11111111

Page 1

MULTIPLE CHOICE. 1) All of the following are examples of real security and privacy risks EXCEPT: A) spam. B) hackers. C) identity theft.

D) viruses.

Answer: A 2) Unwanted e-mail is called ________. A) adware B) spam

C) spyware

D) software

Answer: B 3) While engineers work to create computers that can understand us emotionally, ________ are also evolving toward a more human appearance. A) affecting computing techniques B) computer systems C) ESP systems D) RFIDs Answer: B 4) ________ is a field of study focused on information handling and retrieval of information automatically. A) Database mining B) Computer forensics C) RFID D) Information technology Answer: D 5) Technology no longer protected by copyright, available to everyone, is considered to be ________. A) experimental B) proprietary C) open D) in the public domain Answer: D 6) The prefix nano stands for ________. A) one-billionth B) one-trillionth

C) one-hundredth

D) one-millionth

Answer: A 7) ________ is the nerve center of any digital home, allowing you to interface with the different digital devices connected to the network. A) A modem B) A computer C) The Internet D) A server Answer: B 8) ________ tags are small versions of the roadway electronic toll system used in many states to automate paying tolls as motorists pass through the toll station. A) UPS B) PDA C) PSS D) RFID Answer: D 9) Which of the following is NOT one of the four major data processing functions of a computer? A) storing the data or information B) processing data into information C) gathering data D) analyzing the data or information Answer: D 10) Which of the following is a single-user, multitask operating system? A) Palm OS B) Symbian OS C) MS-DOS Answer: D

1

D) Mac OS


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.