Review Test:Final Exam Practice - Concepts
An example of a mobile device OS is A. macOS. B. Android. C. Linux. D. Windows.
B. Android
Before recycling your Windows computer, you should delete its data by using a program like A. Reclaim. B. File shredder. C. Windows Refresh. D. Windows Reset This PC.
B. File Shredder
Which of the following should you NOT do to secure a wireless network? A. Create a security encryption passphrase. B. Keep the default network name and router password. C. Implement media access control. D. Disable SSID broadcasting.
B. Keep the default network name and router password.
Which of the following would you NOT see on the Windows 11 taskbar? A. File Explorer B. Power C. Task View D. Start
B. Power
Data can be retrieved fastest from A. cache memory. B. registers. C. RAM. D. HDMI.
B. Registers
For complex web development, programmers often use A.Visual Basic. B. Scripting languages. C. Swift. D. DNA.
B. Scripting languages.
A feature in Windows that is used to easily position multiple open windows on the screen is called: A. Program Manager. B. Snap Layout. C. Virtual View. D. Virtual Desktops.
B. Snap Layout.
Which of the following are common to all programming languages? A. JSON and APIs B. Syntax, keywords, and operators C. SDLC and PDLC D. Architecture neutrality
B. Syntax, keywords, and operators
Ensuring that website content is not slanted in its point of view is checking for: A. relevance B. bias C. authority D. audience
B. bias
In a computer, each _can represent a single character such as "G". A. bit B. byte C. petabyte D. megabyte
B. byte
Which type of software controls many "back office" operations and processing functions such as billing, production, and inventory management? A. customer relationship management software B. enterprise resource planning software This is the correct answer. C. data management software D. course management software
B. enterprise resource planning software
Hackers A. are another name for a zombie attack. B. illegally break into a computer or network. C. are security experts in digital forensics. D. use VPNs to gather information.
B. illegally break into a computer or network.
When a printer receives a command, it generates a unique signal to the OS, which is called a(n) A. slice. B. interrupt. C. event. D. none of the above.
B. interrupt.
Using copyrighted works without permission of the copyright holder A. is never possible. B. is possible under the "fair use" doctrine. C. only applies to proprietary software. D. is only possible for photographs of public places.
B. is possible under the "fair use" doctrine.
The most common output device for hard output is a A. mouse. B. printer. C. scanner. D. display screen.
B. printer
What web browser feature would be particularly useful when using public computers? A. pinned tabs B. privacy browsing C. session restore D. all of the above
B. privacy browsing
Multifactor authentication requires you to have a combination of A. gestures. B. something you know, something you are, and something you own. C. methods of payment. D. your password and your PIN.
B. something you know, something you are, and something you own.
Unsupervised learning in an artificial training system improves A. by using training data. B. without being given specific data examples. C. by using augmented reality data. D. by using virtual reality scenarios.
B. without being given specific data examples.
Roberto downloads and modifies an open source software program, then uploads the program with a different name. Which type of software license are they most likely to be working under? A. Open Source License B. Copyleft C. GNU General Public License D. No license is necessary
C. GNU General Public License
Antivirus software prevents infection by recording key attributes about your files and checking to see if they change over time in a process called A. quarantine. B. updating. C. inoculation. D. signature.
C. Inoculation.
Crowdfunding sites include A. Bing and Google. B. Citi Bike and Zipcar. C. Kickstarter and GoFundMe. D. Amazon and Netflix.
C. Kickstarter and GoFundMe.
Which would NOT be considered application software? A. Microsoft PowerPoint B. Chrome browser C. Microsoft Windows 11. D. Adobe Illustrator
C. Microsoft Windows 11.
Which of the following connects the home network to the Internet? A. Router B. Range extender C. Modem D. Switch
C. Modem
Which of the following would NOT be a benefit of networking computers? A. Sharing printers and other peripherals B. Sharing an Internet connection C. Sharing software licenses D. Sharing files
C. Sharing software licenses
Which of the following is a sensor found in certain smartphones? A. RAM B. HDMI C. accelerometer D. DisplayPort
C. accelerometer
Viruses that load from USB drives left connected to computers when computers are turned on are known as A. script viruses. B. polymorphic viruses. C. boot-sector viruses. D. encryption viruses.
C. boot-sector viruses.
You need to know how to program to A. open a template file for budgeting in Microsoft Excel. B. use Microsoft Word to type text and select various fonts. C. create unique software solutions for specialized problems. D. create animations in PowerPoint.
