Documente Academic
Documente Profesional
Documente Cultură
1. An engineer who needs to manage new product development might use what type of software?
2. With the cover off the system unit of a lab computer, your instructor pointed out a type of nonvolatile
memory that can be erased electronically and rewritten. What did your instructor call this memory?
a. perm-memory
b. firewire
c. flash memory
d. EM-ROM
3. A USB ____ is a device that plugs into your PC’s USB port to convert one port into several USB ports.
a. module
b. hub
c. connector
d. bus
4. When a user runs an application, what transfers from a storage device to memory?
a. instructions
b. operations
c. cache
d. registrations
5. When determining the amount of RAM necessary for a computer you wish to purchase, what should
you consider?
6. If someone feels distressed when deprived of computers and mobile devices, that person is said to
suffer from what
condition?
a. Technological interference
b. Technological neurosis
c. Technology overload
d. Technology use syndrome
EXAM ON INFORMATION TECHNOLOGY
7. Which of the following statements is not true about Internet and network attacks?
a. Information kept on an organization’s premises has a higher security risk than information
transmitted over networks.
b. It is usually the responsibility of the network administrators to take measures to protect a network
from security risks.
c. Internet and network attacks that jeopardize security include malware, botnets, denial of service
attacks, back doors, and spoofing.
d. No central administrator is present on the Internet.
8. To prevent unauthorized users from reading data as it travels over a network, what process should
the administrator specify?
a. scrambling
b. authorization
c. encryption
d. decoding scrambling
9. You have just provided the identification number that associates your new software purchase with
the mobile device on which you installed the software. What is the term for this process?
a. app installation
b. software deployment
c. product activation
d. software decryption
10. The ____ is cited as a disadvantage of Web-based training and distance learning by some educators.
a. inflexible location
b. strict-paced instruction
c. lack of face-to-face contact
d. slow feedback and generalized content
11. Which of the following are the two leading manufacturers of personal computer processor chips?
12. Some data projectors include an iPod ____ to connect a video iPod in order to project videos stored
on that device.
a. display c. touch-screen
b. dock d. port
13. You are going to form a partnership with an organization that sells domain names. What kind of
organization is your
EXAM ON INFORMATION TECHNOLOGY
partner?
a. cybersquatter
b. registrar
c. domain vendor
d. ICANN vendor
15. What is the print option where the page is taller than it is wide?
a. printout
b. planed
premier
c. premier
d. portrait
17. Which of the following terms refers to a written list of guidelines that might include rules that
prevent employees from using software illegally or using computers to steal?
a. an IT code of conduct
b. fair use
c. a software license
d. digital rights management
18. In a printer, the number of ____ affects the quality of printed output.
19. Bryan has just started an internship in which he uses a database frequently. The database contains
information about the company’s employees. Bryan’s supervisor senses that he is anxious about using
the database and drops by to give him a short tutorial.
Bryan’s supervisor explains that to retrieve information from the database, Bryan needs to use a ____.
EXAM ON INFORMATION TECHNOLOGY
a. formula
b. presentation
c. form
d. query
21. The numbering system we commonly use is called the decimal numbering system because it uses
____ symbols to represent all possible numbers.
a. 5
b. 2
c. 16
d. 10
22. What kind of camera is found on a computer that allows you to be seen during a video telephone
call?
a. ComCam
b. webcam
c. call cam
d. monitor cam
Feedback
24. ____ are used to input data about a person into a computer system so that the individual can be
identified based on a particular unique physiological characteristic.
a. RFID tags
b. MICR readers
c. Biometric readers
d. OMRs
25. A DNS server is able to identify which of the following?
26. The quality of an LCD monitor or LCD screen depends on several factors. Which of the following is
not true about the factors that affect LCD display quality?
27. ____ is a set of rules for exchanging data over the Web.
a. XML
b. MP3
c. CGI
d. PDF
28. When a Web page requires a very large image (such as to better show a product, home for sale, or
featured piece of art, for instance), a(n) ____ can be used to save loading time.
a. sample image
b. button image
c. icon image
d. thumbnail image
a. 28.8 Kbps
b. 56 Kbps
c. 128 Kbps
d. 10.2 Kbps
30. What is the definition of nonresident in terms of parts of the operating system?
a. dial-up
b. ISDN
EXAM ON INFORMATION TECHNOLOGY
c. DSL
d. ATM
a. Demote
b. Hacker
c. Remote
d. Control
34. A wireless keyboard is a battery-powered device that transmits data to the system unit using
wireless technology. Which of the following wireless technologies commonly are used for this purpose?
a. DVI
b. SATA
c. KeyTrack
d. Bluetooth
35. In DOS, the command ____ displays the files and folders in the current location.
a. COPY
b. FORMAT
c. DIR
d. CD
36. Which of the following can be used to create a software registration number, sometimes illegally?
a. keygen
b. public key
c. BSA
d. decryption key
37. A computer’s ____ is a collection of programs that manage and coordinate the activities taking place
within a computer system.
a. database system
b. operating system
c. storage system
d. application system
38. The company for which you work has just released an updated device driver version. Which of the
following is least likely to be the reason for the release?
39. You want to help ensure that unauthorized people will not be able to view the files on a given
medium. Which of the following will you use?
a. encryption
b. concatentation
c. file linking
d. embedding
40. There are a number of special Web pages, called ____, available to help you locate what you are
looking for on the Internet.
a. domain identifications
b. Internet repositories
c. domain sites
d. search sites
a. cell
b. pointer
c. footer
d. table
42. Charts are inserted into an Excel spreadsheet using the commands in the Charts group on the ____
tab on the Ribbon.
a. Data
b. Format
c. Insert
d. Tools
43. During the 1980s and early 1990s, ____ was the dominant operating system for microcomputers.
a. Mac OS
b. desktop operating system
c. DOS (Disk Operating System)
d. Linux
44. Melissa is the network administrator for a small publishing company. As network administrator, she
is in charge of maintaining the security of all the computers that are part of the company’s network.
One of the first items that Melissa installed was a(n) ____, which checks all incoming and outgoing
traffic and only allows authorized traffic to pass through.
a. firewall
b. encryption algorithm
c. botnet
d. IPS
EXAM ON INFORMATION TECHNOLOGY
45. When a radio station broadcasts a live sporting event over the Web, what technology are they
using?
a. strobbing
b. podcasting
c. streaming
d. gaming
46. Which of the following is NOT a suggestion for easing eyestrain while using a mobile device?
48. What type of software can your parents use to create a will without visiting an attorney?
a. court-documented software
b. legal software
c. accounting/tax preparation software
d. attorney supernumerary software
49. Most notebooks follow the traditional ____ design in which the monitor is on the inside top half of
the PC, and the keyboard and touch pad are on the inside bottom half.
