Ch. 4 & 6 7 Review

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

Formulas with static numbers (instead of cell addresses) are considered

"Hard coded"

Formulas with cell addresses are considered

"Soft Coded"

Flash

- Non volatile, chip based - Doesn't need electricity to retain information - Holds computer start up instructions and system information - System time, date

ROM (Read only memory)

-Non volatile, chip based - Holds the most

RAM (Random Access Memory)

-Volatile, chip based -Commonly known as main memory -Holds data and programs that are currently being worked on

Chip based memory is fast

200,00 time faster than a hard drive Approximately 10 nanoseconds to retrieve data

Many chips stored on a module. A module is a

3 dimensional circuit board

What is the binary system?

A number system that has two unique digits, 0 and 1 called bits. A bit is the smallest unit of data the computer can process.

What is the role of an operating system?

A set of programs that coordinates all the activities among computer or mobile device hardware

___________ does math and comparisons

ALU - Arithmetic Log Unit

Widely used coding scheme to represent a set of characters

ASCII

A(n) ____________________ is a circuit board that enhances the functions of a component of a desktop or server system unit and or provides connections to peripheral devices.

Adapter card

_________ include basic calculations such as addition, subtraction, multiplication and division

Arithmetic Operations

Why do app developers opt for web delivery?

Because they do not have to create a different version for each mobile device's app store

Use other input devices (scanners, microphones, etc.) and extra s/w to detect physiological characteristics Retinal scanner Iris scanner Fingerprint scanner Face recognition Voice recognition Signature verification

Biometric Devices:

"more nits = brighter picture"

Brightness is measured in nits

The wiring that connects all the processing unit components

Bus

Determines the number of bits a computer can transit at one time

Bus width

__________________ is a type of application that assists professionals and designers in creating engineering, architectural, and scientific designs and models.

CAD software

Type of education in which students learn by using and completing exercises with instrumental software

CBT

System unit is comprised of:

CPU Internal Memory Expansion Slots Bus Ports

____________ manages all communication and memory

CU - Control Unit

Small piece of semiconducting materials, usually silicon, on which integrated circuits are etched

Chip

Many factors determine a computer's speed

Chip speed, bus speed, amount of internal memory

Component of the computer that directs and coordinates most of the operations in the computer

Control Unit

What are the two components contained in a processor?

Control unit and arithmetic logic unit

_____________ is a small text file that a web server stores on your computer

Cookie

The term ___________ refers to removing unwanted areas of a photo

Crop

____________ software performs functions specific to a business or industry.

Custom

What happens during the delivery phase of a virus?

During delivery phase, the virus unleashes its payload, which might be a harmless prank, that displays a meaningless message- or it might be destructive, corrupting or deleting data and files.

What steps can you take to safeguard your funds and identify when using personal finance apps?

Evaluate the apps, use strong passwords to access the apps, guard your smartphone, and verify the transactions.

A dual core processor doubles the processing speed of a single core processor. T/F

F

In the binary system, the digit 1 represents the absence of an electronic charge T/F

F

Most RAM is nonvolatile T/F

F

Open source software is a mass produced, copyrighted software that meets the needs of a wide variety of users. T/F

F - Retail Software

Application software serves as the interface between the user, the apps, and the computer's or mobile device's hardware. T/F

F - System Software

In general, multi core processors are less energy efficient than separate multiple processors. T/F

F - more energy efficient

With database software, users run functions to retrieve data. T/F

F - they run queries

The power supply converts the wall outlet AC power into DC power. T/F

F- AC adapter

Cookies typically are considered a type of spyware. T/F

F- Cookies are not considered spyware because website programmers do not attempt to conceal the cookies

A worm is a destructive program designed as a real program. T/F

F- Trojan Horse

The system clock keeps track of the date and time in a computer. T/F

F- a separate battery backed chip, called the real time clock keeps track of date and time

The processor interprets and executes a program or application's instructions while the program or application is in nonvolatile memory. T/F

F- while the program is in RAM

In the machine cycle, the _________ operation obtains a program or application instruction or data item from memory

Fetching

What are the four operations performed during the machine cycle?

Fetching Decoding Executing Storing

ROM chips that contain permanently written data, instructions or information.

Firmware

How does fragmentation affect a computer's performance?

Fragmentation slows down the file access and thus the performance of the entire computer. Defragmenting the disk, or reorganizing it so that the files are stored in contiguous sectors solves this problem

Lots of specialty devices

Gamepad - two handed device, with buttons, wheels, sticks. Talks to console. Joystick - stick with buttons on base Steering wheel - may have buttons and a footpad with pedals Light guns - fancy flashlight or a motion sensing device Dance pad - flat device (can be hard or pliable) that senses pressure Motion sensing device - like a Wii remote

The steps the CPU goes through to perform one instruction

Get instruction from MM - CU Decode the instruction and send to the ALU - CU Instruction performed - ALU Instruction result moved into MM - CU

A(n) _____________ is a device intended to stop network intrusions before they attempt to affect your computer or network maliciously

Hardware firewall

__ allow you to connect many devices to a single port

Hubs

The use of software to emulate hardware capabilities, enabling computers to scale, or adjust up or down, storage, processing power, or bandwidth as needed.

