COSC 1301 Practice Test for Final
COGNITIVE ASSESSMENT Word processing software, spreadsheet software, database software, and presentation software are examples of what category of computer software?
. Application software
Which of the following is NOT a popular programming language?
. Chrome
Which of the following is NOT an operating system used by today's computers and mobile devices?
. DOS
What involves reducing the electricity consumed and environmental waste generated when using a computer?
. Green computing
COGNITIVE ASSESSMENT Which of the following is not true of the thin client on your desk at your office?
. It has extensive capabilities.
What is the term for the picture/video message service available on smartphones and other mobile devices?
. MMS
Which of the following consists of electronic components that store instructions waiting to be executed and data needed by those instructions?
. Memory
COGNITIVE ASSESSMENT What kind of file does Adobe Reader allow you to view?
Which of the following is a device that plugs in a USB port on the computer or mobile device and contains multiple USB ports?
. USB hub
COGNITIVE ASSESSMENT Which of the following terms is used to describe a small text file that a web server stores on your computer?
. a cookie
COGNITIVE ASSESSMENT Which of the following terms is used to describe a program that copies itself repeatedly, using up resources and possibly shutting down the computer or network?
. a worm
COGNITIVE ASSESSMENT You are looking for the basic storage unit on a mobile device. Which of the following represents a single character?
. byte
Which of the following allows access to high-speed Internet services through the cable television network?
. cable modem
Which of the following is an electronic device, operating under the control of instructions stored in its own memory, that can accept data, process the data according to specified rules, produce results, and store the results for future use?
. computer
COGNITIVE ASSESSMENT As you edit some photos from your summer vacation, you decide to remove a blurry area of one of your photos. Which tool will you use for this?
. crop
Which of the following is a collection of data organized in a manner that allows access, retrieval, and use of that data?
. database
COGNITIVE ASSESSMENT What term is used to describe the discovery, collection, and analysis of evidence found on computers and networks?
. digital forensics
Which of the following tools searches for and removes unnecessary files?
. disk cleanup
Which of the following kinds of file utilities shrink the size of a file(s)?
. file compression
COGNITIVE ASSESSMENT The term firewall is _____________.
. hardware and/or software that protects a network's resources from intrusion
COGNITIVE ASSESSMENT In a spreadsheet program, how is data organized?
. in rows and columns collectively called a worksheet
Which of the following kinds of players is a program that allows you to view images and animation, listen to audio, and watch video files on your computer?
. media
Which of the following is equal to approximately one million characters?
. megabyte
Which of the following terms refers to any application that combines text with graphics, animation, audio, video, and/or virtual reality?
. multimedia
Which of the following is the code of acceptable behaviors users should follow while on the Internet; that is, it is the conduct expected of individuals while online?
. netiquette
Which of the following is the process of initiating contact between two Bluetooth devices and allowing them to communicate with each other?
. pairing
Which of the following is a utility that detects and protects a computer from unauthorized intrusions?
. personal firewall
COGNITIVE ASSESSMENT The term, PIN, is an acronym for which of the following?
. personal identification number
Which of the following is a scam in which a perpetrator sends an official looking email that attempts to obtain a user's personal and financial information?
. phishing
What is the term for the smallest element in an electronic image?
. pixel
COGNITIVE ASSESSMENT Recent photos you captured are low in quality. What is one of the first things to check?
. resolution
What manages the resources on a network?
. server
Which of the following is a technique intruders use to make their network or Internet transmission appear legitimate to a victim computer or network?
. spoofing
COGNITIVE ASSESSMENT Which of the following is your library using because it costs less, is easier to maintain, and uses less power than desktop computers?
. thin client
COGNITIVE ASSESSMENT What was the original purpose of a screen saver?
. to prevent images from being permanently etched on a monitor's screen
Which of the following is NOT an example of malware?
. vaporware
Which of the following consists of images displayed in motion?
. video
Which of the following describes a potentially damaging computer program that affects, or infects, a computer negatively by altering the way the computer works without the user's knowledge or permission?
. virus
Which of the following is the development and maintenance of webpages?
. web publishing
Which of the following is a collection of related webpages and associated items, such as documents and pictures, stored on a web server?
