CS1 Chapter 1, 2, 3, 4, 5, 9 – Flashcards

Unlock all answers in this set

Unlock answers
question
in the early 1980s, things began to change. _____ were invented and computer use increased dramatically
answer
microcomputers
question
a growing number of college campuses have wireless ____ on campus that allow students to use their PCs to connect wirelessly to the college network and the Internet from anywhere on campus.
answer
hotspots
question
The computer is used extensively for access control at many organizations, such as ____ that allow individuals to enter the office building, punch in or out of work, or access the company network by providing the proper credentials or being authenticated via a fingerprint or hand scan.
answer
authentication systems
question
Hollerith's machine was used to process the 1890 U.S. Census data and was able to complete teh task in ____, instead of the decade it usually took to process the data by hand.
answer
two and a half years
question
Integrated circuits incorporate many transistors and electronic circuits on a single tiny silicon chip, allowing ____ ____ _____ to be even smaller and more reliable than earlier computers.
answer
third-generation computers
question
common input devices include the keyboard and
answer
mouse
question
two of the most common types of communications hardware are___and network adapters.
answer
modems
question
the term refers to the programs or instructions used to tell the computer what to do.
answer
software
question
the windows____ shown in the figure above contains the following objects: Windows, Icons, Menus, Toolbars, Taskbar, Hyperlinks, Sizing buttons, and a Dialog box.
answer
desktop
question
consists of programs designed to allow people to perform specific tasks using a computer, such as creating letters, preparing budgets, and managing inventory.
answer
application software
question
a personal computer (PC) or ____ is a small computer system designed to be used by one person at a time.
answer
microcomputer
question
most notebooks follow the trditional____design in which the monitor is on the inside top half of the PC, and the keyboard and touch pad are on the inside bottom half.
answer
clamshell
question
ultra-mobile PCs are also called
answer
handheld computers
question
A_____ is a collection of hardware and other devices that are connected together so that users can share hardware, software, and data, as well as electronically communicate with each other.
answer
a computer network
question
to contact people cusing the Internet, you most often use their_______
answer
e-mail addresses
question
there are a number of special Web pages, called_____, avaiable to help you locate what you are looking for on the Internet.
answer
search sites
question
is typically free and provided by virtually all ISPs used with personal computers
answer
Web-based e-mail
question
Sarah is a very active real estate agent. She is looking to purchase a new computer and software so she can keep track of her client's accounts, access the Internet from anywhere in the city, and touch-up photos of real estate properties. Sarah needs to store digital photographs of houses she is previewing. She needs to be able to copy these to the computer at her office. What type of storage device should she use?
answer
USB flash drive
question
Sarah is a very active real estate agent. She is looking to purchase a new computer and software so she can keep track of her client's accounts, access the Internet from anywhere in the city, and touch-up photos of real estate properties. Sarah has hired a programmer to create a Web page for her business. What type of programming language will the programmer use?
answer
XHTML
question
Sarah....What kind of computer would most likely fit Sarah's needs?
answer
notebook
question
The documents waiting to be printed are said to be in a(n) _________, which designates the order the documents will be printed.
answer
print queue
question
Most operating systems today use a text-based user interface.
answer
false
question
All Programs and data located in RAM are divided into fixed-length pages or variable-length files.
answer
false
question
In DOS, the command ____ displays the files and folders in the current location.
answer
DIR
question
One of the most obvious initial changes in Windows Vista is the ____ interface.
answer
Aero
question
Although _____originally used a command line interface, most recent versions of _____ programs use a graphical user interface.
answer
Linux
question
There have been many different versions of the ____________ operating system over the last several years.
answer
Microsoft Windows
question
Uninstall utilities are designed to delete temporary files (such as deleted files still in the Recycle Bin, temporary Internet files, installation files, and so forth) in order to free up disk space.
answer
false
question
If a _______file is deleted, becomes corrupted, or has a conflict with another piece of software, then the device will no longer work.
answer
device driver
question
Commercial Linux distributions, such as those available from ____ and Novell, come with maintenance and support materials.
answer
RedHat?
question
The means by which an operating system or any other program interacts with the user is called the ____.
answer
user interface
question
Case-Based Critical Thinking Questions Case 5-1 Janet is studying operating systems as part of her Understanding Computers 101 class. After learning about the different types of operating systems, she realizes that she uses a number of them in her daily life. All the computers in Janet's school computer lab have the newest version of Windows installed and her phone has the newest windows, which is ____.
answer
windows 7
question
____ software consists of the _______ system and utility programs that control a computer system and allow you to use your computer.
answer
system; operating;
question
_________ programs diagnose and repair problems related to your hard drive.
answer
Dis Management
question
There is still a large installed base of Windows XP users and Microsoft plans to support Windows XP until _____.
answer
2014
question
The older DOS operating system and some versions of the UNIX and Linux operating systems use a(n) graphical user interface.
answer
false
question
Most operating systems today are designed for either 16-bit or 32-bit CPUs.
answer
false
question
____ are utility programs that search for documents and other files on a user's hard drives.
answer
search tools
question
An important task that the operating system performs is ____, which keeps track of the files stored on a computer so that they can be retrieved when needed.
answer
file management
question
Case-Based Critical Thinking Questions Case 5-1 Janet is studying operating systems as part of her Understanding Computers 101 class. After learning about the different types of operating systems, she realizes that she uses a number of them in her daily life. Janet has an Apple computer at home. The operating system of that computer is ____.
answer
mac OS
question
A ____ is a software program that is designed to cause damage to the computer system or perform some other malicious act.
answer
computer virus
question
Windows ___ was built from the ground up using a different kernel than the other versions of Windows.
answer
98
question
In practice, the difference between _____ and application software is not always clear cut.
answer
system
question
Case-Based Critical Thinking Questions Case 5-2 Dean has been using computers for some time now, but he is unfamiliar with a number of utility programs. In order to better maintain his computer, he decides to ask his coworker Andrea for advice on basic utility programs. Andrea tells Dean that he should periodically perform ____ on his computer to optimize the hard drive so that it works more efficiently. This process works by rearranging the data on the hard drive so all files are stored in contiguous locations.
answer
disk defragment
question
Most operating systems have security features available, such as an option to automatically download and install ____ from the operating system's manufacturer on a regular basis.
answer
not security walls. either device drivers or security patches
question
In general, the _______ system serves as an intermediary between the user and the computer.
answer
operating
question
Files and folders deleted from removable media cannot be restored by any method.
answer
false
question
Case-Based Critical Thinking Questions Case 5-2 Dean has been using computers for some time now, but he is unfamiliar with a number of utility programs. In order to better maintain his computer, he decides to ask his coworker Andrea for advice on basic utility programs. Andrea advises Dean to remove unnecessary programs from his computer by using a(n) ____ utility.
answer
uninstall
question
____ was originally developed in the late 1960s at AT Bell Laboratories as an operating system for midrange servers.
answer
UNIX
question
Large computer systems—such as high-end servers, ______, and supercomputers— sometimes use operating systems designed solely for that type of system.
answer
mainframe
question
____ refers to the ability of an operating system to work with more than one program at one time.
answer
multitasking
question
Once a ____ management program is open, you can look at the folders and files stored on your PC.
answer
file
question
There are two primary forms of DOS: ______ and MS-DOS.
answer
PC-DOS
question
Case 2-2 Jack has a computer at home that he uses to access the Internet, store and edit personal photos, and create and edit documents. Recently, he has come to realize that in order to keep the computer performing at its best, he needs to carry out regular system maintenance on the computer. Since Jack has a Windows system, he can right-click a hard drive icon in Windows Explorer, select Properties, and then select the ____ option on the Tools tab to check that hard drive for errors.
answer
Check Now
question
A ____ is an electronic path over which data can travel.
answer
Bus
question
ASCII is the coding system traditionally used with personal computers.
answer
True
question
Some ____ must be added in pairs for optimal performance.
answer
Memory Modules
question
MIDI ports are used to receive wireless transmissions from devices.
answer
False
question
The term ____ refers to chip-based storage used by the computer.
answer
Memory
question
With bitmapped images, the color of each ____ is represented by bits; the more bits used, the better the image quality.
answer
Pixel
question
____ consists of nonvolatile memory chips that can be used for storage by the computer or the user.
answer
Flash Memory
question
Terascale computing is the ability of computers to process one ____ floating-point operations per second (teraflops).
answer
Trillion
question
Benchmark tests typically run the same series of programs on several computer systems that are identical except for one component (such as the CPU) and measure how long each task takes in order to determine the overall relative performance of the component being tested.
answer
True
question
Each pixel in a monochrome graphic can be only one of two possible colors (such as black or white).
answer
True
question
____ are small components typically made out of aluminum with fins that help to dissipate heat.
answer
Heat Sinks
question
Most computers today support the ____ standard, in which the computer automatically configures new devices as soon as they are installed and the PC is powered up.
answer
Plug and Play
question
The control unit takes the instructions fetched by the prefetch unit and translates them into a form that can be understood by the control unit, ALU, and FPU.
answer
False
question
The "system unit" is the main case of a computer.
answer
True
question
Case 2-2 Jack has a computer at home that he uses to access the Internet, store and edit personal photos, and create and edit documents. Recently, he has come to realize that in order to keep the computer performing at its best, he needs to carry out regular system maintenance on the computer. Jack can speed up his computer by scanning it for viruses and ____.
answer
Spyware
question
Cache memory today is usually "external" cache.
answer
False; internal
question
The backside bus (BSB) has been one of the most common types of expansion buses in past years
answer
False
question
In order to synchronize all of a computer's operations, a ____—a small quartz crystal located on the motherboard—is used.
answer
System Clock
question
"Memory" refers to the amount of long-term storage available to a PC.
answer
False
question
A ____ is the smallest unit of data that a binary computer can recognize.
answer
Bit
question
A(n) ____ instruction might look like a meaningless string of 0s and 1s, but it actually represents specific operations and storage locations.
answer
machine language
question
The decode unit coordinates and controls the operations and activities taking place within the CPU.
answer
False
question
The "central processing unit (CPU)" consists of a variety of circuitry and components that are packaged together and connected directly to the motherboard.
answer
True
question
the satisfaction received from consumption; sense of well-being
answer
utility
question
a firm with a single owner who has the right to all profits but who also bears unlimited liability for the firm's losses and debts
answer
sole proprietorship
question
a firm with multiple owners who share the profits and bear unlimited liability for the firm's losses and debts
answer
partnership
question
a legal entity owned by stockholders whose liability is limited to the value of their stock ownership
answer
corporation
question
provides owners with limited liability, but profits are taxed only once
answer
s corporation
question
groups that do not pursue profit as a goal; they engage in charitable, educational, humanitarian, cultural, professional, or other activities, often with a social purpose
answer
not-for-profit organizations
question
a condition that arises when the unregulated operation of markets yields socially undesirable results
answer
market failure
question
prohibitions against price fixing and other anti-competitive practices
answer
antitrust laws
question
a cost or a benefit that affects neither the buyer or the seller, but instead affects the people not involved in the market transaction
answer
externality
question
the use of government purchases, transfer payments, taxes and borrowing to influence economy-wide variables
answer
fiscal policy
question
regulation of the money supply to influence economy-wide variables
answer
monetary policy
question
the distribution of tax burden among taxpayers; who ultimately pays the tax
answer
tax incidence
question
the tax as a percentage of income remains constant as income increases; also called flat tax
answer
proportional taxation
question
the tax as a percentage of income increases as income increases
answer
progressive taxation
question
the tax as a percentage of income decreases as income increases
answer
regressive taxation
question
the percentage of each additional dollar of income that goes to the tax
answer
marginal tax rate
question
the value during a given period of a country's exported goods minus the value of its imported goods
answer
merchandise trade balance
question
a record of all economic transactions during a given period between residents of one country and residents of the rest of the world
answer
balance of payments
question
foreign money needed to carry out international transactions
answer
foreign exchange
question
a tax on imports
answer
tariff
question
a legal limit on the quantity of a particular product that can be imported or exported
answer
quota
question
A(n) ____ is a flat, touch-sensitive device used in conjunction with a digital pen.
answer
graphics tablet
question
Scanners produce images through either impact or nonimpact technologies.
answer
False
question
A display device is the most common form of output device.
answer
true
question
Display devices are used to select and manipulate objects, to input certain types of data (such as handwritten data), and to issue commands to the computer.
answer
false
question
You can connect multiple monitors to a device using CRT cable.
answer
false
question
RFID tags need to be within line of sight of a reader.
answer
false
question
Case-Based Critical Thinking Questions Case 4-2 Lisa is a student who regularly uses the computers at her local Internet café to listen to music, talk to her friends and family through the Internet, and play computer games. Lisa needs to make sure that the computer that she is using has a ____ attached to it for her to be able to hear music and the sounds of a computer game.
answer
speaker
question
A ____ is designed to scan flat objects one page at a time.
answer
flatbed scanner
question
Each pixel on an LCD display emits light in the necessary color.
answer
false
question
____ are the most common type of flat-panel technology used for small- to medium-sized computer monitors.
answer
LCDs
question
Portable barcode readers are always used in point-of-sale (POS) systems.
answer
false
question
The number of bits used to store color information about each pixel is called ____.
answer
bit depth
question
Case-Based Critical Thinking Questions Case 4-1 Stacey is the office manager for a small business and is looking for a new printer and scanner for her office. When buying a scanner, Stacey needs to make sure that the scanner has a high enough ____, typically measured in the number of dots per inch (dpi), for the business needs of the office.
answer
optical resolution
question
One-dimension (1D) barcodes contain data only vertically.
answer
false
question
Computer speakers are the most common type of audio output device.
answer
true
question
Optical character recognition (OCR) is a technology confined primarily to the banking industry, where it is used to facilitate high-volume processing of checks.
answer
false
question
Automating the data entry process is referred to as source data automation.
answer
true
question
When scanning, lower resolution is acceptable if the image is to be enlarged significantly or if only one part of the image is to be extracted and enlarged.
answer
false
question
One factor affecting digital camera quality is the number of pixels, measured in ____, used to store the data for each image.
answer
megapixels
question
A(n) ____ is used to display output from a computer to a wall or projection screen
answer
data projector
question
____ are the standard for business documents and come in both personal and network styles.
answer
laser printer
question
The ____ used to be the norm for desktop computers.
answer
CRT monitor
question
PHOLED technology is especially appropriate for use on mobile devices, consumer electronics, and other devices where power consumption is an important concern.
answer
true
question
In a printer, the print ____ affects the quality of the printed output.
answer
resolution
question
Printer output is a type of soft copy.
answer
false
question
Optical zoom specifications reflect how much the camera can zoom without losing image quality.
answer
true
question
A display device is the most common form of output device.
answer
true
question
A ____ provides a secure private tunnel from the user's computer through the Internet to another destination and is most often used to provide remote employees with secure access to a company network.
answer
Virtual Private Network
question
____, the most commonly used type of possessed knowledge, are secret words or character combinations associated with an individual.
answer
Passwords
question
A type of computer infection occurs when a hacker breaches a computer system in order to delete data, change data, modify programs, or otherwise alter the data and programs located there.
answer
False
question
The best protection against many dot cons is ____.
answer
Common Sense
question
Writing a computer virus or other type of malware or even posting the malware code on the Internet is not illegal, but it is considered highly unethical and irresponsible behavior.
answer
True
question
dentification systems determine whether or not the person attempting access is actually who he or she claims to be.
answer
False
question
Many Internet security concerns today can be categorized as cybercrimes.
answer
True
question
A computer ____ is a software program that is installed without the permission or knowledge of the computer user, that is designed to alter the way a computer operates, and that can replicate itself to infect any new media it has access to.
answer
Virus
question
Cuts or other changes to a finger may prevent access via a(n) "keystroke reader".
answer
False
question
Spear phishing e-mails are directly targeted to a specific individual and typically appear to come from an organization or person that the targeted individual has an association with.
answer
True
question
Case-Based Critical Thinking Questions Case 9-2 Fernando has been having problems with his computer. He takes it to his local computer repair shop to be checked and finds out that his computer has a number of malware that he was not even aware of. The technician tells Fernando that his computer has a ____, which might have gotten into Fernando's computer when he downloaded a free computer game from the Internet.
answer
Virus
question
AntiDoS software is used to detect and eliminate computer viruses and other types of malware.
answer
False
question
The term ____ refers to accessing someone else's unsecured Wi-Fi network from the hacker's current location (such as inside his or her home, outside a Wi-Fi hotspot location, or near a local business).
answer
Wifi piggybacking
question
When a digitally signed document is received, the recipient's computer uses the sender's ____ key to verify the digital signature.
answer
Public
question
The ____ includes provisions to combat cyberterrorism, including protecting ISPs against lawsuits from customers for revealing private information to law enforcement agencies.
answer
Homeland Security Act of 2002
question
___ are acts of malicious destruction to a computer or computer resource.
answer
Computer Sabotage
question
Increasingly, USB security keys, also called USB security ____—USB flash drives that are inserted into a computer to grant access to a network, to supply Web site usernames and passwords, or to provide other security features—are being used.
answer
Tokens
question
A computer that is controlled by a hacker or other computer criminal is referred to as a(n) botherder or zombie computer.
answer
False
question
USB security keys are also called USB security tokens.
answer
True
question
Antivirus programs are usually set up to automatically download new ____ from their associated Web site on a regular basis.
answer
Virus Definitions
question
Phishing schemes may use a technique called ____, which is setting up spoofed Web sites with addresses slightly different from legitimate sites.
answer
Typosquatting
question
A computer that is controlled by a hacker or other computer criminal is referred to as a ____.
answer
Bot
question
____ are sets of tools that allow hackers to access a system.
answer
Rookits
question
____ uses a single secret key to both encrypt and decrypt the file or message.
answer
Private Key Encryptions
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New