Term
Knowing ______________is important to understanding technology and being understood when talking about it. |
|
Definition
|
|
Term
The number of times a second that images on the screen are redrawn is called the ____________ |
|
Definition
|
|
Term
A specified result sought through the use of a precise and systematic method is an __________. |
|
Definition
|
|
Term
The Process of starting a computer is called ________ |
|
Definition
|
|
Term
A device that helps you remember a fact or concept is a ____________ |
|
Definition
|
|
Term
On the computer, programs and information are stored on the __________ |
|
Definition
|
|
Term
|
Definition
|
|
Term
Undo, Cut, Copy and Paste can usually be found in what menu? |
|
Definition
|
|
Term
When the computer needs more information from the user before it completes an action, it gets the information via a _______ |
|
Definition
|
|
Term
The clover-shaped shortcut key on a Macintosh is called the _______ key. |
|
Definition
|
|
Term
Between client requests from a specific IP address, a Web server might handle _______ or even _____ of requests |
|
Definition
|
|
Term
All IP addresses of authoritative name servers for LTDs are maintained and managed by 13 ________ servers scattered around the world |
|
Definition
|
|
Term
A hierarchy or related computers on a network is called _______ |
|
Definition
|
|
Term
A "please reply" message sent over the internet is called a _____ |
|
Definition
|
|
Term
A company that supplies connections to the internet is called a _____ |
|
Definition
Internet Service Provider |
|
|
Term
Local networks that support communications wholly within an organization are called ______ |
|
Definition
|
|
Term
The http:// in a Web address is the _____ |
|
Definition
|
|
Term
|
Definition
|
|
Term
|
Definition
Hypertext Markup Language |
|
|
Term
________ are usually used to link to pages on the same site |
|
Definition
|
|
Term
|
Definition
Graphics Interchange Format |
|
|
Term
|
Definition
Joint Photographic Experts Group |
|
|
Term
|
Definition
1. Make sure that you can reproduce the error 2. Determine exactly what the problem is 3. Eliminate the “obvious causes” 4. Divide the process, separating out the parts that work from the part that doesn’t 5. When you reach a dead end, reassess your information, asking where you may be making wrong assumptions of conclusions; then step through the process again. 6. As you work through the process from start to finish, make predictions about what should happen and verify that your predictions are fulfilled. |
|
|
Term
A ______ is a set of rules that determines what is legal for field input |
|
Definition
|
|
Term
_______ and debugging are essentially the same thing |
|
Definition
|
|
Term
A _______ is an error in the way a system was developed. |
|
Definition
|
|
Term
All the possible states in which a piece of software can exist are its ______________ |
|
Definition
|
|
Term
A ______ program shuts down to avoid causing problems |
|
Definition
|
|
Term
|
Definition
An agreed upon order for basic symbols |
|
|
Term
When data are _______, they are separate and distinct and cannot be transformed into another value by gradations. |
|
Definition
|
|
Term
all the vales in a PandA formulation are _____ |
|
Definition
|
|
Term
The ____ of a bit is its storage pattern in the physical world |
|
Definition
|
|
Term
All computer systems share a _____ set of symbols used to represent characters |
|
Definition
|
|
Term
An Algorithm has five basic requirements |
|
Definition
inputs specified, outputs specified, definiteness, effectiveness and finiteness |
|
|
Term
________ specific example and generating an idea from it |
|
Definition
|
|
Term
Five steps in the Fetch/Execute Cycle |
|
Definition
Instruction Fetch, Instruction Decode, Data Fetch, Instruction Execution and Result Room |
|
|
Term
the ______ is used in the: Instruction Execution |
|
Definition
|
|
Term
Modern Computers know how many instructions? |
|
Definition
|
|
Term
|
Definition
Sampling rate of sound is roughly twice what humans can hear |
|
|
Term
A program that embeds itself in another program, copies itself, and spreads to other computers |
|
Definition
|
|
Term
a program that copies itself from one machine to another across a network |
|
Definition
|
|
Term
is the illegal use of email to scam users into surrendering their personal information, usually items like social security numbers, bank account numbers, and credit card numbers |
|
Definition
|
|