Sunteți pe pagina 1din 112

EXAM ON INFORMATION TECHNOLOGY

1. An engineer who needs to manage new product development might use what type of software?

a. process management software


b. engineering management software
c. product development management software
d. project management software

2. With the cover off the system unit of a lab computer, your instructor pointed out a type of nonvolatile
memory that can be erased electronically and rewritten. What did your instructor call this memory?

a. perm-memory
b. firewire
c. flash memory
d. EM-ROM

3. A USB ____ is a device that plugs into your PC’s USB port to convert one port into several USB ports.

a. module
b. hub
c. connector
d. bus

4. When a user runs an application, what transfers from a storage device to memory?

a. instructions
b. operations
c. cache
d. registrations

5. When determining the amount of RAM necessary for a computer you wish to purchase, what should
you consider?

a. the size of the computer monitor


b. the processing speed of the CPU
c. the types of software you plan to use
d. the number of expansion slots found in the computer

6. If someone feels distressed when deprived of computers and mobile devices, that person is said to
suffer from what
condition?

a. Technological interference
b. Technological neurosis
c. Technology overload
d. Technology use syndrome
EXAM ON INFORMATION TECHNOLOGY

7. Which of the following statements is not true about Internet and network attacks?

a. Information kept on an organization’s premises has a higher security risk than information
transmitted over networks.
b. It is usually the responsibility of the network administrators to take measures to protect a network
from security risks.
c. Internet and network attacks that jeopardize security include malware, botnets, denial of service
attacks, back doors, and spoofing.
d. No central administrator is present on the Internet.

8. To prevent unauthorized users from reading data as it travels over a network, what process should
the administrator specify?

a. scrambling
b. authorization
c. encryption
d. decoding scrambling

9. You have just provided the identification number that associates your new software purchase with
the mobile device on which you installed the software. What is the term for this process?

a. app installation
b. software deployment
c. product activation
d. software decryption

10. The ____ is cited as a disadvantage of Web-based training and distance learning by some educators.

a. inflexible location
b. strict-paced instruction
c. lack of face-to-face contact
d. slow feedback and generalized content

11. Which of the following are the two leading manufacturers of personal computer processor chips?

a. AMD and Xeon


b. Xeon and Intel
c. Intel and AMD
d. Intel and Quad

12. Some data projectors include an iPod ____ to connect a video iPod in order to project videos stored
on that device.

a. display c. touch-screen
b. dock d. port
13. You are going to form a partnership with an organization that sells domain names. What kind of
organization is your
EXAM ON INFORMATION TECHNOLOGY

partner?

a. cybersquatter
b. registrar
c. domain vendor
d. ICANN vendor

14. Which of the following features is offered by WBT?

a. innovative, state-of-the-art graphical representations of world biology and technology-related science


b. primary science documentation adapted for web browsers on both PC and Apple computers
c. DTP with online follow-up
d. self-directed, self-paced instruction

15. What is the print option where the page is taller than it is wide?

a. printout
b. planed
premier
c. premier
d. portrait

16. Which of the following is not true about output types?

a. Graphics can enhance visual appeal and convey information.


b. Many websites use animation.
c. Memos, press releases, and mailing labels include mostly text.
d. Traditional podcasts all make use of video output.

17. Which of the following terms refers to a written list of guidelines that might include rules that
prevent employees from using software illegally or using computers to steal?

a. an IT code of conduct
b. fair use
c. a software license
d. digital rights management

18. In a printer, the number of ____ affects the quality of printed output.

a. characters per second (cps)


b. characters per inch (cpi)
c. lines per inch (lpi)
d. dots per inch (dpi)

19. Bryan has just started an internship in which he uses a database frequently. The database contains
information about the company’s employees. Bryan’s supervisor senses that he is anxious about using
the database and drops by to give him a short tutorial.
Bryan’s supervisor explains that to retrieve information from the database, Bryan needs to use a ____.
EXAM ON INFORMATION TECHNOLOGY

a. formula
b. presentation
c. form
d. query

20. ____ identify users by a particular unique biological characteristic.

a. Biometric access systems


b. Password access systems
c. Possessed knowledge access systems
d. Possessed object access systems

21. The numbering system we commonly use is called the decimal numbering system because it uses
____ symbols to represent all possible numbers.

a. 5
b. 2
c. 16
d. 10

22. What kind of camera is found on a computer that allows you to be seen during a video telephone
call?

a. ComCam
b. webcam
c. call cam
d. monitor cam
Feedback

23. If a tablet has no keyboard, how do you type on it?


Select one:
a. You use a keyboard application.
b. You activate a wired keyboard.
c. You use a server to communicate with the tablet.
d. You use an on-screen keyboard.

24. ____ are used to input data about a person into a computer system so that the individual can be
identified based on a particular unique physiological characteristic.

a. RFID tags
b. MICR readers
c. Biometric readers
d. OMRs
25. A DNS server is able to identify which of the following?

a. every computer or device connected to the Internet


b. the browser being used by a mobile device
EXAM ON INFORMATION TECHNOLOGY

c. the TLD for a given company


d. an IP address based on a domain name

26. The quality of an LCD monitor or LCD screen depends on several factors. Which of the following is
not true about the factors that affect LCD display quality?

a. A lower resolution makes screen items appear smaller.


b. The response time is the time in milliseconds it takes to turn a pixel on or off.
c. Resolution is the number of horizontal and vertical pixels in a display device.
d. Dot pitch is the distance in millimeters between pixels on a display device.

27. ____ is a set of rules for exchanging data over the Web.

a. XML
b. MP3
c. CGI
d. PDF

28. When a Web page requires a very large image (such as to better show a product, home for sale, or
featured piece of art, for instance), a(n) ____ can be used to save loading time.

a. sample image
b. button image
c. icon image
d. thumbnail image

29. Conventional dial-up connects to the Internet at a maximum of ____.

a. 28.8 Kbps
b. 56 Kbps
c. 128 Kbps
d. 10.2 Kbps

30. What is the definition of nonresident in terms of parts of the operating system?

a. instructions that remain on a storage medium until they are needed


b. programs or files that are not compatible with the operating system
c. peripheral devices whose drivers are not yet installed
d. data that remains in memory while the computer is running

31. Popular drawing programs include ____ and CorelDRAW.

a. Adobe Illustrator c. Harvard Graphics


b. Corel Paint Shop Pro d. IBM Storyboard
32. Which of the following is not an example of a dedicated line?

a. dial-up
b. ISDN
EXAM ON INFORMATION TECHNOLOGY

c. DSL
d. ATM

33. One emerging type of Trojan horse is called a ____-Access Trojan.

a. Demote
b. Hacker
c. Remote
d. Control

34. A wireless keyboard is a battery-powered device that transmits data to the system unit using
wireless technology. Which of the following wireless technologies commonly are used for this purpose?

a. DVI
b. SATA
c. KeyTrack
d. Bluetooth

35. In DOS, the command ____ displays the files and folders in the current location.

a. COPY
b. FORMAT
c. DIR
d. CD

36. Which of the following can be used to create a software registration number, sometimes illegally?

a. keygen
b. public key
c. BSA
d. decryption key

37. A computer’s ____ is a collection of programs that manage and coordinate the activities taking place
within a computer system.

a. database system
b. operating system
c. storage system
d. application system

38. The company for which you work has just released an updated device driver version. Which of the
following is least likely to be the reason for the release?

a. to enhance its functionality


b. to manage new Internet connectivity issues
c. to increase compatibility with new operating system versions
d. to correct problems with previous drivers
EXAM ON INFORMATION TECHNOLOGY

39. You want to help ensure that unauthorized people will not be able to view the files on a given
medium. Which of the following will you use?

a. encryption
b. concatentation
c. file linking
d. embedding

40. There are a number of special Web pages, called ____, available to help you locate what you are
looking for on the Internet.

a. domain identifications
b. Internet repositories
c. domain sites
d. search sites

41. In a worksheet, the intersection of a row and a column is called a ____.

a. cell
b. pointer
c. footer
d. table

42. Charts are inserted into an Excel spreadsheet using the commands in the Charts group on the ____
tab on the Ribbon.

a. Data
b. Format
c. Insert
d. Tools

43. During the 1980s and early 1990s, ____ was the dominant operating system for microcomputers.

a. Mac OS
b. desktop operating system
c. DOS (Disk Operating System)
d. Linux

44. Melissa is the network administrator for a small publishing company. As network administrator, she
is in charge of maintaining the security of all the computers that are part of the company’s network.
One of the first items that Melissa installed was a(n) ____, which checks all incoming and outgoing
traffic and only allows authorized traffic to pass through.

a. firewall
b. encryption algorithm
c. botnet
d. IPS
EXAM ON INFORMATION TECHNOLOGY

45. When a radio station broadcasts a live sporting event over the Web, what technology are they
using?

a. strobbing
b. podcasting
c. streaming
d. gaming

46. Which of the following is NOT a suggestion for easing eyestrain while using a mobile device?

a. Position the display about 90 degrees below eye level.


b. Clean the screen regularly.
c. Take an eye break every 30 minutes.
d. Blink your eyes every five seconds.

47. Which is the best description of a coaxial cable?

a. one or more pairs of copper wires bundled together


b. a single copper wire surrounded by at least three layers
c. a cohesive cable connected at axis points
d. dozens or hundreds of thin strands of glass or plastic that use light to transmit signals

48. What type of software can your parents use to create a will without visiting an attorney?

a. court-documented software
b. legal software
c. accounting/tax preparation software
d. attorney supernumerary software

49. Most notebooks follow the traditional ____ design in which the monitor is on the inside top half of
the PC, and the keyboard and touch pad are on the inside bottom half.

Select one:
a. Microsoft
b. clamshell
c. IBM
d. book

50. In addition to personal operating systems and server operating systems, there are also mobile
operating systems and ____.

a. storage operating systems


b. high-performance operating systems
c. embedded operating systems
d. virtual operating systems
EXAM ON INFORMATION TECHNOLOGY

1. ____ can be extremely distressing for victims, can take years to straighten out, and can be very
expensive.

a. Spams
b. Software theft
c. Identity theft
d. Remote access

2. Which network type connects each computer and device to a central device?

a. a core network
b. a ring network
c. a bus network
d. a star network

3. What is a single device that provides functionality of a printer, scanner, copy machine, and perhaps a
fax machine called?

a. a SOHO machine
b. a multifunction printer
c. a multipurpose peripheral
d. a dual use machine

4. Each place value in a binary number represents ____ raised to the appropriate power.

a. 1
b. 10
c. 0
d. 2

5. A strategy for speeding up hard drive performance is ____.

a. disk backing up
b. disk wiring
c. disk caching
d. disk tracking

6. You have heard that it is possible to improve your computer's performance by storing all related files
for a particular program together. What is the term for this?

a. reoperationalization
b. compression
c. maintenance
d. defragmenting
EXAM ON INFORMATION TECHNOLOGY

7. You are looking for the basic storage unit on a mobile device. Which of the following represents a
single character?

a. megabyte
b. bit
c. gigabyte
d. byte

8. Rodney owns a computer that he uses to work, keep in touch with friends and family, watch movies,
listen to music, and use the Internet.

Rodney wants to be able to easily carry files with him wherever he goes but he also has a tendency to
lose things. Knowing this, he should probably save those files on a ____ drive which he can then attach
to his backpack.

a. USB flash
b. CD
c. hard
d. fusion

9. The term ____ refers to accessing someone else’s unsecured Wi-Fi network from the hacker’s current
location (such as inside his or her home, outside a Wi-Fi hotspot location, or near a local business).

a. Wi-Fi worming
b. war driving

10. You want to remove a program from your computer. What do you use?

a. Uninstaller
b. File Compression
c. Backup and Restore
d. Defragmenter

11. A growing number of college campuses have wireless ____ on campus that allow students to use
their PCs to connect wirelessly to the college network and the Internet from anywhere on campus.

a. hotpoints
b. com spots
c. hotspots
d. com points

12. Antivirus programs are usually set up to automatically download new ____ from their associated
Web site on a regular basis.

a. virus reports
b. virus definitions
c. software versions
d. upgrades
EXAM ON INFORMATION TECHNOLOGY

Feedback
Your answer is incorrect.
The correct answer is: virus definitions

13. What type of media transmits multiple signals simultaneously?

a. backbone
b. broadband
c. bandwidth
d. broadwidth

14. To restore a file or folder deleted from your computer’s hard drive, open your computer’s ____ and
restore the file to its original location.

a. Windows Explorer
b. System Restore program
c. Recycle Menu
d. Recycle Bin

15. The accompanying figure shows a portable ____ reader.

a. barcode
b. RFID
c. optimal mark
d. scanner

16. What does the S in SQL stand for?

a. System
b. Serial
c. Server
d. Structured

17. Which type of optical scanner works in a manner similar to a copy machine?

a. pen scanner
b. sheet-fed scanner
c. drum scanner
d. flatbed scanner
EXAM ON INFORMATION TECHNOLOGY

18. A(n) ____ is a named, preprogrammed formula, such as to compute the average of a group of cells
or calculate a mortgage payment amount.

a. label
b. cell
c. argument
d. function

19. Unless you want to allow others to follow your locations throughout the day, disable the ____
tracking feature.

a. GPS
b. BIOS
c. IP
d. NET

20. The key element of the microprocessor is the ____—a device made of semiconductor material that
acts like a switch controlling the flow of electrons inside a chip.

a. transistor
b. chipbus
c. S-card
d. processor

21. ____ is typically used with LANs that have a star topology and can be used in conjunction with
twisted-pair, coaxial, or fiber-optic cabling.

a. Wi-Fi
b. Token Ring
c. Ethernet
d. 80xx2.11

22. You are looking for the best protection against data loss. Which of the following will you use?

a. differential backup
b. archival backup
c. selective backup
d. partial backup

23. You keep hearing a colleague of yours use a term and you are unfamiliar with it. Ultimately,
however, you realize that it is a synonym for the term port. What is it?

a. jack
b. unit
c. scope
d. probe
EXAM ON INFORMATION TECHNOLOGY

24.What is the simplest RAID storage design?

a. mirroring
b. selection
c. outsourcing
d. archival

25. What is an AUP intended to do?

a. license software for individual use


b. contract with an outside organization to provide security and recovery services for a network
c. establish a network of computers, such as a homegroup
d. outline computer activities for which the computer and network may or may not be used

26. Your organization has a large number of servers. Which of the following are you most likely to
choose as a result?

a. bay server
b. blade server
c. rack server
d. tower server

27. Which of the following search texts will display pizza or sandwich places in New Orleans?

a. New Orleans (pizza or sandwich)


b. *New Orleans + pizza_sandwich
c. pizza + sandwich (New Orleans)
d. “New Orleans + pizza_or_sandwich”

28.____ refers to guidelines for online behavior.

a. Netiquette
b. Web etiquette
c. Net rules
d. Internet Rules

29. Presentation graphics programs contain an assortment of tools and operations for creating and
editing slides, including preformatted ____ containing placeholders for the various elements in the slide.

a. slide layouts
b. charts
c. slide clips
d. wizards
EXAM ON INFORMATION TECHNOLOGY

30. ____ generally refers to applications and services that use the Web as a platform to deliver rich
applications that enable people to collaborate, socialize, and share information online.

a. Web Y
b. Web 1.0
c. Web X
d. Web 2.0

31. Jamie is interested in pursuing computers as a career. He is very comfortable working with PCs and
has a broad knowledge of the typical systems and applications software that people use. He has always
enjoyed working closely with people and has a good facility for explaining how technical systems work.
Jamie’s mother is a computer programmer and would like Jamie to follow in her footsteps. What course
would she most likely suggest that Jamie take in college?

a. history of computing
b. Java
c. computer literacy
d. systems analysis

32. What does the booting process do?

a. shuts down the computer


b. starts the computer in safe mode
c. sends the computer to idle mode
d. starts or restarts the computer

33. Related software programs are sometimes sold bundled together as a ____, such as a group of
graphics programs, utility programs, or office-related software.

a. software thread
b. software bank
c. software base
d. software suite

34. With a streaming audio file, only a small portion of the audio file is initially downloaded and ____,
and then the audio file can begin playing while the remainder of the file downloads simultaneously.

