Computer Exam- Volume 1
A(n) ________ performs the same kind of computational work that a CPU performs but is specialized to handle 3-D graphics and image and video processing. GPU image engine accelerator SSD drive
GPU
A browser's ________ shows webpages users visited over a certain period of time.
History list
_______ is characterized by someone using personal information about you (such as your name or Social Security number) for the purpose of defrauding others.
Identity theft
_____ are often used to perform legitimate functions on websites, such as collecting names and addresses of customers, but some can be malicious and can infect your computer with a virus.
Scripts
________ is the default browser for Mac computers. Safari Apple Mozilla Firefox
Safari
Google ________ is a specialized search tool that searches scholarly literature such as peer-reviewed papers, theses, and publications from academic organizations.
Scholar
A mini-program that is executed without your awareness when you visit a website is called a(n) _______.
Script
What is a specialty search engine? A collection of bookmarks on a topic Fee-based search engines with human assistants A metasearch engine Searches only sites deemed appropriate to an interest or industry
Searches only sites deemed appropriate to an interest or industry
____ is a subcategory of e-commerce that uses social networks to help in marketing and purchasing products.
Social commerce
Which of the following is NOT routinely scanned by antivirus software? E-mail attachments Downloaded images Macros Spam
Spam
_____ makes the audio appear to come from all directions.
Surround Sound
Using a ________, you can screen data coming into the logical ports to see if it comes from a trusted source. DDoS token packet filter packet sniffer
packet filter
In the URL https://www.senate.gov/general, general is the ________. domain protocol top-level domain path or subdirectory
path or subdirectory
A firewall designed specifically for home networks is called a ________ firewall. personal static home logical
personal
The amount of RAM that is actually sitting on memory modules in your computer is referred to as _____ memory.
physical
Which of the following is an example of a subdirectory in a URL? .com prenhall.com/tia HTTP:// aol.com
prenhall.com/tia
The first part of a URL, such as http:, indicates the set of rules, or ________, used to retrieve the specified document. browser path protocol domain
protocol
If you are looking for a particular set of keywords in an exact order enclose your keywords in ________.
quotes
A ________ is a small program that executes without your knowledge when you enter a website. script worm macro keystroke logger
script
Response time refers to the amount of time it takes ________. to adjust the settings on a monitor for your computer to boot up to begin printing once you have clicked Print for a pixel to change color
for a pixel to change color
How do metasearch engines work? They suggest alternative search terms. They use wild cards, extensively. They search other search engines' results. They operate in a Boolean string.
They search other search engines' results.
Which of the following parts of a URL indicates the type of organization a host is? Domain name Path Top-level domain Protocol
Top-level domain
A game or screen saver that appears desirable or useful but when it runs does something malicious is called a(n) ____
Trojan horse
A(n) _____ is a program that appears to be something useful or desirable but does something malicious in the background without your knowledge.
Trojan horse
Which of the following ports has the fastest data transfer rate? DVI SVGA FireWire 800 USB 3.0
USB 3.0
A(n) ________ is a website's address.
Uniform Resource Location (URL)
Which is NOT an example of a keyword search strategy to get more specific results? Searching within a specific website Using a metasearch engine Using wild cards Using quotation marks around key words or phrases
Using a metasearch engine
Which of the following is NOT a good method to evaluate a website as appropriate for research? Using an ecommerce website Looking for clues of bias such as a specific agenda Paying attention to the URL to make sure it's from a respected source Using specialized search tools such as Google Scholar
Using an ecommerce website
Which of the following are considered slightly different from viruses as they can run independently of host file execution? Spam E-mail viruses Worms Keystroke logger
Worms
When evaluating the validity of information found on websites, which of the following is FALSE? You should assess that all web pages contain at least some valid information. You should verify information with other online and non-web sources. You should see if the site has the date when it was published. You should determine whether the information is biased.
You should assess that all web pages contain at least some valid information.
