CSCI 1101: Introduction to Computers



CSCI 1101: Introduction to Computers

Final Exam

Choose the correct answer.

1. A legal contract that defines the ways in which you may use a computer program is called a(n) software license .

a. software patent

b. software license

c. software scheme

d. none of the above

2. A(n) computer program is a set of instructions that tells a computer how to perform a particular task.

a. control unit

b. computer program

c. output device

d. input device

3. Disk defragmenter is a utility program that locates and eliminates unnecessary fragments and rearranges files and unused disk space to optimize operations.

a. My Computer

b. Disk defragmenter

c. Windows Explorer

d. Backup

4. Word processing software, a computerized golf game, and accounting software are all examples of application software .

a. application software

b. utility software

c. operating systems

d. system software

5. The electronic and mechanical devices that manipulate data are known as hardware . This term refers to the computer and any peripheral devices.

a. system software

b. hardware

c. software

d. peripheral devices

6. Which of the following is considered only as an input device? keyboard

a. monitor

b. floppy disk

c. keyboard

d. printer

7. The Recycle Bin is an icon on the desktop which represents a temporary storage area for deleted files.

a. Internet Explorer

b. My Documents

c. Recycle Bin

d. Windows Explorer

8. Two or more computers connected together to exchange information or share resources is referred to as a(n) network .

a. bus line

b. workgroup

c. webcast

d. network

9. A(n) peripheral device designates equipment that might be added to a computer system to enhance its functionality.

a. user interface

b. peripheral device

c. operating system

d. software

10. The system software that helps the computer control a peripheral device is called a(n) device driver .

a. operating system

b. device driver

c. application software

d. none of the above

11. Output devices translate the processed information from the computer into a form that humans can understand.

a. Input devices

b. Output devices

c. Keyboards

d. all of the above

12. People sometimes illegally copy, distribute, or modify software. The illegal copies they create are referred to as pirated software .

a. pirated software

b. lifted software

c. gunned software

d. none of the above

13. The Binary system consists of two digits. Each 0 and 1 is called a bit

a. byte

b. bit

c. word

d. chip

14. Every component of the system unit connects directly to the motherboard .

a. motherboard

b. fatherboard

c. integrated circuit

d. expansion card

15. CD and DVD storage can be classified as optical storage.

a. optical

b. digital

c. analog

d. magnetic

16. Cookies are specialized programs that are placed on a hard disk that monitor and track the user’s Web activity.

a. Cookies

b. Monitors

c. Trackers

d. Viruses

17. How many bits are there in a byte? 8

a. 20

b. 4

c. 16

d. 8

18. A Computer virus is a potentially damaging computer program that affects, or infects, your computer in a negative way.

a. computer virus

b. hoax

c. snoopware program

d. firewall

19. Random access memory holds currently running programs and data being processed by the CPU.

a. RAM

b. CMOS

c. ROM

d. Read-only memory

20. Antivirus software helps guard your system against “problem programs.” In order for this to be effective, it is important to update virus definitions regularly.

a. Antivirus software

b. Snoopware

c. Spyware

d. Encryption software

21. CD- RW technology allows you to write data on a CD, then change that data at a later time.

a. W

b. R

c. RW

d. All of the above

22. Each type of system unit has the same basic system components including the system board, microprocessor and memory .

a. system cabinet

b. coding schemes

c. memory

d. smart cards

23. Kilobyte is a unit of measurement which represents approximately 1,000 bytes.

a. Terabyte

b. Megabyte

c. Gigabyte

d. Kilobyte

24. RAM is considered volatile storage.

a. RAM

b. CMOS

c. ROM

d. Read-only memory

25. A byte typically represents one character .

a. bit

b. character

c. device

d. electronic pulse

26. RAM is the acronym for random access memory .

a. read only memory

b. read always memory

c. random access memory

d. ready access memory

27. Ports on the expansion cards allow cables to be connected and are used to connect to devices outside of the system unit.

a. RAM

b. expansion cards

c. closed architecture

d. expansion slots

28. Input is data or instructions used by a computer .

a. the images and text displayed on the monitor

b. processed data or information from a computer

c. data or instructions used by a computer

d. the hardware used to translate data into what people can understand

29. One of the most common input devices is keyboard .

a. mouse

b. monitor

c. keyboard

d. printer

30. Pixels are individual dots or picture elements that form images.

a. Resolution

b. Pixels

c. Clarity

d. Pictures

31. The page that identifies a Web site and contains links to other pages in the site is known as the home page.

a. home

b. anchor

c. base

d. site-map

32. Which of the following terms describes approximately 1,000,000 bytes? megabyte

a. gigabyte

b. megabyte

c. kilobyte

d. terabyte

33. CD-ROM stands for compact disk – read only memory .

a. computer disk ready optical medium

b. computer disk random optical memory

c. compact disk random optical medium

d. compact disk read only memory

34. Storage capacity refers to the amount of data that can be stored on a particular storage medium.

a. Resolution

b. Sector size

c. File size

d. Storage capacity

35. The process of preparing a floppy disk for storage is called formatting .

a. formatting

b. disk defragmentation

c. disk compression

d. sectoring

36. A head crash can occur when a read-write head makes contact with the hard disk’s surface or with particles on its surface. .

a. the read-write head makes contact with the hard disk’s surface due to particles on its surface

b. the read-write head makes contact with the hard disk’s surface due to the system unit being jarred while the disk is in motion

c. the computer user lowers their head in frustration and collides with the desk

d. both a and b

37. Optical disks use reflected light. The 1s and 0s are represented by flat areas called lands and bumpy areas called pits.

