Introduction to Computing (M: 1 and 2) Flashcards

(273 cards)

1
Q

Offers a foundation that permits graduates to adapt to new technologies and new ideas.

A

Computer Science

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Concerned with the information that computer systems can provide to aid a company, non-profit or governmental organization in defining and achieving its goals.

A

Information Systems

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

As a name of an undergraduate degree program, it refers to the preparation of students to meet the computer technology needs of business, government, healthcare, schools, and other kinds of organization.

A

Information Technology (IT)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Department in business or government agency that employs people in computer-related jobs.

A

IT Department

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

What career does E-commerce administrator belong to?

A

Management

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What career does Help desk specialist belong to?

A

Training

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

What career does Technical writer belong to?

A

System development and programming

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Manufacturers and distributors of computers and computer-related hardware.

A

Computer equipment field

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Companies that develop, manufacture, and support software.

A

Computer software field

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Someone that analyzes requirements, designs solutions, and oversees software development process.

A

Project leader

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

Someone who writes and tests computer programs.

A

Programmer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Someone who designs and develops software.

A

Software engineer

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Someone who researches, invents, and develops solutions to complex software problems.

A

Computer scientist

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Provides preventative maintenance, component installation, and repair services.

A

Computer service and repair field

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Someone who installs, maintains, and repairs hardware.

A

Computer technician

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

They need general understanding of computers and specific knowledge of the product they are selling.

A

Computer sales people

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Individual who draws upon expertise in specialized area of computers.

A

IT consultant

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Programs that emphasize technical knowledge and skills

A

Computer information systems (CIS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Programs that stress the theoretical side of programming and operating systems.

A

Computer science (CS)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Teaches students how to design and develop the electrical components found in computers and peripheral devices.

A

Computer engineering (CE)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

A collection of people with common computer equipment of software interests.

A

User group

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

Process of verifying technical knowledge in a particular area.

A

Certification

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is acknowledged with a certificate.

A

Proficiency

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

This provides access to technical information, advanced training, and discounts on publications and tools.

