Chapter 6 Quiz: Input and Output, Chapter 9 - Privacy, Security & Ethics (Quiz), Chapter 8 - Communications and Networks (Quiz), ch 8 quiz, Chapter 5 Quiz: The System Unit, Chapter 4 Quiz: System Software, Chapter 3 Quiz: Application Software, ch 7 q...

Lakukan tugas rumah & ujian kamu dengan baik sekarang menggunakan Quizwiz!

voice over IP

-Transmission of telephone calls over networks.

Cellular services use _______ to provide wireless connectivity to the Internet

3G and 4G cellular networks

DSL

A service that uses existing phone lines to provide high-speed connections is called _______.

Using this type of communications channel, several users can simultaneously use a single connection for high-speed data transfer.

Broadband

Laptops and tablets use _____ that are typically located outside the system unit. Answers: A. AC adapters B. batteries C. power supply units D. MiniDc

Correct Answer: A. AC adapters

This indicates the monitor's ability to display colors by comparing the light intensity of the brightest white to the darkest black. Answers: A. Contrast ratio B. Dot Pitch C. Active display area D. Resolution

Correct Answer: A. Contrast ratio

With these systems, input and output devices are located outside the system unit. Answers: A. Desktop systems B. Personal digital assistants C. Smartphones D. Laptop computers

Correct Answer: A. Desktop systems

Most personal computers allow users to expand their systems by providing these on the system board. Answers: A. Expansion slots B. Ports C. Sound cards D. Network cards

Correct Answer: A. Expansion slots

These types of ports typically provide high-speed connections to specialized devices such as camcorders and storage devices. Answers: A. FireWire B. Serial C. Parallel D. AGP

Correct Answer: A. FireWire

Which of the following can be used to connect several devices to the system unit and are widely used to connect keyboards, mice, printers, storage devices, and a variety of specialty devices? Answers: A. USB port B. SATA C. Parallel port D. Firewire bus

Correct Answer: A. USB port

Pathways that support communication among the various electronic components on the system board are called _____. Answers: A. bus lines B. network lines C. logic paths D. gate ways

Correct Answer: A. bus lines

Which of the following ports provide high-speed connections for external hard-disk drives, optical discs, and other large secondary storage devices? Answers: A. eSATA B. S/PDIF C. HDMI D. MiniDP

Correct Answer: A. eSATA

Most operating systems support the ability to switch between different applications. This is called _______. Answers: A. multitasking B. booting C. translating D. driving

Correct Answer: A. multitasking

Which of the following printer features enables you to print on both sides of a sheet of paper? Answers: A. Simplex B. Duplex C. Resolution D. Dual Matrix

Correct Answer: B. Duplex

The category of operating system used for handheld devices. Answers: A. Network B. Embedded C. Stand-alone D. Open source

Correct Answer: B. Embedded

Which of the following is a function of the control unit? Answers: A. It provides pathways that support communication among the various electronic components. B. It directs the movement of electronic signals between memory and the arithmetic-logic unit. C. It performs fundamental math operations like addition, subtraction, and so on. D. It uses the logic to compare two pieces of data.

Correct Answer: B. It directs the movement of electronic signals between memory and the arithmetic-logic unit.

In a network operating system, this computer coordinates all communication between computers. Answers: A. Client B. Server C. Terminal D. Mode

Correct Answer: B. Server

This type of computer is a thin slab that is almost all monitor with the system unit located behind the monitor. Answers: A. Laptop B. Tablet C. Desktop D. Smartphone

Correct Answer: B. Tablet

This character encoding scheme allows non-English characters and special characters to be represented. Answers: A. ASCII B. Unicode C. EBCDIC D. ANSIC

Correct Answer: B. Unicode

Term used to describe the number of bits that a CPU can access at one time. Answers: A. Bitrate B. Word C. Pulse width D. Character

Correct Answer: B. Word

The size, or _______, is measured by the diagonal length of a monitor's viewing area. Answers: A. resolution B. active display area C. aspect ratio D. dot pitch

Correct Answer: B. active display area

Frequently-accessed information is held in _____. Answers: A. hard drive B. cache memory C. flash memory D. read only memory

Correct Answer: B. cache memory

On the motherboard, the connection points for chips are referred to as _____. Answers: A. slots B. sockets C. ports D. lines

Correct Answer: B. sockets

A 32-bit-word computer can access _____. Answers: A. 2 bytes at a time B. 16 bytes at a time C. 4 bytes at a time D. 8 bytes at a time

Correct Answer: C. 4 bytes at a time

Which of the following is not a character encoding standard? Answers: A. EBCDIC B. ASCII C. CISC D. Unicode

