{"id":111139,"date":"2023-07-28T21:52:17","date_gmt":"2023-07-28T21:52:17","guid":{"rendered":"https:\/\/learnexams.com\/blog\/?p=111139"},"modified":"2023-07-28T21:52:21","modified_gmt":"2023-07-28T21:52:21","slug":"uta-insy-2303-final-exam-latest-2023-2024-real-exam-300-questions-and-correct-answersagrade","status":"publish","type":"post","link":"https:\/\/www.learnexams.com\/blog\/2023\/07\/28\/uta-insy-2303-final-exam-latest-2023-2024-real-exam-300-questions-and-correct-answersagrade\/","title":{"rendered":"UTA INSY 2303 FINAL EXAM LATEST 2023-2024 REAL EXAM 300 QUESTIONS AND CORRECT ANSWERS|AGRADE"},"content":{"rendered":"\n<p>Uta insy 2303 exam quizlet pdf<br>Uta insy 2303 exam quizlet chapter 1<br>insy 2303 exam 1 quizlet<br>insy 2303 final exam<br>insy 2303 exam 2<br>insy 2303 uta<\/p>\n\n\n\n<p>The <strong><em>_<\/em><\/strong> number system allows digital devices to represent virtually any number simply by using 0s and 1s. (Unit 1)<br>Binary<\/p>\n\n\n\n<p>Most graphics software uses a process called pixel <strong><em>_<\/em><\/strong> to create new pixels by averaging the colors of nearby pixels. (Unit 1)<br>Interpolation<\/p>\n\n\n\n<p>MIDI files are less compact than digital audio files. (Unit 1)<br>False<\/p>\n\n\n\n<p>Which of the following options are well suited for using vector graphics? (Unit 1)<br>All of the above<\/p>\n\n\n\n<p>A(n) <strong><em>_<\/em><\/strong> is the software that compresses a video stream when a video is stored, and decompresses the file when the video is played. (Unit 1)<br>Codec<\/p>\n\n\n\n<p>One of the main disadvantages of MIDI is that it cannot produce vocals. (Unit 1)<br>True<\/p>\n\n\n\n<p>Most music for portable media players is stored in <strong><em>_<\/em><\/strong> audio file formats. (Unit 1)<br>Compressed<\/p>\n\n\n\n<p>Which of the following is NOT a type of bitmap format? (Unit 1)<br>ZIP<\/p>\n\n\n\n<p>Instead of storing the color value for each pixel, a vector graphics file contains instructions that a computer uses to create the shape, size, position, and color for each object in an image. (Unit 1)<br>True<\/p>\n\n\n\n<p><strong><em>__<\/em><\/strong> is music, speech, and other sounds represented in binary format for use in digital devices. (Unit 1)<br>Digital audio<\/p>\n\n\n\n<p>In the context of bitmap graphics editing, what technique employs algorithms that pull pixels from one area of an image and then apply them to another area? (Unit 1)<br>Cloning<\/p>\n\n\n\n<p>Digital data can be <strong><em>__<\/em><\/strong> that have been converted into discrete digits such as 0s and 1s. (Unit 1)<br>All of the above<\/p>\n\n\n\n<p>8-bit color depth is also called True Color. (Unit 1)<br>False<\/p>\n\n\n\n<p>Both scanners and digital cameras produce vector graphics. (Unit 1)<br>False<\/p>\n\n\n\n<p>Lossy compression techniques discard some data from an image to shrink its file size. (Unit 1)<br>True<\/p>\n\n\n\n<p>In digital video, a lower resolution reduces the bit rate. (Unit 1)<br>True<\/p>\n\n\n\n<p>TIFF, PNG, and GIF graphics formats offer lossy compression. (Unit 1)<br>False<\/p>\n\n\n\n<p>A bitmap graphic is composed of a grid of tiny rectangular cells. (Unit 1)<br>True<\/p>\n\n\n\n<p>Lossy compression throws away some of the original data during the compression process. (Unit 1)<br>True<\/p>\n\n\n\n<p><strong><em>_<\/em><\/strong> enables people to control software with spoken commands, as well as dictate text into a word processing document. (Unit 1)<br>Speech recognition<\/p>\n\n\n\n<p>To conserve space, applications that require high-quality sound use low sampling rates. (Unit 1)<br>False<\/p>\n\n\n\n<p>Which of the following is NOT a format that is used for digital audio? (Unit 1)<br>DOC<\/p>\n\n\n\n<p>Digital photographs are stored as bitmap files. (Unit 1)<br>True<\/p>\n\n\n\n<p>Digital video is a core technology for which of the following? (Unit 1)<br>All of the above<\/p>\n\n\n\n<p>Which of the following is NOT a type of digital video container file? (Unit 1)<br>PNG<\/p>\n\n\n\n<p>In digital video, as long as the proportion of horizontal and vertical pixels remains the same, the aspect ratio is consistent. (Unit 1)<br>True<\/p>\n\n\n\n<p>Sampling <strong><em>_<\/em><\/strong> refers to the number of times per second that a sound is measured during the recording process. (Unit 1)<br>Rate<\/p>\n\n\n\n<p>JPEG fields are compressed using lossy compression. (Unit 1)<br>True<\/p>\n\n\n\n<p>Video resolutions can be expressed as width x height. (Unit 1)<br>True<\/p>\n\n\n\n<p>3-D graphics are based on vectors stored as a set of instructions describing the coordinates for lines and shapes in a three-dimensional space. What do these vectors form? (Unit 1)<br>A wireframe<\/p>\n\n\n\n<p>The number of frames that are displayed per second is measured in <strong>_<\/strong>. (Unit 1)<br>Fps<\/p>\n\n\n\n<p>A file name extension indicates the file format. (Unit 1)<br>True<\/p>\n\n\n\n<p>Today&#8217;s color display devices represent color using the <strong>_<\/strong> color model. (Unit 1)<br>RGB<\/p>\n\n\n\n<p>Vector graphics usually require more storage space than bitmaps. (Unit 1)<br>False<\/p>\n\n\n\n<p>Regardless of sampling rate, digital audio file size can be reduced using audio compression techniques. (Unit 1)<br>True<\/p>\n\n\n\n<p>Plain, unformatted text is sometimes called ASCII text. (Unit 1)<br>True<\/p>\n\n\n\n<p>Compressed files usually have <strong>_<\/strong> at the end of the file name. (Unit 1)<br>.zip<\/p>\n\n\n\n<p>Lossy compression provides a way to compress data and reconstitute it into its original state. (Unit 1)<br>False<\/p>\n\n\n\n<p>Which of the following tools would be found in 3-D graphics software? (Unit 1)<br>All of the above<\/p>\n\n\n\n<p>After a vector graphic is converted to a bitmap, the resulting graphic no longer has the qualities of a vector graphic. (Unit 1)<br>True<\/p>\n\n\n\n<p>Digital videos look sharpest when they are displayed at a resolution that is larger than the frame size. (Unit 1)<br>False<\/p>\n\n\n\n<p>What is another term for vector graphics software? (Unit 1)<br>Drawing Software<\/p>\n\n\n\n<p>A vector graphic consists of a set of instructions for creating a picture. (Unit 1)<br>True<\/p>\n\n\n\n<p>The number of colors available in a graphic is referred to as color <strong>_<\/strong>. (Unit 1)<br>Depth<\/p>\n\n\n\n<p>Processing is handled by the computer&#8217;s central processing unit (CPU). (Unit 2)<br>True<\/p>\n\n\n\n<p><strong><em><strong>_ is data that is entered into a computer. _<\/strong><\/em><\/strong> is the result produced by a computer. (Unit 2)<br>Input, Output<\/p>\n\n\n\n<p>A slate tablet configuration is basically a screen in a narrow frame that lacks a physical keyboard. (Unit 2)<br>True<\/p>\n\n\n\n<p>Intel Corporation is the world&#8217;s largest chipmaker and supplies a sizeable percentage of the microprocessors that power desktops and laptops. (Unit 2)<br>True<\/p>\n\n\n\n<p>Most computer ads specify the speed of a microprocessor in gigahertz. (Unit 2)<br>True<\/p>\n\n\n\n<p>The term instruction cycle refers to the process in which a computer executes a single instruction.\u200b (Unit 2)<br>True<\/p>\n\n\n\n<p>In a microprocessor, the <strong><em>__<\/em><\/strong> fetches instructions. (Unit 2)<br>Control unit<\/p>\n\n\n\n<p>The ability to switch between programs makes computers multipurpose devices. (Unit 2)<br>True<\/p>\n\n\n\n<p>In a display device, response rate is the time it takes for one pixel to change from black to white then back to black. (Unit 2)<br>True<\/p>\n\n\n\n<p>Modern refrigerators, washing machines, and other appliances are controlled by integrated circuits called <strong><em><strong>__<\/strong><\/em><\/strong> that combine sensors with processing circuitry. (Unit 2)<br>Microcontrollers<\/p>\n\n\n\n<p>Smartwatches are multifunction devices that can include a camera, thermometer, compass, calculator, cell phone, GPS, media player, and fitness tracker. (Unit 2)<br>True<\/p>\n\n\n\n<p><strong><em>_<\/em><\/strong> is a temporary holding area for data and programs. (Unit 2)<br>RAM<\/p>\n\n\n\n<p>During an instruction cycle, all parts of the instruction are performed by the microprocessor&#8217;s control unit. (Unit 2)<br>False<\/p>\n\n\n\n<p>What type of computer should you consider purchasing if you want a system that is ideal for dedicated gamers, serious designers, desktop publishers, and video editors? (Unit 2)<br>Desktop<\/p>\n\n\n\n<p>A solid state drive can be used as a substitute for a hard disk drive. (Unit 2)<br>True<\/p>\n\n\n\n<p>Memory cards are typically volatile. (Unit 2)<br>False<\/p>\n\n\n\n<p>Computers with the same operating systems can typically use the same software and peripheral devices. (Unit 2)<br>True<\/p>\n\n\n\n<p>A desktop is a portable computing device featuring a touch-sensitive screen that can be used for input as well as for output. (Unit 2)<br>False<\/p>\n\n\n\n<p>The part of the data bus that runs between the microprocessor and RAM is called the <strong><em>_<\/em><\/strong> bus. (Unit 2)<br>Local<\/p>\n\n\n\n<p>Battery life is the time your device operates before it must be recharged. (Unit 2)<br>True<\/p>\n\n\n\n<p>Which of the following is an example of a computer that is a small, lightweight personal computer that is designed like a clam shell? (Unit 2)<br>Laptop computer<\/p>\n\n\n\n<p>The electronic components of most digital devices are mounted on a circuit board called a <strong><em><strong><em>__<\/em><\/strong><\/em><\/strong>. (Unit 2)<br>All of the above<\/p>\n\n\n\n<p>RAM is volatile. (Unit 2)<br>True<\/p>\n\n\n\n<p>The operating systems for smartphones are radically different to those used for tablet computers. (Unit 2)<br>False<\/p>\n\n\n\n<p>When a peripheral device is connected or disconnected while the host device is operating, it is called hot-plugging. (Unit 2)<br>True<\/p>\n\n\n\n<p>When interference affects a wireless signal, data must be re-transmitted. (Unit 3)<br>True<\/p>\n\n\n\n<p>Wi-Fi signals may reach up to 300 feet from the router. (Unit 3)<br>True<\/p>\n\n\n\n<p><strong><em>_<\/em><\/strong> are designed to provide connectivity for devices within a limited area, typically within the premises of a home, office building, business, or school. (Unit 3)<br>LANs<\/p>\n\n\n\n<p>UDP is faster than TCP but does not perform error checking. (Unit 3)<br>True<\/p>\n\n\n\n<p>When setting up a Wi-Fi network, the router you select should support the fastest device you&#8217;ll want to use on the network. (Unit 3)<br>True<\/p>\n\n\n\n<p>The most widespread wireless channels for communication networks are microwaves and RF signals. (Unit 3)<br>True<\/p>\n\n\n\n<p>Which type of network cover a large geographical area and usually consists of several smaller networks, which might use different computer platforms and network technologies. (Unit 3)<br>WAN<\/p>\n\n\n\n<p>You can set up Wi-Fi to use wireless mesh topology OR star topology. (Unit 3)<br>True<\/p>\n\n\n\n<p>Connection speed is technically a measure of capacity. (Unit 3)<br>True<\/p>\n\n\n\n<p>The organization that supervises Internet addressing is ARPANET. (Unit 3)<br>False<\/p>\n\n\n\n<p><strong><em>__<\/em><\/strong> LANs are usually arranged in a star topology with computers wired to central switching circuitry that is incorporated in modern routers. (Unit 3)<br>Ethernet<\/p>\n\n\n\n<p>You may be able to bypass DNS outages by changing your DNS server. (Unit 3)<br>True<\/p>\n\n\n\n<p>Which type of network connects smart devices or consumer electronics within a range of about 30 feet (10 meters) and without the use of wires or cables. (Unit 3)<br>PAN<\/p>\n\n\n\n<p>Microwaves have more carrying capacity than radio waves. (Unit 3)<br>True<\/p>\n\n\n\n<p>Suppose you wanted to run a Web server or FTP server from your home. What type of IP address would you want? (Unit 3)<br>Static<\/p>\n\n\n\n<p>Which DCE would you use if you wanted to extend a wired network by adding more ports? (Unit 3)<br>Hub<\/p>\n\n\n\n<p>Which type of network topology connects a peripheral device to a host device? (Unit 3)<br>Point-to-point<\/p>\n\n\n\n<p>DSL is an example of what type of Internet access? (Unit 3)<br>Fixed<\/p>\n\n\n\n<p>When connecting to the Internet, most Internet users connect to a Tier 1 network. (Unit 3)<br>False<\/p>\n\n\n\n<p>Network discovery works in the exact same way on all devices. (Unit 3)<br>False<\/p>\n\n\n\n<p>On a network, any device that stores or generates data is considered to be a(n) <strong>_<\/strong>. (Unit 3)<br>DTE<\/p>\n\n\n\n<p>Which of the following is an example of a DCE? (Unit 3)<br>All of the above<\/p>\n\n\n\n<p>Which type of cables are used for high-capacity trunk lines that provide main routes for telephone, cable, and Internet communications? (Unit 3)<br>Fiber-optic cables<\/p>\n\n\n\n<p>Wireless connections use licensed frequencies that are available for public use. (Unit 3)<br>False<\/p>\n\n\n\n<p>The bandwidth of a channel that carries digital data is usually measured in <strong>_<\/strong>. (Unit 3)<br>Bits per second<\/p>\n\n\n\n<p>Networks can be classified according to their size and geographic scope. (Unit 3)<br>True<\/p>\n\n\n\n<p>Dropbox is an example of a file hosting service. (Unit 3)<br>True<\/p>\n\n\n\n<p>Which type of protocol provides a way to transfer files from one computer to another over any TCP\/IP network, such as a LAN or the Internet. (Unit 3)<br>FTP<\/p>\n\n\n\n<p>Which file sharing protocol distributes the role of a file server across a collection of dispersed computers? (Unit 3)<br>BitTorrent<\/p>\n\n\n\n<p>Which of the following is an advantage of wired connection? (Unit 3)<br>All of the above<\/p>\n\n\n\n<p>The Internet is the world&#8217;s largest WAN. (Unit 3)<br>True<\/p>\n\n\n\n<p>Which of the following is the technique for improving the ranking and visibility of a Web site? (Unit 4)<br>Search engine optimization<\/p>\n\n\n\n<p>A 404 status code indicates that the resource that your browser requested does not exist. (Unit 4)<br>True<\/p>\n\n\n\n<p>What does the HTML tag<\/p>\n\n\n\n<p>designate in an HTML document? (Unit 4)<br>New paragraph<\/p>\n\n\n\n<p>When were the original HTML specifications developed by Tim Berners-Lee? (Unit 4)<br>1990<\/p>\n\n\n\n<p>Which of the following is a function of the browser cache? (Unit 4)<br>Any elements that it stores do not have to be downloaded again<\/p>\n\n\n\n<p>The file name of a specific Web page always appears first in the URL. (Unit 4)<br>False<\/p>\n\n\n\n<p>Using just HTML and CSS, Web designers can create dynamic Web pages. (Unit 4)<br>False<\/p>\n\n\n\n<p>Search engines do not allow users to view or change their search history information. (Unit 4)<br>False<\/p>\n\n\n\n<p>In the list below, which one is NOT a search operator?<br>GET<\/p>\n\n\n\n<p>The <strong><em><strong>__<\/strong><\/em><\/strong> is a collection of HTML documents, images, videos, and sound files that can be linked to each other and accessed over the Internet using a protocol called HTTP. (Unit 4)<br>World Wide Web<\/p>\n\n\n\n<p>In today&#8217;s Web, most Web pages have bidirectional links. (Unit 4)<br>False<\/p>\n\n\n\n<p>Which of the following file extensions indicates the file is an HTML document? (Unit 4)<br>Both A and B<\/p>\n\n\n\n<p>HTML is the only markup language used on the Web. (Unit 4)<br>False<\/p>\n\n\n\n<p>You can create HTML documents with simple text editors such as Notepad or TextEdit. (Unit 4)<br>True<\/p>\n\n\n\n<p>The World Wide Web is a collection of HTML documents, images, videos, and sound files that can be linked to each other and accessed over the Internet using a protocol called <strong>_<\/strong>. (Unit 4)<br>HTTP<\/p>\n\n\n\n<p>A link contains the <strong><em>__<\/em><\/strong> that links to another Web page. (Unit 4)<br>URL<\/p>\n\n\n\n<p>Search engines will keep a record of your search history. (Unit 4)<br>True<\/p>\n\n\n\n<p>Which of the following is a markup language? (Unit 4)<br>All of the above<\/p>\n\n\n\n<p>A URL never contains spaces. (Unit 4)<br>True<\/p>\n\n\n\n<p>You can think of HTTP as the system that browsers use to communicate with a Web server and ask for HTML documents. (Unit 4)<br>True<\/p>\n\n\n\n<p>HTTP is the markup language used to specify the contents of a Web page. (Unit 4)<br>False<\/p>\n\n\n\n<p>Files can remain in the Web cache for days or weeks. (Unit 4)<br>True<\/p>\n\n\n\n<p>HTTP uses port 20 for communications between a client device and a server. (Unit 4)<br>False<\/p>\n\n\n\n<p>Which of the following is NOT an HTTP method? (Unit 4)<br>SEND<\/p>\n\n\n\n<p>It is not possible to delete the contents of your browser cache. (Unit 4)<br>False<\/p>\n\n\n\n<p>Which HTML tag designates links to other Web Page? (Unit 4)<br><a href=\"\"><\/a><\/p>\n\n\n\n<p>If you want to change your default browser, you need to delete the browsers that you no longer want to use. (Unit 4)<br>False<\/p>\n\n\n\n<p>Browser cache is another term for browser History list. (Unit 4)<br>False<\/p>\n\n\n\n<p>Which HTTP method does a browser use when you upload files to a specific Web address? (Unit 4)<br>PUT<\/p>\n\n\n\n<p>Which of the following is data that would NOT be found in a cookie? (Unit 4)<br>Information it reads from your hard drive<\/p>\n\n\n\n<p>An HTML document begins with DOCTYPE and html declarations. (Unit 4)<br>True<\/p>\n\n\n\n<p>The Web is synonymous with the Internet.