CMSC 110 Final Exam
If you are going to attach more than 15 devices to your wireless network, you should make sure your router supports which standard?
802.11ac
According to the book, if your CPU usage levels are greater than ________ during most of your work session, a faster CPU can greatly increase your computer's performance.
90%
Ethernet port
A connectivity port that looks a bit larger than a phone jack
embodied agent
A robot which moves and acts much like a human is a(n)
Supercomputer
A specially designed computer that can perform complex calculations extremely rapidly;
The control unit is one component of the ________.
CPU
What is supercomputer used?
In situations in which complex models requiring intensive mathematical calculations are needed
Roll Back Driver
The Windows feature that removes a newly installed, improperly working driver and replaces it with the last one that worked
ROM
The area that holds all the startup instructions the computer needs to start
web server
The computer which hosts a website
A system restore point is a snapshot of your entire computer system's settings [True or false]
True
Computer vision is the ability for a computer to interpret visual data as humans do.[True or False]
True
Information is data that has been organized or presented in a meaningful fashion. [True or False]
True
Computers use a ________ language consisting of 0s and 1s.
binary
Intellectual Property (IP)
is the result of someone's creativity and knowledge and usually is protected by copyrights.
What is not true about a computer byte?
it can either be a 1 or a 0
internet
large network of networks
A packet analyzer is a program that can enable a hacker to do all of the following except ________.
launch a denial of service (DoS) attack on your computer
Automatic recalculation
lets you immediately see the effects of changing values in your spreadsheet.
host
location that maintains the computers that store the website files
Configuring a firewall to ignore all incoming packets that request access to a specific port is known as ________.
logical port blocking
An example of a first-generation language is ________.
machine language
Project ________ tools incorporate tasks and calendars so a project can stay on schedule.
managment
method of asynchronous electronic communication
GUI
operating system interface uses point-and-click technology
Data are sent through a network in bundles called ________.
packets
A(n) ________ protects a computer against power surges
surge protector
An application programming interface (API) is_________________
the code the application software uses to take advantage of code written by others
search engine
tool used to locate information on the web
In the URL: http://www.microsoft.com/surface, the portion labeled ".com" is the
top-level domain
.edu
top-level domains is restricted to degree-granting institutions
DSL broadband service uses ________ cable.
twisted-pair
The ________ of the operating system enables users to communicate with the computer system.
user interface
all-in-one
A stationary computing device that does not need a separate tower because the processor and the memory are stored in the monitor
Which programming language uses a combination of existing technologies like JavaScript, CSS, and XML?
AJAX
Devices that use a unique personal characteristic, such as a fingerprint, in place of a password are called ________ authentication devices.
Biometric
Which type of printer connect directly to the Internet.
Cloud-ready printers
Match the following: I.Defragment and Optimize Drives II.Task Manager III.System Restore IV.File History, File Recovery V.Disk Cleanup A.brings system back to a previously stable state B.repositions related pieces of files on the hard disk to improve access time C.lists all the programs being used and indicates their status D.backs up important files, makes a complete mirror image of your current computer setup E.removes unnecessary files from the hard drive
Defragment and Optimize Drives - repositions related pieces of files on the hard disk to improve access time Task Manager - lists all the programs being used and indicates their status System Restore - brings system back to a previously stable state File History, File Recovery - backs up important files, makes a complete mirror image of your current computer setup Disk Cleanup - removes unnecessary files from the hard drive
When using Windows File Explorer, which view provides the most specific information?
Details
The flowchart shape for a binary decision is a(n) ________.
Diamond
The Windows utility program that removes unnecessary files from the hard drive is called ________.
Disk Cleanup
Code ________ is the step in which a programmer physically types the code into the computer.
