Comp. Sci. Test 1
Why is a fragmented disk slower than one that is defragmented? a. A fragmented disk has many files stored in noncontiguous sectors. b.A fragmented disk contains temporary Internet files and unused program files that need to be deleted. c. A fragmented disk contains programs that were deleted using Windows Explorer. d. A fragmented disk has no index.
a. A fragmented disk has many files stored in noncontiguous sectors.
Which of the following networks had these two goals: a) allowing scientists to work together on scientific projects; and, b) functioning even if part of the network was destroyed by a nuclear attack? a. ARPANET b. W3C c. NSFnet d. IBMNet
a. ARPANET
When data in a spreadsheet program is changed, what occurs? a. All calculations can be recalculated. b. A new version of the spreadsheet is saved automatically so that both the old version and the new version are available. c. The worksheet is reorganized using preconfigured algorithms to conform to the formatting and hierarchical requirements of the spreadsheet program. d. Nothing; once entered, the data cannot be changed.
a. All calculations can be recalculated.
Green computing involves reducing electricity consumed and environmental waste generated when using a computer. Which of the following is a valid strategy for supporting green computing? a. Buy a computer from a retailer who will dispose of your old computer properly b. Buy battery-operated computers only c. Dispose of replaced computers by selling them on a website d. Replace a computer as soon as a newer, more efficient model is available
a. Buy a computer from a retailer who will dispose of your old computer properly
When a person buys something from an app store, the cost of the item is charged to a credit card whose number often is known by the app store. On what type of device is the credit card number kept by the app store? a. Storage b. Communications c. Input d. Memory
a. Storage
An organization to which you belong is joining the W3C. What is the mission of the work you will undertake as a member? a. To ensure the continued growth of the web b. To devise technology for connecting to the Internet c. To expand mobile broadband access d. To promote Internet2 ventures
a. To ensure the continued growth of the web
If your cousin asks you what devices can be used to record and retrieve data, instructions, and/or information for future use on a computer, which of the following would you tell her? a. USB flash drives, SSDs, hard disks b. Hard disks, memory cards, memory c. Memory, Blu-ray Disc drives, USB flash drives d. Scanners, DVD drives, memory cards
a. USB flash drives, SSDs, hard disks
Most computers and many mobile devices, such as smartphones and portable media players, can connect to which kind of network? a. Wi-Fi b. cellular radio c. Bluetooth d. all of the above
a. Wi-Fi
Which of the following terms is used to describe a program that hides in a computer and allows someone from a remote location to take full control of the computer? a. a rootkit b. a worm c. a virus d. a Trojan horse
a. a rootkit
Which of the following terms is used to describe a program that copies itself repeatedly, using up resources and possibly shutting down the computer or network? a. a worm b. a virus c. a Trojan horse d. a rootkit
a. a worm
Your organization has a large number of servers. Which of the following are you most likely to choose as a result? a. blade server b. rack server c. bay server d. tower server
a. blade server
You do not want to store your data locally on your hard disk. You would rather store it using an Internet service. What is this kind of storage known as? a. cloud storage b. distributed storage c. integrated storage d. VoIP
a. cloud storage
What term is used to illustrate the gap between those with and those without access to technology? a. digital divide b. mobile stratification c. technology caste system d. none of the above
a. digital divide
What is the technology featured in the trend known as the Internet of Things? a. embedded computers b. virtual computing c. SSDs d. Flash drives
a. embedded computers
Which of the following kinds of file utilities shrink the size of a file(s)? a. file compression b. unit c. conversion d. matrix
a. file compression
What type of software can your parents use to create a will without visiting an attorney? a. legal software b. accounting/tax preparation software c. court-documented software d. attorney supernumerary software
a. legal software
Which type of software has no restrictions from the copyright holder regarding modifications of the software's internal instructions and its redistribution? a. open source software b. shareware c. system software d. custom software
