Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

COSC 2336 Final Exam Study Guide: Computer Systems, Programming, and Cybersecurity, Exams of Information Technology

This comprehensive study guide provides a valuable resource for students preparing for the cosc 2336 final exam. it covers key concepts in computer systems, programming logic, hardware and software, data storage, networking, cybersecurity, and digital literacy, including multiple-choice, true/false, and matching questions. The guide also includes key definitions and is updated for the 2025/2026 academic year. This resource is designed to enhance understanding and improve exam performance.

Typology: Exams

2024/2025

Available from 05/02/2025

charleswest
charleswest šŸ‡ŗšŸ‡ø

4.2

(12)

1.3K documents

1 / 19

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
Comprehensive final exam resource for COSC 2336, covering
actual questions on computer systems, programming logic,
hardware and software concepts, data storage, networking,
cybersecurity, digital literacy, and computer history.
Includes multiple-choice, true/false, matching, and key
definitions.
Latest updated exam study Guide 2025/2026
spam (C) - ansunwanted or junk email is called ______.
A. spyware
B. malware
C. spam
D. adware
mining (D) - ansthe process of searching huge amounts of data seeking a pattern is called data
_____
A. scaling
B. warehousing
C. diving
D. mining
virtual reality (C) - ans_____ replaces perceived reality with a different world.
A. variable reality
B. alternate reality
C. virtual reality
D. augmentative reality
false - ansT/F: hardware refers to the programs that give instructions to the computer
false - ansT/F: Affective computing is a field of study focused on the managing, processing,
and automatic retrieval of information
data represents a fact, information is data that has been organized (D) - answhat is the
difference between data and information?
A. they are essentially the same thing
B. data is numbers, information is words
C. data represents a process, information is the stored data
D. data represents a fact, information is data that has been organized
megabyte (B) - answhich of the following is the smallest unit of measure?
A. gigabyte
B. megabyte
C. terabyte
D. petabyte
embedded (A) - ans_____ computers are specially designed computer chips that reside inside
other devices, such as a car.
A. embedded
B. tablet
C. netbook
D. desktop
screen resolution (B) - ansthe number of pixels displayed on the screen is known as ______.
A. aspect ratio
B. screen resolution
C. brightness resolution
D. contrast ratio
pf3
pf4
pf5
pf8
pf9
pfa
pfd
pfe
pff
pf12
pf13

Partial preview of the text

Download COSC 2336 Final Exam Study Guide: Computer Systems, Programming, and Cybersecurity and more Exams Information Technology in PDF only on Docsity!

actual questions on computer systems, programming logic,

hardware and software concepts, data storage, networking,

cybersecurity, digital literacy, and computer history.

Includes multiple-choice, true/false, matching, and key

definitions.

Latest updated exam study Guide 2025/

spam (C) - ansunwanted or junk email is called ______. A. spyware B. malware C. spam D. adware mining (D) - ansthe process of searching huge amounts of data seeking a pattern is called data


A. scaling B. warehousing C. diving D. mining virtual reality (C) - ans_____ replaces perceived reality with a different world. A. variable reality B. alternate reality C. virtual reality D. augmentative reality false - ansT/F: hardware refers to the programs that give instructions to the computer false - ansT/F: Affective computing is a field of study focused on the managing, processing, and automatic retrieval of information data represents a fact, information is data that has been organized (D) - answhat is the difference between data and information? A. they are essentially the same thing B. data is numbers, information is words C. data represents a process, information is the stored data D. data represents a fact, information is data that has been organized megabyte (B) - answhich of the following is the smallest unit of measure? A. gigabyte B. megabyte C. terabyte D. petabyte embedded (A) - ans_____ computers are specially designed computer chips that reside inside other devices, such as a car. A. embedded B. tablet C. netbook D. desktop screen resolution (B) - ansthe number of pixels displayed on the screen is known as ______. A. aspect ratio B. screen resolution C. brightness resolution D. contrast ratio

actual questions on computer systems, programming logic,

hardware and software concepts, data storage, networking,

cybersecurity, digital literacy, and computer history.

Includes multiple-choice, true/false, matching, and key

definitions.

