An e-mail address consists of a(n) username, followed by the @ symbol,...
A user inputs data into a computer, and then the computer processes...
Storage devices are hardware used to store data on or access data from...
Notebook computers (also called laptops) are fully functioning...
The binary numbering system uses only two symbols—the digits 0...
Small office networks enable workers to access company records stored...
Each location in memory has an address.
Early computers required programs to be written in machine language.
The system unit is the main case of a computer.
The buses used to connect peripheral (typically input and output)...
Pipelining increases the number of machine cycles completed per...
One online security problem is ____, in which someone else uses your...
Common input devices include the keyboard and ____.
Case-Based Critical Thinking Questions...
With bitmapped images, the color of each ____ is represented by bits;...
Case-Based Critical Thinking Questions...
Hollerith's machine was used to process the 1890 U.S. Census data and...
____ occurs when data is entered into the computer.
The Windows ____ shown in the figure above contains the following...
The external hardware components are located inside the main box or...
A ____ is equal to 1,024 bytes.
Case-Based Critical Thinking Questions...
MIDI ports are used to receive wireless transmissions from devices.
The ____ takes instructions from the prefetch unit and translates them...
In addition to the four primary computer operations, today's computers...
Computing technologies make it possible to have ____, traditional...
A ____ is a collection of hardware and other devices that are...
Case-Based Critical Thinking Questions...
The ____ enables up to 127 devices to be connected to a computer...
____ refers to guidelines for online behavior.
Two of the most common types of communications hardware are ____ and...
Like graphics data, ____—such as a song or the sound of someone...
Memory refers to the amount of long-term storage available to a PC.
Ultra-mobile PCs are also called ____.
Because of its large size, when audio data is transmitted over the...
Some ____ must be added in pairs for optimal performance.
Communications hardware includes modems, which are used to connect a...
Most recent software programs, including the latest versions of...
Abbreviations or acronyms, such as BTW for "between the words," are...
Integrated circuits incorporate many transistors and electronic...
The accompanying figure shows a DIMM RAM microprocessor.
A(n) ____ instruction might look like a meaningless string of 0s and...
To begin to use a computer, the user first turns on the power by...
Satellite communication (more commonly called s-com) is the process of...
The key element of the microprocessor is the ____—a device made...
The accompanying figure shows a notebook computer.
The control unit takes the instructions fetched by the prefetch unit...
One nanometer (nm) is ____ of a meter.
The ____ orders data and instructions from cache or RAM based on the...
The process of representing data in digital form so it can be used by...