Question | Answer |
Computers use langauges what are they called | binary |
In binary language, each letter of the alphabet, each number, and each special symbol is made up of a unique combination of eight ________ | bits |
large and expensive computers used by simutaneously are called what | Mainframe computer |
computers are specially designed computer chips that reside inside other devices such as a car. | Embedded |
A keyboard and mouse are examples of ________ devices. | input |
The number of pixels displayed on the screen is known as | screen resolution |
The ________ contains the central electronic components of the computer. | motherboard |
is the abbreviation for the place in the computer where the programs and data the computer is currently using are temporarily stored. | RAM |
RAM is a ________ storage location | volatile |
The area that holds all the startup instructions the computer needs to start is the _____ | ROM |
Dropbox is an example of ________ | cloud storage |
CPU | processes commands issued by software instructions |
RAM | stores programs and data the computer is currently using |
ROM | holds start up instructions needed when the computer is powered on |
LED | more energy efficient than LCD monitors |
QWERTY | standard keyboard layout |
Which transmission medium transmits data the fastest? | Fiber-optic cable |
On a network, a(n) ________ helps prevent data packets from colliding with each other | switch |
Using a network without the network owner's permission is known as ___ | piggybacking |
software used to set up and manage a network | NOS |
What is oveclocking. | Running the CPU at a faster speed then the manufacturer recommended is called |
what were the top cyber crime reported by the IC3 | thefts of service |
what is a boot sector | viruses are often transmitted by a flash drive left in a USB port. |
what is a time bomb | viruses that accurs only on a specific date in history |
what are polymorph | it can change code to avoid detection |
what is pharming | When malicious code is planted on your computer and alters your browser's ability to find web addresses |
what is cyber loafing | Using your computer for non-work activities while you are being paid to work i |
packet filtering | method for selectively allowing certain requests to access ports |
CAPTCHA | program that generates distorted text and require that it be typed into a box |
geotag | data attached to a photo that indicates when/where the photo was taken |
outsourcing | When a business hires a third-party firm to provide services it once offered itself |
offshoring | When a U.S. company hires a company outside of the United States |
Home-based | Which type of job involves little day-to-day supervision and requires a worker who is self-disciplined? |
Running the Disk Defragmenter utility will __ | make the hard drive work more efficiently |
what is top down design | __ breaks down a problem into a series of high-level tasks and continues to break each task into successively more detailed subtasks. |
what is visual basic | s a programming language that can be used to create a wide range of Windows applications |
what is certification | provides a consistent method of measuring skill levels in a specific IT area |
what is a solid state | uses electronic memory and has no motors or moving parts. |
relavitism | s the theory that holds that there is no universal moral truth and that instead moral principles are dictated by cultural tastes and customs. |
Divine theory command | God is all knowing and sets moral standarards |
ethics | The study of the general nature of morals and of the specific moral choices individuals |