Deck 2: Computer Terminology and History
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Question
Match between columns
Question
Match between columns
Unlock Deck
Sign up to unlock the cards in this deck!
Unlock Deck
Unlock Deck
1/62
Play
Full screen (f)
Deck 2: Computer Terminology and History
1
Which of the following is NOT a reason for the popularity of bulletin boards among subversive organizations?
A) cheaper than printed publications
B) perception of Second Amendment protection
C) lack of regulations
D) possibility of complete globalization
A) cheaper than printed publications
B) perception of Second Amendment protection
C) lack of regulations
D) possibility of complete globalization
B
2
Which of the following is a collection of hyperlinked pages of information distributed over the Internet via a network protocol?
A) hypertext transfer protocol
B) shell
C) World Wide Web
D) packets
A) hypertext transfer protocol
B) shell
C) World Wide Web
D) packets
C
3
Which of the following tells the computer in which order to access drives?
A) boot sequence
B) operating system
C) random access memory
D) application software
A) boot sequence
B) operating system
C) random access memory
D) application software
A
4
What is Gopher?
A) an information retrieval tool
B) an Internet service provider
C) an e-mail system
D) a low-cost video conferencing facility
A) an information retrieval tool
B) an Internet service provider
C) an e-mail system
D) a low-cost video conferencing facility
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
5
Which of the following devices introduces commands and information to the computer?
A) scanner
B) modem
C) printer
D) keyboard
A) scanner
B) modem
C) printer
D) keyboard
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
6
What is the term used to refer to the method of cracking passwords by manually entering all possible key combinations?
A) spoofing
B) brute force
C) phreaking
D) Vulcan nerve pinch
A) spoofing
B) brute force
C) phreaking
D) Vulcan nerve pinch
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
7
Who is hired by companies who want to test their security system by way of violations?
A) cracker
B) black hat hacker
C) sneaker
D) white hat hacker
A) cracker
B) black hat hacker
C) sneaker
D) white hat hacker
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
8
What is the purpose of random access memory in the computer system?
A) to store easily accessible information permanently
B) to transfer several bits of data simultaneously
C) to monitor data usage
D) to temporarily store information
A) to store easily accessible information permanently
B) to transfer several bits of data simultaneously
C) to monitor data usage
D) to temporarily store information
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
9
What is the most important component of a computer?
A) CPU
B) random access memory
C) motherboard
D) universal serial bus
A) CPU
B) random access memory
C) motherboard
D) universal serial bus
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
10
Which of the following interprets program instructions and processes data in the computer?
A) universal serial bus
B) central processing unit
C) random access memory
D) graphical user interface
A) universal serial bus
B) central processing unit
C) random access memory
D) graphical user interface
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
11
Which of the following is a self-contained program that may spread functional copies of itself to other computer systems?
A) Trojan horse
B) malware
C) worm
D) logic bomb
A) Trojan horse
B) malware
C) worm
D) logic bomb
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
12
Which of the following refers to the unauthorized attempt to gain access to information about a system?
A) clickjacking
B) baud
C) banner grabbing
D) probe
A) clickjacking
B) baud
C) banner grabbing
D) probe
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
13
Which Windows operating system paved the way for the development of peer-to-peer networks?
A) Windows NT 3.1
B) Windows 95
C) Windows 2.0
D) Windows 98 SE
A) Windows NT 3.1
B) Windows 95
C) Windows 2.0
D) Windows 98 SE
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
14
Who was the first person to successfully introduce a device exclusively designed for data processing?
A) Charles Babbage
B) Herman Hollerith
C) John Atanasoff
D) Clifford Berry
A) Charles Babbage
B) Herman Hollerith
C) John Atanasoff
D) Clifford Berry
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
15
Which of the following refers to the keyboard combination that forces a soft-boot or jump to ROM monitor?
A) Vulcan nerve pinch
B) banner grabbing
C) phreaking
D) spoofing
A) Vulcan nerve pinch
B) banner grabbing
C) phreaking
D) spoofing
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
16
For what purpose did British scientists build Colossus I?
A) word processing
B) forensic analysis
C) census tabulation
D) cryptanalysis
A) word processing
B) forensic analysis
C) census tabulation
D) cryptanalysis
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
17
What does the term wetware refer to?
A) humans operating computers
B) evil crackers
C) "good" hackers
D) a system vulnerability
A) humans operating computers
B) evil crackers
C) "good" hackers
D) a system vulnerability
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
18
Which of the following is the first modern digital computer?
A) ENIAC
B) Colossus I
C) ABC
D) GUI
A) ENIAC
B) Colossus I
C) ABC
D) GUI
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
19
Which of the following computer components had its origin in the cathode ray tube?
