Exam
Name___________________________________
MULTIPLE CHOICE.
Choose the one alternative that best completes the statement or answers
the question.
1)
________ is the science that attempts to produce machines
that display the same type of intelligence that humans do.
1)
_______
A)
Simulation
B)
Nanoscience
C)
Nanotechnology
D)
Artificial intelligence (AI)
2)
The metal or plastic case that holds all the physical parts
of the computer is the:
2)
_______
A)
platform.
B)
system unit.
C)
CPU.
D)
mainframe.
TRUE/FALSE. Write
'T' if the statement is true and 'F' if the statement is false.
3)
One of the benefits of becoming computer fluent is knowing
computer "buzz words" and being able to make good purchasing
decisions.
3)
_______
4)
Embedded computers are self-contained computer devices that have
their own programming and do not receive input.
4)
_______
5)
In comparison to Macs, PCs have the larger market
share.
5)
_______
MULTIPLE CHOICE.
Choose the one alternative that best completes the statement or answers
the question.
6)
In computers, every number, letter, and special character
consists of a unique combination of eight bits, called a:
6)
_______
A)
byte.
B)
gigabyte.
C)
kilobyte.
D)
megabyte.
7)
________ are specially designed computers that perform
complex calculations extremely rapidly.
7)
_______
A)
Mainframes
B)
Supercomputers
C)
Laptops
D)
Servers
8)
Computers work using the ________ language.
8)
_______
A)
representational
B)
processing
C)
binary
D)
kilobyte
TRUE/FALSE. Write
'T' if the statement is true and 'F' if the statement is false.
9)
Computers are becoming less prevalent in the classrooms due
to the rise in hardware prices.
9)
_______
MULTIPLE CHOICE.
Choose the one alternative that best completes the statement or answers
the question.
10)
A process known as ________ is used by large retailers to
study trends.
10)
______
A)
data selection
B)
data conversion
C)
POS
D)
data mining
11)
All of the following are examples of real security
and privacy risks EXCEPT:
11)
______
A)
spam.
B)
viruses.
C)
hackers.
D)
identity theft.
TRUE/FALSE. Write
'T' if the statement is true and 'F' if the statement is false.
12)
There is no distinction between data and information.
12)
______
MULTIPLE CHOICE.
Choose the one alternative that best completes the statement or answers
the question.
13)
Word processing, spreadsheet, and photo-editing are
examples of:
13)
______
A)
platform software.
B)
system software.
C)
operating system software.
D)
application software.
14)
Computers gather data, which means that they allow
users to ________ data.
14)
______
A)
present
B)
output
C)
store
D)
input
TRUE/FALSE. Write
'T' if the statement is true and 'F' if the statement is false.
15)
Trend-spotting programs, developed for business, have been used to
predict criminal activity.
15)
______
MULTIPLE CHOICE.
Choose the one alternative that best completes the statement or answers
the question.
16)
Medical students can train on life-sized mannequins that can speak,
breathe and blink, without any risk to a live patient. This is an area of
computerization known as:
16)
______
A)
robotics.
B)
computer forensics.
C)
microelectrodes.
D)
simulation.
17)
The ________ key and the ________ key can be used in
combination with other keys to perform shortcuts and special tasks.
17)
______
A)
Control, Alt
B)
Caps Lock, Num Lock
C)
Function, toggle
D)
Delete, Insert
TRUE/FALSE. Write
'T' if the statement is true and 'F' if the statement is false.
18)
There are two types of CRT monitors on the market: passive-matrix
displays and active-matrix
displays.
18)
______
MULTIPLE CHOICE.
Choose the one alternative that best completes the statement or answers
the question.
19)
RAM is considered temporary or ________
storage.
19)
______
A)
read-only
B)
random
C)
volatile
D)
nonvolatile
TRUE/FALSE. Write
'T' if the statement is true and 'F' if the statement is false.
20)
Speakers connect to the VGA port.
20)
______
MULTIPLE CHOICE.
Choose the one alternative that best completes the statement or answers
the question.
21)
A kilobyte (KB) is approximately ________ bytes.
21)
______
A)
8
B)
one billion
C)
one million
D)
1,000
22)
The most common input devices are the ________ and
the ________.
22)
______
A)
scanner, monitor
B)
microphone, printer
C)
digital camera, speakers
D)
keyboard, mouse
23)
________ keyboards are more compact and generally have
fewer keys.
23)
______
A)
Macintosh
B)
Laptop
C)
QWERTY
D)
Windows
24)
________ printers have tiny hammer-like keys that strike the paper
through an inked ribbon.
24)
______
A)
Impact
B)
Nonimpact
C)
Laser
D)
Ink-jet
25)
________ monitors use a technology similar to that used in
digital watches.
