CIS 110 Book Test

Réussis tes devoirs et examens dès maintenant avec Quizwiz!

When using 7.1 surround sound there are a total of A. 8 speakers. B. 6 speakers. C. 7 speakers and one microphone. D. 7 subwoofers and a dialogue speaker.

A. 8 speakers.

To add ports to your computer, what do you need? A. an expansion hub B. an external hard drive C. a flash memory card D. a digital media card reader

A. An expansion hub

The _________ utility is used for detecting lost files and fragments of files on your hard drive. A. Error-checking B. Disk Defragmenter C. System Refresh D. Disk Cleanup

A. Error-checking

Which of these is NOT an optical storage device? A. flash drive B. Blu-ray drive C. CD drive D. DVD drive

A. Flash drive

You are most likely to find a real-time operating system (RTOS) A. in your automobile. B. on a laptop. C. on an iPad. D. on a smartphone.

A. In your automobile

Which of the following is NOT an example of a smartphone OS? A. Linux B. Android C. BlackBerry D. iOS

A. Linux

Which of the following is an example of a locally administered network? A. P2P network B. Client/server network C. Both A and B D. Neither A and B

A. P2P network

What should you do if you want to search for a phrase? A. Place quotation marks around the phrase. B. Use AND in between all the words in the phrase. C. Precede the phrase with the keyword PHRASE. D. Use a wild card, such as an asterisk.

A. Place quotation marks around the phrase

Which of the following should you avoid doing on social networking sites? A. Posting information about pet names, favorite teachers, and other commonly identifiable information. B. Using caution in choosing what pictures to post. C. Only posting the month and day of your birthday. D. Revisiting privacy settings periodically.

A. Posting information about pet names, favorite teachers, and other commonly identifiable information.

Which of the following would NOT be a benefit of networking computers? A. Sharing software licenses B. Sharing files C. Sharing printers and other peripherals D. Sharing an internet connection

A. Sharing software licesnse

Which of the following can be used to add additional ports to your network? A. Switch B. Router hub C. Switch extension D. Router extension

A. Switch

Simulation Software that can be used in education includes A. The Interactive Body B. MOMA WiFi C. Netflix D. Data Mining

A. The Interactive Body

Which of the following is true about crisis mapping software A. Ushahidi was created in a few days and distributed globally for free. B. it is only useful for collecting email results. C. the results of the crisis map can only be displayed on a computer. D. it is only useful for times of political upheaval.

A. Ushahidi was created in a few days and distributed globally for free

Borrowing hard drive space to optimize RAM storage is known as A. virtual memory. B. authentication. C. multitasking. D. paging.

A. Virtual memory

Which of the following is NOT a mobile device? A. base transceiver station B. ultrabook C. phablet D. tablet

A. base transceiver station

To decide if your current system is still useful for you A. check each subsystem to see how it is performing during your work day. B. ask the salesman at the store. C. make sure your have more than 4 GB of RAM. D. check the brand and speed of your CPU.

A. check each subsystem to see how it is performing during your work day.

Social Networking A. is incorporated as part of political strategy by many politicians. B. cannot be immediate enough to react to quickly developing issues. C. only is useful for personal friendships. D. prevents two-way dialog between people.

A. is incorporated as part of political strategy by many politicians

To determine what devices are connected to your router, you should (1 point) A. log into an account associated with your router's IP address. B. view My Computer properties. C. look to see if the device's IP address matches the router's IP address. D. all of the above.

A. log into an account associated with your router's IP address.

A social engineering technique in which you create a scenario to gain someone's trust is known as: A. pretexting. B. spear phishing. C. pharming. D. phishing.

A. pretexting.

Moore's law refers to: A. the number of transistors inside a CPU chip. B. the amount of memory on a memory chip. C. the speed of DRAM. D. the overall system processing capability.

A. the number of transistors inside a CPU chip.

Cookies, small text files that some websites store on your computer A. will not harm your computer. B. are illegal in most countries. C. are used to spy on your surfing habits. D. can contain viruses that will harm your compute

A. will not harm your computer.

You would not want to consider overclocking if A. you want to keep the warranty on your system. B. you have hyperthreading. C. your CPU is already faster than 2.1 GHz. D. you are looking to run the CPU faster than the recommended speed.

A. you want to keep the warranty on your system.

In the URL http://www.whitehouse.gov/blog, which part is considered the path or subdirectory? A. .gov B. /blog C. http D. www.whitehouse.gov

B. /blog

The Khan Academy is A. A program in Africa to encourage study of mathematics B. A free technology tool used for education C. A simulation package to teach users how to run a business D. Of use to students but not useful for instructors

B. A free technology too used for education

Which search engine searches other search engines? A. Bing B. Dogpile C. Ipl2 D. ChaCha

B. Dogpile

A data category in Access is called a A. record. B. field. C. table. D. query.

