Study sets matching "computer chapter 9"

Study sets
Classes
Users

Study sets matching "computer chapter 9"

38 terms
Computer Science Chapter 9
Processor
Computer
Microprocessor
Central Processor
The component of a computer that computes (performs the instr…
A device that deterministically follows instruction to proces…
Component of a computer that computes or performs instruction…
The ALU and control components of a computer, typically inclu…
Processor
The component of a computer that computes (performs the instr…
Computer
A device that deterministically follows instruction to proces…
10 terms
Chapter 9 Computer
Accounts receivable (AR)
Day sheet
Aging report
Patient aging report
Monies that are coming into the practice
A report that provides information on practice activities for…
A report that lists the amount of money owed to the practice,…
A report that lists a patients balance by age, date, and amou…
Accounts receivable (AR)
Monies that are coming into the practice
Day sheet
A report that provides information on practice activities for…
Computer Concepts Chapter 9
advance fee fraud, identity theft, FBI…
encryption viruses
backdoor programs
firewall
major types of cybercrime reported in the IC3
viruses that compress files and then demand money to restore…
the tool that hackers use to gain access to and take control…
software designed to close logical ports in your computer
advance fee fraud, identity theft, FBI…
major types of cybercrime reported in the IC3
encryption viruses
viruses that compress files and then demand money to restore…
16 terms
Computer Basics Chapter 9
3G Wireless
4G Wireless
Artificial Intelligence (AI)
Augmented Reality
Cell phone service that enables connectivity to the Internet.
The latest and fastest cell phone connection speed. The name…
A computer that simulates or achieves true intelligence.
A term used to define a new smartphone experience in which GP…
3G Wireless
Cell phone service that enables connectivity to the Internet.
4G Wireless
The latest and fastest cell phone connection speed. The name…
Computer Science Chapter 9
The Language Progression
Assembly Language: Disadvantages
High-Level Languages
Compiler
Using computers to solve problems ... Often involves writing pro…
Programmer must "manually" manage the movement of data items…
Expectations of a program written in a high-level language ... P…
Converts high-level language instructions into machine langua…
The Language Progression
Using computers to solve problems ... Often involves writing pro…
Assembly Language: Disadvantages
Programmer must "manually" manage the movement of data items…
55 terms
Computer Maintenance Chapter 9 Printers
what printers do
technician printer-related tasks
uses electrostatic sprayers
criteria used when selecting a printer
produce paper copies of electronic files
select, install, configure, troubleshoot
Inkjet
capacity, speed, color quality, reliability
what printers do
produce paper copies of electronic files
technician printer-related tasks
select, install, configure, troubleshoot
Chapter 9: Computer Operations
Fetch/execute cycle
Memory
Random access memory
Control unit
getting the next instruction, figuring out what to do, gather…
stores both the program while it is running and the data on w…
computer can refer to the memory locations in any order
the hardware implementation of the Fetch/Execute Cycle; circu…
Fetch/execute cycle
getting the next instruction, figuring out what to do, gather…
Memory
stores both the program while it is running and the data on w…
10 terms
Computer Science Chapter 9
ARPANET
Internet
TCP/IP
TCP
Advanced Research Projects Agency Network ... -The predecessor…
Network of Networks ... -Links academic, research, government,…
Transmission Control Protocol/Internet Protocol... -The language…
Breaks down messages into packets
ARPANET
Advanced Research Projects Agency Network ... -The predecessor…
Internet
Network of Networks ... -Links academic, research, government,…
22 terms
Chapter 9- Computer Organization
5 basic parts of computer
5 steps of fetch/execute cycle
Fetch/Execute Cycle
ALU (math) and Control Unit (operation)
1) ALU 2) Control Unit 3) Memory 4) Input 5) Output
1) instruction fetch 2) Instruction decode 3) Data fetch 4) I…
gets next instruction, executes before repeating
Processor's two parts
5 basic parts of computer
1) ALU 2) Control Unit 3) Memory 4) Input 5) Output
5 steps of fetch/execute cycle
1) instruction fetch 2) Instruction decode 3) Data fetch 4) I…
19 terms
computer chapter 9
Antivirus Software
Cookies
Cybercrimes
Cyberloafing
(of software) designed to detect and destroy computer viruses.
