quiz image

Computer Hardware and Input Devices

FamedBohrium avatar
FamedBohrium
·
·
Download

Start Quiz

Study Flashcards

Questions and Answers

What is the term for the integration of digital information with the user's environment in real time?

Augmented Reality

Which of the following devices uses human traits for identification?

Biometric device

What is the purpose of a server in a network?

To share resources among multiple users

What is the primary function of a processor or central processing unit (CPU)?

<p>To perform calculations</p> Signup and view all the answers

What is the term for a type of memory found on the motherboard of a digital device?

<p>RAM (Random Access Memory)</p> Signup and view all the answers

What is an embedded computer?

<p>A digital device that is part of a larger system</p> Signup and view all the answers

What is the term for a wireless technology with a short transmission range?

<p>NFC (Near Field Communication)</p> Signup and view all the answers

What is the term for the number of pixels a screen can display?

<p>Monitor resolution</p> Signup and view all the answers

What is the basic unit of digital data storage?

<p>Bit</p> Signup and view all the answers

What is the purpose of a URL?

<p>To identify a website</p> Signup and view all the answers

What is the primary function of a router?

<p>To transfer data between networks</p> Signup and view all the answers

What is the main difference between a kilobyte and a byte?

<p>A kilobyte is a multiple of a byte</p> Signup and view all the answers

What is the term for saving files to servers located on the Internet?

<p>Cloud storage</p> Signup and view all the answers

What is the BitTorrent protocol used for?

<p>Sharing files over the Internet</p> Signup and view all the answers

What is the purpose of an ISP?

<p>To provide internet access</p> Signup and view all the answers

What is the transmission media with the largest bandwidth?

<p>Fiber-optic cable</p> Signup and view all the answers

What is packet switching used for?

<p>Transferring data over the Internet</p> Signup and view all the answers

What is the term for the practice of using a network of remote servers to store, manage, and process data?

<p>Cloud computing</p> Signup and view all the answers

What is the main purpose of data analytics?

<p>To uncover trends and correlations in data</p> Signup and view all the answers

What are the main building blocks of simple neural networks?

<p>Interconnected artificial neurons</p> Signup and view all the answers

What is the study and application of processes that combine computer and data science to enable computer-assisted or automated problem-solving?

<p>Artificial intelligence</p> Signup and view all the answers

What is referred to as the variance that exists in the output provided by AI algorithms?

<p>AI bias</p> Signup and view all the answers

What includes conscious or unconscious errors in cognition that impact an individual's judgments, assumptions, and decision making?

<p>Cognitive bias</p> Signup and view all the answers

What is a mathematical framework that can be used to analyze how much an algorithm recalls data and information about individuals?

<p>Differential privacy</p> Signup and view all the answers

What is the primary purpose of a MAC address?

<p>To identify a device on a network</p> Signup and view all the answers

What is the term for the process of making electronic payments from one account to another?

<p>Electronic Funds Transfer (EFT)</p> Signup and view all the answers

What type of cookie is stored on a user's hard drive and collects information about user preferences?

<p>Persistent cookie</p> Signup and view all the answers

What is the term for the deliberate misuse of computers and networks via the Internet?

<p>Cybercrime</p> Signup and view all the answers

What is the primary function of a firewall software?

<p>To block a user's access to specific Internet content</p> Signup and view all the answers

What is the term for a computer that has been taken over by a hacker?

<p>Zombie</p> Signup and view all the answers

What is the term for a program that appears legitimate but executes an unwanted activity?

<p>Trojan horse virus</p> Signup and view all the answers

What is the term for the right of personal privacy concerning the storing and displaying of information online?

<p>Internet Privacy</p> Signup and view all the answers

What is the term for the technology that provides a type of firewall protection by hiding internal IP addresses?

<p>NAT (Network Address Translation)</p> Signup and view all the answers

What is the term for a type of spyware that records all actions typed on a keyboard?

<p>Keystroke logger</p> Signup and view all the answers

What is a macro virus?

<p>A virus written in a specific language and placed within a document or spreadsheet</p> Signup and view all the answers

What is the primary goal of a DDoS attack?

<p>To flood a server with internet traffic to prevent users from accessing connected online services and sites</p> Signup and view all the answers

What is the next step in the PDLC after the problem has been clearly defined?

<p>Creating the plan or algorithm</p> Signup and view all the answers

What is the term for the level of complexity of a programming language?

<p>Generation</p> Signup and view all the answers

What is the purpose of a DBMS?

<p>To maximize the benefits a database can provide</p> Signup and view all the answers

What is the term for the organization of data from single characters to fields, records, and tables?

