• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/119

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

119 Cards in this Set

  • Front
  • Back
HTTP is best described as
A protocol used for communication between Web browsers and Web servers
The part of the central processing unit that adds and subtracts numbers is called the
ALU
The File Allocation Table used by most Windows computers in the early 90's used a 16-bit cluster address. How many different cluster addresses were possible using this scheme?
2^16
The 16-bit cluster address became a problem in the mid-90's due to the continuing increase in
disk size
Napster is no longer with us in its original form, because it had an unresolvable problem involving
intellectual property
RISC is best described as a
design philosophy for computer CPUs
The ability of a communication system to handle multiple data transmissions on the same physical medium (for example, many TV channels on a single cable) is called
multiplexing
An IP address that your computer gets from its ISP, and which may be different each time you connect, is called
dynamic
Linux and MacOS are examples of this type of program, which is essential for a computer system to run:
operating system
Name three compression techniques
GIF,Perceptual encoding and JPG
Copying the text of president Adam's convocation speech for a satire or parody is
A protected activity under the fair use doctrine
The ASCII code is used to represent
Plain text characters
The term codec is best defined as
An algorithm for encoding and decoding digital media files
Web pages with snazzy graphics can be visually stunning but unfortunately the images may take a long time to download. A technology specifically designed to deal with this problem is
Compression
Name a protocol specifically for getting Email messages from a server
IMAP
The number of bits per second that can be transmitted accross a network connection is called
Bandwidth
When a large organization decides to link the separate computer systems in all its branches and departments into a single organization-wide system, they have entered the domain of
Enterprise computing
Large central computing resources such as OASIS achieve a very high level of reliability through
redundancy
Renaming the file "Secret Message.doc" to "Secret Message.spy"
Is not adviseable, because the operating system will not know what application to use to open this file
If you were creating a database table called a "member" to keep the names and addresses of members of the UGA Anime society, the information kept about one member would occupy one
record
A piece of data that you collect for each member such as wether or not the member speaks Japanese would be a single
field
In an HTML document that is viewed in a browser, characters inside angle brackets like <H1>
Are only visible if you choose special from the view menu
Expressions like <H1> in HTML documents are called
tags
Gnutella uses what technologies
TCP-IP,Peer-to-peer,MP3
Excel provides SUM, AVERAGE, and COUNT as useful
functions
This company started by a couple of scruffy teenage kids in California made millions by selling the first computers that were affordable and easy to use
Apple
The possibility of affordable personal computers is due to this hardware invention
microprocessor
If Bob sends a message to Alice encrypted with Alice's public key, it must be decrypted using
Alice's private key
The message Bob sends using Alice's public key can only be read by
Alice
For what purpose would Bob typically encode a message for Alice using Alice's private key?
Under no normal circumstances could Bob do this
A technology that allows you to start listening to an MP3 music file from the Web before the file has finished downloading is
streaming
When a small business becomes successful, it may grow out its business information systems. Dealing with this welcome problem involves the issue of
scalability
Which filename extension marks an executable support module?
DLL
Several computers in the same household can share a fast internet connection using what technology?
Routers
Which computer language is found embedded in Web pages?
Javascript
A performance enhancing feature found on Macintosh computers but not windows machines is
RISC
According to the lecture on voting machines Georgia was the first to do what?
to hold a statewide election using only electronic voting machines
Data transmitted on the internet is divided into separated units called
Packets
These data units are steered to the destination computer, which may be all the way on the other side of the world using
IP addresses
The speed of a microprocessor chip is measured in
megahertz
What is the effect of the dot com bubble on the current IT job market?
Collapse of the bubble has left many IT professionals temporarily unemployed
Two computers are able to communicate with each other over a network if and only if they
Use the same protocols
In order to improve voter confidence and eliminate suspicion about the Diebold voting machines
The machines are tested and evaluated by an independant laboratory before the election
According to the lecture on jobs in the information technology area, the most serious long-term threat to IT job prospects is
overseas outsourcing
The ARCHES computing resource at UGA is an example of a
cluster
Which phase in the software lifecycle comes first?
Analysis
Which application program is best suited for maintaining the membership list of a church or a city soccer league?
Access
In order to save a word document under a diffferent file name you would use
The file menu
In order to sort the data in an Excel spreadsheet, you would use
The Data menu
A computer program is basically a long list of
Machine language instructions
Which would be most likely the task of an event handler?
Responding when the user clicks a button in a program
In the movie database example covered in class, movies and reviews were kept in separate
tables
The graphic below represents the operation of a(n)
Distributed virtual supercomputer
Which type of unwelcome virus is most likely to arrive hidden in an email message?
a worm
Forgetting to remove diskettes from the computer when you turn it off increases the vulnerability of
Boot sector viruses
What happens if two computers in your CS lab attempt to transmit data at the same time?
The two senders back off after a delay
Which technology uses an alternate method for dealing with the problem situation that arises when two computers in the same network transmit data at the same time?
Token Ring
If you have just finished typing your term paper using Microsoft word and decide that the concluding paragraph is so good that it should be colored in pink and displayed in a large fancy font, the first thing you must do is
