Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
CSC100 02 FINAL EXAM NAME: ____________________________________________________________________ Save this document to your desktop as Lastname_Firstname_FinalLecture. When finished, save and close the document and e-mail it to [email protected] Multiple Choice: Write A, B, C or D in the space provided 1. The difference between people with access to computers and the Internet and those without this access is known as the : A) Web divide C) digital divide B) Internet divide D) broadband divide ANSWER: ______ 2. Analyzing computer systems to gather potential legal evidence is A) computer detectives C) forensics detectives B) computer forensics D) computer enforcement ANSWER: ______ 3. Which of the following is NOT true about data? A) It represents a fact, a figure, or an C) It can be a recording of sound. idea. D) It has been organized or presented in B) It can be a number, a word, or a a meaningful way. picture. ANSWER: ______ 4. Computers use the ________ language consisting of 0s and 1s. A) symbol C) byte B) binary D) system ANSWER: ______ 5. Which of the following is the largest unit of measure for the size of a computer file? A) Megabyte C) Petabyte B) Gigabyte D) Terabyte ANSWER: ______ 6. The term "bit" is short for. A) megabyte B) binary language C) binary digit D) binary number ANSWER: ______ 7. The ________ contains the central electronic components of the computer. A) motherboard C) peripheral unit B) system unit D) input unit ANSWER: ______ 8. In binary language, each letter of the alphabet, each number, and each special character is made up of a unique combination of A) eight bytes C) eight characters B) eight kilobytes D) eight bits ANSWER: ______ 9. The number of pixels displayed on the screen is known as. A) contrast ratio C) brightness resolution B) aspect ratio D) screen resolution ANSWER: ______ 10. RAM is a ________ storage location. A) permanent B) volatile C) nonvolatile D) network ANSWER: ______ 11. Software refers to a set of instructions that tells the computer what to do. These instruction sets are called . A) databases C) peripherals B) programs D) devices ANSWER: ______ 12. System software does all of the following, EXCEPT A) help run the computer hardware devices B) coordinate instructions between C) add graphics and pictures to files application software and the computer's D) help manage system resources ANSWER: ______ 13. In databases, information is organized in A) tables B) records C) fields D) all of the above ANSWER: ______ 14. The ________ is (are) the group of programs that controls how your computer functions. A) utility programs C) user interface B) application software D) operating system ANSWER: ______ 15. The most essential software in your computer system is the A) security C) operating system B) antivirus D) productivity ANSWER: ______ 16. Each device attached to your computer comes with a special program called a ________ that facilitates communication between the device and the OS. A) device driver C) communication utility B) translator D) device configurator ANSWER: ______ 17. The top three operating systems for personal computers are A) Microsoft Windows, Mac OS X, and and Linux Android 3.0 D) Microsoft Windows, Mac OS X, and B) Mac OS X, Android 3.0, and UNIX Linux C) Microsoft Windows, Android 3.0, ANSWER: ______ 18. The location of a file is specified by it’s . A) drive letter B) file path C) file type D) file extension ANSWER: ______ 19. The process of optimizing RAM storage by borrowing hard drive space is called . A) thrashing C) virtual memory B) swap file D) page file ANSWER: ______ 20. All of the following are benefits of networks EXCEPT, A) sharing an Internet connection C) sharing files B) sharing printers and other peripherals D) sharing an operating system ANSWER: ______ 21. ________ is the maximum speed at which data can be transferred between two nodes. A) Throughput C) Band speed B) Bandwidth D) Through speed ANSWER: ______ 22. Which transmission medium transmits data the fastest? A) Twisted-pair cable C) Wireless B) Coaxial cable D) Fiber-optic cable ANSWER: ______ 23. Network adapters A) are built into the motherboard on each node B) enable nodes in a network to communicate with each other C) are always Ethernet NICs D) are necessary only on servers in a client/server network ANSWER: ______ 24. Client/server networks are controlled by a central server that runs a specialized piece of software called A) Windows 7 C) a firewall B) a network operating system (NOS) D) firmware ANSWER: ______ 25. Data are sent through a network on bundles called A) packages C) packets B) pouches D) switches ANSWER: ______ True/False questions: Write T or F in the space provided 26. An analog-to-digital converter chip converts the sound waves from a voice into digital signals ANSWER: ______ 27. VoIP uses radio waves to transmit data signals over short distances? ANSWER: ______ 28. An Internet connectivity plan is also known as a data plan ANSWER: ______ 29. VoIP can be considered an alternative to a traditional landline phone service. ANSWER: ______ 30. All cell phones have the same components as any computer. ANSWER: ______ 31. When converting analog waves to a series of numerical values, the higher the sampling rate, the more accurately the original wave can be re-created. ANSWER: ______ 32. You cannot be computer literate unless you have knowledge of higher level computer skills, such as computer programming. ANSWER: ______ 33. Data mining is the process of searching huge amounts of data with the hope of finding a pattern. ANSWER: ______ 34. The operating system provides the means for users to interact with a computer. ANSWER: ______ 35. Data and information are terms that can be used interchangeably. ANSWER: ______ 36. One bit is equal to eight bytes. ANSWER: ______ 37. The central processing unit controls all the functions performed by the computer's other components and processes all the commands issued to it by software instructions. ANSWER: ______ 38. The primary benefit of spreadsheet software is its capability to automatically recalculate formulas and functions. ANSWER: ______ 39. Microsoft's spreadsheet software is called Calc. ANSWER: ______ 40. Most word processing programs come with a search and replace tool that enables you to locate and replace specific text. ANSWER: ______ 41. Every computer has an operating system. ANSWER: ______ 42. When your computer runs out of RAM, the operating system borrows space from the CPU. ANSWER: ______ 43. You can use System Restore to restore your system's settings back to a specific date when everything was working properly. ANSWER: ______ 44. The Windows Backup and Restore Utility enables you to make a duplicate copy of all the data on your hard drive. ANSWER: ______ 45. SSID stands for service security identifier ANSWER: ______ 46. A network must be three or more computers that are connected through software and hardware so they can communicate with each other. ANSWER: ______ 47. In a peer-to-peer network, one computer acts as the server. ANSWER: ______ 48. Twisted-pair cable is made up of plastic or glass fibers that transmit data at extremely fast speeds. ANSWER: ______ 49. The most popular transmission media option for wired Ethernet networks is UTP cable. ANSWER: ______ 50. Wireless networks are more vulnerable to attack than wired networks. ANSWER: ______