11111111

Page 1

MULTIPLE CHOICE. 1) All of the following are examples of real security and privacy risks EXCEPT: A) spam. B) hackers. C) identity theft.

D) viruses.

Answer: A 2) Unwanted e-mail is called ________. A) adware B) spam

C) spyware

D) software

Answer: B 3) While engineers work to create computers that can understand us emotionally, ________ are also evolving toward a more human appearance. A) affecting computing techniques B) computer systems C) ESP systems D) RFIDs Answer: B 4) ________ is a field of study focused on information handling and retrieval of information automatically. A) Database mining B) Computer forensics C) RFID D) Information technology Answer: D 5) Technology no longer protected by copyright, available to everyone, is considered to be ________. A) experimental B) proprietary C) open D) in the public domain Answer: D 6) The prefix nano stands for ________. A) one-billionth B) one-trillionth

C) one-hundredth

D) one-millionth

Answer: A 7) ________ is the nerve center of any digital home, allowing you to interface with the different digital devices connected to the network. A) A modem B) A computer C) The Internet D) A server Answer: B 8) ________ tags are small versions of the roadway electronic toll system used in many states to automate paying tolls as motorists pass through the toll station. A) UPS B) PDA C) PSS D) RFID Answer: D 9) Which of the following is NOT one of the four major data processing functions of a computer? A) storing the data or information B) processing data into information C) gathering data D) analyzing the data or information Answer: D 10) Which of the following is a single-user, multitask operating system? A) Palm OS B) Symbian OS C) MS-DOS Answer: D

1

D) Mac OS


11) Which of the following was the first widely used operating system installed in personal computers? A) Linux B) MS-DOS C) Symbian OS D) Microsoft Windows Answer: B 12) The ________ is a program that manages the data between the operating system and all input and output devices attached to the system. A) POST B) BIOS C) Device Manager D) Configuration utility Answer: B 13) Which of the following is NOT a step in the boot process? A) Configuration and customization settings are checked. B) The operating system is loaded into RAM. C) The antivirus program checks all files for viruses. D) The BIOS is activated by powering on the CPU. Answer: C 14) The basic input/output system is stored on a ________ chip. A) RAM B) ROM C) CMOS

D) CPU

Answer: B 15) Which of the following is NOT a function of the operating system? A) It manages the processor. B) It provides a user interface. C) It provides a way for software applications to work with the CPU. D) It manages the removal of spyware. Answer: D 16) During the virtual memory process, the operating system moves data to a temporary storage area on the hard drive called the ________ file. A) memory B) virtual C) swap D) RAM Answer: C 17) Each device attached to your computer comes with a special program called a ________ that facilitates communication between the device and the OS. A) communication utility B) device driver C) translator D) device configurator Answer: B 18) Which of the following does NOT occur during the power-on self-test? A) The video card and video memory are tested. B) The OS is moved into RAM. C) Memory is tested. D) The BIOS is identified. Answer: B 19) The ________ contains all of the different configurations used by the OS and by other applications. A) BIOS B) registry C) CMOS D) kernel Answer: B

2


20) All of the following are terms related to part of the boot process EXCEPT: A) ROM. B) RAM. C) USB.

D) BIOS.

Answer: C 21) ________ are easy-to-use mini desktop programs that give you information at a glance or quick access to frequently used tools including weather information, calendar items, or games. A) Gadgets B) Mini-apps C) Sidebars D) Ribbons Answer: A 22) Before upgrading your OS, you should back up your ________. A) ROM B) system files C) data files

D) BIOS

Answer: C 23) The OS allows you to organize the contents of your computer in a hierarchical structure of ________. A) directories B) files C) drives D) folders Answer: A 24) The location of a file is specified by its ________. A) file extension B) file type

C) drive letter

D) file path

Answer: D 25) In the Windows operating system, the hard drive is represented as the ________. A) A drive B) C drive C) E drive

D) D drive

Answer: B 26) In a Windows folder, to display files and folders as icons in list form, use ________ view. A) Tiles B) List C) Details D) Thumbnails Answer: A 27) Windows 7 introduces the concept of ________, which are folders that gather files from different locations and display the files as if they were all saved in a single folder. A) collections B) libraries C) directories D) groups Answer: B 28) All of the following can be used in a Windows file name EXCEPT: A) $. B) *. C) #.

D) %.