<p>Data hierarchy</p> Signup and view all the answers

What is the term for the reliability and accuracy of the information in a database?

<p>Data integrity</p> Signup and view all the answers

What is the purpose of creating a query in a database?

<p>To search a database for information</p> Signup and view all the answers

What is data mining best described as?

<p>A research and analysis technique to search large volumes of data and discover less-obvious patterns and trends</p> Signup and view all the answers

What is the primary role of descriptive analytics?

<p>To answer questions such as 'what happened?' or 'what is occurring?'</p> Signup and view all the answers

What is the primary function of a computer's microprocessor?

<p>To process data into information</p> Signup and view all the answers

Which type of computer is designed to evaluate complex data very quickly?

<p>Supercomputer</p> Signup and view all the answers

What is the term for the physical parts of a computer system?

<p>Computer hardware</p> Signup and view all the answers

What is the purpose of RAM in a digital device?

<p>To provide temporary storage for data</p> Signup and view all the answers

What is the term for a wireless technology with a short transmission range?

<p>NFC (Near Field Communication)</p> Signup and view all the answers

What is the term for a digital device that accepts input, processes data, provides output, and can store data?

<p>Embedded computer</p> Signup and view all the answers

What is the term for the number of pixels a screen can display?

<p>Monitor resolution</p> Signup and view all the answers

What is the term for a type of server that is shared by multiple users?

<p>Host computer</p> Signup and view all the answers

What is the primary goal of data analytics?

<p>To uncover trends and correlations in raw data</p> Signup and view all the answers

What are the main building blocks of simple neural networks?

<p>Input, hidden, and output layers</p> Signup and view all the answers

What is the study and application of processes that combine computer and data science to enable computer-assisted or automated problem-solving?

<p>Artificial Intelligence (AI)</p> Signup and view all the answers

What is referred to as the variance that exists in the output provided by AI algorithms?

<p>AI bias</p> Signup and view all the answers

What includes conscious or unconscious errors in cognition that impact an individual's judgments, assumptions, and decision making?

<p>Cognitive bias</p> Signup and view all the answers

What is a mathematical framework that can be used to analyze how much an algorithm recalls data and information about individuals?

<p>Differential privacy</p> Signup and view all the answers

What is the primary unit of digital data storage in many computer architectures?

<p>Byte</p> Signup and view all the answers

What is the purpose of a router in a network?

<p>To transfer data from one network to another</p> Signup and view all the answers

What is the term for a high-speed Internet connection that is always on?

<p>Broadband</p> Signup and view all the answers

What is the term for the practice of using a network of remote servers to store, manage, and process data?

<p>Cloud Computing</p> Signup and view all the answers

What is the term for the number of bytes that can be carried on an Internet transmission media in a given amount of time?

<p>Bandwidth</p> Signup and view all the answers

What is the term for a device that allows several computers to use a single Internet connection?

<p>Switch</p> Signup and view all the answers

What is the term for the communication technology that uses short-wavelength radio waves to transfer data?

<p>Bluetooth</p> Signup and view all the answers

What is the term for the entity that manages domain names and IP addresses on the Internet?

<p>ICANN</p> Signup and view all the answers

What is the term for the type of storage device that uses integrated circuits to store data?

<p>Solid-State Drive</p> Signup and view all the answers

What is the term for the process of accessing a file on the Internet and then copying it onto your computer?

<p>Downloading</p> Signup and view all the answers

What is a virus written in a specific language and placed within a document or spreadsheet called?

<p>Macro virus</p> Signup and view all the answers

What is the primary goal of a DDoS attack?

<p>To prevent users from accessing connected online services and sites</p> Signup and view all the answers

What is the next step in the PDLC after the problem has been clearly defined?

<p>Create the plan or algorithm</p> Signup and view all the answers

What is the term for the level of complexity of a programming language?

<p>Generation</p> Signup and view all the answers

What is the purpose of a DBMS?

<p>To maximize the benefits a database can provide</p> Signup and view all the answers

What is the term for the organization of data from single characters to fields, records, and tables?

<p>Data hierarchy</p> Signup and view all the answers

What is the term for the reliability and accuracy of the information in a database?

<p>Data integrity</p> Signup and view all the answers

What is the purpose of creating a query in a database?

<p>To search a database for information</p> Signup and view all the answers

What is data mining best described as?

<p>A research and analysis technique</p> Signup and view all the answers

What is the role of descriptive analytics?

<p>To answer questions such as “what happened?” or “what is occurring?”</p> Signup and view all the answers

What is the primary characteristic of a public cloud deployment model?

