What is the binary number system?
A system used by computers, consisting of 0s and 1s
Under what category of programs and apps do databases and enterprise computing fall?
productivity
Which computer component stores data and programs that the CPU is currently using?
RAM
What is the process of converting data that is readable by humans into encoded characters.
encryption
A(n) ______ is an item that contains data, as well as the actions that read or process the data.
Object
What is stored in a functional computer's read-only memory (ROM)?
boot loader
Name three Operating Systems?
WINDOW, Linux, UNIX, Andriod, Mac OS, IOS
What happens if your computer or mobile device uses up its available RAM?
The operating system may use virtual memory
The Internet has its roots in a networking project started by an agency of the U.S. Department of Defense.
arpanet
Name two recommended safe browsing techniques
Turn off location sharing, Enable a pop-up blocker, erase your browsing history, never store passwords
Name two OOP programming languages
C++, JAVA, Python, JavaScript
A gigabyte is equal to approximately a _____ characters.
billion
What type of software assesses and reports information about various computer resources and devices.
performance monitor
what is the decimal equivalent of the binary 1101?
13
Which data transport protocol includes robust error checking?
TCP
What is a program or set of instructions that allows user to bypass security controls when accessing a program, computer, or network?
back door
During which phase of system development would you acquire any necessary hardware and software?
Design
Name three factors that can affect microprocessor's performance.
Number of cores, clock speed, cache, instruction set, architecture, bus speed and bandwidth
What best describes open source software?
Provided for use, modification, and redistribution.
What kind of error is a syntax error?
An error that occurs when the code violates the rules of the programming language.
What networking technology enables devices to communicate and share data over a wired local area network (LAN).
ethernet
Name three recommended practice for enhancing computer security?
not downloading and installing software from unverified sources, Keeping your operating system and software up to date, not using the same password for all your online accounts, strong passwords, using antivirus/firewall
What is the output of the variable z of the following Python code snippet?
x =12
y = 11
z = x * y - 5
127
What are the essential characteristics that define a computer?
Central Processing Unit (CPU), memory, input/output devices, and software
Describe the difference between analog and digital
Analog are continuous waves and digital is discrete off/on, 0/1
Why use the IF function in Excel?
The IF function in Excel is used to perform logical tests and return one value for a TRUE result and another for a FALSE result.
Which topology offers the greatest number of possible paths from one node to another?
full mesh
Name three ways to stay safe from malware
disconnect from internet, use a firewall, don't click on links, never click OK in a pop-up spyware window, be cautious of using public wi-fi
The output of the code below is (what is the final value of sum ):
i = 0
sum = 1
while i < 2:
sum = sum + i
i = i + 1
print(sum)
2