a. screened
b. buffered
c. stored
d. archived

35. In reference to search utilities, what does an index do?

a. marks space on the storage medium


b. stores information about a file, including its name, date created, and author name
c. saves commonly searched for items in a list so that you can revisit them easily
d. contains a list of shortcuts to file locations
EXAM ON INFORMATION TECHNOLOGY

36, Which of the following technologies is your new wireless headset most likely to use?

a. TCP/IP
b. Bluetooth
c. RFID
d. IrDA

37. Anthony is passionate about politics and enjoys sharing and discussing his views with others over the
Internet.
Anthony regularly visits several popular political ____, which are Web pages designed to facilitate
written discussions between people on specific subjects.

a. e-mail programs
b. Webinars
c. podcasts
d. message boards

38. ____ apps can allow you to lock your mobile device and SIM card remotely.

a. remote security
b. mobile tech
c. mobile security
d. SIM security

39. What company did Larry Ellison help found?

a. Microsoft
b. Sybase
c. Oracle
d. Sun Microsystems

40. You want to bring your game console to another location. How heavy is a typical a game console?

a. 15 pounds
b. one-half pound
c. four pounds
d. one pound

41. Most computer tapes today are in the form of ____ tapes, as shown in the accompanying figure.

a. cartridge
b. flash
c. floppy
d. optical
EXAM ON INFORMATION TECHNOLOGY

42. Which of the following best describes e-commerce?

a. a transaction between two businesses that are bartering and auctioning goods and services via secure
telephonic connections
b. a business transaction that occurs over an electronic network such as the Internet
c. a customer (consumer) experience requiring the Internet, cash, a shopping cart, and videos
d. the sale of electronic goods and services that enable an Internet connection

43. What is the role of the W3C?

a. control the World Wide Web; monitor and govern the use of data and information communicated
over the
Internet
b. supervise and approve corporate and commercial use of the World Wide Web
c. oversee research and set standards for many areas of the Internet
d. own and control the Internet

44. ____ is the most widely used mobile operating system worldwide.

a. Windows Mobile
b. Mac OS
c. Symbian OS
d. Palm OS

45. Which of the following technologies is the new tollbooth on the local highway most likely to use?

a. RFID
b. IrDA
c. TCP/IP
d. Bluetooth

46. Andrea is an aspiring songwriter and musician. She is creating a Web site that would allow her to
showcase her talent and gain exposure.
Once Andrea has recorded her music in an audio file, she would need to use a ____ method to reduce
the size of the file before making it available through her Web site.

a. streaming
b. filtering
c. compression
d. buffering

47. The ____ format is a format specifically created for Web page images.

a. PNG
b. BMP
c. PPT
d. TIF
EXAM ON INFORMATION TECHNOLOGY

48. What kind of controller uses serial signals to transfer data, instructions, and information?

a. SAS
b. SATA
c. SCSI
d. EIDE

49. You need to purchase a new application on behalf of your company, one that will track product
inventory and manage shipping status. Which kind of software will you buy?

a. distribution software
b. human resources software
c. manufacturing software
d. retail software

50. ____ monitors can be added to a computer without requiring a video card that supports multiple
monitors.

a. USB
b. VGA
c. Monochrome
d. GPU
EXAM ON INFORMATION TECHNOLOGY

1.____ is a versatile video format developed by Apple and widely used to distribute video over the Web.

a. .mp3
b. .wmv
c. .mov
d. .avi

2. Which of the following is your library using because it costs less, is easier to maintain, and uses less
power than desktop computers?

a. mainframe
b. thin client
c. tablet
d. ultrabook

3. A ____ is a place to store something temporarily.

a. cache
b. tape
c. track
d. sector

4. If you are looking for a keyboard to project from a device to a flat surface, which of the following
would you use?

a. virtual keyboard
b. integrated keyboard
c. wireless keyboard
d. digital keyboard

5. Which of the following mouse operations would you use if you want to display a shortcut menu?

a. point
b. drag
c. right-drag
d. right-click

6. What component converts the AC power in a wall plug to the DC power required by a computer?

a. electrical alternator
b. power surge and adaptation coordinator
c. AC/DC flip-flop power switch
d. power supply
EXAM ON INFORMATION TECHNOLOGY

7. What is the usual rate of speed for the platters in a hard disk?

a. 2,000 to 4,000 rpm


b. 5,400 to 15,000 rpm
c. 24,500 to 36,000 rpm
d. 12,000 to 25,000 rpm

8. Direct Internet connections are typically ____ connections.

a. satellite
b. bandwidth
c. dial-up
d. broadband

9. A popular use of CD-RW and CD-R discs is to create audio CDs. What is the process of copying audio
and/or video data from a purchased disc and saving it on digital media called?

a. ripping
b. rooting
c. revolving
d. revving

10. Which of the following identifies three types of RAM in sequence from the slowest to the fastest?

a. MRAM, SRAM, DRAM


b. DRAM, SRAM, RDRAM
c. SRAM, DRAM, MRAM
d. SRAM, MRAM, DRAM

11. Which of the following statements is NOT true about the database approach?

a. Databases require more memory, storage, and processing power than file processing systems.
b. The database approach increases the data’s integrity.
c. The database approach allows nontechnical users to access and maintain data.
d. A disadvantage to the database approach is isolated data.

12. A ____ is a software program that is designed to cause damage to the computer system or perform
some other malicious act.

a. computer virus
b. utility program
c. firewall
d. spyware

13. Which of the following connects the processor to cache?

a. expansion bus c. FSB


b. BSB d. system bus
EXAM ON INFORMATION TECHNOLOGY

14. What database term is used to describe a request for specific data from the database?

a. query
b. information
c. retrieval
d. analysis

15. You want to allow sound to be input through a microphone and output through external speakers on
your computer. What must you have in order to do this?

a. port duplicator
b. SCSI port
c. peripheral device manager
d. sound card

16. If you are running a check to ensure that a required field contains data, or the correct minimum
number of characters, what kind of check are you running?

a. completeness
b. check digit
c. alphabetic
d. range

17. When your friend opened the case containing the electronic components of his computer, he saw
the main circuit board for the computer. What is this circuit board called?

a. control board
b. electronic circuit primary board
c. command board
d. motherboard

18. In ____ transmission, data can travel in either direction, but only in one direction at a time.

a. half-duplex
b. half-simplex
c. simplex
d. duplex

19. If your friend recently has participated in e-filing, what has she been doing?

a. creating a file-based system that allows her to produce a transcript and resume and then send them
to potential employers online
b. accumulating digital graphics and photographs for online display
c. filing her state and/or federal tax returns online
d. using database software to electronically file all her records
EXAM ON INFORMATION TECHNOLOGY

20. You are designing software that will allow users to interact with it through ordinary, intuitive
behavior. Which of the following are you using?

a. GUI
b. TUI
c. BUI
d. NUI

21. ____ are programs designed to play audio and video files.

a. Media players
b. Media boxes
c. Real players
d. iPods

22. What makes the posts on Twitter considered a blog?


Select one:
a. The integration of posts with multimedia
b. Their journal format
c. Their social orientation
d. The nature of following

23. You want to connect your mobile device to a speaker. Which of the following is a way to do so?

a. with digital integration


b. via a port
c. using VoIP
d. via social media

24. Which of the following works in a manner similar to a copy machine?

a. display
b. memory
c. solid-state drive
d. scanner

25. What is the term for the process of comparing data with a set of rules or values to find out if the
data is correct?

Select one:
a. procedure
b. verification
c. validation
d. query
EXAM ON INFORMATION TECHNOLOGY

26. You want to clear the memory on your mobile device. Which of the following is sufficient?

a. cold boot c. warm boot


b. soft boot d. new boot

27. Your business is looking to rely on cloud computing services to make data available to its developers
to incorporate in applications. What is the term for this?

a. Data as a Service
b. Platform as a Service
c. Software as a Service
d. Infrastructure as a Service

28. ____ refers to the act of breaking into a computer or network.

a. Spoofing
b. Phishing
c. Hacking
d. Spamming

29. You want to shrink the size of a file. What do you use?

a. PC Maintenance
b. Backup and Restore
c. File Compression
d. Disk Cleanup

30. What is a NIC?

a. a network that controls Internet communications


b. a communications device that enables a computer or device that does not have built-in networking
capability to access a network
c. a network device that controls the IP addresses of the nodes on a network
d. a central communications device that allows computers and devices to transfer data wirelessly

31. You are looking for a port that will work for an audio device. Which of the following is likeliest to
work?

a. DVI
b. HDMI
c. VGA
d. Ethernet

32. Which of the following technologies uses a separate transistor to apply charges to each liquid crystal
cell?

a. organic-matrix c. active-matrix
b. standard-matrix d. dynamic-matrix
EXAM ON INFORMATION TECHNOLOGY

33. ____ includes all the programs that allow a user to perform specific tasks on a computer, such as
writing a letter.

a. Application software
b. Utility programs
c. System software
d. Background programs

34. You have just designed a device-tracking app for sale in the app marketplace. Which of the following
are you least likely to use in your app?

a. IP addresses
b. UNIX
c. GPS
d. Wi-Fi

35. ____ was originally developed as a programming language designed for processing text.

a. Perl
b. AJAX
c. ActiveX
d. JavaScript

36. When your friend is using a website that offers a variety of Internet services from a single convenient
location, what type of website is she using?

a. informational
b. content aggregator
c. portal
d. wiki

37. With which of the following can users transfer items to and from other computer on the Internet?

a. FTP
b. VoIP
c. IM
d. HTML

38. Which of the following is NOT true about storage media and devices?

a. In cloud storage, the actual storage media used is transparent to the user.
b. A storage medium with a capacity of 750 GB can hold approximately 750 billion bytes.
c. Storage media also is called secondary storage.
d. Writing is the process of transferring items from storage media to memory.
EXAM ON INFORMATION TECHNOLOGY

39. You are using a website to check the ticket availability for your flight to Denmark. To what category
does this website belong?

a. server websites c. static websites


b. tabbed websites d. dynamic websites

40. Your smartphone allows you to take and store photos, and play and view your digital media. What is
this overlap of technologies called?

a. digital device integration


b. digital device convergence
c. digital assimilation
d. digibridge

41. You are looking to implement a high-speed network with the sole purpose of providing storage to
other attached servers. Which of the following will you implement?

a. SAN
b. EIDE
c. eSATA
d. SCSI

42. ___ is a generic term that refers to any type of malicious software.

a. Spyware
b. Spamware
c. Malware
d. Badware

43. A Uniform Resource Locator is the same as which of the following?

a. Web address
b. client DNS
c. push-pull mechanism
d. Hypertext Transfer Protocol (HTTP)

44. ____ is a type of scam that uses spoofed domain names to obtain personal information for use in
fraudulent activities.

a. Fishing
b. Pharming
c. Framing
d. Farming

45. Rodney owns a computer that he uses to work, keep in touch with friends and family, watch movies,
listen to music, and use the Internet.
If Rodney wants to be able to record, erase, and overwrite the files on a CD, he should get a ____.
EXAM ON INFORMATION TECHNOLOGY

a. CD-R
b. CD-HD
c. CD-RW
d. CD-BD

46. You have a new application that is taking full advantage of the features of your smartphone,
including the touch
screen and an embedded GPS receiver. What kind of application is this?

a. desktop app
b. mobile app
c. tablet app
d. web app

47. You have a new web app and the host for it is going to provide storage for your data on their server.
What is this called?

a. mobile backup
b. RSS
c. cloud storage
d. syndication

48. ___ is an online news tool designed for facilitating the delivery of news articles, podcasts, and other
content regularly published to a Web site.

a. RSS
b. Video-on-demand
c. VoIP
d. Blog

49. How do you determine which type of computer — tablet, laptop, or desktop — is best?

a. It depends on your needs.


b. It depends on your network.
c. It depends on your client.
d. It depends on your application status.

50. You are looking for a term that can be used to refer collectively to hard disks and SSDs inside a
computer. Which of the following can you use?

a. internal hard drives


b. memory sets
c. optical storage devices
d. SANs
EXAM ON INFORMATION TECHNOLOGY

1. If a dog is identified by scanning the shoulder or neck of the animal, what provides the information
about the dog?

a. an animal ID processor
b. a microchip
c. an ALU
d. a tattooed ID number identified by the scanning device

2. One factor affecting digital camera quality is the number of pixels, measured in ____, used to store
the data for each image.

a. terapixels
b. megapixels
c. gigapixels
d. kilopixels

3. Which of the following is an alternative to a password you can use on your new mobile device?

a. biophasic recognition
b. swiping areas of the screen in a specified order
c. firewalls
d. keycodes

4. One advantage of a dial-up connection is ____.

a. continuous availability
b. security
c. sharing the connection
d. connection speed

5. ____ refers to identifying the browser used by each visitor, typically via JavaScript code.

a. Browser mapping
b. Visitor identification
c. Personalization
d. Browser sniffing

6. Eight bits grouped together are collectively referred to as a ____.

a. byte
b. pixel
c. kilobit
d. binary

7. The most common flat-panel technologies include liquid crystal display (LCD), various types of light
emitting diode (LED), and ____.

a. gas plasma
EXAM ON INFORMATION TECHNOLOGY

b. HD-integrated
c. DVR
d. HDTV

8. The most recent version of Windows is Windows ____.

a. Vista
b. XP
c. 7
d. Leopard

9. When your sister goes to work, what scientific discipline is used in the design of her workplace to
incorporate comfort, efficiency, and safety for her?

Select one:
a. factoronomics
b. ergonomics
c. form technics
d. human entomology

10. What is the approximate distance most Bluetooth devices can be from each other to communicate,
without using additional equipment?

a. 80 feet
b. 100 feet
c. 8 feet
d. 33 feet

11. Which of the following gestures would you use if you want to zoom in on your new tablet to see
more detail on a map,for example?

a. tap
b. pinch
c. stretch
d. press and hold

12. Which of the following mouse operations would you use if you want to draw a picture?

a. double-click
b. point
c. drag
d. click

13. ____ refers to the ability of an operating system to work with more than one program at one time.

a. Multitasking c. Polyprogramming
b. Multiprogramming d. Multidimensional
EXAM ON INFORMATION TECHNOLOGY

14. Sarah is a very active real estate agent. She is looking to purchase a new computer and software so
she can keep track of her client’s accounts, access the Internet from anywhere in the city, and touch-up
photos of real estate properties.
What kind of computer would most likely fit Sarah’s needs?

a. docking station
b. embedded
c. notebook
d. midrange server

15. ____ transmissions are used with cell phones and are sent and received via cellular (cell) towers.

a. Cellular radio
b. Satellite radio
c. Wi-Fi radio
d. PM radio

16. What is virtual memory?

a. where instructions are stored while waiting for a device to become idle
b. data that is not stored when the computer is turned off
c. data stored in the cloud
d. a portion of the hard disk designated to function as additional RAM

17. GIF images are always rectangular, but can use a(n) ____ background color to make the images
appear to be nonrectangular.

a. all color
b. generic
c. neutral
d. transparent

18. You want to remove unnecessary files from your computer. What do you use?

Select one:
a. PC Maintenance
b. File Compression
c. Backup and Restore
d. Disk Cleanup

19. You want to interact with a touch screen. Which of the following do you use?

a. apps
b. gestures
c. servlets
d. telemetry
EXAM ON INFORMATION TECHNOLOGY

20. To what does the term, blogosphere, refer?

a. the body of web design knowledge required to establish a blog


b. the software used to create blogs
c. the worldwide collection of blogs
d. individual blogs as opposed to corporate blogs

21. Display devices can be ____ displays, in which each pixel can only be one of two colors, such as black
or white.

a. bichrome
b. 1D
c. monochrome
d. flat color

22. What does EFT stand for?

a. electronic funds transfer


b. external fee transfer
c. electronic fee transportation
d. external funds transportation

23. Some Web-based encrypted e-mail systems—such as the popular free ____ service—require both
the sender and recipient to have accounts through that system.

a. CryptMail
b. PrivateMail
c. QuietMail
d. HushMail

24. ____ refers to the process of planning what your Web site will look like and how it will work.

a. Web site upload


b. Web site design
c. Web site deployment
d. Web site program

25. Which of the following contains data about each file in the database and each field in those files?

a. DBA
b. data dictionary
c. DBMS
d. data administrator

26. ____ software consists of the operating system and utility programs that control a computer system
and allow you to use your computer.

a. Application
EXAM ON INFORMATION TECHNOLOGY

b. System
c. Front-end
d. Background

27. Your smartphone, digital camera, and printer are all part of a network in your workspace. What type
of network is likely in use?

