Unformatted text preview:

1) Which of these is a open source (free) OS?-Linux2) Which is not required when building your own computer?-Router3) What does Moore's Law describe?-the pace at which CPUs and Computers improve over time4)Most notebooks contain an ________ slot that allows the computer to read flash memory cards, memory sticks, and secure digital cards.-Expresscard5)What determines the processing power of a CPU?- clock speed and the amount of Cache memory6) What determines Cache level?-the proximity to the CPU7) The amount of RAM that is actually sitting on memory modules in your computer is the….-physical memory 8) Modern RAM is usually measured in what?-Gigabytes9) What type of optical storage has the largest capacity?-Blu-Ray Disc10) Access Time is determined by….-Seek time and Latency11) What type of expansion card is used to turn binary codeinto an image you can see?-Video card12) What is the purpose of the disk defragmenter?- to cleanup the hard drive and increase computer performance13) What material are transistors made of?-Silicon14) Clock speed is measured in?-Gigahertz15) Which of the following would not be used for a file that you want to save permanently?-RAM16) The collection of commands a specific CPU can execute is called the…-Instruction Set17) The CPU consists of what two parts?-The control unit and the algorithmic logic unit18)A computer virus attaches itself to another computer program called a…-host program19) A ________ attempts to travel between systems through network connection to spread much faster than a virus.-worm20) What type of virus attaches itself to documents such as word documents?-Macro virus21) A drive-by-download is….-a virus that downloads itself from a webpage that you visit22) The most common way hackers attempt to hack your system is through….-the internet connection on your computer23) Firewalls use a process called network address translation (NAT) to assign internal IP addresses on a network. What device is capable of cottoning this feature?-router24) A type of spyware that monitors keystrokes with the intent of steeling passwords, login IDs, or credit information.-keystroke logger25) Lures internet users to reveal personal information suchas credit card numbers, social security numbers, or other info by pretending to look like a legitimate business such as a bank.-phishing26) What is not true about power surges?-printers are not affected27) Network administrators, database administrators, web server administrators, and telecommunications technicians are all considered part of the _________ department.-Information systems28) ____________ staff the phones, respond to live internet chat, or respond to email and solve problems for customers or employees, either remotely or in person.-Helpdesk analyst29) ________ means that the data contained in the database is accurate and reliable.-Data integrity30) A category of information in a database is referred to asa…..-field31) What type of field is needed to hold a video clip?-Object field32) A group of related fields is a….-record33) Which of the following could not be used a primary key?- a street address34) What is the most popular type of Database?-relational35) A description of the data that will be in the database isthe…-data dictionary36) Used to display a subset of data from a table based on the criteria you specify.-select query37) A __________ shows conditions that are unusual or that need attention by users of the system.-exception report38) A group of two or more computers that are configured to share resources and information.-network39) What is NOT an advantage of using a network over a single computer?-easier to protect and maintain (it is harder to protect networks)40) ________ are used by large corporations to connect two or more locations.-WANs41) A ________ uses public Internet communications infrastructure to build a secure, private network among various locations.-VPN42) Enable a computer to communicate with the network.-Network adapter43) Keeps track of who is logging on to the network and which services on the network are available to each user.-Authentication server44) Stores and manages files on a server for network users.-File server45) A repository for applications such a Microsoft word that allows them to be used over a network.- Application server46) The most widely used type of network typology is…-star typology47) A set of rules for exchanging communication.-protocol48) ______________ Needs to be installed on each client computer and server connected to the network so they can communicate.-Network operating system (NOS)49) Used for identification purposes internally on a network,and is not viewable to external users.-media access control (MAC) address50) A numerical label given by the ISP to a computer to identify it on the internet.-IP addressOpen source software: is freely distributed (no royalties accrue tothe creators), contains the source code, and can be distributed to otherExample: Microsoft visio vs. dia, allows you to make flowcharts; openoffice.orgReasons to install: portability (use on any computer and prevent viruses (Microsoft more popular= more viruses)Moore’s Law: a prediction, named after Gordon Moore, the cofounder of Intel; states that the number of transistors on a CPU chip will double every two yearsExternal SATA: a fast transfer port that allows your computer to connect peripherals such as external hard drives to add more storageCPU (central processing unit): Control unit: coordinates all other activities of all the other computer componentsArithmetic logic unit: responsible for all the arithmetic calculationsCache Memory:How do you know how much space it has? – by the chips proximity to the CPURandom Access Memory: your computer’s temporary storage spaceMedia Access Control (MAC): the physical address of your networkMemory Modules: a small circuit board that holds a series ofrandom access memory (RAM) chips- Ex: DIMM (Dual Inline Memory Modules), most used todayPhysical Memory: amount of RAM that is installed in a computerAccess Time: the time it takes a storage device to locate its stored dataBlu-Ray: fastest use of storage commonly used todaySeek time: the time it takes for the hard drive’s read/write heads to move over the surface of the disk, between tracks,to the correct trackLatency: waiting time of rational delayVideo card: images viewed on the monitorInstruction Set: collection of commands the CPU can executeWorm: a


View Full Document

FSU CGS 2100 - Study Guide

Documents in this Course
Exam 1

Exam 1

12 pages

Notes

Notes

8 pages

Exam 2

Exam 2

16 pages

Chapter 1

Chapter 1

10 pages

Exam 2

Exam 2

12 pages

Chapter 7

Chapter 7

12 pages

Exam 1

Exam 1

12 pages

Exam 1

Exam 1

9 pages

Notes

Notes

15 pages

Chapter 1

Chapter 1

12 pages

Midterm

Midterm

12 pages

Exam 2

Exam 2

3 pages

Exam 2

Exam 2

10 pages

EXAM 2

EXAM 2

22 pages

Exam 2

Exam 2

1 pages

Exam 2

Exam 2

1 pages

Exam 2

Exam 2

2 pages

Exam 2

Exam 2

2 pages

EXAM 2

EXAM 2

2 pages

Chapter 6

Chapter 6

14 pages

Chapter 1

Chapter 1

28 pages

Exam 2

Exam 2

9 pages

Test 1

Test 1

12 pages

Exam 2

Exam 2

14 pages

Exam 2

Exam 2

16 pages

Test 1

Test 1

12 pages

Exam 1

Exam 1

14 pages

Exam 1

Exam 1

14 pages

EXAM

EXAM

14 pages

Chapter 1

Chapter 1

36 pages

Exam 2

Exam 2

10 pages

Load more
Download Study Guide
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Study Guide and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Study Guide 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?