B. Field

The Windows app used for file management is A. Disk Manager. B. File Explorer. C. Task Manager. D. Library Explorer.

B. File Explorer

Software designed to close logical ports in your computer is known as a(n) A. anti-malware blocker. B. firewall. C. network address translator. D. packet filter.

B. Firewall

Which is NOT considered a social networking site? A. YouTube B. Gmail C. Wikipedia D. Delicious

B. Gmail

Which of the following is NOT a major type of cybercrime reported to the IC3? A. Identity theft B. Malware fraud C. Advance fee fraud D. FBI-related scams

B. Malware fraud

What is a Terabyte A. One Million Bytes B. One Trillion Bytes C. One Trillion Bits D. One Billion Bits

B. One Trillion Bytes

Apps specifically designed for Windows 8 A. run on the desktop. B. run full screen. C. use a large amount of RAM. D. can't be closed down once started.

B. Run full screen

Which type of Internet connection requires hardware to be installed outside your home? A. Dial-up B. Satellite C. DSL D. Fiber-optic

B. Satellite

Which is NOT true about self-publishing? (1 point) A. You can self-publish into the Amazon Kindle store. B. Self-publishing means your work will have a limited reach to readers. C. You can still work with editors and designers if you self-publish. D. Some sites help you do social marketing for your book.

B. Self-publishing means your work will have a limited reach to readers.

Which of the following is NOT considered an accessibility utility? A. Speech Recognition B. System Restore C. Magnifier D. Narrator

B. System Restore

Which of the following is NOT a compressed audio file type? A. MP3 B. WAV C. WMA D. AAC

B. WAV

What do you need to get wireless Internet access at home? A. Wireless nodes B. Wireless router C. Mobile router D. All of the above

B. Wireless router

Which of the following is NOT a reason to connect your digital entertainment device to your home network? A. You can access digital content stored on other network devices. B. Your stored entertainment files are more secure when connected to a home network. C. You can easily download entertainment content from the Internet. D. You can share digital content between network devices.

B. Your stored entertainment files are more secure when connected to a home network.

Software that displays messages on your screen enticing you to purchase products is known as A. spam. B. adware. C. spyware. D. trackingware.

B. adware.

Which tool do hackers use to gain access to and take control of your computer? A. stealth viruses B. backdoor programs C. scareware D. phishing software

B. backdoor programs

A backup of only the files on your computer which have been created or changed since the last backup is known as a(n): A. total backup. B. incremental backup. C. image backup. D. modification backup.

B. incremental backup.

A cell phone is cellular because A. phones have become so small in size. B. it uses a network made up of cells or base transceiver stations. C. software can be plugged in or removed. D. of the pattern on the screen of the device.

B. it uses a network made up of cells or base transceiver stations.

Programs that attempt to trick you into buying software by pretending your computer is infected with a virus fall into the class of malware known as A. virusware. B. scareware. C. adware. D spyware.

B. scareware

What is often distributed prior to a final release of software? (1 point) A. Freeware version B. Alpha prerelease C. Beta version D. Open source release

C. Beta Version

Megabit per second is usually used to measure A. data transfer rate. B. throughput. C. both A and B. D. neither A or B

C. Both A and B

The Internet was created to provide: A. a secure form of communications. B. a common communications means for all computers. C. both A and B. D. neither A or B.

C. Both A and B

The amount of time your current CPU is working is called A. Task Manager B. virtual processing C. CPU usage D. system performance

C. CPU usage

Which of these is NOT located on the motherboard? A. RAM B. CPU C. DVD drive D. ROM

C. DVD drive

Which web browser is open source? A. Internet Explorer B. Safari C. Firefox D. Google Chrome

C. Firefox

Ergonomics is an important consideration A. only for desktop computers. B. only for laptop and desktop computers, but never for mobile devices. C. for all computing devices. D. only for laptop computers.

C. For all computing devices

Which of the following is NOT an operating system for a smartphone? A. Android B. Windows Phone C. HTC D. iOS

C. HTC

Digestible microchips A. deliver medication through the skin. B. are not approved by the FDA. C. have embedded sensors to transmit information to physicians. D. look like small computer chips.

C. Have embedded sensors to transmit information to physicians

A digital camera's resolution A. tells you how to transfer images to your printing service. B. depends on the camera's lens. C. is measured in MP. D. only matters for analog cameras.