Select one:
a. LAN
b. VAN
c. MAN
d. PAN

28. When data in a spreadsheet program is changed, what occurs?

a. Nothing; once entered, the data cannot be changed.


b. A new version of the spreadsheet is saved automatically so that both the old version and the new
version are available.
c. All calculations can be recalculated.
d. The worksheet is reorganized using preconfigured algorithms to conform to the formatting and
hierarchical requirements of the spreadsheet program.

29. . There are four basic categories of software: commercial software, shareware, freeware, and ____.

a. licensed software
b. advertising software
c. public domain software
d. publish software

30. Which of the following gestures would you use if you want to activate a link on your new tablet?

a. tap
b. stretch
c. pinch
d. press and hold
Feedback
Your answer is incorrect.
The correct answer is: tap

30. Your company has elected to offload all storage management to an outside organization. What is the
term for this?

a. outsourcing
b. NAS
c. RAID
d. fiber channeling
EXAM ON INFORMATION TECHNOLOGY

32. How is printer resolution measured?

a. pixels per inch


b. points per inch
c. strikes per inch
d. dots per inch

33. A standard that is designed to connect peripheral devices, similar to Bluetooth, but that transfers
data more quickly is ____.

a. wireless USB
b. WiMAX
c. Mobile-Fi
d. xMax

34. What is the best analog for a 32-bit bus?

a. a 32-engine car
b. a 32-foot wide warehouse
c. all of the above
d. a 32-lane highway

35. What happens during a DDoS attack?

a. The police use a virus and other measures to take down a network of computer criminals.
b. Antivirus software disables a virus and protects the computer or network from unauthorized access.
c. A zombie army is used to attack computers or computer networks.
d. An unsuspecting computer is used to send an influx of confusing data messages or useless network
traffic.

36. You compose a new song and you now have exclusive rights to sell your song. Of which of the
following is this an example?

a. trademarking
b. private domain
c. intellectual publication
d. copyright

37. What are the four steps in the machine cycle?

a. decoding, fetching, executing, controlling


b. storing, executing, registering, cycling
c. arithmetic calculations, comparison, storing, pipelining
d. executing, fetching, storing, decoding
EXAM ON INFORMATION TECHNOLOGY

38. Windows, Mac OS, and which other operating system constitute three desktop operating systems?

a. DOS
b. Linux
c. Amazon
d. Internet Explorer

39. Which of the following statements is not true of Wi-Fi?

a. Wi-Fi sometimes is referred to as wireless Ethernet.


b. Even if two products are Wi-Fi Certified, they must share the same platform in order to communicate.
c. When a Wi-Fi network accesses the Internet, it works in conjunction with the TCP/IP network
standard.
d. In open or outdoor areas free from interference, computers or devices should be within 300 feet of
each other to be able to communicate.

40. How is an operating system that runs on computers provided by a variety of manufacturers
classified?

a. device-independent
b. generic
c. multiprocessing
d. proprietary software

41. Lisa is a student who regularly uses the computers at her local Internet café to listen to music, talk to
her friends and family through the Internet, and play computer games.
The Internet café has recently enacted a new policy that says that all users must use the ____ attached
to their computers when carrying out activities on the computer that will provide sound, so as to not
disturb the other users.

a. scanners c. iPod docks


b. headphones d. speakers

42. ____ occurs when someone obtains enough information about a person to be able to masquerade
as that person for a variety of activities—usually to buy products or services in that person’s name.

a. Database theft c. Information theft


b. Data theft d. Identity theft

43. A(n) ____ is a collection of an individual’s work accessible through a Web site.

a. e-portfolio c. e-diary
b. wiki d. blog

44. What does a disk cleanup utility do?

a. creates an index of files on the disk


b. searches for and removes unnecessary files
EXAM ON INFORMATION TECHNOLOGY

c. provides file management capabilities


d. organizes files into consecutive sectors

45. Which of the following is the least likely motive for a DDoS?

a. spoofing
b. negative recognition
c. political anger
d. extortion

46. ____ memory allows you to use more memory than is physically available on your computer.

a. Multithreading
b. Buffer
c. Virtual
d. Shared

47. The ____ network consists of 24 Department of Defense satellites that are used for location and
navigation purposes.

a. location positioning system (LPS)


b. cellular phone
c. satellite positioning system (SPS)
d. global positioning system (GPS)

48. Anything (such as a program, letter, digital photograph, or song) stored on a storage medium is
referred to as a(n) ____.

a. index
b. label
c. folder
d. file

49. When a computer is running multiple programs concurrently, what is the program that is in the
foreground called?

a. open program
b. main program
c. primary program
d. active program

50. What can you use if the computer cannot start from its boot disk?

a. backup media
b. configuration media
c. recovery media
d. system media
EXAM ON INFORMATION TECHNOLOGY

1.Jack has a computer at home that he uses to access the Internet, store and edit personal photos, and
create and edit documents. Recently, he has come to realize that in order to keep the computer
performing at its best, he needs to carry out regular system maintenance on the computer.
Since Jack has a Windows system, he can right-click a hard drive icon in Windows Explorer, select
Properties, and then select the ____ option on the Tools tab to check that hard drive for errors.

a. Check now
b. Defragment now
c. Disk Defragmenter
d. Windows Disk Cleanup

2. Some people are ____ who learn best by doing.

a. visual learners
b. auditory learners
c. kinesthetic learners
d. manual learners

3. What type of circuit board is used to convert computer output into a video signal that displays an
image on a monitor?

a. capture card
b. audiovisual card
c. graphics card
d. image board

4. You are a technology expert and you have been asked to predict which technology will become the
Internet standard for data transmission, replacing T3 lines. Which of the following are you most likely to
predict?

a. ATM
b. ISDN
c. DSL
d. FTTP

5. Which of the following are tasks a pointing device can accomplish?

a. move a pointer on the screen, click buttons, select graphics


b. change a pointer shape, communicate with multiple computers, click links
c. select text, enter text, click menu commands
d. click icons, control a pointer on the screen, change keyboard keys

6. The first basic step in the development process of a multimedia Web site is ____.

a. creating the Web site


b. testing, publishing, and maintaining the site
c. creating the multimedia elements
d. creating the documentation for the site
EXAM ON INFORMATION TECHNOLOGY

7. LCD monitors and LCD screens sometimes use a new type of technology to produce color, which
produces a brighter display that is also easier to read. What is this new technology called?

a. OLED
b. OLCD
c. TNT
d. TFT

8. One of the most obvious initial changes in Windows Vista is the ____ interface.

a. Leopard
b. Aero
c. Android
d. Symbian

9. You run a large network in which it is important to keep a duplicate of the central devices in case the
primary one fails. What category of network topology does this network use?

Select one:
a. bus network
b. core network
c. star network
d. ring network

10. Which storage term used to measure capacity is approximately a billion bytes?

a. gigabyte
b. terabyte
c. megabyte
d. kilobyte

11. Which of the following networks had these two goals: a) allowing scientists to work together on
scientific projects;
and, b) functioning even if part of the network was destroyed by a nuclear attack?

a. IBMNet
b. ARPANET
c. NSFnet
d. W3C

12. Which of the following are criteria for evaluating a website’s content?

a. commerciality and audience


b. content aggregation and authority
c. affiliation and consumer consensus
d. objectivity and currency
EXAM ON INFORMATION TECHNOLOGY

13. Which of the following is not a technology used by hot spots?

a. Wi-Fi
b. UWB
c. Bluetooth
d. WiMAX

14. Which of the following storage devices typically has the fastest transfer rate?

a. memory card
b. optical disc
c. RAM
d. hard disk

15. What term is used to describe the time it takes a signal to travel from one location to another on a
network?

a. latency
b. transmission performance
c. access time
d. bandwidth

16. Which of the following statements best describes the Ethernet network standard?

a. describes rules for dividing messages into small pieces, called packets
b. no central computer or device on the network should control when data can be transmitted
c. computers on a network cannot communicate unless they share the same form of translation
d. computers and devices on the network share or pass a special signal in a unidirectional manner and in
a preset order

17. Which of the following is a component of a Uniform Resource Locator?

a. HTTP identifier
b. website protocol initiator
c. domain name
d. prolog name

18. You have a camera with a 16 MP resolution. How many pixels are represented by that resolution?

a. 16,000
b. 16 billion
c. 16 million
d. 16

19. Which of the following statements is not true about user interfaces?

a. Most computers today use a command-line interface.


b. GUI operating systems use menus and visual images such as buttons.
EXAM ON INFORMATION TECHNOLOGY

c. A user interface instructs the computer how to display information on the screen.
d. A user interface controls how you enter data and instructions.

20. Which of the following is not true about output?

a. Output types include text, graphics, audio, and display.


b. Output is data that has been processed into a useful form.
c. A single form of output can include more than one type of output.
d. The form of output varies depending on the hardware and software being used.

21. ____ software, such as that shown in the accompanying figure, can control which devices can be
connected to an employee’s computer.

a. Professional firewall
b. Network quarantine
c. Data-leakage prevention
d. Device authentication

22. Some e-commerce Web sites utilize ____ to display environments or show what products (such as a
car or a home) look like in the real world.

a. status notification
b. virtual reality
c. shopping carts
d. stock information

23. When a search of the web is conducted based on a search query, which of the following items might
be located?

a. business phone numbers, size of RAM on your computer, news articles


b. publications, maps, audio
c. blogs, HTTP, MSL
d. videos, images, files on your computer’s hard disk
EXAM ON INFORMATION TECHNOLOGY

24. ____ is the fastest and most current Wi-Fi standard.

a. 802.11n
b. 802.11g
c. 802.11x
d. 802.11a
Feedback

25. When a person buys something from an app store, the cost of the item is charged to a credit card
whose number often
is known by the app store. On what type of device is the credit card number kept by the app store?

a. Input
b. Memory
c. Communications
d. Storage

26. You have a new e-book reader and you are expecting to be away on a long hike with it. How many
hours of reading can you get from it before needing to recharge it?

a. 100
b. 75
c. 125
d. 150

27. Your desktop houses its system unit in a frame made of metal. What is the term for this frame?

a. tower
b. bundle
c. server
d. CPU

28. Print speed is typically measured in ____.

a. dots per second (dps)


b. characters per second(cps)
c. pages per minute (ppm)
d. pixels per minute (ppm)

29. Increasingly, USB security keys, also called USB security ____—USB flash drives that are inserted into
a computer to grant access to a network, to supply Web site usernames and passwords, or to provide
other security features—are being used.

a. passes
b. tokens
c. botherders
d. botnets
EXAM ON INFORMATION TECHNOLOGY

30. ____ are sets of tools that allow hackers to access a system.

a. Hackkits
b. Crimekits
c. Toolkits
d. Rootkits

31. ____ refers to the amount of data that can be transferred (such as over a certain type of networking
medium) in a given time period.

a. Modulation
b. Bandwidth
c. Throughband
d. Bluetooth

32. As shown in the accompanying figure, the computer is used extensively for access control at many
organizations, such as ____ that allow individuals to enter the office building, punch in or out of work, or
access the company network by providing the proper credentials or being authenticated via a fingerprint
or hand scan.

a. bar codes
b. virtual reality glasses
c. collaboration systems
d. authentication systems

33. Phishing schemes may use a technique called ____, which is setting up spoofed Web sites with
addresses slightly different from legitimate sites.

a. spamming
b. DoS attacks
c. identity theft
d. typosquatting

34. Which of the following is a result of calculations on your semester grade report?

a. term
b. course sections
c. grade point average
d. name
EXAM ON INFORMATION TECHNOLOGY

35. A computer technician told your friend he needed a circuit board that provides a connection to a
peripheral device for use with his computer. What category of circuit board should your friend
purchase?

a. adapter card
b. memory card
c. expansion board
d. external card

36. ____ tend to be more readable for large quantities of text, and so they are traditionally used for this
purpose.

a. Serif typefaces
b. Dom Casual typefaces
c. Sans serif typefaces
d. Arial typefaces

37. You are an expert in devising product activation schemes for software publishers. Which of the
following is not one of the techniques you have used in the past?

a. You enable the software to be run a preset number of times.


b. You devise the code not to function until you activate it via the Internet or by phone.
c. You write the code to deliver only limited functionality.
d. You create the application to be available for download only.

38. Which of the following offers an alternative to infrared communications with high bandwidth
transmissions?

a. Wi-Fi
b. Bluetooth
c. IrDA
d. cellular radio

39. A storage medium is inserted into the appropriate ____ to be read from or written to.

a. bay
b. storage processor
c. storage device
d. board

40. Images created using Windows Paint and similar painting programs are usually saved in the ____
format.

a. BMP
b. TIFF
c. JPEG
d. GIF
Feedback
EXAM ON INFORMATION TECHNOLOGY

41. What is another term for servers that control access to the hardware, software, and other network
resources?

a. host computers
b. receiver computers
c. client computers
d. node computers

42. Today’s fast computers and ____ Internet connections make Web-based multimedia very feasible.

a. microwave
b. broadband
c. dial-up
d. ISDN

43. ____ are unique numeric or text-based addresses used to identify resources accessible through the
Internet, such as computers, Web pages, and people.

a. Computer addresses
b. Internet addresses
c. Machine IDs
d. Domain IDs

44. For designing the layout of a Web page, ____ are commonly used when designing animated
components.

a. flowcharts
b. storyboards
c. plots
d. page layouts

45. If you are looking to use a Bluetooth device and do not want to extend its range with additional
equipment, which of the following is the approximate distance you can expect between your device and
the device with which it is transmitting data?

a. 33
b. 44
c. 13
d. 3

46. Which of the following is true about the database approach?

a. A database is never more complex than a file processing system.


b. Unauthorized users are unable under any circumstances to gain access to a single database file that
contains personal and confidential data.
c. Data in a database is less vulnerable than data in file processing systems.
d. Business and home users often work with databases because of their numerous advantages.
EXAM ON INFORMATION TECHNOLOGY

47. Which of the following does a new federal laboratory use in its high security areas?

a. iris recognition system


b. digital forensics system
c. hand geometry system
d. signature verification system

48. The elements shown in the accompanying figure are ____, which are used to organize related
documents folder.

a. drives
b. files
c. folders
d. clipboards

49. When a markup language is used, markup ____ are inserted around the Web page content to
identify where elements are to be displayed and how they should look when displayed.

a. identifiers
b. boxes
c. divisions
d. tags

50. One online security problem is ____, in which someone else uses your identity, typically to purchase
goods or services.

a. identity theft
b. identity duplication
c. phishing
d. domain theft
EXAM ON INFORMATION TECHNOLOGY

1. There are independent Web sites (such as the ____ Web site) that report on the validity of current
online rumors and stories.

a. Phisher
b. Identifier
c. Spammer
d. Snopes

2. Technically, to be called a ____, a device must convert digital signals (such as those used by a
computer) to modulated analog signals (such as those used by conventional telephone lines) and vice
versa.

Select one:
a. switch
b. hub
c. modem
d. router

3. What is the purpose of an Internet Protocol address (IP address)?

a. It uniquely identifies the location of each computer or device connected to the Internet.
b. It specifies whether a computer is using a broadband network or a direct-dial network.
c. It differentiates between a server computer and a client computer and contains codes to identify
whether the computer can send data or receive data.
d. It contains the protocol schema used to identify whether the computer is on a wired or wireless
network.

4. Complex DBMSs maintain a listing of activities that modify the contents of a database. What is this
listing called?

a. index
b. recovery disk
c. backup
d. log

5. Which statement best describes how the RFID standard works?

a. A node on a network must have an individual ID code that can communicate with other ready devices.
b. Two connected network devices use infrared light to create a direct frequency.
c. The network uses radio signals to communicate with a tag placed in or attached to an object,
animal, or person.
d. The network uses reference devices instead of actual devices to speed up the transmission process.