a. open source software
Which of the following identify the five steps in web publishing? a. plan the website; design the website; create the website; host the website; maintain the website b. plan the website; design the website; create and deploy the website; update the website; create usage analytics for further website enhancements c. plan, analyze, and design the website; plan and purchase servers and server software; create and deploy the website; test the website for both commercial and consumer use; modify the website based on analytics developed through the website use d. load plug-ins; deploy the website; maintain the website; update the website; upgrade the web server
a. plan the website; design the website; create the website; host the website; maintain the website
In the event a backup file is used, which kind of program reverses the process and returns backed up files to their original form? a. restore b. backup c. reversal d. return
a. restore
You want to make it possible for your smartphone to share its Internet access wirelessly with your friend's device. Which of the following will you use? a. tethering b. VoIP c. attaching d. baseband
a. tethering
When a word processing program user formats a document, what does the user change? a. the document's appearance b. the document's clipboard c. the document's content d. the document's reliability
a. the document's appearance
Antivirus programs look for a specific pattern of virus code. What is this pattern called? a. virus signature b. virus identifier c. virus index d. virus map
a. virus signature
What is the purpose of an Internet Protocol address (IP address)? a.It uniquely identifies the location of each computer or device connected to the Internet. b.It differentiates between a server computer and a client computer and contains codes to identify whether the computer can send data or receive data. c. It specifies whether a computer is using a broadband network or a direct-dial network. d. It contains the protocol schema used to identify whether the computer is on a wired or wireless network.
a.It uniquely identifies the location of each computer or device connected to the Internet.
You are inside a sports arena with your friend. Both of you have Wi-Fi devices. For the devices to communicate with each other, what is the maximum distance they can be apart in this closed space? a. 50 feet b. 100 feet c. 250 feet d. 500 feet
b. 100 feet
Word processing software, spreadsheet software, database software, and presentation software are examples of what category of computer software? a. Hardware coordination software b. Application software c. World Wide Web personal use and productivity software d. System software
b. Application software
If a computer adds together a list of numbers, what term identifies these numbers? a. Software b. Data c. Instructions d. Information
b. Data
Which of the following is a real-time Internet communications service that notifies users when one or more people are online and then allows them to exchange messages or files or join a private chat room? a. Communispace b. IM c. Chattalk d. Wikispace
b. IM
Which of the following is not one of the reasons that a mobile device can be categorized as a computer? a. It can process data according to specified rules. b. It can accept output. c. It can store information for future use. d.It operates under the control of instructions stored in its own memory.
b. It can accept output.
The Internet is a worldwide network. What is the World Wide Web? a.It is an exclusive network of computers separate from the Internet that allows functions such as social sites, resource sharing, blogs, and research. b. It is a service on the Internet. c. It is a feature that allows e-mail between computers connected to the Internet. d. It is the same as the Internet.
b. It is a service on the Internet.
Which of the following do you need to verify that you are the holder of the bank card at your local bank branch? a. transaction ID b. PIN c. skimmer d. account code
b. PIN
If someone feels distressed when deprived of computers and mobile devices, that person is said to suffer from what condition? a. Technological interference b. Technology overload c. Technological neurosis d. Technology use syndrome
b. Technology overload
