Chapter 2, 3, 4, 5, and 6
TLS
(Transport Layer Security) Successor to Secure Sockets Layer (SSL), a security technique that provides encryption of all data that passes between a client and an Internet server.
AUP
(acceptable use policy)
Zombie army
(also called Botnet) groups of bots
Virus signature
(also called a Virus definition) a known specific pattern of virus code.
Dos Attack
(also called denial of service attack) An assault whose purpose is to disrupt computer access to an internet service such as the web or e-mail.
CA
(Certificate Authority) Authorized person or company that issues and verifies digital certificates.
CAPTCHA
(Completely automated public turing test to tell computers and humans apart)
RTLS
(Real time location system) track and identify the location of high-risk or high-value items.
SSL
(Secure Sockets Layer) Security technique that provides encryption of all data that passes between a client and an Internet server.
PaaS (platform as a service)
Cloud computing service that allows developers to create, test, and run their solutions on a cloud platform without having to purchase or configure the underlying hardware and software.
platform as a service (PaaS)
Cloud computing service that allows developers to create, test, and run their solutions on a cloud platform without having to purchase or configure the underlying hardware and software.
DaaS (data as a service)
Cloud computing service that allows users and applications to access a company's data.
IaaS (infrastructure as a service)
Cloud computing service that uses software to emulate hardware capabilities, enabling companies to scale, or adjust up or down, storage, processing power, or bandwidth as needed.
infrastructure as a service (IaaS)
Cloud computing service that uses software to emulate hardware capabilities, enabling companies to scale, or adjust up or down, storage, processing power, or bandwidth as needed.
Coding Scheme
Combination of 0s and 1s that represent uppercase and lowercase letters, numbers, and special symbols that are defined by patterns
2 Features of Read-Only Memory (ROM)
Data on these chips cannot be modified Nonvolatile - contents are not lost when power is removed from the computer
Input
Data that a computer accepts and processes is called _____.
Decrypt
Decipher into a readable form
Cellular Seizure Investigation (CSI) stick
Device used by cyberthieves to download sensitive data from phones and other mobile devices.
A ____ backup copies only the files that have changed since the last backup
Differential
Digits that Can Represent 2 States of Electronic Devices
Digit 0 - the electronic state of off (absence of an electronic charge) Digit 1 - the electronic state of on (presence of an electronic charge)
When a Botnet is used to attack computers of networks it is called a ______ DoS attack
Distributive
2 Features of Slate Tablets
Does not include a physical keyboard, the case is behind the display Keyboard options include an on-screen keyboard, a wireless keyboard, or a keyboard that attaches to the slate via a clip or other mechanism
Nonvolatile Memory
Does not lose its contents when power is removed from the computer Permanent
USB Adapter
Dongle that plugs into a USB port, enhances functions of a mobile computer and / or provides connections to peripheral devices
2 Common Types of RAM
Dynamic RAM Static RAM
DIMMs used in servers can provide additional reliability if they use which of the following technologies?
ECC
Address
Each byte resides temporarily in a location of memory Unique number that identifies the location of a byte in memory
clock cycle
Each tick of the system clock.
3 Common Consumer Tasks of SaaS Applications
Editing documents or photos Sending email messages Managing finances
byte
Eight bits grouped together as a unit.
*Byte*
Eight bits grouped together.
Byte
Eight bits grouped together.
bus
Electrical channel that transfers electronic bits internally within the circuitry of a computer, allowing the devices both inside and attached to the system unit to communicate with each other.
*Bus*
Electrical channel that transfers electronic bits internally within the circuitry of the computer, allowing the devices both inside and attached to the system unit to communicate with each other.
eCycling
Electronic Recycling
*Memory*
Electronic components that store instructions waiting to be executed and the data needed by those instructions.
memory
Electronic components that store instructions waiting to be executed and the data needed by those instructions.
3 Features of Memory
Electronic components that store instructions waiting to be executed by the processor, data needed by those instructions, and the results of processing the data (information) Usually consists of 1 or more chips on the motherboard or some other circuit board in the computer Stores 3 basic categories of items
transistor
Element of an integrated circuit that can act as an electronic switch that opens or closes the circuit for electrical charges.
Sound Card
Enhances the sound-generating capabilities of a microphone and output through external speakers or headphones
Trillions
How many instructions are supercomputers capable of processing in a single second?
6 Ways in Which Processor Chips Include Technologies
Improve processing performance Track computer hardware and software Diagnose and resolve computer problems Secure computers from outside threats Optimize and extend battery life Integrate wireless capabilities
0, off
In a binary system, the digit _____ represents that electronic state of ______
Device
In the educational practice of BYOD, what does D stand for?
____ uses software to emulate hardware capabilities, enabling companies to scale, or adjust up or down, storage, processing power, or bandwidth as needed.
Infrastructure as a Service
Digital forensics
(computer forensics, network forensics, or cyberforensics) the discovery, collection, and analysis of evidence found on computers and networks. involves the examination of computer media, programs, data and log files on computers, servers, and networks.
DDos
(distributed Dos) attack, A zombie army is used to attack computers or computer networks. (A more devastating type of DoS attack)
Malware
(short for malicious software) programs that act without a user's knowledge and deliberately alter the computer's operations. other classes of malware include back doors and spyware.
word size
...number of bits the processor can interpret & execute at a given time • In most computers, this is the same as the bus width
Platform as a Service
...o Allows developers to create, test, & run their solutions on a cloud platform w/o having to purchase or configure the underlying hardware & software
Data as a Service
...o Allows users & apps to access a company's data
eCycling
...o Sustainable Materials Management Electronics Challenge- promotes responsible electronics recycling by using 3rd party certified recyclers
Infrastructure as a Service
...o Uses software to emulate hardware capabilities o Companies can scale storage, processing power, or bandwith
power supply
...o Wall outlets- supply alternating current of 115-120 volts o Computer/mobile devices need direct current of 5 to over 15 volts
digital
...on or off (0,1) • Computers
nanosecond
...one billionth of a second
clock speed
...pace of the system clock; measured by # of ticks per second
front side bus
...part of the motherboard & connects the processor to main memory
executing
...process of carrying out the commands
fetching
...process of obtaining a program or an application instruction or data item from memory
decoding
...process of translating the instruction into signals the computer can execute
ExpressCard module
...removable device (approx. 3 in) that fits in an ExpressCard slot
cooling pad
...rests below laptop & protects computer/user's lap from overheating
stored program concept
...role of memory to store both data & programs
multi-core processor
...single chip w/ 2 or more separate processor cores
L2 cache
...slightly slower than L1, larger capacity • Advanced transfer cache- built directly on the processor chip
heat sink
...small ceramic/metal component with fins on its surface that absorbs & disperses heat produced by electrical components o Many have fans o Packaged as part of chip or installed on top or side of chip
expansion slot
...socket on a desktop or server motherboard that can hold an adapter card
virtual desktop
...some companies specify applications, security settings, & computing resources available to employees on their desktop computers
data bus
...used to transfer actual data
address
...used to transfer info about where the data should reside in memory
liquid cooling technology
...uses continuous flow of fluids in a process that transfers the heated fluid away from the processor to a radiator type grill (which cools liquid) & then returns cooled fluid to processor
volatile
...when computer off, it loses its contents • Temporary • RAM
chip
...where functions are usually stored for CPU
adapter board
...• Circuit board that enhances the functions of a component of a desktop or server system unit and/or provides connections to peripheral devices
adapter card
...• Circuit board that enhances the functions of a component of a desktop or server system unit and/or provides connections to peripheral devices
expansion card
...• Circuit board that enhances the functions of a component of a desktop or server system unit and/or provides connections to peripheral devices
control unit
...• Component of the processor that directs & coordinates most of the operations in the computer • Interprets each instruction & initiates appropriate action to carry out instruction • Directs arithmetic logic unit, registers, & buses
Intel-compatible processors
...• Internal design similar to Intel wprocessors • Identify their processor chips by a model name or #
random access memory
...• Memory chips that can be read from & written to by the processor & other devices
binary system
...• Number system with 0 & 1, called bits (binary digits) o Smallest unit of data the computer can process
arithmetic logic unit
...• Performs arithmetic, comparison, & other operations
RAM
...• Random access memory/main memory • Memory chips that can be read from & written to by the processor & other devices
bus width
...• Size of a bus • Determines the number of bits that the computer can transmit at one time • 32 bit bus- 32 bits (4 bytes) at a time • Larger # means faster
memory module
...• Small circuit board on which RAM chips reisde
system clock
...• Small quartz crystal circuit • Controls timing of all computer operations • Generates regular electronic pulses that set the operating pace of components of the system unit
cache
...• Temporary storage area
flash memory
...• Type of nonvolatile memory that can be erased electronically & rewritten • Allows computer to update its contents easily • Chips store data & programs on many devices
gigahertz
..one billion ticks per second .
Nanosecond
1 billionth of a second
terabyte (TB)
1 trillion bytes.
How many bytes (exactly) are in a kilobyte?
1,024
What is the transfer rate of a 64-bit module running at 1600 MHz?
12800 MB/second
How many individual characters can byte represent?
256
DDR2
2nd generation of DDR Faster than DDR
DDR3
3rd generation of DDR Designed for computers with multi-core processors Faster than DDR2
DDR3
3rd generation of DDR; designed for computers with multi-core processors; faster than DDR2
Which type of cable is required by ATA/66 and above?
40 pins, 80 wires
DDR4
4th generation of DDR Faster than DDR3
DDR4
4th generation of DDR; faster than DDR3
How many bits are in one byte?
