Chapter 1-8 Overview EXAM #1 CRUHL

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

The rule of 72 states that dividing 72 by the interest rate approximates the time for the investment to double. This calculates the ___________ of the investment

Future Value (FV)

The level of complexity of the programming language, or the degree from which it is separated from machine language itself, is called the __________ of the programming language.

Generation

Most laptops have hard drive capacities measured in ___________ or terabytes

Gigabytes

While not actually a programming language, ____________ refers to the protocols that allow content to displayed on Web.

HTML5

A category of cyberterrorism that focuses on hacking computer systems for politically or socially motivated purposes is ___________.

Hacktivism

Phased:

Implements new areas of the system in a predetermined period of time.

SDLC steps in order?:

Investigation, analysis, design, development, implementation, and maintenance.

A form of spyware that records all actions typed on a keyboard is called a _________ logger.

Keystroke

One thousand bytes equals a _________.

Kilobyte

The _____ cache is located directly on the processor itself.

L1

Instructions (software) that allow a computer (hardware) to be used are written using specific symbols, letters and numbers known as a programming _________ or code.

Language

How does a laser printer work?

Laser removes electrons from the drum, paper is fed between the drum and the toner, charged toner is attracted to the drum, and toner is melted onto the paper.

The technology that musicians often use to connect their instruments to computers is _________.

MIDI

This technology allows musicians to create written sheet music simply by playing an instrument.

MIDI

A popular lossy video and audio compression format is:

MP4

When compared to cell phone cameras, most point-and-shoot cameras use photographic technology that is ________.

Nearly the same

Which are common types of servers?

Network, File, and Web Server

Define the term "resolution" in output devices:

Number of pixels in a display and quality of the image.

Frame Rate is:

Number of times per second a frame in a video is advanced.

Has the best possible contrast ratio

OLED

Most cellphone cameras do not have __________ zoom capability.

Optical

What type of media are DVDs and Blu-rays?

Optical

OMR stands for which of the following?

Optical Mark Recognition

Microsoft's Hotmail email service has now transitioned to Microsoft __________.

Outlook

Devices such as speakers, printers, and external keyboards are examples of:

Peripherals

When money is borrowed, the __________ value of the loan (the principal) is the initial amount of money borrowed.

Present

All computations and activities in a digital device are conducted by the:

Processor

A set of rules for communication between devices that determines how data is transmitted and received is called a _________.

Protocol

A type of malware that is triggered each time you boot your computer is called a ___________.

Rootkit

What type of cookie is stored in temporary memory and is lost when the web browser is closed?

Session

Increased data transfer means you should use a __________ USB cord.

Shorter

Direct:

Shuts down the old system and starts the new system.

Dot pitch:

The closer the spacing, the sharper the image, a description of the quality of a monitor or television screen, and the distance between two adjointing sub-pixels in a display.

Decode

The instructions are converted into something the computer can understand

Active Pixel Sensor (APS), Complementary Metal-oxide Semiconductor (CMOS) technology is used in most digital camera smartphone cameras and webcams today.

True

Many computers today use ______, which is a coding scheme using at least 16 bits to represent a character.

Unicode

The technology that uses cameras, microphones, displays, speakers, and software to allow users to both see and hear each other is called:

Video conferencing

Sharing infected files and opening an infected email attachment are ways that a computer _________ can infect a digital device.

Virus

Voice frequency, pitch, speech rhythms, and other characteristics are charted and compared to existing records when using ________ recognition technologies.

Voice

Ransomware:

When activated, encrypts files on user hard drive and then sells a decryption program.

A form of Email fraud where criminals change the account where money is being transferred is called a __________ scam.

Wire-wire

The amount of bits a processor can work with at any given time is referred to as _________ size.

Word

A type of malware that replicates itself throughout a single computer or across a network is called a __________.

Worm

While not technically a programming language, ___________ refers to the protocols that allow content to be displayed on the Web.