<p>It is open to the general public and can be accessed by anyone</p> Signup and view all the answers

What is the primary purpose of a MAC address?

<p>To identify a device on a network</p> Signup and view all the answers

What is electronic funds transfer (EFT) used for?

<p>To transfer funds from one account to another</p> Signup and view all the answers

What is the primary concern of intellectual property?

<p>Trademarks, Trade secrets, and Patents</p> Signup and view all the answers

What is the term for the right of personal privacy concerning the storing and displaying of information online?

<p>Internet privacy</p> Signup and view all the answers

What is a type of spyware that records all actions typed on a keyboard?

<p>Keystroke logger</p> Signup and view all the answers

What is the primary purpose of a firewall software?

<p>To block a user's access to specific internet content</p> Signup and view all the answers

What is the term for a computer that has been taken over by a hacker?

<p>Zombie</p> Signup and view all the answers

What is the primary purpose of a third-party cookie?

<p>To track a user's surfing habits</p> Signup and view all the answers

What is the term for the deliberate misuse of computers and networks via the internet?

<p>Cybercrime</p> Signup and view all the answers

Study Notes

Computer Input

  • Augmented reality (AR) integrates digital information with the user's environment in real-time
  • Input devices include:
    • Controller
    • Point-of-sale device
    • Biometric devices (using human traits for identification, e.g., fingerprints, eye retinas, facial bone structure)

Computer Hardware

  • Refers to the physical parts of a computer system
  • Motherboard: the circuit board that holds the computer's main microprocessor (central processing unit)
  • Embedded computer: a digital device that accepts input, processes data, provides output, and can store data, but is part of a larger device or system (e.g., digital watches)
  • Server: a computer system shared by multiple users, also referred to as host computers
  • Supercomputer: the most powerful type of computer, used for complex calculations
  • Processor/CPU: the brain of the computer, where calculations take place
  • RAM (Random Access Memory): a type of memory found on the motherboard, electronic with no moving parts
  • Universal Serial Bus (USB): an interface enabling communication between digital devices
  • Bluetooth: a short-distance wireless communication technology using short-wavelength radio waves

Computer Storage

  • Bit: the basic unit of digital data storage
  • Byte: a unit of digital information consisting of 8 bits
  • Kilobyte (KB): a unit of storage consisting of approximately 1,000 bytes
  • Megabyte (MB): a unit of storage consisting of approximately 1,000 kilobytes
  • Gigabyte (GB): a unit of storage consisting of approximately one billion bytes
  • Terabyte (TB): a unit of digital data consisting of approximately one trillion bytes
  • Cloud storage: saving files to servers located on the Internet
  • Solid-state drives (SSDs): all-electronic storage devices used in various digital devices

Network, Internet, and Cloud

  • BitTorrent protocol: allows users to share large files over the Internet
  • Wi-Fi: uses the 802.11 protocol to connect devices to a Wi-Fi network
  • Internet: a global network of interconnected computers and servers
  • Packet switching: the Internet's method of transferring data in small packets
  • Bandwidth: the volume of data that can be carried on an Internet transmission medium
  • Broadband: a high-speed Internet connection always on
  • Cloud computing: using a network of remote servers to store, manage, and process data
  • MAC (Media Access Control) address: a unique 12-character alphanumeric identifier for a device on a network

Online Services

  • E-commerce: electronic commerce, including B2C, C2C, and B2B
  • Electronic funds transfer (EFT): transferring funds electronically
  • Electronic data interchange (EDI): electronically communicating business transactions and information
  • Personal branding: identifying and expressing unique traits and values online
  • Metaverse: highly immersive Internet experiences, often involving virtual or augmented reality

Cybersecurity

  • Cybercrime: a crime in which a computer is the object or tool used to commit a criminal offense
  • Cyberattack: a deliberate misuse of computers and networks via the Internet
  • Cybersecurity exploit: a tool or technique for taking advantage of a vulnerability to break into a system
  • Firewall: a software or hardware barrier that controls incoming and outgoing network traffic
  • White hat hacker: a security expert who attempts to hack into a network to ensure its protection
  • Trojan horse virus: a program that appears legitimate but executes an unwanted activity
  • Distributed Denial-of-Service (DDoS) attack: flooding a server with Internet traffic to prevent access

Computer Programming

  • Programming: converting a task into commands a computer can use to perform the task
  • Algorithm: a step-by-step procedure for solving a problem
  • Flowchart: a visual representation of an algorithm
  • Object-oriented analysis: identifying input categories and creating classes and objects
  • C programming language: a popular language developed in the 1970s
  • HTML (Hypertext Markup Language): a standard markup language for displaying content on the web

