Computer Exam

The flashcards below were created by user ginibutler on FreezingBlue Flashcards.

  1. Being ___ means being familiar enough with computers that you understand their capabilities and limitations.
    A. Computer Literate
    B. Computer Savvy
    C. Technology literate
    D. Computer competent
    A. Computer literate
    (this multiple choice question has been scrambled)
  2. The process of searching huge amounts of data with the hope of finding a pattern:
    Data Mining
  3. Which of the following do today's educator NOT need to be familiar with to create constructive computerized lessons and to interact with students?
    A. Web authoring software
    B. The internet
    C. Programs like Moodle or Blackboard
    D. Computers
    A. Web authoring software
    (this multiple choice question has been scrambled)
  4. _____ aare extremely detailed re-creations of crimes or crime scenes that are generated with computers based on forensic evidence, depositions of witnesses, and the opinions of experts.
    A. Verichips
    B. computer forensics animations
    C. HALO images
    D. Data mining profiles
    B. Computer forensics animations
    (this multiple choice question has been scrambled)
  5. Medical students can train on ____ and experience firsthand how a human would react to a particular treatment.
    A. Mannequins
    B. Patient simulators
    C. Robots
    D. A 3d Anatomoical System
    B. Patient simulators
    (this multiple choice question has been scrambled)
  6. By studying the data produced by___, scientists hope to improve the prediction of weather phenomena.
    A. Verichips
    B. PSSs
    C. Simulations
    D. GPS
    C. Simulations
    (this multiple choice question has been scrambled)
  7. A nanometer is:
    A. one millionth of a meter
    B. One-billionth of a meter
    C. one-tenth of a meter
    D. the size of a human hair.
    B. One-billionth of a meter
    (this multiple choice question has been scrambled)
  8. The difference between people with access to computers and the internet and those without this access is known as the :
    A. web divide
    B. internet divide
    C. digital divide
    D. broadband divide
    C. digital divide
    (this multiple choice question has been scrambled)
  9. A___ is a special device that is installed in your computer that allows it to communicate with other deivices on the network.
    A. media center extender
    B. digital media adapter
    C. network adapter
    D. modem
    C. network adaptor
    (this multiple choice question has been scrambled)
  10. While engineers work to create computer that can understand us emotionally, ___ are also evolving toward a more human apperance.
    a. RFIDs
    B. affecting computing techniques
    c. ESP systems
    D. computer systems
    D computer systems
  11. ____ is data that has been organized or presented in a meaningful fashion.
    A. a character
    B. information
    C. a number
    D. a symbol
    B. information
    (this multiple choice question has been scrambled)
  12. ___ binary digits (or bits) combine to create on byte.
    A. two
    B. ten
    C. sixteen
    D. eight
    D. eight
    (this multiple choice question has been scrambled)
  13. A___ is approx. 1 billion bytes.
    A. bit
    B. gigabyte
    C. kilobyted
    D. megabyte
    B. gigabyte
    (this multiple choice question has been scrambled)
  14. ____ Computers are specially designed computer chips that reside inside other devices such as your car or the electronic thermostat in your home.
    A. embedded
    B. desktop
    C. internal
    D. mainframe
    A. embedded
    (this multiple choice question has been scrambled)
  15. A____ is a device that looks like a skinny pen but has no ink.
    A. stylus
    B. joystick
    C. pointer
    D.. e-pen
    A. stylus
    (this multiple choice question has been scrambled)
  16. A(n)____ uses internal sensor or laser to detect the mouse's movement.
    A. optical mouse
    B. MoGo mouse
    C. trackball mouse
    D. wireless mouse
    A. optical mouse
    (this multiple choice question has been scrambled)
  17. _____ printers have tiny hammer-like keys that strike the paper through an inked ribbon.
