CSCI 1101: Introduction to Computers

Final Exam

Choose the correct answer.

  1. A legal contract that defines the ways in which you may use a computer program is called a(n) software license .
  2. software patent
  3. software license
  4. software scheme
  5. none of the above
  1. A(n) computer program is a set of instructions that tells a computer how to perform a particular task.
  2. control unit
  3. computer program
  4. output device
  5. input device
  1. Disk defragmenter is a utility program that locates and eliminates unnecessary fragments and rearranges files and unused disk space to optimize operations.
  2. My Computer
  3. Disk defragmenter
  4. Windows Explorer
  5. Backup
  6. Word processing software, a computerized golf game, and accounting software are all examples of application software .
  7. application software
  8. utility software
  9. operating systems
  10. system software
  1. The electronic and mechanical devices that manipulate data are known as hardware. This term refers to the computer and any peripheral devices.
  2. system software
  3. hardware
  4. software
  5. peripheral devices
  6. Which of the following is considered only as an input device? keyboard
  7. monitor
  8. floppy disk
  9. keyboard
  10. printer
  11. The Recycle Bin is an icon on the desktop which represents a temporary storage area for deleted files.
  12. Internet Explorer
  13. My Documents
  14. Recycle Bin
  15. Windows Explorer
  1. Two or more computers connected together to exchange information or share resources is referred to asa(n) network .
  2. bus line
  3. workgroup
  4. webcast
  5. network

  1. A(n) peripheral device designates equipment that might be added to a computer system to enhance its functionality.
  2. user interface
  3. peripheral device
  4. operating system
  5. software
  1. The system software that helps the computer control a peripheral device is called a(n)device driver .
  2. operating system
  3. device driver
  4. application software
  5. none of the above
  1. Output devices translate the processed information from the computer into a form that humans can understand.
  2. Input devices
  3. Output devices
  4. Keyboards
  5. all of the above
  1. People sometimes illegally copy, distribute, or modify software. The illegal copies they create are referred to as pirated software .
  2. pirated software
  3. lifted software
  4. gunned software
  5. none of the above
  1. The Binary system consists of two digits. Each 0 and 1 is called a bit
  2. byte
  3. bit
  4. word
  5. chip
  1. Every component of the system unit connects directly to the motherboard.
  2. motherboard
  3. fatherboard
  4. integrated circuit
  5. expansion card
  6. CD and DVD storage can be classified as optical storage.
  7. optical
  8. digital
  9. analog
  10. magnetic
  11. Cookies are specialized programs that are placed on a hard disk that monitor and track the user’s Web activity.
  12. Cookies
  13. Monitors
  14. Trackers
  15. Viruses
  16. How many bits are there in a byte? 8
  17. 20
  18. 4
  19. 16
  20. 8

  1. A Computer virus is a potentially damaging computer program that affects, or infects, your computer in a negative way.
  2. computer virus
  3. hoax
  4. snoopware program
  5. firewall
  6. Random access memory holds currently running programs and data being processed by the CPU.
  7. RAM
  8. CMOS
  9. ROM
  10. Read-only memory
  11. Antivirus software helps guard your system against “problem programs.” In order for this to be effective, it is important to update virus definitions regularly.
  12. Antivirus software
  13. Snoopware
  14. Spyware
  15. Encryption software
  16. CD- RW technology allows you to write data on a CD, then change that data at a later time.
  17. W
  18. R
  19. RW
  20. All of the above
  1. Each type of system unit has the same basic system components including the system board, microprocessor and memory .
  2. system cabinet
  3. coding schemes
  4. memory
  5. smart cards
  6. Kilobyte is a unit of measurement which represents approximately 1,000 bytes.
  7. Terabyte
  8. Megabyte
  9. Gigabyte
  10. Kilobyte
  11. RAMis considered volatile storage.
  12. RAM
  13. CMOS
  14. ROM
  15. Read-only memory
  16. A byte typically represents one character.
  17. bit
  18. character
  19. device
  20. electronic pulse
  21. RAM is the acronym for random access memory.
  22. read only memory
  23. read always memory
  24. random access memory
  25. ready access memory

