CS test review

Ace your homework & exams now with Quizwiz!

What does it mean to be computer literate? a. Implies knowledge of how the computer does its work (calculate, compare and copy). b. It includes a working vocabulary of computer and information system components. c. Requires a conceptual understanding of the system as a whole and hands-on ability to work the operating system (Windows, Mac, Linux) and common applications such as spreadsheets, word processors, Web browsers etc. d. All of the above

d. All of the above

What is cyberterrorism? a. The premeditated use of disruptive activities, or the threat thereof, against computers and/or networks, with the intention to cause harm or further social, ideological, religious, political or similar objectives b. Take place on the internet c. It is an illegal act d. All of the above

d. All of the above

What should Artificial Intelligence (AI) stride for? a. The integration of human intellectual capabilities within a computer b. Replicating the thinking patterns of the human brain c. Creating computers that think like humans d. All of the above

d. All of the above

Peter pays attention to all the latest news related to technology. Which of the following statements about computers, may Peter have heard lately? a. Mobile technology is transforming customer interaction b. Phone use for photos and videos is increasing c. New, faster supercomputers are developed every year d. Both a and b

d. Both a and b

26. If in Word 2013, the file TablePractice1 were to be stored within the CS180Homework folder in the root directory of the hard disk drive, its file path would be _______ a. C\\ CS180Homework \ TablePractice1.docx b. C drive:\ CS180Homework \ TablePractice1.docx c. C:\ CS180Homework \ TablePractice1\ d. C:\ CS180Homework \ TablePractice1.docx

d. C:\ CS180Homework \ TablePractice1.docx

Suppose that you have stored a Word 2013 file called BU Report inside the Homework folder, in the root directory of the hard disk drive. Its file path would be _______ a. C\\Homework\BU Report.docx b. C drive:\Homework folder\BU Report.docx c. C:\Homework\BU Report\ d. C:\Homework\BU Report.docx

d. C:\Homework\BU Report.docx

Which is false? a. A technique that uses unique physical identifiers such as facial topography, hand geometry, and retinal patterns b. It is used for verification of an individual's identity c. More secure than traditional passwords and pins d. Is just theoretical and has not yet been implemented

d. Is just theoretical and has not yet been implemented

John decided to buy a Mac computer from Apple and he wants the latest operating system (OS). Which OS should he installed? a. MS Word 2013 b. Windows 7 c. MS Excel 2013 d. X El Capitan

d. X El Capitan

5. The digital revolution __________________. a. is the evolving process of political, social, and economic change enabled by digital tech-nology b. is a contributing factor in the globalization of communications, via the internet c. facilitates the availability of electronic devices available to the consumer d. all of the above

d. all of the above

A Bit is ___________ a. the smallest unit of data b. either 1 or 0 c. 1/8 of a byte d. all of the above

d. all of the above

A computer is an electronic device, that _____ a. can accept input and produce output b. process data arithmetically and logically c. store results d. all of the above

d. all of the above

Computer literacy may be defined as _____ a. understanding the fundamental principles of computer processing b. having basic knowledge of how the computer calculates, compares and saves data c. being able to interact with others that possess technical knowledge in computers d. all of the above

d. all of the above

Identity theft, hacking and viruses are actions related to _____ a. cybercrime b. computer security c. criminal actions d. all of the above

d. all of the above

Since 2013, the Pew Research Center has worked with many projects related to the concept of Digital Divide. The concept of Digital Divide ____ a. illustrates issues of social justice and technology b. determines that everyone should have equal economic opportunities c. states that everybody should have equal access to technology d. all of the above

d. all of the above

Templates can be used to create Excel spreadsheets, Word documents, PowerPoint presentations, and more in a matter of minutes. Why would John use a template? a. To select the structure for his documents and to fill them in as he likes b. To easily update documents c. To maintain consistency between documents d. all of the above

d. all of the above

The ABC machine was_____ a. created by John Atanasoff and Clifford Berry at Iowa State University b. the first computer to use the binary system c. the first-all electronic computer d. all of the above

