Info Tech Chap 3 Quiz Questions & Answers
Which of the following is not an example of a platform?
Today's _____ is based on the same standard as the original IBM PC from the 1980s.
IBM-compatible platform
What is the purpose of a graphical user interface (GUI)?
It enables the user to select commands by pointing and clicking with a mouse or other pointing device or by tapping with a finger.
A solution stack is often called a _____ because of the features it includes: the Linux kernel; a web server such as Apache; a database such as MariaDB, MySQL, or MongoDB; and CGI scripting tools such as Pert, PHP, and/or Python.
LAMP
_____ is a UNIX-based operating system that runs on a number of platforms, including Intel-based PCs, servers, and handheld devices.
Linux
What is the most popular PC operating system in the world?
Microsoft Windows
Most hardware comes with a driver disc containing drivers for different operating systems.
True
Operating systems come with drivers for some common devices.
True
True or False: Binary code is a low-level language.
True
True or False: Nonresidentparts of the operating system remain on the hard disk until they are needed.
True
True or False: UNIX runs on computers of all kinds, from PCs to supercomputers.
True
This graphic illustrates what kind of security system?
a firewall
A _____ is a drive that contains a valid operating system.
boot drive
The environment in which all the windows and applications open and close is the
desktop.
A _____ analyzes a computer's components and system software programs and creates a report that identifies the problems found.
diagnostic utility
A _____ is a mechanical device that reads data from and writes data to a disk, such as a hard disk or DVD.
disk drive
A number of commercially available Linux _____ are available for personal and business computers.
distributions (distros)
A(n) _____ is a file that runs a program.
executable file
You can change the default application for a certain type of file by changing the
file association.
Most files are stored in
folders.
The system BIOS is the BIOS for the
motherboard.
A _____ operating system allows many people to use one CPU at the same time from remote workstations.
multiuser
A child folder is located within a
parent folder.
When a PC starts up, it completes a(n) _____ to check the essential hardware devices and make sure they are operational.
power-on self-test (POST)
The computer's RAM is _____, because it's where the data is placed immediately after it's input or processed.
primary storage
A utility that differentiates legitimate correspondence from junk mail is called a(n)
spam blocker.
Which of the following is not a function of system software?
word processing
The Intel platform comes in two versions: x86 and
x64.
Suppose that you purchase a smartphone that's neither an iPhone nor a Windows phone. What operating system does the phone use?
Android
Any changes a user makes to BIOS settings are performed by the
BIOS Setup utility.
A compact disc (CD) can store up to _____ of data.
900 megabytes
Your keyboard speaks a different language to your operating system (OS) than your printer does. _____ are small programs that translate commands between the OS and the devices.
Drivers
A heuristic is the same thing as a virus definition.
False
All devices of a certain type, such as all printers, speak the same language.
False
Heuristics are identifying strings of computer code that each virus leaves behind.
False
True or False: Firmware is another name for a BIOS program.
False
True or False: People are encouraged to experiment with propriety software, make improvements to it, and share the improvements with the entire user community.
False
True or False: The 64-bit version of the Intel platform is called x86.
False
The data transfer rate is dependent on the interface used to connect the _____ to the motherboard. The modern interface is serial ATA (SATA).
HDD
Which of the following statements describes a basic difference between high-level language and machine language?
High-level language is easier to learn and use than machine language.
Which of the following states a benefit of iOS?
Hundreds of thousands of applications are available for it.
What is another name for the IBM-compatible platform?
Intel platform
Which of the following statements does not describe a thin client?
It has a full-featured operating system.
The file system used in modern versions of Windows, called the _____, uses a master file table.
New Technology File System (NTFS)
Which of the following statements best describes open source software?
The developer retains ownership of the original programming code but makes the code available free to the general public.
Which of the following statements does not describe adware?
The user agrees to have it installed on his or her computer.
An antivirus software can do a full system scan in addition to scanning each file as it is used.
True
Antivirus software is typically resident in memory as the computer operates.
True
For an antivirus program to be effective, it must be updated regularly.
True
True or False: Within each volume, the root directory is the top level of storage.
True
You can update a device driver through Device Manager in Windows.
True
Your operating system may prompt you when driver updates are available for some devices.
True
Of the three main server operating systems, _____ has been in existence the longest and is the only one that was developed from the ground up for servers.