Answer: B 29) In Windows, which character is used as a path separator? A) backslash (\) B) colon (:)

C) hyphen (-)

D) forward slash (/)

Answer: A 30) C:\Documents\Spring 2012\CIS 101\Term Paper\Computer Technology is an example of a ________. A) file list B) file path C) file type D) file extension Answer: B 31) In Windows, a file path starts with a ________. A) backslash (\) B) folder

C) file name

Answer: D

3

D) drive letter


32) With Windows Explorer, you can perform all of the following file management actions EXCEPT: A) renaming files. B) copying files. C) editing files. D) opening files. Answer: C 33) If you want to save a file that will be opened by people who use a wide variety of software, any of the following formats would be safe EXCEPT ________. A) .txt B) .docx C) .rtf D) .pdf Answer: B 34) Which of the following statements concerning the Windows Recycle Bin is TRUE? A) Files deleted from your flash drive reside in the Recycle Bin. B) You can restore files that have been moved to the Recycle Bin. C) Once a file is moved to the Recycle Bin, the file is automatically and permanently deleted. D) The Recycle Bin is a folder on the A drive. Answer: B 35) If Microsoft Word 2010 is used to create a file, which file extension is added automatically? A) .docf B) .docs C) .docx D) .doc Answer: C 36) Which of the following would be a name of a Microsoft Access document? A) inventory.xlsx B) inventory.bmp C) inventory.wpd

D) inventory.accdb

Answer: D 37) The most essential software in your computer system is the ________. A) productivity software B) antivirus software C) operating system software D) security software Answer: C 38) Which of the following Windows utility programs arranges files on your hard drive in sequential order? A) Disk Defragmenter B) Task Manager C) Error-checking D) Disk Cleanup Answer: A 39) Which of the following types of programs help manage system resources such as the hard drive? A) utility programs B) productivity software C) application programming interfaces D) application software Answer: A 40) The process of replacing repeated patterns of letters in a file with a shorter placeholder is called ________. A) file compression B) file minimization C) file optimization D) file reformatting Answer: A 41) Which of the following is a file compression utility? A) Disk Defragmenter C) Disk Cleanup

B) WinZip D) Windows Explorer

Answer: B

4


42) You can use the Windows ________ to check on a nonresponsive program. A) Backup utility B) Explorer C) System Restore

D) Task Manager

Answer: D 43) In Windows, you can create ________ to reset your system in the case of a malfunction. A) restore points B) a previously saved configuration C) backup points D) backup flash drives Answer: A 44) Mac OS X Snow Leopard includes a backup utility called ________. A) System Restore B) Time Machine C) Auto Backup

D) Time Capsules

Answer: B 45) If you want to automatically defragment your hard drive every week, you can set a predetermined time using the ________. A) Task Calendar. B) Task Scheduler C) Task Mode D) Task Manager Answer: B 46) All of the following can be considered to be network operating systems EXCEPT: A) Linux. B) Microsoft Windows. C) UNIX. D) Symbian OS. Answer: D 47) The ________ is responsible for managing the processor and all other components of the computer system, and is an essential part of the operating system. A) CMOS B) kernel C) BIOS D) processor Answer: B 48) When your computer is in Safe mode, you can use the ________ to view and change the properties of all devices attached to the computer. A) Restore utility B) POST utility C) Device Manager D) Configuration utility Answer: C 49) Some video games require a ________ operating system. A) single-user, multitask C) multiuser

B) single-user, single-task D) real-time

Answer: D 50) Which of the following operating systems is used primarily with mainframes as a network operating system? A) UNIX B) Mac OS C) Windows Vista D) Symbian OS Answer: A 51) XO-1 is the name of the computer being provided by the ________ project. A) DigiKid B) One Laptop per Child C) Computers for All D) IT Beta Answer: B

5


52) The version of Windows 7 that is most appropriate for high-end PC users, gamers, and multimedia professionals is ________. A) Windows 7 Starter B) Windows 7 Professional C) Windows 7 Ultimate D) Windows 7 Home Premium Answer: C 53) The ________ manages the flow of data and information through the computer system by coordinating the hardware, software, user interface, processor, and system memory. A) RAM B) motherboard C) application software D) operating system Answer: D 54) The ________ of the operating system allows the user to communicate with the computer system. A) network adapter card B) modem C) window D) user interface Answer: D 55) A(n) ________ software installation allows you to decide which features you want to install on the hard drive. A) custom B) full C) upgrade D) new Answer: A 56) Which of the following is software that you can use for an unlimited time at no charge? A) freeware B) Internet-based software C) Web-based application software D) alpha version software Answer: A 57) Software that is distributed for free, but often with the condition that you pay for it if you like and intend to use it, is called ________. A) Internet-based software B) beta version software C) shareware D) freeware Answer: C 58) Web-based application software is software that ________. A) does not need an Internet connection B) is installed by the computer manufacturer C) allows you to create Web pages D) is stored completely on a Web server instead of your hard drive Answer: D 59) Which file format enables users to share, view, and print any file as long as they have the appropriate program installed? A) HTTP B) MP3 C) DOC D) PDF Answer: D 60) Adobe Dreamweaver is an example of ________. A) desktop publishing software C) accounting software