d. all of the above

The concept of a Digital Age or Digital Revolution, _______. a. is the evolving process of political, social, and economic change enabled by digital technology b. is a contributing factor in the globalization of communications, via the Internet c. facilitates the availability of electronic devices offered to the consumer d. all of the above TCIP/IP *Bits per second =modem speed More Sample questions 1 GB = 1,073,741,824 Bytes

d. all of the above

The term ethics refers to standards of moral conduct. Ethics with respect to the use of computers is referred to as computer ethics. Computer ethics has taken on more significance in recent years because ___________ a. the proliferation of computers in the home, school, and the workplace provides many more opportunities for unethical acts than in the past. b. the Internet makes it easy to distribute information that some would view as unethical. c. the increased accessibility to downloading, copying, and sharing of copyrighted material such as software, books, music, and movies. d. all of the above

d. all of the above

Paul has been thinking about the advantages and disadvantages of cloud storage. Which of the following statements are/is true about cloud storage? Cloud storage _____ a. is 100% reliable and secure b. allows for full ownership of your data c. has free endless storage available d. allows data to remain safe on a third-party server, in case of a disaster

d. allows data to remain safe on a third-party server, in case of a disaster

To carry out a task, such as editing photographs, you would use ____ software. a. system b. support c. executable d. application

d. application

Plagiarism is to use someone's work _______ a. with permission b. without permission c. without citation d. b and c only

d. b and c only

4. Downloading copyrighted material such as movies, MP3s, e-books, and software ____________. a. is considered piracy b. is illegal c. is considered shareware, therefore legal if placed in a public domain d. both a and b

d. both a and b

The act of harassing someone online by sending or posting mean messages, usually anonymously is called _______ a. malware b. hacking c. phishing d. cyberbullying

d. cyberbullying

What are the four fundamental functions of a computer system? a. input, output, web browsing, printing b. input, printing, storage, web browsing c. output, scanning, processing, storage d. input, storage, processing, output

d. input, storage, processing, output

One gigabyte (1 GB) is approximately ______ a. one thousand bytes b. one million bytes c. one trillion bytes d. none of the above

d. none of the above

A CPU comprises of___? a. Random Access Memory (RAM) b. the Control Unit (CU) c. the Arithmetic Logic (ALU) d. only B and C

d. only B and C

Some of the advantages of wired networks include _____ a. faster upload and download times than wireless networks b. mobility c. higher security d. only a and c

d. only a and c

A CPU or Central Processing Unit consists of _________ a. Random Access Memory (RAM) b. the Control Unit (CU) c. the Arithmetic Logic Unit (ALU) d. only b and c

d. only b and c

Charles Babbage was called the "Father of Computers, because _____ a. he was able to assemble the first computer b. he develop the blueprint of the first computer c. he thought about computers having input, output, the mill and a store components d. only b and c

d. only b and c

What is RAM? A. Readily Available Memory; it is the first level of memory used by the computer in all of its operations. B. Random Access Memory; it is memory that can be reached by any sub- system within a computer, and at any time. C. Random Access Memory; it is the memory used for short-term temporary data storage within the computer. D. Resettable Automatic Memory; it is memory that can be used and then automatically reset, or cleared, after being read from or written to.

B. Random Access Memory; it is memory that can be reached by any sub- system within a computer, and at any time.

Fred has decided to implement biometrics to secure the company's computer system. What is Fred implementing? a. A technique that uses unique physical identifiers such as facial topography, hand geometry, and retinal patterns b. A series of personal passwords to define an individual's identity c. A series of personal phrases to define an individual's identity d. Biometrics is just theoretical and cannot be implemented yet

a. A technique that uses unique physical identifiers such as facial topography, hand geometry, and retinal patterns

Which tab appears only when a chart is selected? a. Chart Tools Format b. Insert c. Page Layout d. Review

a. Chart Tools Format

Which search operator searches for an exact word or phrase when using a search engine? a. Quotation marks ("") b. Dash (-) c. Asterisk (*) d. Keyword

a. Quotation marks ("")

