Midterm Flashcards

1
Q

What is “Phishing” also known as?

A

A special category of spam specifically created to defraud or commit identity theft.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

Which RAID level uses Disk mirroring without parity?

A

RAID 1

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Which of the following is the fastest dynamic memory?
50 nanosecond
60 nanosecond
70 nanosecond
80 nanosecond

A

50 nanosecond

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

My laptop has 16 GB of RAM. What type of RAM am I using for my laptop?
Static RAM
Dynamic RAM
BIOS RAM
None of the above

A

Dynamic RAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

The first sector of a hard drive is
MBR (Master Boot Record)
NTFS (New Technology File System)
Ext4 (Extended 4)
FAT32 (File Allocation Table 32)

A

MBR (Master Boot Record)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

What is a Swap partition in the Windows or Linux OS?

A

It is part of the hard drive that works like memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

T/F - When one uses the term disc, it means the data was stored magnetically on the DVD.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

SSDs delete data in _____

A

Blocks

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The storage with the fastest access time

A

Register

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Which type of RAM is used in Cache Memory?

A

SRAM

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

What is IRQ?

A

A number assigned to a device (such as a mouse, keyboard, etc)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Which of the following scam asks you for upfront cash?

A

Phishing

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

IDE hard drive has ___ pins and SATA hard drive has ___ pins

A

IDE 40, SATA 7

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Today Windows 10 operating system uses _____ file system

A

NTFS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

One of the best ways a company can prevent itself from becoming a victim of a spear-phishing
attack is to:

A

Educate Employees

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

I have a 16-bit game (wolf stein). I want to play it on my Windows 10 OS. Which of the
following virtualization technique allows me to run this game?
Emulator
Linux os
Bare metal (Type 1)
Hosted (Type 2)

A

Emulator

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

Which of the following symbols is sudo prompt?
Mike~$
Mike~#
Mike~S
Mike#s

A

Mike~$

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

What is the command to make a partition in Linux?

A

Fdisk

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

In Linux, the operating system / (Forward slash) is considered as

A

Root

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Which of the following partition is bootable?
Primary
Extended
Logical
All of the above

A

Primary

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

In a Windows environment, you can have_______, ______, _______ partitions

A

3 Primary, 1 extended, 24 logical

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

A programming language is usually split into two components of _______ (form) and
_________

A

Syntax and Semantics

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

What is the letter to create a partition in Linux?

A

N

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Linux ______ your password when you are typing it in the terminal.

A

Doesn’t show

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Name two types of Hypervisor.

A

Host, Bare Metal

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

What 2 things does the Hypervisor usually control?

A

CPU, Memory

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Windows 10 uses the ____ file system

A

NTFS

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

The command for file attribute is:

A

Attrib

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

Which of the following characters cannot be used in a Windows file name?
$
0 (a zero)
!
>

A

>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

Please choose four file attributes.
A
B
H
R
S

A

A, H, R, S

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

What key combinations do you hold down to display the System menu for the active Window?
ALT+TAB
ALT+ESC
ALT+ENTER
ALT+SPACEBAR

A

ALT+SPACEBAR

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

T/F - Viruses and Worms require user interaction to infect the initial host.

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Electronic recycling is also known as _______.

A

Urban Mining

34
Q

What is a core processor?

A

A physical processing unit runs independently from each other within a CPU.

35
Q

What is Defragmenting?

A

Defragmenting: this is a way to organize the scattered files on the platter (HDD) for faster reading.

36
Q

According to the lecture, which operating system came first?