25)
______
A)
Cathode-ray tube (CRT)
B)
Electron beam
C)
Liquid crystal display (LCD)
D)
Graphics
26)
Expansion cards (or adapter cards) plug into the expansion
slots on the:
26)
______
A)
RAM.
B)
ROM.
C)
motherboard.
D)
ports.
27)
________ speed is measured in nanoseconds.
27)
______
A)
Hard disk drive
B)
RAM
C)
Expansion board
D)
Modem
28)
________ are large printers used to produce oversize
pictures that require precise continuous lines, such as maps and architectural
plans.
28)
______
A)
Multifunction printers
B)
Plotters
C)
Dot-matrix printers
D)
Thermal printers
29)
A ________ is an output device that creates tangible hard
copies.
29)
______
A)
CRT
B)
printer
C)
scanner
D)
monitor
30)
The hard disk drive is considered ________ storage.
30)
______
A)
read-only
B)
temporary
C)
nonvolatile
D)
legacy
31)
Restarting the system when it is already powered on is
called:
31)
______
A)
a warm boot.
B)
hibernation.
C)
standby mode.
D)
a cold boot.
32)
One of the more recent e-mail scams is referred to as:
32)
______
A)
phishing.
B)
blogging.
C)
flaming.
D)
pop-ups.
TRUE/FALSE. Write
'T' if the statement is true and 'F' if the statement is false.
33)
Chat rooms are a popular form of Internet
communication.
33)
______
34)
A dial-up connection is the most common method of Internet
connection.
34)
______
35)
The largest and fastest pathway on the Internet is referred
to as the Internet brain.
35)
______
MULTIPLE CHOICE.
Choose the one alternative that best completes the statement or answers
the question.
36)
The Internet has its roots in a project started by:
36)
______
A)
higher education.
B)
a not-for-profit organization.
C)
a corporation.
D)
the U.S. military.
37)
Which of the following is NOT a type of search engine?
37)
______
A)
Keyword search engine
B)
Subject directory
C)
Content-oriented directory
D)
Meta search engine
38)
To browse the Internet, you need a:
38)
______
A)
computer that is connected to the Internet and that has a Web browser.
B)
domain name.
C)
home network.
D)
wireless modem.
TRUE/FALSE. Write
'T' if the statement is true and 'F' if the statement is false.
39)
The Internet was developed by Bill Gates.
39)
______
40)
The Internet and the World Wide Web are the same
thing.
40)
______
MULTIPLE CHOICE.
Choose the one alternative that best completes the statement or answers
the question.
41)
________ is an example of a Meta search engine.
41)
______
A)
Yahoo.com
B)
Dailystocks.com
C)
Dogpile.com
D)
Excite.com
TRUE/FALSE. Write
'T' if the statement is true and 'F' if the statement is false.
42)
An Internet Protocol address is a series of four numbers
separated by dots that allows the computers connected to the Internet to be
identified.
42)
______
MULTIPLE CHOICE.
Choose the one alternative that best completes the statement or answers
the question.
43)
In the URL http://www.prenhall.com, the portion labeled http
is the:
43)
______
A)
protocol.
B)
host.
C)
top-level domain.
D)
domain name.
44)
One way to mark a site so that you can return to it later
is to:
44)
______
A)
refresh the URL.
B)
register its domain name.
C)
use breadcrumbs.
D)
use Favorites or Bookmarks.
45)
Which of the following is used to narrow search
results?
45)
______
A)
NOR
B)
OR
C)
AND
D)
Wildcard *
46)
The term backbone refers to:
46)
______
A)
the main pathway used by all data traffic on the Internet.
B)
the software that operates a Web server.
C)
the hardware components required for accessing the Web.
D)
a set of numbers comprising an Internet address.
47)
Microsoft Office is an example of a(n):
47)
______
A)
freeware product.
B)
open-source product.
C)
software suite.
D)
business-management application.
48)
The cell address C5 indicates that the cell:
48)
______
A)
is performing a calculation involving a variable called "C."
B)
is at row 5, column C of the worksheet.
C)
contains a label value of "C5."
D)
is at row C, column 5 of the worksheet.
49)
Individuals who want software to assist in automated
checkbook balancing and bill paying for their personal bank and credit card
accounts will likely use which of the following software products?
49)
______
A)
Acrobat
B)
Quicken
C)
Word
D)
Microsoft Project
50)
The following tasks are all performed by productivity
software EXCEPT:
50)
______
A)
word processing.
B)
spreadsheet modeling.
C)
personal information management.
D)
peripheral device management.
TRUE/FALSE. Write
'T' if the statement is true and 'F' if the statement is false.
51)
Changing the appearance of a document, using word
processing software, is called formatting.
51)
______
MULTIPLE CHOICE.
Choose the one alternative that best completes the statement or answers
the question.
52)
Copyrighted software that can be used for free is:
52)
______
A)
freeware.
