Chapter 1-8 Overview EXAM #1 CRUHL
The rule of 72 states that dividing 72 by the interest rate approximates the time for the investment to double. This calculates the ___________ of the investment
Future Value (FV)
The level of complexity of the programming language, or the degree from which it is separated from machine language itself, is called the __________ of the programming language.
Generation
Most laptops have hard drive capacities measured in ___________ or terabytes
Gigabytes
While not actually a programming language, ____________ refers to the protocols that allow content to displayed on Web.
HTML5
A category of cyberterrorism that focuses on hacking computer systems for politically or socially motivated purposes is ___________.
Hacktivism
Phased:
Implements new areas of the system in a predetermined period of time.
SDLC steps in order?:
Investigation, analysis, design, development, implementation, and maintenance.
A form of spyware that records all actions typed on a keyboard is called a _________ logger.
Keystroke
One thousand bytes equals a _________.
Kilobyte
The _____ cache is located directly on the processor itself.
L1
Instructions (software) that allow a computer (hardware) to be used are written using specific symbols, letters and numbers known as a programming _________ or code.
Language
How does a laser printer work?
Laser removes electrons from the drum, paper is fed between the drum and the toner, charged toner is attracted to the drum, and toner is melted onto the paper.
The technology that musicians often use to connect their instruments to computers is _________.
MIDI
This technology allows musicians to create written sheet music simply by playing an instrument.
MIDI
A popular lossy video and audio compression format is:
MP4
When compared to cell phone cameras, most point-and-shoot cameras use photographic technology that is ________.
Nearly the same
Which are common types of servers?
Network, File, and Web Server
Define the term "resolution" in output devices:
Number of pixels in a display and quality of the image.
Frame Rate is:
Number of times per second a frame in a video is advanced.
Has the best possible contrast ratio
OLED
Most cellphone cameras do not have __________ zoom capability.
Optical
What type of media are DVDs and Blu-rays?
Optical
OMR stands for which of the following?
Optical Mark Recognition
Microsoft's Hotmail email service has now transitioned to Microsoft __________.
Outlook
Devices such as speakers, printers, and external keyboards are examples of:
Peripherals
When money is borrowed, the __________ value of the loan (the principal) is the initial amount of money borrowed.
Present
All computations and activities in a digital device are conducted by the:
Processor
A set of rules for communication between devices that determines how data is transmitted and received is called a _________.
Protocol
A type of malware that is triggered each time you boot your computer is called a ___________.
Rootkit
What type of cookie is stored in temporary memory and is lost when the web browser is closed?
Session
Increased data transfer means you should use a __________ USB cord.
Shorter
Direct:
Shuts down the old system and starts the new system.
Dot pitch:
The closer the spacing, the sharper the image, a description of the quality of a monitor or television screen, and the distance between two adjointing sub-pixels in a display.
Decode
The instructions are converted into something the computer can understand
Active Pixel Sensor (APS), Complementary Metal-oxide Semiconductor (CMOS) technology is used in most digital camera smartphone cameras and webcams today.
True
Many computers today use ______, which is a coding scheme using at least 16 bits to represent a character.
Unicode
The technology that uses cameras, microphones, displays, speakers, and software to allow users to both see and hear each other is called:
Video conferencing
Sharing infected files and opening an infected email attachment are ways that a computer _________ can infect a digital device.
Virus
Voice frequency, pitch, speech rhythms, and other characteristics are charted and compared to existing records when using ________ recognition technologies.
Voice
Ransomware:
When activated, encrypts files on user hard drive and then sells a decryption program.
A form of Email fraud where criminals change the account where money is being transferred is called a __________ scam.
Wire-wire
The amount of bits a processor can work with at any given time is referred to as _________ size.
Word
A type of malware that replicates itself throughout a single computer or across a network is called a __________.
Worm
While not technically a programming language, ___________ refers to the protocols that allow content to be displayed on the Web.
XML
DVD-ROM cannot be _________
burned.
Each number, special character, and letter of the alphabet is represented as a ________
byte.
