cgs2100 exam 3

0.0(0)
learnLearn
examPractice Test
spaced repetitionSpaced Repetition
heart puzzleMatch
flashcardsFlashcards
Card Sorting

1/127

flashcard set

Earn XP

Study Analytics
Name
Mastery
Learn
Test
Matching
Spaced

No study sessions yet.

128 Terms

1
New cards
Know how hard disks store and organize files.
using tracks, sectors, and cylinders
2
New cards
What does the internal hard disk normally store?
programs and data files
3
New cards
Wedge shaped sections on hard disk
sectors
4
New cards
_____________ are a popular solution for individuals and businesses where access speed is not essential, but capacity and durability are crucial.
network drives
5
New cards
Know examples of secondary storage.
solid-state, hard disk, optical disk, cloud
6
New cards
How does an external hard drive connect to a computer?
USB or Thunderbolt port on the system unit
7
New cards
Storage that retains its data after the power is turned off is referred to as ________
non-volatile storage/memory
8
New cards
The process of accessing information from secondary storage devices is referred to as ________
reading
9
New cards
The ________ of a secondary storage device indicates how much data the storage medium can hold
capacity
10
New cards
________ measures the amount of time required by the storage device to retrieve data and programs
access speed
11
New cards
What is file compression and what is it used for? What is file decompression?
A hard disk performance enhancement that increases storage capacity by reducing the amount of space required to store data and programs.
(decompression: Rebuilding a file that has been compressed)
12
New cards
This process improves system performance by acting as a temporary high-speed holding area between a secondary storage device and the CPU.
disk caching
13
New cards
Know the characteristics of RAID storage
Expanding external storage, improving access speed, and providing reliable storage.
- also increases the storage capacity of the system
14
New cards
What are 4 ways to improve the performance of a hard disk?
Disk caching, RAID, and file compression
15
New cards
What are examples of solid state storage?
- Solid-state drives
- Flash memory cards
- USB drives
16
New cards
What type of storage technology does a cell phone use?
flash memory (solid state storage)
17
New cards
Optical disks use ___________ to represent data.
pits and lands
18
New cards
Know about CD-RW, DVD-ROM drives, Ultra HD Blu-ray and Blu-ray. What does the R in DVD-R stand for?
CD-RW: can be erased and rewritten
R in DVD-R: recordable
Blu ray: have a capacity of 50 gigabytes on one side
19
New cards
How are solid state storage devices and hard disks different?
solid state drives have no moving parts
20
New cards
What is it called when servers on the internet supply applications as a service, rather than a product?
Cloud computing
21
New cards
What is cloud storage?
a place to save your files and can be accessed anywhere via the internet
22
New cards
________ speed is the measure of the amount of time required by a storage device to retrieve data and programs.
Access
23
New cards
What is disc caching?
-Provides a temporary high-speed holding area between a secondary storage device and the CPU
-Improves performance by anticipating data needs and reducing time to access data from secondary storage
24
New cards
What are hybrid drives?
Storage drives that contain both solid-state storage and hard disks in an attempt to gain the speed and power benefits of SSDs while still having the low cost and large capacity of hard drives.
25
New cards
USB drives are also known as ______
flash drives
26
New cards
Three common storage options discussed in your text are hard disk, ________, and solid-state storage.
optical disk
27
New cards
Most large organizations store data through a strategy called a(n) ________ to promote efficient and safe use of data across the networks within their organizations.
enterprise storage system
28
New cards
One of the most dramatic changes in connectivity and communications in the past few years has been ________.
Widespread use of mobile devices with wireless internet connectivity
29
New cards
Which devices originate and accept messages in the form of data, information, and/or instructions?
Computer or specialized communication device.
30
New cards
In a communication system, which devices convert messages into packets that can travel across the communication channel?
Connection devices
31
New cards
Know the wireless connections and physical connections.
Wireless connections do not use a solid substance to connect devices (wifi, bluetooth).
Physical connections used a solid medium to connect sending and receiving devices. Connections include twisted-pair cable (Ethernet cables) and fiber-optic cable.
32
New cards
Which of the physical connections is the fastest?
Fiber-optic cable
33
New cards
Which of the wireless connections is considered a line-of-sight medium?
microwave, FM radio
34
New cards
What does WiMax stand for?
Worldwide Interoperability for Microwave Access
35
New cards
Microwave communication uses high-frequency ________.
radio waves
36
New cards
________ is a term relating to sending data to a satellite.
uplink
37
New cards
10. The GPS device in an automobile uses which communication channel?
satellite
38
New cards
11. A service that uses existing phone lines to provide high-speed connections is called ________.
hotspot
39
New cards
12. Cellular services use ________ to provide wireless connectivity to the Internet for smartphones.
3G and 4G
40
New cards
13. The capacity of a communication channel is measured in ________.
bandwidth
41
New cards
14. Know the types of bandwidth.
voiceband aka low bandwidth; standard phone line; too slow for many types of transmissions (video)
medium band: special leased lines for high speed minicomputers --> mainframes long distances; not usually individuals
broadband: used for high-capacity transmissions (DSL, cable, satellite connections); high=quality video
baseband = widely used to connect individual computers that are located close to one another
42
New cards
15. Every computer on the Internet has a unique numeric address called a(n) ________.
IP address
43
New cards
16. ________ is the process of breaking down information sent or transmitted across the Internet into small parts.
Packetization
44
New cards
17. What is TCP/IP?
Transmission Control Protocol/Internet Protocol
45
New cards
18. The ________ is the central node that coordinates the flow of data by sending messages directly between the sender and receiver nodes.
switch
46
New cards
19. In a computer network, this node that requests and uses resources available from other nodes.
client
47
New cards
20. This device enables connectivity between two LANS or a LAN and a larger network.
network gateway
48
New cards
21. A wireless access point that provides Internet access in a public place such as a coffee shop, library, bookstore, or university.
