CIS101 - Midterm

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

Which is most likely to be the ASCII bit code for the character "A"? 01 01101101 01001001 11100110 00011011 01010101 10 01000001

01000001

As transistors were made smaller - more and more could fit into a smaller Integrated Circuit (IC) - powerful computers can now be found inside devices like hearing aids and Bluetooth headsets that can be made as small as ________. A dime A penny A pinhead An atom

A pinhead

What electronic component inside a computer's hardware interacts with the 1's and 0's (bits) in a computer? A transistor (switch) The atoms The molecules A generator

A transistor (switch)

______ is a program that runs on a user's computer without permission, and spreads itself to other computers, often via email. Question options: A bug A worm Spyware A virus

A virus

Who is often credited as the creator of modern computing? Alan Turing Ada Lovelace Herman Hollerith Grace Hopper

Alan Turing

"Giga" is a metric system prefix meaning one _________. Trillion Thousand Million Billion

Billion

______ reduces the size of a file, enables a user to store more files on a drive and speeds up transfers of files via the Internet. Compression Cache A device driver HTTP

Compression

The "driver" in device driver most likely refers to how device driver software _________ hardware. Stores Controls Moves Replaces

Controls

A _____ is an app that interacts with a database. Question options: IMDB Server SQL DBMS

DBMS

A(n) _____ computer is a computer found inside another electrical device. Personal Server Embedded Mobile

Embedded

If you are typing HTML code and add extra spacing or include a few spaces between your words, it will show that way within your browser. True False

False

What does HTML stand for? Hyper Text Memory Language Hyper Text Markup Language Hyper Text Machine Language Hyper Text Maker Language

Hyper Text Markup Language

What are the functions of a computer that make it a computer? Output Store Request Input Read Respond Process

Input Store Process Output

Match the following malware terms to their definition: ____Adware ____Trojan horse ____Sypware ____Rootkit ____Worm ____Virus 1.Potentially damaging program by altering the way a device works without the users knowledge 2.Program that copies itself repeatedly 3.Hides code within a legit program 4.Hides in a device but allows remote external access 5.Secretly collects user information and sends it to a bad actor 6.Displays ads, lots and lots of ads

__6__Adware __3__Trojan horse __5__Sypware __4__Rootkit __2__Worm __1__Virus

A program called a(n) ______ automatically converts an assembly language program into machine language. code converter Unicode reader Machine Language Scripting Engine (MLSE) assembler

assembler

Assembly language was created because ________. people from different countries began programming, requiring a neutral language assembly language is easier to comprehend by humans than 1's and 0's modern CPUs now represent instructions and data as text humans can understand, not as 1's and 0's assembly language runs faster than machine language

assembly language is easier to comprehend by humans than 1's and 0's

A single 1 or 0 is called a ______. byte digit bot bit

bit

A PC/laptop owner can always increase computer speed on their own by adding cache into the CPU chip. true false

false

Avoid including blank lines when writing code or your program will crash. Question options:TrueFalse

false

Beyond homes and offices, more and more companies and cities provide publicly accessible Wi-Fi networks, known as ______, either free or for a price. Question options: hotspots WANs switches routers

hotspots

Computers communicate by sending a piece of information known as a _____, which travels from the sender's computer through various intermediate computers until reaching a destination computer. Question options: bit packet protocol byte

packet

A _____ is a type of computer that is large, expensive, and rarely seen by most people. embedded computer laptop server desktop

server

A computer's storage drive (HDD or SSD) is usually _____ when you want to access data than a computer's memory. non-volatile slower volatile faster

slower

A CPU's cache is typically ______ than memory (RAM). Smaller and slower Larger and faster Larger and slower Smaller and faster

smaller and faster

A PC/laptop owner can usually increase computer speed by adding memory (either adding more memory chips, or replacing existing memory chips with larger ones), but usually cannot add cache because cache is built into the CPU chip. true false

true

A cache is a small fast memory module on the CPU chip. true false

true

A modern computer's main chip commonly holds two, four, eight, or more CPUs. true false

true

A network administrator is typically responsible for daily operations such as ensuring that an organization's networks are operational. Question options:TrueFalse

true

A platform as a service (PaaS) vendor may provide users with pre-built software to easily query a database for customer contacts, invoices, and inventory. Question options:TrueFalse

true

A prototype, or proof of concept, is a model of the proposed system's design, look / feel or functionality. The prototype is just a representation of what the final product may ultimately be. true false

true

A significant downside of some cloud applications is that content is only available while the user maintains an active subscription. Question options:TrueFalse

true

HTTPS is a _____-based encryption protocol. Question options: WiFi email server web

web

A domain name is a sequence of numbers that uniquely identifies each computer or device connected to the Internet Question options:TrueFalse

false

Adding more drive storage means the computer will run programs faster. true false

false

Servers operate a temperatures much cooler than consumer desktops and laptops so cooling a server farm with thousands of servers is a not a challenge. Question options:TrueFalse

false

Software developers spend nearly all their time alone at a computer. Question options:TrueFalse

false

Storage, servers, databases, and networking are all example of products and services provided by an Application as a Service (AaaS) vendor. Question options:TrueFalse

false

System development only involves the IT department and does not include representatives from each department in which the proposed system will be used. true false

false

The Operating System executes instructions one by one. true false

false

The arithmetic logic unit (ALU) tells the memory how to respond to arithmetic operations. true false

false

Viewing a word document benefits from a fast graphics processor. true false

false

Web development, while needed, is a slowly evolving field, with no new technologies created since the late 1990's to make web development more efficient. Question options:TrueFalse

false

When a user types on a keyboard, the typed characters are stored directly on a computer screen. true false

false

While most operating systems provide a way for you to move, delete, or create new items, you must use a separate search application (not included with the operating system) to find specific items on your storage drive whose name or contents match certain words. Question options:TrueFalse

false

You can create multiple online accounts in order to hide your true identity. Question options:TrueFalse

false

Windows is a ____ Operating System developed by Microsoft in the mid-to-late 1980's. Command line Touch-based Text-based Graphical user interface

Graphical user interface

_____ is a textual language for creating web pages. FTP HTTP HTML TCP/IP

HTML

What is the file type rendered by web browsers? Question options: PDF files HTML files IP files FTP files

HTML files

_____ is the standard protocol for transferring web pages over the Internet. Question options: HTTP DHCP SMTP HTML

HTTP

A website wireframe is a visual guide, a prototype, that represents the skeletal framework of a website. True False

True

ASCII stands for American Standard Code for Information Interchange and, using 7 bits per code, has codes for 128 characters. True False

True

Developers check that a system functions properly and meets the requirements in the _____ phase. Planning Support Analysis Implementation Design

Implementation

An HTML file typically starts with an indication of the document type, then a head portion with the page title and other page information, and finally a body portion with the actual page content. True False

True

An image tag, <img> includes four attributes: src="" alt="" height="" width="" True False

True

To assist with sound decision making, information must have value; meaning it is accurate, verifiable, timely, organized, accessible, useful and cost effective. Question options:TrueFalse

true

To search a database for data you write a query statement. Question options:TrueFalse

true

While cloud storage enables local removal to free up local storage, such removal isn't required. Question options:TrueFalse

true

Even if in use, restarting an application (such as a web browser) every so often may be a good idea due to _________. Question options: reduce memory leaks prevent bit overload avoid stack overflow curb byte redundancy

reduce memory leaks

Moving files to the trash or recycle bin does not actually delete files from the drive. true false

true

Which of the following represents the decimal number 7 as a 4-bit binary number? 0111 1110 1000 0001

0111

Which are NOT one of the seven basic hardware components you need to build a computer (that we discussed in class) Graphics Processing Unit (GPU) Input / Output devices Motherboard Power Supply Unit Memory Operating System

1.Operating System2.Graphics Processing Unit (GPU)

Convert the following binary number into a decimal number: 00010101 19 20 23 21

21

A sequence of instructions that solves a problem is called a(n) ____. Algorithm Device driver Portable document Additive function

Algorithm

An information system (elements that work together to produce information) is a collection of: Hardware Software Data People Procedures All of the above

All of the above

In what device might one expect to find an embedded computer? Robotics Medical devices Cars All of the above

All of the above

Which of the following is NOT true about Operating Systems? An OS manages files and folders An OS interfaces with hardware An OS may provide the user with a graphical user interface An OS lets you create documents, spreadsheets and presentations

An OS lets you create documents, spreadsheets and presentations

What do you call a program that you use to perform a task like writing a paper, streaming music, editing a photo, etc.? A high-level language An application An operating system A task manager

An application

______ is a set of hardware, software, data, people, and procedures that work together to produce information Question options: A database solution An enterprise system Platform as a Service An information system

An information system

______ is an operating system developed by Google for smart phones and tablets. Linux iOS Chrome Android

Android

_______ is a graphical Operating System released by Google in 2007 for smartphones and tablets, based on the Linux OS. This Operating System emphasizes interactions via screen touches. iOS Linux Mac OS X Windows Android

Android

Computers in the 1960's had thousands of transistors. How many transistors does a modern laptop computer have? Millions Thousands Trillions Billions

Billions

Computers in the 1960's had thousands of transistors. How many transistors does a modern laptop computer have? Question options: Millions Thousands Trillions Billions

Billions

____ is ultra-fast memory within the CPU where currently needed data and instructions are copied so they can be accessed quickly. BIOS HDD Cache RAM SSD ROM USB

Cache

Many modern CPUs have additional small fast memory modules called a _____ to provide ultra-fast access to the currently-needed instructions and data. Cache (pronounced: cash) Internal Data Drive (IDD) Universal Serial Bus (USB) Read Only Memory (ROM)

Cache (pronounced: cash)

CSS stands for Cascading Service Sheet Complimentary Style Sheet Compatible Style Sheet Cascading Style Sheet

Cascading Style Sheet

CPU stands for ______. Central Processing Unit Central Power Unit Control Process Unit Common Power Unit

Central Processing Unit

_____ invented an automated mechanical computer that was used to calculate polynomial functions. Ada Lovelace Charles Babbage Joseph Marie Jacquard Grace Hopper Alan Turing Herman Hollerith

Charles Babbage

The speed of a CPU is governed by a _______ that synchronizes all of its components. Clock signal System alarm CPU timer GHz

Clock signal

Which of the following is NOT a common database operation: Question options: Editing or updating existing information Inserting or adding new information Reviewing or reading existing information Copying or duplicating existing information Removing or deleting existing information

Copying or duplicating existing information

With HTML, the <a> tag is used for: Creating a hyperlink Creating an article Creating an aside Adding an image

Creating a hyperlink

Developers determine the specifics of how to build a system in the _____ phase. Design Implementation Support Planning

Design

The portions of an Operating System that interface with hardware components, both internal and external, are often called ______. Management tools Device drivers Memory managers Task managers

Device drivers

Which would be an algorithm for determining if the number 953 is odd? Question options: If half of all numbers are odd and the other half are even, there is a 50% chance the number is odd. If the number ends with an even number then the number is even. Determine if the number is odd. Divide 953 by 2. If the remainder is 1, the number is odd.

