Computers


Documents

Order by : Name | Date | Hits | [ Ascendant ]

Computing Essentials ch. 9 quiz Computing Essentials ch. 9 quiz

hot!
Date added: 07/22/2017
Date modified: 07/22/2017
Filesize: 13.11 kB
Downloads: 844

#

Question

 

 Answer

1

Educational institutions have restrictions on disclosing the records of students because of


the Family Educational Rights and Privacy Act (FERPA)

2

Which of the following should you do to avoid identity theft?


All of the above should be done

3

It is estimated that the software industry loses $60 billion annually due to unauthorized copying and /or distribution of software. This is commonly referred to as


software piracy

4

Which of the following is the most widely used wireless network encryption for home wireless networks?


WPA2

5

A program that replicates itself and clogs computers and networks.


Worm

6

Security devices that examine things like fingerprints or irises (colored part of your eye) are known as __________ devices.


biometric scanning

7

Which of the following is not malware?


Ad-Aware

8

Computers that can be remotely controlled for malicious purposes are referred to as


zombies

9

Guidelines for the morally acceptable use of computers in our society are referred to as


computer ethics

10

Small data files that are deposited on a user's hard drive when they visit a Web site are called:


cookies


computer question answers computer question answers

hot!
Date added: 07/09/2017
Date modified: 07/09/2017
Filesize: 310.86 kB
Downloads: 844

1

How many times can you write to a CD-R?

never

only once

no more than 10 times

as many times as you want to

2

These programs are used to create and edit vector images.

Illustration programs

Photo editors

Presentation graphics

Image galleries

3

Most operating systems support the ability to switch between different applications. This is called:

multitasking

booting

translating

driving

4

These discs have a capacity of 50 gigabytes on one side.

HD DVD

CD

DVD

Blu-Ray

5

This operating system is widely used by servers on the web, mainframe computers, and very powerful microcomputers.

Windows

Mac OS X

Linux

UNIX

6

Which of the following is not a popular desktop operating system?

Windows 8

Android

Linux

Mac OS X

7

This type of image is made up of geometric shapes or objects.

Raster

Bitmap

Vector

Pixel

8

This type of boot occurs when the computer is already on and you restart it without turning off the power.

Generic boot

Live boot

Warm boot

Cold boot

9

The smallest element on the screen that can be turned on and off or made different shades is called a

pixel (for picture element)

raster dot

LED

scop (for screen stop)

10

The bar code standard used in retail stores is

RMS (Retail Marking Standard)

CBC (Common Bar Code)

OMR (Optical Mark Recognition)

UPC (Universal Product Code)

11

Which of the following statements is incorrect?

Printer resolution is measured in dpi (dots per inch).

Printer output is often called hard copy.

Memory within a printer is used to store printing instructions and documents waiting to be printed.

Printer speed is measured in the number of words printed per minute.

12

The standard for high definition optical discs is:

DVD-RAM

HD DVD

Blu-ray

HD CD

13

This is the distance between each pixel.

Dot pitch

Refresh rate

Resolution

Word size

14

Frequently-accessed information is held in:

hard drive

cache memory

flash memory

read only memory

15

How many bytes can a 32-bit-word computer access at one time?

1

4

8

16

16

Which of the following is not a function of the operating system?

Managing resources

Providing Internet access

Providing a user interface

Running applications

17

When you reboot your system, the computer follows startup instructions stored in this type of memory.

DRAM

SDRAM

Cache

ROM and Flash

18

This is a utility program that makes a copy of all files or selected files that have been saved onto a disk.

Disk Cleanup

Backup and Restore

Disk Defragmenter

VirusScan

19

What would you plug into a VGA port?

a mouse

an analog monitor

an external hard drive

an ergonomic keyboard

20

This type of software works with end users, application software, and computer hardware to handle the majority of technical details.

Communications

Application

Utility

System

21

This container houses most of the electrical components for a computer system.

chip carrier

system board

system unit

Unicode

22

A term associated with the ability to connect any device to a computer and have it work immediately.

Plug and Play

Instant Connect

Smart Port

No-Drivers-Needed

23

Unlike most other buses that share a single bus line or path with several devices, this bus provides a single dedicated path for each connected device.

