Podcast
Questions and Answers
A kilobyte is a unit of storage that consists of approximately 1 byte.
A kilobyte is a unit of storage that consists of approximately 1 byte.
False
Solid-state drives (SSDs) are mechanical storage devices.
Solid-state drives (SSDs) are mechanical storage devices.
False
The BitTorrent protocol uses a central server to share files over the Internet.
The BitTorrent protocol uses a central server to share files over the Internet.
False
The Internet Corporation of Assigned Names and Numbers (ICANN) manages domain names and IP addresses on the Internet.
The Internet Corporation of Assigned Names and Numbers (ICANN) manages domain names and IP addresses on the Internet.
Signup and view all the answers
WiFi uses the 802.11 protocol to connect devices to the Internet.
WiFi uses the 802.11 protocol to connect devices to the Internet.
Signup and view all the answers
The transmission media with the largest bandwidth is Coaxial Cable.
The transmission media with the largest bandwidth is Coaxial Cable.
Signup and view all the answers
A URL always has a scheme, domain name, and path.
A URL always has a scheme, domain name, and path.
Signup and view all the answers
Cloud storage refers to saving files to local servers located on a personal computer.
Cloud storage refers to saving files to local servers located on a personal computer.
Signup and view all the answers
Broadband is usually measured in KBPS.
Broadband is usually measured in KBPS.
Signup and view all the answers
Cloud computing is the practice of using a local server or a personal computer to store, manage, and process data.
Cloud computing is the practice of using a local server or a personal computer to store, manage, and process data.
Signup and view all the answers
Biometric authentication uses only facial recognition and iris scans.
Biometric authentication uses only facial recognition and iris scans.
Signup and view all the answers
A server is a standalone computer system that is not shared by multiple users.
A server is a standalone computer system that is not shared by multiple users.
Signup and view all the answers
Supercomputers are the least powerful type of computer.
Supercomputers are the least powerful type of computer.
Signup and view all the answers
The central processing unit (CPU) is the part of the computer that stores data.
The central processing unit (CPU) is the part of the computer that stores data.
Signup and view all the answers
RAM is a type of memory that uses mechanical moving parts.
RAM is a type of memory that uses mechanical moving parts.
Signup and view all the answers
A barcode scanner is an output device.
A barcode scanner is an output device.
Signup and view all the answers
Augmented reality is the integration of digital information with the user's environment in offline mode.
Augmented reality is the integration of digital information with the user's environment in offline mode.
Signup and view all the answers
A motherboard is a peripheral device that connects to a computer.
A motherboard is a peripheral device that connects to a computer.
Signup and view all the answers
Cloud computing provides on-demand services, broad network access, and resource pooling.
Cloud computing provides on-demand services, broad network access, and resource pooling.
Signup and view all the answers
EFT is used for transferring funds from one account to another using paper transactions.
EFT is used for transferring funds from one account to another using paper transactions.
Signup and view all the answers
Intellectual property includes only Trade secrets and Patents.
Intellectual property includes only Trade secrets and Patents.
Signup and view all the answers
B2C is a type of e-commerce where businesses interact with other businesses.
B2C is a type of e-commerce where businesses interact with other businesses.
Signup and view all the answers
Personal branding is the process of creating a unique virtual identity.
Personal branding is the process of creating a unique virtual identity.
Signup and view all the answers
A first-party cookie is created by a website other than the one you are currently visiting.
A first-party cookie is created by a website other than the one you are currently visiting.
Signup and view all the answers
A cyberattack is a deliberate misuse of computers and networks via the Internet.
A cyberattack is a deliberate misuse of computers and networks via the Internet.
Signup and view all the answers
A firewall software used to block a user's access to specific Internet content is called a NAT.
A firewall software used to block a user's access to specific Internet content is called a NAT.
Signup and view all the answers
A white hat hacker is a computer expert who attempts to break into a network to cause damage or steal data.
A white hat hacker is a computer expert who attempts to break into a network to cause damage or steal data.
Signup and view all the answers
A macro virus is a type of virus that affects computer hardware.
A macro virus is a type of virus that affects computer hardware.
Signup and view all the answers
A DDoS attack is a type of cybercrime where the attacker floods a server with internet traffic to provide users with faster access to online services and sites.
A DDoS attack is a type of cybercrime where the attacker floods a server with internet traffic to provide users with faster access to online services and sites.
Signup and view all the answers
Converting a task into commands that a computer can use to perform the task is a definition of programming.
Converting a task into commands that a computer can use to perform the task is a definition of programming.
Signup and view all the answers
Object-oriented analysis is used to identify the categories of inputs needed to solve a problem, and the input categories are called objects.
Object-oriented analysis is used to identify the categories of inputs needed to solve a problem, and the input categories are called objects.
Signup and view all the answers
The programming language C was developed in the early 1980s by Dennis M. Ritchie.
The programming language C was developed in the early 1980s by Dennis M. Ritchie.
Signup and view all the answers
HTML stands for HyperThread Markup Language.
HTML stands for HyperThread Markup Language.
Signup and view all the answers
A database that uses fields to create links between tables is called a hierarchical database.
A database that uses fields to create links between tables is called a hierarchical database.
Signup and view all the answers
The reliability and the accuracy of the information in a database is referred to as data mining.
The reliability and the accuracy of the information in a database is referred to as data mining.
Signup and view all the answers
Data analytics is used to answer questions such as 'what happened?' or 'what is occurring?' or 'what was the ROI?'.