8
Address
A _____ bus is used to transfer information about where the data should reside in memory.
*Adapter Card*
A circuit board that enhances the functions of a component of a desk-top or server system unit and/or provides connections to peripheral devices.
adapter board
A circuit board that enhances the functions of a component of a desktop or server system unit and/or provides connections to peripheral devices.
adapter card
A circuit board that enhances the functions of a component of a desktop or server system unit and/or provides connections to peripheral devices. Also called adapter board or expansion card.
Zombie
A computer whose owner is unaware the computer is being controlled remotely by an outside.
USB adapter
A dongle that plugs into a USB port, enhances functions of a mobile computer and/or provides connections to peripheral devices.
*USB Adapter*
A dongle that plugs into a USB port, enhances the functions of a mobile computer and/or provides connections to peripheral devices.
what is an audit trail?
A file that records access attempts
Tower
A frame that houses the system unit on a desktop is called a ______
Manager
A password _____ is a service that stores all of your account information securely.
Virus
A potentially damaging computer program that affects, or infects, a computer negatively by altering the way the computer works without the user's knowledge or permission. Once the virus infects the computer, it can spread throughout and may damage files and system software, including the operating system.
Back Door
A program or set of instructions in a program that allow users to bypass security controls when accessing a program, computer, or network.
Back door=
A program or set of instructions that allows useres to bypass security controls when accessing a program, computer, or network
Bot
A program that performs a repetitive task on a network. Cybercriminals install malicous bots on unprotected computers to create a botnet.
2 Ways of How Seats in a Stadium are Similar to Addresses in Memory
A seat, which is identified by a unique seat number, holds 1 person at a time, and a location in memory, which is identified by a unique address, holds a single byte Both a seat, identified by a seat number and a byte, identified by an address, can be empty
Quarantine
A separate area of a hard disk that hods the infected file until the infection can be removed. This step ensures other files will not become infected.
real-time clock
A separate battery-backed chip that keeps track of the date and time in a computer.
Proxy server
A server outside the organization's network that controls which communications pass into the organization's network.
Multi-core
A single chip with two or more separate processor core.
*Multi-Core Processor*
A single chip with two or more separate processor cores.
multi-core processor
A single chip with two or more separate processor cores.
Cellular Seizure Investigation
A small device that a thief can plug into the phone and then download sensitive data in seconds
*Chip*
A small piece of semiconducting material, usually silicon, on which integrated circuits are etched.
chip
A small piece of semiconducting material, usually silicon, on which integrated circuits are etched.
*Expansion Slot*
A socket on a desktop or server motherboard that can hold an adapter card.
expansion slot
A socket on a desktop or server motherboard that can hold an adapter card.
Spoofing
A technique intruders use to make their network or internet transmission appear legitimate to a victim computer or netorks.
screen protector
A thin plastic film that adheres to the screen of your device.
Personal Firewall
A utility program that detects and protects a personal computer and its data from unauthorized intrusions.
Signature
A virus _____ is a known specific pattern of virus code that antivirus programs use to identify viruses.
Honeypots
A vulnerable computer that is set up to entice an intruder to break into it.
Cyberextortionist
A(n) _____ demands payment to stop an attack.
Differential
A(n) ______ backup copies only the files that have changed since the last full backup.
Convertible
A(n) ______ tablet has a screen in its lid and a keyboard in its base, with the lid and base connected by a swivel-type hinge.
main memory
AKA RAM; memory chips that can be read from & written to by the processor & other devices
system board
AKA motherboard; main circuit board of the computer
motherboard
AKA system board; main circuit board of the computer
The ______ is the component of the processor that performs arithmetic and comparison operations.
ALU
____ is the most widely used coding scheme to represent a set of characters.
ASCII
4 Reasons Why Home and Business Users Choose Cloud Computing
Accessibility Cost Savings Space Savings Scalability
graphics card
Adapter card that converts computer output into a video signal that travels through a cable to the monitor, which displays an image on the screen. Also called video card.
sound card
Adapter card that enhances the soundgenerating capabilities of a personal computer by allowing sound to be input through a microphone and output through external speakers or headphones.
Sharpness
Adjusting the ______ increases or decreases the crispness of objects in the photo.
An encryption_____ is a set of steps that converts readable text into unreadable text
Algorithm
Platform as a service (PaaS)
Allows developers to create, test, and run their solutions on a cloud platform without having to purchase or configure the underlying hardware and software.
Expansion Bus
Allows the processor to communicate with peripheral devices
Software as a service (SaaS)
Allows users and applications to access a company's data.
system bus
Also called the front side bus (FSB), is part of the motherboard and connects the processor to main memory.
ASCII
American Standard Code for Information Interchange; the most widely used coding scheme to represent a set of characters.
Access Time
Amount of time it takes the processor to read data, instructions, and information from memory Directly affects how fast the computer processes data
Trial
An ______ version is an application you can use at no charge for a limited time to see if it meets your needs.
Cloud computing
An environment of virtual servers that house and provide access to resources users access through the internet.
IP Spoofing
An intruder computer fools a network into believing its IP address is associated with a trusted source. Perpetrators of IP spoofing trick their victims into interacting with the phony web site.
Arithmetic Logic Unit
Another component of the processor Performs arithmetic, comparison, and other operations
Zombie
Another term for botnet is _____ army.
computer crime
Any illegal act involving a computer
Possessed objects
Any item that you must carry to gain access to a computer or computer facility. (examples : badges, cards, smart cards, and keys.
System Unit (Chassis)
Case on a desktop that contains and protects the motherboard, hard disk drive, memory, and other electronic components
Feature of Portable Media Players, Digital Cameras, and Handheld Game Devices
Case typically consumers the entire device and houses the display and input devices
Which Intel processor technology interconnects the processor, chipset, and wireless network adapter as a unit, improving laptop performance?
Centrino
COGNITIVE ASSESSMENT Which of the following is NOT true about processors?
Chip manufacturers rely on clock speed as the most important performance factor.
Static RAM (SRAM)
Chips are faster and more reliable than any variation of DRAM chips Chips do not have to be reenergized as often as DRAM Much more expensive than DRAM chips
Dynamic RAM (DRAM)
Chips must be reenergized constantly or they lose their contents
Adapter Card (Expansion Card)
Circuit board that enhances the functions of a component of a desktop or server system unit and / or provides connections to peripheral devices
integrated circuit
Circuit that contains many microscopic pathways capable of carrying electrical current.
cloud computing stack
Cloud Computing is often described as a stack consisting of a broad range of services built on top of one another, for example SaaS, PaaS, and IaaS
___ refers to an environment of servers that house and provide access to resources users access via the internet.
Cloud computing
2 Special Cases of Infrastructure as a Service (IaaS)
Storage as a Service Desktop as a Service
4 Functions of Registers
Storing the location from where an instruction was fetched Storing an instruction while the control unit decodes it Storing data while the ALU calculates it Storing the results of a calculation
SDRAM (Synchronous DRAM)
Synchronized to the system clock Much faster than DRAM
6 Factors of Computer Performance
System Clock Type of Processor Chip Amount of Cache Memory Access Time Bus Width Bus Clock Speed
*Plug and Play*
Technology that gives a computer the capability to recognize peripheral devices as you install them.
Plug and Play
Technology that gives a computer the capability to recognize peripheral devices as you install them.
Internet of things (IoT)
Term that describes an environment where processors are embedded in every product imaginable (things), and those 'things' communicate with each other via the Internet.
microprocessor
Term used by some computer and chip manufacturers to refer to a personal computer processor chip.
Control Unit
The ____ is the component of the processor that directs and coordinates most of the operations in the computer.
What should an AUP specify
The acceptable use of technology by employees for personal reasons
access time
The amount of time it takes a storage device (1) to locate an item on a storage medium or (2) to deliver an item from memory to the processor.
*Access Time*
The amount of time it takes the processor to read data, instructions, and information from memory and the time required to deliver an item from memory to the processor.
system unit
The case that contains and protects the motherboard, hard disk drive, memory, and other electronic components of the computer from damage. Also called chassis.
Coding scheme
The combinations of 0s and 1s that represent uppercase and lower case letters, numbers, and special symbols.
*Control Unit*
The component of the processor that directs and coordinates most of the operations in the computer.
control unit
The component of the processor that directs and coordinates most of the operations in the computer.
virtual desktop
The desktop and its applications appear to be installed on the user's own computer, desktop as a service
Payload
The destructive event or prank the program is intended to deliver.
*Central Processing Unit (CPU)*
The electronic component of a computer that interprets and carries out the basic instructions that operate a computer.
*Processor*
The electronic component of a computer that interprets and carries out the basic instructions that operate a computer.
central processing unit (CPU)
The electronic component of a computer that interprets and carries out the basic instructions that operate a computer. Also called processor.
Cost Savings
The expense of software and high-end hardware, such as fast processors and high-capability memory and storage devices, shifts away from the user
Motherboard
The main circuit board of a personal computer.
*Motherboard*
The main circuit board of the personal computer.
motherboard
The main circuit board of the personal computer. Also called a system board.
*Word Size*
The number of bits the processor can interpret and execute at a given time.
Word size
The number of bits the processor can interpret and execute at a given time.
word size
The number of bits the processor can interpret and execute at a given time.
3 Categories of Items Stored in Memory
The operating system and other programs that control or maintain the computer and its devices Applications that carry out a specific task, such as word processing The data being processed by the applications and the resulting information
Clock speed
The pace of a system clock.