A(n) _____ program prevents unwanted malicious programs from being installed on your computer.
antivirus, anti-virus, anti-malware, or anti-spyware
For security reasons, you should be extremely wary of opening e-mail _____ such as an Excel file.
attachments
A program installed by hackers that allows them to take almost complete control of your computer without your knowledge is called a(n) ______ program.
backdoor or rootkit
A program that executes whenever a computer starts up, ensuring that the virus will be loaded into memory immediately, even before some virus protection programs can load is called a ________. multipartite virus boot-sector virus time bomb logic bomb
boot-sector virus
A large group of software programs that runs autonomously on zombie computers is called a(n) _______
botnet
A website's URL can identify all of the following things EXCEPT the ________. protocol used to retrieve a web document browser required to view the website file path for additional pages within the website website's domain name
browser required to view the website
Anyone who unlawfully breaks into an individual computer or a computer network is called a(n) ______
hacker
The list of results returned to you when you search for information on the web is called a list of ________. keywords strikes hits queries
hits
Which of the following is the correct way to indicate a URL? https://www.microsoft.com http:\www.microsoft.com http:/www.microsoft.com http:\\www.microsoft.com
https://www.microsoft.com
Data that has been organized is called ________. bytes information binary digits output
information
Your computer can get a virus by booting it with an infected ______ left in a USB port.
jump drive, flash drive, thumb drive, or USB drive
The individual words you use as search terms when using a search engine are referred to as ________. queries keywords wildcards hits
keywords
In reference to units of measurement, KB stands for _______
kilobyte
A(n) ________ printer uses toner rather than wet ink.
laser
LCD stands for ______
liquid crystal display
Flat-panel monitors are also called ______ monitors.
liquid crystal display (LCD) or light emitting diode (LED)
A virus that is triggered when certain logical conditions are met, such as opening a file or starting a program a certain number of times is called a ________. worm time bomb logic bomb macro virus
logic bomb
You can increase the number of USB ports on your computer by adding a(n) ________. jump drive repeater gateway expansion hub
expansion hub
A single forward slash and additional text following the domain name in a URL, specifies a particular ________. file or path domain host web page outside of the existing website
file or path
A good way to keep hackers out of a computer is to install a(n) ______
firewall
Virtual communications gateways that allow a computer to accept requests for information from other networks or computers are called ________. open ports logical ports a botnet e-mails
logical ports
The sequence of stages which process a single computer instruction is called the ________. kernel memory control cycle ALU machine cycle
machine cycle
A(n) ______ is a short series of commands that are usually used to automate repetitive tasks.
macro
Processor speeds are measured in units of ______
megahertz
Dogpile is an example of a(n) ________ engine.
metasearch
A(n) _______ searches other search engines rather than individual websites.
metasearch engine
An inkjet printer sprays ink onto the page and is an example of a(n) ______ printer.
nonimpact
Blu-ray and DVDs are referred to as _____ media.
optical and storage
In the URL https://www.senate.gov/committees/committees_home.htm, .gov is the ________. domain top-level domain protocol folder on domain
top-level domain
In a URL, two- or three-letter designations such as .edu or .uk are known as ________.
top-level domains (TLDs?)
URL stands for _________.
uniform resource locator
Flash drives plug into a(n) ________ port on a computer.
universal serial bus (USB)
The most common ports used to connect input and output devices are _______ ports.
universal serial bus (USB)
ShieldsUP and LeakTest are software programs you can use to test whether ________. your firewall is working correctly you have a memory leak your computer is a zombie packets arrive at their intended destinations
your firewall is working correctly
si.edu- Exhibitions- https://- .edu-
- domain - folder or subdirectory - protocol - top-level domain
The current surround sound standard is from _____
Dolby
A computer program that attaches itself to another computer program and attempts to spread itself to other computers when files are exchanged is called a ________. worm bug spam virus
virus
The * (asterisk) symbol is an example of a(n) _________ , which can used in performing searches with some search engines.
