cgs final
single core processor
A processor comprised of one control unit and one ALU is called a ____ .
paas
A programming environment used to develop, test, and disseminate web apps via the Internet.
control panel
A site on the Windows operating system where you can uninstall programs, adjust settings, and manage tasks is the _____.
optical drive
A storage device that uses lasers to read CDs, DVDs, or Blu-ray discs is referred to as a(n) ___ .
IR
A television remote usually uses ___ waves.
500 gb- 1 tb
A typical laptop has a storage capacity of approximately ____ .
g2b
All of the following are considered e-commerce transactions except
open edu resources
All of the following are protected against unauthorized use or distribution by intellectual property laws except
script kiddies
Amateur computer hackers with little programming expertise that illegally gain access to computer systems using programs (scripts) that others have written are called _____ .
HDX
Amazon offers 2 lines of tablet computers, the Amazon Fire and the Amazon fire
broadband
An Internet signal that has enough bandwidth to allow multiple computers to be connected to the same router is called a ___ signal.
ddos
An attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests is called a _____ attack.
memristor
An electronic element that stores data by changing its resistance based on the current that has passed through it (similar to RRAM) is called a(n) ___ .
peripheral
An input, output or storage device connected to a computer is known as a(an) _____
laas
An organization uses servers in the cloud instead of buying and maintaining storage servers for their day-to-day business operations.
cache
In addition to the RAM, modern processors temporarily keep frequently accessed data in a _____.
optical
In photography, there are 2 ways to focus on distant objects, digital zoom and ____ zoom.
magnetic hard drives
Most desktop computers use ___ to store data.
256gb- 1 tb
Most new laptop computers come with how much storage?
virtual
Most smartphones and tablets produced today use a _____ keyboard
ssd
Most tablets and phones use _____ as their main storage device.
capacitance
Most touchpads use _____ to sense when a finger has moved across the pad.
white hat hackers
Non-malicious computer security experts that test the security measures of an organization's information systems to ensure they are protected against malicious intrusions are called ___.
2 to 4 gigahertz
Personal computer CPU clock speeds range between _______ .
helium > traditional hard drives
Platters spin faster,Platters stay cooler,More platters can be placed in the same amount of space
3D mapping, feature charting, skin texture analysis
Select the technologies used by facial recognition software.
separation
Social networking is based on the six degrees of _____ concept which posits that you can connect with anyone through a chain of no more than six introductions or personal links.
adware
Software that collects the user's web browsing history and uses the data collected to create unsolicited targeted pop-up advertisements is called _____ .
3D
Sometimes used to create prototype models for casting, ___ printing is also known as additive manufacturing.
UBE
Spam messages are sometimes referred to as ___.
voice pitch, voice frequency, speech rhythms
Speech recognition software uses which of the following characteristics?
native
The actual number of pixels in a monitor is called ___ resolution
ergonomics
The art and science of creating output that provides information in the most useful manner is called ___ .
bandwidth
The capacity of a particular transmission medium is called its _____.
dot pitch
The distance between two adjacent sub-pixels on a display is referred to as ___ .
saas
The distribution of computer applications over the Internet. Commonly referred to as web apps.
cube
The first commercially available computer with a graphical user interface was NeXT's ___ computer.
file transfer
The protocol used for transmitting large files from one server to another over the Internet is known as the ___ Protocol (FTP).
WPA2
The standard for wireless network privacy and protection is known as ___ .
title 5
The titles in the DMCA that directly impact digital copyright issues include all of the following except
bandwidth
The volume of data that can be carried on an Internet transmission media in an amount of time is called _____.
aspect ratio
The width of a screen compared to the height of a screen is referred to as ___ .
your antivirus software will ensure that your files are safe
There are risks associated with downloading content from the Internet. It is important to consider all of the following when downloading from the Internet except
windows phone
Though not yet commercially successful, the ___ was developed by one of the worlds largest software manufacturers
toner
To create an image with a laser printer ___ is(are) drawn to the drum.
ongoing
Two common categories of cybercrimes include single events and _____ series of events.
optical
Using reflective material to store data that can be read using a laser is called ___ media storage.
projective capacitive
Which type of touchscreen uses a single metallic-coated panel and uses electricity to calculate touch points?
remains the same
With optical zoom, resolution ____ when focusing on distant objects.
