CSCI 1101: Introduction to Computers
CSCI 1101: Introduction to Computers
Final Exam
Choose the correct answer.
1. A legal contract that defines the ways in which you may use a computer program is called a(n) software license .
a. software patent
b. software license
c. software scheme
d. none of the above
2. A(n) computer program is a set of instructions that tells a computer how to perform a particular task.
a. control unit
b. computer program
c. output device
d. input device
3. Disk defragmenter is a utility program that locates and eliminates unnecessary fragments and rearranges files and unused disk space to optimize operations.
a. My Computer
b. Disk defragmenter
c. Windows Explorer
d. Backup
4. Word processing software, a computerized golf game, and accounting software are all examples of application software .
a. application software
b. utility software
c. operating systems
d. system software
5. The electronic and mechanical devices that manipulate data are known as hardware . This term refers to the computer and any peripheral devices.
a. system software
b. hardware
c. software
d. peripheral devices
6. Which of the following is considered only as an input device? keyboard
a. monitor
b. floppy disk
c. keyboard
d. printer
7. The Recycle Bin is an icon on the desktop which represents a temporary storage area for deleted files.
a. Internet Explorer
b. My Documents
c. Recycle Bin
d. Windows Explorer
8. Two or more computers connected together to exchange information or share resources is referred to as a(n) network .
a. bus line
b. workgroup
c. webcast
d. network
9. A(n) peripheral device designates equipment that might be added to a computer system to enhance its functionality.
a. user interface
b. peripheral device
c. operating system
d. software
10. The system software that helps the computer control a peripheral device is called a(n) device driver .
a. operating system
b. device driver
c. application software
d. none of the above
11. Output devices translate the processed information from the computer into a form that humans can understand.
a. Input devices
b. Output devices
c. Keyboards
d. all of the above
12. People sometimes illegally copy, distribute, or modify software. The illegal copies they create are referred to as pirated software .
a. pirated software
b. lifted software
c. gunned software
d. none of the above
13. The Binary system consists of two digits. Each 0 and 1 is called a bit
a. byte
b. bit
c. word
d. chip
14. Every component of the system unit connects directly to the motherboard .
a. motherboard
b. fatherboard
c. integrated circuit
d. expansion card
15. CD and DVD storage can be classified as optical storage.
a. optical
b. digital
c. analog
d. magnetic
16. Cookies are specialized programs that are placed on a hard disk that monitor and track the user’s Web activity.
a. Cookies
b. Monitors
c. Trackers
d. Viruses
17. How many bits are there in a byte? 8
a. 20
b. 4
c. 16
d. 8
18. A Computer virus is a potentially damaging computer program that affects, or infects, your computer in a negative way.
a. computer virus
b. hoax
c. snoopware program
d. firewall
19. Random access memory holds currently running programs and data being processed by the CPU.
a. RAM
b. CMOS
c. ROM
d. Read-only memory
20. Antivirus software helps guard your system against “problem programs.” In order for this to be effective, it is important to update virus definitions regularly.
a. Antivirus software
b. Snoopware
c. Spyware
d. Encryption software
21. CD- RW technology allows you to write data on a CD, then change that data at a later time.
a. W
b. R
c. RW
d. All of the above
22. Each type of system unit has the same basic system components including the system board, microprocessor and memory .
a. system cabinet
b. coding schemes
c. memory
d. smart cards
23. Kilobyte is a unit of measurement which represents approximately 1,000 bytes.
a. Terabyte
b. Megabyte
c. Gigabyte
d. Kilobyte
24. RAM is considered volatile storage.
a. RAM
b. CMOS
c. ROM
d. Read-only memory
25. A byte typically represents one character .
a. bit
b. character
c. device
d. electronic pulse
26. RAM is the acronym for random access memory .
a. read only memory
b. read always memory
c. random access memory
d. ready access memory
27. Ports on the expansion cards allow cables to be connected and are used to connect to devices outside of the system unit.
