Unformatted text preview:

Chapter 71. A ____ overcomes the major disadvantage of CD-R disks, which is being able towrite on them only once.CD-RW2. Users subscribe to a cloud storage service, like the kind advertised in the accompanying figure, to ____All of the above3. Tape________.'no longer is used as a primary method of storage but is used most often for long-term storage and backup4. A(n) ____ is a type of optical disc that users can read from but not write to or erase.DVD-ROM5. ____ is the number of bytes (characters) a storage medium can hold.Capacity6. Common types of flash memory cards include ____.All of the above7. ExpressCard modules can be used to add all of the following EXCEPT ____ capabilities to a computer.Printing8. ____ devices are servers connected to a network with the sole purpose of providing storage.NAS9. All of the following are competing rewriteable DVD formats EXCEPT______.DVD+R10. The smallest unit of data a computer can process is a(n) ____.Bit11. ____ is the process of dividing a disk into tracks and sectors, so the operating system can store and locate data and information on the disk.Formatting12. '____ means you can write on one part of a disc at one time and another part at a later time.MultisessionChapter 81. Two types of system software are ____.operating systems and utility programs2. Smart phones and other small computing devices often use a ____ operating system.Single user/Single tasking3. _______ means the operating system automatically configures new devices as users install themPlug and Play4. A pop-up ____ is a filtering program that stops pop-up ads from displaying on Web pages.Blocker5. A single user/single ____ operating system allows only one user to run one program at a time.Tasking6. The ____ is firmware that contains a computer’s startup instructionsBIOS7. The area of the hard disk used for virtual memory is called a(n) ____ file because it exchanges data, information, and instructions between memory and storage.'Swap8. ____ is the process of starting or restarting a computer.Booting9. '____ software, such as operating systems and utility programs, consists of the programs that control or maintain the operations of a computer and its devices.Systems10. A(n) ____ is someone who tries to access a computer or network illegally.Hacker11. In Windows, the ____ contains a list of programs that open automatically when users boot the computer.Startup Folder12. A(n) ____ computer is a computer that continues to operate when one of its components fails, ensuring that no data is lost.Fault-tolerantChapter 91. ____ allows users to share documents with others in real time.An online meeting2. ____ is a conversation that takes place over the Internet using a telephone connected to a computer, mobile device, or telephone adapterVoIP- Voice over IP3. A wireless ____ point is a central communications device that allows computers and devices to transfer data wirelessly among themselves or to transfer data wirelessly to a wired network.Access4. A communications ____ is a transmission media on which data, instructions, or information travel.Channel5. Developed by IEEE, ____ is a series of network standards that specifies how two wireless devices communicate over the air with each other.802.116. Microwave transmission, often called ____, involves sending signals from one microwave station to another.Fixed Wireless7. ____ is a network standard that specifies no central computer or device on the network should control when data can be transmittedEthernet8. For smaller business and home networks, a ____ allows multiple computers to share a single high-speed Internet connection such as through a cable modem or DSL modem.Router9. A ____ is a collection of computers and devices connected together via communications devices and transmission mediaNetwork10. A(n) ____ network is a simple, inexpensive network that typically connects fewer than 10 computers.Peer to Peer11. DSL___________Uses a modem that sends digital data and information from a a computer to aDSL line.12. A ____ is a wireless network that provides Internet connections to mobile computers and other devices.Hot spotChapter 101. A(n) ____, or copy, of the entire database should be made on a regular basis.Backup2. In a relational database, each row _____________.Has a primary key and each column has a unique name3. A data ____ is a collection of related records stored on storage media such asa hard disk or optical disc.File4. A ____ allows users to access and analyze any view of the database data.Hypercube5. A(n)_________' stores data in objects.OODB6. Object-oriented and object-relational databases often use a query language called ____ to manipulate and retrieve data.OQL7. Occasionally, a database can be damaged or destroyed because of ____.All of the above8. A(n) ____ is a collection of data organized in a manner that allows access, retrieval, and use of that data.Database9. In managing a company’s database, the database ____ requires a technical inside view of data.Administrator10. A major weakness of a lot of file processing systems is that ____.They have redundant data and they isolate data11. Because a data dictionary contains details about the data in a database, some call it ____.Metadata12. The developer of a relational database refers to a record as a(n) _____________TupleChapter 111. A ______ is a small text file that a Web server stores on a user's computer.Cookie2. A UPS connects'between a computer and a _____________Power source3. One approach to content filtering is through a rating system of ____, which issimilar to those used for movies and videos.ICRA4. ______is a program placed on a computer without the user's knowledge.Spyware5. Software ____ occurs when someone steals software media, intentionally erases software programs, or illegally copies a software program.Theft6. ____, which allows users to choose an encryption scheme that passes between a client and a server, requires that both the client and server have digital certificates.Secure HTTP- S-HTTP7. A(n) ____________ copies all of the files in a computer.Full backup8. A certificate ____ is an authorized person or company that issues and verifies digital certificates.Authority9. A _______ is a numeric password either assigned by a company or selected bya user.PIN10. A computer ____ risk is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability.SecurityChapter 131.


