1) Which of these is a open source (free) OS?-Linux2) Which is not required when building your own computer?-Router3) What does Moore's Law describe?-the pace at which CPUs and Computers improve over time4)Most notebooks contain an ________ slot that allows the computer to read flash memory cards, memory sticks, and secure digital cards.-Expresscard5)What determines the processing power of a CPU?- clock speed and the amount of Cache memory6) What determines Cache level?-the proximity to the CPU7) The amount of RAM that is actually sitting on memory modules in your computer is the….-physical memory 8) Modern RAM is usually measured in what?-Gigabytes9) What type of optical storage has the largest capacity?-Blu-Ray Disc10) Access Time is determined by….-Seek time and Latency11) What type of expansion card is used to turn binary codeinto an image you can see?-Video card12) What is the purpose of the disk defragmenter?- to cleanup the hard drive and increase computer performance13) What material are transistors made of?-Silicon14) Clock speed is measured in?-Gigahertz15) Which of the following would not be used for a file that you want to save permanently?-RAM16) The collection of commands a specific CPU can execute is called the…-Instruction Set17) The CPU consists of what two parts?-The control unit and the algorithmic logic unit18)A computer virus attaches itself to another computer program called a…-host program19) A ________ attempts to travel between systems through network connection to spread much faster than a virus.-worm20) What type of virus attaches itself to documents such as word documents?-Macro virus21) A drive-by-download is….-a virus that downloads itself from a webpage that you visit22) The most common way hackers attempt to hack your system is through….-the internet connection on your computer23) Firewalls use a process called network address translation (NAT) to assign internal IP addresses on a network. What device is capable of cottoning this feature?-router24) A type of spyware that monitors keystrokes with the intent of steeling passwords, login IDs, or credit information.-keystroke logger25) Lures internet users to reveal personal information suchas credit card numbers, social security numbers, or other info by pretending to look like a legitimate business such as a bank.-phishing26) What is not true about power surges?-printers are not affected27) Network administrators, database administrators, web server administrators, and telecommunications technicians are all considered part of the _________ department.-Information systems28) ____________ staff the phones, respond to live internet chat, or respond to email and solve problems for customers or employees, either remotely or in person.-Helpdesk analyst29) ________ means that the data contained in the database is accurate and reliable.-Data integrity30) A category of information in a database is referred to asa…..-field31) What type of field is needed to hold a video clip?-Object field32) A group of related fields is a….-record33) Which of the following could not be used a primary key?- a street address34) What is the most popular type of Database?-relational35) A description of the data that will be in the database isthe…-data dictionary36) Used to display a subset of data from a table based on the criteria you specify.-select query37) A __________ shows conditions that are unusual or that need attention by users of the system.-exception report38) A group of two or more computers that are configured to share resources and information.-network39) What is NOT an advantage of using a network over a single computer?-easier to protect and maintain (it is harder to protect networks)40) ________ are used by large corporations to connect two or more locations.-WANs41) A ________ uses public Internet communications infrastructure to build a secure, private network among various locations.-VPN42) Enable a computer to communicate with the network.-Network adapter43) Keeps track of who is logging on to the network and which services on the network are available to each user.-Authentication server44) Stores and manages files on a server for network users.-File server45) A repository for applications such a Microsoft word that allows them to be used over a network.- Application server46) The most widely used type of network typology is…-star typology47) A set of rules for exchanging communication.-protocol48) ______________ Needs to be installed on each client computer and server connected to the network so they can communicate.-Network operating system (NOS)49) Used for identification purposes internally on a network,and is not viewable to external users.-media access control (MAC) address50) A numerical label given by the ISP to a computer to identify it on the internet.-IP addressOpen source software: is freely distributed (no royalties accrue tothe creators), contains the source code, and can be distributed to otherExample: Microsoft visio vs. dia, allows you to make flowcharts; openoffice.orgReasons to install: portability (use on any computer and prevent viruses (Microsoft more popular= more viruses)Moore’s Law: a prediction, named after Gordon Moore, the cofounder of Intel; states that the number of transistors on a CPU chip will double every two yearsExternal SATA: a fast transfer port that allows your computer to connect peripherals such as external hard drives to add more storageCPU (central processing unit): Control unit: coordinates all other activities of all the other computer componentsArithmetic logic unit: responsible for all the arithmetic calculationsCache Memory:How do you know how much space it has? – by the chips proximity to the CPURandom Access Memory: your computer’s temporary storage spaceMedia Access Control (MAC): the physical address of your networkMemory Modules: a small circuit board that holds a series ofrandom access memory (RAM) chips- Ex: DIMM (Dual Inline Memory Modules), most used todayPhysical Memory: amount of RAM that is installed in a computerAccess Time: the time it takes a storage device to locate its stored dataBlu-Ray: fastest use of storage commonly used todaySeek time: the time it takes for the hard drive’s read/write heads to move over the surface of the disk, between tracks,to the correct trackLatency: waiting time of rational delayVideo card: images viewed on the monitorInstruction Set: collection of commands the CPU can executeWorm: a
View Full Document