Quiz

Top of Form

Information

Expand the following acronyms. Do not define the terms. Just indicate what word(s) corresponds to eachletter. Your response must be completely correct to earn the point. Spelling counts.

Question 1 (1 point)

CPU

Question 2 (1 point)

ALU

Question 3 (1 point)

RAM

Question 4 (1 point)

ROM

Question 5 (1 point)

GHz

Question 6 (1 point)

Mb

Question 7 (1 point)

RFID

Question 8 (1 point)

ISP

Question 9 (1 point)

LAN

Question 10 (1 point)

VoIP

Information

Select the one best answer for each of the following questions.

Question 11 (1 point)

The term ____ refers to the programs or instructions used to tell the computerexactly what to do.

Hardware
adapter
software
data

Question 12 (1 point)

____ consists of programs designed to allow people to perform specific tasks using a computer, such as creating letters, preparing budgets, and managing inventory.

Cloud storage
HTML
Java Script
Application software

Question 13 (1 point)

RAM houses data temporarily and a hard drive houses data permanently.

True
False

Question 14 (1 point)

A ____ is a place to store something temporarily.

cache
sector
track
cylinder

Question 15 (1 point)

____ optical discs can be recorded on, erased, and overwritten just like magnetic disks.

Erasable
Re-readable
Rewritable
Recordable

Question 16 (1 point)

Volatile data refers to data stored on a device’s storage medium that will still be there after you have powered off and on your device.

True
False

Question 17 (1 point)

One of the most common 2D barcodes, the ____ code represents data with a matrix of small squares.

ISBN
QR
UPC
RFID

Question 18 (1 point)

____ are used to input data about a person into a computer system so that the individual can be identified based on a particular unique physiological characteristic.

Bioimetrix readers
RFID tags
MICR readers
OMRs

Question 19 (1 point)

A ____ is the smallest colorable area on a display device.

bit
dot
pixel

Question 20 (1 point)

Print speed is typically measured in ____.

dps
ppm
cps

Question 21 (1 point)

Lisa needs to make sure that the computer that she is using has a ____ attached to it for her to be able to hear music and the sounds of a computer game.

microphone
scanner
touch screen
speaker

Question 22 (1 point)

Folders can contain both files and other folders

True
False

Question 23 (1 point)

____ software consists of the operating system and utility programs that control a computer system and allow you to use your computer.

Application
System
Word processing
Database

Question 24 (1 point)

Small programs called ____ are used to communicate with peripheral devices, such as monitors, printers, and scanners.

drivers
managers
utilities
interfaces

Question 25 (1 point)

Most operating systems have security features available, such as an integrated ____ to protect against unauthorized access via the Internet.

router
firewall
hub
modem

Question 26 (1 point)

____ memory allows you to use more memory than is physically available on your computer.

Virtual
Shared
Buffer
Multi-threading

Question 27 (1 point)

In a nutshell, blogs are designed for primarily one-way running communications, while ____ are intended to be modified by others.

e-blogs
e-diaries
e-portfolios
wikis

Question 28 (1 point)

The file management program incorporated into Windows is ____.

WinZip
Disk Cleanup
Stuff It
Windows Explorer

Question 29 (1 point)

To restore a file or folder deleted from your computer’s hard drive, open your computer’s ____ and restore the file to its original location.

Windows Explorer
menu
System Restore program
Recycle Bin

Question 30 (1 point)

____ refers to the act of breaking into a computer or network.

Spoofing
Hacking
Phishing
Spamming

Question 31 (1 point)

A ____ is a security system that essentially creates a wall between a computer or network and the Internet in order to protect against unauthorized access.

Trojan horse
firewall
hub
bridge

Question 32 (1 point)

____ refers to the amount of data that can be transferred (such as over a certain type of networking medium) in a given time period.

Bluetooth
Bandwidth
Modulation
Demodulation

Question 33 (1 point)

____ is the fastest and most current Wi-Fi standard.

802.11a
802.11g
802.11n
802.11x

Question 34 (1 point)

A network adapter, also called a ____ when it is in the form of an expansion card, is used to connect a computer to a network.

network interface card (NIC)
data communications card (DCC)
USB

Question 35 (1 point)

Gabrielle is planning to connect selected devices to the network wirelessly with a wireless ____.

