1,969
18
Essay, 13 pages (3500 words)

Cit 15

The process of searching huge amounts of data seeking a patternMiming Mining

What information is contained in a packet1. An address to which the packet is being sent
2. The address from where the packet originates
3. Reassembly instructions, if the original data is split between packets
4. The data thats being transmitted

Is the standard communication protocol used on most client/server networksEthernet

Crisis MappingTools gather information from sources such as emails, txt messages, and tweets and make the information instantly publicly available for us in emergencies.

ICANNIs responsible for the Internets domain name system and the allocation of IP addresses.

Purpose, Mastering, autonomyLead to greater motivation

NetworkIs a group of two or more computers, or nodes, designed to share information and resources.

_______results when leisure time and tools allow us to engage in creative acts? Cognitive Surplus

What is a common network topologyRing Topology, Star, Bus

What are examples of being computer literate? 1. Understanding the real risks
2. Use the web wisely
3. Avoid online annoyances
4. Protect your identity
5. Avoiding viruses/hackers
6. Diagnosing the problem
7. Using web efficitly
8. Avoiding Spam

A______ uses the internet communications infrastructure to build a secure and private networkVPN

Unwanted or junk email is called? Spam

______ permits two or more people to communicate over the Internet in real time? Instant Message

Mastery is defined as? confidence and excitement about learning new skills

SkypeA popular Voice over internet protocol (VoIP) service is?

Which Language was created for the transferHTTP

Ring Networks use the _____ method to avoid data collisions? Token

______ is a personal identification chip that is about the size of a grain of rice and implanted under the skin? Varamed/Veramev

The ______ is an organization of musicians performing together from different locations all over the globe? Virtual choir

____Solicits online input from consumers? Crowd Survey

Analyzing computer systems to gather potential legal evidence is computer______? Fronsics

______refers to the instructions that tell a computer what to do? software

A_______ server tracks who is logging on to the network as well as which services on the network are available to each user? Authethication server

______ tools enable groups of people to connect and exchange ideas? Social networking

Which is the most commonly used client/server network topology? Star Network

The term computer____ is used to describe someone who is familiar enough with computers to understand their capabilities and limitaions? Literate

QR stands for? Quick Response

The gap between those who have easy access to the internet and technology and this who do not? Digital divide

A_____ network can contain servers as well as individual computers? Client Server

____is out normal sense of the world around us enhanced with digital information? augmentation realityrelality

______is the amount of data that can be transmitted across a transmission medium in a certain amount of time? Bandwif

The ______ initiative is rallying the support of the world to identify mathematical genius? next Einstein

Autonomy is defined as? working without continual direction or control

Using the Internet to get small donations from many people to start a business is called? Crowd Funding

Configuring an account to disable itself after a set number of login attempts using invalid passwords is a method of countering a ______? Brute force attack

Sharing products rather than owning them individually is known as? Collaborative consumption

The _____ hopes to stop human rights abuses throughout the world? witness project

The worlds population combined has an estimated _____ hours a year of free time? 1 trillion

A _____ address is the address that external entities use when communicating with your network? IP

Affective computing… developing systems that can______? Recognize and stimulate human emotions

In a _____ network, each node connected to the network communicates directly with every other node? Peer to Peer

A _____ is an input device that looks like a pen? Stylis

The ____ contains the central electronic components of the computer? Mother board

Is the abbreviation for the place in the computer where the programs and data the computer is currently using are temporarily stored? The Ram

Sends data between two networksrouter

In binary language, each letter of the alphabet, each number, and each special symbol is made up of a unique combination of eight___? bit

Computer use_____ consisting of Os and Is? Binary language

Is concerned with the design and arrangement of machines and furniture to avoid uncomfortable or unsafe experiences? Ergonomics

Apple’s OS X and Microsoft windows are examples of? operating software

A _____ CPU has two processing paths, allowing it to process more than one instruction at a time? Dual Core