Divide 953 by 2. If the remainder is 1, the number is odd.

Moving files to the trash or recycle bin _____. Doesn't remove the file from your storage drive until you empty the trash or recycle bin. Permanently deletes the file from the storage drive. Slows down applications and reduces operating performance. Automatically creates a backup if the file is flagged as do-not-delete.

Doesn't remove the file from your storage drive until you empty the trash or recycle bin

Which of the following is NOT a task likely to be carried out by an operating system? Edits video and audio files Interfaces with the keyboard, monitor and other hardware Provides a graphical interface for the user Keeps track of file locations on a storage drive

Edits video and audio files

What Massive Open Online Course (MOOC) providers have we explored and used as resources for the Assignment #01 presentation. HTMLDog Edx Coursera Brightspace W3Schools Blackboard

Edx Coursera

A file that can be downloaded to a flash drive, emailed or stored in the cloud is said to be portable true false

False

A solid state drive (SDD) contains one or more inflexible, circular platters that use magnetic particles to store data, instructions, and information True False

False

An algorithm is a program used to convert mathematical instructions, written in English words, into machine code. True False

False

An embedded computer is a computer inside a personal computer such as a desktop or laptop. True False

False

Creating a web page requires professional web page designers, typically web pages are only built by large corporations. True False

False

Creating even a simple web page requires years of experience and deep programming knowledge. True False

False

Machine language is a high-level language often used by programmers. True False

False

The following two-step methodical troubleshooting process of: (1) Predict a problem's cause, and (2) Testing to confirm/deny the prediction is not sufficient to solve most computer problems. Question options:TrueFalse

False

When using CSS, if you want to reference a class you use the # (hashtag / pound) symbol and the class's name. For example: #myClassName { color: blue; } True False

False

When using CSS, if you want to reference an id you use the . (period) symbol and the id's name. For example: .myIdName { color: blue; } True False

False

With HTML, a heading tag, e.g. <h1> </h1> is used to show content with larger font and bold text. True False

False

As transistors became smaller such that more could fit on an Integrated Circuit, a consequence was that clock frequencies became ______. Irrelevant Faster Slower Redundant

Faster

If you increase a computer's ticking clock to operate faster, it means a program may execute _______. Faster Slower Longer Shorter

Faster

Modern Operating Systems use a _____ interface which allows for pointing with a mouse and clicking on icons. Graphical user Command line High level Text based

Graphical user

The "device" in device driver refers to _________. Hardware The Operating System The computer or laptop Software

Hardware

_____ languages enables greater programmer productivity by having easy-to-use instructions that humans can read and understand. Assembly Machine High-level Unicode

High-level

Which SQL instruction adds a new record to the database? Question options: Select Record Update Record Insert Into Add Record Create Record

Insert Into

_______ is a version of Unix developed in the early 1990's by Finnish college student Linus Torvalds, and is popular today due in part to being free and open-source, and with people around the world continuing development. While originally text based; popular versions today like Ubuntu have a graphical interface. Mac OS X Windows Android iOS Linux

Linux

_______ is a graphical desktop / laptop Operating System developed by Apple in the early 2000's, based on the Unix OS. Windows iOS Android Mac OS X Linux

Mac OS X

What is the Internet Protocol? Question options: Regulations for users from various countries to access data on international servers. Particular rules for computers to communicate with other computers via a computer network. A set of informal rules that Internet Service Providers (ISPs) follow to allow users access to their networks. A set of government regulations for Internet Service Providers (ISPs) to follow.

Particular rules for computers to communicate with other computers via a computer network.

______ is a scam in which a perpetrator sends an official looking email message that attempts to obtain your personal and/or financial information Question options: Phishing Click-jacking Spyware A Trojan horse

Phishing

An image may consist of millions of _____ (short for "picture elements"), each being a single colored dot. Pixels Quantum dots Pictels Retina squares

Pixels

What does an Internet router do? Question options: Translates high-level programming languages to machine language so the data can be sent across the internet. Serves as the main data storage devices for websites. Converts the machine language the from the country the data was sent into the local machine language of the country receiving the data. Receives packets from computer, or other routers, sending those packets to other computers or routers.

Receives packets from computer, or other routers, sending those packets to other computers or routers.

A computer systems analyst mainly does what? Question options: Writes software Recommends hardware, software and network setups Analyzes database data to produce actionable information Repairs computers

Recommends hardware, software and network setups

A Systems Analyst mostly: Recommends hardware, software and security setups. Writes software programs. Performs support services for technical issues. Assembles hardware systems.

Recommends hardware, software and security setups.

When you load a web page in your browser, your computer communicates with a web server. The actions taken by your computer, the server and the browser are: Question options: Response Request Remit Render Review

Response Request Render

Which of the following are steps the client, server and browser perform to produce a website? Question options: Request Register Relay Response Render

Response Request Render

The CPU's main purpose is to: Interface with the hardware, software and user. Run a program or application's instructions. Store the startup instructions to load when the power is turned on. Store data while you're using programs and applications.

Run a program or application's instructions.

Ada Lovelace wrote detailed notes when translating a document about the Analytical Engine from French to English. These notes were published in the scientific journal _____. Scientific Memoirs Science E'trange Science and Mathematics Scientific Americana

Scientific Memoirs

_____ power the Internet, as well as many businesses. Question options: Mainframes Supercomputers Universal Automatic Computers (UNIVACs) Servers

Servers

Android and iOS are graphical Operating Systems developed for _____. Keyboard and mouse inputs Smartphones and tablets Servers and routers Voice activated outputs

Smartphones and tablets

A device driver is ______ that interfaces with an external hardware device like a screen, keyboard, or printer. Additional hardware A service Software RAM

Software

If a user wants to save large numbers of video files on their computer, they should increase the size of the computer's: Cache CPU Storage Memory

Storage

______ is where your operating system and applications reside when the computer is off. Storage RAM CPU Memory

Storage

Android and iOS are ______ Operating Systems. Keyboard input based Mouse input based Touchscreen input based Voice input based

Touchscreen input based

______ is a process of determining the cause of a computer problem, and ideally solving the problem. Question options: Rebooting Reworking Brainstorming Troubleshooting

Troubleshooting

A high-level language is a programming language having higher-level instructions than assembly language, enabling greater programmer productivity. True False

True

A program called a compiler, or an interpreter, converts a high-level language to assembly/machine language. True False

True

A program in assembly language is human-readable but not as easy to read as a high-level language. True False

True

CSS saves a website developer a lot of work as it is able to control the layout of multiple web pages all at once. True False

True

CSS style rules are commonly placed in a separate file, having a .css extension. True False

True

Every high-level language instruction within a program is converted to machine language so the program can be run by the CPU. True False

True

HTML stands for hyper-text markup language and HTTP stands for hyper-text transfer protocol. True False

True

Unicode can have more bits than ASCII and thus can represent over 100,000 items, such as symbols and non-English characters. True False

True

When using CSS, if you want to reference a class you use the . (period) symbol and the class's name. For example: .myClassName { color: blue; } True False

True

The standard character code that represents characters from multiple languages, e.g. English characters, Asian characters, Arabic characters, etc., using 16 bits is called _____. Unicode ANSI ASCII Binary

Unicode

_____ is a text-based operating system developed in the late 1960's. iOS Android Windows Unix

Unix

_______ is a graphical Operating System developed by Microsoft in the mid-to-late 1980's with powerful graphical features. Linux Android Windows iOS Mac OS X

Windows

A particular computer "X" has a clock frequency of 2.0 GHz. Another computer "Y" is identical to "X" but has a clock frequency of 2.5 GHz. Which describes the most likely relevant difference? Y is larger than X Y is slower than X Y is smaller than X Y is faster than X

Y is faster than X

Can HTML files be read and edited by humans? Yes, HTML is just normal text with tags throughout. Yes, but HTML is 1's and 0's and while people can edit the files they are hard to translate from machine language to human readable. No, HTML is a special format that is unreadable like machine language No, Transmission Control Protocol (TCP) converts HTML files into machine language.

Yes, HTML is just normal text with tags throughout.

Match the following security terms to their definition: ____Computer Security ____Security Breach ____Compromised ____Hack 1.The prevention of unauthorized computer access, including viewing, changing, or destroying a computer or data 2.An instance of unauthorized computer access 3.Unauthorized access by a user with malicious intent 4.A device that, known or unknown to the user, has been accessed with malicious intent

__1__Computer Security __2__Security Breach __4__Compromised __3__Hack

Match the following academic field of study to its description: ____Design of the processes to develop, manage, and disseminate information to help meet organizational goals ____Implementation and management of the technology to develop, manage, and disseminate information ____Theory, design, and development of computing systems. 1.Information Systems (IS) 2.Information Technology (IT) 3.Computer Science (CS)

__1__Design of the processes to develop, manage, and disseminate information to help meet organizational goals __2__Implementation and management of the technology to develop, manage, and disseminate information __3__Theory, design, and development of computing systems.

Information Systems (IS) careers exists in a variety of sectors including retail, finance, nonprofit, and government organizations. Match the following occupations to their summary: ____Determine the computer technology goals for an organization and implement the information systems to meet those goals. Management positions may also require an MBA. ____Study an organization's current computer systems and implement IS solutions to help the organization run more efficiently. ____Responsible for daily operation of an organization's computer networks. 1.Computer and information systems manager 2.Computer systems analyst 3.Network and computer systems administrator

__1__Determine the computer technology goals for an organization and implement the information systems to meet those goals. Management positions may also require an MBA. __2__Study an organization's current computer systems and implement IS solutions to help the organization run more efficiently. __3__Responsible for daily operation of an organization's computer networks.

Technology has enabled a host of new business offerings via the ____ as a service (__aaS) model. Match the offering to its description: ____Infrastructure as a Service (IaaS) ____Application as a Service (AssS) ____Platform as a Service (PaaS) ____Software as a Service (SaaS) 1.A type of business model where users pay to access computing resources such as servers, storage, and networking. Such services enable small companies to avoid some initial start-up costs, getting applications off of the ground faster, and requiring less in-house maintenance. 2.A type of business model where users pay to access vendor's platforms or tool kits to develop and deploy new applications. Vendors reduce the complexity of building new systems and software by abstracting away many of the lower level server, storage, operating system, and networking details. 3.A type of business model where users pay for a vendor's apps, which process and store data on the cloud. 4.A type of business model where users pay to access content but cannot access or configure the underlying resources used to deliver content.

