Deck 11: Computers
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/29
Play
Full screen (f)
Deck 11: Computers
1
Which of the following is the best definition of digital information?
A)Information that is stored on a computer
B)Information that is stored as discrete data
C)Information that is accessible online
D)Information that can be read from a computer screen
A)Information that is stored on a computer
B)Information that is stored as discrete data
C)Information that is accessible online
D)Information that can be read from a computer screen
Information that is stored as discrete data
2
Which of the following is not an advantage that LCD monitors have over CRT monitors?
A)They are cheaper.
B)They take up less space.
C)The screens are perfectly flat.
D)The image isn't distorted near the edges.
A)They are cheaper.
B)They take up less space.
C)The screens are perfectly flat.
D)The image isn't distorted near the edges.
They are cheaper.
3
Where does the term floppy disk come from?
A)The fact that the data can be changed easily
B)The fact that the encoding protocol is considered sloppy by some
C)The fact that the disks used to be bendable
D)The fact that they go between computers, i.e. flip flop
A)The fact that the data can be changed easily
B)The fact that the encoding protocol is considered sloppy by some
C)The fact that the disks used to be bendable
D)The fact that they go between computers, i.e. flip flop
The fact that the disks used to be bendable
4
What is random about random access memory (RAM)?
A)It begins looking for data randomly.
B)It stores data in a random place.
C)Its actual total capacity is somewhat random.
D)It isn't literally random, but it can access any data point at any time.
A)It begins looking for data randomly.
B)It stores data in a random place.
C)Its actual total capacity is somewhat random.
D)It isn't literally random, but it can access any data point at any time.
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
5
What role does the BIOS play?
A)The BIOS loads the operating system.
B)The BIOS mediates between the operating system and the computer.
C)The BIOS mediates between the operating system and the user.
D)The BIOS is a backup in case the operating system fails.
A)The BIOS loads the operating system.
B)The BIOS mediates between the operating system and the computer.
C)The BIOS mediates between the operating system and the user.
D)The BIOS is a backup in case the operating system fails.
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
6
What is the main disadvantage of backwards compatibility?
A)Older programs aren't as good as new ones.
B)Old programs may run, but they often run badly.
C)Systems that are backwards compatible must be more complex.
D)Old programs and new programs often have runtime conflicts.
A)Older programs aren't as good as new ones.
B)Old programs may run, but they often run badly.
C)Systems that are backwards compatible must be more complex.
D)Old programs and new programs often have runtime conflicts.
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
7
What is Moore's law?
A)Processing speed will double every two years.
B)Memory cost will halve every 18 months.
C)Computer power will triple every five years.
D)Computer access will go up ten percent every year.
A)Processing speed will double every two years.
B)Memory cost will halve every 18 months.
C)Computer power will triple every five years.
D)Computer access will go up ten percent every year.
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
8
What would happen if you ran a computer without a graphics card?
A)The computer wouldn't be able to play videos.
B)The computer wouldn't be able to render 3D graphics.
C)The system would slow down a great deal.
D)There would be no image.
A)The computer wouldn't be able to play videos.
B)The computer wouldn't be able to render 3D graphics.
C)The system would slow down a great deal.
D)There would be no image.
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
9
Which of the following is not an example of malware?
A)A computer virus
B)Trojan horses
C)A hacker accessing your system
D)Adware
A)A computer virus
B)Trojan horses
C)A hacker accessing your system
D)Adware
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
10
Which of the following processes is not controlled by the operating system?
A)Process management
B)Maintaining interoperability
C)File management
D)Memory management
A)Process management
B)Maintaining interoperability
C)File management
D)Memory management
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
11
Which is not an example of an algorithm?
A)Software documentation
B)A cooking recipe
C)A computer program
D)Standard cryptographic attacks
A)Software documentation
B)A cooking recipe
C)A computer program
D)Standard cryptographic attacks
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
12
Which of the following algorithms is the least complex?
A)Dynamic programming
B)The greedy method
C)Search and enumeration
D)Exhaustive search
A)Dynamic programming
B)The greedy method
C)Search and enumeration
D)Exhaustive search
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
13
How does prototyping work in software engineering?
A)A shorter, simpler version is designed as a proof of concept.
B)Software is written to solve easier problems of a similar type.
C)A rough, approximate version is designed quickly as a proof of concept.
D)The prototype is only the logic of the program, not the code.
A)A shorter, simpler version is designed as a proof of concept.
B)Software is written to solve easier problems of a similar type.
C)A rough, approximate version is designed quickly as a proof of concept.
D)The prototype is only the logic of the program, not the code.
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
14
Why is C considered to be a low-level programming language?
A)It gives the programmer direct control over memory and hardware.
B)It is usually learned early in a programmer's education.
C)It is not as powerful as some other languages.
D)It is only useful for simple tasks.
A)It gives the programmer direct control over memory and hardware.
B)It is usually learned early in a programmer's education.
C)It is not as powerful as some other languages.
D)It is only useful for simple tasks.
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
15
In object-oriented programming, what is an object?
A)Any data set that the program will operate on
B)A function that the program can call on
C)A piece of hardware that the program must interact with
D)A data set or field along with its associated methods
A)Any data set that the program will operate on
B)A function that the program can call on
C)A piece of hardware that the program must interact with
D)A data set or field along with its associated methods
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
16
Which of the following is a major advantage of cloud computing?