Select one:
a. Microsoft
b. clamshell
c. IBM
d. book
50. In addition to personal operating systems and server operating systems, there are also mobile
operating systems and ____.
1. ____ can be extremely distressing for victims, can take years to straighten out, and can be very
expensive.
a. Spams
b. Software theft
c. Identity theft
d. Remote access
2. Which network type connects each computer and device to a central device?
a. a core network
b. a ring network
c. a bus network
d. a star network
3. What is a single device that provides functionality of a printer, scanner, copy machine, and perhaps a
fax machine called?
a. a SOHO machine
b. a multifunction printer
c. a multipurpose peripheral
d. a dual use machine
4. Each place value in a binary number represents ____ raised to the appropriate power.
a. 1
b. 10
c. 0
d. 2
a. disk backing up
b. disk wiring
c. disk caching
d. disk tracking
6. You have heard that it is possible to improve your computer's performance by storing all related files
for a particular program together. What is the term for this?
a. reoperationalization
b. compression
c. maintenance
d. defragmenting
EXAM ON INFORMATION TECHNOLOGY
7. You are looking for the basic storage unit on a mobile device. Which of the following represents a
single character?
a. megabyte
b. bit
c. gigabyte
d. byte
8. Rodney owns a computer that he uses to work, keep in touch with friends and family, watch movies,
listen to music, and use the Internet.
Rodney wants to be able to easily carry files with him wherever he goes but he also has a tendency to
lose things. Knowing this, he should probably save those files on a ____ drive which he can then attach
to his backpack.
a. USB flash
b. CD
c. hard
d. fusion
9. The term ____ refers to accessing someone else’s unsecured Wi-Fi network from the hacker’s current
location (such as inside his or her home, outside a Wi-Fi hotspot location, or near a local business).
a. Wi-Fi worming
b. war driving
10. You want to remove a program from your computer. What do you use?
a. Uninstaller
b. File Compression
c. Backup and Restore
d. Defragmenter
11. A growing number of college campuses have wireless ____ on campus that allow students to use
their PCs to connect wirelessly to the college network and the Internet from anywhere on campus.
a. hotpoints
b. com spots
c. hotspots
d. com points
12. Antivirus programs are usually set up to automatically download new ____ from their associated
Web site on a regular basis.
a. virus reports
b. virus definitions
c. software versions
d. upgrades
EXAM ON INFORMATION TECHNOLOGY
Feedback
Your answer is incorrect.
The correct answer is: virus definitions
a. backbone
b. broadband
c. bandwidth
d. broadwidth
14. To restore a file or folder deleted from your computer’s hard drive, open your computer’s ____ and
restore the file to its original location.
a. Windows Explorer
b. System Restore program
c. Recycle Menu
d. Recycle Bin
a. barcode
b. RFID
c. optimal mark
d. scanner
a. System
b. Serial
c. Server
d. Structured
17. Which type of optical scanner works in a manner similar to a copy machine?
a. pen scanner
b. sheet-fed scanner
c. drum scanner
d. flatbed scanner
EXAM ON INFORMATION TECHNOLOGY
18. A(n) ____ is a named, preprogrammed formula, such as to compute the average of a group of cells
or calculate a mortgage payment amount.
a. label
b. cell
c. argument
d. function
19. Unless you want to allow others to follow your locations throughout the day, disable the ____
tracking feature.
a. GPS
b. BIOS
c. IP
d. NET
20. The key element of the microprocessor is the ____—a device made of semiconductor material that
acts like a switch controlling the flow of electrons inside a chip.
a. transistor
b. chipbus
c. S-card
d. processor
21. ____ is typically used with LANs that have a star topology and can be used in conjunction with
twisted-pair, coaxial, or fiber-optic cabling.
a. Wi-Fi
b. Token Ring
c. Ethernet
d. 80xx2.11
22. You are looking for the best protection against data loss. Which of the following will you use?
a. differential backup
b. archival backup
c. selective backup
d. partial backup
23. You keep hearing a colleague of yours use a term and you are unfamiliar with it. Ultimately,
however, you realize that it is a synonym for the term port. What is it?
a. jack
b. unit
c. scope
d. probe
EXAM ON INFORMATION TECHNOLOGY
a. mirroring
b. selection
c. outsourcing
d. archival
26. Your organization has a large number of servers. Which of the following are you most likely to
choose as a result?
a. bay server
b. blade server
c. rack server
d. tower server
27. Which of the following search texts will display pizza or sandwich places in New Orleans?
a. Netiquette
b. Web etiquette
c. Net rules
d. Internet Rules
29. Presentation graphics programs contain an assortment of tools and operations for creating and
editing slides, including preformatted ____ containing placeholders for the various elements in the slide.
a. slide layouts
b. charts
c. slide clips
d. wizards
EXAM ON INFORMATION TECHNOLOGY
30. ____ generally refers to applications and services that use the Web as a platform to deliver rich
applications that enable people to collaborate, socialize, and share information online.
a. Web Y
b. Web 1.0
c. Web X
d. Web 2.0
31. Jamie is interested in pursuing computers as a career. He is very comfortable working with PCs and
has a broad knowledge of the typical systems and applications software that people use. He has always
enjoyed working closely with people and has a good facility for explaining how technical systems work.
Jamie’s mother is a computer programmer and would like Jamie to follow in her footsteps. What course
would she most likely suggest that Jamie take in college?
a. history of computing
b. Java
c. computer literacy
d. systems analysis
33. Related software programs are sometimes sold bundled together as a ____, such as a group of
graphics programs, utility programs, or office-related software.
a. software thread
b. software bank
c. software base
d. software suite
34. With a streaming audio file, only a small portion of the audio file is initially downloaded and ____,
and then the audio file can begin playing while the remainder of the file downloads simultaneously.
a. screened
b. buffered
c. stored
d. archived
36, Which of the following technologies is your new wireless headset most likely to use?
a. TCP/IP
b. Bluetooth
c. RFID
d. IrDA
37. Anthony is passionate about politics and enjoys sharing and discussing his views with others over the
Internet.
