Term
| 1) HTTP is best described as |
|
Definition
| a) A protocol used for communication between Web browsers and Web servers |
|
|
Term
| 2) The part of the central processing unit that adds and subtracts numbers is called the |
|
Definition
|
|
Term
| 3) The File Allocation Table used by most Windows computers in the early 90’s used a 16-bit cluster address. How many different cluster addresses were possible using this scheme? |
|
Definition
|
|
Term
| 4) The 16-bit cluster address became a problem in the mid-90’s, due to the continuing increase in |
|
Definition
|
|
Term
| 5) Napster is no longer with us in its original form, because it had an unresolvable problem involving |
|
Definition
|
|
Term
| 6) This diagram, taken from our text, illustrates the difference between **** |
|
Definition
| c) Analog and digital waveforms |
|
|
Term
| 7) RISC is best described as a |
|
Definition
| a) Design philosophy for computer CPUs |
|
|
Term
| 8) The ability of a communication system to handle multiple data transmissions on the same physical medium (for example, many TV channels on a single cable) is called |
|
Definition
|
|
Term
| 9) An IP address that your computer gets from its ISP, and which may be different each time you connect, is called |
|
Definition
|
|
Term
| 10) Linux and MacOS are examples of this type of program, which is essential for a computer system to run: |
|
Definition
|
|
Term
| 11) All of the following are compression techniques except |
|
Definition
|
|
Term
| 12) Copying the text of President Adam’s convocation speech for a satire or parody is |
|
Definition
| b) A protected activity under the Fair Use Doctrine |
|
|
Term
| 13) Fast access to the Internet from home is provided by which technology? |
|
Definition
|
|
Term
| 14) The ASCII code is used to represent |
|
Definition
|
|
Term
| 15) The term codec is best defined as |
|
Definition
| c) An algorithm for encoding and decoding digital media files |
|
|
Term
| 16) Web pages with snazzy graphics can be visually stunning, but unfortunately the images may take a long time to download. A technology specifically designed to deal with this problem is |
|
Definition
|
|
Term
| 18) Clicking the middle of the three buttons shown in the picture above |
|
Definition
| e) Leaves the application window open, but no longer filling the screen |
|
|
Term
| 19) Which of the following is a protocol specifically for getting Email messages from a server? |
|
Definition
|
|
Term
| 20) The number of bits per second that can be transmitted across a network connection is called |
|
Definition
|
|
Term
| 21) When a large organization decides to link the separate computer systems in all its branches and departments into a single organization-wide system, they have entered the domain of |
|
Definition
|
|
Term
| 22) Large central computing resources such as OASIS achieve a very high level of reliability through |
|
Definition
|
|
Term
| 23) Renaming the file “Secret Message.doc” to “Secret Message.spy” |
|
Definition
| Is not advisable, because the operating system will not know what application to use to open this file |
|
|
Term
| 24) If you were creating a database table called “member” to keep the names and addresses of members of the UGA Anime society, the information kept about one member would occupy one |
|
Definition
|
|
Term
| 25) Continuing with the question above, a piece of data that you collect for each member, such as whether or not the member speaks Japanese, would be a single |
|
Definition
|
|
Term
27) Expressions like in HTML documents are called |
|
Definition
|
|
Term
| 28) All of the following are graphic formats except |
|
Definition
|
|
Term
| 29) Gnutella uses all of the following technologies except: |
|
Definition
|
|
Term
| 30) Excel provides SUM, AVERAGE, and COUNT as useful |
|
Definition
|
|
Term
| 31) This company, started by a couple of scruffy teenage kids in California, made millions by selling the first computers that were affordable and easy to use: |
|
Definition
|
|
Term
| 32) The possibility of affordable personal computers is due to this hardware invention: |
|
Definition
|
|
Term
| 33) If Bob sends a message to Alice encrypted with Alice’s public key, it must be decrypted using |
|
Definition
|
|
Term
| 34) The message in the question above |
|
Definition
| Can only be read by Alice |
|
|
Term
| 35) For what purpose would Bob typically encode a message for Alice using Alice’s private key? |
|
Definition
| Under no normal circumstances would Bob do this |
|
|
Term
| 36) A technology that allows you to start listening to an MP3 music file from the Web before the file has finished downloading is |