C. Is measured in MP

If you place a document from your C: drive in the Recycle Bin in Windows A. it is immediately deleted from your system. B. it can only be recovered from the Recycle Bin by using File History. C. it remains on your hard drive until you empty the Recycle Bin. D. you can always retrieve it later if you ever need it again.

C. It remains on your hard drive until you empty the Recycle Bin

PowToon and HaikuDeck are alternatives to A. Microsoft Word B. Adobe InDesign C. Microsoft PowerPoint D. Apple iWork Pages

C. Microsoft PowerPoint

Which of the following is an installed e-mail client? A. Gmail B. Windows Messenger C. Outlook D. Yahoo! mail

C. Outlook

Calendars, tasks, and e-mail are features of A. personal finance software. B. personal communication software. C. personal information management software. D. personal desktop software.

C. Personal information management software

Monitor screens are made up of millions of tiny dots known as A. resolution points. B. bytes. C. pixels. D. bits.

C. Pixels

Web 2.0 has led to a shift from just consuming content towards A. new standards for HTML. B. less sharing of the work we produce. C. producing content. D. spending all our time on leisure activities.

C. Producing content

Which of the following types of software allows you to experience a real situation through a virtual environment? A. Genealogy B. Reference C. Simulation D. Brain Training

C. Simulation

Which is TRUE about supercomputers? A. They are specially designed computing devices that reside in other devices. B. They are specially built to support hundreds of users simultaneously. C. They perform complex calculations rapidly. D. They are best used to execute many programs at the same time.

C. They perform complex calculations rapidly

Which of the following is false? A. SMS is an acronym for text messaging. B. Bluetooth technology uses radio waves. C. Your phone can only be connected to the Internet if there is a WiFi network available. D. An analog to digital converter chip converts your voice into digital signals

C. Your phone can only be connected to the Internet if there is a WiFi network available.

The type of computer that you might find in your automobile is A. a mainframe computer. B. a supercomputer. C. an embedded computer. D. none of the above.

C. an embedded computer.

VOIP is a service that lets you A. eliminate viruses from your mobile devices. B. locate anyone based on their name. C. place phone calls using the internet as the network. D. record messages to your hard drive.

C. place phone calls using the internet as the network.

You can run multiple monitors on your system only if A. you have CrossFire. B. you have a Mac OS X operating system. C. you have a video card that supports more than one monitor. D/ you have SLI.

C. you have a video card that supports more than one monitor.

Which of the following is not an input A. an optical mouse B. a touch-screen monitor C. a keyboard D. a laser printer

D. A laser printer

Being computer literate includes being able to A. avoid spam, adware, and spyware. B. use the web effectively. C. diagnose and fix hardware and software problems. D. all of the above.

D. All of the above

To play digital music files you can use A. a networked audio/video receiver. B. your PC. C. a smartphone. D. all of the above.

D. All of the above

What should you check first to ensure software will work on your computer? A. The type of operating system B. The amount of available RAM C. The available hard drive capacity D. All of the above

D. All of the above

Which of the following describes an IP address? A. It is referred to as a dotted quad. B. It identifies any computer connecting to the Internet. C. It identifies a website. D. All of the above.

D. All of the above

Which of the following might cause interference or poor connectivity between nodes on a wireless network? A. Concrete walls B. Nodes that are too far apart C. Some appliances D. All of the above

D. All of the above

Which software application would you use to calculate and manipulate numerical data? A. Microsoft Office Excel B. Apple iWork Numbers C. Apache OpenOffice Calc D. All of the above

D. All of the above

Computer forensics A. is used to create three-dimensional art. B. tests computers for hardware malfunction. C. analyzes the design of a computer system. D. analyzes computer systems to gather potential legal evidence.

D. Analyzes computer systems to gather potential legal evidence

QR codes can be linked to A. a video. B. a Facebook page. C. a website. D. any of the above

D. Any of the above

The most common type of video memory in a modern video card is A. VRAM. B. SDRAM. C. GDDR3. D. GDDR5.

D. GDDR5

Which of the following is NOT an online photo-sharing site? A. Shutterfly B. Snapfish C. Picasa D. Gimpshop

D. Gimpshop

Examples of crowd-funding and crowd-sourcing include A. Bing and Google. B. Call A Bike and ZipCar. C. Ushahidi and Kiva. D. KIckstarter and MobileVoice.

D. Kickstarter and MobileVoice

An example of an open source OS is A. Windows. B. OS X. C. DOS. D. Linux.

