1
A __________ is an electronic device that process data, converting it into information a. processor b. computer c. case d. stylus B 2 __________ computers represent data as variable points along a continuous spectrum of values. a. Analog b. Digital c. Precise d. Mainframe A 3 Personal computers can be connected together to form a __________. a. server b. supercomputer c. networkd. enterprise C 4 The main component of a desktop PC is the __________ which houses the computer’s critical parts. a. processor b. memory c. keyboard d. system case D 5 To make a notebook act as a desktop model, the notebook can be connected to a __________ which is connected to a monitor and other devices. a. bay b. docking station c. port d. networkB 6 Minicomputers are also called __________ computers. a. midrange b. laptop c. handheld d. smart A 7 The most important or powerful computer in a typical network. a. desktop b. network client c. network server d. network station C 8 The __________ is used by the tablet PC to write on the screen. a. finger b. mouse c. digitizer d. stylus D 9 To access a mainframe or supercomputer, users often use a __________. a. terminalb. node c. desktop d. handheld A 10 This is the part of the computer system that one can touch. a. hardware b. data c. software d. input A 11 There are __________ parts to a computer system a. 2 b. 4 c. 16 d. hundreds of B 12 __________ is processed by the computer into information. a. numbers b. processor c. input d. data D 13 During the __________ portion of the Information Processing Cycle, the computer acquires data from some source. a. processing b. output c. input d. storage C 14 Reusable optical storage will typically have the acronym __________. a. CD b. RW c. DVD d. ROM B 15 The __________ tells the computer how to use its components. a. utility b. networkc. operating system d. application program C 16 The most common type of storage devices are __________. a. magnetic b. optical c. flash d. persistent A 17 Which of the following is the largest unit of storage? a. KB b. MB c. TB d. GB C 18 A(n) __________ is a program that makes the computer easier to use. a. application b. utility c. networkd. operating system B 19 The contents of __________ are lost when the computer turns off. a. storage b. input c. output d. memory D 20 The Internet was originally a project for this government agency. a. ARPA b. NSF c. NSA d. FCC A 21 A word in a web page that, when clicked, opens another document. a. anchor b. URL c. hyperlink d. reference C 22 A network’s __________ is the central structure that connects other portions of the network. a. trunk b. backbone c. protocold. server B 23 __________ is the protocol that supports linking from one web page to another page. a. HTML b. IP c. HTTP d. FTP C 24 The first part of a complete URL is the __________ needed to access the web resource. a. addressb. name c. location d. protocolD 25 You can organize your bookmarks using __________. a. structures b. containers c. folders d. menus C 26 The browser’s __________ keeps a list of web pages you have visited during the current session. a. history b. cache c. favorites d. trail A
27
A __________ organizes the web into categories. a. search engine b. encyclopedia c. archive d. directory D 28 To match all of the words in your search, the Boolean __________ operator should be used. a. AND b. OR c. XOP d. Both AND & ORA 29 E-mail addresses separate the user name from the ISP using the __________ symbol. a. & b. @ c. % d. * B 30 The mail server as defined in the text uses the __________ protocol. a. HTTP b. FTP c. POP d. SMTP C 31 To send email to a large group at one time, a __________ can be use a. listserv b. group c. alias d. mail server A 32 When sending an e-mail, the __________ line describes the contents of the message. a. To b. Subject c. Contents d. CC B 33 Unsolicited commercial email is commonly known as __________. a. junk b. hoaxes c. spam d. hypertext C 34 News servers utilize __________ to distribute documents to readers. a. NNTP b. NEWS c. HTTP d. FTP A 35 To search FTP archives for a file, you should use the __________ tool. a. gopher b. jugheadc. archie d. jalopy B 36 __________ is often referred to as “the CB of the Internet.” a. IRC b. FTP c. E-Mail d. HTTP A 37 Discussion groups may have a __________ who monitors the postings and enforces the site’s rules. a. judge b. sysop c. narratord. censor B 38 A message with replies on a newsgroup is often called a __________. a. post b. list c. thread d. comment C 39 ctrl, shift and alt are called __________ keys. a. adjustment b. function c. modifierd. alphanumeric C 40 To make the number pad act as directional arrows, you press the __________ key. a. num lock b. caps lock c. arrow lock d. shift A 41 The modern keyboard typically has __________ Function keys a. 10 b. 12 c. 14 d. 16 B 42 To move to the beginning of a line of text, press the __________ key. a. A b. Pageup c. Enter d. Home D 43 The __________ determines how long you must hold down an alphanumeric key before the keyboard will repeat the character. a. strike rate b. repeat rate c. default rate d. threshold rate B 44 The traditional mechanical mouse uses a __________ to track the pointer position on the screen. a. light sensor b. wheel c. Ball d. Ruler C 45 To access properties of an object, the mouse technique to use is __________. a. dragging b. dropping c. right-clicking d. shift-clicking C 46 The __________ can be defined as an upside down mouse. a. trackpad b. trackball c. trackpoint d. trackwell B 47 The __________ key will launch the Start button. a. esc b. shift c. Windows d. Shortcut C 48 The wheel on a mouse can make it easier to __________. a. scroll through documents b. select objects c. open documents d. change volume A 49 A __________ is very good at accepting written input a. pen b. stylus c. tablet PC d. mouse C 50 __________ can make it easier to play games. a. Joysticks b. Mouses c. Keyboards d. Pens A 51 The pattern of printed lines on most products are called __________. a. prices b. barcodes c. scanners d. OCR B