XML

DVD-ROM cannot be _________

burned.

Each number, special character, and letter of the alphabet is represented as a ________

byte.

A high-speed storage area usually located directly on the CPU is called:

cache

Solid state drives store data using:

electronic circuits

The art and science of creating output that provides information in the most useful manner is called:

ergonomics

As you use your hard drive new files will be deleted and added. This can create a slower, _________ hard drive.

fragmented

The physical parts of a computer such as the system unit (like the tower unit above) or a monitor are referred to as computer __________.

hardware

DVDs use longer (red spectrum) _______

lasers

Windows 10 is an ___________ ____________

operating system

Software Development Process:

planning programming debugging beta review

The amount of money borrowed in a loan, sometimes referred to as the PV or the loan balance is the loan's:

principal

Number of times per second a frame in a video is advanced is the definition of frame ________

rate

DVDs and Blu-rays use _________ material to store data.

reflective

Triple click:

selects a paragraph

A processor composed of one control unit and one Arithmetic Logic Unit (ALU) is called a:

single-core processor

A thousand gigabytes equal 1 ______________.

terabyte

Bus _______ is measured in bits. A 64-bit bus can transmit 64 bits of data.

width

Disk cleanup steps:

-From the Start button menu, -If prompted choose the mass storage device that you want to clean up -In the Disk Cleanup dialog box, select the items you want to remove -Click OK, then Delete Files

Defragmenting hard drive steps:

-Open Disk Defragmenter by clicking the Start button, -Under Current status, select the disk you want to defragment -To determine if the disk needs to be defragmented or not, click Analyze disk. -Click defragment disk.

What is the Boot Process?

-The device is powered on and the CPU activates UEFI (BIOS) -Power-On Self-Test is executed -OS is loaded into RAM -OS checks the registry and loads saved configuration settings.

What is a bit?

0 or 1

One kilobyte equals _________ bytes.

1,000

Typical aspect ratios for monitors?

16:9 and 4:3

Ultra HD:

3840 x 2160 pixels

Also known as additive manufacturing (AM), ____________ printing sprays successive layers of material to create an object.

3D

CDs provide approximately _________ of data storage space.

700 MB

A byte is equal to ___ bits

8

Wi-Fi uses the ___________ protocol

802.11

A computer program that scans files to identify and remove computer viruses and other malicious programs is called _____________.

Antivirus software

Output

Anything created with a computer. Allows users to view numbers, characters, pictures, or projected images.

Literally meaning "life measure", _______ technologies enable accurate identification.

Biometrics

A channel over which information flows inside a digital device is called a:

Bus

________________'s can only be burned once.

CD-R

Hard drive _____ is the amount of storage you have available to save data and information.

Capacity

In the spreadsheet above the word Uber is found in B6. B6 is called a ___________ reference.

Cell

Examples of management information systems (MIS) include:

DSS, TPS, and ESS

Screen size is measured by the:

Diagonal distance between the upper right and lower left corners of the screen.

In photography, there are two ways to focus on distant objects: optical zoom and ________ zoom.

Digital

A computer that is integrated a larger device, such as a programmable thermostat is called a ___________ computer. It has a real time operating system (RTOS).

Embedded

Characeristics of an SSD.

Extremely fast and no moving parts.

Most tablets have SSD capacities measured in terabytes (TBs).

False

Network _______ Translation (NAT) provides a type of firewall protection by hiding internal IP addresses.

Address

Online nuisances:

Adware, spyware, and spam

Written in natural language and in the form of a flowchart, a programmer uses a(n) _________ to describe the problem the program will solve.

Algorithm

Fetch

An instruction is obtained from memory

The second step of the SDLC process involves collecting data about existing hardware and software, analyzing this data, and preparing specifications for the system. This is called the system ___________ step.

Analysis

The number of bits of data describing each pixel in a display is referred to as:

Color depth

What does CSV stand for?

