CGS 2100 Midterm (FSU)
Popular Personal Media Players (PMP's) include which two of the following devices?
- Amazon Kindle -Fire Amazon Kindle Fire
Hardware Quiz
......
What is the minimum amount of RAM you should have on a laptop?
4 GB
Which of the following are typical aspect ratios for monitors?
4:3 16:9
Which of the following are output?
A YouTube video displayed on a screen An antilock brake system applying brakes
Smartphone cameras work by focusing incoming light onto what type of array that captures images?
Active pixel scanner
Choose what all-in-one computers actually mean.
All-in-one computers house every component except the keyboard and mouse inside the same case as the monitor. An all-in-one computer is a stationary device with a separate keyboard and mouse.
FireWire connectors were developed for ________ computers.
Apple
Lightning connectors and ports are used by which company?
Apple
AJAX stands for ________ JavaScript and XML.
Asynchronous
Match the appropriate Windows keyboard shortcut with its result.
Bold - CTRL+B Cut - CTRL+X Select all - CTRL+A Copy - CTRL+C
If you are planning to write PC games software, you might need to know C or ________.
C++
The PDLC's coding phase uses which of the following languages?
C++
Most of the PC games were written in ________ or ________.
CC C++
In the Firefox, the best steps to clear the browser cookies is to
Click the Menu button, choose History, and then Clear Recent History. Once you have cleared recent History you should set the time range to clear Everything. Click on the arrow next to Details to expand list of History items. Select Cookies and make sure that other items you want to keep are not selected. Close the Clear Recent History window.
Choose the desktop computer features.
Desktops allow for relatively easy upgrade and expansion. Desktops are often used in offices since they do not need to be mobile. Desktops use a full OS.
The acronym DDoS stands for ________.
Distributed Denial of Service
Common symptoms of a computer virus include?
Documents won't save. Computer runs extremely slow Programs launch on their own.
This type of analysis or walking stride identification is valuable because it can be used at night or through walls with infrared cameras or even with satellite imagery.
Gait analysis
The ________ is a separate processor (computer) on your computer that enhances your video.
Graphic processor (GPU)
Today, the standard port for video and audio input on TV is the ________ port.
HDMI
Computer hardware and software used by an organization to improve its performance is called its ________.
IT system
Which is true regarding the length of a USB cord?
In general, the more data being transmitted, the shorter the cord should be.
Which chip and manufacturing company is the largest in the world?
Intel
Who are the three biggest computer processor manufacturers?
Intel AMD Nvidia
To speed up the programming process while producing dynamic web pages, select the program that utilizes tiny programs called scripts.
JavaScript
The method used in the development and maintenance of an IT scheme is called the SDLC. SDLC stands for System Development ________ Cycle.
Life
The technology (chips) that allow cell phone microphones and hearing aids to be so small is the ________ chip.
MEMS
MIDI is an acronym that stands for?
Musical Instrument Digital Interface
Though currently expensive, curved and paper-thin displays are possible using ________ display technology.
OLED
________ runs the processor faster than recommended by the manufacturer. This can increase performance and speed, but will also void the manufacturer warranty.
Overclocking
Match the following.
Playing a song from Spotify - Output Entering text in a word document - Input Putting a photo onto a USB drive (thumb drive) - Storage
Select the advantages of a point-and-shoot camera over a smartphone camera.
Point-and-shoot cameras often have larger pixel sensor arrays, providing higher resolution Point-and-shoot cameras, being thicker, often come with optical zoom capability.
The information in ________ is dumped when a computer is shut down.
RAM
System BIOS (Basic Input/Output System) is stored in ________.
ROM
The type of storage that retains data and information when the power is turned off is called ________.
ROM (Read Only Memory)
Apple developed ________, a programming language for Mac OS and iOS writing software because Objective-C was hard to write.
Swift
Sometimes spam messages are referred to as ________.
UBE
Television displays with resolutions of at least 3840 x 2160 pixels are referred to as ________.
UltraHD
________ Basic is a programming language of the third generation that enables BASIC to be used with the benefits of a graphical user interface.
Visual
The wireless network protocol is called ________.
Wi-Fi
The three most common types of e-mail viruses include all
a keystroke logging Trojan phishing ransomware
A bus is a channel over which information flows. A bus has two parts: the ________ and the ________?
address bus; data bus
Software that collects the web browsing history of the user and uses the collected data to create unwanted pop-up ads is called ________.
adware
Match the following.
allows for the transmission of high-definition audio and video signals - HDMI capable of carrying digital music signals and are common in today's music scene - MIDI a technology that enables the OS to detect and configure peripherals without downloading software or drivers - Plug and Play
The second step of the SDLC phase is to collect information on current hardware and software, analyze this information, and prepare system requirements. This is called the phase of the ________ scheme.
analysis
Inkjet printers are often sold ________ their production cost.
