COSC 1301 Practice Test for Final

Ace your homework & exams now with Quizwiz!

COGNITIVE ASSESSMENT Word processing software, spreadsheet software, database software, and presentation software are examples of what category of computer software?

. Application software

Which of the following is NOT a popular programming language?

. Chrome

Which of the following is NOT an operating system used by today's computers and mobile devices?

. DOS

What involves reducing the electricity consumed and environmental waste generated when using a computer?

. Green computing

COGNITIVE ASSESSMENT Which of the following is not true of the thin client on your desk at your office?

. It has extensive capabilities.

What is the term for the picture/video message service available on smartphones and other mobile devices?

. MMS

Which of the following consists of electronic components that store instructions waiting to be executed and data needed by those instructions?

. Memory

COGNITIVE ASSESSMENT What kind of file does Adobe Reader allow you to view?

. PDF

Which of the following is a device that plugs in a USB port on the computer or mobile device and contains multiple USB ports?

. USB hub

COGNITIVE ASSESSMENT Which of the following terms is used to describe a small text file that a web server stores on your computer?

. a cookie

COGNITIVE ASSESSMENT Which of the following terms is used to describe a program that copies itself repeatedly, using up resources and possibly shutting down the computer or network?

. a worm

COGNITIVE ASSESSMENT You are looking for the basic storage unit on a mobile device. Which of the following represents a single character?

. byte

Which of the following allows access to high-speed Internet services through the cable television network?

. cable modem

Which of the following is an electronic device, operating under the control of instructions stored in its own memory, that can accept data, process the data according to specified rules, produce results, and store the results for future use?

. computer

COGNITIVE ASSESSMENT As you edit some photos from your summer vacation, you decide to remove a blurry area of one of your photos. Which tool will you use for this?

. crop

Which of the following is a collection of data organized in a manner that allows access, retrieval, and use of that data?

. database

COGNITIVE ASSESSMENT What term is used to describe the discovery, collection, and analysis of evidence found on computers and networks?

. digital forensics

Which of the following tools searches for and removes unnecessary files?

. disk cleanup

Which of the following kinds of file utilities shrink the size of a file(s)?

. file compression

COGNITIVE ASSESSMENT The term firewall is _____________.

. hardware and/or software that protects a network's resources from intrusion

COGNITIVE ASSESSMENT In a spreadsheet program, how is data organized?

. in rows and columns collectively called a worksheet

Which of the following kinds of players is a program that allows you to view images and animation, listen to audio, and watch video files on your computer?

. media

Which of the following is equal to approximately one million characters?

. megabyte

Which of the following terms refers to any application that combines text with graphics, animation, audio, video, and/or virtual reality?

. multimedia

Which of the following is the code of acceptable behaviors users should follow while on the Internet; that is, it is the conduct expected of individuals while online?

. netiquette

Which of the following is the process of initiating contact between two Bluetooth devices and allowing them to communicate with each other?

. pairing

Which of the following is a utility that detects and protects a computer from unauthorized intrusions?

. personal firewall

COGNITIVE ASSESSMENT The term, PIN, is an acronym for which of the following?

. personal identification number

Which of the following is a scam in which a perpetrator sends an official looking email that attempts to obtain a user's personal and financial information?

. phishing

What is the term for the smallest element in an electronic image?

. pixel

COGNITIVE ASSESSMENT Recent photos you captured are low in quality. What is one of the first things to check?

. resolution

What manages the resources on a network?

. server

Which of the following is a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network?

. spoofing

COGNITIVE ASSESSMENT Which of the following is your library using because it costs less, is easier to maintain, and uses less power than desktop computers?

. thin client

COGNITIVE ASSESSMENT What was the original purpose of a screen saver?

. to prevent images from being permanently etched on a monitor's screen

Which of the following is NOT an example of malware?

. vaporware

Which of the following consists of images displayed in motion?

. video

Which of the following describes a potentially damaging computer program that affects, or infects, a computer negatively by altering the way the computer works without the user's knowledge or permission?

. virus

Which of the following is the development and maintenance of webpages?

. web publishing

Which of the following is a collection of related webpages and associated items, such as documents and pictures, stored on a web server?

