Study your flashcards anywhere!

Download the official Cram app for free >

  • Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off

How to study your flashcards.

Right/Left arrow keys: Navigate between flashcards.right arrow keyleft arrow key

Up/Down arrow keys: Flip the card between the front and back.down keyup key

H key: Show hint (3rd side).h key

A key: Read text to speech.a key


Play button


Play button




Click to flip

69 Cards in this Set

  • Front
  • Back
If you are creating vector graphics, you must be using:

- paint software.
- draw software.
- photo illustration software.
- drag and drop software.
Draw Software

Paint software uses an electronic canvas to create bit-mapped images. Photo illustration software allows users to manipulate digitized images. Drag and drop software uses ready-made shapes, which can be moved to create diagrams, organization charts, schematics, etc. Vector graphics are created with draw software.
Word processing is an example of what?


With word processing software, what you do to the document (insert images, make text bold, create outlines, etc.) is reflected on the screen, showing you what the document will look like when printed. This is WYSIWYG-"what you see is what you get.
A series of commands, contained within a document, that can be executed when needed is _____?

- an application
- a programming object
- a menu
- a macro
A Macro

A macro is a recorded series of steps or commands that can be stored within a document and used when needed.
A company upgrades their software to a newer version and encounters a few problems. What is the characteristic of the new software that makes this work?

- Interoperability
- Versioning
- Backward compatibility
- Luck
Backward compatibility
what type of graphics file is not bit-mapped
EPS is a widely supported vector graphics format.
What type of datablase is designed to support multiple users, large amounts of data, and the need for a fast, reliable, preformance?

- workstation database
- relational database
- flat database
- network database
Network database
If to get to point G, you must go through A, B, C, D, E, and F, the type of access you are using is called...

- Random
- sequential
- hierarchal
- mappping
The computer based system that optomizes the collection, transfer, and presentation of information through an organization is called:

- A data processing system (DP system)
- a decision support system (DSS)
- a management information system (MIS)
- a intelligent agent
a management information system (MIS)
what do you call the rules that must be agreed upon for transmitting data between 2 devices?

- Domain trust
- protocal
- handshake
What form of security uses a key, or algorithm, to rearrange the bit structure of a message?

- Encryption
- Cryptography
- digital certificate
The primary communications protocol required for data transmission over the internet is called ____________.

TCP/IP, Transmission Control Protocol/Internet Protocol, is the standard internet protocol. SMTP, Simple Mail Transfer Protocol, is used to send mail. FTP, File Transfer Protocol, is used to transfer files. HTTP, Hypertext Transfer Protocol, is the communications protocol used by web browsers and servers. These are all part of the TCP/IP suite of protocols used on the internet.
Each PC that wants to communicate with the network must have a ____________.

- USB hub
- modem
- bus
The network interface card (NIC) enables the exchange of data between PCs in a network. Wireless PCs use wireless NICs.
Star, ring, and bus are examples of what:

- Hybrid connection
- hardware devices
- network typology
- nodes
network typology
In this type of network, all PC's are equal and can share resources

- Peer to peer
- Client/server
- enterprise
Peer to peer
Bob has an interest in restoring a vintage automobile. He would like to be able to ask others who share his interests repair questions, where to purchase parts, and about antique car shows. Which internet resource would be most helpful?

- Email
- Search engines
- newsgroups
- instant messaging
A webmaster stays home but connects to the web server at his office to correct a problem. This person is possibly using _____________.

- Telnet
Telnet runs on your computer and connects you to a computer on the network. You can then enter commands through the telnet program and they will be executed as if you were entering them directly on the other computer's console.
the mark up language which tags text so that it can be displayed by web browsers is called____.

- Java Script
- Perl
A uniform resource locator (URL) includes what pieces of information?

- the name of the domain
- the protocal that will be used and the domain being accessed
- www and the name of the domain being accessed
- the top level domain and the account name in that top level domain
the protocal that will be used and the domain being accessed
A less-than-full-featured
PC which is dependent on
a server for certain
resources, such as storage
and some processing, is
called __________.

- a dumb terminal
- a docking station
- a notebook
- a thin client
A thin client has a processor
and RAM but is dependent on
the server to do much of its
storage and processing.
Because it has less
functionality than a
standalone PC, it is less
What describes the
number of bits handled as
a unit within a computer
system's internal

- Kilobyte
- Octet
- Word

A processor sends and receives electrical signals through one word at a time. A common word size for a PC is 64 bits.
ASCII, ANSI, and Unicode are all types of _____________.

- programming languages
- encryption
- encoding systems
- hexadecimal codes
The system by which bits are represented by letters, numbers and special characters is called an encoding system. The 7-bit ASCII code has been the most popular encoding system for PCs but is being replaced by Unicode. MS Windows has used ANSI to enable text sharing between Windows programs.
A device that translates many types of data or instructions from the user into a form the computer can understand is called:

- an output device
- a peripheral device
- a digitizer
- an input device
an input device
which of the following groups of devices are called input only?

