Review Test:Final Exam Practice - Concepts

Ace your homework & exams now with Quizwiz!

An example of a mobile device OS is A. macOS. B. Android. C. Linux. D. Windows.

B. Android

Before recycling your Windows​ computer, you should delete its data by using a program like A. Reclaim. B. File shredder. C. Windows Refresh. D. Windows Reset This PC.

B. File Shredder

Which of the following should you NOT do to secure a wireless​ network? A. Create a security encryption passphrase. B. Keep the default network name and router password. C. Implement media access control. D. Disable SSID broadcasting.

B. Keep the default network name and router password.

Which of the following would you NOT see on the Windows 11​ taskbar? A. File Explorer B. Power C. Task View D. Start

B. Power

Data can be retrieved fastest from A. cache memory. B. registers. C. RAM. D. HDMI.

B. Registers

For complex web​ development, programmers often use A.Visual Basic. B. Scripting languages. C. Swift. D. DNA.

B. Scripting languages.

A feature in Windows that is used to easily position multiple open windows on the screen is​ called: A. Program Manager. B. Snap Layout. C. Virtual View. D. Virtual Desktops.

B. Snap Layout.

Which of the following are common to all programming​ languages? A. JSON and APIs B. Syntax, keywords, and operators C. SDLC and PDLC D. Architecture neutrality

B. Syntax, keywords, and operators

Ensuring that website content is not slanted in its point of view is checking​ for: A. relevance B. bias C. authority D. audience

B. bias

In a​ computer, each​ _can represent a single character such as​ "G". A. bit B. byte C. petabyte D. megabyte

B. byte

Which type of software controls many​ "back office" operations and processing functions such as​ billing, production, and inventory​ management? A. customer relationship management software B. enterprise resource planning software This is the correct answer. C. data management software D. course management software

B. enterprise resource planning software

Hackers A. are another name for a zombie attack. B. illegally break into a computer or network. C. are security experts in digital forensics. D. use VPNs to gather information.

B. illegally break into a computer or network.

When a printer receives a​ command, it generates a unique signal to the​ OS, which is called​ a(n) A. slice. B. interrupt. C. event. D. none of the above.

B. interrupt.

Using copyrighted works without permission of the copyright holder A. is never possible. B. is possible under the​ "fair use" doctrine. C. only applies to proprietary software. D. is only possible for photographs of public places.

B. is possible under the​ "fair use" doctrine.

The most common output device for hard output is a A. mouse. B. printer. C. scanner. D. display screen.

B. printer

What web browser feature would be particularly useful when using public​ computers? A. pinned tabs B. privacy browsing C. session restore D. all of the above

B. privacy browsing

Multifactor authentication requires you to have a combination of A. gestures. B. something you​ know, something you​ are, and something you own. C. methods of payment. D. your password and your PIN.

B. something you​ know, something you​ are, and something you own.

Unsupervised learning in an artificial training system improves A. by using training data. B. without being given specific data examples. C. by using augmented reality data. D. by using virtual reality scenarios.

B. without being given specific data examples.

Roberto downloads and modifies an open source software​ program, then uploads the program with a different name. Which type of software license are they most likely to be working​ under? A. Open Source License B. Copyleft C. GNU General Public License D. No license is necessary

C. GNU General Public License

Antivirus software prevents infection by recording key attributes about your files and checking to see if they change over time in a process called A. quarantine. B. updating. C. inoculation. D. signature.

C. Inoculation.

Crowdfunding sites include A. Bing and Google. B. Citi Bike and Zipcar. C. Kickstarter and GoFundMe. D. Amazon and Netflix.

C. Kickstarter and GoFundMe.

Which would NOT be considered application​ software? A. Microsoft PowerPoint B. Chrome browser C. Microsoft Windows 11. D. Adobe Illustrator

C. Microsoft Windows 11.

Which of the following connects the home network to the​ Internet? A. Router B. Range extender C. Modem D. Switch

C. Modem

Which of the following would NOT be a benefit of networking​ computers? A. Sharing printers and other peripherals B. Sharing an Internet connection C. Sharing software licenses D. Sharing files

C. Sharing software licenses

Which of the following is a sensor found in certain​ smartphones? A. RAM B. HDMI C. accelerometer D. DisplayPort

C. accelerometer

Viruses that load from USB drives left connected to computers when computers are turned on are known as A. script viruses. B. polymorphic viruses. C. boot-sector viruses. D. encryption viruses.

C. boot-sector viruses.

You need to know how to program to A. open a template file for budgeting in Microsoft Excel. B. use Microsoft Word to type text and select various fonts. C. create unique software solutions for specialized problems. D. create animations in PowerPoint.

