Term
1) HTTP is best described as |
|
Definition
a) A protocol used for communication between Web browsers and Web servers |
|
|
Term
2) The part of the central processing unit that adds and subtracts numbers is called the |
|
Definition
|
|
Term
3) The File Allocation Table used by most Windows computers in the early 90’s used a 16-bit cluster address. How many different cluster addresses were possible using this scheme? |
|
Definition
|
|
Term
4) The 16-bit cluster address became a problem in the mid-90’s, due to the continuing increase in |
|
Definition
|
|
Term
5) Napster is no longer with us in its original form, because it had an unresolvable problem involving |
|
Definition
|
|
Term
6) This diagram, taken from our text, illustrates the difference between **** |
|
Definition
c) Analog and digital waveforms |
|
|
Term
7) RISC is best described as a |
|
Definition
a) Design philosophy for computer CPUs |
|
|
Term
8) The ability of a communication system to handle multiple data transmissions on the same physical medium (for example, many TV channels on a single cable) is called |
|
Definition
|
|
Term
9) An IP address that your computer gets from its ISP, and which may be different each time you connect, is called |
|
Definition
|
|
Term
10) Linux and MacOS are examples of this type of program, which is essential for a computer system to run: |
|
Definition
|
|
Term
11) All of the following are compression techniques except |
|
Definition
|
|
Term
12) Copying the text of President Adam’s convocation speech for a satire or parody is |
|
Definition
b) A protected activity under the Fair Use Doctrine |
|
|
Term
13) Fast access to the Internet from home is provided by which technology? |
|
Definition
|
|
Term
14) The ASCII code is used to represent |
|
Definition
|
|
Term
15) The term codec is best defined as |
|
Definition
c) An algorithm for encoding and decoding digital media files |
|
|
Term
16) Web pages with snazzy graphics can be visually stunning, but unfortunately the images may take a long time to download. A technology specifically designed to deal with this problem is |
|
Definition
|
|
Term
18) Clicking the middle of the three buttons shown in the picture above |
|
Definition
e) Leaves the application window open, but no longer filling the screen |
|
|
Term
19) Which of the following is a protocol specifically for getting Email messages from a server? |
|
Definition
|
|
Term
20) The number of bits per second that can be transmitted across a network connection is called |
|
Definition
|
|
Term
21) When a large organization decides to link the separate computer systems in all its branches and departments into a single organization-wide system, they have entered the domain of |
|
Definition
|
|
Term
22) Large central computing resources such as OASIS achieve a very high level of reliability through |
|
Definition
|
|
Term
23) Renaming the file “Secret Message.doc” to “Secret Message.spy” |
|
Definition
Is not advisable, because the operating system will not know what application to use to open this file |
|
|
Term
24) If you were creating a database table called “member” to keep the names and addresses of members of the UGA Anime society, the information kept about one member would occupy one |
|
Definition
|
|
Term
25) Continuing with the question above, a piece of data that you collect for each member, such as whether or not the member speaks Japanese, would be a single |
|
Definition
|
|
Term
27) Expressions like in HTML documents are called |
|
Definition
|
|
Term
28) All of the following are graphic formats except |
|
Definition
|
|
Term
29) Gnutella uses all of the following technologies except: |
|
Definition
|
|
Term
30) Excel provides SUM, AVERAGE, and COUNT as useful |
|
Definition
|
|
Term
31) This company, started by a couple of scruffy teenage kids in California, made millions by selling the first computers that were affordable and easy to use: |
|
Definition
|
|
Term
32) The possibility of affordable personal computers is due to this hardware invention: |
|
Definition
|
|
Term
33) If Bob sends a message to Alice encrypted with Alice’s public key, it must be decrypted using |
|
Definition
|
|
Term
34) The message in the question above |
|
Definition
Can only be read by Alice |
|
|
Term
35) For what purpose would Bob typically encode a message for Alice using Alice’s private key? |
|
Definition
Under no normal circumstances would Bob do this |
|
|
Term
36) A technology that allows you to start listening to an MP3 music file from the Web before the file has finished downloading is |