Correct Answer: C. CISC

These specialty chips are designed to improve specific computing operations such as displaying 3D images and encrypting data. Answers: A. Smartcards B. CPUs C. Coprocessors D. NIC cards

Correct Answer: C. Coprocessors

A type of specialty processor devoted exclusively to protecting your privacy. Answers: A. Data cards B. Micro cards C. Cryptoprocessor D. Embedded cards

Correct Answer: C. Cryptoprocessor

Which of the following ports is used for connecting musical instruments to a sound card? Answers: A. MiniDP B. S/PDIF C. MIDI D. eSATA

Correct Answer: C. MIDI

This operating system is designed to run only with Apple computers. Answers: A. Windows B. Linux C. Mac OS D. UNIX

Correct Answer: C. Mac OS

Which of the following allows a computer to run two or more operations simultaneously? Answers: A. Coprocessors B. Multiplexing C. Multicore processors D. Binary system

Correct Answer: C. Multicore processors

With this type of memory, large programs are divided into parts and the parts are stored on a secondary device, usually a hard disk. Answers: A. Flash B. Cache C. Virtual D. Extended

Correct Answer: C. Virtual

The processing speed of a microprocessor is typically represented by its _____. Answers: A. bus line B. control unit C. clock speed D. ALU

Correct Answer: C. clock speed

In most personal computer systems, the CPU is contained on a single chip called the _____. Answers: A. semiconductor B. ALU C. microprocessor D. control unit

Correct Answer: C. microprocessor

Before sending a large file over the Internet, you might want to use one of these programs. Answers: A. Disk defragmenter B. Uninstaller C. Disk cleanup program D. File compression program

Correct Answer: D. File compression program

When you reboot your system, the computer follows start-up instructions stored in this type of memory. Answers: A. DRAM B. SDRAM C. Cache D. Flash

Correct Answer: D. Flash

All of the following are commonly used units of measurement to describe memory capacity, except _____. Answers: A. Megabyte (MB) B. Gigabyte (GB) C. Terabyte (TB) D. Nanobyte (NB)

Correct Answer: D. Nanobyte (NB)

OMR, OCR, and MICR are all types of _______. Answers: A. Radio Frequency Card Readers B. magnetic card readers C. bar code readers D. character and mark recognition devices

Correct Answer: D. character and mark recognition devices

Tiny circuit boards etched onto squares of sandlike material, called silicon, are called _____. Answers: A. buses B. slots C. sockets D. chips

Correct Answer: D. chips

A computer can become infected with viruses in all the following ways, except by _______. Answers: A. opening attachments to e-mail messages B. downloading software from the Internet C. downloading files from the Web D. creating a new folder on your computer

Correct Answer: D. creating a new folder on your computer

The proportional relationship between a display's width and height. Answers: A. Aspect ratio B. Resolution C. Dot pitch D. Clock speed

Correct Answer: A. Aspect ratio

The distance between each pixel. Answers: A. Dot pitch B. Refresh rate C. Resolution D. Word size

Correct Answer: A. Dot pitch

A dedicated, mobile device for storing and displaying e-books and other electronic media including electronic newspapers and magazines. Answers: A. E-book reader B. Interactive whiteboard C. HDTV D. Flat panel monitor

Correct Answer: A. E-book reader

This reading device is used in banks to read the numbers on the bottom of checks and deposit slips. Answers: A. MICR B. OCR C. OMR D. UPC

Correct Answer: A. MICR

Keyboards that are widely used on various smartphones and other small portable devices, and which are designed primarily for communicating via texting and connecting to the Web. Answers: A. Thumb B. Traditional C. Notebook D. Combination

Correct Answer: A. Thumb

The system board is also known as the _____. Answers: A. expansion slot B. motherboard C. expansion card D. bus

Correct Answer: B. motherboard

Two categories of laser printers are _______. Answers: A. thermal and personal B. personal and shared C. ink-jet and high-definition D. active-matrix and passive matrix

Correct Answer: B. personal and shared

The arrangement of keys on a keyboard, QWERTY reflects the keyboard layout by _______. Answers: A. representing the phonetics of the alphabets most closely associated with the keyboard B. taking the letters of the first six alphabetic characters found on the top row of keys C. using the alphabetic characters most frequently used on the keyboard D. using the letters of the alphabetic characters that are closest to access while typing

Correct Answer: B. taking the letters of the first six alphabetic characters found on the top row of keys

This type of program allows communication between a peripheral device, such as a mouse or printer, and the rest of the computer system. Answers: A. Client B. Virtual machine C. Device driver D. Server