C. create unique software solutions for specialized problems.
The Internet is a client/server network because A. information is served to people for free. B. the web is a client of the server called the Internet. C. devices connect as clients and ask for data from a computer that serves back results. D. devices need to pay as clients to access the Internet.
C. devices connect as clients and ask for data from a computer that serves back results.
Which of the following is an open electronic publishing format? A. SMS B. azw C. ePub D.PDF
C. ePub
A type of journalism where stories are invented and intended to spread misinformation rather than being factual is known as A. a public domain tale. B. an urban legend. C. fake news. D. a persistence of information story.
C. fake news.
When the binary code is retrieved from RAM and moved to the CPU, this stage is known as A. execute. B. store. C. fetch. D. decode.
C. fetch
Inheritance is a useful feature of a language because it promotes A. easier compilation. B. use of HTML5. C. reuse of existing code. D. proper control structures.
C. reuse of existing code.
C:\ on a Windows PC is like a large filing cabinet, and is referred to as the Question content area bottom Part 1 A. main directory. B. library directory. C. root directory. D. main path.
C. root directory.
A surge protector may look like just another power strip but it also can A. help manage heat. B. detect viruses. C. save your device if a voltage spike is sent through the electrical system. D. prevent theft.
C. save your device if a voltage spike is sent through the electrical system.
The crisis-mapping tool Ushahidi A. is only available in the United States. B. prevents two-way dialog between people. C. shows that a free software product can have great value. D. relies on people using their desktop computing power to help others.
C. shows that a free software product can have great value.
Which of the following would NOT be a concern with relying completely on cloud computing? Question content area bottom Part 1 A. accessing files when Internet access is not available B. creating an offline back-up of critical documents C. the collaborative nature of cloud-based applications D. security and privacy of stored data and information
C. the collaborative nature of cloud-based applications
The oldest, most traditional form of the SDLC is known as A. design. B. scrum. C. the waterfall model. D. debugging.
C. the waterfall model.
To create a ransomware attack one needs A. authorization from Google and Microsoft. B. a Ph.D. degree in Computer Science. C. very little knowledge because they can use Ransomware as a Service sites D. permission from the National Security Agency.
C. very little knowledge because they can use Ransomware as a Service sites
RAM is A. nonvolatile memory. B. both volatile and nonvolatile memory. C. volatile memory. D. neither volatile nor nonvolatile memory.
C. volatile memory.
A(n) is a laptop computer that can convert into a tablet-like device. A. all-in-one PC B. ultrabook C. Chromebook D. 2-in-1 PC
D. 2-in-1 PC
Which of the following is NOT a primary function of an OS? A. Providing a user interface B. Managing hardware C. Managing software D. Accessing the Internet
D. Accessing the Internet
In selecting the most appropriate language it is useful to know A. how much space the final code delivered can occupy. B. how quickly the final code must run. C. if there is a specific target environment (say, a specific operating system). D. all of the above
D. All of the above
Which of the following is NOT considered appropriate e-mail etiquette? Question content area bottom Part 1 A. Avoiding text abbreviations such as LOL, u, and r B. Adding a signature line that includes your contact information C. Including a meaningful subject in the subject line D. Always using Reply to All when responding to e-mail that is sent to multiple people.
D. Always using Reply to All when responding to e-mail that is sent to multiple people.
Which of the following can NOT be done with digital audio workstation software? A. Use synthesizers B. Use virtual instruments C. Create uncompressed MIDI files D. Apply special effects to digital video clips
D. Apply special effects to digital video clips
Which step happens first during the boot process? A. POST B. Customization settings checked C. Load OS to RAM D. CPU activates the BIOS that is stored in ROM
D. CPU activates the BIOS that is stored in ROM
Which of the following is not considered an accessibility utility? A. Magnifier B. Narrator C. Speech Recognition D. File Explorer
D. File Explorer
Which of the following is not a category of intellectual property? A. Copyright B. Patent C. Trade dress D. Imprint
D. Imprint
printers work by spraying tiny drops of ink onto paper. A. 3D B. Laser C. Large format D. Inkjet
D. Inkjet
Increasing the sampling rate when digitizing a file has which effect on the file? A. It decreases the file size B. It neither increases nor decreases the file size C. It depends on the codec used to digitize the file D. It increases the file size
D. It increases the file size
Which of the following describes satellite broadband? A. It uses strands of pure glass or plastic. B. Speed drops as the distance from the main signal source increases. C. It connects with coaxial cable. D. It requires a dish installed outside the building.