    A. laser
    B. inkjet
    C. nonimpact
    D. impact
    D. impact
    (this multiple choice question has been scrambled)
  18. ___ is power mode that allows the compupter to save an image of the desktop and enter a state of reduce power consumption to save energy.
    a. sleep
    b hibernate
    c. standby
    d. coool down
    b. hibernate
  19. USB ports are fast replacing traditional___ and ___ ports because of their ability to transer data quickly.
    a. video, audio
    b ethernet, speaker
    c. monitor, modem
    d. parallel, serial
    d. parallel, serial
  20. A___ enables your computer to connect to other computers or to the internet.
    A. controller card
    b. video card
    c network interface card
    d. sound card
    c. network interface card (NIC)
  21. The internet is:
    A. the same as the web
    B. a communication of system for the U.S. government.
    C. a large network of networks
    D. an internal communicaion system for a business
    C. a large networks of networks
    (this multiple choice question has been scrambled)
  22. Instant messaging (IM) services are programs that enable you to:
    A. send, receive, and edit files.
    B. communicate with others who are online.
    C. broadcast over the internet using compressed audio files such as MP3s.
    D. post journal entries on the Web.
    B. communicate with others who are online
    (this multiple choice question has been scrambled)
  23. Web 2.0 describes:
    A. the newest web browser on the maket.
    B. the newest Web developm,ent language
    C. the newest netiquette rules for group communication.
    D. a trend of a new Web applicaions that combine the funtionality of muliple applicaions
    D. a trend of new web applicaions that combine the functionality of multiple applications.
    (this multiple choice question has been scrambled)
  24. Podcasts use which of the following technologies?
    A. RSS
    B. MSN messenger
    C. an open source software applications for 3D modeling
    D. Vlog
    A. RSS
    (this multiple choice question has been scrambled)
  25. Adobe Reader, Flash player, and Quicktime player are all examples of special sofeware programs called;
    A. browsers
    B. plug-ins
    C. podders
    D. aggregator
    B. plug-ins
    (this multiple choice question has been scrambled)
  26. The name of the free internet browser from Mozzilla is:
    A. firefox
    B. internet explorer
    C. opera
    D. safari
    A. firefox
    (this multiple choice question has been scrambled)
  27. What protocol allows files to be transferred from a web server so that you can view them on your computer using a browser?
    A. COM
    B. HTTP
    C. FTP
    D. WWW
    B. HTTP
    (this multiple choice question has been scrambled)
  28. A set of programs that searches the Web to find informations is called a:
    A. phisher
    B. breadcrumb list
    C. search engine
    D. browser.
    C. search engine
    (this multiple choice question has been scrambled)
  29. The advantage of a dial-up internet connection is:
    A. low cost
    B. there is no need for a modem.
    C. high speed
    D. wireless capabilities
    A. low costs
    (this multiple choice question has been scrambled)
  30. the large scale newworking (LSN) project is:
    A. a military version of the Web.
    B. a U.S. government internet research project.
    C. a project to research the ramifications of free internet in major U. S Cities.
    D. a European internet research project.
    B. a U. S Governement Internet research project
    (this multiple choice question has been scrambled)
  31. System software does all the following Except:
    A. coordinate instructions between application software and the computer's hardware deivces.
    B. help manage system resources
    C. add graphics and pictures to files
    D. help run the computer
    C. add graphics and pictures to files
    (this multiple choice question has been scrambled)
  32. In a spreadsheet, the colums and rows form indicifual boxes called:
    A. addresses
    B. intersects
    C. worksheets
    D. cells
    D. cells
    (this multiple choice question has been scrambled)
  33. Presentation software includes all of the following features Except:
    a,. transitions
    b. animation effects
    c. formulas
    d. themes
    c. formulas
  34. Microsoft Office and Corel Wordperfect Office are examples of:
    A. personal information manager applications
    B. open source products
    C. reeware products
    D. software suites
    D. software suites
    (this multiple choice question has been scrambled)
  35. CD ripping refers to:
    A. creating yoru own CDs from your MP3 collection
    B. stealing songs off the internet
    C. erasing content on a CD
    D. encoding Cds to MP3 format
    D. encoding CD to MP3 format
    (this multiple choice question has been scrambled)
