CGS 2060 Exam 1

Ace your homework & exams now with Quizwiz!

Though currently expensive, curved and paper-thin displays are possible using _____ display technology

LCD

most new laptop computers come with how much storage

123 MB- 206 BG

"full hd" resolution is expressed as

1920x1080

personal computer CPU clock speeds range between

2 to 4 gigahertz

blu-rays provide approximately ____ of storage space

25 GB

according to youtube approximately how much video is uploaded to its site every minute?

300 hours

when you buy a new laptop, how much RAM should it come with

4-8 GB

CDS provide approximately ______ of data storage space

700 MB

An interent signal that has enough bandwidth to allow multiple computers to be connected to the same router is called a _____ signal

????

The first commercially available computer with a graphical user interface was NeXT's _____ computer.

Apple

which optical drive media storm approximately 700 MBs of data

CD

an attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests is called a _______ attack

DDoS

though it could theoretically hold terabytes of data for thousands of years in a microscopic space, _____ storage, using genetic material, is a distant storage option

DNA

The internet service that tends to provide the most consistent speed is

DSL

a commonly used short range wireless technology used for data transfer and electronic payments is called

NFC

the technology that uses the reflection of a laser of the graphite left by a #2 pencil to determine if a bubble has been filled in is called

OMR

Printer speed is described using which acronym?

PPM

because of their capability of storing data in multiple hard drives, data warehousers use _____ technology to ensure redundant data storage

RAID

the place in a digital device where the data and programs that device is currently using are accessible by the processor is called the

RAM

the instructions needed to boot up a computer such as BIOS are typically stores in

ROM

one of the largest data requirements of the future will likely be

mapping patients genomes

a million bytes of data equals approximately one

megabyte

an electronic element that stores data by changing its resistance based on the current that has passed through it (similar to RRAM) is called a

memristor

Select the domain name

mheducation.com

windows OS is owned and maintained by

microsoft

a megabyte equals approximately one ___ bytes

million

megahertz is equal to one ____ cycles (for instructions) per second

million

The word modem stands for

modulator-demodulator

Fiber optic cable is ______ expensive than the coaxial cable to install

more

Lower range tones generally require _____ speakers

more compact

which of the following is a strength of the android platform

most widely used OS for smartphones and tablets

SAGE was developed by the US Department of

Defense

The protocol used for transmitting large files from one server to another over the internet is known as the ____ Protocol (FTP)

File Transfer

this type of connector is the most common for connecting peripherals (printers, monitors, storage, devices, etc) to a computer

FireWire

the _____ is a computer within your computer that creates images

GPU

relatively rugged, water-resistant video creams that allow users to film high-definition video under harsh conditions, such as on ski mountains, in the ocean, or at high attitudes are called extreme-action video cameras or simply a ____

GoPro

A port that allows the transfer of high quality video and audio signals is called a ____ port

HDMI

the standard port for video and audio input into televisions today is the _____ port

HDMI

A URL identifies a particular ____ dress on the World Wide Web

IP

The BitTorrent protocol is often called ______ file sharing

Internet Protocol

ISP stands for

Internet Service Provider

What group determines the standards for the World Wide Web

Internet organization for standardization (ISO)

the _____ cache is located directly on the processor itself

L3

A switch distinguishes between various devices within a network by their ______ addresses

MAC

the technology (chips) that allows cell phone microphones and hearing aids to be so small is the ____ chips

MEMS

the abbreviation for megahertz is

MHz

connecting digitial musical devices to computers is accomplished by using ______ ports

MIDI

this technology allows musicians to create written sheet music, simply by playing an instrument

MIDI

The 2 most common audio file formats are WAV and _____

MP4

Broadband is measured in

Mbps

which of the following might be risky to uninstall from a windows pc laptop

Microsoft works 6-9 converter

_______ is actually storage since it retains data and information when the power has been turned off

ROM (read only memory)

The world wide web was created through a collaboration led by ______

Tim Berners-Lee

most tablets and phones use ____ as their man storage device

USB

this type of connector is the most common for connecting peripherals (printers, monitors, storage, devices, etc) to a Windows computer

USB

What type of port do most digital devices use to attach peripherals?