wild card
One byte is equal to ________. 8 characters 1 word 100 bits of data 8 bits of data
8 bits of data
________ services allow you to keep your files on the Internet so you can access your files from any computer.
Cloud
Because displaying graphics demands a lot of the CPU, a video card also comes with its own ________
Graphics Processing Unit
Which of the following ports do you need to use with a home theater system? FireWire DVI SVGA HDMI
HDMI
________ usually have the largest storage capacity of any storage device inside the computer. Flash memory cards Hard drives DVD drives Blu-ray drives
Hard drives
.com- .edu- .mil- .gov- .org-
- Chevrolet - Harvard University - U.S. Army - IRS - Alzheimer's Association
worm- Trojan horse- logic bomb- encryption virus- polymorphic virus-
- attempts to travel between systems through network connections to spread an infection - appears to be something useful but does something malicious in the background - executes when a certain condition is met - a program that renders your computer files unusable by compressing them - a virus that changes its own code to avoid detection
packet filtering- zombie- firewall- network address translation- packet sniffer-
- method for selectively allowing certain requests to access a port - a computer controlled by a hacker - hardware or software for protecting computers from hackers - technique of assigning hidden internal IP addresses to protect a network against hackers - program used by hackers to look at individual packets as they travel on the Internet
firewall- hacker- packet- botnet- virus-
- prevents intrusion into your computer - a person who poses a threat to your computer - small piece of data that travels through the Internet - group of software programs that usually run independently on a large number of zombie computers - a small program that can compromise a computer system
alternative search engine- specialty search engine- search strategies- keyword- quotation marks-
- search engines other than Google - searches only sites that are relevant to the particular subject - skills used to optimize search engine results - used by search engines to determine what to look for - enclose words or phrases to get exact hits
B2C- e-commerce- C2C- https- social commerce-
- transaction performed between a customer and an online store - business conducted online - transaction between two people at an online auction site - secure sockets layer protocol prefix - uses social networks to assist in marketing and purchasing products
Edge- Chrome- Firefox- Safari-
-Microsoft -Google -Mozilla -Apple
The top-level domain for the White House would be _____.
.gov
Which of the following is NOT an approved top-level domain? .net .uk .org .htm
.htm
________ floods a computer with requests until it shuts down denying access to legitimate users. An encryption virus A DoS attack A polymorphic virus Port blocking
A DoS attack
Which of the following is a program that appears to be something useful or desirable but does something malicious in the background? A zombie A Trojan horse A virus A worm
A Trojan horse
Which of the following is a program that appears to be something useful or desirable but does something malicious in the background? A zombie A Trojan horse A worm A bot
A Trojan horse
________ is the e-commerce term for transactions that take place between a business and other businesses. Brick-and-mortar C2C B2B Point-and-click
B2B
When a customer makes an online purchase from a store such as walmart.com, the transaction is referred to as a(n) _____ transaction.
B2C
Which of the following is an example of a click-and-brick business? Yahoo! Barnes and Noble Amazon eBay
Barnes and Noble
Which of the following statements is FALSE regarding safety and e-commerce? Privacy policies indicate how your data will be used by a company. A closed padlock on your screen indicates a secure connection. Browsers will alert you if you are processing a transaction on an unsafe site. Illegitimate sites can use security symbols illegally.
Browsers will alert you if you are processing a transaction on an unsafe site.
Craigslist is an example of a(n) ________ site.
C2C
The web browser created by Google is ________.