B) educational software D) Web page authoring software

Answer: D

6


61) QuarkXPress and Adobe InDesign are examples of ________ software. A) word processing B) video editing C) image editing D) desktop publishing Answer: D 62) QuickBooks and Peachtree are examples of ________. A) educational software C) gaming software

B) accounting software D) course management software

Answer: B 63) The organization responsible for rating computer games is the ________. A) Motion Picture Rating Board B) Entertainment Software Rating Board C) U.S. Gaming Commission D) Entertainment Game Rating Board Answer: B 64) CD ripping refers to ________. A) erasing content on a CD B) creating your own CDs from your MP3 collection C) stealing songs off the Internet D) encoding CDs to MP3 format Answer: D 65) Adobe Premiere Pro and Microsoft Live Movie Maker are examples of ________ software. A) computer-aided design B) digital video editing C) painting D) Web page authoring Answer: B 66) Multimedia software includes all of the following EXCEPT: A) utility software. B) animation software. C) audio editing software. D) image editing software. Answer: A 67) Microsoft Office and Corel WordPerfect Office are examples of ________. A) software suites B) freeware products C) personal information manager applications D) open source products Answer: A 68) Which type of software lets you dictate letters, e-mails, and voice commands? A) word processing software B) audio editing software C) speech recognition software D) content-delivery software Answer: C 69) Which type of software is used to make a slide show? A) system software C) spreadsheet software

B) word processing software D) presentation software

Answer: D 70) In a spreadsheet, the columns and rows form individual boxes called ________. A) addresses B) intersects C) cells Answer: C 7

D) worksheets


71) Software you can use to create a budget is called ________. A) spreadsheet software B) utility software C) word processing software D) graphics software Answer: A 72) Microsoft Word and OpenOffice.org Writer are examples of ________. A) system software B) utility software C) graphic software D) word processing software Answer: D 73) Software that lets you do tasks at home, school, and work is called ________. A) utility software B) system software C) application software D) reference software Answer: C 74) System software does all of the following EXCEPT ________. A) help run the computer B) add graphics and pictures to files C) help manage system resources D) coordinate instructions between application software and the computer's hardware devices Answer: B 75) Which protocol allows users to share files that reside on local computers with remote computers? A) TCP B) FTP C) UDP D) HTTP Answer: B 76) The majority of Internet communications follow the ________ model of network communications. A) circuit switching B) information exchange C) peer-to-peer D) client/server Answer: D 77) The main paths of the Internet along which data travels the fastest are known collectively as the Internet ________. A) highway B) mainline C) backbone D) spine Answer: C 78) ________ is a consortium of member organizations that develops Web protocols. A) IETF B) W3C C) ISOC

D) ICANN

Answer: B 79) ________ is the main suite of protocols used on the Internet. A) TCP/IP B) FTP C) UDP

D) SMTP

Answer: A 80) The ________ requires companies to provide mechanisms for employees and third parties to anonymously report complaints, including ethics violations. A) Internet Act B) Dyson Act C) Sarbanes—Oxley Act D) Clinton Act Answer: C

8


81) All of the following are types of cyberbullying EXCEPT: A) infecting the victim's computer with malware usually to spy on them. B) calling a co-worker to schedule a meeting. C) spreading rumors or lies on social networking sites. D) posting embarrassing photos or videos on the Web. Answer: B 82) Intellectual property (such as music, writing, and software) is protected through ________ law. A) personal privacy B) social justice C) censorship D) copyright Answer: D 83) Social media sites are about sharing information. The use of this information can raise questions regarding ________. A) social justice B) fair use C) free speech D) personal privacy Answer: D 84) HTTP is the abbreviation for ________. A) hypertext transfer protocol C) hypertext protocol

B) hyper transmission protocol D) hypertext transmission protocol

Answer: A 85) The text version of a Web site's Internet address is called the ________. A) home page B) Uniform Resource Locator (URL) C) protocol D) IP address Answer: B 86) The "s" in https stands for ________. A) shop secure layer C) secure socket logon

