Pre-AP Computer Science Chapter 1 Test
Name: ______
True/False
Indicate whether the statement is true or false.
____1.The motherboard is the main circuit board in a desktop computer.
____2.Topology refers to the physical arrangement of the nodes on a network.
____3.A ring topology connects each node to form a closed loop.
____4.Unicode is a digital code used to represent letters of an alphabet and symbols.
____5.The binary number system is referred to as base 10.
____6.Real numbers are numbers that contain decimal points.
____7.A roundoff error occurs when there are not enough bits to hold the significand.
____8.A file is retained even when a computer is turned off.
____9.Human-readable files are called binary files.
____ 10.File types are distinguished by the extension that comes after the file name.
____11.The largest and most widely accessed network is the Internet.
____12.Gigahertz is a measure of millions of cycles per second.
____13.An intranet extends an extranet.
____14.An intranet is only accessible by authorized users.
____15.Outlook is an example of an e-mail client.
____16.Yahoo! Mail is an example of Web-based e-mail client.
____17.Majordomo is a mailing list server.
____18.A citation gives credit to the original author.
____19.A widely accepted form for citations is published by the Modern Language Association (MLA).
____20.Ergonomics is the science that studies copyright infringement.
____21.The illegal copying of software is called piracy.
____22.Anti-virus programs can detect and erase viruses before they spread or damage data.
____23.Data stored in RAM can be written to secondary memory.
____24.Digital information on the Web is not protected by copyright.
____ 25. Disk defragmentation is an example of a utility program.
____26.Machine language instructions use 0s and 2s to represent the status of a switch.
____27.A high-level programming language consists of English-like instructions.
____ 28.COBOL is an example of a low-level programming language.
____29.A peer-to-peer network has a server.
____30.A client is a powerful computer used to manage network functions such as communications and data sharing.
Multiple Choice
Identify the choice that best completes the statement or answers the question.
____31.Which is a netiquette guideline?
a. / Access the account of another user.b. / Never change your password.
c. / Share your password.
d. / Be considerate of other people’s beliefs.
____32.Which is not an input device?
a. / scanner / c. / microphoneb. / digital camera / d. / Printer
____33.Operating system software
a. / is a combination of hardware and software that works together to allow computers to exchange data.b. / is network security hardware that prevents unauthorized network access.
c. / is software that enables the user to communicate with the computer.
d. / is a series of related Web pages.
____34.Which processes data and controls the flow of data between the computer’s other units?
a. / CPU / c. / ROMb. / USB / d. / SRAM
____35.SRAM (Static Access RAM) is also referred to as
a. / ROM. / c. / cache.b. / integrated circuits. / d. / clock rate.
____36.Which is not an operating system?
a. / Linux / c. / Microsoft Officeb. / Mac OS X Tiger / d. / Microsoft Windows
____37.Which refers to a computer’s hardware and software configuration?
a. / operating system / c. / secondary memoryb. / environment / d. / bus
____38.Which word is used synonymously with environment?
a. / operating system / c. / graphic user interfaceb. / platform / d. / bus
____39.Which programming language is considered a third generation programming language (3GL)?
a. / machine language / c. / SQLb. / assembly language / d. / C
____40.Which is the physical aspect of the computer?
a. / hardware / c. / operating systemb. / software / d. / applications software
____41.A bit is
a. / a single 0 or 1 in the binary code.b. / eight 0s or 1s.
c. / a person’s name stored in memory.
d. / equal to 64K of RAM.
____42.In which type of network topology is each node attached to a hub?
a. / bus topology / c. / ring topologyb. / star topology / d. / client topology
____43.In the e-mail , which part is the top-level domain?
a. / christina / c. / lpdatafilesb. / @ / d. / .com
____44.The number system used in computers is called
a. / decimal. / c. / binary.b. / hexadecimal. / d. / base.
____45.How many states do the electrical circuits on an IC (integrated circuit) have?
a. / one: on / c. / four: + - * /b. / two: on, off / d. / three: on, off, wait
____46.Which is how a base 2 number is written?
a. / 1002 / c. / 1002b. / 1002 / d. / 100 b2
____47.An intranet
a. / is the largest and most widely accessed network.b. / is a network that provides various levels of accessibility to authorized members of the public.
c. / is a network that is used by a single organization and is only accessible by authorized users.
d. / is another word for Internet.
____48.An ISDN is a
a. / cable modem. / c. / subscriber line.b. / conventional modem. / d. / digital telephone network.
____49.The most widely used Internet service is
a. / Internet Relay Chat (IRC). / c. / network news.b. / the World Wide Web. / d. / bulletin board services.
____50.A Web beacon
a. / helps protect the privacy of an individual.b. / helps you search and access information on the Web.
c. / is a computer virus.
d. / is a tiny transparent graphic used to collect data about Web page users.
____51.Which technology requires no moving parts?
a. / magnetic technology / c. / optical technologyb. / solid state technology / d. / stagnant technology
____52.A search engine
a. / is software required to send e-mail messages.b. / is a program that searches e-mail attachments for viruses.
c. / is a program that searches a database of Web pages for keywords.
d. / is used when long Web pages need to be printed.
____53.Which is a process of copying a file from a Web site to a user’s computer?
a. / uploading / c. / telecommunicationsb. / downloading / d. / Ergonomics
____54.Transmitting and receiving data is called
a. / bits per second. / c. / telecommunications.b. / computer transmitting. / d. / demodulation.
____55.The process of translating data into a code that is not readable without a key is referred to as
a. / filtering. / c. / online profiling.b. / encryption. / d. / compiling.
Completion
Complete each statement.
56.The diagram below illustrates a ______topology.
57.The diagram below illustrates a ______topology.
58.______logic can be used in search criteria to limit the number of matches.
59.The number of bytes of data a 3GB hard drive can store is ______.
60.The present time if referred to as the ______age.
61.Bits grouped in units of 16 to 64 (2 to 8 bytes) are called ______.
62.The number of bytes of storage used by a 64K file is ______.