Computer Essentials – Exam Review

CHAPTER 1

T/F
1. A procedure consists of step-by-step instructions that tell the computer how to operate. ____

2. Connectivity of computers can be achieved via telephone lines, cable, satellite or wireless devices. _____

3. Output devices translate processed information from the computer into a form that humans can understand.__

4. Audience handouts, speaker notes, and electronic slides are all components of a worksheet file. ____

5. The Internet is like a giant highway that connects you to millions of other people and organizations located throughout the world. _____

M/C

  1. The primary purpose of software is to turn data into what?
  2. Web Sitesb. information c. programsd. objects
  3. Systems software includes all of the following except..
  4. operating systems
  5. device drivers
  6. utilities
  7. desktop publishing
  8. Minicomputers are also known as
  9. midrange computers
  10. personal digital assistants
  11. mainframe computers
  12. laptop computers
  13. A device that connects to a network without the use of cables is said to be
  14. Distributed
  15. Wireless
  16. Centralized
  17. open source

Fill-in

  1. The purpose of is to convert data (unprocessed facts) into information (processed facts).
  2. A(n) is used to navigate, explore, and find information on the Internet.
  3. The keyboard and the are the most common input devices.
  4. Laser technology is used to read disks such as CDs and DVDs.
  5. A(n) is a communications system connecting two or more computers.

Chapter 2

T/F

  1. The most popular Internet activity is shopping.
  2. The connections from one page of information on the World Wide Web to another are called hyperlinks.
  3. Instant messaging and chat groups are the same.
  4. Web auctions are identical to traditional auctions in that the buyers and sellers eventually meet face-to-face.
  5. Copying files from your computer to another computer on the Internet is called uploading.

Short Answer

  1. The extensions .gov, .edu, .mil, and .net are called
  2. The most popular Internet activity is

Fill In

  1. Being on the Web is often described as being .
  2. Unwanted and unsolicited e-mail is referred to as .
  3. engines are programs that automatically submit your search request to several search engines simultaneously.
  4. is an Internet standard that allows you to connect to another computer (host) on the Internet and to log on to that computer as if you were on a terminal in the next room.
  5. are programs that are automatically loaded and operate as a part of your browser.

Chapter 3

T/F

  1. Graphics programs, audio/video editors, multimedia creation programs, Web authoring, and virtual reality programs are examples of general-purpose applications.
  2. The three most widely used word processing programs are Microsoft Word, Corel WordPerfect, and Lotus Word Pro.
  3. Goal seeking is a very powerful and simple tool to test the effects of different assumptions in a spreadsheet.
  4. Presentation graphics software is an excellent tool to communicate a message and to persuade people.
  5. An embedded object is automatically updated when the source document changes.

Short Answer

  1. This type of software is designed to help you be more productive in performing tasks, and is widely used in nearly every discipline and occupation.
  2. Which one of the following would not be one of the most widely used word processing program?
  3. In a spreadsheet, a cell is defined as the _____
  4. Which of the following is the term for a request for specific data contained in a database?
  5. Norton System Works is classified as this type of software suite

Fill In

  1. ______allows you to set a goal and then analyze other parts of the workbook that would need to be adjusted to meet that goal.
  2. Data in a relational database is organized into related _____.
  3. ____ graphics combine a variety of visual objects to create attractive and interesting presentations.
  4. With object ______, a copy of the object from the source file is inserted in a destination file and is automatically updated when the source file changes.
  5. If you create a chart in Excel and use it in a Word document, the Excel workbook is considered the ____ file.

Chapter 4

T/F

  1. Paint programs are mainly used to create and modify vector images.
  2. Interactivity describes how the various parts of a multimedia presentation relate to one another.
  3. Virtual reality simulates real experiences in a computer-controlled environment.
  4. Virtual reality is a great game tool, but has no serious application.
  5. A robot is different from other assembly-line machines because it can be reprogrammed.

Short Answer

  1. One difference between desktop publishing and word processing is
  2. An essential ingredient for effective multimedia presentations incorporates user participation or ____.
  3. The term that describes a user's participation with a multimedia presentation is ____.
  4. A simulated experience generated by computer, like visiting the surface of the sun or experiencing life inside a human blood cell, is called ____.

Fill-In

1. images use geometric shapes or objects that can easily be resized and manipulated.

2. A presentation that contains graphics, video, music, and voice would be an example of a(n) presentation.

3. Historically, computers were used to solve problems, which could be broken down into a series of well-defined steps.

4. Modern virtual reality strives to be a(n) experience, allowing a user to walk into a virtual reality room or view simulations on a virtual reality wall.

5. A(n) system robot can imitate some human senses.

Chapter 5

T/F

  1. A warm boot occurs when the computer is already on, and you restart it without turning off the power.
  2. Linking two or more computers generally requires a network operating system.
  3. Linux is an example of a non-proprietary operating system.
  4. Norton SystemWorks is one of the most widely used utility suites.
  5. McAfee's Internet Security Suite runs a number of programs continually to monitor your computer.

Short Answer

  1. Specialized programs that allow particular input or output devices to communicate with the rest of the computer system are called
  2. "GUI" stands for
  3. Popular network operating systems include all of the following except
  4. If you were trying to locate a lost file on your Macintosh, which application would you use?
  5. Which of the following is a type of utility used to reduce the size of files to increase the amount of available disk space?