<br>False<\/p>\n\n\n\n<p>What is the term that is used to describe a computer system that could store literary documents, link them according to logical relationships, and allow readers to comment and annotate what they read? (Unit 4)<br>Hypertext<\/p>\n\n\n\n<p>HTML tags are instructions for a browser. (Unit 4)<br>True<\/p>\n\n\n\n<p>A(n) <strong>_<\/strong> is a company that provides space on a server to house Web pages. (Unit 4)<br>Web hosting service<\/p>\n\n\n\n<p>Which of the following is NOT used to create or edit HTML documents? (Unit 4)<br>Filezilla FTP client<\/p>\n\n\n\n<p>HTTP is considered to be a(n) <strong>_<\/strong> protocol. (Unit 4)<br>Stateless<\/p>\n\n\n\n<p>You can use multiple browser on a device. (Unit 4)<br>True<\/p>\n\n\n\n<p>What is the term used for when a link leads to a Web page that no longer exists? (Unit 4)<br>Link rot<\/p>\n\n\n\n<p>An HTML document consists of three sections: the head, the body, and the content. (Unit 4)<br>False<\/p>\n\n\n\n<p>The telecommunications technique used by local email is sometimes referred to as <strong><em>__<\/em><\/strong>. (Unit 5)<br>Store-and-forward<\/p>\n\n\n\n<p>Social networking can be traced back to online services, such as CompuServe, Prodigy, and America Online. (Unit 5)<br>True<\/p>\n\n\n\n<p>Copyright holders can assign any combination of CC rights to create a license. (Unit 5)<br>True<\/p>\n\n\n\n<p>When you create a work, you must apply for protection of that work by copyright and only then do you have exclusive rights to its distribution, modification, and sale. (Unit 5)<br>False<\/p>\n\n\n\n<p>YouTube is an example of social media. (Unit 5)<br>True<\/p>\n\n\n\n<p>In the United States, copyrights do not expire until 70 years after the author&#8217;s death. (Unit 5)<br>True<\/p>\n\n\n\n<p>Crowdsourcing is based on contributions from groups of individuals, but it differs from collaborative work. (Unit 5)<br>True<\/p>\n\n\n\n<p><strong>__<\/strong> is an example of a content community. (Unit 5)<br>Wikipedia<\/p>\n\n\n\n<p>Wikipedia articles can be edited by anyone at any time, and the accuracy and reliability of Wikipedia information are controversial. (Unit 5)<br>True<\/p>\n\n\n\n<p>Geocoding is the process of adding location data to photos, Web sites, HTML documents, audio files, blog posts, and text messages. (Unit 5)<br>False<\/p>\n\n\n\n<p>The number of teens using Facebook increased 30% in 2014. (Unit 5)<br>False<\/p>\n\n\n\n<p>Which one of the following is NOT a Wikipedia content standard? (Unit 5)<br>RSS<\/p>\n\n\n\n<p>Wiki software provides a set of tools for creating and editing content. (Unit 5)<br>True<\/p>\n\n\n\n<p>Which popular social media service is good for sharing media and information? (Unit 5)<br>Content Community<\/p>\n\n\n\n<p>Which of the following is NOT considered to be intellectual property? (Unit 5)<br>Public Domain<\/p>\n\n\n\n<p>A person&#8217;s presence on a social media service is referred to as a(n) <strong><em>_<\/em><\/strong>. (Unit 5)<br>All of the above<\/p>\n\n\n\n<p>What would you use to set up a feed that monitors your favorite blogs, collects the latest posts, and displays them? (Unit 5)<br>Both A and B<\/p>\n\n\n\n<p>Which of the following is a VoIP service? (Unit 5)<br>All of the above<\/p>\n\n\n\n<p><strong><em>__<\/em><\/strong> are online services that facilitate communication and interaction among people who want to share information. (Unit 5)<br>Social media<\/p>\n\n\n\n<p>In Wikipedia, it is possible to edit the text of an article in HTML. (Unit 5)<br>True<\/p>\n\n\n\n<p>On mobile devices, VoIP uses the voice stream, not the data stream. (Unit 5)<br>False<\/p>\n\n\n\n<p><strong><em>_<\/em><\/strong> tags make it possible to search for photos or videos using keywords. (Unit 5)<br>Metadata<\/p>\n\n\n\n<p>Private messages can be forwarded by recipients, so they do not necessarily remain private. (Unit 5)<br>True<\/p>\n\n\n\n<p>A nonprofit organization called <strong><em><strong>__<\/strong><\/em><\/strong> provides a set of standardized licenses that copyright holders can use to extend the rights to use their works to others. (Unit 5)<br>Creative Commons<\/p>\n\n\n\n<p>Which of the following is the least important characteristic of content communities? (Unit 5)<br>Identity<\/p>\n\n\n\n<p>Social networking services tend to emphasize identity and relationships. (Unit 5)<br>True<\/p>\n\n\n\n<p>Webmail is configured so that incoming messages are stored in an Inbox on your local storage device. (Unit 5)<br>False<\/p>\n\n\n\n<p>Instant messaging is a <strong>_<\/strong>, real-time technology for two or more people to type messages back and forth while online. (Unit 5)<br>Synchronous private<\/p>\n\n\n\n<p>Editing the source content of wikis is discouraged at media content communities. (Unit 5)<br>False<\/p>\n\n\n\n<p>In some academic settings, Wikipedia is not regarded as a reliable source of information. (Unit 5)<br>True<\/p>\n\n\n\n<p>Commonly held expectations of privacy include which of the following? (Unit 5)<br>Both of the above<\/p>\n\n\n\n<p>Which term is used to describe an online, personal journal in the form of a web page that contains posts on one or more topics which are usually displayed in reverse chronological order? (Unit 5)<br>Blog<\/p>\n\n\n\n<p>Partitions are created, modified, and deleted using Filezilla on Macs and Disk Partitioner on PCs. (Unit 6)<br>False<\/p>\n\n\n\n<p>Like books and movies, software is a type of intellectual property. (Unit 6)<br>True<\/p>\n\n\n\n<p>Which of the following would be considered an operating system resource? (Unit 6)<br>All of the above<\/p>\n\n\n\n<p>Web apps are examples of cloud computing. (Unit 6)<br>True<\/p>\n\n\n\n<p>Which of the following feature is unique to OS X? (Unit 6)<br>Resource fork<\/p>\n\n\n\n<p>A new version or edition of a software product is referred to as a software <strong><em>__<\/em><\/strong>. (Unit 6)<br>Upgrade<\/p>\n\n\n\n<p>Which of the following is a process for installing software on a PC? (Unit 6)<br>None of the above<\/p>\n\n\n\n<p>Purchasing software is the same as buying tangible goods, meaning software can be used, altered, loaned to friends, resold, or given away. (Unit 6)<br>False<\/p>\n\n\n\n<p>Which of the following operating systems is found on Macintosh desktop and laptop computers? (Unit 6)<br>OS X<\/p>\n\n\n\n<p>Magnetic and optical media are divided into circular <strong><em><strong>_ and then further divided into pie-shaped <em>_<\/em><\/strong><\/em><\/strong>. (Unit 6)<br>Tractors, sectors<\/p>\n\n\n\n<p>Applications include menu options for opening and saving files calling on the operating system&#8217;s file management routines to get the job done. (Unit 6)<br>True<\/p>\n\n\n\n<p>Mobile devices tend to be populated by entertainment apps, games, and social media services. (Unit 6)<br>True<\/p>\n\n\n\n<p>A <strong><em><strong>__<\/strong><\/em><\/strong> is generally priced at a flat rate and allows software to be used on all computers at a specific location. (Unit 6)<br>Site license<\/p>\n\n\n\n<p>If you wanted to run multiple operating systems on one computer, you would use a virtual machine. (Unit 6)<br>True<\/p>\n\n\n\n<p>In spreadsheet software, the________________ feature ensures that the results in every cell are accurate for the information currently entered in the worksheet. (Unit 6)<br>Automatic recalculation<\/p>\n\n\n\n<p><strong><em>_<\/em><\/strong> software may be freely copied, distributed, and even resold. (Unit 6)<br>Public domain<\/p>\n\n\n\n<p>The kernel stays in RAM the entire time your computer is on. (Unit 6)<br>True<\/p>\n\n\n\n<p>Paragraph style includes the alignment of text within the margins and the space between each line of text. (Unit 6)<br>True<\/p>\n\n\n\n<p>Which category of software would programming languages fall into? (Unit 6)<br>Development Software<\/p>\n\n\n\n<p>Many Web apps allow several people to collaborate on projects because the project files are stored on the Web and can be easily shared. (Unit 6)<br>True<\/p>\n\n\n\n<p>The difference between a web app and a mobile app is that the program code for Web apps <strong><em>, whereas mobile apps are stored on the handheld device, so they have to be <strong><em>__<\/em><\/strong><\/em><\/strong>. (Unit 6)<br>Arrives only when you use the app, downloaded and installed<\/p>\n\n\n\n<p>Which OS is installed on more than 80% of the World&#8217;s personal computers? (Unit 6)<br>Microsoft Windows<\/p>\n\n\n\n<p>Two of the most common open source and free software licenses are <strong><em><strong>_<\/strong><\/em><\/strong>. (Unit 6)<br>BSD and GPL<\/p>\n\n\n\n<p>Which of the following is not a file-naming convention? (Unit 6)<br>Spaces are not allowed<\/p>\n\n\n\n<p>An operating system&#8217;s <strong><em><strong>__<\/strong><\/em><\/strong> capability supports a division of labor among all the processing units. (Unit 6)<br>Multiprocessing<\/p>\n\n\n\n<p>Some database software provides tools to work with more than one collection of records, as long as the records are somehow related to each other. (Unit 6)<br>True<\/p>\n\n\n\n<p>What are the main software categories? (Unit 6)<br>System, Development, and Application<\/p>\n\n\n\n<p>There is a universal standard for categorizing software and various categorization schemes have few similarities. (Unit 6)<br>False<\/p>\n\n\n\n<p>A feature called <strong>_<\/strong> determines how your text flows from line to line by automatically moving words down to the next line as you reach the right margin. (Unit 6)<br>Word wrap<\/p>\n\n\n\n<p>Software for PCs contains a <strong>_<\/strong> program that guides you through the installation process.(Unit 6)<br>Setup<\/p>\n\n\n\n<p>Which of the following is a file management utility? (Unit 6)<br>Both A and B<\/p>\n\n\n\n<p>Which of the following types of operating systems would most likely be found on a laptop computer? (Unit 6)<br>Desktop operating system<\/p>\n\n\n\n<p>Portable software does not require installation. (Unit 6)<br>True<\/p>\n\n\n\n<p>The term service pack usually applies to firmware updates for hardware components. (Unit 6)<br>False<\/p>\n\n\n\n<p>A formula, such as =B6+(C6*.1), does not contain software on a PC? (Unit 6)<br>False<\/p>\n\n\n\n<p>All smartphones use the Android operating system. (Unit 6)<br>False<\/p>\n\n\n\n<p>The main directory on a storage device is referred to as the <strong>_<\/strong> directory. (Unit 6)<br>Root<\/p>\n\n\n\n<p>Trojans depend on <strong><em>__<\/em><\/strong> to spread. (Unit 7)<br>Social engineering<\/p>\n\n\n\n<p>Which of the following would be considered spyware? (Unit 7)<br>A keylogger<\/p>\n\n\n\n<p>What is the term used to describe unwanted software that installs along with the application software that you originally downloaded and installed? (Unit 7)<br>PUP<\/p>\n\n\n\n<p>Viruses spread themselves from one device to another. (Unit 7)<br>False<\/p>\n\n\n\n<p>Spam accounts for approximately <strong>__<\/strong> of all email. (Unit 7)<br>70%<\/p>\n\n\n\n<p>Pharming attacks carried out by DNS spoofing can be detected by antivirus software or spyware removal software. (Unit 7)<br>False<\/p>\n\n\n\n<p>Microsoft uses a service called Safe Browsing to alert users about sites to avoid. (Unit 7)<br>False<\/p>\n\n\n\n<p>In addition to replicating itself, a virus self-distributing. (Unit 7)<br>False<\/p>\n\n\n\n<p>A computer <strong><em>_<\/em><\/strong> is a set of self-replicating program instructions that surreptitiously attaches itself to a legitimate executable file on a host device. (Unit 7)<br>Virus<\/p>\n\n\n\n<p>Spam sent by scammers often uses spoofed email addresses. (Unit 7)<br>True<\/p>\n\n\n\n<p>Antivirus software can use techniques called__________ to detect malware by analyzing the characteristics and behavior of suspicious files. (Unit 7)<br>Heuristic analysis<\/p>\n\n\n\n<p>Hackers can use ports to communicate with devices in botnets. (Unit 7)<br>True<\/p>\n\n\n\n<p>Android devices automatically encrypt data stored on the device when a user activates the login password. (Unit 7)<br>False<\/p>\n\n\n\n<p>RATs can be used to create a backdoor to a victim&#8217;s device that takes control of the device&#8217;s camera. (Unit 7)<br>True<\/p>\n\n\n\n<p>When antivirus software detects malware, which of the following would not be a course of action you could take? (Unit 7)<br>Conduct a heuristic analysis<\/p>\n\n\n\n<p>If a hacker intercepts encrypted data by way of a MITM attack, the contents of that data is not always secure. (Unit 7)<br>True<\/p>\n\n\n\n<p>IMSI catchers are operated by cellular service companies. (Unit 7)<br>True<\/p>\n\n\n\n<p>A(n) <strong><em><strong><em>____<\/em><\/strong><\/em><\/strong> takes place when an unauthorized person gains access to a digital device by using an Internet connection and exploiting vulnerabilities in hardware or software. (Unit 7)<br>Online intrusion<\/p>\n\n\n\n<p>Password managers can generate unique passwords that have very good entropy. (Unit 7)<br>True<\/p>\n\n\n\n<p>Most trojans are not designed to replicate themselves. (Unit 7)<br>True<\/p>\n\n\n\n<p>OS X devices include a utility that automatically encrypts data stored locally. (Unit 7)<br>True<\/p>\n\n\n\n<p>If you use a password manager, what do you as the user need to remember? (Unit 7)<br>The master password<\/p>\n\n\n\n<p>A botnet has a server that is controlled by hackers. (Unit 7)<br>True<\/p>\n\n\n\n<p>A <strong><em><strong>_<\/strong><\/em><\/strong> is malware that arrives in a trojan disguised as legitimate software and sets up a secret communication link to a hacker. (Unit 7)<br>RAT<\/p>\n\n\n\n<p>Which type of device is the top target for ransomware? (Unit 7)<br>Smartphones<\/p>\n\n\n\n<p>The dot-com bubble occurred between the years 2008 and 2010. (Unit 8)<br>False<\/p>\n\n\n\n<p>The growth of the ICT industry has a generally upward trend. (Unit 8)<br>True<\/p>\n\n\n\n<p>Prior to 1912, there were no laws or regulations restricting amateur radio transmission in the United States. (Unit 8)<br>True<\/p>\n\n\n\n<p>Transistors performed functions similar to vacuum tubes, but they were larger and more power hungry. (Unit 8)<br>False<\/p>\n\n\n\n<p>Companies are classified into economic sectors according to the types of goods and services they provide. (Unit 8)<br>True<\/p>\n\n\n\n<p>The terms outsourcing and offshoring are the same thing. (Unit 8)<br>False<\/p>\n\n\n\n<p>ENIAC&#8217;s memory held programs but not data. (Unit 8)<br>False<\/p>\n\n\n\n<p>Whistleblowing is risky under any circumstances. (Unit 8)<br>True<\/p>\n\n\n\n<p>Radio technology is the basis for cell phones and Wi-Fi. (Unit 8)<br>True<\/p>\n\n\n\n<p>Information technology law is the legal framework that applies to the collection, storage, and distribution of digital information. (Unit 8)<br>True<\/p>\n\n\n\n<p>A computer that used an Intel 4004 microprocessor would be considered a fourth-generation computer. (Unit 8)<br>True<\/p>\n\n\n\n<p>Moore&#8217;s law accurately described the rate of chip innovation for the last 50 years. (Unit 8)<br>True<\/p>\n\n\n\n<p>Samuel Morse developed and patented a telegraph system. (Unit 8)<br>True<\/p>\n\n\n\n<p>Colossus used binary arithmetic. (Unit 8)<br>True<\/p>\n\n\n\n<p>ICT use in emerging nations lags behind its use in developed nations. (Unit 8)<br>True<\/p>\n\n\n\n<p>Technology workers encompass jobs such as