Computer Essentials – Exam Review
CHAPTER 1
T/F
1. A procedure consists of step-by-step instructions that tell the computer how to operate. ____
2. Connectivity of computers can be achieved via telephone lines, cable, satellite or wireless devices. _____
3. Output devices translate processed information from the computer into a form that humans can understand.__
4. Audience handouts, speaker notes, and electronic slides are all components of a worksheet file. ____
5. The Internet is like a giant highway that connects you to millions of other people and organizations located throughout the world. _____
M/C
- The primary purpose of software is to turn data into what?
- Web Sitesb. information c. programsd. objects
- Systems software includes all of the following except..
- operating systems
- device drivers
- utilities
- desktop publishing
- Minicomputers are also known as
- midrange computers
- personal digital assistants
- mainframe computers
- laptop computers
- A device that connects to a network without the use of cables is said to be
- Distributed
- Wireless
- Centralized
- open source
Fill-in
- The purpose of is to convert data (unprocessed facts) into information (processed facts).
- A(n) is used to navigate, explore, and find information on the Internet.
- The keyboard and the are the most common input devices.
- Laser technology is used to read disks such as CDs and DVDs.
- A(n) is a communications system connecting two or more computers.
Chapter 2
T/F
- The most popular Internet activity is shopping.
- The connections from one page of information on the World Wide Web to another are called hyperlinks.
- Instant messaging and chat groups are the same.
- Web auctions are identical to traditional auctions in that the buyers and sellers eventually meet face-to-face.
- Copying files from your computer to another computer on the Internet is called uploading.
Short Answer
- The extensions .gov, .edu, .mil, and .net are called
- The most popular Internet activity is
Fill In
- Being on the Web is often described as being .
- Unwanted and unsolicited e-mail is referred to as .
- engines are programs that automatically submit your search request to several search engines simultaneously.
- is an Internet standard that allows you to connect to another computer (host) on the Internet and to log on to that computer as if you were on a terminal in the next room.
- are programs that are automatically loaded and operate as a part of your browser.
Chapter 3
T/F
- Graphics programs, audio/video editors, multimedia creation programs, Web authoring, and virtual reality programs are examples of general-purpose applications.
- The three most widely used word processing programs are Microsoft Word, Corel WordPerfect, and Lotus Word Pro.
- Goal seeking is a very powerful and simple tool to test the effects of different assumptions in a spreadsheet.
- Presentation graphics software is an excellent tool to communicate a message and to persuade people.
- An embedded object is automatically updated when the source document changes.
Short Answer
- This type of software is designed to help you be more productive in performing tasks, and is widely used in nearly every discipline and occupation.
- Which one of the following would not be one of the most widely used word processing program?
- In a spreadsheet, a cell is defined as the _____
- Which of the following is the term for a request for specific data contained in a database?
- Norton System Works is classified as this type of software suite
Fill In
- ______allows you to set a goal and then analyze other parts of the workbook that would need to be adjusted to meet that goal.
- Data in a relational database is organized into related _____.
- ____ graphics combine a variety of visual objects to create attractive and interesting presentations.
- With object ______, a copy of the object from the source file is inserted in a destination file and is automatically updated when the source file changes.
- If you create a chart in Excel and use it in a Word document, the Excel workbook is considered the ____ file.
Chapter 4
T/F
- Paint programs are mainly used to create and modify vector images.
- Interactivity describes how the various parts of a multimedia presentation relate to one another.
- Virtual reality simulates real experiences in a computer-controlled environment.
- Virtual reality is a great game tool, but has no serious application.
- A robot is different from other assembly-line machines because it can be reprogrammed.
Short Answer
- One difference between desktop publishing and word processing is
- An essential ingredient for effective multimedia presentations incorporates user participation or ____.
- The term that describes a user's participation with a multimedia presentation is ____.
- A simulated experience generated by computer, like visiting the surface of the sun or experiencing life inside a human blood cell, is called ____.
Fill-In
1. images use geometric shapes or objects that can easily be resized and manipulated.
2. A presentation that contains graphics, video, music, and voice would be an example of a(n) presentation.
3. Historically, computers were used to solve problems, which could be broken down into a series of well-defined steps.
4. Modern virtual reality strives to be a(n) experience, allowing a user to walk into a virtual reality room or view simulations on a virtual reality wall.
5. A(n) system robot can imitate some human senses.
Chapter 5
T/F
- A warm boot occurs when the computer is already on, and you restart it without turning off the power.
- Linking two or more computers generally requires a network operating system.
- Linux is an example of a non-proprietary operating system.
- Norton SystemWorks is one of the most widely used utility suites.
- McAfee's Internet Security Suite runs a number of programs continually to monitor your computer.
Short Answer
- Specialized programs that allow particular input or output devices to communicate with the rest of the computer system are called
- "GUI" stands for
- Popular network operating systems include all of the following except
- If you were trying to locate a lost file on your Macintosh, which application would you use?
- Which of the following is a type of utility used to reduce the size of files to increase the amount of available disk space?
Fill-In
- ______is the ability to run more than one application at the same time, and switch among the applications.
- ______systems are used to connect several computers together.
