Pre-AP Computer Science Chapter 1 Test

Name: ______

True/False

Indicate whether the statement is true or false.

____1.The motherboard is the main circuit board in a desktop computer.

____2.Topology refers to the physical arrangement of the nodes on a network.

____3.A ring topology connects each node to form a closed loop.

____4.Unicode is a digital code used to represent letters of an alphabet and symbols.

____5.The binary number system is referred to as base 10.

____6.Real numbers are numbers that contain decimal points.

____7.A roundoff error occurs when there are not enough bits to hold the significand.

____8.A file is retained even when a computer is turned off.

____9.Human-readable files are called binary files.

____ 10.File types are distinguished by the extension that comes after the file name.

____11.The largest and most widely accessed network is the Internet.

____12.Gigahertz is a measure of millions of cycles per second.

____13.An intranet extends an extranet.

____14.An intranet is only accessible by authorized users.

____15.Outlook is an example of an e-mail client.

____16.Yahoo! Mail is an example of Web-based e-mail client.

____17.Majordomo is a mailing list server.

____18.A citation gives credit to the original author.

____19.A widely accepted form for citations is published by the Modern Language Association (MLA).

____20.Ergonomics is the science that studies copyright infringement.

____21.The illegal copying of software is called piracy.

____22.Anti-virus programs can detect and erase viruses before they spread or damage data.

____23.Data stored in RAM can be written to secondary memory.

____24.Digital information on the Web is not protected by copyright.

____ 25. Disk defragmentation is an example of a utility program.

____26.Machine language instructions use 0s and 2s to represent the status of a switch.

____27.A high-level programming language consists of English-like instructions.

____ 28.COBOL is an example of a low-level programming language.

____29.A peer-to-peer network has a server.

____30.A client is a powerful computer used to manage network functions such as communications and data sharing.

Multiple Choice

Identify the choice that best completes the statement or answers the question.

____31.Which is a netiquette guideline?

a. / Access the account of another user.
b. / Never change your password.
c. / Share your password.
d. / Be considerate of other people’s beliefs.

____32.Which is not an input device?

a. / scanner / c. / microphone
b. / digital camera / d. / Printer

____33.Operating system software

a. / is a combination of hardware and software that works together to allow computers to exchange data.
b. / is network security hardware that prevents unauthorized network access.
c. / is software that enables the user to communicate with the computer.
d. / is a series of related Web pages.

____34.Which processes data and controls the flow of data between the computer’s other units?

a. / CPU / c. / ROM
b. / USB / d. / SRAM

____35.SRAM (Static Access RAM) is also referred to as

a. / ROM. / c. / cache.
b. / integrated circuits. / d. / clock rate.

____36.Which is not an operating system?

a. / Linux / c. / Microsoft Office
b. / Mac OS X Tiger / d. / Microsoft Windows

____37.Which refers to a computer’s hardware and software configuration?

a. / operating system / c. / secondary memory
b. / environment / d. / bus

____38.Which word is used synonymously with environment?

a. / operating system / c. / graphic user interface
b. / platform / d. / bus

____39.Which programming language is considered a third generation programming language (3GL)?

a. / machine language / c. / SQL
b. / assembly language / d. / C

____40.Which is the physical aspect of the computer?

a. / hardware / c. / operating system
b. / software / d. / applications software

____41.A bit is

a. / a single 0 or 1 in the binary code.
b. / eight 0s or 1s.
c. / a person’s name stored in memory.
d. / equal to 64K of RAM.

____42.In which type of network topology is each node attached to a hub?

a. / bus topology / c. / ring topology
b. / star topology / d. / client topology

____43.In the e-mail , which part is the top-level domain?

a. / christina / c. / lpdatafiles
b. / @ / d. / .com

____44.The number system used in computers is called

a. / decimal. / c. / binary.
b. / hexadecimal. / d. / base.

____45.How many states do the electrical circuits on an IC (integrated circuit) have?

a. / one: on / c. / four: + - * /
b. / two: on, off / d. / three: on, off, wait

____46.Which is how a base 2 number is written?

a. / 1002 / c. / 1002
b. / 1002 / d. / 100 b2

____47.An intranet

a. / is the largest and most widely accessed network.
b. / is a network that provides various levels of accessibility to authorized members of the public.
c. / is a network that is used by a single organization and is only accessible by authorized users.
d. / is another word for Internet.

____48.An ISDN is a

a. / cable modem. / c. / subscriber line.
b. / conventional modem. / d. / digital telephone network.

____49.The most widely used Internet service is

a. / Internet Relay Chat (IRC). / c. / network news.
b. / the World Wide Web. / d. / bulletin board services.

____50.A Web beacon

a. / helps protect the privacy of an individual.
b. / helps you search and access information on the Web.
c. / is a computer virus.
d. / is a tiny transparent graphic used to collect data about Web page users.

____51.Which technology requires no moving parts?

a. / magnetic technology / c. / optical technology
b. / solid state technology / d. / stagnant technology

____52.A search engine

a. / is software required to send e-mail messages.
b. / is a program that searches e-mail attachments for viruses.
c. / is a program that searches a database of Web pages for keywords.
d. / is used when long Web pages need to be printed.

____53.Which is a process of copying a file from a Web site to a user’s computer?

a. / uploading / c. / telecommunications
b. / downloading / d. / Ergonomics

____54.Transmitting and receiving data is called

a. / bits per second. / c. / telecommunications.
b. / computer transmitting. / d. / demodulation.

____55.The process of translating data into a code that is not readable without a key is referred to as

a. / filtering. / c. / online profiling.
b. / encryption. / d. / compiling.

Completion

Complete each statement.

56.The diagram below illustrates a ______topology.

57.The diagram below illustrates a ______topology.

58.______logic can be used in search criteria to limit the number of matches.

59.The number of bytes of data a 3GB hard drive can store is ______.

60.The present time if referred to as the ______age.

61.Bits grouped in units of 16 to 64 (2 to 8 bytes) are called ______.

62.The number of bytes of storage used by a 64K file is ______.