TPS
which category of management information systems (MIS) focuses on tracking sales and inventories
1920 x 1080
"Full HD" resolution is expressed as:
cybercrime
A crime in which a computer is the object of the crime or is used to commit a crime or offense is called _____.
wire-wire
A form of email fraud where criminals change the account where money is being transferred is called a ______ scam
botnet
A group of compromised computers controlled by a hacker is called a _____.
megabyte
A million bytes of data equals approximately one ___
hacker
A person who gains unauthorized access to networks and in order to steal and corrupt information and data is called a _____.
cyberterrorist
A person who uses computers and the Internet to launch attacks against computer systems for political or ideological reasons is called a ___.
longer
Because a metal platter is physically spinning, hard drives have ___ access times than solid state hard drives.
data
Being able to surf the web, watch videos, and listen to streaming audio is why call service with a _____ plan is extremely popular in the US
peer to peer
BitTorrent utilizes no central server, instead opting to utilize a _____ structure where each device connected to a network has equal access to the shared files.
pits and lands that are read by a blue spectrum laser beam
Blu-ray stores data using ___ .
mbps
Broadband is measured in _____ .
buses
Data flows between different parts of the computer via _____ .
electronic date interchange
EDI stands for ___ .
cloud
Emailing a file to yourself is an example of using ___ storage.
video
If you buy a new computer game that emphasizes graphics, or new photo/video editing software for your desktop computer, you may want to purchase a new ___ card.
drag
If you have 2 folders open on your desktop and you want to move a file from one folder to the other, simply ___ the file.
below
Inkjet printers are often sold ____ their production cost.
graphical
Letting computer users drag images and documents across their computers' monitors made the ___ User Interface very popular.
unicode
Many computers today use _____ which is a coding scheme using at least 16 bits to represent a character.
optical drives
Many manufacturers have made _____ optional equipment when purchasing a new laptop computer.
radio frequency ID
RFID stands for which of the following
prepare, analyze, data
SDLC 3 phases
cold
Sage was developed during the _____ war.
lcd, led
Select the acronyms that describe a type of computer monitor.
GPU
The ___ is a computer within your computer that creates images.
sampling
The accuracy of a digital recording is determined by the device's ___ rate.
top level domain
The highest level in the domain name hierarchy is known as the ___ .
trade
The main governmental organization that oversees Internet privacy is the Federal ___ Commission.
cyberattack
The malicious use of computer code to modify the normal operations of a computer or network is called a ___ .
right click
The most common method of renaming files and folders is to simply __ on the item and select Rename.
apple
The mouse was developed by which company?
resolution
The number of pixels in a display is called the display's ___ .
resolution
The number of pixels in an image is called the image's ____ .
search
To look for a file or folder in Windows 10, just type the file name in the __ box.
intellectual
To protect against unauthorized software use, sale, or distribution of software, music, movies, video games, and many other digital products, there are ___ property laws.
ctl + x
To remove a file from one folder and place it in another, click on the item and press ___, then move your cursor to the new location and press CTRL + V.
2
Twitter recommends using no more than ___ hashtags per Tweet.
holographic
Using refracted laser light to store data on a photoreceptive substrate is essentially how ___ storage works. Theoretically this could store gigabytes of data within a cubic millimeter
W3C
What group determines the standards for the World Wide Web?
operating system
What manages hardware and software, supports the computer's basic functions, and runs programs?
usb port
What type of port do most digital devices use to attach peripherals?
active pixel sensor
When discussing digital cameras or smartphone cameras with APS CMOS, APS stands for ___ .
double click
When you ___ a file Windows should automatically open it. If it can't Windows will prompt you to select the correct app to open the file.