Zigbee

Firewire

USB

PCIe

24

Which of the following printers are relatively inexpensive and the most widely used?

Laser printers

Inkjet printers

3-D printers

Solid Ink printers

25

This feature of Mac OS X displays and provides direct access to all apps installed on your computer.

Lion

Gestures

Launchpad

Mission Control

26

OMR, OCR, and MICR are all types of:

Radio Frequency Card Readers

magnetic card readers

bar code readers

character and mark recognition devices

27

Dedicated computers with very large storage capacities that provide users access to fast storage and retrieval of data are referred to as

archive servers

file servers

master servers

reference servers

28

This indicates the monitor's ability to display colors by comparing the light intensity of the brightest white to the darkest black.

Contrast ratio

Dot Pitch

Active display area

Resolution

29

These types of ports typically provide connections to specialized devices such as camcorders and storage devices.

FireWire

Serial

Parallel

AGP

30

Most applications use a(n) _____ that displays graphical elements called icons to represent familiar objects.

integrated package

dialog box

graphical user interface

menu button

31

Which of these is not a mass storage device?

RAID system

File server

Optical disc

Organizational cloud storage

32

This type of program allows communication between a peripheral device, such as a mouse or printer, and the rest of the computer system.

Client

Virtual machine

Device driver

Server

33

A high speed networking port that has become a standard for many of today's computers

USB

Firewire

Ethernet

MIDInet

34

Storage that retains its data after the power is turned off is referred to as:

volatile storage.

sequential storage.

direct storage.

nonvolatile storage.

35

All of the following are true of DVD-ROM's except:

They are also known as erasable optical discs.

They can provide over two hours of high-quality video and sound comparable to that found in motion picture theatres.

They are a type of optical disc.

DVD-ROM stands for "digital versatile disc/read only memory".

36

Image editors edit images consisting of thousands of pixels that form this type of image.

Vector

Bitmap

Object

Electronic

37

Which of these is not an example of solid state storage?

Digital versatile disc

SSDs

Flash memory cards

USB drives

38

A device typically used to control a pointer displayed on the monitor.

cord

mouse

printer

scanner

39

These apps allow mobile devices to use their digital cameras to scan special codes.

QR code reader

Code scanner

Optical reader

QR scanner

40

The system board is also known as the:

expansion slot

motherboard

expansion card

bus

41

The operating system based on Linux, designed for netbook computers, and focused on Internet connectivity through cloud computing:

Chrome

Mac

UNIX

Windows

42

These are graphics that typically appear as black and white boxes that automatically link mobile devices to a variety of different content including games, text, videos, and websites.

QR code reader

QR codes

Bar codes

ISBN numbers

43

Three ways to improve the performance of a hard disk include:

disk caching, RAID, and file expansion.

file compression, disk caching, and file encryption.

disk caching, RAID, and file compression.

RAID, file compression and disk expansion.

44

The windows troubleshooting utility that identifies and eliminates nonessential files is called:

Backup and Restore

Disk Defragmenter

Disk Cleanup

Norton Utilities

45

The category of operating system used for handheld devices:

Network

Embedded

Stand-alone

Open source

46

Which of the following is not a system software program type?

Utilities

Device drivers

Language translators

Sectors

47

Hard disks store and organize files using all the following, except:

tracks

sectors

cylinders

paths

48

In a microcomputer system, the CPU is contained on a single chip called the:

semiconductor

ALU

microprocessor

Control Unit

49

Which of the following statements about 3-D printers is NOT true?

They uses a process known as additive manufacturing.

They are relatively expensive - no units are available for less than $1000.

There are a variety of different processes and materials that can be used to create the layers of the output.

The data that drives these devices typically comes from a file created by a 3-D modeling program or from scanning a physical model using a 3-D scanner.

50

A CD-RW disc:

can be written to only once.

can be erased and rewritten.

cannot be written on.

cannot be erased.

51

Main memory in a computer is referred to as

RAM

ROM

PROM

BIOS

52

Two categories of laser printers are:

thermal and personal.

personal and shared.

ink-jet and high-definition.

active-matrix and passive matrix.

