Exam

Name___________________________________

 


MULTIPLE CHOICE.  Choose the one alternative that best completes the statement or answers the question.


1)


________ is the science that attempts to produce machines that display the same type of intelligence that humans do. 


1)


_______


A)


Simulation 


B)


Nanoscience 


C)


Nanotechnology 


D)


Artificial intelligence (AI) 





 


2)


The metal or plastic case that holds all the physical parts of the computer is the: 


2)


_______


A)


platform. 


B)


system unit. 


C)


CPU. 


D)


mainframe. 





 


TRUE/FALSE.  Write 'T' if the statement is true and 'F' if the statement is false.


3)


One of the benefits of becoming computer fluent is knowing computer "buzz words" and being able to make good purchasing decisions.


3)


_______





 


4)


Embedded computers are self-contained computer devices that have their own programming and do not receive input. 


4)


_______





 


5)


In comparison to Macs, PCs have the larger market share. 


5)


_______





 


MULTIPLE CHOICE.  Choose the one alternative that best completes the statement or answers the question.


6)


In computers, every number, letter, and special character consists of a unique combination of eight bits, called a: 


6)


_______


A)


byte. 


B)


gigabyte. 


C)


kilobyte. 


D)


megabyte. 





 


7)


________ are specially designed computers that perform complex calculations extremely rapidly. 


7)


_______


A)


Mainframes 


B)


Supercomputers 


C)


Laptops 


D)


Servers 





 


8)


Computers work using the ________ language. 


8)


_______


A)


representational 


B)


processing 


C)


binary 


D)


kilobyte 





 


TRUE/FALSE.  Write 'T' if the statement is true and 'F' if the statement is false.


9)


Computers are becoming less prevalent in the classrooms due to the rise in hardware prices. 


9)


_______





 


MULTIPLE CHOICE.  Choose the one alternative that best completes the statement or answers the question.


10)


A process known as ________ is used by large retailers to study trends. 


10)


______


A)


data selection 


B)


data conversion 


C)


POS 


D)


data mining 





 


11)


All of the following are examples of real security and privacy risks EXCEPT: 


11)


______


A)


spam. 


B)


viruses. 


C)


hackers. 


D)


identity theft. 





 


TRUE/FALSE.  Write 'T' if the statement is true and 'F' if the statement is false.


12)


There is no distinction between data and information. 


12)


______





 


MULTIPLE CHOICE.  Choose the one alternative that best completes the statement or answers the question.


13)


Word processing, spreadsheet, and photo-editing are examples of: 


13)


______


A)


platform software. 


B)


system software. 


C)


operating system software. 


D)


application software. 





 


14)


Computers gather data, which means that they allow users to ________ data. 


14)


______


A)


present 


B)


output 


C)


store 


D)


input 





 


TRUE/FALSE.  Write 'T' if the statement is true and 'F' if the statement is false.


15)


Trend-spotting programs, developed for business, have been used to predict criminal activity. 


15)


______





 


MULTIPLE CHOICE.  Choose the one alternative that best completes the statement or answers the question.


16)


Medical students can train on life-sized mannequins that can speak, breathe and blink, without any risk to a live patient. This is an area of computerization known as: 


16)


______


A)


robotics. 


B)


computer forensics. 


C)


microelectrodes. 


D)


simulation. 





 


17)


The ________ key and the ________ key can be used in combination with other keys to perform shortcuts and special tasks. 


17)


______


A)


Control, Alt 


B)


Caps Lock, Num Lock 


C)


Function, toggle 


D)


Delete, Insert 





 


TRUE/FALSE.  Write 'T' if the statement is true and 'F' if the statement is false.


18)


There are two types of CRT monitors on the market: passive-matrix displays and active-matrix displays. 


18)


______





 


MULTIPLE CHOICE.  Choose the one alternative that best completes the statement or answers the question.


19)


RAM is considered temporary or ________ storage. 


19)


______


A)


read-only 


B)


random 


C)


volatile 


D)


nonvolatile 





 


TRUE/FALSE.  Write 'T' if the statement is true and 'F' if the statement is false.


20)


Speakers connect to the VGA port. 


20)


______





 


MULTIPLE CHOICE.  Choose the one alternative that best completes the statement or answers the question.


21)


A kilobyte (KB) is approximately ________ bytes. 


21)


______


A)


8 


B)


one billion 


C)


one million 


D)


1,000 





 


22)


The most common input devices are the ________ and the ________. 


22)


______


A)


scanner, monitor 


B)


microphone, printer 


C)


digital camera, speakers 


D)


keyboard, mouse  





 


23)


________ keyboards are more compact and generally have fewer keys. 


23)


______


A)


Macintosh 


B)


Laptop 


C)


QWERTY 


D)


Windows 





 


24)


________ printers have tiny hammer-like keys that strike the paper through an inked ribbon. 


24)


______


A)


Impact 


B)


Nonimpact 


C)


Laser 


D)


Ink-jet 





 


25)


________ monitors use a technology similar to that used in digital watches. 


25)


______


A)


Cathode-ray tube (CRT) 


B)


Electron beam 


C)


Liquid crystal display (LCD) 


D)


Graphics 





 


26)


Expansion cards (or adapter cards) plug into the expansion slots on the: 


26)


______


A)


RAM. 