Latest updated exam study Guide 2025/

network interface card (A) - ansa ______ enables your computer to connect to other computers to the Internet. A. network interface card B. video card C. controller card D. sound card volatile (D) - ansRAM is a ______ storage location. A. nonvolatile B. permanent C. peripheral D. volatile ergonomics (A) - ans_____ is concerned with the design and arrangement of machines and furniture to avoid uncomfortable or unsafe experiences. A. ergonomics B. occupational safety C. repetitive strain prevention D. positioning kilobyte (10^3) megabyte (10^6) gigabyte (10^9) terabyte (10^12) petabyte (10^15) exabyte (10^18) - ansPut in order of smallest to largest: Exabyte Terabyte Kilobyte Petabyte Megabyte Gigabyte browser (D) - anssoftware that enables you to display and interact with text and other media on the web is a web _____. A. agent B. client C. server D. browser client (B) - ansa computer connected to the Internet that asks for data is a(n) ______. A. aggregator B. client C. surrogate D. server wiki (A) - ansa ______ allows users to add, remove, or edit its content.

actual questions on computer systems, programming logic,

hardware and software concepts, data storage, networking,

cybersecurity, digital literacy, and computer history.

Includes multiple-choice, true/false, matching, and key

definitions.

Latest updated exam study Guide 2025/

A. Intel B. Charles C. Moore D. Boyle the control unit and the arithmetic logic unit (D) - ansthe CPU consists of which two parts? A. cache memory and SSD storage B. the control unit and the front side bus C. the arithmetic logic unit and the front side bus D. the control unit and the arithmetic logic unit solid state drive (A) - ansa ______ uses electronic memory and has no motors or moving parts. A. solid state drive B. digital video disk C. Bluray disc D. mechanical hard drive random access memory (D) - answhich of the following is NOT a permanent storage option? A. internal hard drive B. optical drive C. SSD D. random access memory true - ansT/F: the use of multiple cores on one CPU chip allows the execution of two or more sets of instructions at the same time false - ansT/F: accessing data from the hard drive to send to the CPU is faster than accessing data from RAM true - ansT/F: optical discs store data using tiny pits and lands burned by a laser protocol (C) - ansa network ______ is a set of rules for how information and communications are exchanged. A. frame B. packet C. protocol D. token bandwidth (C) - ans______ is the amount of data that can be transmitted across a transmission medium measured in bits per second. A. scalability B. data capacity C. bandwidth D. infusion media access control (C) - ansthe physical address assigned to each network adapter is called its _______ address. A. network access control (NAC) B. network physical address (NPA) C. media access control (MAC)

actual questions on computer systems, programming logic,

hardware and software concepts, data storage, networking,

cybersecurity, digital literacy, and computer history.

Includes multiple-choice, true/false, matching, and key

definitions.

Latest updated exam study Guide 2025/

D. physical address control (PAC) throughput (D) - ans______ is the actual speed of data transfer that is achieved between two node son a network and is always less than or equal to the data transfer rate. A. bandwidth B. broadband C. benchmark D. throughput intraoffice area network (B) - answhich of the following is NOT a common network architecture type? A. home area network (HAN) B. intraoffice area network (IAN) C. personal area network (PAN) D. local area network (LAN) radio waves (B) - answireless network devices use ____ to communicate with each other. A. DSL B. radio waves C. satellites D. fiber optics router (B) - ansto transfer data packets between two or more networks, a ____ is used. A. modem B. router C. hub D. switch true - ansT/F: sharing files is a benefit of a network copyright (B) - ansto protect a movie, what category of intellectual property would be used? A. patent B. copyright C. service mark D. trademark infringement (D) - ansa violation of the holder's rights is known as copyright ______. A. defrauding B. violation C. abuse D. infringement public domain (D) - answorks without copyright protection are considered to be in the ______. A. copyleft domain B. trademark zone C. free use domain D. public domain true - ansT/F: real property is considered immoveable, such as land or a home

actual questions on computer systems, programming logic,

hardware and software concepts, data storage, networking,

cybersecurity, digital literacy, and computer history.

Includes multiple-choice, true/false, matching, and key

definitions.

