CMSC 110 Final Exam

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

If you are going to attach more than 15 devices to your wireless network, you should make sure your router supports which standard?

802.11ac

According to the book, if your CPU usage levels are greater than ________ during most of your work session, a faster CPU can greatly increase your computer's performance.

90%

Ethernet port

A connectivity port that looks a bit larger than a phone jack

embodied agent

A robot which moves and acts much like a human is a(n)

Supercomputer

A specially designed computer that can perform complex calculations extremely rapidly;

The control unit is one component of the ________.

CPU

What is supercomputer used?

In situations in which complex models requiring intensive mathematical calculations are needed

Roll Back Driver

The Windows feature that removes a newly installed, improperly working driver and replaces it with the last one that worked

ROM

The area that holds all the startup instructions the computer needs to start

web server

The computer which hosts a website

A system restore point is a snapshot of your entire computer system's settings [True or false]

True

Computer vision is the ability for a computer to interpret visual data as humans do.[True or False]

True

Information is data that has been organized or presented in a meaningful fashion. [True or False]

True

Computers use a ________ language consisting of 0s and 1s.

binary

Intellectual Property (IP)

is the result of someone's creativity and knowledge and usually is protected by copyrights.

What is not true about a computer byte?

it can either be a 1 or a 0

internet

large network of networks

A packet analyzer is a program that can enable a hacker to do all of the following except ________.

launch a denial of service (DoS) attack on your computer

Automatic recalculation

lets you immediately see the effects of changing values in your spreadsheet.

host

location that maintains the computers that store the website files

Configuring a firewall to ignore all incoming packets that request access to a specific port is known as ________.

logical port blocking

An example of a first-generation language is ________.

machine language

Project ________ tools incorporate tasks and calendars so a project can stay on schedule.

managment

e-mail

method of asynchronous electronic communication

GUI

operating system interface uses point-and-click technology

Data are sent through a network in bundles called ________.

packets

A(n) ________ protects a computer against power surges

surge protector

An application programming interface (API) is_________________

the code the application software uses to take advantage of code written by others

search engine

tool used to locate information on the web

In the URL: http://www.microsoft.com/surface, the portion labeled ".com" is the

top-level domain

.edu

top-level domains is restricted to degree-granting institutions

DSL broadband service uses ________ cable.

twisted-pair

The ________ of the operating system enables users to communicate with the computer system.

user interface

all-in-one

A stationary computing device that does not need a separate tower because the processor and the memory are stored in the monitor

Which programming language uses a combination of existing technologies like JavaScript, CSS, and XML?

AJAX

Devices that use a unique personal characteristic, such as a fingerprint, in place of a password are called ________ authentication devices.

Biometric

Which type of printer connect directly to the Internet.

Cloud-ready printers

Match the following: I.Defragment and Optimize Drives II.Task Manager III.System Restore IV.File History, File Recovery V.Disk Cleanup A.brings system back to a previously stable state B.repositions related pieces of files on the hard disk to improve access time C.lists all the programs being used and indicates their status D.backs up important files, makes a complete mirror image of your current computer setup E.removes unnecessary files from the hard drive

Defragment and Optimize Drives - repositions related pieces of files on the hard disk to improve access time Task Manager - lists all the programs being used and indicates their status System Restore - brings system back to a previously stable state File History, File Recovery - backs up important files, makes a complete mirror image of your current computer setup Disk Cleanup - removes unnecessary files from the hard drive

When using Windows File Explorer, which view provides the most specific information?

Details

The flowchart shape for a binary decision is a(n) ________.

Diamond

The Windows utility program that removes unnecessary files from the hard drive is called ________.

Disk Cleanup

Code ________ is the step in which a programmer physically types the code into the computer.

