Quiz
Top of Form
Information
Expand the following acronyms. Do not define the terms. Just indicate what word(s) corresponds to eachletter. Your response must be completely correct to earn the point. Spelling counts.
Question 1 (1 point)
CPU
Question 2 (1 point)
ALU
Question 3 (1 point)
RAM
Question 4 (1 point)
ROM
Question 5 (1 point)
GHz
Question 6 (1 point)
Mb
Question 7 (1 point)
RFID
Question 8 (1 point)
ISP
Question 9 (1 point)
LAN
Question 10 (1 point)
VoIP
Information
Select the one best answer for each of the following questions.
Question 11 (1 point)
The term ____ refers to the programs or instructions used to tell the computerexactly what to do.
Hardwareadapter
software
data
Question 12 (1 point)
____ consists of programs designed to allow people to perform specific tasks using a computer, such as creating letters, preparing budgets, and managing inventory.
Cloud storageHTML
Java Script
Application software
Question 13 (1 point)
RAM houses data temporarily and a hard drive houses data permanently.
TrueFalse
Question 14 (1 point)
A ____ is a place to store something temporarily.
cachesector
track
cylinder
Question 15 (1 point)
____ optical discs can be recorded on, erased, and overwritten just like magnetic disks.
ErasableRe-readable
Rewritable
Recordable
Question 16 (1 point)
Volatile data refers to data stored on a device’s storage medium that will still be there after you have powered off and on your device.
TrueFalse
Question 17 (1 point)
One of the most common 2D barcodes, the ____ code represents data with a matrix of small squares.
ISBNQR
UPC
RFID
Question 18 (1 point)
____ are used to input data about a person into a computer system so that the individual can be identified based on a particular unique physiological characteristic.
Bioimetrix readersRFID tags
MICR readers
OMRs
Question 19 (1 point)
A ____ is the smallest colorable area on a display device.
bitdot
pixel
Question 20 (1 point)
Print speed is typically measured in ____.
dpsppm
cps
Question 21 (1 point)
Lisa needs to make sure that the computer that she is using has a ____ attached to it for her to be able to hear music and the sounds of a computer game.
microphonescanner
touch screen
speaker
Question 22 (1 point)
Folders can contain both files and other folders
TrueFalse
Question 23 (1 point)
____ software consists of the operating system and utility programs that control a computer system and allow you to use your computer.
ApplicationSystem
Word processing
Database
Question 24 (1 point)
Small programs called ____ are used to communicate with peripheral devices, such as monitors, printers, and scanners.
driversmanagers
utilities
interfaces
Question 25 (1 point)
Most operating systems have security features available, such as an integrated ____ to protect against unauthorized access via the Internet.
routerfirewall
hub
modem
Question 26 (1 point)
____ memory allows you to use more memory than is physically available on your computer.
VirtualShared
Buffer
Multi-threading
Question 27 (1 point)
In a nutshell, blogs are designed for primarily one-way running communications, while ____ are intended to be modified by others.
e-blogse-diaries
e-portfolios
wikis
Question 28 (1 point)
The file management program incorporated into Windows is ____.
WinZipDisk Cleanup
Stuff It
Windows Explorer
Question 29 (1 point)
To restore a file or folder deleted from your computer’s hard drive, open your computer’s ____ and restore the file to its original location.
Windows Explorermenu
System Restore program
Recycle Bin
Question 30 (1 point)
____ refers to the act of breaking into a computer or network.
SpoofingHacking
Phishing
Spamming
Question 31 (1 point)
A ____ is a security system that essentially creates a wall between a computer or network and the Internet in order to protect against unauthorized access.
Trojan horsefirewall
hub
bridge
Question 32 (1 point)
____ refers to the amount of data that can be transferred (such as over a certain type of networking medium) in a given time period.
BluetoothBandwidth
Modulation
Demodulation
Question 33 (1 point)
____ is the fastest and most current Wi-Fi standard.
802.11a802.11g
802.11n
802.11x
Question 34 (1 point)
A network adapter, also called a ____ when it is in the form of an expansion card, is used to connect a computer to a network.
network interface card (NIC)data communications card (DCC)
USB
Question 35 (1 point)
Gabrielle is planning to connect selected devices to the network wirelessly with a wireless ____.
