Chapter 2: "TECHNOLOGY ESSENTIALS"
The Internet is currently using IPv4. What is the next version that will be employed? a) IPv6 b) IPv4.1 c) IPv5 d) None of the above
Answer: a
__________ is a communications service that allows users to communicate in real time over the Internet. a) Instant Messaging b) Blackberry Messaging c) Skype d) WebEx
Answer: a
___________________ is ensuring that data is available to those who need it, when they need it. a) Availability b) Integrity c) Confidentiality d) Disaster recovery e) None of the above
Answer: a
____ contains instructions and data that only special devices can alter. a) ROM b) RAM c) KB d) GB e) None of the above
Answer: a Difficulty: Difficult
_____ is the primary language for creating web pages. a) HTML b) JavaScript c) Ajax d) C+
Answer: a Difficulty: Difficult
A _____ connects, translates, and then directs data that cross between two networks. a) Router b) Hub c) Repeater d) Bridge
Answer: a Difficulty: Easy
Software tools that help individuals and teams keep up with their scheduled meetings, monitor projects, and share work files are known as: a) Groupware b) Microsoft Groove c) SharePoint d) Blackboard
Answer: a Difficulty: Easy
____ is a method of publishing audio programs via the Internet that allows users of just about any digital audio device to download broadcasts or to subscribe to a feed of new files (usually MP3s). a) Podcasting b) Blogging c) Vlogging d) Broadcasting
Answer: a Difficulty: Easy
_____ move around from site to site reading meta tags, and then report the data back to their database for storage. a) Spiders b) Metasearch engines c) Crabs d) Web browsers
Answer: a Difficulty: Easy
Another term for Crawlers is: a) Spiders b) Metasearch c) Crabs d) Queries
Answer: a Difficulty: Medium
HTTP lives at the ____ layer of networks. a) Application b) Presentation c) Network d) Data Link e) None of the above
Answer: a Difficulty: Medium
Who is known as the inventor of the World Wide Web? a) Tim Berners-Lee b) Bill Gates c) Steve Jobs d) Thomas L. Friedman e) None of the above
Answer: a Difficulty: Medium
_____ software provides additional tools that you can use to maintain and service your system a) Utility b) Driver c) Operating System d) Application e) None of the above
Answer: a Difficulty: Medium
Servers are often assigned a specific task, such as handling Web traffic. What is this type of server called? a) Web server b) Application server c) Gateway server d) Firewall server
Answer: a Difficulty: Difficult
Network connection hardware includes all of the following components except: a) Phone lines b) NIC c) Modems d) Cable modems e) Wireless cards
Answer: a Difficulty: Easy
The use of malicious code as part of a subversive, organized scheme is called: a) Malware b) Scareware c) Virus d) Worm
Answer: a Difficulty: Medium
A ____ is also known as a concentrator: a) Router b) Hub c) Repeater d) Bridge
Answer: b
Computer monitors, printers, speakers, and MP3 players are examples of: a) Input devices b) Output devices c) Processing devices d) Storage devices e) None of the above
Answer: b Difficulty: Easy
Examples of _____ include the computer hard drive, CDs, DVDs, USB flash memory, and external hard drives a) Input devices b) Output devices c) Processing devices d) Storage devices e) None of the above
Answer: b Difficulty: Easy
ISP stands for: a) Internet supply provider b) Internet service provider c) Internet server provider d) Internet support provider
Answer: b Difficulty: Easy
Microsoft Excel is an example of: a) Document preparation software b) Electronic spreadsheet software c) Presentation graphics software d) Database management system e) None of the above
Answer: b Difficulty: Easy
Unsolicited and undesired emails are called: a) Junk b) Spam c) DoS d) Phishing
Answer: b Difficulty: Easy
__________ temporarily locates data and instructions before processing. a) Processing b) Memory c) Input d) Output e) Storage
Answer: b Difficulty: Easy
A computer network consists of _____ that represent computer hardware: a) Communications b) Nodes c) Ports d) None of the above
Answer: b Difficulty: Medium
A type of malware designed to trick victims into purchasing and downloading useless and potentially dangerous software is called: a) Malware b) Scareware c) Virus d) Worm
Answer: b Difficulty: Medium
A(n) ____ application is an example of utility software that helps guard your computer against unauthorized access when connected to a network. a) Driver b) Firewall c) Anti-virus d) Malware
Answer: b Difficulty: Medium
Clock speed on a computer is measured most recently in: a) Megahertz (MHz) b) Gigahertz (GHz) c) Megabytes (MB) d) Gigabytes (GB) e) None of the above
Answer: b Difficulty: Medium
Modem speed is measured in: a) PPM b) BPS c) RPM d) None of the above
Answer: b Difficulty: Medium
A(n) ____ is a set of services for distributing private information throughout an organization using a collection of private computer networks brought together to form an organization-wide, private network. a) Internet b) Extranet c) Intranet d) None of the above
Answer: c Difficulty: Difficult
A ____________ operates over a large geographic area, and shares data, information, and resources among units of an organization distant from one another. a) PAN b) MAN c) WAN d) LAN e) None of the above
Answer: c Difficulty: Easy
Benefits of using a GDT are all but one of the following: a) People can work from any place and at any time. b) Organizations can recruit the best people regardless of their physical location. c) Travel and sometimes facilities expenses are increased. d) There is greater flexibility for workers.
