CIS 101 test 1
Which of the following devices uses application software different from those in desktop computers? Answers: a. Laptop b. Notebook c. Netbook d. Mobile phone
d
Sound recorder software is used to capture sound from a microphone and _____ is used to capture sound from a CD. a. burning software b. tracing software c. authoring software d. ripping software
d. ripping software
Trademarks are the standards of moral conduct that guide a business's policies, decisions, and actions. T/F
false
When something is drawn or placed on top of a bitmap image, the pixels in the image are resized, and whatever was beneath the new content lies there till it is deleted. t/f
false
A circuit board is a thin board containing computer chips and other electronic components. t/f
true
A flatbed scanner scans flat objects one page at a time. t/f
true
A magnetic tape is a storage media consisting of plastic tape coated with a magnetizable substance.t/f
true
A port in a system unit of a computer is either built into the motherboard or created with an expansion card inserted into an expansion slot on the motherboard. t/f
true
Embedded flash memory is usually the primary storage for mobile devices, such as tablet and smartphones. t/f
true
Media players are programs designed to play audio and video files streamed from the Internet. T/F
true
Microsoft created Windows 1.0, the original version of Windows, in an effort to meet the needs of users frustrated by having to learn and use Disk Operating System (DOS) commands.T/F
true
Randy, an entrepreneur, has designed a trademark for his new business. He has claimed his trademark but has not registered it with the U.S. Patent and Trademark Office (USPTO), and so he should use the mark TM. T/F
true
The images in the accompanying figure are all examples of presentation graphics. t/f
true
Typically, external devices such as monitors, keyboards, mice, and printers connect to the motherboard by plugging into a port. t/f
true
A _____ is a device made of semiconductor material that controls the flow of electrons inside a chip. Answers: a. register b. adapter c. transistor d. cache
C
A(n)_____ is an impact printer. Answers: a. ink-jet printer b. pico printer c. dot-matrix printer d. laser printer
C
Identify a true statement about an intellectual property. Answers: a. It uses the TM symbol for unregistered service marks. b. It withdraws the protection rights for a work after its creator's death. c. It includes original creative work such as movies and music. d. It provides copyrights only for published works.
C
A _____ is the smallest colorable area in an electronic image. a. file b. bit unit c. system unit d. pixel
D
All data processed by a computer must be in _____. Answers: a. unitary form b. hexadecimal form c. duodecimal form d. binary form
D
Determine the device that helps a mainframe serve thousands of users connected to it. Answers: a. A plotter b. A facsimile c. A punch card d. A thin client
D
A security specialist is responsible for securing the company computers and networks against _____. a. hackers b. staff members c. testers d. auditors
a
David wants to display a few photos from his mobile phone onto a small, rectangular piece of wood that is located at 5 feet away from the mobile phone. David should use a _____ to display the photos. a. pico projector b. drum scanner c. DVD drive d. dot matrix printer
a
T he core of a computer's operating system is called the _____. a. kernel b. boot sector c. node d. shell
a
Ted is a programmer. He uses a desktop to code applications. The means by which Ted interacts with any program on a computer is called the _____. a. user interface b. plug-in c. domain server d. bootstrap
a
The input device in the accompanying image is a _____. a. touch pad b. scanner c. stylus d. keypad
a
Which of the following is an example of hardware? a. A mouse b. A device driver c. A content management system d. A web desktop
a
Which of the following is the fourth step of the machine cycle of a computer? a. The data or results are stored in registers or RAM. b. The next instruction is fetched from cache or RAM. c. The instructions are carried out. d. The instructions are decoded into a form the arithmetic/logic unit or the floating point unit can understand.
a
Which of the following statements is true of servers? a. They are accessed by users connected through a network using a computer. b. They are known as microcomputers and do not host programs and data for a network. c. They cannot be accessed by a home network. d. They can serve only one person at a time to connect to a network.