Latest updated exam study Guide 2025/

A. polymorphic B. worm C. multipartite D. stealth a firewall (B) - ansyou can block logical ports from invaders and make your computer invisible to others on the Internet by installing _______. A. antivirus software B. a firewall C. a packet sniffer D. a packet filter engineering (C) - anssocial ______ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information. A. theft B. pharming C. engineering D. pretexting true - ansT/F: a virus signature is a portion of virus code that is unique to a particular computer virus bits byte nibble - ans_____: 0s or 1s _____: 8 bits _____: 4 bits ASCII - anscode for letters machine language - anslanguage of a computer, bits of 0s 1s cloud storage - ansstorage space on an internet site that can also display as a drive on your computer augmentative reality - ansadd digital information as an overlay to what we already perceive with our senses ex. Google glasses affective computing - anscomputers to recognize and simulate human emotions ROM RAM - ans____: non-volatile memory, holds instructions to start up computer ____: volatile memory, all data that computer is currently using is stored here cache - anssmaller memory area that CPU can access faster, to store commonly needed information volatile memory non volatile memory - ans_____: needs electricity or it is lost _____: preserved when power off hard disk drive - ansprimary storage device, nonvolatile storage pixel - anspicture element, smallest unit of display

actual questions on computer systems, programming logic,

hardware and software concepts, data storage, networking,

cybersecurity, digital literacy, and computer history.

Includes multiple-choice, true/false, matching, and key

definitions.

Latest updated exam study Guide 2025/

computer port - ansplace where some other device attaches to computer so data can be exchanged Charles Babbage - ans"Father of Computing" made analytical engine, which had similar components to a modern computer Ada Lovelace - answrote algorithm for Babbage's analytical engine, sometimes considered the first programmer Alan Turing - anscreated the Turing machine, an abstract computer model for logical operations, this hypothetical machine had infinite tape with symbols and could read, write, erase Grace Hopper - ansearly programmer, invented the compiler, a translator from human to machine language, came up with the term "bug" for problem in a computer computer - ansprogrammable electronic device designed to accept data input output storage processing - ans4 major functions of a computer:

  • ____: keyboards, mice, digital cameras, microphone
  • ____: text, monitors, printers, speakers, headphones
  • ____: hard disk drive, SSD, flash drive, cloud storage
  • ____: motherboard, CPU, RAM, ROM software hardware - ans_______: computer programs _______: physical computer parts CPU Hertz - ansbrains of the computer, controls all functions of a computer's components, processes all commands and instructions measured in _____ HTML - ansbase language of webpages hypertext - ansreferences to other texts/documents ARPA - ansdeveloped ARPANET, routes of internet backbone, beginnings of the internet with the DoD the DoD wanted a system that wouldn't be brought down in war, something with multiple communication channels Tim Berners Lee - ansin 1991, develops HTTP protocol and WWW client server architecture - ansclient requests page, server delivers page IP address IPv

actual questions on computer systems, programming logic,

hardware and software concepts, data storage, networking,

cybersecurity, digital literacy, and computer history.

Includes multiple-choice, true/false, matching, and key

definitions.

Latest updated exam study Guide 2025/

strategies for using more than one drive in a system HDMI - ansa compact audio-video interface standard that carries both high-definition video and uncompressed digital audio GPU (graphics processing unit) - ansvideo card's own CPU for monitor processing database - ansstructured, organized, collection of data fetch decode execute store - ans4 steps of a machine cycle?

  • ____: fetches required piece of data or instruction from RAM
  • ____: decodes instruction into something computer can understand
  • ____: executes instruction
  • ____: stores results to RAM CPU registers cache RAM SSD hard drive - ansRank these memory devices in order with the fastest/smallest/most expensive at top and the slowest/biggest/cheapest at bottom: cache CPU hard drive RAM registers SSD mechanical hard drives - anscoated platters stacked on a spindle, data saved as pattern of magnetized spots of 1s and 0s, patterns of spots are translated into data SSD - ansstore information using: fast access times generating little heat run with no noise require little power optical disks - ansstore information by: tiny pits burned into the disk by high speed laser network - ansgroup of interconnected things, 2 or more connected computers node - anseach device on a network WAN (wide area network)

actual questions on computer systems, programming logic,

hardware and software concepts, data storage, networking,

cybersecurity, digital literacy, and computer history.