A Apple iPad and samsung galaxy tab and a Microsoft surface are examples of____ computer? Tablet

Which computer port can transmit uncompressed audio and video? HDMI

Which computers supports many simultaneous users and manages large amounts of data? Main frame

What is a system used with touch screen? Capacitive, resistive, surface, acoustic wave system

Flash drives plug into? USB Drive

What optical storage media has the greatest storage capacity? Blu Ray (dual Layer), 50 GB, BDs

A ___ is where a peripheral device can attach to a computer so that data can be exchanges between it an the operating system? port

The number of pixels displayed on the screen is known as? screen resolution

A_____ keeps your computer safe by determining who is trying to access it? Firewall

What are examples of nonvolatile, storage? USB, Hard Disk, DVD, ROM, Tape, Cloud

The main suite of protocols used on the Internet is? TCP/IP

The most common type of monitor is? LCD monitor

Inkjet printers and laser printers are examples of printers? Thermal

A ___ address is a unique number that identifies a computer, server, or device connected to the Internet? IP

Dropbox is an example of? iCloud storage

A _____ enables your computer to connect to other computers or to the internet? network interface

What are ways to avoid injuries when working on computers? Take breaks
Ensure the lighting is adequate
assume proper position
purchase adjustable chair
position your monitor correctly

The ” brains” of the computer is? CPU

A address is temporary IP address that is assigned from an available pool of IP addresses? Dynamics

Have tiny hammer like keys that stake the paper through an inked ribbon? Impact printer

An IP address that does not change and is usually assigned manually by a network administrator is called _____ address? Static

Is a representation of a fact, a figure or an idea and can be a number, a word, a picture, or even recording of sound? Data

When using a spreadsheet, the expression = D8-D17 is called a? Formula

Using applications on smartphones and tablets to buy and sell products is known? Mobile commerce

Web-based application software is software that is stored completely on web server instead of you? Hard drive/computer

____ helps run the computer and coordinates instructions between other software and the hardware devices? System Software

An example of a software suites? Microsoft office, apple, work, apache, open office

The appropriate software to use for creating research papers if? Word processing software

______software installation copies all the most commonly used files and programs that distribution disc to your computers hard drive? Full Installtion

When checking to see whether a particular name is registered on the internet, your computer accesses a database that is kept on a ____ server? BNS

____ defines the content in terms of the data that is being described rather than how it is to be displayed? XML

To remove red eye from a digital image, you would use software such as? image editing software/photoshop

A____ is a small program that resides on a server and is designed to be downloaded and run on a client computer? Ad Lid

You can obtain software through______ in which a vendor hosts the software online over the internet and you don not have to install it? Software as a service

Which protocol is used when sending files as attachments by e-mail? MIME/Multiply Internet Mail Extension

Unwanted or unelected software included by manufacturers on new computers is called? Bloatware

The main path of the Internet along which data travels the fastest is known as the internet? Internet Back Bone

The two main types of software are system software and________? Application software

Strong encryption now requires____ bit keys? 256

In the databases a category of data is called? Field

Is used to perform calculation and numerical analyses? Spread Sheet software

The most common audio compression format is? MP3

_____enables you to decide which features you want to install on the hard drive? A custom installation

Quark Xpress is an example ofDesktop publishing software

Tips for a great presentation? Be careful with color
use bullets
Images
Font size

_____computing allows you to store date, files, and applications on the web and access and manipulate those files and applications from any device connected to the internet? Cloud

Types of multimedia and entertainment software? Digital video
Drawing
Audio
Video editing
app creation
gaming
education