below
A ________ is the smallest unit of data that a computer can process.
bit
The two main factors that affect the speed of the processor are clock speed and ________.
bus width
In ASCII 8 bits are combined to create a ________.
byte
Including RAM, modern processors keep frequent and temporary accessed data in ________.
cache
Match the following optical storage media.
capacity of up to 8.5 GB - DVD capacity of up to 700 MB - CD capacity of up to 50 GB (per side) - Blu-ray
Clock speed, also known as ________, is the speed at which the processor performs the operations required to run a digital device and the digital device's instructions.
clock rate
A virus signature is the software ________ of a particular computer virus.
code
A program that checks the source code for errors, and converts it into machine language is a ________.
complier
A description of the difference in the luminance of a display's white pixels compared to the black pixels is called ________.
contrast ratio
A small text file of information created by websites that your web browser stores on your hard drive is called a ________.
cookie
The malevolent use of computer code to change a computer or network's normal operations is called a ________.
cyberattack
A person who uses computers and the Internet to launch attacks against computer systems for political or ideological reasons is called a ________.
cyberterrorist
Devices with a separate system unit and a relatively large footprint are called ________ computers.
desktop
Which device carries a relatively large footprint and separate system unit?
desktop
The fourth step in the life cycle of system growth is to get the required equipment and ensure that it operates properly. This is called the system development step.
development
The size of the screen is measured by the ________.
diagonal distance between the upper right and lower left corners of the screen
The distance between two adjacent sub-pixels on a display is referred to as ________.
dot pitch
RAM is ________ and has no moving parts.
electronic (solid state)
The machine cycle consists of which four steps?
fetch, decode, execute, store
The ________ step in software development is: What should this program do?
first
A process's graphical representation is called a ________.
flowchart
What are some characteristics of a 2-in-1 computer?
full operating system touch screen monitor
A person with unlawful access to networks to steal and corrupt information and data is called a ________.
hacker
These facilitate getting data and information into your computer.
input devices
Common names for a USB drive include?
jump drive flash drive thumb drive
Uses for computer hard drives include ________ and ________.
keeps files for future use data remains intact when computer is turned off
Because of their compact size, touch pads are most often used with ________ computers.
laptop
There are two stages of the final step in the SDLC, one system audit and one assessment stage. This final step is called ________ the system.
maintaining
Even a small degree of programming skill can be beneficial. Many apps allow you to create mini-programs that reduce the number of routine steps required to complete a task. These mini-programs are called ________.
marcos
Match the following.
memory located directly on the processor itself - L1 Cache relatively small amount of memory (measured in kilobytes or megabytes) - Cache extremely small amount of memory (measured in bits) located throughout the processor - Register largest memory of a computer, connected to the processor via the front side bus - RAM
Match the cache.
memory located directly on the processor itself - L1 cache memory located adjacent to the processor - L3 cache memory used to increase a hard drive's efficiency - Disk cache
Megahertz is the same as a ________ cycles (or instruction) per second.
million
Choose the SSD characteristics.
no moving parts extremely fast
The information in the memory (the RAM, the caches, the registers) is ________ when a computer is shut down.
not saved
JSON stands for JavaScript ______________ Notation
object
Rank the storage capacities from highest to lowest. Start with the highest capacity first.
petabyte terabyte gigabyte megabyte kilobyte
The smallest image element is a(n) ________.
pixel
A point in a computer (a hole or a slot) that accepts a specific connector is called a ________.
port
Converting a task into commands that a computer can use to perform the task is one definition of computer ________.
programming
An output device that uses light to display video or image output on a surface is called a ________.
projector
Written in natural language, but often including shorthand programming to help write the program itself, ________ is the word that defines an intermediate step in generating a flowchart algorithm.
pseudocode
Avoiding viruses include all the following
purchase a new router often (yearly) for the latest firewall protection. only visit trusted sites. remove USB drives before booting the computer.
The number of pixels in a display is called the display's ________.
resolution
Data from the hard drive reaches the CPU ________ than data from the RAM.
slower
A combination input and output device that allows users to interact with large computer displays that is sometimes found in classrooms is called an interactive whiteboard or a ________.
smartboard
Devices allowing data to be retained when your computer is shut down are called ________ devices.
storage
What is the most powerful computer type?
supercomputer
Websites that use cookies can collect information about
surfing habits. selling your collected information to third parties. monitoring your web behavior.
Since they are low-priced and reliable, ________ storage devices are extremely popular.
thumb drives (USB or flash drives)
If you purchase a new graphics computer game or a new photo/video editing software for your desktop computer, you may want to purchase a new ________ card.
video
Software that infects a computer and is created by computer code is called a ________.
virus
Common malware types include
viruses. worms. Trojan horses.
Select the statements that describe a computer programmer's algorithm.
written in a natural language, such as English written in the form of a flowchart so that it will be more easily converted into a programming language