USB port

URL stands for ______ Resource Locator

Universal

The original wireless network privacy and protection standard for wifi known as ____

WEP

The standard for wireless network privacy and protection is known as

WEP

The wireless network privacy standard that was introduced in 2003 but was quickly replaced )due to numerous vulnerabilities) was known as

WPA

In addition to activating ______ protection, its a good idea to disable your routers SSID transmission once all your devices are connected

WPA2

the protocol for wireless networks is called

Wifi

WWW stands for

World Wide Web

CDS store data using

a blue spectrum laser beam

DVDS store dating using

a reflective coating that has pits and lands

the cost of an SSD is ____ than the cost of a traditional hard drive

about the same

smartphones cameras work by focusing incoming light into what type of array that capture images?

active pixel scanner

when discussing digital cameras or smartphones cameras with APS CMOS, APS stands for

active pixel sensor

software that collects the users web browsing history and uses the data collected to create unsolicited targeted pop up advertisements is called

adware

combining the power of a desktop with a neat, clean, look ______ computers are popular with businesses. their lack of expandability make them less popular with serious gamers though

all-in-one

What 3 items are needed to install a home wifi network

an internet signal a modem a router

the mouse was developed by which company

apple

The capacity of a particular transmission medium is called its ____

bandwidth

The volume of data that can be carried on an Internet transmission media in an amount of time is called ____

bandwidth

the two major factors that impact processor speed are clock speed and

bandwidth

Inkjet printers are often sold _____ their production cost

below

a gigabyte equals approximately one ______ bytes

billion

one character of information, for example, a letter or a number consists of one ____ of storage

bit

represented as either a 0 or 1, a _____ is the smallest unit of data a computer can process

bit

the smallest unit of data storage is a

bit

a short-range wireless transmission protocol is known as

bluetooth

because its radio waves pass through walls or desktops, ____ - capable devices are becoming very popular

bluetooth

this technology provides short distance wireless communication between electronic devices using extremely low power radio signals

bluetooth

a group of compromised computers controlled by a hacker is called

bobnet

Software applications that allow users to access and surf the world wide web are called ___

browsers

Which might be a choice for Internet service in your area?

cable internet

in addition to the RAM, modern processors temporarily keep frequently accessed data in a

cache

The technology that allows any text, even handwritten scrawls, to be digitized is known as optical ___ recognition.

character

magnetic ink recognition (MICR) is a technology that is most commonly seen on

checks

the number of instructions the CPU can process per second is dictated by the _____ speed of the processor

clock

clockspeed, also referred to as _____, is the speed at which the processor performs the operations required to run a digital device and instructions executed by the digital device

clock rate

the fact that data on servers is nearly always backed up onto other servers gives _____ storage a major advantage over other data storage methods

cloud

Sage was developed during the ____ war

cold

The number of bits of data describing each pixel in a display is referred to as

color depth

the amount of data that defines each color in a pixel is called

color depth

a digital device that accepts input, processes and stores the input, and provides output is a

computer

firewall software used to block a users access to specific internet content is called a ______ filter

content

A description of the difference in the luminance of a displays white pixels computer to the back pixels is called

contrast ratio

the two main components of a processor are the arithmetic logic unit (ALU) and the ______ unit

control

a small text file of information created by websites you visit that your web browser store son your hard disk is called a

cookie

What was the major question that ARPAnet wanted to solve?

could a network be built that would continue to work even if multiple parts collapsed?

the malicious use of computer code to modify the normal operations of a computer or network is called a

cyberattack

harming or harassing a person or group of people via information technology and networks in a repeated and deliberate manner is called

cyberbullying

a crime in which a computer is the object of the crime or is used to commit a crime or offense is called

cybercrime

a person who uses computers and the internet to launch attacks against computer systems for political or ideological reasons is called a

cyberterrorist

disadvantage of the cloud

data is only available when you're online

FireWire connectors were developed for ______ computers

dell

which of the following might contain a traditional (magnetic) hard drive

dell desktop computers

devices with a separate system unit and a relatively large footprint are called _____ computers

desktop

a site on the windows operating system where you can uninstall programs, adjust setting, and manage task is the

device manager

screensize is measured by the ______ across the monitor

diagonal

screen size is measured by the

diagonally distance between the upper right and lower left corers of the screen

a DDoS attack is when computers that have been infected by a virus act as "zombies" and work together to send out illegitimate messages creating huge volumes of network traffic. the acronym DDoS stands for

distributed denial of service

A ____ name identifies a server site on the Internet

domain

Routers that can send internet signals over 2 distinct frequencies are called _____ routers

dual band

using a stylus and touchpad to map the signature and also measure pressure, pen angle, pen up/down, speed etc. is known as what type of signature recognition?