B)
e-mail.
C)
groupware.
D)
shareware.
TRUE/FALSE. Write
'T' if the statement is true and 'F' if the statement is false.
53)
Technically speaking, the term software refers to a set of
instructions that tells the computer what to do.
53)
______
MULTIPLE CHOICE.
Choose the one alternative that best completes the statement or answers
the question.
54)
Microsoft Office 2003 is an example of a(n):
54)
______
A)
personal information manager.
B)
integrated software package.
C)
word processing package.
D)
software suite.
55)
Software refers to a set of instructions that tells the
computer what to do. These instruction sets are called:
55)
______
A)
peripherals.
B)
databases.
C)
programs.
D)
devices.
56)
Computer-aided design (CAD) software can do all of the following
EXCEPT:
56)
______
A)
design and create a Web page.
B)
allow engineers to build virtual models.
C)
work in conjunction with global positioning (GPS) systems.
D)
allow engineers to create automated designs and model visualizations.
57)
When installing software, a 25-digit ________ is required to
ensure authorized installation.
57)
______
A)
authorization
B)
product key
C)
end-user license
D)
download
TRUE/FALSE. Write
'T' if the statement is true and 'F' if the statement is false.
58)
When using spreadsheet software, an equation that you build
yourself is known as a function.
58)
______
MULTIPLE CHOICE.
Choose the one alternative that best completes the statement or answers
the question.
59)
Performing a "what-if" analysis is most commonly
accomplished using ________ software.
59)
______
A)
PIM
B)
presentation
C)
spreadsheet
D)
database
60)
What is the most common type of compatibility that a
software manufacturer will provide for new versions of their software?
60)
______
A)
Forward compatibility but not backward compatibility
B)
Neither backward nor forward compatibility
C)
Backward compatibility but not forward compatibility
D)
Both backward and forward compatibility
61)
Software providers who develop many productivity tools may
also provide stripped-down versions that combine the simpler features of these tools
bundled together into a(n):
61)
______
A)
integrated software application package.
B)
personal information manager.
C)
limited software edition.
D)
software suite.
62)
All of the following are examples of multiuser operating
systems EXCEPT:
62)
______
A)
Windows Server 2003.
B)
Novell Netware.
C)
Symbian.
D)
UNIX.
63)
When you run the ________ utility, unnecessary files,
including temporary Internet files are removed from the hard drive.
63)
______
A)
Backup
B)
Disk Cleanup
C)
Disk Defragmenter
D)
Task Scheduler
64)
Which one of the following statements is TRUE?
64)
______
A)
Single-user operating systems are commonly used in robotics.
B)
Supercomputers use single-user multitask operating systems.
C)
Single-user multitask operating systems are also known as network operating systems.
D)
Windows and Macintosh operating systems are the most commonly used single-user multitask operating systems.
TRUE/FALSE. Write
'T' if the statement is true and 'F' if the statement is false.
65)
The queue is where prints jobs are placed while
waiting to be processed.
65)
______
MULTIPLE CHOICE.
Choose the one alternative that best completes the statement or answers
the question.
66)
Which of the following characters CANNOT be used in a file
name when using the Windows XP operating system?
66)
______
A)
"At" symbol (@)
B)
Colon (:)
C)
Underscore (_)
D)
Hyphen (-)
67)
The memory resident portion of the operating system is
called the:
67)
______
A)
kernel.
B)
registry.
C)
API.
D)
CMOS.
68)
Which of the following is the correct sequence of actions
that takes place during the boot-up process?
68)
______
A)
Activate BIOS → Perform POST → Load operating system → Check configuration settings
B)
Perform POST → Load operating system → Activate BIOS → Check configuration settings
C)
Load operating system → Activate BIOS → Perform POST → Check configuration settings
D)
Activate BIOS → Check configuration settings → Perform POST → Load operating system
69)
The purpose of a swap (or page) file is to:
69)
______
A)
prevent thrashing in a multitasking environment.
B)
allow multiple print jobs to print their pages out simultaneously.
C)
hold a program's data or instructions in virtual memory when it can't fit in RAM.
D)
maintain pages of documents that are being spooled to the printer.
70)
FAT and NTFS are:
70)
______
A)
programs for managing and scheduling tasks on the system.
B)
part of the boot process.
C)
file systems.
D)
file management utility programs.
71)
All of the following are TRUE regarding virtual memory
EXCEPT:
71)
______
A)
the setting for the amount of hard drive space to allocate to virtual memory can be manually changed.
B)
virtual memory is physical space on the hard drive.
C)
any amount of RAM can be allocated to virtual memory.
D)
this temporary storage is called the swap file (or page file).
72)
The ________ is responsible for loading the operating
system from its permanent location into RAM.
72)
______
A)
API
B)
device driver
C)
supervisor program
D)
BIOS