New version page

FSU CGS 2060 - Study Guide

Upgrade to remove ads

This preview shows page 1 out of 4 pages.

View Full Document
Premium Document
Do you want full access? Go Premium and unlock all 4 pages.
Access to all documents
Download any document
Ad free experience

Upgrade to remove ads
Unformatted text preview:

A _____ overcomes the major disadvantage of CD-R disks, which is being able to writeon them only once. CD-RW_____means you can write on one part of a disc at one time and another part at a latertime. MultisessionUser subscribe to a cloud storage service, like the kind advertised in the accompanying figure to_____ All of the aboveAll of the following are rewritable DVD formats except DVD+RThe smallest unit of data a computer can process is an Bit____devices are servers connected to a network with the sole purpose of providing storage. NASCommon types of flash memory cards include _______ All of the Above: CompactFlash, xD Picture Card, Secure Digital and Memory Stick________is the process of dividing a disk into tracks and sectors, so the operating system can store and locate data and information on the disk. FormattingExpressCard modules can be used to add all of the following EXCEPT______ capabilities to a computer. Printing10. An ______ is a type of optical disc that users can read from but not write or erase.DVD-ROM______is the number of bytes characters a storage media can hold. CapacityTape no longer is used as a primary method of storage but is used most often for long-term storage and backup. ...Smart phones and other small computing devices often use a ______operating system.Single user/ single taskingAn _____ is someone who tries to access a computer or network illegally.HackerA pop-up _____ is a filtering program that stops pop-ups ads from displaying on Web pages. Blocker______software such as, operating systems and utility programs, consists of the programs that control or maintain the operations of a computer and its devices.SystemIn Windows, the ____contains a list of programs that open automatically when users boot the computer. Startup FolderA single user, single _____ operating system allows only one user to run one program at a time. TaskingThe ____ is a firmware that contains a computer's startup instructions. BIOSAn ______ computer is a computer that continues to operate when one of its components fails, ensuring that no data is lost. fault-tolerant_____ is the process of starting or restarting a computer. BootingTwo types of system software are ______ and _______. Operating Systems and Utility Programs________ means the operating system automatically configures new devices as users install them. Plug and PlayThe area of the hard disk used for virtual memory is also called a _____ file because it exchanges data, information and instructions between memory and storage. swapAn ______ network is a simple, inexpensive network that typically connects fewer than ten computers. Peer-to-peekMicrowave transmission, often called _______ , involves sending signals from one microwave system to another. fixed wirelessA _____ is a wireless network that provides internet connection to mobile computers and other devices. hot-spot_____ is a conversation that takes place over the Internet using a telephone connectedto a computer, mobile device, or telephone adapter. VoIPFor smaller businesses and home networks, a _____ allows multiple computers to share a single high-speed internet connection such as through a cable modem or DSL modem. router____ is a network standard that specifies no central computer or device on the network should control when data can be transmitted. EthernetDSL All of the aboveA wireless ______ point is a central communications device that allows computers and devices to transfer data wirelessly among themselves, or to transfer data wirelessly to a wired network. accessDeveloped by IEEE, _____ is a series of network standards that specifies how two wireless devices communicate over the air with each other. 802.11______ allows users to share documents with others in real time. Online MeetingA communications _____ is a transmission media on which data, instructions, or information travel. channelA _____ is collection of computers and devices connected together via communications devices and transmission media. networkOccasionally, a database can be damaged or destroyed because of _______. ALL OF THE ABOVE: hardware or software failure, human error, catastrophe such as fireor floodA _____ is a collection of data organized in a manner that allows access, retrieval and use of that data. databaseThe developer of a relational database refers to a record as a _____. tupleA major weakness of a lot of file processing systems is _____. that they have redundant data and they isolate data.A _____ allows users to access and analyze any view of the database data.hypercubeBecause a data dictionary contains details about the data in a database, some call it _____. MetadataAn _____ or copy, of the entire database should be made on a regular basis.BackupA data ____ is a collection of related records stored on storage media such as a hard disk or an optical disk. fileIn a managing company's database, the database _____ requires a technical inside view of data. administratorAn ____ stores data in objects. OODBIn a relational database, each row_______ has a primary key and each column has a unique name.Object-oriented and object relational databases often use a query language called _____ to manipulate and retrieve data. OQLSoftware ______ occurs when someone steals, software media, intentionally erases software programs, or illegally copies a software program, TheftA _____ is a small text file that a web server stores on a user's computer. CookieA certificate _____ is an unauthorized person or company that issues and verifies digital certificates authorityA ____ is a numeric password either assigned by a company or selected by a user.PINOne approach to content filtering is through a rating system of _____, which is similar to those used for movies and videos. ICRAA computer _____ risk is any event or action that could cause a loss of or damage to computer hardware, software, data, information or processing capability.security______is a program placed on a computer without the user's knowledge.SpywareAn ____ copies all the files on a computer. Full BackupA UPS connects between a computer and a _______. Power source________, which allows users to choose an encryption scheme that passes between a client and a server, requires that both the client and the server have digital certificates. Secure-HTTP S HTTP_____ is a special formatting language that programmers use to format documents fordisplay on the web. HTMLWith _____ design, a programmer packages the data and the program or

View Full Document
Download Study Guide
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...

Join to view Study Guide and access 3M+ class-specific study document.

We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Study Guide 2 2 and access 3M+ class-specific study document.


By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?