53

Virtual reality strives to create this type of experience.

electronic

immersive

LCD

VoIP

54

The component of the CPU that does addition, subtraction, multiplication, division, as well as comparison operations is called the

calculator

arithmetic-logic unit

math coprocessor

number cruncher module

55

This type of port provides high-definition video and audio making it possible to use a computer as a video recorder.

MIDI

HDMI

Thunderbolt

eSATA

56

On the system board, specialized cards or circuit boards are connected via

sockets

slots

ports

bays

57

USB drives are also known as:

flash drives

optical drives

ports

universal state bus

58

The width of a monitor divided by the height of the monitor calculates the:

aspect ratio

resolution

dot pitch

clock speed

59

These screens can be touched with more than one finger, which allows for interactions such as rotating graphical objects on the screen with your hand or zooming in and out by pinching and stretching your fingers.

Touch

CRT

Multitouch

LCD

60

An important difference between RAM and ROM is

ROM is always larger than RAM

ROM chips are not stored on the system board

ROM is non-volatile

there is no difference - RAM and ROM are two abbreviations for the same thing.

61

Which of the following characteristics about RAID is incorrect?

expanded storage capability

fast access speed

highly reliable

one high-capacity hard disk drive

62

Also known as NIC, this adapter card is used to connect a computer to a(n):

AIA

expansion

graphics

network

63

The mobile operating system developed by Apple and originally called iPhone OS:

Android

iOS

MacOS

Phone OS

64

This feature of Mac OS X Lion displays all running applications and gestures.

Launchpad

Mission Control

Mountain Lion

Leopard

65

For multicore processors to be used effectively, computers must understand how to divide tasks into parts that can be distributed across each core - an operation called:

arithmetic-logic processing

multiplexer processing

parallel processing

graphics coprocessing

66

Start-up instructions for a computer are often referred to as its

BIOS

Start Routine

Boot chart

GO Sheet

67

This version of UNIX is an open source operating system that is an alternative to Windows.

Mountain Lion

Lion

Linux

Windows

68

Before sending a large file over the Internet, you might want to use one of these programs.

Disk defragmenter

Uninstaller

Disk cleanup program

File compression program

69

This type of software can be described as end user software and is used to accomplish a variety of tasks.

Communications

Application

Utility

System

70

DVD stands for:

digital versatile disc

digital video data

dynamic versatile disc

dynamic video disc

71

Which of the following allows the transmission of telephone calls over computer networks?

Faxing

Cell phones

PDAs

Voice over IP

72

On a hard disk each track is divided into invisible wedge-shaped sections called:

bits

platters

cylinders

sectors

73

_____-input devices convert sounds into a form that can be processed by the system unit.

Electrolyzing

Plotting

Webcam

Audio

74

This reading device is used in banks to read the numbers on the bottom of checks and deposit slips.

MICR

OCR

OMR

UPC

75

This type of program performs specific tasks related to managing computer resources.

Utility

Operating system

Language translator

Device driver


Computing Essentials ch. 8 quiz ONE Computing Essentials ch. 8 quiz ONE

hot!
Date added: 07/21/2017
Date modified: 07/21/2017
Filesize: 13.15 kB
Downloads: 782

1

The GPS device in an automobile uses which communication channel?

 

 

Satellite

2

_____________ is widely used to connect individual computers that are located close to one another. It can only carry a single signal at a time.



Baseband

3

Satellite connection services are



slower than DSL and cable and are available almost anywhere

4

LTE stands for:



Long Term Evolution

5

Text-based addresses are converted to IP addresses by



Domain Name Servers

6

WiMax stands for:



Worldwide interoperability for microwave access

7

How many connected computers are required in order to form a computer network?



two

8

In order to successfully exchange data in a network, computers must adhere to standards called



protocols

9

Using this type of communications channel, several users can simultaneously use a single connection for high-speed data transfer.



Broadband

10

Every computer on the Internet has a unique numeric address called a(n):



IP address

Exam 2 Ch 2 8 9 in Comp Essentials Exam 2 Ch 2 8 9 in Comp Essentials

hot!
Date added: 07/29/2017
Date modified: 07/29/2017
Filesize: 18.27 kB
Downloads: 756

#

Question

 Answer


1

Organizations use the following to allow suppliers and others limited access to their networks.

