transfer large files from one server to another on the internet is the
file transfer protocol
the protocol used for transmitting large files from one server to another over the internet is known as the ____ protocol
file transfer protocol
software that limits the material that a browser fetches or displays is
filters
Hardware or software used to keep a computer secure from outside threats such as hackers and viruses by allowing or blocking Internet traffic is called a ____.
firewall
Number of times per second a frame in a video is advanced is the definition of ___ .
framerate
water resistant camera
gopro
_____ USER INTERFACE
graphical
A person who gains unauthorized access to networks and in order to steal and corrupt information and data is called a _____.
hacker
These facilitate getting data and information into your computer
input devices
touchpad are used with
laptop computers
for __________ it may be less expensive to add an existing cell phone
large corps
Lower range tones generally require ___ speakers.
larger
A million bytes of data equals approximately one ___
megabyte
An electronic element that stores data by changing its resistance based on the current that has passed through it (similar to RRAM) is called a(n) ___ .
memristor
megahertz is equal to one _____ cycles per sec
million
MODEM STANDS FOR
modulator demodulator
fiber optic cable is
more expensive
The 2 most common audio file formats are WAV and ___ .
mp4
new computer game
new video card
Using cells of ionized gas to create images, ___ displays are actually becoming less popular.
plasma
A type of printer that is used to print large graphic images such as architectural drawings by mechanically moving a pen over a large sheet of paper is known as a ___ .
plotter
software that can be added to a browser to increase its functionality are called
plug ins
a hole or slot in a computer is a
port
An output device that uses light to display video or image output on a surface is called a ___ .
projector
RFID
radio frequency identification
Because of their capability of storing data in multiple hard drives, data warehouses use ___ technology to ensure redundant data storage
raid
When referring to digital storage, RAID stands for ___ .
redundant array of independent discs
with optical zoom resolution ___________ when focusing on distant objects
remains the same
# of pixels in an image is called
resolution
The number of pixels in a display is called the display's ___ .
resolution
The device that connects two networks is a
router
your ______ can provide hardware firewall protection
router
because they're both apple products, the browser that works smoothest w macintosh is
safari
The accuracy of a digital recording is determined by the device's ___ rate.
sampling
Increased data transfer will be less likely to have errors if you use a ___ USB cord.
shorter
found in classrooms
smartboard
What type of port do most digital devices use to attach peripherals?
usb
Persistent cookies store information about
user prefernces
Software that infects a computer and is created using computer code is called a computer _____.
virus
A camera that takes photos or steams video into a computer or over the internet is
webcam
adequate cell service
wifi hotspot
the maximum number of bits per instruction that a cpu can process during 1 machine cycle is called
word size
A destructive program that replicates itself throughout a single computer or across a network is called a _____.
worm
A computer controlled by a hacker is called a _____
zombie
devices with a separate system unit and a relatively large foot print are called
desktop computersq
machine cycle steps
fetch decode execute and store
in photography there are two ways to focus on distant objects: digital and ____ zoom
optical
running the processor faster than recommended is called
overclocking
the bitorrent protocol is often called _____ file sharing
peer to peer
An input, output or storage device connected to a computer is known as a(an) _____ .
peripheral
The smallest controllable element of an image is called a(n)___ .
pixel
devices that allow for the retention of data when your computer has been shut down are called ____ devices
storage
because they're inexpensive and reliable ______ have become extremely popular storage devices
thumb drives USB
smartphone input device
touchscreen or keyboard
many computers today use _______ which is a coding scheme
unicode