a
_____ are display devices that can be touched to provide input to the computer associated with them. a. Touch screens b. Touch styluses c. Touch pads d. Touch mice
a
in his supermarket, Davis uses a device that scans a collection of lines of varying widths on products and automatically feeds the data of the products into a computer. The device used by Davis is a _____. a. barcode reader b. flash-drive reader c. flatbed scanner d. cloud scanner
a
Small programs called _____ are used to communicate with peripheral devices, such as monitors, printers, portable storage devices, and keyboards. a. drivers b. adapters c. spreadsheets d. applets
a. drivers
The amount of data actually transferred under real-life conditions is called _____. Answers: a. jitter b. throughput c. latency d. bandwidth
b
____ is a storage method that uses several hard drives working together. Answers: a. Smart card b. Redundant array of independent disks (RAID) c. Near Field Communications (NFC) disks d. Logical volume card
b
A _____ is a special connector accessible through the exterior of the system unit case that is used to connect an external hardware device. answers: a. processor b. motherboard c. port d. chip
c
A computer's _____ is the sequence of instructions the computer follows as it is starting up. a. RAM (random access memory) b. PLA (programmable logic array) c. BIOS (basic input/output system) d. ROM (read-only memory)
c
Casey is learning about the types of servers and more powerful computers available. She has asked her friend Burt, an expert on computers and its uses, to quiz her. Burt asks Casey what type of computer she will need to operate and maintain the network in her school's computer lab. Casey replies that it would be a _____. a. third-generation computer b. supercomputer c. minicomputer d. netbook
c
The progression of input, processing, output, and storage is known as the _____. Answers: a. output transmission cycle b. secure storage cycle c. information processing cycle d. input transfer cycle
c
Victor, an accounts manager at a firm, has drafted the financial report for the financial year. He needs to submit the hard copy of this report to his firm next week. Victor sent the report to his office printer for printing. While taking out the prints from the printer, his hands were stained by flakes of powdered ink from the toner. Identify the printer Victor used. Answers: a. Impact printer b. Thermal printer c. Laser printer d. Ink-jet printer
c
Victor, an accounts manager at a firm, has drafted the financial report for the financial year. He needs to submit the hard copy of this report to his firm next week. While printing the sheets using his printer, a piece of paper jammed the printer. When Victor tried pulling out the paper, his fingers got stained by a liquid used in the printer. Identify the printer Victor used. Answers: a. Thermal printer b. Laser printer c. Ink-jet printer d. Woodblock printer
c
Consider the figure given below. When you request a network activity—such as printing a document using a network printer—the application program first passes the job to the _____. Answers: a. desktop operating system b. embedded operating system c. server operating system d. network operating system
A
Desktop computers can be housed in a _____, which is a system unit designed to sit vertically on the floor. a. tower case b. floppy disk c. drive bay d. hub cove
A
Mac OS X is based on the _____. Selected Answer: a. UNIX operating system b. LiMaX operating system c. FORTRAN operating system d. Disk operating system
A
A _____ is used to synchronize all of a computer's operations. a. system clock b. RAM slot c. bus port d. ROM stick
A
Identify a device that is used to make send text messages, view Web pages and documents, take digital photos, play games, and access other tools. a. A mobile device b. A mnemonic device c. A biometric device d. A translation device
A
Identify the computer that generally runs one program at a time as fast as possible. Selected Answer: Incorrectb. A photonic computer Answers: Correcta. A supercomputer b. A photonic computer c. A quantum computer d. A mainframe computer
A
Steve, a senior architect, has to design a work environment for the people who work in the office, including properly adjusting furniture and hardware. Which of the following should Steve make use of to set up a safe and effective workspace? Answers: a. Ergonomics b. Macronomics c. Geonomics d. Hydrodynamics
A
Susie purchased a tablet computer. Which of the following devices should she use to work on her new computer? a. A digital pen b. An analog pen c. A primary key d. A secondary key
A
The accompanying figure shows a _____. a. solid-state drive b. magnetic drive c. USB chip d. floppy disk
A
Which of the following refers to a measurement of the number of instructions that a CPU can process per second? Selected Answer: answers: a. Clock speed b. RAM capacity c. Hard disk space d. Run time
A
_____ built into the Windows operating system can check a hard drive for errors and optimize it. a. Disk management utilities b. Security programs c. File management utilities d. Backup and recovery programs
A
_____ is a special group of very fast memory circuitry, usually built into the CPU, that is used to speed up processing. a. Cache memory b. Read-only memory c. Virtual memory d. Flash memory
A
Computer professionals who are responsible for designing computers to be used within their companies are the _____. Answers: a. business developers b. systems analysts c. technical support engineers d. software testers
B
Lee is a technical support executive in a product-based software company. On a day when Lee is working from home, he gets a call from a customer about an issue with an application. Lee takes the concerned system's IP address, username, and password and asks the customer to stay connected to the Internet. Which of the following software will help Lee to link to the customer's computer to solve the issue? Answers: a. Project management software b. Desktop publishing software c. Remote access software d. Note taking software