View Full Document

FSU CGS 2060 - Chapter 7

Documents in this Course
Notes

Notes

11 pages

CGS Quiz

CGS Quiz

12 pages

Notes

Notes

4 pages

QUIZ 8

QUIZ 8

3 pages

Chapter 1

Chapter 1

22 pages

EXAM 2

EXAM 2

9 pages

CHAPTER 7

CHAPTER 7

25 pages

QUIZ 1

QUIZ 1

3 pages

Chapter 7

Chapter 7

25 pages

Quizlet

Quizlet

2 pages

Notes

Notes

4 pages

Quiz #7

Quiz #7

24 pages

Notes

Notes

22 pages

QUIZ 10

QUIZ 10

3 pages

Chapter 1

Chapter 1

21 pages

CHAPTER 7

CHAPTER 7

25 pages

CHAPTER 7

CHAPTER 7

31 pages

Chapter 1

Chapter 1

22 pages

Exam 2

Exam 2

6 pages

Notes

Notes

25 pages

QUIZ 4

QUIZ 4

2 pages

QUIZ 3

QUIZ 3

2 pages

Exam 1

Exam 1

47 pages

QUIZ 11

QUIZ 11

3 pages

QUIZ 4

QUIZ 4

2 pages

QUIZ 7

QUIZ 7

3 pages

Quiz 7

Quiz 7

5 pages

Chapter 7

Chapter 7

20 pages

QUIZ 1

QUIZ 1

5 pages

QUIZ 9

QUIZ 9

2 pages

Chapter 7

Chapter 7

36 pages

Chapter 7

Chapter 7

29 pages

Chapter 1

Chapter 1

22 pages

QUIZ 2

QUIZ 2

3 pages

Quiz #1

Quiz #1

15 pages

Chapter 7

Chapter 7

21 pages

Test 1

Test 1

14 pages

Chapter 6

Chapter 6

19 pages

Quiz 1

Quiz 1

18 pages

Exam 2

Exam 2

19 pages

Test 2

Test 2

18 pages

Exam 2

Exam 2

8 pages

CHAPTER 5

CHAPTER 5

12 pages

MIDTERM

MIDTERM

35 pages

Exam 1

Exam 1

7 pages

Exam 2

Exam 2

22 pages

Exam 1

Exam 1

12 pages

Exam 1

Exam 1

7 pages

Exam 1

Exam 1

7 pages

Exam 2

Exam 2

19 pages

EXAM 1

EXAM 1

5 pages

Exam 2

Exam 2

3 pages

Exam 2

Exam 2

22 pages

Exam 2

Exam 2

6 pages

Exam 1

Exam 1

7 pages

Exam 2

Exam 2

19 pages

CHAPTER 5

CHAPTER 5

12 pages

Chapter 1

Chapter 1

40 pages

Exam 1

Exam 1

11 pages

Notes

Notes

30 pages

Load more
Download Chapter 7
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Chapter 7 and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Chapter 7 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?