*Clock Speed*
The pace of the system clock.
clock speed
The pace of the system clock.
E-mail Spoofing
The sender's address or other other componets of the e-mail header are altered so that it appears the e-mail originated from a different sender.
bus width
The size of a bus, which determines the number of bits that a computer can transmit at one time.
binary digit
The smallest unit of data the computer can process. Also called bit.
*Bit*
The smallest unit of data the computer can process. Short for binary digit.
Unauthorized access
The use of a computer or network without permission
Screen Protector
Thin plastic film that adheres to the screen of your device
COGNITIVE ASSESSMENT Which of the following is NOT true about processor cooling?
Today's personal computer processors often require additional cooling beyond the capability of the power supply's main fan.
DDR SDRAM (Double Data Rate DRAM)
Transfers data twice, instead of once, for each clock cycle Faster than SDRAM
A USB flash drive provides additional storage capability when it is plugged in.
True
A byte provides enough different combinations of 0s and 1s to represent 256 different characters.
True
Flash memory is a type of nonvolatile memory that can be erased electronically and rewritten.
True
RAM also is called main memory.
True
Trash cans that send a signal when they need to be emptied is an example of the Internet of Things.
True
True or False: Key words are case sensitive
True
When a user runs an application, its instructions transfer from a storage device to memory.
True
False
True of False? A stick computer has a large amount of storage space.
True
True of False? Applications that carry out a specific task are store in memory.
True
True of False? CTS is inflammation of the nerve that connects the forearm to the palm of your hand.
False
True of False? Older USB devices run faster in a new USB port.
False
True of False? The power supply coverts the wall outlet DC power into AC power.
False
True of False? Two users can have the same email address.
False
True of False? Users of website authoring software must have advanced HTML skills.
False
True or False? A brownout is a complete power failure.
False
True or False? A dual-core processor doubles the processing speed of a single-core processor.
False
True or False? A format checker identifies passive voice and run-on sentences.
False
True or False? A segment of a video is called a slide.
True
True or False? Cyberterrorism and cyberwarfare usually require a team of highly skilled individuals, millions of dollars, and several years of planning.
False
True or False? Email spoofing rarely is used in virus hoaxes and spam.
True
True or False? Encryption is one safeguard against information theft.
True
True or False? If you are purchasing a new desktop, chances are it will include the latest version of your preferred operating system.
True
True or False? Malware creators are targeting smartphones, particularly those using he Android operating system.
True
True or False? Mobile payment providers state that the use of their payment apps is more secure than using a credit card.
False
True or False? Most computers and electronic devices are analog, which uses only two discrete states: on and off.
False
True or False? Passphrases are less secure than passwords.
False
True or False? Public key encryption is also called asymmetric key encryption.
True
True or False? Smartphones and other mobile devices often can function as a portable media player.
True
True or False? The Lightning connector, developed by Apple for the iPhone 5, is compatible with prior iPhone models.
True
True or False? The speed of the system clock has no effect on peripheral devices.
False
True or False? The voice command "OK, Google" will activate your device's search engine.
False
True or False? Users of websites authoring software must have advanced HTML skills.
True
True or False? With CDP, all data is back up whenever a change is made.
True
True or False? You should disable GPS tracking on your mobile device unless you need to use it.
False
True or False? You should run multiple antivirus programs on your computer or mobile device.
False
True or false? A mail server stores and manages email lists.
advanced transfer cache (ATC)
Type of L2 cache built directly on the processor chip, which increases processor speed.
Advanced Transfer Cache (ATC)
Type of L2 cache built directly on the processor chips Processors that use them perform at much faster rates than those that do not use it
Flash Memory
Type of nonvolatile memory that can be erased electronically and rewritten
*Flash Memory*
Type of nonvolatile memory that can be erased electronically and rewritten.
flash memory
Type of nonvolatile memory that can be erased electronically and rewritten.
a dongle that plugs into a USB port, enhances functions of a mobile computer and / or provides connections to peripheral devices
USB adapter
Productivity
Under what category of programs and apps do databases and enterprise computing fall?
address
Unique number that identifies the location of a byte in memory.
How do manufacturers such as Intel and AMD help consumers evaluate various processors?
Use a numbering scheme that more accurately reflects the processing speed of their chips
Feature of USB Adapters and ExpressCard Modules
Used to add memory, communications, multimedia, security, and storage capabilities to mobile computers
Data Bus
Used to transfer actual data
data bus
Used to transfer actual data.
Address Bus
Used to transfer information about where the data should reside in memory
4 Types of Services Available on Cloud Computing
Infrastructure as a Service (Manage IT infrastructure) Software as a Service (Provide Applications) Data as a Service (Access Online Data) Platform as a Service (Create Applications Using Web-Based Development Platforms)
Feature of Game Consoles
Input and output devices, such as controllers and a television, reside outside the case
2 Ways Data Needed by Programs and Applications Enter Memory
Input device Storage device
Result When User Runs an Application
Instructions are transferred from a storage device to memory
the leading manufacturers of personal computer processor chips are ____ and AMD.
Intel
Processor or the Central Processing Unit (CPU)
Interprets and carries out the basic instructions that operate a computer Significantly impacts overall computing power and manages most of a computer's operations
Purpose of Control Unit
Interprets and executes instructions in a memory
Circuit
Just as vehicles travel on a highway, bits travel on a ____.
Real-Time Clock
Keeps track of the date and time in a computer
AN ecrytion ____ is a set of characters that the originator of the data used to encrypt and the recipient of the data used to decrypt
Key
2 Features of Most Laptops, Including Ultrathin Laptops
Keyboard and pointing device often occupy the area on top of the case Display attaches to the case by hinges
4 Steps in How the Processor Needs an Instruction or Data from the Memory
L1 Cache (Fastest Access) L2 Cache (Slower than L1 Access) L3 Cache (If exists) (Separate chip between processor and RAM) (Slower Access than L1 and L2 Cache) Storage Medium (Hard Disk or Optimal Disk)
2 Features of Bus Width
Larger the number of bits handled by the bus, the faster the computer transfers data The wider the bus, the fewer the number of transfer steps required and the faster transfer of data
Activation
Lately, with all of the concerns about copyright infringement, friends have started to ask you about categories of application software and what each kind permits. You tell your friends that product ____ is a technique that some manufacturers use to ensure you do not install software on more computers than legally licensed.
This is not true about cloud data privacy
Law enforcement officials can not access email messages stored on the cloud without informing the user first
Alphanumeric Characters
Letters and numbers
alphanumeric characters
Letters and numbers.
2 Types of Memory Cache that Most Personal Computers Have
Level 1 (L1) Cache Level 2 (L2) cache
Which type of processor memory is located on the processor chip (processor die)?
Level 1 cache
A(n) _____ screen restricts acess to a computer or mobile device until a user perfors acertain action
Lock
Volatile Memory
Loses its contents Temporary
Volatile
Loses its contents when the power is removed from the computer
master file
MDM links and synchronizes all critical data from those disparate systems into one file, called a master file, that provides a common point of reference
Which of the following adapter cards connects to musical instruments?
MIDI
Motherboard (System Board)
Main circuit board of the computer
A password ____ is a service that stores all of your account info securly
Manager
AMD
Manufacture Intel-compatible processors. Have similar internal design, preform the same functions, can be as powerful, but less expensive. Leading manufacturer of processors including Intel.
2 Common Types of Cache
Memory Cache Disk Cache
Read-Only Memory (ROM)
Memory chips storing permanent data and instructions
*RAM*
Memory chips that can be read from and written to by the processor and other devices.
random access memory (RAM)
Memory chips that can be read from and written to by the processor and other devices. Also called main memory.
*Read-Only Memory (ROM)*
Memory chips that store permanent data and instructions.
ROM (read-only memory)
Memory chips that store permanent data and instructions.
Read-only memory (ROM)
Memory chips that store permanent data and instructions.
read-only memory (ROM)
Memory chips that store permanent data and instructions.
Nonvolatile
Memory that does not lose its contents when power is removed from the computer.
nonvolatile memory
Memory that does not lose its contents when power is removed from the computer.
volatile memory
Memory that loses its contents when the computer's power is turned off.
goal seeking
Model that starts with the desired outcome (goal) and a set of variables that impact that outcome, which are used to calculate how that outcome could be achieved and whether it's feasible to achieve that desired outcome
4 Steps on How a Letter is Converted to Binary Form and Back
Press a key on a keyboard, a chip in the keyboard converts the key's electronic signal into a special code, called a scan code Scan code is sent to the electronic circuitry in the computer Electronic circuitry in the computer converts the scan code into its ASCII binary form and stores it as a byte value in its memory for processing When processing is finished, the computer converts the byte into a human-recognizable number, letter of the alphabet, or special character that is displayed on a screen or is printed
PGP
Pretty good privacy
Executing
Process of carrying out the commands
Saving
Process of copying data, instructions, and information from RAM to a storage device such as a hard disk
Fetching
Process of obtaining a program or an application instruction or data item from memory
Decoding
Process of translating the instruction into signals the computer can execute
CPU stands for central ______ unit.
Processing
The ______ interprets and carries out the basic instructions that operate a computer.
Processor
liquid cooling technology
Processor cooling method that uses a continuous flow of fluid(s), such as water and glycol, in a process that transfers the heated fluid away from the processor to a radiator-type grill, which cools the liquid, and then returns the cooled fluid to the processor.
executing
Processor operation in the machine cycle that carries out the commands.
fetching
Processor operation in the machine cycle that obtains a program or an application instruction or data item from memory.
decoding
Processor operation in the machine cycle that translates the instruction into signals the computer can execute.
storing
Processor operation in the machine cycle that writes the result to memory (not to a storage medium).
