Download Final Lecture Test

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Computer security wikipedia , lookup

Wake-on-LAN wikipedia , lookup

Zero-configuration networking wikipedia , lookup

Cracking of wireless networks wikipedia , lookup

Transcript
CSC100 02 FINAL EXAM
NAME: ____________________________________________________________________
Save this document to your desktop as Lastname_Firstname_FinalLecture.
When finished, save and close the document and e-mail it to [email protected]
Multiple Choice: Write A, B, C or D in the space provided
1. The difference between people with access to computers and the Internet and those without
this access is known as the :
A) Web divide
C) digital divide
B) Internet divide
D) broadband divide
ANSWER: ______
2. Analyzing computer systems to gather potential legal evidence is
A) computer detectives
C) forensics detectives
B) computer forensics
D) computer enforcement
ANSWER: ______
3.
Which of the following is NOT true about data?
A) It represents a fact, a figure, or an
C) It can be a recording of sound.
idea.
D) It has been organized or presented in
B) It can be a number, a word, or a
a meaningful way.
picture.
ANSWER: ______
4.
Computers use the ________ language consisting of 0s and 1s.
A) symbol
C) byte
B) binary
D) system
ANSWER: ______
5. Which of the following is the largest unit of measure for the size of a computer file?
A) Megabyte
C) Petabyte
B) Gigabyte
D) Terabyte
ANSWER: ______
6. The term "bit" is short for.
A) megabyte
B) binary language
C) binary digit
D) binary number
ANSWER: ______
7. The ________ contains the central electronic components of the computer.
A) motherboard
C) peripheral unit
B) system unit
D) input unit
ANSWER: ______
8. In binary language, each letter of the alphabet, each number, and each special character is
made up of a unique combination of
A) eight bytes
C) eight characters
B) eight kilobytes
D) eight bits
ANSWER: ______
9. The number of pixels displayed on the screen is known as.
A) contrast ratio
C) brightness resolution
B) aspect ratio
D) screen resolution
ANSWER: ______
10. RAM is a ________ storage location.
A) permanent
B) volatile
C) nonvolatile
D) network
ANSWER: ______
11. Software refers to a set of instructions that tells the computer what to do. These instruction
sets are called .
A) databases
C) peripherals
B) programs
D) devices
ANSWER: ______
12.
System software does all of the following, EXCEPT
A) help run the computer
hardware devices
B) coordinate instructions between
C) add graphics and pictures to files
application software and the computer's
D) help manage system resources
ANSWER: ______
13. In databases, information is organized in
A) tables
B) records
C) fields
D) all of the above
ANSWER: ______
14. The ________ is (are) the group of programs that controls how your computer functions.
A) utility programs
C) user interface
B) application software
D) operating system
ANSWER: ______
15. The most essential software in your computer system is the
A) security
C) operating system
B) antivirus
D) productivity
ANSWER: ______
16. Each device attached to your computer comes with a special program called a ________ that
facilitates communication between the device and the OS.
A) device driver
C) communication utility
B) translator
D) device configurator
ANSWER: ______
17. The top three operating systems for personal computers are
A) Microsoft Windows, Mac OS X, and
and Linux
Android 3.0
D) Microsoft Windows, Mac OS X, and
B) Mac OS X, Android 3.0, and UNIX
Linux
C) Microsoft Windows, Android 3.0,
ANSWER: ______
18. The location of a file is specified by it’s .
A) drive letter
B) file path
C) file type
D) file extension
ANSWER: ______
19. The process of optimizing RAM storage by borrowing hard drive space is called .
A) thrashing
C) virtual memory
B) swap file
D) page file
ANSWER: ______
20. All of the following are benefits of networks EXCEPT,
A) sharing an Internet connection
C) sharing files
B) sharing printers and other peripherals
D) sharing an operating system
ANSWER: ______
21. ________ is the maximum speed at which data can be transferred between two nodes.
A) Throughput
C) Band speed
B) Bandwidth
D) Through speed
ANSWER: ______
22. Which transmission medium transmits data the fastest?
A) Twisted-pair cable
C) Wireless
B) Coaxial cable
D) Fiber-optic cable
ANSWER: ______
23. Network adapters
A) are built into the motherboard on
each node
B) enable nodes in a network to
communicate with each other
C) are always Ethernet NICs
D) are necessary only on servers in a
client/server network
ANSWER: ______
24. Client/server networks are controlled by a central server that runs a specialized piece of
software called
A) Windows 7
C) a firewall
B) a network operating system (NOS)
D) firmware
ANSWER: ______
25. Data are sent through a network on bundles called
A) packages
C) packets
B) pouches
D) switches
ANSWER: ______
True/False questions: Write T or F in the space provided
26. An analog-to-digital converter chip converts the sound waves from a voice into digital
signals
ANSWER: ______
27. VoIP uses radio waves to transmit data signals over short distances?
ANSWER: ______
28. An Internet connectivity plan is also known as a data plan
ANSWER: ______
29. VoIP can be considered an alternative to a traditional landline phone service.
ANSWER: ______
30. All cell phones have the same components as any computer.
ANSWER: ______
31. When converting analog waves to a series of numerical values, the higher the sampling rate,
the more accurately the original wave can be re-created.
ANSWER: ______
32. You cannot be computer literate unless you have knowledge of higher level computer skills,
such as computer programming.
ANSWER: ______
33. Data mining is the process of searching huge amounts of data with the hope of finding a
pattern.
ANSWER: ______
34. The operating system provides the means for users to interact with a computer.
ANSWER: ______
35. Data and information are terms that can be used interchangeably.
ANSWER: ______
36. One bit is equal to eight bytes.
ANSWER: ______
37. The central processing unit controls all the functions performed by the computer's other
components and processes all the commands issued to it by software instructions.
ANSWER: ______
38. The primary benefit of spreadsheet software is its capability to automatically recalculate
formulas and functions.
ANSWER: ______
39. Microsoft's spreadsheet software is called Calc.
ANSWER: ______
40. Most word processing programs come with a search and replace tool that enables you to
locate and replace specific text.
ANSWER: ______
41. Every computer has an operating system.
ANSWER: ______
42. When your computer runs out of RAM, the operating system borrows space from the CPU.
ANSWER: ______
43. You can use System Restore to restore your system's settings back to a specific date when
everything was working properly.
ANSWER: ______
44. The Windows Backup and Restore Utility enables you to make a duplicate copy of all the
data on your hard drive.
ANSWER: ______
45. SSID stands for service security identifier
ANSWER: ______
46. A network must be three or more computers that are connected through software and
hardware so they can communicate with each other.
ANSWER: ______
47. In a peer-to-peer network, one computer acts as the server.
ANSWER: ______
48. Twisted-pair cable is made up of plastic or glass fibers that transmit data at extremely fast
speeds.
ANSWER: ______
49. The most popular transmission media option for wired Ethernet networks is UTP cable.
ANSWER: ______
50. Wireless networks are more vulnerable to attack than wired networks.
ANSWER: ______