Shared Flashcard Set

Details

UGA FINAL
1100
140
Computer Science
Not Applicable
04/30/2004

Additional Computer Science Flashcards

 


 

Cards

Term
1) HTTP is best described as
Definition
a) A protocol used for communication between Web browsers and Web servers
Term
2) The part of the central processing unit that adds and subtracts numbers is called the
Definition
b) ALU
Term
3) The File Allocation Table used by most Windows computers in the early 90’s used a 16-bit cluster address. How many different cluster addresses were possible using this scheme?
Definition
c) 2^16
Term
4) The 16-bit cluster address became a problem in the mid-90’s, due to the continuing increase in
Definition
b) disk size
Term
5) Napster is no longer with us in its original form, because it had an unresolvable problem involving
Definition
d) intellectual property
Term
6) This diagram, taken from our text, illustrates the difference between ****
Definition
c) Analog and digital waveforms
Term
7) RISC is best described as a
Definition
a) Design philosophy for computer CPUs
Term
8) The ability of a communication system to handle multiple data transmissions on the same physical medium (for example, many TV channels on a single cable) is called
Definition
d) multiplexing
Term
9) An IP address that your computer gets from its ISP, and which may be different each time you connect, is called
Definition
b) dynamic
Term
10) Linux and MacOS are examples of this type of program, which is essential for a computer system to run:
Definition
a) operating system
Term
11) All of the following are compression techniques except
Definition
d) dithering
Term
12) Copying the text of President Adam’s convocation speech for a satire or parody is
Definition
b) A protected activity under the Fair Use Doctrine
Term
13) Fast access to the Internet from home is provided by which technology?
Definition
d) DSL
Term
14) The ASCII code is used to represent
Definition
b) Plain text characters
Term
15) The term codec is best defined as
Definition
c) An algorithm for encoding and decoding digital media files
Term
16) Web pages with snazzy graphics can be visually stunning, but unfortunately the images may take a long time to download. A technology specifically designed to deal with this problem is
Definition
a) Compression
Term
18) Clicking the middle of the three buttons shown in the picture above
Definition
e) Leaves the application window open, but no longer filling the screen
Term
19) Which of the following is a protocol specifically for getting Email messages from a server?
Definition
IMAP
Term
20) The number of bits per second that can be transmitted across a network connection is called
Definition
Bandwidth
Term
21) When a large organization decides to link the separate computer systems in all its branches and departments into a single organization-wide system, they have entered the domain of
Definition
Enterprise computing
Term
22) Large central computing resources such as OASIS achieve a very high level of reliability through
Definition
redundancy
Term
23) Renaming the file “Secret Message.doc” to “Secret Message.spy”
Definition
Is not advisable, because the operating system will not know what application to use to open this file
Term
24) If you were creating a database table called “member” to keep the names and addresses of members of the UGA Anime society, the information kept about one member would occupy one
Definition
record
Term
25) Continuing with the question above, a piece of data that you collect for each member, such as whether or not the member speaks Japanese, would be a single
Definition
Field
Term
27) Expressions like