A high-speed storage area usually located directly on the CPU is called:
cache
Solid state drives store data using:
electronic circuits
The art and science of creating output that provides information in the most useful manner is called:
ergonomics
As you use your hard drive new files will be deleted and added. This can create a slower, _________ hard drive.
fragmented
The physical parts of a computer such as the system unit (like the tower unit above) or a monitor are referred to as computer __________.
hardware
DVDs use longer (red spectrum) _______
lasers
Windows 10 is an ___________ ____________
operating system
Software Development Process:
planning programming debugging beta review
The amount of money borrowed in a loan, sometimes referred to as the PV or the loan balance is the loan's:
principal
Number of times per second a frame in a video is advanced is the definition of frame ________
rate
DVDs and Blu-rays use _________ material to store data.
reflective
Triple click:
selects a paragraph
A processor composed of one control unit and one Arithmetic Logic Unit (ALU) is called a:
single-core processor
A thousand gigabytes equal 1 ______________.
terabyte
Bus _______ is measured in bits. A 64-bit bus can transmit 64 bits of data.
width
Disk cleanup steps:
-From the Start button menu, -If prompted choose the mass storage device that you want to clean up -In the Disk Cleanup dialog box, select the items you want to remove -Click OK, then Delete Files
Defragmenting hard drive steps:
-Open Disk Defragmenter by clicking the Start button, -Under Current status, select the disk you want to defragment -To determine if the disk needs to be defragmented or not, click Analyze disk. -Click defragment disk.
What is the Boot Process?
-The device is powered on and the CPU activates UEFI (BIOS) -Power-On Self-Test is executed -OS is loaded into RAM -OS checks the registry and loads saved configuration settings.
What is a bit?
0 or 1
One kilobyte equals _________ bytes.
1,000
Typical aspect ratios for monitors?
16:9 and 4:3
Ultra HD:
3840 x 2160 pixels
Also known as additive manufacturing (AM), ____________ printing sprays successive layers of material to create an object.
3D
CDs provide approximately _________ of data storage space.
700 MB
A byte is equal to ___ bits
8
Wi-Fi uses the ___________ protocol
802.11
A computer program that scans files to identify and remove computer viruses and other malicious programs is called _____________.
Antivirus software
Output
Anything created with a computer. Allows users to view numbers, characters, pictures, or projected images.
Literally meaning "life measure", _______ technologies enable accurate identification.
Biometrics
A channel over which information flows inside a digital device is called a:
Bus
________________'s can only be burned once.
CD-R
Hard drive _____ is the amount of storage you have available to save data and information.
Capacity
In the spreadsheet above the word Uber is found in B6. B6 is called a ___________ reference.
Cell
Examples of management information systems (MIS) include:
DSS, TPS, and ESS
Screen size is measured by the:
Diagonal distance between the upper right and lower left corners of the screen.
In photography, there are two ways to focus on distant objects: optical zoom and ________ zoom.
Digital
A computer that is integrated a larger device, such as a programmable thermostat is called a ___________ computer. It has a real time operating system (RTOS).
Embedded
Characeristics of an SSD.
Extremely fast and no moving parts.
Most tablets have SSD capacities measured in terabytes (TBs).
False
Network _______ Translation (NAT) provides a type of firewall protection by hiding internal IP addresses.
Address
Online nuisances:
Adware, spyware, and spam
Written in natural language and in the form of a flowchart, a programmer uses a(n) _________ to describe the problem the program will solve.
Algorithm
Fetch
An instruction is obtained from memory
The second step of the SDLC process involves collecting data about existing hardware and software, analyzing this data, and preparing specifications for the system. This is called the system ___________ step.
Analysis
The number of bits of data describing each pixel in a display is referred to as:
Color depth
What does CSV stand for?
Comma separated values
A program that takes a program written in C, for example, and converts it into machine code is called a C ____________.
Compiler
______________'s can be burned multiple times
DVD-RW
Memory used to increase a hard drive's efficiency:
Disk cache
Print quality (resolution) is measured in:
Dots per Inch (DPI)
What is a mouse called that fits the hand comfortably and can reduce the risk of repetitive stress injuries such as carpel tunnel?
Ergonomic
After the problem has been clearly defined, the next step in the PDLC is to create the plan or algorithm. This plan is usually written as a ___________, and is written in an ordinary language, such as English.
Flowchart
Overheating, humidity, and magnetic fields can cause damage to the _____________ of a digital device.
Hardware
The roles of directing IS technicians, working with senior management to procure and implement IS, and developing policies for corporate IS typically falls to the _________.
Information Systems (information technology) Program Manager
Virtual keyboards, buttons, cameras, and microphones are examples of some of the _________ devices found on a typical smartphone.
Input
A ___________ allows programmers to convert the source code line-by-line.
Interpreter
RFID Tags:
Inventory tracking, pet identification, and package shipment tracking.
JSON stands for:
JavaScript Object Notation
Memory located next to the processor:
L3 cache
May have a relatively slow refresh rate since it relies on molecular movement.
LCD
High-Definition ________ Interface is a standard interface for audio-video connectivity which allows for the transmission of high-definition audio and video signals.