telephone cable installers and radio broadcasters. (Unit 8)<br>True<\/p>\n\n\n\n<p>A manual calculator implements algorithms autonomously. (Unit 8)<br>False<\/p>\n\n\n\n<p>The 2002 Sarbanes-Oxley Act is meant to offer protection to whistleblowers. (Unit 8)<br>True<\/p>\n\n\n\n<p>Atanasoff-Berry Computer is often considered the first electronic digital computer. (Unit 8)<br>True<\/p>\n\n\n\n<p>Certification alone is sufficient to qualify for a job in the IT industry. (Unit 8)<br>False<\/p>\n\n\n\n<p>Horizontal market software is designed to meet the needs of a single industry while vertical market software meets the needs of many different industries. (Unit 9)<br>False<\/p>\n\n\n\n<p>Detailed application specifications can be developed before or after selecting the hardware and software for an information system. (Unit 9)<br>False<\/p>\n\n\n\n<p>The planning phase of a SDLC includes all of the following except <strong><em>_<\/em><\/strong>. (Unit 9)<br>Writing a requirements report<\/p>\n\n\n\n<p>Industry standard tools for scheduling and project management include PERT, WBS, and <strong><em>__<\/em><\/strong>. (Unit 9)<br>Gantt charts<\/p>\n\n\n\n<p>At an ecommerce site, the merchant&#8217;s ecommerce application carries out only the first and last stages of the payment process. (Unit 9)<br>True<\/p>\n\n\n\n<p>Which ecommerce classification encompasses online storefronts selling merchandise and services to consumers? (Unit 9)<br>B2C<\/p>\n\n\n\n<p>A transaction processing system is characterized by its ability to: (Unit 9)<br>All of the above<\/p>\n\n\n\n<p>Once you&#8217;ve released data to an information system, you still have control of its distribution or its security. (Unit 9)<br>False<\/p>\n\n\n\n<p>A(n) <strong><em><strong><em>_<\/em><\/strong><\/em><\/strong> is a group of people working together to accomplish a goal. (Unit 9)<br>Organization<\/p>\n\n\n\n<p>Application software for an information system is usually a series of preprogrammed software modules supplied by a software publisher. (Unit 9)<br>True<\/p>\n\n\n\n<p>As the design phase of a SDLC begins, programming languages, development tools, and application software needed for the new information system are purchased, installed, and tested to ensure that they work correctly. (Unit 9)<br>False<\/p>\n\n\n\n<p>In DFD terminology, a data store is a process that changes data by performing a calculation, updating information, or sorting a list. (Unit 9)<br>False<\/p>\n\n\n\n<p>JAD provides a structured methodology for planning and holding a series of meetings in which users and analysts jointly identify problems and look for solutions. (Unit 9)<br>True<\/p>\n\n\n\n<p>Which of the following is not a characteristic of a management information system? (Unit 9)<br>Collect, display and modify transactions<\/p>\n\n\n\n<p>The maintenance phase of a SDLC includes all of the following except <strong><em>_<\/em><\/strong>. (Unit 9)<br>Convert data<\/p>\n\n\n\n<p>A(n) <strong><em><strong>_<\/strong><\/em><\/strong> is the sequence of organizations, people, activities, information, and resources involved in moving a product or service from supplier to customer. (Unit 9)<br>Supply chain<\/p>\n\n\n\n<p>Hacking accounts for about 90% of data breaches. (Unit 9)<br>False<\/p>\n\n\n\n<p>Which business practice is a technique initiated by top management that involves all employees and all departments, and focuses on quality assurance in every product and service offered to customers? (Unit 9)<br>TQM<\/p>\n\n\n\n<p>Information systems designed for a specific industry or enterprise may use vertical market software. (Unit 9)<br>True<\/p>\n\n\n\n<p>The design phase of a SDLC includes all of the following except <strong><em>_<\/em><\/strong>. (Unit 9)<br>Write requirements report<\/p>\n\n\n\n<p>The goal of SCM is to supply customers with the right product at the right price. (Unit 9)<br>True<\/p>\n\n\n\n<p>Which type of problem requires human intuition as the basis for finding a solution. (Unit 9)<br>Unstructured<\/p>\n\n\n\n<p>In addition to sales, CRM, and SCM, ERP modules support business activities such as <strong><em><strong><em>_<\/em><\/strong><\/em><\/strong>. (Unit 9)<br>All of the above<\/p>\n\n\n\n<p>Fraud alerts interfere with your ability to receive instant credit. (Unit 9)<br>False<\/p>\n\n\n\n<p>Iterative SDLCs are often referred to as &#8220;agile methods&#8221; because they allow flexibility as development progresses. (Unit 9)<br>True<\/p>\n\n\n\n<p>Which of the following is not a core CRM system? (Unit 9)<br>Payment gateway<\/p>\n\n\n\n<p>System documentation contains step-by-step instructions for performing specific tasks. (Unit 9)<br>False<\/p>\n\n\n\n<p>Three key concepts ensure good quality of service include all of the following except <strong>_<\/strong>. (Unit 9)<br>Convertibility<\/p>\n\n\n\n<p><strong>_<\/strong> applications provide optimal information when they encompass customer support, marketing, and sales. (Unit 9)<br>CRM<\/p>\n\n\n\n<p>The scope of an information system includes which of the following? (Unit 9)<br>Computers, communications networks, and data, people and products, policies and procedures<\/p>\n\n\n\n<p>Which ecommerce classification encompasses consumers selling merchandise and services to each other? (Unit 9)<br>C2C<\/p>\n\n\n\n<p>Acceptance testing is designed to verify that the new information system works as required. (Unit 9)<br>True<\/p>\n\n\n\n<p>Human errors are mistakes made by computer operators. (Unit 9)<br>True<\/p>\n\n\n\n<p>A major source of data for CRM is produced by loyalty programs. (Unit 9)<br>True<\/p>\n\n\n\n<p>Data centers are designed to proactively reduce the risk of data loss that might occur as a result of a disaster. (Unit 9)<br>True<\/p>\n\n\n\n<p>A(n) <strong><em>sort uses one field, to arrange records. A(n)<\/em><\/strong> sort arranges information by more than one field. (Unit 10)<br>Single-level, multi-level<\/p>\n\n\n\n<p>Which of the following is not considered to be type of database client? (Unit 10)<br>All of the above are types of database clients<\/p>\n\n\n\n<p>A table&#8217;s physical sort order is the order in which records are arranged on storage devices. (Unit 10)<br>True<\/p>\n\n\n\n<p>Spreadsheet software offers database capabilities for establishing relationships between different record types. (Unit 10)<br>False<\/p>\n\n\n\n<p>SQL keywords must be entered in all uppercase letters because they are case-sensitive. (Unit 10)<br>False<\/p>\n\n\n\n<p>Which of the following would not be considered a database data type? (Unit 10)<br>SELECT<\/p>\n\n\n\n<p>A lookup routine validates an entry by checking data in an in-house or third-party database. (Unit 10)<br>True<\/p>\n\n\n\n<p>Which database data type is a collection of binary data stored in a single field of a database? (Unit 10)<br>BLOB<\/p>\n\n\n\n<p>Which of the following is not one of the main activities associated with operational databases? (Unit 10)<br>Providing an executive dashboard for decision makers<\/p>\n\n\n\n<p>In a key-value database, each data item has a key that is a unique identifier similar to a relational database key. (Unit 10)<br>True<\/p>\n\n\n\n<p>A filing cabinet full of folders and papers would be classified as a structured file because every document has a unique structure. (Unit 10)<br>False<\/p>\n\n\n\n<p>The acronym <strong><em><strong>__<\/strong><\/em><\/strong> refers to software that manages data stored in a database. (Unit 10)<br>DBMS<\/p>\n\n\n\n<p>A(n) <strong><em>__<\/em><\/strong> is the column of data in a database that is used as the basis for rearranging the data. (Unit 10)<br>Sort key<\/p>\n\n\n\n<p>The goal of normalization is to minimize data redundancy. (Unit 10)<br>True<\/p>\n\n\n\n<p>FileMaker Pro and Microsoft Access are DBMSs. (Unit 10)<br>True<\/p>\n\n\n\n<p>Which database tool is best for simple flat files that involve calculations? (Unit 10)<br>Spreadsheet software<\/p>\n\n\n\n<p>A <strong><em><strong><em>_<\/em><\/strong> solution for data storage adds resources to a single device, while a <strong><em>_<\/em><\/strong><\/em><\/strong> solution adds more devices to a system. (Unit 10)<br>Scale up, scale out<\/p>\n\n\n\n<p>Modern database tools support <strong><em><strong><em>____<\/em><\/strong><\/em><\/strong>, which entails separating data from the programs that manipulate data. (Unit 10)<br>Data independence<\/p>\n\n\n\n<p><strong><em>_<\/em><\/strong> refers to a branch of data mining that analyzes current and historical data to predict future trends. (Unit 10)<br>Predictive analysis<\/p>\n\n\n\n<p>Dedicated enterprise database applications may allow cosmetic changes, but they do not encourage modifications of core data structures. (Unit 10)<br>True<\/p>\n\n\n\n<p>One of the ways that databases are classified is by their structure. (Unit 10)<br>True<\/p>\n\n\n\n<p>An efficiently designed database uses computed fields whenever possible because they do not require manual data entry. (Unit 10)<br>True<\/p>\n\n\n\n<p>A DBMS feature known as <strong><em>__<\/em><\/strong> ensures that transactions are updated in an orderly manner by establishing update rules. (Unit 10)<br>Serializability<\/p>\n\n\n\n<p>In a relational database, relationships are specified by joining common data stored in records from different tables. (Unit 10)<br>True<\/p>\n\n\n\n<p>A(n) <strong><em>_<\/em><\/strong> database is used to collect, modify, and maintain data on a daily basis. (Unit 10)<br>Operational<\/p>\n\n\n\n<p>A(n) <strong><em>_<\/em><\/strong> is a software tool for specifying the content and format for a database report. (Unit 10)<br>Report generator<\/p>\n\n\n\n<p>In the database, a(n) <strong><em>_<\/em><\/strong> contains the smallest unit of meaningful information. (Unit 10)<br>Field<\/p>\n\n\n\n<p>An emerging computing platform that is likely to drive innovation and disruption through the next decade called <strong><em>__<\/em><\/strong> has massive scale, not only in cloud-based hardware technology, but also in the vast amount of data that will be generated, consumed, and analyzed. (Unit 10)<br>3rd platform<\/p>\n\n\n\n<p><strong><em>__<\/em><\/strong> is a data analysis technique used by decision makers to quickly get answers to complex queries that encompass multiple factors, such as locations, revenue, time periods, and employee status. (Unit 10)<br>OLAP<\/p>\n\n\n\n<p>A(n) <strong><em>__<\/em><\/strong> is a specification that the database designer sets up to filter data entered into a particular field. (Unit 10)<br>Field validation rule<\/p>\n\n\n\n<p>The SQL <strong><em>__<\/em><\/strong> command allows you to temporarily join and simultaneously access the data in more than one table. (Unit 10)<br>JOIN<\/p>\n\n\n\n<p>An API is a set of application or operating system functions that programmers can add to the programs they create. (Unit 11)<br>True<\/p>\n\n\n\n<p>Prolog and other declarative languages were classified as fifth-generation languages. (Unit 10)<br>True<\/p>\n\n\n\n<p>Algorithms are usually written in a format that is specific to a particular programming language. (Unit 11)<br>False<\/p>\n\n\n\n<p>An important characteristic of third-generation programming languages is that the source code can be written with simple tools, such as a word processor, and this code can be easily understood by programmers. (Unit 11)<br>True<\/p>\n\n\n\n<p>A(n) <strong><em><strong><em>_<\/em><\/strong><\/em><\/strong> changes the order in which instructions are carried out by directing the computer to execute an instruction elsewhere in the program. (Unit 11)<br>Sequence control structure<\/p>\n\n\n\n<p>Microprocessors only understand machine language, so there has to be some way to convert assembly language instructions into 1s and 0s. (Unit 11)<br>True<\/p>\n\n\n\n<p>As a general rule, declarative programming languages are most suitable for problems that pertain to words and concepts rather than to numbers. (Unit 11)<br>True<\/p>\n\n\n\n<p>Agile methodologies tend to be used for large software development projects involving more than ten developers, geographically dispersed development teams, and life-critical applications. (Unit 11)<br>False<\/p>\n\n\n\n<p>Finding a value for a variable is referred to as <strong><em><strong>_<\/strong><\/em><\/strong>. (Unit 11)<br>Instantiation<\/p>\n\n\n\n<p>Some software engineering activities overlap with the systems analysis and design activities. (Unit 11)<br>True<\/p>\n\n\n\n<p>The goto command is rarely used by skilled programmers because it can lead to programs that are difficult to understand and maintain. (Unit 11)<br>True<\/p>\n\n\n\n<p>Which programming language is used for artificial intelligence applications and expert systems? (Unit 11)<br>Prolog<\/p>\n\n\n\n<p>Application programmers specialize in developing system software such as operating systems, device drivers, security modules, and communications software. (Unit 11)<br>False<\/p>\n\n\n\n<p>A(n) <strong><em><strong>__<\/strong><\/em><\/strong> for a computer program is a set of steps that explains how to begin with known information specified in a problem statement and how to manipulate that information to arrive at a solution. (Unit 11)<br>Algorithm<\/p>\n\n\n\n<p>What is the term that refers to the sequence in which a computer executes program instructions? (Unit 11)<br>Flow control<\/p>\n\n\n\n<p>A(n) <strong><em>_<\/em><\/strong> provides programmers with tools to build substantial sections of a program by pointing and clicking rather than typing lines of code. (Unit 11)<br>VDE<\/p>\n\n\n\n<p>The process of planning a computer program begins with a problem statement that clearly define the program&#8217;s purpose. (Unit 11)<br>True<\/p>\n\n\n\n<p>Programmers insert documentation called facts into the program code. (Unit 11)<br>False<\/p>\n\n\n\n<p>A(n) <em>converts all the statements in a program in a single batch, and the resulting collection of instructions, called <strong><em>_<\/em><\/strong><\/em>, is placed in a new file. (Unit 11)<br>Complier, object code<\/p>\n\n\n\n<p>A low-level language uses command words and grammar based on human languages. (Unit 11)<br>False<\/p>\n\n\n\n<p>A low-level language has a low level of <strong><em><strong>_<\/strong><\/em><\/strong> because it includes commands specific to a particular CPU or microprocessor family. (Unit 11)<br>Abstraction<\/p>\n\n\n\n<p>The human-readable version of a program created in a high-level language by a programmer is called <strong><em>__<\/em><\/strong>. (Unit 11)<br>Source code<\/p>\n\n\n\n<p>A(n) <strong><em><strong><em>____<\/em><\/strong><\/em><\/strong> tells a computer what to do based on whether a condition is true or false. (Unit 11)<br>Selection control structure<\/p>\n\n\n\n<p>When taking the object-oriented approach to a problem, one of the first steps is to identify the objects that pertain to a solution. (Unit 11)<br>True<\/p>\n\n\n\n<p>Which of the following is not a characteristic for a good problem statement? (Unit 11)<br>It contains detailed descriptions of the processes and tools that need to be developed<\/p>\n\n\n\n<p>The <strong><em>_<\/em><\/strong> paradigm is based on the idea that the solution for a problem can be visualized in terms of objects that interact with each other. (Unit 11)<br>Object-oriented<\/p>\n\n\n\n<p>Regarding OO programming, which of the following terms best matches with the term &#8220;method&#8221;? (Unit 11)<br>Main()<\/p>\n\n\n\n<p>Procedural languages encourage programmers to approach problems by breaking the solution down to a series of steps. (Unit 11)<br>True<\/p>\n\n\n\n<p>In Prolog, the <strong><em><strong>_<\/strong><\/em> describes the relationship between the <\/strong>. (Unit 11)<br>Predicate, argument<\/p>\n\n\n\n<p>Declarative languages are commonly used for production applications. (Unit 11)<\/p>\n\n\n\n<p>Structured English is a subset of the English language with limited selection of sentence structures that reflect processing activities. (Unit 11)<br>True<\/p>\n\n\n\n<p>The <strong><em>__<\/em><\/strong> in a problem statement is the information that is supplied to the computer to help it solve a problem. (Unit 11)<br>Known information<\/p>\n\n\n\n<p>Which of the following is not a programming paradigm? (Unit 11)<br>Predictive<\/p>\n\n\n\n<p>Prolog programming is all about facts and rules. (Unit 11)<br>True<\/p>\n\n\n\n<p>The facts in a Prolog program are useful even without any rules. (Unit 11)<br>True<\/p>\n\n\n\n<p><strong><em>_<\/em><\/strong>-generation languages, such as COBOL and Fortran, were used extensively for business and scientific applications. (Unit 11)<br>Third<\/p>\n\n\n\n<p>BBS<br>Bulletin Board System, early forms of online social networking in which user posts could be viewed asynchronously by other members of the bulletin board community.