B)


ROM. 


C)


motherboard. 


D)


ports. 





 


27)


________ speed is measured in nanoseconds. 


27)


______


A)


Hard disk drive 


B)


RAM 


C)


Expansion board 


D)


Modem 





 


28)


________ are large printers used to produce oversize pictures that require precise continuous lines, such as maps and architectural plans. 


28)


______


A)


Multifunction printers 


B)


Plotters 


C)


Dot-matrix printers 


D)


Thermal printers 





 


29)


A ________ is an output device that creates tangible hard copies. 


29)


______


A)


CRT 


B)


printer 


C)


scanner 


D)


monitor 





 


30)


The hard disk drive is considered ________ storage. 


30)


______


A)


read-only 


B)


temporary 


C)


nonvolatile 


D)


legacy 





 


31)


Restarting the system when it is already powered on is called: 


31)


______


A)


a warm boot. 


B)


hibernation. 


C)


standby mode. 


D)


a cold boot. 





 


32)


One of the more recent e-mail scams is referred to as: 


32)


______


A)


phishing. 


B)


blogging. 


C)


flaming. 


D)


pop-ups. 





 


TRUE/FALSE.  Write 'T' if the statement is true and 'F' if the statement is false.


33)


Chat rooms are a popular form of Internet communication. 


33)


______





 


34)


A dial-up connection is the most common method of Internet connection. 


34)


______





 


35)


The largest and fastest pathway on the Internet is referred to as the Internet brain. 


35)


______





 


MULTIPLE CHOICE.  Choose the one alternative that best completes the statement or answers the question.


36)


The Internet has its roots in a project started by: 


36)


______


A)


higher education. 


B)


a not-for-profit organization. 


C)


a corporation. 


D)


the U.S. military. 





 


37)


Which of the following is NOT a type of search engine? 


37)


______


A)


Keyword search engine 


B)


Subject directory 


C)


Content-oriented directory 


D)


Meta search engine 





 


38)


To browse the Internet, you need a: 


38)


______


A)


computer that is connected to the Internet and that has a Web browser.


B)


domain name.


C)


home network.


D)


wireless modem.





 


TRUE/FALSE.  Write 'T' if the statement is true and 'F' if the statement is false.


39)


The Internet was developed by Bill Gates. 


39)


______





 


40)


The Internet and the World Wide Web are the same thing. 


40)


______





 


MULTIPLE CHOICE.  Choose the one alternative that best completes the statement or answers the question.


41)


________ is an example of a Meta search engine. 


41)


______


A)


Yahoo.com 


B)


Dailystocks.com 


C)


Dogpile.com 


D)


Excite.com 





 


TRUE/FALSE.  Write 'T' if the statement is true and 'F' if the statement is false.


42)


An Internet Protocol address is a series of four numbers separated by dots that allows the computers connected to the Internet to be identified.


42)


______





 


MULTIPLE CHOICE.  Choose the one alternative that best completes the statement or answers the question.


43)


In the URL http://www.prenhall.com, the portion labeled http is the: 


43)


______


A)


protocol. 


B)


host. 


C)


top-level domain. 


D)


domain name. 





 


44)


One way to mark a site so that you can return to it later is to: 


44)


______


A)


refresh the URL. 


B)


register its domain name. 


C)


use breadcrumbs. 


D)


use Favorites or Bookmarks. 





 


45)


Which of the following is used to narrow search results? 


45)


______


A)


NOR 


B)


OR 


C)


AND 


D)


Wildcard * 





 


46)


The term backbone refers to: 


46)


______


A)


the main pathway used by all data traffic on the Internet. 


B)


the software that operates a Web server. 


C)


the hardware components required for accessing the Web. 


D)


a set of numbers comprising an Internet address. 





 


47)


Microsoft Office is an example of a(n): 


47)


______


A)


freeware product. 


B)


open-source product. 


C)


software suite. 


D)


business-management application. 





 


48)


The cell address C5 indicates that the cell: 


48)


______


A)


is performing a calculation involving a variable called "C." 


B)


is at row 5, column C of the worksheet. 


C)


contains a label value of "C5." 


D)


is at row C, column 5 of the worksheet. 





 


49)


Individuals who want software to assist in automated checkbook balancing and bill paying for their personal bank and credit card accounts will likely use which of the following software products? 


49)


______


A)


Acrobat 


B)


Quicken 


C)


Word 


D)


Microsoft Project





 


50)


The following tasks are all performed by productivity software EXCEPT: 


50)


______


A)


word processing. 


B)


spreadsheet modeling. 


C)


personal information management. 


D)


peripheral device management. 





 


TRUE/FALSE.  Write 'T' if the statement is true and 'F' if the statement is false.


51)


Changing the appearance of a document, using word processing software, is called formatting. 


51)


______





 


MULTIPLE CHOICE.  Choose the one alternative that best completes the statement or answers the question.