52 To convert paper into an editable document, a scanner would employ __________ technology. a. UPC b. scanning c. conversion d. OCR D 53 To place your image into a live video conference, a __________ is usually used. a. webcam b. digital camera c. video camera d. scannerA 54 Speech recognition programs must eliminate __________ before they can successfully recognize the spoken sounds. a. jargon b. dialects c. accents d. background noise D 55 Kiosks use __________ to simplify the interface. a. trackpads b. touch screensc. trackballs d. voice input B 56 Graphic designers prefer __________ scanners because they produce high-resolution documents a. large format flatbed b. hand c. sheet fed d. digital A 57 Which of the following colors is not used to generate color in the scanning process? a. red b. blue c. yellow d. green C 58 The 1940 World Fair had a robot named __________. a. Robinson b. Model B-9 c. Elektro d. Robbie C 59 This type of monitor is common on desktop computers. It looks much like a standard television. a. cathode-ray tube b. flat-panel c. monochrome d. projector A 60 Monitors use various intensities of __________ colors to generate the rainbow. a. 16 b. 16 million c. three d. four C 61 The __________ helps to align the electron guns. a. pixel b. shadow mask c. resolution d. refresh B 62 LCD monitors often have a smaller __________ than CRT monitors. a. refresh rate b. viewing angle c. color depth d. price B 63 The __________ monitor is similar to the LCD monitor, but has a phosphorescent film between the layers. a. Electro luminescent displays (ELD) b. Plasma displays c. Paper-white displays d. thin-film transistor A 64 This specification of a monitor describes the usable portion of the screen.a. refresh rate b. resolution c. dot-pitch d. viewable area D 65 To minimize eyestrain, you should adjust your monitor to a __________ degree angle. a. 5 b. 10 c. 15 d. 90 B 66 Newer projectors utilize __________ to achieve clearer and brighter images. a. mirrors b. thin-film transistors c. digital light processing d. cathode ray tubes C 67 The most complicated part of your computer’s sound system is the __________. a. speakerb. microphone c. headsetd. sound card D 68 The __________ contains speakers and a microphone on a headband. a. speaker b. microphone c. headsetd. sound card C 69 Dot matrix and band printers are __________ printers. a. laser b. impact c. ink jet d. thermal B 70 Which of the following measures the speed of dot-matrix printers? a. ppm b. dpi c. cps d. lpm C 71 Printers use __________ colors to generate the rainbow.a. 3 b. 4 c. 8 d. 16 B 72 In a laser printer, the __________ transfers the image to the paper. a. laser b. roller c. toner d. drum D 73 Home offices often purchase __________ to solve printing and scanning needs. a. all-in-one peripherals b. photocopiers c. ink-jet printers d. scanners A 74 For a home user that has casual printing needs, the __________ specification is the most important specification of a printer. a. speed b. cost of use c. resolution d. paper size B 75 The __________ printers are used to produce low-cost posters and handouts. a. dye-sublimation b. thermal-wax c. laser d. ink jet B
76
The __________ printer use temperature variations to achieve different colors. a. dye-sublimation b. thermal-wax c. laser d. ink jet A 77 The __________ printer sprays ink onto the page. a. laser b. dotmatrix c. non-inpact d. ink jet D 78 An organization that needs to produce hundreds or thousands of pages a day, the __________ is the most logical choice. a. dot-matrix b. laser c. ink jet d. thermal-wax B 79 Chips are made up of millions of tiny __________ or switches. a. etches b. transistors c. chargesd. electrons B 80 Computers use the __________ number system to store data and perform calculations. a. decimal b. hexadecimal c. binary d. octal C 81 There are __________ bits in one byte. a. 4 b. 8 c. 16 d. 32 B 82 The text code originally used in personal computers. a. EBCDIC b. Extended ASCIIc. Unicode d. ASCII D 83 The __________ performs simple math for the CPU. a. ALU b. DIMM c. BUS d. register A 84 A(n) __________ is one instruction from a program. a. task b. process c. thread d. assignment C 85 The __________ is the electronic pathway between components in the computer. a. CPU b. bus c. RAM d. register B 86 A modern desktop computer will likely use __________ chips to store RAM. a. SO-DIMM b. SIMM c. DIPP d. DIMM D 87 The __________ controls how often the computer executes a task. a. CPU b. bus c. clock d. RAM C 88 The __________ bus is used to connect Macintosh keyboards and mouse. a. USB b. Firewirec. SCSI d. ISA A 89 The Intel __________ is primarily designed for servers. a. Pentium III b. Itanium c. Celeron d. Centrino B 90 This company historically made chips for Macintosh computers. a. Intel b. AMD c. Freescale d. Seagate C 91 The newest processor for Macintosh computers is the 64-bit __________. a. G5 b. Pentium IV c. Athlon FX 64 d. PowerPC A 92 Which of the following specification has little effect on the speed of a processor? a. cache b. system bus speed c. clock speed d. socket type D 93 Multiple processor systems that are required to have an even number of processors are said to be __________ multiple processors. a. symmetric b. even c. balanced d. distributed A 94 The UART chip controls the __________ port on the computer. a. parallel b. serial c. USB d. Ethernet B 95 To add an internal card to a computer, it must have an open __________. a. expansion slot b. bay c. bus d. USB port A 96 The __________ interface transmits one bit at a time. a. parallel b. SCSI c. serial d. FireWire C 97 Most likely the color of the port your monitor is attached to is __________. a. green b. purple c. red d. blue D 98 The SCSI bus connects devices using a __________ cable interface. a. plug-nplay b. daisy chain c. un-terminated d. internal B 99 A __________ is an example of a solid-state memory device. a. flash memory drive b. CD-RW c. floppy disk d. hard disk A 100 Floppy drives, hard drives and tape drives all use a __________ to read data. a. laser b. sensor c. magnet d. pen C 101 The __________ lists the location of files on the disk. a. boot sector b. FAT c. root folder d. data area B