A small text file (up to 4KB) created by a Web site that is s…
is crime that involves a computer and a network. The computer…
s a term used to describe the actions of employees who use th…
Antivirus Software
(of software) designed to detect and destroy computer viruses.
Cookies
A small text file (up to 4KB) created by a Web site that is s…
47 terms
Computer Forensics Chapter 9
Examining and analyzing digital eviden…
What is it called when an investigatio…
List the three bullet points for Scope…
Why has Scope creep become more common?
the amount of data to process
Scope creep
1. Because of unexpected evidence found... 2. Attorneys may ask…
1. Criminal investigations require more detailed examination…
Examining and analyzing digital eviden…
the amount of data to process
What is it called when an investigatio…
Scope creep
12 terms
COMPUTER CHAPTER 9
Standard Functions
Concatenation
concatenation operator
LEN Function
Readymade programs saved in the inbuilt library of QBASIC
joining of two strings
+ plus symbol
find the length of the string
Standard Functions
Readymade programs saved in the inbuilt library of QBASIC
Concatenation
joining of two strings
chapter 9 computer terms
virtualization
mobile operating system
blackberry
sleep mode
the practice of sharing or pooling computing resources, such…
typically has one program running at a time, though others ma…
a proprietary mobile operating system
saves any open documents and programs to RAM, turns off all u…
virtualization
the practice of sharing or pooling computing resources, such…
mobile operating system
typically has one program running at a time, though others ma…
18 terms
Computer chapter 9
A ______ application is an application…
Placing a computer in ______ mode save…
With a _____ interface, users interact…
A _____ operating system allows two or…
cross-platform
hibernate
natural user interface
multitasking
A ______ application is an application…
cross-platform
Placing a computer in ______ mode save…
hibernate
47 terms
Computer Chapter 9
Our present time is referred to as the…
A table is a database object that stor…
All the information about a customer c…
The columns in a table are called reco…
True
True
False
False
Our present time is referred to as the…
True
A table is a database object that stor…
True
28 terms
Computer Vocab chapter 9
Access
Append
Ascending order
Boundary
The microsoft office RDMBS application
Adding data to the end of a table
In order from lowest to highest; alphabetical when based on l…
The column borders in a table
Access
The microsoft office RDMBS application
Append
Adding data to the end of a table
19 terms
computer chapter 9
pharming
phishing
white-hat-hacker
adware
occurs when malicious code is plated on your computer, which…
lures internet users to reveal personal information that coul…
a hacker who breaks into systems just for the challenge of it
software that displays sponsored advertisements in a section…
pharming
occurs when malicious code is plated on your computer, which…
phishing
lures internet users to reveal personal information that coul…
98 terms
Chapter 9 - The Computer Industry
Abacus, 486
Alpha test, 504
Analytical Engine, 488
Apple I, 495
A manual calculator that consists of beads mounted on sticks…
One of the first phases of software testing, usually conducte…
A mechanical calculator designed by Charles Babbage that incl…
An unassembled computer kit released in 1976 by Apple Compute…
Abacus, 486
A manual calculator that consists of beads mounted on sticks…
Alpha test, 504
One of the first phases of software testing, usually conducte…
27 terms
Computer Science: Chapter 9
Most browsers offer this, which ensure…
Which type of program would likely be…
Programs used to secretly record an in…
_____ is concerned with protecting sof…
Privacy mode
Keystroke logger
spyware
Data security
Most browsers offer this, which ensure…
Privacy mode
Which type of program would likely be…
Keystroke logger
26 terms
Computer Science Chapter 9
Memory has a finite capacity.
Each byte in memory is limited in size.
A megabyte is exactly one million bytes.
The ADD instruction adds the values, n…
true
true
1,000,000 bytes of memory
true
Memory has a finite capacity.
true
Each byte in memory is limited in size.
true
Computer Chapter 9
The operating system that a computer s…
The ____ is the core of an operating s…
Some people use the term _____ to refe…
You can start a computer from a _____,…
Platform
Kernel
Cold boot
Boot disk
The operating system that a computer s…
Platform
The ____ is the core of an operating s…
Kernel
computer chapter 9 quiz
__ is used to enter, edit, and format…
__ is used to create a collection of s…
the files you create in excel are call…
the ribbon is organized into __ and gr…
word
PowerPoint
workbooks
tabs
__ is used to enter, edit, and format…
word
__ is used to create a collection of s…
PowerPoint
40 terms
Chapter 9: Computer Organization
Central processing unit
Random Access Memory
MegaByte
Arithmetic Logic Unit
CPU
RAM
MB
ALU
Central processing unit
CPU
Random Access Memory
RAM
Chapter 9: Camera & Computer Arts
daguerrotype
Niepce
George Eastman
Muybridge
first practical photographic process
invented photography
Kodak. "you press the button, we do the rest" (1872)
first motion picture (1878, Horse galloping)
daguerrotype
first practical photographic process
Niepce
invented photography
Computer Concepts Chapter 9
Formula ____ allows you to examine for…
One of the tools that Excel provides t…
A cell containing a formula that refer…
Identifying ____ highlights where chan…
auditing
Solver
precedents
dependents
Formula ____ allows you to examine for…
auditing
One of the tools that Excel provides t…
Solver
14 terms
Computer Concepts Chapter 9
advance fee fraud, identity theft, FBI…
encryption viruses
backdoor programs
firewall
major types of cybercrime reported in the IC3
viruses that compress files and then demand money to restore…
the tool that hackers use to gain access to and take control…
software designed to close logical ports in your computer
advance fee fraud, identity theft, FBI…
major types of cybercrime reported in the IC3
encryption viruses
viruses that compress files and then demand money to restore…
16 terms
Computer Programming: Chapter 9
True/False: With pointer variables you…
True/False: The ampersand (&) is used…
What will the following code output?…
The statement cin >> *num3
False
False
2
stores the keyboard input into the variable pointed to by num3.
True/False: With pointer variables you…
False
True/False: The ampersand (&) is used…
False
Computer Concepts Chapter 9
The summary function that calculates t…
Which of the following is the path to…
The ____ value is a number from 0 to 1…
When creating a PivotTable report, the…
Count
(CHART TOOLS DESIGN tab | Chart Layouts group)
R-squared
anywhere in the range that contains the data
The summary function that calculates t…
Count
Which of the following is the path to…
(CHART TOOLS DESIGN tab | Chart Layouts group)
computer chapter 9 beat the clock
similar to a task pane, a dialog box a…
the bold button on the word ribbon is…
800 x 600 is lower resolution than 136…
Backstage view contains commands that…
False
toggle
True
true
similar to a task pane, a dialog box a…
False
the bold button on the word ribbon is…
toggle
Computer concepts chapter 9
When a hacker steals personal informat…
Viruses that activate on certain dates…
Firewalls work by closing ______ in yo…
An attack that renders a computer unab…
Identity theft
Time bombs
Logical ports
Denial-of-service
When a hacker steals personal informat…
Identity theft
Viruses that activate on certain dates…
Time bombs
14 terms
AP Computer Science Chapter 9 Vocabulary
Code Reuse
Is-a Relationship
Inheritance Hierarchy
Inheritance (Inherit)
The Practice of writing program code once and using it in man…
A hierarchical connection between two categories in which one…
A set of hierarchical relationships between classes of objects.
