click below
click below
Normal Size Small Size show me how
Computer Information
Mid-Term Review
| Question | Answer |
|---|---|
| The collection of Web pages available through the internet. | World Wide Web (WWW) |
| The largest and most well-known computer network, linking millions of computers all over the world. | Internet |
| An act of sabotage that attempts to flood a network server or a Web server with so much activity that it is unable to function. | Denial of Service (DoS) attack |
| The use of spoofed domain names to obtain personal info to be used in fraudulent activities. | Phishing |
| The chip located on the motherboard of a computer that performs the processing for a computer. Also called the processor. | Central Processing Unit (CPU) |
| A type of storage medium read from and written to using a laser beam. | Optical Disc |
| Performing operations on data that have been input into a computer to convert that input to output. | Processing |
| The instructions, also called computer programs, that are used to tell a computer what it should do. | Software |
| Knowledge and understanding of basic computer functions. | Computer Literacy |
| A tiny computer embedded into a product designed to perform specific tasks or functions for that product. | Embedded Computer |
| Uniquely identifies specific Web pages. | Uniform Resource Locator (URL) |
| Eight bits grouped together. | Byte |
| Using a storage device that is not connected directly to your computer. | Remote Storage |
| The main circuit board of a computer, located inside the system unit, to which all computer system components connect. | Motherboard |
| The program used by many search sites to retrieve matching Web pages from their database. | Search Engine |
| A small file stored on a user's hard drive by a Web server; commonly used to identify personal preferences and settings for that user. | Cookie |
| The act of blocking access to particular Web pages or types of Web pages. | Internet Filtering |
| A fraud or scam carried out through the internet. | Dot Con |
| A malicious program that masquerades as something else. | Trojan Horse |
| Any illegal act involving the internet. | Computer Crimes |