ICT2101 Final
The value of any number raised to the zero power is 1. examples: The value of 6^0 = 1 The value of 3^0 = 1
True
This character encoding scheme allows non-English characters and special characters to be represented.
UNICODE
The set of protocols and technologies used to enable routing of digital voice conversations over the Internet is known as:
Voice Over IP (Internet Protocol)
One method for compressing files is to locate repeated patterns (such as the word "microprocessor") and replace them with a token, or code (such as "mc") which is shorter in order to reduce space.
false
Renaming a file and changing the file extension of a spreadsheet created in Microsoft Office Excel 2016 from (.xlsx) to (.docx) will alter the file so it can also be read by Microsoft Office Word.
false
Repeatedly compressing an audio file results in obtaining the optimal quality audio file in a size that can easily be transmitted over the Internet
false
The Internet has a standard system of quality control.
false
The function of a DNS is to assign mac addresses to each device connecting to a network.
false
The purpose of a DNS (Domain Name Service) is to create top level domains (TLD) for websites.
false
The terms "internet" and "www" (World Wide Web) both refer to exactly the same thing.
false
This image reflects an analog signal which transmitted voice sound waves over telephone lines.
false
Users have no way of changing the default setting in both the Windows and the Mac OS that hides the file extensions for filenames.
false
An important task of the ____ is to keep track of files stored on the hard drive.
flash ROM
The _____ number system, or base 16, is used in digital graphics as a shorthand for color representation.
hexadecimal
Disk caching refers to:
incorporating a temporary high-speed area between the processor and secondary storage devices to provide quicker access to frequently used, or soon to be needed, data
Four basic functions
input output processing storage
The second generation of the world wide web, Web 2.0, allowed users to _______ the web.
interact with and contribute to
Match the following ports with the type data they normally handle:
mail packets= port 25 web packets= port 80
What device connects a home network to the "cloud" (i.e. the Internet)?
modem
Which of the following groups of devices all support the output function of a computer?
monitors, printers, speakers, headphones
In what format is data transmitted over the Internet?
packets
[ C:/Program Files/Microsoft Office/Excel ]
pathname
On an optical disc, the lack of a(n) ____ represents a 1.
pit
Which of the following file types all represent bitmap (raster) image formats?
png, gif, tiff
A standardized range of _____ is reserved by convention to identify specific services types provided by host computers and establish entry points for specific types of data packets.
port numbers
Microwave communication uses high-frequency:
radio waves
What is file compression used for when working with graphics file formats?
reducing file size
Digital video and digital audio files are created using ________ .
samples
Select all of the following terms that refer to the physical location of a file stored on a magnetic drive.
sectors, tracks, platters
What is the main advantage of creating a home, or a business, network?
sharing resources
Which of the 4 basic computer functions would describe adding your friends new phone number to your contacts?
storage
The speed with which a modem transmits data is...
transfer rate
Which of the following devices act as a gate - in the closed position it allows current to flow through the wire, representing a one. In the open position it breaks the flow of the current through the wire, representing a zero.
transistor
A picture or image on the Web that does not include the copyright symbol (©) is considered in the public domain and anyone can copy and use that image.
true
A protocol is a set of communication rules for the exchange of information.
true
A zipped file is an example of a file in which the data has been compressed in order to reduce the size of the file.
true
ASCII was the earliest encoding scheme for personal computers but had to replaced when computers became commonly used worldwide due to its limitations on the number of characters it could represent.
true
Audio files can be compressed in iTunes.
true
Audio sampling refers to digital recording and playback, taking a sound and converting it to 1's and 0's.
true
Because lossless compression reproduces an image so accurately, it generally results in a large file size.
true
Digital sounds can be copyrighted with Creative Common Licenses.
true
Firewalls can be used for large corporate networks or for home networks in order to increase security.
true
If you only want to temporarily compress an audio file, such as to make it fit in an email or store it on a medium with limited space, use a file compression utility instead of degrading the quality of the audio.
true
In order to access your documents and files that are stored in the cloud, you must have an Internet connection.
true
Lossless compression reproduces images accurately because large amounts of information about the location and color of each pixel are stored in the file.
true
Most PC operating systems, such as Windows, Linux and the Mac OS, include networking functionality (NOS).
true
Network architecture describes how a computer network is configured and what strategies are employed to share resources.
true
The Mac OS can read files created by the Windows OS.
true
The TLD of a URL might help to determine the overall credibility of a website.
true
The most basic common image format on the web is GIF.
true
The two basic types of digital images are raster and vector.
true
Web 3.0 brought about a more personalized web experience, with content generated specifically for individual users.
true
While LANs have been widely used within organizations for years, they are now being commonly used by individuals in their homes and apartments.
true
iTunes can be used to compress audio files and convert them to different file format.
true
Remote users can connect to an organization's network through this type of secure private connection.
vpn
Which type of compression should be used if file size and download time are the main consideration when using a graphics image on a web page?