C
The computers found in DVD players, thermostats, answering machines, and some appliances are known as _____. Answers: a. fifth-generation computers b. supercomputers c. embedded computers d. mainframe computers
C
Mary has won a newly launched laptop computer in an event conducted by her school. She uses a pressure sensitive device that looks just like a pen to navigate the applications in her laptop. Identify the device Mary is using. a. A touch pad b. A tablet c. A projector d. A stylus
D
The buses in a computer that connect peripheral (typically input and output) devices to the motherboard are often called _____. Answers: a. power buses b. cache buses c. backside buses d. expansion buses
D
Slingbox is an example of _____. Answers: a. project management software b. desktop publishing software c. note-taking software d. remote access software
D
An email address consists of an IP address (a unique identifying name), followed by the @ symbol, followed by the domain name for the computer that will be handling that person's email. T/F
False
In multiprocessing, processors on a CPU usually work together to complete one job more quickly. T/F
False
Microsoft Access is a spreadsheet software. T/F
False
Evan needs to download and print an acknowledgement he has received for an online application form. After the download is completed, the computer gives an option to save and print the document. When Evan clicks the option, the file is placed in a buffer so that the printer can retrieve it. This process is called _____. a. spooling b. blocking c. threading d. slicing
a
Which of the following statements is true of storage systems? a. Magnetic media is less durable than optical discs. b. To minimize disk access time, magnetic hard drives usually store related data on different cylinders of a magnetic hard drive. c. Solid-state drives generate more heat than magnetic hard drives. d. The process of erasing data from a recordable or rewritable optical disc is
a
A computer _____ is the amount of data that a CPU can manipulate at one time. Answers: a. register b. word c. memory d. process
b
Case 2-1 Mary has won a newly launched laptop computer in an event conducted by her school. Mary taps a part of her laptop to perform the actions of a mouse. What is the part of the laptop called? a. A stylus b. A touch pad c. A tablet d. A game pad
b
Damon asks his friend Tanya to test his understanding on computer and business ethics. Tanyaasks Damon to provide a scenario that is an act of plagiarism. Which of the following scenarios can Damon provide? a. A philosopher referring to the information available on the Internet and using certain quotes in her research paper either indented or enclosed in quotation marks with the proper citations for each author b. A teacher sharing a poem with a class, leading the class to believe the poem was his original work c. A newspaper reporter paraphrasing a few sentences or paragraphs written by another author without changing the meaning of the text, including the revised text in an article, and crediting the original author with a proper citation d. A student copying and pasting information from various online documents and using those quotes in her research paper either indented or enclosed in quotation marks with the proper citations for each author
b
Daniel edits an image on his computer using a painting tool. He works on it by coloring the individual pixels in the image. The type of image created by Daniel is a(n) _____. Answers: a. analog image b. bitmap image c. vector image d. radial image
b
Identify the third step of the machine cycle of a computer. a. The data or results are stored in registers or RAM. b. The instructions are carried out. c. The next instruction is fetched from cache or RAM. d. The instructions are decoded.
b
Jane's computer operates on a disk operating system (DOS). Since the interface is difficult to use, she decides to install a new operating system that allows her to use icons and buttons to issue instructions to the computer. Which of the following types of interface should Jane choose? Answers: a. Command-line interface (CLI) b. Graphical user interface (GUI) c. Batch interface d. Text-based user interface
b
Mike creates a graph on his computer using a spreadsheet application. He uses the mouse as the peripheral device with the computer. Which of the following serves as an intermediary between application programs and the computer's hardware that allows Mike to complete his work? Answers: a. Hard drive b. Operating system c. Buffer d. Input device
b
The accompanying figure shows a _____. Answers: a. UNIX interface b. command line interface (CLI) c. graphical user interface (GUI) d. batch interface
b
The hardware shown in the accompanying image is a(n) _____. a. macro USB adapter b. mini expansion card c. mini expansion slot d. macro USB port
b
Which of the following best describes the World Wide Web? a. It refers to the physical structure of a network. b. It refers to one resource available through the Internet. c. It is a closed-source information center. d. It is a company that provides Internet access.
b
Which of the following is a difference between installed software and cloud software? a. Changes can be made to an installed software only when the device is offline, whereas changes can be made to a cloud software only when the device is online. b. Installed software must be installed on a device before it is run, whereas cloud software is run directly from the Internet. c. Offline edits made to an installed software cannot be stored in the computer, whereas offline edits made to a cloud software is stored in a network. d. Installed software is run directly from the Internet, whereas cloud software is preinstalled on the device.