A

Vendors

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
How does certification benefit customers?
Receiving better service from employees with certification.
26
Sometimes called end-user certifications.
Application software certifications
27
Holders of what certificate are considered highly credible during computer crimes cases?
Computer forensics certifications
28
Discovery, collection, and analysis of evidence found on computers and networks.
Computer forensics
29
Focus on particular skills --- user operator, system administrator, and system engineer.
Operating systems certifications
30
Awarded to professionals who demonstrate expertise in planning, installing, managing and troubleshooting a network.
Networking certifications
31
Measure a candidate's ability to identify and control security risks to computer resources.
Security certifications
32
Awarded for knowledge of a specific database management system.
Database system certifications
33
Refers to computer systems built to mimic human intelligence and perform tasks such as recognition of images, speech, or patterns and decision making.
Artificial Intelligence
34
It is a subset of AI
Machine Learning
35
These are some subsets of Machine Learning.
Neural networks, natural language processing (NLP) and Deep learning
36
It is the use of software to automate business processes and repetitive tasks that people used to do.
Robotic Process Automation (RPA)
37
It can be described as data you can only add to, not take away from or change and are consensus-driven so no one entity can take control of the data.
Blockchain
38
Designed to help solve some problems of cloud computing as a way to bypass the latency caused by cloud computing and getting data to a data center for processing.
Edge computing
39
This immerses the user in an environment.
Virtual Reality
40
This enhances their environment.
Augment Reality (AR)
41
This enables devices, home appliances cars and much more to be connected to and exchange data over the Internet.
IoT
42
It is an electronic device, operating under the control of instructions stored in its own memory.
Computer
43
It can perform all of its input, processing, output and storage activities by itself.
Personal computer
44
They help to keep people informed about the latest developments in the computer industry.
Computer industry publications
45
This department directs the planning, research, development, evaluation, and integration of technology.
Management
46
This department analyzes, designs, develops, and implements new information technology and maintains and improves existing systems.
System development and programming
47
This department evaluates and integrates new technologies, administers the organization's data resources, and supports the centralized computer operating system and servers.
Technical services
48
This department operates the centralized computer equipment and administers the network, including both data and voice communications.
Operations
49
This department teaches employees how to use components of the information system or answers specific questions.
Training
50
This department develops and enforces policies designed to safeguard data and information from unauthorized users.
Security
51
The four primary ways to current with computer technology and trends.
1.) Professional organizations and personal networks. 2.) Professional growth and continuing education activities. 3.) Computer publications and Web sites. 4.) Certification.
52
It is a scientific and educational organization dedicated to advancing knowledge and proficiency of information technology.
Association for Computing Machinery (ACM)
53
It is a professional association of programmers, systems analysts, and information processing managers.
Association of Information Technology Professionals (AITP)
54
It involves having current knowledge and understanding of computers and their users.
Computer literacy
55
A collection of unprocessed items, which includes text, numbers, images, audio, and video.
Data
56
Conveys meaning and is useful to people.
Information
57
The electric, electronic, and mechanical components of a computer called....
Hardware
58
Allows you to enter data or instructions into a computer.
Input device
59
Conveys information to one or more people.
Output device
60
A case that contains the electronic components of a computer that are used to process data.
System Unit
61
It records and retrieves items to and from storage media.
Storage device
62
It enables a computer to send and receive data, instructions, and information to and from one or more computers.
Communications device
63
Anyone who communicates with a computer or utilizes the information it generates.
User
64
A collection of computers and devices connected together.
Network
65
A series of related instructions, organized for a common purpose.
Software
66
Two types of software.
System and Application
67
It is a personal computer you can carry from place to place.
Mobile computer
68
A computer small enough to fit on your lap.
Laptop or notebook computer
69
A computing device small enough to hold in your hand.
Mobile device
70
A mobile computing device designed for single player or multiplayer games.
Game console
71
It controls access to the hardware, software, and other resources on a network and provides a centralized storage area for programs, data, and information.
Server
72
A large, expensive, powerful computer that can handle hundreds or thousands of connected users simultaneously.
Mainframe
73
Fastest, most powerful computers that are capable of processing more than one quadrillion instructions in a single second.
Supercomputer
74
A special-purpose computer that functions as a component in a larger product.
Embedded computer
75
What standard game consoles use as an input device.
Handheld controller
76
Provides personal information management functions such as a calendar, an appointment book, address book, a calculator and a notepad.
PDA or personal digital assistant
77
A special type of notebook computer that allows you to draw or write on the screen using a digital pen.
Tablet PC
78
Smartphones are ___________ that usually also provides personal information management.
Internet-enabled
79
A mobile electronic device that is designed primarily for the purpose of reading digital e-books and periodicals.
