CGS 2060 Midterm

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Windows OS is owned and maintained by ______

Microsoft

Which of the following might be risky to uninstall from a PC laptop?

Microsoft Works 6-9 Converter

Sometimes used to create prototype models for casting, _____ printing is also known as additive printing.

3D

When you buy a new laptop, how much RAM should come with it?

4-8 GB

Software that collects the user's web browsing history and uses the data collected to create unsolicited targeted popup advertisements is called _____.

Adware

The smallest unit of data storage is a

Bit

A short range wireless transmission protocol is known as ____.

Bluetooth

The art and science of creating output that provides information in the most useful manner is called ______.

Ergonomics

The machine cycle consists of which four steps?

Fetch, decode, execute, and store

Which transmission media has the largest bandwidth

Fiber Optic

A URL identifies a particular ____ address on the World Wide Web.

File

A protocol commonly used to transfer large files from one server to another on the internet is the ____.

File Transfer Protocol

Software the limits the material that a browser fetches or that a search engine displays are called ____.

Filters

Hardware or software used to keep a computer secure from outside threats such as hackers and viruses by allowing or blocking internet traffic is called a _____.

Firewall

What is a strength of the Linux platform

Free to download and use

A separate processor (computer) in your computer that enhances your video is called the ___.

Graphic processor (GPU)

The abbreviation for megahertz is ____.

MHz

Connecting digital musical devices to computers is accomplished by using ___ ports.

MIDI

Many manufacturers have made _______ optional equipment when buying a new laptop computer

Optical drive

The BitTorrent protocol is often called ____ file sharing.

Peer-to-Peer

An input, output, or storage device connected to a computer is known as a ______.

Peripheral

Cookies stored on a computer's hard drive and is used to collect and store information about user preferences, password and username information, IP addresses, and/or data or web surfacing behavior are called ______ cookies.

Persistent

A type of phishing that seeks to obtain personal information through malicious software that is inserted on a victim's computer is called _____.

Pharming

A request for an electronic "echo" or response from another computer or a service is called a ____.

Ping

The smallest controllable element of an image is called a(n) ______.

Pixel

A point (a hole or slot) in a computer, designed to accept a specific connector is called a ____.

Port

The device that connects two networks is a _____.

Router

Because they have no mechanically moving parts, ___ provide extremely fast, efficient storage.

SSDs

An unsolicited email message is called ______.

Spam

What has the most amount of storage?

Terabyte

A kilobyte has approximately one ______ bytes

Thousand

One type of storage device is a

USB Drive

What type of port do most digital devices use to attach to peripherals?

USB Port

The original wireless network privacy and protection standard for WiFi

WEP

The wireless network privacy standard that was introduced in 2003 but was quickly replaced (due to numerous vulnerabilities) was known as ____.

WPA

In addition to activating ___ protection, it's a good idea to disable your router's SSID transmission once all your devices are connected.

WPA2

The standard for wireless network privacy and protection is known as _____.

WPA2

The protocol for wireless networks is called ___.

WiFi

The first commercially available computer with a graphical user interface was NeXT's ____ computer.

Cube

A person who uses computers and the internet to launch attacks against computer systems for political or ideological reasons is called a _____.

Cyber Terrorist

The malicious use of a computer code to modify the normal operations of a computer or network is called a ______.

Cyber attack

Because its radio waves pass through walls or desktops, ___ capable devices are becoming very popular.

Bluetooth

A group of compromised computers controlled by a hacker is called a ______.

Botnet

An internet signal that has enough bandwidth to allow multiple computers to be connected the same router is called a _____ signal.

Broadband

Software applications that allow users to access and surf the World Wide Web are called _____.

Browsers

Two major factors that impact processor speed are clock speed and ____.

Bus width

The ____ is a computer within your computer creates images.

GPU

Typical SSD capacities for tablet computers or smartphones are measured in ___.

Gigabytes

When determining how much cellular data you need, it is important to consider

How much data you currently use

Many computers today use ___ which is coding scheme using at least 16 bits to represent a character.

Unicode

Data flows between different parts of the computer via __.

Buses

One character of information, for example, a letter or a number consists of one ___ of storage

Byte

Which optical drive media stores approximately 700 MBs of data?

CD

What might be a choice for internet service in your area?

Cable

Most touchpads use____ to sense when a finger has moved across the pad.

Capacitance

Magnetic Ink Recognition (MICR) is a technology that is most commonly seen on

Checks

The number of instructions the CPU can process per second is dictated by the ___ speed of the processor.