b
_____ runs a computer and allows people to use the computer to perform specific tasks, such as creating letters, preparing budgets, managing inventory and customer databases. Answers: a. Expansion card b. Software c. Hardware d. Network interface card
b
A(n) _____ is high-speed memory built into the CPU that temporarily stores data during processing. Answers: a. interface card b. bus c. register d. expansion card
c
All computers require software to operate and perform basic tasks. System software is the software that controls a computer and allows you to use it. Systems software consists of the operating system and utility programs. Many operating systems have been in use since mainframe computers. Identify the facts on each operating system in the following questions. Joe is a professor at BuildTree University. During a lecture on computer software, he tells his students that AT&T Bell Laboratories developed an operating system in the late 1960s for midrange servers that could support a variety of devices from different manufacturers. Which of the following operating systems is Joe talking about? Answers: a. DOS b. Mac OS c. UNIX d. Linux
c
Keith is a beginner in programming and wants to develop an application that will be useful for home security. He finds a list of software readily available in the market and wishes to code an advanced program. He searches online for relevant programs that can be modified and shared with others legally and free of cost. Which of the following types of software should Keith look for on the Web? a. Proprietary software b. Cloud based software c. Public domain software d. Commercial software
c
Remote storage services accessed via the Internet are often referred to as _____. Answers: a. slot storage b. optical storage c. cloud storage d. flash storage
c
Schools or businesses that need to install software on a large number of computers can usually obtain a _____ for the number of users needed. a. business license b. computer license c. network license d. school license
c
Systems software consists of _____. Answers: a. only those programs that operate enterprise-class servers b. productivity programs such as Microsoft Office c. the operating system and utility programs that control a computer d. interface programs that allow users to interact with electronic devices
c
The hardware in the accompanying image is a(n) _____. Answers: a. stylus b. ultra bus card c. optical disc d. network connector
c
Which of the following is a disadvantage of cloud software? Answers: a. Edits stored locally on a computer when a user is offline cannot be synchronized with the documents stored on the cloud servers when online. b. Cloud software cannot be delivered on demand to a user in a location other than where it was installed. c. Cloud software and data cannot be accessed without Internet connection d. Documents created using cloud software are stored online but cannot be accessed via any Internet-enabled device.
c
Which of the following statements is true of virtual memory? a. It uses the whole of the hard drive as additional RAM. b. It lets programs run faster than when they use the RAM. c. It stores some of the program during program execution. d. It can store the information saved on it permanently.
c
A computer cannot function without a(n) _____. a. optical drive b. application suite c. pointing device d. operating system
d
Application software (apps) includes all the programs that allow you to perform specific tasks or applications on a computer. Individuals and businesses use software to write letters, keep track of finances, participate in videoconferences, watch videos, make business presentations, process orders, access Web-based resources, and many other tasks. In the following questions, identify the tasks of different application software. Drake is an entrepreneur and his business has a growing client base as well as a growing inventory. He needs to keep track of a good deal of information and be able to search for information quickly. Which of the following software should Drake use? a. Mastersheet software b. Note taking software c. Presentation software d. Database software
d
Application software (apps) includes all the programs that allow you to perform specific tasks or applications on a computer. Individuals and businesses use software to write letters, keep track of finances, participate in videoconferences, watch videos, make business presentations, process orders, access Web-based resources, and many other tasks. In the following questions, identify the tasks of different application software. Norah has a son who is in grade 2. She wants to host a small birthday party for him and his friends. Although she wants the invites to look attractive and professional, she does not want to spend money on a professional printer. Which of the following software can help Norah? Answers: a. YouSendIt b. Microsoft Works c. Zoho NoteBook d. Serif PagePlus
d
Application software (apps) includes all the programs that allow you to perform specific tasks or applications on a computer. Individuals and businesses use software to write letters, keep track of finances, participate in videoconferences, watch videos, make business presentations, process orders, access Web-based resources, and many other tasks. In the following questions, identify the tasks of different application software. Patrick needs a specialized program to track his personal expenses, manage stock portfolios, and prepare income taxes. For this purpose, Patrick should purchase _____. a. accounting software b. vector software c. database software d. personal finance software
d
Brianna has developed a new device to be used by people with physical disabilities. Brianna's device can be classified as _____. a. networking hardware b. cloud hardware c. flash-drive hardware d. assistive hardware
d
Encyclopedias, dictionaries, and atlases are examples of _____. a. infotainment software b. library software c. educational software d. reference software
d
Identify a true statement about supercomputers. Answers: a. They include smartphones and small tablet devices. b. They can function as either a notebook or a tablet computer because they have display screen that folds shut to resemble a tablet. c. They tend to be very small and are slow at processing. d. They are used for applications that require extraordinary speed, accuracy, and processing capabilities.