E-reader
80
A handheld computer is sometimes referred to as an _______.
Ultra-Mobile PC (UMPC)
81
Most major corporations use _________ for business activities.
Mainframes
82
The most ancient calculating device known.
Abacus
83
An extremely complex rule that functions as an analog computer.
Slide Rule
84
Uses a chain of punch cards to instruct the loom on how to make intricate textiles. Invented by Joseph Marie Jacquard.
Jacquard Loom
85
The Father of Computer
Charles Babbage
86
Considered to be the concept for the general mechanical Computer.
Analytical engine
87
Used by the First Generation of Computers. Are glass tubes with circuits inside and had no air or gas inside.
Vacuum Tubes
88
meaning of UNIVAC
Universal Automatic Computer
89
First instance of a computer bug was a....
Moth
90
Used by Second Generation of Computers. Used to control the amount of current or voltage or used for amplification/modulation or switching of an electronic signal.
Transistors
91
What date were Transistors invented?
December 23, 1947
92
Used by the Third Generation of Computers
Integrated circuits
93
Used by the Fourth Generation of Computers
Microprocessor
94
involves reducing the electricity consumed and environmental waste generated when using a computer.
Green computing
95
This is used to interact with the software using text, graphics and visual images such as icons. by
A GUI or graphical user interface
96
It controls how you enter data and instructions and how information is displayed on the screen.
User Interface
97
The process of setting up software to work with the computer, printer, and other hardware.
Installing
98
Refers to the use of computers to assist with manufacturing processes such as fabrication and assembly.
Computer-aided manufacturing (CAM)
99
A family member who uses a computer for a variety of reasons.
Home user
100
It includes any company with fewer 50 employees.
A small office/home office (SOHO)
101
Employees and students who work on a computer while away from a main office, home office or school.
Mobile users
102
Uses a workstation or other powerful computer to work with industry-specific software.
Power user
103
Works in or interacts with a company with many employees and uses a computer and computer network that processes high volumes of transactions in a single day.
Enterprise user
104
In finance, People use computers for __________
online banking/online investing
105
This is a case that contains electronic components of the computer used to process data.
system unit
106
This is the main circuit board of the system unit
motherboard
107
It is a small piece of semiconducting material, usually silicon, on which integrated circuits are etched.
computer chip
108
This interprets and carries out the basic instructions that operate a computer.
central processing unit (CPU / processor
109
Processors contain a ___________ that directs and coordinates most of the operations in the computer.
control unit
110
It performs arithmetic, comparison, and other operations.
arithmetic logic unit (ALU)
111
get an instruction from Main Memory
fetching
112
translate it into computer commands
decoding
113
actually process the command
executing
114
write the result to Main Memory
storing
115
This is a set of four basic operations that the processor repeats for every instruction.
machine cycle
116
A processor contains small high-speed storage locations called ________.
registers
117
One gigahertz (GHz) equals
one billion ticks
118
On _________________, electronic components and most storage devices are part of the system unit and other devices, such as the keyboard, mouse, and monitor, normally occupy space outside the system unit.
desktop personal computers
119
To fit in notebook and many handheld computers, the keyboards usually are
smaller and have fewer keys
120
Hard copy is called a _____________
printout
121
____________ uses devices that emit and sense light to detect movement.
Optical mouses
122
the inflexible, circular platters on _______ use magnetic particles to store data, instructions, and information on a disk’s surface.
Hard Disks
123
A ____________ which is contained on an integrated circuit, can act as an electronic switch that opens or closes the circuit for electrical charges.
transistor
124
Some computers improve hard disk access time by using a
disk cache
125
It is a flash memory storage device that plugs in a USB port on a computer or portable device.
USB drive
126
Each tick of the system clock equates to a
clock cycle
127
An ________________, which is etched on a computer chip, contains many microscopic pathways capable of carrying electrical current.
integrated circuit
128
They are special keys programmed to issue commands to a computer.
Function Keys
129
Optical discs usually are _______________.
4.75 inches in diameter and less than one-twentieth of an inch thick.
130
It is a self-contained unit that you insert in and remove from a slot or USB port in a device or a computer.
Pocket hard drive
131
This controls the timing of all computer operations.
system clock
132
The pace of the system clock is called the
clock speed
133
It consists of electronic components that store instructions waiting to be executed by the processor, data needed by those instructions, and the results of processing the data.
Memory
134
Loses its contents when the power is turned off.
Volatile memory
135
This is a type of random-access memory that stores each bit of data in a separate capacitor within an integrated circuit.
Dynamic RAM
136
has three different states. It can be in: standby (the circuit is idle), reading (the data has been requested) and writing (updating the contents).
Static RAM
137
Data in MRAM is not stored as electric charge or current flows, but by magnetic storage elements.
Magnetoresistive RAM
138
RAM chips usually reside on a ______________ and are inserted into memory slots.
memory module, memory slots
139
The amount of ____ necessary in a computer often depends on the types of software you plan to use.
RAM
140
This speeds the processes of the computer because it stores frequently used instructions and data.
Memory cache
141
It refers to memory chips storing permanent data and instructions.
Read-only memory (ROM)
142
It can be erased electronically and rewritten.
Flash memory
143