Data analytics is used to answer questions such as 'what happened?' or 'what is occurring?' or 'what was the ROI?'.
Signup and view all the answers
Neural network layers include input, hidden, and output layers, and are a type of machine learning process called deep learning.
Neural network layers include input, hidden, and output layers, and are a type of machine learning process called deep learning.
Signup and view all the answers
SQL stands for Standard Query Language.
SQL stands for Standard Query Language.
Signup and view all the answers
Study Notes
Augmented Reality and Input Devices
- Augmented reality is the integration of digital information with the user's environment in real-time.
- Examples of input devices: Controller, Point-of-sale device, Barcode scanner.
Biometric and NFC
- Biometric refers to the use of human traits for identification, including fingerprints, eye retinas and irises, facial bone structure, palm prints, stride, typing patterns, and speech recognition.
- Near Field Communication (NFC) is a wireless technology with a short transmission range, used in new smartphones and other devices.
Computer Hardware
- Monitor resolution refers to the number of pixels a screen can display, with higher resolutions generally meaning better image quality.
- Computer hardware refers to the physical parts of a computer system, including the motherboard, which holds the computer's main microprocessor (Central Processing Unit).
- Examples of embedded computers: digital watches, which accept input, process data, provide output, and store data as part of a larger device or system.
Server and Processor
- A server is a computer system in a network shared by multiple users, also referred to as a host computer.
- Examples of servers: network, web, and file servers.
- Supercomputers are the most powerful type of computer, used to evaluate complex data quickly.
- The processor (Central Processing Unit) is the brain of the computer, where most calculations take place.
- Random Access Memory (RAM) is a type of memory found on the motherboard, which has no moving parts and is used to execute tasks.
Data Storage and File Sharing
- A bit is the basic unit of digital data storage, with 8 bits equal to 1 byte.
- Units of data storage: kilobyte (KB), megabyte (MB), gigabyte (GB), and terabyte (TB).
- Cloud storage refers to saving files to servers located on the Internet, with data stored in logical pools and managed by a data hosting company.
- Solid-state drives (SSDs) are all-electronic storage devices used in various digital devices.
- The BitTorrent protocol allows users to share large files over the Internet using a peer-to-peer structure.
Internet and Networking
- The Internet refers to all the networks around the world connected to each other using the Transmission Control Protocol/Internet Protocol (TCP/IP).
- Data is transferred over the Internet in small data groupings called packets.
- The Internet uses packet switching to transfer data and information between hosts, with addressing information and data included in each packet.
- The volume of data that can be carried on an Internet transmission media in a certain amount of time is called bandwidth.
- Broadband is a high-speed Internet connection that is always on, measured in megabits per second (MBPS).
Cloud Computing
- Cloud computing is the practice of using a network of remote servers hosted on the Internet to store, manage, and process data.
- 5 essentials of cloud computing: on-demand services, broad network access, resource pooling, rapid elasticity, and measured service.
- Benefits of cloud computing: cost reduction, disaster recovery, scalability, and flexibility.
- Cloud deployment models: private, hybrid, community, and public.
Internet Privacy and Security
- Internet privacy refers to the right of personal privacy concerning the storing, distributing, and displaying of information about oneself via the Internet.
- Intellectual property includes trademarks, trade secrets, and patents.
- Electronic Funds Transfer (EFT) is the technical term for electronic or online banking.
- Electronic Data Interchange (EDI) allows for the electronic communication of business-oriented transactions and information between people and organizations.
- Types of e-commerce: B2C (Business to Consumer), C2C (Consumer to Consumer), and B2B (Business to Business).
Cybercrime and Cybersecurity
- Cybercrime refers to a crime in which a computer is the object of the crime or is used to commit a criminal offense.
- Cybersecurity exploit: a tool or technique for taking advantage of a cybersecurity vulnerability to break into a system and cause harm.
- Types of cyberattacks: malware, viruses, trojan horses, and Distributed Denial-of-Service (DDoS) attacks.
- Cybersecurity measures: firewall software, internet filters, and Network Address Translation (NAT).
Computer Programming
- Converting a task into commands that a computer can use to perform the task is one definition of programming.
- Steps in the Programming Development Life Cycle (PDLC): define the problem, analyze the problem, create a plan or algorithm, write the code, test and debug the code, and maintain the code.
- Developed in the 1970s, the C programming language is the most popular programming language of all time.
- Common programming languages: Java, JavaScript, and HTML.
Data Analytics and AI
- A database is a collection of related data that can be sorted, logically organized, searched, and stored.
- A Database Management System (DBMS) maximizes the benefits a database can provide.
- Data hierarchy: single characters of data, organizing the data into fields, organizing the related fields into records, and the records making up a table.
- Data mining: a research and analysis technique that uses mathematical tools and artificial intelligence (AI) to search large volumes of data and discover less-obvious patterns and trends.
- Descriptive analytics: trying to answer questions such as "what happened?", "what is occurring?", or "what was the ROI?".
- Data Driven Decision Making (DDDM) builds a data-driven community, agility in analytics and data analysis, and data proficiency.
- Artificial Intelligence (AI): the study and application of processes that combine computer and data science to enable computer-assisted or automated problem-solving.
- AI bias: the variance that exists in the output provided by AI algorithms.
- Cognitive bias: conscious or unconscious errors in cognition that impact an individual's judgments, assumptions, and decision-making.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Description
This quiz covers various topics in computer science and technology, including augmented reality, input devices, biometric identification, and near field communication.