d
On a computer with two or more CPUs, _____ is a technique in which each processor or core works on a different job. a. looped hosting b. file hosting c. parallel processing d. multiprocessing
d
Ray, a computer professional, works from home using a tablet. He separates the display from the keyboard for his convenience. Which of the following types of tablet computers is Ray using? Answers: a. Notebook-tablet supercomputers b. Stand-alone notebook-tablet computers c. Notebook-tablet mainframe computers d. Hybrid notebook-tablet computers
d
The accompanying image shows a(n) _____ that is the hardware located in a system unit. a. memory slot b. read-only memory (ROM) c. drive bayd. expansion card
d
The hardware shown in the accompanying image is a(n) _____. a. USB port b. expansion card c. expansion slot d. USB adapter
d
A pincode is an optical code that represents data with bars of varying widths or heights. t/f
false
An IP address is a text-based Internet address. t/f
false
An email message can be sent from any device such as a desktop computer, portable computer, or smartphone, to anyone without an Internet connection. t/f
false
Digital cameras can only take still photos. T/F
false
E-grass includes electronic trash, such as discarded computer components. t/f
false
Mobile devices are powered by a rechargeable battery and include wireless connectivity to enable the device to connect to the Internet.T/F
false
Self-driving cars contain a large number of mainframe computers which enable the car to safely operate without a driver. t/f
false
The physical parts of a computer are called software. t/f
false
The processing operation occurs any time the data, a change to a program, or the output is saved for future use. t/f
false
The random access memory (RAM) inside a computer delivers electricity to the computer via a power cord. t/f
false
When the amount of random access memory (RAM) required exceeds the amount of RAM available in a system, the operating system moves portions of data or programs from RAM to an external hard drive. t/f
false
Pages of programs or data are copied from random access memory (RAM) to the virtual memory area of the hard drive. T/F
true
Pico projectors typically create a display up to about 10 feet wide in order to easily share information stored on the device without everyone having to crowd around a tiny screen. T/F
true
Portable computers contain rechargeable battery packs that can be charged via a power outlet. t/f
true
Shareware is a software program that is given away by the author for others to use free of charge but typically require a small fee if the users choose to use the program regularly. t/f
true
Storage medium refers to the hardware where data is actually stored. T/F
true
To request a Web page located on the Internet, its Internet address—a unique numeric or text-based address—is used. t/f
true
When data is processed into a meaningful form, it becomes information. T/F
true
Windows Embedded is designed for consumer devices. t/f
true
In the 1980s, _____ was the dominant operating system for personal computers. Answers: a. Mac operating system b. UNIX operating system c. Windows operating system d. Disk operating system
D
Which of the following statements is true of a bit? Answers: a. Eight bytes grouped together are collectively referred to as a bit. b. A named collection of files that is stored on computer hardware is known as a bit. c. A bit is also known as a file. d. A bit by itself typically represents only a fraction of a piece of data.
D
Which of the following tasks is performed during backup? Selected Answer: Answers: a. Transferring all files in a computer to a remote server b. Rolling back a system to retrieve files as saved on a previous date c. Deleting files that are not duplicated d. Making a duplicate copy of only certain selected files
D
_____ bits grouped together are collectively referred to as a byte. Answers: a. Twelve b. Nine c. Six d. Eight
D
Which of the following is considered an intellectual property? Answers: a. A plagiarized content b. A patent c. An auction d. An ethic
B
All computers require software to operate and perform basic tasks. System software is the software that controls a computer and allows you to use it. Systems software consists of the operating system and utility programs. Many operating systems have been in use since mainframe computers. Identify the facts on each operating system in the following questions. Joe is using the Command Prompt window to perform some tasks on his computer. Joe is most likely using remnants of the _____. Answers: a. UNIX operating system b. Android operating system c. Haiku operating system d. Symbian operating system
A
Billy, who is studying Java, wants to learn how to build a mobile application and decides to research online. He finds a code and modifies it. He needs an open platform so that he can download the application on his device and use it for testing. Which of the following mobile operating systems should Billy choose? Answers: a. Android b. iPhone OS c. BlackBerry OS d. HPwebOS
A
Casey is learning about the types of servers and more powerful computers available. She has asked her friend Burt, an expert on computers and its uses, to quiz her. Burt describes an incredibly expensive computer designed to focus all of its computing power on one specific task at a time that can handle applications requiring speed, accuracy, and processing capabilities. Casey identifies the type of computer to be a(n) _____. Answers: a. supercomputer b. enterprise-class computer c. mainframe computer d. wireframe computer
A
Charlie uses his personal computer to play games, do his school projects using Microsoft Word, and download information from the Internet. The type of operating system used in Charlie's computer is typically referred to as a(n) _____. answers: a. desktop operating system b. batch operating system c. network operating system d. embedded operating system
A
