Unformatted text preview:

1 Which of these is a open source free OS Linux 2 Which is not required when building your own computer Router 3 What does Moore s Law describe the pace at which CPUs and Computers improve over time 4 Most notebooks contain an slot that allows the computer to read flash memory cards memory sticks and secure digital cards Expresscard 5 What determines the processing power of a CPU clock speed and the amount of Cache memory 6 What determines Cache level the proximity to the CPU 7 The amount of RAM that is actually sitting on memory modules in your computer is the physical memory 8 Modern RAM is usually measured in what Gigabytes 9 What type of optical storage has the largest capacity Blu Ray Disc 10 Access Time is determined by Seek time and Latency 11 What type of expansion card is used to turn binary code into an image you can see Video card 12 What is the purpose of the disk defragmenter to cleanup the hard drive and increase computer performance 13 What material are transistors made of Silicon 14 Clock speed is measured in Gigahertz 15 Which of the following would not be used for a file that you want to save permanently RAM 16 The collection of commands a specific CPU can execute is called the Instruction Set 17 The CPU consists of what two parts The control unit and the algorithmic logic unit 18 A computer virus attaches itself to another computer program called a host program 19 A attempts to travel between systems through network connection to spread much faster than a virus worm 20 What type of virus attaches itself to documents such as word documents Macro virus 21 A drive by download is a virus that downloads itself from a webpage that you visit 22 The most common way hackers attempt to hack your system is through the internet connection on your computer 23 Firewalls use a process called network address translation NAT to assign internal IP addresses on a network What device is capable of cottoning this feature router 24 A type of spyware that monitors keystrokes with the intent of steeling passwords login IDs or credit information keystroke logger 25 Lures internet users to reveal personal information such as credit card numbers social security numbers or other info by pretending to look like a legitimate business such as a bank phishing 26 What is not true about power surges printers are not affected 27 Network administrators database administrators web server administrators and telecommunications technicians are all considered part of the department Information systems 28 staff the phones respond to live internet chat or respond to email and solve problems for customers or employees either remotely or in person Helpdesk analyst 29 means that the data contained in the database is accurate and reliable Data integrity 30 A category of information in a database is referred to as a field 31 What type of field is needed to hold a video clip Object field 32 A group of related fields is a record 33 Which of the following could not be used a primary key a street address 34 What is the most popular type of Database relational 35 A description of the data that will be in the database is the data dictionary 36 Used to display a subset of data from a table based on the criteria you specify select query 37 A shows conditions that are unusual or that need attention by users of the system exception report 38 A group of two or more computers that are configured to share resources and information network 39 What is NOT an advantage of using a network over a single computer easier to protect and maintain it is harder to protect networks 40 are used by large corporations to connect two or more locations WANs 41 A uses public Internet communications infrastructure to build a secure private network among various locations VPN 42 Enable a computer to communicate with the network Network adapter 43 Keeps track of who is logging on to the network and which services on the network are available to each user Authentication server 44 Stores and manages files on a server for network users File server 45 A repository for applications such a Microsoft word that allows them to be used over a network Application server 46 The most widely used type of network typology is star typology 47 A set of rules for exchanging communication protocol 48 Needs to be installed on each client computer and server connected to the network so they can communicate Network operating system NOS 49 Used for identification purposes internally on a network and is not viewable to external users media access control MAC address 50 A numerical label given by the ISP to a computer to identify it on the internet IP address Open source software is freely distributed no royalties accrue to the creators contains the source code and can be distributed to other Example Microsoft visio vs dia allows you to make flowcharts openoffice org Reasons to install portability use on any computer and prevent viruses Microsoft more popular more viruses Moore s Law a prediction named after Gordon Moore the cofounder of Intel states that the number of transistors on a CPU chip will double every two years External SATA a fast transfer port that allows your computer to connect peripherals such as external hard drives to add more storage CPU central processing unit Control unit coordinates all other activities of all the other computer components Arithmetic logic unit responsible for all the arithmetic calculations Cache Memory How do you know how much space it has by the chips proximity to the CPU Random Access Memory your computer s temporary storage space Media Access Control MAC the physical address of your network Memory Modules a small circuit board that holds a series of random access memory RAM chips Ex DIMM Dual Inline Memory Modules most used today Physical Memory amount of RAM that is installed in a computer Access Time the time it takes a storage device to locate its stored data Blu Ray fastest use of storage commonly used today Seek time the time it takes for the hard drive s read write heads to move over the surface of the disk between tracks to the correct track Latency waiting time of rational delay Video card images viewed on the monitor Instruction Set collection of commands the CPU can execute Worm a program that attempts to travel between system through network connections to spread information can run independently of host file execution and are active in spreading themselves largest conficker Macro virus virus that attaches


View Full Document

FSU CGS 2100 - Study Guide

Documents in this Course
Exam 1

Exam 1

12 pages

Notes

Notes

8 pages

Exam 2

Exam 2

16 pages

Chapter 1

Chapter 1

10 pages

Exam 2

Exam 2

12 pages

Chapter 7

Chapter 7

12 pages

Exam 1

Exam 1

12 pages

Exam 1

Exam 1

9 pages

Notes

Notes

15 pages

Chapter 1

Chapter 1

12 pages

Midterm

Midterm

12 pages

Exam 2

Exam 2

3 pages

Exam 2

Exam 2

10 pages

EXAM 2

EXAM 2

22 pages

Exam 2

Exam 2

1 pages

Exam 2

Exam 2

1 pages

Exam 2

Exam 2

2 pages

Exam 2

Exam 2

2 pages

EXAM 2

EXAM 2

2 pages

Chapter 6

Chapter 6

14 pages

Chapter 1

Chapter 1

28 pages

Exam 2

Exam 2

9 pages

Test 1

Test 1

12 pages

Exam 2

Exam 2

14 pages

Exam 2

Exam 2

16 pages

Test 1

Test 1

12 pages

Exam 1

Exam 1

14 pages

Exam 1

Exam 1

14 pages

EXAM

EXAM

14 pages

Chapter 1

Chapter 1

36 pages

Exam 2

Exam 2

10 pages

Load more
Download Study Guide
Our administrator received your request to download this document. We will send you the file to your email shortly.
Loading Unlocking...
Login

Join to view Study Guide and access 3M+ class-specific study document.

or
We will never post anything without your permission.
Don't have an account?
Sign Up

Join to view Study Guide 2 2 and access 3M+ class-specific study document.

or

By creating an account you agree to our Privacy Policy and Terms Of Use

Already a member?