cgs final

Ace your homework & exams now with Quizwiz!

single core processor

A processor comprised of one control unit and one ALU is called a ____ .

paas

A programming environment used to develop, test, and disseminate web apps via the Internet.

control panel

A site on the Windows operating system where you can uninstall programs, adjust settings, and manage tasks is the _____.

optical drive

A storage device that uses lasers to read CDs, DVDs, or Blu-ray discs is referred to as a(n) ___ .

IR

A television remote usually uses ___ waves.

500 gb- 1 tb

A typical laptop has a storage capacity of approximately ____ .

g2b

All of the following are considered e-commerce transactions except

open edu resources

All of the following are protected against unauthorized use or distribution by intellectual property laws except

script kiddies

Amateur computer hackers with little programming expertise that illegally gain access to computer systems using programs (scripts) that others have written are called _____ .

HDX

Amazon offers 2 lines of tablet computers, the Amazon Fire and the Amazon fire

broadband

An Internet signal that has enough bandwidth to allow multiple computers to be connected to the same router is called a ___ signal.

ddos

An attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests is called a _____ attack.

memristor

An electronic element that stores data by changing its resistance based on the current that has passed through it (similar to RRAM) is called a(n) ___ .

peripheral

An input, output or storage device connected to a computer is known as a(an) _____

laas

An organization uses servers in the cloud instead of buying and maintaining storage servers for their day-to-day business operations.

cache

In addition to the RAM, modern processors temporarily keep frequently accessed data in a _____.

optical

In photography, there are 2 ways to focus on distant objects, digital zoom and ____ zoom.

magnetic hard drives

Most desktop computers use ___ to store data.

256gb- 1 tb

Most new laptop computers come with how much storage?

virtual

Most smartphones and tablets produced today use a _____ keyboard

ssd

Most tablets and phones use _____ as their main storage device.

capacitance

Most touchpads use _____ to sense when a finger has moved across the pad.

white hat hackers

Non-malicious computer security experts that test the security measures of an organization's information systems to ensure they are protected against malicious intrusions are called ___.

2 to 4 gigahertz

Personal computer CPU clock speeds range between _______ .

helium > traditional hard drives

Platters spin faster,Platters stay cooler,More platters can be placed in the same amount of space

3D mapping, feature charting, skin texture analysis

Select the technologies used by facial recognition software.

separation

Social networking is based on the six degrees of _____ concept which posits that you can connect with anyone through a chain of no more than six introductions or personal links.

adware

Software that collects the user's web browsing history and uses the data collected to create unsolicited targeted pop-up advertisements is called _____ .

3D

Sometimes used to create prototype models for casting, ___ printing is also known as additive manufacturing.

UBE

Spam messages are sometimes referred to as ___.

voice pitch, voice frequency, speech rhythms

Speech recognition software uses which of the following characteristics?

native

The actual number of pixels in a monitor is called ___ resolution

ergonomics

The art and science of creating output that provides information in the most useful manner is called ___ .

bandwidth

The capacity of a particular transmission medium is called its _____.

dot pitch

The distance between two adjacent sub-pixels on a display is referred to as ___ .

saas

The distribution of computer applications over the Internet. Commonly referred to as web apps.

cube

The first commercially available computer with a graphical user interface was NeXT's ___ computer.

file transfer

The protocol used for transmitting large files from one server to another over the Internet is known as the ___ Protocol (FTP).

WPA2

The standard for wireless network privacy and protection is known as ___ .

title 5

The titles in the DMCA that directly impact digital copyright issues include all of the following except

bandwidth

The volume of data that can be carried on an Internet transmission media in an amount of time is called _____.

aspect ratio

The width of a screen compared to the height of a screen is referred to as ___ .

your antivirus software will ensure that your files are safe

There are risks associated with downloading content from the Internet. It is important to consider all of the following when downloading from the Internet except

windows phone

Though not yet commercially successful, the ___ was developed by one of the worlds largest software manufacturers

toner

To create an image with a laser printer ___ is(are) drawn to the drum.

ongoing

Two common categories of cybercrimes include single events and _____ series of events.

optical

Using reflective material to store data that can be read using a laser is called ___ media storage.

projective capacitive

Which type of touchscreen uses a single metallic-coated panel and uses electricity to calculate touch points?

remains the same

With optical zoom, resolution ____ when focusing on distant objects.

