Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

Computer Science Fundamentals: Hardware, Software, and Networking, Exams of Nursing

A comprehensive overview of various aspects of computer science, including hardware, software, networking, and security. It covers topics such as all-in-one computers, the program development life cycle, android operating systems, ram and storage considerations for laptops and tablets, file extensions, virus infections, management information systems (mis), information systems (is) program managers, electronic data interchange, integral, rfid systems, intrusion detection systems (ids), viruses, web apps, color depth, monitor pixels, video teleconferencing applications, dslr cameras, input devices, and fingerprint detection methods. It also discusses concepts like ajax, wpa, file compression, lossless compression, and geo-tagging.

Typology: Exams

2023/2024

Available from 04/23/2024

maish-daniel
maish-daniel 🇺🇸

1.3K documents

1 / 16

Toggle sidebar

Related documents


Partial preview of the text

Download Computer Science Fundamentals: Hardware, Software, and Networking and more Exams Nursing in PDF only on Docsity! CGS 1060 Final Exam Questions with Answers Latest Update 2024 Test the amount of data that defines each color in a pixel is called _____________ - Correct answer color depth designed to stay on a desk; provides a large monitor but takes up less space than a desktop computer - Correct answer all-in-one computer there are several ways to rename a folder in windows. which of these would work? - Correct answer -on the command bar, click organize and then click rename -click the folder icon and press F2 to activate the edit mode -right click a folder, then click rename which of the following should be considered when choosing an ISP? - Correct answer - how many users will be logged on my network at the same time? -will users be streaming data? -what ISP choices are available in my area? what was the major question that Arpanet wanted to solve? - Correct answer could a network be built that would continue to work even if multiple parts collapsed? select the statements that are true regarding switches - Correct answer -switches connect computers and other devices within a network -switches are usually integrated in the routers of home networks -switches ensure that correct data is transferred to and from the appropriate devices in networks select the statements that are true regarding satellite internet service - Correct answer -uses microwaves to deliver service -provides broadband service virtually anywhere -customers usually purchase a date plan that limits uploading and downloading the world wide web was created through a collaboration led by _________ - Correct answer Tim Berners-Lee select the common internet transmission media: - Correct answer -coaxial cable -telephone wire -cell phone radio waves software applications that allow users to access and surf the world wide web are called _______________ - Correct answer browsers select the statements that are true regarding cable internet service: - Correct answer - uses the same coaxial cable that brings the cable television signal -usually has more bandwidth than DSL lines -internet service can often be bundled with television service select the statements that describe a computer programmer’s algorithm - Correct answer -written in a natural language such as English -written in the form of a flowchart so that it will be more easily converted into a programming language a set of programs that allow data to be exchanged on a website without changing the websites display is _______________` - Correct answer AJAX (asynchronous JavaScript and xml) place the steps of the program development life cycle in the correct order - Correct answer 1. defining the problem 2. creating a plan 3. writing the code 4. debugging the code 5. testing the code select the characteristics of a traditional hard drive - Correct answer -uses magnetic charges to store data -has a read/write head to detect magnetic charges -has physically moving platters all of the following are common ports that are included with laptop computers except - Correct answer MIDI ports while many third party apps are available through its app store, apps for _____________ must first be tested and approved before they’re made available for downloading - Correct answer iPhones choose the Samsung galaxy tablet options - Correct answer -note series -tab series select the functions of a digital signal processor - Correct answer -analyzes signals received from the analog-digital converter to enhance audio quality -reduces unwanted noise -moderates call volume select all the tablet computers - Correct answer -apple pad -Samsung galaxy note PRO -amazon fire had select the characteristics of a blue ray disk - Correct answer - holds approximately 25gb of data -uses pits and lands to store data when referring to digital storage, RAID stands for _____________ - Correct answer redundant array of independent disks an electronic element that stores data by changing its resistance based on the current that has passed through it (similar to RRAM) is called a(n) ________________ - Correct answer memristor most desktop computers used ______________ to store data - Correct answer magnetic hard drives select the characteristics of a traditional hard drive - Correct answer -uses magnetically charged plates to store data -commonly found in desktop computers which of the following are considered storage media? - Correct answer dads, blue ray disks the component of a computer that allows data to be retained after power is turned off is referred to as ____________ - Correct answer storage using refracted laser light to store data on a photoreceptive substrate is essentially how ____________ storage works. Theoretically this could store gigabytes of data within a cubic millimeter - Correct answer holographic place the steps of the SDLC in order - Correct answer 1. investigation 2. analysis 3.design 4. develop the coding step of the PDLC might use which of the following languages? - Correct answer C++ the process used to develop and maintain and IT system is referred to as the SDLC. SDLC stands for the system development _______________ cycle - Correct answer life because objective-c was difficult to write in, apple developed _________________, a programming language for writing software for the mac OS and is - Correct answer swift which of these programs make data more readable to programmers by parsing XML files? - Correct answer JSON another term for a programming code is a programming ____________________ - Correct answer language a graphic representation of a process is called a __________ - Correct answer flowchart after the problem has been clearly defined, the next step in the PDLC is to create the plan or algorithm. This plan is usually written as a ____________ and is written in an ordinary language, such as English - Correct answer flowchart when inputs can be easily placed into different categories or classes, a(n) _______________ -oriented analysis works well - Correct answer object a program that can be used to convert a single line of C# into machine language without having to compile the entire program is called a C#____________ - Correct answer interpreter HTML and it's 5th revision (html5) allow content to be displayed on _____________ - Correct answer the world wide web computer hardware and software that an organization uses to increase its performance is referred to as its _____________ - Correct answer IT system designed to display documents on the web, this version of the HTML set of protocols provides a smooth interface between natural language and machine language by wrapping data in "tags" for web display - Correct answer extensible markup language writing software follows a 5-step process called the PDLC. PDLC stands for the program ________________ life cycle - Correct answer development the final steps in the PDLC process include testing and documenting the software. When testing is conducted by potential customers of the software, it's referred to as a(n) _______________ test - Correct answer beta select the sites that offer internet speed test services - Correct answer -speedtest.net -testmy.net in addition to activating ___________ protection, it's a good idea to disable your routers SSID transmission once all your devices are connected - Correct answer WPA2 a URL identifies a particular ____________ address on the world wide web - Correct answer file the original wireless network privacy and protection standard for wife was known at _____________ - Correct answer WEP the device that connects 2 networks is a ____________ - Correct answer router which of the following are internet service options? - Correct answer satellite, cable, fiber optic a protocol commonly used to transfer large files from one server to another on the internet is the __________ - Correct answer file transfer protocol fiber optic cable is _____________ expensive than coaxial cable to install - Correct answer more the wireless network privacy standard that was introduced in 2003 but was quickly replaced (due to numerous vulnerabilities) was known as _______________ - Correct answer WPA (wired equivalent privacy) file compression: reduces space required by reducing redundancy within files - Correct answer lossless file compression: a lossless compression format - Correct answer zip which of the following file extensions is commonly used for term papers and other word processing tasks? - Correct answer .docks select the common word processing file extensions: - Correct answer -.of -.docx match the extension with the type of document: .bles - Correct answer spreadsheet match the extension with the type of document: .pea - Correct answer presentation if you have 2 folders open on your desktop and you want to copy a file from one folder to the other, hold down _________ and drag the file - Correct answer ctrl place the steps in order to store a file on Google drive - Correct answer 1. open your Google drive account (sign in if neck) 2. click on new to open the drop-down menu 3. select file upload 4. browse to the file and click open select the characteristics of a one drive account - Correct answer -requires a Microsoft email account -provides free cloud storage -can serve as extra storage space committed by employees inside the company rather than outside hackers - Correct answer data theft when referring to business information technology, MIS stands for ______________ - Correct answer management information systems intrusion detection systems (IDS) use several techniques to protect networks. One is called a "halt", which stops the hacker from progressing into the network. Another is called a(n) ___________, which closes the access point used by the hacker - Correct answer block match the business information system (IS) activity with the appropriate manage level: use IS for scheduling daily and weekly operations - Correct answer first level managers (supervisors, floor managers) match the business information system (IS) activity with the appropriate manage level: use IS for record keeping and reporting purposes - Correct answer middle managers match the business information system (IS) activity with the appropriate manage level: use IS to monitor overall business performance - Correct answer top level management (business executives and presidents) if you believe you have fallen victim to a phishing scam you should: - Correct answer - contact the institution the message was allegedly sent from -contact US-CERT which are considered cybercrimes? - Correct answer -internet scams -cyber espionage -information theft identify common symptoms of a computer virus - Correct answer -documents won’t save -computer runs extremely slowly -programs launch on their own non-malicious computer security experts that test the security measures of an organizations information systems to ensure they are protected against malicious intrusions are called _____________ - Correct answer white hat hackers what is the name of a virus written in macro language and placed within a document or spread sheet - Correct answer macro virus firewall software used to block a user’s access to specific internet content is called a(n) _____________ filter - Correct answer internet an unsolicited email message is called _____________ - Correct answer spam a group of compromised computers controlled by a hacker is called a _____________ - Correct answer botnet the malicious use of computer code to modify the normal operations of a computer or network is called a _____________ - Correct answer cyber attack a type of phishing that seeks to obtain personal information through malicious software that is inserted on a victim’s computer is called _______________ - Correct answer pharming amateur computer hackers with little programming expertise that illegally gain access to computer systems using programs (scripts) that others have written are called _______________ - Correct answer script kiddies hardware or software used to keep a computer secure from outside threats such as hackers and viruses by allowing or blocking internet traffic is called a _____________ - Correct answer firewall two common categories of cybercrimes include single events and _____________ series of events - Correct answer on-going specialized hardware or software that capture packets transmitted over a network are called packet ____________ - Correct answer sniffers which of the following refers to the distribution of computer applications over the internet and is commonly referred to as web apps? - Correct answer Saabs if you accidentally delete a file it's not lost forever! just go to your recycle bin, select the item and click _______________ - Correct answer restore in order to keep your files organized, it’s a good idea to create __________ and place your files in them - Correct answer folders select the common audio file formats: - Correct answer -.mp3 -.mp4 (M4A) -.wav match the extension with the type of document: .acid - Correct answer database match the extension with the type of document: .html - Correct answer webpage two major concerns regarding cloud storage are reliability and ___________ - Correct answer security file compression: reduces space required by removing less valuable data - Correct answer loss select the statements that refer to the term "dot pitch" - Correct answer -the distance between two adjoining sub-pixels in a display -the closer the spacing (the smaller the dot pitch) the sharper the image what is true regarding the length of a USB cord? - Correct answer in general, the more data being transmitted, the shorter the cord should be select the true statements regarding an LED display - Correct answer can be extremely thin, great for well-lit areas, extremely energy efficient uses toner cartridges - Correct answer laser printer to create an image with a laser printer _____________ is(are) drawn to the drum - Correct answer toner select the characteristics of a plotter - Correct answer -prints large graphic displays -mechanically moves a pen over a large sheet of paper select the characteristics of a projector - Correct answer -usually requires a darkened environment -allows large audiences to view digital output -usually used with a screen select the statements that refer to color depth - Correct answer -also known as "bit depth" -a measure of the accuracy of the color of each pixel -specifically, the number of bits of data describing each pixel in a display though currently expensive, curved and paper-thin displays are possible using __________ display technology - Correct answer OLED the number of bits of data describing each pixel in a display is referred to as ___________ - Correct answer color depth which colors make up a typical monitor's pixels? - Correct answer red green blue number of times per second a frame in a video is advanced is the definition of ____________ - Correct answer frame rate the width of a screen compared to the height of a screen is referred to as _____________ - Correct answer aspect ratio a point (a hole or slot) in a computer, designed to accept a specific connector, is called a _________ - Correct answer port relatively small amount of memory (measured in kilobytes and megabytes) - Correct answer cache memory located directly on the processor itself - Correct answer l1 cache extremely small amount of memory (measured in bits) located throughout the processor - Correct answer register select the characteristics of desktop computers: - Correct answer - desktops allow for relatively easy upgrade and expansion -desktops are often used in offices since they don’t need to be mobile -desktops use a full OS the smallest element of an image is called a(n) _________ - Correct answer pixel optical storage media: capacity of up to 8.5 gab - Correct answer dad optical storage media: capacity of up to 700 mob - Correct answer cd devices with a separate system unity and a relatively large footprint are called ______________ computers - Correct answer desktop __________ is actually storage since it retains data and information when the power has been turned off - Correct answer ROM (read only memory) because they're inexpensive and reliable ___________ have become extremely popular storage devices - Correct answer thumb drives (USB or flash drive) optical storage media: capacity of up to 50gb (per side) - Correct answer blue-ray screen size is measured by the __________ - Correct answer diagonal distance between the upper right and lower left corners of the screen the place in a digital device where the data and programs that device is currently using are accessible by the processor is called the ___________ - Correct answer RAM screen size is measured by the ___________ across the monitor - Correct answer diagonal fire wire connectors were developed for ___________ computers - Correct answer apple running the processor faster than recommended by the manufacturer is called _____________. this can increased performance and speed, but will also void the manufacturer warranty - Correct answer overclocking a short-range wireless transmission protocol is known as _____________ - Correct answer Bluetooth the visual image output that a computer creates is known as _____________ - Correct answer graphics largest memory of a computer, connected to the processor via the front side bus - Correct answer RAM represented as either a 0 or 1, a ____________ is the smallest unit of data a computer can process - Correct answer bit the maximum number of bits per instruction that a CPU can process during 1 machine cycle is called _____________ - Correct answer word size this type of connector is the most common for connecting peripherals (printers, monitors, storage devices etc) to a computer - Correct answer USB
Docsity logo



Copyright © 2024 Ladybird Srl - Via Leonardo da Vinci 16, 10126, Torino, Italy - VAT 10816460017 - All rights reserved