CIS 110 Book Test
When using 7.1 surround sound there are a total of A. 8 speakers. B. 6 speakers. C. 7 speakers and one microphone. D. 7 subwoofers and a dialogue speaker.
A. 8 speakers.
To add ports to your computer, what do you need? A. an expansion hub B. an external hard drive C. a flash memory card D. a digital media card reader
A. An expansion hub
The _________ utility is used for detecting lost files and fragments of files on your hard drive. A. Error-checking B. Disk Defragmenter C. System Refresh D. Disk Cleanup
A. Error-checking
Which of these is NOT an optical storage device? A. flash drive B. Blu-ray drive C. CD drive D. DVD drive
A. Flash drive
You are most likely to find a real-time operating system (RTOS) A. in your automobile. B. on a laptop. C. on an iPad. D. on a smartphone.
A. In your automobile
Which of the following is NOT an example of a smartphone OS? A. Linux B. Android C. BlackBerry D. iOS
A. Linux
Which of the following is an example of a locally administered network? A. P2P network B. Client/server network C. Both A and B D. Neither A and B
A. P2P network
What should you do if you want to search for a phrase? A. Place quotation marks around the phrase. B. Use AND in between all the words in the phrase. C. Precede the phrase with the keyword PHRASE. D. Use a wild card, such as an asterisk.
A. Place quotation marks around the phrase
Which of the following should you avoid doing on social networking sites? A. Posting information about pet names, favorite teachers, and other commonly identifiable information. B. Using caution in choosing what pictures to post. C. Only posting the month and day of your birthday. D. Revisiting privacy settings periodically.
A. Posting information about pet names, favorite teachers, and other commonly identifiable information.
Which of the following would NOT be a benefit of networking computers? A. Sharing software licenses B. Sharing files C. Sharing printers and other peripherals D. Sharing an internet connection
A. Sharing software licesnse
Which of the following can be used to add additional ports to your network? A. Switch B. Router hub C. Switch extension D. Router extension
A. Switch
Simulation Software that can be used in education includes A. The Interactive Body B. MOMA WiFi C. Netflix D. Data Mining
A. The Interactive Body
Which of the following is true about crisis mapping software A. Ushahidi was created in a few days and distributed globally for free. B. it is only useful for collecting email results. C. the results of the crisis map can only be displayed on a computer. D. it is only useful for times of political upheaval.
A. Ushahidi was created in a few days and distributed globally for free
Borrowing hard drive space to optimize RAM storage is known as A. virtual memory. B. authentication. C. multitasking. D. paging.
A. Virtual memory
Which of the following is NOT a mobile device? A. base transceiver station B. ultrabook C. phablet D. tablet
A. base transceiver station
To decide if your current system is still useful for you A. check each subsystem to see how it is performing during your work day. B. ask the salesman at the store. C. make sure your have more than 4 GB of RAM. D. check the brand and speed of your CPU.
A. check each subsystem to see how it is performing during your work day.
Social Networking A. is incorporated as part of political strategy by many politicians. B. cannot be immediate enough to react to quickly developing issues. C. only is useful for personal friendships. D. prevents two-way dialog between people.
A. is incorporated as part of political strategy by many politicians
To determine what devices are connected to your router, you should (1 point) A. log into an account associated with your router's IP address. B. view My Computer properties. C. look to see if the device's IP address matches the router's IP address. D. all of the above.
A. log into an account associated with your router's IP address.
A social engineering technique in which you create a scenario to gain someone's trust is known as: A. pretexting. B. spear phishing. C. pharming. D. phishing.
A. pretexting.
Moore's law refers to: A. the number of transistors inside a CPU chip. B. the amount of memory on a memory chip. C. the speed of DRAM. D. the overall system processing capability.
A. the number of transistors inside a CPU chip.
Cookies, small text files that some websites store on your computer A. will not harm your computer. B. are illegal in most countries. C. are used to spy on your surfing habits. D. can contain viruses that will harm your compute
A. will not harm your computer.
You would not want to consider overclocking if A. you want to keep the warranty on your system. B. you have hyperthreading. C. your CPU is already faster than 2.1 GHz. D. you are looking to run the CPU faster than the recommended speed.
A. you want to keep the warranty on your system.
In the URL http://www.whitehouse.gov/blog, which part is considered the path or subdirectory? A. .gov B. /blog C. http D. www.whitehouse.gov
B. /blog
The Khan Academy is A. A program in Africa to encourage study of mathematics B. A free technology tool used for education C. A simulation package to teach users how to run a business D. Of use to students but not useful for instructors
B. A free technology too used for education
Which search engine searches other search engines? A. Bing B. Dogpile C. Ipl2 D. ChaCha
B. Dogpile
A data category in Access is called a A. record. B. field. C. table. D. query.