- Windows XP's user interface is called ______.
- ______utilities should be used to save copies of important files.
- ______is a trouble-shooting utility that identifies and eliminates nonessential files.
Chapter 6
T/F
- The CPU is composed of two units: the control unit and the arithmetic control unit.
- Serial ports send data one bit at a time and are very good for sending information over long distances.
- A microprocessor chip's capacity is often expressed in word size.
- Expansions slots are provided on the motherboard so that users can upgrade their computers.
- USB is designed to support several external devices without using an expansion card or slots.
Short Answer
- The human voice is ______.
- ______is the binary coding system used in most microcomputers.
- The ______performs logical and mathematical operations.
- ______chips hold the program and data that the CPU is presently processing.
- Memory that cannot be changed is referred to as______.
Fill-In
- Which of the following is smallest? Desktop System Unit, Notebook System Unit, PDA, Tablet PC
- Tiny circuit-boards etched onto squares of sandlike material called silicon are called
- A 32-bit word computer can access ____ bytes at a time.
- This type of memory is commonly called temporary or volatile storage.
- A computer's ____ produces precisely timed electrical beats or impulses.
Chapter 7
T/F
- The most common keyboard design in use is Dvork.
- A mechanical mouse has no moving parts.
- Grocery stores use bar-code scanners to read UPCs on products.
- HDTV is a television/computer hybrid that delivers a much clearer wide-screen image than traditional television.
- Shared laser printers typically support color, are more expensive, and are used by a group of people.
Short Answer
- This type of mouse is generally considered the traditional type and is currently the most widely used.
- This type of mouse emits and senses light to detect mouse movement.
- Which of the following functions most like a copy machine?
- Recent versions of Microsoft's Word support
- This monitor has a maximum resolution of 1024x768.
Fill-In
- A(n) ______mouse uses radio waves or infrared light waves to communicate with the system unit.
- Optical-mark recognition (OMR) is also called ______.
- ______printers are the most widely used printers because they are reliable, quiet, and relatively inexpensive.
- ______devices are a combination of different devices into one unit.
- A network terminal is also known as a(n) ______client or network computer.
Chapter 8
Short Answer
- Storage that retains its data after the power is turned off is referred to as
- Data on a floppy disk is recorded in rings called
- One or more metallic platters sealed inside a container inside the system unit describes a(n)
- Decreasing the amount of space required to store data and programs is accomplished by
- A CD-RW disk when compared to a hard drive is:
Fill in the Blank
- ______speed is the measure of the amount of time required by a storage device to retrieve data and programs.
- ______refers to how tightly bits can be packed next to one another on a storage medium.
- ______increases storage capacity by reducing the amount of space required to store data and programs.
- ______memory cards are a form of a solid-state storage device that is widely used in notebook computers.
- A ______tape is a unit that allows easy backup of a microcomputer's hard disk.
T/F
- A file that is 1600 KB will fit on a traditional floppy disk.
- The rings on a disk where the data is recorded are called tracks.
- An internal hard disk is a Mylar platter covered with magnetic media and encased in either a hard or soft plastic cover.
- The i-drive, or online storage, has the advantage of being low or no cost and flexible to access because it is located on the Internet.
- Magnetic tape stores data and programs by altering the electromagnetic charges on a recording surface.
Chapter 9
T/F
- Communication systems are electronic systems that transmit data from one location to another.
- T1, T2, T3 and T4 lines support all digital communications and provide very high-speed capacity.
- Before a message is sent on the Internet, it is broken down into small parts called envelopes.
- A network that connects buildings within a city is called a MAN.
- The topology of a network is the arrangement of the computers within it.
Fill in the Blank
- ______cable is a high-frequency transmission medium that has a solid copper core.
- The standard protocol for the Internet is______.
/
In a star network control is maintained by ______.
- In ______network systems, the processing power is centralized in one large computer, usually a mainframe.
- is the P2P network system that does not use a central server.
Short Answer
- Most Web-enabled devices follow a standard known as
- A term relating to sending data to a satellite is
- The capacity of a communication channel is measured in
- A computer network must contain at least this number of computers.
- This type of network provides access to regional service providers and typically span distances greater than 100 miles.
Chapter 10
T/F
- There is a large market for data collected about individuals.
- Privacy of information is primarily a legal issue in the United States.
- Viruses are spread from computer to computer through networks and operating systems.
- Unauthorized copying of programs for personal gain is a form of theft called service theft.
- Ergonomics is the study of making computers fit people.
Fill in the Blanks
- ______constitute the biggest category of computer criminals.
- ______can help protect your computer against voltage spikes.
- ______are secret words or numbers used to gain authorized access to a computer system.
- ______security is concerned with protecting software and data from unauthorized tampering or damage.
- Among heavy computer users ______tunnel syndrome is a common repetitive motion injury.
Short Answer
- The issues that deal with the collection and use of data about individuals is
- Privacy is primarily a(n) ______matter.
- People who gain unauthorized access to computers for the purpose of doing damage are called ______.
- When a hard disk crashes, it is an example of a ____ type of computer security threat.
- A ____ acts as a security buffer between a company's private network and all external networks.