OtherPapers.com - Other Term Papers and Free Essays
Search

Compute - Short Answer

Essay by   •  February 22, 2016  •  Exam  •  3,786 Words (16 Pages)  •  1,705 Views

Essay Preview: Compute - Short Answer

Report this essay
Page 1 of 16

Short answer

Chapter1

1. Worker advocates object to the use of cheap __________ labor that displaces onshore employees.

Correct Answer(s): offshore

2. When someone gains unauthorized access to your personal data and uses it illegally, it is called _________ theft.

Correct Answer(s): identity

3. _________ data is represented using an infinite scale of values.

Correct Answer(s): Analog

4. A microprocessor is hard-wired to perform a preprogrammed set of activities, such as addition, subtraction, and counting. This set of activities is called a(n) __________ set.

Correct Answer(s): instruction

5. The ongoing process of social, political, and economic change brought about by digital technology is referred to as the digital _________.

Correct Answer(s): revolution

6. Images can be digitized by treating them as a series of colored ___________.

Correct Answer(s): dots

7. __________ is the illegal copying and distribution of copyrighted material.

Correct Answer(s): Pirating;Piracy

Correct Answer: True

8. The term instruction _________ refers to the process in which a computer executes a single instruction.

Correct Answer(s): cycle

9. Voice over IP, also called Internet ________, refers to voice conversations that are routed over the Internet, rather than over landlines or cellular phones.

Correct Answer(s): telephony

10. The second phase of the digital revolution materialized when the _________ was opened to public use.

Correct Answer(s): Internet

11. The ___________ was Time magazine's Machine of the Year in 1982.

Correct Answer(s): computer

12. A keyboard and mouse are examples of __________ devices, while a monitor is an example of an output device.

Correct Answer(s): input

13. ____________ protocol refers to any method that confirms a person's identity by using something the person knows, something the person possesses, or something the person is.

Correct Answer(s): Authentication

14. A(n) _______ has two rows of pins that connect the IC circuitry to a circuit board.

Correct Answer(s): DIP;dual in-line packages

15. A series of characters that verifies a user ID and guarantees that you are the person you claim to be is called a __________.

Correct Answer(s): password

16. C, Basic, COBOL, and Java are examples of high-level ________ languages.

Correct Answer(s): programming;programing

17. A machine code instruction has two parts: the op code and the __________.

Correct Answer(s): operand;operands

18. A(n) _________ is one or more collaborative documents that is posted on the Web and can be viewed and changed by users.

Correct Answer(s): Wiki

19. Short for Web logs, ________ are personal journals posted online for public access.

Correct Answer(s): blogs

20. A compiler converts all the statements in a program into ________ code.

Correct Answer(s): object

21. The _________ is a collection of linked documents, graphics, and sounds that can be accessed over the Internet.

Correct Answer(s): Web

22. An unsorted list is input to the computer, which processes it and produces a sorted list as __________.

Correct Answer(s): output

23. A keylogger is a form of malicious code called a(n) _________.

Correct Answer(s): Trojan horse;Trojan

24. When entering passwords, form fillers are not collecting your password from the keyboard; therefore, a hacker cannot secretly record your keystrokes by using a(n) __________.

Correct Answer(s): keylogger

25. A(n) __________ is a multipurpose device that accepts input, processes data, stores data, and produces output, all according to a series of stored instructions.

Correct Answer(s): computer

26. Transistors and integrated circuits, which we call computer ________, were key factors in making electronic devices increasingly smaller and less expensive.

Correct Answer(s): chips

27. A(n)_________ circuit is a super-thin slice of semiconducting material packed with microscopic circuit elements, such as wires and transistors.

Correct Answer(s): integrated

28. A group of 8 bits is called a(n) __________.

Correct Answer(s): byte

20. A(n) ___________ is sometimes called a computer-on-a-chip because it includes many of the elements common to computers.

Correct Answer(s): microcontroller;micro controller;micro-controller

30. Privacy encompasses ___________ - the expectation that personal information will not be collected or divulged without permission.

Correct Answer(s): confidentiality

31. Finland, whose flagship technology company is Nokia, is a world leader in __________ technology.

Correct Answer(s): wireless

32. __________ computers are typically used by businesses and government agencies to provide centralized storage, processing, and management for large amounts of data.

Correct Answer(s): Mainframe;Main frame;Main-frame

33.

...

...

Download as:   txt (27.3 Kb)   pdf (204.8 Kb)   docx (21.3 Kb)  
Continue for 15 more pages »
Only available on OtherPapers.com