38
Jeopardy K201 – The Computer In Business Exam Review 2 Manjit Trehan

Jeopardy

Embed Size (px)

DESCRIPTION

Jeopardy. K201 – The Computer In Business Exam Review 2 Manjit Trehan. These are three Character Encoding Schemes. What are ASCII, EBCDIC, and Unicode?. This number representation system uses only two digits. What is Binary System?. - PowerPoint PPT Presentation

Citation preview

JeopardyK201 – The Computer In Business

Exam Review 2

Manjit Trehan

The System

Unit

Input And Output

Secondary Storage

Comm. And

Networks

Privacy And

Security

Databases

100 100 100 100 100 100

200 200 200 200 200 200

400 400 400 400 400 400

600 600 600 600 600 600

800 800 800 800 800 800

1000 1000 1000 1000 1000 1000

The System UnitAnswer:

Question:

Back

These are three Character Encoding Schemes.

What are ASCII, EBCDIC, and Unicode?

The System UnitAnswer:

Question:

Back

This number representation system uses only two digits.

What is Binary System?

The System UnitAnswer:

Question:

Back

This part of the CPU performs operations like ADD, MULTIPLY, COMPARE.

What is ALU (Arithmetic-Logic Unit)?

The System UnitAnswer:

Question:

Back

Memory used to improve processing by acting as a temporary high-speed holding area.

What is Cache?

The System UnitAnswer:

Question:

Back

This processor is designed to handle the requirements related to 3-D images.

What is a GPU (Graphics Processing Unit) or a Graphics Coprocessor?

The System UnitAnswer:

Question:

Back

These link the CPU to various other components on the system board.

What are bus lines?

Input And OutputAnswer:

Question:

Back

This is the most frequently used output device.

What is a monitor?

Input And OutputAnswer:

Question:

Back

Property that indicates the number of pixel columns and the number of pixel rows that a display device has.

What is resolution?

Input And OutputAnswer:

Question:

Back

This is the distance between pixels on a display device.

What is dot pitch?

Input And OutputAnswer:

Question:

Back

This type of a monitor activates each pixel independently without scanning down the screen.

What is an Active-matrix monitor?

Input And OutputAnswer:

Question:

Back

Printer resolution is not measured in total number of dots on a page, instead we use this to measure this capability.

What is DPI (Dots Per Inch)?

Input And OutputAnswer:

Question:

Back

This type of a device combines the capabilities of a scanner, printer, fax, and copy machine.

What is a Multifunctional device (MFD)?

Secondary StorageAnswer:

Question:

Back

This is what happens when the read/write head of a hard-disk makes contact with the disk’s surface.

What is a head-crash?

Secondary StorageAnswer:

Question:

Back

An enhancement that improves hard-disk performance by anticipating data needs.

What is Disk caching?

Secondary StorageAnswer:

Question:

Back

Storage devices that have no moving parts and function somewhat like memory are known as this.

What is Solid-state storage?

Secondary StorageAnswer:

Question:

Back

In optical storage, a laser beam detects these flat and bumpy areas on the storage medium.

What are lands and pits?

Secondary StorageAnswer:

Question:

Back

This type of CDs can be erased and reused multiple times.

What are CD-RWs?

Secondary StorageAnswer:

Question:

Back

These are virtual storage devices on the Web .

What are Internet Hard Drives?

Communications And NetworksAnswer:

Question:

Back

These cables consist of pairs of copper wires that are twisted together.

What are Twisted-pair cables?

Communications And NetworksAnswer:

Question:

Back

The process of converting from digital to analog signal used by a modem.

What is Modulation?

Communications And NetworksAnswer:

Question:

Back

A measurement of the width or capacity of a communication channel.

What is Bandwidth?

Communications And NetworksAnswer:

Question:

Back

Also known as low bandwidth, it is used for standard telephone communication.

What is Voiceband?

Communications And NetworksAnswer:

Question:

Back

For years, these special high speed lines have been leased by large corporations for all digital communications.

What are T1 and T3?

Communications And NetworksAnswer:

Question:

Back

This is the standard protocol for the Internet.

What is TCP/IP?

Privacy And SecurityAnswer:

Question:

Back

These are standards of moral conduct.

What are Ethics?

Privacy And SecurityAnswer:

Question:

Back

Files deposited on your hard disk from websites for monitoring web activities.

What are Cookies?

Privacy And SecurityAnswer:

Question:

Back

Malicious programs that attach themselves to various programs and databases.

What are Viruses?

Privacy And SecurityAnswer:

Question:

Back

A malicious program that does not attach itself to programs, but instead fills a computer system with self-replicating information.

What is a Worm?

Privacy And SecurityAnswer:

Question:

Back

This attempts to trick Internet users into thinking that a fake but official looking site is legitimate.

What is Phishing?

Privacy And SecurityAnswer:

Question:

Back

Using devices such as fingerprint and iris scanners for verifying a user’s identity.

What is Biometric scanning?

DatabasesAnswer:

Question:

Back

A collection of attributes such as name, and address that describe an entity.

What is a Record

DatabasesAnswer:

Question:

Back

A field that uniquely identifies records in a database table.

What is the Primary Key?

DatabasesAnswer:

Question:

Back

Programming language used for maintaining and analyzing data.

What is Structured Query Language (SQL)?

DatabasesAnswer:

Question:

Back

This type of a database uses tables to store data with some common information among tables.

What is Relational Database?

DatabasesAnswer:

Question:

Back

Searching data warehouses to look for related information and patterns.

What is Data mining?

DatabasesAnswer:

Question:

Back

This type of database stores information in several locations to make it accessible through the network.

What is a Distributed database?