B. Field
The Windows app used for file management is A. Disk Manager. B. File Explorer. C. Task Manager. D. Library Explorer.
B. File Explorer
Software designed to close logical ports in your computer is known as a(n) A. anti-malware blocker. B. firewall. C. network address translator. D. packet filter.
B. Firewall
Which is NOT considered a social networking site? A. YouTube B. Gmail C. Wikipedia D. Delicious
B. Gmail
Which of the following is NOT a major type of cybercrime reported to the IC3? A. Identity theft B. Malware fraud C. Advance fee fraud D. FBI-related scams
B. Malware fraud
What is a Terabyte A. One Million Bytes B. One Trillion Bytes C. One Trillion Bits D. One Billion Bits
B. One Trillion Bytes
Apps specifically designed for Windows 8 A. run on the desktop. B. run full screen. C. use a large amount of RAM. D. can't be closed down once started.
B. Run full screen
Which type of Internet connection requires hardware to be installed outside your home? A. Dial-up B. Satellite C. DSL D. Fiber-optic
B. Satellite
Which is NOT true about self-publishing? (1 point) A. You can self-publish into the Amazon Kindle store. B. Self-publishing means your work will have a limited reach to readers. C. You can still work with editors and designers if you self-publish. D. Some sites help you do social marketing for your book.
B. Self-publishing means your work will have a limited reach to readers.
Which of the following is NOT considered an accessibility utility? A. Speech Recognition B. System Restore C. Magnifier D. Narrator
B. System Restore
Which of the following is NOT a compressed audio file type? A. MP3 B. WAV C. WMA D. AAC
B. WAV
What do you need to get wireless Internet access at home? A. Wireless nodes B. Wireless router C. Mobile router D. All of the above
B. Wireless router
Which of the following is NOT a reason to connect your digital entertainment device to your home network? A. You can access digital content stored on other network devices. B. Your stored entertainment files are more secure when connected to a home network. C. You can easily download entertainment content from the Internet. D. You can share digital content between network devices.
B. Your stored entertainment files are more secure when connected to a home network.
Software that displays messages on your screen enticing you to purchase products is known as A. spam. B. adware. C. spyware. D. trackingware.
B. adware.
Which tool do hackers use to gain access to and take control of your computer? A. stealth viruses B. backdoor programs C. scareware D. phishing software
B. backdoor programs
A backup of only the files on your computer which have been created or changed since the last backup is known as a(n): A. total backup. B. incremental backup. C. image backup. D. modification backup.
B. incremental backup.
A cell phone is cellular because A. phones have become so small in size. B. it uses a network made up of cells or base transceiver stations. C. software can be plugged in or removed. D. of the pattern on the screen of the device.
B. it uses a network made up of cells or base transceiver stations.
Programs that attempt to trick you into buying software by pretending your computer is infected with a virus fall into the class of malware known as A. virusware. B. scareware. C. adware. D spyware.
B. scareware
What is often distributed prior to a final release of software? (1 point) A. Freeware version B. Alpha prerelease C. Beta version D. Open source release
C. Beta Version
Megabit per second is usually used to measure A. data transfer rate. B. throughput. C. both A and B. D. neither A or B
C. Both A and B
The Internet was created to provide: A. a secure form of communications. B. a common communications means for all computers. C. both A and B. D. neither A or B.
C. Both A and B
The amount of time your current CPU is working is called A. Task Manager B. virtual processing C. CPU usage D. system performance
C. CPU usage
Which of these is NOT located on the motherboard? A. RAM B. CPU C. DVD drive D. ROM
C. DVD drive
Which web browser is open source? A. Internet Explorer B. Safari C. Firefox D. Google Chrome
C. Firefox
Ergonomics is an important consideration A. only for desktop computers. B. only for laptop and desktop computers, but never for mobile devices. C. for all computing devices. D. only for laptop computers.
C. For all computing devices
Which of the following is NOT an operating system for a smartphone? A. Android B. Windows Phone C. HTC D. iOS
C. HTC
Digestible microchips A. deliver medication through the skin. B. are not approved by the FDA. C. have embedded sensors to transmit information to physicians. D. look like small computer chips.
C. Have embedded sensors to transmit information to physicians
A digital camera's resolution A. tells you how to transfer images to your printing service. B. depends on the camera's lens. C. is measured in MP. D. only matters for analog cameras.