6. Which of the following identifies broadband Internet connections?


a. IP, Wi-Fi, FTTP
b. OSP, cellular radio network, FTP
c. DSL, Wi-Fi, fixed wireless
d. FTP, OSP, IP
EXAM ON INFORMATION TECHNOLOGY

7. A network adapter, also called a ____ when it is in the form of an expansion card, is used to connect a
computer to a network.

a. USB
b. powerline card
c. network interface card (NIC)
d. data communications card (DCC)

8. What is the definition of a protocol, as it applies to networks?

a. a standard that outlines characteristics of how two network devices communicate


b. the language used to translate analog signals into digital signals
c. the rules governing acceptable network use by employees or other users
d. a method for connecting nodes on a network

9. A website’s home page is most analogous to which of the following?

a. cover of a book
b. pop-up window
c. credits of a movie
d. highway billboard

10. In order for navigational images or other images to be understandable to visitors using assistive
technology systems, the images must be identified with a(n) ____ description.

a. alternative text
b. accessible text
c. assistive
d. Braille text

11. A single spreadsheet document is often called a ____.

a. worksheet
b. cell
c. database
d. workbook

12. When storage devices write data, instructions, and information on storage media, they are creating
output. What best describes the process of writing data?

a. transferring items from memory to a storage medium


b. using a word processor to input data to a file
c. retrieving items from a storage medium to the operating system
d. receiving input and translating it into computer language
EXAM ON INFORMATION TECHNOLOGY

13. Green computing involves reducing electricity consumed and environmental waste generated when
using a computer.

Which of the following is a valid strategy for supporting green computing?

a. Dispose of replaced computers by selling them on a website


b. Replace a computer as soon as a newer, more efficient model is available
c. Buy a computer from a retailer who will dispose of your old computer properly
d. Buy battery-operated computers only

14. You are looking for a term that can be used to refer globally to external hard disks and external SSDs.
Which of the following can you use?

a. external hard drives


b. memory sets
c. SANs
d. optical storage devices

15. Janet is studying operating systems as part of her Understanding Computers 101 class. After learning
about the different types of operating systems, she realizes that she uses a number of them in her daily
life. Janet has an Apple computer at home. The operating system of that computer is ____.

a. Mac OS
b. Windows Vista
c. Windows Embedded
d. Solaris

16. ____ occurs whenever an individual gains access to a computer, network, file, or other resource
without permission.

a. Spoofing
b. Unauthorized access
c. Phishing
d. Vandalizing

17. In ____ transmission, data is sent at the same time as other related data to support certain types of
real-time applications that require the different types of data to be delivered at the proper speed for
that application.

a. endrosynchronous
b. asynchronous
c. isochronous
d. synchronous

18. Which of the following is NOT a name of an Android release?

a. Gingerbread
b. Blackberry
EXAM ON INFORMATION TECHNOLOGY

c. Ice Cream Sandwich


d. Key Lime Pie

19. Bryan has just started an internship in which he uses a database frequently. The database contains
information about the company’s employees. Bryan’s supervisor senses that he is anxious about using
the database and drops by to give him a short tutorial.
The supervisor explains that each employee’s information forms a separate ____.

a. record
b. table
c. file
d. field

20. What is a combination of one or more related characters or bytes and is the smallest unit of data a
user accesses?

a. ID
b. byte
c. data
d. field

21. You are using a tool on your computer to organize a variety of files in folders. What is the term for
this kind of tool?

a. search tool
b. image viewer
c. file manager
d. defragmenter

22. The accompanying figure shows a(n) ____ printer.

a. laser
b. ink-jet
c. thermal
d. dot-matrix
EXAM ON INFORMATION TECHNOLOGY

23. What is the term for using a set of conditions to measure the performance of hardware in your
network?

a. mile marker
b. benchmark
c. high water mark
d. milestone

24. ____ is the proprietary operating system for computers made by Apple Corporation.

a. Linux
b. Mac OS
c. Unix
d. Solaris

25. Which of the following statements is NOT true about smart cards?

a. Contactless smart cards communicate with a reader using Bluetooth technology.


b. There are two types of smart cards.
c. A smart card can double as an ID card or credit card.
d. Uses include storing medical records and other health care information.

26. Which of the following best describes DSL connections?

a. uses long-distance digital telephone lines to carry multiple signals over a single line; only medium to
large companies can afford them
b. transmits at fast speeds on existing standard copper telephone wiring; popular for small business or
home user
c. uses fiber-optic cable to provide extremely high-speed Internet access to a user’s physical, permanent
location
d. a service that carries voice, data, video, and multimedia at a high speed; used by telephone networks
and the Internet

27. Which component allows processors to perform at faster rates than those processors that do not
have this component?

a. advanced transfer cache


b. L612 cache
c. flash cache
d. nano-cache

28. Anthony is passionate about politics and enjoys sharing and discussing his views with others over the
Internet. Every day, Anthony makes a new post to his personal ____, which is a Web page that displays
entries in chronological order.

a. blog c. portal
b. RSS d. wiki
EXAM ON INFORMATION TECHNOLOGY

29. You are going to purchase a mass-produced computer from your local computer store. Which of the
following is likely a component you can customize?

a. processor type
b. video card
c. all of the above
d. sound card

30. A computer ____ is a software program that is installed without the permission or knowledge of the
computer user, that is designed to alter the way a computer operates, and that can replicate itself to
infect any new media it has access to.

a. phish
b. link
c. virus
d. bot

31. Plasma monitors offer large screen sizes and rich colors. Which of the following statements describe
how plasma monitors work?

a. Radiation is used to cause reflections of color that are then displayed on the screen.
b. Electricity is funneled through glass tubes, which correspond to bits and bytes and enable a bright
color display.
c. Voltage is applied to a layer of gas between two glass plates, which releases a UV light that causes
the pixels on the screen to glow.
d. A pool of plasma appears behind the monitor screen and uses heat and light to turn the pixel display
on an off.

32. In reference to computer communications, what does the term noise mean?

a. the busy signal that indicates the network is busy


b. electrical disturbances
c. voice transmissions that include static
d. audio transmissions

33. Which RAID level technique splits data, instructions, and information across multiple disks in the
array?

a. archiving
b. differentiation
c. striping
d. mirroring
EXAM ON INFORMATION TECHNOLOGY

34. Which of the following statements is true about a computer?

a. It converts data to information or converts information to data, depending on the status of the
information processing cycle.
b. Its electronic components process data using instructions.
c. It is an electronic device that processes data as specified by the computer user when the user enters
instructions.
d. It creates data from information that it gathers using software that directs the processing in the
computer.

35. A global positioning system (GPS) consists of ____ and a group of GPS satellites.

a. GPS receivers
b. GPS amplifiers
c. GPS transmitters
d. Wi-Fi receivers

36. A ____ is designed to scan flat objects one page at a time.

a. C-Pen scanner
b. handheld scanner
c. sheetfed scanner
d. flatbed scanner

37. What is the term for the area of the hard disk used for virtual memory?

a. a swap file
b. a partition
c. a page
d. the cloud

38. Which of the following terms is used to describe a program that copies itself repeatedly, using up
resources and possibly shutting down the computer or network?

a. a worm
b. a virus
c. a Trojan horse
d. a rootkit

39. What are the roles of the control unit and the ALU?

a. The ALU directs the operations of the control unit.


b. The ALU carries out different operations based on comparing items and the control unit ensures the
results of the comparisons are accurately interpreted.
c. The control unit directs the operations of the ALU.
d. The ALU acts as a traffic cop and the control unit coordinates most operations in the computer.
EXAM ON INFORMATION TECHNOLOGY

40. Which of the following gestures would you use if you want to zoom out on your new tablet and see
less detail on a map, for example?

a. stretch
b. swipe
c. pinch
d. slide

41. You recently lost some files that were important to you so you have resolved to back up the contents
of your hard disk on a series of rewritable DVDs. What kind of software will you use to do this?

a. disc burning
b. safekeeping
c. CBT
d. media player

42. Sarah is a very active real estate agent. She is looking to purchase a new computer and software so
she can keep track of her client’s accounts, access the Internet from anywhere in the city, and touch-up
photos of real estate properties. Sarah has hired a programmer to create a Web page for her business.
What type of programming language will the programmer use?

a. XHTML
b. BASIC
c. COBAL
d. Python

43. Which industry almost exclusively uses MICR?

a. retail
b. automobile manufacturing
c. banking
d. air transportation

44. What is the first step in the startup process of a computer?

a. LEDs flicker on devices such as the disk drives and keyboard.


b. The power supply or battery sends an electrical current to circuitry in the computer or mobile
device.
c. Instructions stored in the kernel are accessed and processed sequentially.
d. The processor chip resets itself and finds the ROM chips that contain the BIOS.

45. ____ access systems use physical objects for identification purposes and they are frequently used to
control access to facilities and computer systems.

a. Biometric
b. Possessed object
c. Touch object
d. Two-factor
EXAM ON INFORMATION TECHNOLOGY

46. A difference between CRT monitors and flat-panel displays is that most flat-panel displays use digital
signals to display images, while CRT monitors use ____.

a. radio signals
b. analog signals
c. laser signals
d. infrared signals

47. The Windows ____ shown in the figure above contains the following objects: Windows, Icons,
Menus, Toolbars, Taskbar, Hyperlinks, Sizing buttons, and a Dialog box.

a. command
b. toolbox
c. general menu
d. desktop

48. You have created a specific named location on your hard disk to hold some songs you have
purchased. What is the term for this location?

a. index
b. file manager
c. folder
d. safe spot

49. You have a collection of all the photos, videos, and audio you have captured from your new nephew.
What is the name for this collection?

a. digital archive
b. online glossary
c. media library
d. cloud archive

50. ____ are businesses or other organizations that provide Internet access to others, typically for a fee.

a. Application service providers (ASPs) c. Telephone service providers


b. Internet service providers (ISPs) d. Conferencing service providers
EXAM ON INFORMATION TECHNOLOGY

1.____ satellites travel at a speed and direction that keeps pace with the earth’s rotation, so they
appear (from earth) to remain stationary over a given spot.

a. Isochronous
b. Full-duplex transmission
c. Geosynchronous
d. Microwave

2. One of the most common painting programs is ____.

a. Microsoft Paint
b. IBM’s Storyboard
c. Macromedia’s Dreamweaver
d. Adobe’s Acrobat

3. Which of the following statements is not true about software theft?

a. With a single-user license agreement, users are permitted to make one copy of the software as a
backup.
b. Software piracy is the unauthorized and illegal duplication of copyrighted software.
c. Software theft includes disabling or removing programs from company computers.
d. A keygen distributes user names and passwords to those who register their legally purchased
copies of a software program.

4. Brenda is a college student who enjoys downloading music, movies, and television shows from the
Internet. She also uses the Internet for other entertainment, such as sports.
Brenda also orders movies and television through the Internet via a(n) ____ provider, which allows users
to download video for a small fee.

a. blog
b. RSS
c. VoIP
d. VOD

5. Bryan has just started an internship in which he uses a database frequently. The database contains
information about the company’s employees. Bryan’s supervisor senses that he is anxious about using
the database and drops by to give him a short tutorial.
Bryan is told by the supervisor that to create a database, he first needs to create the database ____
itself, and then he can create the necessary database objects.

a. table
b. field
c. file
d. record
EXAM ON INFORMATION TECHNOLOGY

6. What is product activation?

a. the process of entering registration information so that users of the software will receive newsletters
and other marketing materials regarding purchased software

b. the method used by some software companies to guarantee that software purchased on the web will
work on the computer on which the software was downloaded

c. a technique to ensure software is not installed on more computers than legally licensed

d. the process of entering registration information so that users of the software will receive newsletters
and other marketing materials regarding purchased software

7. With bitmapped images, the color of each ____ is represented by bits; the more bits used, the better
the image quality.

a. pixel
b. map
c. byte
d. vector
Feedback

8. You are looking for a way to choose specific files to back up, regardless of whether or not the files
have changed since the last incremental backup. Which of the following will you use?

a. full backup
b. archival backup
c. selective backup
d. differential backup

9. Your Bluetooth headset is waiting for another Bluetooth device to locate its signal. What is this mode
known as?

a. listening mode
b. discoverable mode
c. intelligent mode
d. passkey mode

10. What is a sending device?

a. a device that initiates an instruction to transmit data, instructions, or information


b. a device that accepts the transmission of data, instructions, or information
c. a device that connects to a communications channel
d. a device on which data, instructions, and information travel

11. CD-ROM discs and DVD-ROM discs are ____ optical discs and come prerecorded with commercial
products.
EXAM ON INFORMATION TECHNOLOGY

a. recordable
b. write-only
c. rewritable
d. read-only

12. The green color of the Address bar in the accompanying figure indicates that the site is using a valid
____ SSL certificate.

Select one:
a. SQL
b. HTTPS
c. EV
d. SK

13. Which of the following is NOT an example of a common nonimpact printer?

a. large-format printer
b. dot-matrix printer
c. thermal printer
d. plotter

14. What can you use to identify a problem with resources so that you can try to resolve any problems?

a. a system check
b. a performance monitor
c. a utility manager
d. an efficiency test

15. What term refers to the amount of time it takes a storage device to locate an item on a storage
medium?

a. capacity time
b. recall time
c. transfer time
d. access time

16. One nanometer (nm) is ____ of a meter.

a. one-billionth c. one-thousandth
b. one-millionth d. one-tenth
EXAM ON INFORMATION TECHNOLOGY

17. ____ is charged with such responsibilities as IP address allocation and domain name management.

a. ICANN (Internet Corporation for Assigned Names and Numbers)


b. Internet Society (ISOC)
c. National Center for Supercomputing Applications (NCSA)
d. Web Consortium (W3C)

18. ____ can be used, copied, modified, and distributed to others without restrictions.

a. Public domain software


b. Shareware
c. Freeware
d. Commercial software

19. A ____ is a collection of hardware and other devices that are connected together so that users can
share hardware, software, and data, as well as electronically communicate with each other.

a. database
b. computer network
c. computer bank
d. data bank

20. What is the definition of open source software?

a. software that resides on a network server


b. a multitasking operating system
c. its code is provided for use, modification, and redistribution
d. proprietary software that is licensed for free

21. Repeated threats or other harassment carried out online between adults is referred to as ____.

a. phishing
b. computer sabotage
c. cyberterrorism
d. cyberstalking

22. A(n) ____ is a flat, touch-sensitive device used in conjunction with a digital pen.

Select one:
a. touch screen
b. graphics tablet
c. image tablet
d. graphics table

23. What job title is used for the person who uses the server operating system to add and remove users,
install software, and administer network security?

a. system engineer
EXAM ON INFORMATION TECHNOLOGY

b. network administrator
c. resource manager
d. server operator

24. Robert is a medical writer for a pharmaceutical company. The company allows Robert to work from
home.
Robert’s job is a(n) ____ job.

a. e-working
b. telecommuting
c. videoconferencing
d. telemarketing

25. Your server room has ample floor space. Which of the following are you most likely to choose as a
result?

a. bay server
b. blade server
c. tower server
d. rack server

26. If students in your class are taking a standardized test using a form with rectangles that they fill in
with a pencil, what technology will be used to grade the test?

a. OMR
b. MICR
c. OCR
d. BCR

27. The major carriers of Internet network traffic are known collectively by what term?

a. Internet transmission link


b. Internet backbone
c. Internet complex
d. Internet system grid

28. Gabrielle is the network administrator at a medium-sized company. One of her responsibilities is to
purchase network devices to maintain the company network.
Gabrielle realizes that to improve network performance, she needs to buy and install a ____, which
identifies the device on the network for which the data is intended and sends the data to that device
only.

a. node
b. bus
c. switch
d. bridge

29. Which of the following terms would you be looking for if you want to make a purchase of a variety of
EXAM ON INFORMATION TECHNOLOGY

software at the same time that you purchase your new desktop?

a. component package
b. gathering
c. bundle
d. cluster

30. ____ occurs when data is entered into the computer.

a. Processing
b. Storage
c. Output
d. Input

31. Which term does a user of a relational database use to refer to a file?

a. column
b. relation
c. row
d. table

32. ___ are small components typically made out of aluminum with fins that help to dissipate heat.

a. Heat buses
b. Heat sinks
c. ACs
d. Fans

33. Which of the following statements is not true about hard drives?

a. The system unit on most desktops and laptops contains at least one hard disk.
b. The alignment of metal particles represents either a 0 bit or a 1 bit.
c. A hard disk that is mounted inside the system unit is sometimes called a permadisk.
d. A hard drive contains one or more inflexible, circular platters that use magnetic particles to store
data.