Blackboard is an example of? Oracle, myself, Microsoft Access

QuickBooks is an example of? Accounting software

Dreamweaver is an example? Web authoring software/web design

EULA stands forEnd User License Agreement

A ____ version is an application that is still under development? Beta

The processor market for desktop and laptop computers is dominated byIntel

Which performance activités are carried out by the ALU? Arithmetic logic unit

There are _____ levels of cache memory3

________predicts that the capacity of a CPU will double every 2 years? Mor’s Law

Running the CPU at a faster speed than the manufacturer recommended is called? Over clocking

ram is an example? Volatile storage

Which is the lightest computer? Tablet? ultrabook

The audio subsystem consists of the speakers andaudio/soundcards

The CPU consists of which two parts? control unit/artithemtic unit

The amount of RAM Storage is measured in? Gigibytes

In most current systems______ is the types of RAM used? DDR3

A video card can diveler output to multiple? monitors

______provides high speed information processing by enabling a new set of instructions to start before the previous set is finished? Hyper threading

Running the Disk Cleanup utility is a quick way to clear out? unnecessarily files

The speed of a level of cache is impacted by? Proximity to the CPU

______is a feature of a CPU that allows it to begins to fetch the next instruction before it has finished executing the current one? Hyper-Threading

Which of the ports are used to connect to a video card? DUI Port, HDMI Ports, Display Port

Optical drives use a ______ to read and write dataLaser

When referring to hard dries, access time is measured in? milliseconds

To speed up the display of graphics a ____ is installed on some video card? CPU

In Dolby Digital 7. 1, the . 1 indicates a? subwoofer speaker

Running the Disk Defragmenter utility will make the ____ work more _____Hard Drive
Efficacy

To remove all the changes made to your system, the windows _____ utility returns your computer to the state it was when it came from the factory? refresh

To securely erase data, the U. S Department of Defense suggest that the data be overwritten7 times/multiple

_______automatically duplicates your data and saves itRAID 1

Data______ ensures that the data contained in a database is accurate and reliable? Data Integrity

______breaks down a problem into a series of high-level tasks and continues to break each task into successively more detailed subtasksTop Down Design

The set of specific sequential steps that describes exactly what a computer programs must do to complete the work is called? algorithm

A small Java based program is called? Java Applit

The keywords used in programming languages that use decisions to redirect the flow of a program are called? controlled structure

If a school keeps two lists one for students registration and one for student financial information both containing name and address information this is an example of data? Redundancy

What provides a visual representation of the patterns of an algorithm? Flow Chart

______ is a combination of natural language and programming language that is used to document an algorithmPseudo Code

A data______ is a large scale electronic respority of data that contains and organizes all of an organization data in one placewarehouses

In object oriented programing____ allows a new class to automatically use all the data and methods of its parent classInheritance

An example of a first generation language? machine language

The capability of moving a completed programming solution easily from one type of computer to another is known asportability

Translating an algorithm into a programming language is called? Coding

Before its final commercial release______ version of software may be offered to certain test sites to to interested user free or at reduced cost? Beta

______database are the most commonly used electronic databasesRelational

_____ is used to ensure that data is organized most efficiently? normalization

nontraditional data such as audio clips, videoclips, pictures, and very large documents are calledunstructured data

You would use a ____ to temporarily display records of residents of the city of BostonFilter

A____ is a way of retrieving information from one ore more tables that defines a particular subset of dataQuery

A display a subset if data from table based on the specified criteriaSelected

Data Staging consists of which stepsData
Extraction

In a transaction processing system if the TPs database van be queried and updated while the transaction is taking place is called? real time processing

______ is the branch of computer science that attempts to create computers that think like humansAI/ Artfical intelligence

Big data analytics is usually associated with ____ servicesData warehouse

_________the ability to law a single device to meet all of our media, internet, entertainment, and telephone needsDigital Convergence

______they illustrate the loudness of a sound or the brightness of the colors in an image a given moment in timeAnalog/continuous waves

_______a form of a voice based Internet communication that turns a standard Internet connection into a means to place phone calls, including long distance calls. Uses technology similar to that used in email to transmit your voice data digitally over the internetNoIP(Voice over Internet Protocol)

______ some people regard sound quality and reliability issues as VIPs primary disadvantages when using VoIP at home. There is loss of service if power interruptedDrawbacks of VoIP

