CGS 2060 Midterm
Windows OS is owned and maintained by ______
Microsoft
Which of the following might be risky to uninstall from a PC laptop?
Microsoft Works 6-9 Converter
Sometimes used to create prototype models for casting, _____ printing is also known as additive printing.
3D
When you buy a new laptop, how much RAM should come with it?
4-8 GB
Software that collects the user's web browsing history and uses the data collected to create unsolicited targeted popup advertisements is called _____.
Adware
The smallest unit of data storage is a
Bit
A short range wireless transmission protocol is known as ____.
Bluetooth
The art and science of creating output that provides information in the most useful manner is called ______.
Ergonomics
The machine cycle consists of which four steps?
Fetch, decode, execute, and store
Which transmission media has the largest bandwidth
Fiber Optic
A URL identifies a particular ____ address on the World Wide Web.
File
A protocol commonly used to transfer large files from one server to another on the internet is the ____.
File Transfer Protocol
Software the limits the material that a browser fetches or that a search engine displays are called ____.
Filters
Hardware or software used to keep a computer secure from outside threats such as hackers and viruses by allowing or blocking internet traffic is called a _____.
Firewall
What is a strength of the Linux platform
Free to download and use
A separate processor (computer) in your computer that enhances your video is called the ___.
Graphic processor (GPU)
The abbreviation for megahertz is ____.
MHz
Connecting digital musical devices to computers is accomplished by using ___ ports.
MIDI
Many manufacturers have made _______ optional equipment when buying a new laptop computer
Optical drive
The BitTorrent protocol is often called ____ file sharing.
Peer-to-Peer
An input, output, or storage device connected to a computer is known as a ______.
Peripheral
Cookies stored on a computer's hard drive and is used to collect and store information about user preferences, password and username information, IP addresses, and/or data or web surfacing behavior are called ______ cookies.
Persistent
A type of phishing that seeks to obtain personal information through malicious software that is inserted on a victim's computer is called _____.
Pharming
A request for an electronic "echo" or response from another computer or a service is called a ____.
Ping
The smallest controllable element of an image is called a(n) ______.
Pixel
A point (a hole or slot) in a computer, designed to accept a specific connector is called a ____.
Port
The device that connects two networks is a _____.
Router
Because they have no mechanically moving parts, ___ provide extremely fast, efficient storage.
SSDs
An unsolicited email message is called ______.
Spam
What has the most amount of storage?
Terabyte
A kilobyte has approximately one ______ bytes
Thousand
One type of storage device is a
USB Drive
What type of port do most digital devices use to attach to peripherals?
USB Port
The original wireless network privacy and protection standard for WiFi
WEP
The wireless network privacy standard that was introduced in 2003 but was quickly replaced (due to numerous vulnerabilities) was known as ____.
WPA
In addition to activating ___ protection, it's a good idea to disable your router's SSID transmission once all your devices are connected.
WPA2
The standard for wireless network privacy and protection is known as _____.
WPA2
The protocol for wireless networks is called ___.
WiFi
The first commercially available computer with a graphical user interface was NeXT's ____ computer.
Cube
A person who uses computers and the internet to launch attacks against computer systems for political or ideological reasons is called a _____.
Cyber Terrorist
The malicious use of a computer code to modify the normal operations of a computer or network is called a ______.
Cyber attack
Because its radio waves pass through walls or desktops, ___ capable devices are becoming very popular.
Bluetooth
A group of compromised computers controlled by a hacker is called a ______.
Botnet
An internet signal that has enough bandwidth to allow multiple computers to be connected the same router is called a _____ signal.
Broadband
Software applications that allow users to access and surf the World Wide Web are called _____.
Browsers
Two major factors that impact processor speed are clock speed and ____.
Bus width
The ____ is a computer within your computer creates images.
GPU
Typical SSD capacities for tablet computers or smartphones are measured in ___.
Gigabytes
When determining how much cellular data you need, it is important to consider
How much data you currently use
Many computers today use ___ which is coding scheme using at least 16 bits to represent a character.
Unicode
Data flows between different parts of the computer via __.
Buses
One character of information, for example, a letter or a number consists of one ___ of storage
Byte
Which optical drive media stores approximately 700 MBs of data?
CD
What might be a choice for internet service in your area?
Cable
Most touchpads use____ to sense when a finger has moved across the pad.
Capacitance
Magnetic Ink Recognition (MICR) is a technology that is most commonly seen on
Checks
The number of instructions the CPU can process per second is dictated by the ___ speed of the processor.
