How can we help?
You can also find more resources in our
Select a category
Something is confusing
Something is broken
I have a suggestion
What is your email?
What is 1 + 3?
Upgrade to remove ads
Computer Science 2 Exam Review
An identification code that consists of a set of vertical lines and spaces of different widths
The actual photographed resolution of a digital camera
Many companies use OCR characters on a(n) ____ document, which is a document that is returned to the company that creates and sends it.
The number of horizontal and vertical pixels in a display device
A(n) ____ keyboard has a design that reduces the chance of wrist and hand injuries.
Any data and instructions into the memory of a computer
Used almost exclusively by the banking industry for check processing
A small metal or plastic device that looks like a tiny ink pen but uses pressure instead of ink
A retinal ____ works similarly to an iris recognition system, but instead scans patterns of blood vessels in the back of the retina.
A(n) ____ conference in a meeting between two or more geographically separated people who use a network or the Internet to transmit audio and video data.
Requires any company with 15 or more employees to make reasonable attempts to accommodate the needs of physically challenged workers
A pointing device that fits comfortably under the palm of the hand
A technology that involves reading typewritten, computer-printed, or hand-printed characters from ordinary documents and translating the images into a form that the computer can process
The goal of ____ is to incorporate comfort, efficiency, and safety in the design of items in the workplace.
Voice ____ is the computer's capability of distinguishing spoken words.
A series of instructions that tells a computer what to do and how to do it
A technology that reads hand-drawn marks such as small circles or rectangles
The technology of authenticating a person's identity by verifying a personal characteristic
pixels per inch
Manufacturers often use ____ to represent the resolution of a digital camera like the one shown in the accompanying figure.
Use a row of charged wires to draw an electrostatic pattern on specially coated paper and then fuse toner to the pattern
A single point in an electronic image
An important measure of LCD monitors is the ____ time, which is the time in milliseconds that it takes to turn a pixel on or off.
An output deivice that conveys text, graphics, and video information
A touch-sensitive device, resembling a dry-erase board that displays the image on a connected computer screen
A printer creates images using a laser beam and powdered ink called ____.
A high-speed, high-quality non impact printer
Printed information that exists physically and is a more permanent form of output
A display that uses gas plasma technology, which sandwiches a layer of gas between two glass plates
A hard copy is also called a ____.
Any hardware component that conveys information to one or more people
if the device breaks down, users lose all four functions
The disadvantage of a multi-function peripheral is ____.
Data that has been processed into a useful form
Consists of memory chips that store frequently accessed items
The smallest unit of data a computer can process
A duplicate of a file, program, or disk that can be used in case the original is lost, damaged, or destroyed
A flash memory storage device that plugs in a USB port on a computer or portable device
all of the above
An advantage of portable hard disks and removable hard disks is that users can ____.
The process of dividing a disk into tracks and sectors, so the operating system can store and locate data and information on the disk
A multi-session optical disc on which users can write but not erase their own items such as text, graphics, and audio
Tape storage requires ____ access, which refers to reading or writing data consecutively.
Overcomes the major disadvantage of CD-R disks, which is being able to write on them only once
Use magnetic particles to store data, instructions, and information on a disk's surface
All of the following use direct access EXCEPT ____.
Similar in size to a credit or an ATM card; stores data on a thin microprocessor embedded in the card
The computer hardware that records and/or retrieves items to and from storage media
The number of bytes (characters) a storage medium can hold
An Internet service that provides storage to computer users
A type of optical disc that users can read but not write or erase
A group of two or more integrated hard disks
Made of aluminum, glass, or ceramic and is coated with an alloy material that allows items to be recorded magnetically on its surface
Holds data, instructions, and information for future use
A program that removes or blocks certain items from being displayed
A process that sends documents to a buffer instead of sending them immediately to the printer
multiuser operating system
Enables two or more users to run programs simultaneously
graphical user interface (GUI)
Users interact with menus and visual images such as icons, buttons, and other objects to issue commands
A unique combination of characters, such as letters of the alphabet or numbers, that identifies one specific user
Describes a potentially damaging computer program that affects, or infects, a computer negatively by altering the way the computer works without the user's knowledge or permission
operating system and utility programs
Two types of system software
Someone who tries to access a computer or network illegally
Malware that copies itself repeatedly
Malware that hides within or looks like a legitimate program
The process of starting or restarting a computer
Firmware that contains a computer's start-up instructions
A utility that removes a program as well as any associated entries in the system files
plug and play
Means the operating system automatically configures new devices as users install them
Controls how users enter data and instructions into a computer and how information is displayed on the screen
Consists of the programs that control or maintain the operations of a computer and its devices
Software that acts without a user's knowledge and deliberately alters a computer's operations
In the event that a backup file is used, a ____ program reverses the process and returns backed up files to their original form.
A specific named location on a storage medium that contains related documents
A single user/____ operating system allows a single user to work on two or more programs that reside in memory at the same time.
A program placed on a computer without the user's knowledge or consent that secretly collects information about the user
A private combination of characters associated with a user name that allows access to certain computer resources
A set of programs containing instructions that coordinate all the activities among computer hardware resources
A utility that detects and protects a computer from unauthorized intrusions
Causes a monitor's screen to display a moving image or blank screen if not keyboard or mouse activity occurs for a specified period of time
A network standard that specifies no central computer or device on the network should control when data can be transmitted
all of the above
Computer communications describes a process in which two or more computers or devices transfer ____.
Two examples of ____ are cable television lines and telephone lines.
A collection of computers and devices connected together via communications devices and transmission media
Any typed of hardware capable of transmitting data, instructions, and information between a sending device and a receiving device
A coffeehouse or restaurant that provides computers with Internet access to its customers
A software application that helps groups of people work together on projects and share information over a network
Identifies any network based on the 802.11 family of standards
A simple, inexpensive network that typically connects fewer than 10 computers
A communications device that connects multiple computers together and transmits data to its correct destination on the network
A wireless network that provides Internet connections to mobile computers and other devices
A network topology in which a cable forms a closed loop, with all computers and devices arranged along it
All of the computers and devices (nodes) on the network connect to a central device
wide area network (WAN)
A network that covers a large geographic area, such as a city, country, or the world, using a communications channel that combines many types of media
The amount of data, instructions, and information that can travel over a communications channel
One or more computers act as a server and the other computers on the network request services from the server
Users type and send short text messages on a smart phone or mobile device
Upgrade to remove ads