_____a network of 21 satellites that constantly orbit earth. It uses an antenna to pick up the signals from these satellites and use special software to transform those signals into latitude and longitudeGPS (global positioning system)

______the federal communications commission mandated a GPS chip into every cellphone and smartphone to enable this programEnhanced 911 program

_______the process of updating your data so your files are the sameSynchronizing/syncing

WIRED: use a micro SD card or a USB cable to directly transfer data
WIRELESS: use a wireless connection to transfer dataTwo ways to transfer information between your phone and computer

How does a wired transfer of data work? Almost all phones designed to support USB once connected

How does a wireless transfer of data work? The easiest way is to use a wireless connection to a cloud service. You can synchronize these services to your email.

_______ a technology that lets you send short text messages over cellular network to transmit messagesSMS (short message service)

_____ an extension of sms that lets you send messages that include text, sound, images, and video clips to other phones or email addressesMultimedia message service(MMS)

_____enables you to use your phones cellular network to create a wireless network to create a wireless network to access the internetTethering

_____ textual information captures digitally so that it can be stored, manipulated and transmitted by electronic devicesE-text )electronic text)

_______devices that can display e-text and have supporting tools, like note taking, bookmarks, and integrated dictionariesE-readers

_______intergrated dictionaries pull up a definition just by your highlighting a word. helps read foreign worksE-reader features

Signals such as sound and temperature, which continuously vary in strength and quality are said to beAnalog

Ist generation______ consisted of extruded plastic printing, melting plastic down and then pushing it into a mold to shape it3-D printers

_______ the use of a single unifying device that handles media, Internet entertainment and telephone needsDigital Convergence

______ chip converts sound waves from a voice into digital signalsAnalog to digital

_____ the number of times that an analog wave is measured each second in an analog to digital conversionSampling rate

______ devices that communicate with each other with a single topNFC ( Near field communications)

_____allows only limited use of media that have been legally purchasedDRM (digital rights management)

_____a term used to refer to various licensing plans that enable copyright holders to grant certain rights to the work while retaining other rightsCopy Left

______a rule that squeezes the same audio and video information into less spaceCodect

When using a cell phone, a base transceiver station picks up a request for service and then passes the request to a central location called? Mobile switching center

it has low to free cost, portability, make calls on a laptop or tablet, through a hotspot or networkAdvantages of VoIP

____helps to ensure data integrity by maintaining information in only one placeData centralization

______ a programming language that can be used to create a wide range of windows applicationsVisual Basic

uses relational algebra to extract records from a database by using english like expressions that have variables and operationSQL

The process that converts program code into machine language? Compilation

The internet is? A large network of networks

The concepts of the internet was developed by the U. S Department of Defense as a network that_______ in event of an attack? would not be disrupted easily

The world wide web was based on a protocol developed by? Tim berners-lee

The ” fathers of the Internet” are Vinton Cerf and? robert Kahn

Software that enables you to display and interact with text and other media on the web is a web_____? Browser

The Web is based on the______ protocol? Hypertext transfer

All of the following are tips for professional email etiquette except? Use abbreviation such as BRB to keep the email message shorter

Which of the following is not a proprietary instant messaging (IM) service)LikedIn messenger

____ allows visitors to add, remove, to edit its content? Wiki

Which of the following are personal video journal entires posted on the web? Blogs

_____ is a personal journal posted on the webBlog

Podcasts enable you to? deliver audio/video files via RSS

____ is usually a live broadcast of audio or video contentWebcast

Multimedia is anything that involves one or more of the following except? browsers

______media are continuously fed to your browser so you don’t have to wait for the entire file to completely download before listening to or watch itStreaming

All of the following are types of e-commerce business exceptC2B

A subset of e-commerce that uses social networks to assist in marketing and purchasing in marketing and purchasing products is known associal commerce

Which of the following is NOT a precaution to take when shopping onlinePay with a debit card, not a credit card

