CGS 2060 (Gaitros) Midterm Spring 2018

Ace your homework & exams now with Quizwiz!

"Full HD" resolution is expressed as

1920 x 1080

FireWire was developed for ___ computers

Apple

Which optical drive media stores approximately 700 MBs of data?

CD

What is the major question that ARPAnet wanted to solve?

Could a network be built that would continue to work even if multiple parts collapsed

An attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests is called a _____ attack

DDos

Though it could theoretically hold terabytes of data for thousands of years in microscopic space, ____ storage using genetic maerical, is a distant storage option.

DNA

Which of the following would be considered a cybercrime?

Data manipulation

SAGE was developed by the US Department of ____

Defense

a DDoS attack is when computers that have been infected by a virus act as "zombies" and work together to send out illegitimate messages creating huge volumes of network traffic. The acronym DDos stands for

Distributed Denial of Service

A protocol commonly used to transfer large files from one server to another on the Internet is the ____

File Transfer Protocol

The ___ is a computer within your computer that creates images

GPU

A separate processor (computer) in your computer that enhances your video is called ___

Graphic processor (GPU)

Which is true regarding the length of a USB cord?

In general, the more data being transmitted, the shorter the cord should be.

The ___ cache is located directly on the processor itself

L1

A switch distinguishes between various devices within a network by their____

MAC

Connecting digital musical devices to computers is accomplished by using ___ ports

MIDI

Broadband is measured in ____

Mbps

An electronic element that stores data by changing its resistance based on the current that has passed through it (similar to RRAM) is called a ____

Memristor

Which of the following might be risky to uninstall from a Window's PC laptop

Microsoft Works 6-9 Converter

A commonly-used short range wireless technology used for data transfr​er and electronic payments is called

NFC

Though currently expensive, curved and paper-thin displays are possible using ____ display technology

OLED

Printer speed is described using which acronym

PPM

The place in a digital device where the data and programs that device is currently using are accessible by the processor is called

RAM

The instructions needed to boot-up a computer, such as the BIOS, are typically stored in ____

ROM

RFID stands for which of the following

Radio Frequency Identification

Because they have no mechanically moving parts, ___ provide extremely fast and efficient storage

SSD

A signal transmitted every few seconds by a wireless router so that users' computers can find the Wi-Fi hotspot is called a ____

SSID

The Word Wide Web was created through a collaboration led by ____

Tim Berners-Lee

Many computers today use ___ which is a coding scheme using at least 16 bits to represent a character

Unicode

URL stands for ____ Resource Locator

Universal

The original wireless network privacy and protection standard for Wi-Fi was known as ___

WEP

The standard for wireless network privacy and protection is known as __

WPA2

DVDs store data using

a magnetic coating that is sensed by a read/write head

Smartphone cameras work by focusing incoming light onto what type of array that captures images?

active pixel scanner

When discussing digital cameras or smartphone cameras with APS CMOS, APS stands for

active pixel sensor

software that collects the user's web browsing history and uses the data collected to create unsolicited targeted pop-up advertisements is calld

adware

What 3 items are needed to install a home WiFi network?

an internet signal a modem a router

The capacity of a particular transmission medium is called its ___

bandwidth

inkjet printers are often sold ____ their production cost

below

A gigabyte equals approximately one ___ byte

billion

Represented as either a 0 or a 1, a ___ is the smallest unit of data a computer can process

bit

A short-range wireless transmission protocol is known as

bluetooth

A group of compromised computers controlled by a hacker is called a

botnet

The two major factors that impact processor speed are clock speed and ____

bus width

Most touchpad use _____ to sense when a finger has moved across the pad

capacitance

The number of instructions the CPU can process per second is dictated by the ___ speed of the processor

clock

Clockspeed, also referred to as ___, is the speed at which the processor performs the operations required to run a digital device and instructions executed by the digital device

clock rate

The fact that data on servers is nearly always backed up onto other servers gives ____ storage a major advantage over other storage data methods

cloud

The amount of data that defines each color in a pixel is called

color depth

The number of bits of data describing each pizel in a displa​y is referred to as

color depth

A digital device that accepts input, processes and stores the input, and provides output is a ____

computer

A description of the difference in the luminance of a display's white pixels compared to the black pixels is called ___

contrast ratio

The two main components of a processor are the arithmetic logic unit (ALU) and the ___ unit

control

A small text file of information created by websites you visit that your web browser stores on your hard disk is called a _____

cookie

A person who uses a computer and the Internet to launch attacks against computer systems for political or ideological reasons is called a ___

cyberterrorist

Screensize is measured by the ___ across the monitor

diagonal

Using a stylus and touchpad to map the signature and also measure pressure, pen angle, pen up/down, etc. is known as what type of signature ecognition?