__1__Infrastructure as a Service (IaaS) __4__Application as a Service (AssS) __2__Platform as a Service (PaaS) __3__Software as a Service (SaaS)

Match the following networking equipment and processes to the proper definition: ____Modulation ____Router ____Modem ____Ethernet 1.This process sends computer data and thus requires electrically combining a computer's binary digital signal with an analog electronic signal that is capable of travelling over the ISP's line 2.This device performs the required combining and un-combining of computer data so that the electrical signals can travel over an ISP's line. For example; it demodulates the signals arriving from the ISP line into the digital binary signal your computer requires and also modulates your computer signal into the analog signal that can travel over the ISP line 3.When a computer connects to another computer or device it uses this communication protocol 4.This device is commonly used to send packets from the ISP's line to the appropriate computer among many ina home or office network, and sometimes can send data directly between computers

__1__Modulation __4__Router __2__Modem __3__Ethernet

Match the following computing job descriptions to their title (2/2): ____These professionals use specialized software to store and organize data, such as financial information and customer shipping records. They make sure that data are available to users and are secure from unauthorized access. ____These professionals are responsible for the day-to-day operation of these networks. ____These professionals are the creative minds behind computer programs. Some develop the applications that allow people to do specific tasks on a computer or another device. Others develop the underlying systems that run the devices or control networks. ____These professionals plan and carry out security measures to protect an organization's computer networks and systems. Their responsibilities are continually expanding as the number of cyberattacks increases. ____These professionals design and create websites. They are responsible for the look of the site. They are also responsible for the site's technical aspects, such as performance and capacity, which are measures of a website's speed and how much traffic the site can handle. In addition, web developers may create content for the site. 1.Database Administrators 2.Information Security Analysts 3.Network and Computer Systems Administrators 4.Software Developers 5.Web Developers

__1__These professionals use specialized software to store and organize data, such as financial information and customer shipping records. They make sure that data are available to users and are secure from unauthorized access. __3__These professionals are responsible for the day-to-day operation of these networks. __4__These professionals are the creative minds behind computer programs. Some develop the applications that allow people to do specific tasks on a computer or another device. Others develop the underlying systems that run the devices or control networks. __2__These professionals plan and carry out security measures to protect an organization's computer networks and systems. Their responsibilities are continually expanding as the number of cyberattacks increases. __5__These professionals design and create websites. They are responsible for the look of the site. They are also responsible for the site's technical aspects, such as performance and capacity, which are measures of a website's speed and how much traffic the site can handle. In addition, web developers may create content for the site.

Match the following security risks / protection steps to their definition: ____Unauthorized access ____Information theft ____Encryption ____Two-step verification ____Unauthorized use 1.The use of a computer or network without permission 2.The use of a computer or its data for unapproved or possibly illegal activities 3.Uses two separate methods, one after the next, to verify the identity of a user 4.Occurs when someone steals personal or confidential information 5.A process of converting data that is readable by humans into encoded characters to prevent unauthorized access

__1__Unauthorized access __4__Information theft __5__Encryption __3__Two-step verification __2__Unauthorized use

Match the following careers to their description ____Corporate trainers ____Technology service and repair ____IT Consultant ____Help desk specialist 1.provides preventive maintenance, component installation, and repair services to customers 2.teach employees how to use software and apps, design and develop systems, write programs, integrate and sync data from apps used on multiple devices, and perform other technology-related activities 3.•answers hardware, software, and networking questions in person, over the phone, or electronically via email or a chat room4. typically hired based on expertise, provides technology services to clients

__2__Corporate trainers __1__Technology service and repair __4__IT Consultant __3__Help desk specialist

Put the seven problem solving steps in proper order ____Define goals ____Evaluate the results ____Identify the problem ____Assess alternatives ____Choose the solution ____Brainstorm ____Execute the solution

__2__Define goals __7__Evaluate the results __1__Identify the problem __4__Assess alternatives __5__Choose the solution __3__Brainstorm __6__Execute the solution

Match the following network definitions: ____Local Area Network (LAN) ____Wide Area Network (WAN) ____Personal Area Network (PAN) ____Metropolitan Area Network (MAN) 1.This network connects computers and devices in an individual's workspace with wired and wireless technology 2.This network connects computers and devices in a limited geographical area 3.This network connects multiple networks in a small geographic area 4.This is a network of networks that covers a large geographic area

__2__Local Area Network (LAN) __4__Wide Area Network (WAN) __1__Personal Area Network (PAN) __3__Metropolitan Area Network (MAN)

Match the following Operating System to its description ___MS DOS ___Mac OS X ___Linux ___iOS ___Android ___Windows 1.Popular today due in part to being free and open-source, and with people around the world continuing development. 2.A relatively simple Operating System created by Microsoft. 3.An Operating System with a graphical user interface created by Microsoft. 4.A graphical Operating System developed in the early 2000's, based on the Unix OS. 5.A Unix based graphical Operating System developed by Apple where most user operations involve touch input. 6.A graphical Operating System for smartphones and tablets, based on the Linux OS. Amazon, used this Operating System as a foundation for its Kindle e-Reader, Fire phone, Fire tv and Echo products.

__2__MS DOS __4__Mac OS X __1__Linux __5__iOS __6__Android __3__Windows

Match the following networking careers to their description: ____Network Administrator ____Network Engineer 1.The architect that is responsible for the design, development and deployment of an organization's network and typically requires a bachelor of Computer Science 2.Responsible for the daily operations and maintenance of an existing network and typically an individual can study and self certify to qualify for positions

__2__Network Administrator __1__Network Engineer

Technology has enabled many function specific management systems. Match each of the management systems to their definition: ____Record Management System (RMS) ____Content Management System (CMS) ____Document Management System (DMS) ____Learning Management System (LMS) 1.Consist of the storage and management of company information that can be accessed and modified by users with support for access controls, security, version tracking, and search. 2.Provide evidence of activities within a particular company and often have very strict compliance requirements and are mostly unchanging. 3.A software application for the administration, documentation, tracking, reporting and delivery of educational courses or training programs or learning and development programs. 4.Enables and manages the publishing, modification, organization, and access of various forms of documents and other files. Content can be added through a graphical user interface or web page.

__2__Record Management System (RMS) __4__Content Management System (CMS) __1__Document Management System (DMS) __3__Learning Management System (LMS)

Match Hub and Switch definitions: ____Switch ____Hub 1.Data received is broadcast to every other device on the network, creating security concerns as well as unnecessarily adding traffic to the network 2.Used to receive and send data traffic to specific devices within the network

__2__Switch __1__Hub

Match the following security vulnerabilities and attacks to their definition: ____Backdoor ____Denial of Service (DoS) ____Spoofing ____Botnet 1.A group of compromised computers or mobile devices connected to a network 2.An attack that overwhelms a server with requests, thus disrupting legitimate computer access to an Internet service 3.A program or set of instructions within a program, that the developer created, that allow users to bypass security controls 4.A technique intruders use to make their network or Internet transmission appear legitimate

__3__Backdoor __2__Denial of Service (DoS) __4__Spoofing __1__Botnet

Match the following computer components to its applicable definition: 1.The physical parts of a computer 2.The programs / applications that instruct the computer what to do 3.Runs program instructions and controls other hardware 4.Holds data and applications while your computer is operating 5.Stores data and applications, even when the computer is off

__3__Central Processing Unit (CPU) __1__Hardware __5__Storage __2__Software __4__Memory

Match the following data terms to their definition: ____Database ____Data ____Information ____Server 1. A collection of facts and values 2. Facts and values that have meaning 3. Facts and values organized for easy retrieval 4. Facts and values are commonly stored (kept) here

__3__Database __1__Data __2__Information __4__Server

Match the following enterprise systems to their definition. ____Decision Support System (DSS) ____Transaction Processing System (TPS) ____Management Information System (MIS) ____Expert System 1.An information system that captures and processes data from day-to-day business activities. 2.An Information system that generates accurate, timely, and organized information, so that managers and other users can make decisions, solve problems, supervise activities, and track progress. 3.An information system that helps users analyze information and make decisions. 4.An information system that captures and stores the knowledge of human experiences and then imitates human reasoning and decision making.

__3__Decision Support System (DSS) __1__Transaction Processing System (TPS) __2__Management Information System (MIS) __4__Expert System

Match the following network transmission terms to their definition: ____Latency ____Broadband ____Bandwidth 1.The ability to transmit multiple media signals simultaneously 2.The amount of data that can travel over transmission media 3.A measurement of the time it takes a signal to travel from one location to another on a network

__3__Latency __1__Broadband __2__Bandwidth

Technology has enabled many function specific management systems. Match each of the management systems to their definition: ____Learning Management System (LMS) ____Document Management System (DMS) ____Content Management System (CMS) ____Record Management System (RMS) 1.Consist of the storage and management of company information that can be accessed and modified by users with support for access controls, security, version tracking, and search .2.Provide evidence of activities within a particular company and often have very strict compliance requirements and are mostly unchanging. 3.A software application for the administration, documentation, tracking, reporting and delivery of educational courses or training programs or learning and development programs. 4.Enables and manages the publishing, modification, organization, and access of various forms of documents and other files. Content can be added through a graphical user interface or web page.

__3__Learning Management System (LMS) __1__Document Management System (DMS) __4__Content Management System (CMS) __2__Record Management System (RMS)

Match the basic flowchart shapes we discussed in class to its purpose: ____Parallelogram ____Diamond ____Rectangle ____Oval 1. Process / Processing: Used whenever data is being manipulated, i.e. whenever a non-input output task is performed. 2. Terminal: Used to indicate the start or end of a flowchart single flowline. 3. Input/Output: Used whenever information is entered into the flowchart or displayed from the flowchart. 4. Conditional Branch (Decision): Used to represent operations in which there are two (binary) possible alternatives, e.g. yes/no, true/false.

