CGS Midterm

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

1920 x 1080

"Full HD" resolution is expressed as:

slower

Contact your ISP if your actual Internet speed is _____ than advertised.

Top level Domain

Highest level of domain hierarchy is

active pixel scanner

Smartphone cameras work by focusing incoming light onto what type of array that captures images?

browsers

Software applications that allow users to access and surf the World Wide Web are called ___ .

plug-ins

Software that can be added to a browser to increase its functionality are called ___ .

Virus

Software that infects a computer and is created using a computer code is called a computer

filters

Software that limits the material that a browser fetches or that a search engine displays are called ___ .

3D

Sometimes used to create prototype models for casting ____ printing is also known as additive manufacturing

peer to peer

The BitTorrent protocol is often called ___ file sharing.

DSL

The Internet service that tends to provide the most consistent speeds is _____.

Tim-Berners Lee

The World Wide Web was created through a collaboration led by ___ .

router

The device that connects 2 networks is a _____.

File Transfer

The protocol used for transmitting large files from one server to another over the Internet is known as the ___ Protocol (FTP).

WPA2

The standard for wireless network privacy and protection is known as ___ .

HDMI

The standard port for video and audio input into televisions today is the _____ port

MEMS

The technology (chips) that allow cell phone microphones and hearing aids to be so small is the _____ chip.

character

The technology that allows any text, even handwritten scrawls, to be digitized is known as optical ___ recognition.

video conferencing

The technology that uses cameras, microphones, displays, speakers and software to allow users to both see and hear each other is called ______.

OMR

The technology that uses the reflection of a laser of the graphite left by a #2 pencil to determine if a bubble has been filled in is called.

Control

The two main components of a processor are the arithmetic logic unit (ALU) and the _____ unit

buswidth

The two major factors that impact processor speed are clock speed ______

bandwidth

The volume of data that can be carried on an Internet transmission media in an amount of time is called _____.

WPA

The wireless network privacy standard that was introduced in 2003 but was quickly replaced (due to numerous vulnerabilities) was known as ___ .

modulator-demodulator

The word modem stands for ____.

input devices

These facilitate getting data and information into your computer.

MIDI

This technology allows musicians to create written sheet music simply by playing an instrument.

OLED

Through currently expensive, curved and paper-thin displays are possible using ____ display technology

speakers

To improve the sound quality of their smartphones, many users purchase larger external ____to listen to music

gigabytes

Typical SSD capacities for tablet computers or smartphones are measured in___

Uniform

URL stands for ____ Resource Locator

Microsoft

Windows OS is owned and maintained by _____ .

voice

With ____ recognition technologies, frequency, pitch, speech rhythms and other characteristics are charted and compared to existing records.

is enhanced

With optical zoom, resolution ____ when focusing on distant objects.

router

Your ___ can provide hardware firewall protection for your home network where it connects to the ISP's network, just as ISP networks have firewalls where they connect to the Internet.

contrast ratio

a description of the difference in the luminance of a display's white pixels compared to the black pixels

worm

a destructive program that replicates itself throughout a single computer or across a network is called

botnet

a group of compromised computers controlled by a hacker

USB drive

a type of storage device

clock rate

clockspeed, also referred to as ____ is the speed at which the processor performs the operations required to run a digital device and instructions executed by the digital device

All in one

combining the power of a desktop with a neat, clean, look ______ computers are popular with the businesses. Their lack of expendability make them less popular with serious gamers though.

zombie

computer controlled by a hacker

bit

represented as either 0 or 1, a ____ is the smallest unit of data a computer can process

firewall

security separating 2 networks or even computers on the same network is called

pixel

smallest element of an image

adware

software that conflicts the user's web browsing history and uses the data collected to create unsolicited targeted pop-up advertisements

electronic circuits

solid state drive store data using

refresh rate

term that describes how fast each pixel in a display is updated

L1

the ____ cache is located directly on the processor itself

MHz

the abbreviation for a megahertz is

Sampling

the accuracy of a digital recording is determined by the device's ____ rate

Native

the actual number of pixels is a monitor called ____ resolution

color depth

the amount of data that defines each color in a pixel

hacktivisim

the art of hacking, or breaking into a computer system, for a politically or socially motivated purpose is called

cloud

the fact that data on servers is nearly always backed up onto other services give ____ storage a major advantage over other data storage methods

cyberattack

the malicious use of computer code to modify the normal operations of a computer or network

word size

the maximun number of bits per instruction that a CPU can process during 1 machine cycle is called____

resolution

the number of pixels in a display is called the display's

RAM

the place in a digital device where the data and programs that device is currently using are accessible by the processor is called

