• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/180

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

180 Cards in this Set

  • Front
  • Back
processing multiple instructions simultaneously, each at a different stage of the machine cycle
pipelining
representing a problem as a hierarchy of tasks and subtasks
top down design
the set of specific, sequential steps that exactly describe what a computer program must do to complete the work is know as
algorithm
a hub is a type of
network navigation device
actual programming of software code is done during the __________ step in the SDLC.
development and documentation
In an Ethernet network the component that acts like a traffic signal and amplifies/retransmits data signals within the network is a
hub
Claims to provide a social good by identifying vulnerabilities in a computer system. -- which type of hacker
White hat
A systems local bus runs between the
CPU and main RAM
the operating system of cell phones resides in
ROM
A bus' data transfer speed is determined by its
Bus Width and clock speed
________ viruses will be loaded into memory immediately when the computer starts up, even before virus detection software can load
boot sector
the ________ text system requires special input notation when you hand-write your input to a PDA
graffiti
The network architecture used in most home networks is
Peer to Peer LAN
Unlike viruses, worms do not
replicate themselves
Adding storage capacity to most PDAs requires the use of
Flash Cards
The main characteristic of a tablet PC is its
advanced handwriting technology
todays chips are composed of tens ofmillions of
transistors
In order to support mobile web browsing, phone companies, offering cell phone calling plans usually double as
wireless ISPs
Unicodes advantage over ASCII is that it
supports character representation of many international languates
the earliest electronic switches in computers were
vacuum tubes
the device contained within the system unit that converts binary data into the images that display on the monitor is called
Video card
if you wanta movile computing device that recognizes handwritten characters as a standard feature, your best option is a
tablet pc
unlike sms, mms provides capabilities for
audio and video transmission
the transmission medium with the highest bandwidth is
fiber optic
the category of virus that disguises itself by rewriting its code is called
polymorphic
chip is a common nickname for
integrated circuit
which of the following is most likely to be configured as a client-server local area network
all the computers in a national corp.
two connected computers
ten or more nodes in a business office
a wireless home network
ten or more nodes in a business office
a commonly used material that acts as a semiconductor for c omputers is
silicon
WML is a
language for displaying web content on handheld devices
Moores law is
CPU capacity will double every 18 months
hardware firewalls are typically built in as components of
routers
the operating system in a PDA is store in
ROM
By placing your PDA in a ______ you can connect it to the USB port of a desktop computer in order to synchronize files
cradle
In order to ensure that your anti-virus software is best able to identify and destroy the most recently created viruses you should
us its auto update feature
do tablet pcs include cd drives
no
the portion of the CPU that coordinates the activites of other components of the computer is the
control unit
______ is a technology that allows a PDA to obtain a subset of website info, often eliminating unnecessary graphics and link, in order to reduce bandwith and strage requirements
web clipping
a common method used by firewalls for maximizing the computer security is
blocking access to logical ports
a software program designed to preven unauthorized access to a computer system is called
firewall
a program that apears to perform a useful task but, in addtion, does something milicious in the background is called a
trojan horse
the __________ rate of digital conversion of music content will affect teh size and quality of the MP3 file
sampling
unlike a desktop or laptop computer, most PDAs do not include
an internal hard drive
mathematical calculations and comparison decisions are performed by the
ALU
The leaset expensive mobile communication device is a
pager
the category of operatig system that you most likely have running on your PDA computer is a _______ OS
Single-user, single-task
a flash card is an example of
a non-volatile memory chip
_____ viruses attach to multiple file types in order to escape detection
multpartite
The acronym ASCII stands for
American Standard Code for Information Interchange
Packet filtering and logical port blocking are common techniques used by ______ to protect computers on the internet
firewalls
The quality of music in an MP2 file, as well as its size, is impacted by the rate of ------ that was used during its creation
sampling rate
tye type of network adapter that is installed inside a computer as an expansion card is called a
NIC
a ------- network is one in which each computer can communicate directly with each other, with no central control in the network
p2p
the technology that allows text messaging in cellular phones is called
SMS
th emost common input device used for a tablet pc is a
stylus; digital pen
the general term for handheld computers such as the palm pilor or pocket pc is
pda
------ ports are quickly becoming the most common ports on computer today and are versatile enough to connect many types of peripheral devices
USB
a tablet pc or laptop can be placed in a ----- to make it easy to quickly connect to peripheral devices without the need to repeatedly insert cables into the computer's ports
docks, docking station
the microbrowser in a cell phone interprets web pages that are written in a language called
WML
the process of periodically transferring files between the PDA and the computer so that they are identical is called
synchronization
the data transfer rate of a transmission medium is also called
bandwidth
the circuitry that includes the cpu, memory chips and expansion slots is located on the
motherboard
bit refers to
a 0 or 1 value
the ability of an operating system to control the activites of multiple programs at the same time is called
multi-tasking
microsoft offices is an example of
software suite
the project originating the computer network that eventually evolved into the modern-day internet was called
ARPANET
the terms megahertz and gigahertz refer to the number of ----- per second that a cpu can perform
machine cycles
sortware that you can use for a trial period before paying for it is called
shareware
if you want to maximize the pseed at which web pages will be downloaded and displayed on your browser, the best internet connection option is
ADSL
managing hardware on the computer, providing an interface for users to interact with the computer, and controlling the adccess that paplication programs have to the Cpu are all taskes performend by
the OS
a NIC is used in conjuction with an
ethernet port
by managing the communications lines that make up the main transmission media of the internet, companies like att, spring and mci act as