__3__Parallelogram __4__Diamond __1__Rectangle __2__Oval

Match the following computing job descriptions to their title (1/2): ____These professionals write and test code that allows computer applications and software programs to function properly. They turn the program designs created by software developers and engineers into instructions that a computer can follow. ____These professionals design and build data communication networks, including local area networks (LANs), wide area networks (WANs), and Intranets. These networks range from small connections between two offices to next-generation networking capabilities such as a cloud infrastructure that serves multiple customers. ____These professionals, sometimes called systems architects, study an organization's current computer systems and procedures and design solutions to help the organization operate more efficiently and effectively. They bring business and information technology (IT) together by understanding the needs and limitations of both. ____These professionals invent and design new approaches to computing technology and find innovative uses for existing technology. They study and solve complex problems in computing for business, medicine, science, and other fields. ____These professionals provide help and advice to computer users and organizations. These specialists either support computer networks or they provide technical assistance directly to computer users. 1.Computer and Information Research Scientists 2.Computer Network Architects 3.Computer Programmers 4.Computer Support Specialists 5.Computer Systems Analysts

__3__These professionals write and test code that allows computer applications and software programs to function properly. They turn the program designs created by software developers and engineers into instructions that a computer can follow. __2__These professionals design and build data communication networks, including local area networks (LANs), wide area networks (WANs), and Intranets. These networks range from small connections between two offices to next-generation networking capabilities such as a cloud infrastructure that serves multiple customers. __5__These professionals, sometimes called systems architects, study an organization's current computer systems and procedures and design solutions to help the organization operate more efficiently and effectively. They bring business and information technology (IT) together by understanding the needs and limitations of both. __1__These professionals invent and design new approaches to computing technology and find innovative uses for existing technology. They study and solve complex problems in computing for business, medicine, science, and other fields. __4__These professionals provide help and advice to computer users and organizations. These specialists either support computer networks or they provide technical assistance directly to computer users.

Match the following cloud computing terms with their definition: ____Backup ____Cloud Storage ____Software as a Service (SaaS) ____Cloud Computing 1.A form of computing that provides users with processing resources, data, and storage on the Internet, available from any device with Internet access, in contrast to local processing and storage. 2.A type of business model where users pay for a vendor's apps, which process and store data on the cloud. 3.When files are hosted on remotely-located servers and those files are managed by apps via the web. 4.A copy of a file kept in case the local version is accidentally damaged or lost.

__4__Backup __3__Cloud Storage __2__Software as a Service (SaaS) __1__Cloud Computing

Match the following security risks to the proper definition: ____Spyware ____Unauthorized use ____Social Engineering ____Unauthorized access ____Phishing 1.The use of a computer or network without permission 2.The use of a computer or its data for unapproved or possibly illegal activities 3.An official looking email message that attempts to obtain your personal and/or financial information 4.A program that secretly collects information about the user and then sends the information to some outside source while the user is online 5.Gaining the unauthorized access or obtaining confidential information by taking advantage of trusting human nature and naivety

__4__Spyware __2__Unauthorized use __5__Social Engineering __1__Unauthorized access __3__Phishing

Match the following Uniform Resource Locator (URL) elements of this website - http://www.nps.gov/history/places.html - to the proper term ____Webpage Name ____Domain Name ____Host Name ____Path ____Protocol 1.http:// 2.www. 3.nps.gov 4./history 5./places.html

__5__Webpage Name __3__Domain Name __2__Host Name __4__Path __1__Protocol

Match the following job titles to their respective description: ____Web Developers ____Computer Programmers ____Computer Support Specialist ____Computer Systems Analysts ____Software Developer ____Information Security Analysts 1.Likely requires both a strong knowledge of computer technology, and excellent interpersonal skills due to dealing with non-technical users. 2.Create, design, and program software. 3.Help write programs created by software developers. 4.Help organizations use computing technology to operate effectively. Requires strong combination of business and computing technology knowledge. 5.Focus on protecting an organization's computers and data. Increasingly important as "hackers" continue to steal huge amounts of data, as widely-publicized in recent years. 6.Build websites, which may involve the look/feel, the content, the performance of the site, and more.

__6__Web Developers __3__Computer Programmers __1__Computer Support Specialist __4__Computer Systems Analysts __2__Software Developer __5__Information Security Analysts

Match the following network standards and protocols: ____RFID ____Ethernet ____IrDA (IR) / Infrared ____Near Field Communication (NFC) ____Wi-Fi ____Bluetooth ____LTE ____TCP/IP 1. A network standard that specifies no central computer or device on the network (nodes) should control when data can be transmitted2.A network protocol that defines how messages (data) are routed from one end of a network to another3.Identifies any network based on the 802.11 standard that specifies how two wireless devices communicate over the air with each other4. Defines how high-speed cellular transmissions use broadcast radio to transmit data for mobile communications 5. Defines how two devices use short-range radio waves to pair up and transmit data 6. Transmits data via wireless light waves, but must have an unobstructed line of sight path between the sender and receiver to work 7. Defines how a network uses radio signals to communicate and track items with a tag placed in or attached to an object, an animal, or a person 8. A protocol, based on RFID, that defines how a network uses close-range radio signals to communicate between two devices or objects, e.g. to conduct a mobile pay transaction or to share contact information between two devices simply by having the sending and receiving devices in close proximity

__7__RFID __1__Ethernet __6__IrDA (IR) / Infrared __8__Near Field Communication (NFC) __3__Wi-Fi __5__Bluetooth __4__LTE __2__TCP/IP

The primary objectives of malware include: Question options: damaging data selling products spying all of the above

all of the above

A _____ is a large group of infected computers, controlled without the user's knowledge, to perform tasks such as sending spam. Question options: zombot botfarm botnet spamfarm

botnet

A _____ consists of instructions that a CPU executes (or runs), like multiplying numbers or printing a number to a screen. Storage drive Computer program Memory module Device driver

computer program

A USB flash drive is typically built into modern desktop and laptop computers. true false

false

A USB flash drive typically has an electric cord that plugs into the wall, for electricity while storing data. true false

false

A backup service automatically deletes a user's files from local storage and moves the files to cloud storage, thereby freeing up the user's local storage capacity. Question options:TrueFalse

false

A computer's memory (RAM) executes a program's instructions true false

false

A computer's memory (RAM) stores data even after electricity is turned off. true false

false

A computer's storage (HDD or SSD) holds data temporarily; when electricity is turned off, all data is lost. true false

false

A file is a group of folders that helps you organize items, similar to using a file cabinet. true false

false

A graphics processor means that a general CPU is running special software for fast graphics display. true false

false

A server typically tells each user to wait until the server is ready for that user. Question options:TrueFalse

false

Accessing files from other devices is not a key benefit of cloud storage today, but will be possible with 5G networks in near future. Question options:TrueFalse

false

After initially giving a trial version of a new photography software to a few users, the company gets feedback that most of the users cannot figure out how to use the zoom function. This indicates that they are utilizing the waterfall method. true false

false

An IP address is a text-based name that corresponds to the numeric domain name Question options:TrueFalse

false

An Operating System is a sequence of instructions that solves a problem. true false

false

An Operating System that supports multiple users with individual accounts enables each user to see and use the other user's applications and files. true false

false

Anytime you compress (zip) a file, no matter what compression method you use, you lose some of the original data and the decompressed (unzipped) file will never be identical to the original. Fortunately this is often unnoticeable to humans. true false

false

As a computer gets used new files, folders, and apps begin to fill the computer's storage drive. However that is not an issue as modern storage drives have unlimited capacity so they don't fill up completely. true false

false

Backup files are not important with modern computers, because files or portable USB drives are rarely (if ever) lost. Question options:TrueFalse

false

Cloud applications access and process files on a local computer. Question options:TrueFalse

false

Cloud storage requires removing a file from local storage. Question options:TrueFalse

false

Common operating systems include iOS and Android for desktop computers, and Windows, Mac OS X, and Linux for tablets and smartphones. true false

false

Compression has the drawback of increasing the time to download a file via the web. true false

false

Computer designers can set a computer's clock tick rate to as fast as they want. true false

false

Computer support specialists learn a lot about a particular programs's features and interfaces that are confusing to users, however they are unable to share those findings with software developers to make any improvements. Question options:TrueFalse

false

Computing and technology jobs are all about writing software. Question options:TrueFalse

false

Data integrity ensures data is correctly entered as the data is added to the database. Periodic updates to the database ensure data is up-to-date. Question options:TrueFalse

false

Despite advances in computer technology, today's Operating Systems still cannot provide any monitoring to help determine which applications are using the most CPU or memory capacity. true false

false

Fixing an Operating System security hole requires deleting one's old OS and installing a new copy of the updated OS. Question options:TrueFalse

false

Fortunately, computer scientists have developed encryption techniques that can 100% guarantee data security and user privacy. Unfortunately, few use these guaranteed encryption tools and hacks still happen. Question options:TrueFalse

false

Fortunately, the only information available about you that can be found online is what you intentionally post. Question options:TrueFalse

false

If a CPU's program is like a chef's recipe, then a cache is like a cookbook of recipes. true false

false

If a file is accidentally deleted, then the file is permanently lost. Question options:TrueFalse

false

In the System Development Life Cycle, the Design (D) phase comes before the Analysis (A) phase. true false

false

In the past, the Operating System had to run a little bit of each application at a time, switching thousands of times per second, but modern multitasking Operating Systems can do all these tasks simultaneously. true false

false

It is OK to have spaces between words when naming your variables as long as every subsequent word is capitalized. Question options:TrueFalse

false

Malware is a type of virus. Question options:TrueFalse

false

Minimizing unused apps can improve the performance of a currently running app by giving that app more memory to work with. true false

false

Modern Operating Systems convert a high-level languages like C++, Java, Python, etc. to assembly/machine language (0's and 1's). true false

false

Modern Operating Systems have a single Universal Device Driver (UDD) that allows them to interface with all available hardware devices. true false

false

Modern multitasking Operating Systems will stop running applications in the background that you have open but are not currently using. It does this to free up the CPU, reduce memory utilization, and to prevent the application you're currently using from running slowly. true false

false

Moore's Law can continue forever. true false

false

Moving a file to the trash deletes the file from the drive. true false

false

Netflix is an example of a platform as a service (PaaS). Question options:TrueFalse

false

Once you assign a value to a variable it cannot change. Question options:TrueFalse

false

Online communication between two users is considered private and thus requires a warrant to be accessed by authorities. Question options:TrueFalse

false

Organizations that migrate their data to the cloud must first download large software programs to support the requisite connections and ongoing data transfer requirements. Question options:TrueFalse

false

Paid apps don't sell user information; only free apps collect and sell user information. Question options:TrueFalse

false

Putting multiple CPUs on a single chip has been done since the 1970s. true false

false

The advantage to organizations that keep their data and applications in-house (on site) is that their software is always up to date with the most recent release. Whereas applications running on the cloud are usually one update behind the most recent releases to ensure that there are no deployment issues. Question options:TrueFalse