B) safety secured logon D) secure socket layer

Answer: D 87) E-commerce that involves businesses buying and selling goods and services to other businesses is called ________. A) click-and-brick business B) C2C C) B2B D) B2C Answer: C 88) ________ is a social networking service that enables you to exchange short text messages with your friends or "followers." A) Facebook B) Yahoo! Text C) Twitter D) MySpace Answer: C 89) Facebook and MySpace are considered to be ________. A) phishing Web sites C) e-commerce Web sites

B) business-to-business Web sites D) social networking Web sites

Answer: D

9


90) Podcasts use which of the following technologies? A) Vlog B) an open source software application for 3D modeling C) MSN Messenger D) RSS Answer: D 91) Which of the following are personal video journal entries posted on the Web? A) vlogs B) blogs C) podcasts

D) newsgroups

Answer: A 92) If you wanted to keep a written online journal, you would use ________. A) a podcast B) a weblog C) e-mail

D) a listserv

Answer: B 93) Web 2.0 describes ________. A) the newest netiquette rules for group communication B) the newest Web browser on the market C) the newest Web development language D) a trend of new Web applications that combine the functionality of multiple applications Answer: D 94) Instant messaging (IM) services are programs that enable you to ________. A) broadcast over the Internet using compressed audio files such as MP3s B) send, receive, and edit files C) communicate in real time with others who are online D) post journal entries on the Web Answer: C 95) All of the following are ways to communicate on the Internet EXCEPT: A) e-mail. B) hyperlinks. C) social networks.

D) blogs.

Answer: B 96) The World Wide Web was invented by ________. A) Microsoft C) Apple

B) Tim Berners-Lee at CERN D) the same people who invented the Internet

Answer: B 97) The concept of the Internet developed from ________. A) the desire to create portable music C) the need for electronic mail

B) the Cold War crisis D) the need to digitize both audio and video

Answer: B 98) The Internet is ________. A) the same as the Web B) a large network of networks C) a communication system for the U.S. government D) an internal communication system for a business Answer: B

10


99) Large, expensive computers that support hundreds of users simultaneously are called ________. A) powercomputers B) supercomputers C) mainframes D) maxicomputers Answer: C 100) ________ is the place in a computer where the programs and data the computer is currently using are stored. A) ROM B) RAM C) The power supply D) The CPU Answer: B 101) RAM is considered volatile storage, which means it is ________. A) random B) permanent C) temporary

D) read-only

Answer: C 102) ________ is a form of permanent memory that holds all the instructions the computer needs to start up. A) The CPU B) The NIC C) RAM D) ROM Answer: D 103) A ________ enables your computer to connect to other computers or to the Internet. A) video card B) controller card C) network interface card (NIC) D) sound card Answer: C 104) The ________ port resembles a standard phone jack. A) serial B) peripheral

C) modem

D) FireWire

Answer: C 105) The S-video and the ________ ports on a computer facilitate connecting the computer to multimedia devices such as TVs and DVD players. A) parallel B) USB C) DVI D) AVI Answer: C 106) USB ports are fast replacing traditional ________ ports because of their ability to transfer data quickly. A) video and audio B) monitor and modem C) parallel and serial D) Ethernet and speaker Answer: C 107) ________ ports are now the most common ports for connecting input and output devices to the computer. A) FireWire B) Serial C) Parallel D) Universal serial bus (USB) Answer: D 108) A(n) ________ is where a peripheral device can attach to a computer so that data can be exchanged between it and the operating system. A) port B) expansion bus C) drive D) slot Answer: A 109) Flash drives plug into a(n) ________. A) USB port B) serial port

C) drive bay

Answer: A

11

D) expansion slot


110) ________ are large printers used to produce oversize pictures that require precise continuous lines, such as maps and architectural plans. A) Plotters B) Dot-matrix printers C) Multifunction printers D) Thermal printers Answer: A 111) Monitor screen grids are made up of millions of pixels, with each pixel containing ________ subpixels of colors. A) six B) three C) five D) two Answer: B 112) The small, touch-sensitive area at the base of the keyboard on a notebook computer is known as a ________. A) touch pad B) trackball C) game control D) stylus Answer: A 113) ________ are shortcut keys that you press to perform special tasks; each software application has its own set of tasks assigned to these keys. A) Windows keys B) Control (Ctrl) keys C) Alt keys D) Function keys Answer: D 114) A(n) ________ is a device that looks like a skinny pen but has no ink. A) pointer B) joystick C) stylus

D) e-pen

Answer: C 115) Which of the following is an example of an input device? A) a scanner B) a CD

C) a speaker

D) a printer

Answer: A 116) All the following are examples of input devices EXCEPT a ________. A) keyboard B) scanner C) mouse

D) printer

Answer: D 117) Devices such as monitors and printers that are connected to the computer are called ________. A) processing devices B) system devices C) input devices D) peripheral devices Answer: D 118) ________ computers are specially designed computer chips that reside inside other devices such as your car or the electronic thermostat in your home. A) Internal B) Mainframe C) Embedded D) Desktop Answer: C 119) The ________ contains the central electronic components of the computer. A) motherboard B) system unit C) input unit

D) peripheral unit

Answer: A 120) Any computer parts that you can actually touch are considered to be ________. A) hardware B) platforms C) systems Answer: A

12

D) software


121) ________ software is the set of programs that enables the computer's hardware devices and application software to work together. A) System B) Binary C) Application D) Utility Answer: A 122) A ________ is approximately 1 million bytes. A) terabyte B) kilobyte

C) gigabyte

D) megabyte

C) megabyte

D) gigabyte

Answer: D 123) A ________ is approximately 1 billion bytes. A) bit B) kilobyte Answer: D 124) ________ is the set of computer programs that enables the hardware to perform different tasks. A) Binary data B) Hardware C) Software D) Data Answer: C 125) Computers process data into information by working exclusively with ________. A) multimedia B) numbers C) characters

D) words

Answer: B 126) In binary language, each letter of the alphabet, each number, and each special character is made up of a unique combination of A) eight characters. B) eight bits. C) eight kilobytes. D) eight bytes. Answer: B 127) The term "bit" is short for ________. A) binary digit B) binary number

C) binary language

D) megabyte

Answer: A 128) ________ binary digits (or bits) combine to create one byte. A) Two B) Eight C) Ten

D) Sixteen

Answer: B 129) The ________ language consists of just two digits: 0 and 1. A) base 10 B) binary

C) application

D) data processing

Answer: B 130) After a picture has been taken with a digital camera and processed appropriately, the actual print of the picture is considered ________. A) data B) output C) a process D) input Answer: B 131) Computers gather data, which means that they allow users to ________ data. A) output B) input C) present Answer: B

13

D) store


132) Which of the following do today's educators NOT need to be familiar with to create constructive computerized lessons and to interact with students? A) programs like Moodle or Blackboard B) computers C) the Internet D) Web authoring software Answer: D 133) ________ is data that has been organized or presented in a meaningful fashion. A) A character B) A number C) A symbol

D) Information

Answer: D 134) Which of the following allowed users to interact with the computer more easily? A) word processing software B) the Internet C) operating systems D) the graphical user interface Answer: D 135) One of the reasons the Apple II computer was popular was that ________. A) it had a hard drive B) it had a mouse input device C) it was inexpensive D) the operating system instructions were stored in ROM Answer: D 136) A ________ is a special device that is installed in your computer and allows it to communicate with other devices on the network. A) network adapter B) digital media adapter C) modem D) media center extender Answer: A 137) Children who do not have access to ________ and ________ won't be prepared for future employment. A) the Internet, computers B) television, video games C) information, data D) databases, data mining Answer: A 138) ________ tags, when placed on an animal, can be used to record and track in a database all of the animal's movements. A) GPS B) PPS C) POS D) RFID Answer: D 139) ________ is the application of computer systems and techniques to gather potential legal evidence. A) Data mining processes B) Computer forensics C) Information gathering D) POS skills Answer: B 140) To set up a(n) ________, you must have an appropriate computer and digital devices connected to a home network. A) digital entertainment center B) e-business C) Web site D) digital home Answer: D

14


141) When a job is sent to other countries, as many programming jobs have been, it is said to have been ________. A) exported B) resourced C) imported D) offshored Answer: D 142) The process of searching huge amounts of data with the hope of finding a pattern is called ________. A) data warehousing B) data searching C) data retrieval D) data mining Answer: D 143) ________ is a type of wireless communication that transmits data through radio waves. A) POS technology B) Bluetooth technology C) Nanotechnology D) USB technology Answer: B

15


Turn static files into dynamic content formats.

Create a flipbook
Issuu converts static files into: digital portfolios, online yearbooks, online catalogs, digital photo albums and more. Sign up and create your flipbook.