CSCI 1101: Introduction to Computers
Final Exam
Choose the correct answer.
- A legal contract that defines the ways in which you may use a computer program is called a(n) software license .
- software patent
- software license
- software scheme
- none of the above
- A(n) computer program is a set of instructions that tells a computer how to perform a particular task.
- control unit
- computer program
- output device
- input device
- Disk defragmenter is a utility program that locates and eliminates unnecessary fragments and rearranges files and unused disk space to optimize operations.
- My Computer
- Disk defragmenter
- Windows Explorer
- Backup
- Word processing software, a computerized golf game, and accounting software are all examples of application software .
- application software
- utility software
- operating systems
- system software
- The electronic and mechanical devices that manipulate data are known as hardware. This term refers to the computer and any peripheral devices.
- system software
- hardware
- software
- peripheral devices
- Which of the following is considered only as an input device? keyboard
- monitor
- floppy disk
- keyboard
- printer
- The Recycle Bin is an icon on the desktop which represents a temporary storage area for deleted files.
- Internet Explorer
- My Documents
- Recycle Bin
- Windows Explorer
- Two or more computers connected together to exchange information or share resources is referred to asa(n) network .
- bus line
- workgroup
- webcast
- network
- A(n) peripheral device designates equipment that might be added to a computer system to enhance its functionality.
- user interface
- peripheral device
- operating system
- software
- The system software that helps the computer control a peripheral device is called a(n)device driver .
- operating system
- device driver
- application software
- none of the above
- Output devices translate the processed information from the computer into a form that humans can understand.
- Input devices
- Output devices
- Keyboards
- all of the above
- People sometimes illegally copy, distribute, or modify software. The illegal copies they create are referred to as pirated software .
- pirated software
- lifted software
- gunned software
- none of the above
- The Binary system consists of two digits. Each 0 and 1 is called a bit
- byte
- bit
- word
- chip
- Every component of the system unit connects directly to the motherboard.
- motherboard
- fatherboard
- integrated circuit
- expansion card
- CD and DVD storage can be classified as optical storage.
- optical
- digital
- analog
- magnetic
- Cookies are specialized programs that are placed on a hard disk that monitor and track the user’s Web activity.
- Cookies
- Monitors
- Trackers
- Viruses
- How many bits are there in a byte? 8
- 20
- 4
- 16
- 8
- A Computer virus is a potentially damaging computer program that affects, or infects, your computer in a negative way.
- computer virus
- hoax
- snoopware program
- firewall
- Random access memory holds currently running programs and data being processed by the CPU.
- RAM
- CMOS
- ROM
- Read-only memory
- Antivirus software helps guard your system against “problem programs.” In order for this to be effective, it is important to update virus definitions regularly.
- Antivirus software
- Snoopware
- Spyware
- Encryption software
- CD- RW technology allows you to write data on a CD, then change that data at a later time.
- W
- R
- RW
- All of the above
- Each type of system unit has the same basic system components including the system board, microprocessor and memory .
- system cabinet
- coding schemes
- memory
- smart cards
- Kilobyte is a unit of measurement which represents approximately 1,000 bytes.
- Terabyte
- Megabyte
- Gigabyte
- Kilobyte
- RAMis considered volatile storage.
- RAM
- CMOS
- ROM
- Read-only memory
- A byte typically represents one character.
- bit
- character
- device
- electronic pulse
- RAM is the acronym for random access memory.
- read only memory
- read always memory
- random access memory
- ready access memory
- Ports on the expansion cards allow cables to be connected and are used to connect to devices outside of the system unit.
- RAM
- expansion cards
- closed architecture
- expansion slots
- Input is data or instructions used by a computer.
- the images and text displayed on the monitor
- processed data or information from a computer
- data or instructions used by a computer
- the hardware used to translate data into what people can understand
- One of the most common input devices is keyboard.
- mouse
- monitor
- keyboard
- printer
- Pixels are individual dots or picture elements that form images.
- Resolution
- Pixels
- Clarity
- Pictures
- The page that identifies a Web site and contains links to other pages in the site is known as the home page.
- home
- anchor
- base
- site-map
- Which of the following terms describes approximately 1,000,000 bytes?megabyte
- gigabyte
- megabyte
- kilobyte
- terabyte
- CD-ROM stands for compact disk – read only memory.
- computer disk ready optical medium
- computer disk random optical memory
- compact disk random optical medium
- compact disk read only memory
- Storage capacity refers to the amount of data that can be stored on a particular storage medium.
- Resolution
- Sector size
- File size
- Storage capacity
- The process of preparing a floppy disk for storage is called formatting.
- formatting
- disk defragmentation
- disk compression
- sectoring
- A head crash can occur whena read-write head makes contact with the hard disk’s surface or with particles on its surface. .
- the read-write head makes contact with the hard disk’s surface due to particles on its surface
- the read-write head makes contact with the hard disk’s surface due to the system unit being jarred while the disk is in motion
- the computer user lowers their head in frustration and collides with the desk
- both a and b
- Optical disks use reflected light. The 1s and 0s are represented by flat areas called lands and bumpy areas called pits.
- magnetic disks
- hard disks
- optical disks
- all of the above
- Which of the following, in most cases, has the highest storage capacity?Hard disk
- DVD
- floppy disk
- CD
- hard disk
- Specialized programs that assist users in locating information on the Web are called
search engines. - web browsers
- resource locators
- information engines
- search engines
- Browsers provide access to Web resources. Internet Explorer is one example.
- Search engines
- Internet service providers
- Browsers
- Metasearch engines
- Hyperlinks may appear as text or a graphic and are connections to other Web documents.
- Hyperlinks
- Plug-ins
- Applets
- URLs
- Which of the following could be a symptom of a possible virus?all of the above
- Your computer reboots unexpectedly
- Your executable files unaccountably increase in size
- You have difficulty saving files
- All of the above
- A metasearch engine is a program that automatically submits a search request to several search engines simultaneously.
- specialty engine
- browser
- metasearch engine
- plug-in
- Plug-ins are programs that are automatically loaded and operate as a part of your browser.
- specialty engine
- metasearch engine
- browser
- plug-in
- reading is the process of accessing information from secondary storage devices.
- Reading
- Writing
- Saving
- None of the above
- The write-protect notch is used to both b and c.
- keep someone from accessing the files saved on the floppy
- keep someone from modifying existing files on the floppy
- keep someone from saving new files to the floppy
- both b and c
- all of the above
- A toggle key will turn a feature on and off.
- turn a feature on and off
- activate commands
- disable the keyboard
- change the character
- A type of mouse that emits light to detect movement is referred to as optical.
- visual
- optical
- mechanical
- lateral
- Output is processed information.
- a last revision
- processed information
- character strings
- coded image sets
- Magnetic tape stores and retrieves information using sequential access.
- direct access
- raid array
- sequential access
- mathematically
- The time between when a computer requests data from a secondary storage device and the transfer of the data is called access time .
- access time
- down time
- lag time
- forward speed
- The modulator/demodulator is more commonly referred to as modem.
- adapter
- converter
- modem
- pixel
- Every device that is connected to the Internet is assigned a unique number called a(n) IP address.
- TCP
- HTTP
- protocol
- IP
- A(n) ISPis a company that maintains Internet computers and telecommunications equipment in order to provide Internet access to businesses, organizations, and individuals.
- DSS
- DSL
- ISDN
- ISP
- A(n) browser is a software program that runs on your computer and helps you access Web pages.
- explorer
- browser
- navigator
- manager
- Any file that travels with an e-mail message is called an e-mail attachment.
- attachment
- key
- ASCII
- text file
- A microprocessor is an integrated circuit designed to process instructions.
- cache
- microprocessor
- serial port
- network port
- A user interface can be defined as the combination of hardware and software that helps people and computers communicate with each other.
- buffer
- interface
- index
- montage
- The Windows Explorer utility allows you to view a list of files, move them to different storage devices, copy them, rename them, and delete them.
- Control Panel
- Disk Manager
- Windows Explorer
- Help
- The floppy disk drive is usually assigned the device letter A.
- A
- B
- C
- F
- In the file specification, C:\My Files\English\Report 1.doc, Report 1 is the filename
- drive letter
- primary folder
- filename
- extension
- Using the Ctrlkey as you click each item works well to select files that are not listed consecutively.
- Shift
- Alt
- F1
- Ctrl
- Fiber-optic cable is a bundle of extremely thin tubes of glass.
- UTP
- STP
- Coaxial
- Fiber-optic
- A(n) graphical userinterface features menus and icons that you can manipulate with the click of a mouse.
- command-line
- graphical user
- buffer
- indexed
- A(n) expansion slot is a long, narrow socket on the motherboard into which you can plug a(n) expansion card.
- expansion slot
- expansion card
- peripheral device
- data bus
- Software controlling the computer’s use of disk storage and memory is an operating system.
- Application software
- Gaming software
- An operating system
- None of the above
- Data pathways that link parts of the CPU together and to other components on the system board are called bus lines .
- Bus lines
- Controller cards
- Expansion slots
- Expansion ports
- A small circuit board which provides a computer with the ability to control a storage, input, or output device is referred to as a(n) expansion card .
- device driver
- expansion card
- peripheral device
- data bus
- A type of security system designed to protect an organization’s network against external threats is referred to as a firewall .
- flash wire
- portal block
- lock box
- firewall
- The bandwidth is a term used as a measure of a communication channels capacity.
- lapse time
- cable strength
- bandwidth
- seek time
- The address of a web page is referred to as URL.
- TCP
- URL
- Id-10
- PBI
- The somewhat false sense of security we have when using the Internet is called Illusion of Anonymity .
- Veil of Silence
- Illusion of Anonymity
- Cloud of Coverage
- Smoke and Mirrors
- Fitting the job to the worker rather than forcing the worker to fit the job is known as ergonomics.
- ergonomics
- economics
- enviromatics
- ectographics
- Users pose the biggest threat to computers and information.
- Users
- Consultants
- Hackers
- Programmers
- In general, job opportunities in the information technology area are projected to greatly increase.
- greatly increase
- greatly decrease
- stay about the same
- have no impact on employment