- plotter, terminal, and mouse?
- mouse, track ball, and joystick?
- pen plotter, mouse, and light pen?
- Bar code, OCR, and printer?
mouse, track ball, and joystick
Which type of memory is hardwired by the manufacturer and is used by the computer to produce the initial display screen prompt?

- Flash memory
- Cache memory
ROM, read only memory, is hard wired by the manufacturer of a chip and readies the computer for use.
During processing, data is temporarly stored in the ...
- an input device
- an output device
The type of processor and the ammount of RAM defines a computer's

- Speed and capacity
- memory and chip
- device and controler access time
- expansion slots
speed and capacity
The speed of computers is measured in __________.

- GHz, MHz, MIPS
- bps, Mbps
- baud
Gigahertz (GHz), Megahertz (MHz), Millions of Instructions per second (MIPS) and Floating Point Operations per second (FLOPS) are terms used to describe a computer's speed. Gigabyte (GB) is a measurement of memory. Bits per second (bps), megabits per second (Mbps), or baud are measurements of bandwidth speed.
One million bits is designated by ____________.

- Mb
- MB
- Gb
- GB
Bits are designated by a lowercase "b" and bytes with an uppercase "B". A megabit (Mb) is 1,048,576 bits
Which inventor's vision of a steam powered differential engine to perform calculations introduced many concepts used in today's computers?

- Joseph-Marie Jacquard
- Charles Babbage
- Herman Hollerith
- Blaise Pascal
The government of England withdrew support for Charles Babbage's differential machine. Meanwhile, Babbage had already conceived the idea of a more advanced analytical machine.
The person who's job it is to install system software and hardware, maintain the LAN, and monitor system usage or security is called a:

- programer
- chief information officer
- network administrator
- webmaster
network administrator
In 1969, the Department of Defense created ARPANET as a way to unite a group of scientists located in numerous places. ARPANET evolved into what is now called _____________.

- the World Wide Web
- the Internet
The Department of Defense's Advanced Research Project Agency developed a network so that research scientists, dispersed over a wide geographic area, could communicate faster. It also decentralized computing so that there was redundancy in the network in case of attack.
The use of passwords or user IDs is an example of _____________.

- physical security
- digital certificates
- logical security
- encryption

Logical security is built into software permitting only authorized access and use of a system. Physical security refers to hardware or facilities that could be illegally accessed, stolen, or destroyed. Digital certificates identify the sender of data and help ensure it has not been tampered with. Encryption is a form of data security.
the electronic method of using fingerprints, voice recognition, retinal scanning, or other physical traits to verify identity is called:

- biometerics
- digital ID
- thermograms
- physical security
in order to ensure the security of a transmission over the internet, what might be attached to the message?

- encrypted code
- digital certificate
- application key
- hash
encrypted code
The idea that you should not type your email message in all capital letters is an example of ____________.

- flaming
- email ethics
- network protocols
- netiquette
Netiquette, or network etiquette, is the word coined to describe the rules of conduct on the internet. For example, typing in all caps is considered "screaming" or "yelling" at the recipient.
According to a survey conducted at Stanford University, internet usage has impacted American society in what ways?

- Americans spend less time watching television.
- Americans spend less time with family and friends.
- Americans spend less time shopping in stores.
- All of the above
The Institute for Quantitative Study in Society at Stanford University showed that Americans spend less time with friends and family, shop in stores less, and spend less time watching television. They also found that Americans spent time working for their employers at home without cutting back on office time.
Any data a computer programer receives or asks for to process or any data the computer program displays, prints, or reports is called;

- a string
- a array
- a variable
- input/output
What would be the first step in the development of a computer program?

- Decide which program language to use
- Define the output
- Develop the logic
- Write the program
Before beginning a program, the programmer must have a firm idea of what the program should produce. In the basic model of programming, the output is the last thing produced, but it is the first thing designed.
which expression would not be part of boolean logic?

- OR
What is the term for a set of rules with a finite number of steps used to solve a problem?

- logic
- algorithm
- iteration
- program
What is the term for a section of programming that performs a specific task?

- Function
- Procedure
- Routine
- All of the above
In programming, procedure, function, and routine are terms that describe sections of a program. One distinction between them is that a function returns a value, while a procedure does not. Also, many programming languages come with a prewritten set of functions, although others may be written.
John develops a website. He wants there to be a time-appropriate greeting at the top of the page, such as "Good afternoon." What type of coding would John use to accomplish this?

- Client-side scripting
- Server-side scripting
- Web-based scripting
- C++
Although there are many ways to supply information, efficient coding suggests that if the work can be done on the client machine instead of the server, client-side scripting should be used.
Which type of software takes control of the PC at startup and manages computer resources?

- Multimedia software
- Applications software
- System software
- Allocation software
System software plays a primary role in everything that happens within a computer system.
The logical structures and software routines used to control access to the storage on a hard disk system is called the _______________.

