CGS 2100 Midterm (FSU)

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

Popular Personal Media Players (PMP's) include which two of the following devices?

- Amazon Kindle -Fire Amazon Kindle Fire

Hardware Quiz

......

What is the minimum amount of RAM you should have on a laptop?

4 GB

Which of the following are typical aspect ratios for monitors?

4:3 16:9

Which of the following are output?

A YouTube video displayed on a screen An antilock brake system applying brakes

Smartphone cameras work by focusing incoming light onto what type of array that captures images?

Active pixel scanner

Choose what all-in-one computers actually mean.

All-in-one computers house every component except the keyboard and mouse inside the same case as the monitor. An all-in-one computer is a stationary device with a separate keyboard and mouse.

FireWire connectors were developed for ________ computers.

Apple

Lightning connectors and ports are used by which company?

Apple

AJAX stands for ________ JavaScript and XML.

Asynchronous

Match the appropriate Windows keyboard shortcut with its result.

Bold - CTRL+B Cut - CTRL+X Select all - CTRL+A Copy - CTRL+C

If you are planning to write PC games software, you might need to know C or ________.

C++

The PDLC's coding phase uses which of the following languages?

C++

Most of the PC games were written in ________ or ________.

CC C++

In the Firefox, the best steps to clear the browser cookies is to

Click the Menu button, choose History, and then Clear Recent History. Once you have cleared recent History you should set the time range to clear Everything. Click on the arrow next to Details to expand list of History items. Select Cookies and make sure that other items you want to keep are not selected. Close the Clear Recent History window.

Choose the desktop computer features.

Desktops allow for relatively easy upgrade and expansion. Desktops are often used in offices since they do not need to be mobile. Desktops use a full OS.

The acronym DDoS stands for ________.

Distributed Denial of Service

Common symptoms of a computer virus include?

Documents won't save. Computer runs extremely slow Programs launch on their own.

This type of analysis or walking stride identification is valuable because it can be used at night or through walls with infrared cameras or even with satellite imagery.

Gait analysis

The ________ is a separate processor (computer) on your computer that enhances your video.

Graphic processor (GPU)

Today, the standard port for video and audio input on TV is the ________ port.

HDMI

Computer hardware and software used by an organization to improve its performance is called its ________.

IT system

Which is true regarding the length of a USB cord?

In general, the more data being transmitted, the shorter the cord should be.

Which chip and manufacturing company is the largest in the world?

Intel

Who are the three biggest computer processor manufacturers?

Intel AMD Nvidia

To speed up the programming process while producing dynamic web pages, select the program that utilizes tiny programs called scripts.

JavaScript

The method used in the development and maintenance of an IT scheme is called the SDLC. SDLC stands for System Development ________ Cycle.

Life

The technology (chips) that allow cell phone microphones and hearing aids to be so small is the ________ chip.

MEMS

MIDI is an acronym that stands for?

Musical Instrument Digital Interface

Though currently expensive, curved and paper-thin displays are possible using ________ display technology.

OLED

________ runs the processor faster than recommended by the manufacturer. This can increase performance and speed, but will also void the manufacturer warranty.

Overclocking

Match the following.

Playing a song from Spotify - Output Entering text in a word document - Input Putting a photo onto a USB drive (thumb drive) - Storage

Select the advantages of a point-and-shoot camera over a smartphone camera.

Point-and-shoot cameras often have larger pixel sensor arrays, providing higher resolution Point-and-shoot cameras, being thicker, often come with optical zoom capability.

The information in ________ is dumped when a computer is shut down.

RAM

System BIOS (Basic Input/Output System) is stored in ________.

ROM

The type of storage that retains data and information when the power is turned off is called ________.

ROM (Read Only Memory)

Apple developed ________, a programming language for Mac OS and iOS writing software because Objective-C was hard to write.

Swift

Sometimes spam messages are referred to as ________.

UBE

Television displays with resolutions of at least 3840 x 2160 pixels are referred to as ________.

UltraHD

________ Basic is a programming language of the third generation that enables BASIC to be used with the benefits of a graphical user interface.

Visual

The wireless network protocol is called ________.

Wi-Fi

The three most common types of e-mail viruses include all

a keystroke logging Trojan phishing ransomware

A bus is a channel over which information flows. A bus has two parts: the ________ and the ________?

address bus; data bus

Software that collects the web browsing history of the user and uses the collected data to create unwanted pop-up ads is called ________.

adware

Match the following.

allows for the transmission of high-definition audio and video signals - HDMI capable of carrying digital music signals and are common in today's music scene - MIDI a technology that enables the OS to detect and configure peripherals without downloading software or drivers - Plug and Play

The second step of the SDLC phase is to collect information on current hardware and software, analyze this information, and prepare system requirements. This is called the phase of the ________ scheme.

analysis

Inkjet printers are often sold ________ their production cost.

below

A ________ is the smallest unit of data that a computer can process.

bit

The two main factors that affect the speed of the processor are clock speed and ________.

bus width

In ASCII 8 bits are combined to create a ________.