<\/p>\n\n\n\n<p>blog<br>A publicly accessible series of posts on the Web. Blogs often reflect the views of the author and are periodically updated with new entries.<\/p>\n\n\n\n<p>The collection of HTML pages and images that is stored locally by a browser and used to quickly load pages that have been previously viewed without waiting for them to be downloaded again.<br>browser cache<\/p>\n\n\n\n<p>A module of computer code that adds capabilities to a browser, such as the ability to block ads on Web pages.<br>extension<\/p>\n\n\n\n<p>A modification of copyright practices, copyleft allows third-party copying and distribution as long as the copies have the same license as the original.<br>copyleft<\/p>\n\n\n\n<p>A message sent from a Web server to a browser and stored on a user&#8217;s hard disk, usually containing information about the user.<br>Cookie<\/p>\n\n\n\n<p>Based on 5 rights, copy right holders can grant or deny: attribution, Share alike, no deritvatives, public domain, noncommercial.<\/p>\n\n\n\n<p>Licensing options that extend rights, such as creating derivatives, to someone other than the copyright owner.<br>Creative commons<\/p>\n\n\n\n<p>An activity in which a group of people contribute, usually online, to solving a problem or completing a task.<br>crowd sourcing<\/p>\n\n\n\n<p>(Cascading Style Sheets) Used in conjunction with HTML, a means of formatting the appearance of text and other elements of a Web page.<br>CSS<\/p>\n\n\n\n<p>A collection of information that might be stored in more than one file or in more than one record type.<br>Database<\/p>\n\n\n\n<p>A work, such as a translation or adaptation, that contains major elements of a previously copyrighted work.<br>Derivative work<\/p>\n\n\n\n<p>An area of a hard disk created by dividing a large hard disk into several smaller virtual ones, such as when using two operating systems on a single computer.<br>disk partition<\/p>\n\n\n\n<p>POP3 &#8211; Post Office Protocol and<br>IMAP- Internet message access protocol both manage incoming mail,<br>SMTP-Simple mail transfer protocol-Handles outgoing mail<\/p>\n\n\n\n<p>POP3 &#8211; Post office protocal 3, A standard for retrieving email messages from an email server.<\/p>\n\n\n\n<p>SMTP &#8211; Simple Mail transfer protocal, A communications protocol used to send email across a network or the Internet.<\/p>\n\n\n\n<p>IMAP &#8211; Internet message access protocal, A protocol similar to POP that is used to retrieve email messages from an email server, but offers additional features, such as choosing which emails to download from the server.<br>Email protocols<\/p>\n\n\n\n<p>A type of software license that appears on the computer screen when software is being installed and prompts the user to accept or decline.<br>EULA- End User License Agreements<\/p>\n\n\n\n<p>A set of rules, established by the operating system, that must be followed to create a valid file name.<br>file-naming conventions<\/p>\n\n\n\n<p>Using informal information such as street addresses to derive more formal geolocational data, such as GPS coordinates.<br>geocoding<\/p>\n\n\n\n<p>Adding location data to photos, web sites, HTML documents, audio files, blog posts, and texts<\/p>\n\n\n\n<p>Adding geographic data, such as GPS coordinates, to a file tag.<br>Geotagging<\/p>\n\n\n\n<p>Social networking services, such as Yelp and Google Maps, that offer location-based interaction.<br>Geosocial Networking<\/p>\n\n\n\n<p>Hyper Text Markup Language (HTML)<br>A plain text or ASCII document with embedded HTML tags that dictate formatting and are interpreted by a browser.<\/p>\n\n\n\n<p>Specify how the document should appear when displayed in a browser window<\/p>\n\n\n\n<p>A set of instructions, such as <strong>, inserted into an HTML document to provide formatting and display information to a Web browser.<br>HTML tags<\/strong><\/p>\n\n\n\n<p>A legal concept that refers to ownership of intangible information, such as ideas.<\/p>\n\n\n\n<p>four categories are:<br>Intellectual property<\/p>\n\n\n\n<p>trademarks, patents, copyrights, trade secrets.<\/p>\n\n\n\n<p>Data that contains information about other data; file tags are an example of metadata.<br>metadata tag<\/p>\n\n\n\n<p>A social media service for posting short asynchronous messages such as tweets.<br>microblogging<\/p>\n\n\n\n<p>The ability of a computer or an operating system to support dual-core processors or multiple processors.<br>multiprocessing<\/p>\n\n\n\n<p>The ability of a computer, a processor, or an operating system to run more than one program, job, or task at the same time.<br>multitasking<\/p>\n\n\n\n<p>A technology that allows multiple parts or threads from a program to run simultaneously.<br>multithreading<\/p>\n\n\n\n<p>Software that includes its source code, allowing programmers to modify and improve it.<br>Open source software<\/p>\n\n\n\n<p>what happens on the disks and in circuits for memory<br>Physical storage<\/p>\n\n\n\n<p>A software module that adds a specific feature to a system. In the context of browsers, a plugin adds the ability to display or play various additional file formats.<br>pluggin<\/p>\n\n\n\n<p>designed for PCs and it runs from removable storage, such as USB flash drive<br>Portable software<\/p>\n\n\n\n<p>Material that is not subject to copyright restrictions on its use and distribution.<br>public domain<\/p>\n\n\n\n<p>main directory, can be subdivided into smaller lists<\/p>\n\n\n\n<p>The main directory of a disk.<br>root directory<\/p>\n\n\n\n<p>A collection of patches designed to correct bugs and\/or add features to an existing software program.<br>service pack<\/p>\n\n\n\n<p>A program module supplied with a software package for the purpose of installing the software.<br>setup program<\/p>\n\n\n\n<p>Copyrighted software marketed under a license that allows users to use the software for a trial period and then send in a registration fee if they wish to continue to use it.<br>shareware<\/p>\n\n\n\n<p>uses geolocation to meet with people who are nearby and have similar interests<\/p>\n\n\n\n<p>Connecting with other nearby users on a geosocial network.<br>social discovery<\/p>\n\n\n\n<p>A visual model of the links between entities in a social network.<br>sociograms<\/p>\n\n\n\n<p>Uniform Resource locator, the address of a webpage<br>URL<\/p>\n\n\n\n<p>The component of a search engine that autonomously visits Web sites collecting Web page data that will be indexed and available for searching.<br>Web Crawler<\/p>\n\n\n\n<p>A group of Web pages accessible at a specific Web address that holds a collection of information identified by a common domain name, such as www.cnn.com.<br>website<\/p>\n\n\n\n<p>Information displayed by a Web browser that&#8217;s produced from an HTML document or generated on the fly from data in a database.<br>web page<\/p>\n\n\n\n<p>Collaborative web application that provides tools that enable contributors to post, read, and modify content<br>wiki<\/p>\n\n\n\n<p>WWW- collection of documents, images, and videos, and sound files linked together through HTTP<br>World wide Web<\/p>\n\n\n\n<p>AAC<br>(Advanced Audio Coding )<br>A file format that provides highly compressed audio files with very little loss of sound quality and is promoted by Apple on its iTunes Web site.<\/p>\n\n\n\n<p>ALU<br>(Arithmetic Logic Unit)<br>The part of the CPU that performs arithmetic and logical operations on the numbers stored in its registers.<\/p>\n\n\n\n<p>ARPANET<br>(Advanced Research Projects Agency Network) One of the first packet switching computer networks using TCP\/IP, and the prototype for the Internet.<\/p>\n\n\n\n<p>ASCII<br>(American Standard Code for Information Interchange)<br>A code that represents characters as a series of 1s and 0s. Most computers use ASCII code to represent text, making it possible to transfer data between computers.<\/p>\n\n\n\n<p>Bandwidth<br>The data transmission capacity of a communications channel. Digital signals are measured in bits per second; analog signals in hertz.<\/p>\n\n\n\n<p>Binary<br>The representation of data using two states, such as off-on or 1-0.<\/p>\n\n\n\n<p>BMP<br>(File Extension .bmp)<br>The native bitmap graphics file format of Microsoft Windows.<\/p>\n\n\n\n<p>BN<br>(Backbone Network)<br>high-speed network that connects many networks.<\/p>\n\n\n\n<p>Broadband<br>A term used to refer to communications channels that have bandwidth that equals or exceeds 25 Mbps.<\/p>\n\n\n\n<p>CISC<br>(Complex Instruction Set Computer)<br>A general-purpose microprocessor chip designed to handle a wider array of instructions than a RISC chip.<\/p>\n\n\n\n<p>Compression Types<\/p>\n\n\n\n<p>Core<br>A core is part of a CPU that receives instructions and performs calculations, or actions, based on those instructions. A set of instructions can allow a software program perform a specific function. Processors can have a single core or multiple cores.<\/p>\n\n\n\n<p>CPU<br>(Central Processing Unit)<br>The main processing circuitry, or &#8220;chip,&#8221; within a computer that contains the ALU, control unit, and registers.<\/p>\n\n\n\n<p>Data Bus<br>An electronic pathway or circuit that connects electronic components (such as the processor and RAM) on a computer&#8217;s system board.<\/p>\n\n\n\n<p>Device Driver<br>A type of system software that provides the computer with the means to control a peripheral device.<\/p>\n\n\n\n<p>DNS Spoofing<br>(Domain Name System)<br>A malicious attack on the domain name system in which the IP address corresponding to a Web site is changed in order to redirect users to different locations.<\/p>\n\n\n\n<p>Dynamic Address<br>Temporarily assigned IP addresses usually provided by an ISP.<\/p>\n\n\n\n<p>Form Factor<br>The configuration of a computer&#8217;s system unit; examples include tower, mini-tower, and cube.<\/p>\n\n\n\n<p>GIF<br>(Graphics Interchange Format)<br>A bitmap graphics file format, popularized by CompuServe, for use on the Web.<\/p>\n\n\n\n<p>Handshake<br>A process where a protocol helps two network devices communicate.<\/p>\n\n\n\n<p>IPv4<br>(Internet Protocol version 4)<br>Internet addresses that are 32-bit IP addresses.<br>(Base 10)<\/p>\n\n\n\n<p>IPv6<br>(Internet Protocol version 6)<br>Internet addresses that are 128-bit IP addresses.<br>(Base 16)<\/p>\n\n\n\n<p>JPEG<br>(Joint Photographic Experts Group)<br>A format that uses lossy compression to store bitmap images. JPEG (pronounced &#8220;JAY-peg&#8221;) files have a .jpg extension.<\/p>\n\n\n\n<p>LAN<br>(Local Area Network)<br>An interconnected group of computers and peripherals located within a relatively limited area, such as a building or campus.<\/p>\n\n\n\n<p>Laser Printer<br>A printer that uses laser-based technology, similar to that used by photocopiers, to produce text and graphics.<\/p>\n\n\n\n<p>LCD<br>(Liquid Crystal Display)<br>Technology used for flat panel computer screens typically found on laptop computers.<\/p>\n\n\n\n<p>LED<br>(Light Emitting Diode)<br>Either a display technology that uses LEDs to produce an image on the screen, or one that uses LEDs as backlighting.<\/p>\n\n\n\n<p>MAC address<br>(Media Access Control Address)<br>A unique identifier similar to a serial number assigned to networking equipment at the time of manufacture.<\/p>\n\n\n\n<p>Machine Language<br>A low-level language written in binary code that the computer can execute directly.<\/p>\n\n\n\n<p>Magnetic Storage<br>A technology for recording data onto disks or tape by magnetizing particles of an oxide-based surface coating.<\/p>\n\n\n\n<p>MAN<br>(Metropolitan Area Network) is a computer network that interconnects users with computer resources in a geographic area or region larger than that covered by even a large local area network (LAN) but smaller than the area covered by a wide area network (WAN).<\/p>\n\n\n\n<p>Microprocessor Clock<br>A timing signal that sets the pace for executing instructions in a microprocessor.<br>e.g. 3.4GHz<\/p>\n\n\n\n<p>OCR<br>(Optical Character Recognition)<br>The ability of a device or software to digitize text from printed sources.<\/p>\n\n\n\n<p>MPEG<br>(Moving Picture Experts Group)<br>A family of highly compressed container file formats and codecs for digital multimedia; MPEG-1, MPEG-2, and MPEG-4.<\/p>\n\n\n\n<p>Network Topology<br>The physical structure (layout) of a network including its devices and connections.<\/p>\n\n\n\n<p>Niche Device<br>Device with a limited function or purpose??<br>e.g. Smart watch<\/p>\n\n\n\n<p>OCR<br>(Optical Character Organization)<br>The ability of a device or software to digitize text from printed sources.<\/p>\n\n\n\n<p>OS<br>(Operating System)<br>The software that controls the computer&#8217;s use of its hardware resources, such as memory and disk storage space.<\/p>\n\n\n\n<p>Optical Storage<br>A technology that records data as light and dark spots on a CD, DVD, or other optical media.<\/p>\n\n\n\n<p>Packet<br>A small unit of data transmitted over a network.<\/p>\n\n\n\n<p>PAN<br>(Personal Area Network)<br>An interconnected group of personal digital devices located within a range of about 30 feet.<\/p>\n\n\n\n<p>Pixelation<br>Describes the effect of increasing the size of an image until smooth edges become jagged.<\/p>\n\n\n\n<p>PNG<br>(Portable Network Graphics)<br>A type of graphics file format similar to but newer than GIF and JPEG.<\/p>\n\n\n\n<p>RAM<br>(Random Access Memory)<br>Computer memory circuitry that holds data, program instructions, and the operating system while the computer is on.<\/p>\n\n\n\n<p>RAW<br>(File Extension .RAW)<br>In the context of digital graphics, a file that contains unprocessed image data directly from a digital camera&#8217;s sensors.<\/p>\n\n\n\n<p>RFID<br>(Radio Frequency Identification)<br>A short-range wireless network technology commonly used to track products containing RFID tags.<\/p>\n\n\n\n<p>ROM<br>(Read Only Memory)<br>Refers to one or more integrated circuits that contain permanent instructions that the computer uses during the boot process.<\/p>\n\n\n\n<p>Samping Rate<br>The number of times per second a sound is measured during the recording process.<\/p>\n\n\n\n<p>Server<br>A computer or software on a network that supplies the network with data and storage.<\/p>\n\n\n\n<p>SSD<br>(Solid State Drive)<br>A data storage device that utilizes erasable, re-writable circuitry.<\/p>\n\n\n\n<p>MAN<br>(Metropolitan Area Network) is a computer network that interconnects users with computer resources in a geographic area or region larger than that covered by even a large local area network (LAN) but smaller than the area covered by a wide area network (WAN).<\/p>\n\n\n\n<p>TCP<br>(Transmission Control Protocol)<br>The protocol within TCP\/ IP that is responsible for establishing a data connection between two hosts and breaking data into packets.<\/p>\n\n\n\n<p>Convergence<br>The expansion of cloud computing, a process by which several technologies with distinct functionalities evolve to form a single product. Your computer plays movies. Your cell phone has a camera. Your clock has a radio.<\/p>\n\n\n\n<p>Cloud computing<br>A process that provided access to information, applications, communications, and storage over the Internet.<\/p>\n\n\n\n<p>Digital data<br>Text, numbers, graphics, or sound represented by discrete digits, such as 1s and 0s.<\/p>\n\n\n\n<p>Analog data<br>Data that is measured or represented on a continuously varying scale, such as a dimmer switch or a watch with a sweep second hand.<\/p>\n\n\n\n<p>Compression<br>Any technique that recodes the data in a file so that it contains fewer bits<\/p>\n\n\n\n<p>Lossy compression<br>Any data compression technique in which some of the data is sacrificed to obtain more compression.<\/p>\n\n\n\n<p>Lossless compression<br>A compression technique that is able to reconstitute all of the data in the original file; hence lossless means that this compression technique does not lose data.