select the paragraph whose formatting you want to change
Which memory and storage components have the fastest access time?
RAM memory
Which memory and storage components have the largest storage capacity
Internal hard disk
Surprise!You find a nice new laptop computer under the tree this christmas. What would most likely be the amount of RAM memory on this machine?
256 megabytes
The UGA email system uses a filtering heuristic to attempt to detect junk email. If the mail system thinks that a particular message is junk mail, it will
move the message to a special junk folder and delete it after nine days
Another term for junk email is
spam
USB is a type of
cable for connecting peripheral devices
In a web page underlined text that can be clicked on to go to a different page is called a
hyperlink
The number of different colors available in a digital image is controlled by its
color depth
In which computer language can we specify a correct result without telling the steps which the computer must take to get the result
SQL
A virus scanning program maintains a list of unique bit patterns that identify different viruses. These patterns are called
signatures
The network hardware used in our computer labs is
Ethernet
A destructive action taken by a virus is called its
Payload
MP3 players such as Winamp use the following technique to compensate for variable delays in transmitting music packets via the TCP-IP protocol
buffering
A special piece of software that allows applications on your computer to control a graphics card is called a
device driver
When a cache is full and more data needs to be cached the system must pick up some data to be removed from the cache. The system makes this decision using the
Least-recently-used-principle
Which part of your computer belongs to the operating system layer
your TCP-IP software
In our movie database example we separated the data into two tables instead of maintaining all the data in a single table. What were the entities represented by each table?
movies and movie reviews
The process of revising tables and entities as we did with the movie database is called
normalization
In a three-tier database, the middle tier is the
Web server
The location of a Web Page on the internet is given by its
URL
A file virus can reproduce itself and take destructive actions only when
an executable file infected with the virus is launched
The operating system used on the computers in our CSCI 1100 labs is
Microsoft Windows XP
Distributing public encryption keys is the task of a
certificate authority
The part of your computer that actually executes program instructions is the
CPU
Two types of computers that are both large powerful and expensive but used for different purposes are
Mainframes and supercomputers
One billion bytes is approximately equal to one
gigabyte
In order to make re-connecting to a Web site more convenient, the Web site is allowed to store certain information on your computer's disk. Then when you reconnect, the web site can retrieve this information so you do not have to type it in a second time. These chunks of stored information are called
cookies
If you were setting up a database to maintain tourist information about Georgia, you would probably include a table of hotels in Georgia. The information about one particular hotel would occupy one database
Record
When we use the database to look up hotels near Athens with swimming pools this would be a database
attribute
The GNU project is involved with
open source software
The key hardware invention that made affordable personal computers possible was
the microprocessor
A firewall protects your computer by
shutting off TCP ports
What type of virus might be contained in a word document
a macro virus
A small piece of software that interprets generic commands for a specific hardware device, such as “print” commands for a particular printer, is a(n)
device driver
When we say that a file virus has replicated, we mean that
Part of the virus code has been executed and has made a new copy of the virus hidden inside an executable file
A file whose name is ctrl3d.dll is most likely
an executable support program
One gigabyte is approximately equal to
One thousand megabytes
RISC is best described as a
Design philosophy for computer CPUs
Which of the following problems would be solved or prevented by a defragmentation utility?
File contents scattered in dispersed locations on the hard disk
This type of destructive code hides inside another file, but does not reproduce itself
Trojan horse
One million bytes is approximately the same as one
Megabyte
Preparing a disk for storing data by laying down its sector and cluster boundaries is called
formatting
This component of the CPU allows the CPU to quickly access needed data:
Cache
DirectX and OpenGL are both
interfaces to graphics cards
Little outlets on the exterior of your computer into which you plug printers, mice, digital cameras, etc. are called
ports
Temporarily storing disk contents in RAM memory and Web pages on the disk are both examples of
the caching principle
Which language is preferred for specifying the color, font, and size of text on a Web page?
CSS
GPL is a type of
software license
This language is widely used to encode data for transmission between computers
XML
Which of the following jobs is considered most vulnerable to being replaced by offshoring?
Computer programmer
Which communications protocol translates alphabetic host names such as www.uga.edu into their corresponding numeric addresses?
DNS
Steve Jobs' most important contribution to computing was
Marketing the first commercially available computer with a GUI
A field in a database record can refer to a record in a different table by using a
foreign key
Which communications protocol breaks a message into packets for transmission across the network?
IP
The process of redesigning a data model to eliminate redundant data and improve efficiency is called
Normalization
A ____ license allows software to be used on any and all computers at a specific location, such as on a university campus.
site
The P, TABLE, and UL elements are all HTML
container elements
Which communications protocol creates a seamless “data pipe” to connect two applications across the Internet?
TCP
A web server returns this number to the web browser, indicating whether the request was successful and if not, what type of error occurred:
status code
A small piece of software that interprets generic commands for a specific hardware device, such as “print” commands for a particular printer, is a(n)
device driver
Microsoft’s Janus and Apple’s FairPlay are both
digital rights management systems