Programming & Lan.
Privacy, Security, Ethics
Comm and Networks
Mobile Phone
Variety
100

Translating an algorithm into a programming language is called ____

coding

100

_____ floods a computer with requests until it shuts down and refuses to answer any requests for information

A DOS attack

100

A network used to communicate among devices close to one person is called a ___

PAN

100

Text messaging is also called 

short messaging service (SMS)

100

Which transmission medium transmits data the fastest?

Fiber-optic cable

200

___ ____ Is the instructions programmers have written in a higher level language.

source code
200

Free computer games and free screen saver programs are typical carriers of ___ ____.

trojan horses.

200

__ is the short range radio communication standard that transmits data over short distances 

Bluetooth

200

Almost all cellphones are designed with a ___ port.

USB

200

Each record must have a unique field called a ___ ___ field 

Primary key

300

____ Is the process of translating a task into a series of commands that a computer will use to perform the task.

Programming

300

Data ____ means that the data contained in a database is accurate and reliable.

Integrity
300

A ____ is a device connected to a network such as a computer game or a game console.

node 

300

An Internet connectivity plan is also known as a ____ ____

data plan
300

Microwave communication uses high-frequency ____ ____

radio waves

400

The first generation language is ____ ____

machine language 

400

What is a fraudulent or deceptive act designed to trick individuals on the Internet into spending time or money for little or no return?

Internet scam

400

___ is a very well known free VoIP provider 

skype 
400

The operating system of a cell phone is stored in  ___

ROM

400

___ describes how a network is arranged and how resources are coordinated and shared.

network architecture 
500

The set of specific, sequential steps that describe exactly what a computer program must do to complete the work is called a(n) _____.

Algorithm

500

A(n) ___ ___ is a portion of the virus code that is unique to a particular computer virus.

virus signature 

500
A normal telephone cable is a type of _____.

twisted-pair cable

500

The main difference between the tablet and smart phone is the ___ ____.

screen size 

500

C++ and Java are all ___ -generation languages 

Third 

M
e
n
u