CGS Test 2 Study Guide Chapter 7 Storage 1 A CD RW overcomes the major disadvantage of CD R disks which is being able to write on them only once Multisession means you can write on one part of a disc at one time and another part at a later time 2 3 User subscribe to a cloud storage service like the kind advertised in the accompanying figure to All of the above 4 All of the following are rewritable DVD formats except DVD R 5 The smallest unit of data a computer can process is a n bit 6 NAS devices are servers connected to a network with the sole purpose of providing storage 7 Common types of flash memory cards include All of the above CompactFlash xD Picture Card Secure Digital and Memory Stick 8 Formatting is the process of dividing a disk into tracks and sectors so the operating system can store and locate data and information on the disk 9 ExpressCard modules can be used to add all of the following EXCEPT printing capabilities to a computer 10 A n DVD ROM is a type of optical disc that users can read from but not write or erase 11 Capacity is the number of bytes characters a storage media can hold 12 Tape no longer is used as a primary method of storage but is used most often for long term storage and backup Chapter 8 Operating Systems and Utility Programs 1 Smart phones and other small computing devices often use a Single User Single Tasking operating system 2 A n hacker is someone who tries to access a computer or network illegally 3 A pop up blocker is a filtering program that stops pop ups ads from displaying on Web pages 4 System software such as operating systems and utility programs consists of the programs that 5 control or maintain the operations of a computer and its devices In Windows the Startup Folder contains a list of programs that open automatically when users boot the computer 6 A single user single tasking operating system allows only one user to run one program at a time 7 The BIOS is a firmware that contains a computer s startup instructions 8 A n fault tolerant computer is a computer that continues to operate when one of its components fails ensuring that no data is lost 9 Booting is the process of starting or restarting a computer 10 Two types of system software are operating systems and utility programs 11 Plug Play means the operating system automatically configures new devices as users install them 12 The area of the hard disk used for virtual memory is also called a n swap file because it exchanges data information and instructions between memory and storage Chapter 9 Communications Networks 1 A n Peer to peek network is a simple inexpensive network that typically connects fewer than ten computers 2 Microwave transmission often called fixed wireless involves sending signals from one microwave system to another devices 3 A hot spot is a wireless network that provides internet connection to mobile computers and other 4 VoIP is a conversation that takes place over the Internet using a telephone connected to a computer mobile device or telephone adapter 5 For smaller businesses and home networks a router allows multiple computers to share a single high speed internet connection such as through a cable modem or DSL modem 6 Ethernet is a network standard that specifies no central computer or device on the network should control when data can be transmitted 7 DSL ALL of the above 8 A wireless access point is a central communications device that allows computers and devices to transfer data wirelessly among themselves or to transfer data wirelessly to a wired network 9 Developed by IEEE 802 11 is a series of network standards that specifies how two wireless devices communicate over the air with each other 10 Online Meeting allows users to share documents with others in real time 11 A communications channel is a transmission media on which data instructions or information travel 12 A network is collection of computers and devices connected together via communications devices and transmission media Chapter 10 Database Management 1 Occasionally a database can be damaged or destroyed because of ALL OF THE ABOVE hardware or software failure human error catastrophe such as fire or flood 2 A n database is a collection of data organized in a manner that allows access retrieval and use of that data isolate data 3 The developer of a relational database refers to a record as a n tuple 4 A major weakness of a lot of file processing systems is that they have redundant data and they 5 A hypercube allows users to access and analyze any view of the database data 6 Because a data dictionary contains details about the data in a database some call it metadata 7 A n backup or copy of the entire database should be made on a regular basis 8 A data file is a collection of related records stored on storage media such as a hard disk or an 9 optical disk In a managing company s database the database administrator requires a technical inside view of data 10 A n OODB stores data in objects 11 In a relational database each row has a primary key and each column has a unique name 12 Object oriented and object relational databases often use a query language called OQL to manipulate and retrieve data Chapter 11 Computer Security and Safety Ethics and Privacy 1 Software theft occurs when someone steals software media intentionally erases software programs or illegally copies a software program 2 A cookie is a small text file that a web server stores on a user s computer 3 A certificate authority is an unauthorized person or company that issues and verifies digital certificates 4 A PIN is a numeric password either assigned by a company or selected by a user 5 One approach to content filtering is through a rating system of ICRA which is similar to those used for movies and videos 6 A computer security risk is any event or action that could cause a loss of or damage to computer hardware software data information or processing capability 7 Spyware is a program placed on a computer without the user s knowledge 8 A n full backup copies all the files on a computer 9 A UPS connects between a computer and a power source 10 Secure HTTP S HTTP which allows users to choose an encryption scheme that passes between a client and a server requires that both the client and the server have digital certificates Chapter 13 Programing Languages and Program Development 1 HTML is a special formatting language that programmers use to format documents for display on the web COBOL 2 With OO Object oriented design a
View Full Document