Intel-compatible processors
Processors manufactured by AMD that have an internal design similar to Intel processors, perform the same functions, and can be as powerful, but often are less expensive.
superscalar
Processors that can execute more than one instruction per clock cycle.
Storage as a Service
Providers offer file management services such as storing files online, system backup, and archiving earlies versions of files
Scalability
Provides the flexibility to increase or decrease computing requirements as needed
Most Common Type of Volatile Memory
RAM
When a program runs on a computer, it is stored in
RAM
____, also called main memory, consists of memory chips that can be read from and written to by the processor and other devices.
RAM
files remain in ____ as long as the computer or mobile devices has continuous power.
RAM
static RAM (SRAM)
RAM chips that are faster and more reliable than and do not have to be reenergized as often as DRAM chips.
Dynamic RAM
RAM chips that must be reenergized constantly or they lose their contents. Also called DRAM.
Which memory technology that is no longer used has a 32-bit data bus, 232 pins and requires a placeholder in empty slots?
RIMM
____ refers to memory chips storing permanent data and instructions.
ROM
3 Examples of Nonvolatile Memory
ROM Flash Memory CMOS
true
ROM chips also car called firmware
*Firmware*
ROM chips or flash memory chips that store permanent instructions, such as a computer or mobile device's start-up instructions.
Firmware
ROM chips that contain permanently written data, instructions, or information such as a computer or mobile device's start-up instructions
firmware
ROM chips that contain permanently written data, instructions, or information.
firmware
ROM chips that obtain permanently written data, instructions or information.
RDRAM
Rambus DRAM; much faster than SDRAM
Digital
Recognizes only 2 discrete states: on and off Example: most computers since they are electronic devices powered by electricity, which also has only 2 states - on and off
Audit trail
Records in a file both successful and unsuccessful access attempts.
ExpressCard Module
Removable device, about 75 mm long (approximately 3 inches) and 34 mm wide (approximately 1.3 inches) or L-shaped with a width of 54 mm (approximately 2 inches), that fits in an ExpressCard slot
RSI
Repetitive strain injury
*Digital*
Representation of data using only two discrete states: on (1) and off (0).
digital
Representation of data using only two discrete states: on (1) and off (0).
Cooling Pad
Rests below a laptop and protects the computer from overheating and also the user's lap from excessive heat
Stored Program Concept
Role of memory to store both data and programs
You realize your computer has been affected by malware, it seems as if someone is controlling your computer from a remote location what type of malware might you have?
Rootkit
Which hard drive technology is used to predict when a drive is likely to fail?
S.M.A.R.T.
Which of the following is true about DIMM technologies?
SDRAM runs synchronized with system clock
What technology in a DIMM informs the BIOS of the module's size, speed, voltage, and data path width?
SPD
Index
Search tools typically use a ______ which stores a variety of information about a file.
2 Features of Resulting Information Stored in Memory
Sent to an output device for future access Sent to a storage device for future access
machine cycle
Set of four basic operations that a processor repeats for every instruction: (1) fetching, (2) decoding, (3) executing, and, if necessary, (4) storing.
*eCycling*
Short for electronics recycling.
Multi-Core Processor
Single chip with 2 or more separate processor cores
Bus Width
Size of a bus, which determines the number of bits that the computer can transmit at 1 time
L2 Cache
Slightly slower than L1 cache but has a much larger capacity Current processors include Advanced Transfer Cache (ATC)
*Memory Slots*
Slots on the motherboard that hold memory modules.
Heat Sink
Small ceramic or metal component with fins on its surface that absorbs and disperses heat produced by electrical components, such as a processor
heat sink
Small ceramic or metal component with fins on its surface that absorbs and disperses heat produced by electrical components, such as a processor.
*Memory Module*
Small circuit board that houses RAM chips and is held in a memory slot on the motherboard.
*System Clock*
Small quartz crystal circuit that controls the timing of all computer operations.
system clock
Small quartz crystal circuit that controls the timing of all computer operations.
System Clock
Small quartz crystal circuit which the processor relies on to control the timing of all computer operations Generates regular electronic pulses, or ticks, that set the operating pace of components of the system unit
Registers
Small, high-speed storage locations that temporarily hold data and instructions Part of the processor, not part of memory or a permanent storage device
registers
Small, high-speed storage locations that temporarily hold data and instructions.
Bit (Short for Binary Digit)
Smallest unit of data the computer can process
Expansion Slot
Socket on a desktop or server motherboard that can hold an adapter card
___ describes a computing environment where an Internet server hosts and deploys applications
Software as a Service
an aspect of cloud computing that describes a computing environment where an Internet server hosts and deploys applications is known as ____.
Software as a Service (SaaS)
Predictive
Some smartphones use ______ text, where you press one key on the keyboard or keypad for each letter in a word, and software on the phone suggests words you may want.
2 Popular Adapter Cards
Sound Cards Video Cards
Scan Code
Special code in which a chip in the keyboard is converted into the key's electronic signal
2 Types of Memory in Which Computer and Mobile Devices Contain
Volatile Nonvolatile
online transaction processing (OLTP)
Volatile systems that are designed to process and store transaction data
Web 2.0
Web sites that provide a means for users to share personal info, allow users to modify web site content, and have application software built into the site for visitors to use
Virtual Desktop
What Desktop as a Service is also known as because the desktop and its applications appear to be installed on the user's own computer
Creates software registration numbers
What does a keygen do?
Clock Cycle
What each tick is equal to
The right to use a program or app
What is an EULA?
Cache
What most of today's computers use to improve their processing times Temporary storage area
Eyes
What part of the body does CVS impact?
Superscalar
What processors today are called since they can execute more than 1 instruction per clock cycle
The acceptable use of technology by employees for personal reasons.
What should an AUP specify?
Complementary Metal-Oxide Semiconductor (CMOS)
What some RAM chips, flash memory chips, and other memory chips use because it provides high speeds and consumes little power Uses battery power to retain information even when the power to the computer is off
Byte
When 8 bits are grouped together as a unit Provides enough different combinations of 0s and 1s to represent 256 different characters
This is not true about 2 step verification
When a system sends an authentication code it typically does not expire
The availability of ports is not important because you can always add ports.
When purchasing a mobile computer, which of the following is NOT recommended?
Which of the following best describes a single sign on account
When you enter your name into one account and you are automatically signed into other accounts and services
Which of the following is true about installing a processor on a motherboard?
after placing the processor in the socket, you need to lock down the lever
link/hyperlink
allow you to obtain information on a website in a non-linear way
You recently purchased a new laptop for home you want to ensure that you are safe from malware so you should not do this
always stay connected to the internet
Which of the following is NOT a feature of a processor?
amount of CMOS
A programmable language allows us to express
an algorithm
Paas
an aspect of cloud computing that allows developers to create, test, and run their solutions on a cloud platform without having to purchase or configure the underlying hardware and software is known as ______.
Cyberwarfare
an attack whose goal ranges from disabling a government's computer network to crippling a country. (usually require a team of highly skilled individuals, millions of dollars, and several years of planning)
Virus hoax
an e-mail message that warns user of a nonexistent virus or other malware. These hoaxes are in the form of a chain letter that requests the user to send a copy of the e-mail message to as many people as possible.
executive information system (EIS)
an information system specifically designed to support senior management
At each step of its operation, the input to a Central Processing Unit is
an instruction
ad hoc report
an unplanned report that is generated to a mobile device or computer on demand as needed
Human speech is ____ because it uses continuous (wave form) signals that vary in strength and quality
analog
touchpoint
any action or interaction with a customer, such as email, text, direct mail, phone call social media message, and so on
Computer security risk
any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability.
Processors contain a control unit and a(n) ___ unit.
arithmetic logic
the ___ unit of the processor performs arithmetic, comparison , and other operations.
arithmetic logic
true
as with processors, manufacturers state the clock speed for a bus in hertz
Biometric Devices
authenticates a person's identity by translating a personal characteristic, such as a fingerprint, into a digital code that is compared with a digital code stored in the computer verifying a physical or behavioral characteristic.
the ___ system is a number system that has just two unique digits, 0 and 1
binary
A ___ is the smallest unit of the data the computer can process.
bit
A(n) ______ is the smallest unit of data a computer can process.
bit
What is the most likely result of correctly installed processor, but an incorrectly installed cooler?
boot process begins, but system suddenly turns off after a short period
You want to ensure your wireless network is secure you don't do this
broadcast the SSID
allows various devices both inside and attached to the system unit to communicate with each other
bus
The size of a bus, called the ___, determines the number of bits that the computer can transmit at one time.
bus width
customer-centric
business models strive to create the best solution or experience for the customer. In contrast, product-centric models are internally focused on creating the best product
When 8 bits are group together as a unit, they form a ___.
byte
when an application's instructions and data are transferred to memory from storage devices, the instructions and data exist as ____.
bytes
This is not recomended to protect against hardware failure
cables and locks
most of today's computers improve their processing times with ____, which is a temporary storage area.
cache
transistor
can act as an electronic switch that opens or closes the circuit for electrical charges
On personal computers, the circuitry for the processor, memory, and other components reside on a computer ___.
chip
small piece of semiconducting materials, usually silicon, on which integrated circuits are etched.
chip
An integrated ___ contains many microscopic pathways capable of carrying electrical current.
