CGS mid term exam

Ace your homework & exams now with Quizwiz!

25 GB

Blu-rays provide approximately ___ of storage space.

persistent

Cookies stored on a computer's hard drive and used to collect and store information about user preferences, password and username information, IP address, and/or data on web surfing behavior are called ___ cookies.

byte

One character of information, for example, a letter or a number consists of one ___ of storage

defense

SAGE was developed by the US Department of ___ .

color depth

The number of bits of data describing each pixel in a display is referred to as ___ .

larger

Lower range tones generally require ___ speakers.

DDoS

An attack on a network that is designed to interrupt or stop network traffic by flooding it with too many requests is called a _____ attack.

bit

The smallest unit of data storage is a ___ .

MEMS

The technology (chips) that allow cell phone microphones and hearing aids to be so small is the _____ chip.

refresh rate

The term that describes how fast each pixel in a display is updated is ___

toner

To create an image with a laser printer ___ is(are) drawn to the drum.

uniform

URL stands for ___ Resource Locator.

dynamic

Using a stylus and touchpad to map the signature and also measure pressure, pen angle, pen up/down, speed, etc, is known as what type of signature recognition?

plasma

Using cells of ionized gas to create images, ___ displays are actually becoming less popular.

In general, the more data being transmitted, the shorter the cord should be.

Which is true regarding the length of a USB cord?

is enhanced

With optical zoom, resolution ____ when focusing on distant objects.

ROM

_____ is actually storage since it retains data and info when the power is turned off

unicode

a coding scheme using at least 6 bits to represent a character

tablet

a computer that is highly mobile has a smaller OS and used touchscreen

computer

a digital device that accepts input and stores the input, and provides output is a __________

billion bytes

a gigabyte equals one b_____ bytes

thousand

a kilobyte is equal to approximately one _______ bytes

million bytes

a megabyte equals approximately one _________ bytes

laptop

a mobile hinged computer with an integrated keyboard that uses a full operating system is called a notebook or a ________ computer

bluetooth is

a short range wireless transmission protocol

control panel

a site on the windows operating system where you can uninstall programs adjust settings and manage tasks is the ________

one trillion bytes

a terabyte equals approximately one __________ bytes

terabyte

a thousand gigabytes equals

infared waves

a tv remote uses -

MHz

abbreviation for mega hetrz

buses

data flows between different parts of the computer via buses

apple

firewire connectors were developed for ______ computers

fetch, decode, execute, store

four steps of the machine cycle

intel

largest chip designing company

optical drives

many manufacturers have made ________ optional equipment when purchasing a new laptop computer

electronic

memory is ______ and has no moving parts

256GB - 1 TB

most new laptop computers come with how much storage

SSD

most tablets and phones use ______ as their main storage device

hertz

one cycle per second

2-4 gigahertz

personal computer CPU clockpeeds range between

wifi

protocol for wireless networks

overclocking

running the processor faster then recommended

GPU

the _____ is a computer within your computer that creates images

L1

the __________ cache is located directly on the processor itself

native resolution

the actualt number of pixels on a monitor is called

color depth

the amount of data that defines each pixel is called

clock speed

the number of instructions the CPU can process per second is dictated by the ________ of the processor

bluetooth

waves can pass through walls

terabyte

which of the following represents the highest amount of storage -megabyte -gigabyte -terabyte -kilobyte

hacker

A form of spyware that records all actions typed on a keyboard is called a _____ logger.

botnet

A group of compromised computers controlled by a hacker.

cookie

A small text file of information created by websites you visit that your web browser stores on your hard disk is called a(n) _____.

optical drive

A storage device that uses lasers to read CDs, DVDs, or Blu-ray discs is referred to as a(n) ___ .

optical

In photography, there are 2 ways to focus on distant objects, digital zoom and ____ zoom.

smaller

the average computer has a ______ dard drive then avereg desktop computer

clock rate

the clock speed or __________ is the speed at which the processor runs the operations required to run a digital device

word size

the max number of bits per instruction the CPU can process within a machine cycle

ALU and control unit

two parts of the processor are

shorter

Increased data transfer will be less likely to have errors if you use a ___ USB cord.

below

Inkjet printers are often sold ____ their production cost.

checks

Magnetic Ink Recognition (MICR) is a technology that is most commonly seen on ____

capacitance

Most touchpads use _____ to sense when a finger has moved across the pad.

white hat hackers

Non-malicious computer security experts that test the security measures of an organization's information systems to ensure they are protected against malicious intrusions are called ___.