Editing

A Rules-based artificial intelligence system is designed based on the rules the human brain uses to function.[True or False]

False

Affective computing is a field of study focused on the managing, processing, and automatic retrieval of information. [True or False]

False

All online word processing applications are as fully featured as installed versions. [True or False]

False

Application software helps run the computer and coordinates instructions with the hardware. [True or False]

False

Crowdfunding is asking for large donations from a few people. [True or False]

False

Deep learning algorithms require data to be labeled correct or incorrect to work properly [True or False]

False

Deep learning algorithms require data to be labeled correct or incorrect to work properly. [True or False]

False

If you reformat the hard drive on a computer, it erases all personal information from your computer and makes it safe to donate. [True or False]

False

Machine learning requires precise programming to achieve the desired results.[True or False]

False

The File History utility only keeps the most recent version of a file.[True or False]

False

The mouse is an onscreen icon that helps the user keep track of exactly what is active on the display screen.[True or False]

False

The smartphone with the most capabilities is known as a feature phone. [True or False]

False

There are federal laws against cyber-stalking. [True or False]

False

Transistors contain a huge number of integrated circuits. [True or False]

False

True or False: Accessing data from the hard drive to send to the CPU is faster than accessing data from RAM.

False

True or False: In terms of video resolution, HD stands for highly digitized.

False

True or False: Registers are areas of memory that are located close to the CPU

False

True or False: Since you can always redownload program files, you do not need to include them in backups.

False

True or False: The conversion rate is the number of times per second that the analog signal is measured and converted into a digital value.

False

True or False: The standard set of vocabulary for pseudocode is specific and detailed.

False

True or False: Using a backdoor program, you can use your computer while you are away from the office.

False

Websites selling a product are often the most accurate and appropriate for research. [True or False]

False

When using a Windows PC, ________ is the main tool for finding, viewing, and managing files.

File Explorer

Computer ________ involves identifying, extracting, preserving, and documenting computer evidence

Forensics

What is a popular copyleft license used for software?

General Public License (GNU)

The CPU usage ________ records your CPU usage for the past minute.

Graph

What type of hackers break into systems for the thrill or to show off their skills.

Gray-hat

Match each of the following network types to its definition: I.HAN II.MAN III.LAN IV.PAN V.WAN A.confined to a small geographic location beyond the home B.services a residence C.used to communicate among devices near an individual D.covers a city E.a network that covers the greatest distance

HAN - services a residence MAN - covers a city LAN - confined to a small geographic location beyond the home PAN - used to communicate among devices near an individual WAN - a network that covers the greatest distance

A stoppage of a mechanical hard drive that often results in data loss is called a(n) ________.

Hard Crash

A(n) ________ is anything designed to deceive another person, either as a practical joke or for financial gain.

Hoaz

Artificial neural networks are based on the structure of the

Human brain

Most small businesses and homeowners purchase and connect to the Internet through a(n) ________.

Internet Service Provider, ISP

What is not a reason someone might risk violating a copyright?

It is hard to prove the copyright in court.

A small Java-based program is called a ________.

Java applet

The ________ of the operating system provides the operating system's basic functionality.

Kernel

A computer lab is an example of a(n) ________ type of network.

LAN; local area network

Most supercomputers use the ________ operating system.

Linux

A large network designed to provide access to a specific geographic area, such as a large city, is a ________.

MAN

Match each of the following terms to its definition: I.MP3 II.AAC III.ADC IV.WMV V.SD A.storage card for media B.digital video file format which includes both audio and video C.digital music file format used broadly D.default digital music file format with iTunes E.converts audio signals into digital signals

MP3 - digital music file format used broadly AAC - default digital music file format with iTunes ADC - converts audio signals into digital signals WMV - digital video file format which includes both audio and video SD - storage card for media

A ________ is a virus that is attached to documents.

Macro Virus

You can automate features in most modern software programs by using custom-built miniprograms called ________.

Macros

Are e-books always PDF format?

No

Is Google Tunes an example of a method to stream music?

No

what is not a key factor a programmer uses in selecting the language for a project?

Number of inputs required

What activities is carried out by the ALU?

Performs arithmetic calculations

________ is a technique that allows the CPU to work on more than one instruction at the same time.

Pipelining

What is the act of copying text or ideas from someone else and claiming them as your own?

Plagiarism

One way to protect your personal information on Facebook is to change your ________ settings.

Privacy

The Windows ________ utility returns your computer to the state it was in when it came from the factory.

Reset

The FedEx logo is a ________ mark.

Service

When you can control devices and appliances by apps installed on your smartphone or tablet, you are said to have a(n) ________ home.

Smart

The program that coordinates all the computer's print jobs is known as a(n

Spooler

Windows uses a memory-management technique known as ________ to monitor which applications you use most frequently and then preloads them into your system memory.