internet service prviders to end-users like you and me
the category of software most appropriate for controlling the design and layout of complext documents like newsletters and brocures is
desktop publishing
the devices that allows computers to send datea along telephone lines is called
modem
which of the following internet-basec communication methods is most similar to conducting a private telephone conversation with a single person
instant messaging
which of the following is considered to be volatile storage
RAM
the brains of the computer which executes the instructions is called the
cpu
many computers inclue a restart button on the fron panel; pressing it will cause the system to perform a
warm boot
a set of four numbers separated by dots that identifies a computer on the internet is called
ip address
the main difference between application and system software is that
system software manages hardware whereas application software performs tasks
the following are all broadband connections except
dsl
dialup
isdn
cable
dial up
the follwoing internet connection options all use telephone lines except
dial up
isdn
dsl
cable
cable
what type of port sends data one bit at a time
serial
slide layouts and design templates are features of ---- software
presentation
the following tasks are all performed by productivity software except
spreadsheet modeling
word processing
personal info management
file compression
file compression
online retail web sites such as amazon.com fall into the ----- category of e-commerce
b2c
volatile storage refers to
loss of data on the strage device when power is shut off
which of the follwoing software products is the most appropriate for developing web pages
corel draw
arcsoft
macromedia dreamweaver
adobe pagemaker
macromedia dreamweaver
the instructions that a computer needs in order to start up are located in
ROM
the process of converting a digital computer signal into an analog telephone signal is called
modulation
if you want to exit out of a non-responding program, you can do this viea the ------ utility
task manager
which method of web searching involves starting with a major categories then narrowing in on successively more specific subcategoreis until finding a list of specific web sites
subject directories
software providers who develop many productivity tools may also provide stripped-down version sthat combine the simpler features of these tools bundled together
integrated software application
the term 56k when applied to modems refers to
data transfer rate
the term that refers to computers that provide resources to other computers in a network is
server
which of the following is an example of system software
operating system
there are - bits in a byte
8
which of the following ports is most likely to be used for connecting a pirnter to a computer
parallel
the general category of software that enables people in different locations to work together on common projects is called
groupware
a company that provides internet access is an
ISP
the cell address C5 indicats that the cell is in the ---row and --- column of the worksheet
fifth, thrid
a scientific institution performing intensive mathematical operation for a complex model that requires extremely poerful computer capabilities wiill most likely make use of
supercomputer
correct sequence of smallest to largest unit of storage
kilo,mega,giga,tera,peta
instructions and data that are about to be processed by teh CPU are located in
RAM
the program that controls the overall functioning of your ocmputer's hardware is called the -----
operating system
the term that refers to unwatned and unsolicited email messages, usually coming in the form of ads from companies is
spam
copyrighted software that is provided without charge usually over the internet is called
freeware
commercial web sites will often store text files called ------- on your computer to keep track of info regarding your purchasing activites
cookies
---- technology involves using input devices, including microphones and video camers, on computers in a network to enable rel-time communications in a "meeting" format when participants are geographically distant from each other
videoconferencing
- is a special purpose language that is used for creating web pages and that allows communication on the www
HTML
most productivity software tools proves -- to guide users in a step-by - step manner through performing complicated tasks
wizards
training prgrams that requre the student to operate in realistic or dangerous environments, such as teaching pilots to fly or people to operate complicated machinerty, utilze ----- techniques
simulation
the location where external devices connect to a computer is called a ------ of which there are many types, such as serial, parallel or USB
port
a kilobyte is approx --- bytes
2^20 -- 1000
each computer on the internet is assigne a unique identification number called an
ip address
== is the science that attempts to produce machines exhibiting human-level intelligence
AI -- artificial intelligence
with ----- dsl, the data transfer rate for uploading data is the same as the data transfer rate for downloading data
symetrical
the category of hardware that includes keyboards and mice is known as -- devices
input
what do computers do
they are data processing devices -- they help organize sort and categorize data to turn it into information
what are the computers 4 major functions
1. gathering data (or allows users to input data) 2. it processes that data (performs calculations or some other maipulation of the data) 3. it outputs data or info (displays infor in a form suitable for the user 4. it stores data and info for later use
what is the difference between data and information
data is a representation of a fact or idea.
Info is data that has been organized or presented in a meaningful fashion -- information is more powerful than raw data
what is the difference between application software and system software
application software is the set of programs you use on a computer to help you carry out tasks
system software is the set of programs that enables your computer's hardware devices and application software to work together
what are mainframes
large expensive computers pecifically designed to provide services to hundreds or thousands of users at a time
what are supercomputers
computers designed to perform a small number of calculations as rapidly as possible
what is a trackball mouse
the rolerball sits on top or on the side of the mouse so you can move the ball with yoru fingers
differenct between optical mouse and wireless mouse
optical -- laser, or internal sensor
wireless -- batteries and send data to the computers via radio or light waves
what is the difference between CRT and LCD monitors
CRT -- cathode ray tube -- tv set monitor; curved screen, cheaper, high resolution, can be viewed at an angle and better color quality
LCD -- liquid crystal display -- flat screen, smaller, lighter and more energy efficient
difference between impact and nonimpact printers
impact -- hammer like keys that strike the paper through an inked ribbon
non impact -- spray ink or use laser beams to transfer marks on the paper -- inkjet and laser