SCMS
Which category of management information systems (MIS) combines the forecasting capability of decision support software with the records keeping capability of transaction processing systems software to help businesses manage inventories efficiently
shorter, more data
Which is true regarding the length of a USB cord?
a transistor, a hole in a punch card
Which would be used to store a single bit of data?
file explorer
You created a flyer and saved it in your Documents folder. To find this file you could open Cortana (in Windows 10) and type the flyer's name in the search window, or you could click on the ___ icon (all Windows versions, on your toolbar) and access the Documents folder from there.
zombie
Your computer has been attacked and overtaken by a hacker. The hacker has control over your computer and can now use it to launch attacks on other computers and systems. Your computer is known as a ____ computer.
flowchart
a graphic representation of a process is called a
zip
a lossless compression format
top-down
a programming design that breaks down a problem into a series of tasks is called ___ programming
storage
adding a microSD (when possible) increases your phone's capacity
flowchart
after the problem has been clearly defined, the next step in the PDLC is the create or plan an algorithm. this plan is usually written as a ____ and is written in an ordinary language, such as english.
english
after the program has been clearly defined, the next step in the PDLC is to create the plan or algorithm. this plan is usually written as a flowchart, and is in written in an ordinary language such as ___
mcafee, norton, avg, google
anti-virus software options
WAV, mp4
audio file compression formats
swift
because objective c was difficult to write in, apple developed ___, a programming language for writing software for the Mac OS and the IOS
AUPs
business owners, copyright holders, and network administrators publish ____ so that users understand what is expected and permissible when they use the network, computer equipment, and/or software
base transceiver station
cell towers are connected to
thermal printer
commonly used for receipts
IT system
computer hardware and software that an organization uses to increase its performance is referred to as its ____
programming
converting a task into a commands that a computer can use to perform the task is called ___
rootkits
create backdoor programs, delete files, install rogue files
diamond
decision point
displays refresh rate
describes how fast each pixel in a display is updated, The higher the refresh rate, the smoother the video, describes the number of times per second a frame is advanced in a video, Videos play best with refresh rates at even multiples of the frame rate.
extensible markup language
designed to display documents on the web, this version of the HTML set of protocols provides a smooth interface between natural language and machine language by wrapping data in tags for web display
screen resolution
equals the number of pixels in a display, measures image quality
register
extremely small amount of memory (measured in bits) located throughout the processor
JPEG, PNG
image compression formats
language
instructions (software) that allow a computer (hardware) to be used are written using specific symbols, letters and numbers known as a programming ____ or code
RAM
largest memory of a computer, connected to the processor via the front side bus
L1 cache
memory located directly on the processor itself
javascript, C++, english, java
once an algorithm or plan has been created, the next step in the PDLC is to write the coding for the program. This highly structured process may be completed using which languages?
blu ray and dvd player
optical drives?
thermal printing
paper turns black when heated, commonly used for printing receipts
rectangle
process or procedure
shorthand
pseudocode is written in a natural language, but often including programming ___ to assist in writing the program itself. pseudocode is the term that describes an intermediate step in creating an algorithm from a flow chart.
development
purchasing the necessary software for the system is the part of the system ___ step in the SDLC process
compress a file
reduce storage space requirements, reduce bandwidth needed to transmit a file
lossless
reduces space required by reducing redundancy within files
lossy
reduces space required by removing less valuable data
cache
relatively small amount of memory (measured in kilobytes or megabytes).
video
some apps that use a surprising amount of data are those that include embedded
oval
start point or finish point
traditional hard drive
stores data magnetically, contains read/write heads, contains platters
digital- analog converters
the devices inside your phone that convert analog waves (such as sounds waves) into digital signals that your phone can process are called
investigation
the first step in the SDLC involves defining the problems that the IT system should address, examining various alternatives and reporting the findings. This is referred to as the ___ step
first level managers
use information systems for recording line employee performance
middle managers
use information systems for recording line employee performance
top level management
use information systems to for see corporate opportunities and threats
plotter printer
used for drafting or blueprints
ink jet printer
uses ink cartridges
dvd
uses pits and lands to store data, holds approximately 4.5 GB of data
laser printer
uses toner cartridges
top level managers
using information systems to help for see corporate business opportunities and threats might be done by all levels of management, but it is most important for which management level
galaxy, note
what devices are manufactured by samsung
management information systems
when referring to business info tech MIS stands for
DSS
which category of management information systems (MIS) focuses on providing forecasting capabilities for sales and production?
pseudocode
written in a natural language, but often including programming shorthand to assist in writing the program itself, ____ is the term that describes an intermediate step in creating an algorithm from a flow chart.