1 / 38

Jeopardy

Jeopardy. K201 – The Computer In Business Exam Review 2 Manjit Trehan. These are three Character Encoding Schemes. What are ASCII, EBCDIC, and Unicode?. This number representation system uses only two digits. What is Binary System?.

Download Presentation

Jeopardy

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Jeopardy K201 – The Computer In Business Exam Review 2 Manjit Trehan

  2. These are three Character Encoding Schemes. • What are ASCII, EBCDIC, and Unicode?

  3. This number representation system uses only two digits. • What is Binary System?

  4. This part of the CPU performs operations like ADD, MULTIPLY, COMPARE. • What is ALU (Arithmetic-Logic Unit)?

  5. Memory used to improve processing by acting as a temporary high-speed holding area. • What is Cache?

  6. This processor is designed to handle the requirements related to 3-D images. • What is a GPU (Graphics Processing Unit) or a Graphics Coprocessor?

  7. These link the CPU to various other components on the system board. • What are bus lines?

  8. This is the most frequently used output device. • What is a monitor?

  9. Property that indicates the number of pixel columns and the number of pixel rows that a display device has. • What is resolution?

  10. This is the distance between pixels on a display device. • What is dot pitch?

  11. This type of a monitor activates each pixel independently without scanning down the screen. • What is an Active-matrix monitor?

  12. Printer resolution is not measured in total number of dots on a page, instead we use this to measure this capability. • What is DPI (Dots Per Inch)?

  13. This type of a device combines the capabilities of a scanner, printer, fax, and copy machine. • What is a Multifunctional device (MFD)?

  14. This is what happens when the read/write head of a hard-disk makes contact with the disk’s surface. • What is a head-crash?

  15. An enhancement that improves hard-disk performance by anticipating data needs. • What is Disk caching?

  16. Storage devices that have no moving parts and function somewhat like memory are known as this. • What is Solid-state storage?

  17. In optical storage, a laser beam detects these flat and bumpy areas on the storage medium. • What are lands and pits?

  18. This type of CDs can be erased and reused multiple times. • What are CD-RWs?

  19. These are virtual storage devices on the Web . • What are Internet Hard Drives?

  20. These cables consist of pairs of copper wires that are twisted together. • What are Twisted-pair cables?

  21. The process of converting from digital to analog signal used by a modem. • What is Modulation?

  22. A measurement of the width or capacity of a communication channel. • What is Bandwidth?

  23. Also known as low bandwidth, it is used for standard telephone communication. • What is Voiceband?

  24. For years, these special high speed lines have been leased by large corporations for all digital communications. • What are T1 and T3?

  25. This is the standard protocol for the Internet. • What is TCP/IP?

  26. These are standards of moral conduct. • What are Ethics?

  27. Files deposited on your hard disk from websites for monitoring web activities. • What are Cookies?

  28. Malicious programs that attach themselves to various programs and databases. • What are Viruses?

  29. A malicious program that does not attach itself to programs, but instead fills a computer system with self-replicating information. • What is a Worm?

  30. This attempts to trick Internet users into thinking that a fake but official looking site is legitimate. • What is Phishing?

  31. Using devices such as fingerprint and iris scanners for verifying a user’s identity. • What is Biometric scanning?

  32. A collection of attributes such as name, and address that describe an entity. • What is a Record

  33. A field that uniquely identifies records in a database table. • What is the Primary Key?

  34. Programming language used for maintaining and analyzing data. • What is Structured Query Language (SQL)?

  35. This type of a database uses tables to store data with some common information among tables. • What is Relational Database?

  36. Searching data warehouses to look for related information and patterns. • What is Data mining?

  37. This type of database stores information in several locations to make it accessible through the network. • What is a Distributed database?

More Related