D. Linux

What web browser feature would be particularly useful when using public computers? A. Session restore B. Pinned tabs C. All of the above D. Privacy browsing

D. Privacy browsing

Which would NOT be considered productivity software? A. Note-taking B. Personal finance C. Database D. Project management

D. Project Management

If your computer can't store all the required OS data in RAM, it can use a temporary file on the hard drive to store data. This is known as a _________ file. A. nonvolatile B. thrash C. Linux D. swap

D. Swap

Which of the following is true? A. The Windows System Properties window tells you how much memory you should buy. B. RAM is where the CPU is located. C. Intel is the only manufacturer of CPUs. D. The CPU contains the ALU.

D. The CPU contains the ALU.

Which port enables you to connect devices such as keyboards and printers to your computer? A. connectivity B. HDMI C. DVI D. USB

D. USB

What device would be useful to amplify a wireless signal? A. Dual-band router B. Router amplifier C. Network Interface Card D. Wireless range extender

D. Wireless range extender

A computer that a hacker has gained control of in order to launch DoS attacks is known as a __________ computer. A. rootkit B. breached C. compromised D. zombie

D. Zombie

Analog signals are different than discrete signals because A. analog waves no longer exist. B. analog signals are sets of numeric values. C. only analog signals can be used for video or audio. D. analog waves are continuous.

D. analog waves are continuous.

Viruses that compress files and then demand money to restore them are known as A. boot-sector viruses. B. polymorphic viruses. C. script viruses. D. encryption viruses.

D. encryption viruses.

An audio MIDI interface box lets you connect your computer to A. plotters. B. external hard drives. C. printers. D. guitars and microphones.

D. guitars and microphones.

Windows creates "restore points" so that you can A. add additional hard disk storage space. B. extend your warranty. C. protect your system from viruses. D. return your system to the way it was before you installed new software.

D. return your system to the way it was before you installed new software.

Streaming music services allow you to A. purchase audio CDs. B. avoid digital rights management. C. make your own music available to your friends. D. subscribe monthly and have access to millions of songs.

D. subscribe monthly and have access to millions of songs.

True or False: A WiFi network is always faster than a 4G network.

False

True or False: A benefit of using database software applications is the ability to perform what-if analysis.

False

True or False: All device must run the same version of an operating system to connect to a home network.

False

True or False: Donating your computer will not necessarily put you at risk for identity theft.

False

True or False: E-mail is synchronous while instant messaging is asynchronous.

False

True or False: Encrypting data is not an appropriate measure for protecting mobile devices such as tablets.

False

True or False: HTTP is the only Internet protocol

False

True or False: Hackers that break into systems for malicious reasons, such as to destroy information or for illegal gain, are known as grey-hat hackers.

False

True or False: Inkjet printers are considered legacy technology.

False

True or False: Modern motivation theory says people work hardest when offered the highest pay

False

True or False: Password strength is only determined by the length of the password.

False

True or False: Proprietary software is free and available with few licensing restrictions.

False

True or False: System restore points can only be created by Windows automatically on a regular schedule.

False

True or False: The aspect ratio of an HD television is more square than that of a standard definition TV.

False

True or False: The first step of the boot process is the power-on self-test (POST).

False

True or False: The hard drive is an example of a volatile storage device.

False

True or False: You cannot get good productivity software for free.

False

True: or False: Being computer literate mean s you know how to solve any computer problem.

False

True or False: 802.11ac is the current wireless Ethernet standard.

True

True or False: Being Computer literate is an advantage in almost every type of career

True

True or False: Collaborative, user-created web content is also known as Web 2.0.

True

True or False: Data and information are NOT interchangeable terms

True

True or False: Digital video can be stored in an .mpg file, a .mpeg file, or a .mp4 file

True

True or False: Each device attached to your computer needs a device driver to communicate with the OS.

True

True or False: Every smartphone contains a GPS chip

True

True or False: Home network servers are used for file management tasks on a home network

True

True or False: Network adapters installed internally in a device are called NICs

True

True or False: RAID 0 cuts the time it takes to write a file to disk in half.

True

True or False: SSD startup drives will reduce the amount of time to boot up.

True

True or False: Sending e-mails to lure people into revealing personal information is a technique known as phishing.

True

True or False: Social bookmarking and tagging are the same thing

True

True or False: SuperFetch is a memory-management technique that pulls info from your hard drive into RAM.

True

True or False: The GNU General Public License is an example of copyleft.

True

True or False: The Virtual Choir showed that people have the means to collaborate easily internationally

True

True or False: The processor speed of the CPU is not the only measure of a processor's expected performance.

True

True or False: You can terminate nonresponsive programs with Task Manager.

True


Ensembles d'études connexes

بيتر ميلاد : شرح وحدات اللغة الأنجليزية 3ث

View Set

Computer Science - Excel Questions

View Set

BYU Writing 045 - Lesson 6 Speedback

View Set