A microcomputer (or personal/desktop computer) _____ a. allows control over all the phases of computer processing b. allows access to digital content anytime, anyplace and anywhere c. is limited to processing specific tasks and bulk data processing d. none o the above

a. allows control over all the phases of computer processing

Random Access Memory (RAM) is said to be volatile on desktops and laptops. This means that _______ a. data is lost when the computer is turned off b. data is unstable when the computer is on c. data is unpredictable when the computer is turned off d. data is saved when the computer is turned off

a. data is lost when the computer is turned off

Application software _____________ a. help perform specific tasks e.g. Microsoft Office, Adobe Photoshop b. is an Apple product with its own operating system and graphic user interface (GUI ) c. is one of the first operating systems for the personal computer d. none of the above

a. help perform specific tasks e.g. Microsoft Office, Adobe Photoshop

Keyboard, microphone, and mouse are examples of _________ a. input devices b. computer software c. output devices d. none of the above

a. input devices

An Executable file _________ a. is a file with an exe extension b. is a music file c. is basically another name for a program d. none of the above

a. is a file with an exe extension

A network setup within the same classroom is a _____ a. local area network (LAN) b. wide area network (WAN) c. network of networks d. all of the above

a. local area network (LAN)

3D printers are capable of printing 3D models created with a computer aided design software. A 3D Printer is an output device that requires ______ and produces _____ a. soft copy/hard copy b. hard copy/hard copy c. soft copy/soft copy d. none of the above

a. soft copy/hard copy

A ___________ is capable of computing quadrillions of calculations in just a few nanoseconds and used mainly for advanced research activities. a. supercomputer b. mainframe c. microcomputer d. mobile device

a. supercomputer

10. What is a bit in terms of computing? a. the smallest unit of data b. either 1 or 0 c. 1/8 of a byte d. all of the above

a. the smallest unit of data

What is a bit in terms of computing? a. the smallest unit of data b. either 1 or 0 c. 1/8 of a byte d. all of the above

a. the smallest unit of data

A store carries several computers and you want the computer with the highest performance. Which computer would you buy? a. 3.38 MHz Processor with 8.00 GB of installed RAM b. 2.33 GHz Processor with 8.00 GB of installed RAM c. 2.33 GHz Processor with 16.00 MB of installed RAM d. 2.33 MHz Processor with 8.00 GB of installed RAM

b. 2.33 GHz Processor with 8.00 GB of installed RAM

Jane wants to buy a computer to play "Call of Duty", a game heavy in graphics, video, and sound. Which computer should she preferably buy? a. CPU @ 3.10 GHz with 8.00 GB of RAM b. CPU @ 3.20 GHz with 8.00 GB of RAM c. CPU @ 3.20 MHz with 16.00 MB of RAM d. CPU @ 3.20 GHz with 16.00 KB of RAM

b. CPU @ 3.20 GHz with 8.00 GB of RAM

9. Which tab on the ribbon do you use to create a chart? a. Design c. Page Layout b. Insert d. Format

b. Insert

When processing data, the temporary holding area for data, application program instructions, and the operating system is called _____ a. hard drive b. RAM (Random Access memory) c. ROM (Read Only Memory) d. CPU (Central Processing Unit)

b. RAM (Random Access memory)

_______ software helps the computer to control and coordinate all the activities of the computer hardware a. Utility b. Systems c. Application d. Cloud

b. Systems

Which of the following statements is NOT true? a. The Internet can enhance our lives through communication, entertainment, and information. b. The content of the Internet is controlled by various government agencies, here in the US. c. The Internet has and will continue to have an impact in nearly all areas of science, commerce, and art. d. The Internet is transforming our society into a knowledge society.

b. The content of the Internet is controlled by various government agencies, here in the US.

Viruses can be classified as a(n) _____ a. programming language b. applications software c. operating system d. systems software

b. applications software

What are viruses? a. programming language b. applications software c. operating system d. systems software

b. applications software

A method of personal identification, called ______, bases individual's identification on a physical trait. a. authentication b. biometrics c. metrics d. scanning

b. biometrics

The transmission speed of a network device such as a modem, is measured in _________ a. bytes per second b. bits per second c. kilobytes per second d. only a and c

b. bits per second

Searching the Internet for "Face recognition and biometrics" instead of Face recognition AND "biometrics": a. increases the number of articles found b. decreases the number of articles found c. makes no difference d. cannot use AND in a search

b. decreases the number of articles found

The Internet and the World Wide Web (Web) are _______ a. different in that the Internet is the system of linked documents and the Web is the infrastructure b. different in that the Internet is the infrastructure and the Web is the system of linked documents c. the same d. none of the above

b. different in that the Internet is the infrastructure and the Web is the system of linked documents