Fill-In

  1. ______is the ability to run more than one application at the same time, and switch among the applications.
  2. ______systems are used to connect several computers together.
  3. Windows XP's user interface is called ______.
  4. ______utilities should be used to save copies of important files.
  5. ______is a trouble-shooting utility that identifies and eliminates nonessential files.

Chapter 6

T/F

  1. The CPU is composed of two units: the control unit and the arithmetic control unit.
  2. Serial ports send data one bit at a time and are very good for sending information over long distances.
  3. A microprocessor chip's capacity is often expressed in word size.
  4. Expansions slots are provided on the motherboard so that users can upgrade their computers.
  5. USB is designed to support several external devices without using an expansion card or slots.

Short Answer

  1. The human voice is ______.
  2. ______is the binary coding system used in most microcomputers.
  3. The ______performs logical and mathematical operations.
  4. ______chips hold the program and data that the CPU is presently processing.
  5. Memory that cannot be changed is referred to as______.

Fill-In

  1. Which of the following is smallest? Desktop System Unit, Notebook System Unit, PDA, Tablet PC
  2. Tiny circuit-boards etched onto squares of sandlike material called silicon are called
  3. A 32-bit word computer can access ____ bytes at a time.
  4. This type of memory is commonly called temporary or volatile storage.
  5. A computer's ____ produces precisely timed electrical beats or impulses.

Chapter 7

T/F

  1. The most common keyboard design in use is Dvork.
  2. A mechanical mouse has no moving parts.
  3. Grocery stores use bar-code scanners to read UPCs on products.
  4. HDTV is a television/computer hybrid that delivers a much clearer wide-screen image than traditional television.
  5. Shared laser printers typically support color, are more expensive, and are used by a group of people.

Short Answer

  1. This type of mouse is generally considered the traditional type and is currently the most widely used.
  2. This type of mouse emits and senses light to detect mouse movement.
  3. Which of the following functions most like a copy machine?
  4. Recent versions of Microsoft's Word support
  5. This monitor has a maximum resolution of 1024x768.

Fill-In

  1. A(n) ______mouse uses radio waves or infrared light waves to communicate with the system unit.
  2. Optical-mark recognition (OMR) is also called ______.
  3. ______printers are the most widely used printers because they are reliable, quiet, and relatively inexpensive.
  4. ______devices are a combination of different devices into one unit.
  5. A network terminal is also known as a(n) ______client or network computer.

Chapter 8

Short Answer

  1. Storage that retains its data after the power is turned off is referred to as
  2. Data on a floppy disk is recorded in rings called
  3. One or more metallic platters sealed inside a container inside the system unit describes a(n)
  4. Decreasing the amount of space required to store data and programs is accomplished by
  5. A CD-RW disk when compared to a hard drive is:

Fill in the Blank

  1. ______speed is the measure of the amount of time required by a storage device to retrieve data and programs.
  2. ______refers to how tightly bits can be packed next to one another on a storage medium.
  3. ______increases storage capacity by reducing the amount of space required to store data and programs.
  4. ______memory cards are a form of a solid-state storage device that is widely used in notebook computers.
  5. A ______tape is a unit that allows easy backup of a microcomputer's hard disk.

T/F

  1. A file that is 1600 KB will fit on a traditional floppy disk.
  2. The rings on a disk where the data is recorded are called tracks.
  3. An internal hard disk is a Mylar platter covered with magnetic media and encased in either a hard or soft plastic cover.
  4. The i-drive, or online storage, has the advantage of being low or no cost and flexible to access because it is located on the Internet.
  5. Magnetic tape stores data and programs by altering the electromagnetic charges on a recording surface.

Chapter 9

T/F

  1. Communication systems are electronic systems that transmit data from one location to another.
  2. T1, T2, T3 and T4 lines support all digital communications and provide very high-speed capacity.
  3. Before a message is sent on the Internet, it is broken down into small parts called envelopes.
  4. A network that connects buildings within a city is called a MAN.
  5. The topology of a network is the arrangement of the computers within it.

Fill in the Blank

  1. ______cable is a high-frequency transmission medium that has a solid copper core.

  1. The standard protocol for the Internet is______.

/
In a star network control is maintained by ______.
  1. In ______network systems, the processing power is centralized in one large computer, usually a mainframe.
  2. is the P2P network system that does not use a central server.

Short Answer

  1. Most Web-enabled devices follow a standard known as
  2. A term relating to sending data to a satellite is
  3. The capacity of a communication channel is measured in
  4. A computer network must contain at least this number of computers.
  5. This type of network provides access to regional service providers and typically span distances greater than 100 miles.

Chapter 10

T/F

  1. There is a large market for data collected about individuals.
  2. Privacy of information is primarily a legal issue in the United States.
  3. Viruses are spread from computer to computer through networks and operating systems.
  4. Unauthorized copying of programs for personal gain is a form of theft called service theft.
  5. Ergonomics is the study of making computers fit people.

Fill in the Blanks

  1. ______constitute the biggest category of computer criminals.
  2. ______can help protect your computer against voltage spikes.
  3. ______are secret words or numbers used to gain authorized access to a computer system.
  4. ______security is concerned with protecting software and data from unauthorized tampering or damage.
  5. Among heavy computer users ______tunnel syndrome is a common repetitive motion injury.

Short Answer

  1. The issues that deal with the collection and use of data about individuals is
  2. Privacy is primarily a(n) ______matter.
  3. People who gain unauthorized access to computers for the purpose of doing damage are called ______.
  4. When a hard disk crashes, it is an example of a ____ type of computer security threat.
  5. A ____ acts as a security buffer between a company's private network and all external networks.