Chrome
Which of the following virus types uses the address book in the victim's e-mail system for distribution? Multipartite virus Macro Polymorphic E-mail virus
E-mail virus
Which of the following virus types infects your computer by running a program that searches for common types of data files (such as a Microsoft file) and compresses them using a complex encryption key that renders your files unusable? Stealth Macro Encryption Polymorphic
Encryption
Which of these is NOT a specialty search on Google? Scholar Finance Fashion Patent Search
Fashion
All of the following are web browsers EXCEPT ________. Firefox Chrome Linux Safari
Linux
The term ______ refers to businesses that have physical store locations as well as a website for online purchases.
click-and-brick
C2C stands for ______
consumer to consumer
The representation of a fact, figure, or idea is called ________. byte data input information
data
Attacks that are launched from multiple zombie computers at the same time are called ________. distributed denial-of-service attacks (DDoS) script kiddies worms Trojan horses
distributed denial-of-service attacks (DDoS)
The process of conducting business online is called ____
e-commerce
Which of the following is a popular example of a C2C site? Google Amazon.com Yahoo! eBay
eBay
A specialty search engine is a(n) ________. spider program which collects hits over time search engine that searches only sites that are relevant to a particular topic launch style search engine internal website search
search engine that searches only sites that are relevant to a particular topic
A metasearch engine is different than a regular search engine because it ________. searches for several keywords simultaneously is much faster than a regular search engine is a service that charges a fee for use, due to its superiority searches other search engines instead of individual websites
searches other search engines instead of individual websites
Hackers can use packet ________ to capture valuable information, then sell or use the information illegally. sniffers interceptors filters intruders
sniffers
A virus that is triggered by the passage of time is called a ________. logic bomb macro virus worm time bomb
time bomb
A virus that is triggered on a certain date is called a(n) _____.
time bomb
Images are created on an LCD monitor using millions of tiny dots known as _______ .
pixels
USB- Ethernet- DVI- VGA- HDMI-
-commonly used for connecting input and output devices - used to connect a computer to a network -commonly used to connect projectors to a computer system - commonly used to connect CRT monitors in older systems -used for home theater systems
GPU- video adapter- DVI- HDMI- eSATA-
-special processor for images and 3-D graphics -expansion card used to translate binary data into images -port used for digital LCD connection -port used for connecting gaming consoles -can be used to connect an external hard drive
random access memory- nonvolatile storage- ALU- motherboard- physical memory-
-temporary storage space - permanent storage - performs calculations and makes logic and comparison decisions - primary circuit board - the amount of RAM sitting on memory modules
Which of the following statements about flash memory is FALSE? A flash drive is needed to read a flash memory card. Some flash memory can be plugged directly into a USB port. Flash memory cards are often used in smartphones. Some flash memory cards can store 256 GB of data.
A flash drive is needed to read a flash memory card.
Which of the following is NOT an example of data? A word A picture A sound A report
A report
Which of the following statements is FALSE? When referring to computers, every number, letter, or special character consists of a unique combination of 8 bits. A single bit can represent a single letter. Everything a computer does is broken down into a series of 0s and 1s. Bit is short for binary digit.
A single bit can represent a single letter.
Which of the following CANNOT be represented by a single byte? A special character such as @ A number such as 45 A letter of the alphabet such as Y A word such as Tom
A word such as Tom
Which of the following does NOT determine CPU performance? Speed of the front side bus Amount of cache on the CPU Processor speed Amount of nonvolatile memory
Amount of nonvolatile memory
With a liquid crystal display (LCD) monitor, what causes images to be displayed on the screen? Static electricity Up and down movement of light Light surrounding the images An electric current passing through the liquid crystal solution and moving the crystals to either block the fluorescent light or let the light shine through
An electric current passing through the liquid crystal solution and moving the crystals to either block the fluorescent light or let the light shine through
Which of the following optical storage devices holds the most high-definition video? BD DVD Hard drive CD
BD
The ____ optical disc has the largest storage capacity.
Blu-Ray
Which of the following is NOT an optical storage device? Flash drive CD Blu-ray DVD
Flash drive
Which of the following statements about your computer's primary hard drives is FALSE? Some hard drives hold up to 8 TB of information. Hard drives are nonvolatile storage devices. Internal hard drives use a laser to read and write data. Internal hard drives are enclosed in the system unit.
