Geschreven door studenten die geslaagd zijn Direct beschikbaar na je betaling Online lezen of als PDF Verkeerd document? Gratis ruilen 4,6 TrustPilot
logo-home
Tentamen (uitwerkingen)

INSY 2303 UTA SCOTT FINAL EXAM QUESTIONS ANSWERED CORRECTLY LATEST UPDATE 2026

Beoordeling
-
Verkocht
-
Pagina's
6
Cijfer
A+
Geüpload op
25-03-2026
Geschreven in
2025/2026

INSY 2303 UTA SCOTT FINAL EXAM QUESTIONS ANSWERED CORRECTLY LATEST UPDATE 2026 Digital vs. Analog - Answersdigital reads a series of ones and zeros, while analog reads a continuous flow of data. Lossy - AnswersDescribes a method of compression in which data is lost in a way that cannot be recovered from the compressed data. Lossless Compression - Answersa data compression algorithm that allows the original data to be perfectly reconstructed from the compressed data. pixel interpolation - AnswersA process that is used by graphics software to average the color of adjacent pixels in an image, usually when the image is enlarged. Data vs. Information - AnswersData = raw facts and figures. Information = meaningful interpretation of data. Bitmap vs. Vector Graphics - AnswersBitmap Graphics: an image, such as a digital photo, that is stored as a grid work of colored dots. Vector Graphics: an image generated from descriptions that specify the position, length, and direction in which lines and shapes are drawn 3D graphics - AnswersA digital graphics format that displays a three-dimensional image in a two-dimensional space. Vectors - AnswersLines and curves that form simple shapes rendering - AnswersIn graphics software, the process of creating a 3D solid image by covering a wireframe drawing and applying computer-generated highlights and shadows Ray tracing - AnswersThe technique for adding light and shadows to a 3-D image Application - AnswersComputer programs that help users perform a specific task such as word processing. Also called application programs, applications, or programs. Operating System - AnswersThe software that controls the computer's use of its hardware resources, such as memory and disk storage space. Also called an OS. Magnetic Storage - AnswersA technology for recording data onto disks or tape by magnetizing particles of an oxide-based surface coating. Optical Storage - AnswersA technology that records data as light and dark spots on a CD, DVD, or other optical media Solid state storage - AnswersA technology that records data and stores it in a microscopic grid of cells on a nonvolatile, erasable, low-power chip Cloud Storage - AnswersA storage area that is located on a remote server, usually on the Internet, rather than on a local storage device ALU - Answers(Arithmetic Logic Unit) The part of the CPU that performs arithmetic and logical operations on the numbers stored in its registers Control Unit - AnswersThe part of the microprocessor that directs and coordinates processing. RAM vs ROM - AnswersRAM - RANDOM ACCESS MEMORY -is volatile; lose power, it forgets -stores programs from the HD for the CPU to work w/in the present -comes in many sizes, types, speeds -a mobo can have only 1 size/type but many speeds ROM - READ ONLY MEMORY -stores info about how the computer works -It is not volatile; does not forget w/o power serial processing - AnswersProcessing data one instruction at a time, completing one instruction before beginning another pipelining processing - AnswersA technology that allows a processor to begin executing an instruction before completing the previous instruction. parallel processing - AnswersThe simultaneous use of more than one processor to execute a program. TCP - AnswersThe protocol within TCP/IP that is responsible for establishing a data connection between two hosts and breaking data into packets. IP - AnswersOne of the main protocols of TCP/IP; responsible for addressing packets so that they can be routed to their destinations; IPv4 offers 32-bit addresses whereas IPv6 offers 128-bit addresses. HTML Tags - AnswersA set of instructions, such as B, inserted into an HTML document to provide formatting and display information to a Web browser. HTML5 - AnswersIt is the fifth and current version of the HTML standard, can be used as an alternative to Flash media Circuit Switching - AnswersThe method used by the telephone network to temporarily connect one telephone with another for the duration of a call. LAN - AnswersLocal area networks are often referred to as LANs. They are designed to provide connectivity for devices within a limited area, typically within the premises of a home, office building, business, or school. Packet Switching - AnswersOccurs when the sending computer divides a message into a number of efficiently sized units called packets, each of which contains the address of the destination computer HTTP - AnswersThe communications protocol used to transmit Web pages HTTPS - Answers(Hypertext Transfer Protocol Secure) The protocol used to create secure connections for ecommerce by adding a layer of encryption Client-side scripting - AnswersProgram code that is executed by a client's browser, as opposed to being executed by the server Server-side scripting - AnswersA Web page response approach in which programs running on the Web server create Web pages before sending them back to the requesting Web clients as parts of response messages. Hypertext links - AnswersAlso referred to simply as links; words, phrases, or images on a Web page that, when clicked, take you to designated URLs. Web crawler - AnswersCombs the Web to gather data that's representative of the contents of Web pages Indexer - AnswersProcesses the information gathered by the crawler into a list of keywords and URLs stored in a database Database - AnswersStores billions of index references to Web pages Query Processor - Answers• Allows you to access the database by entering search terms, and then produces a list of Web pages that contain content relevant to your query SMPT - Answersa communications protocol used to send e-mail across a network or the Internet POP3 - Answersa standard for retrieving e-mail messages from an email server; deletes messages from the server after they are downloaded Copyright - Answersa form of legal protection that grants the author of an original work an exclusive right to copy, distribute, and sell Trademark - Answersany word, name, symbol, or design used in commerce to identify and distinguish the goods of one company from those of another Metadata tag - Answersa keyword that describes information, such as the content of a media element Buffer - AnswersMemory that is temporarily used to store input or other data until the processor is ready to use it. memory leak - AnswersAn undesirable state in which a program requests memory but never releases it, which can eventually prevent other programs from running File Shredder - AnswersSoftware designed to overwrite sectors of a disk with a random series of 1s and 0s to ensure deletion of data. Database software - AnswersSoftware designed for entering, finding, organizing, updating, and reporting information stored in a database. Spyware - AnswersAny software that covertly gathers user information without the user's knowledge, usually for advertising purposes. Botnet - AnswersA group of bots under the remote control of a botmaster, used to distribute spam and denial-of-service attacks. Worm - Answerscomputer worm -A software program designed to enter a computer system, usually a network, through security "holes" and then replicate itself and spread to other devices. Virus - AnswersA program designed to attach itself to a file, reproduce, destroy data, display an irritating message, or otherwise disrupt computer operations. Port Scan - AnswersAn exploit used by hackers to locate computer ports that can be used for surreptitious access; also called a port probe. Trojan - AnswersA computer program that appears to perform one function while actually doing something else, such as inserting a virus into a computer system or stealing a password. Firewall - AnswersSoftware or hardware designed to analyze and control incoming and outgoing packets on a network; used to enhance security by filtering out potential intrusion attempts. Rootkit - AnswersSoftware that conceals running processes; used by hackers to disguise security breaches and break-ins. Information Technology - Answers(1) A degree program that focuses on the computer equipment and software used by businesses and organizations. (2) The use of computers and software to manipulate data. Computer Science - AnswersA career field that focuses on developing fast and efficient computers from their construction to their programming and operating systems. Systems Analyst - AnswersA computer professional responsible for analyzing requirements, designing information systems, and supervising the implementation of new information systems. Database Administrator - AnswersA person who supervises database design, development, testing, and maintenance. 1G - AnswersComputers that used vacuum tubes to process and store data, such as UNIVAC. 2G - AnswersComputers that use transistors for data processing and storage instead of vacuum tubes. 3G - AnswersComputers characterized by using integrated circuits instead of transistors or vacuum tubes for data processing. 4G - AnswersComputers, such as today's personal computers, servers, and mainframes, that use a general-purpose microprocessor for data processing. ERP - Answerssuite of software modules that integrate major business activities planning phase - Answers1. assembling the project team 2. justifying the project 3. choosing a development methodology 4. developing a project schedule 5. producing a project development plan Product Development Plan - Answers1. short description of the project 2. estimate of the project costs and financial benefits 3. list of project team 4. schedule for the project B2B and B2G - Answers-web sites such as FedBid, Oracle, and Ingram sell goods and services to other businesses or to the government B2C - AnswersOnline storefronts such as Amazon that offer merchandise and services to consumers C2C - AnswersConsumers sell to each other at popular auction and list sites, such as eBay TPS - Answersprovides a way to collect, process, store, display, modify, or cancel transactions OLAP - Answersprovides a way to collect, process, store, display, modify, or cancel transactions Encapsulation - AnswersRefers to the process of hiding the internal details of objects and their methods. After an object is coded, it becomes a black box, which essentially hides its details from other objects and allows the data to be accessed using methods. Can be easily reused, modified, and repurposed. Polymorphism - Answerssometimes called overloading, the ability to redefine a method in a subclass. Allows programmers to create a single, generic name for a procedure that behaves in unique ways for different classes. Allows a programmer to define different getArea() methods for each subclass. When the completed programs runs, pizza shapes are collected from the user and corresponding getArea() method can be applied to calculate the area of a pizza.