Anthony regularly visits several popular political ____, which are Web pages designed to facilitate
written discussions between people on specific subjects.
a. e-mail programs
b. Webinars
c. podcasts
d. message boards
38. ____ apps can allow you to lock your mobile device and SIM card remotely.
a. remote security
b. mobile tech
c. mobile security
d. SIM security
a. Microsoft
b. Sybase
c. Oracle
d. Sun Microsystems
40. You want to bring your game console to another location. How heavy is a typical a game console?
a. 15 pounds
b. one-half pound
c. four pounds
d. one pound
41. Most computer tapes today are in the form of ____ tapes, as shown in the accompanying figure.
a. cartridge
b. flash
c. floppy
d. optical
EXAM ON INFORMATION TECHNOLOGY
a. a transaction between two businesses that are bartering and auctioning goods and services via secure
telephonic connections
b. a business transaction that occurs over an electronic network such as the Internet
c. a customer (consumer) experience requiring the Internet, cash, a shopping cart, and videos
d. the sale of electronic goods and services that enable an Internet connection
a. control the World Wide Web; monitor and govern the use of data and information communicated
over the
Internet
b. supervise and approve corporate and commercial use of the World Wide Web
c. oversee research and set standards for many areas of the Internet
d. own and control the Internet
44. ____ is the most widely used mobile operating system worldwide.
a. Windows Mobile
b. Mac OS
c. Symbian OS
d. Palm OS
45. Which of the following technologies is the new tollbooth on the local highway most likely to use?
a. RFID
b. IrDA
c. TCP/IP
d. Bluetooth
46. Andrea is an aspiring songwriter and musician. She is creating a Web site that would allow her to
showcase her talent and gain exposure.
Once Andrea has recorded her music in an audio file, she would need to use a ____ method to reduce
the size of the file before making it available through her Web site.
a. streaming
b. filtering
c. compression
d. buffering
47. The ____ format is a format specifically created for Web page images.
a. PNG
b. BMP
c. PPT
d. TIF
EXAM ON INFORMATION TECHNOLOGY
48. What kind of controller uses serial signals to transfer data, instructions, and information?
a. SAS
b. SATA
c. SCSI
d. EIDE
49. You need to purchase a new application on behalf of your company, one that will track product
inventory and manage shipping status. Which kind of software will you buy?
a. distribution software
b. human resources software
c. manufacturing software
d. retail software
50. ____ monitors can be added to a computer without requiring a video card that supports multiple
monitors.
a. USB
b. VGA
c. Monochrome
d. GPU
EXAM ON INFORMATION TECHNOLOGY
1.____ is a versatile video format developed by Apple and widely used to distribute video over the Web.
a. .mp3
b. .wmv
c. .mov
d. .avi
2. Which of the following is your library using because it costs less, is easier to maintain, and uses less
power than desktop computers?
a. mainframe
b. thin client
c. tablet
d. ultrabook
a. cache
b. tape
c. track
d. sector
4. If you are looking for a keyboard to project from a device to a flat surface, which of the following
would you use?
a. virtual keyboard
b. integrated keyboard
c. wireless keyboard
d. digital keyboard
5. Which of the following mouse operations would you use if you want to display a shortcut menu?
a. point
b. drag
c. right-drag
d. right-click
6. What component converts the AC power in a wall plug to the DC power required by a computer?
a. electrical alternator
b. power surge and adaptation coordinator
c. AC/DC flip-flop power switch
d. power supply
EXAM ON INFORMATION TECHNOLOGY
7. What is the usual rate of speed for the platters in a hard disk?
a. satellite
b. bandwidth
c. dial-up
d. broadband
9. A popular use of CD-RW and CD-R discs is to create audio CDs. What is the process of copying audio
and/or video data from a purchased disc and saving it on digital media called?
a. ripping
b. rooting
c. revolving
d. revving
10. Which of the following identifies three types of RAM in sequence from the slowest to the fastest?
11. Which of the following statements is NOT true about the database approach?
a. Databases require more memory, storage, and processing power than file processing systems.
b. The database approach increases the data’s integrity.
c. The database approach allows nontechnical users to access and maintain data.
d. A disadvantage to the database approach is isolated data.
12. A ____ is a software program that is designed to cause damage to the computer system or perform
some other malicious act.
a. computer virus
b. utility program
c. firewall
d. spyware
14. What database term is used to describe a request for specific data from the database?
a. query
b. information
c. retrieval
d. analysis
15. You want to allow sound to be input through a microphone and output through external speakers on
your computer. What must you have in order to do this?
a. port duplicator
b. SCSI port
c. peripheral device manager
d. sound card
16. If you are running a check to ensure that a required field contains data, or the correct minimum
number of characters, what kind of check are you running?
a. completeness
b. check digit
c. alphabetic
d. range
17. When your friend opened the case containing the electronic components of his computer, he saw
the main circuit board for the computer. What is this circuit board called?
a. control board
b. electronic circuit primary board
c. command board
d. motherboard
18. In ____ transmission, data can travel in either direction, but only in one direction at a time.
a. half-duplex
b. half-simplex
c. simplex
d. duplex
19. If your friend recently has participated in e-filing, what has she been doing?
a. creating a file-based system that allows her to produce a transcript and resume and then send them
to potential employers online
b. accumulating digital graphics and photographs for online display
c. filing her state and/or federal tax returns online
d. using database software to electronically file all her records
EXAM ON INFORMATION TECHNOLOGY
20. You are designing software that will allow users to interact with it through ordinary, intuitive
behavior. Which of the following are you using?
a. GUI
b. TUI
c. BUI
d. NUI
21. ____ are programs designed to play audio and video files.
a. Media players
b. Media boxes
c. Real players
d. iPods
23. You want to connect your mobile device to a speaker. Which of the following is a way to do so?
a. display
b. memory
c. solid-state drive
d. scanner
25. What is the term for the process of comparing data with a set of rules or values to find out if the
data is correct?
Select one:
a. procedure
b. verification
c. validation
d. query
EXAM ON INFORMATION TECHNOLOGY
26. You want to clear the memory on your mobile device. Which of the following is sufficient?
27. Your business is looking to rely on cloud computing services to make data available to its developers
to incorporate in applications. What is the term for this?
a. Data as a Service
b. Platform as a Service
c. Software as a Service
d. Infrastructure as a Service
a. Spoofing
b. Phishing
c. Hacking
d. Spamming
29. You want to shrink the size of a file. What do you use?
a. PC Maintenance
b. Backup and Restore
c. File Compression
d. Disk Cleanup
31. You are looking for a port that will work for an audio device. Which of the following is likeliest to
work?
a. DVI
b. HDMI
c. VGA
d. Ethernet
32. Which of the following technologies uses a separate transistor to apply charges to each liquid crystal
cell?
a. organic-matrix c. active-matrix
b. standard-matrix d. dynamic-matrix
EXAM ON INFORMATION TECHNOLOGY
33. ____ includes all the programs that allow a user to perform specific tasks on a computer, such as
writing a letter.
a. Application software
b. Utility programs
c. System software
d. Background programs
34. You have just designed a device-tracking app for sale in the app marketplace. Which of the following
are you least likely to use in your app?
a. IP addresses
b. UNIX
c. GPS
d. Wi-Fi
35. ____ was originally developed as a programming language designed for processing text.
a. Perl
b. AJAX
c. ActiveX
d. JavaScript
36. When your friend is using a website that offers a variety of Internet services from a single convenient
location, what type of website is she using?
a. informational
b. content aggregator
c. portal
d. wiki
37. With which of the following can users transfer items to and from other computer on the Internet?
a. FTP
b. VoIP
c. IM
d. HTML
38. Which of the following is NOT true about storage media and devices?
a. In cloud storage, the actual storage media used is transparent to the user.
b. A storage medium with a capacity of 750 GB can hold approximately 750 billion bytes.
c. Storage media also is called secondary storage.
d. Writing is the process of transferring items from storage media to memory.