Internal hard drives use a laser to read and write data.
Which of the following statements about assessing website security is TRUE? A website's information policy ensures that confidential information is kept secure. Just because a website has a return policy, it does not mean online transactions are secure. Websites that conduct online sales are required to take special precautions to ensure all transactions are secure. The URL of a secure website begins with shttps://.
Just because a website has a return policy, it does not mean online transactions are secure.
Which of the following is the smallest unit of measure? Terabyte Megabyte Gigabyte Petabyte
Megabyte
Which of the following is the largest unit of measure? Megabyte Terabyte Petabyte Kilobyte
Petabyte
The colors displayed by an LCD monitor are made by combining which of the following colors? Green, blue, and yellow Red, magenta, and blue Cyan, yellow, magenta, and black Red, blue, and green
Red, blue, and green
Which of the following does NOT indicate that a website is secure? The Microsoft seal displayed on the toolbar. A closed padlock appears in the toolbar. The URL begins with https://. The address bar is colored in green.
The Microsoft seal displayed on the toolbar.
The CPU includes which two sections? The arithmetic logic unit and the associative memory The control unit and the front side bus The control unit and the arithmetic logic unit The arithmetic logic unit and the front side bus
The control unit and the arithmetic logic unit
Which of the following is NOT a suggested way to protect yourself when shopping online? You should save a copy of the order. You should use a debit card. You should look for third-party verification. You should make sure the company has a phone number and street address.
You should use a debit card.
Bit is short for ________. megabyte kilobyte byte binary digit
binary digit
Computers work only with ________. binary numbers letters and symbols hexadecimal numbers decimal numbers
binary numbers
A CPU's ______ determines how quickly the processor can work.
clock speed
A monitor's ________ is a measure of the difference in light intensity between the brightest white and the darkest black colors. aspect ratio resolution brightness contrast ratio
contrast ratio
Which of the following is NOT a type of optical media? eSATA BD-ROM CD-R DVD-RW
eSATA
How many bits does it take to spell the word yes? 30 8 3 24
24
The fastest USB port currently available is using the new standard USB ____
3.1
Which of the following storage devices has the most capacity? BD DVD CD Cache
BD
Computers use ________ language to process data at the most basic level. computer C++ English binary
binary
Optical drives use a(n) ______ to store and read data on a CD or DVD.
laser
Cache memory is ________. a type of read-only memory slower than RAM permanent memory a type of random access memory that is more accessible to the CPU than regular RAM
a type of random access memory that is more accessible to the CPU than regular RAM
Two of the most important factors to consider when choosing an LCD monitor are its resolution and ________. dot pitch contrast refresh rate aspect ratio
aspect ratio
A high-capacity _______ hard drive is a viable, portable option for backing up the data on your computer's primary hard drive.
external
The _______ connects the CPU to the system memory.
front side bus and FSB
Which of the following ports are used to connect a computer to a cable modem or to a network? Ethernet DVI HDMI FireWire
Ethernet
Which of the following statements about CPU speed is FALSE? It is not the only indicator of a computer's speed. It is also called kernel speed. It can be determined by looking at the System Properties window. It is measured in gigahertz.
It is also called kernel speed.