A

Unix

37
Q

Which 2 of the following would characterize DOS operating system?
GUI
16 bit
32 bit
Single task

A

16 bit
Single task

38
Q

Which device uses a lithium battery

A

the BIOS

39
Q

T/F - Color Depth: the number of color values that can be assigned to a single pixel in an image

A

True

40
Q

In computer programming, a floating point is a ____ with a ______

A

Real number with a decimal
ie. 3.15

41
Q

a bit is the most ___ ____ of information

A

Basic Unit

42
Q

a byte is the smallest possible ______ unit of computer storage

A

Addressable

43
Q

a _____ is a contiguous group of bytes

contiguous - next or together in sequence

A

Word

44
Q

Word sizes of __, __, or __ bits are most common

A

16, 32, 64

45
Q

In a ____ _______ system, a word is the smallest addressable unit of storage

A

Word Addressable

46
Q

A group of 4 bits is called a

A

Nibble

47
Q

Two nibbles create a

A

Byte

48
Q

The two nibbles in a byte are split by

A

High order and low order

49
Q

a _____ _____ is the symbol used in numerical representations to separate the integer part of a number from its fractional part

A

Radix point

50
Q

A floating point is a number with

A

a decimal or “fractional part”

51
Q

Single precision 754 is a __ ___number while Double precision 754 is a __ ___number

A

32 bit, 64 bit

52
Q

The range of a floating point is

A

the largest and smallest values that can be expressed

53
Q

Precision of a floating point is

A

the amount of information we have about a value. In other words, the amount of decimal places are at the end of a given measurement.

“the floating point is precise to the nth decimal place”

54
Q

Precision of a floating point is

A

the amount of information we have about a value. In other words, the number of decimal places that are at the end of a given measurement.

“The floating point is precise to the nth decimal place”

55
Q

The accuracy of a floating point is

A

how closely a numeric representation approximates a true value

56
Q

Floating point overflow is when

A

there is no room to store the high-order bits resulting from a calculation

57
Q

Underflow occurs when a value is

A

too small to store, possibly by resulting from division by 0

58
Q

Unsigned numbers only store ______ numbers, not ______ numbers

A

positive, not negative

59
Q

Signed numbers either use a ____ (__) or can be _________ between negative values and positive values

Examples:

A

flag (bit), distinguished

Examples:
+25 or [0]11001

[] added for visuals

60
Q

+7 signed vs unsigned

A

0111 vs 111

61
Q

2 and 6 in 3 bit signed form

A

0010 and 0110

62
Q

-2 and -6 in 3 unsigned form

A

1010 and 1110

63
Q

To represent negative values, computer systems allocate the ____ _____ bit to indicate the sign of a value

A

high order

64
Q

The high order bit is the ____ ____ bit in a byte

A

left most

65
Q

The high order bit is also called ____ ___________ bit

A

Most significant bit

66
Q

+3 and -3 In 8 bit signed magnitude

A

000000011 and 10000011

67
Q

Computers perform arithmetic operations on signed magnitude numbers in a similar to humans, how?

A

by ignoring the sign of the operands, doing the calculation, then applying the appropriate sign afterwards

68
Q

2 disadvantages of signed magnitude

A
  1. Despite being easy for people, difficult for computers (requires complicated hardware)
  2. Allows 2 different representations of 0, positive and negative 0
69
Q

Instead of signed magnitude, computers employ _______ ______

A

complement systems

70
Q

Positive and negative 0 causes

A

Hardware issues

71
Q

+0 and -0 in 3 bit signed form

A

000 and 100

72
Q

In signed magnitude you add a _ to the ___ if the number is positive

A

0 to the MSB

73
Q

In signed magnitude you add a _ to the ___ if the number is negative

A

1 to the MSB

74
Q

In one’s complement if the number is positive, convert it to ______ then add a _ for the sign bit

A

Binary, add a 0

75
Q

In one’s complement if the number is negative, convert to binary, add a _, then _____ the bits _______

A

add a 0, then flip the bits opposite

Ex. 45 = 0101101
-45 = 1010010

76
Q

7 vs -7 in 8 bit one’s complement

A

00000111 vs 11111000

77
Q

Complement systems are useful because they eliminate the need for ________

A

Subtraction

78
Q

The disadvantage of one’s complement is that it still has 2 representations of

A

0, positive and negative 0

79
Q

000 in binary translates to ___ in one’s complement

A

111

80
Q

111 in binary translates to ___ in one’s complement

A

000

81
Q

In two’s complement, convert it to binary and add _ for the sign bit

A

0

82
Q

Continue from slide 60

A