CSIS 110 Ch1
Card Set Information
CSIS 110 Ch1
csis 110 ch1
Practice questions for chapter 1
The binary number 10 represents _______ in the decimal number system.
The master controller for all activities that take place within a computer is ________.
Name the four steps of the instruction cycle.
1. fetch instruction
2. interpret instruction
3. execute instruction
4. increment pointer
A set of computer programs that helps a computer monitor itself and function more efficiently is ________.
______ is the process of converting text, numbers, sound, photos, and video into data that can be processed by digital devices.
A group of computers linked by wired or wireless technology is a(n) ________.
The ______ is a command word for an operation suck as add, compare, or jump.
The type of code that uses only seven bits for each character is ______.
A(n) ______ converts and executes one statment at a time.
A ______ attack uses password-cracking software.
_____ is/are a form of asynchronous communications.
_______ intercepts information set over a network.
Digital devices can use ________ as a code to represent character data.
ASCII, Extended ASCII, and EBCDIC
A super-thin slice of semiconduction material packed with microscopic circuit elements is a(n) ________.
Storage is typically expressed as ______.
An electronic component that can be programmed to perform tasks is a ______.
Technology ______ is a process by which several different technologies with distinct functionality evolve to form a single product.
_______ provide a space for interacting and communication via e-mail, blogs, chat, and post.
Online social networks
Key factors in making electronic device increasingly smaller and less expensive include _______.
A set of computer programs that helps a person carry out a task is ______.
1,073,741,824 bytes is a ____.
A computer is a multiple purpose device that can store data, process data, accept input but NOT _______.
Password management functions include generating passwords, tracking passwords, providing password strength, but NOT _______.
The ______ is the part of the microprocessor that performs arithmetic operations.
A chip carrier that has a row of pins running along the two sides.
DIP (dual inline package)
Data transmission speeds are typically expressed as _____.
In a computer, most procession takes place in _____.
_______ tools cloak a person's identity online.
C, BASIC, COBOL, and Java are examples of _____ programming languages.
More than ______ percent of cameras sold today are digital.
A chip carrier that has multiple pins running along all sides.
PGA (pin grid array)
A term which can refer to a person who manipulates computers with malicious intent is a _______.
black hat, cracker, and hacker
In terms of an authentication protocol, the phrase 'something a person knows' refers to ______.
The type of data uses an infinite scale of values.
_____ is a term that refers to entities that exist largely within computer networks.
An ordinary personal computer that is connected to a network is a _______.
The type of data where text, numbers, graphics, sound, and video have been converted into dexcrete digits.
The human-readable version of a program is called _______.
The type of code that uses eight bits for each character is ________.
A powerful desktop computer used for high-performance task is a _____.
An area of a computer that temporarily holds data waiting to be processed is ______.
1,024 bytes is a ____.
A hacker posing as a legitimate representative of an official organization such as your bank is an example of _______.
Digital imaging has had an effect in what areas?
medicine, video, and photo processing
A compute-intensive problem runs on a ______.
________ can be directly executed by the processors' circuitry.
The ___ is a collection of linked documents, graphics, and sounds.
Web (world wide web)
A(n) _____ is a microprocessor-based computing device designed to meet the computing needs of an individual.
A named collection of data that exists on a storage medium is known as (a) ________.
Problems a hacker can cause after breaking into your computer include _______.
applying for credit in your name, sending embarrassing e-mails, and apply for a mortgage using your data
1,048,576 bytes is a _______.
In 1982, the percentage of households that had a computer was fewer than _____ percent.
_________ does not require both parties to be online at the same time.
In terms of an authentication protocol, the phrase 'something a person possesses' could refer to _______.
an ID card
In terms of an authentication protocol, the phrase 'something a person is' refers to a(n) ________.
A ______ is a series of characters that becomes a person's unique identifier.
Initially sales were slow for the personal computer because of _______.
price or lack of software?
The first difital computers were built during World War II for ________.
The _____ houses all essential chips and provides connecting circuitry between them.
The ______ form an instruction specifies the data.
A collection of preprogrammed activities such as addition, subtraction, counting, and comparison is called a(n) ______.