in HTML documents are called

Definition
tags
Term
28) All of the following are graphic formats except
Definition
MP3
Term
29) Gnutella uses all of the following technologies except:
Definition
Client-server
Term
30) Excel provides SUM, AVERAGE, and COUNT as useful
Definition
functions
Term
31) This company, started by a couple of scruffy teenage kids in California, made millions by selling the first computers that were affordable and easy to use:
Definition
Apple
Term
32) The possibility of affordable personal computers is due to this hardware invention:
Definition
microprocessor
Term
33) If Bob sends a message to Alice encrypted with Alice’s public key, it must be decrypted using
Definition
Alice’s private key
Term
34) The message in the question above
Definition
Can only be read by Alice
Term
35) For what purpose would Bob typically encode a message for Alice using Alice’s private key?
Definition
Under no normal circumstances would Bob do this
Term
36) A technology that allows you to start listening to an MP3 music file from the Web before the file has finished downloading is
Definition
streaming
Term
37) When a small business becomes successful, it may out grow its business information systems. Dealing with this welcome problem involves the issue of
Definition
scalability
Term
38) Which filename extension marks an executable support module?
Definition
DLL
Term
39) Several computers in the same household can share a fast Internet connection using this technology:
Definition
Routers
Term
40) Which computer language is found embedded in Web pages?
Definition
Javascript
Term
41) A performance-enhancing feature found on Macintosh computers but not Windows machines is
Definition
RISC
Term
42) According to the lecture on voting machines,
Definition
a) Georgia was the first state to hold a statewide election using only electronic voting machines
Term
43) Data transmitted on the Internet is divided into separate units called
Definition
Packets
Term
44) These data units are steered to the destination computer, which may be all the way on the other side of the world, using
Definition
IP addresses
Term
45) The speed of a microprocessor chip is measured in
Definition
megahertz
Term
46) What is the effect of the dot-com bubble on the current IT job market?
Definition
Collapse of the bubble has left many IT professionals temporarily unemployed
Term
47) Two computers are able to communicate with each other over a network if and only if they
Definition
Use the same protocols
Term
In order to improve voter confidence and eliminate suspicion about the Diebold voting machines,
Definition
The machines are tested and evaluated by an independent laboratory before the election
Term
49) According to the lecture on jobs in the information technology area, the most serious long-term threat to IT job prospects is
Definition
overseas outsourcing
Term
50) The ARCHES computing resource at UGA is an example of a
Definition
cluster
Term
51) Which of the following phases of the software lifecycle comes first?
Definition
Analysis
Term
52) When your computer is turned off, which of the following is stored in the RAM memory?
Definition
none of the above
Term
53) Which application program is best suited for maintaining the membership list of a church or a city soccer league?
Definition
Access
Term
54) In order to save a Word document under a different file name, you would use
Definition
The File menu
Term
55) In order to sort the data in an Excel spreadsheet, you would use
Definition
the Data menu
Term
56) A computer program is basically a long list of
Definition
Machine language instructions
Term
57) Which of the following would be most likely the task of an event handler?
Definition
Responding when the user clicks a button in a program
Term
In the movie database example covered in class, movies and reviews were kept in separate
Definition
tables
Term
59) The graphic below represents the operation of a(n)
Definition
Distributed virtual supercomputer
Term
Which type of unwelcome thing is most likely to arrive hidden in an email message?
Definition
a worm
Term
61) Forgetting to remove diskettes from the computer when you turn it off increases your vulnerability to
Definition
Boot sector viruses
Term
62) What happens if two computers in your CS lab attempt to transmit data at the same time?
Definition
The two senders each back off and retransmit after a delay
Term
63) Which technology uses an alternate method for dealing with the problem situation mentioned in the question above?
Definition
Token-ring
Term
64) If you have just finished typing your term paper using Microsoft Word, and decide that the concluding paragraph is so good that it should be colored pink and displayed in a large fancy font, the first thing you must do is
Definition
Select the paragraph whose formatting you want to change
Term
65) Which of the following memory and storage components has the fastest access time?
Definition
RAM memory
Term
66) Which of the following memory and storage components has the largest storage capacity?
Definition
Internal hard disk
Term
67) Surprise! You find a nice new laptop computer under the tree this Christmas. Which of the following would be the most likely amount of RAM memory on this machine?
Definition
256 megabytes
Term
68) The UGA email system uses a filtering heuristic to attempt to detect junk email. If the mail systems thinks that a particular message is junk mail, it will
Definition
Move the message to a special Junk folder, and delete it after nine days
Term
69) Another term for junk email is
Definition
spam
Term
70) USB is a type of
Definition
cable for connecting peripheral devices
Term
71) In a Web page, underlined text that can be clicked on to go to a different page is called a(n)
Definition
hyperlink
Term
72) The number of different colors available in a digital image is controlled by its
Definition
color depth
Term
73) In which of the following computer languages can we specify a correct result without telling the steps which the computer must take to get the result?
Definition
SQL
Term
74) A virus scanning program maintains a list of unique bit patterns that identify different viruses. These patterns are called
Definition
signatures
Term
75) The network hardware used in our computer labs is
Definition
Ethernet
Term
76) Uh-oh! The message shown at right indicates a possible attack by
Definition
The MS Blaster worm
Term
77) A destructive action taken by a virus is called its
Definition
Payload
Term
78) MP3 players such as Winamp use the following technique to compensate for variable delays in transmitting music packets via the TCP-IP protocol:
Definition
buffering
Term
79) A special piece of software that allows applications on your computer to control a graphics card is called a
Definition
device driver
Term
80) When a cache is full and more data needs to be cached, the system must pick some data to be removed from the cache. The system makes this decision using the
Definition
Least-recently-used principle
Term
81) Which part of your computer belongs to the operating system layer?
Definition
your TCP-IP software
Term
82) In our movie database example we separated the data into two tables instead of maintaining all the data in a single table. What were the entities represented by each table?
Definition
movies and movie reviews
Term
83) The process of revising tables and entities as we did with the movie database above is called
Definition
normalization
Term
84) In a three-tier database, the middle tier is the
Definition
Web server
Term
85) The location of a Web page on the Internet is given by its
Definition
URL
Term
86) A file virus can reproduce itself and take destructive actions only when
Definition
An executable file infected with the virus is launched
Term
87) The operating system used on the computers in our CSCI 1100 labs is
Definition
Microsoft Windows XP
Term
88) Distributing public encryption keys is the task of a
Definition
a)Certificate authority c) Security server
b)Security router d) Data warehouse
Term
89) The part of your computer that actually executes program instructions is the
Definition
CPU
Term
91) Two types of computers that are both large, powerful, and expensive, but used for different purposes, are
Definition
Mainframes and supercomputers
Term
92) One billion bytes is approximately equal to one
Definition
gigabyte
Term
the Web site is allowed to store certain information on your computer’s disk. Then when you re-connect, the Web site can retrieve this information so you do not have to type it in a second time. this stored information are called
Definition
cookies
Term
If you were setting up a database to maintain tourist information about Georgia, you would probably include a table of hotels in Georgia. The information about one particular hotel would occupy one database
Definition
Record
Term
95) Continuing the previous question, a piece of information that was kept for each hotel, such as the price or whether the hotel has a swimming pool, would be a database
Definition
attribute
Term
Continuing the previous question, when we use the database to look up hotels near Athens with swimming pools, this would be a database
Definition
attribute
Term
98) The GNU project is involved with
Definition
Open-source software
Term
99) The key hardware invention that made affordable personal computers possible was
Definition
The microprocessor
Term
100) A firewall protects your computer by
Definition
shutting off TCP ports
Term
TCP and HTTP are
Definition
Network protocols
Term
In the film Paperback Computer, we see a psychological experiment involving a young boy drinking a glass of milk. The point of this experiment was to show
Definition
The importance of visual perception in our mental worldview
Term
Requirements analysis, design, and testing are all part of the
Definition
Systems life cycle
Term
The term true color refers to which property of a graphic image?
Definition
color depth
Term
MPEG and QuickTime are
Definition
digital video formats
Term
Rendering and ray tracing are techniques used in
Definition
3-D graphics
Term
Direct, parallel, and pilot are different methods for
Definition
converting to a new computer system
Term
Which of the following would be an activity of the design stage of the software lifecycle?
Definition
Writing specifications
Term
A compression scheme that maintains all of the original file information, so that the original file can be exactly reconstituted from the compressed version, is called
Definition
lossless
Term
Which type of software is used to make structured, routine decisions?
Definition
Management information system
Term
In the expression the_bad_thang = document.getElementById(‘yo_mama’) , getElementById is
Definition
a function
Term
The diagram shown below is intended to illustrate the trend of costs during which phase of the software development life cycle?
Definition
maintenance
Term
To make all the H3 elements in a page be colored blue, you would use which language?
Definition
CSS
Term
When machine A wants to send an IP packet to machine B, machine A needs to figure out whether machine B is on the same local network as machine A. In order to make this determination machine A uses
Definition
its netmask
Term
Continuing the previous question, if machine A determines that machine B is not on the same network, machine A
Definition
Sends the packet to its gateway
Term
A digital video that flickers on the screen might have too low a
Definition
frame rate
Term
A technique that uses a checkerboard effect of different-colored pixels to simulate the appearance of a smoothly changing color is
Definition
analog and digital
Term
A company whose business is providing Internet connectivity to consumers like you is a(n)
Definition
ISP
Term
An IP address that may change each time you connect is called:
Definition
Dynamic
Term
Which language is preferred for specifying the color, font, and size of text on a Web page?
Definition
CSS
Term
26) “Downstream and upstream rates” refer to
Definition
How fast your computer can receive and send bits to and from a server
Term
27) Which of the following terms is a way of getting Internet access to your home across telephone lines?
Definition
DSL
Term
Which of the following terms is a way of getting Internet access to your home across telephone lines?
Definition
DSL
Term
28) Which language is preferred for specifying interactive behavior of a Web page, such as items lighting up when you move the mouse over them?
Definition
JavaScript
Term
29) In the HTML tag