Input devices _________ a. enter information into a computer b. enter data into a computer c. enter the results of processing into the computer memory d. all of the above

b. enter data into a computer

When using search engines, adding a dash (-) before a word or site ______ a. acts as a placeholder for any unknown terms b. excludes all results that include that word or site c. search for an exact word or phrase on a site d. indicates a word that serves as a key or reference

b. excludes all results that include that word or site

Output devices, produce ____ a. data b. information c. text only d. values only

b. information

Worm viruses ______ a. execute when a computer boots-up b. spread on their own when a file is executed c. spread as an attachment to an email and the victim's address book d. execute when certain conditions or dates are reached

b. spread on their own when a file is executed

Operating Systems (OS) is classified as ______ software a. applications b. systems c. utility d. cloud

b. systems

The objective(s) of fifth generation computers or AI (Artificial Intelligence) is (are) to _____ a. use binary number systems as the basic components for memory and circuitry for processing b. work toward self-creation, self-programming, and self-preservation c. process data using microprocessors, with thousands of integrated circuits added onto a single silicon chip d. none of the above

b. work toward self-creation, self-programming, and self-preservation

Anna would like to narrow her research on talking robots to data posted in the last year, making sure not to search the wikipedia website. Her best combination of keywords, search operators and search tools is _____ a. talking robots 2016 NOT wikipedia.org b. talking robots NOT wikipedia.org Search Tools > Any time > Past year c. "talking robots" -wikipedia.org Search Tools > Any time > Past year d. "talking robots" 2015 2016 -wikipedia.org

c. "talking robots" -wikipedia.org Search Tools > Any time > Past year

In reference to computer viruses, which of the following statements is TRUE? a. As network connectivity increases, the likelihood of viruses spreading decreases. b. Installing antivirus software totally protects your computer from infection. c. A virus sent as an e-mail attachment can infect your computer, only when executed. d. all of the above.

c. A virus sent as an e-mail attachment can infect your computer, only when executed

Anna is working on her computer when the power suddenly shuts off. Any type of power interruption, no matter how brief, could result in the loss of data from the ___________ a. hard disk b. CD-RW c. RAM d. CD-R

c. RAM

In terms of a loss of power to a computer (unsaved data), data loss occurs in/from? a. hard disk b. CD-RW c. RAM. d. CD-R

c. RAM.

To regulate Internet data transport, the best known protocol is called _________ a. FTP b. HTTP c. TCP/IP d. all of the above

c. TCP/IP

Which protocol is used to regulate the transmission of Internet data? a. FTP b. HTTP c. TCP/IP d. All of the above

c. TCP/IP

In mobile computers, the speech feature (voice) such as iPhone's Siri, Windows' Cortana or Goggle Now is _____ device. a. an input only b. an output only c. both input and output d. none of the above

c. both input and output

Downloading movies from a website without paying the fees, is a violation of ____ a. privacy b. plagiarism c. intellectual property d. social justice

c. intellectual property

Computers are capable of all of the following, except _________ a. repetitive tasks b. high speed processing of data c. intelligence d. simulations

c. intelligence

The __________ holds many of the crucial electronic components of the system, such as the central processing unit (CPU) and memory (RAM), and provides connectors for other peripherals. a. ports b. drive bay c. motherboard d. network interface card

c. motherboard

A storage device such as a flash drive, is ______ a. volatile b. a temporary storage c. non-volatile d. all of the above

c. non-volatile

Bandwidth refers to the _____ of a network a. size b. devices c. transmission speed d. infrastructure

c. transmission speed


Related study sets

Chap. 24: asepsis and infection control

View Set

Grammar Adjective, Noun, and Pronoun Review

View Set

Med Surg Chapter 68: Management of Patients with Neurologic Trauma

View Set

Chapter 15: Europe to the Early 1500s

View Set

Chapter 2 - The Chemistry of Life

View Set

Adams Pharm for Nurses : Ch 24 : Diuretic Therapy & Drugs for Kidney Failure

View Set