dynamic

memory is ____ and has no moving parts

electronic (solid state)

The art and science of creating output that provides information in the most useful manner is called

ergonomics

all of the following are common ports that are included with laptop computers except

ethernet ports

the machine cycle consists of which four steps

fetch, decode, execute, and store

Which transmission media has the largest bandwidth?

fiber optic

A protocol commonly used to transfer large files from one server to another on the Internet is the

file transfer protocol

Software that limits the material that a browser fetches or that a search engine displays are called _____

filters

hardware or software used to keep a computer secure from outside threats such as hackers and viruses by allowing or blocking internet traffic is called a

firewall

Number of times per second a frame in a video is advanced is the definition of

frame rate

which of the following is a strength of the linux platform

free to download and use

typical SSD capacities for tablet computers or smartphones are measured in

gigabytes

a separate processor (computer) in your computer that enhances your video is called the

graphic processor (GPU)

many computers today use _____ which is a coding scheme using at least 16 bits to represent a character

graphic processor GPU

Letting computer users drag images and documents across their computers monitors made the _____ user interface very popular.

graphical

a person who gains unauthorized access to networks and in order to steal and corrupt information and data is called a

hacker

the act of hacking, or breaking into a computer system for a politically or socially motivated purposes is called

hacktivism

data flows between different part of the computer via

hard drive

what is equal to one cycle per second

hertz

a refracted laser beam striking a photoreceptors from many different angles allows ____ storage to retain many bits of data in the same location

holographic

using refracted laser light to store data on a photoreceptive substrate is essentially how _____ storage works. theoretically this could store gigabytes of data within a cubic millimeter

holographic

When determining how much cell phone data you need it is important to consider

how much data you currently use

the visual image output that a computer creates a known as

icons

Which is true regarding the length of a USB cord?

in general, the more data being transmitted, the shorter the cord should be

a television remote usually uses ______ waves

infrared (IR)

Sometimes used to create prototype models for casting ______ printing is also known as additive manufacturing

inkjet

the largest chip designing and manufacturing company in the world is

intel

Although it sounds ironic, searching the _____ in your area is an efficient way to search for an ISP.

internet

Which of these browsers was developed by Microsoft?

internet explorer

with optical zoom, resolution _____ when focusing on distant objects

is enhanced

a form of spyware that records all actions typed on a keyboard is called a _____ logger

keystroke

which of the following represent the highest amount of storage

kilobyte

which of the following represents the least amount of storage?

kilobyte

For _____ it may be less expensive to add an existing cell phone data plan and to use the phone as a hotspot than to add wired Internet service

large corporations

what is the name of a virus written in a macro language and placed within a document or spreadsheet

macro virus

the actual number of pixels in a monitor is called ____ resolution

native

an application that navigates all of the files and folders on your MAC is the

navigator

what manages hardware and software, supports the computers basic functions and runs programs

operating system

what manages hardware and software, supports the computers basic functions and runs programs

operating systems

in photography there are 2 ways to focus on distant objects, digital zoom and ___ zoom

optical

a storage device that uses lasers to read CDS, DVDS, or blu ray dis is referred to as

optical drive

many manufacturers have made ___ optional equipment when purchasing a new laptop computer

optical drives

running the processor faster than recommend by the manufacturer is called ______. this can increase performance and speed, but will also void the manufacturer warranty

overclocking

Paul Baran developed technology called ______ switching that made the Internet possible and reliable

packet

An input output or storage device connected to a computer is known as

peripheral

cookies stored on a computers hard drive and used to collect and store information about user preferences, password and username information, IP address and/or data on web surfing behavior are called _____ cookies

persistent

a mobile hinged computer with an integrated keyboard that sues a full operating system is called a notebook or a _____ computer

phablet

a type of phishing that seeks to obtain personal information though malicious software that is inserted on a victims computer is called

pharming

A request for an electronic "echo" or response from another computer or server is called a

ping

The smallest controllable element of an image is called a

pixel

the smallest element of an image is called a

pixel

Using cells of ionized gas to create images, _____ displays are actually becoming less popular

plasma

A type of printer that is used to print large graphic images such as architectural drawing by mechanically moving a pen over a large sheet of paper is known as

plotter

Software that can be added to a browser to increase its functionality are called

plug-in

a point (a hole or slot) in a computer designed to accept a specific connector is called a