It is a non-volatile storage device which stores digitally encoded data on rapidly rotating platters with magnetic surfaces.
hard disk drive
144
It is an optical disc storage media format.
DVD
145
It is an optical disc storage medium to supersede the standard DVD format. Its main uses are for storing PlayStation 3 games, high-definition video and data storage with up to 50GB per disc.
Blu-ray Disc
146
It consists of a NAND-type flash memory data storage device integrated with a USB interface.
USB flash drive
147
It is a solid-state electronic flash memory data storage device capable of storing digital contents.
memory card or flash memory card
148
The __________, of a number system is the total number of unique symbols available in that system.
radix or base
149
The octal number system has a base, or radix, of ___
8
150
Binary number system has a base, or radix, of ___
2
151
Binary numbers are composed of two symbols: _____
0 and 1
152
The hexadecimal number system has a base, or radix, of ___
16
153
Hexadecimal numbers are composed of
sixteen symbols
154
consists of the programs that control or maintain the operations of the computer and its devices.
System software
155
Two types of system softwares
Operating systems and Utility programs
156
a set of programs containing instructions that work together to coordinate all the activities among computer hardware resources
operating system (OS)
157
The process of starting or restarting a computer
booting
158
Turning on a computer that has been powered off completely
Cold boot
159
Using the operating system to restart a computer
Warm boot
160
It is the drive from which your computer starts
boot drive
161
saves any open documents and programs to RAM, turns off all unneeded functions, and then places the computer in a low- power state
Sleep mode
162
saves any open documents and programs to a hard disk before removing power from the computer
Hibernate
163
It controls how you enter data and instructions and how information is displayed on the screen
user interface
164
With this, you interact with menus and visual images
graphical user interface (GUI)
165
The operating system determines the order in which tasks are processed
task scheduling
166
automatically configures new devices as you install them.
Plug and Play
167
a program that assesses and reports information about various computer resources and devices.
performance monitor
168
It is a complete operating system that works on a desktop computer, notebook computer, or mobile computing device
stand-alone operating system
169
It resides on a ROM chip on a mobile device or consumer electronic device.
embedded operating system
170
It is a type of system software that allows a user to perform maintenance-type tasks
utility program
171
detects and protects a personal computer from unauthorized intrusions
personal firewall
172
It describes a potentially damaging computer program that affects a computer negatively.
virus
173
It copies itself repeatedly in memory or over a network
worm
174
It hides within or looks like a legitimate program
Trojan horse
175
It protects a computer against viruses
antivirus program
176
It is a program placed on a computer without the user’s knowledge that secretly collects information about the user
Spyware
177
It displays an online advertisement in a banner or pop-up window
Adware
178
For email spams
Anti-spam programs
179
It consists of programs designed to make users more productive and/or assist with personal tasks
Application software
180
It is application software that assists people while performing business activities
Business software
181
An organized collection of information which can easily be retrieved
database
182
allows users to create, access, and manage a database
Database software
183
allows users to create visual aids for presentations to communicate ideas, messages, and other information to a group
Presentation software
184
is a Web site that allows users to access and interact with software from any computer or device that is connected to the Internet
Web application
185
refers to a collection of multiple pieces of equipment involved in the dissemination of information.
information system (IS)
186
Common types of information systems
* Transaction processing systems * Management information systems * Decision support systems * Executive information systems
187
Six elements of a Computer Based Informations System (CBIS)
* Hardware * Software * Data * Procedures * People * Communication
188
It refers to the computers themselves, along with any and all peripherals, including servers, routers, monitors, printers and storage devices.
Hardware
189
It tells the hardware how to function. It gathers, organizes and manipulates data and carries out instructions.
Software
190
This is the information part of an information system, and whether that is statistical data, sets of instructions, lists of names or even graphics and animations, it is all key to a CBIS.
Data
191
Frequently covered in instruction or user manuals that describe how to use the hardware, software and data.
Procedures
192
Individuals who design and operate the software, input the data, build the hardware and keep it running, write the procedures and it is ultimately people who determine the success or failure of a CBIS.
People
193
The components that allow one computer to communicate with another are hardware and are controlled by software.
Communication
194
It is related for a specific purpose or topic.
Set of data
195
A list of related information in columns and rows
Table
196
It is a database object that can be used to extract or show information in Datasheet view.
Query
197
It is a database object that you can use to enter, edit, or display data from a table or a query.
Forms
198
It is another database object which can be use to summarize information from a table or query.
Report
199
It can be used to create an action or set of actions that can be used to automate a task.
Macros
199
It is a field or set of fields in your table that acts as a unique identifier for every row.
Primary Keys
199
It is a situation that exists between two relational database tables when one table has a foreign key that references the primary key of the other table.
Relationships
200
It exist when a primary record from the primary table has only one related record in the related table.