|
Definition
|
|
Term
37) When a small business becomes successful, it may out grow its business information systems. Dealing with this welcome problem involves the issue of |
|
Definition
|
|
Term
38) Which filename extension marks an executable support module? |
|
Definition
|
|
Term
39) Several computers in the same household can share a fast Internet connection using this technology: |
|
Definition
|
|
Term
40) Which computer language is found embedded in Web pages? |
|
Definition
|
|
Term
41) A performance-enhancing feature found on Macintosh computers but not Windows machines is |
|
Definition
|
|
Term
42) According to the lecture on voting machines, |
|
Definition
a) Georgia was the first state to hold a statewide election using only electronic voting machines |
|
|
Term
43) Data transmitted on the Internet is divided into separate units called |
|
Definition
|
|
Term
44) These data units are steered to the destination computer, which may be all the way on the other side of the world, using |
|
Definition
|
|
Term
45) The speed of a microprocessor chip is measured in |
|
Definition
|
|
Term
46) What is the effect of the dot-com bubble on the current IT job market? |
|
Definition
Collapse of the bubble has left many IT professionals temporarily unemployed |
|
|
Term
47) Two computers are able to communicate with each other over a network if and only if they |
|
Definition
|
|
Term
In order to improve voter confidence and eliminate suspicion about the Diebold voting machines, |
|
Definition
The machines are tested and evaluated by an independent laboratory before the election |
|
|
Term
49) According to the lecture on jobs in the information technology area, the most serious long-term threat to IT job prospects is |
|
Definition
|
|
Term
50) The ARCHES computing resource at UGA is an example of a |
|
Definition
|
|
Term
51) Which of the following phases of the software lifecycle comes first? |
|
Definition
|
|
Term
52) When your computer is turned off, which of the following is stored in the RAM memory? |
|
Definition
|
|
Term
53) Which application program is best suited for maintaining the membership list of a church or a city soccer league? |
|
Definition
|
|
Term
54) In order to save a Word document under a different file name, you would use |
|
Definition
|
|
Term
55) In order to sort the data in an Excel spreadsheet, you would use |
|
Definition
|
|
Term
56) A computer program is basically a long list of |
|
Definition
Machine language instructions |
|
|
Term
57) Which of the following would be most likely the task of an event handler? |
|
Definition
Responding when the user clicks a button in a program |
|
|
Term
In the movie database example covered in class, movies and reviews were kept in separate |
|
Definition
|
|
Term
59) The graphic below represents the operation of a(n) |
|
Definition
Distributed virtual supercomputer |
|
|
Term
Which type of unwelcome thing is most likely to arrive hidden in an email message? |
|
Definition
|
|
Term
61) Forgetting to remove diskettes from the computer when you turn it off increases your vulnerability to |
|
Definition
|
|
Term
62) What happens if two computers in your CS lab attempt to transmit data at the same time? |
|
Definition
The two senders each back off and retransmit after a delay |
|
|
Term
63) Which technology uses an alternate method for dealing with the problem situation mentioned in the question above? |
|
Definition
|
|
Term
64) If you have just finished typing your term paper using Microsoft Word, and decide that the concluding paragraph is so good that it should be colored pink and displayed in a large fancy font, the first thing you must do is |
|
Definition
Select the paragraph whose formatting you want to change |
|
|
Term
65) Which of the following memory and storage components has the fastest access time? |
|
Definition
|
|
Term
66) Which of the following memory and storage components has the largest storage capacity? |
|
Definition
|
|
Term
67) Surprise! You find a nice new laptop computer under the tree this Christmas. Which of the following would be the most likely amount of RAM memory on this machine? |
|
Definition
|
|
Term
68) The UGA email system uses a filtering heuristic to attempt to detect junk email. If the mail systems thinks that a particular message is junk mail, it will |
|
Definition
Move the message to a special Junk folder, and delete it after nine days |
|
|
Term
69) Another term for junk email is |
|
Definition
|
|
Term
|
Definition
cable for connecting peripheral devices |
|
|
Term