Includes multiple-choice, true/false, matching, and key

definitions.

Latest updated exam study Guide 2025/

LAN (local area network) HAN (home area network) PAN (personal area network) - ans- biggest network (ex. the internet)

  • mid size network (ex. smaller town, IUP campus computers)
  • smaller network, different devices hooked up in a single home
  • smallest network, for use by one single person IEEE 802.11 - ansdeveloped Ethernet, this version has letters of: a, b, g, n, ac, ad, ah ethernet - ansdeveloped by IEEE, wireless and wired networks, backwards compatibility (newer can use older versions) TCP IP - ansTCP - makes sure that a file you are sending arrives correctly IP - individual number attached to each computer UTP cable - anspart of wired network, twisted copper wires surrounded by a plastic jacket coaxial cable - anspart of wired network, single copper wire surrounded by layers of plastic fiber optic cable - anspart of wired network, a cable that transmits data at close to speed of light along glass or plastic fibers broadband modem - ansconnect to internet service provider switch - anslike a station operator, sends signals to correct computer media access control (MAC) address - ansthis unique address is actually hard wired into every network device by the manufacturer, no two alike in the world packet - ansmessages sent over the internet divided into bunches of these wireless network adapter - anseach computer that will connect to your wireless network needs one of these, instead of having a cable connector on the back, it has an antenna wireless access point (WAP) - ansacts as a central connection point for all computers that have wireless network adapter, links your wireless network to your wired network service set identifier (SSID) - ansname that identifies an access point and all the wireless computers that are connected to it bluetooth - ansshort range wireless network technology that lets devices connect to each other without the need for cables or a WiFi network access point ex. wireless mice internet of things - ansmany little devices connected to network with sensors information resources - ansWhy do we have computer networks?

actual questions on computer systems, programming logic,

hardware and software concepts, data storage, networking,

cybersecurity, digital literacy, and computer history.

Includes multiple-choice, true/false, matching, and key

definitions.

Latest updated exam study Guide 2025/

note magnify - ans4 advantages of using a digital text compared to a paper text?

  • fast _________
  • integrated __________
  • _____ taking/highlighting

3 - anshow is the color in a single pixel often represented? each pixel is often represented with ____ numbers between 0 and 255, one color for each RGB copyright patents trademarks - ansname 3 of 5 categories of intellectual property:

  • _____: belongs to the creator of original work, own rights to exclusively reproduce the work, distribute the work to the public, perform or display the works publicly, prepare derivative works
  • ______: right to invention
  • ______: word, phrase, design to uniquely identify a company's product 70 - ansa copyright lasts for the life of the creator plus ____ years identity theft - ansstealing personal information, thief steals personal information and poses as you in financial or legal transactions adware - ansdisplays advertisements in part of browser or pop-up spyware - anstransmits information about you to owner of program virus - anstype of malware, computer program or malicious code that attaches to other computer program (host) and attempts to spread itself boot sector virus - ansgoes to Master Boot Record, used when computer boots up/starts logic time bomb - anstriggered on certain date or after certain series of actions worm - anslike viruses, but don't require human interaction to spread, standalone and self- replicate script virus - ansscript is a series of commands macro virus - ansmacro is short series of commands to automate repetitive tasks, viruses use macro to create shortcut to malicious information email virus - ansuse address book in victim's email to spread encryption virus - ansalso called ransomware, encrypt files with encryption key, ask for ransom to get information back multipartite virus - ansvirus that hide sin different types of files stealth virus - ansviruses that erase themselves off hard drive and "hide" in RAM (volatile) memory

actual questions on computer systems, programming logic,

hardware and software concepts, data storage, networking,

cybersecurity, digital literacy, and computer history.

Includes multiple-choice, true/false, matching, and key

definitions.

