ist 101 computer Word Scramble
|
Embed Code - If you would like this activity on your web page, copy the script below and paste it into your web page.
Normal Size Small Size show me how
Normal Size Small Size show me how
Question | Answer |
Computers use langauges what are they called | binary |
In binary language, each letter of the alphabet, each number, and each special symbol is made up of a unique combination of eight ________ | bits |
large and expensive computers used by simutaneously are called what | Mainframe computer |
computers are specially designed computer chips that reside inside other devices such as a car. | Embedded |
A keyboard and mouse are examples of ________ devices. | input |
The number of pixels displayed on the screen is known as | screen resolution |
The ________ contains the central electronic components of the computer. | motherboard |
is the abbreviation for the place in the computer where the programs and data the computer is currently using are temporarily stored. | RAM |
RAM is a ________ storage location | volatile |
The area that holds all the startup instructions the computer needs to start is the _____ | ROM |
Dropbox is an example of ________ | cloud storage |
CPU | processes commands issued by software instructions |
RAM | stores programs and data the computer is currently using |
ROM | holds start up instructions needed when the computer is powered on |
LED | more energy efficient than LCD monitors |
QWERTY | standard keyboard layout |
Which transmission medium transmits data the fastest? | Fiber-optic cable |
On a network, a(n) ________ helps prevent data packets from colliding with each other | switch |
Using a network without the network owner's permission is known as ___ | piggybacking |
software used to set up and manage a network | NOS |
What is oveclocking. | Running the CPU at a faster speed then the manufacturer recommended is called |
what were the top cyber crime reported by the IC3 | thefts of service |
what is a boot sector | viruses are often transmitted by a flash drive left in a USB port. |
what is a time bomb | viruses that accurs only on a specific date in history |
what are polymorph | it can change code to avoid detection |
what is pharming | When malicious code is planted on your computer and alters your browser's ability to find web addresses |
what is cyber loafing | Using your computer for non-work activities while you are being paid to work i |
packet filtering | method for selectively allowing certain requests to access ports |
CAPTCHA | program that generates distorted text and require that it be typed into a box |
geotag | data attached to a photo that indicates when/where the photo was taken |
outsourcing | When a business hires a third-party firm to provide services it once offered itself |
offshoring | When a U.S. company hires a company outside of the United States |
Home-based | Which type of job involves little day-to-day supervision and requires a worker who is self-disciplined? |
Running the Disk Defragmenter utility will __ | make the hard drive work more efficiently |
what is top down design | __ breaks down a problem into a series of high-level tasks and continues to break each task into successively more detailed subtasks. |
what is visual basic | s a programming language that can be used to create a wide range of Windows applications |
what is certification | provides a consistent method of measuring skill levels in a specific IT area |
what is a solid state | uses electronic memory and has no motors or moving parts. |
relavitism | s the theory that holds that there is no universal moral truth and that instead moral principles are dictated by cultural tastes and customs. |
Divine theory command | God is all knowing and sets moral standarards |
ethics | The study of the general nature of morals and of the specific moral choices individuals |
Created by:
burn
Popular Computers sets