102
The file system used by Windows 2000 and XP. a. FAT b. FAT32 c. HPFS d. NTFS 5 D 103 Each sector on a hard drive stores __________ bytes of data. a. 64 b. 512 c. 1024 d. 1 gigabyte B 104 A drive that can be removed or inserted while the computer is running is said to be __________. a. robust b. dynamic c. hot swappable d. SCSI C 105 A tape drive offers __________ access to data. a. random b. sporadic c. timely d. sequential D 106 Newer CD-ROM store about __________ minutes of audio data. a. 65 b. 70 c. 75 d. 80 D 107 CD-RW disks cannot store ___________ data. a. video b. audio c. numericd. multimedia B 108 Solid state drives use __________ RAM to store data. a. dynamic RAM b. synchronous static RAMc. synchronous dynamic RAM d. parity RAM C 109 Drive access time is measured in __________. a. nanoseconds b. milliseconds c. microseconds d. picoseconds B 110 Your __________ files store various versions of running programs. a. cache b. memory c. temp d. static C 111 Removing a program properly requires __________ it. a. deleting b. removing c. disabling d. uninstalling D 112 To find a bad spot on the disk, you can use a __________. a. disk scanner b. disk defragmenter c. disk tool d. disk formatter A 113 A 500 MB file compressed to 125 MB enjoys a __________ compression ratio. a. 0.084027778 b. 0.125694444 c. 0 d. 0.209027778 C 114 SCSIs have better __________ than EIDE. a. storage capacity b. data transfer time c. seek time d. rotational speedB 115 __________ is the process of removing a file from a compressed archive. a. pulling b. restoring c. uninstalling d. extracting D 116 What does the term EIDE stand for? a. enhanced integrated drive electronics b. enhanced internal drive electronics c. enhanced interfaced drive electronics d. enhanced iconic drive electronics A 117 The time to move the read/write heads to a spot on the medium is defined as the __________ of the device. a. seek time b. read time c. average access time d. transfer time C 118 Which organization established the standard for SCSI? a. IBM b. ANSI c. Microsoft d. IEEE B 119 Medical devices often run a __________ operating system. a. real-time b. single user c. multi-user d. networkA 120 In modern operating systems, the __________ feature has dramatically improved user productivity. a. copy and paste b. command-line interface c. multitasking d. intrusion detection C 121 The main interface in Windows and OS X is a(n) __________ interface. a. embedded b. graphical c. command-line d. neural B 122 A command-line interface tells you it is waiting for the next command by using a __________. a. dialog box b. menu c. prompt d. system call C 123 A service provided by the OS for programmers is referred to as a(n) __________. a. context b. interrupt c. shortcutd. system call D 124 To place a sound into a Word document, you would use the __________ feature of Windows. a. OLE b. Clipboard c. Paste d. task switching A 125 The program that allows the OS to work with a printer or a video card is a(n) __________. a. utility b. driver c. applet d. system call B
126
The __________ protects your system from hackers. a. Snort b. backup c. anti-virus d. firewall D 127 A program currently loaded in the system but not active is said to be running in the __________. a. user session b. kernel c. background d. foreground C 128 Data that is copied from an application is stored in the __________. a. driver b. Clipboard c. terminald. prompt B 129 The most popular operating system on the planet is in the __________ family of operating systems. a. Windows b. Linux c. DOS d. Mac OS A 130 Initially __________ was separated into two products: one designated for user computers the other a network server. a. Linux b. Windows XP c. Windows NT d. Novell C 131 The Neural Interface described in the chapter was named __________. a. Brain Commander b. Thought Type c. Neuron Navigator d. Brain Communicator D 132 If you need an operating system that provides data redundancy, you should select a __________ operating system. a. networkb. embedded c. Linux d. Windows A 133 A database that contains the users, shares and features of a network. a. shell b. enterprise directory c. distributed application d. operating environment B 134 A program that runs in parts on several computers is said to be __________. a. delegated b. spread c. distributed d. recursive C 135 Novell recently purchased the __________ flavor of Linux. a. SuSE b. Mandrake c. RedHat d. Slackware A 136 The last member of the Windows 9X family a. Windows XP b. Windows 95 c. Windows 98 d. Windows ME D 137 Which operating system historically has a command-line interface? a. Windows b. Win.CE c. UNIX d. OS X C 138 This operating system is expected to dominate the server market. a. Windows 2003 b. Linux c. Novell d. SuSE B 139 This type of software is designed for users who want to customize the programs they use. a. freeware b. open-source software c. shareware d. macros B 140 The __________ of software contains lists of commands and options. a. menu bar b. title bar c. formula bar d. tool bar A 141 Changing an existing document is called __________ the document. a. creating b. modifying c. adjusting d. editing D 142 A __________ is a named set of characters that have the same characteristics. a. type face b. type style c. font d. pico C 143 In a spreadsheet program the __________ contains related worksheets and documents. a. workbook b. column c. cell d. formula A 144 The power of spreadsheets lies in its __________. a. cells b. worksheets c. labels d. formulas D 145 In a presentation program a __________ is a resizable box for text and graphical elements. a. text boxb. cell c. frame d. object C 146 Which of the following is PIM software? a. Microsoft Word b. Microsoft Outlook c. Microsoft Excel d. Microsoft PowerPoint B 147 The __________ is portable and allows the presenter to place the slides onto any surface.a. PC to TV converter b. large scale CRT monitorc. computer screen d. data projector D 148 A(n) __________ is software that you purchase that solves one task. a. suite b. stand-alone program c. open-source program d. freeware program B
