CGS Quiz 4-6 Exam 2
A 64-bit-word computer can access 8 bytes at a time. A. True B. False
A
Integrated circuits typically are mounted on ________, which are then plugged into the system board. A. slots B. ports C. chip carriers D. pins
C
Laptops typically use ________ that are typically located outside the system unit. A. power supply units B. MiniDC C. AC adapters D. batteries
C
A ________ is the number of bits that can be accessed at one time by the CPU. A. word B. pulse width C. character D. bit rate
A
A computer can become infected with viruses in all the following ways, except by ________. A. creating a new folder on your computer B. downloading software from the Internet C. downloading files from the Web D. opening attachments to e-mail messages
A
A(n) ________-bit-word computer can access eight bytes of information at a time. A. 64 B. 256 C. 128 D. 512
A
All the following are commonly used units of measurement to describe memory capacity, except ________. A. nanobyte (NB) B. gigabyte (GB) C. megabyte (MB) D. terabyte (TB)
A
Antivirus programs guard your computer system against viruses or other damaging programs that can invade your computer system. A. True B. False
A
Cables are used to connect exterior devices to the system unit via the ports. One end of the cable is attached to the device, and the other end has a connector that is attached to a matching connector on the port. A. True B. False
A
Computers require direct current (DC) to power their electronic components and to represent data and instructions. A. True B. False
A
Desktop computers have a(n) ________ unit, located within the system unit, that plugs into a standard wall outlet, converts AC to DC, and provides the power to drive all the system unit components. A. power supply B. batter C. bus D. miniDC
A
Handwriting recognition software translates handwritten notes into a form that the system unit can process. A. True B. False
A
In a network environment, the network server computer coordinates all communications between the other computers. A. True B. False
A
In a virtualized environment, the operating system of each virtual machine is known as the ________ operating system. A. guest B. home C. client D. host
A
In many application programs, this feature is used to provide information or request input. A. Dialog boxes B. Windows C. Menus D. Pointer
A
Linux is a popular and powerful alternative to the Windows operating system. A. True B. False
A
Many operating systems now include voice assist tools that allow a user to directly issue commands. A. True B. False
A
MiniDP ports are an audiovisual port typically used to connect large monitors. A. True B. False
A
RAM is considered temporary, or volatile, storage. A. True B. False
A
Robots use cameras, microphones, and other sensors as inputs; outputs can be as complex as exploring damaged nuclear reactors to as simple as taking a photo. A. True B. False
A
The ________, also known as the system chassis, is a container that houses most of the electronic components that make up a computer system. A. system unit B. microprocessor C. CPU D. ALU
A
The most widely used character encoding standard today is ________. A. Unicode B. EBCDIC C. CISC D. ASCII
A
The mouse, game controllers, and touch screens are all types of ________ devices. A. pointing B. ethernet C. MIDI D. bus
A
The operating system is often referred to as the software platform A. True B. False
A
The system unit, also known as the system chassis, is a container that houses most of the electronic components that make up a computer system. A. True B. False
A
There are several ways in which you can "catch" a computer virus. A. True B. False
A
This character encoding scheme allows non-English characters and special characters to be represented. A. Unicode B. ANSIC C. EBCDIC D. ASCII
A
VGA and DVI ports provide connections to monitors. A. True B. False
A
Which of the following is a popular mobile operating system? A. Android B. Windows 10 Mobile C. Linux D. UNIX
A
Which of the following is not a popular desktop operating system? A. Android B. Linux C. Windows 10 D. macOS X
A
________ are specialized digital video cameras that capture images and send them to a computer for broadcast over the Internet. A. Webcams B. Stylus C. RFIDs D. Pods
A
________ cards are used to connect a computer to a network. A. Network adapter B. Battery C. AC adapter D. MiniDC
A
A magnetic card reader does not require the card to actually make contact with the reader. A. True B. False
B
A touch screen is classified as a special type of scanning device. A. True B. False
B
ASCII supports languages such as Chinese and Japanese. A. True B. False
B
Antivirus programs, backup programs, and virtual assistants are all examples of ________ programs. A. operating system B. utility C. language translator D. device driver
B