  36. QuarkXpress and Adobe Indesign are examples of ____ software.
    a word processing
    b. video editing
    c. image editing
    d. destop publishing
    d. desktop publishing
  37. GPS software allows users to:
    A. fine-tune an internet connection
    B. locate restaurants, airports, and points of interest
    C. use PDS to access e-mail.
    D. play games online using portable gaming systems
    B. locate restaurants, airports, and points of interest
    (this multiple choice question has been scrambled)
  38. Web-based application software is software that:
    A. is installed by computer manufacturer.
    B. is stored completely on a web server instead of your hard drive.
    C. allows you to create Web papes.
    D. does not need an internet connection
    B. is stored completely on a web server intead of your hard drive
    (this multiple choice question has been scrambled)
  39. A(n)___ software installation allows you to decide which features you want to install on the hard drive.
    A. upgrade
    B. custom
    C. full
    D. new
    B. custom
    (this multiple choice question has been scrambled)
  40. Which of the following is an example of discounted software?
    A. Web-based application software
    B. educational versions of software
    C. a software suite
    D. beta versions of software
    B. educational versions of software
    (this multiple choice question has been scrambled)
  41. The______ of the operating system allows the user to communicate with the computer system.
    A. modem
    B. window
    C. network adapter card
    D. interface
    D. interface
    (this multiple choice question has been scrambled)
  42. Which of the following is a single-user, multiask operating system?
    A. Mac Os
    B. Palm oS
    C. MS-Dos
    D. Symbian Os
    A. Mac Os
    (this multiple choice question has been scrambled)
  43. Which of the following statments about Apple Mac OS is TRUE?
    a. Mac OS was first OS to use a graphuical user interface.
    c. Mac OS can be used on Windows-based PCs
    d. There are more software applications avaiable for the Mac OS than for Windows-based PCs
    A. Mac OS was the first OS to use a graphical user interface
  44. The ______ is responsible for managing the processor and all other components of the computer system, and is an essential part of the operating system.
    A. BIOS
    B. kernel
    C. processor
    D. CMOS
    B. kernel
    (this multiple choice question has been scrambled)
  45. The basic input/output system is stored on a ___chip.
    A. CPU
    B. ROM
    C. CMOS
    D. RAM
    B. ROM
    (this multiple choice question has been scrambled)
  46. The ____ contains all of the different configurations used by the OS and by other applications.

    A. kernel
    B. Registry
    C. CMOS
    D. BIOS
    B. registry
    (this multiple choice question has been scrambled)
  47. Berfore upgrading your OS, you should back up your:
    A. BIOS
    B. ROM
    C. Data files
    D. system files.
    C. data files
    (this multiple choice question has been scrambled)
  48. Windows 7 introduces the concept of___. which are folder that gather files from different locations and display the files as if they were all saved in a single folder.
    A. directories
    B. libraries
    C. groups
    D. collections
    B. libraries
    (this multiple choice question has been scrambled)
  49. With Windows Explorer, you can perform all of the following file management actions EXCEPT:
    A. editing files.
    B. renaming files.
    C. opening files.
    D. copying files.
    A. editing files
    (this multiple choice question has been scrambled)
  50. The most essential software in your computer system is the:
    A. antivirus software
    B. security software
    C. productivity software
    D. operating system software
    D. operating system software
    (this multiple choice question has been scrambled)
  51. You can use the Windows____ to check on a nonrepsonsive program.
    A. System restore
    B. Task manager
    C. Explorer
    D. Back up utility
    B. Task manager
    (this multiple choice question has been scrambled)
  52. Moore's Law is a rule that predicts:
    A. the spead of the frontside of the bus.
    B. the pace at which CPUs inprove.
    C. the gata transfer rate for a hard drive
    D. the access time of the read/wriet head.
    B. the pace at which CPUs improve
    (this multiple choice question has been scrambled)
  53. The CPU is connected to the system memory by the:
    A. cache memory
    B. frontside bus
    C. expansion card.
    D. expansion hub.
    B. front side bus
    (this multiple choice question has been scrambled)
  54. CPU speed is measure in:
    A. gigahertz
    B. bytes per second
    C. megahertz
    D. kilohertz
    A. gigahertz
    (this multiple choice question has been scrambled)
  55. When your computer is using virtual memory, the operating system builds a file called the____ on the hard drive that allows processing to continue.