Correct Answer: C. Device driver

Which of the following types of character recognition systems is used for standardized multiple-choice testing? Answers: A. UPC B. MICR C. OMR D. OCR

Correct Answer: C. OMR

Which of the following is not a type of scanning device? Answers: A. Optical scanner B. Bar code reader C. Stylus D. Character and mark recognition

Correct Answer: C. Stylus

This type of boot occurs when the computer is already on and you restart it without turning off the power. Answers: A. Generic boot B. Live boot C. Warm boot D. Cold boot

Correct Answer: C. Warm boot

For multicore processors to be used effectively, computers must understand how to divide tasks into parts that can be distributed across each core—an operation called _____. Answers: A. arithmetic-logic processing B. multiplexer processing C. parallel processing D. graphics coprocessing

Correct Answer: C. parallel processing

The series of dots that form the image on a monitor are called _______. Answers: A. picas B. bits C. pixels D. bytes

Correct Answer: C. pixels

_______-input devices convert sounds into a form that can be processed by the system unit. Answers: A. Electrolyzing B. Plotting C. Webcam D. Audio

Correct Answer: D. Audio

Specialized devices with a large display connected to a computer projector and are widely used in classrooms and corporate boardrooms. Answers: A. Scanners B. HDTV C. E-books D. Digital or interactive whiteboards

Correct Answer: D. Digital or interactive whiteboards

The study of human factors related to things people use. Answers: A. Headgear B. RSI C. Technical study D. Ergonomics

Correct Answer: D. Ergonomics

_______ is any data or instructions that are used by a computer. Answers: A. Digital B. Output C. Information D. Input

Correct Answer: D. Input

Which of the following statements is incorrect? Answers: A. Printer resolution is measured in dpi (dots per inch). B. Printer output is often called hard copy. C. Memory within a printer is used to store printing instructions and documents waiting to be printed. D. Printer speed is measured in the number of words printed per minute.

Correct Answer: D. Printer speed is measured in the number of words printed per minute.

Type of keyboard that uses a touch screen as the input device. Answers: A. PDA B. Wireless C. Traditional D. Virtual

Correct Answer: D. Virtual

Which of the following allows the transmission of telephone calls over computer networks? Answers: A. Faxing B. Cell phones C. PDAs D. Voice over IP

Correct Answer: D. Voice over IP

Integrated circuits must be mounted on _____, which are then plugged into the system board. Answers: A. slots B. pins C. ports D. chip carriers

Correct Answer: D. chip carriers

Printers connected to the Internet that provide printing services to others on the Internet are called _______. Answers: A. dot-matrix printers B. thermal printers C. plotters D. cloud printers

Correct Answer: D. cloud printers

Bar code readers use _______ embedded in them to read bar codes. Answers: A. coprocessors B. magnetic cells C. RFID microchip D. photoelectric cells

Correct Answer: D. photoelectric cells

The most widely used audio-input device is the _______. Answers: A. cloud printers B. microphone C. speakers and headphones D. faxes

Correct Answer: speakers and headphones

connection devices

In a communication system, which among the following convert messages into packets that can travel across the communication channel?

radio waves

Microwave communication uses high-frequency _______.

true

Modulation is the name of the process of converting from digital to analog.

_______ is the process of breaking down information sent or transmitted across the Internet into small parts.

Packetization

true

TCP/IP protocol involves identifying, sending, and receiving devices and breaking information into small parts for transmission across the Internet.

bandwidth

The capacity of a communication channel is measured in _______.

TCP/IP

The essential features of this include identifying, sending, and receiving devices and breaking information into small parts for transmission across the Internet.

mesh

This type of network topology does not use a specific physical layout

The three primary privacy issues are accuracy, property, and: a.) access b.) ethics c.) ownership d.) security

a.) Access

Match the words with the following definitions. phishing, encryption, plagiarism. information brokers, accuracy, spyware, zombies, malware, cookies, biometric a.) Privacy concern that relates to the responsibility to ensure correct data collection. b.) Individuals who collect and sell personal data. c.) Small data files deposited on your hard disk from websites you have visited. d.) Wide range of programs that secretly record and report an individual's activities on the internet. e.) Malicious programs that damage or disrupt a computer system. f.) Infected computers that can be remotely controlled. g.) Used by scammers to trick internet users with official-looking websites. h.) A type of scanning device such as fingerprint and iris (eye) scanner. i.) Process of coding information to make it unreadable except to those who have a key. j.) An ethical issue relating to using another person's work and ideas as your own without giving credit to the original source.

