CSIS 110 Ch1

The flashcards below were created by user Anonymous on FreezingBlue Flashcards.

  1. The binary number 10 represents _______ in the decimal number system.
  2. The master controller for all activities that take place within a computer is ________.
    the CPU
  3. Name the four steps of the instruction cycle.
    • 1. fetch instruction
    • 2. interpret instruction
    • 3. execute instruction
    • 4. increment pointer
  4. A set of computer programs that helps a computer monitor itself and function more efficiently is ________.
    system software
  5. ______ is the process of converting text, numbers, sound, photos, and video into data that can be processed by digital devices.
  6. A group of computers linked by wired or wireless technology is a(n) ________.
  7. The ______ is a command word for an operation suck as add, compare, or jump.
    op code
  8. The type of code that uses only seven bits for each character is ______.
  9. A(n) ______ converts and executes one statment at a time.
  10. A ______ attack uses password-cracking software.
    brute force
  11. _____ is/are a form of asynchronous communications.
    Bulletin boards
  12. _______ intercepts information set over a network.
  13. Digital devices can use ________ as a code to represent character data.
    ASCII, Extended ASCII, and EBCDIC
  14. A super-thin slice of semiconduction material packed with microscopic circuit elements is a(n) ________.
    integrated circuit
  15. Storage is typically expressed as ______.
  16. An electronic component that can be programmed to perform tasks is a ______.
  17. Technology ______ is a process by which several different technologies with distinct functionality evolve to form a single product.
  18. _______ provide a space for interacting and communication via e-mail, blogs, chat, and post.
    Online social networks
  19. Key factors in making electronic device increasingly smaller and less expensive include _______.
    integrated circuits
  20. A set of computer programs that helps a person carry out a task is ______.
    application software
  21. 1,073,741,824 bytes is a ____.
  22. A computer is a multiple purpose device that can store data, process data, accept input but NOT _______.
    think independently
  23. Password management functions include generating passwords, tracking passwords, providing password strength, but NOT _______.
    recording keystrokes
  24. The ______ is the part of the microprocessor that performs arithmetic operations.
  25. A chip carrier that has a row of pins running along the two sides.
    DIP (dual inline package)
  26. Data transmission speeds are typically expressed as _____.
  27. In a computer, most procession takes place in _____.
    the CPU
  28. _______ tools cloak a person's identity online.
  29. C, BASIC, COBOL, and Java are examples of _____ programming languages.
  30. More than ______ percent of cameras sold today are digital.
  31. A chip carrier that has multiple pins running along all sides.
    PGA (pin grid array)
  32. A term which can refer to a person who manipulates computers with malicious intent is a _______.
    black hat, cracker, and hacker
  33. In terms of an authentication protocol, the phrase 'something a person knows' refers to ______.
    a password
  34. The type of data uses an infinite scale of values.
  35. _____ is a term that refers to entities that exist largely within computer networks.
  36. An ordinary personal computer that is connected to a network is a _______.
  37. The type of data where text, numbers, graphics, sound, and video have been converted into dexcrete digits.
  38. The human-readable version of a program is called _______.
    Programming Language
  39. The type of code that uses eight bits for each character is ________.
    Extended ASCII
  40. A powerful desktop computer used for high-performance task is a _____.
  41. An area of a computer that temporarily holds data waiting to be processed is ______.
  42. 1,024 bytes is a ____.
  43. A hacker posing as a legitimate representative of an official organization such as your bank is an example of _______.
  44. Digital imaging has had an effect in what areas?
    medicine, video, and photo processing
  45. A compute-intensive problem runs on a ______.
  46. ________ can be directly executed by the processors' circuitry.
    Machine language
  47. The ___ is a collection of linked documents, graphics, and sounds.
    Web (world wide web)
  48. A(n) _____ is a microprocessor-based computing device designed to meet the computing needs of an individual.
    personal computer
  49. A named collection of data that exists on a storage medium is known as (a) ________.
  50. Problems a hacker can cause after breaking into your computer include _______.
    applying for credit in your name, sending embarrassing e-mails, and apply for a mortgage using your data
  51. 1,048,576 bytes is a _______.
  52. In 1982, the percentage of households that had a computer was fewer than _____ percent.
  53. _________ does not require both parties to be online at the same time.
    bulletin boards
  54. In terms of an authentication protocol, the phrase 'something a person possesses' could refer to _______.
    an ID card
  55. In terms of an authentication protocol, the phrase 'something a person is' refers to a(n) ________.
    biometric device
  56. A ______ is a series of characters that becomes a person's unique identifier.
    user ID
  57. Initially sales were slow for the personal computer because of _______.
    price or lack of software?
  58. The first difital computers were built during World War II for ________.
    code breaking
  59. The _____ houses all essential chips and provides connecting circuitry between them.
    system board
  60. The ______ form an instruction specifies the data.
  61. A collection of preprogrammed activities such as addition, subtraction, counting, and comparison is called a(n) ______.
    instruction set
Card Set
CSIS 110 Ch1
Practice questions for chapter 1
Show Answers