Intro to Computing Final Exam Review
The Electronic Numerical Integrator and Computer (ENIAC) A) was the first general-purpose commercial computer built in the United States. B) could calculate 500 times faster than the existing electromechanical calculators. C) predicted that Eisenhower would win the election. D) was developed just before World War II.
B
The ________ is the most common input device. A) mouse B) keyboard C) monitor D) printer
B
The majority of computer crimes are committed by A) domestic hackers. B) company employees. C) foreign hackers. D) teenage computer geniuses.
B
The most common pointing input device is the A) trackball. B) mouse. C) touchscreen. D) touchpad.
B
The number of bits devoted to each pixel is called A) resolution. B) bit depth. C) byte depth. D) vector graphics.
B
The primary difference between a LAN and a WAN is the A) speed. B) geographical area. C) variety of hardware devices. D) number of hardware devices.
B
The typical computer criminal is a(n) A) young hacker. B) trusted employee with no criminal record. C) trusted employee with a long, but secret criminal record. D) experienced hacker.
B
The wheel located between the two standard buttons on a mouse is used to A) click in Web pages. B) scroll. C) click and select items. D) jump to different Web pages.
B
When both margins are ragged, the document contains A) left justification. B) center justification. C) full justification. D) right justification.
B
Which department of the U.S. government developed the initial stages of the Internet? A) Department of Commerce B) Department of Defense C) CIA D) Judicial Department
B
Which of the following is an example of social engineering? A) malware B) spoofing C) botnets D) spam
B
________ is the early operating system developed by Microsoft. A) Serial-ATA B) MS-DOS C) Windows 7 D) Linux
B
________ replaced MS-DOS. A) Serial ATA B) Microsoft Windows C) Mouse D) Linux
B
The hardware device commonly referred to as the "brain" of the computer is the
CPU
All of the following are true statements about databases EXCEPT: A) Databases allow easy reorganization of data. B) Using a database simplifies retrieving information. C) Databases store large amounts of data. D) Information from the database cannot be printed.
D
All of the following statements are true EXCEPT: A) Wireless networks are convenient for people on the move. B) Wireless networks are easier to install because they don't require drilling or digging. C) Wireless networks use radio transmitters. D) Wireless networks are faster than wired networks.
D
Cables containing copper wires that resemble those in standard telephone cables are known as ________ cables. A) coaxial B) fiber-optic C) Wi-Fi D) twisted pair
D
Entering and editing text can be done most efficiently using a A) spreadsheet. B) desktop publishing program. C) database. D) word-processing program.
D
In a database table, a ________ is all the information related to one person, product, or event. A) table B) report C) field D) record
D
In a database, a ________ field shows results of calculations performed on data in other numeric fields. A) configured B) concatenated C) key D) computed
D
Integrated circuits rapidly replaced transistors for all of the following reason(s) EXCEPT: A) efficiency. B) reliability. C) speed. D) size.
D
Printer fonts are stored in the A) RAM of the computer system. B) ROM of the computer system. C) hard drive. D) ROM of the printer.
D
Producing output involves A) accepting information from the outside world. B) communication with another computer. C) moving and storing information. D) communicating information to the outside world.
D
The traditional QWERTY keyboard has been shown to cause A) relaxation-caused injuries. B) repetitive-related sores. C) ergonomic vein problems. D) repetitive-stress injuries.
D
The two primary companies developing OpenType font formats are Microsoft and A) Google. B) IBM. C) Apple. D) Adobe.
D
Typical computer programming languages used today include all of the following EXCEPT: A) Visual Basic. B) C++. C) Java. D) machine language.
D
Which input device resembles an upside-down mouse? A) touchpad B) trackpoint C) trackpad D) trackball
D
Which of the following is NOT a true statement about IPv6? A) IPv6 increases the amount of available IP addresses. B) IPv6 supports multicast. C) IPv6 is a more efficient way to transmit data. D) IPv6 is supported on all machines.
D
With a simple ________ graphic, a single bit of computer memory represents each pixel. A) analog B) vector C) object-oriented D) bitmapped
D
________ created the World Wide Web, the URL scheme, HTML and HTTP. A) Bill Gates B) Jaron Lanier C) Alan Kay D) Tim Berners-Lee
D
The World Wide Web has been around since the
1990s
What character/number does ASCII binary code 0 0 1 1 0 1 1 0 translate to?