false

The benefit of DSL internet vs cable internet is that DSL is much faster. The downside of DSL internet is that you share the line with your neighbors. Thus if the households around you are all downloading movies or streaming videos/music/games at the same time, your speed will slow down. Question options:TrueFalse

false

The benefit of cable internet is that you have a dedicated line to your house. The downside is that speeds become slower the farther your house is away from your Internet Service Provider (ISP). Question options:TrueFalse

false

The downside of telecommuting, where an employee works outside of the traditional office space, is that it requires employees to have a dedicated telephone line. Question options:TrueFalse

false

The hashtag, #, is used in Python to signify a comment for the compiler to read so it knows how to process the subsequent code into machine language for the CPU to execute. Question options:TrueFalse

false

The longer that an app has been running, the more stable and reliable the app becomes. Question options:TrueFalse

false

The spiral method allow phases to be performed simultaneously. For example, implementation can begin while a system is being designed. true false

false

The waterfall method allows phases to be performed simultaneously. For example, implementation can begin while a system is being designed. true false

false

The waterfall method is Planning, Analyzing, Designing, Implementing, and Supporting your new system in a series of iterations over time, improving incrementally based on user involvement and feedback. true false

false

To ensure that you remain anonymous while using the internet you can use "Incognito" mode on a web browser and your data will remain private. Question options:TrueFalse

false

To protect your data in case of computer theft, a user should copy files from one folder to another folder on the computer's internal storage drive. Question options:TrueFalse

false

Today, with the modern Operating Systems installed on new desktop and laptop computers, backing up files is a waste of time. true false

false

Users can access cloud computing services without connecting to the Internet. Question options:TrueFalse

false

Validation refers to the accuracy of the data in the database. Question options:TrueFalse

false

While most operating systems provide a way for you to move, delete, or create new items, you must use a separate search application (not included with the operating system) to find specific items on your storage drive whose name or contents match certain words. true false

false

With the spiral method, a mobile application is deployed to users after a single round of testing. true false

false

Pseudocode graphically depicts the steps that take place in a program using the diamond, rectangle, parallelogram, and oval symbols we discussed in class. Question options:TrueFalse

fasle

A(n) _____ is a programming language having higher level of abstraction, thus instructions are easier for programmers to use than assembly language, enabling greater programmer productivity. ASCII language high-level language compiler language Unicode language

high-level language

_____ is a graphical operating system developed by Apple in 2007 for smartphones and tablets. Android Windows iOS Unix

iOS

_______ is a graphical Operating System developed by Apple in 2007 for Apple smartphones and tablets. A key feature is that most user operations involve touching the screen, using multiple fingers and gestures (like swiping or pinching), rather than typing or using a mouse. Mac OS X Android Windows Linux iOS

iOS

What syntax below would be part of a conditional branch Question options: yes/no do/skip if/else true/false

if/else

Some companies prefer _______ because the companies have more control over employees and the quality of the company products. Question options: outsourcing telecommuting employees a remote workforce in-house workers

in-house workers

A USB flash drive ________. is non-volatile loses data when the power goes off. is read only is volatile

is non-volatile

A touchscreen typically eliminates the need for a physical ______. USB hard drive keyboard mouse

keyboard

A computer's RAM _____ data when the power is turned off. encrypts loses stores copies

loses

Computer instructions written using only 1's and 0's is know as _____ language. high-level mid-level assembly machine

machine

A communication _____, defines the rules for transferring information among computers. Question options: protocol path packet paradigm

protocol

The Jacquard Loom and the Analytical Engine both used _____ to input specific patterns or programs. random access memory (RAM) reel-to-reel magnetic tape binary transistors punched cards

punched cards

If your internal storage drive is full, or nearly full, a user might start by deleting unneeded _____ files. text word document songs, movies and photos none of the above

songs, movies and photos

Around the start of the 20th century, computer hardware originated from ______. television screens and parts telegraph equipment telephone switches radio parts

telephone switches

A single computer chip in a modern smartphone may have _____ of CPUs operating concurrently. billions tens thousands millions

tens

In-house refers to company labor being performed by _____ Question options: contractors / consultants the same company's employees a different company's employees employees that work from home (telecommuters)

the same company's employees

"pseudo" means fake, so pseudocode is fake code. Question options:TrueFalse

true

A CPU only understands 0's and 1's, known as machine language. true false

true

A certification demonstrates your knowledge in a specific area to employers or potential employers Question options:TrueFalse

true

A company may require an applicant to have various certifications to ensure the applicant possesses the skills needed for a particular job. Question options:TrueFalse

true

A compromised device is known as a zombie. Question options:TrueFalse

true

A computer and information systems manager is typically responsible for higher-level tasks such as defining and designing technology solutions to meet an organization's goals. Question options:TrueFalse

true

A computer consists of four primary functions; input, store, process, output true false

true

A computer program consists of instructions that the Central Processing Unit (CPU) executes (or runs). true false

true

A computer systems analyst is often tasked with developing computing solutions to help an organization run more efficiently, such as improving the speed and usability of an inventory system. Question options:TrueFalse

true

A computer's speed improves by shrinking the size of circuits. This allows engineers to build more complex CPUs that can perform more computations per clock tick, add more cache on a chip, and even permit multiple CPUs to fit on a single chip. true false

true

A control unit tells computer components, such as memory, the ALU, and input and output devices, how to respond to computer instructions. true false

true

A file is a collection of information stored somewhere on a drive, such as a song, a movie, your English paper, or another application. true false

true

A file that is useful across different applications, computers, or operating systems is said to be portable. true false

true

A file's extension name informs users and applications of that file's type. Thus, different file types typically have a different abbreviation after the file name. true false

true

A for loop repeats the loop's subsequent instructions a specified number of times. Question options:TrueFalse

true

A function is a dedicated block of code that can be called by referring to the function's name. Question options:TrueFalse

true

A growing number of colleges and employers are using social-media to research applicants. Question options:TrueFalse

true

A key benefit from Moore's Law is that over time, the same-size chip produces higher clock frequency speeds. This is possible because smaller transistors can change between 0 and 1 faster, and because smaller transistors allow circuits to be closer together so an Integrated Circuit's clock signal travels less distance. true false

true

A nearly-full storage drive may cause your programs and applications (apps) to run slowly, as the apps and Operating System struggle to find drive space. true false

true

A network is a collection of computers and devices connected together via communications devices and transmission media. Question options:TrueFalse

true

A pixel may be 3 numbers (each a byte) indicating the amount of red, green, and blue. true false

true

A smartphone will not make a call. The user predicts an app bug, and thus restarts the smartphone to test the prediction. Calls now work. The user can reasonably assume the test confirmed the prediction. Question options:TrueFalse

true

A storage device that stores data after electricity is turned off is said to be non-volatile. true false

true

A variable is a named location within RAM Question options:TrueFalse

true

A virus is attached to an email, an office document, etc. A worm spreads without such attachment, spreading from computer to computer without requiring user action. Question options:TrueFalse

true

A while loop will execute a block of code over and over again forever as long as the evaluated condition remains true. Question options:TrueFalse

true

Access controls define who can access a computer, device, or network; when they can access it; and what actions they can take while accessing it. Question options:TrueFalse

true

Accessing data from your hard drive is slower than accessing data from memory. true false

true

An Information System creates, stores, organizes, and distributes information. true false

true

An Information System developer using the spiral method may use multiple iterations of the design cycle phases to build the same computer system. true false

true

An Information System developer using the spiral method may use multiple iterations to incrementally build and test a system. true false

true

An Operating System provides a mechanism for a user to create and maintain files. true false

true

An algorithm is a sequence of instructions that solves a problem. Question options:TrueFalse

true

An application (or app) is a program that performs a task like listening to music, send an email, write a paper or surf the web. true false

true

An arithmetic logic unit (ALU) is a fundamental part of a computer processor (CPU) that can also perform bitwise logic operations like AND, OR, XOR. true false

true

An example of a cloud computing development platform is Amazon Web Services (AWS) which offers a suite of online services including storage, databases, and analytics. Question options:TrueFalse

true

An infographic is a visual representation of data and information, designed to communicate quickly, simplify complex concepts, or present patterns or trends true false

true

An operating system can provide a way for you to see what folders/files/apps are on your HDD/SDD. Question options:TrueFalse

true

An operating system can provide a way for you to see what folders/files/apps are on your HDD/SDD. true false

true

At a time when women were not often encouraged to pursue careers in mathematics, Ada Lovelace worked with Charles Babbage and subsequently documented an algorithm that would be considered the first computer program. true false

true

By reducing a file's size, compression enables more files to be stored on a drive. true false

true

COBOL is an English-based programming language designed for business use. true false

true

Certifications typically focus on a specific topic such as security, software, or networking. Within a specific topic, dozens of certification variations may also exist to verify skill sets for a particular set of job-related tasks. Question options:TrueFalse

true

Cloud applications can be accessed by various user devices and from various locations. Question options:TrueFalse

true

Cloud applications process and deliver data located on remote servers that are accessible via the Internet. Question options:TrueFalse

true

Cloud computing is Internet-based, therefore services can only be access when connected to the Internet. Question options:TrueFalse

true

Cloud storage is often used to keep a copy of a local file in case the local file is damaged/lost. Question options:TrueFalse

true

Computer Science (CS) degrees focus on the underlying theory and developing of computing systems. Question options:TrueFalse

true

Computer programmers may write code in multiple computer languages on a daily basis. Question options:TrueFalse

true

Computer security impacts anyone who uses a computer, from individuals to large corporations. Question options:TrueFalse

true

Computer security is an increasingly important part of a company's normal operations. Question options:TrueFalse

true

Computer speed improves because shrinking circuit size means engineers can 1) build more complex CPUs that do more computations per clock tick, 2) can add more cache on each chip, and 3) can even put multiple CPUs on one chip. true false

true

Computer systems analysts also help organizations operate more efficiently. Question options:TrueFalse

true

Computers are built from connected switches that, like light switches, are either on or off. true false

true

Computers are built from transistor circuits that appear on a fingernail-sized device known as an Integrated Circuit (IC for short). An IC is also called a chip, due to being sliced from a larger chunk of silicon, like a potato chip is sliced from a potato. true false

true

Computers with older Wi-Fi versions will typically work with a newer-version router, but may not obtain the new-version's higher potential speed. Question options:TrueFalse

true

Copying items from memory to cache is slow, so a larger cache means less-frequent copying and the faster a program may run. true false