C. create unique software solutions for specialized problems.

The Internet is a​ client/server network because A. information is served to people for free. B. the web is a client of the server called the Internet. C. devices connect as clients and ask for data from a computer that serves back results. D. devices need to pay as clients to access the Internet.

C. devices connect as clients and ask for data from a computer that serves back results.

Which of the following is an open electronic publishing​ format? A. SMS B. azw C. ePub D.PDF

C. ePub

A type of journalism where stories are invented and intended to spread misinformation rather than being factual is known as A. a public domain tale. B. an urban legend. C. fake news. D. a persistence of information story.

C. fake news.

When the binary code is retrieved from RAM and moved to the​ CPU, this stage is known as A. execute. B. store. C. fetch. D. decode.

C. fetch

Inheritance is a useful feature of a language because it promotes A. easier compilation. B. use of HTML5. C. reuse of existing code. D. proper control structures.

C. reuse of existing code.

​C:\ on a Windows PC is like a large filing​ cabinet, and is referred to as the Question content area bottom Part 1 A. main directory. B. library directory. C. root directory. D. main path.

C. root directory.

A surge protector may look like just another power strip but it also can A. help manage heat. B. detect viruses. C. save your device if a voltage spike is sent through the electrical system. D. prevent theft.

C. save your device if a voltage spike is sent through the electrical system.

The​ crisis-mapping tool Ushahidi A. is only available in the United States. B. prevents​ two-way dialog between people. C. shows that a free software product can have great value. D. relies on people using their desktop computing power to help others.

C. shows that a free software product can have great value.

Which of the following would NOT be a concern with relying completely on cloud​ computing? Question content area bottom Part 1 A. accessing files when Internet access is not available B. creating an offline​ back-up of critical documents C. the collaborative nature of​ cloud-based applications D. security and privacy of stored data and information

C. the collaborative nature of​ cloud-based applications

The​ oldest, most traditional form of the SDLC is known as A. design. B. scrum. C. the waterfall model. D. debugging.

C. the waterfall model.

To create a ransomware attack one needs A. authorization from Google and Microsoft. B. a Ph.D. degree in Computer Science. C. very little knowledge because they can use Ransomware as a Service sites D. permission from the National Security Agency.

C. very little knowledge because they can use Ransomware as a Service sites

RAM is A. nonvolatile memory. B. both volatile and nonvolatile memory. C. volatile memory. D. neither volatile nor nonvolatile memory.

C. volatile memory.

A(n) is a laptop computer that can convert into a​ tablet-like device. A. all-in-one PC B. ultrabook C. Chromebook D. 2-in-1 PC

D. 2-in-1 PC

Which of the following is NOT a primary function of an​ OS? A. Providing a user interface B. Managing hardware C. Managing software D. Accessing the Internet

D. Accessing the Internet

In selecting the most appropriate language it is useful to know A. how much space the final code delivered can occupy. B. how quickly the final code must run. C. if there is a specific target environment​ (say, a specific operating​ system). D. all of the above

D. All of the above

Which of the following is NOT considered appropriate​ e-mail etiquette? Question content area bottom Part 1 A. Avoiding text abbreviations such as​ LOL, u, and r B. Adding a signature line that includes your contact information C. Including a meaningful subject in the subject line D. Always using Reply to All when responding to​ e-mail that is sent to multiple people.

D. Always using Reply to All when responding to​ e-mail that is sent to multiple people.

Which of the following can NOT be done with digital audio workstation​ software? A. Use synthesizers B. Use virtual instruments C. Create uncompressed MIDI files D. Apply special effects to digital video clips

D. Apply special effects to digital video clips

Which step happens first during the boot​ process? A. POST B. Customization settings checked C. Load OS to RAM D. CPU activates the BIOS that is stored in ROM

D. CPU activates the BIOS that is stored in ROM

Which of the following is not considered an accessibility​ utility? A. Magnifier B. Narrator C. Speech Recognition D. File Explorer

D. File Explorer

Which of the following is not a category of intellectual​ property? A. Copyright B. Patent C. Trade dress D. Imprint

D. Imprint

printers work by spraying tiny drops of ink onto paper. A. 3D B. Laser C. Large format D. Inkjet

D. Inkjet

Increasing the sampling rate when digitizing a file has which effect on the​ file? A. It decreases the file size B. It neither increases nor decreases the file size C. It depends on the codec used to digitize the file D. It increases the file size

D. It increases the file size

Which of the following describes satellite​ broadband? A. It uses strands of pure glass or plastic. B. Speed drops as the distance from the main signal source increases. C. It connects with coaxial cable. D. It requires a dish installed outside the building.

D. It requires a dish installed outside the building.

If you want to use your computer for recording your​ band, you would benefit most from​ a(n) A. overclocking interface. B. MIDI interface. C. RAID interface. D. HDMI interface.