circuit
the processor relies on a small quartz crystal circuit called the system ____ to control the timing of all computer operations.
clock
A ____ is a written guidline that helps determing wether a specification is ethicle/ unethical or allowed/ not allowed
code of conduct
In object-oriented programming a method is
code that allows access to an objects attributes or that carries out some other action for the object
____ map a set of alphanumeric characters and special symbols to a sequence of numeric values that a computer can process.
coding schemes
batch processing
collects all transaction for a day, shift, or other time period, and then processes the data and updates the data stores
Which of the following is true about DIMM slots?
color coding is used to identify the channel
CMOS
complementary metal oxide semiconductor; used by memory chips; uses battery power to retain info even when the power to the computer is off
control unit
component of the computer that directs and coordinates most of the operations in the computer.
purpose of the system bus
connects the processor to main memory
IP address
consist of 4 groups of numbers, each separated by a period. First portion identifies the network and the last portion identifies the specific computer
memory
consists of electronic components that store instructions waiting to be executed and data needed by those instructions
enterprise architecture (EA)
the way IT systems and processes are structured. EA is an ongoing process of creating, maintaining, and leveraging IT. It helps to solve two critical challenges: where an organization is going and how it will get there
DDR SDRAM
double data rate SDRAM; transfers data twice for each clock cycle; faster than SDRAM
DIMM
dual inline memory module; • Pins on opposite sides of the circuit board do not connect & thus form 2 sets of contacts e;
____ RAM chips must be reenergized constantly or they lose their contents.
dynamic
screen protector
thin plastic film that adheres to the screen of your device
For what purpose was the BSA formed
to promote understanding of software piracy
_____ can help conserve natural resources because precious metals, glass, and solid waste are removed before the shell is taken to landfills
eCycling
EGMPSMS
embedded computer, game console, mobile devices, personal computer, server, mainframe, supercomputer
An organization creates a disaster recovery plan which part would include return procedures ( who can enter the facility and what actions they are to perform?)
emergency plan
data as a service (DaaS)
enables data to be shared among clouds, systems, apps, and so on regardless of the data source or where they are stored (elimination of third party could provider)
Social ___ is defined as gaining unauthorised access to or obtaining confidential information by taking advantage of another person
engineering
In a machine cycle, ___ is the process of carrying out the commands
executing
cross-sell
to sell additional complimentary products or services
up-sell
to sell more expensive models or features
A(n) ____ is a socket on a desktop or server motherboard that can hold an adapter card.
expansion slot
a socket on a desktop or server motherboard that can hold an adapter card
expansion slot
Flash drives, CD's, and external disks are all examples of
external memory
A iris recognition system uses technology to read patterns n the users
eye
A session cookie stores user names and or passwords so that users do not need to enter this information every time they sign in to the website
false
Email spoofing rarely is used in virus hoaxes and spam
false
If your computers opperating system provides a personal firewall ypu do not need to disable it if you are using a third party firewall
false
Software used to fight cyber criminals is called crimeware
false
To protect files on your devices hard drive from hackers turn on file and printer sharing
false
True or False: An algorithm allows ambiguity
false
True or False: Indentifiers may start with a number
false
True or False: machine languages can be used to write programs that can run on any macine
false
True or False: main is a reserved word
false
Two users can have the same email address
false
Viruses worms and trojan horses replicate themselves to other computers or devices
false
intentionally erasing software is not an example of software theft
false
public key encryption is also called asymettric key encryption
false
with a credit card purchase when users sign their name on a signature capture pad using a stilus the retailer uses a signature verification system to authenticat the user
false
Paraphrases are less secure than passwords
falsee
A ROOTkit can be a backdoor
true
Common digital security risks include information theft and system failure
true
Content filterining is the process of restricting acess to certain material
true
ROM chips that contain permanently written data, instructions, or information.
firmware
____ is a type of nonvolatile memory that can be erased electronically and rewritten
flash memory
Cyber terrrorism in cyber warfare usually require a team of highly skilled individuals, million dollars, and several years of planning
true
Piracy is the most common form of software theft
true
Security experts recommend using different user names and passwords for every account
true
True or False: int is a reserved word
true
True or False: public is a reserved word
true
True or False: static is a reserved word
true
True or False: void is a reserved word
true
Unusually high drive activity or a slower than normal internet activity are signs that your computer or mobile device may be a zombie
true
User ID's are also called usernames, log on names, and sign in names.
true
a Hand geometry sytem measures the size and shape of a persons hand
true
employers can use firewalls to restrict employees access to sensative data
true
encryption is one safegaurd against information theft
true
the website for cert/cc provides information about internet security breaches
true
with CDP all data is backed up whenever a change is made
true
you should disable GPS tracking on your mobile device unless you need to use it
true
A location in memory used for storing data and given a name in a computer program that can be changed is called a
variable
exception report
generated only when something is outside the norm, either higher or lower than expected. More likely to be read because workers know that some unusual event or deviation has occurred
A ___ equals approximately 1 billion bytes.
gigabyte
one ___ equals one billion ticks of the system clock per second
gigahertz
Botnets
group of compromised computers connected to a network such as the internet that are used as part of a network that attacks other networks usually for nefarious purposes.
Script kiddie
has the same intent as a cracker but does not have the technical skills and knowledge. Script kiddies often use pre-written hacking and cracking programs to break into computer.
A ___ is a small ceramic or metal component with fins on its surface that absorbs and disperses heat produced by electrical components, such as a processor.
heat sink
____ allows you to insert and remove a device while the computer is running.
hot plugging
Which of the following statements is NOT true when setting up dual channeling?
if you have two pairs installed in two channels, all four DIMMs must match
false
in binary system, the digit I represents the absence of an electronic charge
true
in cloud computing, the back end consists of ht servers and storage devices that manage and store devices that manage and store the resources accessed by users.
false
in general, multi core processors are less energy efficient than separate multiple processors.
fetching
in the machine cycle, the _____ operation obtains a program or application instruction or data item from memory.
Mice, trackpads, keyboards, scanners, and joysticsks are all examples of _______ devices
input
Macros
instructions saved in software such as a word processing or spreadsheet program.
transistor
integrated circuit component that acts as an electronic switch that opens or closes the circuit for electrical charges
when a computer's power is turned off, ____ memory loses its contents.
volatile
decision support system (DSS)
interactive applications that support decision making
processor/CPU
interprets and carries out the basic instructions that operate a computer; significantly impacts th overall computing power and manages most of the computers operations.
what does a Keygen do?
it creates software registation numbers
if the web address begins with https instead of http what do you know about the website
it is secure
Words that have a special meaning in a programming language are called
key words
Not a recommended practice for gaming safety
look for games that use active X or java script as they are always safe
Which process writes sector markings to a hard drive?
low-level formatting
For every instruction, a processor repeats a set of four basic operations, which comprise a ___ cycle.
machine
motherboard
main circuit board of system unit. Many electronic components attach to it, others are built into it.
Malware is short for ______ software
malicious
___ are applications that incorporate data from multiple providers into a new application.
mashups
____ consists of electronic components that store instructions waiting to be executed by the processor, data needed by those instructions, and the results of processing the data.
memory
helps speed the processes of the computer because it stores frequently used instructions and data
memory cache
small circuit board
memory module
motherboard hold memory modules
memory slots
An operating system allocates resources like _____ to _______
memory.....programs that are running
term used by some computer manufacturers to refer to a personal computer chip
microprocessor
Which of the following memory configurations definitely will not work when populating a motherboard with DIMMs?
mixing unbuffered with registered
false
most RAM is nonvolatile
the ___ is the main circuit of the computer
motherboard
A(n) ___ processor is a single chip with two or more separate processor cores
multi-core
What is the general name of the processor feature that AMD calls HyperTransport?
multithreading
What unit of measurement is used for DIMM read and write times?
nanoseconds
examples of ___ memory include ROM, flash memory, and CMOS.
nonvolatile
Pin stands for personal identification _______
number
word size
number of bits the processor can interpret and execute at a given time
true
on a personal computer, all functions of the processor usually are on a single chip.
Because computers are electronic devices powered by electricity, they have only two states:
on and off
hertz
one cycle per second
Cybercrime
online or internet-based illegal acts
When a user starts a computer, portions of the __________load into memory from the computer's hard disk
operating system
three categories of items stored in computer memory
operating system and other programs; applications; data being processed
Trusted Source
organization or person you believe will not send a virus infected file knowingly.