true

Data mining techniques can identify information likely linked to a particular user. Companies can then aggregate and sell user information, including private data and user lifestyle. Question options:TrueFalse

true

Data transmitted from unencrypted Wi-Fi networks can be collected by anyone within the network's proximity. Question options:TrueFalse

true

Data within a database can be processed to produce information just as mining Big Data can produce knowledge. Question options:TrueFalse

true

Every Internet connection automatically transmits the sender's IP address along with whatever information the user sends. Transactions such as visiting a webpage or watching a video transmits information about a user. Question options:TrueFalse

true

Every time the computer's clock ticks, millions of switches consume electricity to execute an instruction, generating heat. Thus, a fast computer chip might be 200 degrees Fahrenheit and hot enough to cook an egg on. true false

true

For many non-computing jobs (dentist, attorney, nurse, business, etc.), computer usage is high, and thus knowledge of computing technology can yield strong advantages even for people not in a computing career. Question options:TrueFalse

true

For the common case of a user accidentally deleting a needed file, many operating systems don't really delete the file from the drive, but rather move the file to a special folder called "Trash" or "Recycle Bin". Question options:TrueFalse

true

Gantt/Pert charts are popular project management tools. true false

true

Hardware is the term for the physical parts of a computer. true false

true

Hidden data, such as a user's IP address, can be used to uniquely identify a user. Question options:TrueFalse

true

Human behavior is the single most important threat to online and data security. Question options:TrueFalse

true

If a CPU's clock ticks 1 billion times per second, then the CPU may run 1 billion instructions per second. true false

true

If a CPU's data is like a person's phone book, then a cache is like the person writing a phone number on his hand. true false

true

If a company is tasked with developing a new satellite to monitor weather patterns and must have a complete budget for the design before building the satellite they would employ the waterfall method. true false

true

If a company makes three prototypes for a new Bluetooth speaker, that would be an indication that they were utilizing the spiral method. true false

true

If a computer has too many switching transistors it can generate enough heat to damage an Integrated Circuit. Thus, engineers have not continued to increase clock frequencies much beyond 3 GHz. true false

true

If a user commonly doesn't quit previous apps before running another app. A multitasking OS may continue to run those previous apps, which occupy valuable CPU time and memory, causing the user's current app to run slowly. Thus, a good OS user takes time to occasionally quit unused apps. true false

true

In recent years, operating systems have become much simpler and intuitive to use (in the past, a user had to know about OS commands, OS folders, device drivers, and more). true false

true

In terms of relative speed, accessing data from a drive is slow, accessing data from memory is faster, and accessing data from a cache is fastest. true false

true

Information Security (IS) degrees focus on how to manage information, including the development of processes and technology solutions. Question options:TrueFalse

true

Information Technology (IT) degrees focus on using and servicing the technologies used in the day-to-day practices of an organization. Question options:TrueFalse

true

Information about a user comes from many sources including information posted by others or hidden data attached to posts. Question options:TrueFalse

true

Information security analysts learn the weaknesses of computers in order to protect the computers and data. Question options:TrueFalse

true

Information that seems to have been deleted, like Snapchat photos, may still be retrieved by users with the right technical skills. Question options:TrueFalse

true

Lossy compression may be OK for data like images or audio where humans barely notice a quality difference, but is clearly not OK for precise data like text or bank account numbers since the meaning would change. true false

true

Many cloud applications have moved to a subscription based model in which the user pays a monthly fee. Question options:TrueFalse

true

Many computers have a fan that blows room air over a computer's CPU chip to keep the chip cool. true false

true

Memory leaks are especially noticeable in web browsers, which tend to be left running without quitting for long periods. Thus, a user may find that quitting and restarting an app results in less memory usage and thus faster-running apps. Question options:TrueFalse

true

Minimized apps still consume memory. true false

true

Most operating systems provide some way for a user see what folder/file/app items exist on a drive, as well as to move, delete, or create new items, or to find items whose name or contents match certain words. true false

true

One of the many roles that an Operating System performs is to manage your files and folders while it keeps track of where those items are stored on a drive. true false

true

Rapid technology advancements in mobile and cloud computing are requiring information system developers to become more innovative in how to integrate business and upcoming technologies. true false

true

Regarding viruses, some quietly seek to steal credit card numbers or similar high-value information while others do illicit tasks, like send mass emails or take part in attacks, on behalf of some person or organization. Question options:TrueFalse

true

Running multiple applications simultaneously is known as multitasking. true false

true

Sharing a photo online may provide additional hidden information such as date and location. Question options:TrueFalse

true

Shrinking circuits enables more complex CPUs to do more computation per clock tick, with more CPUs and cache fitting on a chip, all which improve a computer's speed. true false

true

Signing out regularly, changing passwords frequently, never writing a password (in a file, email, or paper), using different passwords for different sites, and using hard-to-guess passwords can improve account security. Question options:TrueFalse

true

Social engineering is gaining the unauthorized access or obtaining confidential information by taking advantage of trusting human nature and naivety. Question options:TrueFalse

true

Software developers commonly work closely with team members, making joint decisions, helping each other, testing each others' software, etc. Question options:TrueFalse

true

Software developers work closely with customers, sales teams, other engineers, etc. Question options:TrueFalse

true

Software is the term for the programs that instruct the computer what to do. true false

true

Some operating systems provide a monitoring app, like Windows' Task Manager, to help determine which apps are using the most CPU or memory. true false

true

The CPU manages most of the computer's activities, e.g. getting user input data into memory, doing calculations on data, and displaying data from memory onto the screen. true false

true

The Internet is the interconnection of computers communicating using a set of rules (protocols), and the Web is just one particular use of the Internet. Question options:TrueFalse

true

The SDLC spiral method utilizes the steps of the waterfall method but iterates those steps multiple times in short cycles that takes advantage of user feedback. true false

true

The advantage of cloud computing is that it provides users with processing resources, data, and storage on the Internet, available from any device with Internet access, in contrast to local processing and storage. Question options:TrueFalse

true

The arithmetic logic unit (ALU) performs arithmetic (+, -, *, /) and logic (AND, OR, XOR, NOT) operations on binary integers. true false

true

The difference between a worm and a virus is that a worm doesn't use a host file. Question options:TrueFalse

true

The files used by cloud applications are often stored on remote servers, making the files accessible to users from multiple devices. Question options:TrueFalse

true

The number of embedded computers are greater than the number of desktops and laptop computers. true false

true

The operating system is software that acts as the central point between the user, the hardware and applications. true false

true

The purpose of using pseudocode is that it is easier for people to understand than conventional programming language code. Question options:TrueFalse

true

The reason restating your computer commonly works to fix issues is that bugs exist in nearly all computer software, including applications and operating systems. The longer that software runs, the more likely that a bug will be encountered that causes the software to run poorly, to use up excess memory, etc. The restart properly closes all the open programs and starts them anew. Question options:TrueFalse

true

There are several kinds of databases. Question options:TrueFalse

true

To a user, multiple applications like a music player and a web browser appear to be running simultaneously, but in fact the Operating System is running a little bit of each application at a time, switching thousands of times per second. true false

true

Today, computers exist invisibly in nearly anything electrical. true false

true

Two-step verification helps secure a user's account by requiring the user during sign in to enter a temporary code appearing on the user's mobile phone. Question options:TrueFalse

true

Unlike viruses and worms, trojan software does not spread itself. Rather, a user intentionally installs the software, believing the software to be safe to use. Question options:TrueFalse

true

Users should assume that companies, institutions, and governments are saving and exchanging information about users both openly and covertly. Question options:TrueFalse

true

When the CPU is instructed to run a program, the CPU first copies the program and other needed data from storage and into memory, and then runs the program from memory. true false

true

When using early versions of Operating Systems, users would have to manually type in text-based commands. true false

true

As a result of telecommuting, employees have more schedule flexibility which can lead to a better _____. Question options: performance review promotion opportunity work / life balance productivity score

work / life balance

A _____ file is a common file format for combining multiple files into one file and that usually involves compression. zcf zip zif zap

zip

In what decades did Tim Berners-Lee develop and release HTTP, thus creating the start of the world wide web we know today? Question options: 1960's & 1970's 1970's & 1980's 1980's & 1990's 1990's & 2000's

1980's & 1990's

If a particular computer runs at 3 GHz and if 1 Hz means one clock tick per second, then 3 GHz means that this particular computer's clock ticks: 1 billion times per second 3 billion times per second 30 million times per second 300 thousand times per second

3 billion times per second

The binary number 01000000 represents what decimal number? 48 100 32 64

64

A byte is how many bits? 16 4 64 8 32

8

The HTML page contains two primary sections within the <html> </html> tags. One section talks to the browser and the other contains the content for the user to see. What are they? <head> </head> <body> </body> <section> <section> <aside> </aside>

<head> </head> <body> </body>

The assignment operator is _____ Question options: = += % ==

=

Which most closely resembles a computer program? Question options: A book that organizes addresses and phone numbers A list of words and definitions A tree diagram A cooking recipe

A cooking recipe

_____ is used to encrypt plain text into cipher text. Question options: HTTPS A cryptographic key SSL Cipher XL

A cryptographic key

Which best describes modern software programming? A computer writes machine instructions, which are translated to a high-level program. A computer writes a high-level program, which is translated to machine instructions. A human writes machine instructions, which are translated to a high-level program. A human writes a high-level program, which is translated to machine instructions.

A human writes a high-level program, which is translated to machine instructions.