Clock

Clockspeed, also referred to as ___, the speed at which the processor performs the operations recquired to run a digital device and instructions executed by the digital device.

Clock rate

Because it allows their files to be accessed from any device on the Internet, many users like to backup their files using ____ storage

Cloud

Emailing a file to yourself is an example of using ___ storage.

Cloud

The fact that data on servers is nearly always backed up onto other servers gives ___ storage a major advantage over other data storage methods.

Cloud

SAGE was developed during the ______ war.

Cold

The amount of data that defines each color in a pixel is called

Color depth

The number of bits of data describing each pixel in a display is referred to as _____.

Color depth

A digital device that accepts input, and processes and stores the input, and provides output

Computer

A description of the difference in the luminescence of a display's black and white pixels is called ____.

Contrast ratio

The two main components of a processor are the arithmetic logic unit (ALU) and the ____ unit.

Control

A site on the windows operating system where you can uninstall programs, adjust settings, and manage tasks is the ________

Control Panel

A small text file of information created by websites you visit that your web browser stores on your hard disk is called a _______.

Cookie

What was the main question that ARPAnet wanted to solve?

Could a network be built that would continue to work even if multiple parts collapsed?

Which of the following might contain a traditional (magnetic) hard drive?

Dell desktop computer

Devices with a separate system unit and relatively large footprint are called ___ computers.

Desktop

Screen size is measured by the ____ across the monitor.

Diagonal

Screen size is measured by the.

Diagonal distance between the lower left corner of the screen to the upper right corner

Using a stylus and touchpad to map the signature and also measure pressure, pen angle, pen up/down, speed, etc. is known as what type of signature recognition?

Dynamic

Memory is ___ and has no moving parts.

Electronic (solid state)

Solid state drives store data using

Electronic circuits

Relatively rugged, water resistant video cameras that allow users to film HD video under harsh conditions, such as on ski mountains, in the ocean, or at high altitudes are called extreme action video cameras or simply a

GoPro

Letting computer users drag images and documents across their computers' monitors made the ___ User interface very popular.

Graphical

The visual image output that a computer creates is known as ___.

Graphics

A port that allows the transfer of high quality video and audio signals is called a(n) ______ port.

HDMI

The standard port for video audio input into televisions today is the ____ port.

HDMI

A person who gains unauthorized access to networks in order to steal and corrupt information and data is called a ______.

Hacker

The act of hacking or breaking in to a computer system for politically or socially motivated purposes is called _____.

Hacktivism

Using refracted laser light to store data on a photoreceptive substrate is essentially how ___ storage works. Theoretically this could store gigabytes of data within a cubic millimeter.

Holographic

What is true regarding a USB cord?

In general, the more data being transmitted, the shorter the cord should be

A television remote usually uses ____ waves.

Infrared (IR)

These facilitate getting data and information into your computer.

Input devices

The largest chip designing and manufacturing company in the world is

Intel

Although it sounds ironic, searching the_____ in your area is an efficient way to search for an ISP.

Internet

Firewall software used to block a user's access to specific internet content is called an ________ filter.

Internet

Which browser was developed by Microsoft?

Internet Explorer

ISP stands for what?

Internet Service Provider

What three are needed to install a home WiFi network?

Internet signal, modem, router

A form of spyware that records all actions typed on a keyboard is called a ______ logger.

Keystroke

What represents the least amount of storage?

Kilobyte

The ____ cache is located directly on the processor itself.

L1

A mobile hinged computer with an integrated keyboard that uses a full operating system is called a notebook or ______ computer

Laptop

Because a metal platter is physically spinning, hard drives have ___ access times than solid hard drives.

Longer

The cost of an SSD is ___ than the cost of a traditional hard drive.

Lower

A switch distinguishes between various devices within a network by their ____ addresses.

MAC

The technology (chips) that allow cell phone microphones and hearing aids to be so small is the ____ chip.

MEMS

This technology allows musicians to create written sheet music simply by playing an instrument.

MIDI

What is the name of a virus written in a macro language and placed within a document or spreadsheet?

Macro Virus

One of the largest data requirements of the future will likely be

Mapping patients' genomes

Broadband is measured in ____.

Mbps

A million bytes of data equals approximately one

Megabyte

An electronic element that stores data by changing its resistance based on the current that has passed through it (similar to RAM) is called a

Memristor

Megahertz is equal to one __ cycles (or instructions) per second.

Million

The word modem stands for ____.

Modulator-demodulator

Fiber optic cable is ____ expensive than coaxial cable to install

More

What is a strength of the android platform?

Most widely used OS for smartphones and tablets

The number of pixels in a monitor is called ____ resolution.

