Glossary Crossword Instructions: Use the terms and clues below to complete the crossword puzzle. party memory execute decode nibble prefetch services Across 4. Computer applications or programs which run in the background of an operating system to maintain proper computer functionality. 5. The process responsible for adding, subtracting, and moving memory. 6. A component of the pipeline which breaks down a complex line of code into smaller pieces. Down 1. A four-bit aggregation. 2. An outdated type of memory which contained an extra chip used to keep track of information in other RAM chips. 3. A component of the pipeline interfaces with the memory controller chip to get lines of code into the CPU.
Glossary Word Search Instructions: Use the clues below to complete the word search. party memory execute decode nibble prefetch services
Glossary Matching Instructions: Match the glossary term described in Session 2 to its definition. a. party memory b. execute c. decode d. nibble e. prefetch f. services 1. A four-bit aggregation. 2. A component of the pipeline which breaks down a complex line of code into smaller pieces. 3. The process responsible for adding, subtracting, and moving memory. 4. A component of the pipeline interface with the memory controller chip to get lines of code into the CPU. 5. An outdated type of memory which contained an extra chip used to keep track of information in other RAM chips. 6. Computer applications or programs which run in the background of an operating system to maintain proper computer functionality.
Session 2 Quiz Instructions: Circle the letter of the option that BEST answers the question. (If you do not know the answer, go back to the curriculum and find the correct answer, DO NOT GUESS!!!) 1. Which action is used to select something in Windows? A. Shift-click B. Right-click C. Single-click D. Double-click 2. Pressing the Windows logo key along with which other key will show the contents of the computer? A. C B. D C. E D. S 3. Where is copied text stored? A. Desktop B. Clipboard C. Document D. System files 4. Which option indicates hidden files? A. lse B. Red X C. Grayed-out icon D. File name.hidden 5. Which Run command is used to manually access the registry? A. regedit B. manreg C. registry D. regaccess
6. What is the primary function of MMC? A. Log errors and alerts B. Allow the user to create utilities C. Provide system efficiency tables D. Allow the user to configure the layout of the desktop 7. Which type of connection is used to link the MCC to the CPU? A. Address bus B. Street wires C. Processor bus D. Selection wires 8. The pipeline can be stopped at any point if it becomes too complicated. A. True B. False 9. Which are qualities of the L3 cache? Choose all that apply. A. Self-reliant B. Multiple megabytes C. Slower than the CPU D. Faster than the RAM 10. Currently running programs appear in which area? A. Taskbar B. Start button C. Quick Launch bar D. Running applications 11. Which allows older programs to run on newer operating systems? A. Downgrading B. Task Manager C. Read-only mode D. Compatibility mode
12. In which operating systems does the keyboard shortcut, Windows logo key+tab, allow the user to tab through all of the open windows? Choose all that apply. A. Windows 7 B. Windows XP C. Windows 2007 D. Windows Vista 13. Which occurs when the user performs the SHIFT+DELETE command? A. File is permanently deleted B. File is sent out of the folder C. File is moved to the desktop D. File is sent to the Recycle Bin 14. Which folder is automatically emptied when a computer is running out of hard drive space? A. Help B. Fonts C. Media D. Offline Web Pages 15. Which file stores a user's personal settings? A. My Computer B. My Documents C. Application Data D. Preferred Settings 16. Which Windows Vista feature helps to protect against unauthorized changes to a computer? A. Control Panel B. Registry control C. User Account Control D. Account management 17. In which Vista Control Panel item is the Memory Diagnostics tool located? A. System Options B. Disk Management C. Administrative Tools D. Users and Computers
18. Traditionally, how many bits are in one byte? A. 4 B. 8 C. 12 D. 16 19. How is RAM broken up? A. Bit-wide segments B. Byte-wide segments C. 16 bit-wide segments D. 8 byte-wide segments 20. Which term is used to describe the number which is 2 to the 20th power? A. Kilobyte B. Gigabyte C. Megabyte D. Vingtabyte