Graphics

the visual image output that a computer creates

USB

this type of connector is the most common for connecting peripherals (printers, monitors, storage devices) to a windows computer

DNA

though it could theoretically hold terabytes of data for thousands of years in a microscopic space, ____, storage, using genetic material, is a distant storage option.

helium

to allow hard disk drive platters to spin more smoothly and cooler, some manufacturers seal the platters in____instead of air

toner

to create an image with a laser printer____ is drawn to the drum

MP4

two most common audio file formats are WAV and

Spam

unsolicited email message

Distributed Denial of Service

A DDos attack is when computers that have been affected by a virus act as "zombies" and work together to send out illegitimate messages creating huge volumes of network traffic. The acronym stands for

File

A URL identifies a particular __ address on the World Wide Web.

domain

A ___ name identifies a server site on the Internet.

webcam

A camera that takes photos or steams video into a computer or over the Internet is called a ___ .

smartboard

A combination input and output device that allows users to interact with large computer displays that is sometimes found in classrooms is called an interactive whiteboard or a ___.

NFC

A commonly-used short range wireless technology used for data transfer and electronic payments is called ___ .

tablet

A computer that is highly mobile, has a smaller OS, and uses a touchscreen as the primary input method is called a _____ .

cybercrime

A crime in which a computer is the object of the crime or is used to commit a crime or offense is called

computer

A digital device that accepts input, processes and stores the input, and provides output is a ____ .

keystroke

A form of spyware that records all actions typed on a keyboard is a ______ logger

billion

A gigabyte equals approximately one _____ bytes.

thousand

A kilobyte is equal to approximately one _____ bytes.

million

A megabyte equals approximately one _____ bytes?

laptop

A mobile hinged computer with an integrated keyboard that uses a full operating system is called a notebook or a ____ computer.

Cyberterrorist

A person who uses computers and the internet to launch attacks against computer systems for political or ideological reasons is called

Port

A point (a hole or slot) in a computer, designed to accept a specific connector

HDMI

A port that allows the transfer of high quality video and audio signals is called ___ port

File Transfer Protocol

A protocol commonly used to transfer large files from one server to another on the Internet is the ___ .

ping

A request for an electronic "echo" or response from another computer or server is called a ____.

Graphic Processor (GPU)

A separate processor (computer) in your computer that enhances your video is called

SSID

A signal transmitted every few seconds by a wireless router so that users' computers can find the Wi-Fi hotspot is called a(n) ___ .

control panel

A site on the Windows operating system where you can uninstall programs, adjust settings, and manage tasks is the _____.

MAC

A switch distinguishes between various devices within a network by their __ addresses.

Infrared (IR)

A television remote usually uses ____ wave

trillion

A terabyte equals approximately one _____ bytes?

Pharming

A type of phishing that seeks to obtain personal information through malicious software that is inserted on a victims computer is called

300 hours

According to youtube about how much video is uploaded to its site every minute

MIDI ports

All of the following are common ports that are included with laptop computers except

internet

Although it sounds ironic, searching the _____ in your area is an efficient way to search for an ISP.

Finder

An application that navigates all of the files and folders on your Mac is the _____ .

DDos

An attack on a network that is designed to interrupt or stop network traffic by flooding it with too many request is called ____ attack

memristor

An electronic element that stores data by changing its resistance based on current that has passed through it (similar to RRAM) is called

Bluetooth

Because its radio waves pass through walls or desktops______- capable devices are becoming very popular

RAID

Because of their capacity of storing data in multiple hard drives, data warehouses use ___- technology to ensure redundant data storage

laptop

Because of their compact size, touchpads are most often used with _____ computers.

Thumbdrives (USB or Flashdrives)

Because they are inexpensive and reliable ____ have become extremely popular storage devices

SSDs

Because they have no mechanically moving parts, ___ provide extremely fast, efficient storage

Safari

Because they're both Apple products, the browser that works smoothest with Macintosh OS X is ___ .

