Study sets, textbooks, questions
Upgrade to remove ads
Computers Multiple Choice: Test 5
Terms in this set (81)
Memory is measured in
All of the above
Computer memory is like...
a row of plastic cups
The control unit of the computer is involved in the ...
Instruction fetch and instruction execute cycle
The peripheral most closely tied to the computer is the...
Computer instructions are...
4 bytes long
The program counter keeps track of the...
next instruction in the control unit
The computer's speed is measured in megahurtz, that is...
millions of cycles per second
On the computer, a billion clock ticks in a second is called...
Computer speed is dependent upon all of the following except...
A clock speed of 1 GHz means the computer runs...
Around 1 billion instructions per second
A page fault is...
An attempt by the computer to run instructions stored on the hard disk
Which of the following is not controlled by the operating system...
Integrated circuits are so remarkable because...
All of the above
The "wires" on a computer chip are made from...
The lowest programming language that humans use is...
Which of the following is not an operating system...
Management of a computer's hardwire is done with...
an operating system
How many steps are a part of the fetch/execute cycle...
The next instruction must be at the memory address
Most americans wrongly assume that their privacy regarding buisness information is restricted to ________.
____ and ____ are the two biggest threats to privacy.
Government and business
Five principles for the collection and use of the personal information were first laid out by the _____.
code of fair information practices.
The ____ limits the governments ability to interfere with people's privacy.
Privacy act of 1974
The united states takes a _____ approach to individual privacy by passing laws to limit specific industrious or business practices.
The concept of _____ allows data on people from EU countries
_____ is the process of recovering encrypted cipher text.
____ can be described as x or y byt not both.
Public key encryption techniques are known as _____.
A _____ is a security bypass that could be used to send clear text to security officials.
_____ systems would bypass security by requiring software vendors to register their encryption keys.
A _____ solution provides consistent protection to all information.
Spreadsheets are used primarily in...
The basic unit of a spreadsheet...
Spreadsheets can be...
sort by any column
A range of cells can include...
the entire spreadsheet
Data too wide to fit in a cell...
The main purpose of a spreadsheet is to...
process numerical data
To stop editing a cell and move on to another cell, use the...
common, summary applications in a spreadsheet are handed by...
over 100 built-in functions
To get a cell to display $10 you must...
Enter 10.00 and format the cell to currency
To select a range of cells...
Drag the cursor across the cells
A formula reference begins with...
the equal sign (=)
spreadsheet columns are labeled with _____.
The rows of a spreadsheet are designated with ____.
The ____ determines whether a spreadsheet cell contains a formula in data
Spreadsheet formulas are edited in the _____.
an absolute cell reference makes use of the ___ symbol in its formula
the process of copying from one cell to many others by somply dragging is called ____.
Control over the style of the display of a cell is called ____.
Cell references that do not change when copied from one cell to another are called ____ references.
The min function is used to display the ___ item in a list.
a file with a .txt extension probably contains ______.
To change the way contents of a cell appears you change its _____.
format or formatting.
The first rule of setting up effective spreadsheets i...
Focus on form
Place descriptive information...
on the top and left
In the conditional formatting dialog box, the default condition is...
what symbol is used to denote absolute cell references...
dollar sign ($)
The IF function specifies...
Action on true outcome
To access letters of a cell value for such comparisons, use the function...
IF ( )
A word or a phrase applied to a cell or range of cells is called its...
The scenario manager window is accessed via the...
What method is used to access subsets of information...
The key field for the student database on a campus is probably the student...
A unique identifier stored in place of information that might be repeated is known as a...
A logical database is...
All of the above
Logical tables are created with a...
Associating information from two or more tables is done with a...
Queries are a part of the...
all of the above
A set of attributes for which all entities are different is known as a...
XML should be edited using a...
XML tags may not contain...
________ computer problems are problems that have no practical solution because the data set involved is so large to defy a practical solution.
________ use a "brute force" approach to solving a problem by trying every possibility and then picking the best solution.
The ________ is a famous computation that computers cannot solve.
A(n) ________ is a procedure that assigns a numerical value to each chess piece when calculating the best possible move.
In chess or other games, looking ahead to future moves is described as ________.
the game tree
Getting two or more computers to work on a problem at the same time is called ________.
Increasing the number of CDs that need to be alphabetized would increase the size of the computation according to the ________ algorithm.
The Face Forward algorithm is an example of the ________ algorithm.
A(n) ________ test attempts to define thinking.
Sets found in the same folder
Comp Sci 131 Final: True/False
Mid Intro Comp part II: Test 5
Sets with similar terms
Principles of Computing Final Exam
information systems 1800 final mim duncan
Other sets by this creator
MGMT 3130 Q1
MKTG 3131 FINAL Study Guide
ECON 3131 T3