D. MIDI interface.

Riannon is in her​ home, watching a video she took on​ vacation, while her brother is playing a game on his Nintendo​ Switch, and her dad is checking stock quotes on his iPad. What kind of network does this family most likely​ have? Question content area bottom Part 1 A. Both a and b B. Neither a nor b C. Client/server network D. P2P network

D. P2P network

is a set of strategies for using more than one drive in a system. A. The machine cycle B. VPU C. GPU D. RAID

D. RAID

Which of the following is NOT a computer​ port? A. DisplayPort B. Thunderbolt C. USB D. ROM

D. ROM

Which kind of software might be used to train airline​ pilots? A. Project management software B. Course management software C. Test preparation software D. Simulation software

D. Simulation software

The type of network that would be necessary to connect the networks of two college campuses would​ be: A. LAN B. PAN C. MAN D. WAN

D. WAN

Being computer literate includes being able to A.diagnose and fix hardware and software problems. B. avoid​ spam, adware, and spyware. C. use the web effectively. D. all of the above

D. all of the above

It is important to maintain your online reputation A. because employers often review social media before hiring employees. B. because of the persistence of information. C. to ensure that information about you is accurate. D. all of the above

D. all of the above

Which of the following describes an IP​ address? A. It identifies any computer connecting to the Internet. B. It is referred to as a dotted quad. C. It identifies a website. D. all of the above

D. all of the above

Intellectual property A. can be protected legally by the patent system. B. is the result of​ someone's creative work and design. C. can include works of​ music, film, or engineering design. D. all of the above.

D. all of the above.

An image​ ( or system backup​ ) saves only the following kinds of​ files: A. applications. B. photos and videos. C. data files. D. applications, operating system and data files.

D. applications, operating system and data files.

Embodied agents A. are plagiarism checking software systems. B. are intelligent personal assistants made possible by artificial intelligence. C. are hackers working for foreign governments. D. are robots that look and act like human beings.

D. are robots that look and act like human beings.

A good way to assess your CPU usage is to A. check the number reported by the system defrag utility. B. feel the temperature of the CPU with your hand. C. listen for the sound of a spinning hard disk drive. D. check the Performance tab of the Task Manager.

D. check the Performance tab of the Task Manager.

The steps of the program development life cycle start with A. testing. B. algorithm development. C. coding. D. describing the problem.

D. describing the problem.

The combination of​ media, Internet,​ entertainment, and phone services into a single device illustrates the principal of A. digital collusion. B. digital combination. C. digital cohesion. D. digital convergence.

D. digital convergence.

When analog data is measured and converted to a stream of numerical​ values, this is referred to as the data. A. compressing B. upstreaming C. streamlining D. digitizing

D. digitizing

In the URL​ http://www.whitehouse.gov/blog, what part of the URL is represented by​ www.whitehouse.gov? A. path or subdirectory B. top-level domain C. protocol D. domain name

D. domain name

Deepfake technologies A. can be detected even by casual viewers because of imperfections. B. help spread information about important issues. C. can be applied to photos but not live video. D. employ artificial intelligence techniques.

D. employ artificial intelligence techniques.

How the program should behave if the input data is invalid is part of A. beta testing. B. scope creep. C. process. D. error handling.

D. error handling.

Ergonomics is an important consideration A. only for laptop and desktop​ computers, but never for mobile devices. B. only for desktop computers. C. only for laptop computers. D. for all computing devices.

D. for all computing devices.

Sophisticated modeling software is helping international researchers A. analyze computer systems to gather potential legal evidence. B. market new types of products to a wider audience. C. create more intricate screenplays and movie scripts. D. increase the pace of research in finding and producing vaccines.

D. increase the pace of research in finding and producing vaccines.

An interpreted language has an advantage over a compiled language because A. it can support​ HTML5, the newest version. B. it is easier to use with​ online, virtual collaboration. C. it is a better structured version of the language. D. it helps make development faster.

D. it helps make development faster.

Firewalls use a process of​ _to assign IP addresses to the devices internal to the network so hackers will not know what they are. A. port blocking B. packet filtering C. VPN D. network address translation​ (NAT)

D. network address translation​ (NAT)

Device drivers are A. no longer used because of Plug and Play. B. always installed from a CD. C. mapping programs to generate driving instructions. D. often bundled with the operating system.

D. often bundled with the operating system.

Java is considered to be architecture neutral because it A. can run on many different generations of Windows. B. can run in any browser. C. can be recompiled to run on many CPUs. D. only needs to be compiled once and can run on many different CPUs.

D. only needs to be compiled once and can run on many different CPUs.

Moore's Law refers to the A. amount of memory on a memory chip. B. speed of DRAM. C. overall system processing capability. D. pace at which CPUs improve.