Clock
Clockspeed, also referred to as ___, the speed at which the processor performs the operations recquired to run a digital device and instructions executed by the digital device.
Clock rate
Because it allows their files to be accessed from any device on the Internet, many users like to backup their files using ____ storage
Cloud
Emailing a file to yourself is an example of using ___ storage.
Cloud
The fact that data on servers is nearly always backed up onto other servers gives ___ storage a major advantage over other data storage methods.
Cloud
SAGE was developed during the ______ war.
Cold
The amount of data that defines each color in a pixel is called
Color depth
The number of bits of data describing each pixel in a display is referred to as _____.
Color depth
A digital device that accepts input, and processes and stores the input, and provides output
Computer
A description of the difference in the luminescence of a display's black and white pixels is called ____.
Contrast ratio
The two main components of a processor are the arithmetic logic unit (ALU) and the ____ unit.
Control
A site on the windows operating system where you can uninstall programs, adjust settings, and manage tasks is the ________
Control Panel
A small text file of information created by websites you visit that your web browser stores on your hard disk is called a _______.
Cookie
What was the main question that ARPAnet wanted to solve?
Could a network be built that would continue to work even if multiple parts collapsed?
Which of the following might contain a traditional (magnetic) hard drive?
Dell desktop computer
Devices with a separate system unit and relatively large footprint are called ___ computers.
Desktop
Screen size is measured by the ____ across the monitor.
Diagonal
Screen size is measured by the.
Diagonal distance between the lower left corner of the screen to the upper right corner
Using a stylus and touchpad to map the signature and also measure pressure, pen angle, pen up/down, speed, etc. is known as what type of signature recognition?
Dynamic
Memory is ___ and has no moving parts.
Electronic (solid state)
Solid state drives store data using
Electronic circuits
Relatively rugged, water resistant video cameras that allow users to film HD video under harsh conditions, such as on ski mountains, in the ocean, or at high altitudes are called extreme action video cameras or simply a
GoPro
Letting computer users drag images and documents across their computers' monitors made the ___ User interface very popular.
Graphical
The visual image output that a computer creates is known as ___.
Graphics
A port that allows the transfer of high quality video and audio signals is called a(n) ______ port.
HDMI
The standard port for video audio input into televisions today is the ____ port.
HDMI
A person who gains unauthorized access to networks in order to steal and corrupt information and data is called a ______.
Hacker
The act of hacking or breaking in to a computer system for politically or socially motivated purposes is called _____.
Hacktivism
Using refracted laser light to store data on a photoreceptive substrate is essentially how ___ storage works. Theoretically this could store gigabytes of data within a cubic millimeter.
Holographic
What is true regarding a USB cord?
In general, the more data being transmitted, the shorter the cord should be
A television remote usually uses ____ waves.
Infrared (IR)
These facilitate getting data and information into your computer.
Input devices
The largest chip designing and manufacturing company in the world is
Intel
Although it sounds ironic, searching the_____ in your area is an efficient way to search for an ISP.
Internet
Firewall software used to block a user's access to specific internet content is called an ________ filter.
Internet
Which browser was developed by Microsoft?
Internet Explorer
ISP stands for what?
Internet Service Provider
What three are needed to install a home WiFi network?
Internet signal, modem, router
A form of spyware that records all actions typed on a keyboard is called a ______ logger.
Keystroke
What represents the least amount of storage?
Kilobyte
The ____ cache is located directly on the processor itself.
L1
A mobile hinged computer with an integrated keyboard that uses a full operating system is called a notebook or ______ computer
Laptop
Because a metal platter is physically spinning, hard drives have ___ access times than solid hard drives.
Longer
The cost of an SSD is ___ than the cost of a traditional hard drive.
Lower
A switch distinguishes between various devices within a network by their ____ addresses.
MAC
The technology (chips) that allow cell phone microphones and hearing aids to be so small is the ____ chip.
MEMS
This technology allows musicians to create written sheet music simply by playing an instrument.
MIDI
What is the name of a virus written in a macro language and placed within a document or spreadsheet?
Macro Virus
One of the largest data requirements of the future will likely be
Mapping patients' genomes
Broadband is measured in ____.
Mbps
A million bytes of data equals approximately one
Megabyte
An electronic element that stores data by changing its resistance based on the current that has passed through it (similar to RAM) is called a
Memristor
Megahertz is equal to one __ cycles (or instructions) per second.