<\/p>\n\n\n\n<p>Compression is commonly referred to as &#8220;zipping&#8221;.<br>True<\/p>\n\n\n\n<p>On laptops and desktop computers, the compression utility is accessed from the same screen used to manage files.<br>True<\/p>\n\n\n\n<p>Pixel interpolation<br>A process that is used by graphics software to average the color of adjacent pixels in an image, usually when the image is enlarged.<\/p>\n\n\n\n<p>Data<br>In the context of computing and data management, data refers to the symbols that a computer uses to represent facts and ideas.<\/p>\n\n\n\n<p>Information<br>A computer system that collects, stores, and processes information, usually within the context of an organization.<\/p>\n\n\n\n<p>Bitmap<br>An image, such as a digital photo, that is stored as a grid work of colored dots.<\/p>\n\n\n\n<p>A bitmap graphic is composed of a grid of tiny rectangular cells where each cell is a picture element, commonly called a pixel.<br>True<\/p>\n\n\n\n<p>Vector graphics include standard shapes such as circles and rectangles.<br>True<\/p>\n\n\n\n<p>Vector graphics<br>An image generated from descriptions that specify the position, length, and direction in which lines and shapes are drawn.<\/p>\n\n\n\n<p>Vector graphics vs. Bitmap graphics<br>Vector graphics resize better than bitmaps, require less storage space, are not as realistic as bitmap images, and editing an object is easier than in bitmap.<\/p>\n\n\n\n<p>Vector graphics are used for line art, logos, simple illustrations, infographic elements, and diagrams.<br>True<\/p>\n\n\n\n<p><strong><em>_<\/em><\/strong> are based on vectors stored as a set of instructions describing the coordinates for lines and shapes in a three-dimensional space.<br>3-D graphics<\/p>\n\n\n\n<p>Ray tracing<br>A technique by which light and shadows are added to a 3-D image.<\/p>\n\n\n\n<p>Rendering<br>In graphics software, the process of creating a 3-D solid image by covering a wireframe drawing and applying computer-generated highlights and shadows.<\/p>\n\n\n\n<p>Vectors<br>Lines and curves that form simple shapes.<\/p>\n\n\n\n<p>Vectors form a wireframe that works like the framework for a tent.<br>True<\/p>\n\n\n\n<p>Software<br>The instructions that direct a computer to perform a task, interact with a user, or process data.<\/p>\n\n\n\n<p>Application software<br>A set of computer programs that help users perform a specific task such as word processing.<\/p>\n\n\n\n<p>The primary purpose of <strong><em>_<\/em><\/strong> is to help the computer system monitor itself in order to function efficiently (an example is a computer operating system or OS).<br>System software<\/p>\n\n\n\n<p><strong><em>_<\/em><\/strong> are used for creating software applications, Web sites, operating systems, and utilities.<br>Development tools<\/p>\n\n\n\n<p>When a computer &#8220;runs&#8221; software, it performs the instructions to carry out a task.<br>True<\/p>\n\n\n\n<p>Operating system<br>The software that controls the computer&#8217;s use of its hardware resources, such as memory and disk storage space.<\/p>\n\n\n\n<p>Storage<br>A term used for the components of a digital device designed to hold data permanently.<\/p>\n\n\n\n<p>A data storage system has two main components: a <em>and a <\/em>.<br>Storage medium; storage device<\/p>\n\n\n\n<p>Storage medium<br>The disk, tape, CD, or DVD that contains data.<\/p>\n\n\n\n<p>Storage device<br>The mechanical apparatus that records and retrieves data from a storage medium.<\/p>\n\n\n\n<p>Magnetic storage<br>Storage that represents data by magnetizing particles of an oxide-based surface coating.<\/p>\n\n\n\n<p>A hard disk drive contains one or more platters and their associated read-write heads.<br>True<\/p>\n\n\n\n<p>A <strong><em>_<\/em><\/strong> is a flat, rigid disk made of aluminum or glass and coated with magnetic iron oxide particles.<br>Hard disk platter<\/p>\n\n\n\n<p>A read-write head mechanism in the disk drive magnetizes particles to write data, and senses the particles&#8217; polarities to read data.<br>True<\/p>\n\n\n\n<p>Access time<br>The average time it takes a computer to locate data on the storage medium and read it.<\/p>\n\n\n\n<p>Data transfer rate<br>The amount of data a storage device can move per second from the storage medium to RAM.<\/p>\n\n\n\n<p>CD, DVD, and Blu-ray (BD) technologies are classified as optical storage, which represents data as microscopic light and dark spots on the disc surface.<br>True<\/p>\n\n\n\n<p>Optical storage<br>Storage that records data as light and dark spots on a CD, DVD, or other optical media.<\/p>\n\n\n\n<p>Optical technologies are grouped into three categories:<br>Read-only, recordable, and rewriteable.<\/p>\n\n\n\n<p>Read-only technology (ROM)<br>A technology that stores data permanently on a disc, which cannot be later added to or changed and can potentially store data for 100 years.<\/p>\n\n\n\n<p>Recordable technology (R)<br>A technology that uses a laser to change the color in a dye laser sandwiched beneath the clear plastic disc surface; the laser creates dark spots that are read as pits.<\/p>\n\n\n\n<p>Rewritable technology (RW)<br>A technology that uses phase change technology to alter a crystal structure on the disc surface; altering this structure creates patterns of light and dark spots resembling pits and lands.<\/p>\n\n\n\n<p>Solid state storage<br>Storage that stores data in erasable, rewritable circuitry, rather than on spinning disks or streaming tape.<\/p>\n\n\n\n<p>Memory card<br>A flat, solid state storage medium commonly used to transfer files from digital cameras and media players to computers.<\/p>\n\n\n\n<p>Solid state drive (SSD)<br>A package of flash memory that can be used as a substitute for a hard disk drive.<\/p>\n\n\n\n<p>USB flash drive<br>A portable storage device that plugs directly into a computer&#8217;s system unit using a built-in USB connector.<\/p>\n\n\n\n<p>Cloud storage<br>A storage area that is located on a remote server, usually on the Internet, rather than on a local storage device.<\/p>\n\n\n\n<p>Remote storage is housed on an external device that can be accessed from a network.<br>True<\/p>\n\n\n\n<p>Security and privacy risks<br>The risk that the more places your data is stored and the more networks on which it tavels, the more susceptible it becomes to hackers and spying agencies.<\/p>\n\n\n\n<p>Service outages<br>When all the data stored on a cloud storage site become temporarily inaccessible.<\/p>\n\n\n\n<p>Discontinuation of service<br>When a cloud storage provider has closed down their services with little warning.<\/p>\n\n\n\n<p>ALU (Arithmetic logic unit)<br>The part of the CPU that performs arithmetic and logical operations on the numbers stored in its registers.<\/p>\n\n\n\n<p>Control unit<br>The part of the microprocessor that directs and coordinates processing.<\/p>\n\n\n\n<p>CPU (Central processing unit)<br>The key component of a computer system, which contains the circuitry necessary to interpret and execute program instructions.<\/p>\n\n\n\n<p>RAM (Random access memory)<br>A temporary holding area for data, application program instructions, and the operating system.<\/p>\n\n\n\n<p>Most RAM is volatile, meaning it needs electrical power to hold data.<br>True<\/p>\n\n\n\n<p>In RAM, microscopic electronic parts called <strong><em>_<\/em><\/strong> hold the bits that represent data.<br>Capacitors<\/p>\n\n\n\n<p>Higher RAM capacity adds to the expense of a device.<br>True<\/p>\n\n\n\n<p>ROM (Read only memory)<br>A type of memory circuitry that is housed in a single integrated circuit on the system board.<\/p>\n\n\n\n<p>ROM contains a small set of instructions and data called the <strong><em>_<\/em><\/strong> which tell a digital device how to start.<br>Boot loader<\/p>\n\n\n\n<p>Virtual memory<br>A computer&#8217;s use of hard disk storage to simulate RAM.<\/p>\n\n\n\n<p>Volatile<br>A term that describes data (usually in RAM) that can exist only with a constant supply of power.<\/p>\n\n\n\n<p>Nonvolatile<br>Any electronic component that does not require a constant supply of power to hold data.<\/p>\n\n\n\n<p>Durability<br>Storage that has resistance to damage from handling and environmental factors such as dust, humidity, heat, and cold. Can be measured lifespan or in write cycles ( the number of times it can be written and revised).<\/p>\n\n\n\n<p>Serial processing<br>Processing data one instruction at a time, completing one instruction before beginning another.<\/p>\n\n\n\n<p>Dependability<br>Storage that is available when needed; not subject to breakdown, malfunction, network outages, or service interruptions. Can be measured by mean time failures (MBTF is the time a device is expected to function before failing). Cloud storage dependability can be measured by uptime (the percent of time the service is accessible).<\/p>\n\n\n\n<p>Capacity<br>The amount of data that can be stored, usually measured in gigabytes (GB) or terabytes (TB).<\/p>\n\n\n\n<p>Pipelining processing<br>A technology that allows a processor to begin executing an instruction before completing the previous instruction.<\/p>\n\n\n\n<p>Parallel processing<br>The simultaneous use of more than one processor to execute a program.<\/p>\n\n\n\n<p>Communications network<br>A collection of devices used to originate, send, route, and receive data transmissions.<\/p>\n\n\n\n<p>Wired channels<br>Channels that transport data through wires and cables.<\/p>\n\n\n\n<p>Wireless channels<br>Channels that transport data from one device to another without the use of cable or wires.<\/p>\n\n\n\n<p>When you set up a wired connection, you don&#8217;t have to worry about hackers intercepting your data from outside your house.<br>True<\/p>\n\n\n\n<p>A <strong><em>_<\/em><\/strong> contains circuitry that converts the data-carrying signals from a digital device to signals that can travel over various communications channels.<br>Modem<\/p>\n\n\n\n<p>A <strong><em>_<\/em><\/strong> converts digital signals from a computer into audible analog signals that can travel over telephone lines.<br>Voiceband modem<\/p>\n\n\n\n<p>A <strong><em>_<\/em><\/strong> is a fixed Internet connection that uses a voiceband modem and the telephone company&#8217;s circuit-switched network to transport data between your computer and your ISP.<br>Dial-up connection<\/p>\n\n\n\n<p>TCP (Transmission control protocol)<br>The protocol responsible for dividing files into chunks, adding headers containing information for reassembling packets in their original order, and verifying that the data was not corrupted while in transit (a process called error checking).<\/p>\n\n\n\n<p>IP (Internet protocol)<br>The protocol responsible for addressing packets so that they can be routed to their destinations; IPv4 offers 32-bit addresses whereas IPv6 offers 128-bit addresses.<\/p>\n\n\n\n<p>Private IP address<br>An IP address that cannot be routed over the Internet.<\/p>\n\n\n\n<p>Public IP address<br>An IP address that can be routed over the Internet.<\/p>\n\n\n\n<p>IPv4 (Internet Protocol version 4)<br>The Internet address standard which uses 32-bit addresses to identify Internet connected devices.<\/p>\n\n\n\n<p>IPv6 (Internet Protocol version 6)<br>The Internet address that uses 128 bits for each address; produces billions and billions of unique Internet addresses.<\/p>\n\n\n\n<p>LAN (Local area networks)<br>Networks that are designed to provide connectivity for devices within a limited area, typically within the premises of a home, office building, business, or school.<\/p>\n\n\n\n<p>Ethernet<br>A wired network technology that is defined by IEEE 802.3 standards.<\/p>\n\n\n\n<p>Ethernet was originally a bus topology in which computers were all strung along a cable like birds on a power line.<br>True<\/p>\n\n\n\n<p>Internet backbone<br>The major communications links that form the core of the Internet.<\/p>\n\n\n\n<p>Latency<br>The elapsed time for data to make a round-trip from point A to point B and back to point A.<\/p>\n\n\n\n<p>Packet loss<br>Data that never reaches its destination or gets discarded because it arrives too late.<\/p>\n\n\n\n<p>Packet<br>A parcel of data that is sent across a computer network; once at their destination, they are reassembled into the original message according to their sequence numbers.<\/p>\n\n\n\n<p>Packet switching<br>A technology used by data communications networks, such as the Internet, where a message is divided into smaller units called packets for transmission.<\/p>\n\n\n\n<p>Circuit switching<br>The method used by the telephone network to temporarily connect one telephone with another for the duration of a call.<\/p>\n\n\n\n<p>The Web (The World Wide Web)<br>A collection of HTML documents, images, videos, and sound files that can be linked to each other and accessed over the Internet using a protocol called HTTP.<\/p>\n\n\n\n<p>The Web is the Internet.<br>False<\/p>\n\n\n\n<p>Web server<br>An Internet-based computer that stores Web site content and accepts requests from browsers.<\/p>\n\n\n\n<p>A <strong><em>_<\/em><\/strong> typically contains a collection of related information organized and formatted so it can be accessed using a browser.<br>Web site<\/p>\n\n\n\n<p>A <strong><em>_<\/em><\/strong> is based on an HTML source document that is stored as a file on a Web server.<br>Web page<\/p>\n\n\n\n<p>Hypertext<br>A way of organizing a collection of documents by assigning an address to each and providing a way to link from one address to another.<\/p>\n\n\n\n<p>Hypertext links<br>Words, phrases, or images on a Web page that, when clicked, take you to designated URLs.<\/p>\n\n\n\n<p>Ted Nelson coined the term hypertext to describe a computer system that could store literary documents; link them in logical relationships; and allow users to comment on what they read.<br>True<\/p>\n\n\n\n<p>Most URLs begin with http:\/\/ to indicate the Web&#8217;s standard communications protocol.<br>True<\/p>\n\n\n\n<p>HTTP<br>A communication protocol that works with TCP\/IP to get the elements for Web pages to a local browser.<\/p>\n\n\n\n<p>The data that you transmit to a Web server can be secured if it is sent over an <strong><em>_<\/em><\/strong> , which encrypts the data stream between client devices and servers.<br>HTTP Secure connection<\/p>\n\n\n\n<p>Sites that use HTTP Secure are required to present an SSL certificate to the browser; this helps the browser verify that the site is not pretending to be another site.<br>True<\/p>\n\n\n\n<p>HTTP Secure is based on HTTP and a public key encryption technology called SSL\/TLS.<br>True<\/p>\n\n\n\n<p><strong><em>_<\/em><\/strong> is a very clever process that requires one key to encrypt data, but a different key to decrypt it; the encryption key can&#8217;t be used to decrypt the message.<br>Public key encryption<\/p>\n\n\n\n<p>Client-side scripts<br>A program code that is executed by a client&#8217;s browser, as opposed to being executed by the server.<\/p>\n\n\n\n<p>Server-side scripts<br>A program code that is executed by a Web server in response to client data.<\/p>\n\n\n\n<p>HTML document<br>A plain text or ASCII document with embedded HTML tags that dictate formatting and are interpreted by a browser.<\/p>\n\n\n\n<p>HTML tags<br>A set of instructions, such as <strong>, inserted into an HTML document to provide formatting and display information to a Web browser.<\/strong><\/p>\n\n\n\n<p>HTML5<br>The current version of HTML.<\/p>\n\n\n\n<p>HTML<br>The foundation for professionally designed corporate Web sites.<\/p>\n\n\n\n<p>Search engine<br>A computer program designed to help people locate information on the Web by formulating simple queries consisting of one or more words called keywords or search terms.<\/p>\n\n\n\n<p>Web crawler<br>The component of a search engine that combs the Web to gather data that&#8217;s representative of the contents of Web pages.<\/p>\n\n\n\n<p>Indexer<br>The component of a search engine that processes the information gathered by the crawler into a list of keywords and URLs stored in a database.<\/p>\n\n\n\n<p>Database<br>The component of a search engine that stores billions of index references to Web pages.<\/p>\n\n\n\n<p>Query processer<br>The component of a search engine that allows you to access the database by entering search terms, and then produces a list of Web pages that contain content relevant to your query.