Description
CSIS 110 Midterm Exam
- The __________ of a disk is the time for the beginning of the desired sector to rotate under the read/write
- Some companies now send users a temporary code or password to a trusted device after they have logged in with a valid username and password through a process known as __________.
- A(n) __________ is an algorithmic operation that carries out a single numeric computation and stores the
- A program written in assembly language is called the __________ program.
- If a computer has a maximum of 2 N memory cells, then each address field in a machine language instruction must be __________ bits wide to enable us to address every cell.
- A __________ is the repetition of a block of
- The __________ are the devices that allow a computer system to communicate and interact with the outside world as well as store information.
- Using the leftmost bit of a number to represent the sign, with 0 meaning positive and 1 meaning negative is termed __________ notation.
- In __________ computer science, researchers study the logical and mathematical properties of problems and their solutions.
- In the commercial and office environment, the most widely used broadband technology is __________ .
- A __________ uses the same wires that carry regular telephone signals into your
- The __________ operation complements the value of a Boolean
- The acronym __________ is frequently used to refer to the memory unit of a
- In 1614, John Napier invented __________ as a way to simplify difficult mathematical
- __________ are systems that create communities of users who share common interests and activities and which provide multiple methods of online interaction.
- The __________ is the number of bits used to encode each
- An algorithm is a __________ collection of unambiguous and effectively computable operations that, when executed, produces a result and halts in a finite amount of
- A __________ is an integer greater than 1 that can only be written as the product of itself and
- Translators for __________ are called
- __________ is a general term applied to any use of computers and networking to support the paperless exchange of goods, information, and services in the commercial
- The conversion of symbolic op codes such as LOAD, ADD, and SUBTRACT to binary makes use of a structure called the __________.
- A __________ cipher, also called a shift cipher, involves shifting each character in the message to another character some fixed distance farther along in the
- During the __________ generation of computing, the desktop machine shrunk to the size of a
- A(n) __________ is a set of independent computer systems connected by telecommunication links for the purpose of sharing information and resources.
- Integrated circuits, built on silicon chips, were introduced during the __________ generation of computing.
- The voice-oriented dial-up telephone network was originally a(n) __________ medium.
- The __________ revolution enabled us to implement algorithms that automated the drudgery of repetitive mental tasks.
- The __________ of a disk is the time needed to position the read/write head over the correct track.
- __________ verifies who has the right to gain access to the computer, whether it is your local machine or the web
- A machine language program is called the __________ program.
- A __________ connects hardware devices such as computers, printers, and storage devices that are all in close
- To solve the problem of two users having the same password, some operating systems keep a third entry for each user in the password file, namely, __________ at which the user created the
- A __________ contains massive amounts of information that can be electronically searched for specific facts or documents.
- Icons displayed on the screen are selected with a mouse and a button using a technique called __________.
- __________ is the term for the separation of a service from the entity (or entities) providing that
- To try all possible passwords of length k or less would require __________ attempts.
- __________ is a collection of documents interconnected by
- Examples of control operations would be __________ and __________.
- C++ and Java are examples of __________ languages.
- The total number of __________ per second is called
- A(n) __________ operation involves the comparison of values and the subsequent use of the outcome to decide what to do
- Cluster computing is an example of __________ parallel
- There are 2 30 bytes in a __________.
- The __________ hides from the user the messy details of the underlying
- One of the most widely used standards for wireless local access is called __________.
- The __________ takes the password the user originally chooses, chops it up, and stirs it around according to a given
- The __________ holds the address of the next instruction to be
- The first line of defense against illicit use of, or threats to, computer resources and sensitive information is a strong authentication and __________ process.
- It is the task of the __________ to fetch and execute
- A(n) __________ handles the details of input/output and compensates for any speed differences between I/O devices and other parts of the computer.