What is product activation? a.the process of entering registration information so that users of the software will receive newsletters and other marketing materials regarding purchased software b. a technique to ensure software is not installed on more computers than legally licensed c. a term used to describe starting application software purchased in a retail store d. the method used by some software companies to guarantee that software purchased on the web will work on the computer on which the software was downloaded
b. a technique to ensure software is not installed on more computers than legally licensed
What is the term for characters, such as :) or :( , used to express emotion in an email message or newsgroup article? a. FAQs b. emoticons c. spam d. flames
b. emoticons
Which of the following is a category of users? a. telemetry users b. enterprise users c. communications users d. tower users
b. enterprise users
Which of the following are valid TLDs? a. mil, com, ipv b. gov, org, net c. www, edu, com d. com, net, bmk
b. gov, org, net
Which of the following are criteria for evaluating a website's content? a. content aggregation and authority b. objectivity and currency c. commerciality and audience d. affiliation and consumer consensus
b. objectivity and currency
A type of computer usually has only one user. Which of the following is most likely to be the type of computer? a. supercomputer b. personal computer c. server d. SSD
b. personal computer
During the infection stage, what three actions does a computer virus typically perform? a. attach to email, unleash its payload, delete antivirus files b. replicate itself, conceal itself, activate when a condition or event occurs c. conceal itself, replicate itself, release its payload d. infect the system, deliver its payload, multiply
b. replicate itself, conceal itself, activate when a condition or event occurs
Collections, such as that pictured in the accompanying figure, allow computers to share which of the following? a. systems b. resources c. links d. media
b. resources
What is the software that finds websites, webpages, images, and other information called? a. subject query b. search engine c. subject directory d. search application
b. search engine
A type of computer usually has thousands of users. Which of the following is most likely to be the type of computer? a. personal computer b. supercomputer c. game console d. mobile computer
b. supercomputer
You have a new word processing program. Which of the following is least likely to be a feature in the program's spelling checker? a.the capability to check the spelling of a specific document section b. the capability to check the arithmetic in a table of calculations c. the capability to check for a misuse of homophones d. the capability to check for contextual spelling errors
b. the capability to check the arithmetic in a table of calculations
Which of the following is the process of transferring files from a computer to a server on the Internet? a. downloading b. uploading c. flowing d. streaming
b. uploading
You want to connect your mobile device to a speaker. Which of the following is a way to do so? a. using VoIP b. via a port c. with digital integration d. via social media
b. via a port
If someone you know is purchasing word processing software, what features can she expect to find in the software? a. mail merge, wrapcheck, thesaurus b. wordwrap, spell checker, clip art c. columns, templates, autowrite d. search and replace, word adjust, collaboration
b. wordwrap, spell checker, clip art
You have a camera with a 16 MP resolution. How many pixels are represented by that resolution? a. 16 b. 16,000 c. 16 million d. 16 billion
c. 16 million
If you are looking to use a Bluetooth device and do not want to extend its range with additional equipment, which of the following is the approximate distance you can expect between your device and the device with which it is transmitting data? a. 3 feet b. 13 feet c. 33 feet d. 44 feet
c. 33 feet
What is the goal of Internet2? a.Ensure telemedicine, digital libraries, high-definition video, and Internet fraud detection all can be available over the Internet. b. It is the same as Internet; it has no particular goal. c. Develop and test advanced Internet technologies. d. Replace Internet1.
c. Develop and test advanced Internet technologies
Which of the following is true of VoIP? a. It uses a slow speed dial-up connection. b. It uses the public switched telephone network. c. Skype is an example of VoIP software. d. All of the above.
c. Skype is an example of VoIP software.
If a tablet has no keyboard, how do you type on it? a. You use a keyboard application. b. You activate a wired keyboard. c. You use an on-screen keyboard. d. You use a server to communicate with the tablet.
c. You use an on-screen keyboard.
What is the World Wide Web? a. a database of every document stored on computers worldwide b. the wiring and cabling used to connect computers on the Internet c. a worldwide collection of electronic documents d. a set of electronic documents diagramming and charting all the worldwide Internet connections
c. a worldwide collection of electronic documents
A DNS server is able to identify which of the following? a. the browser being used by a mobile device b. every computer or device connected to the Internet c. an IP address based on a domain name d. the TLD for a given company
c. an IP address based on a domain name
Your data center is looking to conserve space in its server room. Which of the following are you most likely to choose as a result? a. tower server b. bay server c. blade server d. indexed server
c. blade server
As shown in the accompanying figure, which of the following is a real-time typed conversation that takes place on a computer? a. confab b. quick talk c. chat d. VoIP
c. chat
You are storing a new worksheet online for members of your project team to be able to share access to it. What kind of computing is this an example of? a. digital b. liberated c. cloud d. disperse
c. cloud
Which of the following types of software do engineers, architects and scientists use to create designs? a. augmented design software (ADS) b. design and development software (DAD) c. computer-aided design software (CAD) d. computer-based engineering design software (CED)
c. computer-aided design software (CAD)
Your smartphone allows you to take and store photos, and play and view your digital media. What is this overlap of technologies called? a. digital assimilation b. online integration c. convergence d. digibridge
c. convergence
Which of the following items in your pocket uses NFC technology? a. coin purse b. postage stamp c. credit card d. wallet
c. credit card
Which of the following tools searches for and removes unnecessary files? a. uninstaller b. file manager c. disk cleanup d. disk defragmenter
c. disk cleanup
How often should you change your password? a. every other day b. every week c. every three months d. never
c. every three months
Which of the following is a typical size for a game console? a. one-half pound b. one pound c. four pounds d. 15 pounds
c. four pounds
Which of the following is an example of information on a grade report? a. term b. name c. grade point average d. address
c. grade point average
Which of the following is a utility that allows users to display, copy, and print the contents of a graphics file? a. graphics manager b. JPEG utility c. image viewer d. PNG player
c. image viewer
A friend of yours was talking on a mobile phone and her attention was diverted from something that was happening around her while she was on the phone. What phenomenon does this illustrate? a. failure to integrate b. distracted vision c. inattentional blindness d. visual inactivity
c. inattentional blindness
For which of the following to work must both parties be online at the same time, and the receiver of a message be willing to accept messages? a. email b. FTP c. instant messaging d. all of the above
c. instant messaging
Which of the following category of users works on a computer while away from a main office, home office, or school? a. SOHO b. key c. mobile d. power
c. mobile
When you purchase a digital camera, what type of software often is included with the purchase? a. paint editing software b. clip art management software c. photo editing software d. reference software
c. photo editing software
A host in a network performs which of the following tasks? a. ensures satellite communications are functional b. exclusively monitors wireless networks to search for data transmission errors c. provides services and connections to other computers on the network d.routes transmissions over a network to guarantee data reaches its intended destination
c. provides services and connections to other computers on the network
Your new calendar application allows you to make sure that your mobile device and your corporation's server both have the latest version of any updated information. What is the term for this capability? a. reconciliation b. concatenation c. synchronization d. adjoinment
c. synchronization
According to netiquette, Internet users should assume which of the following? a. all material is accurate b. all material is up-to-date c. the use of all capital letters is the equivalent of shouting d. all of the above
c. the use of all capital letters is the equivalent of shouting
Which of the following is your library using because it costs less, is easier to maintain, and uses less power than desktop computers? a. mainframe b. tablet c. thin client d. ultrabook
c. thin client
Which of the following are you most likely to find on your next trip to an amusement park? a. cloud kiosk b. virtual kiosk c. ticket kiosk d. financial kiosk
c. ticket kiosk
Which of the following is a utility that removes a program, as well as any associated entries in the system files? a. antiapp utility b. application purger c. uninstaller d. application remover
c. uninstaller
At your local supermarket there is a kiosk that allows you to rent your favorite movie on DVD. Of which of the following is this an example? a. film kiosk b. media kiosk c. vending kiosk d. photo kiosk
c. vending kiosk
Which of the following identifies broadband Internet connections? a. IP, Wi-Fi, FTTP b. FTP, OSP, IP c. OSP, cellular radio network, FTP d. DSL, Wi-Fi, fixed wireless
d. DSL, Wi-Fi, fixed wireless
You want to download a video from the Internet to your desktop. What process do you use? a. VoIP b. Wireless accessing c. Surfing d. Downloading
d. Downloading
If you are looking for an online social network that allows you to share messages and interests with family and friends, which of the following is the best match for you? a. LinkedIn b. Digg c. Twitter d. Facebook
d. Facebook
Which of the following is not true of the thin client on your desk at your office? a. It looks like a desktop computer. b. It does not contain a hard disk. c. It accesses data via the Internet. d. It has extensive capabilities.
d. It has extensive capabilities.
