CGS midterm quizlet
Place the steps of the Program Development Life Cycle in the correct order.
1. Defining the problem 2. Creating a plan 3. Writing the code 4. debugging the code 5. testing the code
Which of the following could have a traditional (magnetic) hard drive? 1. Dell desktop computer 2. Samsung Galaxy S6 3. Apple iPad 4. Apple iPhone six
1. Dell Desktop computer
Identify the characteristics of a desktop computer.
1. Desktops allow for relatively easy upgrade and expansion. 2. Desktops are often used in offices since they don't need to be mobile. 3. Desktops are full OS
What is true about packet sniffers?
1. Legitimate sniffers are used for routine examination and problem detection. 2. Unauthorized sniffers are used to steal information.
In which order should you delete cookies in Internet Explorer (Microsoft Edge)?
1. On the Start screen, tap or click Internet Explorer to open Internet Explorer. 2. Swipe in from the right edge of the screen, and then tap Settings. (If you're using a mouse, point to the lower-right corner of the screen, move the mouse pointer up, and then click Settings). 3. Tap or click Options, and then, under History, tap or click Select. 4. Select the Cookies check box, then tap or click Delete.
what's true about utility programs?
1. Program that performs a specific maintenance type of task 2. included in both Windows and Mac OS 3. common examples include disk formatting, disk cleanup, and disk defragmenting
What three stages are included in the SDLC process's system design phase?
1. Purchasing necessary software 2. Purchasing needed hardware 3. Setting up, installing, and testing the system.
What are some output devices?
1. Televisions 2. Printers
What are some reasons for buying a tablet computer?
1. You need a computer that you can use while walking 2. You need a highly mobile computer that works well for e books and gaming.
what is true about script kiddies?
1. are amateur computer hackers with little programming expertise 2. illegally gain access to computer systems using programs (scripts) that others have written
What statements describe a computer programmer's algorithm?
1. written in the form of a flowchart so that it will be more easily converted into a programming language 2. used to train the program's users 3. Written in a natural language, like English
Some computers use _______ to represent characters in a binary format.
ASCII
What are the input devices often found at a point-of-sale station?
Barcode or UPC reader Keypad UPC scanning wand
A wireless short-range transmission protocol is called ________.
Bluetooth
Select the true statements regarding an LED display.
Can be extremely thin Extremely energy efficient Great for well-lit areas
Most touch pads use ________ to sense when a finger has moved across the pad.
Capacitance
A program that checks the source code for errors, and converts it into machine language is a ________.
Complier
Antivirus software is a computer program used to scan files to identify and remove ________ and ________.
Computer viruses, other malicious programs
On a cable, the connector is the end that connects to a port.
Connector
The three stages to be completed in the SDLC's inquiry phase include
Defining the problem Examining alternatives Reporting your findings
Which statements refer to a display's contrast ratio?
Describes the difference in brightness Luminescence of white pixels compared to black pixels
Which device carries a relatively large footprint and separate system unit?
Desktop
What flowchart symbol is for the decision point?
Diamond
Common symptoms of a computer virus include?
Documents wont save Computer runs extremely slow Programs launch on their own
The distance between two adjacent sub-pixels on a display is referred to as ________.
Dot Pitch
What is the acronym for End-User Licensing Agreement?
EULA
This version of the HTML set of protocols designed to display documents on the web provides a smooth interface between natural language and machine language by wrapping data for web display in "tags".
Extensible Markup Language
A type of thunderbolt port, found on apple computers
FireWire
The ________ step in software development is: What should this program do?
First
What are some characteristics of a 2-in-1 computer?
Full operating system More storage than a traditional laptop Touch screen monitor
The ________ is a separate processor (computer) on your computer that enhances your video.
Graphic Processor (GPU)
MEMS chips are used in what?
Hearing Aids Smartphones
A program that can be used to turn a single line of C# into a machine language without the complete program being compiled is called a C# ________.
Interpretor
To speed up the programming process while producing dynamic web pages, select the program that utilizes tiny programs called scripts.
JavaScript
The processor directly houses the ________ cache.
L1
Memory located on the processor itself
L1 Cache
Memory located adjacent to the processor
L3 cache
Most laptops, tablets, and smartphones use a(n) ________ display.
LCD
The method used in the development and maintenance of an IT scheme is called the SDLC. SDLC stands for System Development ________ Cycle.
Life
The technology (chips) that allow cell phone microphones and hearing aids to be so small is the ________ chip.
MEMS
All of the following are common ports that are included with laptop computers except ________. 1. MIDI ports 2. USB ports 3. Ethernet Ports 4. HDMI ports
MIDI ports
Common types of servers include
Network Server File server Web server
The technology that uses the reflection of a laser of the graphite left by a #2 pencil to determine if a bubble has been filled in is called
OMR
What manages hardware and software, supports the computer's basic functions, and runs programs?