<\/p>\n\n\n\n<p>SMTP<br>(Simple Mail Transfer Protocol) A communications protocol used to send email across a network or the Internet.<\/p>\n\n\n\n<p>POP3<br>(Post Office Protocol version 3) A standard for retrieving email messages from an email server.<\/p>\n\n\n\n<p>IMAP<br>(Internet Message Access Protocol) A protocol similar to POP that is used to retrieve email messages from an email server, but offers additional features, such as choosing which emails to download from the server.<\/p>\n\n\n\n<p>VOIP<br>(Voice over Internet Protocol) Hardware, software, and protocols used to make telephone-style calls over the Internet. Also referred to as Internet telephony.<\/p>\n\n\n\n<p>Webmail<br>An email system that allows users to access email messages using a browser.<\/p>\n\n\n\n<p>Asynchronous<br>In the context of communications, such as email and text messaging, both parties need not be online at the same time.<\/p>\n\n\n\n<p>Synchronous<br>A communications mode, such as VoIP, in which participants must be online at the same time.<\/p>\n\n\n\n<p>Store-and-forward Technology<br>A technology used by communications networks in which a message, such as an email, is temporarily held in storage on a server until it is requested by a client computer.<\/p>\n\n\n\n<p>RSS Reader<br>Software that can be used to set up and access an RSS feed.<\/p>\n\n\n\n<p>Public Domain<br>Material that is not subject to copyright restrictions on its use and distribution.<\/p>\n\n\n\n<p>Copyright<br>A form of legal protection that grants certain exclusive rights to the work&#8217;s creator or the owner of the copyright.<\/p>\n\n\n\n<p>Trademark<br>A logo symbol or word used to represent a business.<\/p>\n\n\n\n<p>Intellectual property<br>A legal concept that refers to ownership of intangible information, such as ideas.<\/p>\n\n\n\n<p>IP Address<br>private IP address- An IP address that cannot be routed over the Internet.<\/p>\n\n\n\n<p>public IP address- IP addresses that can be routed over the Internet (as opposed to private IP addresses that cannot)<\/p>\n\n\n\n<p>(Internet Protocol) One of the main protocols of TCP\/IP; responsible for addressing packets so that they can be routed to their destinations; IPv4 offers 32-bit addresses whereas IPv6 offers 128-bit addresses.<\/p>\n\n\n\n<p>Metadata Tag<br>Data that contains information about other data; file tags are an example of metadata.<\/p>\n\n\n\n<p>Hotspot Triangulation<br>The process of locating a device based on its distance from various hotspot servers.<\/p>\n\n\n\n<p>User Interface<br>The software and hardware that enable people to interact with computers.<\/p>\n\n\n\n<p>Pirated Software<br>Software that is copied, sold, or distributed without permission from the copyright holder.<\/p>\n\n\n\n<p>Open Sources Software<br>Software that includes its source code, allowing programmers to modify and improve it.<\/p>\n\n\n\n<p>Executable File<br>A file, usually with an .exe extension, containing instructions that tell a computer how to perform a specific task.<\/p>\n\n\n\n<p>EULA<br>(end-user license agreements) A type of software license that appears on the computer screen when software is being installed and prompts the user to accept or decline.<\/p>\n\n\n\n<p>Portable Software<br>Software designed to be stored on a flash drive or CD and does not require installation before it is used.<\/p>\n\n\n\n<p>Local Application<br>Software that is stored on a local device and loaded from there into RAM when it runs.<\/p>\n\n\n\n<p>Server Operating System<br>A type of operating system, sometimes called a network operating system, that provides management tools for distributed networks, email servers, and Web hosting sites.<\/p>\n\n\n\n<p>Kernel<br>The core module of an operating system that typically manages memory, processes, tasks, and storage devices.<\/p>\n\n\n\n<p>Buffer<br>Memory that is temporarily used to store input or other data until the processor is ready to use it.<\/p>\n\n\n\n<p>Memory Leak<br>An undesirable state in which a program requests memory but never releases it, which can eventually prevent other programs from running.<\/p>\n\n\n\n<p>File Shredder<br>Software designed to overwrite sectors of a disk with a random series of 1s and 0s to ensure deletion of data.<\/p>\n\n\n\n<p>Database<br>A collection of information that might be stored in more than one file or in more than one record type.<\/p>\n\n\n\n<p>Database Software<br>Software designed for entering, finding, organizing, updating, and reporting information stored in a database.<\/p>\n\n\n\n<p>Service Pack<br>A collection of patches designed to correct bugs and\/or add features to an existing software program.<\/p>\n\n\n\n<p>Software Update<br>A section of code or a program module designed to correct errors or enhance security on an already installed software product.<\/p>\n\n\n\n<p>Software Upgrade<br>A new version of a software product containing new features and designed to replace the entire earlier version of the product.<\/p>\n\n\n\n<p>Physical storage Model<br>A representation of data as it is physically stored.<\/p>\n\n\n\n<p>Logical storage model<br>A metaphor for the representation of stored files as, for example, a file cabinet containing folders.<\/p>\n\n\n\n<p>Disk Partition<br>An area of a hard disk created by dividing a large hard disk into several smaller virtual ones, such as when using two operating systems on a single computer.<\/p>\n\n\n\n<p>Absolute reference<br>In a worksheet formula, a cell reference (usually preceded by a $ symbol) that cannot change as a result of a move or copy operation.<\/p>\n\n\n\n<p>Relative reference<br>In a worksheet, a cell reference that can change if cells change position as a result of a move or copy operation.<\/p>\n\n\n\n<p>Keylogger<br>A program, sometimes part of a trojan, that records a person&#8217;s keystrokes, saves them, and then sends them to a system administrator or remote hacker.<\/p>\n\n\n\n<p>Firewall<br>Software or hardware designed to analyze and control incoming and outgoing packets on a network; used to enhance security by filtering out potential intrusion attempts.<\/p>\n\n\n\n<p>Pharming<br>An exploit that redirects users to fake Web sites.<\/p>\n\n\n\n<p>Phising<br>An email-based scam that&#8217;s designed to fool users into revealing confidential information.<\/p>\n\n\n\n<p>Address Spoofnig<br>Using a fake IP or email address to conceal the origin of a packet or message.<\/p>\n\n\n\n<p>Social Enginering<br>Methods for tricking people into engaging in non-secure activities, such as clicking on links and downloading infected files.<\/p>\n\n\n\n<p>TLS<br>(Transport Layer Security) An update of the Secure Sockets Layer (SSL) protocol for encrypting data before it is transmitted over a network.<\/p>\n\n\n\n<p>Malware<br>Programs such as viruses, worms, and bots designed to disrupt computer operations.<\/p>\n\n\n\n<p>Evile Twin<br>A malicious wireless network or hotspot designed to look legitimate and ensnare unwary users looking for a free Internet connection.<\/p>\n\n\n\n<p>Man-in-the-Middle<br>A malicious exploit in which messages between two people are intercepted without their knowledge.<\/p>\n\n\n\n<p>Spyware<br>Any software that covertly gathers user information without the user&#8217;s knowledge, usually for advertising purposes.<\/p>\n\n\n\n<p>Adware<br>Software that displays unwanted advertisements or analyzes user online behavior to create a profile used by advertisers.<\/p>\n\n\n\n<p>Port Scan<br>An exploit used by hackers to locate computer ports that can be used for surreptitious access; also called a port probe.<\/p>\n\n\n\n<p>Botnet<br>A group of bots under the remote control of a botmaster, used to distribute spam and denial-of-service attacks.<\/p>\n\n\n\n<p>Software License Single User<br>Legal permission for one person to use a particular software package.<\/p>\n\n\n\n<p>Software Licence Multi-User<br>Legal permission for more than one person to use a particular software package.<\/p>\n\n\n\n<p>Software Licence Site<br>A legal contract that defines the ways in which a user may use a computer program.<\/p>\n\n\n\n<p>Commercial software<br>Copyrighted computer applications sold to consumers for profit.<\/p>\n\n\n\n<p>Proprietary software<br>Software that carries restrictions on its use that are delineated by copyright, patents, or license agreements.<\/p>\n\n\n\n<p>Public domain software<br>Software that is available for public use without restriction except that it cannot be copyrighted.<\/p>\n\n\n\n<p>Demo ware software<br>Software that is supplied for free, but is limited in some way until you pay for it.<\/p>\n\n\n\n<p>Freeware software<br>Copyrighted software that is given away by the author or copyright owner.<\/p>\n\n\n\n<p>Shareware software<br>Copyrighted software marketed under a license that allows users to use the software for a trial period and then send in a registration fee if they wish to continue to use it.<\/p>\n\n\n\n<p>Jailbreak<br>Making unauthorized changes to an iPod, iPhone, or iPad to get apps from a source other than the official iTunes App Store.<\/p>\n\n\n\n<p>Virtual machine<br>Software that creates an operating environment that emulates another computer platform (for example, Parallels Desktop creates a virtual PC on an Intel Macintosh computer).<\/p>\n\n\n\n<p>Thin Client<br>A device or software that depends on software, storage, and other services provided by another device, such as a Web server.<\/p>\n\n\n\n<p>Multithreading<br>A technology that allows multiple parts or threads from a program to run simultaneously.<\/p>\n\n\n\n<p>Miltitasking<br>The ability of a computer, a processor, or an operating system to run more than one program, job, or task at the same time.<\/p>\n\n\n\n<p>Multiprocessing<br>The ability of a computer or an operating system to support dual-core processors or multiple processors.<\/p>\n\n\n\n<p>Ransomware<br>Malware that encrypts files as part of an exploit to extort money from victims who want to regain use of their files in unencrypted format.<\/p>\n\n\n\n<p>Backdoor<br>A method typically used by hackers for surreptitiously accessing computers.<\/p>\n\n\n\n<p>Trojan<br>A computer program that appears to perform one function while actually doing something else, such as inserting a virus into a computer system or stealing a password.<\/p>\n\n\n\n<p>Worm<br>computer worm -A software program designed to enter a computer system, usually a network, through security &#8220;holes&#8221; and then replicate itself and spread to other devices.<\/p>\n\n\n\n<p>Internet worm -A type of malware that spreads over the Internet, usually by sending itself to random IP addresses.<\/p>\n\n\n\n<p>mass-mailing worm- A worm that sends itself to every email address in the address book of an infected computer.<\/p>\n\n\n\n<p>file-sharing worm- A type of malware that is distributed on file sharing networks, such as pirate music download sites.<\/p>\n\n\n\n<p>Virus<br>A program designed to attach itself to a file, reproduce, destroy data, display an irritating message, or otherwise disrupt computer operations.<\/p>\n\n\n\n<p>Virus signature<br>The unique computer code contained in a virus that security software uses to identify it.<\/p>\n\n\n\n<p>Quarantined File<br>A file suspected to be infected with a virus that is moved to a special folder by antivirus software to prevent accidental access to it.<\/p>\n\n\n\n<p>Rootkit<br>Software that conceals running processes; used by hackers to disguise security breaches and break-ins.<\/p>\n\n\n\n<p>Dictionary Attack<br>A method of discovering a password by trying every word in an electronic dictionary.<\/p>\n\n\n\n<p>Brute force Attack<br>A method of breaking encryption code by trying all possible encryption keys.<\/p>\n\n\n\n<p>Authentication protocol<br>Passwords, user IDs, and biometric measures used to verify a person&#8217;s identity.<\/p>\n\n\n\n<p>Cryptographic Key<br>A specific word, number, or phrase that must be used to encrypt or decrypt data.<\/p>\n\n\n\n<p>Cryptographic Algorithim<br>A specific procedure for encrypting and decrypting data.<\/p>\n\n\n\n<p>Encryption<br>The process of scrambling or hiding information so that it cannot be understood without the key necessary to change it back into its original form.<\/p>\n\n\n\n<p>Decryption<br>The process of removing the encryption to produce clear text.<\/p>\n\n\n\n<p>Plaintext<br>An original, unencrypted message.<\/p>\n\n\n\n<p>Ciphertext<br>An encrypted message.<\/p>\n\n\n\n<p>Digital Certificate<br>A file that verifies the identity of a device, usually used in the context of network-based servers sending an encryption key to a client device.<\/p>\n\n\n\n<p>Confidentiality<br>The obligation not to disclose willingly any information obtained in confidence.<\/p>\n\n\n\n<p>Code of Ethics<br>A set of guidelines designed to help professionals make on-the-job ethical decisions.<\/p>\n\n\n\n<p>Information Techonlogy<br>(1) A degree program that focuses on the computer equipment and software used by businesses and organizations. (2) The use of computers and software to manipulate data.<\/p>\n\n\n\n<p>Comuter Science<br>A career field that focuses on developing fast and efficient computers from their construction to their programming and operating systems.<\/p>\n\n\n\n<p>Software Engineer<br>The process of developing software using systematic mathematical, engineering, and management techniques.<\/p>\n\n\n\n<p>Systems Analyst<br>A computer professional responsible for analyzing requirements, designing information systems, and supervising the implementation of new information systems.<\/p>\n\n\n\n<p>Computer Operator<br>A computer professional who works directly with and maintains mainframe computers or server arrays.<\/p>\n\n\n\n<p>Network administaor<br>The person responsible for configuring and monitoring a computer network.<\/p>\n\n\n\n<p>Database Administrator<br>A person who supervises database design, development, testing, and maintenance.<\/p>\n\n\n\n<p>Computer Programmer<br>A person who designs, codes, and tests computer programs.<\/p>\n\n\n\n<p>Security specialist<br>A computer professional who analyzes security threats, implements solutions, and develops policies and procedures to protect computer equipment and data.<\/p>\n\n\n\n<p>CIO<br>(CIO) The highest-ranking executive responsible for information systems.<br>Chief Information Officer<\/p>\n\n\n\n<p>1G<br>Computers that used vacuum tubes to process and store data, such as UNIVAC.<\/p>\n\n\n\n<p>2G<br>Computers that use transistors for data processing and storage instead of vacuum tubes.<\/p>\n\n\n\n<p>3G<br>Computers characterized by using integrated circuits instead of transistors or vacuum tubes for data processing.<\/p>\n\n\n\n<p>4G<br>Computers, such as today&#8217;s personal computers, servers, and mainframes, that use a general-purpose microprocessor for data processing.<\/p>\n\n\n\n<p>Transistor<br>A computer processing technology created by Bell Laboratories in 1947; characterizes second-generation computers, which replaced vacuum tubes for data processing.<\/p>\n\n\n\n<p>Vacuum Tube<br>An electronic device that controls the flow of electrons in a vacuum and represents binary data; used in the construction of first-generation computers.<\/p>\n\n\n\n<p>Moore&#8217;s Law<br>Gordon Moore&#8217;s prediction that technological innovation would double the number of transistors in an integrated circuit every two years without raising its cost.<\/p>\n\n\n\n<p>Disruptive Technlogy<br>An invention that changes markets by replacing existing goods or services.<\/p>\n\n\n\n<p>Offshoring<br>The corporate practice of relocating production, manufacturing, or customer service to lower-cost overseas locations.<\/p>\n\n\n\n<p>Outsourcnig<br>The corporate practice of using third-party contractors to supply raw goods, manufacturing, or services.<\/p>\n\n\n\n<p>Dot-coms<br>A legacy term for companies formed mainly to offer goods and services online.<\/p>\n\n\n\n<p>Digital Revolution<br>is an ongoing process of social, political, and economic change brought about by digital technology, such as microchips, computers, and the Internet.<\/p>\n\n\n\n<p>Convergence<br>The expansion of cloud computing , a process by which several technologies with distinct functionalities evolve to form a single product. Your computer plays movies. Your cell phone has a camera. Your clock has a radio.