Monitors, printers, and status lights are all examples of ________ devices
output
arithmetic logic unit (ALU)
performs arithmetic, comparison, and other operations
microprocessor
personal computer processor chip
A slate tablet typically does not include a
physical keyboard
Passcode is another term for a
pin
____ means the computer automatically can recognize peripheral devices as you install them
plug and play
The ability of a language to let a programmer develop a program on computer system that can be run on other systems is called
portability
(laptop AC) adapter converts the wall outlet AC power into DC power
power supply
The ____ or laptop AC adapter converts the wall outlet AC power into DC power.
power supply
Encryption
process of converting readable data into unreadable characters to prevent unauthorized access
real time processing
processing of data or transactions as they occur
the ___ interprets and carries out the basic instructions that operate a computer
processor
What are the two main components of the motherboard?
processor and memory
Anti-virus program
protects a computer against viruses by identifying and removing any computer viruses found in memory, on storage media or on incoming files.
this is not a green computing recomendation
purchase low efficiency equipment
ROM
read only memory; memory chips storing permanent data & instructions
storage device
records (writes) and/or retrieves (reads) items to and from storage media
what-if analysis
refers to changing assumptions or data in the model to see the impacts of those changes on the outcome
A DIMM that holds data and amplifies a signal before the data is written to the module uses which technology?
registers
A processor contains small, high-speed storage locations, called ___, that temporarily hold data and instructions.
registers
small, high-speed storage locations contained in a processor
registers
An identifier that cannot be used as a variable name is known as a
reserved word
The purpose of running a program with different combinations of data is to expose ______ errors and ______ errors.
run-time......logical
processor
same as CPU
A(n)____ often uses prewritten hacking and cracking programs
script kiddie
the pace of the system clock, called clock speed, is measured by the number of ticks per
second
DDR2
second generation of DDR; faster than DDR
real-time clock
separate battery-backed chip that keeps track of the date & time in a computer; battery runs on this even when the computer is off
Online Service Provider (OSP)
similar to an ISP, in addition to providing Internet access, they also posess many other memers-only features, such as instant messaging or their own customized version of the web. ie: AOL and MSN
On a personal computer, all functions of the processor usually are on a
single chip
SIMM
single inline memory module;• Pins on opposite sides of the circuit board that connect together to form a single set of contact
memory ____ on the motherboard hold memory modules
slots
chip
small piece of semiconducting materials, usually silicon, on which integrated circuits are etched.
registers
small, high speed storage locations contained in a processor
registers
small, high speed storage locations in a processor
Which of the following is NOT true about hard disk drives?
sold state drives are less expensive than magnetic hard drives
hacker
someone who accesses a computer or network illegally (has advanced computer and network skills)
cracker
someone who accesses a computer or network illegally but has the intent of destroying data, stealing information, or other malicious action (has advanced computer and network skills)
cyberextortionist
someone who uses e-mail as a vehicle for extortion. these perpetrators send organization a threatening e-mail message indicating they will expose confidential information, exploit a security flaw, or launch an attack that will compromise the organization's network- if they are not paid a sum of money.
Cyberterrorist
someone who uses the internet or network to destroy or damage computers for political reasons.
The code that a programmer writes is called
source code
A compiler translates
source code into executable code
data silo
stand-alone data stores available for a specific function or department, but not accessible by other ISs
the role of memory to store both data and programs is known as the ___ concept.
stored program
CMOS
stores date, time, all device settings
FERPA regulates the confididentiality of
students educational recorrds
processors today typically are ___, which means they can execute more than one instruction per clock cycle.
superscalar
Application Software is any software that runs with the
support of the operating system
master data management (MDM)
synchronizes all business critical data from disparate systems into a master file, which provides a trusted data source
SDRAM
synchronous DRAM; synchronized to the system clock; much faster than DRAM
The rules that govern the correct order and usage of the elements of a language are called the
syntax
The motherboard is sometimes called a(n) ______ board.
system
the processor relies on a small quartz crystal circuit called the ___ to control the timing of all computer operations
system clock
the term, ___, refers to the case on a desktop that contains and protects the motherboard, hard disk drive, memory, and other electronic components.
system unit
Which of the following is NOT a necessary precaution when installing memory modules?
test the motherboard for residual electrical charges
motherboard
the ______ is the main circuit board of the computer.
control unit
the component of the processor that directs and coordinates most of the operations in the computer; it interprets each instruction issued by a program and then initiates the appropriate action to carry out the instruction
data governance
the control of enterprise data through formal policies and procedures to help ensure that data can be trusted and are accessible
Supercomputers
the fastest, most powerful type of computer-and the most expensive
top-level domain (TLD)
the last section of a domain name, identifies the type of organization associated with the domain. ie: ".com", ".edu", ".net"
Internet backbone
the major carriers of network traffic on the Internet
true
the motherboard also is called a system board
true
the power supply converts the wall outlet AC power into DC power
false
the processor interprets and executes a program or application's instructions while the program or application is in nonvolatile memory.
data
the raw material from which information is produced; and the quality, reliability, and integrity of the data must be maintained for the information to be useful
bit
the smallest unit of data the computer can process
false
the system clock keeps track of the date and time in a computer
IoT
the term, ______ describes a computing environment where everyday objects are connected to the internet.
domain name
the text version of an IP address
information management
the use of IT tools and methods to collect, process, consolidate, store, and secure data from sources that are often fragmented and inconsistent
Unauthorized use
the use of a computer or its data fro unapproved or possibly illegal activites
IaaS
the use of software to emulate hardware capabilities, enabling computer to scale or adjust up or down, storage, processing power, or bandwidth as needed.
Online security service
website that evaluates your computer to check for internet and e-mail vulnerabilities. (Service then provides recommendations of how to address the vulnerabilities)
volatile
when turned off, is gone. ie: RAM (random access memory)
non-volatile
when turned off, remains. ie: ROM (read-only memory)
storage media
where a computer keeps data, instructions, and information
ASCII
widely used coding scheme to represent a set of characters
the number of bits the processor can interpret and execute at a given time
word size
storing
writing the result to memory; part of the machine cycle
RAM, random-access memory, is called that because
you can pick any two random locations and it will take the same time to access the data
Liquid Cooling Technology
Uses a continuous flow of fluid(s), such as water and glycol, in a process that transfers the heated fluid away from the processor to a radiator-type grill, which cools the liquid, and then returns the cooled fluid to the processor
Analog
Uses continuous (wave form) signals that vary in strength and quality Example: Human speech
Infrastructure as a Service (IaaS)
Uses software to emulate hardware capabilities, enabling companies to scale, or adjust up or down, storage, processing power, or bandwidth as needed
2 Ways that Mobile Computers and Devices Can Run
Using a power supply Using batteries
Badges cards, smart cards. ans keys are examples of ____ objects
Possesed
bus width
determines the number of bits that the computer can transmit at one time
Which of the following is NOT a component of a processor?
device driver
When a program is not running, it is stored on a
disk
alphanumeric characters
...letters & numbers
inoculate
(to inoculate a program file) the antivirus program records information such as the file size and file creation date in a separate inoculation file. The antivirus program then uses this information to detect if a virus tampers with the data describing the inoculated program file.
gigabyte
...(billion)- 500,000 pages of text, 600 photos, etc.
backside bus
...- connects processor to cache
L3 cache
...- on the motherboard; separate from the processor chip; exists only on computers that use L2 advanced transfer cache
terabyte
...1 trillion bytes
machine cycle
...4 basic operations: fetching, decoding, executing, storing
system bus
...AKA front side bus (FSB); part of the motherboard & connects the processor to main memory
video card
...AKA graphics card; converts computer output into a video signal that travels through a cable to the monitor, which displays an image on the screen
graphics card
...AKA video card; converts computer output into a video signal that travels through a cable to the monitor, which displays an image on the screen
ASCII
...Amer. Stand. Code for Info. Exchange- most widely used coding scheme to represent a set of characters
firmware
...ROM chips that contain permanently written data, instructions, or information (such as a computer's startup instructions)
expansion bus
...allows processor to communicate with peripheral devices
hot plugging
...allows you to insert & remove a device while computer is running
access time
...amount of time it takes the processor to read data, instructions, & information from memory • Directly affects how fast the computer processes data
mashups
...apps that incorporate data from multiple providers into a new app
arithmetic operations
...basic calculations such as addition, subtraction, multiplication, division
byte
...basic storage unit in memory • Each byte resides in a location in memory that has an address
bit
...binary digits o Smallest unit of data the computer can process
antistatic wristband
...bracelet designed to protect electronics from an electrostatic discharge by preventing a buildup of static electricity on a user
advanced transfer cache
...built directly on the processor chip
L1 cache
...built directly on the processor chip; small capacity
superscalar
...can execute more than one instruction per clock cycle
system unit
...case on a desktop that contains & protects the motherboard, hard disk drive, memory, & other electronic components
chassis
...case on a desktop that contains & protects the motherboard, hard disk drive, memory, & other electronic components (system unit)
bus
...channel through which bits are transferred along
address bus
...channel through which bits are transferred along; used to transfer info about where the data should reside in memory
static RAM
...chips are faster & more reliable; do not have to be reenergized as often; much more expensive
dynamic RAM (DRAM)
...chips must be reenergized constantly or they lose their contents; variations exist
comparison operations
...comparing one item with another o Result det. What actions occur
plug & play
...computer automatically can recognize peripheral devices as you install them
analog
...continuous, wave form signals that vary in strength & quality • Human speech
nonvolatile memory
...doesn't lose contents when power is removed • Permanent • ROM, flash memory, CMOS
USB adapter
...dongle that plugs into a USB port; enhances functions of a mobile computer and/or provides connections to peripheral devices
clock cycle
...each tick on system clock
memory
...electronic components that store instructions waiting to be executed by the processor, data needed by those instructions, & the results of processing the data
sound card
...enhances the sound generating capabilities of a personal computer by allowing sound to be input through a microphone & output through external speakers or headphones
memory cache
...helps speed the processes of the computer b/c it stores frequently used instructions & data
memory slots
...hold memory modules; on motherboard
Cellular Seizure Investigation stick
...inserted into cell phone to download sensitive data
central processing unit
...interprets & carries out the basic instructions that operate a computer
Platform as a Service (PaaS)
Application developers need to maintain computers running specific hardware, operating systems, development tools, databases, and other software Allows developers to create, test, and run their solutions on a cloud platform without having to purchase or configure the underlying hardware and software
Mashups
Applications that incorporate data from multiple providers into a new application
Mashup
Applications that incorporate data from multiple providers into a new application.
mashups
Applications that incorporate data from multiple providers into a new application.