Multimedia
The technology that provides a type of firewall protection by hiding internal IP addresses is called _________.
NAT
Apple Pay uses _______ for payment transfer.
NFC
When inputs can easily be placed into different categories or classes, a(n) ________ -oriented analysis works well.
Object
What type of server intercepts all messages between client and server to help avert a hacker or other intruder from attacking a network?
Proxy
The shorthand that programmers use while building an algorithm is called: _____________
Pseudocode
_______ is actually storage since it retains data and information when the power has been turned off.
ROM (Read-Only Memory)
With optical zoom, resolution ________ when focusing on distant objects.
Remains the same
Software that gives network administrators the ability to provide computer assistance from a central location by allowing them to display and control any computer on the network is called __________ software.
Remote Desktop
Data from the hard drive can reach CPU __________ than data from the RAM.
Slower
A combination input and output device that allows user to interact with large computer displays that is sometimes found in classrooms is called an interactive whiteboard or a ______.
Smartboard
DVDs store data using:
A reflective coating that has pits and lands.
Which audio compression format is used by Apple music?
AAC
Select the set of programs that allow data to be exchanged on a website without changing the website's display.
AJAX
Before you use your employer's computer network, you'll probably have to read and sign that you agree to abide by the network's ___________ use policy.
Acceptable
What 3 parts must be in a loop:
An initial value, a process, and a test condition.
Clock speed, also referred to as ________ ________ is the speed at which the processor performs the operations required to run a digital device and instructions executed by the digital device.
Clock Rate
A person who harms or harasses via information technology and networks in a repeated and deliberate manner is called a ___________.
Cyberbully
IDS, which stands for intruder ________ system, protects a network from hackers
Detection
Purchasing the necessary software for the system is part of the system __________ step in the SDLC process.
Development
Which category of management information systems (MIS) focuses on corporate database drill-down capabilities?
ESS
Memory, such as RAM or cache, is ____________ and has no moving parts.
Electronic (Solid State)
The study of human factors related to things people use.
Ergonomics
5GL
Extremely advanced. Uses statements (scripts) rather than algorithms.
Select the technologies used by facial recognition software:
Feature charting, skin texture measuring, and 3D mapping.
When you invest money the ___________ value of the your investment is how much you will have after a certain amount of time.
Future
Typical hard drive capacities for personal computers are measured in which 2 of the following?
Gigabytes and Terabytes
The speed of most modern processors is measured in: ________
Gigahertz
The depiction of image data on a display or output device are called:
Graphics
A unit of frequency representing one cycle per second is:
Hertz
Firewall software used to block a user's access to specific Internet content is called a(n) _________ filter.
Internet
Select the traits that are currently used for biometric identification.
Irises, stride, and fingerprints.
An object-oriented programming language that is popular for writing apps for Android phones and tablets is:
Java
What is true about packet sniffers?
Legitimate sniffers are used for routine examination and problem detection and unauthorized sniffers are used to steal information.
One million bytes equals a ________ of data. This is enough to store the text in approximately four books in plain text.
Megabyte
Apple Pay, Google Wallet and Android Pay all use _________ technology.
NFC
Though currently expensive, curved and paper-thin displays are possible using ______________ display technology.
OLED
Describe a computer programmer's algorithm:;
Often written in the form of a flowchart so that can be shared, and if necessary, edited by other programmers and written in natural language, such as English.
Parallel:
Old and new systems run side-by-side for a while.
For which of the following activities would a typical marketing department need a strong information system?
Online sales, updating the business's social media sites, and online advertising.
Typically computer viruses must be _________ to attack and do damage to a digital device.
Opened
Most cellphone cameras do not have _______ zoom capability.
Optical
The smallest controllable element of an image is called a(n) ___________.
Pixel
Creates image using cells of ionized red, blue, and green gas
Plasma
To convert sound waves into digital signals, each sound wave is ___________.
Sampled
What does SDLC stand for?
System Development Life Cycle
Execute
The processor completes the instruction
Store
The results are placed in memory before the next instruction is executed.
What's true of script kiddies?
They illegally gain access to computer systems using programs (scripts) that others have written and they are typically amateur computer hackers with little programming expertise.
The programming design that forces programmers to consider how the algorithm can be written in computer code by first breaking it down into smaller tasks is called:
Top-down programming design
What does TPS stand for?
Transaction processing systems
Computer hardware and software that an organization uses to increase its performance is referred to as its Information Technology (IT) _______________.