USB port
hub
access point
data point

Question 36 (1 point)

______is a form of robot-assisted surgery, in which a robot controlled by a physician operates on the patient.

Telecommuting
Telemedicine
Telesurgery
Telecommunications

Question 37 (1 point)

An intranet (not Internet) is a private network, such as a company LAN, that is set up by an organization for use by its employees

True
False

Question 38 (1 point)

The primary infrastructure that makes up the ____ is typically owned by communications companies, such as telephone and cable companies.

sub Internet
World Net
Internet USA
Internet backbone

Question 39 (1 point)

____ is the most widely used type of home broadband connection, with over half of the home broadband market.

DSL Internet access
Fixed wireless Internet access
Mobile wireless Internet access
Cable Internet access

Question 40 (1 point)

A ____ is loosely defined as a very small device that has some built-in computing or Internet capability.

mainframe computer
personal computer
client-server
mobile device

Question 41 (1 point)

A ____ is a collection of hardware and other devices that are connected together so that users can share hardware, software, and data, as well as electronically communicate with each other.

computer network
database
hard drive
spreadsheet

Question 42 (1 point)

Similar to the way an IP address or domain name uniquely identifies a computer on the Internet, a ____ uniquely identifies a Web page.

TCP/IP
URL
HTTP
Web ID (WID)

Question 43 (1 point)

Phishing schemes may use a technique called ____, which is setting up spoofed Web sites with addresses slightly different from legitimate sites.

typosquatting
spamming
DoS attacks
identity theft

Question 44 (1 point)

The ____, implemented in 2001, grants federal authorities expanded surveillance and intelligence-gathering powers, such as broadening their ability to obtain the real identity of Internet users and to intercept Internet communications.

Sarbanes-Oxley Act
USA Patriot Act
Identity Theft and Assumption Deterrence Act of 1998
No Electronic Theft (NET) Act

Question 45 (1 point)

In a home network containing both wired and wireless devices, a user types www.oakton.eduin the address bar of the Web browser. To fulfill this request, the data moves from the:

computer to the modem to the router to the firewall to the switchto the ISP to the Internet
computer to the switch to the firewall to the router to the modem to the ISP to the Internet
computer to the switch to the firewall to the modem to the router the ISP to the Internet
more information is needed

Question 46 (1 point)

Jamie’s mother is a computer programmer and would like Jamie to follow in her footsteps. What course would she most likely suggest that Jamie take in college?

systems analysis
computer literacy
Java
History of computing

Question 47 (1 point)

Sarah is a real estate agent. She needs to purchase a new computer and software so she can keep track of her client’s accounts, access the Internet from anywhere in the city, and touch-up photos of real estate properties.

Sarah needs to store digital photographs of houses she is previewing. She needs to be able to copy these to the computer at her office. What type of storage device should she use?

Data projector
Firewire port
Scanner
USB flash drive

Question 48 (1 point)

Sarah (see previous question) has hired a programmer to create a Website for her real estate business. What type of programming language will the programmer use?

Python
XHTML
Visual Basic
Objective C

Question 49 (1 point)

Most search sites use a ____—a software program—in conjunction with a huge database of information about Web pages to help visitors find Web pages that contain the information they are seeking.

search store
search engine
search cabinet
search toolbox

Question 50 (1 point)

One of the most straightforward ways to improve the quality of the hits returned in a search is to use ____—essentially typing more than one keyword in a keyword search.

phrase searching
character searching
index searching
acronym searching

Question 51 (1 point)

____ allows you to exchange real-time messages easily with people on your buddy list—a list of individuals that you specify.

VoIP
Instant messaging
Streaming
Blogging

Question 52 (1 point)

Online shopping and online investing are examples of ____.

online merchandising
online marketing
e-trade
e-commerce

Question 53 (1 point)

Many Web pages today use ____ —small text files that are stored on your hard drive by a Web server, typically the one associated with the Web page being viewed—to identify return visitors and their preferences.

blogs
podcasts
cookies
filters

Question 54 (1 point)

Three very large databases are on my hard drive; the sizes are235MB, 585MB, and 1.2GB.I want to bring them home butI can't email them because of their size. Will all three of the databases fit on aUSB flash drive purchased just recently?

