Midterm Flashcards

(82 cards)

1
Q

What is “Phishing” also known as?

A

A special category of spam specifically created to defraud or commit identity theft.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which RAID level uses Disk mirroring without parity?

A

RAID 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following is the fastest dynamic memory?
50 nanosecond
60 nanosecond
70 nanosecond
80 nanosecond

A

50 nanosecond

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

My laptop has 16 GB of RAM. What type of RAM am I using for my laptop?
Static RAM
Dynamic RAM
BIOS RAM
None of the above

A

Dynamic RAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The first sector of a hard drive is
MBR (Master Boot Record)
NTFS (New Technology File System)
Ext4 (Extended 4)
FAT32 (File Allocation Table 32)

A

MBR (Master Boot Record)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a Swap partition in the Windows or Linux OS?

A

It is part of the hard drive that works like memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

T/F - When one uses the term disc, it means the data was stored magnetically on the DVD.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

SSDs delete data in _____

A

Blocks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The storage with the fastest access time

A

Register

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which type of RAM is used in Cache Memory?

A

SRAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is IRQ?

A

A number assigned to a device (such as a mouse, keyboard, etc)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following scam asks you for upfront cash?

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

IDE hard drive has ___ pins and SATA hard drive has ___ pins

A

IDE 40, SATA 7

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Today Windows 10 operating system uses _____ file system

A

NTFS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

One of the best ways a company can prevent itself from becoming a victim of a spear-phishing
attack is to:

A

Educate Employees

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

I have a 16-bit game (wolf stein). I want to play it on my Windows 10 OS. Which of the
following virtualization technique allows me to run this game?
Emulator
Linux os
Bare metal (Type 1)
Hosted (Type 2)

A

Emulator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which of the following symbols is sudo prompt?
Mike~$
Mike~#
Mike~S
Mike#s

A

Mike~$

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the command to make a partition in Linux?

A

Fdisk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

In Linux, the operating system / (Forward slash) is considered as

A

Root

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which of the following partition is bootable?
Primary
Extended
Logical
All of the above

A

Primary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

In a Windows environment, you can have_______, ______, _______ partitions

A

3 Primary, 1 extended, 24 logical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A programming language is usually split into two components of _______ (form) and
_________

A

Syntax and Semantics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is the letter to create a partition in Linux?

A

N

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Linux ______ your password when you are typing it in the terminal.

A

Doesn’t show

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Name two types of Hypervisor.
Host, Bare Metal
26
What 2 things does the Hypervisor usually control?
CPU, Memory
27
Windows 10 uses the ____ file system
NTFS
28
The command for file attribute is:
Attrib
29
Which of the following characters cannot be used in a Windows file name? $ 0 (a zero) ! >
>
30
Please choose four file attributes. A B H R S
A, H, R, S
31
What key combinations do you hold down to display the System menu for the active Window? ALT+TAB ALT+ESC ALT+ENTER ALT+SPACEBAR
ALT+SPACEBAR
32
T/F - Viruses and Worms require user interaction to infect the initial host.
False
33
Electronic recycling is also known as _______.
Urban Mining
34
What is a core processor?
A physical processing unit runs independently from each other within a CPU.
35
What is Defragmenting?
Defragmenting: this is a way to organize the scattered files on the platter (HDD) for faster reading.
36
According to the lecture, which operating system came first?
Unix
37
Which 2 of the following would characterize DOS operating system? GUI 16 bit 32 bit Single task
16 bit Single task
38
Which device uses a lithium battery
the BIOS
39
T/F - Color Depth: the number of color values that can be assigned to a single pixel in an image
True
40
In computer programming, a floating point is a ____ with a ______
Real number with a decimal ie. 3.15
41
a bit is the most ___ ____ of information
Basic Unit
42
a byte is the smallest possible ______ unit of computer storage
Addressable
43
a _____ is a contiguous group of bytes contiguous - next or together in sequence
Word
44
Word sizes of __, __, or __ bits are most common
16, 32, 64
45
In a ____ _______ system, a word is the smallest addressable unit of storage
Word Addressable
46
A group of 4 bits is called a
Nibble
47
Two nibbles create a
Byte
48
The two nibbles in a byte are split by
High order and low order
49
a _____ _____ is the symbol used in numerical representations to separate the integer part of a number from its fractional part
Radix point
50
A floating point is a number with
a decimal or "fractional part"
51
Single precision 754 is a __ ___number while Double precision 754 is a __ ___number
32 bit, 64 bit
52
The range of a floating point is
the largest and smallest values that can be expressed
53
Precision of a floating point is
the amount of information we have about a value. In other words, the amount of decimal places are at the end of a given measurement. "the floating point is precise to the nth decimal place"
54
Precision of a floating point is
the amount of information we have about a value. In other words, the number of decimal places that are at the end of a given measurement. "The floating point is precise to the nth decimal place"
55
The accuracy of a floating point is
how closely a numeric representation approximates a true value
56
Floating point overflow is when
there is no room to store the high-order bits resulting from a calculation
57
Underflow occurs when a value is
too small to store, possibly by resulting from division by 0
58
Unsigned numbers only store ______ numbers, not ______ numbers
positive, not negative
59
Signed numbers either use a ____ (__) or can be _________ between negative values and positive values Examples:
flag (bit), distinguished Examples: +25 or [0]11001 [] added for visuals
60
+7 signed vs unsigned
0111 vs 111
61
2 and 6 in 3 bit signed form
0010 and 0110
62
-2 and -6 in 3 unsigned form
1010 and 1110
63
To represent negative values, computer systems allocate the ____ _____ bit to indicate the sign of a value
high order
64
The high order bit is the ____ ____ bit in a byte
left most
65
The high order bit is also called ____ ___________ bit
Most significant bit
66
+3 and -3 In 8 bit signed magnitude
000000011 and 10000011
67
Computers perform arithmetic operations on signed magnitude numbers in a similar to humans, how?
by ignoring the sign of the operands, doing the calculation, then applying the appropriate sign afterwards
68
2 disadvantages of signed magnitude
1. Despite being easy for people, difficult for computers (requires complicated hardware) 2. Allows 2 different representations of 0, positive and negative 0
69
Instead of signed magnitude, computers employ _______ ______
complement systems
70
Positive and negative 0 causes
Hardware issues
71
+0 and -0 in 3 bit signed form
000 and 100
72
In signed magnitude you add a _ to the ___ if the number is positive
0 to the MSB
73
In signed magnitude you add a _ to the ___ if the number is negative
1 to the MSB
74
In one's complement if the number is positive, convert it to ______ then add a _ for the sign bit
Binary, add a 0
75
In one's complement if the number is negative, convert to binary, add a _, then _____ the bits _______
add a 0, then flip the bits opposite Ex. 45 = 0101101 -45 = 1010010
76
7 vs -7 in 8 bit one's complement
00000111 vs 11111000
77
Complement systems are useful because they eliminate the need for ________
Subtraction
78
The disadvantage of one's complement is that it still has 2 representations of
0, positive and negative 0
79
000 in binary translates to ___ in one's complement
111
80
111 in binary translates to ___ in one's complement
000
81
In two's complement, convert it to binary and add _ for the sign bit
0
82
Continue from slide 60