Meer zien Lees minder
Instelling
INSY 2303
Vak
INSY 2303

Voorbeeld van de inhoud

INSY 2303 UTA SCOTT FINAL EXAM QUESTIONS ANSWERED CORRECTLY LATEST UPDATE 2026

Digital vs. Analog - Answersdigital reads a series of ones and zeros, while analog reads a continuous
flow of data.
Lossy - AnswersDescribes a method of compression in which data is lost in a way that cannot be
recovered from the compressed data.
Lossless Compression - Answersa data compression algorithm that allows the original data to be
perfectly reconstructed from the compressed data.
pixel interpolation - AnswersA process that is used by graphics software to average the color of
adjacent pixels in an image, usually when the image is enlarged.
Data vs. Information - AnswersData = raw facts and figures. Information = meaningful interpretation
of data.
Bitmap vs. Vector Graphics - AnswersBitmap Graphics: an image, such as a digital photo, that is stored
as a grid work of colored dots.

Vector Graphics: an image generated from descriptions that specify the position, length, and direction
in which lines and shapes are drawn
3D graphics - AnswersA digital graphics format that displays a three-dimensional image in a two-
dimensional space.
Vectors - AnswersLines and curves that form simple shapes
rendering - AnswersIn graphics software, the process of creating a 3D solid image by covering a
wireframe drawing and applying computer-generated highlights and shadows
Ray tracing - AnswersThe technique for adding light and shadows to a 3-D image
Application - AnswersComputer programs that help users perform a specific task such as word
processing. Also called application programs, applications, or programs.
Operating System - AnswersThe software that controls the computer's use of its hardware resources,
such as memory and disk storage space. Also called an OS.
Magnetic Storage - AnswersA technology for recording data onto disks or tape by magnetizing
particles of an oxide-based surface coating.
Optical Storage - AnswersA technology that records data as light and dark spots on a CD, DVD, or
other optical media
Solid state storage - AnswersA technology that records data and stores it in a microscopic grid of cells
on a nonvolatile, erasable, low-power chip
Cloud Storage - AnswersA storage area that is located on a remote server, usually on the Internet,
rather than on a local storage device
ALU - Answers(Arithmetic Logic Unit) The part of the CPU that performs arithmetic and logical
operations on the numbers stored in its registers
Control Unit - AnswersThe part of the microprocessor that directs and coordinates processing.
RAM vs ROM - AnswersRAM - RANDOM ACCESS MEMORY
-is volatile; lose power, it forgets
-stores programs from the HD for the CPU to work w/in the present
-comes in many sizes, types, speeds
-a mobo can have only 1 size/type but many speeds
ROM - READ ONLY MEMORY
-stores info about how the computer works
-It is not volatile; does not forget w/o power
serial processing - AnswersProcessing data one instruction at a time, completing one instruction
before beginning another
pipelining processing - AnswersA technology that allows a processor to begin executing an instruction
before completing the previous instruction.
parallel processing - AnswersThe simultaneous use of more than one processor to execute a program.
TCP - AnswersThe protocol within TCP/IP that is responsible for establishing a data connection
between two hosts and breaking data into packets.
IP - AnswersOne of the main protocols of TCP/IP; responsible for addressing packets so that they can
be routed to their destinations; IPv4 offers 32-bit addresses whereas IPv6 offers 128-bit addresses.
HTML Tags - AnswersA set of instructions, such as <B>, inserted into an HTML document to provide
formatting and display information to a Web browser.