- operating system
- tree
- file system
The file system is the general name given to the system used by an operating system to organize and keep track of files stored on the hard drive. FAT (file allocation table) is the original PC file system designed in the 1970s.
The utility that allows a programer to stop a program at any point and examine what is happening and change variables is called:

- a compiler
- an editor
- a definer
- a debuger
a debuger
A tool that automates and simplifies some of the tasks of programming/scripting is called ______________.

- a compiler
- an interpreter
- an editor
- a programmer
An editor is a tool used by programmers to simplify some tasks. Code or objects that may be used frequently are sometimes available from menus; certain syntax errors may be color coded, etc. FrontPage is a web design tool with an HTML editor.
Operating systems that let you give or select commands by pointing and clicking a mouse are examples of what kind of enviroments?

- Windows
If you type "C:\>copy" in order to make a copy of something, this is an example of

- programing
- syntax
- a command line
A command line
What type of backup system spreads data across several integrated disk drives?

- Archival storage
- QIC data cartridge
Redundant Array of Independent Disks (RAID) provides fault tolerant backup by making a duplicate entry on a duplicate disk for every entry made. It is highly unlikely that two disks will fail at the same time.
Software packages that provide a means for jobs such as data recovery and repair, backups, and virus protection are called ____________.

- utility software
- operating systems software
- anti-viral software
- application software
Norton Utilities is an example of a utility software package that handles a number of system tasks like data recovery, creation of backups, and virus protection.
Done with practice test
Next flashcards will be notes from wikipedia
How many bits to a byte
In almost all modern computers, each memory cell is set up to store binary numbers in groups of eight bits (called a byte). Each byte is able to represent 256 different numbers (2^8 = 256); either from 0 to 255 or -128 to +127.
How large is a computer's memory capacity?
A computer can store any kind of information in memory if it can be represented numerically. Modern computers have billions or even trillions of bytes of memory.
The CPU contains a special set of memory cells called registers that can be read and written to much more rapidly than the main memory area. There are typically between two and one hundred registers depending on the type of CPU.
Registers are used for the most frequently needed data items to avoid having to access main memory every time data is needed. As data is constantly being worked on, reducing the need to access main memory (which is often slow compared to the ALU and control units) greatly increases the computer's speed.
Computer memory types
Computer main memory comes in two principal varieties: random-access memory or RAM and read-only memory or ROM.
RAM can be read and written to anytime the CPU commands it.

In general, the contents of RAM are erased when the power to the computer is turned off
ROM is pre-loaded with data and software that never changes, so the CPU can only read from it. ROM is typically used to store the computer's initial start-up instructions.

ROM retains its data indefinitely
main difference between RAM and ROM
ROM contains a specialized program called the BIOS that orchestrates loading the computer's operating system from the hard disk drive into RAM whenever the computer is turned on or reset. In embedded computers, which frequently do not have disk drives, all of the required software may be stored in ROM.

Flash memory blurs the distinction between ROM and RAM, as it retains its data when turned off but is also rewritable. It is typically much slower than conventional ROM and RAM however, so its use is restricted to applications where high speed is unnecessary.
Software stored in ROM is often called firmware, because it is notionally more like hardware than software

= I/O is the means by which a computer exchanges information with the outside world.
Devices that provide input or output to the computer are called peripherals. On a typical personal computer, peripherals include input devices like the keyboard and mouse, and output devices such as the display and printer.
What classifies as I/O
Hard disk drives, floppy disk drives and optical disc drives serve as both input and output devices. Computer networking is another form of I/O.
U.S. military's SAGE system (1950's)
first large-scale example of a networking/internet system
In the 1970s, computer engineers at research institutions throughout the United States began to link their computers together using telecommunications technology. This effort was funded by ARPA (now DARPA), and the computer network that it produced was called the ARPANET. The technologies that made the Arpanet possible spread and evolved.
The term hardware covers all of those parts of a computer that are tangible objects. Circuits, displays, power supplies, cables, keyboards, printers and mice are all hardware.
Software refers to parts of the computer which do not have a material form, such as programs, data, protocols, etc. When software is stored in hardware that cannot easily be modified (such as BIOS ROM in an IBM PC compatible), it is sometimes called "firmware" to indicate that it falls into an uncertain area somewhere between hardware and software.
Programing language
Programming languages provide various ways of specifying programs for computers to run. Unlike natural languages, programming languages are designed to permit no ambiguity and to be concise. They are purely written languages and are often difficult to read aloud. They are generally either translated into machine code by a compiler or an assembler before being run, or translated directly at run time by an interpreter. Sometimes programs are executed by a hybrid method of the two techniques. There are thousands of different programming languages—some intended to be general purpose, others useful only for highly specialized applications.
What part of the URL is the top level domain?

Examples of common top level domains are com, edu, gov, info, mil, net, org, and biz. Notice that we are just talking about the top level domain. The domain name would be ""; the top level domain just refers to the part after the period.