SuperFetch

________ sound is a type of audio system where the listener hears the sound as if it were coming from all directions using multiple speakers

Surround

supervised learning

Teaching Siri or the Google Assistant how to recognize your voice by reading to it is an example of

binary language

The language computers use to process data into information, consisting of only the values 0 and 1.

screen resolution

The number of pixels displayed on the screen

A ________ is a virus that is triggered on a certain date.

Time bomb

Adobe Photoshop

To remove red eye from a digital image, you would use software such as

A file is a collection of program instructions or data that is stored and treated as a single unit [True or False]

True

A metasearch engine searches other search engines instead of individual websites. .[True or False]

True

Solid state hybrid drives are a combination of a mechanical hard drive and an SSD drive. [True or False]

True

True or False: A macro virus is a virus that is attached to a file.

True

True or False: A switch acts like a traffic signal on a network.

True

True or False: A virus signature is a portion of virus code that is unique to a particular computer virus.

True

True or False: Inheritance means that the data and methods of an existing class can be extended and customized to fit a new class.

True

True or False: RAW files are larger in size than JPEG files.

True

True or False: Real property is considered immoveable, such as land or a home.

True

True or False: Second-generation languages are also known as assembly languages.

True

True or False: The Internet is a technically a WAN.

True

True or False: The dark web is a well-concealed part of the deep web.

True

True or False: Video cards are designed with their own RAM storage

True

True or False: Video cards are designed with their own RAM storage.

True

True or False: Your online reputation consists of the information available about you in cyberspace.

True

What is not considered to be exclusively a video port?

USB

What type of port is the most common port used to connect input and output devices to a computer?

Universal serial bus (USB)

When does copyright protection begin?

When a work is created and fixed into a digital or physical form

linked data

When data on the Internet has been formally defined and can be expressed in relationships,

What is a good rule to follow to avoid plagiarism?

When in doubt, cite your source.

When performing searches, the asterisk (*) is used as a(n) ________.

Wild Card

What is a a proprietary OS for desktop and laptop computers?

Windows

________ enables users to define their own data-based tags and facilitates the exchange of information between websites

XML

Beta Version

a software application that is still under development.

Deep Learning (DL)

a subset of ML field that describes systems capable of learning from mistakes

Machine Learning

analyzes patterns in data, then uses the patterns to draw conclusions and adjust the actions of the AI system accordingly.

The best defense against viruses is to install ________ software, which is specifically designed to detect viruses and protect your computer and files from harm.

antivirus

browser

application program used to view the web

Corona and App Inventor can be used to develop ________.

apps for mobile devices

The term network ________ is the same as the network design.

architecture

Crowdfunding

asking for small donation from a large number of people

The ________ process blocks unauthorized users from getting into a computer system.

authentication

The capability of current devices to use earlier standards, in addition to the current standard, is known as ________.

backward compatibility

When it comes to programming, the original class is known as the ________ class.

base

Before its final commercial release, a(n) ________ version of software may be offered to certain test sites or to interested users free or at a reduced cost.

beta

Running the Disk Cleanup utility is a quick way to ________.

clear out temporary Internet files

A(n) ________ is a rule that squeezes the same audio and video information into less space.

codec; compression/decompression

The process that converts program code into machine language is called ________.

compilation

The technology a self-driving car uses to know the difference between a tree and a person is known as computer ________.

computer vision

Blackboard is an example of ________ software.

course management

Each device attached to your computer has a special program called a(n) ________ that enables the device and operating system to communicate with each other.

device driver

The fact that your smartphone can perform various functions previously performed by other devices makes it an example______

digital convergence

Match each of the following terms to its definition: I.digital-to-analog converter II.MPEG-4 III.ripping IV.analog-to-digital converter V.codec A.changes zeros and ones to a continuous analog wave B.converting a song on a CD to a digital computer file C.changes your voice's sound waves into digital signals D.usually has a .mp4 extension E.rule using hardware or software that compresses audio and video information

digital-to-analog converter - changes zeros and ones to a continuous analog wave MPEG-4 - usually has a .mp4 extension ripping - converting a song on a CD to a digital computer file analog-to-digital converter - changes your voice's sound waves into digital signals codec - rule using hardware or software that compresses audio and video information

spam

electronic junk mail

The process of ________ translates data into code so that it is protected from prying eyes.

encryption

Updating the ________ on your network devices can help protect you from hackers.

firmware, operating system

Flatbed scanners

generate digital images which can be printed, saved, or emailed.