*Cache*
Area of memory that stores the contents of frequently used data or instructions.
cache
Area of memory that stores the contents of frequently used data or instructions.
3 Types of Internal Components that the Control Unit Directs
Arithmetic logic unit Registers Buses
Intrusion detection software
Automattically analyzes all network traffic, assesses system bulnerabilities, identifies any unauthorized intrusions, and notifies network administrators of suspicious behavior patterns or system breaches.
Arithmetic Operations
Basic calculations such as addition, subtraction, multiplication, and division
Bus
Bits transfer internally within the circuitry of the computer along electric channels Each channel allows the various devices both inside and attached to the system unit to communicate with each other
Antistatic Wristband
Bracelet designed to protect electronics from an electrostatic discharge by preventing a buildup of static electricity on a user Has an attached clip that you connect to any bare metal surface, which acts as a ground
antistatic wristband
Bracelet designed to protect electronics from an electrostatic discharge by preventing a buildup of static electricity on a user.
L1 Cache
Built directly on the processor chip Usually has a very small capacity
expansion bus
Bus that allows the processor to communicate with peripheral devices.
backside bus (BSB)
Bus that connects the processor to cache.
front side bus (FSB)
Bus that is part of the motherboard and connects the processor to main memory.
This is not true about CAPTCHAs
CAPTCHAs were developed to verify input, is coming from computer programs not humans
When a program runs on a computer, the part of the computer that carries out the instructions is called the
CPU
Processing
CPU stands for central _____ unit.
L1 cache
Cache built directly on the processor chip.
L3 Cache
Cache on the motherboard that is separate from the processor chip Exists only on computers that use L2 advanced transfer cache
L3 cache
Cache on the motherboard that is separate from the processor chip.
*Memory Cache*
Cache that helps speed the processes of a computer by storing frequently used instructions and data.
memory cache
Cache that helps speed the processes of a computer by storing frequently used instructions and data.
L2 cache
Cache that is slightly slower than L1 cache but has a much larger capacity.
False
Cambria and Calibri are examples of font styles.
Transistor
Can act as an electronic switch that opens or closes the circuit for electrical charges
Feature of a Smartphone
Case is often behind the display
2 Features of Convertible Tablets
Case is positioned below a keyboard, providing functionality similar to a laptop Display attaches to the case with a swivel-type hinge, enabling the user to rotate the display and fold it down over the keyboard to look like a slate tablet
Desktop as a Service
Companies specifying the applications, security settings, and computing resources available to employees on their desktop computers Images, or configurations, provide a common desktop work environment available to employees across an entire organization Also known as virtual desktop
Comparison Operations
Comparing one data item with another to determine whether the 1st item is greater than, equal to, or less than the other item
CMOS
Complementary metal-oxide semiconductor; technology used by some RAM chips, flash memory chips, and other types of memory chips that provides high speeds and consumes little power by using battery power to retain information even when the power to a computer is off.
Control Unit
Component of the processor that directs and coordinates most of the operations in the computer Has a role much like a traffic officer: it interprets each instruction issued by a program or an application and then initiates the appropriate action to carry out the instruction
*Arithmetic Logic Unit (ALU)*
Component of the processor that performs arithmetic, comparison, and other operations.
arithmetic logic unit
Component of the processor that performs arithmetic, comparison, and other operations. Also called ALU.
*Power Supply*
Component of the system unit that converts wall outlet AC power to the DC power that is used by a computer.
power supply
Component of the system unit that converts wall outlet AC power to the DC power that is used by a computer.
Zipped
Compressed files sometimes are called _____ files.
Cert/CC
Computer Emergency Response Team Coordination Center (A federally funded internet security research and development center)
Plug and Play
Computer can automatically recognize peripheral devices as you install them Can plug in a device and then immediately begin using it
Software as a Service (SaaS)
Computing environment where an Internet server hosts and deploys (utilize) applications Examples: Google Docs
software as a service (SaaS)
Computing environment where an Internet server hosts and deploys applications.
stored program concept
Concept of using memory to store both data and programs.
Hot Plugging
Concept that you can change a removable flash memory device without having to open the system unit or restart the computer Allows you to insert and remove a device while the computer is running
Backside Bus (BSB)
Connects the processor to cache
RAM (Random Access Memory) (Main Memory)
Consists of memory chips that can be read from and written to by the processor and other devices
3 Features of Cases
Contains and protects the electronics of the computer or mobile device from damage Made out of metal or plastic Available in a variety of shapes and sizes
Integrated Circuit
Contains many microscopic pathways capable of carrying electrical current Can contain millions of elements such as resistors, capacitors, and transistors
Processor Core (Core)
Contains the circuitry necessary to execute instructions
*Analog*
Continuous (wave form) signals.
analog
Continuous (wave form) signals.
The ______ is the component of the processor that directs and coordinates most of the operations in the computer.
Control Unit
2 Components of Processors
Control Unit Arithmetic Logic Unit (ALU)
Video Card (Graphics Card)
Converts computer output into a video signal that travels through a cable to the monitor, which displays an image on the screen
Power Supply (Laptop AC Adapter)
Converts the wall outlet AC power into DC power
Fan
Cooling device in computers that are meant to be quiet and can be regulated by temperature.
Which type of memory can support quad, triple, and dual channels?
DDR3
Accessibility
Data and/or applications are available worldwide from any computer or device with an Internet connection
2 Components of a Bus
Data bus Address Bus
Memory Cache
Helps speed the processes of the computer because it stores frequently used instructions and data
4 Features of Cloud Computing
Environment of servers that house and provide access to resources users access via the Internet Consists of a front and back end, connected to each other through a network Front end includes the hardware and software with which a user interacts to access the cloud Back end consists of servers and storage devices that manage and store the resources accessed by users
Terabyte (TB)
Equal to approximately 1 trillion bytes
Gigabyte (GB)
Equals approximately 1 billion bytes
Gigahertz (GHz)
Equals to one billion ticks of the system clock per second
A dual-core processor doubles the processing speed of a single-core processor.
False
Each processor core on a multi-core processor generally runs faster than a single-core processor.
False
If your computer requires that you install memory in pairs, it doesn't matter if the two memory modules are the same type, size, or speed.
False
RAM is an example of nonvolatile memory.
False
The power supply coverts the wall outlet DC power into AC power.
False
Virtual desktop
Feature of cloud computing in which the desktop and its applications appear to be installed on the user's own computer.
hot plugging
Feature that allows you to insert or remove a removable flash memory device and other devices while the computer is running.
___ is the process of obtaining a program or an application instruction or data item from memory.
Fetching
4 Types in the Machine Cycle
Fetching Decoding Executing Storing
You should install a personal ______ a program that protects your computer from unauthorized access by blocking certain types of communications
Firewall
Which type of memory is the main memory installed as DIMMs on a motherboard?
Flash RAM
Space Savings
Floor space required for servers, storage devices, and other hardware shifts away from the user
Points
Font size is gauged by a measurement system called ______.
To promote understanding of software piracy.
For what purpose was the BSA formed?
4 Ways Buses Can Transfer Bits
From input devices to memory From memory to the processor From the processor to memory From memory to output or storage devices
management information system (MIS)
General-purpose reporting systems. objective is to provide reports to managers for tracking operations, monitoring, and control
Data as a Service (DaaS)
Government agencies, companies, and social media sites make data available for developers to incorporate in applications or to use when making business decisions and plans Allows users and application to access a company's data
A(n) ___ was originally a complimentary work for a computer enthusiast
Hacker
Firewall
Hardware and/or software that protects a networks resources from intrusion by users on another network such as the internet.
SIMM (Single Inline Memory Module)
Has pins on opposite sides of the circuit board that connect together to form a single set of contacts
Intel-Compatible Processor
Have an internal design similar to Intel processors, perform the same functions, and can be as powerful, but often are less expensive
3 Types of Technology That Help to Further Dissipate Processor Heat
Heat Sinks Liquid Cooling Technologies Cooling mats
2 Features of Flash Memory
Most computers use it to hold their start-up instructions because it allows the computer to update its contents easily Store data and programs on many mobile devices and peripheral devices, such as smartphones, portable media players, printers, digital cameras, automotive devices, and digital voice recorders
ASCII (American Standard Code for Information Interchange)
Most widely used coding scheme to represent a set of characters
Memory Slots
Motherboard that holds memory modules
RDRAM (Rambus DRAM)
Much faster than SDRAM
Is HTML a programmable language?
No
Word Size
Number of bits the processor can interpret and execute at a given time
Binary System
Number system that has just 2 unique digits, 0 and 1, called bits
*Binary System*
Number system that has just two unique digits, 0 and 1, called bits.
Binary
Number system that has just two unique digits, 0 and 1, called bits.
binary system
Number system that has just two unique digits, 0 and 1, called bits.
4 Types of Characters That Can Be Used to Represent a Byte
Numbers Uppercase and lowercase letters of the alphabet Punctuation marks Other keyboard symbols, such as an asterisk (*), ampersand (&), and dollar sign ($)
gigabyte (GB)
One billion characters.
Gigahertz (GHz)
One billion ticks of the system clock per minute.
*Gigahertz (GHz)*
One billion ticks of the system clock per second.
gigahertz (GHz)
One billion ticks of the system clock per second.
Nanosecond
One billionth of a second.
nanosecond (ns)
One billionth of a second.
hertz
One clock cycle per second.