EXAM ON INFORMATION TECHNOLOGY
39. You are using a website to check the ticket availability for your flight to Denmark. To what category
does this website belong?
40. Your smartphone allows you to take and store photos, and play and view your digital media. What is
this overlap of technologies called?
41. You are looking to implement a high-speed network with the sole purpose of providing storage to
other attached servers. Which of the following will you implement?
a. SAN
b. EIDE
c. eSATA
d. SCSI
42. ___ is a generic term that refers to any type of malicious software.
a. Spyware
b. Spamware
c. Malware
d. Badware
a. Web address
b. client DNS
c. push-pull mechanism
d. Hypertext Transfer Protocol (HTTP)
44. ____ is a type of scam that uses spoofed domain names to obtain personal information for use in
fraudulent activities.
a. Fishing
b. Pharming
c. Framing
d. Farming
45. Rodney owns a computer that he uses to work, keep in touch with friends and family, watch movies,
listen to music, and use the Internet.
If Rodney wants to be able to record, erase, and overwrite the files on a CD, he should get a ____.
EXAM ON INFORMATION TECHNOLOGY
a. CD-R
b. CD-HD
c. CD-RW
d. CD-BD
46. You have a new application that is taking full advantage of the features of your smartphone,
including the touch
screen and an embedded GPS receiver. What kind of application is this?
a. desktop app
b. mobile app
c. tablet app
d. web app
47. You have a new web app and the host for it is going to provide storage for your data on their server.
What is this called?
a. mobile backup
b. RSS
c. cloud storage
d. syndication
48. ___ is an online news tool designed for facilitating the delivery of news articles, podcasts, and other
content regularly published to a Web site.
a. RSS
b. Video-on-demand
c. VoIP
d. Blog
49. How do you determine which type of computer — tablet, laptop, or desktop — is best?
50. You are looking for a term that can be used to refer collectively to hard disks and SSDs inside a
computer. Which of the following can you use?
1. If a dog is identified by scanning the shoulder or neck of the animal, what provides the information
about the dog?
a. an animal ID processor
b. a microchip
c. an ALU
d. a tattooed ID number identified by the scanning device
2. One factor affecting digital camera quality is the number of pixels, measured in ____, used to store
the data for each image.
a. terapixels
b. megapixels
c. gigapixels
d. kilopixels
3. Which of the following is an alternative to a password you can use on your new mobile device?
a. biophasic recognition
b. swiping areas of the screen in a specified order
c. firewalls
d. keycodes
a. continuous availability
b. security
c. sharing the connection
d. connection speed
5. ____ refers to identifying the browser used by each visitor, typically via JavaScript code.
a. Browser mapping
b. Visitor identification
c. Personalization
d. Browser sniffing
a. byte
b. pixel
c. kilobit
d. binary
7. The most common flat-panel technologies include liquid crystal display (LCD), various types of light
emitting diode (LED), and ____.
a. gas plasma
EXAM ON INFORMATION TECHNOLOGY
b. HD-integrated
c. DVR
d. HDTV
a. Vista
b. XP
c. 7
d. Leopard
9. When your sister goes to work, what scientific discipline is used in the design of her workplace to
incorporate comfort, efficiency, and safety for her?
Select one:
a. factoronomics
b. ergonomics
c. form technics
d. human entomology
10. What is the approximate distance most Bluetooth devices can be from each other to communicate,
without using additional equipment?
a. 80 feet
b. 100 feet
c. 8 feet
d. 33 feet
11. Which of the following gestures would you use if you want to zoom in on your new tablet to see
more detail on a map,for example?
a. tap
b. pinch
c. stretch
d. press and hold
12. Which of the following mouse operations would you use if you want to draw a picture?
a. double-click
b. point
c. drag
d. click
13. ____ refers to the ability of an operating system to work with more than one program at one time.
a. Multitasking c. Polyprogramming
b. Multiprogramming d. Multidimensional
EXAM ON INFORMATION TECHNOLOGY
14. Sarah is a very active real estate agent. She is looking to purchase a new computer and software so
she can keep track of her client’s accounts, access the Internet from anywhere in the city, and touch-up
photos of real estate properties.
What kind of computer would most likely fit Sarah’s needs?
a. docking station
b. embedded
c. notebook
d. midrange server
15. ____ transmissions are used with cell phones and are sent and received via cellular (cell) towers.
a. Cellular radio
b. Satellite radio
c. Wi-Fi radio
d. PM radio
a. where instructions are stored while waiting for a device to become idle
b. data that is not stored when the computer is turned off
c. data stored in the cloud
d. a portion of the hard disk designated to function as additional RAM
17. GIF images are always rectangular, but can use a(n) ____ background color to make the images
appear to be nonrectangular.
a. all color
b. generic
c. neutral
d. transparent
18. You want to remove unnecessary files from your computer. What do you use?
Select one:
a. PC Maintenance
b. File Compression
c. Backup and Restore
d. Disk Cleanup
19. You want to interact with a touch screen. Which of the following do you use?
a. apps
b. gestures
c. servlets
d. telemetry
EXAM ON INFORMATION TECHNOLOGY
21. Display devices can be ____ displays, in which each pixel can only be one of two colors, such as black
or white.
a. bichrome
b. 1D
c. monochrome
d. flat color
23. Some Web-based encrypted e-mail systems—such as the popular free ____ service—require both
the sender and recipient to have accounts through that system.
a. CryptMail
b. PrivateMail
c. QuietMail
d. HushMail
24. ____ refers to the process of planning what your Web site will look like and how it will work.
25. Which of the following contains data about each file in the database and each field in those files?
a. DBA
b. data dictionary
c. DBMS
d. data administrator
26. ____ software consists of the operating system and utility programs that control a computer system
and allow you to use your computer.
a. Application
EXAM ON INFORMATION TECHNOLOGY
b. System
c. Front-end
d. Background
27. Your smartphone, digital camera, and printer are all part of a network in your workspace. What type
of network is likely in use?
Select one:
a. LAN
b. VAN
c. MAN
d. PAN
29. . There are four basic categories of software: commercial software, shareware, freeware, and ____.
a. licensed software
b. advertising software
c. public domain software
d. publish software
30. Which of the following gestures would you use if you want to activate a link on your new tablet?
a. tap
b. stretch
c. pinch
d. press and hold
Feedback
Your answer is incorrect.
