CS 102 group 1
Information processing cycle
1. Input 2. Process 3. Output. 4. Storage
Three items located in a SYSTEMS UNIT
1. power supply 2. drive bay 3. cooling fan
hacker
A ______ uses a computer to commit cybercrimes such as creating viruses and disrupting computer networks.
Multi-user
A large company such as retail store or airline reservation system uses a ___________ computer that acts as a central computer in a network.
trojan horse
A______ is a program that disguises itself as an interesting, useful, or desirable program in order to gain access to your system.
worm
A______ is a type of malware that self-replicates and spreads through computers and networks.
All the above
Alex is a photographer who takes professional-quality images. His digital camera is full of high-resolution images and it's almost out of memory. What should he do?
Cloud computing
Allowed you to store your files and use various applications in an online account.
zombies
Computers infected and compromised with malware are known as______ because they are under external control of a hacker.
clock rate, multiple cores, brand and model
Determine CPU's preformance?
password theft
Hackers commit ______ by using spyware or by attempting combinations such as "123456" or "password."
GUI
In 1984, Apple came out with the Mac, a PC that featured a revolutionary ______ that changed the way people interacted with computers.
LED
LCD and LED are two types of flat-panel monitors. Click on the monitor that is thinner, lighter, and more energy efficient with better contrast ratios, response times, and viewing angles.
Home automations
Let's people use Mobil device to control household activities
supercomputer
NASA uses this type of computer to conduct modeling and simulations for upcoming missions, radar and research
optical disk
Optical storage devices use lasers to read or write data to the reflective surface of a(n) ___.
optical
Scanners use______ technology to convert objects into a digital format.
solid state
Since ______ storage uses memory chips for storage, it has no moving parts like hard drives or optical drives.
Microprocessor and CPU
The "brain" of the computer, ______ and _______ organizes and carries out instructions to produce a desired output?
operating system
The ______ must be loaded before any other software during the computer's start-up or boot process. The ______ is the software that allows other applications to run.
QWERTY
The alphanumeric keys refer to the main set of keys that allow you to input letters, numbers, and punctuation. The most common arrangement of these keys is referred to as the ______ layout.
random access memory (RAM)
The amount of ______ you have installed in your computer determines how many applications you can have open and work on at the same time. You can make your computer faster by adding more ______ or memory modules
magnetic storage
The development of ______ allowed data to be represented by magnets, which can hold their position or pattern to represent 0's and 1's without electricity.
bit
The most fundamental unit of computing is the ______, which is represented as an on (1) or off (0) value.
circuit board
The motherboard is the largest _______?
storage
The purpose of ______ is to hold programs and data permanently, even when the computer is turned off.
network server
Type of multi-user computer where you can store company's website and share files and software with his coworkers.
optical mouse, touch pad, tracker ball
Users typically interact with most computer software via an on-screen pointer in the form of an arrow. Click three pointing devices you can use to control the arrow
acceptable use policy (AUP)
When starting a new job or enrolling in a new school, you may sign a(n) ______, a document containing an organization's policies for the ethical, secure, and appropriate use of computing resources.
flaming & trolling
While not illegal, many unethical behaviors such as ______ affect online users.
anti-malware
___ is a security utility that protects your computer from various types of malware.INSTRUCTION:___ is a security utility that protects your computer from various types of malware.
private browsing
______ is a feature that will delete your history, cache and cookies the moment you close the private windows.
multitasking
______ is the ability to run multiple programs at the same time.
barcode
______ scanners are used to scan the barcode labels that uniquely identify most products sold today.
Haptic
______ technology can enhance audio or video output from computers to make them ore relevant or noticeable.
drive, folder, file
file hierarchy
Chrome OS
the OS that requires an internet connection to run its software applications.
Unix, Linux, Microsoft Windows
three of the most popular server operating systems