PPM

Printer speed is described using which acronym?

adio frequency identification

RFID stands for which of the following.

plug ins

Software that can be added to a browser to increase its functionality are called ___ .

adware

Software that collects the user's web browsing history and uses the data collected to create unsolicited targeted pop-up advertisements is called _____ .

virus

Software that infects a computer and is created using computer code is called a computer _____.

sniffers

Specialized hardware or software that capture packets transmitted over a network are called packet _____

sampling

The accuracy of a digital recording is determined by the device's ___ rate.

resolution

The number of pixels in an image is called the image's ____

character

The technology that allows any text, even handwritten scrawls, to be digitized is known as optical ___ recognition

WPA

The wireless network privacy standard that was introduced in 2003 but was quickly replaced (due to numerous vulnerabilities) was known as ___ .

NFC

A commonly-used short range wireless technology used for data transfer and electronic payments is called ___

zombie

A computer controlled by a hacker is called a _____.

pharming

A type of phishing that seeks to obtain personal information through malicious software that is inserted on a victim's computer is called _______ .

plotter

A type of printer that is used to print large graphic images such as architectural drawings by mechanically moving a pen over a large sheet of paper is known as a ___

broadband

An Internet signal that has enough bandwidth to allow multiple computers to be connected to the same router is called a ___ signal.

memristor

An electronic element that stores data by changing its resistance based on the current that has passed through it (similar to RRAM) is called a(n) ___

contrast ratio

Description of difference in luminance of white pixels vs black pixels is

hacktivism

Hacking for a politically or socially motivated purposes. Uses same techniques as a hacker but does so in order to disrupt services and bring attention to a political or social cause.

OMR

The technology that uses the reflection of a laser of the graphite left by a #2 pencil to determine if a bubble has been filled in is called.

OLED

Though currently expensive, curved and paper-thin displays are possible using ___ display technology.

single core processor

a processor compromised of one control unit and one ALU is called a

1920 x 1080

full HD resolution is expressed as :

cache

in addidtion to the RAM, modern processors temporarily keep data in a _______

ROM

instructions needed to boot up a computer such as the bios are stored in the

bus width and clock speed

two major factors that impact processor speed are

gigabytes

typical SSD capacities are measured in _______

touchscreens

used in a variety of devices including ATMS and point of sale terminals _________ allow for the input of data with the use of a stylus or finger

operating system

what manages hardware and software supports computers basic functions and runs programs

4 - 8 GB

when you buy a new laptop how much RAM should it come with

most widely used OS for smartphones and tablets

which of the following is a strength of the android platform

free to download and use

which of the following is a strength of the linux platform

microsoft works 6-9 computer

which of the following might be risky to uninstall from a windows PC laptop

kilobyte

which of the following represents the least amount of storage -kilobyte -gigabyte -gigahertz -megabytes

protective capacitive

which type of touchscreen uses a single metallic created panel and uses electricity to calculate touch points

microsoft

windows OS is owned and maintained by

MIDI ports

all of the following are common ports that are included with laptop computers except -HDMI ports -USB ports -MIDI ports -ethernet ports

finder

an application that navigates all of the files and folders on your MAC is the _____


Related study sets

Macro Midterm #5 (Ch 15,16,17, & 18) NOTES

View Set

ISTQB Foundation Extension Agile Tester Chapter 3: Agile Testing Methods, Techniques, and Tools

View Set

(Chapter 16 HW) Exchange Rates and International Capital Flows

View Set

The Great Gatsby Vocabulary Chapters 1-3

View Set

Chapter 48: Care of Patient with Ear Problems

View Set