C. Is measured in MP
If you place a document from your C: drive in the Recycle Bin in Windows A. it is immediately deleted from your system. B. it can only be recovered from the Recycle Bin by using File History. C. it remains on your hard drive until you empty the Recycle Bin. D. you can always retrieve it later if you ever need it again.
C. It remains on your hard drive until you empty the Recycle Bin
PowToon and HaikuDeck are alternatives to A. Microsoft Word B. Adobe InDesign C. Microsoft PowerPoint D. Apple iWork Pages
C. Microsoft PowerPoint
Which of the following is an installed e-mail client? A. Gmail B. Windows Messenger C. Outlook D. Yahoo! mail
C. Outlook
Calendars, tasks, and e-mail are features of A. personal finance software. B. personal communication software. C. personal information management software. D. personal desktop software.
C. Personal information management software
Monitor screens are made up of millions of tiny dots known as A. resolution points. B. bytes. C. pixels. D. bits.
C. Pixels
Web 2.0 has led to a shift from just consuming content towards A. new standards for HTML. B. less sharing of the work we produce. C. producing content. D. spending all our time on leisure activities.
C. Producing content
Which of the following types of software allows you to experience a real situation through a virtual environment? A. Genealogy B. Reference C. Simulation D. Brain Training
C. Simulation
Which is TRUE about supercomputers? A. They are specially designed computing devices that reside in other devices. B. They are specially built to support hundreds of users simultaneously. C. They perform complex calculations rapidly. D. They are best used to execute many programs at the same time.
C. They perform complex calculations rapidly
Which of the following is false? A. SMS is an acronym for text messaging. B. Bluetooth technology uses radio waves. C. Your phone can only be connected to the Internet if there is a WiFi network available. D. An analog to digital converter chip converts your voice into digital signals
C. Your phone can only be connected to the Internet if there is a WiFi network available.
The type of computer that you might find in your automobile is A. a mainframe computer. B. a supercomputer. C. an embedded computer. D. none of the above.
C. an embedded computer.
VOIP is a service that lets you A. eliminate viruses from your mobile devices. B. locate anyone based on their name. C. place phone calls using the internet as the network. D. record messages to your hard drive.
C. place phone calls using the internet as the network.
You can run multiple monitors on your system only if A. you have CrossFire. B. you have a Mac OS X operating system. C. you have a video card that supports more than one monitor. D/ you have SLI.
C. you have a video card that supports more than one monitor.
Which of the following is not an input A. an optical mouse B. a touch-screen monitor C. a keyboard D. a laser printer
D. A laser printer
Being computer literate includes being able to A. avoid spam, adware, and spyware. B. use the web effectively. C. diagnose and fix hardware and software problems. D. all of the above.
D. All of the above
To play digital music files you can use A. a networked audio/video receiver. B. your PC. C. a smartphone. D. all of the above.
D. All of the above
What should you check first to ensure software will work on your computer? A. The type of operating system B. The amount of available RAM C. The available hard drive capacity D. All of the above
D. All of the above
Which of the following describes an IP address? A. It is referred to as a dotted quad. B. It identifies any computer connecting to the Internet. C. It identifies a website. D. All of the above.
D. All of the above
Which of the following might cause interference or poor connectivity between nodes on a wireless network? A. Concrete walls B. Nodes that are too far apart C. Some appliances D. All of the above
D. All of the above
Which software application would you use to calculate and manipulate numerical data? A. Microsoft Office Excel B. Apple iWork Numbers C. Apache OpenOffice Calc D. All of the above
D. All of the above
Computer forensics A. is used to create three-dimensional art. B. tests computers for hardware malfunction. C. analyzes the design of a computer system. D. analyzes computer systems to gather potential legal evidence.
D. Analyzes computer systems to gather potential legal evidence
QR codes can be linked to A. a video. B. a Facebook page. C. a website. D. any of the above
D. Any of the above
The most common type of video memory in a modern video card is A. VRAM. B. SDRAM. C. GDDR3. D. GDDR5.
D. GDDR5
Which of the following is NOT an online photo-sharing site? A. Shutterfly B. Snapfish C. Picasa D. Gimpshop
D. Gimpshop
Examples of crowd-funding and crowd-sourcing include A. Bing and Google. B. Call A Bike and ZipCar. C. Ushahidi and Kiva. D. KIckstarter and MobileVoice.
D. Kickstarter and MobileVoice
An example of an open source OS is A. Windows. B. OS X. C. DOS. D. Linux.