Extranets


2

Educational institutions have restrictions on disclosing the records of students because of

the Family Educational Rights and Privacy Act (FERPA)


3

A high-frequency transmission cable that delivers television signals as well as connects computers in a network.

coaxial


4

In the URL https://msudenver.simnetonline.com/sp. The domain name is:

msudenver.simnetonline.com


5

Which of the following is the most widely used wireless network encryption for home wireless networks?

WPA2


6

Remote users can connect to an organization's network through this type of secure private connection.

VPN


7

Going from smallest to largest, which of these is in the correct order?

PAN - LAN - MAN - WAN


8

How many connected computers are required in order to form a computer network?

two


9

A(n) _____ acts as a security buffer between a corporation's private network and all external networks.

firewall


10

Which of the following is NOT a valid guideline for creating strong passwords:

the password length should be no more than 6 characters


11

Operating systems that control and coordinate the activities of all computers and other devices on a network are called

network operating systems


12

A web page typically contains _____ which contains the formatting instructions for displaying the web page.

Hypertext Markup Language (HTML)


13

The ability to collect and store large quantities of transactions from businesses like phone companies and credit card companies has resulted in an ever-growing volume of data that is often referred to as

big data


14

Small data files that are deposited on a user's hard drive when they visit a Web site are called:

cookies


15

An important disadvantage of P2P networks is:

they lack security controls


16

This method of file transfer has been used for decades and is frequently used for uploading changes to a Web site hosted by an Internet service provider.

FTP


17

In network terminology, _______ is a generic term to describe any device (e.g. computer, printer, or data storage device) that is connected to the network.

node


18

Most browsers offer this, which ensures that your browsing activity is not recorded on your hard disk.

Privacy mode


19

Cellular services use _____ to provide wireless connectivity to the Internet.

3G and 4G cellular networks


20

The use of the Internet, cell phones, or other devices to send or post content intended to hurt or embarrass another person.

Cyberbullying


21

A network topology in which the central node is connected to two or more subordinate nodes that in turn are connected to other sub-ordinate nodes.

Tree


22

In the URL "http://www.simnetonline.com", ".com" is the _____.

top-level domain (TLD)


23

Satellite connection services are

slower than DSL and cable and are available almost anywhere


24

Which type of program would likely be used by investigators to record a potential suspects' Internet activities?

Keystroke logger


25

The GPS device in an automobile uses which communication channel?

Satellite


26

Which of the following is not malware?

Ad-Aware


27

Technology in which audio and/or video files are continuously downloaded to your computer while you are listening to and/or viewing them is called

streaming


28

The network that connects computers all over the world.

Internet


29

In order to successfully exchange data in a network, computers must adhere to standards called

protocols


30

Network firewalls often make use of a special computer called a

proxy server


31

A program that replicates itself and clogs computers and networks.

Worm


32

Attempts to trick Internet users into thinking a fake but official-looking web site or e-mail is legitimate is referred to as

phishing


33

A connection or link to other documents or web pages is called a(n):

hyperlink


34

Bus, ring, star, tree, and mesh are five types of network:

topologies


35

____ is the process of breaking down information sent or transmitted across the Internet into small parts.

Packetization


36

A wireless access point that provides Internet access in a public place such as a coffee shop, library, bookstore, or university.

Hotspot


37

Security devices that examine things like fingerprints or irises (colored part of your eye) are known as __________ devices.

biometric scanning


38

For browsers to connect to resources on the Internet, the location of the resources must be specified through addresses called _____.

uniform resource locators (URLs)


39

A private network within an organization that resembles the Internet is called a(n):

intranet


40

The process of coding information to make it unreadable except to those who have a special piece of information known as a key.

Encryption


41

Which among the following is a way to shut down an ISP or Web site?

Denial of service attack


42

Sometimes referred to as a LAN adapter, these expansion cards connect a computer to a network.

NIC


43

The rules for exchanging data between computers.

protocols


44

This type of network strategy uses central computers to coordinate and supply services to other nodes on the network.