, HTML5 - AnswersIt is the fifth and current version of the HTML standard, can be used as an
alternative to Flash media
Circuit Switching - AnswersThe method used by the telephone network to temporarily connect one
telephone with another for the duration of a call.
LAN - AnswersLocal area networks are often referred to as LANs. They are designed to provide
connectivity for devices within a limited area, typically within the premises of a home, office building,
business, or school.
Packet Switching - AnswersOccurs when the sending computer divides a message into a number of
efficiently sized units called packets, each of which contains the address of the destination computer
HTTP - AnswersThe communications protocol used to transmit Web pages
HTTPS - Answers(Hypertext Transfer Protocol Secure) The protocol used to create secure connections
for ecommerce by adding a layer of encryption
Client-side scripting - AnswersProgram code that is executed by a client's browser, as opposed to
being executed by the server
Server-side scripting - AnswersA Web page response approach in which programs running on the Web
server create Web pages before sending them back to the requesting Web clients as parts of response
messages.
Hypertext links - AnswersAlso referred to simply as links; words, phrases, or images on a Web page
that, when clicked, take you to designated URLs.
Web crawler - AnswersCombs the Web to gather data that's representative of the contents of Web
pages
Indexer - AnswersProcesses the information gathered by the crawler into a list of keywords and URLs
stored in a database
Database - AnswersStores billions of index references to Web pages
Query Processor - Answers• Allows you to access the database by entering search terms, and then
produces a list of Web pages that contain content relevant to your query
SMPT - Answersa communications protocol used to send e-mail across a network or the Internet
POP3 - Answersa standard for retrieving e-mail messages from an email server; deletes messages
from the server after they are downloaded
Copyright - Answersa form of legal protection that grants the author of an original work an exclusive
right to copy, distribute, and sell
Trademark - Answersany word, name, symbol, or design used in commerce to identify and distinguish
the goods of one company from those of another
Metadata tag - Answersa keyword that describes information, such as the content of a media element
Buffer - AnswersMemory that is temporarily used to store input or other data until the processor is
ready to use it.
memory leak - AnswersAn undesirable state in which a program requests memory but never releases
it, which can eventually prevent other programs from running
File Shredder - AnswersSoftware designed to overwrite sectors of a disk with a random series of 1s
and 0s to ensure deletion of data.
Database software - AnswersSoftware designed for entering, finding, organizing, updating, and
reporting information stored in a database.
Spyware - AnswersAny software that covertly gathers user information without the user's knowledge,
usually for advertising purposes.
Botnet - AnswersA group of bots under the remote control of a botmaster, used to distribute spam
and denial-of-service attacks.
Worm - Answerscomputer worm -A software program designed to enter a computer system, usually a
network, through security "holes" and then replicate itself and spread to other devices.
Virus - AnswersA program designed to attach itself to a file, reproduce, destroy data, display an
irritating message, or otherwise disrupt computer operations.
Port Scan - AnswersAn exploit used by hackers to locate computer ports that can be used for
surreptitious access; also called a port probe.
Trojan - AnswersA computer program that appears to perform one function while actually doing
something else, such as inserting a virus into a computer system or stealing a password.
Firewall - AnswersSoftware or hardware designed to analyze and control incoming and outgoing
packets on a network; used to enhance security by filtering out potential intrusion attempts.

Geschreven voor

Instelling
INSY 2303
Vak
INSY 2303

Documentinformatie

Geüpload op
25 maart 2026
Aantal pagina's
6
Geschreven in
2025/2026
Type
Tentamen (uitwerkingen)
Bevat
Vragen en antwoorden

Onderwerpen

$11.49
Krijg toegang tot het volledige document:

Verkeerd document? Gratis ruilen Binnen 14 dagen na aankoop en voor het downloaden kun je een ander document kiezen. Je kunt het bedrag gewoon opnieuw besteden.
Geschreven door studenten die geslaagd zijn
Direct beschikbaar na je betaling
Online lezen of als PDF

Maak kennis met de verkoper

Seller avatar
De reputatie van een verkoper is gebaseerd op het aantal documenten dat iemand tegen betaling verkocht heeft en de beoordelingen die voor die items ontvangen zijn. Er zijn drie niveau’s te onderscheiden: brons, zilver en goud. Hoe beter de reputatie, hoe meer de kwaliteit van zijn of haar werk te vertrouwen is.
TutorJosh Chamberlain College Of Nursing
Volgen Je moet ingelogd zijn om studenten of vakken te kunnen volgen
Verkocht
441
Lid sinds
1 jaar
Aantal volgers
16
Documenten
31724
Laatst verkocht
21 uur geleden
Tutor Joshua

Here You will find all Documents and Package Deals Offered By Tutor Joshua.

3.5

73 beoordelingen

5
26
4
16
3
14
2
1
1
16

Recent door jou bekeken

Waarom studenten kiezen voor Stuvia

Gemaakt door medestudenten, geverifieerd door reviews

Kwaliteit die je kunt vertrouwen: geschreven door studenten die slaagden en beoordeeld door anderen die dit document gebruikten.

Niet tevreden? Kies een ander document

Geen zorgen! Je kunt voor hetzelfde geld direct een ander document kiezen dat beter past bij wat je zoekt.

Betaal zoals je wilt, start meteen met leren

Geen abonnement, geen verplichtingen. Betaal zoals je gewend bent via iDeal of creditcard en download je PDF-document meteen.

Student with book image

“Gekocht, gedownload en geslaagd. Zo makkelijk kan het dus zijn.”

Alisha Student

Bezig met je bronvermelding?

Maak nauwkeurige citaten in APA, MLA en Harvard met onze gratis bronnengenerator.

Bezig met je bronvermelding?

Veelgestelde vragen