25 GB

Blu-Rays provide approximately ___ of storage space

Mbps

Broadband is measured in _____ .

700 MB

CDs provide approximately ___ of data storage space

Higer

Cost of a SSD is ____ than the cost of a traditional hard drive

a reflective coating that has pits and lands

DVDs store data using

More

Fiber optic cable is _____ expensive than coaxial cable to install.

content

Firewall software used to block a user's access to specific internet content is called ____ filter

apple

Firewire connectors were developed for____ computers

individual users

For _____ it may be less expensive to add an existing cell phone data plan and to use the phone as a hotspot than to add wired Internet service.

internet service provider

ISP stands for:

WPA2

In addition to activating ___ protection, it's a good idea to disable your router's SSID transmission once all your devices are connected.

Cache

In addition to the RAM, modem processors temporarily keep frequently accessed data in a ____

TRUE

In general, the more data being transmitted, the shorter the cord should be

optical

In photography, there are 2 ways to focus on distant objects, digital zoom and ____ zoom.

graphical

Letting computer users drag images and documents across their computers' monitors made the ___ User Interface very popular.

fetch, decode, execute, and store

Machine cycle consist of which 4 steps

checks

Magnetic Ink Recognition (MICR) is a technology that is most commonly seen on ____ .

wifi hotspot

Many cellular ISPs offer modem/router combination devices that can create a _____ wherever there's adequate cell service.

Unicode

Many computers today use_____ which is a coding scheme using at least 16 bits to represent a character

optical drives

Many manufacturers have made _____ optional equipment when purchasing a new laptop computer.

Million

Megahertz is equal to one _____ cycles per second

electronic (solid state)

Memory is ___ and has no moving parts

Virtual

Most Smart phones and tablets produced today have a ____ keyboard

256GB-1TB

Most new laptop computers come with how much storage?

SSD

Most tablets and phones use ____ as their main storage device

SSD

Most tablets and phones use _____ as their main storage device.

capacitance

Most touchpads use _____ to sense when a finger has moved across the pad.

packet

Paul Baran developed a technology called _____ switching that made the Internet possible and reliable.

User preferences

Persistent cookies store information about ____

2 to 4 gigahertz

Personal computer CPU clock speeds range between_____

Radio Frequency Identification

RFID stands for which of the following.

Go Pro

Relatively rugged, water-resistant video cameras that allow users to film high-definition video under harsh conditions, such as on ski mountains, in the ocean, or at high altitudes are called extreme-action video cameras or simply a ___ .

dual band

Routers that can send Internet signals over 2 distinct frequencies are called _____ routers.

overclocking

Running the processor faster than recommended by manufactures is called____. This can increase the performance and speed, but will also void manufacturer warranty.

Defense

Sage was developed by US department of___

Cold war

Sage was developed during ____

Diagonal

Screen size is measured by the _____ across the monitor

mheducation.com

Select the domain name.

touchscreen or keyboard

Select the smartphone input device.

Ergonomics

The art of science of creating output that provides information in the most useful manner is called

Smaller

The average tablet computer has _______ hard drive than the average desktop computer

bandwidth

The capacity of a particular transmission medium is called its _____.

Cube

The first commercially available computer with a graphical user interface was NeXT's ___ computer.

ROM

The instructions needed to boot-up a computer, such as the BIOS, are typically stored in

Intel

The largest chip designing and manufacturing company in the world is

Apple

The mouse was developed by which company?

clock

The number of instructions the CPU can process per second is directed by ____ speed processor

resolution

The number of pixels in an image is called the image's ____ .

WEP

The original wireless network privacy and protection standard for Wi-Fi was known as ___ .

Bluetooth

This technology provides short-distance wireless communication between electronic devices using extremely low power radio signals.

touchscreens

Used in a variety of devices including ATMs and point-of-sale terminals, ____ allow for the input of data with the use of a stylus or finger.

dynamic

Using a stylus and touchpad to map the signature and also measure pressure, pen angle, pen up/down, speed, etc, is known as what type of signature recognition?

world wide web

WWW stands for

router, modem, internet signal

What 3 items are needed to install a home WiFi network?

