CGS 2060 MIDTERM

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

mouse was developed by

APPLE

Which is true regarding the length of a USB cord?

In general, the more data being transmitted, the shorter the cord should be.

The WWW was created through a collar led by

Tim Berners Lee

NEXTS

apple

firewire

apple

The capacity of a particular transmission medium is called its

bandwidth

The two major factors that impact the processor speed are clock speed and ...

bandwidth

The smallest unit of data storage is a __

bit

SHORT DISTANCE WIRELESS COMMUNICATION

bluetooth

a short range wireless transmission protocol is known as

bluetooth

bc its radio waves pass through walls or desktops, ____ capable devices are popualr

bluetooth

an internet signal that has enough bandwidth to allow multiple computers to be connected to the same router is called a ______ signal

broadband

software applications that allow users to access and surf the www are called

browsers

The act of hacking, or breaking into a computer system, for a politically or socially motivated purposes is called _____.

hacktivism

To allow hard disk drive platters to spin more smoothly and cooler, some manufacturers seal the platters in ___ instead of air.

helium

what is equal to once cycle per second

hertz

cost of a SSD is ______ than a hard drive

higher

a tv remote usually uses _______ waves

infrared

domain name

mheducation.com

The term that describes how fast each pixel in a display is updated is ___

refresh rate

most phones and tablets produced today use a _______ keyboard

virtual

wireless network

wifi

Software that collects the user's web browsing history and uses the data collected to create unsolicited targeted pop-up advertisements is called _____ .

adware

in addition to ram, modern processors temporarily keep frequently accessed data in a

cache

most touchpad use

capacitance

Which optical drive media stores approximately 700 MBs of data?

cd

the technology that allows any text to be digitized is known as optical______ recognition

character

Magnetic Ink Recognition is most commonly seen on

checks

Paul Baran developed a technology called _____ switching that made the internet possible

circuit

Emailing a file to yourself is an example of using ___ storage.

cloud

The number of bits of data describing each pixel in a display is referred to as ___ .

color depth

the amount of data that defies each color in a pixel is called

color depth

the visual image output that a computer creates is known as

color depth

traditional magnetic hard drive

dell desktop computer

devices with a separate system unit and a large footprint are called

desktop computers

routers that can send internet signals over 2 distinct frequencies are called _____ routers

dual band

using a stylus and touchpad to map signatures and measure pressure is what type of recongiton

dynamic

largest bandwidth

fiberoptic

A url identifies a particular _____ address on the www

file

ISP stands doe

internet service provider

A form of spyware that records all actions typed on a keyboard is called a _____ logger.

keystroke

sage was developed during the

korean war

The volume of data that can be carried on an internet transmission media in an amount of time is called

latency

What is the name of a virus written in a macro language and placed within a document or spreadsheet.

macro virus

the actual number of pixels in a monitor is called _____ resolution

native

A group of compromised computers controlled by a hacker is called a _____.

network

Using reflective material to store data that can be read using a laser is called ___ media storage.

optical

Using refracted laser light to store data on a photoreceptive substrate is essentially how ___ storage works. Theoretically this could store gigabytes of data within a cubic millimeter

optical

A type of phishing that seeks to obtain personal information through malicious software that is inserted on a victim's computer is called _______ .

pharming

a security system separating 2 networks or even computers on the same network is called

ping

electronic echo

ping

a processor comprised of one control unit and one ALU is called a

single core processor

Specialized hardware or software that capture packets transmitted over a network are called packet _____.

sniffer

Because they have no mechanically moving parts, ___ provide extremely fast, efficient storage. Multiple

ssd

To create an image with a laser printer ___ is(are) drawn to the drum.

toner

the highest level in the domain name hierarchy is known as the _____

top level domain

URL

universal resource locaator

when discussing digital or smartphone cameras with APS CMOS APS stands for

active pixel sensor

Harming or harassing a person or group of people via information technology and networks in a repeated and deliberate manner is called _____.

cyber bullying

A crime in which a computer is the object of the crime or is used to commit a crime or offense is called _____.

cyber crime

Non-malicious computer security experts that test the security measures of an organization's information systems to ensure they are protected against malicious intrusions are called ___.

cyber security specialists

A person who uses computers and the Internet to launch attacks against computer systems for political or ideological reasons is called a ___.

cyber terrorist

memory is _______ and has no moving parts

electronic solid state

The fact that data on servers is nearly always backed up onto other servers gives ___ storage a major advantage over other data storage methods.

external

Cookies stored on a computer's hard drive and used to collect and store information about user preferences, password and username information, IP address, and/or data on web surfing behavior are called ___ cookies.

persistent

signal transmitted by wireless router

ping

personal computer CPU clock speeds range between ...

