CS Final – Flashcards

Unlock all answers in this set

Unlock answers
question
Eight bits grouped together are collectively referred to as a ____.
answer
byte
question
A ___ is the smallest unit of data that a binary computer can recognize.
answer
bit
question
Video data - such as home movies, feature films, and television shows - is displayed using a collection of ______.
answer
frames
question
A(n) ___ instruction might look like a meaningless string of 0s and 1s, but it actually represents specific operations and storage locations.
answer
machine language
question
One measurement of the speed of a CPU is the ___, which is rated in megahertz (MHz) or gigahertz (GHz).
answer
CPU clock speed
question
A computer ____ is the amount of data (measured in bits or bytes) that a CPU can manipulate at one time.
answer
word
question
A ___ is an electronic path over which data can travel
answer
bus
question
The bus width and bus speed together determine the bus's ___ or bandwidth; that is, the amount of data that can be transferred via the bus in a given period of time.
answer
throughput
question
____ have begun to replace ROM for storing system information, such as PC's BIOS.
answer
flash memory chips
question
The ___ is the section of the CPU that performs arithmetic involving integers and logical operations.
answer
ALU
question
The ___ tries to predict what data and instructions will be needed and retrieves them ahead of time, in order to help avoid delays in processing.
answer
prefetch unit
question
In order to synchronize all of a computer's operations, a ____ - a quartz crystal located on the motherboard - is used
answer
system clock
question
Some drive letters, such as the letter __ typically used w/ the primary hard drive, are usually consistent from computer to computer and do not change even if more storage devices are added to a computer.
answer
C
question
_____ means that data can be retrieved directly from any location on the storage medium, in any order.
answer
random access
question
Anything (such as a program, letter, digital photograph, or song) stored on a storage medium is referred to as a(n) ____.
answer
file
question
Virtually all personal computers come with a(n) ____ that is used to store most programs and data.
answer
hard drive
question
Each hard disk is divided into pie-shaped groups of ___.
answer
sectors
question
A strategy for speeding up hard drive performance is ___.
answer
disk caching
question
The time required to move the read/write heads to the cylinder that contains (or will contain) the desired data is called the ____.
answer
seek time
question
Partitions are sometimes referred to as ____.
answer
logical drivers
question
Conventional CD discs use ___ lasers.
answer
infrared
question
CD-ROM discs and DVD-ROM discs are ____ optical discs and come prerecorded with commercial products.
answer
read-only
question
____ devices are high-performance storage servers that are individually connected to a network to provide storage for the computers connected to that network.
answer
Network attached storage (NAS)
question
Some smart cards today store ___ data - such as the characteristics of a finger print - int he card and use that data to ensure the authenticity of the card's user before authorizing the smart card transaction.
answer
biometric
question
RAID 0 uses disk ___, which spreads files over several disk drives.
answer
striping
question
With a ___, the user touches the screen with his/her finger to select commands or otherwise provide input to the computer with which it is being used.
answer
touch screen
question
A ____ is designed to scan flat objects one page at a time.
answer
flatbed scanner
question
A ____ is an optical code that represents data with bars of vary widths or heights.
answer
barcode
question
____ input data from special forms to score or tally exams, questionnaires, ballots, and so forth.
answer
Optical mark readers (OMRs)
question
One factor affecting digital camera quality is the number of pixels, measured in ___, used to store the data for each image.
answer
megapixels
question
Wireless displays connect to a computer using wireless networking connection such as Wi-Fi or ____.
answer
Bluetooth
question
Print speed is usually measured in ____.
answer
pages per minute (ppm)
question
____ form images by spraying tiny drops of liquid ink onto the page, one line printed at a time.
answer
Ink-jet printers
question
System software is usually divided into two categories: operating system software and ___ programs.
answer
utility
question
The ___ boots the computer, launches application software programs, and ensures that all actions requested by a user are valid and processed in an orderly fashion.
answer
operating systems
question
Small programs called ___ are used to communicate with peripheral devices, such as monitors, printers, and scanners.
answer
drivers
question
Most operating systems have security features available, such as an integrated ___ to protect against unauthorized access via the Internet.
answer
firewall
question
___ memory allows you to use more memory than is physically available on your computer.
answer
Virtual
question
A ___ is an area in RAM or on the hard drive designated to hold input and output on their way in or out of the system.
answer
buffer
question
The most recent version of Windows is Windows __.
answer
7
question
The file management program incorporated into Windows is ____.
answer
Windows Explorer
question
When a software program is purchased, the buyer is acquiring a(n) ___ that permits him or her to use the software.
answer
software license
question
There are 4 basic categories of software: commercial software, shareware, freeware, and _____.
answer
public domain software
question
Companies that deliver SaaS are sometimes referred to as ____.
answer
application service providers (ASPs)
question
A single spreadsheet document is often called a ____.
answer
worksheet
question
In a worksheet, the intersection of a row and a column is called a ____.
answer
cell
question
Although labels and constant values will be copied exactly to the new location, the way formulas behave when they are copied depends on whether they use relative cell referencing or ___.
answer
absolute cell referencing
question
The most common type of database used on PC's today is a(n) ____.
answer
relational database
question
A ____ is a question, or, in database terms, a request for specific information from the database.
answer
query
question
____ refers to organizing the content to be transferred to DVD, such as importing video clips, creating the desired menu structure, and so forth.
answer
DVD authoring
question
A(n) ___ is a collection of elements (people, hardware, software, and data) and procedures that interact to generate information needed by the users in an organization.