D. Linux
What web browser feature would be particularly useful when using public computers? A. Session restore B. Pinned tabs C. All of the above D. Privacy browsing
D. Privacy browsing
Which would NOT be considered productivity software? A. Note-taking B. Personal finance C. Database D. Project management
D. Project Management
If your computer can't store all the required OS data in RAM, it can use a temporary file on the hard drive to store data. This is known as a _________ file. A. nonvolatile B. thrash C. Linux D. swap
D. Swap
Which of the following is true? A. The Windows System Properties window tells you how much memory you should buy. B. RAM is where the CPU is located. C. Intel is the only manufacturer of CPUs. D. The CPU contains the ALU.
D. The CPU contains the ALU.
Which port enables you to connect devices such as keyboards and printers to your computer? A. connectivity B. HDMI C. DVI D. USB
D. USB
What device would be useful to amplify a wireless signal? A. Dual-band router B. Router amplifier C. Network Interface Card D. Wireless range extender
D. Wireless range extender
A computer that a hacker has gained control of in order to launch DoS attacks is known as a __________ computer. A. rootkit B. breached C. compromised D. zombie
D. Zombie
Analog signals are different than discrete signals because A. analog waves no longer exist. B. analog signals are sets of numeric values. C. only analog signals can be used for video or audio. D. analog waves are continuous.
D. analog waves are continuous.
Viruses that compress files and then demand money to restore them are known as A. boot-sector viruses. B. polymorphic viruses. C. script viruses. D. encryption viruses.
D. encryption viruses.
An audio MIDI interface box lets you connect your computer to A. plotters. B. external hard drives. C. printers. D. guitars and microphones.
D. guitars and microphones.
Windows creates "restore points" so that you can A. add additional hard disk storage space. B. extend your warranty. C. protect your system from viruses. D. return your system to the way it was before you installed new software.
D. return your system to the way it was before you installed new software.
Streaming music services allow you to A. purchase audio CDs. B. avoid digital rights management. C. make your own music available to your friends. D. subscribe monthly and have access to millions of songs.
D. subscribe monthly and have access to millions of songs.
True or False: A WiFi network is always faster than a 4G network.
False
True or False: A benefit of using database software applications is the ability to perform what-if analysis.
False
True or False: All device must run the same version of an operating system to connect to a home network.
False
True or False: Donating your computer will not necessarily put you at risk for identity theft.
False
True or False: E-mail is synchronous while instant messaging is asynchronous.
False
True or False: Encrypting data is not an appropriate measure for protecting mobile devices such as tablets.
False
True or False: HTTP is the only Internet protocol
False
True or False: Hackers that break into systems for malicious reasons, such as to destroy information or for illegal gain, are known as grey-hat hackers.
False
True or False: Inkjet printers are considered legacy technology.
False
True or False: Modern motivation theory says people work hardest when offered the highest pay
False
True or False: Password strength is only determined by the length of the password.
False
True or False: Proprietary software is free and available with few licensing restrictions.
False
True or False: System restore points can only be created by Windows automatically on a regular schedule.
False
True or False: The aspect ratio of an HD television is more square than that of a standard definition TV.
False
True or False: The first step of the boot process is the power-on self-test (POST).
False
True or False: The hard drive is an example of a volatile storage device.
False
True or False: You cannot get good productivity software for free.
False
True: or False: Being computer literate mean s you know how to solve any computer problem.
False
True or False: 802.11ac is the current wireless Ethernet standard.
True
True or False: Being Computer literate is an advantage in almost every type of career
True
True or False: Collaborative, user-created web content is also known as Web 2.0.
True
True or False: Data and information are NOT interchangeable terms
True
True or False: Digital video can be stored in an .mpg file, a .mpeg file, or a .mp4 file
True
True or False: Each device attached to your computer needs a device driver to communicate with the OS.
True
True or False: Every smartphone contains a GPS chip
True
True or False: Home network servers are used for file management tasks on a home network
True
True or False: Network adapters installed internally in a device are called NICs
True
True or False: RAID 0 cuts the time it takes to write a file to disk in half.
True
True or False: SSD startup drives will reduce the amount of time to boot up.
True
True or False: Sending e-mails to lure people into revealing personal information is a technique known as phishing.
True
True or False: Social bookmarking and tagging are the same thing
True
True or False: SuperFetch is a memory-management technique that pulls info from your hard drive into RAM.
True
True or False: The GNU General Public License is an example of copyleft.
True
True or False: The Virtual Choir showed that people have the means to collaborate easily internationally
True
True or False: The processor speed of the CPU is not the only measure of a processor's expected performance.
True
True or False: You can terminate nonresponsive programs with Task Manager.
True