Answer: c Difficulty: Easy
You can think about _____ as information that specifies how a hardware device should work with other data, information, and knowledge: a) Instructions b) Operating systems c) Software d) Drivers
Answer: c Difficulty: Easy
_____ software is software that can be used, modified, improved, and redistributed. a) Utility software b) Middleware c) Open source d) Drivers
Answer: c Difficulty: Easy
A ______ is a standard set of rules that allows the communication of data between nodes on a network. a) Moral b) Code c) Protocol d) Ethic
Answer: c Difficulty: Medium
A program that is able to copy itself and infect a computer is called: a) Malware b) Scareware c) Virus d) Worm
Answer: c Difficulty: Medium
A ____ is a group of people who work across geographic distance. a) Dispersed team b) Localized team c) Dedicated team d) Virtual team
Answer: d Difficulty: Medium
A ___________________ allows an organization to resume operations after a major event that interrupts normal business processes. a) Availability b) Integrity c) Confidentiality d) Disaster recovery plan e) None of the above
Answer: d Difficulty: Medium
A business _____________ plan addresses other aspects of resuming business operations, including loss and personnel recovery. a) Availability b) Integrity c) Confidentiality d) Continuity e) None of the above
Answer: d Difficulty: Medium
The Internet uses: a) TCP/IP suite of packet switching protocols b) Number of routers connecting points throughout the world c) Proprietary set of rules d) A and B e) B and C
Answer: d Difficulty: Medium
Which of the following is the most commonly known type of cloud computing? a) PaaS b) PAS c) ASP d) SaaS e) None of the above
Answer: d Difficulty: Medium
A computer network requires four primary components. Which of the following is NOT one of them? a) Data that computers share on the network b) Special hardware c) Software that allows computers to communicate d) Communication media to link the computers together e) None of the above
Answer: e Difficulty: Medium
An example of a Personal Information Management system is: a) Microsoft Word b) Microsoft Excel c) Microsoft PowerPoint d) Microsoft Access e) None of the above
Answer: e Difficulty: Medium
The Internet is sometimes known as a ____area network: a) Personal b) Local c) Wide d) Municipal e) None of the above
Answer: e Difficulty: Medium
A plotter is: a) A printer b) A scanner c) Special architectural hardware d) None of the above
Answer: a Difficulty: Easy
Computers have long-term memory called: a) ROM b) RAM c) KB d) GB e) None of the above
Answer: a Difficulty: Easy
Higher clock speeds usually mean ________ performance. a) Faster b) Slower c) Worse d) Better
Answer: a Difficulty: Easy
Keyboards, pointing devices (such as a Wii, mouse, or touchpad), scanners, and digital cameras are examples of: a) Input devices b) Output devices c) Processing devices d) Storage devices e) None of the above
Answer: a Difficulty: Easy
Microsoft Word is an example of: a) Document preparation software b) Electronic spreadsheet software c) Presentation graphics software d) Database management system e) None of the above
Answer: a Difficulty: Easy
Static web page file will typically hold a combination of text content and ____ commands. a) HTML b) JavaScript c) Ajax d) C+
Answer: a Difficulty: Easy
The digital signals going out from your computer into an analog signal appropriate for the connection medium used is called: a) Modulation b) Demodulation c) Conversion d) None of the above
Answer: a Difficulty: Easy
Today, the fastest-growing network is arguably our global computer network, known as the: a) Internet b) Extranet c) Intranet d) None of the above
Answer: a Difficulty: Easy
___ is the popular name for 802.11 standards for wireless network access. a) Wi-Fi b) VoIP c) Cloud d) TCP/IP
Answer: a Difficulty: Easy
_____ temporarily locates data and instructions before processing. a) Memory b) The CPU c) The keyboard d) The mouse e) None of the above
Answer: a Difficulty: Easy
A ____ sends out a search query to other search engines, and then returns the list to you. a) Metasearch engine b) Spiders c) SQL d) Crawlers
Answer: a Difficulty: Medium
A ________________ covers a very small space that ranges from the size of a human body to a small office . a) PAN b) MAN c) WAN d) LAN e) None of the above
Answer: a Difficulty: Medium
A chalk mark on the side of a building put there by a hacker indicating an open network is available inside is called: a) Warchalking b) Chalktagging c) Chalking d) Chalkmarking
Answer: a Difficulty: Medium
A(n) _______________________ performs processor- intensive computations using parallel processing. a) Supercomputer b) Mainframe c) Server farm d) Embedded processor e) None of the above
Answer: a Difficulty: Medium
A ____ serves as a central connection point for cables from the devices on the network. a) Router b) Hub c) Repeater d) Bridge
Answer: b Difficulty: Difficult
_____ is/are software that is more common in enterprises. Its purpose is to link applications that use dissimilar software or hardware platform. a) Utility software b) Middleware c) Open source software d) Drivers
Answer: b Difficulty: Difficult
A ____ area network is within the immediate location or building. a) Personal b) Local c) Wide d) Municipal e) None of the above
Answer: b Difficulty: Easy