2-4 gigahertz

Blu-rays provide approximately ___ of storage space.

25 gb

Sometimes used to create prototype models for casting, ___ printing is also known as additive manufacturing

3D

CDs provide approximately ___ of data storage space.

700 MB

Inkjet printers are often sold ____ their production cost.

Below

represented as either 0 or 1, a ___ is the smallest unit of data a computer can process

Bit

a separate processor (computer) in your computer that enhances your video is the

CPU

The internet service that tends to provide the most consistent speeds is

DSL

The acronym DDoS stands for ___ .

Developed Denial of Service

The art and science of creating output that provides information in the most useful manner is called ___ .

Ergonomics

typical sad capacities for tablet computers or smartphones are measured in

Gigabytes

A port that allows the transfer of high quality video and audio signals is called a(n) ___ port.

HDMI

The standard port for video and audio input into televisions today is the .... port

HDMI

largest chip company is

Intel

microsoft

Internet explorer

The _______ cache is located directly on the processor itself

L1

a switch distinguishes between various devices within a network by their _______ addresses

MAC

the technology (chips) that allow cell phone microphones and hearing aids to be so small is the _____ chip

MEMS

megahertz=

MHz

connecting digital music......

MIDI

this technology allows musicians to create written sheet music by playing an instrument

MIDI

broadband is measured in

Mbps

a commonly used short range wireless technology used for data transfer and electronic payments is called

NFC

Though currently expensive, curved and paper-thin displays are possible using ___ display technology.

OLED

the technology that uses the reflection of a laser of the graphite left by a # 2 pencil to determine if a bubble has been filled in is called

OMR

Printer speed is described using which acronym?

PPM

the place in a digital device where the data and programs that device is currently using are accessible by the processors is called the

RAM

Instructions needed to boot up a computer are stored in

ROM

____ is actually storage since it retains data and information when power is off

ROM

Because a metal platter is physically spinning, hard drives have ___ access times than solid state hard drives.

SHORTER

What group determines the standards for the WWW

The world wide web consortium (wc3)

Connector most common for connecting printers, monitors etc

USB

The original wireless network privacy and protection standard for wifi was known as

WEP

the standard for wireless network privacy and protection is known as

WEP

wireless network introduced then replaced in 2003

WPA

in addition to activating _____ protection, its a food idea to disable your routers said transmission

WPA 2

CDs store data using ___

a blue spectrum laser beam

Blu-ray stores data using ___

a magnetic coating that is sensed by a read/write head

DVDs store data using ___ .

a reflective coating that has pits and lands

smartphone camera work by focusing incoming light onto what type of array that captures images

active pixel scanner

_____ ARE POPULAR WITH BUSINESS

all in one

data flows between different parts of the computer via

busses

the number of instructions the cpu can process per second is dictated by the ______ speed

clock

clock speed is also referred to as

clock rate

Because it allows their files to be accessed from any device on the Internet, many users like to back-up their files using ___ storage.

cloud

Firewall software used to block a user's access to specific Internet content is called a(n) _____ filter.

content

A description of the difference in the luminance of a display's white pixels compared to the black pixels is called ___ .

contrast

TWO MAIN COMPONENTS OF A PROCESSOR ARE ALU AND ....... UNIT

control

The malicious use of computer code to modify the normal operations of a computer or network is called a ___

cyber attack

One disadvantage of cloud storage is that

data is only available when you're online.