Kevin has designed a computer that can fit on or next to a piece of furniture so that it can be used by people at home or office. Conventional personal computers that are designed to fit on or next to a piece of furniture are often referred to as _____. Answers: a. desktop computers b. supercomputers c. mainframe computers d. server computers
A
Many mobile devices can perform Internet searches and other tasks via _____. a. voice commands b. command prompts c. diagnostic signals d. thought transference
A
Randy sets up a home server that will allow him to securely access his stored content remotely via the Internet. Here, Randy has created a _____. a. personal cloud b. cloud agent c. cloud gate d. logical cloud
A
Steve, a graphics designer, uses a dual core system for work. He uses different types of photo editing software that have slowed down the processing speed of his computer. He believes rearranging data on the hard drive will help the computer work faster. Which of the following processes can help improve the computer's efficiency? a. Optimization b. Emulation c. Segmentation d. Virtualization
A
The accompanying figure shows a(n) _____. Answers: a. external optical drive b. USB disc c. flash memory card d. external stylus
A
The term _____ refers to the use of computers in an environmentally friendly manner. a. green computing b. scene computing c. bio computing d. organic computing
A
What is the value of 32 bits grouped together? a. 4 bytes b. 16 bytes c. 32 bytes d. 2 bytes
A
Which of the following is a difference between bitmap images and vector images? a. Bitmap images cannot be enlarged and still maintain their quality, whereas vector images can be resized and otherwise manipulated without loss of quality. b. Bitmap images are usually named with the extension .XLSX, whereas vector images are named with the extension .VNP. c. Bitmap images use mathematical formulas to represent image content, whereas vector images are created by coloring pixels. d. Bitmap images are programmed in terms of numbers, whereas vector images are programmed in terms of characters.
A
Bill is a trainer at a data entry company in Brampton, Canada. He is asked to train physically and visually challenged individuals to perform necessary job tasks and to communicate with others. Which of the following technologies should Bill use to assist them? Selected Answer: Answers: a. Nanotechnology b. Braille technology c. La crosse technology d. Quantum technology
B
James shares the link of his Google Doc with his friend over e-mail. Here, James is using _____ to share information. Answers: a. flash computing b. cloud computing c. pixel computing d. stylus computing
B
The _____ allows the core of a computer to communicate with other CPU components, such as the memory controller and other cores. Answers: a. decode unit b. bus interface unit c. prefetch unit d. control unit
B
Which of the following statements is considered a benefit of a computer-oriented society? Selected Answer: Answers: a. It increases the need of people and reduces unemployment in society. b. The capability to virtually design, build, and test new buildings before the actual construction begins helps professionals create safer products. c. As more and more data about our everyday activities is collected and stored on computers accessible via the Internet, our privacy is never at risk. d. There is no potential risk to personal privacy, which is one of the most important societal advantages.
B
Which of the following statements is true of storage systems? answers: a. In a magnetic hard drive, a cylinder is smaller in size than a sector. b. Smart cards can store biometric data in the card. c. Optical discs are less durable than magnetic media. d. Cloud storage is also known as USB-drive storage.
B
Which of the following statements is true of supercomputers? Selected Answer: Answers: a. They are setup in simulated environments on a single server. b. They have enormous processing power. c. They can process multiple applications simultaneously. d. They do not facilitate faster research breakthrough
B
identify a true statement about RAM (random access memory). . Answers: a. Having less RAM allows more applications to run at one time in a computer. b. Data in RAM is erased when the computer is shut off. c. It is nonvolatile. d. It is also known as ROM (Read Only Memory).
B
Identify an accurate statement about embedded computers. a. They are used for large-scale computing purposes. b. They are used in various fields such as weather forecasting and quantum mechanics. c. They cannot be used as general-purpose computers. d. They cannot be used in a car's navigational or entertainme
C
Roger, an entrepreneur of a software industry, decides to use a system that will run the programs needed to meet the different needs of a wide variety of users during business hours. This system also performs large processing tasks, such as payroll and billing. Which of the following systems should Roger use? Answers: a. Stand-alone computers b. Remote desktop systems c. Mainframe computers d. Optical mark recognition systems
C
The Apple watch is an example of a _____. Answers: a. wireframe device b. mainframe computer c. mobile device d. supercomputer
C
The part of a CPU core that translates instructions into a form that can be processed by the arithmetic/logic unit (ALU) and floating point unit (FPU) is called the _____. Selected Answer; a. Universal Serial Bus b. expansion bus c. decode unit d. prefetch unit
C
File management programs can also be used to _____. Answers: a. duplicate a file so it can be restored at a later date b. monitor a file on a computer and block suspicious activity c. recover deleted files from the recycle bin d. search for stored files that meet specified criteria
D
Identify the difference between data and information from the following options. Answers: a. Data is the outcome derived after processing information, while information is only the input given to a system. b. Data is easily understood, while information is difficult to understand. c. Data is generated to answer a question, while information is a raw fact. d. Data is an unorganized set of facts, while information is processed data.
