Ch. 4 & 6 7 Review
Formulas with static numbers (instead of cell addresses) are considered
"Hard coded"
Formulas with cell addresses are considered
"Soft Coded"
Flash
- Non volatile, chip based - Doesn't need electricity to retain information - Holds computer start up instructions and system information - System time, date
ROM (Read only memory)
-Non volatile, chip based - Holds the most
RAM (Random Access Memory)
-Volatile, chip based -Commonly known as main memory -Holds data and programs that are currently being worked on
Chip based memory is fast
200,00 time faster than a hard drive Approximately 10 nanoseconds to retrieve data
Many chips stored on a module. A module is a
3 dimensional circuit board
What is the binary system?
A number system that has two unique digits, 0 and 1 called bits. A bit is the smallest unit of data the computer can process.
What is the role of an operating system?
A set of programs that coordinates all the activities among computer or mobile device hardware
___________ does math and comparisons
ALU - Arithmetic Log Unit
Widely used coding scheme to represent a set of characters
ASCII
A(n) ____________________ is a circuit board that enhances the functions of a component of a desktop or server system unit and or provides connections to peripheral devices.
Adapter card
_________ include basic calculations such as addition, subtraction, multiplication and division
Arithmetic Operations
Why do app developers opt for web delivery?
Because they do not have to create a different version for each mobile device's app store
Use other input devices (scanners, microphones, etc.) and extra s/w to detect physiological characteristics Retinal scanner Iris scanner Fingerprint scanner Face recognition Voice recognition Signature verification
Biometric Devices:
"more nits = brighter picture"
Brightness is measured in nits
The wiring that connects all the processing unit components
Bus
Determines the number of bits a computer can transit at one time
Bus width
__________________ is a type of application that assists professionals and designers in creating engineering, architectural, and scientific designs and models.
CAD software
Type of education in which students learn by using and completing exercises with instrumental software
CBT
System unit is comprised of:
CPU Internal Memory Expansion Slots Bus Ports
____________ manages all communication and memory
CU - Control Unit
Small piece of semiconducting materials, usually silicon, on which integrated circuits are etched
Chip
Many factors determine a computer's speed
Chip speed, bus speed, amount of internal memory
Component of the computer that directs and coordinates most of the operations in the computer
Control Unit
What are the two components contained in a processor?
Control unit and arithmetic logic unit
_____________ is a small text file that a web server stores on your computer
Cookie
The term ___________ refers to removing unwanted areas of a photo
Crop
____________ software performs functions specific to a business or industry.
Custom
What happens during the delivery phase of a virus?
During delivery phase, the virus unleashes its payload, which might be a harmless prank, that displays a meaningless message- or it might be destructive, corrupting or deleting data and files.
What steps can you take to safeguard your funds and identify when using personal finance apps?
Evaluate the apps, use strong passwords to access the apps, guard your smartphone, and verify the transactions.
A dual core processor doubles the processing speed of a single core processor. T/F
F
In the binary system, the digit 1 represents the absence of an electronic charge T/F
F
Most RAM is nonvolatile T/F
F
Open source software is a mass produced, copyrighted software that meets the needs of a wide variety of users. T/F
F - Retail Software
Application software serves as the interface between the user, the apps, and the computer's or mobile device's hardware. T/F
F - System Software
In general, multi core processors are less energy efficient than separate multiple processors. T/F
F - more energy efficient
With database software, users run functions to retrieve data. T/F
F - they run queries
The power supply converts the wall outlet AC power into DC power. T/F
F- AC adapter
Cookies typically are considered a type of spyware. T/F
F- Cookies are not considered spyware because website programmers do not attempt to conceal the cookies
A worm is a destructive program designed as a real program. T/F
F- Trojan Horse
The system clock keeps track of the date and time in a computer. T/F
F- a separate battery backed chip, called the real time clock keeps track of date and time
The processor interprets and executes a program or application's instructions while the program or application is in nonvolatile memory. T/F
F- while the program is in RAM
In the machine cycle, the _________ operation obtains a program or application instruction or data item from memory
Fetching
What are the four operations performed during the machine cycle?
Fetching Decoding Executing Storing
ROM chips that contain permanently written data, instructions or information.
Firmware
How does fragmentation affect a computer's performance?
Fragmentation slows down the file access and thus the performance of the entire computer. Defragmenting the disk, or reorganizing it so that the files are stored in contiguous sectors solves this problem
Lots of specialty devices
Gamepad - two handed device, with buttons, wheels, sticks. Talks to console. Joystick - stick with buttons on base Steering wheel - may have buttons and a footpad with pedals Light guns - fancy flashlight or a motion sensing device Dance pad - flat device (can be hard or pliable) that senses pressure Motion sensing device - like a Wii remote
The steps the CPU goes through to perform one instruction
Get instruction from MM - CU Decode the instruction and send to the ALU - CU Instruction performed - ALU Instruction result moved into MM - CU
A(n) _____________ is a device intended to stop network intrusions before they attempt to affect your computer or network maliciously
Hardware firewall
__ allow you to connect many devices to a single port
Hubs
The use of software to emulate hardware capabilities, enabling computers to scale, or adjust up or down, storage, processing power, or bandwidth as needed.
