Standard 1 Final Prep

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

What computer was sold to US Census Bureau in 1951? UNIVAC ENIAC EDVAC Mark I

UNIVAC

Program or series of instruction that can replicate without the user's knowledge

Virus

Which is the physical aspect of the computer? operating system applications software software hardware

hardware

The following is an example of what? 8B542408 83FA0077 06B80000 machine code assembly language compiler code binary code

machine code

Which is not an input device? printer scanner digital camera microphone

printer

Which would be classified as a mobile computing device? mainframe desktop computer minicomputer tablet PC

tablet PC

How many states do the electrical circuits on an IC (integrated circuit) have? three: on, off, wait four: + - * / one: on two: on, off

two: on, off

What type of code is directly understood by the CPU? Machine Code Abstract Code Assembly Language C

Machine Code

__________ holds data for all applications that are currently running on your computer, but only while the power is on. RAM Memory processor ROM Cache

RAM

Requires government authorities have a subpoena, summons or search warrant to access an individual's financial records

Right to Financial Privacy Act of 1978

Gives Americans the freedom to use any type of encryption to protect their confidential information.

Safety and Freedom through Encryption Act of 1999 (SAFE)

What is the purpose of the Fair Credit Reporting Act of 1970? It is protection of digial information from illegal use or reproduction. It restricts the way in which personal data can be used by federal agencies. It requires that a government authority have a supoena, summons or search warrant to access an individual's financial records. To give individuals the right to see information collected about them for use by credit, insurance and employement agencies.

To give individuals the right to see information collected about them for use by credit, insurance and employement agencies.

Program or series of instruction that appears as something else

Trojan Horse

Digits in binary are also know as bits. False True

True

The binary number 10111 is ______ in decimal. none of the options 15 23 4

23

The binary number 1000110 equals ________ in hexadecimal. 46 12 16 D3

46

101 in base 2 equals ______ in decimal. 5 9 6 4

5

John Atanasoff Clifford Berry Invention

Atanasoff-Berry Computer

________ is another name for Decimal. Base 16 Base 2 Base 10 Base 8

Base 10

All of the following are high-level programming languages except: C# Java Basic Visual Basic

Basic

Second Step to the Programming Process

Design the Solution

The decimal number 10 is equal to ________ in binary? 0010 1010 1001 1111

1010

The hexadecimal number A41 is ________ in binary. 101001000001 None of the options. 10000100001 01100100001

101001000001

How many KB in 1 MB? 924KB 1024KB 1000KB 1KB

1024KB

The decimal number 15 equals ________ in binary. 0000 1110 1111 0111

1111

The F in hexadecimal is equal to 16 10 11 15

15

What base number system is also known as hexadecimal? none of the options 8 10 16

16

"This Code, consisting of 24 imperatives formulated as statements of personal responsibility, identifies the elements of such a commitment." American Computing Act Computing Professional Conduct Guidelines ACM Code of Ethics and Professional Conduct American Computing Professional Ethics Act

ACM Code of Ethics and Professional Conduct

Who is called the first programmer due to writing a program based on the design of the Analytical Machine? Charles Babbage Herman Hollerith Ada Byron Alan Turing

Ada Byron

Who wrote the first computer program? Herman Hollerith Charles Babbage Stephen Jobs Ada Byron

Ada Byron

Who wrote the first computer program? Stephen Jobs Herman Hollerith Ada Byron Charles Babbage

Ada Byron

Charles Babbage Invention

Analytical Engine and Difference Engine

Install on computers to detect and remove code before it can replicate or damage data

Antivirus programs

Which number system utilizes only two digits? Binary Octal Decimal Hexadecimal

Binary

All of the following were developed in the 1990's except: Java PHP C Python

C

What is the most closely related language to the CLI (Common Language Infrastructure) the backbone of the .Net Framework, and the first one developed specifically for it? C# C Visual Basic C++

C#

All of the following are second generation programming languages except: Basic COBOL Fortran C++

C++

Which processes data and controls the flow of data between the computer's other units? USB ROM CPU SRAM

CPU

Requires commercial websites that collect personal information from children under the age of 13 to obtain parental consent. Electronic Communications Privacy Act of 1986 Electronic Freedom of Information Act of 1996 Children's Online Privacy Protection Act of 1988 Safety and Freedom through Encryption Act of 1999

Children's Online Privacy Protection Act of 1988

Requires commercial websites that collect personal information from children under the age of 13 to obtain parental consent.

Children's Online Privacy Protection Act of 1998 (COPPA)

Addresses data collection by credit, insurance and employment agencies

Consumer Credit Reporting Reform Act of 1996

Which of the following would be part of an Acceptable Use Policy? There is more than one. Do not access, upload, download, or distribute inappropriate materials Use of the network for private business Use appropriate language Do not reveal personal information Accessing, uploading, downloading, or distributing inappropriate materials Do not access another's account

Do not access, upload, download, or distribute inappropriate materials Use appropriate language Do not reveal personal information Do not access another's account

Fifth Step to the Programming Process

Document and Maintain the Program

John Mauchly J. Presper Eckert John von Neumann Invention

EDVAC/EDSAC

Which of the first generation computers was a secret military project during WWII used to calculate trajectory of artillery shells? Atanasoff-Berry Computer ENIAC Mark I The Analytical Machine

ENIAC

John Mauchly J. Presper Eckert Invention

ENIAC/UNIVAC

What type of memory does a flash drive use? Electrically Programmable Read-Only Memory Cache Electrically Erasable Programmable Read-Only Memory Electrically Erasable Programmable Random Access Memory