<\/p>\n\n\n\n<p>The Web<br>is a collection of linked documents, graphics, and audio that can be accessed over the Internet.<\/p>\n\n\n\n<p>Cloud Computing<br>which provided access to information, applications, communications, and storage over the Internet.<\/p>\n\n\n\n<p>Digital data<br>Text, numbers, graphics, or sound represented by discrete digits, such as 1s and 0s.<\/p>\n\n\n\n<p>Analog Data<br>Data that is measured or represented on a continuously varying scale, such as a dimmer switch or a watch with a sweep second hand.<\/p>\n\n\n\n<p>Digitization<br>Converting non-digital information or media to a digital format through the use of a scanner, sampler, or other input device.<\/p>\n\n\n\n<p>Compression<br>A ratio such as 5:1 indicating the amount of compression that has been applied to a file. High compression ratios such as 35:1 indicate more compression so data can be contained in smaller files.<\/p>\n\n\n\n<p>Lossy<br>Any data compression technique in which some of the data is sacrificed to obtain more compression.<\/p>\n\n\n\n<p>Lossless<br>A compression technique that is able to reconstitute all of the data in the original file; hence lossless means that this compression technique does not lose data.<\/p>\n\n\n\n<p>Image Resolution<br>The number of pixels in an image, usually expressed as horizontal pixels \u00d7 vertical pixels.<\/p>\n\n\n\n<p>Aspect Ratio<br>The ratio of the width and height of an image or display screen.<\/p>\n\n\n\n<p>Pixel Interpolation<br>A process that is used by graphics software to average the color of adjacent pixels in an image, usually when the image is enlarged.<\/p>\n\n\n\n<p>Audio Sampling Rate<br>The number of times per second a sound is measured during the recording process.<\/p>\n\n\n\n<p>Data<br>In the context of computing and data management, data refers to the symbols that a computer uses to represent facts and ideas.<\/p>\n\n\n\n<p>Information<br>A computer system that collects, stores, and processes information, usually within the context of an organization.<\/p>\n\n\n\n<p>Bitmap<br>An image, such as a digital photo, that is stored as a grid work of colored dots.<\/p>\n\n\n\n<p>Vector Graphics<br>An image generated from descriptions that specify the position, length, and direction in which lines and shapes are drawn.<\/p>\n\n\n\n<p>Realism<br>the rendering process can take into account the way that light shines on surfaces and creates shadows.<\/p>\n\n\n\n<p>3-D Graphics<br>are based on vectors stored as a set of instructions describing the coordinates for lines and shapes in a three-dimensional space.<\/p>\n\n\n\n<p>Vectors<br>Lines and curves that form simple shapes.<\/p>\n\n\n\n<p>Rendering<br>In graphics software, the process of creating a 3-D solid image by covering a wireframe drawing and applying computer-generated highlights and shadows.<\/p>\n\n\n\n<p>Ease of Editing-<br>Ability to edit vector or bit map. Vector easier to edit<\/p>\n\n\n\n<p>Resizing<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Ability to resize vector or bitmap. Vector resizes proportionally while bitmap maintains resolution.<\/li>\n<\/ul>\n\n\n\n<p>Ray Tracing<br>A technique by which light and shadows are added to a 3-D image.<\/p>\n\n\n\n<p>Instruction Set<br>The collection of instructions that a CPU is designed to process.<\/p>\n\n\n\n<p>Software-<br>The instructions that direct a computer to perform a task, interact with a user, or process data.<\/p>\n\n\n\n<p>Application-<br>Computer programs that help users perform a specific task such as word processing.<\/p>\n\n\n\n<p>Operating system-<br>The software that controls the computer&#8217;s use of its hardware resources, such as memory and disk storage space.<\/p>\n\n\n\n<p>Form factor<br>The configuration of a computer&#8217;s system unit; examples include tower, mini-tower, and cube.<\/p>\n\n\n\n<p>Mainframe<br>is a large and expensive computer capable of simultaneously processing data for hundreds or thousands of users. Its processing circuitry is housed in a closet-sized cabinet.<\/p>\n\n\n\n<p>Supercomputer<br>at the time of construction, one of the fastest computers in the world<\/p>\n\n\n\n<p>Server-<br>A computer or software on a network that supplies the network with data and storage.<\/p>\n\n\n\n<p>ALU<br>The part of the CPU that performs arithmetic and logical operations on the numbers stored in its registers.<\/p>\n\n\n\n<p>Control Unit-<br>The part of the microprocessor that directs and coordinates processing.<\/p>\n\n\n\n<p>RAM<br>Computer memory circuitry that holds data, program instructions, and the operating system while the computer is on.<\/p>\n\n\n\n<p>ROM-<br>Refers to one or more integrated circuits that contain permanent instructions that the computer uses during the boot process.<\/p>\n\n\n\n<p>Virtual Memory-<br>A computer&#8217;s use of hard disk storage to simulate RAM.<\/p>\n\n\n\n<p>Magnetic-<br>A technology for recording data onto disks or tape by magnetizing particles of an oxide-based surface coating.<\/p>\n\n\n\n<p>Optical-<br>A technology that records data as light and dark spots on a CD, DVD, or other optical media.<\/p>\n\n\n\n<p>Cloud<br>A storage area that is located on a remote server, usually on the Internet, rather than on a local storage device.<\/p>\n\n\n\n<p>Volatile-<br>A term that describes data (usually in RAM) that can exist only with a constant supply of power.<\/p>\n\n\n\n<p>Nonvolatile<br>Any electronic component that does not require a constant supply of power to hold data.<\/p>\n\n\n\n<p>Serial processing-<br>Processing data one instruction at a time, completing one instruction before beginning another.<\/p>\n\n\n\n<p>Pipelining processing-<br>A technology that allows a processor to begin executing an instruction before completing the previous instruction.<\/p>\n\n\n\n<p>Parallel Processing-<br>The simultaneous use of more than one processor to execute a program.<\/p>\n\n\n\n<p>Network Node<br>In a network, a connection point; in a hierarchical database, a segment or record type.<\/p>\n\n\n\n<p>TCP<br>The protocol within TCP\/IP that is responsible for establishing a data connection between two hosts and breaking data into packets.<\/p>\n\n\n\n<p>IP-<br>One of the main protocols of TCP\/IP; responsible for addressing packets so that they can be routed to their destinations; IPv4 offers 32-bit addresses whereas IPv6 offers 128-bit addresses.<\/p>\n\n\n\n<p>Private IP address<br>An IP address that cannot be routed over the Internet.<\/p>\n\n\n\n<p>Public IP Address<br>IP addresses that can be routed over the Internet<\/p>\n\n\n\n<p>DNS spoofing<br>A malicious attack on the domain name system in which the IP address corresponding to a Web site is changed in order to redirect users to different locations.<\/p>\n\n\n\n<p>Symmetric connection<br>Any connection to the Internet in which the upstream speed is the same as the downstream speed<\/p>\n\n\n\n<p>Asymmetric Connection<br>A network connection in which the download capacity is different from (usually faster than) the upload capacity.<\/p>\n\n\n\n<p>ARPANET-<br>One of the first packet switching computer networks using TCP\/IP, and the prototype for the Internet.<\/p>\n\n\n\n<p>Internet Backbone<br>The major communications links that form the core of the Internet.<\/p>\n\n\n\n<p>ISP-<br>Companies that provide Internet access to businesses, organizations, and individuals.<\/p>\n\n\n\n<p>IXP<br>Nodes on the Internet where data from one service provider is transferred to a different service provider.<\/p>\n\n\n\n<p>NIC<br>Circuitry, often on an expansion card mounted inside a computer, that transmits and receives data on a local area network. Also called a NIC, network card, or network adapter.<\/p>\n\n\n\n<p>Communication Protocols<br>A set of rules that ensures the orderly and accurate transmission and reception of data.<\/p>\n\n\n\n<p>Physical protocols<br>Specify cable and signal standards for the channels that carry data<\/p>\n\n\n\n<p>Transport protocols<br>Make sure data gets to its destination by establishing standards for dividing data into chunks, assigning addresses, and correcting errors<\/p>\n\n\n\n<p>Arrival protocols-<br>Convert data into standard formats that can be used by applications, such as email, Web browsers, and Skype<\/p>\n\n\n\n<p>Packet<br>A small unit of data transmitted over a network.<\/p>\n\n\n\n<p>Circuit Switching-<br>The method used by the telephone network to temporarily connect one telephone with another for the duration of a call.<\/p>\n\n\n\n<p>Packet Switching<br>A technology used by data communications networks, such as the Internet, where a message is divided into smaller units called packets for transmission.<\/p>\n\n\n\n<p>Jitter<br>Deviations in the timing of a digital signal that can interfere with communications, especially voice over IP.<\/p>\n\n\n\n<p>Packet Loss<br>A situation in which data bits are lost in transit, requiring them to be resent, which significantly increases the time required for an intact message to arrive at its destination.<\/p>\n\n\n\n<p>Fixed internet access<br>Any Internet access service designed to be used from a fixed, non-portable location<\/p>\n\n\n\n<p>Portable internet access<br>Any type of Internet service, such as portable satellite, that can be moved from one place to another.<\/p>\n\n\n\n<p>Dial-Up<br>A connection that uses a phone line to establish a temporary Internet connection.<\/p>\n\n\n\n<p>Cable-<br>A type of Internet connection offered to subscribers by cable television companies.<\/p>\n\n\n\n<p>DSL<br>A high-speed Internet connection that uses existing telephone lines, requiring close proximity to a switching station.<\/p>\n\n\n\n<p>Satellite<br>A high-speed Internet service that uses a geosynchronous or low-earth orbit satellite to send data directly to satellite dishes owned by individuals.<\/p>\n\n\n\n<p>FTTH<br>A communication link that connects subscribers&#8217; homes using fiber-optic cable.<\/p>\n\n\n\n<p>Web Server-<br>A computer that listens for queries from Web browsers and transmits HTML documents over the Internet.<\/p>\n\n\n\n<p>Web Site<br>A group of Web pages accessible at a specific Web address that holds a collection of information identified by a common domain name, such aswww.cnn.com.<\/p>\n\n\n\n<p>Web Page-<br>Information displayed by a Web browser that&#8217;s produced from an HTML document or generated on the fly from data in a database.<\/p>\n\n\n\n<p>Hypertext<br>A way of organizing a collection of documents by assigning an address to each and providing a way to link from one address to another.<\/p>\n\n\n\n<p>Hypertext Links<br>words, phrases, or images on a Web page that, when clicked, take you to designated URLs.<\/p>\n\n\n\n<p>Web Browser<br>A program that communicates with a Web server and displays Web pages.<\/p>\n\n\n\n<p>Browser Cache<br>The collection of HTML pages and images that is stored locally by a browser and used to quickly load pages that have been previously viewed without waiting for them to be downloaded again.<\/p>\n\n\n\n<p>Plugin<br>A software module that adds a specific feature to a system. In the context of browsers, a plugin adds the ability to display or play various additional file formats.<\/p>\n\n\n\n<p>Browser Extension<br>A module of computer code that adds capabilities to a browser, such as the ability to block ads on Web pages.<\/p>\n\n\n\n<p>Dynamic Web Page-<br>A way of displaying data from a database as customized Web pages, which are generated as the page is sent to the browser.<\/p>\n\n\n\n<p>Static Web Page<br>A Web page that does not change once it is displayed on the screen by a browser.<\/p>\n\n\n\n<p>Client-Side scripts<br>Program code that is executed by a client&#8217;s browser, as opposed to being executed by the server.<\/p>\n\n\n\n<p>Server-Side Scripts<br>Program code that is executed by a Web server in response to client data.<\/p>\n\n\n\n<p>HTML document<br>A plain text or ASCII document with embedded HTML tags that dictate formatting and are interpreted by a browser.<\/p>\n\n\n\n<p>Markup Language<br>A language that provides text and graphics formatting through the use of tags.<\/p>\n\n\n\n<p>HTML Tags<br>A set of instructions, such as <strong>, inserted into an HTML document to provide formatting and display information to a Web browser.<\/strong><\/p>\n\n\n\n<p>HTML5<br>The current version of HTML.<\/p>\n\n\n\n<p>CSS-<br>Used in conjunction with HTML, a means of formatting the appearance of text and other elements of a Web page.<\/p>\n\n\n\n<p>Search Engine optimization<br>Making modifications to a Web site to move it closer to the top of the list returned by search engines.<\/p>\n\n\n\n<p>Web Crawler-<br>The component of a search engine that autonomously visits Web sites collecting Web page data that will be indexed and available for searching.<\/p>\n\n\n\n<p>Search engine Indexer<br>The component of a search engine that reviews the Web pages brought back by a crawler and creates pointers to them so that they can be quickly accessed.<\/p>\n\n\n\n<p>Database<br>A collection of information that might be stored in more than one file or in more than one record type.<\/p>\n\n\n\n<p>Query Processor<br>The component of a search engine that examines keywords entered by users and fetches results that match the query.<\/p>\n\n\n\n<p>Communications Network<br>A collection of devices used to originate, send, route, and receive data transmissions.<\/p>\n\n\n\n<p>Communications Channel<br>Any pathway between the sender and receiver; channel may refer to a physical medium or a frequency.<\/p>\n\n\n\n<p>Network Topology<br>The physical structure of a network including its devices and connections.<\/p>\n\n\n\n<p>Data<br>symbols that represent people, events, things, and ideas.<\/p>\n\n\n\n<p>Data Representation<br>form in which data is stored, processed, and transmitted<\/p>\n\n\n\n<p>Know the difference between bits and bytes<br>1 byte = 8 bits<br>Bits are binary, only 2 states (0\/1, +\/-, light\/dark)<\/p>\n\n\n\n<p>Ripping<br>Digital Audio Extraction<\/p>\n\n\n\n<p>Know about bitmap and vector graphics<br>Bitmap: Grid of rectangular cells (pixel)<br>Vector: form a wireframe that works like the framework for a<br>tent<br>Rendering: applying wireframe surface with color and<br>texture<br>Ray tracing: technique to add light and shadow<\/p>\n\n\n\n<p>Microprocessor<br>integrated circuit designed to process instructions<br>Most important, usually most expensive<\/p>\n\n\n\n<p>CPU (Central Processing Unit)<br>Where the computations are performed<\/p>\n\n\n\n<p>ALU (Arithmetic Logic Unit)<br>Part of the CPU that performs logic operations<\/p>\n\n\n\n<p>How are peripheral devices generally attached to computers?<br>3 I think, keyboard, mouse, screen<\/p>\n\n\n\n<p>Application software<br>set of computer programs that helps a person carry out a task<\/p>\n\n\n\n<p>system software<br>Help the computer system monitor itself in order to function efficiently<br>example: OS<\/p>\n\n\n\n<p>ARM based processors<br>smartphones and tablets<\/p>\n\n\n\n<p>x86 processors<br>An older processor that first used the number 86 in the model number and processes 32 bits at a time.<\/p>\n\n\n\n<p>Network<br>a group of two or more computer systems linked together<\/p>\n\n\n\n<p>LAN (Local Area Network)<br>type of network used to describe computers that are connected in a single physical location<\/p>\n\n\n\n<p>PAN (Personal Area Network)<br>A network that connects two to three workstations with twisted pair cabling most often seen in small or home offices.<\/p>\n\n\n\n<p>WAN (Wide Area Network)<br>network that connects several LANs in different locations<\/p>\n\n\n\n<p>Different types of topologies<\/p>\n\n\n\n<p>Connection speed, internet connection<br>Speed measured in bits, storage measured in bytes<br>(symmetrical, asymmetrical): refers to symmetry of up\/down speed<\/p>\n\n\n\n<p>HTTP (HyperText Transfer Protocol)<br>the protocol used for transmitting web pages over the Internet<\/p>\n\n\n\n<p>HTTPS (HyperText Transfer Protocol Secure)<br>An encrypted version of HTTP. It uses port 443.<\/p>\n\n\n\n<p>URL composition<br>Case sensitive, no spaces, forward slashes<\/p>\n\n\n\n<p>What do you need to do if you want to change your default browser?