|
Definition
|
|
Term
| 37) When a small business becomes successful, it may out grow its business information systems. Dealing with this welcome problem involves the issue of |
|
Definition
|
|
Term
| 38) Which filename extension marks an executable support module? |
|
Definition
|
|
Term
| 39) Several computers in the same household can share a fast Internet connection using this technology: |
|
Definition
|
|
Term
| 40) Which computer language is found embedded in Web pages? |
|
Definition
|
|
Term
| 41) A performance-enhancing feature found on Macintosh computers but not Windows machines is |
|
Definition
|
|
Term
| 42) According to the lecture on voting machines, |
|
Definition
| a) Georgia was the first state to hold a statewide election using only electronic voting machines |
|
|
Term
| 43) Data transmitted on the Internet is divided into separate units called |
|
Definition
|
|
Term
| 44) These data units are steered to the destination computer, which may be all the way on the other side of the world, using |
|
Definition
|
|
Term
| 45) The speed of a microprocessor chip is measured in |
|
Definition
|
|
Term
| 46) What is the effect of the dot-com bubble on the current IT job market? |
|
Definition
| Collapse of the bubble has left many IT professionals temporarily unemployed |
|
|
Term
| 47) Two computers are able to communicate with each other over a network if and only if they |
|
Definition
|
|
Term
| In order to improve voter confidence and eliminate suspicion about the Diebold voting machines, |
|
Definition
| The machines are tested and evaluated by an independent laboratory before the election |
|
|
Term
| 49) According to the lecture on jobs in the information technology area, the most serious long-term threat to IT job prospects is |
|
Definition
|
|
Term
| 50) The ARCHES computing resource at UGA is an example of a |
|
Definition
|
|
Term
| 51) Which of the following phases of the software lifecycle comes first? |
|
Definition
|
|
Term
| 52) When your computer is turned off, which of the following is stored in the RAM memory? |
|
Definition
|
|
Term
| 53) Which application program is best suited for maintaining the membership list of a church or a city soccer league? |
|
Definition
|
|
Term
| 54) In order to save a Word document under a different file name, you would use |
|
Definition
|
|
Term
| 55) In order to sort the data in an Excel spreadsheet, you would use |
|
Definition
|
|
Term
| 56) A computer program is basically a long list of |
|
Definition
| Machine language instructions |
|
|
Term
| 57) Which of the following would be most likely the task of an event handler? |
|
Definition
| Responding when the user clicks a button in a program |
|
|
Term
| In the movie database example covered in class, movies and reviews were kept in separate |
|
Definition
|
|
Term
| 59) The graphic below represents the operation of a(n) |
|
Definition
| Distributed virtual supercomputer |
|
|
Term
| Which type of unwelcome thing is most likely to arrive hidden in an email message? |
|
Definition
|
|
Term
| 61) Forgetting to remove diskettes from the computer when you turn it off increases your vulnerability to |
|
Definition
|
|
Term
| 62) What happens if two computers in your CS lab attempt to transmit data at the same time? |
|
Definition
| The two senders each back off and retransmit after a delay |
|
|
Term
| 63) Which technology uses an alternate method for dealing with the problem situation mentioned in the question above? |
|
Definition
|
|
Term
| 64) If you have just finished typing your term paper using Microsoft Word, and decide that the concluding paragraph is so good that it should be colored pink and displayed in a large fancy font, the first thing you must do is |
|
Definition
| Select the paragraph whose formatting you want to change |
|
|
Term
| 65) Which of the following memory and storage components has the fastest access time? |
|
Definition
|
|
Term
| 66) Which of the following memory and storage components has the largest storage capacity? |
|
Definition
|
|
Term
| 67) Surprise! You find a nice new laptop computer under the tree this Christmas. Which of the following would be the most likely amount of RAM memory on this machine? |
|
Definition
|
|
Term
| 68) The UGA email system uses a filtering heuristic to attempt to detect junk email. If the mail systems thinks that a particular message is junk mail, it will |
|
Definition
| Move the message to a special Junk folder, and delete it after nine days |
|
|
Term
| 69) Another term for junk email is |
|
Definition
|
|
Term
|
Definition
| cable for connecting peripheral devices |
|
|
Term