. website

COGNITIVE ASSESSMENT How often should you change your password?

every three months

COGNITIVE ASSESSMENT You need to set up a computer to store and deliver email messages for your small business. Which of the following are you most likely to use?

mail server

Which of the following are large, expensive, powerful computers that can handle hundreds or thousands of connected users simultaneously and store tremendous amounts of data, instructions, and information?

mainframes

Computer viruses, worms, Trojan horses, and rootkits are classified as which of the following?

malware

Which of the following is NOT a type of kiosk?

media

COGNITIVE ASSESSMENT At your local supermarket there is a kiosk that allows you to rent your favorite movie on DVD. Of which of the following is this an example?

media kiosk

What kind of software allows users to combine text, graphics, audio, video, and animation into an interactive application?

multimedia editing

Which of the following kinds of software enables users to enter typed text, handwritten comments, drawings, or sketches anywhere on a page and then save the page as part of a notebook?

note taking

COGNITIVE ASSESSMENT Which of the following best describes the term, cybercrime?

online or Internet-based illegal acts

COGNITIVE ASSESSMENT Which type of software has no restrictions from the copyright holder regarding modifications of the software's internal instructions and its redistribution?

open source software

Which type of disc is a type of storage media that consists of a flat, round, portable metal disc made of metal, plastic, and lacquer that is written and read by a laser?

optical

Which of the following is a program that extends the capability of a browser?

plug-in

COGNITIVE ASSESSMENT Your friend has been assigned the task of creating visual aids to communicate ideas, messages, and other information to a sales group. What type of software should she use to complete this task?

presentation software

Which of the following is a request for specific data from a database?

query

With which of the following do users choose which folders and files to include in a backup?

selective backup

Which of the following is an example of a mobile device?

smartphones

Which of the following is a collection of individual programs sold as a unit?

software suite

Which of the following kinds of software is NOT usually included by an installed operating system

spreadsheet

COGNITIVE ASSESSMENT You need to store and manage all the Microsoft Office files for your office. Which of the following are you most likely to use?

storage server

Which of the following are the fastest, most powerful computers — and the most expensive?

supercomputers

Which of the following protects against electrical power variations?

surge protector

Which of the following allows users to have multiple home pages that automatically display when the browser runs?

tabbed browsing

How many peripheral devices can you connect with a USB port?

up to 127

Which of the following kinds of software allows users to modify a segment of a video, called a clip?

video editing

Which kind of keyboard projects an image of a keyboard on a flat surface?

virtual

What is the term for an electronic document on the web that can contain text, graphics, animation, audio (sound), and video?

webpage

Which of the following kinds of software allows users to create and manipulate documents containing mostly text and sometimes graphics?

word processing

COGNITIVE ASSESSMENT The major carriers of Internet network traffic are known collectively by what term?

Internet backbone

COGNITIVE ASSESSMENT What is the purpose of an Internet Protocol address (IP address)?

It uniquely identifies the location of each computer or device connected to the Internet.

Any illegal act involving a computer generally is referred to as a computer crime.

True

Cloud computing uses server virtualization.

True

Digital cameras often can connect to or communicate wirelessly with a computer, a printer, or the Internet

True

Ergonomic studies have shown that using the correct type and configuration of chair, keyboard, display device, and work surface helps users work comfortably and efficiently and helps protect their health.

True

In a networked environment, each computer on the network can access the hardware on the network.

True

Most current web browsers support tabbed browsing, where the top of the browser displays a tab for each webpage you open.

True

People suffering from technology overload feel distressed when deprived of technology, even for a short length of time.

True

Software developers typically cannot incorporate freeware in applications they intend to sell.

True

Some audio files require you to download a media player.

True

Websites often collect data about you so that they can customize advertisements and send you personalized email messages.

True

When you enter a domain name, the DNS server translates the domain name to its associated IP address of that data and information can be routed to the correct computer.

True

Wi-Fi uses short-range radio signals to enable specially enabled computers and devices to communicate with each other.

True

Which of the following programs allow designers to rotate designs of 3-D objects to view them from any angle?

CAD

COGNITIVE ASSESSMENT Your electric service has been failing with some frequency lately because of a lot of storms, and you are looking for more peace of mind when it comes to a reliable power source for your computer. Which of the following could help?

UPS

COGNITIVE ASSESSMENT In order to safeguard your personal information, which of the following is recommended?

Clear your history file when you are finished browsing.

Which of the following is a technology that provides high-speed Internet connection using the telephone network?

DSL

Which of the following is a collection of unprocessed items, which can include text, numbers, images, audio, and video?

