PracticeExam PDF
PracticeExam PDF
2. Software that allows the application software to interact with the computer is called _________
A. device driver
B. application software
C. system software
D. utility program
A. operating system
B. device drivers
C. utility programs
D. application software
4. A __________ is a named collection of data or a program that exists in a computer's secondary
storage.
A. utility
B. driver
C. buffer
D. file
5. User-interface features use _________ to facilitate a person's interaction with the computer.
A. graphics
B. systems software
C. application software
D. utilities
6. Keys found on the top or the left of the keyboard that are used to execute commands specific
to the software being used are called __________.
A. macros
B. function keys
C. templates
D. arrows
7. Small pictures that are used with GUIs to represent programs, data files, or procedures are
called __________.
A. icons
B. menus
C. desktops
D. frames
8. Menus and icons representing frequently used options and commands are displayed across
the top of a\the display window in an area known as the __________.
A. taskbar
B. toolbar
C. function bar
D. desktop
TRUE FALSE
10. Backup, data recovery, virus protection, disk cleanup, and data compression are utility
programs.
TRUE FALSE
11. Computer keyboards have special-purpose keys that are used to enter, delete, and edit data
and to execute commands.
TRUE FALSE
12. A rollover feature provides a small box explaining an icon's function when the mouse pointer
is rolled over the icon.
TRUE FALSE
TRUE FALSE
FALSE TRUE
16. The tiny piece of silicon that houses millions of microminiature electronic circuits is called a
__________.
A. conductor
B. chip
C. unit
D. transistor
17. The two digits used in the binary system are __________.
A. 0 and -1
B. 0 and 1
C. 1 and 2
D. -1 and 1
19. One billion cycles (ticks) of the system clock per second equal 1 __________.
A. megahertz
B. gigahertz
C. kilohertz
D. hertz
20. Electrical data roadways through which bits are transmitted within the CPU and other
components of the motherboard are called _________.
A. cables
B. buses
C. ports
D. signals
21. Which port is used to transmit slow data over long distances?
A. serial
B. parallel
C. USB
D. SCSI
.
22. Which of these is a hard-disk technology for large computer systems?
A. RAID
B. SCSI
C. EIDE
D. VFAT
B. volatile
C. primary
D. ROM
24. A circuit is a closed path followed or capable of being followed by an electric current.
TRUE FALSE
25. A tiny electrically operated switch that can turn on and off many millions of times per second
is a microchip.
FALSE TRUE
.
26. A microprocessor contains the miniaturized circuitry of a computer processor.
TRUE FALSE
27. All data and instructions that go into a computer, are processed by it, and come out of it are
represented as binary numbers signaling only two states: on and off.
TRUE FALSE
TRUE FALSE
31. Unicode uses 2 bytes for each character, rather than 1 byte; ASCII uses 1 byte.
TRUE FALSE
.
32 What are devices called that translate data into a form the computer can process
A. input hardware
B. output hardware
C. printer
D. storage hardware
A. light pen
B. webcam
C. scanner
D. monitor
B. printer
C. microphone
D. speaker
Microphones are input devices.
35. Which of these pointing devices is used most often on microcomputers?
A. touchpad
B. mouse
C. stylus
D. joy stick
A. PC
B. laptop
C. mainframe
D. workstation
37. What do you call a video display screen that can receive input from the touch of a finger?
A. digitizer
B. touchpad
C. touch screen
D. virtual screen
38. Which device uses light-sensing (optical) equipment to convert images of text, drawings, and
photos into digital form?
A. light pen
B. scanner
C. digitizer
D. pointing stick
39. A webcam can be used to send a document to another location over the Internet.
FALSE TRUE
40. Information technology includes technologies that measure and analyze human body
characteristics for the purpose of maintaining security.
TRUE FALSE
TRUE FALSE
42. One of the trends of future input technology is the increased use of source data entry.
TRUE FALSE
43. Data that is displayed on a screen or stored on a disk is called a hardcopy.
FALSE TRUE
44. Video cards (also graphics cards, video adapters) are the devices that display images on
the screen. They have their own memory called video RAM, or VRAM.
TRUE FALSE
45. Thermal printers are often used to print cash register receipts.
TRUE FALSE
46. What wired communications medium consists of dozens or hundreds of thin strands of glass
plastic?
A. twisted-pair
B. coaxial
C. fiber-optic
D. straight wire
47. A ________ is a fixed-length block of data for transmission.
A. node
B. protocol
C. packet
D. backbone
48. In the ________ network topology, communications devices are connected to a single cable
with two endpoints.