A) printer
B) scanner
C) mouse
D) monitor
A) printer
B) scanner
C) mouse
D) monitor
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
20
What is the term used to describe the final destination of discarded, lost, or destroyed data?
A) dead bit office
B) back door
C) bit bucket
D) sneaker closet
A) dead bit office
B) back door
C) bit bucket
D) sneaker closet
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
21
For users, 24-hour accessibility equates to 24-hour vulnerability.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
22
Which of the following is known as the "baby" of computer operating systems and is freely distributed?
A) Windows
B) Macintosh
C) UNIX
D) Linux
A) Windows
B) Macintosh
C) UNIX
D) Linux
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
23
The first modern digital computer was built at Iowa State University.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
24
The Internet accompanied the introduction of the first computers.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
25
In which Mac OS did Apple introduce its first Unix-based operating system?
A) Mac OS X
B) System 7
C) Mac OS 8
D) System 2.1
A) Mac OS X
B) System 7
C) Mac OS 8
D) System 2.1
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
26
Unlike Microsoft, Macintosh introduced software advancement at a snail's pace.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
27
Worms refers to a code that causes damage to computer systems.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
28
Operating systems may be either single-user or multiple-user.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
29
Intranets are small local networks connecting computers within one organization, controlled by a common system administrator.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
30
Purely underground boards have proven to be transient and elusive, appearing and disappearing relatively quickly.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
31
Who developed the Electronic Numerical Integrator and Computer (ENIAC)?
A) John Atanasoff and Clifford Berry
B) Charles Babbage and Herman Hollerith
C) John W. Mauchly and John Presper Eckert
D) Max Newman and Steve Wozniak
A) John Atanasoff and Clifford Berry
B) Charles Babbage and Herman Hollerith
C) John W. Mauchly and John Presper Eckert
D) Max Newman and Steve Wozniak
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
32
The smallest piece of data is called a bit.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
33
The Mosaic interface is an e-mail system.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
34
One of the earliest computers developed by Charles Babbage was created to tabulate the 1880 U.S.census.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
35
Due to their limited storage capacity and fragility, floppies were replaced by alternate mass storage devices.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
36
Software is composed of components that are physical or tangible in nature.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
37
Online predators often use chat rooms to lure their victims.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
38
Which of the following is structured to allow users to participate in real-time conversations?
A) chat rooms
B) news services
C) websites
D) video feeds
A) chat rooms
B) news services
C) websites
D) video feeds
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
39
Sony Ericsson introduced the first commercially available smart phone using the Symbian OS.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
40
How are websites identified?
A) through post office protocol
B) through domain name system
C) through uniform resource locator
D) through Internet message access protocol
A) through post office protocol
B) through domain name system
C) through uniform resource locator
D) through Internet message access protocol
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
41
________ was built by Professor Max Newman at a government lab in Buckinghamshire, England.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
42
Prior to the introduction of domain names, computers were accessed by their ________.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
43
Discuss how computers evolved.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
44
________ is a set of prepackaged instructions which allow users to perform a variety of functions, including but not limited to word processing, statistical analysis, and the like.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
45
The grouping of data that consists of eight bits is a ________.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
46
________ is a system in which a set of services, technologies, and often virtualized resources enable the delivery of computing as a service as opposed to a product.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
47
________ were unsophisticated instruments used in ancient times exclusively for mathematical computations.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
48
________ is a system whereby individual personal computers are connected to one another, allowing each participant to serve as either a client or a server.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
49
Discuss the original purpose behind the development of the Internet.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
50
Explain why UNIX is considered the backbone of the Internet.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
51
The ________ is a piece of software that runs user applications and provides an interface to the hardware.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
52
________ is a term used to designate "good" hackers.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
53
________ are central switching devices for communications lines in a star topology.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
54
Originally, the Internet was funded in large part by ________ and was not available for commercial usage.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
55
A tangled code is also known as ________ code.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
56
A ________ is a device that combines the functionality of a personal digital assistant (PDA) and the mobility of a cellular phone.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
57
The vision and foresight of ________ laid the foundation for a virtual explosion in communication, processing, and digital technology.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
58
The ________ is the heart of the UNIX operating system.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
59
Chat rooms are a popular medium of instant communication via the Internet.Explain why users should be careful in communicating through chat rooms.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
60
Explain how the Internet has become the backbone for global communications and transnational capitalism.
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
61
Match between columns
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck
62
Match between columns
Unlock Deck
Unlock for access to all 62 flashcards in this deck.
Unlock Deck
k this deck