a.) Accuracy b.) Information brokers c.) Cookies d.) Spyware e.) Malware f.) Zombies g.) Phishing h.) Biometric i.) Encryption j.) Plagiarism

A short-range radio communication standard that transmits data over short distances of up to approximately 30 feet. a.) Bluetooth b.) broadband c.) DSL d.) TCP/IP

a.) Bluetooth

Match each term to the correct definition. node, TCP/IP, tree, microwave, protocols, intrusion detection system, peer-to-peer, analog, bus, network administrator a.) Type of network topology in which each device is connected to a common cable called a backbone. b.) A widely used Internet protocol. c.) Uses high-frequency radio waves. d.) Signals that are continuous electronic waves. e.) Rules for exchanging data between computers, f.) Any device that is connected to a network. g.) A computer specialist responsible for efficient network operations and implementation of new networks. h.) This network, also known as a hierarchical network, is often used to share corporate-wide data. i.) In this network, nodes have equal authority and can act as both clients and servers. j.) Work with firewalls to protect an organization's network.

a.) Bus b.) TCP/IP c.) Microwave d.) Analog e.) Protocols f.) Node g.) Network administrator h.) Tree i.) Peer-to-peer j.) Intrusion detection system

A high-frequency transmission cable that delivers television signals and connects computers in a network. a.) coaxial b.) hi def c.) 3-D d.) twisted pair

a.) Coaxial

The concept related to using computer networks to link people and resources. a.) connectivity b.) GPS c.) TCP/IP d.) Wi-Fi

a.) Connectivity

The use of the Internet, cell phones, or other devices to send or post content intended to hurt or embarrass another person is known as: a.) cyberbullying b.) online harassment c.) social media discrimination d.) unethical communication

a.) Cyberbullying

Browsers store the locations of sites visited in a: a.)history file b.) menu c.) tool bar d.) firewall

a.) History file

Typically using Wi-Fi technology, these wireless access points are available from public places such as coffee shops, libraries, bookstores, colleges, and universities. a.) hotspots b.) extranets c.) PANs d.) LANs

a.) Hotspots

Every computer on the Internet has a unique numeric address called a(n): a.) IP address b.) DNS c.) broadcast d.) packet

a.) IP address

Bus, ring, star, tree, and mesh are types of network: a.) topologies b.) protocols c.) strategies d.) devices

a.) Topologies

Programs that come into a computer system disguised as something else are called: a.) Trojan horses b.) viruses c.) web bugs d.) zombies

a.) Trojan horses

A byte is formed by a group of _____. Select one: a. 4 bits b. 8 bits c. 12 bits d. 16 bits.

b. 8 bits.

The bandwidth typically used for DSL, cable, and satellite connections to the Internet. a.) baseband b.) broadband c.) medium band d.) voiceband

b.) Broadband

Computer criminals who create and distribute malicious programs. a.) antispies b.) crackers c.) cyber traders d.) identity thieves

b.) Crackers

To prevent copyright violations, corporations often use: a.) ACT b.) DRM c.) VPN d.) WPA2

b.) DRM

Sometimes referred to as a LAN adapter, these expansion cards connect a computer to a network. a.) PCMCIA b.) NIC c.) server d.) VPN

b.) NIC

A device that allows one LAN to be linked to other LANs or to larger networks. a.) IDS b.) network gateway c.) PAN d.) switch

b.) Network gateway

Special hardware and software used to control access to a corporation's private network is known as a(n): a.) antivirus program b.) communication gate c.) firewall d.) spyware removal program

c.) Firewall

The information that people voluntarily post in social networking sites, blogs, and photo- and video-sharing sites is used to create their: a.) access approval b.) firewall c.) online identity d.) phish

c.) Online identity

The browser mode that ensures your browsing activity is not recorded. a.) detect b.) insert c.) privacy d.) sleep

c.) Privacy

Highly detailed and personalized descriptions of individuals are electronic: a.) cookies b.) histories c.) profiles d.) web bugs

c.) Profiles

In a computer network, this node that requests and uses resources available from other nodes

client

The speed with which a modem transmits data is called its: a.) digital velocity b.) dynamic rate c.) modular rating d.) transfer rate

d.) Transfer rate

Connection devices are the actual connecting or transmission medium that carries the message. a. true b.false

false

A type of mouse that emits and senses light to detect mouse movement.

optical

Combination keys perform a function when held down in combination with another key A. TRUE B. FALSE

true

Fiber-optic cable transmits data as pulses of light through tiny tubes of glass a. true b.false

true


Set pelajaran terkait

MAR 4613 Exam One: Quiz Questions

View Set

Chapter 7 Interest Rates And Bond Valuation

View Set