a. RAM
b. expansion cards
c. closed architecture
d. expansion slots
28. Input is data or instructions used by a computer .
a. the images and text displayed on the monitor
b. processed data or information from a computer
c. data or instructions used by a computer
d. the hardware used to translate data into what people can understand
29. One of the most common input devices is keyboard .
a. mouse
b. monitor
c. keyboard
d. printer
30. Pixels are individual dots or picture elements that form images.
a. Resolution
b. Pixels
c. Clarity
d. Pictures
31. The page that identifies a Web site and contains links to other pages in the site is known as the home page.
a. home
b. anchor
c. base
d. site-map
32. Which of the following terms describes approximately 1,000,000 bytes? megabyte
a. gigabyte
b. megabyte
c. kilobyte
d. terabyte
33. CD-ROM stands for compact disk – read only memory .
a. computer disk ready optical medium
b. computer disk random optical memory
c. compact disk random optical medium
d. compact disk read only memory
34. Storage capacity refers to the amount of data that can be stored on a particular storage medium.
a. Resolution
b. Sector size
c. File size
d. Storage capacity
35. The process of preparing a floppy disk for storage is called formatting .
a. formatting
b. disk defragmentation
c. disk compression
d. sectoring
36. A head crash can occur when a read-write head makes contact with the hard disk’s surface or with particles on its surface. .
a. the read-write head makes contact with the hard disk’s surface due to particles on its surface
b. the read-write head makes contact with the hard disk’s surface due to the system unit being jarred while the disk is in motion
c. the computer user lowers their head in frustration and collides with the desk
d. both a and b
37. Optical disks use reflected light. The 1s and 0s are represented by flat areas called lands and bumpy areas called pits.
a. magnetic disks
b. hard disks
c. optical disks
d. all of the above
38. Which of the following, in most cases, has the highest storage capacity? Hard disk
a. DVD
b. floppy disk
c. CD
d. hard disk
39. Specialized programs that assist users in locating information on the Web are called
search engines .
a. web browsers
b. resource locators
c. information engines
d. search engines
40. Browsers provide access to Web resources. Internet Explorer is one example.
a. Search engines
b. Internet service providers
c. Browsers
d. Metasearch engines
41. Hyperlinks may appear as text or a graphic and are connections to other Web documents.
a. Hyperlinks
b. Plug-ins
c. Applets
d. URLs
42. Which of the following could be a symptom of a possible virus? all of the above
a. Your computer reboots unexpectedly
b. Your executable files unaccountably increase in size
c. You have difficulty saving files
d. All of the above
43. A metasearch engine is a program that automatically submits a search request to several search engines simultaneously.
a. specialty engine
b. browser
c. metasearch engine
d. plug-in
44. Plug-ins are programs that are automatically loaded and operate as a part of your browser.
a. specialty engine
b. metasearch engine
c. browser
d. plug-in
45. reading is the process of accessing information from secondary storage devices.
a. Reading
b. Writing
c. Saving
d. None of the above
46. The write-protect notch is used to both b and c .
a. keep someone from accessing the files saved on the floppy
b. keep someone from modifying existing files on the floppy
c. keep someone from saving new files to the floppy
d. both b and c
e. all of the above
47. A toggle key will turn a feature on and off .
a. turn a feature on and off
b. activate commands
c. disable the keyboard
d. change the character
48. A type of mouse that emits light to detect movement is referred to as optical .
a. visual
b. optical
c. mechanical
d. lateral
49. Output is processed information .
a. a last revision
b. processed information
c. character strings
d. coded image sets
50. Magnetic tape stores and retrieves information using sequential access .
a. direct access
b. raid array
c. sequential access
d. mathematically
51. The time between when a computer requests data from a secondary storage device and the transfer of the data is called access time .
