Is the ROM readable, writeable, or both?
Readable only.
1 Byte = ___ bits.
8
List a secondary memory storage device.
Hard drive, CD, USB, floppy disk, ect
What's the worlds largest WAN?
The internet!
What does the OSI model stand for?
Open Systems Interconnection model.
What is the primary function of the ALU?
Performs all the basic arithmetic, logical, and input/output operations.
List two differences between primary memory and secondary memory.
Volatility, speed, storage.
What's another word for a set of software that controls the computer hardware resources and provides services for computer programs?
An operating system.
What's the difference between a client and a server?
A client sends request, a server deals with them.
What are protocols?
The rules of communication.
List the main parts of the CPU.
CU: Control Unit
MAR: Memory Address Register
MDR: Memory Data Register
ALU: Arithmetic Logic Unit
Why is the RAM empty when the computer starts?
Because it is volatile.
What is the difference between a GLI and a CLI?
One is graphical and allows for user interaction with a mouse or pointer, the other is command like only and uses direct input by the user.
What are some differences between LAN and WLAN networks?
1) They use different transmission mediums
2) LAN is faster
3) Lan is safer
4) WLAN is more flexible
Which layer does IP belong to?
Network.
What's the difference between the memory address bus and the data bus?
Memory address bus is how the MAR communicates with the primary memory.
Data bus is how the RAM and the MDR connect.
A small amount of SRAM placed between the main RAM and the processor is also known as a _______?
Cache.
What is the definition of a pixel?
The smallest controllable element in a display or image.
What type of network is decentralized?
Peer-2-Peer Networks.
List one of the secure VPN technologies.
1) Internet Protocol Security Protocol (IPSec)
2) Secure Sockets Layer (SSL)
3) Transport Layer Security (TLS)
List the 4 steps in the machine instruction cycle.
1. Fetch
2. Decode
3. Executor
4. Store
Describe the process of virtual memory.
When primary memory fills up the non-volatile, high-capacity secondary storage is used to handle any overflow to keep all applications running concurrently.
Why is the Unicode character-encoding scheme needed?
To deal with non-Latin languages, such as Arabic.
What must all data traveling through a VPN always be?
Encrypted.
Name five of the seven layers in the OSI model.
Physical, datalink, network, transport, session, presentation, application.