USB porthub
access point
data point
Question 36 (1 point)
______is a form of robot-assisted surgery, in which a robot controlled by a physician operates on the patient.
TelecommutingTelemedicine
Telesurgery
Telecommunications
Question 37 (1 point)
An intranet (not Internet) is a private network, such as a company LAN, that is set up by an organization for use by its employees
TrueFalse
Question 38 (1 point)
The primary infrastructure that makes up the ____ is typically owned by communications companies, such as telephone and cable companies.
sub InternetWorld Net
Internet USA
Internet backbone
Question 39 (1 point)
____ is the most widely used type of home broadband connection, with over half of the home broadband market.
DSL Internet accessFixed wireless Internet access
Mobile wireless Internet access
Cable Internet access
Question 40 (1 point)
A ____ is loosely defined as a very small device that has some built-in computing or Internet capability.
mainframe computerpersonal computer
client-server
mobile device
Question 41 (1 point)
A ____ is a collection of hardware and other devices that are connected together so that users can share hardware, software, and data, as well as electronically communicate with each other.
computer networkdatabase
hard drive
spreadsheet
Question 42 (1 point)
Similar to the way an IP address or domain name uniquely identifies a computer on the Internet, a ____ uniquely identifies a Web page.
TCP/IPURL
HTTP
Web ID (WID)
Question 43 (1 point)
Phishing schemes may use a technique called ____, which is setting up spoofed Web sites with addresses slightly different from legitimate sites.
typosquattingspamming
DoS attacks
identity theft
Question 44 (1 point)
The ____, implemented in 2001, grants federal authorities expanded surveillance and intelligence-gathering powers, such as broadening their ability to obtain the real identity of Internet users and to intercept Internet communications.
Sarbanes-Oxley ActUSA Patriot Act
Identity Theft and Assumption Deterrence Act of 1998
No Electronic Theft (NET) Act
Question 45 (1 point)
In a home network containing both wired and wireless devices, a user types www.oakton.eduin the address bar of the Web browser. To fulfill this request, the data moves from the:
computer to the modem to the router to the firewall to the switchto the ISP to the Internetcomputer to the switch to the firewall to the router to the modem to the ISP to the Internet
computer to the switch to the firewall to the modem to the router the ISP to the Internet
more information is needed
Question 46 (1 point)
Jamie’s mother is a computer programmer and would like Jamie to follow in her footsteps. What course would she most likely suggest that Jamie take in college?
systems analysiscomputer literacy
Java
History of computing
Question 47 (1 point)
Sarah is a real estate agent. She needs to purchase a new computer and software so she can keep track of her client’s accounts, access the Internet from anywhere in the city, and touch-up photos of real estate properties.
Sarah needs to store digital photographs of houses she is previewing. She needs to be able to copy these to the computer at her office. What type of storage device should she use?
Data projectorFirewire port
Scanner
USB flash drive
Question 48 (1 point)
Sarah (see previous question) has hired a programmer to create a Website for her real estate business. What type of programming language will the programmer use?
PythonXHTML
Visual Basic
Objective C
Question 49 (1 point)
Most search sites use a ____—a software program—in conjunction with a huge database of information about Web pages to help visitors find Web pages that contain the information they are seeking.
search storesearch engine
search cabinet
search toolbox
Question 50 (1 point)
One of the most straightforward ways to improve the quality of the hits returned in a search is to use ____—essentially typing more than one keyword in a keyword search.
phrase searchingcharacter searching
index searching
acronym searching
Question 51 (1 point)
____ allows you to exchange real-time messages easily with people on your buddy list—a list of individuals that you specify.
VoIPInstant messaging
Streaming
Blogging
Question 52 (1 point)
Online shopping and online investing are examples of ____.
online merchandisingonline marketing
e-trade
e-commerce
Question 53 (1 point)
Many Web pages today use ____ —small text files that are stored on your hard drive by a Web server, typically the one associated with the Web page being viewed—to identify return visitors and their preferences.
blogspodcasts
cookies
filters
Question 54 (1 point)
Three very large databases are on my hard drive; the sizes are235MB, 585MB, and 1.2GB.I want to bring them home butI can't email them because of their size. Will all three of the databases fit on aUSB flash drive purchased just recently?