________ are the places that peripheral devices attach to the computer. Gateways Repeaters Ports Hubs
Ports
______ remembers everything the computer needs to process data into information, but only while the computer is on.
RAM
The primary circuit board of a computer system is the ____
motherboard
Computer systems always include ________ devices for permanent storage of instructions and data. volatile storage nonvolatile storage kernel memory flash memory
nonvolatile storage
bit- byte- hertz- megabyte- terabyte-
- 0 or 1 - 8 binary digits -machine cycles per second -greater than a kilobyte, smaller than a gigabyte -more than one trillion bytes
USB 3.0 transfer rate- DVD storage capacity- Blu-ray storage capacity- eSATA transfer rate- USB 2.0 transfer rate-
- 5 Gbps - 7 GB of data - 50 GB of data - 3 Gbps - 400 Mbps
printer speed- printer resolution- inkjet printers- all-in-one- laser printers-
- measured in ppm - measured in dpi - affordable and produce photo-quality images - combines the functions of a printer, scanner, copier, and fax into a single machine - generally produce the highest quality printouts
Eight binary digits is equal to ________. 1 bit 1 byte 100 bytes 1 word
1 byte
To accommodate HD format video, new monitors have an aspect ratio of ________. 16:9 5:4 4:3 25:16
16:9
The resolution of a monitor has to be at least ________ to play a Blu-ray movie 1920 × 1080 1024 × 768 1366 × 768 1600 × 1200
1920 × 1080
_______ memory cards are removable storage devices that let you transfer digital data to a computer.
Flash
An LCD's viewing angle is measured in ________. refreshes megahertz degrees inches
degrees
A printer's resolution is measured in ________ ppm pixels pdf dpi
dpi
In reference to units of measurement, GB stands for ____
gigabyte
The amount of RAM recommended for most systems today is measured in ________. megahertz (MHz) megabytes (MB) gigabytes (GB) gigahertz (GHz)
gigabytes (GB)
A CPU's clock speed, is measured in ________. kilohertz (KHz) bytes per second (Bps) gigahertz (GHz) bits per second (bps)
gigahertz (GHz)
On secure websites, http changes to ________. shttp httpsecure https sws
https
The small circuit boards that hold RAM chips are known as ____
memory modules
The small circuit boards that hold a series of RAM chips are called ________. virtual memory expansion cards memory modules flash memory cards
memory modules
The CPU is located on the computer's ________. hard disk kernel motherboard flash memory
motherboard
If you want to be able to use a form of optical media (such as a CD or DVD) that you can write to as many times as you like, your media should be in _____ format.
read/write
A ________ drive has no moving parts. Blu-ray solid state compact disc hard disk
solid state
The sound in Dolby's eighth channel is sent to a(n) _____
subwoofer
RAM is an example of _______ storage because when the power is turned off, RAM is cleared out.
temporary
The percentage of time your CPU is working is referred to as CPU ________. throughput usage capacity latency
usage
An expansion card that translates binary data into images is a(n) ________ card. audio sound game video
video
Video cards include their own RAM, called ______
video memory
A megabyte holds approximately ________ bytes of data. 1,000,000,000,000 1,000,000,000,000,000 1,000,000,000 1,000,000
1,000,000
A kilobyte holds ________ bytes of data. 1,048,576 1,024 16 256
1,024
contrast ratio- brightness- viewing angle- response time- resolution-
-the difference in light intensity between the brightest white and the darkest black colors a monitor can produce -measured as candelas per square meter -tells how far you can move to the side, above, or below a monitor before the image quality degrades below acceptable levels - how long it takes a pixel to change color -number of pixels displayed on a screen
A bit consists of a ________. series of 0s and 1s such as 101 single letter such as R and B 0 or a 1 number such a 2 or 9
0 or a 1
An LCD screen is composed of a fixed grid of ________. rays organic materials pixels phosphors
pixels
Speed for printers is measured in ________. ppm Kps Mhz pps
ppm
A(n) ______ printer works either by melting wax-based ink onto ordinary paper or by burning dots onto specially coated paper.
thermal
The Better Business Bureau seal on a website indicates ________. a business to consumer (B2C) site a business to business (B2B) site purchases can only be done using credit cards third-party verification
third-party verification
A kilobyte contains approximately one ________ bytes of data. million thousand billion hundred
thousand
A(n) ______ is also referred to as a jump drive, USB drive, or flash drive.
thumb drive
The _______ of a monitor tells how far you can move to the side, above, or below the monitor before the image quality degrades to unacceptable levels.
viewing angle