











Study with the several resources on Docsity
Earn points by helping other students or get them with a premium plan
Prepare for your exams
Study with the several resources on Docsity
Earn points to download
Earn points by helping other students or get them with a premium plan
Community
Ask the community for help and clear up your study doubts
Discover the best universities in your country according to Docsity users
Free resources
Download our free guides on studying techniques, anxiety management strategies, and thesis advice from Docsity tutors
This comprehensive study guide provides a valuable resource for students preparing for the cosc 2336 final exam. it covers key concepts in computer systems, programming logic, hardware and software, data storage, networking, cybersecurity, and digital literacy, including multiple-choice, true/false, and matching questions. The guide also includes key definitions and is updated for the 2025/2026 academic year. This resource is designed to enhance understanding and improve exam performance.
Typology: Exams
1 / 19
This page cannot be seen from the preview
Don't miss anything!
spam (C) - ansunwanted or junk email is called ______. A. spyware B. malware C. spam D. adware mining (D) - ansthe process of searching huge amounts of data seeking a pattern is called data
A. scaling B. warehousing C. diving D. mining virtual reality (C) - ans_____ replaces perceived reality with a different world. A. variable reality B. alternate reality C. virtual reality D. augmentative reality false - ansT/F: hardware refers to the programs that give instructions to the computer false - ansT/F: Affective computing is a field of study focused on the managing, processing, and automatic retrieval of information data represents a fact, information is data that has been organized (D) - answhat is the difference between data and information? A. they are essentially the same thing B. data is numbers, information is words C. data represents a process, information is the stored data D. data represents a fact, information is data that has been organized megabyte (B) - answhich of the following is the smallest unit of measure? A. gigabyte B. megabyte C. terabyte D. petabyte embedded (A) - ans_____ computers are specially designed computer chips that reside inside other devices, such as a car. A. embedded B. tablet C. netbook D. desktop screen resolution (B) - ansthe number of pixels displayed on the screen is known as ______. A. aspect ratio B. screen resolution C. brightness resolution D. contrast ratio
network interface card (A) - ansa ______ enables your computer to connect to other computers to the Internet. A. network interface card B. video card C. controller card D. sound card volatile (D) - ansRAM is a ______ storage location. A. nonvolatile B. permanent C. peripheral D. volatile ergonomics (A) - ans_____ is concerned with the design and arrangement of machines and furniture to avoid uncomfortable or unsafe experiences. A. ergonomics B. occupational safety C. repetitive strain prevention D. positioning kilobyte (10^3) megabyte (10^6) gigabyte (10^9) terabyte (10^12) petabyte (10^15) exabyte (10^18) - ansPut in order of smallest to largest: Exabyte Terabyte Kilobyte Petabyte Megabyte Gigabyte browser (D) - anssoftware that enables you to display and interact with text and other media on the web is a web _____. A. agent B. client C. server D. browser client (B) - ansa computer connected to the Internet that asks for data is a(n) ______. A. aggregator B. client C. surrogate D. server wiki (A) - ansa ______ allows users to add, remove, or edit its content.
A. Intel B. Charles C. Moore D. Boyle the control unit and the arithmetic logic unit (D) - ansthe CPU consists of which two parts? A. cache memory and SSD storage B. the control unit and the front side bus C. the arithmetic logic unit and the front side bus D. the control unit and the arithmetic logic unit solid state drive (A) - ansa ______ uses electronic memory and has no motors or moving parts. A. solid state drive B. digital video disk C. Bluray disc D. mechanical hard drive random access memory (D) - answhich of the following is NOT a permanent storage option? A. internal hard drive B. optical drive C. SSD D. random access memory true - ansT/F: the use of multiple cores on one CPU chip allows the execution of two or more sets of instructions at the same time false - ansT/F: accessing data from the hard drive to send to the CPU is faster than accessing data from RAM true - ansT/F: optical discs store data using tiny pits and lands burned by a laser protocol (C) - ansa network ______ is a set of rules for how information and communications are exchanged. A. frame B. packet C. protocol D. token bandwidth (C) - ans______ is the amount of data that can be transmitted across a transmission medium measured in bits per second. A. scalability B. data capacity C. bandwidth D. infusion media access control (C) - ansthe physical address assigned to each network adapter is called its _______ address. A. network access control (NAC) B. network physical address (NPA) C. media access control (MAC)
D. physical address control (PAC) throughput (D) - ans______ is the actual speed of data transfer that is achieved between two node son a network and is always less than or equal to the data transfer rate. A. bandwidth B. broadband C. benchmark D. throughput intraoffice area network (B) - answhich of the following is NOT a common network architecture type? A. home area network (HAN) B. intraoffice area network (IAN) C. personal area network (PAN) D. local area network (LAN) radio waves (B) - answireless network devices use ____ to communicate with each other. A. DSL B. radio waves C. satellites D. fiber optics router (B) - ansto transfer data packets between two or more networks, a ____ is used. A. modem B. router C. hub D. switch true - ansT/F: sharing files is a benefit of a network copyright (B) - ansto protect a movie, what category of intellectual property would be used? A. patent B. copyright C. service mark D. trademark infringement (D) - ansa violation of the holder's rights is known as copyright ______. A. defrauding B. violation C. abuse D. infringement public domain (D) - answorks without copyright protection are considered to be in the ______. A. copyleft domain B. trademark zone C. free use domain D. public domain true - ansT/F: real property is considered immoveable, such as land or a home