System
Right-click:
opens the menu options
Mary uses computers and the internet to launch attacks against computer systems for political or ideological reasons. Mary is considered a cyber-___________.
terrorist
The computer hardware and software that an organization uses to increase its productivity is referred to as an IT:
System
The final step in the system development life cycle is maintaining the system. Select the two phases of this step:
System audit and evaluation phase
USB drives use special _________ to store information.
Transistors
Often accompanying downloaded music or apps, programs that appear to be legitimate, but executes an unwanted activity when activated is called a __________.
Trojan
Spam messages are sometimes called ________ and are used for a variety of marketing purposes including selling products and services.
UBE
Things with storage:
USB drive, Blu-ray disc, ROM, and SSDs.
Lightning connectors were developed by:
Apple
The width of a screen compared to the height of a screen is referred to as:
Aspect Ratio
Judy wants to purchase a Blu-ray disc that can be recorded on multiple times. She should choose discs that are labeled:
BD-RE
Another name for a computer's processor is the _______.
CPU
A digital device that accepts input, processes and stores the input, and provides output is a ___________
Computer
Cache contains frequently accessed data and is _________ the computer's RAM
Much smaller than
Things with memory:
RAM, L3 Cache, and Processor registers
Specialized hardware or software that captures packets transmitted over a network are called packet ________
Sniffers
DeSean received an unsolicited email message from an unknown sender. This email was __________.
Spam
Ted installs computer software designed to prevent spam messages from entering his email inbox. This type of software is called a _________ filter.
Spam
4GL
Specifically designed for creating database management programs.
Software that collects information about your Internet surfing habits and behaviors is called __________.
Spyware
Pilot
Starts in one area of the organization and then is deployed to the rest of the organization.
Blu-ray discs and DVDs are __________ media.
Storage
The component of a computer that allows data to be retained after power is turned off is referred to as _______________.
Storage
Characteristics of a traditional hard drive:
Stores data magnetically, Platter, Read/write head
Because Objective-C was difficult to write in, Apple developed __________ , a programming language for writing software for the Mac OS and the iOS.
Swift
Popular in the 1990s, the blue port in the image is used to connect computers to monitors or televisions. It is a ______ port.
VGA
To make a calculation always refer to a specific cell when copying it using the fill handle, make the cell a(n) _____________ reference.
Absolute
Smartphone cameras work by focusing incoming light onto what type of array that captures images.
Active Pixel Sensor
Many hands-free devices and other mainstream computer input tools have resulted from the creation of ______ use technologies
Adaptive
Technologies that permit alternative means of entering data into a digital device, such as using your voice to write text messages, are referred to as ____________ technologies.
Adaptive
Monitoring database systems performance, developing and maintaining databases, and establishing user privileges for databases are usual roles of a Database _______________.
Administrator
Collecting data, interpreting information gleaned from a database, and preparing reports for senior management are tasks that are typically assigned to a data __________.
Analyst
2GL
Assembly language. An assembler converts 2GL into machine language.
Worms:
Automatically reproduces itself.
The 3rd generation programming language that most students learned when most computers used MS DOS was ____________. It remains a safe programming language for using 3rd party code and provides a coding standard that integrates easily with other programming languages.
BASIC
_______ provides short-distance wireless communication between electronic devices using extremely low power radio signals.
Bluetooth
Black hat hackers
Break into computer systems with the intent of causing damage or stealing data
If you plan to write software for PC games you should probably learn C or ___________.
C++
You made a simple spreadsheet for an online class assignment for a group project and want all group members to be able to open it regardless of what spreadsheet program they use. Which format would be the best to use?
CSV
Memory and _______ hold data used by processors
Cache
Which of the following are input devices commonly found in a smartphone?
Camera & Microphone
What does DDoS stand for?
Distributed Denial of Service
Data theft
Employees who are leaving their jobs sometimes think they have a right to take copyrighted material that they created for the business, even though it doesn't belong to them.
Executives rely on _________ software because it provides tools to run an entire corporation.
Enterprise Resource Planning
To allow hard disk drive platters to spin more smoothly and cooler, some manufacturers seal the platters in ___ instead of air.
Helium
3GL
High-level programming language. Uses a complier to convert into machine language.
Because they have no moving parts, SSDs costs tend to be _______ than traditional (magnetic) hard drives
Higher
A refracted laser beam striking a photoreceptor from many different angles allows ___ storage to retain many bits of data in the same location.
Holographic
Which statements refer to a display's contrast ratio?
In general, the higher the contrast ratio, the better the image quality, describes the difference in brightness, and luminance of white pixels compared to black pixels.