byte

Including RAM, modern processors keep frequent and temporary accessed data in ________.

cache

Match the following optical storage media.

capacity of up to 8.5 GB - DVD capacity of up to 700 MB - CD capacity of up to 50 GB (per side) - Blu-ray

Clock speed, also known as ________, is the speed at which the processor performs the operations required to run a digital device and the digital device's instructions.

clock rate

A virus signature is the software ________ of a particular computer virus.

code

A program that checks the source code for errors, and converts it into machine language is a ________.

complier

A description of the difference in the luminance of a display's white pixels compared to the black pixels is called ________.

contrast ratio

A small text file of information created by websites that your web browser stores on your hard drive is called a ________.

cookie

The malevolent use of computer code to change a computer or network's normal operations is called a ________.

cyberattack

A person who uses computers and the Internet to launch attacks against computer systems for political or ideological reasons is called a ________.

cyberterrorist

Devices with a separate system unit and a relatively large footprint are called ________ computers.

desktop

Which device carries a relatively large footprint and separate system unit?

desktop

The fourth step in the life cycle of system growth is to get the required equipment and ensure that it operates properly. This is called the system development step.

development

The size of the screen is measured by the ________.

diagonal distance between the upper right and lower left corners of the screen

The distance between two adjacent sub-pixels on a display is referred to as ________.

dot pitch

RAM is ________ and has no moving parts.

electronic (solid state)

The machine cycle consists of which four steps?

fetch, decode, execute, store

The ________ step in software development is: What should this program do?

first

A process's graphical representation is called a ________.

flowchart

What are some characteristics of a 2-in-1 computer?

full operating system touch screen monitor

A person with unlawful access to networks to steal and corrupt information and data is called a ________.

hacker

These facilitate getting data and information into your computer.

input devices

Common names for a USB drive include?

jump drive flash drive thumb drive

Uses for computer hard drives include ________ and ________.

keeps files for future use data remains intact when computer is turned off

Because of their compact size, touch pads are most often used with ________ computers.

laptop

There are two stages of the final step in the SDLC, one system audit and one assessment stage. This final step is called ________ the system.

maintaining

Even a small degree of programming skill can be beneficial. Many apps allow you to create mini-programs that reduce the number of routine steps required to complete a task. These mini-programs are called ________.

marcos

Match the following.

memory located directly on the processor itself - L1 Cache relatively small amount of memory (measured in kilobytes or megabytes) - Cache extremely small amount of memory (measured in bits) located throughout the processor - Register largest memory of a computer, connected to the processor via the front side bus - RAM

Match the cache.

memory located directly on the processor itself - L1 cache memory located adjacent to the processor - L3 cache memory used to increase a hard drive's efficiency - Disk cache

Megahertz is the same as a ________ cycles (or instruction) per second.

million

Choose the SSD characteristics.

no moving parts extremely fast

The information in the memory (the RAM, the caches, the registers) is ________ when a computer is shut down.

not saved

JSON stands for JavaScript ______________ Notation

object

Rank the storage capacities from highest to lowest. Start with the highest capacity first.

petabyte terabyte gigabyte megabyte kilobyte

The smallest image element is a(n) ________.

pixel

A point in a computer (a hole or a slot) that accepts a specific connector is called a ________.

port

Converting a task into commands that a computer can use to perform the task is one definition of computer ________.

programming

An output device that uses light to display video or image output on a surface is called a ________.

projector

Written in natural language, but often including shorthand programming to help write the program itself, ________ is the word that defines an intermediate step in generating a flowchart algorithm.

pseudocode

Avoiding viruses include all the following

purchase a new router often (yearly) for the latest firewall protection. only visit trusted sites. remove USB drives before booting the computer.

The number of pixels in a display is called the display's ________.

resolution

Data from the hard drive reaches the CPU ________ than data from the RAM.

slower

A combination input and output device that allows users to interact with large computer displays that is sometimes found in classrooms is called an interactive whiteboard or a ________.

smartboard

Devices allowing data to be retained when your computer is shut down are called ________ devices.

storage

What is the most powerful computer type?

supercomputer

Websites that use cookies can collect information about

surfing habits. selling your collected information to third parties. monitoring your web behavior.

Since they are low-priced and reliable, ________ storage devices are extremely popular.

thumb drives (USB or flash drives)

If you purchase a new graphics computer game or a new photo/video editing software for your desktop computer, you may want to purchase a new ________ card.

video

Software that infects a computer and is created by computer code is called a ________.

virus

Common malware types include

viruses. worms. Trojan horses.

Select the statements that describe a computer programmer's algorithm.

written in a natural language, such as English written in the form of a flowchart so that it will be more easily converted into a programming language


संबंधित स्टडी सेट्स

VOLUME 5 CHAPTER 1 (GYNECOLOGY) PARAMEDIC

View Set

NU 231 Chapter 39: Oxygenation and Perfusion - prep

View Set

Jarvis Chapter 12, Ed 8 HESI Nutrition

View Set