port

most touchpad are _____ to sense when a finger has moved across the pad

pressure

these facilitate getting data and information into your computer

processing devices

which type of touchscreen uses a single metallic-coated panel and uses electricity to calculate touch points

projective capacitive

An output device that uses light to display video or image output on a surface is called a

projector

RFID stands for which of the following

radio frequency identification

when referring to digital storage, RAID stands for

redundant array of independent discs

Using reflective material to store data that can be read using a laser is called ___ media storage

reflective

The term that describs how fast each pixel in a display is updated is

refresh rate

The number of pixels in a display is called the displays

resolution

the number of pixels in an image is called the images

resolution

The device that connects 2 networks is a ______

router

Your ___ can provide hardware firewall protection for you home network where it connects to the ISPs networks, just as ISP networks have firewalls where they connect to the internet

router

Because they're both Apple products, the browser that works smoothest with Macintosh OS X is called

safari

The accuracy of a digital recording is determined by the devices ____ rate

sampling

Increased data transfer will be less likely to have errors if you use a ____ USB cord

shorter

because a metal platter is physically spinning, hard drives have _____ access times than solid state hard drives

shorter

in general the ___ the access time, the faster the hard drive

shorter

a processor comprised of one control unit and one ALU is called a

single core processor

Contact your ISP if your actual internet speed id ____ than advertised

slower

the average tablet computer has a ___ hard drive than the average desktop computer

smaller

a combination input and output device that allows users to interact with large computer displays that is sometimes found in classrooms is called an interactive whiteboard or a

smartboard

specialized hardware or software that capture packets transmitted over a network are called packet

sniffers

an unsolicited email message is called

spam

which of the following would be considered a cybercrime

spam

select the smartphone input device

speaker???

To improve the sound quality of their smartphones, many users purchase larger external ____ to listen to music

speakers

Select the sites that offer Internet speed test services

speedof.me---TestMy.net---- speedtest.net-----fast.com

devices that allow for the retention of data when your computer has been shut down are called ______ devices

storage

the component of a computer that allows data to be retained after power is turned off is referred to as

storage

A security system separating 2 networks or even computers on the same network is called a

switch

a computer that is highly mobile, has a smaller OS and uses a touchscreen as the primary input method is called a _____

tablet/smartphone

because of their compact size, touchpad are most often used with __ computers

tablets/smartphones

a thousand gigabytes equals one

terabyte

a kilobyte is equal lot approximately one ____ bytes

thousand

because they're inexpensive and reliable ____ have become extremely popular storage devices

thumbnails (USB or flash drives)

Laser printers are popular in offices because they use relatively inexpensive

toner

TO create an image with a laser print ____ is drawn to the drunk

toner

The highest level in the domain name hierarchy is known as the

top level domain

used in variety of devices including ATMS and point-of sale terminals _____ allow for the input of data with the use of a stylus or finger

touchscreens

if you buy a new computer game that emphasizes graphics, or new photo/video editing software for your desktop computer, you may want to purchase a new ___ card

video

the technology that uses cameras, microphones, displays, speakers and software to allow users to both see and hear each other is called

video conferencing

most smartphones and tablets produced today use a _____ keyboard

virtual

software that infects a computer and is created using computer code is called a computer

virus

with ___ recognition technologies, frequency, pitch, speed rhythms and other characteristics are charted and compared to existing records

voice

persistent cookies store information about

web site preferences

a camera that takes photos or streams video into a computer or over the internet is called a ____

webcam

non-malicious computer security experts that test the security measures of an organizations information systems to ensure they are protected against malicious infusions are called

white hat hackers

Many cellular ISPs offer modem/router combination devices that can create a ______ wherever theres adequate cell service

wifi hotspot

A signal transmitted every few seconds by a wireless router so that users computers can find the wifi hotspot is called a ______

wireless

the maximum number of bits per instructions that a CPU can process during 1 machine cycle is called

word size

a destructive program that replicates itself throughout a single computer or across a network is called a

worm

a computer controlled by a hacker is called a

zombie


Related study sets

Chapter 11: Building A Small Network

View Set

WEEK 3 (cladistics, phylogeny, early life on earth)

View Set

Chapter 8 Project Quality Management

View Set

Types of life policies and Annuities

View Set

Chapter 17. Understanding Accounting and Financial Information

View Set

Chapter 11: Laws and Rules - Connecticut

View Set