dynamic

Memory is ___ and has no moving parts

electronic (solid state)

Solid start drives store data using ____

electronic circuits

The art and science of creating output that provides information in the ost useful manner is called ___

ergonomics

The machine cycle consists of which 4 steps

fetch, decode, execute, and store

which transmission media has the largest bandwidth

fiber optic

Software that limits the material that a browser fetches or that a search engine displays are called ___

filters

Typical SSD capacities for tablet computers or smartphones are measured in ___

gigabytes

The visual image output that the computer creates is known as ____

graphics

The act of hacking or breaking into a computer system for politically or socially motivated purposes is called ___

hacktivism

To allow hard disk drive platters to spin more smoothly and cooler, some manufacturers seal the platters in ____ instead of air

helium

What is equal to one cycle per second

hertz

The cost of an SSD is ___ than the cost of a traditional hard drive

higher

Using refracted laser light to store data on a photoreceptive substrate is essentially how ___ storage works. Theoretically this could store gigabytes of data within a cubic millimeter

holographic

A television remote usually uses ___ waves

infrared (IR)

a form of spyware that records all actions typed on a keyboard is called a ____ logger

keystroke

Which of the following represents the least amount of storage

kilobyte

lower range tones generally require ___ speakers

larger

Because a metal platter is physically spinning, hard drive have ____ access time than solid state hard drives

longer

What is the name of a virus written in macro language and placed within a document or spreadsheet

macro virus

One of the largest data requirements in the future will likely be ____

mapping patients' genomes

A million bytes of data equals approximately one

megabyte

Megahertz is equal to one ___ cycles (or instructions) per second

million

The word modem stands for ___

modulator-demodulator

The actual number of pixels in a monitor is called ___ resolution

native

Using reflective material to store data that can be read using a laser is called ____ media storage

optical

The technology that allows any text, even handwritten scrawls, to be digitized is known as ____

optical character recognition

A storage device that uses lasers to read CDs, DVDs, or Blu-ray discs is referred to as an _____

optical drive

Running the processor faster than recommended is called ____. This can increase performance and speed but will also void the manufacturer warranty

overclocking

Paul Baran developed a technology called ____ switching that made the Internet possible and reliable

packet

An input, output or storage device connected to a computer is known as a ____`

peripheral

Cookies stored on a computer's hard drive and used to collect and store information about user preferences, passwords and username information, IP address, and/or data on web surfing behavior are called ____ cookies

persistant

A type of phishing that seeks to obtain personal information through malicious software that is inserted on a victim's computer is called ___

pharming

A request for an electronic "echo" or response from another computer or server is called a ____

ping

Blu-ray stores data using ____

pits and lands the are read by a blue spectrum laser beam

Using cells of ionized gas to create images, _____ displays are actually becoming less popular

plasma

A type of printer that is used to print large graphic images such as an architechtural drawning by mechanically moving a pen over a large sheet of paper is known as a ____

plotter

When referring to digital storage, RAID stands for ___

redundant array of independent discs

With optical zoom, resolution ____ when focusing on distant objects

remains the same

your ___ can provide hardware firewall protection for your home network where it connects to the ISP's network, just as ISP networks have firewalls where they connect to the internet

router

The accuracy of a digital recording is determined by the device's ____

sampling rate

In general, the ___ the access time, the faster the hard drive

shorter

A processor comprised of one control unit and one ALU is called a

single-core processor

The average tablet computer has a ____ hard drive than the average desktop computer

smaller

specialized hardware or software that captures packets transmitted over a network are called packet ___

sniffers

An unsolicited email message is called

spam

Devices that allow for the retention of data when our computer has been shut down are called ____ devices

storage

A thousand gigabytes equals one

terabyte

Because they're inexpensive and reliable ___ have become extremely popular storage devices

thumb drives (USB or flash drives)

laser printers are popular in the offices because they use relatively inexpensive ___

toner

to create an image with a laser printer ___ is drawn to the drum

toner

a terabyte equals one ___ bytes

trillion

If you buy a new computer game that emphasizes graphics, or new photo/video editing software for your desktop computer, you may want to purchase a new ____ card

video

software that infects a computer and is created using computer code is called a computer ___

virus

The maximum number of bits per instruction that a CPU can process during 1 machine cycle is called

word size

A destructive program that replicates itself throughout a single computer or across a network is called a

worm


Related study sets

Blood Bank Exam Simulator Questions

View Set

Principles of Management Multiple choice

View Set

science finals - questions that cannot be answered by science

View Set

Fluids, Electrolytes, and Acid Base Balance

View Set