The correct answer is: tap
30. Your company has elected to offload all storage management to an outside organization. What is the
term for this?
a. outsourcing
b. NAS
c. RAID
d. fiber channeling
EXAM ON INFORMATION TECHNOLOGY
33. A standard that is designed to connect peripheral devices, similar to Bluetooth, but that transfers
data more quickly is ____.
a. wireless USB
b. WiMAX
c. Mobile-Fi
d. xMax
a. a 32-engine car
b. a 32-foot wide warehouse
c. all of the above
d. a 32-lane highway
a. The police use a virus and other measures to take down a network of computer criminals.
b. Antivirus software disables a virus and protects the computer or network from unauthorized access.
c. A zombie army is used to attack computers or computer networks.
d. An unsuspecting computer is used to send an influx of confusing data messages or useless network
traffic.
36. You compose a new song and you now have exclusive rights to sell your song. Of which of the
following is this an example?
a. trademarking
b. private domain
c. intellectual publication
d. copyright
38. Windows, Mac OS, and which other operating system constitute three desktop operating systems?
a. DOS
b. Linux
c. Amazon
d. Internet Explorer
40. How is an operating system that runs on computers provided by a variety of manufacturers
classified?
a. device-independent
b. generic
c. multiprocessing
d. proprietary software
41. Lisa is a student who regularly uses the computers at her local Internet café to listen to music, talk to
her friends and family through the Internet, and play computer games.
The Internet café has recently enacted a new policy that says that all users must use the ____ attached
to their computers when carrying out activities on the computer that will provide sound, so as to not
disturb the other users.
42. ____ occurs when someone obtains enough information about a person to be able to masquerade
as that person for a variety of activities—usually to buy products or services in that person’s name.
43. A(n) ____ is a collection of an individual’s work accessible through a Web site.
a. e-portfolio c. e-diary
b. wiki d. blog
45. Which of the following is the least likely motive for a DDoS?
a. spoofing
b. negative recognition
c. political anger
d. extortion
46. ____ memory allows you to use more memory than is physically available on your computer.
a. Multithreading
b. Buffer
c. Virtual
d. Shared
47. The ____ network consists of 24 Department of Defense satellites that are used for location and
navigation purposes.
48. Anything (such as a program, letter, digital photograph, or song) stored on a storage medium is
referred to as a(n) ____.
a. index
b. label
c. folder
d. file
49. When a computer is running multiple programs concurrently, what is the program that is in the
foreground called?
a. open program
b. main program
c. primary program
d. active program
50. What can you use if the computer cannot start from its boot disk?
a. backup media
b. configuration media
c. recovery media
d. system media
EXAM ON INFORMATION TECHNOLOGY
1.Jack has a computer at home that he uses to access the Internet, store and edit personal photos, and
create and edit documents. Recently, he has come to realize that in order to keep the computer
performing at its best, he needs to carry out regular system maintenance on the computer.
Since Jack has a Windows system, he can right-click a hard drive icon in Windows Explorer, select
Properties, and then select the ____ option on the Tools tab to check that hard drive for errors.
a. Check now
b. Defragment now
c. Disk Defragmenter
d. Windows Disk Cleanup
a. visual learners
b. auditory learners
c. kinesthetic learners
d. manual learners
3. What type of circuit board is used to convert computer output into a video signal that displays an
image on a monitor?
a. capture card
b. audiovisual card
c. graphics card
d. image board
4. You are a technology expert and you have been asked to predict which technology will become the
Internet standard for data transmission, replacing T3 lines. Which of the following are you most likely to
predict?
a. ATM
b. ISDN
c. DSL
d. FTTP
6. The first basic step in the development process of a multimedia Web site is ____.
7. LCD monitors and LCD screens sometimes use a new type of technology to produce color, which
produces a brighter display that is also easier to read. What is this new technology called?
a. OLED
b. OLCD
c. TNT
d. TFT
8. One of the most obvious initial changes in Windows Vista is the ____ interface.
a. Leopard
b. Aero
c. Android
d. Symbian
9. You run a large network in which it is important to keep a duplicate of the central devices in case the
primary one fails. What category of network topology does this network use?
Select one:
a. bus network
b. core network
c. star network
d. ring network
10. Which storage term used to measure capacity is approximately a billion bytes?
a. gigabyte
b. terabyte
c. megabyte
d. kilobyte
11. Which of the following networks had these two goals: a) allowing scientists to work together on
scientific projects;
and, b) functioning even if part of the network was destroyed by a nuclear attack?
a. IBMNet
b. ARPANET
c. NSFnet
d. W3C
12. Which of the following are criteria for evaluating a website’s content?
a. Wi-Fi
b. UWB
c. Bluetooth
d. WiMAX
14. Which of the following storage devices typically has the fastest transfer rate?
a. memory card
b. optical disc
c. RAM
d. hard disk
15. What term is used to describe the time it takes a signal to travel from one location to another on a
network?
a. latency
b. transmission performance
c. access time
d. bandwidth
16. Which of the following statements best describes the Ethernet network standard?
a. describes rules for dividing messages into small pieces, called packets
b. no central computer or device on the network should control when data can be transmitted
c. computers on a network cannot communicate unless they share the same form of translation
d. computers and devices on the network share or pass a special signal in a unidirectional manner and in
a preset order
a. HTTP identifier
b. website protocol initiator
c. domain name
d. prolog name
18. You have a camera with a 16 MP resolution. How many pixels are represented by that resolution?
a. 16,000
b. 16 billion
c. 16 million
d. 16
19. Which of the following statements is not true about user interfaces?
c. A user interface instructs the computer how to display information on the screen.
d. A user interface controls how you enter data and instructions.
21. ____ software, such as that shown in the accompanying figure, can control which devices can be
connected to an employee’s computer.
a. Professional firewall
b. Network quarantine
c. Data-leakage prevention
d. Device authentication
22. Some e-commerce Web sites utilize ____ to display environments or show what products (such as a
car or a home) look like in the real world.
a. status notification
b. virtual reality
c. shopping carts
d. stock information
23. When a search of the web is conducted based on a search query, which of the following items might
be located?
a. 802.11n
b. 802.11g
c. 802.11x
d. 802.11a
Feedback
25. When a person buys something from an app store, the cost of the item is charged to a credit card
whose number often
is known by the app store. On what type of device is the credit card number kept by the app store?
a. Input
b. Memory
c. Communications
d. Storage
26. You have a new e-book reader and you are expecting to be away on a long hike with it. How many
hours of reading can you get from it before needing to recharge it?