The two methods of identifying people by their eyes are retina scanning and _________ scanning.
Iris
An object-oriented programming language that is popular for writing apps for Android phones and tablets is ____________.
Java
Only $2.99/month A programming language that uses HTML scripts to make creating Websites and Webpages much faster is __________.
Javascript
What does JPEG stand for?
Joint Photographers Expert Group
To create a reminder in Windows 10, click Cortana and then click the ____________ sign.
Light Bulb
A decision point in a flowchart that asks a question and has 3 parts (an initial value, a process, and a test condition) is called a _____________.
Loop
Because it reduces an audio file's sampling rate to save space, the MP3 format is a ______________ compression format
Lossy
Fetch, decode, execute, and store are steps of the ________ cyle.
Machine
1GL
Machine language. Represented by a series of 1s and 0s.
Malware is short for ____________ software.
Malicious
Experts suggest using password __________ software to keep your passwords safe.
Management
MIS stands for:
Manager Information Systems
Two or more complete processors residing on the same chip and can execute two or more sets of instructions at a time is called a ___________-core processor.
Multi
Items that can be connected to a digital device are referred to as ______
Peripherals
Server banks have storage capacities measured in _____________ of data.
Petabytes
Creating a fake webpage to trick victims into divulging personal information is a type of phishing known as __________.
Pharming
What does RAID stand for?
Redundant Array of Independent Discs
The term that describes how fast each pixel in a display is updated is:
Refresh rate
The number of pixels in an image defines the picture's ___________.
Resolution
Software programs that hide in the operating system and allow for the installation of hidden files are called:
Rootkits
If you notice you are receiving fake antivirus messages, power down your computer and reboot your computer in ___________ mode.
Safe
The ________ the access time, the faster your data will reach your processor.
Shorter
The technology that allows any text, even handwritten scrawls, to be digitized is known as optical ________ recognition.
Character
The technology that allows any text, even handwritten scrawls, to be digitized is known as optical _________ recognition.
Character
Magnetic Ink Recognition (MICR) is a technology that is most commonly seen on _________.
Checks
Emailing a file to yourself is an example of using ___________ storage.
Cloud
The number of bits of data describing each pixel in a display is referred to as __________ depth.
Color
White hat hackers
Computer experts that attempt to hack into a network to ensure that it is protected against intrusions.
The specialized end of a cord, plug, or expansion card that connects into a port is called a _________.
Connector
To adjust your Windows computer's time and date settings, it's often easiest to go to the ___________ panel.
Control
A deliberate misuse of computers and networks, ___________ use malicious code to modify the normal operations of a computer or network.
Cyberattacks
A crime in which a computer is the object of the crime or is used to commit a criminal offense is called _________.
Cybercrime
DSS stands for:
Decision Support System
PDLC 6 steps:
Define the problem, creating a plan, writing the code, testing the code, debug the code, and documenting the program
To reduce the time it takes to find files on a hard drive it is a good idea to __________ your hard drive.
Defragment
The third step of the SDLC has 3 phases, specifically, developing several system proposals, selecting the most feasible proposal, and reporting on the selected system to be developed. This step is called the system _______ step.
Design
Using a stylus and touchpad to map the signature and also measure pressure, pen angle, pen up/down, speed, etc., is known as what type of signature recognition?
Dynamic
What is a Solid State Drive? (SSD)
Electronic storage devices that are used in a variety of products. SSDs have no moving parts, which makes them faster and more durable than hard drives.
The technology (chips) that allow cell phone microphones and hearing aids to be so small is the _________ chip.
MEMS
When referring to management information systems, SCMS stands for supply chain __________ software.
Management
Initially, the United States Computer Emergency Readiness Team (US-CERT) determined that these 2 vulnerabilities would necessitate replacing a significant number of Intel and AMD computer processors.
Meltdown and Spectre
An electronic element that stores data by changing its resistance based on the current that has passed through it (similar to RRAM) is called a(n) ___
Memristor
A type of printer that is used to print large graphic images such as architectural drawings by mechanically moving a pen over a large sheet of paper is known as a _____.
Plotter
The most common computer keyboard is named for the first six letters on the top row of letters and is sometimes referred to as a _________ keyboard.
QWERTY
Once the virus is identified the antivirus software attempts to remove the virus from the file. If the software cannot remove the infected file it will send the file to an isolated area on the hard disk called _____.
Quarantine
Because of their capability of storing data in multiple hard drives, data warehouses use __________ technology to ensure redundant data storage.
RAID
Because of its complexity, developing an IT system uses a process called the __________
SDLC