M5, M6, M7 Introduction to computing
circuit
Just as vehicles travel on a highway, bits travel on a(n) ______.
UPC
Kind of bar code used by retail and grocery stores
malicious
Malware is short for ______ software.
Converts a scanned image into a text file that can be edited, such as with a word processing application
Many scanners include OCR software. What does OCR software do?
clock speed
Measured in ticks per second
flat-panel
Most current displays are a type of ______ display.
binary
Number system that has just two unique digits
convertible
On a(n) ______ tablet, the case is positioned below a keyboard, attached by a hinge that enables the user to fold the display down over the keyboard.
gigahertz
One billion ticks of a system clock per second
Number
PIN stands for personal identification ______.
PIN
Passcode is another term for a(n) ______.
firmware
ROM chips called ______ contain permanently written instructions, or information, such as start-up instructions.
processor
The ______ interprets and carries out the basic instructions that operate a computer.
ALU
The ______ is the component of the processor that performs arithmetic and comparison operations.
MICR
The banking industry almost exclusively uses ______ for check processing.
rom
The data on most of this type of chip cannot be modified
cmos
The flash memory chips that store a computer's startup information frequently use this kind of technology
motherboard
The main circuit board
ascii
The most widely used coding scheme to represent a set of characters
system
The motherboard is sometimes called a(n) ______ board.
word size
The number of bits a processor can interpret and execute at a given time
clock
The system ______ generates regular electronic pulses that set the operating pace of the system unit.
cybercrime
The term ______ refers to online or Internet-based illegal acts.
multi-core
This kind of processor is a single chip with two or more processor cores
dynamic, static
Two commons types of RAM are ______ RAM and ______ RAM.
nonvolatile
Type of memory that can keep its contents when the power is removed from the computer
audio
VoIP is a type of ______ output.
Creates software registration numbers.
What does a keygen do?
A file that records access attempts.
What is an audit trail?
distributed
When a botnet is used to attack computers or networks, it is called a(n) ______ DoS attack.
Can execute more than one instruction per clock cycle
Which of the following best defines superscalar, as it pertains to processors?
A program or set of instructions that allows user to bypass security controls when accessing a program, computer, or network.
Which of the following best describes a back door?
When you enter your name into one account and you are automatically signed into other accounts and services.
Which of the following best describes a single sign on account?
You can rent or lease the software.
Which of the following is NOT a part of a typical single-user license agreement?
CAPTCHAs were developed to verify input is coming from computer programs, not humans.
Which of the following is NOT true about CAPTCHAs?
If the QR code directs you to a website displaying a form, enter your personal information to ensure your safety.
Which of the following is NOT true about QR codes?
The processor and memory are built into the motherboard.
Which of the following is NOT true about motherboards?
Today's personal computer processors often require additional cooling beyond the capability of the power supply's main fan.
Which of the following is NOT true about processor cooling?
Security experts recommend placing each of your credit cards in separate locations, rather than stacking them.
Which of the following is NOT true about protecting your credit cards from scanning devices?
The case on a smartphone often is in front of the display.
Which of the following is NOT true about system units?
When a system sends an authentication code, it typically does not expire.
Which of the following is NOT true about two-step verification?
Voice recognition is also called talk recognition.
Which of the following is NOT true about voice input?
cables and locks
Which of the following is not recommended to protect against hardware failure?
control unit and ALU
Which two components work together to perform processing operations?
comparison
You have been studying processors. Your instructor has asked you to help prepare a lecture for introductory students learning about processors. You explain that when payroll software determines which employees should receive overtime based on hours worked, it is a result of a(n) ______ operation.
executing
You have been studying processors. Your instructor has asked you to help prepare a lecture for introductory students learning about processors. You explain that when the ALU performs calculations on data, it is part of the ______ process in the machine cycle.
rootkit
You realize your computer has been infected with malware. It seems as if someone is controlling your computer from a remote location. What type of malware might you have?
worm
You realize your computer has been infected with malware. The program has been copying itself repeatedly, using up resources. What type of malware might you have?
always stay connected to the Internet
You recently purchased a new laptop for home. You want to ensure that you are safe from malware. You should make sure to do all of the following EXCEPT ______.
laser beams
You recently started working part-time in a retail store, and are learning about the reading devices your store uses. Your store uses a bar code reader to process items during checkout. What type of technology does the bar code reader use?