Operating system
In photography, there are two ways to focus on distant objects, digital zoom and ________ zoom.
Optical
Playing a Spotify song is an example of
Output
What flowchart symbol is for the star/finish point?
Oval
________ runs the processor faster than recommended by the manufacturer. This can increase performance and speed, but will also void the manufacturer warranty.
Overclocking
What flowchart symbol is for the input/output point?
Parallelogram
The smallest image element is a(n) ________.
Pixel
A point in a computer (a hole or a slot) that accepts a specific connector is called a ________.
Port
A slot or hole that matches the cord or expansion card being connected to the port
Port
Select the peripherals. 1. Printers 2. Smartphones 3. Monitor 4. Tablet
Printers Monitor
Converting a task into commands that a computer can use to perform the task is called ________.
Programming
The type of storage that retains data and information when the power is turned off is called ________.
ROM
system BIOS (basic input/output system) is stored in
ROM (Read Only Memory)
What flowchart symbol is for the process or procedure?
Rectangle
Most tablets and phones use ________ as their main storage device.
SSD
The accuracy of a digital recording is determined by the device's ________ rate.
Sampling
Which devices use a virtual keyboard? 1. Laptop 2. Smartphone 3. Tablet 4. Desktop
Smartphone Tablet
Which of the following is not a presentation software term? 1. Speaker notes 2. Slide 3. Speaker Image 4. Slide Master
Speaker Image
Saving photos to a USB drive is an example of
Storage
You can minimize your risk of computer damage by using a ________ or a ________.
Surge Protector, UPS (uninterruptable power supply)
What program would you would be using if you would like to write iPhone applications?
Swift
The term "native resolution" refers to
The number of pixels in a display
The term "native resolution" refers to?
The number of pixels in a display
What is the input device for smartphones?
Touch screen or keyboard
Which of the following are true regarding high-definition displays?
Typically have aspect ratios of 16:9 Typically have 1080 horizontal lines of pixels Typically have frame rates of 1920 FPS
Sometimes spam messages are referred to as ________.
UBE
This type of connector is the most common type of connection to a computer for peripherals (printers, monitors, storage devices, etc.).
USB
allows for data transfer between devices and for devices to be electrically charged
USB
What are some characteristics of a projector?
Usually required a darkened environment Allows large audiences to view digital output Usually used with a screen
Most smartphones and tablets produced today use a ________ keyboard.
Virtual
________ Basic is a programming language of the third generation that enables BASIC to be used with the benefits of a graphical user interface.
Visual
Firewalls help protect against ________ and ________.
Worms, Hackers
Although not a programming language technically, ________ pertains to the protocols that enable content to be displayed on the Internet.
XML
Software that collects the web browsing history of the user and uses the collected data to create unwanted pop-up ads is called ________.
adware
Entering text in a word document is an example of
an input
The second step of the SDLC phase is to collect information on current hardware and software, analyze this information, and prepare system requirements. This is called the phase of the ________ scheme.
analysis
A collection of hacker-controlled computers is called a ________.
botnet
Avoiding viruses would not include
bypassing your browser's built-in security.
A description of the difference in the luminance of a display's white pixels compared to the black pixels is called ________.
contrast ratio
A small text file of information created by websites that your web browser stores on your hard drive is called a ________.
cookie
The malevolent use of computer code to change a computer or network's normal operations is called a ________.
cyberattack
A person who uses computers and the Internet to launch attacks against computer systems for political or ideological reasons is called a ________.
cyberterrorist
Memory used to increase a hard drive's efficiency
disk cache
RAM is ________ and has no moving parts.
electronic (solid state)
A process's graphical representation is called a ________.
flowchart
A person with unlawful access to networks to steal and corrupt information and data is called a ________.
hacker
A ________ logger is a form of spyware that records your keyboard strokes.
keystroke
An initial value process, a process and a test condition which can potentially return to the initial value is called a ________.
loop
There are two stages of the final step in the SDLC, one system audit and one assessment stage. This final step is called ________ the system.
maintaining
A megabyte equals approximately one ________ bytes?
million
A laptop typically has ________ RAM than a smartphone.
more
Single events and a(n) ________ series of events are two common cybercrime categories.
on-going
Factors that damage computer hardware include?
power surges overheating humidity magnetic fields
Amateur computer hackers with little programming expertise, who illegally access computer systems by means of programs (scripts) written by others, are called ________.
script kiddies
The average tablet has a ________ hard drive compared to the average desktop.
smaller
The maximum number of bits per CPU instruction during one machine cycle is
word size
A damaging program duplicating itself on a single computer or over a network is called a ________.
worm