6
A bit can be A) 0 or 1. B) any number from 0 through 9. C) any number or letter. D) any letter A through E.
A
A collection of information stored in an organized form on a computer is a(n) A) database. B) query. C) operating system. D) utility.
A
A computerized ________ is a good comparison to a database. A) file cabinet B) typewriter C) overhead projector D) calculator
A
ARPANET was funded by ________. A) the U.S. government B) IBM C) CERN D) a group of interested scientists
A
An artist can use ________ software to draw, rotate, stretch, and combine model objects inside a complex "walk through" environment. A) 3-D modeling B) presentation-graphics C) photo management D) vector graphics
A
Compilers and translators are one form of A) software. B) ROM. C) RAM. D) hardware.
A
Each individual computer and networked peripheral attached to a LAN is a A) node. B) server. C) router. D) hub.
A
For a program to be read by the CPU, it must be loaded into A) memory or random access memory (RAM). B) the hard disk. C) read-only memory (ROM). D) the BIOS.
A
Graphics software can store images as ________, or lines and shapes rather than individual pixels. A) vector graphics B) raster graphics C) bitmapped graphics D) presentation-graphics
A
Hardware components are A) physical parts of a computer system. B) fully functional without computer software. C) impossible to add on after the initial purchase of a computer. D) the intangible parts of a computer system.
A
If a word processor shows you the words on screen formatted almost exactly as they appear on the printed page, it has ______________. A) WYSIWYG B) macros C) TrueType D) justification
A
In a local area network, a ________ only transmits data to the destination node. A) switch B) port C) hub D) NIC
A
Machine language uses A) numeric codes. B) English language codes. C) Java language. D) human instructions.
A
Open standards refers to A) standards not owned by any company. B) standards used by all countries. C) standards that are free to all parties. D) software programs running on different types of operating systems.
A
OpenType is a combination of ______________. A) TrueType and PostScript B) TrueType and Sans serif C) Javascript and Sans serif D) Javascript and TrueType
A
TCP/IP protocols define how information can be transferred between machines and how machines on the network can be identified with ________ addresses. A) unique B) similar C) identical D) multiple
A
TCP/IP was developed as an experiment in ________, connecting different types of networks and computer systems. A) internetworking B) intranetworking C) connecting D) wiring
A
The CPU is also known as the A) microprocessor. B) random access memory. C) primary storage. D) microunit.
A
The density of pixels on a computer screen is known as A) resolution. B) pixelity. C) pixel depth. D) DPI.
A
The name for harassment on the Internet is A) cyberstalking. B) cyberpersecution. C) cyberdenigration. D) cyberhounding
A
The pointing device that comes built-in on a laptop computer can be any device EXCEPT a A) mouse. B) trackball. C) touchpad. D) trackpoint.
A
This IP address doesn't change every day: A) static IP address. B) dynamic IP address. C) unique IP address. D) common name and number.
A
Using deception to get individuals to reveal sensitive information is also known as a(n) ________ attack. A) social engineering B) hacking C) identity theft D) trojan horse
A
What type of font looks fine on a monitor but is not smooth when printed? A) bitmapped B) TrueType C) OpenType D) unscalable
A
When a programmer checks to see if a program functions correctly and then corrects errors, it is known as A) debugging. B) de-erroring. C) default-error checking. D) error-proofing a program.
A
One main reason MySpace was created was to
create personal web sites
Vacuum tubes were eventually replaced by
integrated circuits
The first computers were designed to
perform repetitive calculations and tasks.
Which technological advancement made it possible for computers to become as small as they are today?
silicon chip
The primary output device for computers is a
video monitor
Pixels are A) dots of ink from an inkjet printer. B) tiny dots on a computer screen arranged in rows. C) a set of tools on-screen. D) points on the end of a PDA handheld device.
B
Software for organizing storage and retrieval of information is a(n) A) record. B) database program. C) platform. D) data warehouse.
B
In a customer database, a customer's surname would be keyed into a(n) ________ field. A) key B) text C) numeric D) computed
B
A bitmapped graphic is also called a(n) ________ graphic. A) vector B) raster C) animated D) digital
B
A program that masquerades as a useful program, but is really a destructive program, is a(n) A) worm. B) Trojan horse. C) virus. D) botnet.
