info Flashcards

(147 cards)

1
Q
  1. The _____ is the part of a computer that executes the instructions of a computer program.
A

microprocessor

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q
  1. Which of the following is an example of volatile memory?
A

Random-access memory – Loses content when power is turned off.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Random-access memory – Loses content when power is turned off.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q
  1. _____ is a nonvolatile
A

chip-based storage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Flash memory – Retains data even when power is off.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q
  1. _____ are substances that are capable of enabling as well as inhibiting the flow of electricity.
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Semiconductors – Conduct electricity under certain conditions

A

essential for electronics.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q
  1. The third wave of computing was characterized by the introduction of _____.
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

personal computers – PCs brought computing to individuals and small businesses.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q
  1. 1 ____ = 1 billion bytes
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

gigabyte

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q
  1. 1 petabyte = 1 _____ bytes
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

quadrillion

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q
  1. Moore’s Law kicked in during the 1970s for the ___________
A

and minicomputers were a hit.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

second wave

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q
  1. Which of the following statements is a valid reason for chip manufacturers to carry minimal inventory?
A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Products with a significant chip-based component rapidly fall in value and can cause huge losses when overproduced.

A
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
26
10. Firmware refers to:
27
control software stored on nonvolatile memory chips.
28
29
11. Software (often on firmware) designed to make physical products and devices “smarter” is referred to as ___________.
30
Embedded systems
31
32
12. _____ perform the work that users and firms are directly interested in accomplishing.
33
Applications
34
35
13. Which of the following is an example of application software?
36
MS Word
37
38
14. _____ refers to applications installed on a personal computer for single-user tasks.
39
Desktop software
40
41
15. Which function is likely performed by enterprise software?
42
Inventory tracking
43
44
16. _____ integrates many business functions
such as accounting
45
Enterprise resource planning
46
47
17. Systems that use data created by other systems for reporting and decision-making are called _____ systems.
48
business intelligence
49
50
18. Implications for firms without consistent database systems:
51
They struggle to manage their value chain efficiently.
52
53
19. Cost of producing an additional unit:
54
marginal cost
55
56
20. Software is extremely profitable because:
57
the marginal cost to produce an additional copy is effectively zero.
58
59
21. _____ refers to software that is free and can be modified.
60
Open source software
61
62
22. Outdated notion regarding open source:
63
OSS is fueled by loners contributing for glory.
64
65
23. True statement on open source software:
66
Linux is the flagship OSS product
available on all scales of computing devices.
67
68
24. LAMP stack constituents:
69
Linux
Apache
70
71
25. LAMP stack is used:
72
to power many of the Internet’s most popular websites
73
74
26. Not true about potential benefits of platforms:
75
all of the above are true
76
77
27. _____ support interoperable machine-to-machine interaction.
78
Web services
79
80
28. _____ is a standard for exchanging formatted messages.
81
EDI
82
83
29. Most common function of EDI:
84
Sending electronic equivalents of structured documents
85
86
30. Technologies replacing older EDI:
87
Both (a) and (c)
88
89
31. One of the factors that accelerated the development of the Internet during the 1990s was:
90
the invention of graphical Web browsing
91
92
32. The address one types into a Web browser is also known as a:
93
uniform resource locator
94
95
33. Which of the following statements holds true for the term “HTML”?
96
It refers to the language used to create and format Web pages
97
98
34. Popular sites like Google and Yahoo! have several computers assigned to their host names because:
99
it ensures that the load of requests to their sites do not overwhelm a single computer
100
101
35. A firm that provides hardware and services to run Web sites of others is known as a(n) _____:
102
Web hosting service
103
104
36. What is an example of cybersquatting?
105
Acquiring a domain name to extort a firm
individual
106
107
37. “HTML” is used to:
108
create and format Web pages
109
110
38. The domain name service (DNS) is a distributed database that allows users to communicate with other computers by:
111
mapping host and domain names to IP addresses of computers
112
113
39. A(n) _____ is a temporary storage space used to speed computing tasks:
114
cache
115
116
40. The fault-tolerant nature of the DNS ensures that:
117
the service continues functioning even if one nameserver goes down
118
119
41. The exploit referred to as __________ allowed hackers to leverage vulnerability in DNS software to redirect users to sites they did not request:
120
cache poisoning
121
122
42. Cyber criminals who infiltrate systems and collect data for illegal resale are called:
123
data harvesters
124
125
43. Which aspect of international law would enable a cyber-criminal operating across borders to evade prosecution?
126
Non-existent extradition agreements between two countries
127
128
44. A research scientist passing on sensitive pharmaceutical data to a rival company is held responsible for:
129
Corporate espionage
130
131
45. An attack on the US power grid by terrorists or a foreign power is indicative of:
132
cyberwarfare
133
134
46. The term _____ originally referred to a particularly skilled programmer:
135
hacker
136
137
47. A(n) _____ is someone who uncovers computer weaknesses and reveals them without exploiting them:
138
white hat hacker
139
140
48. A protester seeking to make a political point by leveraging technology tools is called a(n) _____:
141
hacktivist
142
143
49. Which of these would be an example of a DDoS attack?
144
Overloading a popular social networking site with inbound messages
145
146
50. Which of the following statements is consistent with ground realities regarding information security?
147
Law-enforcement agencies struggle to hire
train