34. In which of the following databases is the physical location of the server on which it is stored is
transparent and often unknown, to the user?

a. distributed
b. relational
c. market
d. OODB

35. What is the term for a feature that has a graphical user interface to assist users with retrieving data?

a. QDE c. DBMS
b. QBE d. SQL
EXAM ON INFORMATION TECHNOLOGY

36. What is storage media?

a. The hardware that records and retrieves items from storage.


b. The data and information stored on a computer.
c. The software used to display items in storage.
d. The physical material on which a computer keeps data, instructions, and information.

37. A ____, as shown in the accompanying figure, consists of a vertical stack of tracks, with the same
relative track on each disk surface.

a. section
b. cylinder
c. segment
d. sector

38. When application software poses a question to a computer user and the user answers, what term is
used to identify that answer?

a. user program directive


b. user command
c. user response
d. user interface reply

39. What kind of file does Adobe Reader allow you to view?

a. FFT
b. PDT
c. DOC
d. PDF

40. ____ tags are similar to HTML tags, but there are stricter rules about how the markup tags are
written.
EXAM ON INFORMATION TECHNOLOGY

a. XML
b. JavaScript
c. XHTML
d. Perl

41. The accompanying figure corresponds to the ____ style for desktop PCs.
lion

a. desktop case
b. sub case
c. all-in-one case
d. tower case

42. As you edit some photos from your summer vacation, you decide to remove a blurry area of one of
your photos. Which tool will you use for this?

a. crop
b. resize
c. contrast
d. compress

43. A(n) ____ is a medium-sized computer used to host programs and data for a small network.

a. Internet server
b. mainframe computer
c. midrange server
d. super server

44. The ____ format is a standard format for Web page images and is used most often with logos,
banners, and other nonphotographic images.

a. GIF
b. TIF
c. MPEG
d. BMP

45. Most search sites use a ____—a software program—in conjunction with a huge database of
information about Web pages to help visitors find Web pages that contain the information they are
seeking.

a. search box
b. search engine
c. search store
d. search toolbox

46. When Mary started college, her parents bought her a new computer that came with minimal
software. She is now looking into purchasing additional software.
EXAM ON INFORMATION TECHNOLOGY

Mary enjoys taking digital photos and would like software that would allow her to perform tasks such as
correct brightness or contrast, eliminate red eye, crop, resize, etc. In order to have this functionality on
her computer, she needs a photo ____ program.

a. embedding
b. editing
c. dramatization
d. formatting

47. Most Web pages today are written in a ____— a coding system used to define the structure, layout,
and general appearance of the content of a Web page.

a. 4G language
b. programming language
c. scripting language
d. markup language

48. Which of the following is an open source operating system?

a. Solaris
b. UNIX
c. DOS
d. Linux

49. In addition to their full versions, some commercial software is available as a ____ or trial version.

a. sample
b. friendly version
c. demo
d. complimentary version

50. What program is used to start and shut down a computer or mobile device, provide a user interface,
manage programs and memory, and provide file management, among other functions?

a. a system utility
b. application software
c. a file utility
d. an operating system
EXAM ON INFORMATION TECHNOLOGY

1.Some touch screens recognize when you touch the screen with two fingers or two hands. If you are
looking for a device on which you can do this, what type of touch screen should you search for?

a. phase-touch
b. dual-touch
c. twin-touch
d. multi-touch

2. When a user types data on a keyboard, what is occurring?

a. The user is issuing a command that is stored in the memory of the computer and then is transformed
into input data for use with a program.
b. The user is using an input device to enter input into the memory of the computer.
c. The user is employing an input device (the keyboard) to tell the computer what tasks to perform and
how to perform them.
d. The user is entering information that will be transferred to the CPU for interpretation and then to
storage so that the information will be available when needed.

3. A computer ____ is the amount of data (measured in bits or bytes) that a CPU can manipulate at one
time.

a. word
b. statement
c. unit
d. character

4. In the early 1980s, things began to change. ____ were invented and computer use increased
dramatically.

a. Computers
b. Microcomputers
c. Printers
d. Networks

5. ____ is a shareware program.

a. Microsoft Office (office suite)


b. Internet Explorer (Web browser)
c. WinZip (file compression program)
d. Pine (e-mail program)

6. Media that allow random access are sometimes referred to as ____ media.

a. addressable
b. identifiable
c. nonidentifiable
d. optical
EXAM ON INFORMATION TECHNOLOGY

7. What distinguishes a data collection device from other input devices?

a. It obtains data directly at the location where the transaction or event takes place.
b. Its reliability is higher than any other input device so it is more suited to high security data capture
use scenarios.
c. It collects data rather than computer input.
d. It can collect and store much more data in a shorter period of time than other input devices.

8. Smith Web Design is creating a secure Web site for a local doctor. In addition to providing basic
information about her practice, she wants her patients to be able to log on and access their records,
including images such as X-rays and MRIs.
After patients log on, they should be able to download scanned versions of their X-rays and MRIs. These
images should be provided in the ____ format.

a. BMP
b. GIF
c. TIF
d. JPEG

9. Jess is a musician who has just bought a new computer. Now she has to determine how to connect
this computer to the devices that were connected to her old computer.
To connect her external hard drive where her music files are stored to the computer, Jess needs to use
the ____ port.

a. modem
b. USB
c. network
d. serial

10. One of the most promising types of nonvolatile RAM is magnetic (or more precisely, ____) (MRAM).

a. magnetoselective
b. magnetobalanced
c. magnetocharged
d. magnetoresistive

11. Recent photos you captured are low in quality. What is one of the first things to check?

a. distance
b. lens cap
c. resolution
d. batteries

12. You need to set up a computer to store and deliver email messages for your small business. Which of
the following are you most likely to use?

a. network server
b. mail server
EXAM ON INFORMATION TECHNOLOGY

c. home server
d. file server

13. Which of the following terms is used to describe a program that hides in a computer and allows
someone from a remote location to take full control of the computer?

a. a Trojan horse
b. a worm
c. a rootkit
d. a virus

14. IF YOU RECEIVE AN EMAIL MESSAGE IN ALL CAPITAL LETTERS, WHAT DOES THIS SIGNIFY?

a. THE EMAIL WAS SENT FROM A GOVERNMENT AGENCY.


b. THE EMAIL IS IMPORTANT.
c. THE CAPSLOCK KEY ON YOUR KEYBOARD IS MALFUNCTIONING.
d. THE PERSON WHO WROTE THE EMAIL WAS SHOUTING AT YOU.

15. The accompanying figure shows the iGoogle ____ Web page.

a. RSS
b. social networking
c. portal
d. podcasting

16. In a 16.8-million-color (called photographic quality or ____) image, three bytes (24 bits) are used to
store the color data for each pixel in the image.

a. full color
b. real color
c. mega color
d. true color

17. When typing text in a word processing program, you should only press ____ after a short line (like a
title), at the end of a paragraph, and to leave a blank line between paragraphs.
EXAM ON INFORMATION TECHNOLOGY

a. Backspace
b. Enter
c. Insert
d. Esc

18. Social engineering, as it pertains to computers, is _____________.

a. compiling data from multiple computer users in order to make predictions about computer trends
b. creating consumer and personal profiles by tracking website history and electronic purchases
c. gaining unauthorized access or obtaining confidential information by taking advantage of the
trusting nature or naivety of users
d. filtering Internet content to targeted users based on their personal preferences

19. ____ refers to using a PC to combine and manipulate text and images to create attractive documents
that look as if they were created by a professional printer.

a. Desktop publishing
b. Project management software
c. Personal productivity
d. Computer-aided design (CAD)

20. In Internet terminology, what is the term, google.com, called?

a. Internet service provider


b. domain name
c. webpage protocol
d. TLD

21.Stacey is the office manager for a small business and is looking for a new printer and scanner for her
office. After doing some research into printers, Stacey decides to buy a(n) ____ printer, since they are
the standard for business documents and are typically faster and have better quality output than other
types of printers.

a. ink-jet
b. digital
c. magnetic
d. laser

22. If your cousin wanted to view information from the World Wide Web, what application software
would you tell her to be sure she has on her computer?

a. ISP interface resolution and handshake configuration controller


b. browser
c. Word processor
d. DNS server support system

23. What is the smallest unit of data the computer can process?
EXAM ON INFORMATION TECHNOLOGY

a. reg
b. log
c. byte
d. bit

24. Most network cards contain a port that accepts a(n) ____, which looks similar to a telephone
connector but is larger.

a. RJ-12 connector
b. RJ-45 connector
c. RJ-11 connector
d. RJ-14 connector

25. The file management program incorporated into Windows is ____.

a. WinZip
b. StuffIt
c. Windows Explorer
d. Disk Cleanup

26. A piece of software you use is privately owned and limited to a specific vendor. What is the term for
this kind of software?

a. locked
b. incompatible
c. proprietary
d. vendor-specific

28. Wireless displays connect to a computer using a wireless networking connection such as Wi-Fi or
____.

a. 3D
b. VGA
c. Bluetooth
d. USB

29. Some personal computer manufacturers provide a hard disk configuration that connects multiple
smaller disks into a single unit that acts like a single large hard disk. What is this grouping called?

a. RPM
b. RAID
c. AXS
d. ACIS
EXAM ON INFORMATION TECHNOLOGY

29. In the example shown in the accompanying figure, ____ is being used to create an animated banner.

a. Adobe Dreamweaver
b. Adobe Fireworks
c. Adobe Contribute
d. Adobe Flash

30. An emerging type of mobile phone is the cellular/satellite ____ phone that can be used with cellular
service when it is available and then switches to satellite service when cellular service is not available.

a. duplex
b. dual-core
c. digital
d. dual-mode

31. Which of the following is not true about tape storage?

a. Tape is a magnetically coated ribbon of plastic capable of storing large amounts of data and
information at a low cost.
b. A tape cartridge is small, rectangular, plastic housing for tape.
c. A benefit of tape is that it allows for nonsequential access.
d. Business users utilize tape most often for long-term storage and backup.

32. Images are available in many formats, such as TIF, BMP, GIF, JPEG, and ____.

a. MP3
b. MPEG
c. AVI
d. PNG

33. You want to add a new external hard disk to your computer, but you are unable to connect because
you have run out of USB ports. Which of the following can you use instead?

a. peripheral index
EXAM ON INFORMATION TECHNOLOGY

b. ExpressCard module
c. CPU center
d. USB hub

34. The ____, implemented in 2001, grants federal authorities expanded surveillance and intelligence-
gathering powers, such as broadening their ability to obtain the real identity of Internet users and to
intercept Internet communications.

a. Identity Theft and Assumption Deterrence Act of 1998


b. USA Patriot Act
c. Sarbanes-Oxley Act
d. No Electronic Theft (NET) Act

35. In ____ transmission, data can move in both directions at the same time, such as with a telephone.

a. half-simplex
b. full-simplex
c. full-duplex
d. half-duplex

36. Integrated circuits incorporate many transistors and electronic circuits on a single tiny silicon chip,
allowing ____ to be even smaller and more reliable than earlier computers.

a. third-generation computers
b. fourth-generation computers
c. fifth-generation computers
d. second-generation computers

37. Where do RAM chips usually reside within a computer?

a. in the processor/memory signal cache circuitry


b. on the memory digital dynamic circuit board
c. on a memory module
d. in a memory slot

38. A ____ provides a secure private tunnel from the user’s computer through the Internet to another
destination and is most often used to provide remote employees with secure access to a company
network.

a. USB private network


b. virtual private network
c. tunnel private network
d. laptop private network

39. ____ are the standard for business documents and come in both personal and network styles.

a. Line printers
b. Laser printers
EXAM ON INFORMATION TECHNOLOGY

c. Dot-matrix printers
d. Ink-jet printers

40. Which of the following is a type of backup you can only perform at your large enterprise?

a. continuous
b. differential
c. incremental
d. full

41. To read data, the reference beam projects the hologram containing the requested data onto a ____
that reads the entire data page at one time.

a. detector
b. spacer
c. modulator
d. header

42. A ____ is the hardware where data is actually stored.

a. storage medium
b. storage device
c. storage processor
d. storage memory

43. Common input devices include the keyboard and ____.

a. printer
b. monitor
c. mouse
d. speaker

44. What is the World Wide Web?

a. a worldwide collection of electronic documents


b. a set of electronic documents diagramming and charting all the worldwide Internet connections
c. a database of every document stored on computers worldwide
d. the wiring and cabling used to connect computers on the Internet

45. Which of the following technologies is your new mobile phone payment device most likely to use?

a. WiMax
b. NFC
c. Token ring
d. Bluetooth

46. You want to use the UMB cellular transmission standard on your new mobile phone. Which standard
will you use?
EXAM ON INFORMATION TECHNOLOGY

a. 3G
b. 5G
c. 4G
d. 2G

47. The means by which an operating system or any other program interacts with the user is called the
____.

a. programming interface
b. program front-end
c. user interface
d. user login

48. You want a form of backup that copies all program and data files. Which of the following will you
use?

a. archival backup
b. partial backup
c. selective backup
d. differential backup

49. Which of the following statements is not a safeguard against the failure of hardware?

a. device-tracking apps
b. surge protectors
c. fault-tolerant computers
d. UPS

50. What type of software restricts access to specified websites?

a. net filtering
b. spam filtering
c. phishing
d. web filtering
EXAM ON INFORMATION TECHNOLOGY

1.Which of the following identify the five steps in web publishing?

a. plan the website; design the website; create the website; host the website; maintain the website

b. load plug-ins; deploy the website; maintain the website; update the website; upgrade the web server

c. plan the website; design the website; create and deploy the website; update the website; create
usage analytics for further website enhancements

d. plan, analyze, and design the website; plan and purchase servers and server software; create and
deploy the website; test the website for both commercial and consumer use; modify the website based
on analytics developed through the website use

2. Which of the following gestures would you use if you want to display a bar that contains commands
on an edge of the screen of your new tablet?

a. swipe
b. pinch
c. press and hold
d. stretch

3. To manage day-to-day interactions with customers, including phone calls and e-mails, what type of
software would a company use?

a. human interface software


b. customer service software
c. phone call management software with e-mail extensions
d. customer management software

4. The ____ orders data and instructions from cache or RAM based on the task at hand.

a. control unit
b. decode unit
c. ALU
d. prefetch unit

5. Which of the following communications technologies does not use broadcast radio signals?

a. Bluetooth
b. UWB
c. IR
d. Wi-Fi

6. You are thinking about no longer using the default browser for your Mac and instead switching to a
new one. Which browser will you no longer be using if you do this?

a. Safari
b. Firefox
EXAM ON INFORMATION TECHNOLOGY

c. Opera
d. Internet Explorer

7. Dean has been using computers for some time now, but he is unfamiliar with a number of utility
programs. In order to better maintain his computer, he decides to ask his coworker Andrea for advice on
basic utility programs. Another thing that Andrea tells Dean is that it is very important for him to ____ all
of his important data on a regular basis to protect against data loss in the case of a problem with the
computer. He can use a(n) ____ utility to do this.

a. compress
b. cleanup
c. backup
d. defragment

8. ____ consists of predrawn electronic images.

a. Graphics art
b. Clip art
c. Drawing art
d. ASCII art

9. Some drive letters, such as the letter ____ typically used with the primary hard drive, are usually
consistent from computer to computer and do not change even if more storage devices are added to a
computer.

a. H
b. A
c. B
d. C

10. What was the original purpose of a screen saver?

a. to save energy by reducing the monitor activity


b. to prevent images from being permanently etched on a monitor’s screen
c. to protect a computer by requiring a password to deactivate it
d. to prevent access by hackers and avoid viruses

11. Which of the following is not true about mobile printers?

a. Mobile printers are barely wider than the paper on which they print.
b. Mobile printers usually connect to a FireWire port.
c. Mobile printers are battery-powered.
d. Mobile printers can use ink-jet or thermal technology.