IaaS
When might you choose to use a database instead of a spreadsheet?
If you want to collect, reorganize, and filter data, and or create reports from the data.
Connect to the system unit either with a cable or wirelessly Infrared requires line of sight Radio (e.g. Bluetooth)
Input/Output Devices
The term, ________ describes a computing environment where everyday objects are connected to the Internet.
IoT
A(n) __________________ is the right to use a program or app
License Agreement
___________ are applications that incorporate data from multiple providers into a new application.
Mashups
The ____ is the main circuit board of the computer
Motherboard
The main circuit board of the computer
Motherboard
A ___ is a single chip with two or more separate processor cores
Multi - core processor
Mobile Payment apps use a payment system on phones equipped with a(n) ____________________, which stores data that is transmitted to a contactless terminal and verified as a legitimate scale.
NFC chip
Application Software dictates:
OS H/W - memory, video card Peripherals
OCR (Optical Character Recognition) Recognizes numbers and letters OMR (Optical Mark Recognition) Like a Scantron machine Bar Code readers, lots of kinds
Optical Readers
Convert anything scanned into an image
Optical scanners
An aspect of cloud computing that allows developers to create, test, and run their solutions on a cloud platform without having to purchase or configure the underlying hardware and software is known as _________
PaaS - platform as a service
Destructive event or prank a virus was created to deliver
Payload
Input and output devices called
Peripheral Devices
Security tool that protects and detects a personal computer and its data from unauthorized intrusions
Personal Firewall
Scan in which a perpetrator sends an official looking email to message that attempts to obtain personal and or financial information
Phishing
Essentially sockets for connecting peripheral devices Serial - one bit at a time Parallel - multiple channels USB (Universal Serial Bus) Connects many types of devices Lots of other specialty ports: Head phone Microphone Telephone
Ports
Who might use CAD - COMPUTER AIDED DESIGN?
Professionals and designers, engineers, architects, scientists, home and small business users
Square shaped graphic that represents a web address or other information
QR code
Separate area of a hard drive that holds an infected file until the infection can be removed
Quarantine
Lots of internal memory:
RAM ROM Flash
What is meant by the term, microprocessor?
Refers to a personal computer processor chip
Small high speed storage locations contained in a processor
Registers
Copyrighted software that is distributed at no cost for a trial period
Shareware
Computing environment where an internet server hosts and deploys applications
Software as a Service
What is the difference between software registration and product activation ?
Software registration typically is optional an usually involves submitting your name and other personal information to the software manufacturer or developer. Registering the software often entitles you to product support. Product activation is a technique that some software manufacturers use to ensure that you do not install software on more computers than legally licensed.
______________ software is an application that allows users to organize data in columns and rows and perform calculations on the data
Spreadsheet
The operating system and other tools are collectively known as
System Software
The hardware that houses the processing unit components
System Unit
PCs also have bays
System Unit opening that can hold a device Internal and External Internal holds Hard drive External holds CD, DVD drive
A PDF file can be viewed and printed without the software that created the original document. T/F
T
A router can also function as a hardware firewall
T
As with processors, manufacturers state the clock speed for a bus in hertz. T/F
T
In cloud computing, the back end consists of the servers and storage devices that manage and store the resources accessed by users. T/F
T
On a personal computer, all functions of the processor usually are on a single chip. T/F
T
ROM chips are also called firmware. T/F
T
Software suites offer three major advantages: lower cost, ease of use, and integration. T/F
T
The military and airlines use CBT simulations to train pilots to fly in various conditions and environments. T/F
T
The motherboard also is called a system board. T/F
T
When downloading shareware, freeware or public domain software, it is good practice to seek websites with ratings for and reviews of products
T
While a computer or mobile device is running, the operating system remains in memory. T/F
T
With web apps, you always access the latest version of the software. T/F
T
What is the clipboard?
Temporary storage location
How does a personal firewall protect your computer?
They constantly monitor all transmissions to and from a computer or mobile device and may inform a user of attempted intrusions.
Program that enables you to perform maintenance type tasks, usually related to managing devices, media and programs used by computers and mobile devices
Tools
Integrated circuit component that acts as an electronic switch that opens or closes the circuit for electrical charges
Transistor
In addition to the clock speed, what other factors influence the computer's performance?
Type of processor chip, amount of cache memory access time, bus width, and bus clock speed.
Number of bits the processor an interpret and execute at a given time
Word Size
Malware that resides in active memory and replicates itself over a network to infect computers and devices, using up the system resources and possibly shutting down the system.
Worm
What type of activities does a license agreement restrict?
You do not have the right to copy, loan, borrow, rent, or in any way distribute programs or apps. Doing so, is a violation of copyright law; it is also a federal crime.
A character can be represented by one
byte
ARM chips have lower power consumption so majority of mobile devices use them to...
extend battery life