D
If a problem occurs—such as if a program stops functioning or too many programs are open for the amount of memory installed—an operating system notifies the user and tries to correct the problem by _____. a. deleting all the functions from the offending program b. allowing only the offending program to run and stopping the other running programs c. minimizing the screen in which the offending program runs d. closing the offending program
D
In the accompanying figure, box _____ points to the command to change to a new drive. Answers: a. A b. C c. D d. B
D
Integrated circuits incorporate many _____ on a single tiny silicon chip, making computers smaller and more reliable. Answers: a. batch files and algorithmic circuits b. metafiles and mnemonic circuits c. arrays and bitmap circuits d. transistors and electronic circuits
D
Matthew's computer uses the Windows operating system. He decides to switch to the Linux operating system as the software available for Linux cost relatively lesser than those for Windows. Identify a strong reason for Matthew to switch from Windows to Linux operating system. Answers: a. All Windows-based programs will run in Linux. b. Operations of Linux are different from those of the Windows operating system. c. Linux provides a large selection of peripheral hardware drivers. d. Linux allows customization of the user interface and control of computers.
D
One trend involving servers, as well as mainframe computers, is _____ that is the creation of practical versions of a computing resource. a. optimization b. fragmentation c. virtualization d. normalization
D
Rita, a computer science student, studies about servers with her friend. They learn about a trend that stores each user's desktop environment on a server and delivers it to each individual via any authorized device. Which of the following trends is discussed in this scenario? Answers: a. Desktop generalization b. Desktop authorization c. Desktop normalization d. Desktop virtualization
D
Roger, a budding author, completes a manuscript and sends it to various publishers. He copyrights his work so that it will not be copied by others. For how long will the copyright cover Roger's work? Selected Answer: Answers: a. 85 years b. 75 years c. 80 years d. 70 years
D
Samuel downloads a program that is free of charge from the Internet, which he cannot share with others for evaluation purposes. After using the program for 30 days, he gets a notification asking him to pay a small fee to continue using the program. Samuel has downloaded a _____. Answers: a. malware program b. grayware program c. freeware program d. shareware progra
D
Thomas asked his friend for a software suite. His friend had the software suite in his computer and he copied it into a small, rectangular storage medium and gave it to Thomas. Identify the storage medium in which Thomas's friend copied the software suite. Answers: a. Random access memory b. Read only memory c. Optical disk d. Flash memory card
D
Which of the following is the second step of the machine cycle of a computer? answers: a. The instructions are carried out. b. The next instruction is fetched from cache or RAM. c. The data or results are stored in registers or RAM. d. The instructions are decoded.
D
Which of the following leads to new software licensing issues? Answers: a. Freeware program b. Public domain software c. Remote server access d. Cloud computing
D
_____ includes any software that is developed and sold for a profit. Answers: a. A freeware program b. Public domain software c. An industry-wide program d. Commercial software
D
_____, the largest and most well-known computer network in the world, is a network of networks because it consists of a vast collection of networks that can access each other. Answers: a. The World Wide Web b. An intranet c. An extranet d. The Internet
D
ll computers require software to operate and perform basic tasks. System software is the software that controls a computer and allows you to use it. Systems software consists of the operating system and utility programs. Many operating systems have been in use since mainframe computers. Identify the facts on each operating system in the following questions. Joe, a professor, tells his students about an operating system that does not utilize a graphical user interface and does not support modern processors and processing techniques. Which of the following operating systems is Joe talking about? Answers: a. Linux b. UNIX c. Mac OS d. DOS
D
n the accompanying image, the hardware that box "A" is pointing to is a type of _____. Answers: a. random access memory (RAM) b. network port c. power supply d. USB flash drive
D
Kevin edits a digital photograph. If Kevin uses an image editing program for this purpose, the program will use the arithmetic/logic unit, with help from the _____ when needed, using only arithmetic and logical operations. Answers: a. decode unit b. prefetch unit c. floating point unit d. bus interface unit
c
Which of the following statements is true of a home network? Answers: a. It can be used to control missile guidance systems and satellites. b. It permits home computers to work with a peak speed of 27,000 trillion calculations per second. c. It allows home computers to share a single printer and Internet connection. d. It requires home computers to be located in climate-controlled data centers.
