Computer Info DANTES
5000
5 seconds is equal to _____ milliseconds.
dashboard
A GUI is sometimes called a computer __________.
bus
A ___ network has two endpoints and all computers are connected to a single wire or cable. Data packets on a ___ can collide; when this happens, the sending device waits and retransmits. If a connection on the ___ is broken (i.e. one of the computers in the chain crashes), the network may go down.
what-if
A ___-__ analysis allows a user to change the contents of a spreadsheet cell and find out how that would change the outcome of the calculation.
field
A ____ contains the smallest unit of meaningful data and can therefore be called the basic building block for a structured file or database. Examples of _____ include name, address, social security number, etc.
ring
A ____ network has no endpoints and all computers are connected in a continuous loop. In a ____ network, all packets flow in only one direction; there are no data collisions. If a connection on the ____ is broken, the network may go down.
Network Interface (NIC)
A ______ _______ Card is used by a computer to transmit and receive data over a network.
hash function
A ______ ________ uses an algorithm to transform a given string of letters into a string that represents the original string
macro
A _______, or keyboard shortcut, is a single keystroke or command used to automatically issue a longer, predefined series of keystrokes or commands.
kilobyte
A _________ is a unit of measurement equaling 1024 bytes of data.
megabyte
A _________ is a unit of measurement roughly equaling one million bytes.
protocol
A __________ is a set of rules governing the exchange of data between hardware and software on a communications network.TCP/IP is an example of a network communications _____________.
gigabyte
A ___________ is a unit of measurement roughly equaling one billion bytes.
binary
A bit equals one _____ digit.
word size
A computer's _____ _____ is the number of bits that the processor may process at any one time. The more bits in a _____, the faster the computer. Examples of ______ ______ in modern computers include 16, 32, and 64 bits.
index
A database ______ contains a list of keys and each key provides a pointer to the record that contains the rest of the fields related to that key.
widget
A desktop ________ appears on the computer desktop and is a specialized utility that looks like a control and displays information.
plaintext cleartext
A message that has not been encrypted is called _________ or __________.
sequential
A tape drive is an example of a _______________ access device; it retrieves data by starting at the beginning of the tape and reading each record until the required data is found
overclocking
A technique for increasing the speed of computer components such as motherboards, memory, processors, and graphics cards is called ________. __________ is popular with computer gamers but can be dangerous as components may overheat and be damaged or catch fire.
byte
A unit of measure equaling 8 bits is a _________.
expert
An __________ system is an interactive computer program that helps users solve problems. MYCIN, PROSPECTOR, CARES, CLUES and CLIPS are all examples
algorithm
An ____________ is a formula or set of steps for solving a particular problem. To be an _________, a set of rules must be unambiguous and have a clear stopping point.
embedded
Any electronic system that uses a CPU but is not a general purpose computer is called an _____________ system. Handheld computers and PDAs are examples of _________ systems because the operating system resides on a single chip. ___________ systems also include cellphones, watches, and components in cars, planes, trains and machine tools.
Basic Input/Output System
BIOS stands for _____ _____ _____ ______
255
Current versions of Windows support file names up to ___ characters long.
Dynamic Host Configuration Protocol
DHCP stands for ______ _______ ________ ______.
node
Each connection point on a network is called a ______. _____s include computers, network devices, and networked peripherals.
microcontrollers
Embedded computers are also called _______________ and are small, specialized microprocessors installed in cars, cell phones, and smart appliances.
decode
Fetch, _________, execute and store are the four basic operations of the machine cycle.
execute
Fetch, decode, _________ and store are the four basic operations of the machine cycle.
store
Fetch, decode, execute and _______ are the four basic operations of the machine cycle.
compression
File __________ is a method of removing repetitive elements of a file causing the file to require less storage space and less time to transmit.
Hypertext Markup Language
HTML stands for _______ _______ ______
Hypertext Transfer Protocol
HTTP stands for ____ _____ _____
primary
If we were using a database containing employee records, the ________ key might be the employee ID number or social security number. The _________ key could be a unique series of numbers or characters; it doesn't have to be meaningful--just unique.
star
In a ____ network, all computers are connected to a central computer. The central computer is called a hub. The hub prevents packet collisions, but if the hub goes down the network stops.
key
In a relational database, a _____ field is used to sort data. This can also be called a sort _____, index, or ___word. Most database applications allow for multiple keys so that users can sort records in different ways.
