Computer Info DANTES

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

5000

5 seconds is equal to _____ milliseconds.

dashboard

A GUI is sometimes called a computer __________.

bus

A ___ network has two endpoints and all computers are connected to a single wire or cable. Data packets on a ___ can collide; when this happens, the sending device waits and retransmits. If a connection on the ___ is broken (i.e. one of the computers in the chain crashes), the network may go down.

what-if

A ___-__ analysis allows a user to change the contents of a spreadsheet cell and find out how that would change the outcome of the calculation.

field

A ____ contains the smallest unit of meaningful data and can therefore be called the basic building block for a structured file or database. Examples of _____ include name, address, social security number, etc.

ring

A ____ network has no endpoints and all computers are connected in a continuous loop. In a ____ network, all packets flow in only one direction; there are no data collisions. If a connection on the ____ is broken, the network may go down.

Network Interface (NIC)

A ______ _______ Card is used by a computer to transmit and receive data over a network.

hash function

A ______ ________ uses an algorithm to transform a given string of letters into a string that represents the original string

macro

A _______, or keyboard shortcut, is a single keystroke or command used to automatically issue a longer, predefined series of keystrokes or commands.

kilobyte

A _________ is a unit of measurement equaling 1024 bytes of data.

megabyte

A _________ is a unit of measurement roughly equaling one million bytes.

protocol

A __________ is a set of rules governing the exchange of data between hardware and software on a communications network.TCP/IP is an example of a network communications _____________.

gigabyte

A ___________ is a unit of measurement roughly equaling one billion bytes.

binary

A bit equals one _____ digit.

word size

A computer's _____ _____ is the number of bits that the processor may process at any one time. The more bits in a _____, the faster the computer. Examples of ______ ______ in modern computers include 16, 32, and 64 bits.

index

A database ______ contains a list of keys and each key provides a pointer to the record that contains the rest of the fields related to that key.

widget

A desktop ________ appears on the computer desktop and is a specialized utility that looks like a control and displays information.

plaintext cleartext

A message that has not been encrypted is called _________ or __________.

sequential

A tape drive is an example of a _______________ access device; it retrieves data by starting at the beginning of the tape and reading each record until the required data is found

overclocking

A technique for increasing the speed of computer components such as motherboards, memory, processors, and graphics cards is called ________. __________ is popular with computer gamers but can be dangerous as components may overheat and be damaged or catch fire.

byte

A unit of measure equaling 8 bits is a _________.

expert

An __________ system is an interactive computer program that helps users solve problems. MYCIN, PROSPECTOR, CARES, CLUES and CLIPS are all examples

algorithm

An ____________ is a formula or set of steps for solving a particular problem. To be an _________, a set of rules must be unambiguous and have a clear stopping point.

embedded

Any electronic system that uses a CPU but is not a general purpose computer is called an _____________ system. Handheld computers and PDAs are examples of _________ systems because the operating system resides on a single chip. ___________ systems also include cellphones, watches, and components in cars, planes, trains and machine tools.

Basic Input/Output System

BIOS stands for _____ _____ _____ ______

255

Current versions of Windows support file names up to ___ characters long.

Dynamic Host Configuration Protocol

DHCP stands for ______ _______ ________ ______.

node

Each connection point on a network is called a ______. _____s include computers, network devices, and networked peripherals.

microcontrollers

Embedded computers are also called _______________ and are small, specialized microprocessors installed in cars, cell phones, and smart appliances.

decode

Fetch, _________, execute and store are the four basic operations of the machine cycle.

execute

Fetch, decode, _________ and store are the four basic operations of the machine cycle.

store

Fetch, decode, execute and _______ are the four basic operations of the machine cycle.

compression

File __________ is a method of removing repetitive elements of a file causing the file to require less storage space and less time to transmit.

Hypertext Markup Language

HTML stands for _______ _______ ______

Hypertext Transfer Protocol

HTTP stands for ____ _____ _____

primary

If we were using a database containing employee records, the ________ key might be the employee ID number or social security number. The _________ key could be a unique series of numbers or characters; it doesn't have to be meaningful--just unique.

star

In a ____ network, all computers are connected to a central computer. The central computer is called a hub. The hub prevents packet collisions, but if the hub goes down the network stops.

key

In a relational database, a _____ field is used to sort data. This can also be called a sort _____, index, or ___word. Most database applications allow for multiple keys so that users can sort records in different ways.

