1/45
Looks like no tags are added yet.
Name | Mastery | Learn | Test | Matching | Spaced |
|---|
No study sessions yet.
Best practices for having a secure password
Use a combination of letters, numbers, and symbols; avoid common words and phrases.
Horizontal pathways in a Karel world
They are called streets.
Karel's direction after turnLeft(); turnLeft();
Karel is facing South.
Main function definition in a program
The main function should be defined once.
Calling the main function in a program
The main function should be called once.
While loops in JavaScript
They are used for repeated execution of a block of code as long as a specified condition is true.
Career in visual presentation and design of goods
This is known as a graphic designer.
Career determining computer hardware and software needs
This is known as a systems analyst.
Number designating an 'on' switch in Binary Code
The number is 1.
Single unit of information in binary code
It is expressed as either a solitary 0 or 1.
Physical arrangement of devices on a network
This is referred to as network topology.
Single cable in a bus topology
It functions as a shared communication medium.
Computer network for internal communication
This is known as a Local Area Network (LAN).
Tree topology integration
A Tree topology integrates multiple star topologies together.
Minimum number of computers for a network
At least two computers must be connected.
Text version of an IP address
This is known as a domain name.
Device installed inside each computer connected to a network
This is known as a network interface card (NIC).
Device recognized and installed by a computer on its own
This is known as a plug-and-play device.
Group of files for device communication with OS
This is called a device driver.
Peripheral acting as a portable storage device
This is known as a USB flash drive.
Example of a user application
Examples include Browser, Text editor, Games, File Explorer.
Circuit board with ports and sockets
This is known as a motherboard.
Being an upstander in cyberbullying
You can report the bullying and support the victim.
A person's digital footprint
It is the trail of data you leave online.
Specific instance of copyright violation
This is known as plagiarism.
Making copies of computer data
This is known as data backup.
Crime of identity theft
This involves taking personal information to establish credit and charge items.
Unsolicited commercial email
This is known as spam.
Connected group of computers over a large area
This is known as a Wide Area Network (WAN).
Grouping data in small chunks
This involves using packets that contain sequence numbers.
Setup using multiple paths to connect nodes
This is known as a mesh network.
Most popular OS for desktops and laptops
This is currently Windows.
Extension that only opens on Windows
This is .exe.
32-bit operating system on a 64-bit processor
True.
Interchangeable with the word 'application'
Software is not interchangeable.
Stage of development life cycle for prototypes
This occurs in the design stage.
Stage for quality assurance team involvement
This occurs in the testing stage.
Legal practice of hacking public websites
False.
Citing sources for media use
False; citation does not grant free use.
People who can access your digital footprint
Teachers, colleges, potential employers, family, friends, and acquaintances.
STEM field with more jobs than graduates
This is computer science.
Industries utilizing computer science
Examples include Agriculture, Government, Music, Healthcare, Art, Film.
Centralized powerful computer as a hub
This is known as a client-server model.
Third-party vendor hosting data
This is known as cloud computing.
Small block of data for transmission
This is known as a packet.
Type of coaxial cable used in networking
This is known as RG-6.