    A. page file
    B. cache file
    C. RAM file
    D. sap file
    A. page file
    (this multiple choice question has been scrambled)
  56. The amount of RAM that is actuall on the memory modules in your computer is the ___ memory.
    A. virtual
    B. physical
    C. noncolatile
    D. permanent
    B. physical
    (this multiple choice question has been scrambled)
  57. Which is fastest type of optical drive on the market?
    A. cd drives.
    B. blu-ray drives
    C. flash drives
    d DVD drives
    B. Blu-ray drives
    (this multiple choice question has been scrambled)
  58. Two types of video memory;
    A. 4-bit and 8-bit
    B. GDDR3 and GDDR5
    C. SRAM and DRAM
    D. Irda and IDE
    B. GDDR3 and GDDR5
    (this multiple choice question has been scrambled)
  59. An expansion card that translates binary data into images is a(n):
    A. audio card
    B. sound card
    C. video card
    D. game card.
    C. video card
    (this multiple choice question has been scrambled)
  60. Running the Disk Cleanup utility is a quick way to:
    a. clean out your Start up folder
    b. clear out unnecessary files.
    c, remove spyware programs
    d. defrag your hard drive
    b. clear out your unnecessary files
  61. Which of the following is NOT an example of a network node?
    A. a computer
    B. mouse
    C. modem
    D. a printer
    B. mouse
    (this multiple choice question has been scrambled)
  62. The ___ is the maximum speed at which data can be transmitted between two nodes on a network.
    a, throughput
    b. data transfer rate
    c. node speed
    d. transmission speed
    b. data transfer rate
  63. A ____ is a newtowk located in your home that is used to connect all of your digital devices.
    A. MAN
    B. LAN
    C. HAN
    D. WAN
    C. HAN
    (this multiple choice question has been scrambled)
  64. Client/server newtorks are controlled by a central server that runs a sprecialized piece of software called:
    A. firmware
    B. a newwork operating system (NOS)
    C. a firewall
    D. Windoes Vista
    B. Networking operatins system (NOS)
    (this multiple choice question has been scrambled)
  65. A ____ keeps track of data packets and in conjunction with network interface cards, helps the data packets find their destination without running into each other on an Ethernet network.
    A. switch
    B. hub
    C. router
    D. amplifier
    A. switch
    (this multiple choice question has been scrambled)
  66. Which of the following newtowkr adapters is most likely to be preinstalled in a typical notebook computer today?
    a. modem
    b. a transceiver
    b. both a wireless and wired network adapter
    d. a power-line adapter
    c. both a wireless and wired network adapter
  67. The unique number assigned to a network adapter by the manufacturer is referred to as the ____ address.
    A. MAC
    B. IP
    C. Network
    D. SSID
    A. Mac
    (this multiple choice question has been scrambled)
  68. Which transmission medium is able to transmit data the fastest?
    A. coaxial cable
    B. wireless
    C. fiber-optic cable
    D. twisted pair cable
    C. fiber-optic cable
    (this multiple choice question has been scrambled)
  69. The most popular transmission medium option for wired Ethernet networks is:
    A. powerline cable
    B. coaxial cable
    C. fiber-optic cable
    D. unshielded twisted pair cable
    D. unshilded twisted pair cable (UTP)
    (this multiple choice question has been scrambled)
  70. Which of the following devices is needed to share an Internet connection on a wireless network?
    A. modem
    B. wireless router
    C. wireless hub
    D. fiber-optic cable
    B. wireless router
    (this multiple choice question has been scrambled)
  71. Images are representation of sound and light waves called___ or continuous waves.
    A. digital
    B. patter
    C. modular
    D. analog
    D. digital
    (this multiple choice question has been scrambled)
  72. The operating system of a cell phone is stored:
    a the CPU
    b. the transciever
    c. RAM
    d. ROM
    d. ROM
  73. A ____ is included in a cell phone to hangle the compression of data for it to be quickly trnasmitted to another phone.
