Chapter 1 Flashcards
1,073,741,824 bytes is a ____.
Gigabyte
A powerful desktop computer used for high-performance tasks is a ____.
Workstation
The accompanying figure represents the instruction cycle. The third step is Box C and represents the ____.

execute instruction
Any method that confirms a person’s identity
Authentication Protocol
Part of the microprocessor that performs arithmetic operations
ALU
An area of the computer that temporarily holds data waiting to be processed, stored, or output.
Memory
The practice of copying a file from a remote computer to a local computer.
Download
The area where data can be left on a permanent basis when it is not immediately needed for processing.
Storage
Fetches each instruction
Control Unit
Stores user IDs with their corresponding password
Password Manager
Human-readable version of a program
Source Code
Provides codes for 65, 000 characters
Unicode
Unauthorized use and access to personal data
Identity Theft
Differentiates between uppercase and lowercase words
Case Sensitive
Another name for integrated circuit
Microchip
Digital devices can use ____ as a code to represent character data.
ASCII, Extended ASCII and EBCDIC.
A ____ attack uses password-cracking software.
Brute Force
Which is the highest resolution?
WQXGA
The term “form factor” refers to the size and dimensions of a component, such as a system board.
True
In the accompanying figure, the item marked B is a ____.

eSATA Port
Special high-speed memory that allows a microprocessor to access data more rapidly than from memory located elsewhere on the system board
CPU Cache
Number of colors a monitor can display
Color Depth
An area of the hard disk used by the operating system to store parts of programs and data files if a program exceeds its allocated RAM
Virtual Memory
High-capacity DVD technology that uses a blue-violet colored laser
Blu-ray