52)


Copyrighted software that can be used for free is: 


52)


______


A)


freeware. 


B)


e-mail. 


C)


groupware. 


D)


shareware. 





 


TRUE/FALSE.  Write 'T' if the statement is true and 'F' if the statement is false.


53)


Technically speaking, the term software refers to a set of instructions that tells the computer what to do. 


53)


______





 


MULTIPLE CHOICE.  Choose the one alternative that best completes the statement or answers the question.


54)


Microsoft Office 2003 is an example of a(n): 


54)


______


A)


personal information manager. 


B)


integrated software package. 


C)


word processing package. 


D)


software suite. 





 


55)


Software refers to a set of instructions that tells the computer what to do. These instruction sets are called: 


55)


______


A)


peripherals.


B)


databases.


C)


programs.


D)


devices.





 


56)


Computer-aided design (CAD) software can do all of the following EXCEPT: 


56)


______


A)


design and create a Web page. 


B)


allow engineers to build virtual models. 


C)


work in conjunction with global positioning (GPS) systems. 


D)


allow engineers to create automated designs and model visualizations. 





 


57)


When installing software, a 25-digit ________ is required to ensure authorized installation. 


57)


______


A)


authorization 


B)


product key 


C)


end-user license 


D)


download 





 


TRUE/FALSE.  Write 'T' if the statement is true and 'F' if the statement is false.


58)


When using spreadsheet software, an equation that you build yourself is known as a function. 


58)


______





 


MULTIPLE CHOICE.  Choose the one alternative that best completes the statement or answers the question.


59)


Performing a "what-if" analysis is most commonly accomplished using ________ software. 


59)


______


A)


PIM 


B)


presentation 


C)


spreadsheet 


D)


database 





 


60)


What is the most common type of compatibility that a software manufacturer will provide for new versions of their software? 


60)


______


A)


Forward compatibility but not backward compatibility 


B)


Neither backward nor forward compatibility 


C)


Backward compatibility but not forward compatibility 


D)


Both backward and forward compatibility 





 


61)


Software providers who develop many productivity tools may also provide stripped-down versions that combine the simpler features of these tools bundled together into a(n): 


61)


______


A)


integrated software application package. 


B)


personal information manager. 


C)


limited software edition. 


D)


software suite. 





 


62)


All of the following are examples of multiuser operating systems EXCEPT: 


62)


______


A)


Windows Server 2003.


B)


Novell Netware.


C)


Symbian.


D)


UNIX.





 


63)


When you run the ________ utility, unnecessary files, including temporary Internet files are removed from the hard drive. 


63)


______


A)


Backup 


B)


Disk Cleanup 


C)


Disk Defragmenter 


D)


Task Scheduler 





 


64)


Which one of the following statements is TRUE? 


64)


______


A)


Single-user operating systems are commonly used in robotics. 


B)


Supercomputers use single-user multitask operating systems. 


C)


Single-user multitask operating systems are also known as network operating systems. 


D)


Windows and Macintosh operating systems are the most commonly used single-user multitask operating systems. 





 


TRUE/FALSE.  Write 'T' if the statement is true and 'F' if the statement is false.


65)


The queue is where prints jobs are placed while waiting to be processed. 


65)


______





 


MULTIPLE CHOICE.  Choose the one alternative that best completes the statement or answers the question.


66)


Which of the following characters CANNOT be used in a file name when using the Windows XP operating system? 


66)


______


A)


"At" symbol (@) 


B)


Colon (:) 


C)


Underscore (_) 


D)


Hyphen (-) 





 


67)


The memory resident portion of the operating system is called the: 


67)


______


A)


kernel. 


B)


registry. 


C)


API. 


D)


CMOS. 





 


68)


Which of the following is the correct sequence of actions that takes place during the boot-up process?  


68)


______


A)


Activate BIOS Perform POST Load operating system Check configuration settings 


B)


Perform POST Load operating system Activate BIOS Check configuration settings 


C)


Load operating system Activate BIOS Perform POST Check configuration settings 


D)


Activate BIOS Check configuration settings Perform POST Load operating system 





 


69)


The purpose of a swap (or page) file is to: 


69)


______


A)


prevent thrashing in a multitasking environment. 


B)


allow multiple print jobs to print their pages out simultaneously. 


C)


hold a program's data or instructions in virtual memory when it can't fit in RAM. 


D)


maintain pages of documents that are being spooled to the printer. 





 


70)


FAT and NTFS are: 


70)


______


A)


programs for managing and scheduling tasks on the system. 


B)


part of the boot process. 


C)


file systems. 


D)


file management utility programs. 





 


71)


All of the following are TRUE regarding virtual memory EXCEPT: 


71)


______


A)


the setting for the amount of hard drive space to allocate to virtual memory can be manually changed. 


B)


virtual memory is physical space on the hard drive. 


C)


any amount of RAM can be allocated to virtual memory. 


D)


this temporary storage is called the swap file (or page file). 





 


72)


The ________ is responsible for loading the operating system from its permanent location into RAM. 


72)


______


A)


API 


B)


device driver 


C)


supervisor program 


D)


BIOS