CGS2060 Exam 3

0.0(0)
studied byStudied by 0 people
call kaiCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/151

flashcard set

Earn XP

Description and Tags

Last updated 10:02 PM on 12/2/22
Name
Mastery
Learn
Test
Matching
Spaced
Call with Kai

No analytics yet

Send a link to your students to track their progress

152 Terms

1
New cards
Know how hard disks store and organize files .
Hard disks store & organize files using tracks ( rings of concentric circles on the platter ) , sectors invisible wedge shaped sections ) , & cycling ears ( runs through each track of a stack of platters )
2
New cards
What does the internal hard disk normally store ?
Programs & data files
3
New cards
Programs On a hard disk each track is divided into invisible wedge - shaped sections called _____.
Sectors
4
New cards
are a popular solution for individuals and businesses where access speed is not essential , but capacity and durability are crucial .
Network drives
5
New cards
Know examples of secondary storage .
Solid state , hard disk , optical disk , cloud
6
New cards
How does an external hard drive connect to a computer ?
Plug it in
7
New cards
Storage that retains its data after the power is turned off is referred to as _____
Secondary storage
8
New cards
The process of accessing information from secondary storage devices is referred to as _____
Reading
9
New cards
The of a secondary storage device indicates how much data the storage medium can hold
Capacity
10
New cards
measures the amount of time required by the storage device to retrieve data and programs ?
Access speed
11
New cards
What is file compression and what is it used for ? What is file decompression ?
Scan files for ways to reduce amount of required storage ; increase storage capacity by reducing amount of space required to store data & programs
12
New cards
This process improves system performance by acting as a temporary high - speed holding area between a secondary storage device and the CPU .
Disk caching
13
New cards
Know the characteristics of RAID storage .
Improves performance by expanding external storage , improving access speed , & providing reliable storage
14
New cards
What are 4 ways to improve the performance of a Hard Disk ?
Disk caching , hybrid drives , RAID , file compression / decompression
15
New cards
What are examples of solid state storage ?
SSD , flash memory cards , usb drives
16
New cards
What type of storage technology does a cell phone use ?
SSD
17
New cards
Optical disks use to represent data .
Pits and lands
18
New cards
Know about CD, DVD, blue ray, HD blue ray, and R.
CD - 1st widely available optical format for PC users
19
New cards
DVD - standard optical discs in PCs, more storage than CD
20
New cards
Blue ray - designed to store high definition videos
21
New cards
HD blue ray - able to playback 4k video content & store high definition videos
22
New cards
R- recordable
23
New cards
How are solid state storage devices and hard disks different ?
SSD has no moving parts while hard disks have moving parts
24
New cards
What is it called when servers on the Internet supply applications as a service , rather than a product ?
Cloud computing
25
New cards
What is cloud storage ?
Stores data on the internet
26
New cards
_____ speed is the measure of the amount of time required by a storage device to retrieve data and programs .
access
27
New cards
What is disc caching ?
Improves hard disk performance by anticipating data needs & reducing time to access data from secondary storage
28
New cards
What are hybrid drives ?
Storage drivers that contain both solid state storage & hard disks in attempt to fain speed & power benefits of SSD while still having low cost & large capacity of hard drives
29
New cards
USB drives are also known as _____ drives ?
Flash
30
New cards
Three common storage options discussed in your text are hard disk , and solid - state storage .
Optical disk
31
New cards
What is cloud storage ?
Upload & store documents on the internet
32
New cards
Most large organizations store data through a strategy called a ( n ) _____ to promote efficient and safe use of data across the networks within their organizations .
Enterprise storage system
33
New cards
One of the most dramatic changes in connectivity and communications in the past few years has been ______
Widespread use of mobile devices w / wireless internet connectivity .
34
New cards
Which devices originate and accept messages in the form of data , information , and / or instructions ?
Sending & receiving devices
35
New cards
In a communication system , which devices convert messages into packets that can travel across the communication channel ?
Connection devices
36
New cards
Know the wireless connections and physical connections .
...
37
New cards
Which of the physical connections is the fastest ?
Fiber optic
38
New cards
Which of the wireless connections is considered a line - of - sight medium ?
Microwave
39
New cards
What does WiMax stand for ?
Worldwide Interoperability for Microwave Access Microwave
40
New cards
Microwave communication uses high - frequency _____
Radio waves
41
New cards
is a term relating to sending data to a satellite .
Upload
42
New cards
The GPS device in an automobile uses which communication channel ?
Satellite
43
New cards
A service that uses existing phone lines to provide high - speed connections is called _____
DSL
44
New cards
Cellular services use _____ to provide wireless connectivity to the Internet for smartphones .
3G & 4G
45
New cards
The capacity of a communication channel is measured in _____
Bandwidth
46
New cards
Know the types of bandwidth .
...
47
New cards
Every computer on the Internet has a unique numeric address called a ( n ) _____
IP address
48
New cards
is the process of breaking down information sent or transmitted across the Internet into small parts .
Pocketization
49
New cards
What is TCP / IP ?
Transmission Control Protocol / Internet Protocol