A programming technique that allows a derived class to extend…
Code Reuse
The Practice of writing program code once and using it in man…
Is-a Relationship
A hierarchical connection between two categories in which one…
40 terms
Computer Science Chapter 9
Privacy
anonymity
Cookies
GUID; Globally unique identifier
refers to an individual's ability to restrict or eliminate th…
refers to the ability to convey a message without disclosing…
small text files that are written to your computers hard disk…
identification number that is generated by a hardware compone…
Privacy
refers to an individual's ability to restrict or eliminate th…
anonymity
refers to the ability to convey a message without disclosing…
26 terms
Chapter 9 - Computer Security
Ways a computer catches a virus
Ways an antivirus detects a virus
Malware
Spyware
Downloading infected files from web sites, emails, shared USB…
Looking for a virus signature
Softare that has malicious intent
Unwanted piggybacking program that usually downloads with oth…
Ways a computer catches a virus
Downloading infected files from web sites, emails, shared USB…
Ways an antivirus detects a virus
Looking for a virus signature
28 terms
Chapter 9- computer organization
Operating System
Arithmetic Logic Unit
Control Unit
word
OS
ALU, does the math, part one of a processor
part 2 of a processor, works like a traffic cop, controlling…
4 bytes taken as a unit is very common today, so this has bee…
Operating System
OS
Arithmetic Logic Unit
ALU, does the math, part one of a processor
Computer Science Chapter 9
javaScript
event-driven
properties
methods
event-driven, object-based programming
programming language that responds to events
attributes that describe an object's characteristics
actions that an object can perform
javaScript
event-driven, object-based programming
event-driven
programming language that responds to events
22 terms
Chapter 9 Logistics - Computer
inventory
The Pareto Principle (aka 80-20 Rule)
knowing the demand pattern
how much variability there was in the…
Components, raw materials, work in process, finished goods an…
for many events, roughly 80% of the effects come from 20% of…
what is the key to good inventory management?
What does standard deviation tell us?
inventory
Components, raw materials, work in process, finished goods an…
The Pareto Principle (aka 80-20 Rule)
for many events, roughly 80% of the effects come from 20% of…
Computer Service Chapter 9
active partition
actuator arm
AT Attachment (ATA)
basic disk
the designated boot disk fo rthe system.
The device that moves the read/write head over the disk.
A standard for disk drive interface that integrates the contr…
the traditional FAT16, FAT32, and NTFS file storage systems.
active partition
the designated boot disk fo rthe system.
actuator arm
The device that moves the read/write head over the disk.
24 terms
Computer Security TIA Chapter 9
Computer virus
How does my computer catch a virus?
Logic Bomb
Time Bomb
Computer program that attaches itself to another program and…
downloading infected audio/video files from peer to peer shar…
virus triggered when certain logical conditions are met... open…
a virus triggered by the passage of time or on a specific date
Computer virus
Computer program that attaches itself to another program and…
How does my computer catch a virus?
downloading infected audio/video files from peer to peer shar…
Chapter 9 Computer Application
Computer Communications
what is needed for successful communic…
sending devices
communication channel
process in which two or more computer or devices, transfer da…
sending device, communication channel, receiving device
initiates instructions to transmit data, instructions or info…
media on which data, instructions or information travel
Computer Communications
process in which two or more computer or devices, transfer da…
what is needed for successful communic…
sending device, communication channel, receiving device
Computer I: Chapter 9
Our present time is referred to as the…
A table is a database object that stor…
All the information about a customer c…
The columns in a table are called reco…
True
True
False
False
Our present time is referred to as the…
True
A table is a database object that stor…
True
95 terms
Computer Concepts 2014 - Chapter 9
Abacus
Alpha test
Analytical Engine
Apple I
A manual calculator that consists of beads mounted on sticks…
One of the first phases of software testing, usually conducte…
A mechanical calculator designed by Charles Babbage that incl…
An unassembled computer kit released in 1976 by Apple Compute…
Abacus
A manual calculator that consists of beads mounted on sticks…
Alpha test
One of the first phases of software testing, usually conducte…
101 terms
chapter 9 computer science
what is the most finacially imaging cy…
what types of scams do identity theive…
with all the new coverage abou tidenti…
what defines hacker?