If you are looking for an online social network that allows you to include recommendations from people who know you professionally, which of the following is the best match for you? a. Digg b. Twitter c. Facebook d. LinkedIn
d. LinkedIn
Windows, Mac OS, and which other operating system constitute three desktop operating systems? a. DOS b. Amazon c. Internet Explorer d. Linux
d. Linux
What kind of file does Adobe Reader allow you to view? a. FFT b. PDT c. DOC d. PDF
d. PDF
Which of the following is NOT a suggestion for easing eyestrain while using a mobile device? a. Blink your eyes every five seconds. b. Take an eye break every 30 minutes. c. Clean the screen regularly. d. Position the display about 90 degrees below eye level.
d. Position the display about 90 degrees below eye level.
If you are looking for an online social network that allows you to stay current with the daily activities of those you are following, which of the following is the best match for you? a. Digg b. LinkedIn c. Facebook d. Twitter
d. Twitter
Which of the following defines FTP sites at which anyone can transfer some, if not all, available files? a. identified b. signed c. named d. anonymous
d. anonymous
Which of the following would allow you to capture a series of images with your camera in rapid succession? a. quick mode b. shooting mode c. rapid mode d. burst mode
d. burst mode
Your manager has asked you to shift usage and consumption of technology resources from a local environment managed by in-house IT staff to the Internet. What kind of computing will allow you to accomplish her goal? a. disperse b. digital c. liberated d. cloud
d. cloud
In Internet terminology, what is the term, google.com, called? a. Internet service provider b. webpage protocol c. TLD d. domain name
d. domain name
Your new home has a vacuum system. What kind of computer is controlling it? a. virtual computer b. integrated computer c. appliance computer d. embedded computer
d. embedded computer
You go to your local town utility in order to pay your gas bill. Which of the following are you most likely to use? a. utility kiosk b. visitor kiosk c. vending kiosk d. financial kiosk
d. financial kiosk
In a spreadsheet program, how is data organized? a. in rows and columns collectively called a spreadsheet b. in columns and cells collectively called a notebook c. in a notebook containing thousands of pages d. in rows and columns collectively called a worksheet
d. in rows and columns collectively called a worksheet
Which of the following is the code of acceptable behaviors users should follow while on the Internet; that is, it is the conduct expected of individuals while online? a. web politesse b. web civility c. Internet behavior d. netiquette
d. netiquette
Which of the following are valid steps toward virus protection? a.stay informed about viruses, never visit web sites unless they are approved by the Virus Protection Agency (VPA) b. delete a personal firewall, scan your computer for malware c.open e-mail attachments and then scan them for viruses, install operating system updates d. purchase a reputable antivirus program, update antivirus definitions regularly
d. purchase a reputable antivirus program, update antivirus definitions regularly
Which of the following terms means that the people who are conversing on a computer are online at the same time? a. mainline b. automatic c. real-world d. real time
d. real time
Which of the following works in a manner similar to a copy machine? a. memory b. display c. solid-state drive d. scanner
d. scanner
What does a disk cleanup utility do? a. creates an index of files on the disk b. organizes files into consecutive sectors c. provides file management capabilities d. searches for and removes unnecessary files
d. searches for and removes unnecessary files
A thief has unfortunately captured your ATM card number by placing a panel on top of the face of an ATM, which was virtually undetectable to you. What is this technology called? a. digimask b. transaction thief c. PIN CAPTCHA d. skimmer
d. skimmer
What is multimedia? a. GIF, JPEG, PNG, and TIFF b. a description of webpages that require special software and web connections to display graphic waveforms c. multiple uses of nontext information such as drawings and videos d. the combination of text, graphics, animation, audio, video, and/or virtual reality
d. the combination of text, graphics, animation, audio, video, and/or virtual reality
You have a new phone. What determines what type of messages you can send? a. the type of phone b. the embedded computer within the phone c. where you are geographically at any given time d. the services offered by the mobile service provider
d. the services offered by the mobile service provider
Your server room has ample floor space. Which of the following are you most likely to choose as a result? a. blade server b. rack server c. bay server d. tower server
d. tower server
You see a kiosk in the lobby of your local hospital. Which of the following is it most likely to be? a. financial kiosk b. ticket kiosk c. photo kiosk d. visitor kiosk
d. visitor kiosk