Study sets, textbooks, questions
Upgrade to remove ads
Principles of Computing Final Exam
9.3 Fill in the blank
Terms in this set (75)
A _____ is an "instruction execution engine" cycling through a series of operations, performing an instruction on each round.
______ write the instructions for a computer
________, considered by many to be the world's first electronic computer, was created by J. Presper Eckert and John Mauchly of the University of Pennsylvania
The ______ is the part of the computer that gets instructions from memory and carries them out
ALU is short for _______
The ability to create software by combining other software is known as ________.
Computers have instructions for both transforming and _______ information.
Data Fetch gets the values, called ___________, from memory that the ALU needs to perform operations like ADD and MULTIPLY.
Programs and their data must reside in the computer's _______ when programs run.
Every peripheral communicates with the computer through a(n) __________.
The ability to control when __________ do and do not conduct electricity is the main process used in computer construction.
The rate of the Fetch/Execute Cycle is determined by the computer's _______.
The process of executing a program is also called ____________.
Programs written in a high-level language are ______, i.e., translated, into assembly language programs, which are then assembled into binary.
_________ is simply an alternative form of machine language expressed using letters and normal numbers so people can understand it.
A(n) _______ starts the computer, manages memory, and controls the peripherals.
IC is shot for __________.
The common name for an integrated circuit is a computer ________.
A(n) ______ is a light-sensitive material used to make a chip.
A(n) _______ is a force one object can have on another without touching it.
A(n) ______is a connector between two wires that controls whether they are electrically connected.
Modern computers are developed with ________, the most widely used integrated circuit technology.
C, C++, and Java are all examples of a(n) ______ programming language.
The _________ cycle consists of getting the instruction, figuring out what to do, gathering the data needed to do it, doing it, saving the result, and repeating.
Most Americans wrongly assume that their privacy regarding business information is restricted to ____________.
Government and Business
____ and ____ entities are the two biggest threats to privacy.
A _____ is information stored on a Web client computer by an HTTP server computer
Privacy Act of 1974
The ______ limits the government's ability to interfere with people's privacy.
The method by which malware gets into your computer is known as _____of attack.
peer 2 peer
_____refers to the relationship between computers that are communicating over the Internet where each of the computers-yours and someones else's- is a "file server" for the other.
_____ is the process of recovering encrypted cipher text.
Malware that directly manipulates operating system tables to hide its presence is known as ______.
_____ communication involves message exchange in which the content is encrypted to keep it private.
_____ is the crime of posing as someone else for fraudulent purposes.
A _____ is a barrier between two computers on a network, or between the internet and a personal computer.
The _____ principle of the OECD Fair Information Practices states that personal data gathered should be relevant to the purposes for which it is used, and should be accurate, complete, and up-to-date.
______ is the choice of disapproving to a use of information.
______ is the choice of approving to a use of information.
_______, the practice of a Web site automatically sending details about your visit to other content providers, is an emerging problem of concern to privacy experts.
A _____ is published by the receiver and used by the sender to encrypt messages
Computer scientists have not yet proved the invincibility of the RSA scheme, but it can be "made more secure" simply by ______the size of the key.
______is software intended to do harm to a computer connected to the internet.
The ______ public key cryptosystem, invented by Rivest, Shamir, and Adelman, is one of the popular PKC algorithms.
In computer security, compromised computers that act under the direction of an external master computer, often to send spam, are called ______.
Recovery after a disaster involves installing the most recent _____backup copy.
The first step in programming is to create a(n) __________.
Buttons and checkboxes are known as _____ of forms.
______tags must surround all of the input elements.
A(n) ______ is an indication from the computer (operating system) that something just happened (mouse click).
A programming style that responds to events, such as mouse clicks, is known as _____ programming.
Declaring the variable
Setting the initial values for the variables in a program is called _______.
The value ______ of an input element with button type provides the label on the button.
Cross-element references require the ________.
Only the ______ attribute of the <form> tag is required.
_______is a description for computations solvable by computer in principle, but not in practice.
_______ use a "brute force" approach to solving a problem by trying every possibility and then picking the best solution.
The _______, determine if a computation halts for a given input, is a problem that cannot be solved by a computer. The Loop-Checker algorithm checking for infinite loops is one example.
Computers don't understand ______, that is, the language that humans use.
In computer games, e.g., chess, a(n) ______ is a procedure that assigns a numerical value to each chess piece when calculating the best possible move.
In chess, looking ahead to future moves is described as ______ since it involved moving toward the lower layers of possible choices.
Getting 2 or more computers to work on a problem at the same time is called _______.
A ______ test is an experimental setting to determine if a computer and a person can be distinguished by their answers to a judge's questions.
Spreadsheet columns are labeled with ______.
The rows of a spreadsheet are designated with ______.
Equals Sign (=)
The ______at the beginning of a cell entry determines whether a spreadsheet cell contains a formula or data.
Data from another application that one wants to import into a spreadsheet is called _______.
dollar sign ($)
An absolute cell reference makes use of the ______ symbol in its formula.
The process of copying from one cell to many others by simply dragging is called ______.
In a spreadsheet, a(n) _____ is a naming scheme that allows the user to refer to a group of cells by naming the first cell and the last cell and placing a colon (:) in between.
Cell references that do not change when copied from one cell to another are called _____ references.
The Min function is used to display the ______ item in a list.
A file with a .txt extension is an ASCHII _____ file.
To change the way contents of a cell appears, you change its ______.
to helps us create a list, spreadsheets give us an array of _____ that we fill in to set up our list.
Sets with similar terms
Finance Digital Literacy- Semester 1
Case Scenarios (Chapter 7-8)
Chapter 2 EEC
Other sets by this creator
Cultural Perspectives in health care
Psychology of Workplace Behaviors ch 13
Psychology of Work Place lecture 11 and 12
Psychology of Workplace Behaviors lecture 14
Other Quizlet sets
Final Review: In-class highlighted terms
C++I (FINAL EXAM)
ISDS309 - Chapter 1