Million
The word modem stands for ____.
Modulator-demodulator
Fiber optic cable is ____ expensive than coaxial cable to install
More
What is a strength of the android platform?
Most widely used OS for smartphones and tablets
The number of pixels in a monitor is called ____ resolution.
Native
What manages hardware and software, supports the computer's basic functions, and runs programs?
Operating System
In photography, there are two ways to focus on distant objects, digital zoom and ____ zoom
Optical
Running the processor faster than recommended by the manufacturer is called ____.
Overclocking
Printer speed is described using which acronym?
PPM
Paul Baran developed a technology called _____ switching that made the internet possible and reliable.
Packet
The smallest element of an image is called a ____.
Pixel
Using cells of ionized gas to create images, ______ displays are actually becoming less popular.
Plasma
A type of printer that is used to print large graphic images such as architectural drawings by mechanically moving a pen over a large sheet of paper is known as a _______.
Plotter
Software that can be added to a browser to increase its functionality are called ____.
Plugins
Because of their capability of storing data in multiple hard drives, data warehouses use ___ technology to ensure redundant storage
RAID
The place in a digital device where the data and programs that device is currently using are accessible by the processor is called the ___.
RAM
_____ is actually storage since it retains data and information when the power has been turned off.
ROM (Read Only Memory)
When referring to digital storage, RAID stands for
Redundant Array of Independent Discs
The term that describes how fast each pixel in a display is updated is ______.
Refresh Rate
With optical zoom, resolution ____ when focusing on distant objects.
Remains the same
The number of pixels in a display is called the display's ______.
Resolution
Your _____ can provide hardware firewall protection for your home network where it connects to the ISP's network, just as ISP networks have firewalls where they connect to the internet.
Router
Most tablets and phones use _____ as their main storage device
SSD
A signal transmitted every few seconds by a wireless router so that a users' computers can find a WiFi hotspot is called a ______.
SSID
Because they're both Apple products, the browser that works smoothest with Macintosh OS X is _____.
Safari
The accuracy of a digital recording is decided by the device's _____ rate.
Sampling
Increased data transfer will be less likely to have errors if you use a _____ USB cord.
Shorter
A processor comprised of one control unit and one ALU is called a
Single core processor
Contact your ISP if your actual internet speed is _____ than advertised.
Slower
The average tablet computer has a ____ hard drive than the average desktop computer.
Smaller
A combination input and output device that allows users to interact with large computer displays that is sometimes found in classrooms is called an interactive whiteboard or a ____.
Smartboard
Specialized hardware or software that capture packets transmitted over a network are called packet ______.
Sniffers
A security system separating two networks or even computers on the same network is called a ___.
Switch
A computer that is highly mobile, has a smaller OS, and uses a touchscreen as the primary input method is called ______
Tablet
A thousand gigabytes equals one
Terabyte
Because they're inexpensive and reliable __ have become extremely popular storage devices.
Thumbdrives (USB or flash drives)
The World Wide Web was created through a collaboration led by _____.
Tim Berners-Lee
Laser printers are popular in offices because they use relatively inexpensive
Toner
To create an image with a laser printer, ______ is drawn to the drum.
Toner
The highest level in the domain name hierarchy is known as the ____.
Top Life Domain
Select the smartphone input device
Touchscreen or keyboard
Used in a variety of devices, including ATMs and point-of-sale terminals, _______ allow for input of data using only a finger or stylus -
Touchscreens
A terabyte equals approximately _______ bytes
Trillion
This type of connector is the most common for connecting peripherals (printers, monitors, storage devices, etc.) to a computer.
USB
With ____ recognition technologies, frequency, pitch, speech rhythms and other characteristics are charted and compared to existing records
Voice
What group determines the standards for the World Wide Web?
W3C
A camera that takes photos or streams video into a computer or over the Internet is called a
Webcam
Nonmalicious computer security experts that test the security measures of an organization's systems to ensure they are protected against malicious intrusions are called ____.
White Hat Hackers
Many cellular ISP's offer modem/router combination devices that can create a ___ wherever there's adequate cell service.
WiFi Hotspot
WWW stands for what?
World Wide Web
A destructive program that replicates itself throughout a single computer or across a network is called a ____.
Worm
A computer controlled by a hacker is called a _____.