Lossy compression
This type of network topology does not use a specific physical layout, but ensures more consistent connectivity by requiring each node to be connected to more than a single node.
Mesh
Which of the following devices converts analog signals to digital and digital signals to analog?
Modem
Which of the following is NOT a common file system for computers in the personal computer category?
RDOS
What kind of a connector is used on an Ethernet cable?
RJ45
Match the protocols to the services that use them:
SMTP=email HTTP=web pages FTP=transferring files TCP/IP=packaging all files transmitted over the internet
C: on a Windows operating system, or Macintosh HD on the Mac operating system, denotes:
The primary internal hard drive
File systems allow users to organize files using folders, subfolders or directories, making it much easier to locate files.
True
Which of the following is not an example of secondary storage?
RAM
File Sizes
1. Byte 2. Kilobyte (kB) 3. megabyte (MB) 4. gigabyte (GB) 5. terabyte (TB) 6. petabyte (PB) 7. exabyte (EB) 8. Zettabyte (ZB) 9. Yottabyte (YB)
Select all of the following items that are Boolean operators:
AND/OR
Which of the following Internet resources is most likely to contain peer-reviewed articles?
An online scholarly journal.
Which of the following might lead you to suspect a website is NOT suitable for use in your academic research?
Any of the reasons listed here would be good reasons to suspect the website's credibility and perhaps check into it further.
_________ is a wireless technology used to connect devices over very short distances; it is most frequently used in a PAN.
Bluetooth
In a computer network, this type of node requests and uses resources available from other nodes.
Client
A file system retains data about the properties of each file stored in the system. This set of data is referred to as big data.
False
In order to process data, a computer must first convert the required data to a decimal ASCII code, then to the binary ASCII code. Question options:
False
The decimal numbering system (base 10) is used in computer processors because it uses only 1 and 0's which can be easily represented by current, or no current.
False
The storage function of a computer is not supported by devices housed inside the system unit, only by external devices or by cloud computing systems.
False
Which of the following best describes the capabilities of fourth generation (4G) cell phone technologies?
High-speed Internet service over cellular networks
The new Internet Protocol that was recently implemented to identify the large amount of Internet users is called ____.
IPv6
Which of the following terms best describe the method, or hierarchy, used by the Windows OS to keep files logically organized?
Libraries, folders, subfolders
The essential features of this include identifying sending and receiving devices, and breaking information into small parts for transmission across the Internet - 'packaging' data for transmission over the Internet.
TCP/IP
What is the standard protocol for the Internet?
TCP/IP
Which of the following are software applications used by the Windows and the Mac operating systems to manage files?
Windows Explorer and Finder
Which of the following locations could be used to store files to be shared with other users?
any of these promote online file sharing
Early computers worked with which two basic types of data?
binary and UNICODE
Just like the quality of an image is measured in resolution, the quality of an audio or video file is measured by the _________ .
bit rate
eight bits grouped together is a
byte
OMR, OCR, and MICR are all types of _____, or specialized scanners supporting the input function.
character and mark recognition devices
A high-frequency transmission cable that delivers television signals as well as connects computers in a network.
coaxial
Display size is measured ____
diagonally
Digitizing the things we sense typically requires an analog-to-____ conversion.
digital
A web browser and a search engine are both software applications used for identical purposes.
false
All images publicly accessible on the Internet may be freely and legally downloaded and reproduced.
false
File management functions come pre-built into the hardware features on mobile devices.
false
Flash memory devices, such as USB drives and memory cards, most often use the NTFS file system.
false
If you want to find something on the Internet, you go to a search engine, as they contain everything that is available online.
false
In a peer-to-peer network, only the central host computer supplies the resources, the other computers request resources from this host.
false
MP3, OGG, AAC & WMA are all types of lossless compression audio files.
false
Mobile devices use the same file management systems as PC's and Mac's.
false