Midterm Flashcards
What is “Phishing” also known as?
A special category of spam specifically created to defraud or commit identity theft.
Which RAID level uses Disk mirroring without parity?
RAID 1
Which of the following is the fastest dynamic memory?
50 nanosecond
60 nanosecond
70 nanosecond
80 nanosecond
50 nanosecond
My laptop has 16 GB of RAM. What type of RAM am I using for my laptop?
Static RAM
Dynamic RAM
BIOS RAM
None of the above
Dynamic RAM
The first sector of a hard drive is
MBR (Master Boot Record)
NTFS (New Technology File System)
Ext4 (Extended 4)
FAT32 (File Allocation Table 32)
MBR (Master Boot Record)
What is a Swap partition in the Windows or Linux OS?
It is part of the hard drive that works like memory
T/F - When one uses the term disc, it means the data was stored magnetically on the DVD.
False
SSDs delete data in _____
Blocks
The storage with the fastest access time
Register
Which type of RAM is used in Cache Memory?
SRAM
What is IRQ?
A number assigned to a device (such as a mouse, keyboard, etc)
Which of the following scam asks you for upfront cash?
Phishing
IDE hard drive has ___ pins and SATA hard drive has ___ pins
IDE 40, SATA 7
Today Windows 10 operating system uses _____ file system
NTFS
One of the best ways a company can prevent itself from becoming a victim of a spear-phishing
attack is to:
Educate Employees
I have a 16-bit game (wolf stein). I want to play it on my Windows 10 OS. Which of the
following virtualization technique allows me to run this game?
Emulator
Linux os
Bare metal (Type 1)
Hosted (Type 2)
Emulator
Which of the following symbols is sudo prompt?
Mike~$
Mike~#
Mike~S
Mike#s
Mike~$
What is the command to make a partition in Linux?
Fdisk
In Linux, the operating system / (Forward slash) is considered as
Root
Which of the following partition is bootable?
Primary
Extended
Logical
All of the above
Primary
In a Windows environment, you can have_______, ______, _______ partitions
3 Primary, 1 extended, 24 logical
A programming language is usually split into two components of _______ (form) and
_________
Syntax and Semantics
What is the letter to create a partition in Linux?
N
Linux ______ your password when you are typing it in the terminal.
Doesn’t show
Name two types of Hypervisor.
Host, Bare Metal
What 2 things does the Hypervisor usually control?
CPU, Memory
Windows 10 uses the ____ file system
NTFS
The command for file attribute is:
Attrib
Which of the following characters cannot be used in a Windows file name?
$
0 (a zero)
!
>
>
Please choose four file attributes.
A
B
H
R
S
A, H, R, S
What key combinations do you hold down to display the System menu for the active Window?
ALT+TAB
ALT+ESC
ALT+ENTER
ALT+SPACEBAR
ALT+SPACEBAR
T/F - Viruses and Worms require user interaction to infect the initial host.
False
Electronic recycling is also known as _______.
Urban Mining
What is a core processor?
A physical processing unit runs independently from each other within a CPU.
What is Defragmenting?
Defragmenting: this is a way to organize the scattered files on the platter (HDD) for faster reading.
According to the lecture, which operating system came first?
Unix
Which 2 of the following would characterize DOS operating system?
GUI
16 bit
32 bit
Single task
16 bit
Single task
Which device uses a lithium battery
the BIOS
T/F - Color Depth: the number of color values that can be assigned to a single pixel in an image
True
In computer programming, a floating point is a ____ with a ______
Real number with a decimal
ie. 3.15
a bit is the most ___ ____ of information
Basic Unit
a byte is the smallest possible ______ unit of computer storage
Addressable
a _____ is a contiguous group of bytes
contiguous - next or together in sequence
Word
Word sizes of __, __, or __ bits are most common
16, 32, 64
In a ____ _______ system, a word is the smallest addressable unit of storage
Word Addressable
A group of 4 bits is called a
Nibble
Two nibbles create a
Byte
The two nibbles in a byte are split by
High order and low order
a _____ _____ is the symbol used in numerical representations to separate the integer part of a number from its fractional part
Radix point
A floating point is a number with
a decimal or “fractional part”
Single precision 754 is a __ ___number while Double precision 754 is a __ ___number
32 bit, 64 bit
The range of a floating point is
the largest and smallest values that can be expressed
Precision of a floating point is
the amount of information we have about a value. In other words, the amount of decimal places are at the end of a given measurement.
“the floating point is precise to the nth decimal place”
Precision of a floating point is
the amount of information we have about a value. In other words, the number of decimal places that are at the end of a given measurement.
“The floating point is precise to the nth decimal place”
The accuracy of a floating point is
how closely a numeric representation approximates a true value
Floating point overflow is when
there is no room to store the high-order bits resulting from a calculation
Underflow occurs when a value is
too small to store, possibly by resulting from division by 0
Unsigned numbers only store ______ numbers, not ______ numbers
positive, not negative
Signed numbers either use a ____ (__) or can be _________ between negative values and positive values
Examples:
flag (bit), distinguished
Examples:
+25 or [0]11001
[] added for visuals
+7 signed vs unsigned
0111 vs 111
2 and 6 in 3 bit signed form
0010 and 0110
-2 and -6 in 3 unsigned form
1010 and 1110
To represent negative values, computer systems allocate the ____ _____ bit to indicate the sign of a value
high order
The high order bit is the ____ ____ bit in a byte
left most
The high order bit is also called ____ ___________ bit
Most significant bit
+3 and -3 In 8 bit signed magnitude
000000011 and 10000011
Computers perform arithmetic operations on signed magnitude numbers in a similar to humans, how?
by ignoring the sign of the operands, doing the calculation, then applying the appropriate sign afterwards
2 disadvantages of signed magnitude
- Despite being easy for people, difficult for computers (requires complicated hardware)
- Allows 2 different representations of 0, positive and negative 0
Instead of signed magnitude, computers employ _______ ______
complement systems
Positive and negative 0 causes
Hardware issues
+0 and -0 in 3 bit signed form
000 and 100
In signed magnitude you add a _ to the ___ if the number is positive
0 to the MSB
In signed magnitude you add a _ to the ___ if the number is negative
1 to the MSB
In one’s complement if the number is positive, convert it to ______ then add a _ for the sign bit
Binary, add a 0
In one’s complement if the number is negative, convert to binary, add a _, then _____ the bits _______
add a 0, then flip the bits opposite
Ex. 45 = 0101101
-45 = 1010010
7 vs -7 in 8 bit one’s complement
00000111 vs 11111000
Complement systems are useful because they eliminate the need for ________
Subtraction
The disadvantage of one’s complement is that it still has 2 representations of
0, positive and negative 0
000 in binary translates to ___ in one’s complement
111
111 in binary translates to ___ in one’s complement
000
In two’s complement, convert it to binary and add _ for the sign bit
0
Continue from slide 60