One-to-One relationship
201
It exist when a primary record from the primary table is related to many records in the related table.
One-to-Many relationship
202
It exist when a primary record from the primary table is related to many records in the related table AND a related record in the related table is also related to many records in the primary table.
Many-to-Many relationship
203
Drawbacks of using file systems to store data
Data redundancy and inconsistency Difficulty in accessing data Data isolation Integrity problems Atomicity of updates Concurrent access by multiple users Security problems
204
It is a group of computer systems and other computing hardware devices that are linked together through communication channels to facilitate communication and resource-sharing among a wide range of users.
computer network
205
The arrangement of a network which comprises of nodes and connecting lines via sender and receiver
Network Topologies
206
It is a network type in which every computer and network device is connected to single cable.
Bus topology
207
It forms a ring connecting all devices with its exactly two neighboring devices.
Ring topology
208
All the devices are connected to a single hub through a cable.
Star topology
209
every device is connected to another device via particular channel.
Mesh topology
210
It is a collection of two or more topologies which are described above.
Hybrid topology
211
It is a worldwide collection of networks that links millions of businesses, government agencies, educational institutions, and individuals.
Internet
212
ARPANET
(Advanced Research Project Agency Network)
213
It oversees research and sets guidelines and standards
World Wide Web Consortium (W3C)
214
It is a business that provides individuals and organizations access to the Internet free or for a fee
access provider
215
It is a number that uniquely identifies each computer or device connected to the Internet
IP address
216
It is the text version of an IP address
domain name
217
It translates the domain name into its associated IP address
DNS server
218
It consists of a worldwide collection of electronic documents (Web pages)
World Wide Web
219
It is a collection of related Web pages and associated items
Web site
220
It is a computer that delivers requested Web pages to your computer
Web server
221
It allows users to access Web pages and Web 2.0 programs
Web browser
222
It is the first page that a Web site displays
home page
223
It is the process of receiving information
Downloading
224
Unique address for a web page
URL or Web address
225
It allows you to open and view multiple Web pages in a single Web browser window
Tabbed browsing
226
search engine
227
Refers to any application that combines text
Multimedia
228
It is a digital representation of nontext information
graphic
229
It is a small version of a larger graphic
thumbnail
230
It is the appearance of motion created by displaying a series of still images in sequence
Animation
231
It includes music, speech, or any other sound
Audio
232
It is the process of transferring data in a continuous and even flow
Streaming
233
consists of images displayed in motion
Video
234
It is the use of computers to simulate a real or imagined environment that appears as a three-dimensional space
Virtual reality (VR)
235
It is a program that extends the capability of a Web browser
plug-in
236
It is the development and maintenance of Web pages
Web publishing
237
It is the transmission of messages and files via a computer network
E-mail
238
It allows you to create, send, receive, forward, store, print, and delete e-mail messages
e-mail program
239
It enables users to speak to other users over the Internet
VoIP
240
It is the code of acceptable Internet behavior
Netiquette
241
Action that causes loss of or damage to computer system.
computer security risk
242
Identifies and removes computer viruses
antivirus program
243
Makes a network or Internet transmission appear legitimate
spoofing
244
Unique combination of characters that identifies user
user name
245
It is private combination of characters associated with the user name that allows access to computer resources
Password
246
personal identification number (PIN)
247
Authenticates person’s identity using personal characteristic
biometric device
248
It is act of stealing computer equipment
Hardware theft
249
It is act of defacing or destroying computer equipment
Hardware vandalism
249
Act of stealing or illegally copying software or intentionally erasing programs
software theft
250
It is illegal duplication of copyrighted software
Software piracy
251
Single-user license agreement allows user to install software on one computer, make backup copy, and sell software after removing from computer
license agreement
252
Process of converting plaintext (readable data) into ciphertext (unreadable characters)
encryption
252
unwanted electrical signal
Noise
253
drop in electrical supply
undervoltage
254
significant increase in electrical power
Overvoltage or power surge
255
Protects computer and equipment from electrical power disturbances
surge protector
256
In case of system failure or corrupted files
restore files by copying to original location
257
duplicate of file. program, or disk
backup
258
Moral guidelines that govern use of computers and information systems
computer ethics
259
rights to which creators are entitled for their work
Intellectual property rights
260
Written guideline that helps determine whether computer action is ethical
code of conduct
261
Right of individuals and companies to deny or restrict collection and use of information about them
information privacy
262
Small file on your computer that contains data about you
cookie
263
It is unsolicited e-mail message sent to many recipients
Spam
264
Scam in which a perpetrator sends an official looking e-mail that attempts to obtain your personal and financial information
phishing
265
Process of restricting access to certain material
content filtering
266
Discovery, collection, and analysis of evidence found on computers and networks
computer forensics
267
when computer consumes entire social life
Computer addiction
268
eye and vision problems
Computer vision syndrome
269
Applied science devoted to comfort, efficiency, and safety in workplace
ergonomics