71) In a Web page, underlined text that can be clicked on to go to a different page is called a(n) |
|
Definition
|
|
Term
72) The number of different colors available in a digital image is controlled by its |
|
Definition
|
|
Term
73) In which of the following computer languages can we specify a correct result without telling the steps which the computer must take to get the result? |
|
Definition
|
|
Term
74) A virus scanning program maintains a list of unique bit patterns that identify different viruses. These patterns are called |
|
Definition
|
|
Term
75) The network hardware used in our computer labs is |
|
Definition
|
|
Term
76) Uh-oh! The message shown at right indicates a possible attack by |
|
Definition
|
|
Term
77) A destructive action taken by a virus is called its |
|
Definition
|
|
Term
78) MP3 players such as Winamp use the following technique to compensate for variable delays in transmitting music packets via the TCP-IP protocol: |
|
Definition
|
|
Term
79) A special piece of software that allows applications on your computer to control a graphics card is called a |
|
Definition
|
|
Term
80) When a cache is full and more data needs to be cached, the system must pick some data to be removed from the cache. The system makes this decision using the |
|
Definition
Least-recently-used principle |
|
|
Term
81) Which part of your computer belongs to the operating system layer? |
|
Definition
|
|
Term
82) In our movie database example we separated the data into two tables instead of maintaining all the data in a single table. What were the entities represented by each table? |
|
Definition
|
|
Term
83) The process of revising tables and entities as we did with the movie database above is called |
|
Definition
|
|
Term
84) In a three-tier database, the middle tier is the |
|
Definition
|
|
Term
85) The location of a Web page on the Internet is given by its |
|
Definition
|
|
Term
86) A file virus can reproduce itself and take destructive actions only when |
|
Definition
An executable file infected with the virus is launched |
|
|
Term
87) The operating system used on the computers in our CSCI 1100 labs is |
|
Definition
|
|
Term
88) Distributing public encryption keys is the task of a |
|
Definition
a)Certificate authority c) Security server b)Security router d) Data warehouse |
|
|
Term
89) The part of your computer that actually executes program instructions is the |
|
Definition
|
|
Term
91) Two types of computers that are both large, powerful, and expensive, but used for different purposes, are |
|
Definition
Mainframes and supercomputers |
|
|
Term
92) One billion bytes is approximately equal to one |
|
Definition
|
|
Term
the Web site is allowed to store certain information on your computer’s disk. Then when you re-connect, the Web site can retrieve this information so you do not have to type it in a second time. this stored information are called |
|
Definition
|
|
Term
If you were setting up a database to maintain tourist information about Georgia, you would probably include a table of hotels in Georgia. The information about one particular hotel would occupy one database |
|
Definition
|
|
Term
95) Continuing the previous question, a piece of information that was kept for each hotel, such as the price or whether the hotel has a swimming pool, would be a database |
|
Definition
|
|
Term
Continuing the previous question, when we use the database to look up hotels near Athens with swimming pools, this would be a database |
|
Definition
|
|
Term
98) The GNU project is involved with |
|
Definition
|
|
Term
99) The key hardware invention that made affordable personal computers possible was |
|
Definition
|
|
Term
100) A firewall protects your computer by |
|
Definition
|
|
Term
|
Definition
|
|
Term
In the film Paperback Computer, we see a psychological experiment involving a young boy drinking a glass of milk. The point of this experiment was to show |
|
Definition
The importance of visual perception in our mental worldview |
|
|
Term
Requirements analysis, design, and testing are all part of the |
|
Definition
|
|
Term
The term true color refers to which property of a graphic image? |
|
Definition
|
|
Term
|
Definition
|
|
Term
Rendering and ray tracing are techniques used in |
|
Definition
|
|
Term
Direct, parallel, and pilot are different methods for |
|
Definition
converting to a new computer system |
|
|
Term
Which of the following would be an activity of the design stage of the software lifecycle? |
|
Definition
|
|
Term