Native

What manages hardware and software, supports the computer's basic functions, and runs programs?

Operating System

In photography, there are two ways to focus on distant objects, digital zoom and ____ zoom

Optical

Running the processor faster than recommended by the manufacturer is called ____.

Overclocking

Printer speed is described using which acronym?

PPM

Paul Baran developed a technology called _____ switching that made the internet possible and reliable.

Packet

The smallest element of an image is called a ____.

Pixel

Using cells of ionized gas to create images, ______ displays are actually becoming less popular.

Plasma

A type of printer that is used to print large graphic images such as architectural drawings by mechanically moving a pen over a large sheet of paper is known as a _______.

Plotter

Software that can be added to a browser to increase its functionality are called ____.

Plugins

Because of their capability of storing data in multiple hard drives, data warehouses use ___ technology to ensure redundant storage

RAID

The place in a digital device where the data and programs that device is currently using are accessible by the processor is called the ___.

RAM

_____ is actually storage since it retains data and information when the power has been turned off.

ROM (Read Only Memory)

When referring to digital storage, RAID stands for

Redundant Array of Independent Discs

The term that describes how fast each pixel in a display is updated is ______.

Refresh Rate

With optical zoom, resolution ____ when focusing on distant objects.

Remains the same

The number of pixels in a display is called the display's ______.

Resolution

Your _____ can provide hardware firewall protection for your home network where it connects to the ISP's network, just as ISP networks have firewalls where they connect to the internet.

Router

Most tablets and phones use _____ as their main storage device

SSD

A signal transmitted every few seconds by a wireless router so that a users' computers can find a WiFi hotspot is called a ______.

SSID

Because they're both Apple products, the browser that works smoothest with Macintosh OS X is _____.

Safari

The accuracy of a digital recording is decided by the device's _____ rate.

Sampling

Increased data transfer will be less likely to have errors if you use a _____ USB cord.

Shorter

A processor comprised of one control unit and one ALU is called a

Single core processor

Contact your ISP if your actual internet speed is _____ than advertised.

Slower

The average tablet computer has a ____ hard drive than the average desktop computer.

Smaller

A combination input and output device that allows users to interact with large computer displays that is sometimes found in classrooms is called an interactive whiteboard or a ____.

Smartboard

Specialized hardware or software that capture packets transmitted over a network are called packet ______.

Sniffers

A security system separating two networks or even computers on the same network is called a ___.

Switch

A computer that is highly mobile, has a smaller OS, and uses a touchscreen as the primary input method is called ______

Tablet

A thousand gigabytes equals one

Terabyte

Because they're inexpensive and reliable __ have become extremely popular storage devices.

Thumbdrives (USB or flash drives)

The World Wide Web was created through a collaboration led by _____.

Tim Berners-Lee

Laser printers are popular in offices because they use relatively inexpensive

Toner

To create an image with a laser printer, ______ is drawn to the drum.

Toner

The highest level in the domain name hierarchy is known as the ____.

Top Life Domain

Select the smartphone input device

Touchscreen or keyboard

Used in a variety of devices, including ATMs and point-of-sale terminals, _______ allow for input of data using only a finger or stylus -

Touchscreens

A terabyte equals approximately _______ bytes

Trillion

This type of connector is the most common for connecting peripherals (printers, monitors, storage devices, etc.) to a computer.

USB

With ____ recognition technologies, frequency, pitch, speech rhythms and other characteristics are charted and compared to existing records

Voice

What group determines the standards for the World Wide Web?

W3C

A camera that takes photos or streams video into a computer or over the Internet is called a

Webcam

Nonmalicious computer security experts that test the security measures of an organization's systems to ensure they are protected against malicious intrusions are called ____.

White Hat Hackers

Many cellular ISP's offer modem/router combination devices that can create a ___ wherever there's adequate cell service.

WiFi Hotspot

WWW stands for what?

World Wide Web

A destructive program that replicates itself throughout a single computer or across a network is called a ____.

Worm

A computer controlled by a hacker is called a _____.

Zombie

CDs store data using

a reflective coating that has pits and lands

DVD's store data using

a reflective coating that has pits and lands

Combining the power of a desktop with a neat, clean look, ___ computers are popular with businesses.

all-in-one

A gigabyte has approximately one ______ bytes

billion

This technology provides short

distance wireless communication between electronic devices using extremely low power radio signals - Bluetooth

Though currently expensive, curved and paper thin displays are possible using _____ display technology.

- OLED

The instructions needed to bootup a computer, such as the BIOS, are typically stored in ____.