149
If you magnify a __________ you can see its individual pixels. a. vector graphic b. bitmap c. DXF d. EMF B 150 Paint programs keep track of every __________ placed on the screen. a. image b. object c. pixel d. color C 151 The term __________ originated with large books of reproducible images. a. clip art b. scanned images c. digital photo d. bitmap A 152 In a photo editor, you can repair scratches using the __________ tool. a. mask b. airbrush c. stamper d. eraser B 153 Animation effects in modern movies are often created with __________ programs. a. JPG b. CAD c. CGI d. IGF C 154 This graphic type is commonly only found on the Macintosh family of operating systems. a. bmp b. jpg c. gif d. pict D 155 Blueprints are usually created using __________ software. a. CGI b. paint c. CAD d. draw C 156 To create a prototype of a new product, a designer might use a __________ program. a. CAD b. 3D modeling c. paint d. draw B 157 Using more than one medium in a project is commonly referred to as __________. a. multimedia b. CAD c. photo-realistic d. CGI A 158 A __________ predesigned document that already has coordinating fonts, a layout, and a background. a. ruler b. model c. template d. guide C 159 Which is the most important item in a client-server network? a. client b. hub c. server d. media C 160 This technology allows a phone call to be routed over network wires. a. VOIP b. teleconferencing c. video-conferencing d. Fast Ethernet A 161 __________ is defined as the logical layout of the cables and devices that connect the nodes of the network. a. Structure b. Schematic c. Protocol d. Topology D 162 In a __________ network, the ends of the network wires are attached to terminators. a. star b. bus c. hybrid d. mesh B 163 The Internet is an example of a __________ network. a. star b. bus c. hybrid d. mesh D 164 Data moves though the network in a structure called __________. a. packets b. payload c. datagrams d. tokens A 165 __________ is the means used to link a network’s nodes together. a. Protocol b. Packet c. Topology d. Media D 166 The fastest cable type discussed in the text is __________. a. coaxial b. fiber optic c. twisted pair d. wireless B 167 This device connects the computer to the network media. a. cable b. hub c. NIC d. terminator C 168 A __________ looks at each packet’s header to determine where the packet should go. a. bridge b. switch c. gateway d. router D 169 The newest error-correction protocol used in modern modems. a. TCP/IP b. NetBEUI c. V.92 d. POTS C 170 The maximum speed of a T1 connection. a. 56Kbps b. 64 Kbps c. 1.544 Mbps d. 44.7 Mbps C 171 Saving a file from the Internet onto your computer is called __________. a. downloading b. uploading c. transferring d. storing A 172 __________ is a protocol designed by the telecommunications industry as a more efficient way to send voice, video, and computer data over a single network. a. TCP b. 802.11 c. T3 d. ATM D 173 To allow a wireless network to grow, __________ are added. a. wireless access points b. extension points c. switches d. wireless NICS B 174 802.11 describes __________ networks. a. wireless b. coaxial c. fiber optic d. copper A
175
__________ provides 2 64 Kbps data channels and one 19 Kbps control channel. a. PRI b. BRI c. DSL d. ATM B 176 The __________ technology is attractive to home customers because it uses the existing phone lines. a. cable internet b. T1 c. DSL d. ATM C 177 The expression DSL stands for __________. a. Digital Subscriber Line b. Digital Signature Loop c. Digital Sending Line d. Digital Subscriber Loop A 178 A modem that is on the desk is called a(n) __________ modem. a. internal b. faz c. voice d. externalD 179 Connections to the Internet using a phone line and a modem are called __________ connections. a. broadband b. dish c. digital d. dial-up D 180 DSL speed typically lists the __________ speed.a. transfer b. download c. upload d. control B 181 The name for the Windows version of the Internet API. a. Winsock b. Socketsc. WinModem d. DirectX A 182 Accessing the Internet in a very remote location is the job of a __________ connection. a. dial-up b. satellite c. cable d. DSL B 183 Which of the following describes a wireless network you might install in your home? a. WLAN b. WWAN c. cell d. radio IP A 184 The __________ service always provides the same up and download speeds. a. ADSL b. VDSL c. SDSL d. dial-up C 185 The local antenna for satellite connections is called a __________. a. VSAT b. modem c. terminald. DTA A 186 Which of the following not a Internet connection?a. WWAN b. DSL c. WLAN d. dial-up A 187 The fastest theoretical speed of a dialup connection is __________. a. 53Kbps b. 56 Kbps c. 126 Kbps d. 1.5 Mbps B 188 This high-speed Internet solution is installed using existing phone lines. a. T1 b. cable c. DSL d. SatelliteC 189 This technology is used to protect e-commerce pages. a. HTTP b. HTML c. SSL d. HTTPS C 190 B2B transactions are performed __________ to __________. a. Business, business b. Buyer, businessc. business, broker d. buyer, broker A 191 A store that combines online and physical presence is called a(n) __________ store. a. brick-and-mortar b. click-and-mortarc. combination d. e-commerce B 192 Extranet and Intranets typically use __________ technology. a. SSL b. proprietary c. Internet d. protocolC 193 To encourage repeat