A compression scheme that maintains all of the original file information, so that the original file can be exactly reconstituted from the compressed version, is called |
|
Definition
|
|
Term
Which type of software is used to make structured, routine decisions? |
|
Definition
Management information system |
|
|
Term
In the expression the_bad_thang = document.getElementById(‘yo_mama’) , getElementById is |
|
Definition
|
|
Term
The diagram shown below is intended to illustrate the trend of costs during which phase of the software development life cycle? |
|
Definition
|
|
Term
To make all the H3 elements in a page be colored blue, you would use which language? |
|
Definition
|
|
Term
When machine A wants to send an IP packet to machine B, machine A needs to figure out whether machine B is on the same local network as machine A. In order to make this determination machine A uses |
|
Definition
|
|
Term
Continuing the previous question, if machine A determines that machine B is not on the same network, machine A |
|
Definition
Sends the packet to its gateway |
|
|
Term
A digital video that flickers on the screen might have too low a |
|
Definition
|
|
Term
A technique that uses a checkerboard effect of different-colored pixels to simulate the appearance of a smoothly changing color is |
|
Definition
|
|
Term
A company whose business is providing Internet connectivity to consumers like you is a(n) |
|
Definition
|
|
Term
An IP address that may change each time you connect is called: |
|
Definition
|
|
Term
Which language is preferred for specifying the color, font, and size of text on a Web page? |
|
Definition
|
|
Term
26) “Downstream and upstream rates” refer to |
|
Definition
How fast your computer can receive and send bits to and from a server |
|
|
Term
27) Which of the following terms is a way of getting Internet access to your home across telephone lines? |
|
Definition
|
|
Term
Which of the following terms is a way of getting Internet access to your home across telephone lines? |
|
Definition
|
|
Term
28) Which language is preferred for specifying interactive behavior of a Web page, such as items lighting up when you move the mouse over them? |
|
Definition
|
|
Term
29) In the HTML tag …. , className is best described as |
|
Definition
An attribute that specifies style information |
|
|
Term
The “10,000 eyes effect” is a) A network security problem |
|
Definition
An argument for using open source software |
|
|
Term
32) If a digital image is described as “300 x 200,” this would be a specification of the image’s |
|
Definition
|
|
Term
34) Describing a software program as open source means that |
|
Definition
You can get this program without paying a licensing fee |
|
|
Term
35) A generic term for techniques that allow many computers to transmit data on the same wire or other physical medium is |
|
Definition
|
|
Term
36) All of the following are graphics formats except: a)GIF b)BMP c) JPG d) XML |
|
Definition
|
|
Term
37) All of the following are procedural languages except a)Java b) SQL c) C++ d) Visual Basic |
|
Definition
|
|
Term
38) In the HTML expression … class is |
|
Definition
|
|
Term
39) In the HTML expression … P is |
|
Definition
|
|
Term
|
Definition
Uploading and downloading files |
|
|
Term
41) MP3 is best described as a(n) |
|
Definition
encoding system or format |
|
|
Term
42) The computer wizards who developed the first graphical user interface worked at |
|
Definition
|
|
Term
43) These computer wizards came up with the idea for the graphical user interface by observing the thought processes of |
|
Definition
|
|
Term
44) The person who made the decision to develop and market the first commercially available computer with a graphical user interface was |
|
Definition
|
|
Term
45) What is the easiest way to get a firewall for your Windows XP system? |
|
Definition
Use the built-in firewall software in Windows XP |
|
|
Term
46) The practice of contracting jobs out to foreign countries instead of hiring American workers to do the same job is called |
|
Definition
|
|
Term
47) In order to set up a home computer network, your cable modem or DSL connection should be connected directly to a(n) |
|
Definition
|
|
Term
48) This technique is used by MP3 to reduce the file size of a track without compromising its sound quality: |
|
Definition
|
|
Term
49) The general term for techniques to reduce the size of a file without losing too much of its information content or perceived quality is |
|
Definition
|
|
Term
50) In an Ethernet network, if two stations attempt to transmit at the same time |
|
Definition
Both stations back off and retransmit after a short delay |
|
|