click below
click below
Normal Size Small Size show me how
COMP1200
STUDY TABLE
| Question | Answer |
|---|---|
| Exam 1 | Chapter 1 Questions page 28 |
| What are four primary operations of a computer? | Input, Processing, Output and storage |
| 3.Describe the difference between data and information. | A user inputs data into a computer, and then the computer processes it. When data is modified, or processed into a meaniful form, ti becomes information. |
| 5.Explain cloud computing? | Cloud computing refers to data, applications, and even resources stored on computers aaccessed over the internet-in a "cloud" of computers-rater than on users' computers, and you accessonly what you need when you need it. |
| 6. List the six categories of computers. | Embedded Computers, Mobled devices, Personal computers, Midrange servers, Mainframe Computers, Supercomputers. |
| 8. Describe virtulization. | Virtualization tells computers there is another storage area, more operating systems, smiliar to partitioning |
| 9. What are supercomputers? | Supercomputers are the most powerful and most expensive type of computer available. To reduce cost, supercomputers are often built by smaller and less expensive computers into a supercomputing cluster that acts as a single supercomputer. |
| 10. What is a network? | A network is a clollection of computers and other devices that are connected to share hardwar, sofware, and data. |
| 11. What ar the three parts of an email address? | Email address consists of a username, followed by the @ symbol, followed by the domain name for the computer that wil be handling that person's email. username, domain and @symbol |
| 12. Describe computer ethics. | Ethics refers to standards of moral conduct. Ethics with respect to the use of computers are referred to as computer ethics. Business ethics are the standards of conduct that guide a business's policies, decisions, and actions. |
| Ch. 5 p.184 | Answer |
| 1. What is an Internet service provider? | A business or other organization that provides internet access to others, typically for a fee. |
| 2. What is a webinar? | (Web Seminar) are similar to Web conferences, but typically have a designated presenter and an audience. |
| 4. Why do some people block cookies? | To avoid being tracked doing certain activites that belongs to websites of advertising networks. |
| 5. What is included in an emil message header? | The email address and the name of the business, education etc. |
| 10. What is the History list? | The History list tracks the Web pages you visit over a certain time period, not just doing a browsing session. |
| 14. What is the difference between replying to an email message and forwarding it? | The forward feature creates a copy of the original message subject and body, but leaves the To, Cc, and Bcc boxes blank. |