A)Programs are easier to design for cloud computing.
B)Resources are used more efficiently.
C)Cloud computing is inherently more secure.
D)Programs use less processing power when running on the cloud.
A)Programs are easier to design for cloud computing.
B)Resources are used more efficiently.
C)Cloud computing is inherently more secure.
D)Programs use less processing power when running on the cloud.
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
17
What is the difference between an algorithm and a protocol?
A)Algorithms say what needs to be done; protocols also say who is responsible for doing it.
B)Protocols do not necessarily solve problems.
C)Protocols always involve more than one actor.
D)Protocols are specifically used in software engineering.
A)Algorithms say what needs to be done; protocols also say who is responsible for doing it.
B)Protocols do not necessarily solve problems.
C)Protocols always involve more than one actor.
D)Protocols are specifically used in software engineering.
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
18
Does modern encryption rely more heavily on private key or public key encryption?
A)Public key encryption
B)Private key encryption
C)A combination of public and private key encryption
D)Neither technique is used much anymore
A)Public key encryption
B)Private key encryption
C)A combination of public and private key encryption
D)Neither technique is used much anymore
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
19
Why is the JPEG format considered to be lossy?
A)It loses data during data compression.
B)The file marker is easy to lose.
C)The encoding can be lost, making the picture useless.
D)Lossy is programming jargon referring to the algorithms that JPEG uses.
A)It loses data during data compression.
B)The file marker is easy to lose.
C)The encoding can be lost, making the picture useless.
D)Lossy is programming jargon referring to the algorithms that JPEG uses.
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
20
What determines the maximum size of an Ethernet network?
A)There is no maximum size.
B)The maximum size depends on the strength of the transmitter.
C)The maximum size is limited by the collision domain.
D)The maximum size is limited by the server's processing power.
A)There is no maximum size.
B)The maximum size depends on the strength of the transmitter.
C)The maximum size is limited by the collision domain.
D)The maximum size is limited by the server's processing power.
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
21
What computer network is generally considered to be the origin of the Internet?
A)ARPANET
B)FTP
C)HTTP
D)The World Wide Web
A)ARPANET
B)FTP
C)HTTP
D)The World Wide Web
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
22
What agency is responsible for regulating IP addresses?
A)WWW
B)ICANN
C)Each company is responsible for maintaining its own IP address.
D)The job is split between regional registries.
A)WWW
B)ICANN
C)Each company is responsible for maintaining its own IP address.
D)The job is split between regional registries.
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
23
What open-source software?
A)Software that is available free of charge
B)Software that was developed by a non-profit organization
C)Software that can work on any operating system
D)Software with freely available source code
A)Software that is available free of charge
B)Software that was developed by a non-profit organization
C)Software that can work on any operating system
D)Software with freely available source code
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
24
What is the main disadvantage of relational databases?
A)The relationships between datasets must be known.
B)Data tags must be determined in advance.
C)They restrict the possible uses of the database.
D)There is redundant data.
A)The relationships between datasets must be known.
B)Data tags must be determined in advance.
C)They restrict the possible uses of the database.
D)There is redundant data.
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
25
What activity reduces huge amounts of data to smaller sets of meaningful, usable data?
A)Data mining
B)Data silos
C)Data warehousing
D)SQL querying
A)Data mining
B)Data silos
C)Data warehousing
D)SQL querying
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
26
In terms of online security, what is re-identification?
A)Validating a user's identity before granting access to secure content
B)Validating a user's identity throughout a secure session
C)Requiring a user to log back in after a session has expired
D)Determining a user's actual identity from anonymous information
A)Validating a user's identity before granting access to secure content
B)Validating a user's identity throughout a secure session
C)Requiring a user to log back in after a session has expired
D)Determining a user's actual identity from anonymous information
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
27
What is error encoding?
A)A form of copy protection that intentionally creates errors to prove authenticity
B)Code that corrects errors that occur during routine operation
C)Errors made when writing data to memory
D)Mistakes made when writing a computer program
A)A form of copy protection that intentionally creates errors to prove authenticity
B)Code that corrects errors that occur during routine operation
C)Errors made when writing data to memory
D)Mistakes made when writing a computer program
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
28
What is a white-hat hacker?
A)White-hat hackers are security experts who do not break the law.
B)White-hat hackers expose security vulnerabilities so that they can be corrected.
C)White-hat hackers are hackers who work for the government.
D)White-hat hackers are programmers who track down cybercriminals.
A)White-hat hackers are security experts who do not break the law.
B)White-hat hackers expose security vulnerabilities so that they can be corrected.
C)White-hat hackers are hackers who work for the government.
D)White-hat hackers are programmers who track down cybercriminals.
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck
29
Which of the following might be included in a document's metadata?
A)The date of creation
B)The number of times the document has been accessed
C)The usernames of everyone who has accessed the document
D)All of the above
A)The date of creation
B)The number of times the document has been accessed
C)The usernames of everyone who has accessed the document
D)All of the above
Unlock Deck
Unlock for access to all 29 flashcards in this deck.
Unlock Deck
k this deck