Electrically Erasable Programmable Read-Only Memory

Makes it a crime to access electronic data without authorization

Electronic Communications Privacy Act of 1986 (ECPA)

Requires federal government agencies to make certain agency information available for public inspection

Electronic Freedom of Information Act of 1996

Issues with computers in the workplace

Employee monitoring

Which of the following deals with computers in the workplace? Invasion of privacy Copyright Employee monitoring Identity theft

Employee monitoring

Power & paper waste disposal of out-dated hardware

Environmental concerns

The science that studies safe work environments

Ergonomics

Requires federal agencies to develop, document and implement an agency-wide program to provide information security. Electronic Communications Privacy Act of 1986 Federal Information Security Management Act of 2002 Identity Theft Penalty Enhancement Act of 2004 Consumer Credit Reporting Reform Act of 1996

Federal Information Security Management Act of 2002

Requires federal agencies to develop, document and implement an agency-wide program to provide information security.

Federal Information Security Management Act of 2002 (FISMA)

Speeds are measured in _________ or throughput rate. GHz KHz MHz THz

GHz

Illegal act to gain access to large computer systems to perform acts of vandalism

Hacker

Which category of programming languages has the most abstraction from the hardware? High Level Low Level Assembly Language Machine Language

High Level

First Step to the Programming Process

Identify the Problem

Establishes penalties for aggravated identity theft

Identity Theft Penalty Enhancement Act of 2004

Identity Theft

Invasion of privacy

What is the purpose of the ALU? It is used to store data for quick retrieval. It process data and controls the flow of data. It determines the speed at which a CPU can execute instructions. It performs logic and arithmetic operations and makes comparisons.

It performs logic and arithmetic operations and makes comparisons.

Protects against copyright infringement

NET (No Electronic Theft) Act of 1997

If a zero is shown in binary, it represents: Both 0 and 1 Neither 0 nor 1 Off On

Off

Marketing technique where data is collected about customers visiting a website

Online Profiling

Blaise Pascal Invention

Pascaline

Act of sending an email to a user falsely claiming to be a legitimate business in an attempt to trick the user into revealing personal information that could be used for crimes like identity theft

Phishing

Illegal copies being distributed

Piracy

Which of the following does not deal with ergonomics? Safe work environments Repetitive stress injuries Eye strain Power & paper waste

Power & paper waste

Restricts the way in which personal data can be used by federal agencies

Privacy Act of 1974

Gives law enforcement the ability to monitor individual's email and web activity Provide Appropriate Tools Required to Intercept and Obstruct Terrorism (PATRIOT) Act of 2001 Electronic Freedom of Information Act of 1996 Safety and Freedom through Encryption Act of 1999 Right to Financial Privacy Act of 1978

Provide Appropriate Tools Required to Intercept and Obstruct Terrorism (PATRIOT) Act of 2001

Gives law enforcement the ability to monitor individual's email and web activity

Provide Aprropriate Tools Required to Intercept and Obstruct Terrorism Act of 2001 (PATRIOT)

Joseph Jacquard Invention

Punched Cards

Gottfried Wilhelm von Leibniz Invention

Stepped Reckoner

Herman Hollerith Invention

Tabulating Machine

Fourth Step to the Programming Process

Test the Program

What law protects against copyright infringement? The Financial Privacy Act of 1978 The Fair Credit Reporting act of 1970 The NET Act of 1997 The Privacy Act of 1974

The NET Act of 1997

This act restricts the way in which personal data can be used by federal agencies. The Financial Privacy Act of 1978 The Privacy Act of 1974 The NET Act of 1997 The Fair Credit Reporting Act of 1970

The Privacy Act of 1974

What sparked the beginning of third generation computers? The invention of the Integrated Circuit The invention of stored memory The invention of the transistor The invention of the first programming language

The invention of the Integrated Circuit

What sparked the second generation computers? The invention of the transistor The invention of machine language The invention of the Integrated Circuit The invention of the first computer language.

The invention of the transistor

What made it possible to build the microcomputer (PC)? The microprocessor The Integrated Circuit The development of stored memory The transistor

The microprocessor

Program that is able to reproduce itself over a network

Worm

Third Step to the Programming Process

Write the Program

A bit is a person's name stored in memory. a single 0 or 1 in the binary code. eight 0s or 1s. equal to 64K of RAM

a single 0 or 1 in the binary code.

00000000 01001101 represents the letter M in kilobytes. decimal. hexadecimal. binary.

binary

The number system used in computers is called hexadecimal. decimal. base. binary.

binary

Computer memory capacity and file size are measured in codes. bytes. inches. nanoseconds.

bytes

SRAM (Static RAM) is also referred to as clock rate. integrated circuits. ROM. cache.

cache

The _______________is high speed memory that stores frequently accessed instructions. cache random access memory processing unit memory controller

cache


Set pelajaran terkait

NUR 320: Intracranial EAQ, Chapter 38:, GI, safety, 309 Quiz 4

View Set

SC-900: Microsoft Security, Compliance, and Identity Fundamentals

View Set

Ch 22: The Role of Life insurance in Estate Planning

View Set

Job Related Services Quiz 3: Area and Volume

View Set

Sect 3: Food Safety & Supply Topic B

View Set

Chapter 12 - IP Addressing and Subnetting

View Set

the complete ap econ review guide

View Set