When setting up a home network, make sure each node ________.

has a network adapter

custom software

installation enables you to decide which features you want to install on the hard drive

The collection of commands that a specific CPU can execute is called the ________ for that system.

instruction set

A(n) ________ translates source code into an intermediate form of code, line by line.

interpreter

Creative Commons licenses are ________.

irrevocable

Intelligence

is the ability to acquire and apply knowledge and skills.

Match Each of the following: I.entertainment II.enterprise resource planning III.database IV.video-editing V.word processing A.manage back end business functions B.write and edit documents C.play games D.edit movies E.keep track of clients

manage back end business functions - enterprise resource planning write and edit documents - edit movies play games - entertainment edit movies - video-editing keep track of clients - database

Tablet computers and smartphones use ________ operating systems.

mobile

A(n) ________ virus is designed to infect multiple file types in an effort to fool antivirus software.

multi-partite

Routers and switches are example of network ________ devices.

navigation

Is USB considered to be exclusively a video port?

no

is Humanism a system of ethics?

no

The process of identifying all the categories of inputs that are part of the problem the program is meant to solve is known as ________.

object-oriented analysis

LibreOffice is an example of a(n) ________ productivity software package.

open source

When a large group of computers are networked to work together on a task, it is known as ________ processing.

parallel

Match each of the following terms to its definition: I.portability II.reusability III.inheritance IV.method V.data A.a new class can automatically pick up data and methods of an existing class B.the capability to move a completed programming solution easily from one type of computer to another C.the ability to apply classes from other projects to a new project D.an object-oriented action or behavior E.raw inpu

portability- the capability to move a completed programming solution easily from one type of computer to another reusability - the ability to apply classes from other projects to a new project inheritance - a new class can automatically pick up data and methods of an existing class method- an object-oriented action or behavior data - Raw input

A clearly stated objective of how a program should work and how it responds to errors is called the ________.

problem statement

Scanning a product's ________ code with a smartphone can take you to online information and video content.

quick response, QR

Predictive policing

refers to the gathering and analyzing of data in the hope of preventing future crimes

What is the fastest, most expensive memory in your computer?

registers

Virtual reality

replaces perceived reality with a different world.

In the Windows operating system, the C:\ drive is commonly referred to as the ________ directory

root

smallest capacity to largest capacity

second largest - terabyte third largest - gigabyte Fifth Largest - kilobyte Fourth Largest - megabyte Largest - petabyte

A(n) ________ enables the computer to drive the speaker system.

sound card

Match each of the following terms to its meaning: I.spear phishing II.rootkit III.scareware IV.zombie V.spyware A.program that allows hackers to gain access to your computer without your knowledge B.malware on your computer used to convince you that your computer has a virus C.a computer controlled by a hacker D.sending e-mails to people known to be customers of a company to get individuals to reveal sensitive data E.transmits information about you, such as your Internet-surfing habits

spear phishing - sending e-mails to people known to be customers of a company to get individuals to reveal sensitive data rootkit - program that allows hackers to gain access to your computer without your knowledge scareware - malware on your computer used to convince you that your computer has a virus zombie - a computer controlled by a hacker spyware - transmits information about you, such as your Internet-surfing habits

On a network, a(n) ________ helps prevent data packets from colliding with each other.

switch

A(n) ________ error is caused by not following the strict, precise set of rules for a specific programming language. Selected Answer

syntax

An Apple iPad and an Amazon Fire are examples of ________ computers.

tablet

What is computer vision?

the ability to interpret visual information the way humans do

what does motherboard contain?

the central electronic components of the computer

A(n) ________ is the portion of virus code that is unique to a particular computer virus.

virus signature

natural language processing (nlp)

works to develop AI systems that understand written and spoken words.


संबंधित स्टडी सेट्स

Saunders Respiratory NCLEX questions

View Set

We are not really strangers FULL GAME

View Set

M1:U1 PowerPoint Key Terms Assignment

View Set

NURS 562: Family Nursing Prep U Chapter 1

View Set

BLAW PPT 27, Intellectual Property Rights: Patents

View Set