Client/server


45

Criminal offenses involving a computer and a network are referred to as 'computer crime' or

cyber-crime


46

Online banking is an example of what type of e-commerce?

B2C


47

The capacity of a communication channel is measured in:

bandwidth


48

Free computer games and free screen saver programs are typical carriers of:

Trojan horses


49

This type of network topology does not use a specific physical layout.

Mesh


50

The ______ is the central node that coordinates the flow of data by sending messages directly between the sender and receiver nodes.

switch


51

This type of e-commerce often resembles the electronic version of the classified ads or an auction.

C2C


52

Using this type of communications channel, several users can simultaneously use a single connection for high-speed data transfer.

Broadband


53

This is a legal concept that gives content creators the right to control use and distribution of their work.

Copyright


54

Typically, the maximum distance spanned by a local area network is

1 mile


55

When you enter a keyword or phrase into a search engine the results display as a list of these.

Hits


56

Guidelines for the morally acceptable use of computers in our society are referred to as

computer ethics


57

This type of computer criminal creates and distributes malicious programs.

Cracker


58

WiMax stands for:

Worldwide interoperability for microwave access


59

Text-based addresses are converted to IP addresses by

Domain Name Servers


60

Which of the following should you do to avoid identity theft?

All of the above should be done


61

Browsers store the locations of sites visited in a:

history file


62

All communication in a wireless local area network (WLAN) passes through the network's

wireless access point


63

A device that forwards data packets from one network to their destination in another network is called a(n)

router


64

Programs used to secretly record an individual's activities on the Internet are called:

spyware


65

The essential features of this include identifying sending and receiving devices, and breaking information into small parts for transmission across the Internet.

TCP/IP


66

A network configuration in which each device is connected directly to a central network switch is called a(n)

star network


67

_____________ is widely used to connect individual computers that are located close to one another. It can only carry a single signal at a time.

Baseband


68

The most common way to access the Internet is through _____.

an Internet service provider (ISP)


69

A collection of utility programs designed to protect your privacy while you are on the web is called a(n)

security suite


70

LTE stands for:

Long Term Evolution


71

Telephone lines and Ethernet connections typically use type of cable.

twisted-pair cable


72

Which physical connection is the fastest?

Fiber-optic cable


73

These are used by advertisers to keep track of your Web activity as you move from one site to the next.

Third-party cookies


74

Every computer on the Internet has a unique numeric address called a(n):

IP address


75

Which of the following is NOT a common Internet browser?

Microsoft Visio



Computing Essentials ch. 8 quiz TWO Computing Essentials ch. 8 quiz TWO

hot!
Date added: 07/22/2017
Date modified: 07/22/2017
Filesize: 12.89 kB
Downloads: 734

#

Question

 

Answer

 

1

A network topology in which the central node is connected to two or more subordinate nodes that in turn are connected to other sub-ordinate nodes.


Tree

 

2

The ______ is the central node that coordinates the flow of data by sending messages directly between the sender and receiver nodes.


switch

 

3

A private network within an organization that resembles the Internet is called a(n):


intranet

 

4

This type of network strategy uses central computers to coordinate and supply services to other nodes on the network.


Client/server

 

5

Organizations use the following to allow suppliers and others limited access to their networks.


Extranets

 

6

A network configuration in which each device is connected directly to a central network switch is called a(n)


star network

 

7

Typically, the maximum distance spanned by a local area network is


1 mile

 

8

Network firewalls often make use of a special computer called a


proxy server

 

9

An important disadvantage of P2P networks is:


they lack security controls

 

10

Sometimes referred to as a LAN adapter, these expansion cards connect a computer to a network.


NIC

 


«StartPrev12345NextEnd»
Page 1 of 5
 
Featured Link:
Homework-Tutors
Get your assignment done at low charges, quality work and within time lines.
Algebra homework help
Our FREE tutors create solvers with work shown, write algebra lessons, help you solve your homework problems.
Homework Anytime
Need help with your assignment and case study. Work with us to get the plagiarism free quality solutions.
Raaviblog
'How To' articles for latest gadgets, web technology and Google Products.