QR
You recently started working part-time in a retail store, and are learning about the reading devices your store uses. Your store uses a type of 2-D bar code. What is another term for this type of code?
Broadcast the SSID.
You want to ensure your wireless network is secure. Which of the following should you NOT do?
thermal
You work in a medical lab that requires high-quality dye-sublimation printers. What type of printer do you use?
Diagonally, from one corner to another
Your friend Margo is considering what type of display to purchase with her new desktop computer and she asks you for advice. How do you tell Margo to measure the screens she is considering?
encryption
______ is the process of converting data that is readable by humans into encoded characters.
Decoding
______ refers to the process of translating instructions into signals the computer can execute.
Word
______ size is the number of bits the processor can interpret and execute at a given time.
Morphing
______ transforms one video image into another image over the course of several frames of video.
Zombie
compromised computer or device whose owner is unaware the computer or device is being controlled remotely by an outsider
Script kiddie
hacker who doesnt have the technical skills and knowledge of a cracker
Technology ethics
moral guidelines that govern the use of computers, mobile devices, information systems, and related technologies
Digital certificate
notice that guarantees a user or website is legitimate
Keygen
program that creates software registration numbers and sometimes activation codes
Disc burning software
program that writes text, graphics, audio files on a recordable or rewritable disc
Phishing
scam in which a perpetrator sends a message in an attempt to obtain personal or financial information
Access control
security measure that defines who can access a computer, device, or network, when they can access it, and what actions they can take while accessing it
Cookie
small text that a web server stores on your computer
virtual
You are an IT consultant. A small business client wants to explore cloud computing services as a way to save money and space. The business wants to provide a common work environment of applications, security settings, and computing resources, without requiring all of these to reside on users' computers. You recommend a(n) ______ desktop.
byte
8 bits
address
A byte's ______ is a unique number that identifies the location of a byte in memory.
certificate
A digital ______ is a notice that guarantees a user or website is legitimate.
differential
A(n) ______ backup copies only the files that have changed since the last full backup.
expansion
A(n) ______ bus allows the processor to communicate with peripheral devices.
backside
A(n) ______ bus connects the processor to cache.
address
A(n) ______ bus is used to transfer information about where the data should reside in memory.
transistor
A(n) ______ can act as an electronic switch that opens or closes the circuits for electrical charges.
cyberextortionist
A(n) ______ demands payment to stop an attack.
cracker
A(n) ______ has a goal of destroying data or stealing information.
Virus
A(n) ______ is a potentially damaging program that affects, or infects, a computer or mobile device negatively by altering the way the computer or device works without the user's knowledge or permission.
bot
A(n) ______ is a program that performs a repetitive task on a network.
Code of Conduct
A(n) ______ is a written guideline that helps determine whether a specification is ethical/unethical or allowed/not allowed.
MIDI
A(n) ______ is a written guideline that helps determine whether a specification is ethical/unethical or allowed/not allowed. Which of the following adapter cards connects to musical instruments?
bit
A(n) ______ is the smallest unit of data a computer can process.
script kiddie
A(n) ______ often uses prewritten hacking and cracking programs.
lock
A(n) ______ screen restricts access to a computer or mobile device until a user performs a certain action.
hacker
A(n) ______ was originally a complimentary work for a computer enthusiast.
Key
An encryption ______ is a set of characters that the originator of the data uses to encrypt, and the recipient of the data uses to decrypt.
Retina Display
An encryption ______ is a set of characters that the originator of the data uses to encrypt, and the recipient of the data uses to decrypt. Which display technology was developed by Apple, produces vibrant colors, and supports viewing from all angles?
algorithm
An encryption ______ is a set of steps that converts readable text into unreadable text.
nanosecond
An extremely fast unit of time
eye
An iris recognition system uses technology to read patterns in the user's ______.
Zombie
Another term for botnet is ______ army.
possessed
Badges, cards, smart cards, and keys are examples of _____ objects.
processing
CPU stands for central ______ unit.
data
DaaS stands for ______ as a service.
spoofing
IP ______ occurs when an intruder computer fools a network into believing its IP address is associated with a trusted source.
It is secure.
If the web address of a website begins with https instead of http, what do you know about the website?
touch
If you sweep your thumb on the mouse to scroll pages, you likely are using what type of mouse?
0, off
In a binary system, the digit ______ represents that electronic state of ______.