Hertz
One cycle per second
arithmetic operations
Operations that involve basic calculations such as addition, subtraction, multiplication, and division.
comparison operations
Operations that involve comparing one data item with another to determine whether the first item is greater than, equal to, or less than the other item.
Which of the following is true about disk drive interfaces?
PATA allows for two connectors on a motherboard
Clock Speed
Pace of the system clock, which is measured by the number of ticks per second
cooling pad
Pad that rests below a laptop and protects the computer from overheating and also the user's lap from excessive heat.
System Bus (Front Side Bus) (FSB)
Part of the motherboard and connects the processor to main memory
Feature of Arithmetic Logic Unit
Performs calculations on the data in memory
Microprocessor
Personal computer processor chip
PIN
Personal identification number, a numeric password, either assigned by a company or selected by a user.
DIMM (Dual Inline Memory Module)
Pins on opposite sides of the circuit board do not connect and, thus, form 2 sets of contacts
Memory module
Place where RAM chips usually reside Small circuit board
Chip
Place where the circuitry for the processor, memory, and other components reside on personal computers Small piece of semiconducting material, usually silicon, on which integrated circuits are etched
___ allows developers to create, test, and run their solutions on a cloud platform without having to purchase or configure the underlying hardware and software.
Platform as a Service
5 Features of RAM (Random Access Memory)
When you turn on power to a computer or mobile device, certain operating system files are loaded into RAM from a storage device such as a hard disk Files remain in RAM as long as the computer or mobile device has continuous (Same thing occurs when additional applications are data are requested from storage into RAM) Processor interprets and executes a program or application's instructions while the program or application is in RAM Can accommodate multiple programs and applications simultaneously Most is volatile - must save any data, instructions, and information you may need in the future
L3
Which cache level is on the motherboard and is separate from the processor chip?
MIDI
Which of the following adapter cards connects to musical instruments?
Processor and memory
Which of the following are two main components on the motherboard?
When you enter your name into one account & you are automatically signed into other accounts and services.
Which of the following best describes a single sign on account?
Reorganizing the hard disk so that files are stored in contiguous sectors.
Which of the following best describes disk defragmentation?
To map characters to numeric values that a computer can process
Which of the following best describes the use of ASCII?
PaaS
Which of the following cloud services allows developers to create, test, and run solutions on a cloud platform without having to purchase the underlying hardware and software?
IaaS
Which of the following cloud services uses software to emulate hardware capabilities, such as to increase or decrease bandwidth or storage to meet changing needs?
Office
Which of the following is NOT an example of an operating system?
Presentations are viewed as clip shows
Which of the following is NOT true about presentation software?
The case on a smartphone often is in front of the display.
Which of the following is NOT true about system units?
Some software touted as offering malware protection actually installs more malware.
Which of the following is recommended to avoid malware infections?
Rack
Which of the following server types is housed in a slot on a metal frame?
Supercomputer
Which of the following would not fit on a desk or your hand?
4 Options for eCycling
Wireless carriers and big box retailers Not-for-profit organizations Secondary market EPA
You realize that your computer has been infected by malware, the program has been copying itself repeatedly using up resources, what type of malware might you have?
Worm
Storing
Writing the result to memory
Virtual
You are an IT consultant. A small business client wants to explore cloud computing services as a way to save money and space. The business wants to provide a common work environment of applications, security settings, and computing resources, without requiring all of these to reside on users' computers. You recommend a ______ desktop.
Law enforcement officials cannot access email messages stored on the cloud without informing the user first.
You are curious about cloud data privacy, so you do some research on the potential risks, as well as protection methods and regulations. Which of the following is NOT true about cloud data privacy?
Augmented reality
You are viewing a 3D graphic of a human body that you can use to visualize various muscles and organs by zooming in and out. What type of app are you likely using?
this is not a part of typically single user liscence agreement
You can rent or lease the software
Comparison
You have been studying processors. Your instructor has asked you to help prepare a lecture for introductory students learning about processors. You explain that when payroll software determines which employees should receive overtime based on hours worked, it is a result of a _______ operation.
Worm
You realize your computer has been infected with malware. The program has been copying itself repeatedly, sing up resources. What type of malware might you have?
Always stay connected to the Internet.
You recently purchased a new laptop for home. You want to ensure that you are safe from malware. You should make sure to do all of the following EXCEPT ______.
Cell
Your boss, Molly, asks you to create a spreadsheet for sales data for the store at which you both work. In a spreadsheet, B4 represents a _____.
Purchase software separately rather than having it bundled with the computer.
Your friend Marvin works weekends in an electronics store selling computers. You are in the market for a new desktop for your home. Which of the following does Marvin NOT recommend you do?
Count the cash immediately to ensure you receive the right amount.
Your school is in a safe neighborhood but there have been a few thefts at ATMs. You work part-time in your school's campus security office and have been asked to prepare tips for students about ATM safety. Which of the following will you NOT recommend?
Another term for Botnet is ______ army
Zombie
Word
_____ size is the number of bits the processor can interpret and execute at a given time.
Cloud
______ computing refers to an environment that provides resources and services accessed via the Internet
arithmetic operations
______ include basic calculations such as addition, subtraction, multiplication, and division.
mashups
_______are applications that incorporate data from multiple providers into a new application.
a multi core processor
a ______ is a single chip with two or more separate processor cores.
A bit is
a binary digit, like 0 or 1
system unit
a case that contains electronic components of the computer used to process data, they come in a variety of shapes and sizes.
volatility
a characteristic of databases that refers to the process by which databases are constantly in use or being updated
network
a collection of computers and devices connected together, often wirelessly, via communication devices and transmission media
desktop computer
a computer that is designed so the system unit, input devices, output devices, and many other devices fit entirely on or under a desk or table
What two components work together to perform processing operations inside a processor/CPU?
a control unit and an arithmetic logic unit (ALU)
false
a dual core processor doubles the processing sped of a single core processor.
cloud computing
a general term that refers to a style of computing in which IT services are delivered on-demand and accessible via the Internet. Common examples are Dropbox, Gmail, and GoogleDrive
data center
a location storing a large number of network servers used for the storage, processing, management, distribution, and archiving of data, systems, web traffic, services, and enterprise applications. Also refers to the building or facility that houses the servers and equipment
In object-oriented programming a class is
a model or template from which objects are created
Rootkit
a program that hides in a computer and allows someone from a remote location to take full control or the computer. Once the rootkit is installed, the rootkit author can execute programs, change settings, monitor activity, and access files on the remote computer. Although rootkits can have legitimate uses, such as in law enforcement, their use in nefarious and illegal activities is growing rapidly.
Trojan horse
a program that hides within or looks like a legitimate program. A certain condition or action usually triggers the trojan horse. trojan horse does not replicate itself to other computers.
database
a repository or data store that is organized for efficient access, search, retrieval, and update
operating system
a set of programs that coordinates all the activities among computer hardware devices
platform as a service (PaaS)
a set of tools and services that make coding and deploying these apps faster and more efficient
public cloud
a shared cloud architecture run over a public network, such as the Internet. It allows multiple clients to access the same virtualized services and utilize the same pool of servers across a public network
On a personal computer, all functions of the processor usually are on ___
a single chip
private cloud
a single-tenant environment with stronger security and control for regulated industries and critical data. A ________ ______ resides within an enterprise's own network and firewall
virtual machine (VM)
a software-created computer or operating system
transaction processing system (TPS)
a system designed to process specific types of data input from ongoing transactions
virtualization
a technique that creates multiple operating systems that run on a single physical machine
flash memory
a type of non-volatile memory that can be erased and electronically re-written
infrastructure as a service (IaaS)
a way of delivering cloud computing infrastucture as an on-demand service. Rather than purchasing servers...companies instead buy all computing resources as a fully outsources service
software as a service (SaaS)
a widely used model in which software is leased and available on demand instead of being owned or licensed from the vendor
Internet
a worldwide collection of networks that connects millions of businesses, government agencies, educational institutions, and individuals
adapter card
a(n)_______ is a circuit board that enhances the functions of a component of a desktop or servers system unit and/or provides connections to peripheral devices.
____ is the amount of time it takes the processor to read data, instructions, and information from memory.
access time
A(n) ____ is a circuit board that enhances the functions of a component of a desktop or server system unit and/ or provides connections to peripheral devices.
adapter card
A byte in memory is identified by a unique number called its
address
A(n) ___ is a unique number that identifies the location of a byte in memory.
address
System software
consists of the programs that control or maintain the operations of the computer and its devices. It serves as the interface between the user, the application software, and the computer's hardware.
integrated circuit
contains many microscopic pathways capable of carrying electrical current; can contain millions of resistors, capacitors, & transistors
The ___ is the component of the processor that directs and coordinates most of the operations in the computer
control unit
A ___ rests below a laptop and protects the computer from overheating and also the user's lap from excessive heat.
cooling pad
A(n)____ has a goal of destroying data or stealing information
cracker
A(n)____ demands payment to stop an attack
cyberextortionist
master data
data about the entities of importance to an enterprise, such as customers, products, accounts, and other business-critical data information that are needed for operations and business transactions
dirty data
data of such poor quality that they cannot be trusted or relied upon for decisions
information
data that have been processed, organized, or put into context so that it has meaning and value to the person receiving it
unstructured decisions
decisions that depend on human intelligence, knowledge, and/or experience- as well as data and models to solve them
structured decisions
decisions that have a well-defined method for solving and the data needed to rech a decision
Software as a Service
describes a computing environment where an internet server hosts & deploys applications (example: Salesforce)