TPS

which category of management information systems (MIS) focuses on tracking sales and inventories

1920 x 1080

"Full HD" resolution is expressed as:

cybercrime

A crime in which a computer is the object of the crime or is used to commit a crime or offense is called _____.

wire-wire

A form of email fraud where criminals change the account where money is being transferred is called a ______ scam

botnet

A group of compromised computers controlled by a hacker is called a _____.

megabyte

A million bytes of data equals approximately one ___

hacker

A person who gains unauthorized access to networks and in order to steal and corrupt information and data is called a _____.

cyberterrorist

A person who uses computers and the Internet to launch attacks against computer systems for political or ideological reasons is called a ___.

longer

Because a metal platter is physically spinning, hard drives have ___ access times than solid state hard drives.

data

Being able to surf the web, watch videos, and listen to streaming audio is why call service with a _____ plan is extremely popular in the US

peer to peer

BitTorrent utilizes no central server, instead opting to utilize a _____ structure where each device connected to a network has equal access to the shared files.

pits and lands that are read by a blue spectrum laser beam

Blu-ray stores data using ___ .

mbps

Broadband is measured in _____ .

buses

Data flows between different parts of the computer via _____ .

electronic date interchange

EDI stands for ___ .

cloud

Emailing a file to yourself is an example of using ___ storage.

video

If you buy a new computer game that emphasizes graphics, or new photo/video editing software for your desktop computer, you may want to purchase a new ___ card.

drag

If you have 2 folders open on your desktop and you want to move a file from one folder to the other, simply ___ the file.

below

Inkjet printers are often sold ____ their production cost.

graphical

Letting computer users drag images and documents across their computers' monitors made the ___ User Interface very popular.

unicode

Many computers today use _____ which is a coding scheme using at least 16 bits to represent a character.

optical drives

Many manufacturers have made _____ optional equipment when purchasing a new laptop computer.

radio frequency ID

RFID stands for which of the following

prepare, analyze, data

SDLC 3 phases

cold

Sage was developed during the _____ war.

lcd, led

Select the acronyms that describe a type of computer monitor.

GPU

The ___ is a computer within your computer that creates images.

sampling

The accuracy of a digital recording is determined by the device's ___ rate.

top level domain

The highest level in the domain name hierarchy is known as the ___ .

trade

The main governmental organization that oversees Internet privacy is the Federal ___ Commission.

cyberattack

The malicious use of computer code to modify the normal operations of a computer or network is called a ___ .

right click

The most common method of renaming files and folders is to simply __ on the item and select Rename.

apple

The mouse was developed by which company?

resolution

The number of pixels in a display is called the display's ___ .

resolution

The number of pixels in an image is called the image's ____ .

search

To look for a file or folder in Windows 10, just type the file name in the __ box.

intellectual

To protect against unauthorized software use, sale, or distribution of software, music, movies, video games, and many other digital products, there are ___ property laws.

ctl + x

To remove a file from one folder and place it in another, click on the item and press ___, then move your cursor to the new location and press CTRL + V.

2

Twitter recommends using no more than ___ hashtags per Tweet.

holographic

Using refracted laser light to store data on a photoreceptive substrate is essentially how ___ storage works. Theoretically this could store gigabytes of data within a cubic millimeter

W3C

What group determines the standards for the World Wide Web?

operating system

What manages hardware and software, supports the computer's basic functions, and runs programs?

usb port

What type of port do most digital devices use to attach peripherals?

active pixel sensor

When discussing digital cameras or smartphone cameras with APS CMOS, APS stands for ___ .

double click

When you ___ a file Windows should automatically open it. If it can't Windows will prompt you to select the correct app to open the file.

SCMS

Which category of management information systems (MIS) combines the forecasting capability of decision support software with the records keeping capability of transaction processing systems software to help businesses manage inventories efficiently

shorter, more data

Which is true regarding the length of a USB cord?

a transistor, a hole in a punch card

Which would be used to store a single bit of data?

file explorer

You created a flyer and saved it in your Documents folder. To find this file you could open Cortana (in Windows 10) and type the flyer's name in the search window, or you could click on the ___ icon (all Windows versions, on your toolbar) and access the Documents folder from there.

zombie

Your computer has been attacked and overtaken by a hacker. The hacker has control over your computer and can now use it to launch attacks on other computers and systems. Your computer is known as a ____ computer.