Editing
A Rules-based artificial intelligence system is designed based on the rules the human brain uses to function.[True or False]
False
Affective computing is a field of study focused on the managing, processing, and automatic retrieval of information. [True or False]
False
All online word processing applications are as fully featured as installed versions. [True or False]
False
Application software helps run the computer and coordinates instructions with the hardware. [True or False]
False
Crowdfunding is asking for large donations from a few people. [True or False]
False
Deep learning algorithms require data to be labeled correct or incorrect to work properly [True or False]
False
Deep learning algorithms require data to be labeled correct or incorrect to work properly. [True or False]
False
If you reformat the hard drive on a computer, it erases all personal information from your computer and makes it safe to donate. [True or False]
False
Machine learning requires precise programming to achieve the desired results.[True or False]
False
The File History utility only keeps the most recent version of a file.[True or False]
False
The mouse is an onscreen icon that helps the user keep track of exactly what is active on the display screen.[True or False]
False
The smartphone with the most capabilities is known as a feature phone. [True or False]
False
There are federal laws against cyber-stalking. [True or False]
False
Transistors contain a huge number of integrated circuits. [True or False]
False
True or False: Accessing data from the hard drive to send to the CPU is faster than accessing data from RAM.
False
True or False: In terms of video resolution, HD stands for highly digitized.
False
True or False: Registers are areas of memory that are located close to the CPU
False
True or False: Since you can always redownload program files, you do not need to include them in backups.
False
True or False: The conversion rate is the number of times per second that the analog signal is measured and converted into a digital value.
False
True or False: The standard set of vocabulary for pseudocode is specific and detailed.
False
True or False: Using a backdoor program, you can use your computer while you are away from the office.
False
Websites selling a product are often the most accurate and appropriate for research. [True or False]
False
When using a Windows PC, ________ is the main tool for finding, viewing, and managing files.
File Explorer
Computer ________ involves identifying, extracting, preserving, and documenting computer evidence
Forensics
What is a popular copyleft license used for software?
General Public License (GNU)
The CPU usage ________ records your CPU usage for the past minute.
Graph
What type of hackers break into systems for the thrill or to show off their skills.
Gray-hat
Match each of the following network types to its definition: I.HAN II.MAN III.LAN IV.PAN V.WAN A.confined to a small geographic location beyond the home B.services a residence C.used to communicate among devices near an individual D.covers a city E.a network that covers the greatest distance
HAN - services a residence MAN - covers a city LAN - confined to a small geographic location beyond the home PAN - used to communicate among devices near an individual WAN - a network that covers the greatest distance
A stoppage of a mechanical hard drive that often results in data loss is called a(n) ________.
Hard Crash
A(n) ________ is anything designed to deceive another person, either as a practical joke or for financial gain.
Hoaz
Artificial neural networks are based on the structure of the
Human brain
Most small businesses and homeowners purchase and connect to the Internet through a(n) ________.
Internet Service Provider, ISP
What is not a reason someone might risk violating a copyright?
It is hard to prove the copyright in court.
A small Java-based program is called a ________.
Java applet
The ________ of the operating system provides the operating system's basic functionality.
Kernel
A computer lab is an example of a(n) ________ type of network.
LAN; local area network
Most supercomputers use the ________ operating system.
Linux
A large network designed to provide access to a specific geographic area, such as a large city, is a ________.
MAN
Match each of the following terms to its definition: I.MP3 II.AAC III.ADC IV.WMV V.SD A.storage card for media B.digital video file format which includes both audio and video C.digital music file format used broadly D.default digital music file format with iTunes E.converts audio signals into digital signals
MP3 - digital music file format used broadly AAC - default digital music file format with iTunes ADC - converts audio signals into digital signals WMV - digital video file format which includes both audio and video SD - storage card for media
A ________ is a virus that is attached to documents.
Macro Virus
You can automate features in most modern software programs by using custom-built miniprograms called ________.
Macros
Are e-books always PDF format?
No
Is Google Tunes an example of a method to stream music?
No
what is not a key factor a programmer uses in selecting the language for a project?
Number of inputs required
What activities is carried out by the ALU?
Performs arithmetic calculations
________ is a technique that allows the CPU to work on more than one instruction at the same time.
Pipelining
What is the act of copying text or ideas from someone else and claiming them as your own?
Plagiarism
One way to protect your personal information on Facebook is to change your ________ settings.
Privacy
The Windows ________ utility returns your computer to the state it was in when it came from the factory.
Reset
The FedEx logo is a ________ mark.
Service
When you can control devices and appliances by apps installed on your smartphone or tablet, you are said to have a(n) ________ home.