Zombie
CDs store data using
a reflective coating that has pits and lands
DVD's store data using
a reflective coating that has pits and lands
Combining the power of a desktop with a neat, clean look, ___ computers are popular with businesses.
all-in-one
A gigabyte has approximately one ______ bytes
billion
This technology provides short
distance wireless communication between electronic devices using extremely low power radio signals - Bluetooth
Though currently expensive, curved and paper thin displays are possible using _____ display technology.
- OLED
The instructions needed to bootup a computer, such as the BIOS, are typically stored in ____.
- ROM
"Full HD resolution" is best described as
1920x1080
Personal computer CPU clock speeds range between
2 to 4 Gigahertz
BluRays provide approximately ___ of storage space. -
25 GB
Most new laptop computers come with how much storage?
256GB - 1 TB
When discussing digital cameras or smartphone cameras with APS, CMOS, APS stands for
Active Pixel Sensor
Smartphone cameras work by focusing incoming light onto what type of array that captures images?
Active pixel scanner
FireWire connectors were developed for ____ computers.
Apple
The mouse was developed by which company?
Apple
The capacity of a particular transmission medium is called ______.
Bandwidth
The volume of data that can be carried on an internet transmission media in an amount of time is called ___.
Bandwidth
Inkjet printers are often sold ______ their production cost.
Below
Represented as either a 0 or 1, a ___ is the smallest unit of data a computer can process.
Bit
The technology that allows any text, even handwritten scrawls, to be digitized is known as optical ___ recognition.
Character
An attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests is called a ______ attack.
DDoS
Though it could theoretically hold terabytes of data for thousands of years, in a microscopic space, ___ storage, using genetic material, is a distant storage option.
DNA
The internet service that tends to provide the most consistent speeds is _____.
DSL
What is considered a cyber crime?
Data manipulation
SAGE was developed by the US department of ______.
Defense
Routers that can send internet signals over 2 distinct frequencies are called _____ routers.
Dual band
An application that navigates all the files and folders in your mac is the ______.
Finder
The number of times per second a frame in a video is advanced is the definition of
Frame rate
To allow hard disk drive platters spin more smoothly and cooler, some manufacturers seal platters in ___ instead of air.
Helium
What is equal to one cycle per second?
Hertz
A refracted laser beam striking a photoreceptor from many different angles allows ___ storage to retain many bits of data in the same location.
Holographic
Because of their compact size, touchpads are most often used with ___ computers.
Laptop
Lower range tones generally require ______ speakers.
Larger
All of the following are common ports that are included with laptop computers except
MIDI ports
A commonly used short range wireless technology used for data transfer and electronic payments is called
NFC (Near Field Communication)
A megabyte is equal to approximately ______ bytes
One Million
Using reflective material to store data that can be read using a laser is called ______ media storage.
Optical
A storage device that uses lasers to read CDs, DVDs, or Bluray discs is referred to as an -
Optical drive
Which type of touchscreen uses a single metallic coated panel and uses electricity to calculate touch points?
Projective capacitive
An output device that uses light to display video or image output on a surface is called a _____.
Projector
RFID stands for which of the following?
Radio Frequency Identification
The number of pixels in an image is called the image's
Resolution
To improve the sound quality of their smartphones, many users purchase large external ______ to listen to music.
Speakers
Select the sites that offer internet speed test services.
Speedtest.net and TestMy.Net
Devices that allow for the retention of data when your computer has been shut down are called _____ devices.
Storage
URL stands for ___ Resource Locator.
Uniform
Persistent cookies store information about _____.
User preferences
If you buy a new computer game that emphasizes graphics, or new photo/video editing software for your desktop computer, you may want to purchase a new ___ card.
Video
The technology that uses cameras, microphones, displays, speakers and software to allow users to both see and hear each other is called
Video conferencing
Most smartphones and tablets produced today use a ____ keyboard.
Virtual
Software that infects a computer and is created using computer code is called a computer _____.
Virus
In addition to the RAM, modern processors temporarily keep frequently accessed data in a
cache
One disadvantage of cloud storage is that
data is only available when you're online
For _____ it may be less expensive to add an existing cell phone data plan and to use the phone as a hotspot than to add wired internet service.
individual users
The maximum number of bits per instruction that a CPU can process during 1 machine cycle is called
word size
Select the domain name:
www.cnet.com
A crime in which a computer is the object of the crime or is used to commit a crime or offense is called a ____.
Cyber crime
Harming or harassing a person or group of people via information technology and networks in a repeated and deliberate manner is called a ______.
Cyberbullying
What does DDoS stand for?
Distributed Denial of Service
A ____ identifies a server site on the internet.
Domain