flowchart

a graphic representation of a process is called a

zip

a lossless compression format

top-down

a programming design that breaks down a problem into a series of tasks is called ___ programming

storage

adding a microSD (when possible) increases your phone's capacity

flowchart

after the problem has been clearly defined, the next step in the PDLC is the create or plan an algorithm. this plan is usually written as a ____ and is written in an ordinary language, such as english.

english

after the program has been clearly defined, the next step in the PDLC is to create the plan or algorithm. this plan is usually written as a flowchart, and is in written in an ordinary language such as ___

mcafee, norton, avg, google

anti-virus software options

WAV, mp4

audio file compression formats

swift

because objective c was difficult to write in, apple developed ___, a programming language for writing software for the Mac OS and the IOS

AUPs

business owners, copyright holders, and network administrators publish ____ so that users understand what is expected and permissible when they use the network, computer equipment, and/or software

base transceiver station

cell towers are connected to

thermal printer

commonly used for receipts

IT system

computer hardware and software that an organization uses to increase its performance is referred to as its ____

programming

converting a task into a commands that a computer can use to perform the task is called ___

rootkits

create backdoor programs, delete files, install rogue files

diamond

decision point

displays refresh rate

describes how fast each pixel in a display is updated, The higher the refresh rate, the smoother the video, describes the number of times per second a frame is advanced in a video, Videos play best with refresh rates at even multiples of the frame rate.

extensible markup language

designed to display documents on the web, this version of the HTML set of protocols provides a smooth interface between natural language and machine language by wrapping data in tags for web display

screen resolution

equals the number of pixels in a display, measures image quality

register

extremely small amount of memory (measured in bits) located throughout the processor

JPEG, PNG

image compression formats

language

instructions (software) that allow a computer (hardware) to be used are written using specific symbols, letters and numbers known as a programming ____ or code

RAM

largest memory of a computer, connected to the processor via the front side bus

L1 cache

memory located directly on the processor itself

javascript, C++, english, java

once an algorithm or plan has been created, the next step in the PDLC is to write the coding for the program. This highly structured process may be completed using which languages?

blu ray and dvd player

optical drives?

thermal printing

paper turns black when heated, commonly used for printing receipts

rectangle

process or procedure

shorthand

pseudocode is written in a natural language, but often including programming ___ to assist in writing the program itself. pseudocode is the term that describes an intermediate step in creating an algorithm from a flow chart.

development

purchasing the necessary software for the system is the part of the system ___ step in the SDLC process

compress a file

reduce storage space requirements, reduce bandwidth needed to transmit a file

lossless

reduces space required by reducing redundancy within files

lossy

reduces space required by removing less valuable data

cache

relatively small amount of memory (measured in kilobytes or megabytes).

video

some apps that use a surprising amount of data are those that include embedded

oval

start point or finish point

traditional hard drive

stores data magnetically, contains read/write heads, contains platters

digital- analog converters

the devices inside your phone that convert analog waves (such as sounds waves) into digital signals that your phone can process are called

investigation

the first step in the SDLC involves defining the problems that the IT system should address, examining various alternatives and reporting the findings. This is referred to as the ___ step

first level managers

use information systems for recording line employee performance

middle managers

use information systems for recording line employee performance

top level management

use information systems to for see corporate opportunities and threats

plotter printer

used for drafting or blueprints

ink jet printer

uses ink cartridges

dvd

uses pits and lands to store data, holds approximately 4.5 GB of data

laser printer

uses toner cartridges

top level managers

using information systems to help for see corporate business opportunities and threats might be done by all levels of management, but it is most important for which management level

galaxy, note

what devices are manufactured by samsung

management information systems

when referring to business info tech MIS stands for

DSS

which category of management information systems (MIS) focuses on providing forecasting capabilities for sales and production?

pseudocode

written in a natural language, but often including programming shorthand to assist in writing the program itself, ____ is the term that describes an intermediate step in creating an algorithm from a flow chart.


Related study sets

FDMA 2855-Social Media Marketing Tools

View Set

Cambridge English Profile Level C1

View Set

CGS Chapter3: Application Software

View Set

ATI assessment B Med/Surg II (Yamile)

View Set

History & Systems Quiz 2 (Ch. 3-6)

View Set

Foundations of the Restoration Midterm 1

View Set