A _____ is a software application that allows you to easily navigate the Web and view the content you find there. a) Web Server b) Web browser c) Search engine d) None of the above
Answer: b Difficulty: Easy
Servers are often assigned a specific task, such as running programs. What is this type of server called? a) Web server b) Application server c) Gateway server d) Firewall server
Answer: b Difficulty: Easy
The Internet and the World Wide Web use which protocol to transmit messages? a) HTTP b) TCPIP c) HTML d) URL e) None of the above
Answer: b Difficulty: Easy
The _____ software coordinates and handles the details of working with the computer hardware. a) Instruction b) Operating system c) Driver d) Utility
Answer: b Difficulty: Easy
Converting an analog signal back into a digital signal that your computer can recognize is called: a) Modulation b) Demodulation c) Conversion d) None of the above
Answer: b Difficulty: Medium
Processing, memory, and storage are three components of: a) Information technology b) Basic hardware c) Networking components d) None of the above e) All of the above
Answer: b Difficulty: Medium
Which of the following carries out many of the organizational processing needs using high-speed processing chips and large amounts of memory? a) Supercomputer b) Mainframe c) Server farm d) Embedded processor e) None of the above
Answer: b Difficulty: Medium
Which of the following operates within the immediate location or building, and shares files, resources, servers, and other hardware among the members of an organization? a) PAN b) MAN c) WAN d) LAN e) None of the above
Answer: b Difficulty: Medium
_____ uses the Internet's foundation technologies of packet switching and TCP/IP to carry voice instead of data. a) Wi-Fi b) VoIP c) Cloud d) TCP/IP
Answer: b Difficulty: Medium
_____________ is ensuring that data is not changed and represents the original secure data. a) Availability b) Integrity c) Confidentiality d) Disaster recovery e) None of the above
Answer: b Difficulty: Medium
____ stores data only until they are no longer needed, or until you shut down the computer. a) ROM b) RAM c) KB d) GB e) None of the above
Answer: b Difficulty: Easy
A(n) _______________________ allows multiple servers to handle network processing activities. a) Supercomputer b) Mainframe c) Server farm d) Embedded processor e) None of the above
Answer: c Difficulty: Difficult
Network traffic hardware includes all of the following except: a) Routers b) Bridges c) Hard drives d) Repeaters e) Hubs
Answer: c Difficulty: Difficult
____ computing simply means computing over the Internet. a) Wi-Fi b) VoIP c) Cloud d) TCP/IP
Answer: c Difficulty: Difficult
A flash memory stick is an example of: a) Input b) Output c) Storage d) Network e) Scanner
Answer: c Difficulty: Easy
An attempt to make a website unavailable to its users by sending the target so many communication requests that its server eventually goes down is called: a) Junk b) Spam c) DoS d) Phishing
Answer: c Difficulty: Easy
PDA stands for: a) Professional digital assistant b) Programming digital assistant c) Personal digital assistant d) Portable digital assistant
Answer: c Difficulty: Easy
ROM stands for: a) Read only management b) Random only management c) Read only memory d) Random only memory
Answer: c Difficulty: Easy
The _____ you type into your browser can also be called a Web address: a) HTTP b) HTML c) URL d) XML e) None of the above
Answer: c Difficulty: Easy
The hardware location that temporarily stores data and instructions is: a) USB key b) ROM c) RAM d) Hard drive
Answer: c Difficulty: Easy
A ______ is sometimes needed to strengthen or amplify signals that are sent along a long transmission route. a) Router b) Hub c) Repeater d) Bridge
Answer: c Difficulty: Medium
BPS stands for: a) Bytes per second b) Blips per second c) Bits per second d) Beeps per second
Answer: c Difficulty: Medium
POTS stands for: a) plain original telephone system b) plain original telecom system c) plain old telephone system d) plain old telecom system
Answer: c Difficulty: Medium
Software can be defined as: a) Something that is controlled by the hardware b) Something that comes with the computer itself c) A collection of instructions that in IT device executes d) Games and productive programs
Answer: c Difficulty: Medium
The ____ comprises the set of rules for exchanging messages on the World Wide Web. a) FTP b) XML c) HTTP d) TCP/IP
Answer: c Difficulty: Medium
Wi-Fi is the popular name for the _______ standards for wireless network access. a) 802.1 b) 802.1a c) 802.11 d) 802.11a
Answer: c Difficulty: Medium
__________ is an online technology company that develops and delivers software tools on the Internet. Payment for the service is often based on fees or subscriptions. a) PaaS b) PAS c) ASP d) SaaS e) None of the above
Answer: c Difficulty: Medium
___________________ is the ability to hide information from unauthorized viewing. a) Availability b) Integrity c) Confidentiality d) Disaster recovery e) None of the above
Answer: c Difficulty: Medium
Which of the following is a true statement about the Internet? a) A wireless device cannot be used to connect to the Internet. b) The Internet and the World Wide Web are interchangeable terms. c) The Internet was discovered by Al Gore. d) Home users require an ISP to connect to the Internet. e) Dial-up and broadband provide faster access to the Internet.