a. magnetic disks

b. hard disks

c. optical disks

d. all of the above

38. Which of the following, in most cases, has the highest storage capacity? Hard disk

a. DVD

b. floppy disk

c. CD

d. hard disk

39. Specialized programs that assist users in locating information on the Web are called

search engines .

a. web browsers

b. resource locators

c. information engines

d. search engines

40. Browsers provide access to Web resources. Internet Explorer is one example.

a. Search engines

b. Internet service providers

c. Browsers

d. Metasearch engines

41. Hyperlinks may appear as text or a graphic and are connections to other Web documents.

a. Hyperlinks

b. Plug-ins

c. Applets

d. URLs

42. Which of the following could be a symptom of a possible virus? all of the above

a. Your computer reboots unexpectedly

b. Your executable files unaccountably increase in size

c. You have difficulty saving files

d. All of the above

43. A metasearch engine is a program that automatically submits a search request to several search engines simultaneously.

a. specialty engine

b. browser

c. metasearch engine

d. plug-in

44. Plug-ins are programs that are automatically loaded and operate as a part of your browser.

a. specialty engine

b. metasearch engine

c. browser

d. plug-in

45. reading is the process of accessing information from secondary storage devices.

a. Reading

b. Writing

c. Saving

d. None of the above

46. The write-protect notch is used to both b and c .

a. keep someone from accessing the files saved on the floppy

b. keep someone from modifying existing files on the floppy

c. keep someone from saving new files to the floppy

d. both b and c

e. all of the above

47. A toggle key will turn a feature on and off .

a. turn a feature on and off

b. activate commands

c. disable the keyboard

d. change the character

48. A type of mouse that emits light to detect movement is referred to as optical .

a. visual

b. optical

c. mechanical

d. lateral

49. Output is processed information .

a. a last revision

b. processed information

c. character strings

d. coded image sets

50. Magnetic tape stores and retrieves information using sequential access .

a. direct access

b. raid array

c. sequential access

d. mathematically

51. The time between when a computer requests data from a secondary storage device and the transfer of the data is called access time .

a. access time

b. down time

c. lag time

d. forward speed

52. The modulator/demodulator is more commonly referred to as modem .

a. adapter

b. converter

c. modem

d. pixel

53. Every device that is connected to the Internet is assigned a unique number called a(n) IP address.

a. TCP

b. HTTP

c. protocol

d. IP

54. A(n) ISP is a company that maintains Internet computers and telecommunications equipment in order to provide Internet access to businesses, organizations, and individuals.

a. DSS

b. DSL

c. ISDN

d. ISP

55. A(n) browser is a software program that runs on your computer and helps you access Web pages.

a. explorer

b. browser

c. navigator

d. manager

56. Any file that travels with an e-mail message is called an e-mail attachment .

a. attachment

b. key

c. ASCII

d. text file

57. A microprocessor is an integrated circuit designed to process instructions.

a. cache

b. microprocessor

c. serial port

d. network port

58. A user interface can be defined as the combination of hardware and software that helps people and computers communicate with each other.

a. buffer

b. interface

c. index

d. montage

59. The Windows Explorer utility allows you to view a list of files, move them to different storage devices, copy them, rename them, and delete them.

a. Control Panel

b. Disk Manager

c. Windows Explorer

d. Help

60. The floppy disk drive is usually assigned the device letter A .

a. A

b. B

c. C

d. F

61. In the file specification, C:\My Files\English\Report 1.doc, Report 1 is the filename

a. drive letter

b. primary folder

c. filename

d. extension

62. Using the Ctrl key as you click each item works well to select files that are not listed consecutively.

a. Shift

b. Alt

c. F1

d. Ctrl

63. Fiber-optic cable is a bundle of extremely thin tubes of glass.

a. UTP

b. STP

c. Coaxial

d. Fiber-optic

64. A(n) graphical user interface features menus and icons that you can manipulate with the click of a mouse.

a. command-line

b. graphical user

c. buffer

d. indexed

65. A(n) expansion slot is a long, narrow socket on the motherboard into which you can plug a(n) expansion card.

a. expansion slot

b. expansion card

c. peripheral device

d. data bus

66. Software controlling the computer’s use of disk storage and memory is an operating system .

a. Application software

b. Gaming software

c. An operating system

d. None of the above

67. Data pathways that link parts of the CPU together and to other components on the system board are called bus lines .

a. Bus lines

b. Controller cards

c. Expansion slots

d. Expansion ports

68. A small circuit board which provides a computer with the ability to control a storage, input, or output device is referred to as a(n) expansion card .

a. device driver

b. expansion card

c. peripheral device

d. data bus

69. A type of security system designed to protect an organization’s network against external threats is referred to as a firewall .

a. flash wire

b. portal block

c. lock box

d. firewall

70. The bandwidth is a term used as a measure of a communication channels capacity.

a. lapse time

b. cable strength

c. bandwidth

d. seek time

71. The address of a web page is referred to as URL .

a. TCP

b. URL

c. Id-10

d. PBI

72. The somewhat false sense of security we have when using the Internet is called Illusion of Anonymity .

a. Veil of Silence

b. Illusion of Anonymity

c. Cloud of Coverage

d. Smoke and Mirrors

73. Fitting the job to the worker rather than forcing the worker to fit the job is known as ergonomics .

a. ergonomics

b. economics

c. enviromatics

d. ectographics

74. Users pose the biggest threat to computers and information.

a. Users

b. Consultants

c. Hackers

d. Programmers

75. In general, job opportunities in the information technology area are projected to greatly increase .

a. greatly increase

b. greatly decrease

c. stay about the same

d. have no impact on employment

................
................

In order to avoid copyright disputes, this page is only a partial summary.

Google Online Preview   Download