customers, e-commerce sites recommend users create a(n) __________. a. profile b. account c. survey d. wish list B 194 Purchasing a friend’s wedding gift online is an example of a(n) __________ transaction. a. B2C b. B2B c. P2P d. C2B A 195 To support shopping carts, most sites require a(n) __________ be placed on your computer. a. client software b. API c. cookie d. browserC 196 Purchasing stock online from a vendor is an example of a(n) __________ transaction. a. B2B b. online finance c. online banking d. online broker B 197 Granting an outside organization access to internal web pages is often implemented using a(n) __________. a. extranet b. intranet c. internet d. hacker A 198 An employee that performs works from home is said to be a(n) __________. a. slacker b. progressive thinker c. telecommuter d. networker C 199 The __________ is the software tool to store or access data. a. table b. DBMS c. query d. report B
200
__________ are documents that when filled in create records. a. Forms b. Reportsc. Tables d. Querties A 201 This database has only one table. a. relational b. large c. flat-file d. DBMS C 202 The __________ field is used to hold a yes or no answer. a. object b. number c. text d. logical D 203 To delete records or perform calculations on a table, the best tool to use is a __________. a. query b. filter c. form d. report A 204 __________ is used to build ‘intuitive’ queries. a. SQL b. Xbase c. QBE d. XML C 205 To print information from a table, the __________ tool is the best choice. a. form b. report c. query d. macro B 206 To store your picture in a database requires a(n) __________ field. a. BLOB b. text c. image d. logical A 207 The __________ is used to access one record at a time. a. query b. filter c. form d. report C 208 SQL stands for __________. a. Standard Query Language b. Structured Query Language c. Simplified Query Language d. Static Query Language B 209 An application that executes on separate PCs like this is called a(n) __________ application. a. enterprise b. distributed c. tier d. global B 210 The most popular commercial DBMS. a. Microsoft SQL Server b. Microsoft Access c. MySQL d. Oracle D 211 The ability of a database to grow as the data tracking needs grow is its __________. a. scalability b. expandability c. maintainability d. platform-independence A 212 The most open source DBMS. a. Microsoft SQL Server b. Microsoft Access c. MySQL d. Oracle C 213 A DBMS that runs on many different operating systems is said to be __________. a. scalable b. robust c. platform independent d. distributed C 214 Search engines use a(n) __________ to automatically index sites. a. crawler b. query c. enterprise d. sitebuilder A 215 The __________ performs document tracking. a. distributed application b. enterprise software c. Oracle software d. EDM software D 216 An enterprise solution with data storage, a client interface and a security system is a(n) __________ system. a. 2-tier b. 3-tier c. 4-tier d. n-tier B 217 __________ will answer questions you did not think to ask of your data. a. data mining b. data extrapolation c. knowledge discovery d. data enlightenment C 218 __________ is the clear leader for personal databases. a. Microsoft Access b. Microsoft FoxPro c. Borland dBase d. MySQL A 219 Information systems are composed of __________ basic components. a. four b. three c. two d. many B 220 A human order taker can be bypassed when using a(n) __________ a. office automation system. b. management information system. c. transaction processing system. d. decision support system. C 221 The __________ can help you choose a product. a. office automation system b. management information system c. transaction processing system d. decision support systemD 222 The expert system uses a(n) __________ to select the most appropriate response. a. inference engine b. decision support systemc. knowledge base d. data source A 223 An intranet that is accessible by outside workers. a. firewall b. extranet c. management information system d. P2PN B
224 __________ is the capability to continue as if nothing has happened, even after a major component failure. a. redundancy b. interoperability c. fault tolerance d. backup C 225 Striping with parity is also known as RAID __________. a. 0 b. 1 c. 4 d. 6 C 226 A storage device that is connected directly to a network is an example of __________. a. network attached storage b. storage area network c. direct attached storage d. RAID A 227 A tape library will use a robotic component called a(n) __________ to change and store multiple tape cartridges. a. RAID b. backup device c. redundant system d. auto loader D 228 More than one of the same component is an example of a __________ system. a. scalable b. redundant c. RAID d. back-upB 229 When developers start to acquire equipment or software, the __________ stage of the SDLC has been reached. a. development b. design c. implementation d. needs analysis A 230 A __________ implementation will involve employees utilizing one part at a time. a. parallel b. direct c. phased d. pilot C 231 Adding new features is typically performed during the __________ phase. a. implementation b. needs analysis c. development d. maintenance D 232 The intensity and the level of commitment required in the first __________ phases of RAD are expected to shorten the entire development process. a. two b. three c. five d. six A 233 Senior managers but not end users participate during the __________ sessions for RAD. a. needs analysis b. joint requirements planning c. joint applications design d. object oriented system analysis B 234 Analyzing the current system is performed during the __________ phase. a. development b. design c. implementation d. needs analysis D 235 In __________, team members start with the big picture and move to the details. a. top-down design b. bottom-up design c. object oriented system analysis d. rapid application design A 236 Many teams use working models called __________ to explore the look and feel of screens with users. a. demos b. prototypes c. objects d. designs B 237 In the needs analysis section of the SDLC, the __________ typically defines a need for a new system a. manager b. system analyst c. user d. technical writer C 238 This phase of the SDLC may involve a small group of testers. a. maintenance b. needs analysis c. implementation d. development C 239 The __________ is a special database that holds information about the computer’s user, installed programs and hardware devices. a. dynamic link library b. initialization file c. compiled help module d. Windows Registry D 240 A(n) __________ converts all the source code into machine code, creating an executable file. a. linker b. compiler c. assembler d. interpreter B 241 An IPO chart consists of __________ columns. a. three b. four c. five d. unlimited A 242 A series of steps that always results in an answer is the definition of __________. a. heuristic b. flowchart c. algorithm d. pseudo code C 243 __________ are built around special program flow constructs called conditional statements. a. Selection structures b. Sequence structure c. Repetition structures d. Assignment statements A 244 The color of an object is an example of a(n) __________. a. attribute b. detail c. listing d. specification A
245
A(n) __________ file contains information in an indexed and cross-linked format. a. executable b. initialization c. help d. library C 246 A(n) __________ encapsulates data and functionality. a. structured program b. selection statement c. object d. program B 247 __________ are text files containing OS commands. a. Initialization files b. Batch files c. Executable files d. Help files B 248 When the computer has to play a sound, it generates a(n) __________. a. request b. command c. interrupt d. sequence C 249 The rules of a language are called its __________. a. structure b. code c. syntax d. rigidity C 250 A language that can be written on one platform and executed on another platform is said to be __________. a. portable b. robust c. third generation d. dynamic A 251 Fourth generation languages typically allow the developer to work inside of a(n) __________. a. interpreter b. assembler c. editor d. IDE D 252 __________ is Microsoft’s latest entry into the programming arena. a. Java b. .NET c. Visual Basic d. Pascal B 253 A next-generation Web content development language, __________ typically refers to a suite of technologies that allow developers to store data in a readable format. a. HTML b. XSL c. XML d. PHP C 254 Macromedia __________is an HTML editor that allows the developer to visually write Web pages. a. Flash b. Dreamweaver c. MX d. FireWorks B 255 JavaScript was developed by __________ to run inside of web pages. a. Microsoft b. Sun c. Oracle d. Netscape D 256 To create movies for a web page, the best solution is to use __________. a. Java b. Flash c. JavaScript d. XML B 257 To connect a web page to an Oracle database, the __________ language is suggested. a. ASP b. PHP c. Java d. XSL B 258 This technology is used to convert XML into HTML. a. CSS b. XHTML c. PHP d. XSL D 259 A __________ is anything that can cause harm. a. vulnerability b. phish c. threat d. spoof C 260 In the right setting a thief will steal your information by simply watching what you type. a. snagging b. spying c. social engineering d. shoulder surfingD 261 A __________ is a small program embedded inside of a GIF image. a. web bug b. cookie c. spyware application d. spam A 262 A hacker contacts you my phone or email and attempts to acquire your password. a. spoofing b. phishing c. spamming d. bugging B 263 This power protection device includes a battery that provides a few minutes of power. a. surge suppressor b. line conditioner c. generator d. UPS D 264 The phrase __________ describes viruses, worms, Trojan horse attack applets, and attack scripts. a. malware b. spam c. phish d. virus A 265 A hacker that changes or forges information in an electronic resource, is engaging in __________. a. denial of service b. sniffing c. terrorism d. data diddling D 266 Hackers often gain entry to a network be pretending to be at a legitimate computer. a. spoofing b. forging c. IP spoofing d. ID theft C 267 The __________ of a threat measures its potential impact on a system. a. vulnerabilities b. countermeasures c. degree of harm d. susceptibility C
268
The power level drops below 120V. a. brownout b. spike c. blackout d. surge B 269 You should keep credit card and pay statements for at least _________ years. a. two b. three c. four d. five B 270 The __________ prevents unlawful access to voice communications by wire. a. Electronic Communications Privacy Act b. Freedom of Information Act c. USA Patriot Act d. Privacy Act of 1974 A 271 __________cookies are also known as transient cookies. a. Third-party b. First-party c. Sessiond. Persistent C 272 Which of the following will not protect you from spam? a. spam blockers b. e-mail rules c. popup blocker d. filters C 273 A __________’s main purpose is to prohibit unauthorized access to your computer via the Internet. a. popup blocker b. firewall c. spyware blocker d. spam assassin B 274 To read the system messages and warnings, access the __________ in Windows. a. system manager b. control panel c. event viewer d. message screen C 275 Before discarding a financial document, you should __________.a. copy it b. shred it c. file it d. post it B 276 To create a copy of files in the event of system failure, you create a __________. a. restore file b. backup c. firewall d. redundancy B 277 If configured correctly, the __________ will prevent interaction with your computer after a specified time period. a. firewall b. filter c. screen saver d. popup blocker C 278 To recover files from a backup, you perform a __________. a. restore b. scan c. unerase d. copy A
1 text
Features of word-processing include c. personlaizing from letters
a. d.