Latest updated exam study Guide 2025/

packet analyzer (sniffer) - ansprogram that examines packets (data on internet) and can read their content keylogger - ansprogram that captures all keystrokes on a computer trojan horse - ans"disguised" programs that appear to be useful but run malicious code in background, often allow "backdoor programs" and rootkits, which can give unlimited access to your computer zombie - ansa computer hacker controls your computer totally DDOS (distributed denial of service attack) - anszombies flood computer with requests to slow/shut down websites botnet - anscollection of devices with internet access infected by malware and controlled together cookie - anssmall text files some websites store on your computer when you visit them pretexting - anscreating a scenario that sounds legitimate enough that someone will trust you, form of social engineering phishing - anssends email that looks legitimate to get information from users form of social engineering spear phishing - ansuse targeted information specific to that person (often stolen by social engineering or other means) pharming - anslike phishing, but malicious code sends you to wrong website form of social engineering scareware - ansmakes you think computer is infected form of social engineering network address translation - ansrouter or firewall hides address of computer biometric authentication - ansuse biological traits for authentication ex. using fingerprints, face scanning to identify user multifactor authentication - anscombines 2 of these 3 for authentication:

  • something you know (password, security questions)
  • something you have (sending a code to your cell phone)
  • something you are (biometric, like fingerprints) virtual private network (VPN) - anssecure connection, but use public internet to send information, offers private communication over internet government auction fee identity - anstypes of cybercrime:

actual questions on computer systems, programming logic,

hardware and software concepts, data storage, networking,

cybersecurity, digital literacy, and computer history.

Includes multiple-choice, true/false, matching, and key

definitions.

Latest updated exam study Guide 2025/

  • write ___ (translate algorithm into computer commands)
  • _____ (find and fix errors)
  • _____ and document Java visual basic swift java HTML javascript - ansList 2 computer languages in each of these categories: (1) General:


(2) Mobile:

  • ____ (Apple)
  • ____ (Android) (3) Web development:


query - ansa ____ language is designed to manipulate or extract data from a database data validation - ansensures data is valid or of the right type primary key - ansuniquely identifies a record (row) ex. student ID foreign key - ansties different tables together (points to data in a different table) data warehouse - anslarge scale collection of data, contains and organizes data from an organization's multiple databases in one place (multiple departments) business intelligence - ansthe ability to improve business decision making with databases enterprise resource planning - ansbusiness management system, accumulates all information relevant to running a business efficiently information integrity meaningful - ansadvantages of using a database:

  • manage large amounts of data _______
  • make ______ sharing possible
  • promote data _______
  • databases make data more _____ and useful relational database - ansorganized data in table format,

actual questions on computer systems, programming logic,

hardware and software concepts, data storage, networking,

cybersecurity, digital literacy, and computer history.

Includes multiple-choice, true/false, matching, and key

definitions.

Latest updated exam study Guide 2025/

relationships tie different tables together (common field in one table linked to common field in second table) fields records tables - ans3 basic parts of relational database:

  • ____: categories of data (columns)
  • ____: groups of related fields (rows)
  • ____: groups of records P2P network - anspeer to peer network, decentralized, direct communication server virtualization - ansone physical server divided into multiple "virtual" or "software" servers bastion host - ansheavily secured server on a special perimeter network proxy server - ansacts as a go-between between computers and "dangerous" internet intranet - ansinternal, private network set up by a business extranet - anspart of intranet, accessible to certain people on the outside (such as customers or vendors) top second - ans___ level domain: standardized pools such as .com and .org ____ level domain: unique within its own TLD but not necessarily unique to all top level domains Ex. in www.google.com .com = top level domain google = second level domain DNS (domain name system) - anslike a phone book to look up URLs and get IP addresses encryption - anslike having a secret decoder ring to hide what you are writing, turns "plaintext" into "ciphertext" plaintext - ansthings like email often sent as this, anybody can intercept and read them ciphertext - ansencryption turns plaintext into this, a scrambled version of the text non profit organizations - answho manages the internet? group of several ___ ____ _______, each with their own specialty IP address - anscomputer address for sending communications static dynamic - ans____ IP address: never changes, assigned by network administrators or ISP _____ IP address: temporary, assigned from pool of addresses, more common, uses DHCP to share addresses

actual questions on computer systems, programming logic,

hardware and software concepts, data storage, networking,

cybersecurity, digital literacy, and computer history.

Includes multiple-choice, true/false, matching, and key

definitions.

Latest updated exam study Guide 2025/

D. tables