Backup programs can identify and remove unused files and applications. A. True B. False
B
Based on the macOS, Android is designed for Apple's iPhone and iPad. A. True B. False
B
Because macOS X market share is so large, more application programs are developed to run under macOS X than any other operating system. A. True B. False
B
Cell phones generally include a network operating system. A. True B. False
B
For multicore processors to be used effectively, computers must understand how to divide tasks into parts that can be distributed across each core—an operation called ________. A. arithmetic-logic processing B. parallel processing C. multiplexer processing D. graphics coprocessing
B
Graphics cards connect the system board to secondary storage. A. True B. False
B
Parallel processing requires a computer to perform one complete task before beginning the next task. A. True B. False
B
Programs such as word processors and spreadsheets are known as utilities. A. True B. False
B
System software cannot handle technical details without user intervention. A. True B. False
B
The ALU tells the rest of the computer system how to carry out a program's instructions. A. True B. False
B
The number of bits that can travel simultaneously down a bus is known as the word size. A. True B. False
B
These types of ports typically provide high-definition video and audio, making it possible to use a computer as a video jukebox or an HD video recorder. A. Thunderbolt B. HDMI C. Ethernet D. Firewire
B
This penlike device typically used with tablets and mobile devices. A. Mechanical pencil B. Stylus C. Game controller D. Multitouch device
B
This type of computer is very similar to cell phones, although it is larger, heavier, and generally more powerful. A. Desktop B. Tablet C. Laptop D. Smartphone
B
Two categories of laser printers are ________. A. ink-jet and high definition B. personal and shared C. active-matrix and passive-matrix D. thermal and personal
B
Unmanned aerial vehicles (UAV) are too expensive for anything but military budgets. A. True B. False
B
Utility suites come with one program only. A. True B. False
B
Virtual memory is stored on a RAM chip. A. True B. False
B
Virtual reality (VR) strives to create a virtual or ________ experience by using specialized hardware that includes headgear and gloves. A. duplicate B. immersive C. internet D. ethernet
B
With these systems, input and output devices are located outside the system unit. A. Personal digital assistants B. Desktop systems C. Smartphones D. Laptop computers
B
________ is any data or instructions that are entered into a computer. A. Output B. Input C. Digital D. Information
B
________ memory improves processing by acting as a temporary high-speed holding area between the memory and the CPU. A. Virtual B. Cache C. Read only D. Flash
B
________ printers are printers connected to the Internet that provide printing services to others on the Internet. A. Dot-matrix B. Cloud C. Thermal D. Laser
B
________ printers are widely used with ATMs. A. Laser B. Thermal C. Cloud D. Dot-matrix
B
A keyboard key, like Caps Lock, that turns a feature on or off is called a ________ key. A. function B. power C. toggle D. combination
C
Pathways that support communication among the various electronic components on the system board are called ________. A. logic paths B. gate ways C. bus lines D. network lines
C
The arrangement of keys on a keyboard, QWERTY reflects the keyboard layout by ________. A. using the alphabetic characters most frequently used on the keyboard B. representing the phonetics of the alphabets most closely associated with the keyboard C. taking the letters of the first six alphabetic characters found on the top row of keys D. using the letters of the alphabetic characters that are closest to access while typing
C
The processing speed of a microprocessor is typically represented by its ________. A. ALU B. control unit C. clock speed D. bus line
C
This operating system is designed to run only with Apple computers. A. Linux B. Windows C. macOS D. UNIX
C
This type of embedded operating system is used by cell phones. A. Network B. Stand-alone C. Mobile D. Desktop
C
When you reboot your system, the computer follows start-up instructions stored in this type of memory. A. DRAM B. Cache C. Flash D. SDRAM
C
Which of the following is not a character encoding standard? A. Unicode B. EBCDIC C. CISC D. ASCII
C
Which of the following offers a combination of the features of RAM and ROM? A. Cache Memory B. DDR C. Flash Memory D. DRAM
C
Which of the following ports is the port found on most laptops and desktops? A. Firewire B. Thunderbolt C. USB-A D. MiniDP
C
________ allow a single computer to run two or more operations at the same time. A. Parallel processors B. Coprocessors C. Multicore processors D. Graphics processors
C
________ are specialized programs designed to make computing easier. A. Device drivers B. Language translators C. Utilities D. Virtualization assistants
C
________ operating systems are used to control and coordinate computers that are linked together. A. Real-time B. Embedded C. Network D. Stand-alone
C
________ ports are the standard high-speed networking ports for many of today's computers. A. ASCII B. Bus C. Ethernet D. Specialized
C
________ recognition is often used to score standardized multiple-choice tests. A. Magnetic ink character B. Radio frequency C. Optical-mark D. Optical-character
C
For multicore processors to be used effectively, computers must understand how to divide tasks into parts that can be distributed across each core—an operation called ________. A. graphics coprocessing B. arithmetic-logic processing C. multiplexer processing D. parallel processing
D
Most ________ are accompanied by several common utility programs, including a search program, a storage management program, and a backup program. A. Servers B. Virtual assistants C. Virtual machines D. Operating systems
D
Most ________ are accompanied by several common utility programs, including a search program, a storage management program, and a backup program. A. virtual assistants B. virtual machines C. servers D. operating systems
D
Most operating systems support the ability to switch between different applications. This is called ________. A. driving B. translating C. booting D. multitasking
D
The ________ is often referred to as the software environment or software platform. A. language translator B. device driver C. utility software D. operating system
D
The category of operating system used for handheld devices. A. Stand-alone B. Open source C. Network D. Embedded
D
The number of bits that can travel simultaneously down a bus is known as the bus ________. A. lines B. length C. expandability D. width
D
The proportional relationship between a display's width and height. A. Clock speed B. Resolution C. Dot pitch D. Aspect ratio
D
This system software is responsible for managing your computer's resources including memory, processing, and storage. A. Language translator B. Utility C. Device driver D. Operating system
D
This version of UNIX is an open source operating system that is an alternative to Windows. A. High Sierra B. Sierra C. Lion D. Linux
D
Troubleshooting or ________ programs recognize and correct problems. A. backup B. virtualization C. virtual assistant D. diagnostic
D
Type of keyboard that uses a touch screen as the input device. A. Wireless B. Traditional C. PDA D. Virtual
D
What kind of specialized monitor is used for cell phones with screens that wrap around the edges of the phone and for curved monitors whose edges wrap toward the viewer? A. Flat-panel monitor B. Digital projector C. Interactive whiteboard D. Flexible screens
D
When a single physical computer run this type of software, it operates as though it were two or more separate and independent computers. A. File compression B. Backup C. Troubleshooting D. Virtualization
D
Which of the following can be used to connect several devices to the system unit and are widely used to connect keyboards, mice, printers, storage devices, and a variety of specialty devices? A. Firewire bus B. SATA C. Parallel port D. USB port
D
With this type of memory, large programs are divided into parts and the parts are stored on a secondary device, usually a hard disk. A. Flash B. Extended C. Cache D. Virtual
D
________ allow computers to be connected without cables. A. Sound cards B. Ports C. Expansion slots D. Wireless network cards
D
________ are graphic representations for a program, type of file, or function. A. Drivers B. Sectors C. Pixels D. Icons
D
________ are special-purpose printers that use output from graphics tablets or other graphical input devices that are typically found in architectural and engineering environments. A. Thermal printers B. Dot-matrix C. Laser printers D. Plotters
D
________ buses connect the CPU to memory on the system board. A. Firewire B. SATA C. Parallel D. System
D
________ operations consist of making comparisons. A. Specialty B. Microprocessor C. Multicore D. Logical
D
________ ports are audiovisual ports typically used to connect large monitors. These ports are used with many Apple Macintosh computers. A. FireWire B. Thunderbolt C. Ethernet D. MiniDP
D
________ ports provide high-speed connections for up to seven separate devices connected one to another. A. Ethernet B. FireWire C. USB-B D. Thunderbolt
D
________ printers use a technology similar to that used in a photocopying machine. A. Cloud B. Dot-matrix C. Thermal D. Laser
D
________ programs guard your computer system against viruses or other damaging programs that can invade your computer system. A. Search B. Backup C. Troubleshooting D. Antivirus
D