CSC 100: Modules 5-8 Answers

0.0(0)
Studied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/87

encourage image

There's no tags or description

Looks like no tags are added yet.

Last updated 1:02 AM on 4/5/26
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

88 Terms

1
New cards

True

Any illegal act involving the use of a computer or related devices generally is referred to as a crimewave.

2
New cards

False

A rootkit displays an online advertisement in a banner or pop-up window on webpages, email, or other Internet services.

3
New cards

True

Viruses, worms, and other malware can be hidden in downloaded game files and mobile apps.

4
New cards

True

An audit trail records in a file both successful and unsuccessful access attempts.

5
New cards

True

It is good practice to change your password frequently.

6
New cards

True

Intentionally erasing software would be considered software theft.

7
New cards

True

A typical license agreement allows you to rent or lease the software.

8
New cards

False

Unencrypted, readable data is called ciphertext.

9
New cards

False

Private key encryption is also called asymmetric key encryption.

10
New cards

True

VPNs encrypt data to help ensure that the data is safe from being intercepted by unauthorized people.

11
New cards

True

When data is traveling to or from a computer to a cloud service, it is subject to interception.

12
New cards

True

Full backups are made at regular intervals on removable media in a grandparent-parent-child backup scheme.

13
New cards

access control

security measure that defines who can access a computer, device, or network; when they can access it; and what actions they can take while accessing it

14
New cards

bot

program that performs a repetitive task on a network

15
New cards

cookie

small text file that a web server stores on your computer

16
New cards

digital certificate

notice that guarantees a user or website is legitimate

17
New cards

disc burning software

program that writes text, graphics, audio, and video files on a recordable or rewritable disc

18
New cards

keygen

program that creates software registration numbers and sometimes activation codes

19
New cards

phishing

scam in which a perpetrator sends a message in an attempt to obtain personal or financial information

20
New cards

script kiddie

hacker who does not have the technical skills and knowledge of a cracker

21
New cards

technology ethics

moral guidelines that govern the use of computers, mobile devices, information systems, and related technologies

22
New cards

zombie

compromised computer or device whose owner is unaware

23
New cards

True

The motherboard also is called a system board.

24
New cards

False

A single-board computer often is more expensive than a traditional desktop computer.

25
New cards

False

A dual-core processor doubles the processing speed of a single-core processor.

26
New cards

True

In general, multi-core processors are less energy efficient than separate multiple processors.

27
New cards

False

The system clock keeps track of the date and time in a computer.

28
New cards

True

In cloud computing, the back end consists of the servers and storage devices that manage and store the resources accessed by users.

29
New cards

False

In the binary system, the digit 1 represents the absence of an electronic charge.

30
New cards

False

Most RAM is nonvolatile.

31
New cards

True

The processor interprets and executes a program or application's instructions while the program or application is in nonvolatile memory.

32
New cards

True

ROM chips also are called firmware.

33
New cards

True

As with processors, manufacturers state the clock speed for a bus in hertz.

34
New cards

True

The power supply converts the wall outlet AC power into DC power.

35
New cards

ASCII

widely used coding scheme to represent a set of characters

36
New cards

bus width

number of bits the processor can interpret and execute at a given time

37
New cards

chip

small piece of semiconducting materials, usually silicon, on which integrated circuits are etched

38
New cards

control unit

component of the computer that directs and coordinates most of the operations in the computer

39
New cards

firmware

ROM chips that contain permanently written data, instructions, or information

40
New cards

IaaS

the use of software to emulate hardware capabilities, enabling computers to scale, or adjust up or down, storage, processing power, or bandwidth as needed

41
New cards

motherboard

the main circuit board of the computer

42
New cards

registers

small, high-speed storage locations contained in a processor

43
New cards

transistor

integrated circuit component that acts as an electronic switch that opens or closes the circuit for electrical charges

44
New cards

word size

determines the number of bits that the computer can transmit at one time

45
New cards

True

CAPS LOCK and NUM LOCK are two examples of toggle keys.

46
New cards

True

Keylogging software runs undetected and stores every keystroke in a file for later retrieval.

47
New cards

True

Wearable devices mainly rely upon touch input.

48
New cards

False

A smaller frame rate results in a smaller file size for a video, as well as a smoother playback.

49
New cards

False

Optical character recognition (OCR) and optical mark recognition (OMR) are two technologies used by QR code readers.

50
New cards

False

A magstripe reader reads the preprinted characters on the bottom of a check.

51
New cards

True

LCD stands for liquid crystal display.

52
New cards

True

In terms of response time, the lower the number, the faster the response time.

53
New cards

False

Contrast ratio defines a display's width relative to its height.

54
New cards

False

A 3-D printer creates an object by using ink cartridges.

55
New cards

False

Printer resolution is measured by the number of pixels per inch a printer can print.

56
New cards

True

A dye-sublimation printer uses heat to transfer colored dye to specially coated paper.