The World Wide Web Consortium (W3C)

What group determines the standards for the World Wide Web?

Operating system

What manages hardware and software, supports the computer's basic functions, and runs programs?

Could a network be built that would continue to work even if multiple parts collapsed?

What was the major question that ARPAnet wanted to solve?

how much data you currently use

When determining how much cell phone data you need it is important to consider

active pixel sensor

When discussing digital cameras or smartphone cameras with APS CMOS, APS stands for ___ .

4-8GB

When you buy a new laptop, how much RAM should it come with?

most widely used OS for smartphones and tablets

Which of the following is a strength of the Android platform?

free to download and use

Which of the following is a strength of the Linux platform?

Microsoft Works 6-9 Converter

Which of the following might be risky to uninstall from a Windows PC laptop?

terabyte

Which of the following represent the highest amount of storage?

kilobyte

Which of the following represents the least amount of storage?

Wifi

Which transmission media has the largest bandwidth?

projective capacitive

Which type of touchscreen uses a single metallic-coated panel and uses electricity to calculate touch points?

megabyte

a million bytes of data equals about one

Bluetooth

a short-range wireless transmission protocol is known as

optical drive

a storage device that uses lasers to read CDs, DVDs, or Blu-ray discs is referred to as

peripheral

an input, output or storage device connected to a computer is known as

projector

an output device that uses light to display video or image output on a surface.

shorter

because a metal platter is physically spinning, hard drives have ___ access times than solid state hard drives

cloud

emailing a file to yourself is an example of ____ storage

cable internet

good choice of internet service in your area

cyberbullying

harming or harassing a person via technology

shorter

in general, the ___ the access time, the faster the hard drive

broadband

internet signal that has enough bandwidth to allow multiple computers to be connected to the same router is called ____ signal

data is only available when you are offline

one disadvantage of cloud storage is that

mapping parents genomes

one of the largest data requirements of the future will likely be

PPM

printer speed described using what acronym

WIFI

protocol for wireless networks is called

holographic

using refracted laser light to store data on a photoreceptive substrate is essentially how ___storage works. theoretically this could store gigabytes of data within a cubic millimeter.

redundant array of independent disk

when referring to digital storage, RAID stands for

internet explorer

which browser developed by microsoft

Which of following might contain a traditional magnetic hard drive

Dell Desktop computer

Storage

Devices that are allowed for the retention of data when your computer has been shut down are called ___ devices

plotter

a type of printer that is used to print large graphic images such as architectural drawings by mechanically moving a pen over a large sheet of paper is known as a

GPU

computer within your computer that creates images

MIDI

connecting digital musical devices to computers is accomplished by using ____ ports

data malipulaiton

cyber crime

Buses

data flows between different parts of the computer via

desktop

devices with a separate system unit and a relatively large footprint are called ____ computers

desktop

devices with a separate system unit and a relatively large footprint are called____ computers

firewall

hardware or software used to keep a computer secure from outside threats such as hackers and viruses by allowing or blocking internet traffic is called

video

if you buy a new computer game that emphasizes graphics, or new photo/video editing software for your desktop computer, you may want to purchase a new ____ card

shorter

increased data transfer will be less likely to have errors if you use a _____ USB cord

below

inkjet printers are often sold ____ their production cost

ROM (Read Only Memory)

is actually storage since it retains data and information when the power has been turned off

toner

laser printers are popular in offices because they use relatively inexpensive

Larger

lower range tones generally require ____ speakers

macro virus

name of a virus written in macro language and placed within a document or spreadsheet

white hat hackers

non-malicious computer security experts that test the security measures of an organizations information system to ensure they are protected against malicious intrusions are called

frame rate

number of times per second a frame in a video is advanced is definition of

byte

one character of information, for ex, a letter or a number consist of one ___ byte of storage

hacker

person who gains unauthorized access to networks and in order to steal and corrupt info and data is called a

plasma

using cells of ionized gas to create images, ____ displays are actually becoming less popular

hertz

what is equal to one cycle per second

CD

which optical drive media stores approx. 700 Mbs of data

cookie

a small text file of information created by websites you visit that your web browsers stores on your hard disk is called


Ensembles d'études connexes

Unit 4 Chapters 10-15 The Nursing Process

View Set