YesNo
Question 55 (1 point)
Because she is an avid baseball fan, Brenda has subscribed to the ____ feed of her local team so that news about her team is delivered to her as it becomes available.
wikiVOD
RSS
portal
Question 56 (1 point)
What kind of computer would most likely fit Sarah's needs?
notebookmidrange server
embedded
docking station
Question 57 (1 point)
These eight ____, 1010 10102, represent one _____.
binary digits, bitbytes, bit
bits, byte
bytes, character
Question 58 (1 point)
One measurement of the speed of a CPU is the ____, which is rated in megahertz (MHz) or gigahertz (GHz).
system speedsystem rpm
CPU clock speed
CPU rpm
Question 59 (1 point)
The bus width and bus speed together determine the bus’s ____ or bandwidth; that is, the amount of data that can be transferred via the bus in a given period of time.
throughputclock speed
memory
machine cycle
Question 60 (1 point)
The ____ step takes instructions from the fetch unit and translates them into a form that the control unit can understand.
ALUexecute
decode
store
Question 61 (1 point)
Which of the following is the same as =AVERAGE(A1:A3)?
=A1+B1+C1=(A1+B1+C1)/3
=A1+A2+A3
=(A1+A2+A3)/3
Question 62 (1 point)
Jess has pictures from her old computer d on an external hard drive. To transfer these to her new computer, she would use a(n) ____ .
serial portmodem
USB port
SCSI port
Question 63 (1 point)
Most CPUs today are ______CPUs; that is, CPUs that contain the processing components or cores of multiple independent processors on a single CPU.
single-coreMulti-core
double-sided
integrated
Information
Give me an example (not a definition) of each of the following descriptions. Each of your responses can be used just one time.
Question 64 (1 point)
computer hardware found inside the system unit
Question 65 (1 point)
a secondary storagedevice
Question 66 (1 point)
an output device
Question 67 (1 point)
a typical home Internet connection
Question 68 (1 point)
networking hardware
Question 69 (1 point)
wired networking media
Question 70 (1 point)
a field in a database (think about the Banner registration system)
Question 71 (1 point)
software in the Microsoft Office 2010 Suite (excluding Microsoft Word)
Question 72 (1 point)
a measurementused to determine the capacity of a secondary storage device
Question 73 (1 point)
an advantage to using a SSDs instead of a spinning hard disk (magnetic technology)
Question 74 (1 point)
houses programs (software) and data
Question 75 (1 point)
commonly-used application software
Question 76 (1 point)
a cell address
Question 77 (1 point)
a domain name
Question 78 (1 point)
a formatting feature in word processing software
Question 79 (1 point)
text typically found in a footer
Question 80 (1 point)
a command on the File tab in Microsoft Word
Question 81 (1 point)
a commonly used function in spreadsheeting software
Question 82 (1 point)
a common use for a computer network (excluding using a web browser to view websites)
Question 83 (1 point)
a function of anoperating system
Question 84 (1 point)
a random access peripheral device
Information
Identify the term associated with each description (or definition or explanation) given.
Question 85 (1 point)
anelectronic device that operates based on instructions in a program; it accepts data, performs operations on the data, displays results,stores results, and communicates results
Question 86 (1 point)
a software program that is installed without the permission or knowledge of the computer user, that is designed to alter the way a computer operates, and that can replicate itself to infect any new media it has access to.
Question 87 (1 point)
occurs when someone obtains enough information about a person to be able to masquerade as that person for a variety of activities—usually to buy products or services in that person’s name.
Question 88 (1 point)
the ability of an operating system to have more than one programopen at one time. Without this function,an operating system would require the user to close one program before opening another program.
Question 89 (1 point)
the use of networking technology to conduct real-time, face-to-face meetings between individuals physically located in different places.
Question 90 (1 point)
rearranging the data on the hard drive so all files are stored in contiguous locations
Question 91 (1 point)
duplicate an important file(s) on your hard drive so that if a problem occurs (a file becomes corrupted or hard drive crashes), you can restore that file(s).
Question 92 (1 point)
any illegal act involving a computer
Question 93 (1 point)
use legitimate-looking e-mails to trick users into providing private information