Uploaded by g.nolasco.luna

CSCI - midterm study guide

advertisement
CSCI – Study guide
Module 1
2. Computer - an electronic device for storing and processing data, typically in binary form,
according to instructions given to it in a variable program
Hardware- collection of physical parts of a computer system
User- person who utilizes a computer or network service
6. A server is a computer dedicated to providing one or more services to other computers or
devices on a network. The services a server provides are storing content and controlling access
to hardware, software, and other resources on a network.
13. Data is a group of unprocessed information while information is a group of data processed in
a meaningful way to the user. Data is an input and information is an output therefore
information is dependent on data. Some examples of data are numbers, videos, audio, and
images. Some examples of information is data that possess context, relevance,and purpose like a
cash receipt.
17. Memory is a component in your computer that allows for short term data access. Storage is
the component in your computer that allows for long term data access.
19. Cloud Storage: Internet service that provides remote storage to computer users. Types of
services offered by cloud storage include public, private, and hybrid services.
24. What is a browser? Describe the purpose of a search engine.
A browser is a software that enables users that have an internet connection to have access
to different webpages on a computer, mobile device, or other electronics. A search engine is
used to find specific information on a topic such as photos, music, videos, or text.
28. Define the term, malware. List ways you can protect yourself from malware.
Malware, short for malicious software, is software that acts without a user’s knowledge and
deliberately changes the computer or mobile device’s operations.
● Use virus protection software
● Use a firewall
● Be suspicious of all unsolicited email and text messages
● Disconnect your computer from the Internet
● Download software with caution
● Close spyware windows
● Before using any removable media, scan it for malware
● Keep current
● Back up regularly
30. Explain physical and behavioral health risks associated with using computers.
Technology addiction: when someone becomes obsessed with using technology.
Technology overload: individuals suffering from technology overload feel distressed when
deprived of computers and mobile devices.
33.define the term operating system. List popular operating systems for computer and mobile
devices.
An operating system (OS), in its most general sense, is software that allows a user to run
other applications
Computer- Microsoft, windows and Linux
Mobile- android and ios
37. Define the term, hotspot.
- Hotspot: wireless access point that is created by a dedicated hardware device or a
smartphone feature that shares the phone's cellular data
Module 2
8. An IP address stands for Internet Protocol address. It is the sequence of number that
uniquely identifies the locations the location of each computer or device connected to
the internet or any other network. The two IP addressing schemes are IPv4, and IPv6.
The difference between the IPv4 is it addresses in availability, this being due to the
growth of the Internet. On the other hand, the IPv6 scheme increases the available
number of IP addresses exponentially.
9. Domain name- is a text-based name that corresponds to the IP address of a server,
such as a web server that hosts a website.
Steps to run a domain name:
1. Run a browser.
2. Use a search engine to locate a domain name register and then navigate to the
website.
3. Check to see if the domain name is available that you wish for.
4. Choose how many years you would like to pay and keep the domain name for.
5. Then pay for your domain and services.
10. What is the purpose of TLDs? A TDL is defined as a top-level domain of an internet
address such as .org or .com. It states the corporation that owns it.
12. A DNS server is the way that the Internet holds the Domain Names and their IP
addresses. When you type in a website name, the DNS server changes the domain
name to the IP address so the command can be sent to the computer.
32. Define the term, e-commerce. Differentiate among B2C, C2C, and B2B e-commerce
a. E-commerce is a business transaction that occurs over an electronic network such as
the internet
b. B2C- business to customer; sale of goods or services to the general public
c. C2C- Customer to customer; when one consumer sells directly to another, such as an
online auction
d. B2B- Business to business; when businesses provide goods and services to other
businesses, such as online advertising, recruiting, credit, sales, market research,
technical support, and training
Module 3
3. Protection against malware infections - have strong passwords, log out of websites when
you’re done, carefully read emails, use firewalls
5. A processor, also called CPU (central processing unit), is the electronic component that
interprets and carries out the basic instructions that operate a computer. Memory consists
of electronic components that store instructions waiting to be executed and data needed
by those instructions.