Comma separated values

A program that takes a program written in C, for example, and converts it into machine code is called a C ____________.

Compiler

______________'s can be burned multiple times

DVD-RW

Memory used to increase a hard drive's efficiency:

Disk cache

Print quality (resolution) is measured in:

Dots per Inch (DPI)

What is a mouse called that fits the hand comfortably and can reduce the risk of repetitive stress injuries such as carpel tunnel?

Ergonomic

After the problem has been clearly defined, the next step in the PDLC is to create the plan or algorithm. This plan is usually written as a ___________, and is written in an ordinary language, such as English.

Flowchart

Overheating, humidity, and magnetic fields can cause damage to the _____________ of a digital device.

Hardware

The roles of directing IS technicians, working with senior management to procure and implement IS, and developing policies for corporate IS typically falls to the _________.

Information Systems (information technology) Program Manager

Virtual keyboards, buttons, cameras, and microphones are examples of some of the _________ devices found on a typical smartphone.

Input

A ___________ allows programmers to convert the source code line-by-line.

Interpreter

RFID Tags:

Inventory tracking, pet identification, and package shipment tracking.

JSON stands for:

JavaScript Object Notation

Memory located next to the processor:

L3 cache

May have a relatively slow refresh rate since it relies on molecular movement.

LCD

High-Definition ________ Interface is a standard interface for audio-video connectivity which allows for the transmission of high-definition audio and video signals.

Multimedia

The technology that provides a type of firewall protection by hiding internal IP addresses is called _________.

NAT

Apple Pay uses _______ for payment transfer.

NFC

When inputs can easily be placed into different categories or classes, a(n) ________ -oriented analysis works well.

Object

What type of server intercepts all messages between client and server to help avert a hacker or other intruder from attacking a network?

Proxy

The shorthand that programmers use while building an algorithm is called: _____________

Pseudocode

_______ is actually storage since it retains data and information when the power has been turned off.

ROM (Read-Only Memory)

With optical zoom, resolution ________ when focusing on distant objects.

Remains the same

Software that gives network administrators the ability to provide computer assistance from a central location by allowing them to display and control any computer on the network is called __________ software.

Remote Desktop

Data from the hard drive can reach CPU __________ than data from the RAM.

Slower

A combination input and output device that allows user to interact with large computer displays that is sometimes found in classrooms is called an interactive whiteboard or a ______.

Smartboard

DVDs store data using:

A reflective coating that has pits and lands.

Which audio compression format is used by Apple music?

AAC

Select the set of programs that allow data to be exchanged on a website without changing the website's display.

AJAX

Before you use your employer's computer network, you'll probably have to read and sign that you agree to abide by the network's ___________ use policy.

Acceptable

What 3 parts must be in a loop:

An initial value, a process, and a test condition.

Clock speed, also referred to as ________ ________ is the speed at which the processor performs the operations required to run a digital device and instructions executed by the digital device.

Clock Rate

A person who harms or harasses via information technology and networks in a repeated and deliberate manner is called a ___________.

Cyberbully

IDS, which stands for intruder ________ system, protects a network from hackers

Detection

Purchasing the necessary software for the system is part of the system __________ step in the SDLC process.

Development

Which category of management information systems (MIS) focuses on corporate database drill-down capabilities?

ESS

Memory, such as RAM or cache, is ____________ and has no moving parts.

Electronic (Solid State)

The study of human factors related to things people use.

Ergonomics

5GL

Extremely advanced. Uses statements (scripts) rather than algorithms.

Select the technologies used by facial recognition software:

Feature charting, skin texture measuring, and 3D mapping.

When you invest money the ___________ value of the your investment is how much you will have after a certain amount of time.

Future

Typical hard drive capacities for personal computers are measured in which 2 of the following?

Gigabytes and Terabytes

The speed of most modern processors is measured in: ________

Gigahertz

The depiction of image data on a display or output device are called:

Graphics

A unit of frequency representing one cycle per second is:

Hertz

Firewall software used to block a user's access to specific Internet content is called a(n) _________ filter.