2
Computer Systems/Programs have been useful in: a. space exploration b. weather prediction c. predicting earthquakes d. All of the above D
3
The largest digit in the octal system is: d. 8 B
4
The system used by computers in doing arithmetic is: c. decimal d. None of the above A
5
A byte is big enough to store: The number 700 d.
6
A named group of characters in secondary memory is called a: Directory c. Record d. Word A
7
An example of an analog calculator is: c. Pascal’s adding machine
8
The second generation computer used: a. c. Integrated circuits d. VLSI
9
A computer keyboard, unlike a typewriter keyboard has a: b. Control key c. Carriage return key d.
10
A pixel is a: a. Virtual device One charcter on a computer screen
11
The slowest of the following memory devices is the: a. floppy disk c. disk pack d. hard disk
12
The most widely used computer are a. c. minicomputer d. mainframe
a.
checking spelling All of the above D
2
7
b. d.
c.
a.
binary b.
revising
10 octal
Two Charcaters c. a.
File
b.
an abacus b. a slide rule Babbage’s Analytical Engine B Vacuum tubes b. B
Transistors
a. Shift key "c" key B
Dot on a computer screen None of the above B Cassette tape A
microcomputer b. A
13 A function of the computer processor is to a. memory b. carry out instructions once fetched computer memory d. All of the above D 14
b.
a. One character b. None of the above A
a. d.
b.
c. b.
supercomputer
to fetch instructions from c. fetch data from
The following is a statement in an algorithm for a robot’s movements:IF the way is clear THEN cross the street The robot will:- a. Cross the street b. cross the street if “the way is clear” is true
15
BIOS is typically placed inside d. Transistor A
a.
ROM
16
A cell in a spreadsheet may contain: a. Formulas d. All of the above D
17
Operating system is a a. c. Not a software d.
Will never cross the street d. Will do nothing C b.
RAM
Numbers
Application software None of the above
b. B
c.
c.
Hard Disk
b.
Words c.
System software
18
RAM is kind of ______ storafe device Input d. Output A
a.
Volatile b.
19
The most commonly used protable devices are a. Digital diaries d. All of the above B
Non-volatile
PDA's b.
Laptopsc.
20 We use _______ on oour computer to see the internet web pages a. browserb. Word c. Windows Explorer d. Hyper terminal A 21
The popular example of WAN is : Micronet d. DSL A
a.
Internet b.
Web
Intranet c.
22
The terminators at the ends in bus topology helps in _____ the data Removng the data b. Boosting c. Regenrating the above A Slower b.
c.
a. d.
Sometimes faster
None of
23
LAN is _______ then WAN a. Faster d. All of the above C
24
Computer Networks may involve: a. Telephone lines b. c. Satellites d. All of the above D
Microwaves
25
An ________ is a collection of different computer networks a. b. Control system c. Internet d. Mechanical systems
Hybrid system C
26
The number 14.2 is best represented by the data type: Real c. Integer d. String B
a.
Character
c.
b.
27 The concept of Artifical intelligence is going to be introduced in the a. 1st generation of computersb. 2nd generation of computers c. 3rd generation of computers d. 5th generation of computers D 28 A database system is considered to have media b. the speed of electronic media c. updating information d. All of the above D a. d.
a. the accuracy and electronic rapid access for inserting, deleting, and
29
Plotters are kind of : Memory devices
30 disk
Virtual memory refers to a portion of your _________ allocated to be b. RAM c. ROM d. Cache A used by the computer a. b. c.
a.
31
Step by step instructions used to solve any problem refer to a. b. Algorithm c. Register set d. FAT table
Instruction set B
32
Optical mouse uses _______ mechanism for working (i.e cursor tracking) Balls b. Light c. Button d. Hyrbird B
a.
33
Cache is introduced between RAM and the ________ a. Hard disk Processor c. Floppy disk d. None of the above B
b.
34
A byte is cluster of D
8 Bits
a.
Input devices b. None of the above
2 Bits
b.
4 Bits
Output devices c. B
c.
6 Bits
Hard
d.
d.
35 Hard disk is an exmaple of a. Secondary storage device b. Primary storage device c. Premimum storage device d. Volatile storage device A 36
An example of a data type is: d. All of the above D
a.
Integer b.
Boolean
c.
Real
37
A computer’s screen contains” : a. more pixels than a television screen b. fewer pixels than a television screen c. the same number of pixels as a television screen d. None of the above B 38
Storage Memory can be made of: a. a magnetic device semiconductors c. microscopic magnetized bubbles d. D
39
Floppy disk is a. Volatile b. d. Fastest device B
Non-volatile
40 A disk drive’s head can: a. Read and write b. write only d. not do anything A
c.
b. all of the above
Very good device
Can read only c.
Can
41
The arrangement of the dots on a screen into row and columns______ is referred as a. vector b. pixel c. raster d. none of the above C
42
A computer’s output can consist of: a. musical notes d. all of the above D
letters b.
drawings
c.