B
A relational database requires one or more A) forms. B) tables. C) queries. D) reports.
B
A set of step-by-step procedures for accomplishing a task is known as a(n) A) hardware program. B) algorithm. C) software bug. D) firmware program.
B
A touchpad responds to A) light. B) pressure. C) clicking. D) the sense of heat from fingertips.
B
All of the following are advantages of using a computer network EXCEPT that it A) reduces costs by sharing hardware. B) promotes independence so users have exclusive control over their own data and applications. C) increases efficiency when software is shared. D) increases communication and productivity.
B
CPU stands for A) central production unit. B) central processing unit. C) computer processing unit. D) central printing unit.
B
Collecting personal information and effectively posing as another individual is known as the crime of A) spooling. B) identity theft. C) spoofing. D) phishing
B
Database programs can do all of the following EXCEPT: A) store and organize data. B) create graphics. C) communicate data. D) alleviate information overload.
B
Documents converted to ________ can be published to the Web. A) a .docx file B) HTML C) .xlsx format D) machine language
B
Errors in a software program are referred to as A) software omissions. B) bugs. C) viruses. D) bad recipe.
B
In what decade was ARPANET developed? A) 1950s B) 1960s C) 1970s D) 1980s
B
A ________ is a network of computers in a close physical area. A) WAN B) MAN C) LAN D) GAN
C
A set of computer instructions designed to solve a specific problem is referred to as a A) solution. B) device. C) program. D) hardware concept.
C
A(n) ________ broadcasts messages to all devices connected to a LAN. A) switch B) port C) hub D) NIC
C
Automated factories pose the greatest threat to the employment of A) highly educated workers. B) office workers. C) blue-collar workers. D) white-collar workers.
C
Every host computer on the Internet has a(n) ________. A) similar IP address B) unique 15-digit number C) unique IP address D) DNS
C
For patients living in remote places, doctors use the Web to practice A) anamorphic projection. B) remote imaging. C) telemedicine. D) automated surgery.
C
In a customer database table, all information for one customer is kept in a A) batch. B) field. C) record. D) query.
C
Of the following, which one is NOT a way to protect yourself from identity theft? A) Be sure to use a secure Web site. B) Handle email with care. C) Make all online purchases with a debit card. D) Do not put bills in the trash.
C
Placing a phone call pretending to be someone else, in order to trick someone into doing something is also known as A) phishing. B) identity theft. C) spoofing. D) hacking.
C
Processing information involves A) accepting information from the outside world. B) communication with another computer. C) performing arithmetic or logical operations on information that is input. D) All of these answers are forms of processing information.
C
The Internet is controlled by ________. A) the U.S. government B) IBM, Intel, and Microsoft C) no one in particular D) the U.S. taxpayers
C
The alignment of text on a line is referred to as A) spacing. B) alignment. C) justification. D) margin alignment.
C
The most basic computer network can be described as A) a minimum of five computers linked together. B) the Internet. C) two or more computers that are linked together. D) the use of satellites linking computers together.
C
The most common input devices include A) monitors and keyboards. B) monitors and mice. C) mice and keyboards. D) printer and mice.
C
The typical mouse uses ________ to detect movement. A) microwave signals B) coaxial cable C) reflected light D) digital signals
C
To have a page number and chapter title appear in the ________ margin of every page, create a footer. A) top B) left C) bottom D) right
C
When a program assigns 8 bits to a pixel, that pixel can display up to ________ different shades of gray. A) 8 B) 64 C) 256 D) 1,024
C
When reading a program, the CPU ________ instructions from the program. A) runs and operates B) opens and reads C) fetches and executes D) executes and opens
C
Which two factors are important to a casual computer user when you choose a computer? A) speed and design B) monitor size and resolution C) compatibility and performance D) compatibility and peripherals
C
________ is what allows a computer to function as a word processor, then a browser, and then a spreadsheet. A) Hardware B) Firmware C) Software D) Drivers
C
This machine was used to crack Nazi military codes:
Colossus
According to the FBI, how much identity theft begins with email? A) all B) one-half C) one-quarter D) two-thirds
D
All of the following are essential components of every computer system EXCEPT: A) software. B) hardware. C) people. D) networks.
D