UNIX

Mac OS X includes a _______-based kernel which reduces the number of errors and glitches. This ________-based kernel also contributes to stronger security. Mac OS X was rewritten for Intel architecture in 2006 and has a reputation for being an easy to use, reliable, and secure operating system.

cryptographic algorithm

Messages are encrypted using a ____________ __________ and a key (a password).

hash function

Passwords are often encrypted using a _______ _________, which takes a string of characters of any length and converts it into a string of a specific length.

extranets

Private intranets that connect internal personnel and selected vendors are called _____________.

nonvolatile

ROM chips contain data that is _____________, meaning that this data is not lost when the computer is turned off.

TLS

SSL (Secure Socket Layer) and ___ are protocols used to create a secure connection between a computer and a website. Sensitive information such as credit card numbers is encrypted and therefore useless if intercepted.

microprocessors

Some computers have a single chip containing the circuits for two ________________; this is called a dual core processor.

benchmarks

Tests run by laboratories to compare the overall speed of microprocessors are called _____________.

control: arithmetic: registers

The CPU consists of the_______________ unit, the ______________/logic unit (ALU) and the ________________ (high speed storage areas).

compression

The JPEG graphics format has built-in _____________ that can be adjusted by the user. Modifying the __________ allows the user to control the resulting file size.

registry

The Windows _________ is a database that maintains a record of installed software and peripheral devices, preferences, and settings.

BIOS

The ____ is a set of instructions contained in ROM that tell the computer how to find the operating system and load it into RAM. The _____ also enables the computer to interpret keyboard commands and display characters on the monitor.

kernel : supervisor

The _______ (also known as the _____) is the central component of the operating system. While the computer is running, it remains in main memory and manages nonresident programs. It manages programs not resident in main memory to perform tasks that support application programs.

backbone

The internet ___________ consists of high speed, high capacity transmission lines that use the newest communications technology to transmit data across the internet.

motherboard

The main circuit board of the computer, the __________, contains the CPU and memory chips as well as connections for the keyboard, mouse, and printer.

command line

The most common user interface for UNIX systems is the _______ ______ interface.

bits

The number of ______ limits how big of a number can be expressed. To calculate this limit, simply do 2n, where n is the number of ______.

driven:line

The old (non-GUI) operating systems (DOS and UNIX) used command-_________ interfaces, or command-_______ interfaces that required the user to type complicated instructions.

Platform

The particular operating system and processor model on which a computer system is based is called the __________.

Pretty Good Privacy (PGP)

The public key encryption software used to encrypt documents such as email is called _______ ________ _______ and is available for free download on the web.

instruction : machine

The series of events which takes place in a set order and at specified intervals, that occurs when the processor retrieves an instruction from storage and executes it, is called the ________ cycle, also sometimes called the _______ cycle

inference engine

The software that controls the search of the expert system's knowledge base and produces a conclusion is called the ______ _______.

HTTP

The web protocol _____ is a set of rules for exchanging information over the web.

8

To convert from word size to bytes, you must divide by __ because there are __ bits in a byte. Therefore, when we're dealing with a 64 bit word size, we divide by __ and the result is __ bytes.

1000

To convert seconds to milliseconds, multiply by ______. Access times for PC storage devices are measured in milliseconds.

switch

Unlike a hub, a _______ sends packets only to the computer that is the intended recipient.

pipelining

Using a technology called ____________, the processor can start executing an instruction before the previous instruction completes.

parallel

When a computer performs several tasks simultaneously, this is called ________ processing. An example of _________ processing is when several processors work together sharing memory on the same task. This is often used in large computer systems designed to keep operating when one CPU fails.

serial

With _______ processing, the CPU must complete all steps in the instruction cycle before it begins to execute the next instruction. instructions are executed sequentially in the order received.