a. access time
b. down time
c. lag time
d. forward speed
52. The modulator/demodulator is more commonly referred to as modem .
a. adapter
b. converter
c. modem
d. pixel
53. Every device that is connected to the Internet is assigned a unique number called a(n) IP address.
a. TCP
b. HTTP
c. protocol
d. IP
54. A(n) ISP is a company that maintains Internet computers and telecommunications equipment in order to provide Internet access to businesses, organizations, and individuals.
a. DSS
b. DSL
c. ISDN
d. ISP
55. A(n) browser is a software program that runs on your computer and helps you access Web pages.
a. explorer
b. browser
c. navigator
d. manager
56. Any file that travels with an e-mail message is called an e-mail attachment .
a. attachment
b. key
c. ASCII
d. text file
57. A microprocessor is an integrated circuit designed to process instructions.
a. cache
b. microprocessor
c. serial port
d. network port
58. A user interface can be defined as the combination of hardware and software that helps people and computers communicate with each other.
a. buffer
b. interface
c. index
d. montage
59. The Windows Explorer utility allows you to view a list of files, move them to different storage devices, copy them, rename them, and delete them.
a. Control Panel
b. Disk Manager
c. Windows Explorer
d. Help
60. The floppy disk drive is usually assigned the device letter A .
a. A
b. B
c. C
d. F
61. In the file specification, C:\My Files\English\Report 1.doc, Report 1 is the filename
a. drive letter
b. primary folder
c. filename
d. extension
62. Using the Ctrl key as you click each item works well to select files that are not listed consecutively.
a. Shift
b. Alt
c. F1
d. Ctrl
63. Fiber-optic cable is a bundle of extremely thin tubes of glass.
a. UTP
b. STP
c. Coaxial
d. Fiber-optic
64. A(n) graphical user interface features menus and icons that you can manipulate with the click of a mouse.
a. command-line
b. graphical user
c. buffer
d. indexed
65. A(n) expansion slot is a long, narrow socket on the motherboard into which you can plug a(n) expansion card.
a. expansion slot
b. expansion card
c. peripheral device
d. data bus
66. Software controlling the computer’s use of disk storage and memory is an operating system .
a. Application software
b. Gaming software
c. An operating system
d. None of the above
67. Data pathways that link parts of the CPU together and to other components on the system board are called bus lines .
a. Bus lines
b. Controller cards
c. Expansion slots
d. Expansion ports
68. A small circuit board which provides a computer with the ability to control a storage, input, or output device is referred to as a(n) expansion card .
a. device driver
b. expansion card
c. peripheral device
d. data bus
69. A type of security system designed to protect an organization’s network against external threats is referred to as a firewall .
a. flash wire
b. portal block
c. lock box
d. firewall
70. The bandwidth is a term used as a measure of a communication channels capacity.
a. lapse time
b. cable strength
c. bandwidth
d. seek time
71. The address of a web page is referred to as URL .
a. TCP
b. URL
c. Id-10
d. PBI
72. The somewhat false sense of security we have when using the Internet is called Illusion of Anonymity .
a. Veil of Silence
b. Illusion of Anonymity
c. Cloud of Coverage
d. Smoke and Mirrors
73. Fitting the job to the worker rather than forcing the worker to fit the job is known as ergonomics .
a. ergonomics
b. economics
c. enviromatics
d. ectographics
74. Users pose the biggest threat to computers and information.
a. Users
b. Consultants
c. Hackers
d. Programmers
75. In general, job opportunities in the information technology area are projected to greatly increase .
a. greatly increase
b. greatly decrease
c. stay about the same
d. have no impact on employment
................
................
In order to avoid copyright disputes, this page is only a partial summary.
To fulfill the demand for quickly locating and searching documents.
It is intelligent file search solution for home and business.
Related searches
- introduction to computers lecture notes
- introduction to computers notes pdf
- introduction to computers pdf download
- introduction to computers pdf books
- introduction to computers textbook pdf
- introduction to computers pdf
- introduction to computers tutorial pdf
- introduction to computers book download
- basic introduction to computers pdf
- introduction to computers textbook
- introduction to computers book pdf
- introduction to computers book