answer
information system
question
____ is the process of gathering, storing, accessing, and analyzing data about a company in order to make better business decisions.
answer
Business intelligence
question
____ refer to the variety of systems in place to record the details of financial transactions, such as payments and purchases.
answer
Accounting systems
question
___ is a special type of large, integrated system that ties together all types of a company's activities such as planning, manufacturing, sales, marketing, distribution, customer service, and finance.
answer
ERP
question
___ refers to the use of computers to help manage manufacturing operations and control machinery used in those processes.
answer
Computer-aided manufacturing (CAM)
question
A ____ is responsible for maintaining a large, multiuser system.
answer
system administrator
question
Each phase of the ___ produces some type of documentation to pass on to the next phase.
answer
system development life cycle
question
When a proposal for a new system or system modification is submitted, one of the first steps is to conduct a ___.
answer
preliminary investigation
question
___ programming focuses on the step-by-step instructions that tell the computer what to do to solve a problem.
answer
Procedural
question
___ is the first phase of the PDLC.
answer
Problem analysis
question
In a(n) ___ check, the programmer "walks" through the program design, keeping track fo the values of any look counters and other variables in a tracing table to ensure the program does what it is intended to do.
answer
desk
question
___ are notes within the actual program code that identify key features and steps of the program but that are written in such a way that the computer knows to ignore them when the program is executed.
answer
Comments
question
Rather than creating a complete object module for a program, a(n) ___ reads, translates, and executes the source program one line at a time.
answer
interpreter
question
___ errors occur when a formula is written incorrectly, when a mistake is made with a decision condition, or when the wrong variable name is used.
answer
Logic
question
___ is a broad term to describe creating and managing an application throughout its entire lifecycle - from design through testing.
answer
Application Lifecycle Management (ALM)
question
A field is also called a ___.
answer
column
question
A ____ is a collection of related fields.
answer
record
question
The field in a table that is used to relate that table to other tables is called the ____.
answer
primary key
question
___ are made up of related records.
answer
Tables
question
The ___ contains all data definitions for a database, including table structures, security information, relationships between the tables in the database, and so on.
answer
data dictionary
question
A(n) ___ is a small table consisting only of a list of the primary key field for each record in a table along with location information for that record.
answer
index
question
With a ___, a database is located in its entirety on a single computer, such as a server or mainframe computer.
answer
centralized database system
question
The ___ is the most widely used database model today.
answer
relational database management system (RDBMS)
question
A ___ extracts specific information from a database by specifying particular conditions (called criteria) about the data you would like to retrieve.
answer
query
question
Web-based database requests are received by the Web server, which then converts the request into a database query and passes it on to the database server with the help of software called ____.
answer
middleware
question
One objective of the ___ project was to create a computer network that would allow researchers located in different places to communicate with each other.
answer
ARPANET
question
___ are businesses or other organizations that provide Internet access to others, typically for a fee.
answer
Internet service providers (ISPs)
question
___ are companies that manage and distribute Web-based software services to customers over the Internet.
answer
Application service providers (ASPs)
question
___ is charged with such responsibilities as IP address allocation and domain name management.
answer
ICANN (Internet Corporation for Assigned Names and Numbers)
question
The ___ is the most commonly used Internet search type.
answer
keyword search
question
___ allows you to exchange real-time messages easily with people on you buddy list - a list of individuals that you specify.
answer
Instant messaging
question
Online shopping and online investing are examples of ___.
answer
e-commerce
question
Computer crime is sometimes referred to as ____.
answer
cybercrime
question
___ are sets of tools that allow hackers to access a system.
answer
Rootkits
question
The term ___ refers to accessing someone else's unsecured Wi-Fi network from the hacker's current location (such as inside his/her home, outside a Wi-Fi hotspot location, or near a local business).
answer
Wi-Fi piggybacking
question
Increasingly, USB security keys, also called USB security ____ - USB flash drives that are inserted into a computer to grant access to a network, to supply Web site usernames and passwords, or to provide other security features - are being used.
answer
tokens
question
A ___ is security system that essentially creates a wall between a computer or network and the Internet in order to protect against unauthorized access.
answer
firewall
question
A ___ provides a secure private tunnel from the user's computer through the Internet to another destination and is most often used to provide remote employees with secure access to a company network.
answer
virtual private network
question
___ is a generic term that refers to any type of malicious software.
answer
Malware
question
A ___ is a malicious program that masquerades as something else - usually as some type of application program.
answer
Trojan horse
question
A computer ___ spreads by creating copies of its code and sending those copies to other computers via a network.
answer
worm
question
Images are available in many formats such as TIF, BMP GIF, JPEG, and ___.
answer
PNG
question
GIF images are always rectangular, but can use a(n) ___ background color to make the images appear to be nonrectangular.
answer
transparent
question
When a Web page requires a very large image (such as to better show a product, home for sale, or featured piece of art), a(n) ____ can be used to save loading time.
answer
thumbnail image
question
A ___ is a small program inserted into a Web page that performs a specific task, such as changing the values in a stock portfolio, scrolling text or images across the screen, and so forth.
answer
Java applet
question
___ refers to the process of planning what your Web site will look like and how it will work.
answer
Web stie design
question
The first basic step in the development process of a multimedia Web site is ___.
answer
creating the multimedia elements
question
Most Web pages today are written in a _____ - a coding system used to define the structure, layout, and general appearance of the content of a Web page.
answer
markup language
question
___ tags are similar to HTML tags, but there are stricter rules about how the markup tags are written.
answer
XHTML
question
____ was originally developed as a programming language designed for processing text.
answer
Perl
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New