Internet

Select the traits that are currently used for biometric identification.

Irises, stride, and fingerprints.

An object-oriented programming language that is popular for writing apps for Android phones and tablets is:

Java

What is true about packet sniffers?

Legitimate sniffers are used for routine examination and problem detection and unauthorized sniffers are used to steal information.

One million bytes equals a ________ of data. This is enough to store the text in approximately four books in plain text.

Megabyte

Apple Pay, Google Wallet and Android Pay all use _________ technology.

NFC

Though currently expensive, curved and paper-thin displays are possible using ______________ display technology.

OLED

Describe a computer programmer's algorithm:;

Often written in the form of a flowchart so that can be shared, and if necessary, edited by other programmers and written in natural language, such as English.

Parallel:

Old and new systems run side-by-side for a while.

For which of the following activities would a typical marketing department need a strong information system?

Online sales, updating the business's social media sites, and online advertising.

Typically computer viruses must be _________ to attack and do damage to a digital device.

Opened

Most cellphone cameras do not have _______ zoom capability.

Optical

The smallest controllable element of an image is called a(n) ___________.

Pixel

Creates image using cells of ionized red, blue, and green gas

Plasma

To convert sound waves into digital signals, each sound wave is ___________.

Sampled

What does SDLC stand for?

System Development Life Cycle

Execute

The processor completes the instruction

Store

The results are placed in memory before the next instruction is executed.

What's true of script kiddies?

They illegally gain access to computer systems using programs (scripts) that others have written and they are typically amateur computer hackers with little programming expertise.

The programming design that forces programmers to consider how the algorithm can be written in computer code by first breaking it down into smaller tasks is called:

Top-down programming design

What does TPS stand for?

Transaction processing systems

Computer hardware and software that an organization uses to increase its performance is referred to as its Information Technology (IT) _______________.

System

Right-click:

opens the menu options

Mary uses computers and the internet to launch attacks against computer systems for political or ideological reasons. Mary is considered a cyber-___________.

terrorist

The computer hardware and software that an organization uses to increase its productivity is referred to as an IT:

System

The final step in the system development life cycle is maintaining the system. Select the two phases of this step:

System audit and evaluation phase

USB drives use special _________ to store information.

Transistors

Often accompanying downloaded music or apps, programs that appear to be legitimate, but executes an unwanted activity when activated is called a __________.

Trojan

Spam messages are sometimes called ________ and are used for a variety of marketing purposes including selling products and services.

UBE

Things with storage:

USB drive, Blu-ray disc, ROM, and SSDs.

Lightning connectors were developed by:

Apple

The width of a screen compared to the height of a screen is referred to as:

Aspect Ratio

Judy wants to purchase a Blu-ray disc that can be recorded on multiple times. She should choose discs that are labeled:

BD-RE

Another name for a computer's processor is the _______.

CPU

A digital device that accepts input, processes and stores the input, and provides output is a ___________

Computer

Cache contains frequently accessed data and is _________ the computer's RAM

Much smaller than

Things with memory:

RAM, L3 Cache, and Processor registers

Specialized hardware or software that captures packets transmitted over a network are called packet ________

Sniffers

DeSean received an unsolicited email message from an unknown sender. This email was __________.

Spam

Ted installs computer software designed to prevent spam messages from entering his email inbox. This type of software is called a _________ filter.

Spam

4GL

Specifically designed for creating database management programs.

Software that collects information about your Internet surfing habits and behaviors is called __________.

Spyware

Pilot

Starts in one area of the organization and then is deployed to the rest of the organization.

Blu-ray discs and DVDs are __________ media.

Storage

The component of a computer that allows data to be retained after power is turned off is referred to as _______________.

Storage

Characteristics of a traditional hard drive:

Stores data magnetically, Platter, Read/write head

Because Objective-C was difficult to write in, Apple developed __________ , a programming language for writing software for the Mac OS and the iOS.

