click below
click below
Normal Size Small Size show me how
ist 101 computer
midterm study sheet
| Question | Answer |
|---|---|
| Computers use langauges what are they called | binary |
| In binary language, each letter of the alphabet, each number, and each special symbol is made up of a unique combination of eight ________ | bits |
| large and expensive computers used by simutaneously are called what | Mainframe computer |
| computers are specially designed computer chips that reside inside other devices such as a car. | Embedded |
| A keyboard and mouse are examples of ________ devices. | input |
| The number of pixels displayed on the screen is known as | screen resolution |
| The ________ contains the central electronic components of the computer. | motherboard |
| is the abbreviation for the place in the computer where the programs and data the computer is currently using are temporarily stored. | RAM |
| RAM is a ________ storage location | volatile |
| The area that holds all the startup instructions the computer needs to start is the _____ | ROM |
| Dropbox is an example of ________ | cloud storage |
| CPU | processes commands issued by software instructions |
| RAM | stores programs and data the computer is currently using |
| ROM | holds start up instructions needed when the computer is powered on |
| LED | more energy efficient than LCD monitors |
| QWERTY | standard keyboard layout |
| Which transmission medium transmits data the fastest? | Fiber-optic cable |
| On a network, a(n) ________ helps prevent data packets from colliding with each other | switch |
| Using a network without the network owner's permission is known as ___ | piggybacking |
| software used to set up and manage a network | NOS |
| What is oveclocking. | Running the CPU at a faster speed then the manufacturer recommended is called |
| what were the top cyber crime reported by the IC3 | thefts of service |
| what is a boot sector | viruses are often transmitted by a flash drive left in a USB port. |
| what is a time bomb | viruses that accurs only on a specific date in history |
| what are polymorph | it can change code to avoid detection |
| what is pharming | When malicious code is planted on your computer and alters your browser's ability to find web addresses |
| what is cyber loafing | Using your computer for non-work activities while you are being paid to work i |
| packet filtering | method for selectively allowing certain requests to access ports |
| CAPTCHA | program that generates distorted text and require that it be typed into a box |
| geotag | data attached to a photo that indicates when/where the photo was taken |
| outsourcing | When a business hires a third-party firm to provide services it once offered itself |
| offshoring | When a U.S. company hires a company outside of the United States |
| Home-based | Which type of job involves little day-to-day supervision and requires a worker who is self-disciplined? |
| Running the Disk Defragmenter utility will __ | make the hard drive work more efficiently |
| what is top down design | __ breaks down a problem into a series of high-level tasks and continues to break each task into successively more detailed subtasks. |
| what is visual basic | s a programming language that can be used to create a wide range of Windows applications |
| what is certification | provides a consistent method of measuring skill levels in a specific IT area |
| what is a solid state | uses electronic memory and has no motors or moving parts. |
| relavitism | s the theory that holds that there is no universal moral truth and that instead moral principles are dictated by cultural tastes and customs. |
| Divine theory command | God is all knowing and sets moral standarards |
| ethics | The study of the general nature of morals and of the specific moral choices individuals |