also:plotters -- large printers for oversized pictures

thermal printers -- melting wax based ink or burning dots into specialty coated paper
serial ports are
ports that send data one bit at a time and are often used to connect modems to the computer
parallel ports are
ports that send data between devices in group sof bits at speeds of 500 Kbps and is therefore much faster than a serial port. often used to connect printers to computers
connectivity ports are
ports that give you access to networks and the internet and enable your computer to function as a fax machine
include modem and ethernet ports
modem ports
it uses a traditional telephone signal to connect two computers
ethernet port
slightly larger than a standard phone jack -- can connect your computer to a DSL/cable modem or a network
computers volatile memory
RAM -- located on the motherboard -- where all data and instructions are held when computer is running
permanent type of memory
ROM -- responsible for housing instructions to help start up the computer
What is ergonomics
how to arrange your computer and equptment to minimize your risk of injury or discomfort
origin of the internet
military officials developed the internet as a reliabel means of communication sin the event of war
ADSL
SDSL
Asymmetrical Digital Subscriber Line -- transmissions download (receive) data from the internet faster than they can upload (send)

Symmetical Digitcal Subscriber Line - upload and download data at the same speed
URL
Uniform Resource Locator -- composed of several parts -- protocol, host, top-level domain and occasionally paths (subdirectories)
subject directory
a structured outline of web sites organized by topics and subtopics
Boolean operators
words like and, not and or -- used to refine searches
difference between listservs and newsgroups
listservs- private
newsgroups - public
productivity software
brance of application software; include wordprocessing, spreadsheet, presentation, personal information management (PIM) and database programs
shareware and freeware
shareware - software that allows you to test sofware (limited time free of charge)
freeware - copyrighted software you can use for free
utility programs
programs that perform general housekeeping tasks for the ocputer, such as system maintenance and file compression
four categories of operating systems
Realtime OS - require no user intervention and are designed for systems with a specific purpose and response time (robotic machinery)
Single-user,single task OS: computers on which one user is performing one task at a time -- pdas
Single-user,multitask OSs; computers on which one user is performing more that one task at a time -- desktop computers
Multiuser OS -- are designed for systems in which multiple users are working on more than one task at a time
GUI
Graphical user interface -- display graphics and use the point and click technology of the mouse and cursor, making the OS more user friendly -- common features include windows, menus and icons
device drivers
facilitate the communication between devices attached to the computer and the OS -- translate the specialized commans of devices to commants that the OS can understand and vice versa, enabling the OS to communicate with ever device in the computer system
APIs
Application programming interfaces-- the OS includes the blocs of code to which software applications refer -- facilitating the interaction between OS and application software
4 steps of boot process
1. basic input/output system (BIOS) is activate by powering on the CPU
2. in the Power on self test (POST) test, the BIOS checks that all attached devices are in place
3. the operating system is loaded into RAM
4. Configuration and customization settings are checked
Function of the CPU
processes instructions, performs calculations, manages the flow of information through a computer system and is responsible for processing into info the data you input. -- composed of two units ALU(arithmatic logic unit) and control unit
machine cycle
process the cpu goes through to fetch, decode, execute and store data
largest soure of nonvolatile memory
hard drives
amplified and unamplified speakers
amplified -- external power
unamplified -- internal power
port
an interface through which wxternal devices connect to the computer
IrDA port
based on a standard developed by the Infrared Data Association for transmitting data -- enable you to transmit data between two devices by using infrared light waves
Bluetooth
uses radio waves to send data over short distances -- allows wireless transport of data
MIDIport