50
New cards
The _____ is the central node that coordinates the flow of data by sending messages directly between the sender and receiver nodes .
Switch
51
New cards
In a computer network , this node that requests and uses resources available from other nodes
Client
52
New cards
This device enables connectivity between two LANS or a LAN and a larger network .
Network gateway
53
New cards
A wireless access point that provides Internet access in a public place such as a coffee shop , library , bookstore , or university .
Hotspot
54
New cards
______ A network topology in which the central node is connected to two or more subordinate nodes that , in turn , are connected to other subordinate nodes .
Tree
55
New cards
This type of network strategy uses central servers to coordinate and supply services to other nodes on the network .
Client server
56
New cards
Organizations use the _____ to allow suppliers and others limited access to their networks
Extranets
57
New cards
All communications between a company's internal networks and the outside world pass through this server .
Proxy
58
New cards
What is a VPN ?
Remote users can connect to an organizations network through this type of secure private connection
59
New cards
What is a Mesh network ?
This type of network topology doesn't use a specific physical layout
60
New cards
The actual connecting or transmission medium that carries the message in a communication system is called the _____
Communication channel
61
New cards
is a high - frequency transmission medium that has a single solid - copper core .
Coaxial cables
62
New cards
is the name of the process of converting from analog to digital .
Digitization
63
New cards
uses standard telephone lines to provide high - speed connections .
ASDL ( asymmetric digital subscriber line ) - DSL
64
New cards
transmits data as pulses of light through tiny tubes of glass .
Fiber - optic cable
65
New cards
What is a local area network ?
Networks w / nodes that are in close proximity
66
New cards
What is a gateway network ?
Device allows one LAN to be linked to other LANs or larger networks
67
New cards
A LAN set up for a household's personal use is called a ( n ) ______ network .
Home area
68
New cards
are countrywide and worldwide networks .
Wide area networks
69
New cards
A ( n ) _______ area network is a type of wireless network that works within your immediate surroundings to connect cell phones to headsets , controllers to game systems , and so on .
Personal
70
New cards
What is a client / server network ?
Use central servers to coordinate & supply services to other nodes on the network
71
New cards
What is an intranet ?
Private network w / in an organization that resembles the internet
72
New cards
What is an extranet ?
Private network w / in an organization that connects more than one organization
73
New cards
What is a server ?
...
74
New cards
In a wireless LAN , all communications pass through the network's centrally located wireless access point or _____ station .
Base
75
New cards
describes how a network is arranged and how resources are coordinated and shared
Networ architecture
76
New cards
Most firewalls include a special computer called a ( n ) ________ server to manage communications between the internal networks and the outside world .
Proxy
77
New cards
People that collect , analyze , and sell personal data are called ______
Information resellers
78
New cards
These programs record virtually everything you do on your computer and are used by employers to search employee email and computer files .
Employee monitoring software what
79
New cards
What are cookies and what are they used for ?
small data files that are deposited on your hard disk from websites you have visited
80
New cards
What types of cookies are there and what are they used for ?
First - party = one generated & then read only by the website you are currently visiting
81
New cards
Third - party = usually generated by an advertising company that is affiliated w / the website you are currently visiting
82
New cards
Programs used to secretly record an individual's activities on the Internet are called ______
Spyware
83
New cards
Which type of program would likely be used by investigators to record a potential suspects ' Internet activities ?
Keystroke logger
84
New cards
A " cracker " is what type of computer criminal ?
Malicious software
85
New cards
Most browsers offer this , which ensures that your browsing activity is not recorded on your hard disk .
Privacy mode
86
New cards
What is malware and what types of malware are there ?
designed to damage or disrupt a computer system
87
New cards
1 ) Viruses
88
New cards
2 ) Worms
89
New cards
3 ) Trojan horse
90
New cards
What type of program replicates itself and clogs computers and networks .
Viruses
91
New cards
Free computer games and free screen saver programs are typical carriers of _____
Trojan horses
92
New cards
What is a denial of service attack ?
...
93
New cards
What is an internet scam ?
...
94
New cards
What is cyberbullying ?
...
95
New cards
The most significant concerns for implementation of computer technology involve _______, security, & ethics.
Privacy
96
New cards
According to which law is it illegal for an owner of a commercial program to make backup copies for their personal use and resell or give them away ?
copies for Digital Millennium Copyright Act
97
New cards
Corporations often use this to prevent copyright violations .
DRM
98
New cards
This uses software to try thousands of common words sequentially in an attempt to gain unauthorized access to a user's account .
Dictionary attack
99
New cards
This type of Wi - Fi hotspot operates close to a legitimate Wi - Fi hotspot and steals information such as usernames and passwords .
Rogue Wi - Fi hotspots
100
New cards
The process of coding information to make it unreadable except to those who have a special piece of information known as a key .
Encryption