cpsc

Card Set Information

Author:
timmasoner
ID:
164603
Filename:
cpsc
Updated:
2012-07-31 16:34:31
Tags:
cpsc
Folders:

Description:
cpsc
Show Answers:

Home > Flashcards > Print Preview

The flashcards below were created by user timmasoner on FreezingBlue Flashcards. What would you like to do?


  1. Software that is distributed for free, but often with the condition that
    you pay for it if you like and intend to use it, is called
    shareware
  2. A wireless network uses which of the following as its transmission
    medium?
    radio waves
  3. The OS allows you to organize the contents of your computer in a
    hierarchical structure of
    directories
  4. By studying the data produced by ___   , scientists hope
    to improve the prediction of weather phenomena
    simulations
  5. Devices such as monitors and printers that are connected to the computer
    are called
    peripheral devices
  6. C:\Documents\Spring 2012\CIS 101\Term Paper\Computer Technology is an
    example of a
    file path
  7. The process of replacing repeated patterns of letters in a file with a
    shorter placeholder is called
    file compression
  8. Which type of software is used at colleges to keep track of student
    records
    database software
  9. is a special device that is
    installed in your
    computer and allows it
    to communicate with other devices on
    the network
    network adapter
  10. allows you to
    transfer media from your
    computer to other media devices (such as a
    plasma TV
    • digital media
    • adapter
  11. A webcast is
    • the broadcast of audio or
    • video content over the Internet
  12. The Internet backbone refers to
    • the main pathway of high-speed
    • communications lines through which all Internet traffic flows
  13. In a spreadsheet, the columns and rows form individual
    boxes called
    cells
  14. software is the set of programs that enables the computer's hardware devices and
    application software to work together.
    System
  15. keeps track of data packets and, in conjunction with network interface cards,
    helps the data packets find their destination without running into each other on
    an Ethernet network
    switch
  16. One way to increase security on a network is by installing a
    firewall
  17. is the nerve center of
    any digital home, allowing you to
    interface with the
    different digital
    devices connected to
    the network
    A computer
  18. On a Windows system, you can determine the amount of RAM by looking in the----window
    System Properties
  19. A network that has 10 or more nodes is usually configured as a
    • client/server
    • network
  20. The CPU consists of which two parts
    • the control unit and the
    • arithmetic logic unit
  21. Sophisticated networks generally use which of the following hardware
    devices to ease the flow of data packets throughout the network
    • routers and
    • switches
  22. The ________ is the maximum speed at which data can be transmitted between
    two nodes on a network
    data transfer rate
  23. manages the flow of data and information through the computer system by
    coordinating the hardware, software, user interface, processor, and system
    memory
    operating system
  24. E-commerce that involves businesses buying and selling goods and services
    to other businesses is called
    B2B
  25. is responsible for managing the processor and all other components of the
    computer system, and is an essential part of the operating system.
    kernel
  26. The small circuit boards that hold a series of RAM chips are called
    memory modules
  27. is data that has been organized or presented in a meaningful fashion
    Information
  28. CPU speed, also called clock speed, is measured in
    gigahertz
  29. The ________ of the operating system allows the user to communicate with
    the computer system
    user interface
  30. The CPU is connected to the system memory by the
    front side bus
  31. Client/server networks are controlled by a central server that runs a
    specialized piece of software called
    • a network operating system
    • (NOS
  32. When referring to hard drives, access time is measured in
    milliseconds
  33. is a field of study focused on information handling and retrieval of information
    automatically
    • Information
    • technology
  34. At a minimum, what content must all data packets contain
    • recipient's address, sender's
    • address, reassembling instructions, and data
  35. By using a(n) ________, individual Internet users are able to connect to
    their ISP.
    point of presence (POP
  36. ________ is an IP address that is assigned from an available pool of IP
    addresses.
    dynamic address
  37. A(n) ________ contains text that is linked to other documents or
    media.
    hypertext document
  38. The main paths of the Internet along which data travels the fastest are
    known collectively as the Internet
    backbone
  39. is the main suite of protocols used on the Internet.
  40. TCP/IP
  41. are high-speed, fiber-optic communications lines.
    OC lines
  42. com and .org are examples of
    top-level domains
  43. Packet ________ is a form of protection for your computer that looks at