hotspot
49
New cards
22. ______, A network topology in which the central node is connected to two or more subordinate nodes that, in turn, are connected to other subordinate nodes.
tree
50
New cards
23. This type of network strategy uses central servers to coordinate and supply services to other nodes on the network.
client/server
51
New cards
24. Organizations use _________ to allow suppliers and others limited access to their networks.
extranets
52
New cards
25. All communications between a company's internal networks and the outside world pass through this server.
proxy
53
New cards
26. What is a VPN?
Remote users can connect to an organization's network through this type of secure private connection.
54
New cards
27. What is a Mesh network?
type of network topology that does not use a specific physical layout
55
New cards
28. The actual connecting or transmission medium that carries the message in a communication system is called the ________.
communication channel
56
New cards
29. ________ is a high-frequency transmission medium that has a single solid-copper core.
coaxial cables
57
New cards
30. ________ is the name of the process of converting from analog to digital.
digitization or demodulation
58
New cards
31. ________ uses standard telephone lines to provide high-speed connections.
DSL
59
New cards
32. ________ transmits data as pulses of light through tiny tubes of glass.
fiber optic cable
60
New cards
33. What is a local area network?
LAN, small groups of computers linked together over a small geographic area
61
New cards
34. What is a gateway network?
enables connectivity between two LANS or a LAN and a larger network
62
New cards
35. A LAN set up for a household's personal use is called a(n) ________ network.
home
63
New cards
36. ________ are countrywide and worldwide networks.
Wide area network
64
New cards
37. A(n) ________ area network is a type of wireless network that works within your immediate surroundings to connect cell phones to headsets, controllers to game systems, and so on.
personal
65
New cards
38. What is a client/server network?
the internet
66
New cards
39. What is an intranet?
private network within an organization
- works like internet
67
New cards
40. What is an extranet?
Organizations use the following to allow suppliers and others limited access to their networks.
68
New cards
41. What is a server?
coordinates all communication between computers.
69
New cards
42. In a wireless LAN, all communications pass through the network's centrally located wireless access point or ________ station.
base
70
New cards
43. ________ describes how a network is arranged and how resources are coordinated and shared.
network architecture
71
New cards
44. Most firewalls include a special computer called a(n) ________ server to manage communications between the internal networks and the outside world.
gateway
72
New cards
1. People that collect, analyze, and sell personal data are called ________.
information resellers
73
New cards
2. These programs record virtually everything you do on your computer and are used by employers to search employee email and computer files.
Employee monitoring software
74
New cards
3. What are cookies and what are they used for?
Small data files that are deposited on a user's hard disk when they visit a website are called
75
New cards
4. What types of cookies are there and what are they used for?
3rd party cookies: used by advertisers to keep track of your web activity as you move from one site to the next
1st party cookies: generated and then read only by the web site you are currently visiting.
76
New cards
5. Programs used to secretly record an individual's activities on the Internet are called ________.
spyware
77
New cards
6. Which type of program would likely be used by investigators to record a potential suspects' Internet activities?
keystroke logger
78
New cards
7. A "cracker" is what type of computer criminal?
creates and distributes malicious programs
79
New cards
8. Most browsers offer this, which ensures that your browsing activity is not recorded on your hard disk.
privacy mode
80
New cards
9. What is malware and what types of malware are there?
Viruses and other things that can harm computers
81
New cards
10. What type of program replicates itself and clogs computers and networks.
worms
82
New cards
11. Free computer games and free screen saver programs are typical carriers of ________.
trojan horses
83
New cards
12. What is a denial of service attack?
A way to shut down an ISP or website
84
New cards
13. What is an internet scam?
fraudulent or deceptive act designed to trick individuals on the Internet into spending time or money for little or no return
85
New cards
14. What is cyberbullying?
duh
86
New cards
15. The most significant concerns for implementation of computer technology involve ________, security, and ethics.
privacy
87
New cards
16. According to which law is it illegal for an owner of a commercial program to make backup copies for their personal use and resell or give them away?
Digital Millennium Copyright act
88
New cards
17. Corporations often use this to prevent copyright violations.
Digital rights management (drm)
89
New cards
18. This uses software to try thousands of common words sequentially in an attempt to gain unauthorized access to a user's account.
Dictionary attack
90
New cards
19. This type of Wi-Fi hotspot operates close to a legitimate Wi-Fi hotspot and steals information such as usernames and passwords.
rogue
91
New cards
20. The process of coding information to make it unreadable except to those who have a special piece of information known as a key.
encryption
92
New cards
21. A ________ acts as a security buffer between a corporation's private network and all external networks.
firewall
93
New cards
22. What is wireless network encryption and what is the most common type?
WPA2
94
New cards
25. This is a legal concept that gives content creators the right to control use and distribution of their work.
copyright
95
New cards
26. This law gives you the right to look at your personal records held by government agencies.
freedom of information act
96
New cards
27. Computer criminals that create and spread viruses are punished under this law.
Computer fraud and abuse act
97
New cards
28. ________, a privacy issue, relates to the responsibility of controlling who is able to use data.
Access
98
New cards
29. The collection of data can be searched to find all the action of one person creates a(n) ________ that reveals a highly detailed account of your life.
digital footprint
99
New cards
30. ________ is the illegal assumption of someone's identity for the purposes of economic gain.
identity theft
100
New cards
31. ________ store information about the current session, your general preferences, and your activity on the website.
First party cookies