Compute - Short Answer
Essay by cicij • February 22, 2016 • Exam • 3,786 Words (16 Pages) • 1,705 Views
Short answer
Chapter1
1. Worker advocates object to the use of cheap __________ labor that displaces onshore employees.
Correct Answer(s): offshore
2. When someone gains unauthorized access to your personal data and uses it illegally, it is called _________ theft.
Correct Answer(s): identity
3. _________ data is represented using an infinite scale of values.
Correct Answer(s): Analog
4. A microprocessor is hard-wired to perform a preprogrammed set of activities, such as addition, subtraction, and counting. This set of activities is called a(n) __________ set.
Correct Answer(s): instruction
5. The ongoing process of social, political, and economic change brought about by digital technology is referred to as the digital _________.
Correct Answer(s): revolution
6. Images can be digitized by treating them as a series of colored ___________.
Correct Answer(s): dots
7. __________ is the illegal copying and distribution of copyrighted material.
Correct Answer(s): Pirating;Piracy
Correct Answer: True
8. The term instruction _________ refers to the process in which a computer executes a single instruction.
Correct Answer(s): cycle
9. Voice over IP, also called Internet ________, refers to voice conversations that are routed over the Internet, rather than over landlines or cellular phones.
Correct Answer(s): telephony
10. The second phase of the digital revolution materialized when the _________ was opened to public use.
Correct Answer(s): Internet
11. The ___________ was Time magazine's Machine of the Year in 1982.
Correct Answer(s): computer
12. A keyboard and mouse are examples of __________ devices, while a monitor is an example of an output device.
Correct Answer(s): input
13. ____________ protocol refers to any method that confirms a person's identity by using something the person knows, something the person possesses, or something the person is.
Correct Answer(s): Authentication
14. A(n) _______ has two rows of pins that connect the IC circuitry to a circuit board.
Correct Answer(s): DIP;dual in-line packages
15. A series of characters that verifies a user ID and guarantees that you are the person you claim to be is called a __________.
Correct Answer(s): password
16. C, Basic, COBOL, and Java are examples of high-level ________ languages.
Correct Answer(s): programming;programing
17. A machine code instruction has two parts: the op code and the __________.
Correct Answer(s): operand;operands
18. A(n) _________ is one or more collaborative documents that is posted on the Web and can be viewed and changed by users.
Correct Answer(s): Wiki
19. Short for Web logs, ________ are personal journals posted online for public access.
Correct Answer(s): blogs
20. A compiler converts all the statements in a program into ________ code.
Correct Answer(s): object
21. The _________ is a collection of linked documents, graphics, and sounds that can be accessed over the Internet.
Correct Answer(s): Web
22. An unsorted list is input to the computer, which processes it and produces a sorted list as __________.
Correct Answer(s): output
23. A keylogger is a form of malicious code called a(n) _________.
Correct Answer(s): Trojan horse;Trojan
24. When entering passwords, form fillers are not collecting your password from the keyboard; therefore, a hacker cannot secretly record your keystrokes by using a(n) __________.
Correct Answer(s): keylogger
25. A(n) __________ is a multipurpose device that accepts input, processes data, stores data, and produces output, all according to a series of stored instructions.
Correct Answer(s): computer
26. Transistors and integrated circuits, which we call computer ________, were key factors in making electronic devices increasingly smaller and less expensive.
Correct Answer(s): chips
27. A(n)_________ circuit is a super-thin slice of semiconducting material packed with microscopic circuit elements, such as wires and transistors.
Correct Answer(s): integrated
28. A group of 8 bits is called a(n) __________.
Correct Answer(s): byte
20. A(n) ___________ is sometimes called a computer-on-a-chip because it includes many of the elements common to computers.
Correct Answer(s): microcontroller;micro controller;micro-controller
30. Privacy encompasses ___________ - the expectation that personal information will not be collected or divulged without permission.
Correct Answer(s): confidentiality
31. Finland, whose flagship technology company is Nokia, is a world leader in __________ technology.
Correct Answer(s): wireless
32. __________ computers are typically used by businesses and government agencies to provide centralized storage, processing, and management for large amounts of data.
Correct Answer(s): Mainframe;Main frame;Main-frame
33.
...
...