IST MIDTERM

0.0(0)
studied byStudied by 0 people
0.0(0)
full-widthCall Kai
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
GameKnowt Play
Card Sorting

1/45

encourage image

There's no tags or description

Looks like no tags are added yet.

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

46 Terms

1
New cards

Best practices for having a secure password

Use a combination of letters, numbers, and symbols; avoid common words and phrases.

2
New cards

Horizontal pathways in a Karel world

They are called streets.

3
New cards

Karel's direction after turnLeft(); turnLeft();

Karel is facing South.

4
New cards

Main function definition in a program

The main function should be defined once.

5
New cards

Calling the main function in a program

The main function should be called once.

6
New cards

While loops in JavaScript

They are used for repeated execution of a block of code as long as a specified condition is true.

7
New cards

Career in visual presentation and design of goods

This is known as a graphic designer.

8
New cards

Career determining computer hardware and software needs

This is known as a systems analyst.

9
New cards

Number designating an 'on' switch in Binary Code

The number is 1.

10
New cards

Single unit of information in binary code

It is expressed as either a solitary 0 or 1.

11
New cards

Physical arrangement of devices on a network

This is referred to as network topology.

12
New cards

Single cable in a bus topology

It functions as a shared communication medium.

13
New cards

Computer network for internal communication

This is known as a Local Area Network (LAN).

14
New cards

Tree topology integration

A Tree topology integrates multiple star topologies together.

15
New cards

Minimum number of computers for a network

At least two computers must be connected.

16
New cards

Text version of an IP address

This is known as a domain name.

17
New cards

Device installed inside each computer connected to a network

This is known as a network interface card (NIC).

18
New cards

Device recognized and installed by a computer on its own

This is known as a plug-and-play device.

19
New cards

Group of files for device communication with OS

This is called a device driver.

20
New cards

Peripheral acting as a portable storage device

This is known as a USB flash drive.

21
New cards

Example of a user application

Examples include Browser, Text editor, Games, File Explorer.

22
New cards

Circuit board with ports and sockets

This is known as a motherboard.

23
New cards

Being an upstander in cyberbullying

You can report the bullying and support the victim.

24
New cards

A person's digital footprint

It is the trail of data you leave online.

25
New cards

Specific instance of copyright violation

This is known as plagiarism.

26
New cards

Making copies of computer data

This is known as data backup.

27
New cards

Crime of identity theft

This involves taking personal information to establish credit and charge items.

28
New cards

Unsolicited commercial email

This is known as spam.

29
New cards

Connected group of computers over a large area

This is known as a Wide Area Network (WAN).

30
New cards

Grouping data in small chunks

This involves using packets that contain sequence numbers.

31
New cards

Setup using multiple paths to connect nodes

This is known as a mesh network.

32
New cards

Most popular OS for desktops and laptops

This is currently Windows.

33
New cards

Extension that only opens on Windows

This is .exe.

34
New cards

32-bit operating system on a 64-bit processor

True.

35
New cards

Interchangeable with the word 'application'

Software is not interchangeable.

36
New cards

Stage of development life cycle for prototypes

This occurs in the design stage.

37
New cards

Stage for quality assurance team involvement

This occurs in the testing stage.

38
New cards

Legal practice of hacking public websites

False.

39
New cards

Citing sources for media use

False; citation does not grant free use.

40
New cards

People who can access your digital footprint

Teachers, colleges, potential employers, family, friends, and acquaintances.

41
New cards

STEM field with more jobs than graduates

This is computer science.

42
New cards

Industries utilizing computer science

Examples include Agriculture, Government, Music, Healthcare, Art, Film.

43
New cards

Centralized powerful computer as a hub

This is known as a client-server model.

44
New cards

Third-party vendor hosting data

This is known as cloud computing.

45
New cards

Small block of data for transmission

This is known as a packet.

46
New cards

Type of coaxial cable used in networking

This is known as RG-6.