D. pace at which CPUs improve.

Which of the following functions of a computer is mostly responsible for turning data into​ information? A. input B. storage C. output D. processing

D. processing

​Image-editing software allows you to A. compute complex formulas. B. conduct product simulations. C. create drafting blueprints. D. remove red eye.

D. remove red eye.

A is a program that takes complete control of your computer without your knowledge. Question content area bottom Part 1 A. sniffer B. VPN C. botnet D. rootkit

D. rootkit

Which of the following is NOT a component of a search​ engine? A. spider B. search engine software C. indexer program D. search assistant

D. search assistant

The minimum recommended standards for the operating​ system, processor, primary memory​ (RAM), and storage capacity for certain software are called A. hardware. B. redistributing standards. C. minimum standards. D. system requirements.

D. system requirements.

Touch-screen devices usually feature keyboards. A. laser-projection B. physical C. optical D. virtual

D. virtual

Which of the following would NOT cause interference or poor connectivity between nodes on a wireless​ network? A. A wireless extender B. Nodes that are too far apart C. Concrete walls D. Some appliances

A. A wireless extender

Which type of broadband Internet carries voice data and network​ data? A. DSL B. Fiber-optic C. Cable D. Satellite

A. DSL

A special processing chip found on video cards is the A. GPU B. ROM C. CPU D. HDMI

A. GPU

Which of the following would NOT impact the digital​ divide? A. Less sharing of the work we produce B. Legislation allowing communications companies to charge per website for access C. Expansion of free​ Wi-Fi connectivity in major cities D. A decline in the price of internet access

A. Less sharing of the work we produce

Which of the following is done to determine what devices are connected to a​ router? A. Log into the​ router's IP account This is the correct answer. B. Use Security manager in Windows C. Use File Explorer​ > My PC D. Count the number of devices connected to the​ switch(es)

A. Log into the​ router's IP account

Which required network device is generally integrated in computers and​ laptops? A. Network Adapter B. Router C. Modem D. Switch

A. Network Adapter

Which of the following is NOT a digital video file​ format? A. PDF B. ​MPEG-4 C. WMV D. AVI

A. PDF

When an OS processes tasks in a priority​ order, it is known as A. preemptive multitasking. B. interruptive multitasking. C. multitasking handling. D. preemptive interrupting.

A. Premmptive multitaking

Windows creates​ "restore points" so that you can. A. Return your system to the way it was before you installed new software. B. Add additional hard disk storage space. C. Protect your system from hackers. D. Extend your warranty.

A. Return your system to the way it was before you installed new software.

Which of the following should you do to uninstall a program from Windows​ 11? A. Right-click the app on the Start menu and select Uninstall B. Delete the program icon on the Start menu C. Right-click a program file in File Explorer and select Uninstall program D. Move the app icon on the Start menu to Trash

A. Right-Click the app on the Start menu and select Uninstall

Which of the following does NOT determine the quality of a digital​ image? A. The number of pixels in the camera lens This is the correct answer. B. Resolution of the camera C. File format and compression used D. Image sensor size

A. The number of pixels in the camera lens

Which of the following statements is​ FALSE? A. Unethical behavior is always illegal. B. Life experience affects an​ individual's personal ethics. C. Individuals who have no sense of right or wrong exhibit amoral behavior. D. Ethical decisions are usually influenced by personal ethics.

A. Unethical behavior is always illegal.

Language​ translator, thesaurus, and bibliography are features in what kind of​ software? A. Word processing B. Course management software C. Note-taking software D. Presentation

A. Word processing

Beta software is made available because A. a company is making an early release to test bugs. B. the company needs more profits. C. wireless networking must be added. D. new programmers have been hired.

A. a company is making an early release to test bugs.

Which type of social networking site would best describe​ LinkedIn? A. business networking B. social communication C. media sharing D. social payment

A. business networking

Which component of a computing device drains the battery the​ fastest? Question content area bottom Part 1 A. display screen B. Bluetooth adapter C. hard drive D. Wi-Fi adapter

A. display screen

A packet analyzer is called a sniffer because A. it captures and reads data inside each packet. B. it filters out spam. C. it starts a​ denial-of-service attack. D. it detects​ high-speed transmissions.

A. it captures and reads data inside each packet.

Personal ethics can be described as A. the set of formal or informal ethical principles you use to make decisions. B. the laws established by the legal system. C. society's established ethical system of conduct. D. the set of stories passed to you through your family history.

A. the set of formal or informal ethical principles you use to make decisions.


Related study sets

CITI Social/Behavioral Research Course

View Set

Chapter 27: Disorders of Cardiac Function, and Heart Failure and Circulatory Shock

View Set

Payroll Accounting: Employer Taxes and Reports

View Set

Economics Chapter 21 Test FORM B

View Set

OB: Chapter 21 Nursing Management of Labor and Birth at Risk

View Set