Exam 1: Computers and Digital Basics

arrow
  • Select Tags
search iconSearch Question
flashcardsStudy Flashcards
  • Select Tags

Jim has just purchased a new computer and it has made him think about how it works. He is particularly interested in how information is processed and stored in his computer. He has come to you for help. -When adding two numbers,Jim knows that each number is going into its own register and the control unit provides the instructions such as add.He wants to know where the result of the add goes.You tell him it goes to ____.

(Multiple Choice)
4.9/5
(43)

A(n)____________________ is a type of computer that is considered one of the fastest in the world (at the time of construction).

(Short Answer)
4.9/5
(34)

Digital devices can use ____ as a code to represent character data.

(Multiple Choice)
4.8/5
(26)

  -The accompanying figure represents the instruction cycle.The second step is Box B and represents the ____. -The accompanying figure represents the instruction cycle.The second step is Box B and represents the ____.

(Multiple Choice)
4.9/5
(33)

Data transmission speeds are typically expressed as ____.

(Multiple Choice)
4.9/5
(36)

  -The ____ from an instruction specifies the data. -The ____ from an instruction specifies the data.

(Multiple Choice)
4.8/5
(41)

An ordinary personal computer that is connected to a network is a ____.

(Multiple Choice)
4.9/5
(39)

A powerful desktop computer used for high-performance tasks is a ____.

(Multiple Choice)
4.8/5
(29)

A(n)keylogger is a form of malicious code._________________________

(True/False)
4.8/5
(35)

  -The type of code that uses only seven bits for each character is ____. -The type of code that uses only seven bits for each character is ____.

(Multiple Choice)
4.9/5
(41)

In terms of an authentication protocol,the phrase 'something a person is' refers to a(n)____.

(Multiple Choice)
4.9/5
(41)

A machine language instruction has two parts,the op code and the ____________________.

(Short Answer)
4.8/5
(32)

A term which can refer to a person who manipulates computers with malicious intent is ____.

(Multiple Choice)
4.8/5
(41)

____ computing provides access to information,applications,communications,and storage over the Internet.

(Multiple Choice)
5.0/5
(40)

  -The binary number 10 represents ____ in the decimal number system. -The binary number 10 represents ____ in the decimal number system.

(Multiple Choice)
4.8/5
(41)

  -____,as shown in the accompanying figure,can be directly executed by the processors's circuitry. -____,as shown in the accompanying figure,can be directly executed by the processors's circuitry.

(Multiple Choice)
4.8/5
(34)

  -The accompanying figure represents the instruction cycle.The third step is Box C and represents the ____. -The accompanying figure represents the instruction cycle.The third step is Box C and represents the ____.

(Multiple Choice)
4.9/5
(31)

A problem a hacker can cause after breaking into your computer might be ____.

(Multiple Choice)
4.8/5
(35)

Are handheld devices computers?

(Essay)
4.8/5
(44)

The ____ phase of the digital revolution materialized in the 1990s when the Internet was opened to public use.

(Multiple Choice)
4.7/5
(39)
Showing 121 - 140 of 147
close modal

Filters

  • Essay(0)
  • Multiple Choice(0)
  • Short Answer(0)
  • True False(0)
  • Matching(0)