  1. Ports on the expansion cards allow cables to be connected and are used to connect to devices outside of the system unit.
  2. RAM
  3. expansion cards
  4. closed architecture
  5. expansion slots
  6. Input is data or instructions used by a computer.
  7. the images and text displayed on the monitor
  8. processed data or information from a computer
  9. data or instructions used by a computer
  10. the hardware used to translate data into what people can understand
  11. One of the most common input devices is keyboard.
  12. mouse
  13. monitor
  14. keyboard
  15. printer
  16. Pixels are individual dots or picture elements that form images.
  17. Resolution
  18. Pixels
  19. Clarity
  20. Pictures
  21. The page that identifies a Web site and contains links to other pages in the site is known as the home page.
  22. home
  23. anchor
  24. base
  25. site-map
  26. Which of the following terms describes approximately 1,000,000 bytes?megabyte
  27. gigabyte
  28. megabyte
  29. kilobyte
  30. terabyte
  31. CD-ROM stands for compact disk – read only memory.
  32. computer disk ready optical medium
  33. computer disk random optical memory
  34. compact disk random optical medium
  35. compact disk read only memory
  36. Storage capacity refers to the amount of data that can be stored on a particular storage medium.
  37. Resolution
  38. Sector size
  39. File size
  40. Storage capacity
  1. The process of preparing a floppy disk for storage is called formatting.
  2. formatting
  3. disk defragmentation
  4. disk compression
  5. sectoring

  1. A head crash can occur whena read-write head makes contact with the hard disk’s surface or with particles on its surface. .
  2. the read-write head makes contact with the hard disk’s surface due to particles on its surface
  3. the read-write head makes contact with the hard disk’s surface due to the system unit being jarred while the disk is in motion
  4. the computer user lowers their head in frustration and collides with the desk
  5. both a and b
  6. Optical disks use reflected light. The 1s and 0s are represented by flat areas called lands and bumpy areas called pits.
  7. magnetic disks
  8. hard disks
  9. optical disks
  10. all of the above
  11. Which of the following, in most cases, has the highest storage capacity?Hard disk
  12. DVD
  13. floppy disk
  14. CD
  15. hard disk
  16. Specialized programs that assist users in locating information on the Web are called
    search engines.
  17. web browsers
  18. resource locators
  19. information engines
  20. search engines
  21. Browsers provide access to Web resources. Internet Explorer is one example.
  22. Search engines
  23. Internet service providers
  24. Browsers
  25. Metasearch engines
  26. Hyperlinks may appear as text or a graphic and are connections to other Web documents.
  27. Hyperlinks
  28. Plug-ins
  29. Applets
  30. URLs
  31. Which of the following could be a symptom of a possible virus?all of the above
  32. Your computer reboots unexpectedly
  33. Your executable files unaccountably increase in size
  34. You have difficulty saving files
  35. All of the above
  36. A metasearch engine is a program that automatically submits a search request to several search engines simultaneously.
  37. specialty engine
  38. browser
  39. metasearch engine
  40. plug-in
  41. Plug-ins are programs that are automatically loaded and operate as a part of your browser.
  42. specialty engine
  43. metasearch engine
  44. browser
  45. plug-in

  1. reading is the process of accessing information from secondary storage devices.
  2. Reading
  3. Writing
  4. Saving
  5. None of the above
  1. The write-protect notch is used to both b and c.
  2. keep someone from accessing the files saved on the floppy
  3. keep someone from modifying existing files on the floppy
  4. keep someone from saving new files to the floppy
  5. both b and c
  6. all of the above
  7. A toggle key will turn a feature on and off.
  8. turn a feature on and off
  9. activate commands
  10. disable the keyboard
  11. change the character
  12. A type of mouse that emits light to detect movement is referred to as optical.
  13. visual
  14. optical
  15. mechanical
  16. lateral
  17. Output is processed information.
  18. a last revision
  19. processed information
  20. character strings
  21. coded image sets
  22. Magnetic tape stores and retrieves information using sequential access.
  23. direct access
  24. raid array
  25. sequential access
  26. mathematically
  27. The time between when a computer requests data from a secondary storage device and the transfer of the data is called access time .
  28. access time
  29. down time
  30. lag time
  31. forward speed
  32. The modulator/demodulator is more commonly referred to as modem.
  33. adapter
  34. converter
  35. modem
  36. pixel
  37. Every device that is connected to the Internet is assigned a unique number called a(n) IP address.
  38. TCP
  39. HTTP
  40. protocol
  41. IP