A. ring
B. bus
C. star
D. peer-to-peer
49. To create larger networks, a bridge connects the same types of networks, and a ________
connects dissimilar networks.
A. router
B. gateway
C. hub
D. host
A. a company intranet
B. a company extranet
C. a company LAN
D. any of these
51. A network that operates without relying on a server is the ________ network.
A. peer-to-peer
B. client/server
C. host-to-host
D. master/slave
52. A network that covers a wide geographical area is called a ________.
A. LAN
B. WAN
C. MAN
D. HAN
53. A ________ is a system of interconnected computers, telephones, or communications devices
that can communicate and share resources.
A. terminal
B. router
C. network
D. server
54. The ________ is a device that converts digital computer signals into analog signals so that they
can be sent over a telephone line.
A. printer
B. scanner
C. modem
D. digitizer
55. Each zero and one signal represents a ________.
A. bit
B. byte
C. kilobyte
D. megabyte
56. Impact printers are the only desktop printers that can use multilayered forms to print many
copies at once.
TRUE FALSE
FALSE TRUE
58. Ergonomics involves the relationship between workers and their environments, including
workers' health.
TRUE FALSE
Virtual private networks (VPNs) are private networks that use a public network (usually the
59. Internet) instead of private, leased (expensive) lines to connect remote sites.
TRUE FALSE
60. In a network, communications protocols specify the type of electrical connections, the timing
of message exchanges, and error-detection techniques.
TRUE FALSE
62. The two general classes of bandwidth are long and short.
FALSE TRUE
63. Because of the excellence of satellite technology, GPS location IDs are 100% accurate.
FALSE TRUE
TRUE FALSE
65. Which of these is NOT a level of the data storage hierarchy?
A. bit
B. byte
C. record
D. metadata
A. main field
B. primary field
C. high field
D. key field
67. Wi-Fi connections are always secure; no one can steal your data when you are online.
FALSE TRUE
68. What is the software that controls the structure of a database and access to the data?
A. characters
B. tables
C. fields
D. records
A. characters
B. tables
C. fields
D. files
72. Sending emails that appear to come from a trusted source, which direct you to a website
where you're asked to reveal personal information is called _________.
C. phishing
D. pharming
73. Which of the following is NOT a method in which a security system tries to authenticate a
user's identity?
74. _______ is a system of safeguards for protecting information technology against disasters,
system failures, and unauthorized access.
A. WAP
B. File sharing
C. Security
D. DDoS
75. Which of the following is NOT a function of the U.S. Computer Emergency Response Team
(CERT)?
76. In 2009 a cracker stole more than 500,000 patient records from a state-run database and
demanded ransom for the return of the records. This crime is called ________.
B. dirty-data entry
C. theft of software
D. theft of information
77. A software bug is an error in a program that causes it not to work properly.
TRUE FALSE
TRUE FALSE
FALSE TRUE
80. When people at work play online games or do online shopping on their employer's time, this is
called theft of information.
FALSE TRUE
81. Internet users purchasing products on the Internet should enter private information only on
sites that show a padlock icon at the top or bottom of the page, which indicates that
encryption technology is being used.
TRUE FALSE
A. worm
B. virus
C. Trojan horse
D. denial-of-service attack
83. What short-distance wireless standard is used to link cell phones, computers, and peripherals
at distances of up to about 33 feet?
A. Bluetooth
B. Wi-Fi
C. HomeRF
D. WISP
A. broadcast radio
B. infrared radio
C. GPS
D. microwave radio
85. What set of rules is used to link nearly all mobile devices to a telecommunications carrier's
wireless network and content providers?
A. LAN
B. WAN
C. WAP
D. HAN
86. A type of wired communications technology used to connect equipment in a home network is
the following:
A. Ethernet
B. HomePNA
C. HomePlug
D. any of these
87. What kind of topology (layout) is used by a network that connects all its computers and
communications devices to a central server?
A. ring
B. bus
C. star
D. peer-to-peer
88. Which of these is NOT a network topology?
A. ring
B. bus
C. hub
D. star
89. A(n) ________ is a system of hardware and/or software that protects a computer or a network
from intruders.
A. VPN
B. intranet
C. firewall
D. protocol
90. A virtual private network may include _______
A. a company intranet
B. a company extranet
C. a company LAN
D. any of these