    each packet that comes into your computer network
    screening
  44. (n) ________ server acts as a liaison between an intranet and the Internet.
    proxy
  45. A ________ is a set of rules that defines how information is exchanged on
    a network.
    protocol
  46. Which of the following devices are used to send data between two
    networks?
    routers
  47. A(n) ________ address is the address external entities use to communicate
    with your network.
    IP
  48. Which topology is the most commonly used client/server network topology
    today?
    star
  49. What do you call a group of data packets that are sent together?
    frame
  50. A ________ uses the public Internet communications infrastructure to build
    a secure, private network
    VPN (virtual private network
  51. In a database, a field is a
    • category of
    • information
  52. means that for each value in the foreign key of one table, there is a
    corresponding value in the primary key of another table.
    • Referential
    • integrity
  53. is the process of reducing data redundancy by recording data only once.
    Normalization
  54. SQL uses ________ to extract records from a database by using English-like
    expressions that have variables and operations
    relational algebra
  55. relationship indicates that for a record in one table, there can be many related
    records in another table.
    one-to-many
  56. When creating a database with a DBMS, you must create a description of the
    data called the
    data dictionary.
  57. Data ________ means that the data contained in a database is accurate and
    reliable.
    integrity
  58. database ________ instructs a database to search for particular pieces of data.
    query
  59. is the process of translating a task into a series of commands that a computer
    will use to perform that task.
    Programming
  60. During which phase of the system development life cycle are flowcharts and
    data-flow diagrams developed?
    design
  61. n) ________ error is caught when the program executes.
    runtime
  62. In object-oriented programming, ________ allows a new class to
    automatically pick up all the data and methods of an existing class
    inheritance
  63. enables users to define their own tags and facilitates exchange of information
    between Web sites.
    XML
  64. Structured Query Language (SQL) is an example of a
    • fourth-generation
    • language
  65. An alternative approach to systems development, called ________, makes use
    of a prototype at the beginning of the project.
    • rapid application development
    • (RAD
  66. In a ________ system, each step is dependent on the previous step being
    completed first
    waterfall
  67. The loop decision point consists of three features: an initial value, a
    set of actions to be performed, and a(n) _____
    test condition
  68. The language that the CPU understands, consisting of a sequence of bits,
    is called
    machine language
  69. Many ________ sold for home use are also configured as firewalls and are
    capable of performing network address translation (NAT
    routers
  70. makes broadband users more vulnerable to attacks.
    Static addressing
  71. SMS delivers messages to the appropriate mobile device using ________
    technology.
    store-and-forward
  72. To transfer files from your computer to a portable media player (PMP),
    most newer PMPs use a ________ port or a FireWire port
    USB 2.0
  73. A base transceiver station receives a request for cellular service and
    passes that request to a central location called a
    • mobile switching
    • center
  74. Flash memory, used by most MP3 players, is a type of
    nonvolatile memory
  75. Web content specially designed for viewing via a cell phone or smartphone
    is written in a format called
    WML (Wireless Markup Language
  76. Which of the following is specialized software made to display Web pages
    on a cell phone
    microbrowser
  77. Sophisticated networks generally use which of the following hardware
    devices to ease the flow of data packets throughout the network
    • routers and
    • switches
  78. One way to increase security on a network is by installing a
    firewall
  79. The unique number assigned to a network adapter by the manufacturer is
    referred to as the ________ address.
    MAC
  80. The ________ is the maximum speed at which data can be transmitted between
    two nodes on a network.
    data transfer rate
  81. A computer network is defined as two or more computers connected with
    ________ so that they can communicate with each other
    • software and
    • hardware
  82. A(n) ________ keeps track of data packets and, in conjunction with network
    interface cards, helps the data packets find their destination without running
    into each other on an Ethernet network
    switch
  83. Client/server networks are controlled by a central server that runs a
    specialized piece of software called
    • a network operating system
    • (NOS
  84. network that has 10 or more nodes is usually configured as a
    • client/server
    • network

What would you like to do?

Home > Flashcards > Print Preview