| 71) In a Web page, underlined text that can be clicked on to go to a different page is called a(n) |
|
Definition
|
|
Term
| 72) The number of different colors available in a digital image is controlled by its |
|
Definition
|
|
Term
| 73) In which of the following computer languages can we specify a correct result without telling the steps which the computer must take to get the result? |
|
Definition
|
|
Term
| 74) A virus scanning program maintains a list of unique bit patterns that identify different viruses. These patterns are called |
|
Definition
|
|
Term
| 75) The network hardware used in our computer labs is |
|
Definition
|
|
Term
| 76) Uh-oh! The message shown at right indicates a possible attack by |
|
Definition
|
|
Term
| 77) A destructive action taken by a virus is called its |
|
Definition
|
|
Term
| 78) MP3 players such as Winamp use the following technique to compensate for variable delays in transmitting music packets via the TCP-IP protocol: |
|
Definition
|
|
Term
| 79) A special piece of software that allows applications on your computer to control a graphics card is called a |
|
Definition
|
|
Term
| 80) When a cache is full and more data needs to be cached, the system must pick some data to be removed from the cache. The system makes this decision using the |
|
Definition
| Least-recently-used principle |
|
|
Term
| 81) Which part of your computer belongs to the operating system layer? |
|
Definition
|
|
Term
| 82) In our movie database example we separated the data into two tables instead of maintaining all the data in a single table. What were the entities represented by each table? |
|
Definition
|
|
Term
| 83) The process of revising tables and entities as we did with the movie database above is called |
|
Definition
|
|
Term
| 84) In a three-tier database, the middle tier is the |
|
Definition
|
|
Term
| 85) The location of a Web page on the Internet is given by its |
|
Definition
|
|
Term
| 86) A file virus can reproduce itself and take destructive actions only when |
|
Definition
| An executable file infected with the virus is launched |
|
|
Term
| 87) The operating system used on the computers in our CSCI 1100 labs is |
|
Definition
|
|
Term
| 88) Distributing public encryption keys is the task of a |
|
Definition
a)Certificate authority c) Security server b)Security router d) Data warehouse |
|
|
Term
| 89) The part of your computer that actually executes program instructions is the |
|
Definition
|
|
Term
| 91) Two types of computers that are both large, powerful, and expensive, but used for different purposes, are |
|
Definition
| Mainframes and supercomputers |
|
|
Term
| 92) One billion bytes is approximately equal to one |
|
Definition
|
|
Term
| the Web site is allowed to store certain information on your computer’s disk. Then when you re-connect, the Web site can retrieve this information so you do not have to type it in a second time. this stored information are called |
|
Definition
|
|
Term
| If you were setting up a database to maintain tourist information about Georgia, you would probably include a table of hotels in Georgia. The information about one particular hotel would occupy one database |
|
Definition
|
|
Term
| 95) Continuing the previous question, a piece of information that was kept for each hotel, such as the price or whether the hotel has a swimming pool, would be a database |
|
Definition
|
|
Term
| Continuing the previous question, when we use the database to look up hotels near Athens with swimming pools, this would be a database |
|
Definition
|
|
Term
| 98) The GNU project is involved with |
|
Definition
|
|
Term
| 99) The key hardware invention that made affordable personal computers possible was |
|
Definition
|
|
Term
| 100) A firewall protects your computer by |
|
Definition
|
|
Term
|
Definition
|
|
Term
| In the film Paperback Computer, we see a psychological experiment involving a young boy drinking a glass of milk. The point of this experiment was to show |
|
Definition
| The importance of visual perception in our mental worldview |
|
|
Term
| Requirements analysis, design, and testing are all part of the |
|
Definition
|
|
Term
| The term true color refers to which property of a graphic image? |
|
Definition
|
|
Term
|
Definition
|
|
Term
| Rendering and ray tracing are techniques used in |
|
Definition
|
|
Term
| Direct, parallel, and pilot are different methods for |
|
Definition
| converting to a new computer system |
|
|
Term
| Which of the following would be an activity of the design stage of the software lifecycle? |
|
Definition
|
|
Term