. website
COGNITIVE ASSESSMENT How often should you change your password?
every three months
COGNITIVE ASSESSMENT You need to set up a computer to store and deliver email messages for your small business. Which of the following are you most likely to use?
mail server
Which of the following are large, expensive, powerful computers that can handle hundreds or thousands of connected users simultaneously and store tremendous amounts of data, instructions, and information?
mainframes
Computer viruses, worms, Trojan horses, and rootkits are classified as which of the following?
malware
Which of the following is NOT a type of kiosk?
media
COGNITIVE ASSESSMENT At your local supermarket there is a kiosk that allows you to rent your favorite movie on DVD. Of which of the following is this an example?
media kiosk
What kind of software allows users to combine text, graphics, audio, video, and animation into an interactive application?
multimedia editing
Which of the following kinds of software enables users to enter typed text, handwritten comments, drawings, or sketches anywhere on a page and then save the page as part of a notebook?
note taking
COGNITIVE ASSESSMENT Which of the following best describes the term, cybercrime?
online or Internet-based illegal acts
COGNITIVE ASSESSMENT Which type of software has no restrictions from the copyright holder regarding modifications of the software's internal instructions and its redistribution?
open source software
Which type of disc is a type of storage media that consists of a flat, round, portable metal disc made of metal, plastic, and lacquer that is written and read by a laser?
optical
Which of the following is a program that extends the capability of a browser?
plug-in
COGNITIVE ASSESSMENT Your friend has been assigned the task of creating visual aids to communicate ideas, messages, and other information to a sales group. What type of software should she use to complete this task?
presentation software
Which of the following is a request for specific data from a database?
query
With which of the following do users choose which folders and files to include in a backup?
selective backup
Which of the following is an example of a mobile device?
smartphones
Which of the following is a collection of individual programs sold as a unit?
software suite
Which of the following kinds of software is NOT usually included by an installed operating system
spreadsheet
COGNITIVE ASSESSMENT You need to store and manage all the Microsoft Office files for your office. Which of the following are you most likely to use?
storage server
Which of the following are the fastest, most powerful computers — and the most expensive?
supercomputers
Which of the following protects against electrical power variations?
surge protector
Which of the following allows users to have multiple home pages that automatically display when the browser runs?
tabbed browsing
How many peripheral devices can you connect with a USB port?
up to 127
Which of the following kinds of software allows users to modify a segment of a video, called a clip?
video editing
Which kind of keyboard projects an image of a keyboard on a flat surface?
virtual
What is the term for an electronic document on the web that can contain text, graphics, animation, audio (sound), and video?
webpage
Which of the following kinds of software allows users to create and manipulate documents containing mostly text and sometimes graphics?
word processing
COGNITIVE ASSESSMENT The major carriers of Internet network traffic are known collectively by what term?
Internet backbone
COGNITIVE ASSESSMENT What is the purpose of an Internet Protocol address (IP address)?
It uniquely identifies the location of each computer or device connected to the Internet.
Any illegal act involving a computer generally is referred to as a computer crime.
True
Cloud computing uses server virtualization.
True
Digital cameras often can connect to or communicate wirelessly with a computer, a printer, or the Internet
True
Ergonomic studies have shown that using the correct type and configuration of chair, keyboard, display device, and work surface helps users work comfortably and efficiently and helps protect their health.
True
In a networked environment, each computer on the network can access the hardware on the network.
True
Most current web browsers support tabbed browsing, where the top of the browser displays a tab for each webpage you open.
True
People suffering from technology overload feel distressed when deprived of technology, even for a short length of time.
True
Software developers typically cannot incorporate freeware in applications they intend to sell.
True
Some audio files require you to download a media player.
True
Websites often collect data about you so that they can customize advertisements and send you personalized email messages.
True
When you enter a domain name, the DNS server translates the domain name to its associated IP address of that data and information can be routed to the correct computer.
True
Wi-Fi uses short-range radio signals to enable specially enabled computers and devices to communicate with each other.
True
Which of the following programs allow designers to rotate designs of 3-D objects to view them from any angle?
CAD
COGNITIVE ASSESSMENT Your electric service has been failing with some frequency lately because of a lot of storms, and you are looking for more peace of mind when it comes to a reliable power source for your computer. Which of the following could help?
UPS
COGNITIVE ASSESSMENT In order to safeguard your personal information, which of the following is recommended?
Clear your history file when you are finished browsing.
