MULTIPLE CHOICE. 1) All of the following are examples of real security and privacy risks EXCEPT: A) spam. B) hackers. C) identity theft.
D) viruses.
Answer: A 2) Unwanted e-mail is called ________. A) adware B) spam
C) spyware
D) software
Answer: B 3) While engineers work to create computers that can understand us emotionally, ________ are also evolving toward a more human appearance. A) affecting computing techniques B) computer systems C) ESP systems D) RFIDs Answer: B 4) ________ is a field of study focused on information handling and retrieval of information automatically. A) Database mining B) Computer forensics C) RFID D) Information technology Answer: D 5) Technology no longer protected by copyright, available to everyone, is considered to be ________. A) experimental B) proprietary C) open D) in the public domain Answer: D 6) The prefix nano stands for ________. A) one-billionth B) one-trillionth
C) one-hundredth
D) one-millionth
Answer: A 7) ________ is the nerve center of any digital home, allowing you to interface with the different digital devices connected to the network. A) A modem B) A computer C) The Internet D) A server Answer: B 8) ________ tags are small versions of the roadway electronic toll system used in many states to automate paying tolls as motorists pass through the toll station. A) UPS B) PDA C) PSS D) RFID Answer: D 9) Which of the following is NOT one of the four major data processing functions of a computer? A) storing the data or information B) processing data into information C) gathering data D) analyzing the data or information Answer: D 10) Which of the following is a single-user, multitask operating system? A) Palm OS B) Symbian OS C) MS-DOS Answer: D
1
D) Mac OS