Each machine instruction consists of 0's and 1's. The 0's and 1's come from the operation of a transistor, whose functionality is similar to _______. A light switch, which may conduct electricity (1) or not conduct electricity (0) A plant, which may be poisonous (1) or non-poisonous (0) A person, who may be talking (1) or silent (0) A car, which can be travelling fast (1) or slow (0)

A light switch, which may conduct electricity (1) or not conduct electricity (0)

_____ on a web page is text that can be clicked to jump to another web page. machine language A link or hyperlink Unicode CSS

A link or hyperlink

The Analytical Engine included a(n) _____ to perform arithmetic operations. Cache ALU RAM CPU

ALU

The standard character code that represents only English characters (not characters from other languages) using 7 or 8 bits is called ______. Unicode ANSI binary ASCII

ASCII

What is considered to be the first computer programs, the detailed steps to compute the Bernoulli numbers, was written by ________. Herman Hollerith Joseph Marie Jacquard Charles Babbage Alan Turing Grace Hopper Ada Lovelace

Ada Lovelace

Who is considered the first computer programmer. Ada Lovelace Bill Gates Joseph Marie Jacquard Gordon Moore

Ada Lovelace

The _____ introduced a framework to transfer of information between educational and government organizations working together on joint projects, laying the foundation for the Internet. Question options: Manhattan Project European Organization for Nuclear Research (CERN) International Science Foundation (ISF) Advanced Research Projects Agency Network (ARPANET)

Advanced Research Projects Agency Network (ARPANET)

How many SDLC iterations are used in the spiral method? 2 4 6 As many as needed

As many as needed

_____ is a textual human-understandable representation of a machine language's 0's and 1's but not as easy to read as high-level languages. HTTP Unicode Assembly language ASCII

Assembly language

Why was assembly language created? Assembly language replaced both ASCII and Unicode Dual core CPUs were invented with one core dedicated to processing human readable input instructions. CPUs began using text and no longer required the 1's and 0's of machine language Assembly language is human readable versus inputting 1's and 0's

Assembly language is human readable versus inputting 1's and 0's

The term "bit" is short for ______. Binary Interface Technology Bitmap Bitly Binary digit Binary Interaction Technology

Binary digit

What is the smallest unit of measurement in a computer? RAM Bit Byte GHz Tic

Bit

The following is an example of which data type: true Question options: If/Else Positive Boolean Binary

Boolean

An acronym for common database operations is ______. Question options: DIRT IMDB CRUD SQL

CRUD

______ is a language that can be used to style a web page via changes in colors, sizes, spacing, fonts, and more. CSS HTML machine language HTTP

CSS

A filename _____, such as .pdf or .xlsx or .doc, indicates what type of data a file contains. Prefix Appendix Type ID Extension

Extension

The term _____, allow users to create and organize files, thereby keeping track of file locations on a hard drive or other storage device. Folder management File management Folder administration File administration

File management

Different file types typically have a different abbreviation after the filename's period, known as a(n) _______. Application typesetter Document format Executable Filename extension

Filename extension

_____ invented the first programming language compiler, which converted mathematical notation using English words to machine code. Grace Hopper Herman Hollerith Joseph Marie Jacquard Alan Turing Ada Lovelace Charles Babbage

Grace Hopper

What is NOT one of the Operating System's duties? Multitasking File Management Hardware Interfacing Graphic Processing

Graphic Processing

_____ refers to work performed within an company rather than work performed by an external source. Question options: In-house Remote workforce Telecommuting Outsourcing

In-house

The following is an example of which data type: 1600 Question options: Float Integer Whole Number

Integer

In the early 19th century, _____ simplified textile manufacturing with a machine and program that could produce patterns via punch cards. Grace Hopper Charles Babbage Herman Hollerith Ada Lovelace Joseph Marie Jacquard Alan Turing

Joseph Marie Jacquard

_______ is a programming language that runs in a browser, enabling web pages that support actions like responding to a button click. Question options: HTML/CSS Python HTTP JavaScript

JavaScript

What words can you NOT use to name variables? Question options: Pseudo code words Key/reserved words Algebraic variable names, e.g. x or y Primary words

Key/reserved words

______ is where your operating system and applications reside when you're using them. CPU Memory SSD Storage

Memory

A DBMS is an app that creates, maintains, and accesses database systems. Popular DBMS' include: Question options: Microsoft Access IMDB Oracle Database Google Cloudbase MySQL

Microsoft Access Oracle Database MySQL

When restoring power to network devices, which ordering is recommended? Question options: ISP, Modem, Router PC, Modem, ISP PC, Router, Modem Modem, Router, PC

Modem, Router, PC

The ability for an operating system to run more than one application at the same time is know as _______. Multi-threading App-balancing Multi-tasking Program rotation

Multi-tasking

The algorithm to compute the Bernoulli numbers and said to be the first computer program was titled _____. Note G Note A Note F Note B

Note G

A(n) ______ is a special program with various duties, such as interfacing with hardware (providing a more abstract view to applications), managing files and folders, and running multiple applications seemingly simultaneously (multitasking) for one or more users. Application Manager Operating System Interface Manager Graphics Processor

Operating System

One of the roles of a(n) _____ is to manage files and folders, keeping track of such items' locations on a drive, making such items visible to a user, and allowing a user to open files or run apps. Operating System Task Manager Sub-directory Viewer Memory Management System

Operating System

_____ is a common business term referring to company A using company B to do work that might otherwise have been done by the company A's employees. Question options: Telecommuting Remote workforce In-house Outsourcing

Outsourcing

Email is a type of ____ that a user runs to carry out a particular task, such as sending or receiving messages. Operating system Program / application (or app) File Device driver

Program / application (or app)

A _____ searches the database for entries matching user defined criteria. Question options: Request Query DBMS SQL

Query

Accessing _____ is faster than accessing a storage device. SSD USB RAM HDD

RAM

When a program executes, large blocks of data are typically first copied from a storage drive to smaller and faster _____, where the CPU then accesses the data. CSS GPU RAM USB

RAM

100 MHz is _______ than 2 GHz. Faster Shorter Longer Slower

Slower

Between 2010 and 2015, the computers manufactured and shipped in the highest quantity were _______. Tablets Desktops Smartphones Laptops

Smartphones

An Operating System is a _____ that carries out detailed interactions with hardware on behalf of applications. Hypertext language USB manager Protocol Software program

Software program

What type of drive uses no moving parts and is faster than most common types of storage devices? Hard Disk Solid State Cache Floppy

Solid State

Developers can use the ____ method where each phase of the SDLC sequence is repeated one or more times. Waterfall Spiral PADIS Incremental

Spiral

The following is an example of which data type: "246" Question options: Value Integer String Number

String

The following is an example of which data type: "Please enter your password" Question options: Request Assignment Input String

String

The acronym SQL is _____. Question options: Select Query Language Standard Query Language Simple Query Language Structured Query Language

Structured Query Language

A _____ is used for computationally intensive jobs often involving big data and can execute trillions of instructions per second on large data sets. Universal Automatic Computer (UNIVAC) Mainframe Server Supercomputer

Supercomputer

Which computer is fastest? Smartphone Server Laptop Supercomputer

Supercomputer

The set of activities that are grouped into phases and used to build an information system is called the _____. System Development Life Cycle Product Deployment Launch Cycle GANTT/PERT Process Prototyping Process

System Development Life Cycle

Which protocol defines how data is to be sent over the internet is first broken down into packets and then keeps track of what packets are delivered and what need to be resent? Question options: FTP HTTP IP TCP

TCP

For computers to transmit and receive files using the world wide web, it requires three things: Question options: Text files, known as Hypertext Markup Language (HTML) files, containing links to other text files. A set of rules, known as the Hypertext Transfer Protocol (HTTP), for transferring HTML files among computers. A program, known as a browser, like Chrome or Firefox, for viewing HTML files. A device driver that enables the Operating System to communicate with the world wide web's router and switch hardware.

Text files, known as Hypertext Markup Language (HTML) files, containing links to other text files. A set of rules, known as the Hypertext Transfer Protocol (HTTP), for transferring HTML files among computers. A program, known as a browser, like Chrome or Firefox, for viewing HTML files.

What does an Operating System (OS) do when a user wants to run multiple applications simultaneously?

The OS pulls files and programs from storage and into memory then rapidly switches between all the applications at a rate the user doesn't notice.

A program called a compiler converts a high-level language to machine language. True False

True

When using CSS, if you want to reference an id you use the # (hashtag / pound) symbol and the id's name. For example: #myIdName { color: blue; } True False

True

With HTML, a heading tag, e.g. <h1> </h1> through <h6> </h6>, is used to indicate to the browser your content's prioritized order of importance. True False

True

With HTML, you can indicate if you want a list of items to be ordered or un-ordered. True False

True

Which of the following is NOT true about an Operating System's file storage process? Users create files to store folders, making it easier to organize your data. The Operating System maintains links between files and folders on the drive. Users create many files and the Operating System stores these files in a file system. Files and folders can be stored on multiple drives

Users create files to store folders, making it easier to organize your data.

When it comes to managing Big Data, companies need to consider which of the following? Question options: Volume Variety Verifiable Velocity Validity

Volume Variety Velocity

Developers can use the _____ method where each phase of the SDLC is done in sequence, entirely completing one phase before moving to the next phase. Spiral PADIS Waterfall Agile

Waterfall

A _____ is a small text file that a web server stores on your computer. Question options: login key breadcrumb cookie site tracker

cookie

Match the following database terms to the proper description ____Field ____Table ____Primary Key ____Record 1. The basic unit of data stored in a database 2. Basic units of data that are related and grouped together 3. The unique identifier for basic units of data that are related and grouped together 4. A collection of related data

__1__Field __4__Table __3__Primary Key __2__Record

Match the following databases types to the proper description: ____Multidimensional Database ____Relational Database ____Object-Oriented Database 1. Stores information in tables composed of rows and columns 2. May store similar information in multiple tables over time 3. Stores items individually with properties

__2__Multidimensional Database __1__Relational Database __3__Object-Oriented Database

Put the following Systems Development Life Cycle (SDLC) steps in order: ____Implementation ____Planning ____Support ____Analysis ____Design

__4__Implementation __1__Planning __5__Support __2__Analysis __3__Design

Server farms are often built near ______. Question options: universities, as a ready supply of technical talent is required military bases, as server farms contain highly sensitive corporate data a region with cheap labor, since server farms require massive human manual labor a cheap electrical source, since server farms consume megawatts of electricity

a cheap electrical source, since server farms consume megawatts of electricity

A(n) ______ makes regular backups of a user's files without the user's involvement, either as the files are updated, or on a schedule like daily or weekly. Question options: encryption file manual backup system automated backup system backup folder on the same storage drive

automated backup system

The internet is a connection of ______. Question options: billions of computers around the world thousands of computers around the world billions of computers in the U.S. thousands of computers in the U.S.

billions of computers around the world

Integer values such as 52, images, text and audio files are stored within a computer as _____ numbers. hexadecimal octal binary decimal

binary

Computers can only represent two values (0 or 1), so they use a base two number system, known as _______. Boolean numbers fractal numbers decimal numbers binary numbers

binary numbers

Servers and PCs typically are designed to be run from electricity coming from batteries. true false

false

A variable is a(n) _______. Question options: container that holds a value iterating loop, e.g. for, while expression conditional branch

container that holds a value

Encryption scrambles plain text (that humans can read) into ______. Question options: hexcode cyphertext cryptotext hypertext

cyphertext

Which of the following is NOT a SQL instruction? Question options: Where From Select Insert Find

find

Application developers must create multiple device drivers so their applications can interface directly with various hardware. true false

flase

The sole way to make computers run programs faster is by increasing clock frequency. true false

flase

While the number of embedded computers are increasingly found in everyday electronics, they're still a few years away from outnumbering the total number of desktop and laptop computers shipped each year. true false

flase

The following is an example of which data type: 3.14159265359 Question options: Float Number Pi Decimal

float

On a storage drive, a(n) _____ is a metaphorical container used to store one or more files. Folder Document Index Extension

folder

A web browser displays web pages with what type of file extension? Question options: URL HTTP HTML WWW

html

Because a CPU only understands binary, all instructions must be just 0's and 1's, such instructions are known as _______. Machine language HTML High-level language Assembly language

machine language

A(n) ______ involves a user intentionally copying files to another location. That other location should be separate from the file's storage drive, such as a USB drive or an external hard drive, or a location in the cloud. Question options: printed copy manual backup encryption file backup folder on the same storage drive

manual backup

The hardware component whose main purpose is to store data while you're using programs and applications is the: CPU. hard drive. memory. GPU.

memory.