Which of the following is a technology that provides high-speed Internet connection using the telephone network?
DSL
Which of the following is a collection of unprocessed items, which can include text, numbers, images, audio, and video?
Data
With contemporary antivirus protection it is now possible to ensure a virus or malware never will attack your computer.
False
You need extensive knowledge of networks to set up a home network.
False
COGNITIVE ASSESSMENT If someone displays a webpage in a browser and the page indicates Flash Player is needed, what is Flash Player?
a plug-in
COGNITIVE ASSESSMENT What is the World Wide Web?
a worldwide collection of electronic documents
COGNITIVE ASSESSMENT A DNS server is able to identify which of the following?
an IP address based on a domain name
What kind of software consists of programs designed to make users more productive and/or assist them with personal tasks?
application
Which of the following is a duplicate of a file, program, or disk that can be used if the original is lost, damaged, or destroyed?
backup
Which kind of device is hardware capable of transferring items from computers and devices to transmission media and vice versa?
communications device
COGNITIVE ASSESSMENT As you edit some photos from your summer vacation, you choose to make a beach photo much smaller in terms of its file size in order to be able to email it to your friends. Which tool will you use for this?
compress
COGNITIVE ASSESSMENT What term is used to describe the process of restricting access to certain material on the web?
content filtering
Which of the following is someone who demands payment in order to stop an attack on an organization's technology infrastructure?
cyberextortionist
COGNITIVE ASSESSMENT Which of the following terms refers to someone who accesses a computer or network illegally with the intent of malicious action?
cyberterrorist
Which of the following kinds of certificate is a notice that guarantees a user or website is legitimate?
digital
COGNITIVE ASSESSMENT Your smartphone allows you to take and store photos, and play and view your digital media. What is this overlap of technologies called?
digital device convergence
Which of the following is any event or action that could cause a loss of or damage to computer hardware, software, data, information, or processing capability?
digital security risk
COGNITIVE ASSESSMENT In Internet terminology, what is the term, google.com, called?
domain name
COGNITIVE ASSESSMENT When an instrument in the dashboard of your car informs you the air pressure in the right rear tire is low, what type of computer determines the air pressure is low?
embedded computer
Which of the following is a special-purpose computer that functions as a component in a larger product?
embedded computer
Biometric objects are entirely foolproof.
False
Hot spots are businesses that provide individuals and companies access to the Internet free or for a fee, usually a fixed monthly amount.
False
Like an IP address, the components of a domain name are separated by commas
False
One effective strategy for creating strong passwords includes changing common words to symbols.
False
Open source software is copyrighted software that is distributed at no cost for a trial period.
False
The Internet is a service of the web.
False
COGNITIVE ASSESSMENT If you are looking to use a Bluetooth device and do not want to extend its range with additional equipment, which of the following is the approximate distance you can expect between your device and the device with which it is transmitting data?
33 feet
COGNITIVE ASSESSMENT Which of the following statements is not true about biometric devices?
Biometric devices are an unreliable method of identification and notification.
Which of the following is a popular social networking site?
At a higher resolution, you can capture and store more images in your digital camera.
False
Which of the following conveys meaning and is useful to users?
Information
Which of the following is a worldwide collection of networks that connects millions of businesses, government agencies, educational institutions, and individuals?
Internet
Which of the following is not a possessed object?
PIN
Which of the following is true of VoIP?
Skype is an example of VoIP software.
What consist(s) of a series of related instructions that tells the computer what tasks to perform and how to perform them?
Software
COGNITIVE ASSESSMENT The term, zombie, is _____________.
a computer or device whose owner is unaware that the computer or device is being controlled remotely by an outsider
COGNITIVE ASSESSMENT Social engineering, as it pertains to computers, is _____________.
gaining unauthorized access or obtaining confidential information by taking advantage of the trusting nature or naivety of users
Which of the following kinds of software provides the capabilities of paint software and also includes the ability to enhance and modify existing images and pictures?
image editing
Which of the following refers to the right of individuals and companies to deny or restrict the collection and use of information about them?
information privacy
COGNITIVE ASSESSMENT When a waiter at a restaurant steals credit card numbers to make fraudulent purchases, this is called _____________.
information theft
For which of the following to work must both parties be online at the same time, and the receiver of a message be willing to accept messages?
instant messaging