Unformatted text preview:

1 A overcomes the major disadvantage of CD R disks which is being able to Chapter 7 write on them only once CD RW 2 Users subscribe to a cloud storage service like the kind advertised in the accompanying figure to All of the above 3 Tape erase DVD ROM Capacity All of the above Printing NAS DVD R Bit no longer is used as a primary method of storage but is used most often for long term storage and backup 4 A n is a type of optical disc that users can read from but not write to or 5 is the number of bytes characters a storage medium can hold 6 Common types of flash memory cards include 7 ExpressCard modules can be used to add all of the following EXCEPT capabilities to a computer 8 devices are servers connected to a network with the sole purpose of providing storage 9 All of the following are competing rewriteable DVD formats EXCEPT 10 The smallest unit of data a computer can process is a n 11 is the process of dividing a disk into tracks and sectors so the operating system can store and locate data and information on the disk 12 means you can write on one part of a disc at one time and another part Formatting at a later time Multisession Chapter 8 1 Two types of system software are operating systems and utility programs system Single user Single tasking 2 Smart phones and other small computing devices often use a operating 3 means the operating system automatically configures new devices as users install them 4 A pop up is a filtering program that stops pop up ads from displaying Plug and Play on Web pages Blocker Tasking BIOS Swap 5 A single user single operating system allows only one user to run one program at a time 6 The is firmware that contains a computer s startup instructions 7 The area of the hard disk used for virtual memory is called a n file because it exchanges data information and instructions between memory and storage 8 is the process of starting or restarting a computer 9 software such as operating systems and utility programs consists of the programs that control or maintain the operations of a computer and its devices 10 A n is someone who tries to access a computer or network illegally 11 In Windows the contains a list of programs that open automatically when users boot the computer 12 A n computer is a computer that continues to operate when one of its components fails ensuring that no data is lost Chapter 9 1 allows users to share documents with others in real time 2 is a conversation that takes place over the Internet using a telephone connected to a computer mobile device or telephone adapter 3 A wireless point is a central communications device that allows computers and devices to transfer data wirelessly among themselves or to transfer data wirelessly to a wired network 4 A communications is a transmission media on which data instructions or information travel Booting Systems Hacker Startup Folder Fault tolerant An online meeting VoIP Voice over IP Access Channel 5 Developed by IEEE is a series of network standards that specifies how two wireless devices communicate over the air with each other 6 Microwave transmission often called involves sending signals from one microwave station to another 802 11 Fixed Wireless 7 is a network standard that specifies no central computer or device on the network should control when data can be transmitted 8 For smaller business and home networks a allows multiple computers to share a single high speed Internet connection such as through a cable modem or DSL modem 9 A is a collection of computers and devices connected together via communications devices and transmission media 10 A n network is a simple inexpensive network that typically connects fewer than 10 computers Uses a modem that sends digital data and information from a a computer to a DSL line 12 A is a wireless network that provides Internet connections to mobile computers and other devices Chapter 10 1 A n or copy of the entire database should be made on a regular basis Ethernet Router Network Hot spot Backup Peer to Peer 11 DSL 2 In a relational database each row Has a primary key and each column has a unique name 3 A data is a collection of related records stored on storage media such as a hard disk or optical disc 4 A allows users to access and analyze any view of the database data 5 A n stores data in objects 6 Object oriented and object relational databases often use a query language called to manipulate and retrieve data 7 Occasionally a database can be damaged or destroyed because of 8 A n is a collection of data organized in a manner that allows access retrieval and use of that data 9 In managing a company s database the database requires a technical inside view of data 10 A major weakness of a lot of file processing systems is that They have redundant data and they isolate data 11 Because a data dictionary contains details about the data in a database File Hypercube OODB OQL All of the above Database Administrator some call it Metadata 12 The developer of a relational database refers to a record as a n Chapter 11 1 A is a small text file that a Web server stores on a user s computer 2 A UPS connects between a computer and a Power source 3 One approach to content filtering is through a rating system of which is similar to those used for movies and videos 4 is a program placed on a computer without the user s knowledge 5 Software occurs when someone steals software media intentionally erases software programs or illegally copies a software program 6 which allows users to choose an encryption scheme that passes between a client and a server requires that both the client and server have digital certificates Secure HTTP S HTTP 7 A n copies all of the files in a computer 8 A certificate is an authorized person or company that issues and verifies digital certificates 9 A is a numeric password either assigned by a company or selected by Tuple Cookie ICRA Spyware Theft Full backup Authority a user PIN 10 A computer risk is any event or action that could cause a loss of or damage to computer hardware software data information or processing capability Security Cobol C Chapter 13 1 which is a programming language designed for business applications evolved out of a joint effort between the United States government businesses and major universities 2 is an object oriented language based on C and has been accepted as a standard for Web applications and XML based Web services 3 In object oriented OO design the concept of packaging data and procedures into a single