….

, className is best described as
Definition
An attribute that specifies style information
Term
The “10,000 eyes effect” is
a) A network security problem
Definition
An argument for using open source software
Term
32) If a digital image is described as “300 x 200,” this would be a specification of the image’s
Definition
Resolution
Term
34) Describing a software program as open source means that
Definition
You can get this program without paying a licensing fee
Term
35) A generic term for techniques that allow many computers to transmit data on the same wire or other physical medium is
Definition
multiplexing
Term
36) All of the following are graphics formats except:
a)GIF b)BMP c) JPG
d) XML
Definition
d) XML
Term
37) All of the following are procedural languages except
a)Java b) SQL c) C++ d) Visual Basic
Definition
b) SQL
Term
38) In the HTML expression

… class is

Definition
an attribute
Term
39) In the HTML expression

… P is

Definition
The tag name
Term
40) FTP is used for
Definition
Uploading and downloading files
Term
41) MP3 is best described as a(n)
Definition
encoding system or format
Term
42) The computer wizards who developed the first graphical user interface worked at
Definition
Xerox PARC
Term
43) These computer wizards came up with the idea for the graphical user interface by observing the thought processes of
Definition
Children
Term
44) The person who made the decision to develop and market the first commercially available computer with a graphical user interface was
Definition
Steve Jobs
Term
45) What is the easiest way to get a firewall for your Windows XP system?
Definition
Use the built-in firewall software in Windows XP
Term
46) The practice of contracting jobs out to foreign countries instead of hiring American workers to do the same job is called
Definition
offshoring
Term
47) In order to set up a home computer network, your cable modem or DSL connection should be connected directly to a(n)
Definition
Router
Term
48) This technique is used by MP3 to reduce the file size of a track without compromising its sound quality:
Definition
perceptual encoding
Term
49) The general term for techniques to reduce the size of a file without losing too much of its information content or perceived quality is
Definition
compression
Term
50) In an Ethernet network, if two stations attempt to transmit at the same time
Definition
Both stations back off and retransmit after a short delay
Supporting users have an ad free experience!