12. Lisa is a student who regularly uses the computers at her local Internet café to listen to music, talk to
her friends and family through the Internet, and play computer games.
The Internet café provides ____ on some computers so that users can both listen and talk through the
device during a telephone call made through the computer without disturbing other users.
EXAM ON INFORMATION TECHNOLOGY

a. microphones
b. scanners
c. headsets
d. speakers

13. You are experiencing some problems with your operating system on your desktop and want to repair
some problems with your hard disk. Which of the following will you use?

a. disk defragmenter
b. backup tool
c. file compression tool
d. PC maintenance tool

14. One measurement of the speed of a CPU is the ____, which is rated in megahertz (MHz) or gigahertz
(GHz).

a. CPU clock speed


b. system rpm
c. system speed
d. CPU rpm

15. In order to safeguard your personal information, which of the following is recommended?

a. Fill out rebates and warranty forms completely to provide the manufacturer with as much information
as possible in case you need to contact them.
b. Use shopping club and buying cards when shopping to remain anonymous.
c. Clear your history file when you are finished browsing.
d. Preprint your telephone number on your personal checks so businesses can reach you quickly if they
determine there is a problem with your purchase.

16. A(n) ____ instruction might look like a meaningless string of 0s and 1s, but it actually represents
specific operations and storage locations.

a. machine language
b. COBOL language
c. programming language
d. ASCII

17. As you edit some photos from your summer vacation, you decide to shrink one of your favorite
photos to produce a wallet size. Which tool will you use for this?

a. resize
b. compress
c. contrast
d. crop
Marked out of 1.00
EXAM ON INFORMATION TECHNOLOGY

18. If someone you know is purchasing word processing software, what features can she expect to find
in the software?

a. columns, templates, autowrite


b. wordwrap, spell checker, clip art
c. mail merge, wrapcheck, thesaurus
d. search and replace, word adjust, collaboration

19. An important task that the operating system performs is ____, which keeps track of the files stored
on a computer so that they can be retrieved when needed.

a. file management
b. file listing
c. disk management
d. file recovery

20. Dean has been using computers for some time now, but he is unfamiliar with a number of utility
programs. In order to better maintain his computer, he decides to ask his coworker Andrea for advice on
basic utility programs.Andrea advises Dean to remove unnecessary programs from his computer by
using a(n) ____ utility.

a. cleanup
b. remove
c. uninstall
d. delete

21. Word processing software, spreadsheet software, database software, and presentation software are
examples of what category of computer software?

a. World Wide Web personal use and productivity software


b. System software
c. Application software
d. Hardware coordination software

22. Ultra-mobile PCs are also called ____.

a. handheld computers
b. range computers
c. mini computers
d. frame computers

23. What method is used to read a bar code?

a. The magnetic bar codes are converted by a bar code reader into a form that a computer can process.
b. A laser translates the bars on the bar code into digital signals that are stored in RAM.
c. A laser scanner produces light beams that pass through a scanner filter which then translatesthe light
patterns into digital patterns that can be interpreted by the CPU.
EXAM ON INFORMATION TECHNOLOGY

d. A bar code reader uses laser beams to read bar codes.

24. Digital still cameras most often use ____ cards for storage.

a. RAM memory
b. laser memory
c. ROM memory
d. flash memory

25. A type of computer usually has thousands of users. Which of the following is most likely to be the
type of computer?

a. supercomputer
b. personal computer
c. game console
d. mobile computer

26. Today’s CPUs are formed using a process called ____ that imprints patterns on semiconductor
materials.

a. vectoring
b. serigraphy
c. imprintment
d. lithography

27. What is DBMS?

a. a file
b. software
c. a device
d. information

28. To what does the term, traffic, refer to when used in conjunction with the Internet?

a. the communications activity on the Internet


b. the wires, fiber optics, underground cables, and radio signals used to carry the data and information
across the Internet
c. the number of computers on the Internet
d. all the wired, wireless, and satellite connections on the Internet

29. Hollerith’s machine was used to process the 1890 U.S. Census data and was able to complete the
task in ____, instead of the decade it usually took to process the data by hand.

a. three and a half years


b. two and a half years
c. five and a half years
d. four and a half years
EXAM ON INFORMATION TECHNOLOGY

30. Which of the following is NOT true about caring for optical discs?

a. Do not expose discs to extreme temperatures or humidity.


b. Moisten a nonabrasive cloth with warm water and ammonia to clean the disc.
c. Store optical discs in jewel boxes and store them vertically.
d. Never bend a disc.

31. Which of the following may need to happen before your Bluetooth headset can communicate with
your smartphone?

a. They might need to be coupled.


b. They might need to be paired.
c. They might need to be synced.
d. They might need to be adapted.

32. What is the difference between a wiki and a blog?

a. Businesses create blogs but they do not create wikis.


b. Users can modify posts in a wiki but they cannot modify posts made by a blogger.
c. Blogs allow the sharing of ideas from all people while wikis allow sharing from only a single person.
d. Home users can use blogs but not wikis.

33. You need a version of USB technology that will support older USB devices, of which you have many,
as well as newer ones. What word do you want to see in the specs?

a. backward compatible
b. integrated
c. Bluetooth-enabled
d. multifunctional

34. Last night, you experienced a power increase that lasted for less than one thousandth of a second.
What is the term for this?

a. hit
b. juice
c. joule
d. spike

35. What kind of communications device sends and receives data and information to and from a digital
line, such as ISDN and cable?

a. a modem
b. a switch
c. a hub
d. a router

36. What type of device reads the strip of magnetic material on the back of your credit card?
EXAM ON INFORMATION TECHNOLOGY

a. credit card reader


b. magReader
c. MCR
d. magnetic stripe card reader

37. Rodney owns a computer that he uses to work, keep in touch with friends and family, watch movies,
listen to music, and use the Internet. If Rodney wants to record music files onto a CD, he needs to make
sure that his operating system has CD-____ capabilities.

a. burning
b. hybrid
c. mirroring
d. striping

38. With a ____, the user touches the screen with his or her finger to select commands or otherwise
provide input to the computer with which it is being used.

a. graphics tablet
b. touch screen
c. laser screen
d. signature capture device

39. What does each byte in the ASCII coding scheme represent?

a. single character
b. single cluster
c. multiple bits
d. multiple characters

40. Which of the following is not true of the thin client on your desk at your office?

a. It accesses data via the Internet.


b. It has extensive capabilities.
c. It looks like a desktop computer.
d. It does not contain a hard disk.

41. A ____ is an electronic path over which data can travel.

a. word
b. bus
c. cache memory
d. lane

42. Companies that deliver SaaS are sometimes referred to as ____.

a. download services
b. application service providers (ASPs)
c. Internet service providers (ISPs)
EXAM ON INFORMATION TECHNOLOGY

d. running services

43. ____, the most commonly used type of possessed knowledge, are secret words or character
combinations associated with an individual.

a. Usernames
b. PINs
c. Codes
d. Passwords

44. You have received an email that is directing you to a phony website that looks like the website for
your mortgage company. What kind of message is this?

a. pop-up
b. pharming
c. phishing
d. spam

45. What involves showing users exactly how they will use the new hardware and software in the
system?

a. testing
b. training
c. acceptance
d. converting

46. A program has been placed on your smartphone without your knowledge and it is collecting
personal information about you. What kind of application is this?

a. adware
b. phishing application
c. spyware
d. filter

47. Which of the following gestures would you use if you want to run a new browser app on your new
tablet?

a. pinch
b. press and hold
c. double-tap
d. slide

48. You love to take pictures of your family. What standard do you use to print pictures directly from
your camera?

a. WBA c. USB
b. IBW d. UWB
EXAM ON INFORMATION TECHNOLOGY

49. The ____ takes instructions from the prefetch unit and translates them into a form that the control
unit can understand.

a. ALU
b. internal cache
c. register
d. decode unit

50. In a spreadsheet program, how is data organized?

a. in rows and columns collectively called a spreadsheet


b. in a notebook containing thousands of pages
c. in columns and cells collectively called a notebook
d. in rows and columns collectively called a worksheet
EXAM ON INFORMATION TECHNOLOGY

1.Some touch screens recognize when you touch the screen with two fingers or two hands. If you are
looking for a device on which you can do this, what type of touch screen should you search for?

a. phase-touch
b. dual-touch
c. twin-touch
d. multi-touch

2. When a user types data on a keyboard, what is occurring?

a. The user is issuing a command that is stored in the memory of the computer and then is transformed
into input data for use with a program.
b. The user is using an input device to enter input into the memory of the computer.
c. The user is employing an input device (the keyboard) to tell the computer what tasks to perform and
how to perform them.
d. The user is entering information that will be transferred to the CPU for interpretation and then to
storage so that the information will be available when needed.

3. A computer ____ is the amount of data (measured in bits or bytes) that a CPU can manipulate at one
time.

a. word
b. statement
c. unit
d. character

4. In the early 1980s, things began to change. ____ were invented and computer use increased
dramatically.

a. Computers
b. Microcomputers
c. Printers
d. Networks

5. ____ is a shareware program.

a. Microsoft Office (office suite)


b. Internet Explorer (Web browser)
c. WinZip (file compression program)
d. Pine (e-mail program)

6. Media that allow random access are sometimes referred to as ____ media.

a. addressable
b. identifiable
c. nonidentifiable
EXAM ON INFORMATION TECHNOLOGY

d. optical

7. What distinguishes a data collection device from other input devices?

a. It obtains data directly at the location where the transaction or event takes place.
b. Its reliability is higher than any other input device so it is more suited to high security data capture
use scenarios.
c. It collects data rather than computer input.
d. It can collect and store much more data in a shorter period of time than other input devices.

8. Smith Web Design is creating a secure Web site for a local doctor. In addition to providing basic
information about her practice, she wants her patients to be able to log on and access their records,
including images such as X-rays and MRIs.
After patients log on, they should be able to download scanned versions of their X-rays and MRIs. These
images should be provided in the ____ format.

a. BMP
b. GIF
c. TIF
d. JPEG

9. Jess is a musician who has just bought a new computer. Now she has to determine how to connect
this computer to the devices that were connected to her old computer.
To connect her external hard drive where her music files are stored to the computer, Jess needs to use
the ____ port.

a. modem
b. USB
c. network
d. serial

10. One of the most promising types of nonvolatile RAM is magnetic (or more precisely, ____) (MRAM).

a. magnetoselective
b. magnetobalanced
c. magnetocharged
d. magnetoresistive

11. Recent photos you captured are low in quality. What is one of the first things to check?

a. distance
b. lens cap
c. resolution
d. batteries

12. You need to set up a computer to store and deliver email messages for your small business. Which of
the following are you most likely to use?
EXAM ON INFORMATION TECHNOLOGY

a. network server
b. mail server
c. home server
d. file server

13. Which of the following terms is used to describe a program that hides in a computer and allows
someone from a remote location to take full control of the computer?

a. a Trojan horse
b. a worm
c. a rootkit
d. a virus

14. IF YOU RECEIVE AN EMAIL MESSAGE IN ALL CAPITAL LETTERS, WHAT DOES THIS SIGNIFY?

a. THE EMAIL WAS SENT FROM A GOVERNMENT AGENCY.


b. THE EMAIL IS IMPORTANT.
c. THE CAPSLOCK KEY ON YOUR KEYBOARD IS MALFUNCTIONING.
d. THE PERSON WHO WROTE THE EMAIL WAS SHOUTING AT YOU.

15. The accompanying figure shows the iGoogle ____ Web page.

a. RSS
b. social networking
c. portal
d. podcasting

16. In a 16.8-million-color (called photographic quality or ____) image, three bytes (24 bits) are used to
store the color data for each pixel in the image.

a. full color
b. real color
c. mega color
d. true color

17. When typing text in a word processing program, you should only press ____ after a short line (like a
title), at the end of a paragraph, and to leave a blank line between paragraphs.

a. Backspace
b. Enter
c. Insert
d. Esc

18. Social engineering, as it pertains to computers, is _____________.

a. compiling data from multiple computer users in order to make predictions about computer trends
b. creating consumer and personal profiles by tracking website history and electronic purchases
EXAM ON INFORMATION TECHNOLOGY

c. gaining unauthorized access or obtaining confidential information by taking advantage of the


trusting nature or naivety of users
d. filtering Internet content to targeted users based on their personal preferences

19. ____ refers to using a PC to combine and manipulate text and images to create attractive documents
that look as if they were created by a professional printer.

a. Desktop publishing
b. Project management software
c. Personal productivity
d. Computer-aided design (CAD)

20. In Internet terminology, what is the term, google.com, called?

a. Internet service provider


b. domain name
c. webpage protocol
d. TLD

21. Stacey is the office manager for a small business and is looking for a new printer and scanner for her
office. After doing some research into printers, Stacey decides to buy a(n) ____ printer, since they are
the standard for business documents and are typically faster and have better quality output than other
types of printers.

a. ink-jet
b. digital
c. magnetic
d. laser

22. If your cousin wanted to view information from the World Wide Web, what application software
would you tell her to be sure she has on her computer?

a. ISP interface resolution and handshake configuration controller


b. browser
c. Word processor
d. DNS server support system

23. What is the smallest unit of data the computer can process?

a. reg
b. log
c. byte
d. bit

24. Most network cards contain a port that accepts a(n) ____, which looks similar to a telephone
connector but is larger.

a. RJ-12 connector
EXAM ON INFORMATION TECHNOLOGY

b. RJ-45 connector
c. RJ-11 connector
d. RJ-14 connector

25. The file management program incorporated into Windows is ____.

a. WinZip
b. StuffIt
c. Windows Explorer
d. Disk Cleanup

26. A piece of software you use is privately owned and limited to a specific vendor. What is the term for
this kind of software?

a. locked
b. incompatible
c. proprietary
d. vendor-specific

27. Wireless displays connect to a computer using a wireless networking connection such as Wi-Fi or
____.

a. 3D
b. VGA
c. Bluetooth
d. USB

28. Some personal computer manufacturers provide a hard disk configuration that connects multiple
smaller disks into a single unit that acts like a single large hard disk. What is this grouping called?

a. RPM
b. RAID
c. AXS
d. ACIS

29. In the example shown in the accompanying figure, ____ is being used to create an animated banner.

a. Adobe Dreamweaver
b. Adobe Fireworks
c. Adobe Contribute
d. Adobe Flash

30. An emerging type of mobile phone is the cellular/satellite ____ phone that can be used with cellular
service when it is available and then switches to satellite service when cellular service is not available.

a. duplex
b. dual-core
c. digital
EXAM ON INFORMATION TECHNOLOGY

d. dual-mode

31. Which of the following is not true about tape storage?

a. Tape is a magnetically coated ribbon of plastic capable of storing large amounts of data and
information at a low cost.
b. A tape cartridge is small, rectangular, plastic housing for tape.
c. A benefit of tape is that it allows for nonsequential access.
d. Business users utilize tape most often for long-term storage and backup.