Yes
No

Question 55 (1 point)

Because she is an avid baseball fan, Brenda has subscribed to the ____ feed of her local team so that news about her team is delivered to her as it becomes available.

wiki
VOD
RSS
portal

Question 56 (1 point)

What kind of computer would most likely fit Sarah's needs?

notebook
midrange server
embedded
docking station

Question 57 (1 point)

These eight ____, 1010 10102, represent one _____.

binary digits, bit
bytes, bit
bits, byte
bytes, character

Question 58 (1 point)

One measurement of the speed of a CPU is the ____, which is rated in megahertz (MHz) or gigahertz (GHz).

system speed
system rpm
CPU clock speed
CPU rpm

Question 59 (1 point)

The bus width and bus speed together determine the bus’s ____ or bandwidth; that is, the amount of data that can be transferred via the bus in a given period of time.

throughput
clock speed
memory
machine cycle

Question 60 (1 point)

The ____ step takes instructions from the fetch unit and translates them into a form that the control unit can understand.

ALU
execute
decode
store

Question 61 (1 point)

Which of the following is the same as =AVERAGE(A1:A3)?

=A1+B1+C1
=(A1+B1+C1)/3
=A1+A2+A3
=(A1+A2+A3)/3

Question 62 (1 point)

Jess has pictures from her old computer d on an external hard drive. To transfer these to her new computer, she would use a(n) ____ .

serial port
modem
USB port
SCSI port

Question 63 (1 point)

Most CPUs today are ______CPUs; that is, CPUs that contain the processing components or cores of multiple independent processors on a single CPU.

single-core
Multi-core
double-sided
integrated

Information

Give me an example (not a definition) of each of the following descriptions. Each of your responses can be used just one time.

Question 64 (1 point)

computer hardware found inside the system unit

Question 65 (1 point)

a secondary storagedevice

Question 66 (1 point)

an output device

Question 67 (1 point)

a typical home Internet connection

Question 68 (1 point)

networking hardware

Question 69 (1 point)

wired networking media

Question 70 (1 point)

a field in a database (think about the Banner registration system)

Question 71 (1 point)

software in the Microsoft Office 2010 Suite (excluding Microsoft Word)

Question 72 (1 point)

a measurementused to determine the capacity of a secondary storage device

Question 73 (1 point)

an advantage to using a SSDs instead of a spinning hard disk (magnetic technology)

Question 74 (1 point)

houses programs (software) and data

Question 75 (1 point)

commonly-used application software

Question 76 (1 point)

a cell address

Question 77 (1 point)

a domain name

Question 78 (1 point)

a formatting feature in word processing software

Question 79 (1 point)

text typically found in a footer

Question 80 (1 point)

a command on the File tab in Microsoft Word

Question 81 (1 point)

a commonly used function in spreadsheeting software

Question 82 (1 point)

a common use for a computer network (excluding using a web browser to view websites)

Question 83 (1 point)

a function of anoperating system

Question 84 (1 point)

a random access peripheral device

Information

Identify the term associated with each description (or definition or explanation) given.

Question 85 (1 point)

anelectronic device that operates based on instructions in a program; it accepts data, performs operations on the data, displays results,stores results, and communicates results

Question 86 (1 point)

a software program that is installed without the permission or knowledge of the computer user, that is designed to alter the way a computer operates, and that can replicate itself to infect any new media it has access to.

Question 87 (1 point)

occurs when someone obtains enough information about a person to be able to masquerade as that person for a variety of activities—usually to buy products or services in that person’s name.

Question 88 (1 point)

the ability of an operating system to have more than one programopen at one time. Without this function,an operating system would require the user to close one program before opening another program.

Question 89 (1 point)

the use of networking technology to conduct real-time, face-to-face meetings between individuals physically located in different places.

Question 90 (1 point)

rearranging the data on the hard drive so all files are stored in contiguous locations

Question 91 (1 point)

duplicate an important file(s) on your hard drive so that if a problem occurs (a file becomes corrupted or hard drive crashes), you can restore that file(s).

Question 92 (1 point)

any illegal act involving a computer

Question 93 (1 point)

use legitimate-looking e-mails to trick users into providing private information