A. polymorphic B. worm C. multipartite D. stealth a firewall (B) - ansyou can block logical ports from invaders and make your computer invisible to others on the Internet by installing _______. A. antivirus software B. a firewall C. a packet sniffer D. a packet filter engineering (C) - anssocial ______ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information. A. theft B. pharming C. engineering D. pretexting true - ansT/F: a virus signature is a portion of virus code that is unique to a particular computer virus bits byte nibble - ans_____: 0s or 1s _____: 8 bits _____: 4 bits ASCII - anscode for letters machine language - anslanguage of a computer, bits of 0s 1s cloud storage - ansstorage space on an internet site that can also display as a drive on your computer augmentative reality - ansadd digital information as an overlay to what we already perceive with our senses ex. Google glasses affective computing - anscomputers to recognize and simulate human emotions ROM RAM - ans____: non-volatile memory, holds instructions to start up computer ____: volatile memory, all data that computer is currently using is stored here cache - anssmaller memory area that CPU can access faster, to store commonly needed information volatile memory non volatile memory - ans_____: needs electricity or it is lost _____: preserved when power off hard disk drive - ansprimary storage device, nonvolatile storage pixel - anspicture element, smallest unit of display
computer port - ansplace where some other device attaches to computer so data can be exchanged Charles Babbage - ans"Father of Computing" made analytical engine, which had similar components to a modern computer Ada Lovelace - answrote algorithm for Babbage's analytical engine, sometimes considered the first programmer Alan Turing - anscreated the Turing machine, an abstract computer model for logical operations, this hypothetical machine had infinite tape with symbols and could read, write, erase Grace Hopper - ansearly programmer, invented the compiler, a translator from human to machine language, came up with the term "bug" for problem in a computer computer - ansprogrammable electronic device designed to accept data input output storage processing - ans4 major functions of a computer:
strategies for using more than one drive in a system HDMI - ansa compact audio-video interface standard that carries both high-definition video and uncompressed digital audio GPU (graphics processing unit) - ansvideo card's own CPU for monitor processing database - ansstructured, organized, collection of data fetch decode execute store - ans4 steps of a machine cycle?
LAN (local area network) HAN (home area network) PAN (personal area network) - ans- biggest network (ex. the internet)
note magnify - ans4 advantages of using a digital text compared to a paper text?
3 - anshow is the color in a single pixel often represented? each pixel is often represented with ____ numbers between 0 and 255, one color for each RGB copyright patents trademarks - ansname 3 of 5 categories of intellectual property:
packet analyzer (sniffer) - ansprogram that examines packets (data on internet) and can read their content keylogger - ansprogram that captures all keystrokes on a computer trojan horse - ans"disguised" programs that appear to be useful but run malicious code in background, often allow "backdoor programs" and rootkits, which can give unlimited access to your computer zombie - ansa computer hacker controls your computer totally DDOS (distributed denial of service attack) - anszombies flood computer with requests to slow/shut down websites botnet - anscollection of devices with internet access infected by malware and controlled together cookie - anssmall text files some websites store on your computer when you visit them pretexting - anscreating a scenario that sounds legitimate enough that someone will trust you, form of social engineering phishing - anssends email that looks legitimate to get information from users form of social engineering spear phishing - ansuse targeted information specific to that person (often stolen by social engineering or other means) pharming - anslike phishing, but malicious code sends you to wrong website form of social engineering scareware - ansmakes you think computer is infected form of social engineering network address translation - ansrouter or firewall hides address of computer biometric authentication - ansuse biological traits for authentication ex. using fingerprints, face scanning to identify user multifactor authentication - anscombines 2 of these 3 for authentication:
(2) Mobile:
query - ansa ____ language is designed to manipulate or extract data from a database data validation - ansensures data is valid or of the right type primary key - ansuniquely identifies a record (row) ex. student ID foreign key - ansties different tables together (points to data in a different table) data warehouse - anslarge scale collection of data, contains and organizes data from an organization's multiple databases in one place (multiple departments) business intelligence - ansthe ability to improve business decision making with databases enterprise resource planning - ansbusiness management system, accumulates all information relevant to running a business efficiently information integrity meaningful - ansadvantages of using a database:
relationships tie different tables together (common field in one table linked to common field in second table) fields records tables - ans3 basic parts of relational database:
D. tables