57
New cards

command

instruction that causes a program or app to perform a specific action

58
New cards

drone

aircraft that operates by an onboard computer and GPS, a remote control device, and/or an app on a computer or mobile device

59
New cards

headset

device that functions as both headphones and a microphone

60
New cards

interactive whiteboard

touch-sensitive device that displays the image on a connected computer screen, usually via projector

61
New cards

keyboard shortcut

one or more keyboard keys that you press to perform an operating system or application-related task

62
New cards

multi-touch

touch screen capability of recognizing more than one point of contact at the same time

63
New cards

scanner

light-sensing input device that reads printed text and graphics and then translates the result into a form the computer can process

64
New cards

stylus

small metal or plastic device that looks like a tiny ink pen but uses pressure instead of ink

65
New cards

touchpad

small, flat, rectangular pointing device that is sensitive to pressure and motion

66
New cards

voice recognition

computer or mobile device's capability of distinguishing spoken word

67
New cards

False

Storage devices can be categorized as input or output devices.

68
New cards

True

A storage medium is volatile; that is, items stored on it remain intact even when you turn off a computer or mobile device.

69
New cards

True

Compared with the access time of memory, the access time of storage devices is slow.

70
New cards

False

On storage media, a higher density means less storage capacity.

71
New cards

False

Because of current standards, head crashes no longer occur.

72
New cards

False

The access time of a hard disk can be more than 100 times faster than an SSD.

73
New cards

False

While encrypted files offer greater security than unencrypted files, an operating system may require more time to open and access encrypted files.

74
New cards

True

While each program may use a different method of encrypting files, they all use the process of cryptography.

75
New cards

True

A group of two or more integrated hard drives is called a RAID.

76
New cards

True

When you are finishing a USB flash drive, simply remove it from the USB port.

77
New cards

True

Mini discs require a separate mini disc drive; that is, they do not work in standard-sized optical disc drives.

78
New cards

False

An active RFID tag contains a battery that runs the chip's circuitry and broadcasts a signal to the RFID reader; because they are so small, they can be embedded in skin.

79
New cards

capacity

the number of bytes a storage medium can hold

80
New cards

controller

special-purpose chip and electronic circuits that control the transfer of data, instructions, and information from a drive to and from the system bus and other components in the computer

81
New cards

longitudinal recording

storage method in which the magnetic particles are aligned horizontally around a disk's surface

82
New cards

network attached storage

server whose sole purpose is providing storage to users, computers, and devices attached to the network

83
New cards

reading

process of transferring data, instructions, and information from a storage medium into memory

84
New cards

ripping

process of copying audio and/or video data from a purchased disc and saving it on your own media

85
New cards

sequential access

storage technique that reads or writes data consecutively

86
New cards

solid-state media

flash memory chip type that consists entirely of electronic components, such as integrated circuits, and contains no moving parts

87
New cards

thumb drive

flash memory storage device that plugs in a USB port on a computer or mobile device

88
New cards

writing

process of transferring data, instructions, and information from memory to a storage medium

Explore top notes

note
PRENATAL DEVELOPMENT
Updated 1221d ago
0.0(0)
note
CGO casus 1
Updated 444d ago
0.0(0)
note
Ancient Philosophers
Updated 1149d ago
0.0(0)
note
2.8 The Early Baroque Period
Updated 1220d ago
0.0(0)
note
Chapter 13: The Sectional Crisis
Updated 1286d ago
0.0(0)
note
Weathering, Soil, and Mass Wasting
Updated 1168d ago
0.0(0)
note
PRENATAL DEVELOPMENT
Updated 1221d ago
0.0(0)
note
CGO casus 1
Updated 444d ago
0.0(0)
note
Ancient Philosophers
Updated 1149d ago
0.0(0)
note
2.8 The Early Baroque Period
Updated 1220d ago
0.0(0)
note
Chapter 13: The Sectional Crisis
Updated 1286d ago
0.0(0)
note
Weathering, Soil, and Mass Wasting
Updated 1168d ago
0.0(0)

Explore top flashcards

flashcards
HFrEF Treatment
94
Updated 474d ago
0.0(0)
flashcards
Chapter 26
75
Updated 721d ago
0.0(0)
flashcards
Biopsychology -
62
Updated 583d ago
0.0(0)
flashcards
unit 3 ap hug
56
Updated 1211d ago
0.0(0)
flashcards
Psychology AOS Research Methods
51
Updated 303d ago
0.0(0)
flashcards
MI Quiz 1.4, 2.1, 2.2
58
Updated 1149d ago
0.0(0)
flashcards
HFrEF Treatment
94
Updated 474d ago
0.0(0)
flashcards
Chapter 26
75
Updated 721d ago
0.0(0)
flashcards
Biopsychology -
62
Updated 583d ago
0.0(0)
flashcards
unit 3 ap hug
56
Updated 1211d ago
0.0(0)
flashcards
Psychology AOS Research Methods
51
Updated 303d ago
0.0(0)
flashcards
MI Quiz 1.4, 2.1, 2.2
58
Updated 1149d ago
0.0(0)