| A compression scheme that maintains all of the original file information, so that the original file can be exactly reconstituted from the compressed version, is called |
|
Definition
|
|
Term
| Which type of software is used to make structured, routine decisions? |
|
Definition
| Management information system |
|
|
Term
| In the expression the_bad_thang = document.getElementById(‘yo_mama’) , getElementById is |
|
Definition
|
|
Term
| The diagram shown below is intended to illustrate the trend of costs during which phase of the software development life cycle? |
|
Definition
|
|
Term
| To make all the H3 elements in a page be colored blue, you would use which language? |
|
Definition
|
|
Term
| When machine A wants to send an IP packet to machine B, machine A needs to figure out whether machine B is on the same local network as machine A. In order to make this determination machine A uses |
|
Definition
|
|
Term
| Continuing the previous question, if machine A determines that machine B is not on the same network, machine A |
|
Definition
| Sends the packet to its gateway |
|
|
Term
| A digital video that flickers on the screen might have too low a |
|
Definition
|
|
Term
| A technique that uses a checkerboard effect of different-colored pixels to simulate the appearance of a smoothly changing color is |
|
Definition
|
|
Term
| A company whose business is providing Internet connectivity to consumers like you is a(n) |
|
Definition
|
|
Term
| An IP address that may change each time you connect is called: |
|
Definition
|
|
Term
| Which language is preferred for specifying the color, font, and size of text on a Web page? |
|
Definition
|
|
Term
| 26) “Downstream and upstream rates” refer to |
|
Definition
| How fast your computer can receive and send bits to and from a server |
|
|
Term
| 27) Which of the following terms is a way of getting Internet access to your home across telephone lines? |
|
Definition
|
|
Term
| Which of the following terms is a way of getting Internet access to your home across telephone lines? |
|
Definition
|
|
Term
| 28) Which language is preferred for specifying interactive behavior of a Web page, such as items lighting up when you move the mouse over them? |
|
Definition
|
|
Term
| 29) In the HTML tag …. , className is best described as |
|
Definition
| An attribute that specifies style information |
|
|
Term
The “10,000 eyes effect” is a) A network security problem |
|
Definition
| An argument for using open source software |
|
|
Term
| 32) If a digital image is described as “300 x 200,” this would be a specification of the image’s |
|
Definition
|
|
Term
| 34) Describing a software program as open source means that |
|
Definition
| You can get this program without paying a licensing fee |
|
|
Term
| 35) A generic term for techniques that allow many computers to transmit data on the same wire or other physical medium is |
|
Definition
|
|
Term
36) All of the following are graphics formats except: a)GIF b)BMP c) JPG d) XML |
|
Definition
|
|
Term
37) All of the following are procedural languages except a)Java b) SQL c) C++ d) Visual Basic |
|
Definition
|
|
Term
| 38) In the HTML expression … class is |
|
Definition
|
|
Term
| 39) In the HTML expression … P is |
|
Definition
|
|
Term
|
Definition
| Uploading and downloading files |
|
|
Term
| 41) MP3 is best described as a(n) |
|
Definition
| encoding system or format |
|
|
Term
| 42) The computer wizards who developed the first graphical user interface worked at |
|
Definition
|
|
Term
| 43) These computer wizards came up with the idea for the graphical user interface by observing the thought processes of |
|
Definition
|
|
Term
| 44) The person who made the decision to develop and market the first commercially available computer with a graphical user interface was |
|
Definition
|
|
Term
| 45) What is the easiest way to get a firewall for your Windows XP system? |
|
Definition
| Use the built-in firewall software in Windows XP |
|
|
Term
| 46) The practice of contracting jobs out to foreign countries instead of hiring American workers to do the same job is called |
|
Definition
|
|
Term
| 47) In order to set up a home computer network, your cable modem or DSL connection should be connected directly to a(n) |
|
Definition
|
|
Term
| 48) This technique is used by MP3 to reduce the file size of a track without compromising its sound quality: |
|
Definition
|
|
Term
| 49) The general term for techniques to reduce the size of a file without losing too much of its information content or perceived quality is |
|
Definition
|
|
Term
| 50) In an Ethernet network, if two stations attempt to transmit at the same time |
|
Definition
| Both stations back off and retransmit after a short delay |
|
|