D. It requires a dish installed outside the building.
If you want to use your computer for recording your band, you would benefit most from a(n) A. overclocking interface. B. MIDI interface. C. RAID interface. D. HDMI interface.
D. MIDI interface.
Riannon is in her home, watching a video she took on vacation, while her brother is playing a game on his Nintendo Switch, and her dad is checking stock quotes on his iPad. What kind of network does this family most likely have? Question content area bottom Part 1 A. Both a and b B. Neither a nor b C. Client/server network D. P2P network
D. P2P network
is a set of strategies for using more than one drive in a system. A. The machine cycle B. VPU C. GPU D. RAID
D. RAID
Which of the following is NOT a computer port? A. DisplayPort B. Thunderbolt C. USB D. ROM
D. ROM
Which kind of software might be used to train airline pilots? A. Project management software B. Course management software C. Test preparation software D. Simulation software
D. Simulation software
The type of network that would be necessary to connect the networks of two college campuses would be: A. LAN B. PAN C. MAN D. WAN
D. WAN
Being computer literate includes being able to A.diagnose and fix hardware and software problems. B. avoid spam, adware, and spyware. C. use the web effectively. D. all of the above
D. all of the above
It is important to maintain your online reputation A. because employers often review social media before hiring employees. B. because of the persistence of information. C. to ensure that information about you is accurate. D. all of the above
D. all of the above
Which of the following describes an IP address? A. It identifies any computer connecting to the Internet. B. It is referred to as a dotted quad. C. It identifies a website. D. all of the above
D. all of the above
Intellectual property A. can be protected legally by the patent system. B. is the result of someone's creative work and design. C. can include works of music, film, or engineering design. D. all of the above.
D. all of the above.
An image ( or system backup ) saves only the following kinds of files: A. applications. B. photos and videos. C. data files. D. applications, operating system and data files.
D. applications, operating system and data files.
Embodied agents A. are plagiarism checking software systems. B. are intelligent personal assistants made possible by artificial intelligence. C. are hackers working for foreign governments. D. are robots that look and act like human beings.
D. are robots that look and act like human beings.
A good way to assess your CPU usage is to A. check the number reported by the system defrag utility. B. feel the temperature of the CPU with your hand. C. listen for the sound of a spinning hard disk drive. D. check the Performance tab of the Task Manager.
D. check the Performance tab of the Task Manager.
The steps of the program development life cycle start with A. testing. B. algorithm development. C. coding. D. describing the problem.
D. describing the problem.
The combination of media, Internet, entertainment, and phone services into a single device illustrates the principal of A. digital collusion. B. digital combination. C. digital cohesion. D. digital convergence.
D. digital convergence.
When analog data is measured and converted to a stream of numerical values, this is referred to as the data. A. compressing B. upstreaming C. streamlining D. digitizing
D. digitizing
In the URL http://www.whitehouse.gov/blog, what part of the URL is represented by www.whitehouse.gov? A. path or subdirectory B. top-level domain C. protocol D. domain name
D. domain name
Deepfake technologies A. can be detected even by casual viewers because of imperfections. B. help spread information about important issues. C. can be applied to photos but not live video. D. employ artificial intelligence techniques.
D. employ artificial intelligence techniques.
How the program should behave if the input data is invalid is part of A. beta testing. B. scope creep. C. process. D. error handling.
D. error handling.
Ergonomics is an important consideration A. only for laptop and desktop computers, but never for mobile devices. B. only for desktop computers. C. only for laptop computers. D. for all computing devices.
D. for all computing devices.
Sophisticated modeling software is helping international researchers A. analyze computer systems to gather potential legal evidence. B. market new types of products to a wider audience. C. create more intricate screenplays and movie scripts. D. increase the pace of research in finding and producing vaccines.
D. increase the pace of research in finding and producing vaccines.
An interpreted language has an advantage over a compiled language because A. it can support HTML5, the newest version. B. it is easier to use with online, virtual collaboration. C. it is a better structured version of the language. D. it helps make development faster.
D. it helps make development faster.
Firewalls use a process of _to assign IP addresses to the devices internal to the network so hackers will not know what they are. A. port blocking B. packet filtering C. VPN D. network address translation (NAT)
D. network address translation (NAT)
Device drivers are A. no longer used because of Plug and Play. B. always installed from a CD. C. mapping programs to generate driving instructions. D. often bundled with the operating system.
D. often bundled with the operating system.
Java is considered to be architecture neutral because it A. can run on many different generations of Windows. B. can run in any browser. C. can be recompiled to run on many CPUs. D. only needs to be compiled once and can run on many different CPUs.