UNIX
Mac OS X includes a _______-based kernel which reduces the number of errors and glitches. This ________-based kernel also contributes to stronger security. Mac OS X was rewritten for Intel architecture in 2006 and has a reputation for being an easy to use, reliable, and secure operating system.
cryptographic algorithm
Messages are encrypted using a ____________ __________ and a key (a password).
hash function
Passwords are often encrypted using a _______ _________, which takes a string of characters of any length and converts it into a string of a specific length.
extranets
Private intranets that connect internal personnel and selected vendors are called _____________.
nonvolatile
ROM chips contain data that is _____________, meaning that this data is not lost when the computer is turned off.
TLS
SSL (Secure Socket Layer) and ___ are protocols used to create a secure connection between a computer and a website. Sensitive information such as credit card numbers is encrypted and therefore useless if intercepted.
microprocessors
Some computers have a single chip containing the circuits for two ________________; this is called a dual core processor.
benchmarks
Tests run by laboratories to compare the overall speed of microprocessors are called _____________.
control: arithmetic: registers
The CPU consists of the_______________ unit, the ______________/logic unit (ALU) and the ________________ (high speed storage areas).
compression
The JPEG graphics format has built-in _____________ that can be adjusted by the user. Modifying the __________ allows the user to control the resulting file size.
registry
The Windows _________ is a database that maintains a record of installed software and peripheral devices, preferences, and settings.
BIOS
The ____ is a set of instructions contained in ROM that tell the computer how to find the operating system and load it into RAM. The _____ also enables the computer to interpret keyboard commands and display characters on the monitor.
kernel : supervisor
The _______ (also known as the _____) is the central component of the operating system. While the computer is running, it remains in main memory and manages nonresident programs. It manages programs not resident in main memory to perform tasks that support application programs.
backbone
The internet ___________ consists of high speed, high capacity transmission lines that use the newest communications technology to transmit data across the internet.
motherboard
The main circuit board of the computer, the __________, contains the CPU and memory chips as well as connections for the keyboard, mouse, and printer.
command line
The most common user interface for UNIX systems is the _______ ______ interface.
bits
The number of ______ limits how big of a number can be expressed. To calculate this limit, simply do 2n, where n is the number of ______.
driven:line
The old (non-GUI) operating systems (DOS and UNIX) used command-_________ interfaces, or command-_______ interfaces that required the user to type complicated instructions.
Platform
The particular operating system and processor model on which a computer system is based is called the __________.
Pretty Good Privacy (PGP)
The public key encryption software used to encrypt documents such as email is called _______ ________ _______ and is available for free download on the web.
instruction : machine
The series of events which takes place in a set order and at specified intervals, that occurs when the processor retrieves an instruction from storage and executes it, is called the ________ cycle, also sometimes called the _______ cycle
inference engine
The software that controls the search of the expert system's knowledge base and produces a conclusion is called the ______ _______.
HTTP
The web protocol _____ is a set of rules for exchanging information over the web.
8
To convert from word size to bytes, you must divide by __ because there are __ bits in a byte. Therefore, when we're dealing with a 64 bit word size, we divide by __ and the result is __ bytes.
1000
To convert seconds to milliseconds, multiply by ______. Access times for PC storage devices are measured in milliseconds.
switch
Unlike a hub, a _______ sends packets only to the computer that is the intended recipient.
pipelining
Using a technology called ____________, the processor can start executing an instruction before the previous instruction completes.
parallel
When a computer performs several tasks simultaneously, this is called ________ processing. An example of _________ processing is when several processors work together sharing memory on the same task. This is often used in large computer systems designed to keep operating when one CPU fails.
serial
With _______ processing, the CPU must complete all steps in the instruction cycle before it begins to execute the next instruction. instructions are executed sequentially in the order received.
FTP
___ is a protocol used to copy files from one computer to another over the Internet.
TIFF
____ is a graphics file format used on both PCs and Macs for high quality printable files.
analog digital
____(1) data is measured in ranges and can be represented as a wave. If using the analogy of a light switch, a light dimmer switch would be _______(1) and a normal on/off switch would be _______(2) (represented in discrete digits such as 1's and 0's).
bus ring star
____, ___ and _____ are the three basic network topologies.
Random Access
_____ ______ storage devices are able to go directly to the requested data. Examples include computer hard disk drives, RAM, flash drives, floppy drives and CD-ROM drives. _______ _______ is much faster than sequential access storage (tape).
UNIX
_____ is a proprietary multitasking operating system with built-in networking capabilities that supports multiple users. It was first developed by Bell Laboratories in 1969. Today, it runs on all types of computers including PCs, workstations, and servers
memory
_____ is an area of the computer that holds data that is waiting to be processed.
CAD (Computer Aided Design)
_____ software is used to design products, maps, structures and civil engineering drawings. Drawings created with ______ software are 3D and can be rotated to view all sides.
Rule based
_____-_______ detection software is used by merchants for online transactions to detect and prevent fraud by establishing criteria each transaction must meet.
Fetch
______, decode, execute and store are the four basic operations of the machine cycle.
Random Access
_______ _________ Memory, stores temporary data which is waiting to be stored, processed, or output, and this data is lost if the computer is turned off. _____ ______ memory usually consists of several circuit boards (chips) that plug directly into the computer's system board.
Public key
________ _______ encryption uses two keys and is used to transmit credit card data in secure e-commerce transactions and it is also used for secure email.
Personal Information Management (PIM)
________ ________ ________ software helps users organize and manage daily business activities. Examples of information managed by ___ ____ ____ software include addresses, phone numbers, appointments, and to-do lists.
Multimedia authoring
________ ________ software combines video, text, animation, graphics and sound to create standalone multimedia applications.
Read-Only
________ __________ Memory chips contain fixed computer start up instructions, are loaded at the factory, and are nonvolatile.
DHCP
________ is a protocol designed to automatically distribute IP addresses.
cache
________ temporarily stores instructions and data that the processor is likely to use frequently. Examples of ___________ include L1, L2, and L3. In all cases, it is storage located closer to the processor than RAM and therefore can be accessed much more quickly. ______ speeds up processing.
Virtual machine
_________ ________ technology allows users to simulate the hardware and software of one computer architecture on another.
Linux
_________ is a non-proprietary version of UNIX and is maintained by thousands of volunteer programmers around the world. It was created in 1991 by Linus Torvalds, a programmer from Finland.
groupware
__________ is software that allows several people to collaborate on projects over a network.
Primary
__________ storage, also known as RAM or memory, is temporary data waiting to be processed, and is held in computer circuitry. This data is lost when the computer is turned off.
Gateways
___________ are used to transmit data between LANs of different network topologies or network operating systems.
microcomputers
___________ include personal computers: desktops and towers, laptops, and handheld computers.
freeware
___________ is software that is copyrighted but is available for free.
Cyberspace
___________ is the world of communications in general; it includes wired and wireless communications, as well as the Internet. It includes the Web, chat rooms, blogs, member based services, conference calls and automatic teller machines (ATMs).
Analytical
_____________ graphics (also called business graphics) are graphical forms that make numeric data easier to analyze.
Virtual
______________ memory uses the hard disk to mimic primary storage (RAM) and is used to store parts of data files or programs until needed, thereby gaining almost unlimited memory capacity.
Decompression
_________________ is used to restore the file to its original condition by replacing the repeated patterns that were removed during file compression.
secondary
___________storage refers to devices and media that store data permanently, such as a floppy disk, a floppy disk, or a USB drive. This data is not lost when the computer is turned off.
cyphertext
a message that has been encrypted is called _______.
256
an 8 bit video card is limited to displaying _____ colors.
solaris
is a version of UNIX made by sun microsystems and is popular for large websites and e-commerce servers.
control
the CPU ______ unit carries out four basic operations known as the machine cycle.