Computer Science Final (Fall 2018)
What is the approximate value of a gigabyte?
1,000 megabytes
Compact Disk (CDs) are capable of storing up to ________ of data
700 MB
The seeds of the internet were planted in 1969 with ________, which connected computers at four universities in the western United States
ARPANET
___________ occurs when computers or machines can perform that work that was once done by a human
Automation
Any email address placed in the ___ will be invisible to the recipients of your message.
BCC
Which of the following optical discs can store the most data?
Blu-ray
When it comes to describing a computer's storage or memory we commonly use the unit known as the __________, which is simply a collection of eight bits
Byte
__________ refers to a form of high-speed memory that stores a small, frequently-used set of instructions and data. It is located inside modern CPUs.
Cache
The _________ is a temporary location for things that are being moved or copied.
Clipboard
A ________ license allows an author to set conditions for the free use and distribution of their work
Creative Commons
Kickstarter is known as a(n) ________ website because it allows the general public to provide financial support to organizations and individuals that are working on a new product
Crowdfunding
A ___ attack allows hackers to shut down or block access to websites and other network resources by overwhelming them with requests.
DDoS
The most fundamental components of storage that users interact with are the:
Files
Which of the following is used to create an interface to view, add, update, and delete data in a table
Forms
Keys, which are labeled F1, F2, and so on, are used to perform an action within a program
Function
Web browsers keep a list of every website you have visited in an area know as the:
History
Which of the following is a graphic that you can insert directly into your document
Horizontal line
A software _____________ is a contract from the software creator that specified the rules for using this software
License
Collectively, all malicious programs are referred to as:
Malware
Tumblr and Twitter and both examples of ________ services, where users share brief thoughts, links, and multimedia
Microblogging
A _________ is a device that can convert digital information from a computer into analog sound waves that can be transmitted over the phone lines
Modem
________ tags, such as those present in many automated toll collection systems, can be scanned from longer distances and at higher speeds then barcodes
RFID
Users with broadband connections are typically equipped with a(n) ________ that connects their home's network to the internet
Residential gateway
_______, which dates back to 1969, runs many of the world's most powerful servers.
Unix
_________ memory refers to a portion of your hard drive that is being used as RAM
Virtual
The _________ is a program that translates a specific programming language into a machine language that can be processed by the CPU
compiler
Operating systems communicate with most hardware components using:
device drivers
The ability to run multiple programs at the same time is known as:
multitasking
________ software is used for entering, calculating, and analyzing sets of numbers.
spreadsheet
A _________ license allows companies to install the software on multiple (or all) the machines that they own.
volume