Swift

Popular in the 1990s, the blue port in the image is used to connect computers to monitors or televisions. It is a ______ port.

VGA

To make a calculation always refer to a specific cell when copying it using the fill handle, make the cell a(n) _____________ reference.

Absolute

Smartphone cameras work by focusing incoming light onto what type of array that captures images.

Active Pixel Sensor

Many hands-free devices and other mainstream computer input tools have resulted from the creation of ______ use technologies

Adaptive

Technologies that permit alternative means of entering data into a digital device, such as using your voice to write text messages, are referred to as ____________ technologies.

Adaptive

Monitoring database systems performance, developing and maintaining databases, and establishing user privileges for databases are usual roles of a Database _______________.

Administrator

Collecting data, interpreting information gleaned from a database, and preparing reports for senior management are tasks that are typically assigned to a data __________.

Analyst

2GL

Assembly language. An assembler converts 2GL into machine language.

Worms:

Automatically reproduces itself.

The 3rd generation programming language that most students learned when most computers used MS DOS was ____________. It remains a safe programming language for using 3rd party code and provides a coding standard that integrates easily with other programming languages.

BASIC

_______ provides short-distance wireless communication between electronic devices using extremely low power radio signals.

Bluetooth

Black hat hackers

Break into computer systems with the intent of causing damage or stealing data

If you plan to write software for PC games you should probably learn C or ___________.

C++

You made a simple spreadsheet for an online class assignment for a group project and want all group members to be able to open it regardless of what spreadsheet program they use. Which format would be the best to use?

CSV

Memory and _______ hold data used by processors

Cache

Which of the following are input devices commonly found in a smartphone?

Camera & Microphone

What does DDoS stand for?

Distributed Denial of Service

Data theft

Employees who are leaving their jobs sometimes think they have a right to take copyrighted material that they created for the business, even though it doesn't belong to them.

Executives rely on _________ software because it provides tools to run an entire corporation.

Enterprise Resource Planning

To allow hard disk drive platters to spin more smoothly and cooler, some manufacturers seal the platters in ___ instead of air.

Helium

3GL

High-level programming language. Uses a complier to convert into machine language.

Because they have no moving parts, SSDs costs tend to be _______ than traditional (magnetic) hard drives

Higher

A refracted laser beam striking a photoreceptor from many different angles allows ___ storage to retain many bits of data in the same location.

Holographic

Which statements refer to a display's contrast ratio?

In general, the higher the contrast ratio, the better the image quality, describes the difference in brightness, and luminance of white pixels compared to black pixels.

The two methods of identifying people by their eyes are retina scanning and _________ scanning.

Iris

An object-oriented programming language that is popular for writing apps for Android phones and tablets is ____________.

Java

Only $2.99/month A programming language that uses HTML scripts to make creating Websites and Webpages much faster is __________.

Javascript

What does JPEG stand for?

Joint Photographers Expert Group

To create a reminder in Windows 10, click Cortana and then click the ____________ sign.

Light Bulb

A decision point in a flowchart that asks a question and has 3 parts (an initial value, a process, and a test condition) is called a _____________.

Loop

Because it reduces an audio file's sampling rate to save space, the MP3 format is a ______________ compression format

Lossy

Fetch, decode, execute, and store are steps of the ________ cyle.

Machine

1GL

Machine language. Represented by a series of 1s and 0s.

Malware is short for ____________ software.

Malicious

Experts suggest using password __________ software to keep your passwords safe.

Management

MIS stands for:

Manager Information Systems

Two or more complete processors residing on the same chip and can execute two or more sets of instructions at a time is called a ___________-core processor.

Multi

Items that can be connected to a digital device are referred to as ______

Peripherals

Server banks have storage capacities measured in _____________ of data.

Petabytes

Creating a fake webpage to trick victims into divulging personal information is a type of phishing known as __________.