    A. analog-to-digital converter
    B. compresson utility
    C. codec
    D. digital signal processor
    D. digital signal processor
    (this multiple choice question has been scrambled)
  74. SMS delivers messages to appropriate mobile device using__ technology
    A. MMS
    B.store and forward
    C. bluetooth
    D. recieve and forward
    B. store and forward
    (this multiple choice question has been scrambled)
  75. An IPOD is an example of a:
    A. personal media player(PMP)
    B. personal digital assistant (PDA/ smartphone)
    C. digital information manager
    d personal information manager
    A. PMP
    (this multiple choice question has been scrambled)
  76. To transfer files from your computer to a portable media player, most new pmps use a ___ port or fire wire port.
    A. parallel
    B. USB 2.0
    C. multimedia
    D. serial
    B. USB
    (this multiple choice question has been scrambled)
  77. _____ is a special copyleft license used for software.
    A. attribution licensing
    B. Noncommercial licensing
    C. GNU
    D. creative commons
    C. GNU
    (this multiple choice question has been scrambled)
  78. A__ runs a full-featured operating system and weighs less than 2 lbs.
    Netbook
  79. Flash memory, used MP3 players, is a type of:
    A. nonvolatile memory
    B. vibrant memory
    C. non vibrant memory
    D. volatile memory
    A. nonvolatile memory
    (this multiple choice question has been scrambled)
  80. Broadcasting your video to a live audience over the WEB is referred to as:
    A. webcasting
    B. streaming casting
    C. internet casting
    D. podcasting
    A. webcasting
    (this multiple choice question has been scrambled)
  81. A___ is a secure internet pathway that large corporations use to protect sensitive date.
    A. VPN
    B.HAN
    C.LAN
    D. WAN
    C. VPN
    (this multiple choice question has been scrambled)
  82. Which type of virus was the famous Michelangelo virus?
    a. a time bomb
    b. a worm
    d. a script virus
    d. an e-mail virus
    a. time bomb
  83. During the process of___ the antivirus software records key attributes about the files on your computer and keeps these statistics in a safe place on your hard drive.
    A. encryption
    B. inoculation
    C. quarantining
    D. scanning
    A. encryption
    (this multiple choice question has been scrambled)
  84. ___floods the computer with requests until it shuts down and refuses to answer any more requests for information.
    a. A trojan hourse
    a polymorphic virus
    c. portblocking
    d. a ddos attack
    d. a ddos attack
  85. The purpose of network address translation (NAT) is to:
    A. convert logical ports to physical port configurations
    B. dynamicaly assign IP addreses VIA an ISP
    C. hide user IP addresses from the internet
    D. translate IP addresses from the internet
    C. hide user IP addresses from the internet
    (this multiple choice question has been scrambled)
  86. Adware and spyware are referred to collectively as:
    A. firmware
    B. viruses
    C. alertwar
    D. grayware
    D. grayware
    (this multiple choice question has been scrambled)
  87. All of the following can be used for backing up data files EXCEPT:
    A. DVDS
    B. external hard drives
    C. flash drives
    D. RAM
    D. RAM
    (this multiple choice question has been scrambled)
  88. For complete protection when backing up your files, you should use a program that creates a ____ of your entire system.
    A. disk back up
    B. incremental backup
    C. image back up
    D. full back up
    C. image backup
    (this multiple choice question has been scrambled)
  89. Which of the statements about protecting against power surges is false?
    A. surge protectors wear out over time
    B. a power surge ruin your computer
    C. printer do not requie power surge protectors
    D. a whole-house surge protector protects all electrical deivces in the house
    C. PRinters dont require protectors
    (this multiple choice question has been scrambled)
  90. Social ___ is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive information.
    a. engineering
    b/ pharming
    c. pretexting
    d. theft
    a. engineering
Author:
ginibutler
ID:
54573
Card Set:
Computer Exam
Updated:
2010-12-12 19:12:57
Tags:
Computer
Folders:

Description:
Exam for computers
Show Answers: