
Technology experts and computer programmers will enjoy these software and history flash cards.
There are 42 flash cards in this set (7 pages to print.)
To use:
1. Print out the cards.
2. Cut along the dashed lines.
3. Fold along the solid lines.
Sample flash cards in this set:
| Questions | Answers |
|---|---|
| The primary function of a hard drive? | STORING DATA |
| Occurs when media and other data from a file are stored in various locations on a hard drive, slowing down the system's performance? | FRAGMENTATION |
| Blocks unwanted programs from accessing the internet? | FIREWALL |
| What is it called when a computer performs multiple processing functions at the same time? | PARALLEL PROCESSING |
| Steve Jobs and Steve Wozniac? | CO-FOUNDERS OF APPLE |
| What is an information-sharing connection between two or more devices? | A NETWORK |
| A widely used LAN protocol which requires a wired connection? | ETHERNET |
| Made up of 1024 kilobytes? | MEGABYTE |
| A device used to connect a device via a telephone line, and works by coding and decoding digital information before sending it over that telephone line? | MODEM |
| Made up of 1024 bytes? | GIGABYTE |
| Made up of 1024 megabytes? | GIGABYTE |
| The most basic neural network has three layers of neurons: | INPUT, OUTPUT, and HIDDEN NEURONS |
| A data message or fragment of a message is referred to as what? | PACKET |
| Diverting a website's traffic to another website illegally? | PHARMING |
| The computer systems in a network which packets pass between are? | NODES |
| A type of network where the resources of all computers on the network are pooled together? | PEER - TO - PEER NETWORK |
| The execution of a set of instructions which will be repeated? | LOOP |
| A technique used by corporate entities to flood download sites with flawed copies of a piece of media in order to reduce piracy? | SPOOFING |
| Order of the generations of computers: | VACUUM TUBES TRANSISTORS INTEGERATED CIRCUITS MICROPROCESSORS |
| Mitchell Kapor and Jonathan Sachs? | FOUNDERS OF LOTUS |
| Acts as a transition between human language and machine language, allowing a programmer to tell a computer what to do: | PROGRAMMING LANGUAGE |
| The first computer used in the United States? (Could perform computation of loops). | ENIAC |
| Bill Gates | FOUNDER OF MICROSOFT |
| The first commercial computer? | UNIVAC1 |
| A group of columns within a database which uniquely specify a row, with no rows having NULL value | PRIMARY KEY |
| Responsible for processing data and calculations within the system? | CPU (CENTRAL PROCESSING UNIT) |
| Has no physical existence, but is a virtual operation of the computer (such as an antivirus) | SOFTWARE |
| What does DSL stand for? | DIGITAL SUBSCRIBER LINE |
| Can be read by a CD drive, but not written to? | CD-ROM |
| Used in situations where small uploads can be achieved simply by users with little knowledge of uploading? | HTTP (HYPERTEXT TRANSFER PROTOCOL) |
| Primarily used by webmasters for mass uploads directly to a server? | FTP |
| What is true of a VIRUS but not a TROJAN HORSE? | IT CAN BE TRANSFERRED FROM ONE COMPUTER TO ANOTHER. |
| What are the four types of structured files in a database? | ISAM, HEAPS, HASH BUCKETS, and B+ TREES |
| A processor's specific code or machine language? | NATIVE CODE |
| What are the 3 major classes of software? | APPLICATION, PROGRAMMING, and SYSTEM |
| Used to copy files between systems on a network and upload files to a server? | FTP (FILE TRANSFER PROTOCOL) |
| A data processing series where the output from one element becomes the input of the next element? | SOFTWARE PIPELINE |
| What year was the APPLE II introduced? | 1977 |
| An internet-connected computer that has been hacked or infected with a virus? | ZOMBIE COMPUTER |
| Type of programming where the programmer deals with a series of self-contained objects which interact with one another? | OBJECT ORIENTED PROGRAMMING |
| A form of memory which persists when a machine is turned off, and cannot be written to? | ROM (READ ONLY MEMORY) |
| A user interface which primarily uses graphical elements such as images and icons? | GUI (GRAPHICAL USER INTERFACE) |