32. Images are available in many formats, such as TIF, BMP, GIF, JPEG, and ____.

a. MP3
b. MPEG
c. AVI
d. PNG

33. You want to add a new external hard disk to your computer, but you are unable to connect because
you have run out of USB ports. Which of the following can you use instead?

a. peripheral index
b. ExpressCard module
c. CPU center
d. USB hub

34. The ____, implemented in 2001, grants federal authorities expanded surveillance and intelligence-
gathering powers, such as broadening their ability to obtain the real identity of Internet users and to
intercept Internet communications.

a. Identity Theft and Assumption Deterrence Act of 1998


b. USA Patriot Act
c. Sarbanes-Oxley Act
d. No Electronic Theft (NET) Act

35. In ____ transmission, data can move in both directions at the same time, such as with a telephone.

Select one:
a. half-simplex
b. full-simplex
c. full-duplex
d. half-duplex

36. Integrated circuits incorporate many transistors and electronic circuits on a single tiny silicon chip,
allowing ____ to be even smaller and more reliable than earlier computers.

a. third-generation computers
b. fourth-generation computers
c. fifth-generation computers
EXAM ON INFORMATION TECHNOLOGY

d. second-generation computers

37. Where do RAM chips usually reside within a computer?

a. in the processor/memory signal cache circuitry


b. on the memory digital dynamic circuit board
c. on a memory module
d. in a memory slot

38. A ____ provides a secure private tunnel from the user’s computer through the Internet to another
destination and is most often used to provide remote employees with secure access to a company
network.

a. USB private network


b. virtual private network
c. tunnel private network
d. laptop private network

39. ____ are the standard for business documents and come in both personal and network styles.

a. Line printers
b. Laser printers
c. Dot-matrix printers
d. Ink-jet printers

40. Which of the following is a type of backup you can only perform at your large enterprise?

a. continuous
b. differential
c. incremental
d. full

41. To read data, the reference beam projects the hologram containing the requested data onto a ____
that reads the entire data page at one time.

a. detector
b. spacer
c. modulator
d. header

42. A ____ is the hardware where data is actually stored.

a. storage medium
b. storage device
c. storage processor
d. storage memory

43. Common input devices include the keyboard and ____.


EXAM ON INFORMATION TECHNOLOGY

a. printer
b. monitor
c. mouse
d. speaker

44. What is the World Wide Web?

a. a worldwide collection of electronic documents


b. a set of electronic documents diagramming and charting all the worldwide Internet connections
c. a database of every document stored on computers worldwide
d. the wiring and cabling used to connect computers on the Internet

45. Which of the following technologies is your new mobile phone payment device most likely to use?

a. WiMax
b. NFC
c. Token ring
d. Bluetooth

46. You want to use the UMB cellular transmission standard on your new mobile phone. Which standard
will you use?

a. 3G c. 4G
b. 5G d. 2G

47. The means by which an operating system or any other program interacts with the user is called the
____.

a. programming interface c. user interface


b. program front-end d. user login

48. You want a form of backup that copies all program and data files. Which of the following will you
use?

a. archival backup c. selective backup


b. partial backup d. differential backup

49. Which of the following statements is not a safeguard against the failure of hardware?

a. device-tracking apps c. fault-tolerant computers


b. surge protectors d. UPS

50. What type of software restricts access to specified websites?

a. net filtering c. phishing


b. spam filtering d. web filtering
EXAM ON INFORMATION TECHNOLOGY

1.Which type of software has no restrictions from the copyright holder regarding modifications of the
software’s internal instructions and its redistribution?

a. custom software
b. system software
c. shareware
d. open source software

2. You are using a Linux-based operating system designed by Google to work primarily with web apps.
What is it called?

a. Symbian OS
b. Chrome OS
c. iOS
d. BlackBerry OS

3. What is the core of an operating system that manages memory and devices, maintains the internal
clock, starts programs, and assigns the computer’s resources?

a. the cylinder
b. the kernel
c. the core
d. the BIOS

4. Data files are also often called ____.

a. scripts
b. databases
c. documents
d. sheets

5. If your cousin asks you what devices can be used to record and retrieve data, instructions, and/or
information for future use on a computer, which of the following would you tell her?

a. Hard disks, memory cards, memory


b. Memory, Blu-ray Disc drives, USB flash drives
c. USB flash drives, SSDs, hard disks
d. Scanners, DVD drives, memory cards

6. You are looking for a backup that copies only the files that have changes since the last full backup.
Which of the following will you use?

a. selective backup
b. differential backup
c. archival backup
d. incremental backup
EXAM ON INFORMATION TECHNOLOGY

7. What are the three categories of items stored in computer memory?

a. operating system and other programs; applications; data being processed


b. system software; applications; command software
c. applications; application hardware; application data
d. system software; data being processed; Internet websites required to monitor and control the
computer

9. Digital camcorders are similar to conventional ____ camcorders.

a. binary
b. analog
c. electronic
d. manual

10. You have just written a new app to intercept documents from the operating system that are to be
printed and place them in the queue. What is this app called?

a. print spooler
b. job manager
c. page interceptor
d. printer task handler

11. ____ is the current version of Windows Phone.

a. Windows Phone 9
b. Windows Server 2011
c. Windows Phone 5
d. Windows Phone 7

12. A standard CD-ROM is called a single-session disc. Why are they called single-session discs?

a. A CD-ROM can include only one type of file per disc.


b. They can be used only once.
c. They are used for only one purpose.
d. Manufacturers write all items on the disc at one time.

13. An organization to which you belong is joining the W3C. What is the mission of the work you will
undertake as a member?

a. To promote Internet2 ventures


b. To ensure the continued growth of the web
c. To devise technology for connecting to the Internet
d. To expand mobile broadband access

14. Which of the following does your daughter's daycare use to verify the identity of parents who pick
up their children?
EXAM ON INFORMATION TECHNOLOGY

a. face recognition system


b. hand geometry system
c. digital forensics system
d. iris recognition system

14. Most operating systems have security features available, such as an integrated ____ to protect
against unauthorized access via the Internet.

a. modem
b. router
c. firewall
d. hub

15. Robert is a medical writer for a pharmaceutical company. The company allows Robert to work from
home. Every day, Robert uses ____ to have a real-time, face-to-face meeting with his boss.

a. telemarketing
b. virtual networks
c. videoconferencing
d. intranets

16. A ____ is an optical code that represents data with bars of varying widths or heights.

a. character code
b. digital code
c. barcode
d. bar table

17. You are looking for a browser that will run on your computer, which uses the Linux operating
system. Which of the following is an option for you?

a. Chrome
b. Safari
c. Internet Explorer
d. Firefox

18. Define the term, payload, as it pertains to computer crime.

a. the financial burden computer crime places on its victims


b. the money a criminal receives from extortion or other computer crimes
c. the destructive event or prank the virus is intended to deliver
d. the amount of data loss to a company or individual who is a victim of a computer crime

19. ____ is a wireless standard that is designed for very short-range (10 meters, approximately 33 feet,
or less) connections.

a. xMax c. Bluetooth
b. IrDA d. Wi-Fi
EXAM ON INFORMATION TECHNOLOGY

20. In a printer, the print ____ affects the quality of the printed output.

a. palette
b. size
c. resolution
d. depth

21. Which of the following gestures would you use if you want to move an item around the screen on
your new tablet?

a. swipe
b. stretch
c. slide
d. pinch

22. Your business is looking to rely on cloud computing services to create applications using web-based
development platforms. What is the term for this?

a. Software as a Service
b. Data as a Service
c. Infrastructure as a Service
d. Platform as a Service

23. Most computers and many mobile devices, such as smartphones and portable media players, can
connect to which kind of network?

a. Bluetooth
b. Wi-Fi
c. cellular radio
d. all of the above

24. The bus width and bus speed together determine the bus’s ____ or bandwidth; that is, the amount
of data that can be transferred via the bus in a given period of time.

a. memory
b. throughput
c. clock speed
d. machine cycle

25. Common online investing services include the ability to set up a(n) ____ that displays the status of
the stocks you specify.

a. stock account
b. e-tailer
c. online portfolio
d. online recorder
EXAM ON INFORMATION TECHNOLOGY

26. ___ provide(s) a method of storing data on two or more hard drives that work in combination to do
the job of a larger drive.

a. Storage Area Networks (SANs)


b. RAID (redundant arrays of independent disks)
c. Holographic Storage
d. Network Attached Storage (NAS)

27. What is another term for the operating system a computer uses?

a. file manager
b. system utility
c. platform
d. application

28. Which of the following gestures would you use if you want to activate a mode that enables you to
move an item with one finger to a new location on your new tablet?

a. press and hold


b. swipe
c. double-tap
d. slide

29. Jack has a computer at home that he uses to access the Internet, store and edit personal photos, and
create and edit documents. Recently, he has come to realize that in order to keep the computer
performing at its best, he needs to carry out regular system maintenance on the computer.
Jack can use the ____ program to locate and delete temporary files, such as installation files, Web
browsing history, and files in the Recycle Bin.

a. Windows Registry
b. Windows Disk Cleanup
c. Disk Defragmenter
d. Temporary Files

30. Fernando has been having problems with his computer. He takes it to his local computer repair shop
to be checked and finds out that his computer has a number of malware that he was not even aware of.
The technician tells Fernando that his computer has a ____, which might have gotten into Fernando’s
computer when he downloaded a free computer game from the Internet.

a. virus
b. spider
c. bot
d. spam

31. ____ refers to organizing the content to be transferred to DVD, such as importing video clips,
creating the desired menu structure, and so forth.

a. DVD ripping
EXAM ON INFORMATION TECHNOLOGY

b. DVD authoring
c. Video editing
d. Video ripping

32. Which of the following terms is used to describe a small text file that a web server stores on your
computer?

a. a cookie
b. a breadcrumb
c. a cracker
d. a nugget

33. Which of the following technologies is your new inventory tracking system at your small business
most likely to use?

a. TCP/IP
b. Bluetooth
c. UWB
d. IrDA

34. Which of the following statements about data types is FALSE?

a. AutoNumber data types assign numbers automatically to each record.


b. Yes/No fields can be used to create a field with True or False options.
c. Text data types are used for lengthy memos.
d. Object data types are used for photos, audio, or video.

35. Which of the following mouse operations would you use if you want to start a program feature?

a. double-click
b. drag
c. point
d. click

36. Which of the following statements is not true about intellectual property rights?

a. Intellectual property refers to unique and original works such as ideas, inventions, company logos,
and more.
b. A copyright protects any tangible form of expression.
c. The term fair use refers to the rights which creators are entitled for their work.
d. Digital rights management is a strategy designed to prevent illegal distribution of digital content.

37. Which of the following describe computer memory?

a. a series of digital devices embedded within computers that interprets commands from computer
users and remembers them for future reference in order to increase the processing power of a
computer
EXAM ON INFORMATION TECHNOLOGY

b. chips stored on the computer processor board that interact with both the system unit and the
processor in order to extract the data required for processing

c. electronic components that store, among other things, instructions waiting to be executed by the
processor

d. manufactured devices that store a single digital address at a time in order to facilitate an orderly
transfer of data within a computer

38. Which of the following are uses for application software?

a. to make business activities more difficult and, therefore, more secure


b. to assist users with controlling or maintaining the operation of a computer
c. to serve as the interface between the user and the computer hardware
d. to make users more productive

39. Melissa is the network administrator for a small publishing company. As network administrator, she
is in charge of maintaining the security of all the computers that are part of the company’s network.
Melissa has set up procedures so that every user using a computer connected to the network needs to
enter his or her ____, which appears as asterisks on the screen as it is being entered.

a. password
b. e-mail address
c. public key
d. private key

40. ____ are illustrations of faces showing smiles, frowns, and other expressions that are created with
keyboard symbols.

a. Phishes
b. Spams
c. Emoticons
d. Trojan horses

41. Although labels and constant values will be copied exactly to the new location, the way formulas
behave when they are copied depends on whether they use relative cell referencing or ____.

a. absolute cell referencing


b. integral cell referencing
c. total cell referencing
d. full cell referencing

42. Melissa is the network administrator for a small publishing company. As network administrator, she
is in charge of maintaining the security of all the computers that are part of the company’s network.
Melissa also decided to use a(n) ____, which continuously monitors and analyzes the traffic allowed to
and from the network to detect possible attacks as they are occurring and block them.

a. RAM
EXAM ON INFORMATION TECHNOLOGY

b. IPS
c. antivirus software
d. firewall

43. When a software program is purchased, the buyer is acquiring a(n) ____ that permits him or her to
use the software.

a. software key
b. copyright
c. software license
d. ownership right

44. What is the general term for programs that act without a user’s knowledge and deliberately alter the
computer’s operations?

a. malware
b. evilapp
c. viralware
d. cybersoft

45. Rearranging the data on the hard drive so all files are stored in contiguous locations is called ____.

a. file compression
b. disk defragmentation
c. disk cleanup
d. disk backup

46. What is the term used to connect a device to a network that has an IP address?

a. core
b. link
c. node
d. bus

47. What is a feature that has a graphical user interface to assist users with retrieving data?

a. DBE
b. SQL
c. NoSQL
d. QBE

48. A ____ transmits all data received to all network devices connected to it, regardless of which device
the data is being sent to.

a. gateway
b. bridge
c. router
d. hub
EXAM ON INFORMATION TECHNOLOGY

49. Smith Web Design is creating a secure Web site for a local doctor. In addition to providing basic
information about her practice, she wants her patients to be able to log on and access their records,
including images such as X-rays and MRIs.

Smith Web Design has decided to place all navigation buttons in a column on the left hand side of the
page. They should create these in the ____ format.

a. TIF
b. GIF
c. BMP
d. JPEG

50. Which of the following rests below a laptop and protects the computer from overheating and also
your lap from excessive heat?

a. cooling pad
b. lap pad
c. heat sink
d. heat blanket
EXAM ON INFORMATION TECHNOLOGY

1. Creating a(n) ____ means making a duplicate copy of important files so that when a problem occurs,
you can restore those files using the backup copy.

a. backup
b. mirror
c. index
d. hidden file

2. When you break a large document apart, consider including a link to view or download the entire
document intact either as a Web page or in a common format, such as Word or ____.

a. XML
b. MDF
c. XHTML
d. PDF

3. Your roommate is a graphic artist. She buys a large-format printer that creates photo-realistic-quality
color prints. What printer technology does her printer use?

a. plotter printer
b. impact printer
c. dye-sublimation
d. ink-jet printer

4. If your instructor turns on his computer and then starts a web browser, what contents are in RAM?

a. the operating system


b. certain operating system instructions and instructions downloaded from the Internet that tell the
operating system how to download data from the Internet
c. the web browser instructions and certain operating system instructions
d. the web browser instructions and certain instructions from other applications that your instructor
might start at a later time

5. ____ are the most common type of flat-panel technology used for small- to medium-sized computer
monitors.

a. FOLEDs
b. LCDs
c. Gas plasmas
d. OLEDs

6. External hard drives today typically connect to a computer via a USB or ____ port.

a. Firewall
b. FireWire
c. Bluetooth
d. IrDA
EXAM ON INFORMATION TECHNOLOGY

7. ____ are table of contents pages that contain links to all main pages on the sites.

a. Site maps
b. Frames
c. Search boxes
d. Drop-down menus

8. A type of computer usually has only one user. Which of the following is most likely to be the type of
computer?

a. personal computer
b. SSD
c. supercomputer
d. server

9. How are standards such as EDI used by businesses?

a. as a service for transferring funds


b. to classify their network cable types in order to connect devices
c. to define how data transmits across transmission media
d. to secure their network

10Which of the following gestures would you use if you want to get immediate access to allowable
actions on your new tablet?

a. press and hold


b. swipe
c. tap
d. stretch

11. Which of the following identifies pointing devices that can be used instead of a mouse?

a. pointing pin, trackpad, mouseball


b. trackball, pointing stick, thumbpad
c. clickpad, finger roll, mousetrack
d. trackball, touchpad, pointing stick

12. Andrea is an aspiring songwriter and musician. She is creating a Web site that would allow her to
showcase her talent and gain exposure.
Andrea does not yet have any CDs of her music, but she can still create audio files to put on her Web site
using a microphone or ____ instrument.

a. XML
b. WAV
c. WML
d. MIDI

13. ____ keys on a keyboard are used for issuing commands in some programs.
EXAM ON INFORMATION TECHNOLOGY

a. Alphanumeric
b. Arrow
c. Function
d. Number

14. If you are running a check that applies a formula to the primary key, what kind of check are you
running?

a. alphabetic
b. range
c. check digit
d. completeness

15. One of the most common 2D barcodes, the ____ code represents data with a matrix of small
squares.

a. Code 39
b. UPC
c. QR
d. ISBN

16. An application you own will run on a new version of your operating system. What is the term for this
kind of application?

a. upgrade compatible
b. upward compatible
c. upgrade compliant
d. Plug and Play

17. At your local supermarket there is a kiosk that allows you to rent your favorite movie on DVD. Of
which of the following is this an example?

a. film kiosk
b. photo kiosk
c. vending kiosk
d. media kiosk

18. Regardless of how storage devices are connected to a computer, ____ and/or names are typically
assigned to each storage device.

a. single-digit numbers
b. letters of the alphabet
c. vowels
d. special characters

19. What term is used to describe the discovery, collection, and analysis of evidence found on
computers and networks?
EXAM ON INFORMATION TECHNOLOGY

a. cybersleuthing
b. data mining
c. digital forensics
d. system analysis

20. ____ uses a single secret key to both encrypt and decrypt the file or message.

a. Private key encryption


b. Synchronous key encryption
c. Asymmetric key encryption
d. Public key encryption

21. When you examine a computer chip under a microscope, what will you see?

a. circuit boards
b. silicon molecules
c. integrated circuits
d. quad cores

22. The original first-generation cell phones were ____ and designed for voice data only.

a. discrete
b. magnetic
c. analog
d. digital

23. ____ is a new alternative for homes and businesses today in areas where there is fiber optic cabling
available all the way to the building.

a. T1
b. ISDN
c. BoF
d. DSL

24 You are investigating a problem with the motherboard, what are the two main components to check
out?

a. system unit, memory


b. CPU, processor
c. processor, system unit
d. memory, processor

25. To which of the following is a control unit most analogous?

a. firefighter
b. doctor
c. photographer
EXAM ON INFORMATION TECHNOLOGY

d. traffic officer

26. A data dictionary contains details about data. What term is used to describe this characteristic?

a. maxidata
b. omnidata
c. metadata
d. duplidata

27. If you are looking for an online social network that allows you to stay current with the daily activities
of those you are following, which of the following is the best match for you?

a. LinkedIn
b. Facebook
c. Twitter
d. Digg

28. If your instructor advises you to use the keys at the top of your keyboard that are identified by the
letter F and then a number to perform certain activities, what kind of keys is she advising you to use?

a. facilitating keys
b. function keys
c. finger keys
d. feature keys

29. If a computer advertisement states a computer operates at 5 GHz, what does that mean?

a. The CPU in the computer is an Intel processor.


b. The computer contains 5 GHz of RAM.
c. The system clock has a clock speed of five billion clock cycles per second.
d. It guarantees the computer runs faster than one that operates at 4 GHz.