- ROM

"Full HD resolution" is best described as

1920x1080

Personal computer CPU clock speeds range between

2 to 4 Gigahertz

BluRays provide approximately ___ of storage space. -

25 GB

Most new laptop computers come with how much storage?

256GB - 1 TB

When discussing digital cameras or smartphone cameras with APS, CMOS, APS stands for

Active Pixel Sensor

Smartphone cameras work by focusing incoming light onto what type of array that captures images?

Active pixel scanner

FireWire connectors were developed for ____ computers.

Apple

The mouse was developed by which company?

Apple

The capacity of a particular transmission medium is called ______.

Bandwidth

The volume of data that can be carried on an internet transmission media in an amount of time is called ___.

Bandwidth

Inkjet printers are often sold ______ their production cost.

Below

Represented as either a 0 or 1, a ___ is the smallest unit of data a computer can process.

Bit

The technology that allows any text, even handwritten scrawls, to be digitized is known as optical ___ recognition.

Character

An attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests is called a ______ attack.

DDoS

Though it could theoretically hold terabytes of data for thousands of years, in a microscopic space, ___ storage, using genetic material, is a distant storage option.

DNA

The internet service that tends to provide the most consistent speeds is _____.

DSL

What is considered a cyber crime?

Data manipulation

SAGE was developed by the US department of ______.

Defense

Routers that can send internet signals over 2 distinct frequencies are called _____ routers.

Dual band

An application that navigates all the files and folders in your mac is the ______.

Finder

The number of times per second a frame in a video is advanced is the definition of

Frame rate

To allow hard disk drive platters spin more smoothly and cooler, some manufacturers seal platters in ___ instead of air.

Helium

What is equal to one cycle per second?

Hertz

A refracted laser beam striking a photoreceptor from many different angles allows ___ storage to retain many bits of data in the same location.

Holographic

Because of their compact size, touchpads are most often used with ___ computers.

Laptop

Lower range tones generally require ______ speakers.

Larger

All of the following are common ports that are included with laptop computers except

MIDI ports

A commonly used short range wireless technology used for data transfer and electronic payments is called

NFC (Near Field Communication)

A megabyte is equal to approximately ______ bytes

One Million

Using reflective material to store data that can be read using a laser is called ______ media storage.

Optical

A storage device that uses lasers to read CDs, DVDs, or Bluray discs is referred to as an -

Optical drive

Which type of touchscreen uses a single metallic coated panel and uses electricity to calculate touch points?

Projective capacitive

An output device that uses light to display video or image output on a surface is called a _____.

Projector

RFID stands for which of the following?

Radio Frequency Identification

The number of pixels in an image is called the image's

Resolution

To improve the sound quality of their smartphones, many users purchase large external ______ to listen to music.

Speakers

Select the sites that offer internet speed test services.

Speedtest.net and TestMy.Net

Devices that allow for the retention of data when your computer has been shut down are called _____ devices.

Storage

URL stands for ___ Resource Locator.

Uniform

Persistent cookies store information about _____.

User preferences

If you buy a new computer game that emphasizes graphics, or new photo/video editing software for your desktop computer, you may want to purchase a new ___ card.

Video

The technology that uses cameras, microphones, displays, speakers and software to allow users to both see and hear each other is called

Video conferencing

Most smartphones and tablets produced today use a ____ keyboard.

Virtual

Software that infects a computer and is created using computer code is called a computer _____.

Virus

In addition to the RAM, modern processors temporarily keep frequently accessed data in a

cache

One disadvantage of cloud storage is that

data is only available when you're online

For _____ it may be less expensive to add an existing cell phone data plan and to use the phone as a hotspot than to add wired internet service.

individual users

The maximum number of bits per instruction that a CPU can process during 1 machine cycle is called

word size

Select the domain name:

www.cnet.com

A crime in which a computer is the object of the crime or is used to commit a crime or offense is called a ____.

Cyber crime

Harming or harassing a person or group of people via information technology and networks in a repeated and deliberate manner is called a ______.

Cyberbullying

What does DDoS stand for?

Distributed Denial of Service

A ____ identifies a server site on the internet.

Domain


Ensembles d'études connexes

Geography Lesson 8 Vocabulary Terms

View Set

Psychology: Unit 5: QUIZ 1: ABNORMAL BEHAVIOR; QUIZ 2: GROUP BEHAVIOR; TEST

View Set

история олимпиада

View Set

Chronic Obstructive Pulmonary Diseases

View Set

Finance Chapter 6 Practice Problems

View Set

Chapter 46 NCLEX practice questions

View Set