When deciding what apps to quit by examining each app's memory usage, the user might first consider quitting apps using the ______ memory. Question options: newest most oldest least

most

Which of the following is most likely a file that stores a formatted document of text and graphics, such as a resume or newsletter, that can be viewed on multiple platforms? myResume.mov myResume.exe myNewsletter.mp3 myNewsletter.pdf

myNewsletter.pdf

A computer monitor consists of hundreds of thousands of tiny colored picture elements, each known as a _____. Quantum Dot byte bit LCD pixel CRT Retina Display Element

pixel

Each time computer X communicates with computer Y via the internet, the data takes ____ . Question options: the same route, every time, through intermediate computers possibly different routes through intermediate computers shorter than the previous time longer than the previous time

possibly different routes through intermediate computers

A user's laptop is running unusually slow. If after troubleshooting, the user does not find any obvious reasons for the performance issue, the most reasonable next step would be to _____ Question options: unplug the computer and use battery power restart the laptop take the computer to a service center like Geek Squad reinstall the operating system

restart the laptop

A computer's HDD or SSD _____ data when the power is turned off. copies loses encrypts retains

retains

A ______ typically consumes more electrical power than the other listed computer types due to the emphasis on speed. server Smartphone desktop laptop

server

A(n) _____ stores and delivers files over a network, e.g. web pages, documents, music or videos, in response to other computer's requests. Question options: embedded device router switch server

server

This type of computer is usually fast, but large, costly, and power-hungry. They often kept in special closets, labs, or even warehouses; most people have never even seen one. Macro processor Server Universal Automatic Computer (UNIVAC) Mark I or Mark II

server

A _____ is a specialized computer that consists mostly of a screen, which is used for both input and output. desktop server smartphone laptop

smartphone

A CPU can access an item from cache faster than from memory and from memory faster than from storage. true false

true

A Denial of Service (DoS) attack is achieved by submitting huge numbers of access requests simultaneously to one website, which overloads that site's web server, thus preventing legitimate requests from being handled (those requests are denied service). Question options:TrueFalse

true

A Domain Name System (DNS) is like the internet's phone book that translates the domain name into its associated IP address Question options:TrueFalse

true

Online posts to social media, blogs, websites, et al that convey a professional image, a wide range of interests, or demonstrate positive interactions with others can encourage an employer to make a job offer Question options:TrueFalse

true

Python is a popular high-level programming language with powerful data-processing operations. Question options:TrueFalse

true

While privacy tools can limit a websites' ability to track your browsing activities, information leaks can still be used to obtain and infer even more of your personal information that you yourself didn't provide. Question options:TrueFalse

true

While the upside of a computer's faster clock speed means faster running programs, the downside is more electrical cost, it will generate more heat (hence a need for cooling fans), and has a shorter battery life. true false

true

With camel case, you capitalize the first letter of every word after the first word Question options:TrueFalse

true

With today's modern Operating Systems used by desktops and laptops, users can configure automated backup systems to automatically backup files on a hourly, daily, or weekly basis. true false

true

A "reboot" of the network involves _____. Question options: turning devices 'off' and then 'on' again replacing old or defective equipment manually resetting firewalls and running anti-virus software to remove malware the ISP resetting your IP connections

turning devices 'off' and then 'on' again

From fastest to slowest, rank the following in the correct order of how fast data can be accessed RAM HDD SSD Cache

1. Cache 2. RAM 3. SSD 4. HDD

Engineers have reduce integrated circuit switches sizes by half about every ____. This is known as Moore's Law. 4 years 5 years 12 months 2 years

2 years

Moore's Law is the term for the trend of Integrated Circuits (IC) chip capacity having doubled roughly every ____ from the 1960's into the 2000's. 24 months 36 months 9 months 48 months

24 months

_____ developed a machine called the bombe that proved instrumental in helping the Allies in the war. Alan Turing Grace Hopper Joseph Marie Jacquard Ada Lovelace Herman Hollerith Charles Babbage

Alan Turing

If your internal storage drive is full, or nearly full, easy options for creating storage drive capacity (making it less full) include: Delete some movies, songs, and photos as these can each be large gigabyte files. Delete some PDF files (like for entire books) that can be as large as hundreds of megabytes. Empty the recycle/trash bin to remove the files from your storage drive. All of the above

All of the above

____ was an American computer scientist and served in the U.S. Navy Reserve. While working as a computer programmer. ______ wanted a programming language that used English words, instead of assembly language or machine code, to make programming more accessible and invented the first programming language compiler, which converted mathematical notation using English words to machine code. The popularization of the term computer bug is sometimes attributed to ____ Steve Jobs Alan Turing Gordon Moore Grace Hopper

Grace Hopper

Generating graphics or video on a screen, such as for a video game or for a movie, requires special computations that must occur quickly for good viewing quality. A ______ is a special chip whose hardware is specially designed for fast graphics and video processing. Retina Display Module High Definition Card Graphics Processor (or GPU) Integrated Video Chip (IVC)

Graphics Processor (or GPU)

A storage drive that consists of a spinning disk that stores bits using magnetism, is known as a ______. Solid State Drive (SSD) Binary State Drive (BSD) Machine Language Drive (MLD) Hard Disk Drive (HDD) Universal Serial Bus (USB) Drive

Hard Disk Drive (HDD)

_____'s invention was enough to form a company that, through subsequent name changes, is known today as IBM. Herman Hollerith Joseph Marie Jacquard Charles Babbage Ada Lovelace Grace Hopper Alan Turing

Herman Hollerith

RAM is short for _______. Random Access Memory Reading Access Memory Rapid Access Memory Readable Applied Memory

Random Access Memory

Today, storage drives that use a computer chip (with no moving parts) instead of a spinning disk to store data is known as a ______. Machine Language Drive (MLD) Hard Disk Drive (HDD) Solid State Drive (SSD) Binary State Drive (BSD)

Solid State Drive (SSD)

If a user wants to download all of their favorite songs, movies, tv shows (every season) and games to save for watching / playing / listening to later, they may need to increase the size of their computer's _______. Cache CPU Memory Storage

Storage

The _________ evaluates if a computer is considered intelligent by posing a series of questions. A computer passes the test if the computer's response cannot be distinguished from a human's response. Babbage Check Turing Test Hopper Analysis Hollerith Question

Turing Test

Most keyboards interface with a desktop computer via a _____ port. USB SSD ROM RAM

USB

A _____ is a non-volatile storage device that a user can connect to a computer via a USB port. server USB flash drive ROM chip RAM stick

USB flash drive

A CPU runs a program's instructions one at a time. The speed at which a CPU runs instructions is governed by _____. The amount of power from the Power Supply Unit (PSU) A pulsating laser A ticking clock signal The amount of memory the computer has

a ticking clock signal

A _____ chip has 2 CPUs on the chip. tri-core quad-core octo-core dual-core

dual-core

Computers in robots, cars, and medical devices are examples of computers known as _____ computers. micro- embedded dynamic portable

embedded

A typical embedded computer in a household appliance, like in a coffeemaker, thermostat, or garage door opener, costs about the same as a desktop computer. True False

false

Hard disk drives (HDD) and solid-state drives (SSD) are volatile, while memory is non-volatile. true false

false

Hardware interfacing, allows users to create and organize files, while keeping track of file locations on a drive. true false

false

Modern storage drives (HDD, SSD or USB), support multiple applications running seemingly simultaneously, running a bit of each application one at a time, switching thousands of times per second. true false

false

More memory (RAM) means the computer can store more videos, photos, documents, etc., when the computer's power is off. true false

false

The number of desktop computers sold continues to rise each year. true false

false

Generating graphics or video on a screen, such as for a video game or for a movie, requires special computations that must occur quickly for good viewing quality. A _____ is a special CPU chip whose hardware is specially designed for fast graphics and video processing. Pixel processing engine Graphics processor Quantum processor Retina display

graphics processor

A particular computer has a separate keyboard and screen. A user presses a key, and a character appears on the screen. The pressed key was most likely first stored: in the keyboard in memory on the screen none of the above

in memory

A computer monitor combines three basic colors to generate a huge variety of other colors. The three colors are: Black Yellow White Indigo Green Blue Red Purple Orange

red, blue, green

More ______ are shipped per year than all of the other options combined. laptops desktops smartphones tablets

smartphones

Which type of computer is most popular? Tablets Laptops Desktops Smartphones

smartphones

A(n) _____ is a switch that can be switched on or off to let electricity flow. It is like a light switch, except turning the switch on or off is done electronically rather than by a human hand. memory module Operating System transistor device driver

transistor

An embedded computer is a computer inside another electrical device, like inside a TV, car, printer, thermostat, satellite, etc. true false

true

Most modern cars contain dozens of computers to control a variety of subsystems including entertainment, navigation, security, emissions, braking, and cruise control. true false

true

Programmers of the first computers were mostly women. true false

true

Punched cards were a computing device that stored data and programs, which remained in use until the 1970s. true false

true

The CPU executes (runs) a program's instructions. true false

true

Today, billions of embedded computers are manufactured every year, whose costs range from pennies (computers in toys, greeting cards, cheap calculators, etc.) to millions of dollars (computers in jets, satellites, robots, factories, etc.). true false

true

When an internal desktop or laptop storage drive is full, many programs and applications (apps) won't run properly and/or will complain because most programs and apps need to create new files while running. true false

true


Set pelajaran terkait

Chapter 12 Gross Domestic Product and Growth (Economics)

View Set

(Unit 6) Miscellaneous Basic FL Insurance Laws

View Set

HRM REVIEWER 1 (Chapter 2: JOB ANALYSIS)

View Set