UNIX
_____ is a version of Microsoft Windows designed for servers.
Windows Server
Which of the following examines the hard disk and its contents to identify potential problems, such as physically bad spots and errors in the table of contents?
a disk scanner
Which of the following is one of the four types of system software?
an operating system (OS)
If you want to remove (delete) a program from your computer, including all of its associated entries and additional files, which of the following should you use?
an uninstaller
Virus checker is another name for
antivirus software.
The average amount of time between the operating system requesting a file and the HDD delivering it is known as the
average access time.
If your computer doesn't have a _____ utility, you can copy files manually to a secondary location using File Explorer or another file management utility.
backup
Storing your downloaded songs on a(n) _____ allows you to access them from several devices.
cloud drive
Starting a computer after the power has been turned off is referred to as a
cold boot.
A prompt such as C:\> is an example of a
command-line interface.
A(n) _____ translates an entire program into machine language once and then saves it in a file that can be reused over and over.
compiler
A _____ scans the hard disk and reorganizes files and unused space, allowing the operating system to locate and access files and data more quickly.
disk defragmenter
WinZip and StuffIt are examples of _____ utilities, which shrink the size of a file by reducing _____ (that is, instances of repeated bits).
file compression; redundancies
Common _____ include .pdf and .docx.
file extensions
A _____ is a conceptual graphic that helps illustrate the hierarchical structure of a file storage system.
folder tree
The small pictures that represent files, folders, and applications on the computer screen are called
icons.
This screen capture shows the contents of a folder called Drivers. Which of the following is a child folder located within the Drivers folder?
input
JavaScript is an example of a programming language that must be _____, not _____.
interpreted; compiled
On an optical disc, the areas of greater reflectivity are called
lands.
Apple Macintosh computers use the _____ operating system.
macOS
Binary code, which is written in zeroes (0s) and ones (1s), is sometimes called
machine language.
Malicious software, commonly known as _____, can be detected by antivirus utilities and deleted or quarantined when found.
malware
The kernel is a _____ part of the operating system, which means that it remains in memory while the computer is in operation.
memory resident
A _____ typically consists of a combination of hardware and software.
network firewall
A file that's split up and stored in _____ takes longer to load because the operating system must locate and retrieve all the various pieces.
noncontiguous sectors
CDs and DVDs are both _____, which store data in patterns of greater and lesser reflectivity on the surface.
optical discs
C:\Users\Smith\Desktop\AnnualBudget\March2018 is an example of a
path.
Symantec and McAfee both make _____ software, which is designed to protect a PC from unauthorized users attempting to access it through an internet connection.
personal firewall
In addition to installing firewall software, a company might add a hardware device, such as a dedicated firewall device or _____, that screens all communications entering and leaving networked computers to prevent unauthorized access.
proxy server
A USB flash drive and a hard disk drive are both considered
secondary storage.
Any type of software, including an operating system, contains a _____ that allows communication between the software and the user.
shell
A _____ is an icon that points to a file and that you can place in a handy location, such as on your computer desktop; double-clicking on the icon lets you access the file.
shortcut
What is a basic input/output system (BIOS)?
software on the motherboard that helps the computer start up
A USB flash drive is a common example of a
solid-state drive (SSD).
Roughly 55 percent of all internet email traffic is
spam.
Which of the following is a form of malware that tracks the activities of an internet user for the benefit of a third party?
spyware
Depending on the file system in use, the disk's _____ may be called the file allocation table (FAT).
table of contents
On the Start menu, large rectangular _____ serve as shortcuts to applications you can run.
tiles
Which of the following is not a function of the kernel?
to start up the computer
Blu-ray discs (BDs) are commonly used for which of these purposes?
to store and transfer large amounts of data
A _____ is a numbered, concentric ring or circle on a hard disk.
track
Compilers and interpreters are types of
translators.
Consider this graphic illustrating the steps in the PC startup process. In Step 6, which term should be provided on the blank line?
user interface
A(n) _____ program protects the computer from security and privacy violations.
utility
Your C drive, D drive, and F drive are examples of
volumes.
If you restart your computer after downloading a new piece of software, you are performing a
warm boot.
Opening a Microsoft Word document and your browser and arranging the _____ side by side enables you to view them simultaneously.
windows