FTP

___ is a protocol used to copy files from one computer to another over the Internet.

TIFF

____ is a graphics file format used on both PCs and Macs for high quality printable files.

analog digital

____(1) data is measured in ranges and can be represented as a wave. If using the analogy of a light switch, a light dimmer switch would be _______(1) and a normal on/off switch would be _______(2) (represented in discrete digits such as 1's and 0's).

bus ring star

____, ___ and _____ are the three basic network topologies.

Random Access

_____ ______ storage devices are able to go directly to the requested data. Examples include computer hard disk drives, RAM, flash drives, floppy drives and CD-ROM drives. _______ _______ is much faster than sequential access storage (tape).

UNIX

_____ is a proprietary multitasking operating system with built-in networking capabilities that supports multiple users. It was first developed by Bell Laboratories in 1969. Today, it runs on all types of computers including PCs, workstations, and servers

memory

_____ is an area of the computer that holds data that is waiting to be processed.

CAD (Computer Aided Design)

_____ software is used to design products, maps, structures and civil engineering drawings. Drawings created with ______ software are 3D and can be rotated to view all sides.

Rule based

_____-_______ detection software is used by merchants for online transactions to detect and prevent fraud by establishing criteria each transaction must meet.

Fetch

______, decode, execute and store are the four basic operations of the machine cycle.

Random Access

_______ _________ Memory, stores temporary data which is waiting to be stored, processed, or output, and this data is lost if the computer is turned off. _____ ______ memory usually consists of several circuit boards (chips) that plug directly into the computer's system board.

Public key

________ _______ encryption uses two keys and is used to transmit credit card data in secure e-commerce transactions and it is also used for secure email.

Personal Information Management (PIM)

________ ________ ________ software helps users organize and manage daily business activities. Examples of information managed by ___ ____ ____ software include addresses, phone numbers, appointments, and to-do lists.

Multimedia authoring

________ ________ software combines video, text, animation, graphics and sound to create standalone multimedia applications.

Read-Only

________ __________ Memory chips contain fixed computer start up instructions, are loaded at the factory, and are nonvolatile.

DHCP

________ is a protocol designed to automatically distribute IP addresses.

cache

________ temporarily stores instructions and data that the processor is likely to use frequently. Examples of ___________ include L1, L2, and L3. In all cases, it is storage located closer to the processor than RAM and therefore can be accessed much more quickly. ______ speeds up processing.

Virtual machine

_________ ________ technology allows users to simulate the hardware and software of one computer architecture on another.

Linux

_________ is a non-proprietary version of UNIX and is maintained by thousands of volunteer programmers around the world. It was created in 1991 by Linus Torvalds, a programmer from Finland.

groupware

__________ is software that allows several people to collaborate on projects over a network.

Primary

__________ storage, also known as RAM or memory, is temporary data waiting to be processed, and is held in computer circuitry. This data is lost when the computer is turned off.

Gateways

___________ are used to transmit data between LANs of different network topologies or network operating systems.

microcomputers

___________ include personal computers: desktops and towers, laptops, and handheld computers.

freeware

___________ is software that is copyrighted but is available for free.

Cyberspace

___________ is the world of communications in general; it includes wired and wireless communications, as well as the Internet. It includes the Web, chat rooms, blogs, member based services, conference calls and automatic teller machines (ATMs).

Analytical

_____________ graphics (also called business graphics) are graphical forms that make numeric data easier to analyze.

Virtual

______________ memory uses the hard disk to mimic primary storage (RAM) and is used to store parts of data files or programs until needed, thereby gaining almost unlimited memory capacity.

Decompression

_________________ is used to restore the file to its original condition by replacing the repeated patterns that were removed during file compression.

secondary

___________storage refers to devices and media that store data permanently, such as a floppy disk, a floppy disk, or a USB drive. This data is not lost when the computer is turned off.

cyphertext

a message that has been encrypted is called _______.

256

an 8 bit video card is limited to displaying _____ colors.

solaris

is a version of UNIX made by sun microsystems and is popular for large websites and e-commerce servers.

control

the CPU ______ unit carries out four basic operations known as the machine cycle.


Set pelajaran terkait

ACE Exam Study: Program Progression and Modification

View Set

ETA Fiber Certification Technician (FOT) WOAC

View Set

Cognitive Psychology 2341 Chapter 5: Memory Structures

View Set

Old People Questions (Chp 32 Foundations)

View Set