D. only needs to be compiled once and can run on many different CPUs.
Moore's Law refers to the A. amount of memory on a memory chip. B. speed of DRAM. C. overall system processing capability. D. pace at which CPUs improve.
D. pace at which CPUs improve.
Which of the following functions of a computer is mostly responsible for turning data into information? A. input B. storage C. output D. processing
D. processing
Image-editing software allows you to A. compute complex formulas. B. conduct product simulations. C. create drafting blueprints. D. remove red eye.
D. remove red eye.
A is a program that takes complete control of your computer without your knowledge. Question content area bottom Part 1 A. sniffer B. VPN C. botnet D. rootkit
D. rootkit
Which of the following is NOT a component of a search engine? A. spider B. search engine software C. indexer program D. search assistant
D. search assistant
The minimum recommended standards for the operating system, processor, primary memory (RAM), and storage capacity for certain software are called A. hardware. B. redistributing standards. C. minimum standards. D. system requirements.
D. system requirements.
Touch-screen devices usually feature keyboards. A. laser-projection B. physical C. optical D. virtual
D. virtual
Which of the following would NOT cause interference or poor connectivity between nodes on a wireless network? A. A wireless extender B. Nodes that are too far apart C. Concrete walls D. Some appliances
A. A wireless extender
Which type of broadband Internet carries voice data and network data? A. DSL B. Fiber-optic C. Cable D. Satellite
A. DSL
A special processing chip found on video cards is the A. GPU B. ROM C. CPU D. HDMI
A. GPU
Which of the following would NOT impact the digital divide? A. Less sharing of the work we produce B. Legislation allowing communications companies to charge per website for access C. Expansion of free Wi-Fi connectivity in major cities D. A decline in the price of internet access
A. Less sharing of the work we produce
Which of the following is done to determine what devices are connected to a router? A. Log into the router's IP account This is the correct answer. B. Use Security manager in Windows C. Use File Explorer > My PC D. Count the number of devices connected to the switch(es)
A. Log into the router's IP account
Which required network device is generally integrated in computers and laptops? A. Network Adapter B. Router C. Modem D. Switch
A. Network Adapter
Which of the following is NOT a digital video file format? A. PDF B. MPEG-4 C. WMV D. AVI
A. PDF
When an OS processes tasks in a priority order, it is known as A. preemptive multitasking. B. interruptive multitasking. C. multitasking handling. D. preemptive interrupting.
A. Premmptive multitaking
Windows creates "restore points" so that you can. A. Return your system to the way it was before you installed new software. B. Add additional hard disk storage space. C. Protect your system from hackers. D. Extend your warranty.
A. Return your system to the way it was before you installed new software.
Which of the following should you do to uninstall a program from Windows 11? A. Right-click the app on the Start menu and select Uninstall B. Delete the program icon on the Start menu C. Right-click a program file in File Explorer and select Uninstall program D. Move the app icon on the Start menu to Trash
A. Right-Click the app on the Start menu and select Uninstall
Which of the following does NOT determine the quality of a digital image? A. The number of pixels in the camera lens This is the correct answer. B. Resolution of the camera C. File format and compression used D. Image sensor size
A. The number of pixels in the camera lens
Which of the following statements is FALSE? A. Unethical behavior is always illegal. B. Life experience affects an individual's personal ethics. C. Individuals who have no sense of right or wrong exhibit amoral behavior. D. Ethical decisions are usually influenced by personal ethics.
A. Unethical behavior is always illegal.
Language translator, thesaurus, and bibliography are features in what kind of software? A. Word processing B. Course management software C. Note-taking software D. Presentation
A. Word processing
Beta software is made available because A. a company is making an early release to test bugs. B. the company needs more profits. C. wireless networking must be added. D. new programmers have been hired.
A. a company is making an early release to test bugs.
Which type of social networking site would best describe LinkedIn? A. business networking B. social communication C. media sharing D. social payment
A. business networking
Which component of a computing device drains the battery the fastest? Question content area bottom Part 1 A. display screen B. Bluetooth adapter C. hard drive D. Wi-Fi adapter
A. display screen
A packet analyzer is called a sniffer because A. it captures and reads data inside each packet. B. it filters out spam. C. it starts a denial-of-service attack. D. it detects high-speed transmissions.
A. it captures and reads data inside each packet.
Personal ethics can be described as A. the set of formal or informal ethical principles you use to make decisions. B. the laws established by the legal system. C. society's established ethical system of conduct. D. the set of stories passed to you through your family history.
A. the set of formal or informal ethical principles you use to make decisions.