bank account and credit/debit card numbers. identity teft
1. counterfiting your exisiting credit and debit cards... 2. ope…
no 46% if poeple who open spam did it intentionally out of cu…
anyone who unlawfully breaks into a computer system
what is the most finacially imaging cy…
bank account and credit/debit card numbers. identity teft
what types of scams do identity theive…
1. counterfiting your exisiting credit and debit cards... 2. ope…
8 terms
Computer Science Chapter 9
abstract class
abstract method
base class
derived class
a class that models an abstract concept. A class that contain…
a method that has been declared, but not implemented. abstrac…
a superclass
a subclass
abstract class
a class that models an abstract concept. A class that contain…
abstract method
a method that has been declared, but not implemented. abstrac…
Chapter 9 computer Vocab
Wallet
administrator account
Passbook
command language
A window phone app that provides a centralized location for c…
Enables user to access all files and programs on the computer…
An IOS app that provides a centralized location for coupons
When working with a command-line interface , the set of comma…
Wallet
A window phone app that provides a centralized location for c…
administrator account
Enables user to access all files and programs on the computer…
20 terms
Chapter 9 computer Vocab
Wallet
administrator account
Passbook
command language
A window phone app that provides a centralized location for c…
Enables user to access all files and programs on the computer…
An IOS app that provides a centralized location for coupons
When working with a command-line interface , the set of comma…
Wallet
A window phone app that provides a centralized location for c…
administrator account
Enables user to access all files and programs on the computer…
Chapter 9 computer Vocab
Wallet
administrator account
Passbook
command language
A window phone app that provides a centralized location for c…
Enables user to access all files and programs on the computer…
An IOS app that provides a centralized location for coupons
When working with a command-line interface , the set of comma…
Wallet
A window phone app that provides a centralized location for c…
administrator account
Enables user to access all files and programs on the computer…
46 terms
Chapter 9: Principles of Computer Operations
computer
fetch/execute cycle
discrete locations
addresses
a device that deterministically follows instructions to proce…
the basic instruction execution process of a computer
where memory is organized. similar to apartment buildings. In…
every memory location has one. similar to a mailbox, although…
computer
a device that deterministically follows instructions to proce…
fetch/execute cycle
the basic instruction execution process of a computer
Chapter 9 Computer Programming.
What is the primary job of a constructor
The constructive r is automatically ca…
Can the constructor call other methods…
How can you recognize a constructor me…
The job of the constructor is to initialize the attributes of…
New & initial values
Yes
A constructor method has the same name identifiers the class…
What is the primary job of a constructor
The job of the constructor is to initialize the attributes of…
The constructive r is automatically ca…
New & initial values
Chapter 9; Computer Applications in the Medical Office
Cookies
Downloading
Encryption
Ethernet
tiny files that are left on the computer's hard drive by a we…
transferring information from an outside location to your com…
scrambling email messages as they leave one site and unscramb…
system that allows the computer to be connected to a cable or…
Cookies
tiny files that are left on the computer's hard drive by a we…
Downloading
transferring information from an outside location to your com…
36 terms
Criminal Law: Chapter 9 - Property and Computer Crimes
acquisitive offense
arson
asportation
blackmail
A crime that involves the unlawful acquiring or appropriation…
The knowing and malicious burning of the personal property of…
The trespassory taking and carrying away (as of personal prop…
A form of extortion in which a threat is made to disclose a c…
acquisitive offense
A crime that involves the unlawful acquiring or appropriation…
arson
The knowing and malicious burning of the personal property of…
1 of 10