Answer: c Difficulty: Medium
One purpose, now commonplace, is the use of _______________ to make calls anywhere in the world and bypass traditional switched telephone networks. a) VoIT b) ViOT c) ViOp d) VoIP e) None of the above
Answer: d Difficulty: Difficult
To ensure that your password is and remains as strong as possible, you should follow all of these guidelines EXCEPT: a) Use at least eight characters. b) Include digits, punctuation, and non-printing characters. c) Use both upper- and lowercase characters. d) Use the same passwords on different accounts. e) Change your password regularly and don't reuse passwords or make minor variations such as incrementing a digit
Answer: d Difficulty: Difficult
Microsoft Access is an example of: a) Document preparation software b) Electronic spreadsheet software c) Presentation graphics software d) Database management system e) None of the above
Answer: d Difficulty: Easy
The Internet uses the ______ suite of packet switching protocols. a) HTML b) XML c) VoiP d) TCP/IP
Answer: d Difficulty: Easy
There are several benefits to cloud computing. Which of the following isn't one of them? a) Reduced cost b) Scalability c) Accessibility d) Limited
Answer: d Difficulty: Easy
46) An example of a DBMS would be: a) Microsoft Word b) Microsoft Excel c) Microsoft Outlook d) Microsoft Access e) None of the above
Answer: d Difficulty: Medium
An attempt to gain personal and confidential information for fraudulent purposes such as identity theft is called: a) Junk b) Spam c) DoS d) Phishing
Answer: d Difficulty: Medium
CPU stands for: a) Central Packet Unit b) Controller Processing Unit c) Controller Packet Unit d) Central Processing Unit e) None of the above
Answer: d Difficulty: Medium
In a computer, the _____ holds the instructions used to control the start-up processes. a) CPU b) LCU c) RAM d) ROM e) None of the above
Answer: d Difficulty: Medium
Once started on a computer (by clicking an email attachment), it automatically sends out infected emails to everybody in the user's address book. This type of risk is called: a) Malware b) Scareware c) Virus d) Worm
Answer: d Difficulty: Medium
Which of the following provides low-scale processing and/or identification; embedded in appliances and products? a) Supercomputer b) Mainframe c) Server farm d) Embedded processor e) None of the above
Answer: d Difficulty: Medium
Who owns the Internets? a) Internet Engineering Task Force (IETF) b) The Internet Architecture Board (IAB) c) The World Wide Web Consortium (W3C) d) None of the above
Answer: d Difficulty: Medium
_____ software is a complete, self-contained program or set of programs for performing a specific job. a) Utility b) Driver c) Operating System d) Application e) None of the above
Answer: d Difficulty: Medium
_______, both wired and wireless, allow you to connect to a remote network over a telecommunications line, such as the telephone or cable TV service. a) Routers b) Bridges c) Switches d) Hubs e) Modems
Answer: e Difficulty: Difficult
HTTP stands for: a) hypertext traded protocol b) hybrid transfer protocol c) hypertext transfer principle d) hybrid traded protocol e) none of the above
Answer: e Difficulty: Easy
Microsoft Outlook is an example of: a) Document preparation software b) Electronic spreadsheet software c) Presentation graphics software d) Database management system e) None of the above
Answer: e Difficulty: Easy
Which of the following is not considered part of a computer network? a) Nodes b) Software c) Users d) Links e) An electronic document
Answer: e Difficulty: Easy
Which of the following types of software controls the primary functions of a computer system? a) Utility b) Drivers c) Application d) Network e) Operating system
Answer: e Difficulty: Easy
__________ stores data information and instructions for the long term. a) Processing b) Memory c) Input d) Output e) Storage
Answer: e Difficulty: Easy