IaaS

When might you choose to use a database instead of a spreadsheet?

If you want to collect, reorganize, and filter data, and or create reports from the data.

Connect to the system unit either with a cable or wirelessly Infrared requires line of sight Radio (e.g. Bluetooth)

Input/Output Devices

The term, ________ describes a computing environment where everyday objects are connected to the Internet.

IoT

A(n) __________________ is the right to use a program or app

License Agreement

___________ are applications that incorporate data from multiple providers into a new application.

Mashups

The ____ is the main circuit board of the computer

Motherboard

The main circuit board of the computer

Motherboard

A ___ is a single chip with two or more separate processor cores

Multi - core processor

Mobile Payment apps use a payment system on phones equipped with a(n) ____________________, which stores data that is transmitted to a contactless terminal and verified as a legitimate scale.

NFC chip

Application Software dictates:

OS H/W - memory, video card Peripherals

OCR (Optical Character Recognition) Recognizes numbers and letters OMR (Optical Mark Recognition) Like a Scantron machine Bar Code readers, lots of kinds

Optical Readers

Convert anything scanned into an image

Optical scanners

An aspect of cloud computing that allows developers to create, test, and run their solutions on a cloud platform without having to purchase or configure the underlying hardware and software is known as _________

PaaS - platform as a service

Destructive event or prank a virus was created to deliver

Payload

Input and output devices called

Peripheral Devices

Security tool that protects and detects a personal computer and its data from unauthorized intrusions

Personal Firewall

Scan in which a perpetrator sends an official looking email to message that attempts to obtain personal and or financial information

Phishing

Essentially sockets for connecting peripheral devices Serial - one bit at a time Parallel - multiple channels USB (Universal Serial Bus) Connects many types of devices Lots of other specialty ports: Head phone Microphone Telephone

Ports

Who might use CAD - COMPUTER AIDED DESIGN?

Professionals and designers, engineers, architects, scientists, home and small business users

Square shaped graphic that represents a web address or other information

QR code

Separate area of a hard drive that holds an infected file until the infection can be removed

Quarantine

Lots of internal memory:

RAM ROM Flash

What is meant by the term, microprocessor?

Refers to a personal computer processor chip

Small high speed storage locations contained in a processor

Registers

Copyrighted software that is distributed at no cost for a trial period

Shareware

Computing environment where an internet server hosts and deploys applications

Software as a Service

What is the difference between software registration and product activation ?

Software registration typically is optional an usually involves submitting your name and other personal information to the software manufacturer or developer. Registering the software often entitles you to product support. Product activation is a technique that some software manufacturers use to ensure that you do not install software on more computers than legally licensed.

______________ software is an application that allows users to organize data in columns and rows and perform calculations on the data

Spreadsheet

The operating system and other tools are collectively known as

System Software

The hardware that houses the processing unit components

System Unit

PCs also have bays

System Unit opening that can hold a device Internal and External Internal holds Hard drive External holds CD, DVD drive

A PDF file can be viewed and printed without the software that created the original document. T/F

T

A router can also function as a hardware firewall

T

As with processors, manufacturers state the clock speed for a bus in hertz. T/F

T

In cloud computing, the back end consists of the servers and storage devices that manage and store the resources accessed by users. T/F

T

On a personal computer, all functions of the processor usually are on a single chip. T/F

T

ROM chips are also called firmware. T/F

T

Software suites offer three major advantages: lower cost, ease of use, and integration. T/F

T

The military and airlines use CBT simulations to train pilots to fly in various conditions and environments. T/F

T

The motherboard also is called a system board. T/F

T

When downloading shareware, freeware or public domain software, it is good practice to seek websites with ratings for and reviews of products

T

While a computer or mobile device is running, the operating system remains in memory. T/F

T

With web apps, you always access the latest version of the software. T/F

T

What is the clipboard?

Temporary storage location

How does a personal firewall protect your computer?

They constantly monitor all transmissions to and from a computer or mobile device and may inform a user of attempted intrusions.

Program that enables you to perform maintenance type tasks, usually related to managing devices, media and programs used by computers and mobile devices

Tools

Integrated circuit component that acts as an electronic switch that opens or closes the circuit for electrical charges

Transistor

In addition to the clock speed, what other factors influence the computer's performance?

Type of processor chip, amount of cache memory access time, bus width, and bus clock speed.

Number of bits the processor an interpret and execute at a given time

Word Size

Malware that resides in active memory and replicates itself over a network to infect computers and devices, using up the system resources and possibly shutting down the system.

Worm

What type of activities does a license agreement restrict?

You do not have the right to copy, loan, borrow, rent, or in any way distribute programs or apps. Doing so, is a violation of copyright law; it is also a federal crime.

A character can be represented by one

byte

ARM chips have lower power consumption so majority of mobile devices use them to...

extend battery life


Ensembles d'études connexes

Unit 12: Abnormal Behavior, Myers AP Psychology, 3rd edition

View Set

UNIT 8: PROVIDE CONTACT CENTRE SERVICES

View Set

3rd Year Gas Venting and Chimneys

View Set

History: The Cold War 1945-62 Part 2/10

View Set