Term
| Knowing ______________is important to understanding technology and being understood when talking about it. |
|
Definition
|
|
Term
| The number of times a second that images on the screen are redrawn is called the ____________ |
|
Definition
|
|
Term
| A specified result sought through the use of a precise and systematic method is an __________. |
|
Definition
|
|
Term
| The Process of starting a computer is called ________ |
|
Definition
|
|
Term
| A device that helps you remember a fact or concept is a ____________ |
|
Definition
|
|
Term
| On the computer, programs and information are stored on the __________ |
|
Definition
|
|
Term
|
Definition
|
|
Term
| Undo, Cut, Copy and Paste can usually be found in what menu? |
|
Definition
|
|
Term
| When the computer needs more information from the user before it completes an action, it gets the information via a _______ |
|
Definition
|
|
Term
| The clover-shaped shortcut key on a Macintosh is called the _______ key. |
|
Definition
|
|
Term
| Between client requests from a specific IP address, a Web server might handle _______ or even _____ of requests |
|
Definition
|
|
Term
| All IP addresses of authoritative name servers for LTDs are maintained and managed by 13 ________ servers scattered around the world |
|
Definition
|
|
Term
| A hierarchy or related computers on a network is called _______ |
|
Definition
|
|
Term
| A "please reply" message sent over the internet is called a _____ |
|
Definition
|
|
Term
| A company that supplies connections to the internet is called a _____ |
|
Definition
| Internet Service Provider |
|
|
Term
| Local networks that support communications wholly within an organization are called ______ |
|
Definition
|
|
Term
| The http:// in a Web address is the _____ |
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
| Hypertext Markup Language |
|
|
Term
| ________ are usually used to link to pages on the same site |
|
Definition
|
|
Term
|
Definition
| Graphics Interchange Format |
|
|
Term
|
Definition
| Joint Photographic Experts Group |
|
|
Term
|
Definition
1. Make sure that you can reproduce the error 2. Determine exactly what the problem is 3. Eliminate the “obvious causes” 4. Divide the process, separating out the parts that work from the part that doesn’t 5. When you reach a dead end, reassess your information, asking where you may be making wrong assumptions of conclusions; then step through the process again. 6. As you work through the process from start to finish, make predictions about what should happen and verify that your predictions are fulfilled. |
|
|
Term
| A ______ is a set of rules that determines what is legal for field input |
|
Definition
|
|
Term
| _______ and debugging are essentially the same thing |
|
Definition
|
|
Term
| A _______ is an error in the way a system was developed. |
|
Definition
|
|
Term
| All the possible states in which a piece of software can exist are its ______________ |
|
Definition
|
|
Term
| A ______ program shuts down to avoid causing problems |
|
Definition
|
|
Term
|
Definition
| An agreed upon order for basic symbols |
|
|
Term
| When data are _______, they are separate and distinct and cannot be transformed into another value by gradations. |
|
Definition
|
|
Term
| all the vales in a PandA formulation are _____ |
|
Definition
|
|
Term
| The ____ of a bit is its storage pattern in the physical world |
|
Definition
|
|
Term
| All computer systems share a _____ set of symbols used to represent characters |
|
Definition
|
|
Term
| An Algorithm has five basic requirements |
|
Definition
| inputs specified, outputs specified, definiteness, effectiveness and finiteness |
|
|
Term
| ________ specific example and generating an idea from it |
|
Definition
|
|
Term
| Five steps in the Fetch/Execute Cycle |
|
Definition
| Instruction Fetch, Instruction Decode, Data Fetch, Instruction Execution and Result Room |
|
|
Term
| the ______ is used in the: Instruction Execution |
|
Definition
|
|
Term
| Modern Computers know how many instructions? |
|
Definition
|
|
Term
|
Definition
| Sampling rate of sound is roughly twice what humans can hear |
|
|
Term
| A program that embeds itself in another program, copies itself, and spreads to other computers |
|
Definition
|
|
Term
| a program that copies itself from one machine to another across a network |
|
Definition
|
|
Term
| is the illegal use of email to scam users into surrendering their personal information, usually items like social security numbers, bank account numbers, and credit card numbers |
|
Definition
|
|