a. 100
b. 75
c. 125
d. 150
27. Your desktop houses its system unit in a frame made of metal. What is the term for this frame?
a. tower
b. bundle
c. server
d. CPU
29. Increasingly, USB security keys, also called USB security ____—USB flash drives that are inserted into
a computer to grant access to a network, to supply Web site usernames and passwords, or to provide
other security features—are being used.
a. passes
b. tokens
c. botherders
d. botnets
EXAM ON INFORMATION TECHNOLOGY
30. ____ are sets of tools that allow hackers to access a system.
a. Hackkits
b. Crimekits
c. Toolkits
d. Rootkits
31. ____ refers to the amount of data that can be transferred (such as over a certain type of networking
medium) in a given time period.
a. Modulation
b. Bandwidth
c. Throughband
d. Bluetooth
32. As shown in the accompanying figure, the computer is used extensively for access control at many
organizations, such as ____ that allow individuals to enter the office building, punch in or out of work, or
access the company network by providing the proper credentials or being authenticated via a fingerprint
or hand scan.
a. bar codes
b. virtual reality glasses
c. collaboration systems
d. authentication systems
33. Phishing schemes may use a technique called ____, which is setting up spoofed Web sites with
addresses slightly different from legitimate sites.
a. spamming
b. DoS attacks
c. identity theft
d. typosquatting
34. Which of the following is a result of calculations on your semester grade report?
a. term
b. course sections
c. grade point average
d. name
EXAM ON INFORMATION TECHNOLOGY
35. A computer technician told your friend he needed a circuit board that provides a connection to a
peripheral device for use with his computer. What category of circuit board should your friend
purchase?
a. adapter card
b. memory card
c. expansion board
d. external card
36. ____ tend to be more readable for large quantities of text, and so they are traditionally used for this
purpose.
a. Serif typefaces
b. Dom Casual typefaces
c. Sans serif typefaces
d. Arial typefaces
37. You are an expert in devising product activation schemes for software publishers. Which of the
following is not one of the techniques you have used in the past?
38. Which of the following offers an alternative to infrared communications with high bandwidth
transmissions?
a. Wi-Fi
b. Bluetooth
c. IrDA
d. cellular radio
39. A storage medium is inserted into the appropriate ____ to be read from or written to.
a. bay
b. storage processor
c. storage device
d. board
40. Images created using Windows Paint and similar painting programs are usually saved in the ____
format.
a. BMP
b. TIFF
c. JPEG
d. GIF
Feedback
EXAM ON INFORMATION TECHNOLOGY
41. What is another term for servers that control access to the hardware, software, and other network
resources?
a. host computers
b. receiver computers
c. client computers
d. node computers
42. Today’s fast computers and ____ Internet connections make Web-based multimedia very feasible.
a. microwave
b. broadband
c. dial-up
d. ISDN
43. ____ are unique numeric or text-based addresses used to identify resources accessible through the
Internet, such as computers, Web pages, and people.
a. Computer addresses
b. Internet addresses
c. Machine IDs
d. Domain IDs
44. For designing the layout of a Web page, ____ are commonly used when designing animated
components.
a. flowcharts
b. storyboards
c. plots
d. page layouts
45. If you are looking to use a Bluetooth device and do not want to extend its range with additional
equipment, which of the following is the approximate distance you can expect between your device and
the device with which it is transmitting data?
a. 33
b. 44
c. 13
d. 3
47. Which of the following does a new federal laboratory use in its high security areas?
48. The elements shown in the accompanying figure are ____, which are used to organize related
documents folder.
a. drives
b. files
c. folders
d. clipboards
49. When a markup language is used, markup ____ are inserted around the Web page content to
identify where elements are to be displayed and how they should look when displayed.
a. identifiers
b. boxes
c. divisions
d. tags
50. One online security problem is ____, in which someone else uses your identity, typically to purchase
goods or services.
a. identity theft
b. identity duplication
c. phishing
d. domain theft
EXAM ON INFORMATION TECHNOLOGY
1. There are independent Web sites (such as the ____ Web site) that report on the validity of current
online rumors and stories.
a. Phisher
b. Identifier
c. Spammer
d. Snopes
2. Technically, to be called a ____, a device must convert digital signals (such as those used by a
computer) to modulated analog signals (such as those used by conventional telephone lines) and vice
versa.
Select one:
a. switch
b. hub
c. modem
d. router
a. It uniquely identifies the location of each computer or device connected to the Internet.
b. It specifies whether a computer is using a broadband network or a direct-dial network.
c. It differentiates between a server computer and a client computer and contains codes to identify
whether the computer can send data or receive data.
d. It contains the protocol schema used to identify whether the computer is on a wired or wireless
network.
4. Complex DBMSs maintain a listing of activities that modify the contents of a database. What is this
listing called?
a. index
b. recovery disk
c. backup
d. log
a. A node on a network must have an individual ID code that can communicate with other ready devices.
b. Two connected network devices use infrared light to create a direct frequency.
c. The network uses radio signals to communicate with a tag placed in or attached to an object,
animal, or person.
d. The network uses reference devices instead of actual devices to speed up the transmission process.
7. A network adapter, also called a ____ when it is in the form of an expansion card, is used to connect a
computer to a network.
a. USB
b. powerline card
c. network interface card (NIC)
d. data communications card (DCC)
a. cover of a book
b. pop-up window
c. credits of a movie
d. highway billboard
10. In order for navigational images or other images to be understandable to visitors using assistive
technology systems, the images must be identified with a(n) ____ description.
a. alternative text
b. accessible text
c. assistive
d. Braille text
a. worksheet
b. cell
c. database
d. workbook
12. When storage devices write data, instructions, and information on storage media, they are creating
output. What best describes the process of writing data?
13. Green computing involves reducing electricity consumed and environmental waste generated when
using a computer.
14. You are looking for a term that can be used to refer globally to external hard disks and external SSDs.
Which of the following can you use?
15. Janet is studying operating systems as part of her Understanding Computers 101 class. After learning
about the different types of operating systems, she realizes that she uses a number of them in her daily
life. Janet has an Apple computer at home. The operating system of that computer is ____.
a. Mac OS
b. Windows Vista
c. Windows Embedded
d. Solaris
16. ____ occurs whenever an individual gains access to a computer, network, file, or other resource
without permission.
a. Spoofing
b. Unauthorized access
c. Phishing
d. Vandalizing
17. In ____ transmission, data is sent at the same time as other related data to support certain types of
real-time applications that require the different types of data to be delivered at the proper speed for
that application.
a. endrosynchronous
b. asynchronous
c. isochronous
d. synchronous
a. Gingerbread
b. Blackberry
EXAM ON INFORMATION TECHNOLOGY
19. Bryan has just started an internship in which he uses a database frequently. The database contains
information about the company’s employees. Bryan’s supervisor senses that he is anxious about using
the database and drops by to give him a short tutorial.