Smart
The program that coordinates all the computer's print jobs is known as a(n
Spooler
Windows uses a memory-management technique known as ________ to monitor which applications you use most frequently and then preloads them into your system memory.
SuperFetch
________ sound is a type of audio system where the listener hears the sound as if it were coming from all directions using multiple speakers
Surround
supervised learning
Teaching Siri or the Google Assistant how to recognize your voice by reading to it is an example of
binary language
The language computers use to process data into information, consisting of only the values 0 and 1.
screen resolution
The number of pixels displayed on the screen
A ________ is a virus that is triggered on a certain date.
Time bomb
Adobe Photoshop
To remove red eye from a digital image, you would use software such as
A file is a collection of program instructions or data that is stored and treated as a single unit [True or False]
True
A metasearch engine searches other search engines instead of individual websites. .[True or False]
True
Solid state hybrid drives are a combination of a mechanical hard drive and an SSD drive. [True or False]
True
True or False: A macro virus is a virus that is attached to a file.
True
True or False: A switch acts like a traffic signal on a network.
True
True or False: A virus signature is a portion of virus code that is unique to a particular computer virus.
True
True or False: Inheritance means that the data and methods of an existing class can be extended and customized to fit a new class.
True
True or False: RAW files are larger in size than JPEG files.
True
True or False: Real property is considered immoveable, such as land or a home.
True
True or False: Second-generation languages are also known as assembly languages.
True
True or False: The Internet is a technically a WAN.
True
True or False: The dark web is a well-concealed part of the deep web.
True
True or False: Video cards are designed with their own RAM storage
True
True or False: Video cards are designed with their own RAM storage.
True
True or False: Your online reputation consists of the information available about you in cyberspace.
True
What is not considered to be exclusively a video port?
USB
What type of port is the most common port used to connect input and output devices to a computer?
Universal serial bus (USB)
When does copyright protection begin?
When a work is created and fixed into a digital or physical form
linked data
When data on the Internet has been formally defined and can be expressed in relationships,
What is a good rule to follow to avoid plagiarism?
When in doubt, cite your source.
When performing searches, the asterisk (*) is used as a(n) ________.
Wild Card
What is a a proprietary OS for desktop and laptop computers?
Windows
________ enables users to define their own data-based tags and facilitates the exchange of information between websites
XML
Beta Version
a software application that is still under development.
Deep Learning (DL)
a subset of ML field that describes systems capable of learning from mistakes
Machine Learning
analyzes patterns in data, then uses the patterns to draw conclusions and adjust the actions of the AI system accordingly.
The best defense against viruses is to install ________ software, which is specifically designed to detect viruses and protect your computer and files from harm.
antivirus
browser
application program used to view the web
Corona and App Inventor can be used to develop ________.
apps for mobile devices
The term network ________ is the same as the network design.
architecture
Crowdfunding
asking for small donation from a large number of people
The ________ process blocks unauthorized users from getting into a computer system.
authentication
The capability of current devices to use earlier standards, in addition to the current standard, is known as ________.
backward compatibility
When it comes to programming, the original class is known as the ________ class.
base
Before its final commercial release, a(n) ________ version of software may be offered to certain test sites or to interested users free or at a reduced cost.
beta
Running the Disk Cleanup utility is a quick way to ________.
clear out temporary Internet files
A(n) ________ is a rule that squeezes the same audio and video information into less space.
codec; compression/decompression
The process that converts program code into machine language is called ________.
compilation
The technology a self-driving car uses to know the difference between a tree and a person is known as computer ________.
computer vision
Blackboard is an example of ________ software.
course management
Each device attached to your computer has a special program called a(n) ________ that enables the device and operating system to communicate with each other.
device driver
The fact that your smartphone can perform various functions previously performed by other devices makes it an example______
digital convergence
Match each of the following terms to its definition: I.digital-to-analog converter II.MPEG-4 III.ripping IV.analog-to-digital converter V.codec A.changes zeros and ones to a continuous analog wave B.converting a song on a CD to a digital computer file C.changes your voice's sound waves into digital signals D.usually has a .mp4 extension E.rule using hardware or software that compresses audio and video information
digital-to-analog converter - changes zeros and ones to a continuous analog wave MPEG-4 - usually has a .mp4 extension ripping - converting a song on a CD to a digital computer file analog-to-digital converter - changes your voice's sound waves into digital signals codec - rule using hardware or software that compresses audio and video information
spam
electronic junk mail
The process of ________ translates data into code so that it is protected from prying eyes.
encryption
Updating the ________ on your network devices can help protect you from hackers.
firmware, operating system
Flatbed scanners
generate digital images which can be printed, saved, or emailed.
