Unformatted text preview:

Exam II Study Guide CGS2060 Chapter 7 Common types of flash memory cards include all of the above CompactFlash CF xD Picture Card Secure Digital SD and Memory Stick A overcomes the major disadvantage of CD R disks which is being able to write on them only once CD RW is the number of bytes characters a storage medium can hold Capacity A n is a type of optical disc that users can read from but not write to or erase DVD ROM All of the following are competing rewritable DVD formats EXCEPT DVD R means you can write on one part of a disc at one time and another part at a later time multisession devices are servers connected to a network with the sole purpose of providing storage NAS Users subscribe to a cloud storage service like the kind advertised in the accompanying figure to All of the above save time by storing large files instantaneously allows others to access files store offsite backups of data ExpressCard modules can be used to add all of the following EXCEPT capabilities to a computer printing is the process of dividing a disk into tracks and sectors so the operating system can store and locate data and information on the disk formatting The smallest unit of data a computer can process is a n bit Tape no longer is used as a primary method of storage but is used most often for long term storage and backup Chapter 8 In Windows the contains a list of programs that open automatically when users boot the computer Startup Folder means the operating system automatically configures new devices as users install them Plug and Play software such as operating systems and utility programs consists of the programs that control or maintain the operations of a computer and its devices System A single user single operating system allows only one user to run one program at a time tasking The area of the hard disk used for virtual memory is called a n file because it exchanges data information and instructions between memory and storage swap Two types of system software are operating systems and utility programs A n is someone who tries to access a computer or network illegally hacker The is firmware that contains a computer s startup instructions BIOS Smart phones and other small computing devices often use a operating system Single User Single Tasking is the process of starting or restarting a computer Booting A n computer is a computer that continues to operate when one of its components fails ensuring that no data is lost Fault tolerant A pop up is a filtering program that stops pop up ads from displaying on Web pages blocker Chapter 9 Developed by IEEE is a series of network standards that specifies how two wireless devices communicate over the air with each other 802 11 Microwave transmission often called involves sending signals from one microwave station to another fixed wireless A communications is a transmission media on which data instructions or information travel channel DSL Uses a modem that sends digital data and information from a a computer to a DSL line is a network standard that specifies no central computer or device on the network should control when data can be transmitted ehternet is a conversation that takes place over the Internet using a telephone connected to a computer mobile device or telephone adapter VoIP Voice over IP For smaller business and home networks a allows multiple computers to share a single high speed Internet connection such as through a cable modem or DSL modem router A is a collection of computers and devices connected together via communications devices and transmission media network allows users to share documents with others in real time an online meeting A wireless point is a central communications device that allows computers and devices to transfer data wirelessly among themselves or to transfer data wirelessly to a wired network access A is a wireless network that provides Internet connections to mobile computers and other devices hot spot A n network is a simple inexpensive network that typically connects fewer than 10 computers peer to peer Chapter 10 Because a data dictionary contains details about the data in a database some call it metadata The developer of a relational database refers to a record as a n tuple A n is a collection of data organized in a manner that allows access retrieval and use of that data database A major weakness of a lot of file processing systems is that they have redundant data and they isolate data A n or copy of the entire database should be made on a regular basis backup Occasionally a database can be damaged or destroyed because of all of the above hardware or software failure human error catastrophe such as a fire or flood In a relational database each row has a primary key and each column has a unique name In managing a company s database the database requires a technical inside view of data administrator Object oriented and object relational databases often use a query language called to manipulate and retrieve data OQL A n stores data in objects OODB A data is a collection of related records stored on storage media such as a hard disk or optical disc file A allows users to access and analyze any view of the database data hypercube Chapter 11 is a program placed on a computer without the user s knowledge spyware One approach to content filtering is through a rating system of which is similar to those used for movies and videos ICRA A certificate is an authorized person or company that issues and verifies digital certificates authority A UPS connects between a computer and a power source A is a small text file that a Web server stores on a user s computer cookie A n copies all of the files in a computer full backup which allows users to choose an encryption scheme that passes between a client and a server requires that both the client and server have digital certificates Secure HTTP S HTTP A computer risk is any event or action that could cause a loss of or damage to computer hardware software data information or processing capability security Software occurs when someone steals software media intentionally erases software programs or illegally copies a software program theft A is a numeric password either assigned by a company or selected by a user PIN Chapter 13 which is a programming language designed for business applications evolved out of a joint effort between the United States government businesses and major universities cobol In design a programmer typically begins with a general design and moves


View Full Document

FSU CGS 2060 - Exam II Study Guide

Documents in this Course
Notes

Notes

11 pages

CGS Quiz

CGS Quiz

12 pages

Notes

Notes

4 pages

QUIZ 8

QUIZ 8

3 pages

Chapter 1

Chapter 1

22 pages

EXAM 2

EXAM 2

9 pages

CHAPTER 7

CHAPTER 7

25 pages

QUIZ 1

QUIZ 1

3 pages

Chapter 7

Chapter 7

25 pages

Quizlet

Quizlet

2 pages

Notes

Notes

4 pages

Quiz #7

Quiz #7

24 pages

Notes

Notes

22 pages

QUIZ 10

QUIZ 10

3 pages

Chapter 1

Chapter 1

21 pages

CHAPTER 7

CHAPTER 7

25 pages

CHAPTER 7

CHAPTER 7

31 pages

Chapter 1

Chapter 1

22 pages

Exam 2

Exam 2

6 pages

Notes

Notes

25 pages

QUIZ 4

QUIZ 4

2 pages

QUIZ 3

QUIZ 3

2 pages

Exam 1

Exam 1

47 pages

QUIZ 11

QUIZ 11

3 pages

QUIZ 4

QUIZ 4

2 pages

QUIZ 7

QUIZ 7

3 pages

Quiz 7

Quiz 7

5 pages

Chapter 7

Chapter 7

20 pages

QUIZ 1

QUIZ 1

5 pages

QUIZ 9

QUIZ 9

2 pages

Chapter 7

Chapter 7

36 pages

Chapter 7

Chapter 7

29 pages

Chapter 1

Chapter 1

22 pages

QUIZ 2

QUIZ 2

3 pages

Quiz #1

Quiz #1

15 pages

Chapter 7

Chapter 7

21 pages

Test 1

Test 1

14 pages

Chapter 6

Chapter 6

19 pages

Quiz 1

Quiz 1

18 pages

Exam 2

Exam 2

19 pages

Test 2

Test 2

18 pages

Exam 2

Exam 2

8 pages

CHAPTER 5

CHAPTER 5

12 pages

MIDTERM

MIDTERM

35 pages

Exam 1

Exam 1

7 pages

Exam 2

Exam 2

22 pages

Exam 1

Exam 1

12 pages

Exam 1

Exam 1

7 pages

Exam 1

Exam 1

7 pages

Exam 2

Exam 2

19 pages

EXAM 1

EXAM 1

5 pages

Exam 2

Exam 2

3 pages

Exam 2

Exam 2

22 pages

Exam 2

Exam 2

6 pages

Exam 1

Exam 1

7 pages

Exam 2

Exam 2

19 pages

CHAPTER 5

CHAPTER 5

12 pages

Chapter 1

Chapter 1

40 pages

Exam 1

Exam 1

11 pages

Notes

Notes

30 pages

Load more
Download Exam II Study Guide
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Exam II Study Guide and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Exam II Study Guide 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?