12. You can purchase the appropriate desktop for your needs by considering
1. The specific software you need
2. Determine the operating system you are most comfortable with (MacOS, Windows)
3. Consider buying a more powerful desktop, because technology evolves quickly, and
the least powerful desktop may not fulfil your needs later on.
13. Describe the purpose and functions of server. Differentiate among rack, blade, and, tower
servers.
A server is a computer that is used to provide one or more services to a different computer or
device. A server rack is server that is in a slot on a metal frame which has different servers on
different slots. A blade is a single circuit blade which can hold many different blades. A tower is
a server that is built into a tower/ cabinet.
14. Define virtualization as it relates to serves. Define the terms, server farm and mainframe.
Virtualization is the act of sharing/ pooling computing resources. Server virtualization uses
software to enable a physical server which matches the hardware and computing capabilities of
a server. A server farm is several servers in one location. A mainframe is a large server that
handles multiple users at once.
15. Define the terms, terminal and thin client. List the advantages of a thin client.
A terminal is a computer that allows the user to send or receive information from a host or
server. A thin client has a limited amount of capabilities and run programs on the internet.
18.The main AWS blog,Werner Vogels' blog, Charles Babcock, David Linthicum.
Businesses use this to help them maximize their resources.
32. List products that contain embedded computers. List the disadvantages of in-vehicle
technology
a. Some products are consumer electronics (TV, mobile devices, DVD players),
home automation devices (lights security systems), automobiles (engine control
module, airbag controller), robotics and process controllers (power monitors,
medical devices), and computer devices and office machine (copy machines,
printers). The disadvantages to in-vehicle technology is that at any time, the
technology could fail.
33. Describe the trend, the Internet of Things
a. An environment where processors are embedded in every product imaginable,
and those things communicate with one another via the Internet. Examples are
alarm clocks, coffeemakers, vehicles, and refrigerators. An example, when your
refrigerator detects low milk, it sends your phone a text message that you need
to add milk to your grocery list
37. Define the term, backward compatible.
- It means they support older USB devices as well as newer ones.
42. List methods of securing against hardware theft and vandalism.
- Physical access control. Put the hardware in a safe place and secure it by locking the
place and protect the equipment.
- Real time location. System of tracking and identifying the location of high-risk or
high-value items.
- Install alarm systems. When someone breaks into the safe room at a time where he is
not allowed to and tries to steal or break hardware for example, the alarm will let the
security forces know.
- Use cables to lock computers to stationary objects. That way, it will not be easy to move
the computer.
- Install a mini security system. Same as the alarm system.
43. Define the terms, undervoltage and overvoltage, and explain how each can damage a
computer or data.
Undervoltage: occurs when the electrical supply or voltage drops often defined as more than
5%, below the normal volts; Can cause data loss but generally does not cause equipment
damage
Overvoltage(power surge):occurs when the incoming electrical supply or voltage increases,
often defined as more than 5%, above the normal volts.
- A momentary overvoltage, occurs when the increase in power lasts for less than one
millisecond. Uncontrollable disturbances such as lightning bolts can cause spikes.
Overvoltages can cause immediate and permanent damage to hardware.
44. Describe the purposes of surge protectors and UPS devices. Explain the purpose a
fault-tolerant computer.
Surge Protectors: uses electrical components to provide a stable current flow and minimize the
chances of an overvoltage reaching the computer and other electronic equipment.
UPS: device that contains surge protection circuits and one or more batteries that can provide
power during a temporary or permanent loss of power. UPS connects your computer and a
power source
Fault-tolerant computer: has duplicate components so that it can continue to operate when one
of its main components fails.
45. Identify the causes and types of repetitive strain injuries. List symptoms of CVS.
RSI: tendonitis and carpal tunnel syndrome
-from repeated or forceful bending of the wrist
CVS: condition that affects eyesight
-sore, tired, burning, itching or dry eyes
-blurred or double vision
-headache or sore neck
-Difficulty focusing on screen image
-color fringes/ after images when looking away
-increased sensitivity to light
Download