Which of the following would be considered a cybercrime?

data manipulation

An attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests is called a _____ attack.

ddos

SAGE was developed by us department of

defense

Though it could theoretically hold terabytes of data for thousands of years in a microscopic space, ___ storage, using genetic material, is a distant storage option.`

dna

a ______ name identifies a server site on the internet

domain

Solid state drives store data using ___

electronic circuits

a protocol commonly used to transfer large files from one server to another on the internet is the

file transfer protocol

the protocol used for transmitting large files from one server to another over the internet is known as the ____ protocol

file transfer protocol

software that limits the material that a browser fetches or displays is

filters

Hardware or software used to keep a computer secure from outside threats such as hackers and viruses by allowing or blocking Internet traffic is called a ____.

firewall

Number of times per second a frame in a video is advanced is the definition of ___ .

framerate

water resistant camera

gopro

_____ USER INTERFACE

graphical

A person who gains unauthorized access to networks and in order to steal and corrupt information and data is called a _____.

hacker

These facilitate getting data and information into your computer

input devices

touchpad are used with

laptop computers

for __________ it may be less expensive to add an existing cell phone

large corps

Lower range tones generally require ___ speakers.

larger

A million bytes of data equals approximately one ___

megabyte

An electronic element that stores data by changing its resistance based on the current that has passed through it (similar to RRAM) is called a(n) ___ .

memristor

megahertz is equal to one _____ cycles per sec

million

MODEM STANDS FOR

modulator demodulator

fiber optic cable is

more expensive

The 2 most common audio file formats are WAV and ___ .

mp4

new computer game

new video card

Using cells of ionized gas to create images, ___ displays are actually becoming less popular.

plasma

A type of printer that is used to print large graphic images such as architectural drawings by mechanically moving a pen over a large sheet of paper is known as a ___ .

plotter

software that can be added to a browser to increase its functionality are called

plug ins

a hole or slot in a computer is a

port

An output device that uses light to display video or image output on a surface is called a ___ .

projector

RFID

radio frequency identification

Because of their capability of storing data in multiple hard drives, data warehouses use ___ technology to ensure redundant data storage

raid

When referring to digital storage, RAID stands for ___ .

redundant array of independent discs

with optical zoom resolution ___________ when focusing on distant objects

remains the same

# of pixels in an image is called

resolution

The number of pixels in a display is called the display's ___ .

resolution

The device that connects two networks is a

router

your ______ can provide hardware firewall protection

router

because they're both apple products, the browser that works smoothest w macintosh is

safari

The accuracy of a digital recording is determined by the device's ___ rate.

sampling

Increased data transfer will be less likely to have errors if you use a ___ USB cord.

shorter

found in classrooms

smartboard

What type of port do most digital devices use to attach peripherals?

usb

Persistent cookies store information about

user prefernces

Software that infects a computer and is created using computer code is called a computer _____.

virus

A camera that takes photos or steams video into a computer or over the internet is

webcam

adequate cell service

wifi hotspot

the maximum number of bits per instruction that a cpu can process during 1 machine cycle is called

word size

A destructive program that replicates itself throughout a single computer or across a network is called a _____.

worm

A computer controlled by a hacker is called a _____

zombie

devices with a separate system unit and a relatively large foot print are called

desktop computersq

machine cycle steps

fetch decode execute and store

in photography there are two ways to focus on distant objects: digital and ____ zoom

optical

running the processor faster than recommended is called

overclocking

the bitorrent protocol is often called _____ file sharing

peer to peer

An input, output or storage device connected to a computer is known as a(an) _____ .

peripheral

The smallest controllable element of an image is called a(n)___ .

pixel

devices that allow for the retention of data when your computer has been shut down are called ____ devices

storage

because they're inexpensive and reliable ______ have become extremely popular storage devices

thumb drives USB

smartphone input device

touchscreen or keyboard

many computers today use _______ which is a coding scheme

unicode


Set pelajaran terkait

Hinkle Chapter 29: Management of Patients With Complications from Heart Disease

View Set

insurance chapter 5: life insurance underwriting and policy issue

View Set

INTIMATE PARTNER ABUSE AND STALKING

View Set

Chapter 1- The Purchasing Function: An Overview

View Set