  1. A(n) ISPis a company that maintains Internet computers and telecommunications equipment in order to provide Internet access to businesses, organizations, and individuals.
  2. DSS
  3. DSL
  4. ISDN
  5. ISP
  6. A(n) browser is a software program that runs on your computer and helps you access Web pages.
  7. explorer
  8. browser
  9. navigator
  10. manager
  11. Any file that travels with an e-mail message is called an e-mail attachment.
  12. attachment
  13. key
  14. ASCII
  15. text file
  16. A microprocessor is an integrated circuit designed to process instructions.
  17. cache
  18. microprocessor
  19. serial port
  20. network port
  21. A user interface can be defined as the combination of hardware and software that helps people and computers communicate with each other.
  22. buffer
  23. interface
  24. index
  25. montage
  26. The Windows Explorer utility allows you to view a list of files, move them to different storage devices, copy them, rename them, and delete them.
  27. Control Panel
  28. Disk Manager
  29. Windows Explorer
  30. Help
  31. The floppy disk drive is usually assigned the device letter A.
  32. A
  33. B
  34. C
  35. F
  36. In the file specification, C:\My Files\English\Report 1.doc, Report 1 is the filename
  37. drive letter
  38. primary folder
  39. filename
  40. extension
  41. Using the Ctrlkey as you click each item works well to select files that are not listed consecutively.
  42. Shift
  43. Alt
  44. F1
  45. Ctrl

  1. Fiber-optic cable is a bundle of extremely thin tubes of glass.
  2. UTP
  3. STP
  4. Coaxial
  5. Fiber-optic
  6. A(n) graphical userinterface features menus and icons that you can manipulate with the click of a mouse.
  7. command-line
  8. graphical user
  9. buffer
  10. indexed
  1. A(n) expansion slot is a long, narrow socket on the motherboard into which you can plug a(n) expansion card.
  2. expansion slot
  3. expansion card
  4. peripheral device
  5. data bus
  6. Software controlling the computer’s use of disk storage and memory is an operating system.
  7. Application software
  8. Gaming software
  9. An operating system
  10. None of the above
  11. Data pathways that link parts of the CPU together and to other components on the system board are called bus lines .
  12. Bus lines
  13. Controller cards
  14. Expansion slots
  15. Expansion ports
  16. A small circuit board which provides a computer with the ability to control a storage, input, or output device is referred to as a(n) expansion card .
  17. device driver
  18. expansion card
  19. peripheral device
  20. data bus
  21. A type of security system designed to protect an organization’s network against external threats is referred to as a firewall .
  22. flash wire
  23. portal block
  24. lock box
  25. firewall
  26. The bandwidth is a term used as a measure of a communication channels capacity.
  27. lapse time
  28. cable strength
  29. bandwidth
  30. seek time
  31. The address of a web page is referred to as URL.
  32. TCP
  33. URL
  34. Id-10
  35. PBI

  1. The somewhat false sense of security we have when using the Internet is called Illusion of Anonymity .
  2. Veil of Silence
  3. Illusion of Anonymity
  4. Cloud of Coverage
  5. Smoke and Mirrors
  6. Fitting the job to the worker rather than forcing the worker to fit the job is known as ergonomics.
  7. ergonomics
  8. economics
  9. enviromatics
  10. ectographics
  11. Users pose the biggest threat to computers and information.
  12. Users
  13. Consultants
  14. Hackers
  15. Programmers
  16. In general, job opportunities in the information technology area are projected to greatly increase.
  17. greatly increase
  18. greatly decrease
  19. stay about the same
  20. have no impact on employment