The ” s” in https stands for______ socket layersecure

The browser feature which allows tabs to work independently from one another so if one crashes, the others may continue to work is known astab isolation

The unique address for a particular website is theURL

The URL the portion labeled . com is thetop level domain

In the URL the portion labeled /surface is thesubdirectory

in the URL labeled http is theprotocol

which of the following domains identifies a degrees granting institution. edu

Which of the following is a feature of Live bookmarks? adds RSS technology to bookmarks

AND, OR, and NOT are examples of_____ operatorsBoolean

The two major types software programs are utility programs and theoperating system

The______ of the operating enables users to communicate with the computer system? User interface

OS x is the operating system developed by? Apple

All of the following are examples of network operating systems except? MS-DOS

Which of the following capabilities of UNIX is false? It is only for super computers

Most supercomputers use the_____ operating system? Linux

Which of the following operating system are used on most tablets? Android and iOS

Most smartphones use operating systems developed by? Google and Apple

Which of the following i a proprietary OS for desktop and laptop computers? Windows

Windows 10 uses____ account for easy access and storage of online filesOneDrive

The Mac OS was the first commercially available OS to incopertaepoint and clock technology

Which of the following is NOT a user interface? application programming interface (API

Using hard disk space to temporarily store data or instructions from RAM is referred to as thevirtual memory

Each device attached to your computer has a special program called a(n) ________ that enables the device and operating system to communicate with each otherdevice driver

Which of the following is the first step in the boot process? The BIOS is activated by turning on the computer

The basic input/output system (BIOS) is stored on a ________ chipROM

All of the following are terms related to part of the boot process EXCEPTUSB

In the late 1980s, computer specialists were concerned that proprietary software had too many ________, so they started working on open source projects. bugs

C: denotes a(n) ________ directory that is at the top of the filing structure of a computer. root

All of the following can be used in an OS X file name EXCEPT:

The location of a file is specified by itsfile path

Which of the following is the name of a Microsoft Excel file? Inventory. xlsx

Deleted files on a Mac computer are moved to thetrash

Which of the following Windows utility programs arranges pieces of files on your hard drive to allow for faster access? Disk Defragmenter

Which of the following is NOT a Windows utility program? Desktop

You can use the Windows ________ to check on a nonresponsive program. Task Manager

The ________ utility automatically creates duplicates of your libraries, desktops, contacts and favorites to another storage location. File History

ONCIT 15 SPECIFICALLY FOR YOUFOR ONLY$13. 90/PAGEOrder NowTags:

  • iOS
  • Microsoft Windows
  • Programming Languages
  • Smartphone

Thank's for Your Vote!
Cit 15. Page 1
Cit 15. Page 2
Cit 15. Page 3
Cit 15. Page 4
Cit 15. Page 5
Cit 15. Page 6
Cit 15. Page 7
Cit 15. Page 8
Cit 15. Page 9

This work, titled "Cit 15" was written and willingly shared by a fellow student. This sample can be utilized as a research and reference resource to aid in the writing of your own work. Any use of the work that does not include an appropriate citation is banned.

If you are the owner of this work and don’t want it to be published on AssignBuster, request its removal.

Request Removal
Cite this Essay

References

AssignBuster. (2022) 'Cit 15'. 26 September.

Reference

AssignBuster. (2022, September 26). Cit 15. Retrieved from https://assignbuster.com/cit-15/

References

AssignBuster. 2022. "Cit 15." September 26, 2022. https://assignbuster.com/cit-15/.

1. AssignBuster. "Cit 15." September 26, 2022. https://assignbuster.com/cit-15/.


Bibliography


AssignBuster. "Cit 15." September 26, 2022. https://assignbuster.com/cit-15/.

Work Cited

"Cit 15." AssignBuster, 26 Sept. 2022, assignbuster.com/cit-15/.

Get in Touch

Please, let us know if you have any ideas on improving Cit 15, or our service. We will be happy to hear what you think: [email protected]