port that allows you to connect electronic musical instruments to your cmoputer (Musical Instrument Digital Interface)
expansion cards
allows additional ports to be connected to the computer -- install into a system unit -- (expansion hubs are similar yet connect to your system through aa port)
what do networks allow users to do
1. share peripherals
2. transfer files easily
3. share an internet connection
difference between client server networks and peer to peer networks
client server -- 10 or more nodes -- contains two types of copmuters -- a client which users accomplish specific taskes and a swerver that provides resources to the clients and central control for the network
peer to peer - each node of the network can communicate directly with ever other node instead of having a separate device exercies central control over the network -- most common -- in homes
4 main components of every network
1. transmission media to connect and establich sommunication between nodes
2. network adapters that allow the nodes on the network to communicate
3. network navigation devices that move data around the network
4. software that allows the network to run
difference between powerline and phone line networks
power line -- use the electrical wiring in your home to connect the nodes in the network
phoneline -- move data through the ntwork using conventional phone lines

both have low throughput and are more expensive than ethernet
white hat hackers -- black hat hackers -- script kiddies
white hat -- not malicious; exposing system
black hat -- want to destroy info or for illegal gain
script kiddies -- amateur hackers -- use tools created by skilled hackers that enable unskilled novices to wreak the same havoc as professionals
what is a firewall
a program designed to keep computers safe from hackers -- closes off invaders to logical ports
WPA -- WEP
wi-fi protected access
wired equivalent privacy -- both use encryption (a method of translating your data into code) to protect data in your wireless transmissions.
SSID
network name
virus
a program that attaches itself to another program and attempts to spread itself to other computers when files are exchanged
bootsector virus
replicate themselves into the MASTER BOOT RECORD on the hardrive
logic bombs and time bombes
logic-- viruses that are triggered when certain logical conditions are met, such as opening a file, booting your computer or accessing certain programs
time -- viruses that are triggered by the passage of time or on a certain date
worms
slightly different from viruses in that they attempt to travel between systesm through network connections to spread their infections. infect a host file and wait for that fil to be executed on another computer to replicate
Script and Macro Viruses
Script - lists of commands, actually mini programs, that are exectued without your knowledge, often used to perform useful legitimate function on web sites such as collecting names and address info
macro - attached to documents that use macros (a short series of commands that usually automates repetitive tasks)
trojan horses
do something unintended to the victim's computer -- while pretending to do something else
polymorphic virus
change their own code -- or rewrite themselves to avoid detection -- most infect on certain type of file ie .ese files
mulipartite viruses
designed to infect muliple file types in an effort to fool the antivirus software that is looking for them
stealth viruses
temporarily erase their code from the files where thye reside and hide in the active memory of the computer
do pdas have built in hard drives
no, but for memory needs beyond their built-in ram and rom, pdas use removale falsh memory
switch
electronic switches are devices inside the computer that flip between two stats -- 1 or 0 -- on or off. transistors are switches built out of layers of semiconductors. Integrated circuits are very samll regions of semiconductor material that suppor a huge numbers of transistors
ASCII and Unicode
ASCII code uses 8 bits to represent 255 characters -- Unicode uses 16 bits to represent 65,000 characters
cache memory
consists of small blocks of memory located directly on and next to the CPU chip that hold recently or frequently used instructions or data that the cup needs the most. the cpu can more quicly retrive data and instruction from cache than from ram
bus
an electrical wire in the computer circuitry through which data travels between the computer various components. Local bueses are on the motherboard and run between the cpu and the main system memory -- the width of the bus dtermines how many bits of data can be sent along a given bus at any one time.