<br>change stuff<\/p>\n\n\n\n<p>Browser cache (deleting contents of browser cache)<br>Store information regarding browser sessions<\/p>\n\n\n\n<p>Private key, public key encryption<\/p>\n\n\n\n<p>hat is usually the extension at the end of a compressed file name?<br>.zip<\/p>\n\n\n\n<p>MIDI (Musical Instrument Digital Interface)<br>A set of standards that are used to represent music in digital form<\/p>\n\n\n\n<p>Speech synthesis<br>The process by which computers produce sound that resembles spoken words<\/p>\n\n\n\n<p>speech recognition<br>The process by which computers recognize voice patterns and words, and then convert them to digital data.<\/p>\n\n\n\n<p>Color depth<br>The number of colors per pixel that can be contained in an image.<\/p>\n\n\n\n<p>Supercomputer<br>a particularly powerful mainframe computer.<\/p>\n\n\n\n<p>Instruction<br>How to do something<\/p>\n\n\n\n<p>Instruction set<br>set of all operations that can be executed by a processor<\/p>\n\n\n\n<p>what should programs be converted into for the microprocessor to read instructions?<br>Machine Language<\/p>\n\n\n\n<p>RAM (Random Access Memory)<br>The workspace of your computer. It&#8217;s the area that stores the information and data for processing by the computer&#8217;s CPU.<\/p>\n\n\n\n<p>ROM (Read Only Memory)<br>Chips that contain programming code and cannot be erased.<\/p>\n\n\n\n<p>Local and expansion buses<br>Local: computer bus that connects directly, or almost directly, from the CPU to one or more slots on the expansion bus, faster than expansion<\/p>\n\n\n\n<p>Expansion: provides an input\/output pathway for transferring information between internal hardware, such as RAM or the CPU, and expansion devices such as a graphics card or sound card.<\/p>\n\n\n\n<p>Bandwidth<br>Transmission capacity measure by bit rate<\/p>\n\n\n\n<p>circuit switching<br>a dedicated connection is formed between two points and the connection remains active for the duration of the transmission<\/p>\n\n\n\n<p>Packet switching<br>the transmission technology that divides blocks of text into packets<\/p>\n\n\n\n<p>Static and dynamic IP (Internet Protocol) address<br>Static: permanent<br>Dynamic: temporarily assigned to a device<br>V4: 32 bit<br>V6: 128 bit<\/p>\n\n\n\n<p>HTML (Hyper Text Markup Language)<br>The computer language that is used to create a website.<\/p>\n\n\n\n<p>Internet<br>Global data communications network<\/p>\n\n\n\n<p>World Wide Web<br>collection of HTML documents, images, videos, and sound files that can be linked to each other and accessed over the Internet using a protocol called HTTP<\/p>\n\n\n\n<p>Webpage<br>based on an HTML source document that is stored as a file on a Web server<\/p>\n\n\n\n<p>Browser<br>Software used to browse the world wide web<\/p>\n\n\n\n<p>FTP (File Transfer Protocol)<br>A protocol used to move files and folders over a network or the Internet.<\/p>\n\n\n\n<p>Plugin<br>a program that extends a browser&#8217;s ability to work with file formats<\/p>\n\n\n\n<p>markup languages<br>authors mark up documents by inserting special instructions called HTML tags that specify how the document should appear when displayed in a browser window<\/p>\n\n\n\n<p>Critical Path<br>The sequence of stages determining the minimum time needed for an operation especially when analyzed on a computer for a large organization<\/p>\n\n\n\n<p>Colocation Center<br>Centers that dedicate information systems which several corporations lease space and equipment<\/p>\n\n\n\n<p>Data Center<br>a specialized facility designed to hold and protect computer systems and data<\/p>\n\n\n\n<p>Application Development Tool<br>Software that assists in the creation of new software<\/p>\n\n\n\n<p>ERP<br>Enterprise Resource Planning; it is a suite of software modules that integrate major business activities<\/p>\n\n\n\n<p>SDLC\/Phases of the SDLC<br>An information system progresses through several phases as it is developed, used, and retired<\/p>\n\n\n\n<p>order of phases<br>Analysis &gt; Design &gt; Implementation &gt; Maintenance &gt; Planning<\/p>\n\n\n\n<p>main purpose<br>System Requirements Report &gt; Application Specifications &gt; Working System &gt; Project Development Plan<\/p>\n\n\n\n<p>Feature Creep<br>A tendency for product or project requirements to increase during development beyond those originally foreseen<\/p>\n\n\n\n<p>JAD<br>Joint Application Design, A process used in the life cycle area of the dynamic systems development method to collect business requirements while developing new information systems for a company<\/p>\n\n\n\n<p>BI<br>A technology driven process for analyzing data and presenting actionable information to help executives, managers and other corporate end users make informed business decisions<\/p>\n\n\n\n<p>Object-Oriented Methodology<br>treats an information system as a collection of objects that interact to accomplish tasks<\/p>\n\n\n\n<p>UML<br>Unified Modeling Language, The current standard for object-oriented documentation<\/p>\n\n\n\n<p>class diagram<br>provides the name of each object, a list of each object&#8217;s attributes, a list of methods, and an indication of the associations between objects<\/p>\n\n\n\n<p>use case diagram<br>documents the users of an information system and the functions they perform<\/p>\n\n\n\n<p>Sequence Diagram<br>depicts the detailed sequence of interactions that take place for a use case<\/p>\n\n\n\n<p>System Conversion<br>the process of deactivating an old information system and activating a new one<\/p>\n\n\n\n<p>Unit Testing<br>Each application module is completed undergoes this to ensure that it operates reliably and correctly<\/p>\n\n\n\n<p>Integration Testing<br>Performed to ensure that the modules operate together correctly<\/p>\n\n\n\n<p>System Testing<br>Ensures that all the hardware and software components work together<\/p>\n\n\n\n<p>MRP<br>Material Requirements Planning, A production planning, scheduling, and inventory control system used to manage manufacturing processes.<\/p>\n\n\n\n<p>Data Flow Diagram<br>The core documentation tool for project teams using structured methodology, graphically illustrates how data moves through an information system<\/p>\n\n\n\n<p>Success Factors<br>They also serve as an evaluation checklist at the end of a project<\/p>\n\n\n\n<p>Gantt Chart<br>shows the duration of development tasks as they occur over time<\/p>\n\n\n\n<p>WBS &#8211; Work breakdown structure<br>Work breakdown structure, breaks a complete task into a series of subtasks<\/p>\n\n\n\n<p>PERT -Program evaluation and review technique<br>Program evaluation and review technique, used for analyzing the time needed to complete each project task<\/p>\n\n\n\n<p>JIT &#8211; Just-In-Time manufacturing<br>A methodology aimed primarily at reducing times within production system as well as response times from suppliers and to customers<\/p>\n\n\n\n<p>Horizontal Market<br>Designed for common elements of many businesses<\/p>\n\n\n\n<p>Vertical Market<br>Designed for a specific industry or enterprise<\/p>\n\n\n\n<p>Turnkey System<br>A computer system that has been customized for a particular application<\/p>\n\n\n\n<p>B2B and B2G<br>Websites such as FedBid, Oracle, &amp; Ingram sell goods and services to other businesses or to the government<\/p>\n\n\n\n<p>B2C (business-to-consumer)<br>Online storefronts such as Zappos, Amazon &amp; Dell offer merchandise and services to consumers<\/p>\n\n\n\n<p>C2C (consumer-to-consumer)<br>Consumers sell to each other at popular auction and list sites, such as eBay &amp; TaoBao.<\/p>\n\n\n\n<p>Fuzzy Logic<br>An expert system can deal with this type of data by working with confidence levels. These systems are designed to deal with data that is imprecise or problematic<\/p>\n\n\n\n<p>Expert System<br>A computer system designed to analyze data and produce a recommendation, diagnosis, or decision based on a set of facts and rules<\/p>\n\n\n\n<p>TPS (Transaction Processing System)<br>Transaction Processing System, provides a way to collect, process, store, display, modify or cancel transactions<\/p>\n\n\n\n<p>DSS (decision support system)<br>Decision Support System helps people make decisions by directly manipulating data, accessing data from external sources, generating statistical projections, and creating data models of various scenarios<\/p>\n\n\n\n<p>Batch Processing<br>The processing of previously collected jobs in a si<\/p>\n\n\n\n<p>OLTP (online transaction processing)<br>Online Transaction Processing System, a real-time method in which each transaction is processed as it is entered<\/p>\n\n\n\n<p>Exception Report<br>contains information that is outside of normal or acceptable ranges<\/p>\n\n\n\n<p>summary report<br>combines information that is outside of normal or acceptable ranges<\/p>\n\n\n\n<p>Ad Hoc Report<br>A report that is created on the fly, displaying information in a table or a chart that is the result of a question that has not already been codified in a production report.<\/p>\n\n\n\n<p>Database\/Database Models<br>The underlying structure of a database<\/p>\n\n\n\n<p>hierarchical<br>one-to-one and one-to-many relationships which are linked in a hierarchical structure<\/p>\n\n\n\n<p>network<br>Conceived as a flexible way of representing objects and their relationships.<\/p>\n\n\n\n<p>Relational<br>stores data in a collection of related tables<\/p>\n\n\n\n<p>O-O<br>stores data as objects, which can be grouped into classes and defined by attributes and methods<\/p>\n\n\n\n<p>DBMS (Database Management System)<br>software that manages data stored in a database<\/p>\n\n\n\n<p>Data Independence<br>Entails separating data from the programs that manipulate it<\/p>\n\n\n\n<p>Data Redundancy<br>The amount of data that is duplicated in a database<\/p>\n\n\n\n<p>Normalization<br>helps database designers create a database structure that minimizes storage space and increases processing efficiency<\/p>\n\n\n\n<p>Operational Database<br>Used to collect, modify, and maintain data on a daily basis<\/p>\n\n\n\n<p>Data Warehouse<br>A large store of data accumulated from a wide range of sources within a company and used to guide management decisions<\/p>\n\n\n\n<p>Big Data<br>The huge collections of data that are difficult to process, analyze, and manage using conventional database tools<\/p>\n\n\n\n<p>Hadoop<br>An open source distributed processing framework that manages data processing and storage for big data applications running in clustered systems<\/p>\n\n\n\n<p>MapReduce<br>A programming model and an associated implementation for processing and generating big data sets with a parallel, distributed algorithm on a cluster<\/p>\n\n\n\n<p>Data Mining<br>The practice of examining large databases in order to generate new information<\/p>\n\n\n\n<p>Distributed Database<br>A database in which not all storage devices are attached to a common processor<\/p>\n\n\n\n<p>Cardinality<br>The number of associations that can exist between two record types<\/p>\n\n\n\n<p>Relationship<br>An association between data that&#8217;s sorted in different record types<\/p>\n\n\n\n<p>ERD (Entity Relationship Diagram)<br>The relationship between record types can be depicted graphically<\/p>\n\n\n\n<p>create<br>Create a database or table<\/p>\n\n\n\n<p>insert<br>Add a record<\/p>\n\n\n\n<p>update<br>Change data in a field<\/p>\n\n\n\n<p>delete<br>Remove a record from a table<\/p>\n\n\n\n<p>join<br>Use the data from two tables<\/p>\n\n\n\n<p>SELECT<br>Search for records<\/p>\n\n\n\n<p>High-Level Languages<br>command words and grammar based on human languages to provide a level of abstraction that hides the underlying low-level language<\/p>\n\n\n\n<p>Low-Level Languages<br>a low level of abstraction because it includes commands specific to a particular CPU or microprocessor family<\/p>\n\n\n\n<p>1st Generation<br>First machine languages programmers used<\/p>\n\n\n\n<p>2nd Generation<br>Added a level of abstraction to machine languages by substituting abbreviated command words for binary numbers<\/p>\n\n\n\n<p>3rd Generation<br>Conceived in the 1950s and used easy &#8211; to &#8211; remember command words<\/p>\n\n\n\n<p>4th Generation<br>&#8220;High &#8211; Level&#8221; languages &amp; more closely resemble human languages<\/p>\n\n\n\n<p>5th Generation<br>Prolong language based on a declarative programming paradigm<\/p>\n\n\n\n<p>Programming Paradigms<br>A way of conceptualizing and structuring the tasks a computer performs<\/p>\n\n\n\n<p>Variable<br>A value that can change<\/p>\n\n\n\n<p>Constant<br>A factor that remains the same throughout a program<\/p>\n\n\n\n<p>Runtime Error<br>Occurs when a program runs instructions that the computer cant execute<\/p>\n\n\n\n<p>Logic Error<br>A type of runtime error in the logic or design of the program<\/p>\n\n\n\n<p>Syntax Error<br>When an instruction does not follow the syntax rules of the programming language<\/p>\n\n\n\n<p>Source Code<br>readable version of a program created in a high-level language by a programmer<\/p>\n\n\n\n<p>Object Code<br>The resulting collection of instructions placed in a new file<\/p>\n\n\n\n<p>API<br>A set of functions and procedures allowing the creation of applications that access the features or data of an operating system, application or other service<\/p>\n\n\n\n<p>Algorithm<br>A set of steps for carrying out a task that can be written down and implemented<\/p>\n\n\n\n<p>Pseudocode<br>A notational system for algorithms that is less formal than a programming language<\/p>\n\n\n\n<p>Structured English<br>A graphical representation of the way a computer should progress from one instruction to the next as it performs a task<\/p>\n\n\n\n<p>Syntax<br>The set of rules that specify the sequence of keywords, parameters and punctuation in a program instruction<\/p>\n\n\n\n<p>Interpreter<br>Converts and executes one statement at a time while the program is running<\/p>\n\n\n\n<p>Compiler<br>Converts all statements in a program in a single batch<\/p>\n\n\n\n<p>selection control structure<br>tells a computer what to do based on whether a condition is true or false<\/p>\n\n\n\n<p>repetition control structure<br>directs the computer to repeat one or more instructions until a certain condition is met<\/p>\n\n\n\n<p>Sequence control structure<br>changes the order in which instructions are carried out by directing the computer to execute an instruction elsewhere in the program<\/p>\n\n\n\n<p>Class<br>A template for a group of objects with similar characteristics<\/p>\n\n\n\n<p>Object<br>A unit of data that represents an abstract or real-world entity, such as a person, place or thing<\/p>\n\n\n\n<p>Class Hierarchy<br>The process of producing new classes with inherited attributes<\/p>\n\n\n\n<p>Attribute<br>Defines the characteristics of a set of objects<\/p>\n\n\n\n<p>Method<br>A segment of code that defines an action<\/p>\n\n\n\n<p>Inheritance<br>Passing certain characteristics from one class to other classes<\/p>\n\n\n\n<p>Polymorphism<br>The ability to redefine a method in a subclass<\/p>\n\n\n\n<p>Encapsulation<br>One of two related but distinct notions, and sometimes to the combination thereof: A language mechanism for restricting direct access to some of the objects components.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Uta insy 2303 exam quizlet pdfUta insy 2303 exam quizlet chapter 1insy 2303 exam 1 quizletinsy 2303 final examinsy 2303 exam 2insy 2303 uta The _ number system allows digital devices to represent virtually any number simply by using 0s and 1s. (Unit 1)Binary Most graphics software uses a process called pixel _ to create [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[],"tags":[],"class_list":["post-111139","post","type-post","status-publish","format-standard","hentry"],"_links":{"self":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/posts\/111139","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/comments?post=111139"}],"version-history":[{"count":0,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/posts\/111139\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/media?parent=111139"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/categories?post=111139"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.learnexams.com\/blog\/wp-json\/wp\/v2\/tags?post=111139"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}