The supervisor explains that each employee’s information forms a separate ____.
a. record
b. table
c. file
d. field
20. What is a combination of one or more related characters or bytes and is the smallest unit of data a
user accesses?
a. ID
b. byte
c. data
d. field
21. You are using a tool on your computer to organize a variety of files in folders. What is the term for
this kind of tool?
a. search tool
b. image viewer
c. file manager
d. defragmenter
a. laser
b. ink-jet
c. thermal
d. dot-matrix
EXAM ON INFORMATION TECHNOLOGY
23. What is the term for using a set of conditions to measure the performance of hardware in your
network?
a. mile marker
b. benchmark
c. high water mark
d. milestone
24. ____ is the proprietary operating system for computers made by Apple Corporation.
a. Linux
b. Mac OS
c. Unix
d. Solaris
25. Which of the following statements is NOT true about smart cards?
a. uses long-distance digital telephone lines to carry multiple signals over a single line; only medium to
large companies can afford them
b. transmits at fast speeds on existing standard copper telephone wiring; popular for small business or
home user
c. uses fiber-optic cable to provide extremely high-speed Internet access to a user’s physical, permanent
location
d. a service that carries voice, data, video, and multimedia at a high speed; used by telephone networks
and the Internet
27. Which component allows processors to perform at faster rates than those processors that do not
have this component?
28. Anthony is passionate about politics and enjoys sharing and discussing his views with others over the
Internet. Every day, Anthony makes a new post to his personal ____, which is a Web page that displays
entries in chronological order.
a. blog c. portal
b. RSS d. wiki
EXAM ON INFORMATION TECHNOLOGY
29. You are going to purchase a mass-produced computer from your local computer store. Which of the
following is likely a component you can customize?
a. processor type
b. video card
c. all of the above
d. sound card
30. A computer ____ is a software program that is installed without the permission or knowledge of the
computer user, that is designed to alter the way a computer operates, and that can replicate itself to
infect any new media it has access to.
a. phish
b. link
c. virus
d. bot
31. Plasma monitors offer large screen sizes and rich colors. Which of the following statements describe
how plasma monitors work?
a. Radiation is used to cause reflections of color that are then displayed on the screen.
b. Electricity is funneled through glass tubes, which correspond to bits and bytes and enable a bright
color display.
c. Voltage is applied to a layer of gas between two glass plates, which releases a UV light that causes
the pixels on the screen to glow.
d. A pool of plasma appears behind the monitor screen and uses heat and light to turn the pixel display
on an off.
32. In reference to computer communications, what does the term noise mean?
33. Which RAID level technique splits data, instructions, and information across multiple disks in the
array?
a. archiving
b. differentiation
c. striping
d. mirroring
EXAM ON INFORMATION TECHNOLOGY
a. It converts data to information or converts information to data, depending on the status of the
information processing cycle.
b. Its electronic components process data using instructions.
c. It is an electronic device that processes data as specified by the computer user when the user enters
instructions.
d. It creates data from information that it gathers using software that directs the processing in the
computer.
35. A global positioning system (GPS) consists of ____ and a group of GPS satellites.
a. GPS receivers
b. GPS amplifiers
c. GPS transmitters
d. Wi-Fi receivers
a. C-Pen scanner
b. handheld scanner
c. sheetfed scanner
d. flatbed scanner
37. What is the term for the area of the hard disk used for virtual memory?
a. a swap file
b. a partition
c. a page
d. the cloud
38. Which of the following terms is used to describe a program that copies itself repeatedly, using up
resources and possibly shutting down the computer or network?
a. a worm
b. a virus
c. a Trojan horse
d. a rootkit
39. What are the roles of the control unit and the ALU?
40. Which of the following gestures would you use if you want to zoom out on your new tablet and see
less detail on a map, for example?
a. stretch
b. swipe
c. pinch
d. slide
41. You recently lost some files that were important to you so you have resolved to back up the contents
of your hard disk on a series of rewritable DVDs. What kind of software will you use to do this?
a. disc burning
b. safekeeping
c. CBT
d. media player
42. Sarah is a very active real estate agent. She is looking to purchase a new computer and software so
she can keep track of her client’s accounts, access the Internet from anywhere in the city, and touch-up
photos of real estate properties. Sarah has hired a programmer to create a Web page for her business.
What type of programming language will the programmer use?
a. XHTML
b. BASIC
c. COBAL
d. Python
a. retail
b. automobile manufacturing
c. banking
d. air transportation
45. ____ access systems use physical objects for identification purposes and they are frequently used to
control access to facilities and computer systems.
a. Biometric
b. Possessed object
c. Touch object
d. Two-factor
EXAM ON INFORMATION TECHNOLOGY
46. A difference between CRT monitors and flat-panel displays is that most flat-panel displays use digital
signals to display images, while CRT monitors use ____.
a. radio signals
b. analog signals
c. laser signals
d. infrared signals
47. The Windows ____ shown in the figure above contains the following objects: Windows, Icons,
Menus, Toolbars, Taskbar, Hyperlinks, Sizing buttons, and a Dialog box.
a. command
b. toolbox
c. general menu
d. desktop
48. You have created a specific named location on your hard disk to hold some songs you have
purchased. What is the term for this location?
a. index
b. file manager
c. folder
d. safe spot
49. You have a collection of all the photos, videos, and audio you have captured from your new nephew.
What is the name for this collection?
a. digital archive
b. online glossary
c. media library
d. cloud archive
50. ____ are businesses or other organizations that provide Internet access to others, typically for a fee.
1.____ satellites travel at a speed and direction that keeps pace with the earth’s rotation, so they
appear (from earth) to remain stationary over a given spot.
a. Isochronous
b. Full-duplex transmission
c. Geosynchronous
d. Microwave
a. Microsoft Paint
b. IBM’s Storyboard
c. Macromedia’s Dreamweaver
d. Adobe’s Acrobat
a. With a single-user license agreement, users are permitted to make one copy of the software as a
backup.
b. Software piracy is the unauthorized and illegal duplication of copyrighted software.
c. Software theft includes disabling or removing programs from company computers.
d. A keygen distributes user names and passwords to those who register their legally purchased
copies of a software program.
4. Brenda is a college student who enjoys downloading music, movies, and television shows from the
Internet. She also uses the Internet for other entertainment, such as sports.
Brenda also orders movies and television through the Internet via a(n) ____ provider, which allows users
to download video for a small fee.
a. blog
b. RSS
c. VoIP
d. VOD
5. Bryan has just started an internship in which he uses a database frequently. The database contains
information about the company’s employees. Bryan’s supervisor senses that he is anxious about using
the database and drops by to give him a short tutorial.