c
A _____ is an input device that reads an individual's fingerprint or voice. Selected Answer: a. barcode reader b. biometric reader c. RFID reader d. card reader
b
Presentation graphics programs can be used to generate Web pages or Web page content. T/F
True
Salma wants to buy a smartphone. She does not have any knowledge about the specifications and types of phones available in the market as this is her first smartphone. The types of operating systems that Salma can choose from are Windows 8, Android, and iOS. T/F
True
Smart cards can store personal identification data or funds. T/F
True
Which of the following is true of an embedded computer? Answers: a. It is a supercomputer embedded into a product designed to perform specific tasks or functions for that product. b. It is a mainframe computer embedded into a product designed to perform specific tasks or functions for that product. c. It is a tiny computer embedded into a product designed to perform specific tasks or functions for that product. d. It is a personal computer embedded into a product designed to perform specific tasks or functions for that product.
C
Which of the following refers to the versatile bus architecture widely used for connecting peripheral devices? Answers: a. Random Access Memory Bus b. Register Bus c. Universal Serial Bus d. Cache Memory Bus
C
Which of the following statements is true of Internet Protocol version 6 (IPv6)? answers: a. It was designed for use with third-generation computers. b. It performs IP fragmentation. c. It allows 2128 unique addresses for all devices connecting to the Internet. d. It has four parts that are separated by periods.
C
Which of the following was introduced by the U.S. Environmental Protection Agency (EPA) as a voluntary labeling program designed to identify and promote power-efficient products in an effort to reduce greenhouse gas emissions? Answers: a. Power Commando b. VOLUNTEER PLANT c. ENERGY STAR d. Gas Quantum Vessel
C
identify a true statement about mainframe computers. Selected Answer: Answers: a. Mainframe computers are dedicated to serve only a single user connected via a dumb terminal. b. Mainframe computers are dedicated to serve only a single user connected via a personal computer. c. Mainframe computers are typically located in climate-controlled data centers. d. Mainframe computers are typically located within a tower case of a desktop computer.
C
A computer's operating system is loaded into memory during the eviction process. T/F
False
A keyboard is an input device used to move the on-screen pointer to enable the user to select and manipulate objects. T/F
False
The operating system is loaded into memory during the _____. a. boot process b. swap process c. eviction process d. sole process
a
Bruce, a freelance Web designer, has signed a contract to design a Web site for Glenvalley Corporation. He has been told that the Web site will only provide company specifics, the products they develop, the company founders, and the contact details; and no financial transactions would happen on the Web site. Which of the following email addresses should Bruce use to update in the "Contact Us" tab of the Web page? a. [email protected] b. abruce.glenvalleycorporation@com c. abruce@glenvalleycorporation@com d. abruce. glenvalleycorporation.com
Bruce, a freelance Web designer, has signed a contract to design a Web site for Glenvalley Corporation. He has been told that the Web site will only provide company specifics, the products they develop, the company founders, and the contact details; and no financial transactions would happen on the Web site. According to the specifications provided by the organization, which of the following Web page protocols should Bruce make use of to develop the Web site? a. Secure sockets layer (ssl://) b. Hypertext Transfer Protocol (http://) c. File Transfer Protocol (ftp://) d. Transmission Control Protocol (tcp://)
b
Damon asks his friend Tanya to test his understanding on computer and business ethics. Tanya provides a scenario to Damon where a student copies and pastes information from various online documents to create a research paper, without crediting the original authors. The paper is only for school use and will not be shared or sold outside of school. Damon replies saying that this is an act of _____. a. felony b. plagiarism c. inchoateness d. solicitation
b
Application software (apps) includes all the programs that allow you to perform specific tasks or applications on a computer. Individuals and businesses use software to write letters, keep track of finances, participate in videoconferences, watch videos, make business presentations, process orders, access Web-based resources, and many other tasks. In the following questions, identify the tasks of different application software. Michelle wants an application program that can use formulas to perform calculations and organize numbers and values into rows and columns. Identify the application program that Michelle should choose. a. Note taking software b. Presentation software c. Word processing program d. Spreadsheet program
d
Mobile devices are powered by a rechargeable battery and include wireless connectivity to enable the device to connect to the Internet. T/F
true