Data

With contemporary antivirus protection it is now possible to ensure a virus or malware never will attack your computer.

False

You need extensive knowledge of networks to set up a home network.

False

COGNITIVE ASSESSMENT If someone displays a webpage in a browser and the page indicates Flash Player is needed, what is Flash Player?

a plug-in

COGNITIVE ASSESSMENT What is the World Wide Web?

a worldwide collection of electronic documents

COGNITIVE ASSESSMENT A DNS server is able to identify which of the following?

an IP address based on a domain name

What kind of software consists of programs designed to make users more productive and/or assist them with personal tasks?

application

Which of the following is a duplicate of a file, program, or disk that can be used if the original is lost, damaged, or destroyed?

backup

Which kind of device is hardware capable of transferring items from computers and devices to transmission media and vice versa?

communications device

COGNITIVE ASSESSMENT As you edit some photos from your summer vacation, you choose to make a beach photo much smaller in terms of its file size in order to be able to email it to your friends. Which tool will you use for this?

compress

COGNITIVE ASSESSMENT What term is used to describe the process of restricting access to certain material on the web?

content filtering

Which of the following is someone who demands payment in order to stop an attack on an organization's technology infrastructure?

cyberextortionist

COGNITIVE ASSESSMENT Which of the following terms refers to someone who accesses a computer or network illegally with the intent of malicious action?

cyberterrorist

Which of the following kinds of certificate is a notice that guarantees a user or website is legitimate?

digital

COGNITIVE ASSESSMENT Your smartphone allows you to take and store photos, and play and view your digital media. What is this overlap of technologies called?

digital device convergence

Which of the following is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability?

digital security risk

COGNITIVE ASSESSMENT In Internet terminology, what is the term, google.com, called?

domain name

COGNITIVE ASSESSMENT When an instrument in the dashboard of your car informs you the air pressure in the right rear tire is low, what type of computer determines the air pressure is low?

embedded computer

Which of the following is a special-purpose computer that functions as a component in a larger product?

embedded computer

Biometric objects are entirely foolproof.

False

Hot spots are businesses that provide individuals and companies access to the Internet free or for a fee, usually a fixed monthly amount.

False

Like an IP address, the components of a domain name are separated by commas

False

One effective strategy for creating strong passwords includes changing common words to symbols.

False

Open source software is copyrighted software that is distributed at no cost for a trial period.

False

The Internet is a service of the web.

False

COGNITIVE ASSESSMENT If you are looking to use a Bluetooth device and do not want to extend its range with additional equipment, which of the following is the approximate distance you can expect between your device and the device with which it is transmitting data?

33 feet

COGNITIVE ASSESSMENT Which of the following statements is not true about biometric devices?

Biometric devices are an unreliable method of identification and notification.

Which of the following is a popular social networking site?

Facebook

At a higher resolution, you can capture and store more images in your digital camera.

False

Which of the following conveys meaning and is useful to users?

Information

Which of the following is a worldwide collection of networks that connects millions of businesses, government agencies, educational institutions, and individuals?

Internet

Which of the following is not a possessed object?

PIN

Which of the following is true of VoIP?

Skype is an example of VoIP software.

What consist(s) of a series of related instructions that tells the computer what tasks to perform and how to perform them?

Software

COGNITIVE ASSESSMENT The term, zombie, is _____________.

a computer or device whose owner is unaware that the computer or device is being controlled remotely by an outsider

COGNITIVE ASSESSMENT Social engineering, as it pertains to computers, is _____________.

gaining unauthorized access or obtaining confidential information by taking advantage of the trusting nature or naivety of users

Which of the following kinds of software provides the capabilities of paint software and also includes the ability to enhance and modify existing images and pictures?

image editing

Which of the following refers to the right of individuals and companies to deny or restrict the collection and use of information about them?

information privacy

COGNITIVE ASSESSMENT When a waiter at a restaurant steals credit card numbers to make fraudulent purchases, this is called _____________.

information theft

For which of the following to work must both parties be online at the same time, and the receiver of a message be willing to accept messages?

instant messaging


Related study sets

Gen Chem Experiment 3: Fractional Crystallization

View Set

Percy Jackson Ch. 5 Reading Comprehension

View Set

Comp sci Practice Attempt - 2020 Practice Exam 1 MCQ

View Set

Comprehensive Core Competency CNA

View Set

Macroeconomics ch 30, 34, 36, and 40

View Set