30. Your sister just started a company that provides individuals and organizations access to the Internet
for a small fee.

a. access provider
b. broadband network gateway administrator
c. regional broadband domain monitor
d. wireless Internet technology disseminator

31. Your instructor has asked you to perform some research regarding a computer’s capability of
distinguishing spoken words. What is the best search term to use for your research?

a. digital voice input


b. speech identification
c. speech differentiation
d. voice recognition
EXAM ON INFORMATION TECHNOLOGY

32. What is the term for a narrow recording band that forms a full circle on the surface of a hard disk?

a. track
b. sector
c. platter
d. cluster

33. ____ is a Linux-based operating system developed by the Open Handset Alliance.

a. Android
b. UNIX
c. Vista
d. Mac OS X

34. The ____ boots the computer, launches application software programs, and ensures that all actions
requested by a user are valid and processed in an orderly fashion.

a. registry
b. startup
c. driver
d. operating system

35. One of the most straightforward ways to improve the quality of the hits returned in a search is to
use ____—essentially typing more than one keyword in a keyword search.

a. code searching
b. index searching
c. phrase searching
d. character searching

36. Which term describes a huge database that stores and manages data required to analyze historical
and current transactions?

a. data warehouse
b. data mine
c. data market
d. data archive

37. If your computer or printer does not have a built-in slot for memory cards, you can purchase a
device that can access the data stored on the memory card. What is that device called?

a. a transfer port
b. a memory stick
c. a read/write head
d. a card reader/writer

38. Which of the following technologies is your new remote control most likely to use?
EXAM ON INFORMATION TECHNOLOGY

a. IrDA
b. TCP/IP
c. Bluetooth
d. RFID

39. A computer that is controlled by a hacker or other computer criminal is referred to as a ____.

a. client
b. spider
c. bot
d. server

40. You want to run another operating system on your computer in addition to the one already installed.
Which of the following will let you do that?

a. warm boot
b. single-tasking operating system
c. secondary install
d. virtual machine

41. Which of the following does your new smartphone use to unlock the device?

a. face recognition system


b. hand geometry system
c. digital forensics system
d. iris recognition system

42. When a word processing program user formats a document, what does the user change?

a. the document’s appearance


b. the document’s reliability
c. the document’s content
d. the document’s clipboard

43. Computer memory and computer storage are available in varying sizes. Which of the following is the
largest amount of memory or storage?

a. gigabyte (GB)
b. terabyte (TB)
c. megabyte (MB)
d. kilobyte (KB)

44. A computer ____ spreads by creating copies of its code and sending those copies to other computers
via a network.

a. software
b. virus
c. worm
EXAM ON INFORMATION TECHNOLOGY

d. hacker

45. Today, the standard term for placing telephone calls over any type of data network (including the
Internet, as well as a LAN, WAN, or other type of data network) is ____.

a. DSL
b. BoF
c. ISDN
d. VoIP

46. Which of the following is a small version of a larger graphic?

a. SmallGraph
b. thumbnail
c. Compressed Bit Form (CBF)
d. podgraph

47. The term, botnet, means _____________.

a. a program that performs a repetitive task on a network


b. a group of compromised computers connected to a network that attacks other networks
c. a computer whose owner is unaware that the computer is being controlled remotely by an outsider
d. spam sent via email to spread viruses or commit a distributed denial of service attack

48. You want a storage medium that allows you to locate a particular data item immediately, without
having to move consecutively through items stored in front of the desired data item or file. What kind of
access will this storage medium use?

a. direct
b. indexed
c. sequential
d. preconfigured

49. A ____ is an image designed to enhance a presentation (such as an electronic slide show or a printed
report) visually, typically to convey information more easily to people.

a. presentation graphic
b. projector
c. Trojan horse
d. phish

50. Which of the following is not one of the reasons that a mobile device can be categorized as a
computer?

a. It can accept output.


b. It can store information for future use.
c. It can process data according to specified rules.
d. It operates under the control of instructions stored in its own memory.
EXAM ON INFORMATION TECHNOLOGY

1. Why is a fragmented disk slower than one that is defragmented?

a. A fragmented disk contains temporary Internet files and unused program files that need to be
deleted.
b. A fragmented disk has many files stored in noncontiguous sectors.
c. A fragmented disk contains programs that were deleted using Windows Explorer.
d. A fragmented disk has no index.

2. Conventional PCs are often referred to as ____ because the complete computer system fits on or next
to a desk.

a. processor computers
b. laptop computers
c. super computers
d. desktop computers

3. Smith Web Design is creating a secure Web site for a local doctor. In addition to providing basic
information about her practice, she wants her patients to be able to log on and access their records,
including images such as X-rays and MRIs.
In the “About Us” section of the Web site, the doctor wants to include a photo of her office. The best
format to save the photo in is ____.

a. JPEG
b. GIF
c. BMP
d. TIF

4. What happens when a computer or mobile device starts up?

a. The computer locates operating system in storage and loads it into RAM.
b. The computer accesses the memory and loads a program such as a word processing program.
c. The computer opens application software from ROM.
d. The computer searches for instructions in RAM.

5. With ____, data is sent one bit at a time, one after the other along a single path.

a. digital transmission
b. serial transmission
c. parallel transmission
d. wireless transmission

6. A ____ is a question, or, in database terms, a request for specific information from the database.

a. report
b. cell
c. query
d. form
EXAM ON INFORMATION TECHNOLOGY

7. Monitoring systems may also use ____, which are devices that respond to a stimulus (such as heat,
light, or pressure) and generate an electrical signal that can be measured or interpreted.

a. IAs
b. interpreters
c. transmitters
d. sensors

8. What is the term for an electrical channel within the circuitry of a computer than can transfer 8 bytes
of data at a time?

a. system channel port (8-byte)


b. 800 MHz circuit path
c. 64-bit bus
d. 32-bit bus

9. The term, PIN, is an acronym for which of the following?

a. private Internet notification


b. personal information network
c. personal identification number
d. possessed information number

10. What is data redundancy?

a. Data is linked to multiple records in a database.


b. There is no primary key to distinguish records.
c. Each department has its own files, so the same data might be stored in multiple files.
d. In the same database, each department enters data without checking to ensure it has not already
been entered.

11. Lisa is a student who regularly uses the computers at her local Internet café to listen to music, talk to
her friends and family through the Internet, and play computer games.
Lisa needs to make sure that the computer that she is using has a ____ attached to it for her to be able
to hear music and the sounds of a computer game.

a. touch screen
b. speaker
c. scanner
d. microphone

12. You want to place a video from the Internet to your desktop. What process do you use?

a. Downloading
b. Wireless accessing
c. Surfing
d. VoIP
EXAM ON INFORMATION TECHNOLOGY

13. Which of the following will you use if you are looking to perform backups in between full backups?

a. differential backup
b. archival backup
c. partial backup
d. selective backup

14. The term ____ refers to chip-based storage used by the computer.

a. Zip drive
b. hard drive
c. storage media
d. memory

15. When Mary started college, her parents bought her a new computer that came with minimal
software. She is now looking into purchasing additional software.
Mary needs word processing software for her classes, but she has to budget her resources carefully this
semester. She might consider using ____, which is available as a free download via the Internet.

a. SmartSuite.org
b. OpenOffice.org
c. WordPerfect Office
d. Microsoft Office

16. In your school’s database, in which of the following is all of the information about a particular
student stored?
Select one:
a. a report
b. a field
c. a record
d. a character

17. You received a new portable media player for your birthday. It is less than ideal as a gift, however,
because you were hoping to do something with it, and it is not something you can do with the player.
What is that thing you were hoping to do?

a. play games
b. watch television shows
c. take photos
d. manage a server

18. ____ optical discs can be recorded on, erased, and overwritten just like magnetic disks.

a. Recordable
b. Rereadable
c. Rewritable
d. Erasable
EXAM ON INFORMATION TECHNOLOGY

19. Which term is used to describe software used by cybercriminals?

a. conware
b. criminalware
c. cyberware
d. crimeware

20. When an instrument in the dashboard of your car informs you the air pressure in the right rear tire is
low, what type of computer determines the air pressure is low?

Select one:
a. server
b. embedded computer
c. online linked computer
d. analog computer

21. ____ is a family of operating systems based on Windows that is designed primarily for consumer and
industrial devices that are not personal computers.

a. Windows Vista
b. Windows Embedded
c. Windows Server 2003
d. Windows Mobile

22. If a manufacturer is looking for memory that is very durable and shock resistant, which kind of
technology might it use in its laptops?

a. SSDs
b. DVD drives
c. hard disks
d. platters

23. A(n) ____ keyboard folds or rolls up and connects to a device via a wired or wireless connection
when needed.

a. MIDI
b. slide-out
c. on-screen
d. portable

24. What is the purpose of memory management?

a. to optimize the use of RAM


b. to store data in the most efficient manner
c. to allocate system resources stored in ROM
d. to start the computer and operating system quickly
EXAM ON INFORMATION TECHNOLOGY

25. ____ sites allow you to generate map and driving directions and provide access to specific types of
useful information.

a. Reference
b. Product information
c. Educational
d. News

26. Commercial Linux distributions, such as those available from ____ and Novell, come with
maintenance and support materials.

a. Adobe
b. Cisco
c. .NET Framework
d. Red Hat

27. What is a receiving device?

a. a device that connects to a communications channel


b. a device on which data, instructions, and information travel
c. a device that accepts the transmission of data, instructions, or information
d. a device that initiates an instruction to transmit data, instructions, or information

28. What are two elements found in an email address?

a. address book and user name


b. domain name and POP3
c. user name and domain name
d. @ symbol and dot com name

29. Slides can be advanced at predetermined intervals or by clicking the mouse or ____.

a. pressing the esc key


b. pressing the backspace key
c. pressing the spacebar
d. right-clicking the mouse

30. If your friend is enjoying a cup of coffee in a trendy coffee shop and at the same time is surfing the
web, which of the following is she using?

a. SIS
b. Fixed Limited Online Access Transport (FLOAT)
c. a hot spot
d. FFT

31. Smart cards and holographic drives are examples of ____ systems.

a.storage
EXAM ON INFORMATION TECHNOLOGY

b. Wi-Fi
c.satellite
d. artificial intelligence

32. What is a more user-friendly interface some users use instead of interacting directly with a DBMS?

a. data file
b. user environment
c. front end
d. home page

33. Online shopping and online investing are examples of ____.

a. e-commerce
b. online merchandising
c. online marketing
d. e-trade

34. A(n) ____ is used to display output from a computer to a wall or projection screen

a. scanner
b. SED
c. IMOD
d. data projector

35. Which of the following is a huge database that stores and manages the data required to analyze
historical and current transactions?

a. data marketing
b. data distribution
c. data analysis
d. data warehouse

36. When data is processed into a meaningful form, it becomes ____.

a. information
b. code
c. a database
d. a program

37. System software is usually divided into two categories: operating system software and ____
programs.

a. planning system
b. background
c. FAT system
d. utility
EXAM ON INFORMATION TECHNOLOGY

38. Which of the following terms is used to describe a scam in which a website includes a button, image
or link that contains a malicious program?

a. war driving
b. spitting
c. clickjacking
d. spimming

39. A computer salesman refers to the shape and size of your new computer by a specific term. What
term does he use?

a. resolution
b. aggregator
c. form factor
d. base index

40. Fernando has been having problems with his computer. He takes it to his local computer repair shop
to be checked and finds out that his computer has a number of malware that he was not even aware of.
The technician also found a ____ on the computer, which is designed to find sensitive information about
the user located on the PC and then send it to the malware creator. The technician explains that this
type of malware cannot replicate itself.

a. bot
b. worm
c. virus
d. Trojan horse

41. The term CAPTCHA is _____________.

a. a series of distorted characters that a user is required to enter correctly to continue using a website
b. a digital image used to help decipher a faded or blurry word in digitized news archives
c. the average time it takes a computer to discover a password based on the number of characters
d. a private combination of words associated with a user name that allows access to computer resources

42. A host in a network performs which of the following tasks?

a. Replace Internet1.
b. Ensure telemedicine, digital libraries, high-definition video, and Internet fraud detection all can be
available over the Internet.
c. Develop and test advanced Internet technologies.
d. It is the same as Internet; it has no particular goal.

43. ____ refers to any instruction delivered via the Web.


a. Web-based teaching (WBT)
b. Web-based training (WBT)
c. E-training
d. Distance lessons
EXAM ON INFORMATION TECHNOLOGY

44. You are creating a database for your computer club. Most of the students live in your town, Durham.
How can you make Durham appear initially in the field to make data entry easier?

a. make it the default value


b. add a drop-down box
c. make the field a maximum of size characters
d. use AutoComplete

45. After a power failure, you instruct the DBMS to use the log to reenter any changes made to the
database since the last save or backup. What term is used to describe this backup technique?

a. restoration principle
b. rollback
c. continuous backup
d. forward recovery

46. You own a third-party business that provides networking services such as EDI, secure data and
information transfer, storage, and email. Into what category of business does this business fall?

a. CIN
b. VAN
c. EAN
d. NIC

47. You are outside in a public park with your friend. Both of you have Wi-Fi devices. For the devices to
communicate with each other, what is the maximum distance they can be apart?

a. 300 feet
b. 200 feet
c. 500 feet
d. 100 feet

48. What is unique about a multi-core processor?

a. It is a single chip with two or more separate processor cores.


b. It contains multiple control elements that, when working together, can increase the data processed
over the Internet.
c. It is a single processor with two or more separate chips.
d. It uses core memory to enhance the processing speed of processors.
EXAM ON INFORMATION TECHNOLOGY

49. One type of storage device that is sometimes used with computers and that uses sequential access is
a ____.

a. flash drive
b. compact card
c. hard drive
d. magnetic tape drive

50. Which of the following items in your pocket uses NFC technology?

a. credit card
b. postage stamp
c. coin purse
d. wallet

S-ar putea să vă placă și