click below
click below
Normal Size Small Size show me how
Computer Information
Midterm Review
| Question | Answer |
|---|---|
| What is computer literacy? | The knowledge and understanding of computers |
| What does a computer do? | Input, Process, Output, Store, Communication |
| What term refers to the trend where computers are embedded in almost any device you can think of? | Ubiquitous Computing |
| What is the difference between hardware and software? | Hardware is the physical parts of a computer and the software is a set of instructions that tell what a computer should do. |
| What is a network? | A collection of computers that are connected together |
| What is smaller: bit or byte? | Bit |
| What is ASCII? | A coding system traditionally used with personal computers |
| Which system is used by computers to perform mathematical functions? | Binary system |
| What is a CPU? | Central processing unit - the chip located on the motherboard of a computer that performs the processing for a computer |
| What part of the microprocessor performs integer arithmetic operations? | ALU |
| What did the Internet start off as? | ARPANET - an experimental network |
| The program used by many search sites to retrieve matching Web pages from their databases is called ______. | Search engine |
| A Web page that contains regular updates in chronological order, typically acting as a personal online journal for an individual is called a ______. | Blog |
| A small file stored on a user's hard drive by a Web server; commonly used to identify personal preferences and settings for that user. | Cookie |
| The collection of Web pages available through the Internet. | World Wide Web (WWW) |
| What is a dot con? | A fraud or scam carried out through the Internet |
| What is hacking? | The act of breaking into another computer system |
| Where are digital certificates obtained from? | A certificate authority |
| What is a firewall? | A collection of hardware and/or software intended to protect a computer or computer network from unauthorized access |
| What is phishing? | The use of spoofed domain names to obtain personal information to be used in fraudulent activities. |