View Full Document

FSU CGS 2060 - Chapter 7

Documents in this Course
Notes

Notes

11 pages

CGS Quiz

CGS Quiz

12 pages

Notes

Notes

4 pages

QUIZ 8

QUIZ 8

3 pages

Chapter 1

Chapter 1

22 pages

EXAM 2

EXAM 2

9 pages

CHAPTER 7

CHAPTER 7

25 pages

QUIZ 1

QUIZ 1

3 pages

Chapter 7

Chapter 7

25 pages

Quizlet

Quizlet

2 pages

Notes

Notes

4 pages

Quiz #7

Quiz #7

24 pages

Notes

Notes

22 pages

QUIZ 10

QUIZ 10

3 pages

Chapter 1

Chapter 1

21 pages

CHAPTER 7

CHAPTER 7

25 pages

CHAPTER 7

CHAPTER 7

31 pages

Chapter 1

Chapter 1

22 pages

Exam 2

Exam 2

6 pages

Notes

Notes

25 pages

QUIZ 4

QUIZ 4

2 pages

QUIZ 3

QUIZ 3

2 pages

Exam 1

Exam 1

47 pages

QUIZ 11

QUIZ 11

3 pages

QUIZ 4

QUIZ 4

2 pages

QUIZ 7

QUIZ 7

3 pages

Quiz 7

Quiz 7

5 pages

Chapter 7

Chapter 7

20 pages

QUIZ 1

QUIZ 1

5 pages

QUIZ 9

QUIZ 9

2 pages

Chapter 7

Chapter 7

36 pages

Chapter 7

Chapter 7

29 pages

Chapter 1

Chapter 1

22 pages

QUIZ 2

QUIZ 2

3 pages

Quiz #1

Quiz #1

15 pages

Chapter 7

Chapter 7

21 pages

Test 1

Test 1

14 pages

Chapter 6

Chapter 6

19 pages

Quiz 1

Quiz 1

18 pages

Exam 2

Exam 2

19 pages

Test 2

Test 2

18 pages

Exam 2

Exam 2

8 pages

CHAPTER 5

CHAPTER 5

12 pages

MIDTERM

MIDTERM

35 pages

Exam 1

Exam 1

7 pages

Exam 2

Exam 2

22 pages

Exam 1

Exam 1

12 pages

Exam 1

Exam 1

7 pages

Exam 1

Exam 1

7 pages

Exam 2

Exam 2

19 pages

EXAM 1

EXAM 1

5 pages

Exam 2

Exam 2

3 pages

Exam 2

Exam 2

22 pages

Exam 2

Exam 2

6 pages

Exam 1

Exam 1

7 pages

Exam 2

Exam 2

19 pages

CHAPTER 5

CHAPTER 5

12 pages

Chapter 1

Chapter 1

40 pages

Exam 1

Exam 1

11 pages

Notes

Notes

30 pages

Load more
Download Chapter 7
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Chapter 7 and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Chapter 7 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?