Pharming

What does RAID stand for?

Redundant Array of Independent Discs

The term that describes how fast each pixel in a display is updated is:

Refresh rate

The number of pixels in an image defines the picture's ___________.

Resolution

Software programs that hide in the operating system and allow for the installation of hidden files are called:

Rootkits

If you notice you are receiving fake antivirus messages, power down your computer and reboot your computer in ___________ mode.

Safe

The ________ the access time, the faster your data will reach your processor.

Shorter

The technology that allows any text, even handwritten scrawls, to be digitized is known as optical ________ recognition.

Character

The technology that allows any text, even handwritten scrawls, to be digitized is known as optical _________ recognition.

Character

Magnetic Ink Recognition (MICR) is a technology that is most commonly seen on _________.

Checks

Emailing a file to yourself is an example of using ___________ storage.

Cloud

The number of bits of data describing each pixel in a display is referred to as __________ depth.

Color

White hat hackers

Computer experts that attempt to hack into a network to ensure that it is protected against intrusions.

The specialized end of a cord, plug, or expansion card that connects into a port is called a _________.

Connector

To adjust your Windows computer's time and date settings, it's often easiest to go to the ___________ panel.

Control

A deliberate misuse of computers and networks, ___________ use malicious code to modify the normal operations of a computer or network.

Cyberattacks

A crime in which a computer is the object of the crime or is used to commit a criminal offense is called _________.

Cybercrime

DSS stands for:

Decision Support System

PDLC 6 steps:

Define the problem, creating a plan, writing the code, testing the code, debug the code, and documenting the program

To reduce the time it takes to find files on a hard drive it is a good idea to __________ your hard drive.

Defragment

The third step of the SDLC has 3 phases, specifically, developing several system proposals, selecting the most feasible proposal, and reporting on the selected system to be developed. This step is called the system _______ step.

Design

Using a stylus and touchpad to map the signature and also measure pressure, pen angle, pen up/down, speed, etc., is known as what type of signature recognition?

Dynamic

What is a Solid State Drive? (SSD)

Electronic storage devices that are used in a variety of products. SSDs have no moving parts, which makes them faster and more durable than hard drives.

The technology (chips) that allow cell phone microphones and hearing aids to be so small is the _________ chip.

MEMS

When referring to management information systems, SCMS stands for supply chain __________ software.

Management

Initially, the United States Computer Emergency Readiness Team (US-CERT) determined that these 2 vulnerabilities would necessitate replacing a significant number of Intel and AMD computer processors.

Meltdown and Spectre

An electronic element that stores data by changing its resistance based on the current that has passed through it (similar to RRAM) is called a(n) ___

Memristor

A type of printer that is used to print large graphic images such as architectural drawings by mechanically moving a pen over a large sheet of paper is known as a _____.

Plotter

The most common computer keyboard is named for the first six letters on the top row of letters and is sometimes referred to as a _________ keyboard.

QWERTY

Once the virus is identified the antivirus software attempts to remove the virus from the file. If the software cannot remove the infected file it will send the file to an isolated area on the hard disk called _____.

Quarantine

Because of their capability of storing data in multiple hard drives, data warehouses use __________ technology to ensure redundant data storage.

RAID

Because of its complexity, developing an IT system uses a process called the __________

SDLC


Ensembles d'études connexes

Ms.Silva's Theorems, Postulates, Definitions, and Formulas

View Set

Med Surg Chapter 43 pg 1008-1014 & 1018-1021/BPH, Vasectomy, & ED #2

View Set

Chapter 27: Management of Patients With Coronary Vascular Disorders

View Set

Basic Nursing Chapter Two Clinical Judgement

View Set

Intraoperative Nursing Management

View Set

12-11 Network Infrastructure Security Group

View Set

Chapters 7 10 11 12 Econ 410 Final Review

View Set

Wastewater Treatment Grade 1 - Part 1(Transcribed by Chuck)

View Set