When setting up a home network, make sure each node ________.
has a network adapter
custom software
installation enables you to decide which features you want to install on the hard drive
The collection of commands that a specific CPU can execute is called the ________ for that system.
instruction set
A(n) ________ translates source code into an intermediate form of code, line by line.
interpreter
Creative Commons licenses are ________.
irrevocable
Intelligence
is the ability to acquire and apply knowledge and skills.
Match Each of the following: I.entertainment II.enterprise resource planning III.database IV.video-editing V.word processing A.manage back end business functions B.write and edit documents C.play games D.edit movies E.keep track of clients
manage back end business functions - enterprise resource planning write and edit documents - edit movies play games - entertainment edit movies - video-editing keep track of clients - database
Tablet computers and smartphones use ________ operating systems.
mobile
A(n) ________ virus is designed to infect multiple file types in an effort to fool antivirus software.
multi-partite
Routers and switches are example of network ________ devices.
navigation
Is USB considered to be exclusively a video port?
no
is Humanism a system of ethics?
no
The process of identifying all the categories of inputs that are part of the problem the program is meant to solve is known as ________.
object-oriented analysis
LibreOffice is an example of a(n) ________ productivity software package.
open source
When a large group of computers are networked to work together on a task, it is known as ________ processing.
parallel
Match each of the following terms to its definition: I.portability II.reusability III.inheritance IV.method V.data A.a new class can automatically pick up data and methods of an existing class B.the capability to move a completed programming solution easily from one type of computer to another C.the ability to apply classes from other projects to a new project D.an object-oriented action or behavior E.raw inpu
portability- the capability to move a completed programming solution easily from one type of computer to another reusability - the ability to apply classes from other projects to a new project inheritance - a new class can automatically pick up data and methods of an existing class method- an object-oriented action or behavior data - Raw input
A clearly stated objective of how a program should work and how it responds to errors is called the ________.
problem statement
Scanning a product's ________ code with a smartphone can take you to online information and video content.
quick response, QR
Predictive policing
refers to the gathering and analyzing of data in the hope of preventing future crimes
What is the fastest, most expensive memory in your computer?
registers
Virtual reality
replaces perceived reality with a different world.
In the Windows operating system, the C:\ drive is commonly referred to as the ________ directory
root
smallest capacity to largest capacity
second largest - terabyte third largest - gigabyte Fifth Largest - kilobyte Fourth Largest - megabyte Largest - petabyte
A(n) ________ enables the computer to drive the speaker system.
sound card
Match each of the following terms to its meaning: I.spear phishing II.rootkit III.scareware IV.zombie V.spyware A.program that allows hackers to gain access to your computer without your knowledge B.malware on your computer used to convince you that your computer has a virus C.a computer controlled by a hacker D.sending e-mails to people known to be customers of a company to get individuals to reveal sensitive data E.transmits information about you, such as your Internet-surfing habits
spear phishing - sending e-mails to people known to be customers of a company to get individuals to reveal sensitive data rootkit - program that allows hackers to gain access to your computer without your knowledge scareware - malware on your computer used to convince you that your computer has a virus zombie - a computer controlled by a hacker spyware - transmits information about you, such as your Internet-surfing habits
On a network, a(n) ________ helps prevent data packets from colliding with each other.
switch
A(n) ________ error is caused by not following the strict, precise set of rules for a specific programming language. Selected Answer
syntax
An Apple iPad and an Amazon Fire are examples of ________ computers.
tablet
What is computer vision?
the ability to interpret visual information the way humans do
what does motherboard contain?
the central electronic components of the computer
A(n) ________ is the portion of virus code that is unique to a particular computer virus.
virus signature
natural language processing (nlp)
works to develop AI systems that understand written and spoken words.