Databases

  • Database Management System (DBMS): a system that maximizes the benefits of a database
  • Data hierarchy: organizing data into fields, records, and tables
  • Relational database: a database using fields to create links between tables
  • Data integrity: the reliability and accuracy of information in a database
  • Data mining: using mathematical tools and artificial intelligence to discover patterns and trends in large datasets

Computer Input

  • Augmented reality (AR) integrates digital information with the user's environment in real-time
  • Input devices include:
    • Controller
    • Point-of-sale device
    • Biometric devices (using human traits for identification, e.g., fingerprints, eye retinas, facial bone structure)

Computer Hardware

  • Refers to the physical parts of a computer system
  • Motherboard: the circuit board that holds the computer's main microprocessor (central processing unit)
  • Embedded computer: a digital device that accepts input, processes data, provides output, and can store data, but is part of a larger device or system (e.g., digital watches)
  • Server: a computer system shared by multiple users, also referred to as host computers
  • Supercomputer: the most powerful type of computer, used for complex calculations
  • Processor/CPU: the brain of the computer, where calculations take place
  • RAM (Random Access Memory): a type of memory found on the motherboard, electronic with no moving parts
  • Universal Serial Bus (USB): an interface enabling communication between digital devices
  • Bluetooth: a short-distance wireless communication technology using short-wavelength radio waves

Computer Storage

  • Bit: the basic unit of digital data storage
  • Byte: a unit of digital information consisting of 8 bits
  • Kilobyte (KB): a unit of storage consisting of approximately 1,000 bytes
  • Megabyte (MB): a unit of storage consisting of approximately 1,000 kilobytes
  • Gigabyte (GB): a unit of storage consisting of approximately one billion bytes
  • Terabyte (TB): a unit of digital data consisting of approximately one trillion bytes
  • Cloud storage: saving files to servers located on the Internet
  • Solid-state drives (SSDs): all-electronic storage devices used in various digital devices

Network, Internet, and Cloud

  • BitTorrent protocol: allows users to share large files over the Internet
  • Wi-Fi: uses the 802.11 protocol to connect devices to a Wi-Fi network
  • Internet: a global network of interconnected computers and servers
  • Packet switching: the Internet's method of transferring data in small packets
  • Bandwidth: the volume of data that can be carried on an Internet transmission medium
  • Broadband: a high-speed Internet connection always on
  • Cloud computing: using a network of remote servers to store, manage, and process data
  • MAC (Media Access Control) address: a unique 12-character alphanumeric identifier for a device on a network

Online Services

  • E-commerce: electronic commerce, including B2C, C2C, and B2B
  • Electronic funds transfer (EFT): transferring funds electronically
  • Electronic data interchange (EDI): electronically communicating business transactions and information
  • Personal branding: identifying and expressing unique traits and values online
  • Metaverse: highly immersive Internet experiences, often involving virtual or augmented reality

Cybersecurity

  • Cybercrime: a crime in which a computer is the object or tool used to commit a criminal offense
  • Cyberattack: a deliberate misuse of computers and networks via the Internet
  • Cybersecurity exploit: a tool or technique for taking advantage of a vulnerability to break into a system
  • Firewall: a software or hardware barrier that controls incoming and outgoing network traffic
  • White hat hacker: a security expert who attempts to hack into a network to ensure its protection
  • Trojan horse virus: a program that appears legitimate but executes an unwanted activity
  • Distributed Denial-of-Service (DDoS) attack: flooding a server with Internet traffic to prevent access

Computer Programming

  • Programming: converting a task into commands a computer can use to perform the task
  • Algorithm: a step-by-step procedure for solving a problem
  • Flowchart: a visual representation of an algorithm
  • Object-oriented analysis: identifying input categories and creating classes and objects
  • C programming language: a popular language developed in the 1970s
  • HTML (Hypertext Markup Language): a standard markup language for displaying content on the web

Databases

  • Database Management System (DBMS): a system that maximizes the benefits of a database
  • Data hierarchy: organizing data into fields, records, and tables
  • Relational database: a database using fields to create links between tables
  • Data integrity: the reliability and accuracy of information in a database
  • Data mining: using mathematical tools and artificial intelligence to discover patterns and trends in large datasets

Studying That Suits You

Use AI to generate personalized quizzes and flashcards to suit your learning preferences.

Quiz Team

More Quizzes Like This

Computer Hardware: Input Devices
5 questions
 Μάθημα Υπολογιστών Chapter 5
16 questions
Computer Hardware Input Devices
10 questions
How Computers Work
10 questions
Use Quizgecko on...
Browser
Browser