43
The device which is responsible to guide and forward the data between the a. Routersb. Application layer c. Windows d. Modem connections A two computers in an internet is 44
We write an algorithm in the a. English words d. Visual Basic
45
Caches are introduced in computers to support the ________ concept Pipelining b. Forwarding c. Regenrating d. A
46
PROM is just like a None of the above
47
Every hardware devie requires a _________ to be able to run properly in with our a. Software layers b. Hard disk c. Driver d. Keyboard C computer
48
Every software is made with the help of a Processor c. Output devices d.
49 101 represents: a. and one in decimal d. 50
a. A
CD-R
Programming langugae b. C
b.
five in binary b. All of the above D
The portable devices normally use the Wired/Wireless netowrking c. only wireless B
CD-RW c.
C++
c.
a. Retransmission
DVD-RW
d.
a. Programming langugae b. Buffers A sixt five in octal c.
a. Wired networking Do not use any networking
one hundred b. d.
Use
1
Which of the following is used to explore the Internet? a. Browser b. Spreadsheet c. Clipboard d. Word ProcessorA 2 The Internet is a system of computers all over the world that are linked to one another. This type of system is considered to be a. an electronic database b. a local area network (LAN) c. a stand alone system d. a wide area network (WAN) D 3 What tool is capable of calculating monthly rainfall amounts and creating graphs based on that data? a. clipart b. graphics c. word processor d. spreadsheet D 4 How many 'quacks' does the following loop print? for(int i=10;i>0;i--) {print("quack ");} a. 11 b. 10 c. 9 d. 12 B 5 The Hexadecimal number FD is represented in binary as: a. 1111 1101 b. 1111 1011 c. 1111 1010 d. 1101 1111 A 6 A homepage is part of a: a. terminalb. website c. LAN d. WAN B 7 PDA stands for a. protocol disk administrator b. primary digital assistant c. processor digital add-on d. personal digital assistant D 8 Loading the operating system into a personal computer is called a. booting b. interrupting c. prompting d. paging A 9 Making illegal copies of copyrighted software is called a. browsing b. software piracy c. collaboration d. electronic distribution B 10 The type of software that can store, update, manipulate, and retrieve data is called a. desktop publishing b. spreadsheet c. database management d. graphics C 11 The entire computer system is coordinated by a. ALU b. control unit c. registers d. arithmetic operators B 12 Data is represented on a computer by a two-state on/off system called a. word b. byte c. binary d. RAM C 13 A letter, digit, or special character is represented by a a. bit b. byte c. megabyte d. kilobyte B 14 Memory capacity may be expressed in a. MHz b. Megabytes c. microseconds d. cycles B 15 Which of the following is/are not part of the CPU? a. Control unit b. ALU c. registers d. primary storage D 16 Another name for secondary storage is a. cylinder storage b. density c. auxiliary storage d. memory C 17 A hard disk can be backed up efficiently by using a. zoning b. tape system c. transaction file d. WORM B 18 Devices that send and receive satellite signals are called a. modems b. earth stations c. tokens d. servers B 19 Transmission permitting data to move both directions but only one way at a time is called a. simplex b. full-duplex c. half-duplex d. start/stop C 20 Which is not a Boolean operator? a. OR b. AND c. NOT d. IN D 21 The action of moving a page up or down on the screen is called a. scrolling b. linking c. segmenting d. framing A 22 ISP stands for a. International Serial Port b. Internet Switching Protocol c. Internet Service Provider d. none of the above C 23 The binary number 10100001 represents a. 1010 (Decimal) b. 161 (Decimal) c. 160 (Decimal) d. AB(Hexadecimal) B 24 Which of the following has the smallest storage capacity a. CD b. DVD c. Floppy disk d. Hard disk C 25 Numbers are stored inside a computer in a. binary form b. ASCII code form c. decimal form d. alphanumeric form A 26 The 4-bit binary number 0111 represents a. 15 b. -7 c. 7 d. 1 C
27
Clock speed is measured in a. bits per second b. Hertz c. baud d. bytes B 28 Pipelining improves CPU performance due to a. introduction of parallelism b. increased clock speed c. reduced memory access time d. additional functional units A 29 A GUI is a. hardware b. software interface c. operating system d. language interpreter B 30 A compiler a. converts a program to machine code b. changes format of a file c. starts an operating system d. combines two programs A 31 “Zipping” a file means a. encrypting it b. decrypting it c. transmitting it d. compressing it D 32 An AND gate generates a high output when a. any one of its inputs is high b. all of its inputs are high c. all of its inputs are low d. power fails B 33 A byte is how many bits long? a. 8 b. 16 c. 32 d. 64 A 34 An LED display is an example of a ________________ device. a. input b. output c. processing d. storage B 35 NOT, AND, OR are _______ operators. a. Logical b. Arithmetic c. Control d. Shift A 36 Main memory of a computer is a. volatile b. non-volatile c. very slow d. not required A 37 A record of personal finances is best maintained by using which of the following? a. spreadsheet b. word processor c. database d. presentation C 38 A bar code reader is an example of a ___________ device. a. input b. output c. processing d. storage A 39 The computer to which a user’s computer connects in order to access the Internet is called a _____ a. supercomputer b. notebook c. PDA d. server D 40 Computer software with restrictions on use or private modification is called ___________ software a. proprietary b. open source c. freeware d. none of the above A