Bryan is told by the supervisor that to create a database, he first needs to create the database ____
itself, and then he can create the necessary database objects.
a. table
b. field
c. file
d. record
EXAM ON INFORMATION TECHNOLOGY
a. the process of entering registration information so that users of the software will receive newsletters
and other marketing materials regarding purchased software
b. the method used by some software companies to guarantee that software purchased on the web will
work on the computer on which the software was downloaded
c. a technique to ensure software is not installed on more computers than legally licensed
d. the process of entering registration information so that users of the software will receive newsletters
and other marketing materials regarding purchased software
7. With bitmapped images, the color of each ____ is represented by bits; the more bits used, the better
the image quality.
a. pixel
b. map
c. byte
d. vector
Feedback
8. You are looking for a way to choose specific files to back up, regardless of whether or not the files
have changed since the last incremental backup. Which of the following will you use?
a. full backup
b. archival backup
c. selective backup
d. differential backup
9. Your Bluetooth headset is waiting for another Bluetooth device to locate its signal. What is this mode
known as?
a. listening mode
b. discoverable mode
c. intelligent mode
d. passkey mode
11. CD-ROM discs and DVD-ROM discs are ____ optical discs and come prerecorded with commercial
products.
EXAM ON INFORMATION TECHNOLOGY
a. recordable
b. write-only
c. rewritable
d. read-only
12. The green color of the Address bar in the accompanying figure indicates that the site is using a valid
____ SSL certificate.
Select one:
a. SQL
b. HTTPS
c. EV
d. SK
a. large-format printer
b. dot-matrix printer
c. thermal printer
d. plotter
14. What can you use to identify a problem with resources so that you can try to resolve any problems?
a. a system check
b. a performance monitor
c. a utility manager
d. an efficiency test
15. What term refers to the amount of time it takes a storage device to locate an item on a storage
medium?
a. capacity time
b. recall time
c. transfer time
d. access time
a. one-billionth c. one-thousandth
b. one-millionth d. one-tenth
EXAM ON INFORMATION TECHNOLOGY
17. ____ is charged with such responsibilities as IP address allocation and domain name management.
18. ____ can be used, copied, modified, and distributed to others without restrictions.
19. A ____ is a collection of hardware and other devices that are connected together so that users can
share hardware, software, and data, as well as electronically communicate with each other.
a. database
b. computer network
c. computer bank
d. data bank
21. Repeated threats or other harassment carried out online between adults is referred to as ____.
a. phishing
b. computer sabotage
c. cyberterrorism
d. cyberstalking
22. A(n) ____ is a flat, touch-sensitive device used in conjunction with a digital pen.
Select one:
a. touch screen
b. graphics tablet
c. image tablet
d. graphics table
23. What job title is used for the person who uses the server operating system to add and remove users,
install software, and administer network security?
a. system engineer
EXAM ON INFORMATION TECHNOLOGY
b. network administrator
c. resource manager
d. server operator
24. Robert is a medical writer for a pharmaceutical company. The company allows Robert to work from
home.
Robert’s job is a(n) ____ job.
a. e-working
b. telecommuting
c. videoconferencing
d. telemarketing
25. Your server room has ample floor space. Which of the following are you most likely to choose as a
result?
a. bay server
b. blade server
c. tower server
d. rack server
26. If students in your class are taking a standardized test using a form with rectangles that they fill in
with a pencil, what technology will be used to grade the test?
a. OMR
b. MICR
c. OCR
d. BCR
27. The major carriers of Internet network traffic are known collectively by what term?
28. Gabrielle is the network administrator at a medium-sized company. One of her responsibilities is to
purchase network devices to maintain the company network.
Gabrielle realizes that to improve network performance, she needs to buy and install a ____, which
identifies the device on the network for which the data is intended and sends the data to that device
only.
a. node
b. bus
c. switch
d. bridge
29. Which of the following terms would you be looking for if you want to make a purchase of a variety of
EXAM ON INFORMATION TECHNOLOGY
software at the same time that you purchase your new desktop?
a. component package
b. gathering
c. bundle
d. cluster
a. Processing
b. Storage
c. Output
d. Input
31. Which term does a user of a relational database use to refer to a file?
a. column
b. relation
c. row
d. table
32. ___ are small components typically made out of aluminum with fins that help to dissipate heat.
a. Heat buses
b. Heat sinks
c. ACs
d. Fans
33. Which of the following statements is not true about hard drives?
a. The system unit on most desktops and laptops contains at least one hard disk.
b. The alignment of metal particles represents either a 0 bit or a 1 bit.
c. A hard disk that is mounted inside the system unit is sometimes called a permadisk.
d. A hard drive contains one or more inflexible, circular platters that use magnetic particles to store
data.
34. In which of the following databases is the physical location of the server on which it is stored is
transparent and often unknown, to the user?
a. distributed
b. relational
c. market
d. OODB
35. What is the term for a feature that has a graphical user interface to assist users with retrieving data?
a. QDE c. DBMS
b. QBE d. SQL
EXAM ON INFORMATION TECHNOLOGY
37. A ____, as shown in the accompanying figure, consists of a vertical stack of tracks, with the same
relative track on each disk surface.
a. section
b. cylinder
c. segment
d. sector
38. When application software poses a question to a computer user and the user answers, what term is
used to identify that answer?
39. What kind of file does Adobe Reader allow you to view?
a. FFT
b. PDT
c. DOC
d. PDF
40. ____ tags are similar to HTML tags, but there are stricter rules about how the markup tags are
written.
EXAM ON INFORMATION TECHNOLOGY
a. XML
b. JavaScript
c. XHTML
d. Perl
41. The accompanying figure corresponds to the ____ style for desktop PCs.
lion
a. desktop case
b. sub case
c. all-in-one case
d. tower case
42. As you edit some photos from your summer vacation, you decide to remove a blurry area of one of
your photos. Which tool will you use for this?
a. crop
b. resize
c. contrast
d. compress
43. A(n) ____ is a medium-sized computer used to host programs and data for a small network.
a. Internet server
b. mainframe computer
c. midrange server
d. super server
44. The ____ format is a standard format for Web page images and is used most often with logos,
banners, and other nonphotographic images.
a. GIF
b. TIF
c. MPEG
d. BMP
45. Most search sites use a ____—a software program—in conjunction with a huge database of
information about Web pages to help visitors find Web pages that contain the information they are
seeking.
a. search box
b. search engine
c. search store
d. search toolbox
46. When Mary started college, her parents bought her a new computer that came with minimal
software. She is now looking into purchasing additional software.
EXAM ON INFORMATION TECHNOLOGY
Mary enjoys taking digital photos and would like software that would allow her to perform tasks such as
correct brightness or contrast, eliminate red eye, crop, resize, etc. In order to have this functionality on
her computer, she needs a photo ____ program.
a. embedding
b. editing
c. dramatization
d. formatting
47. Most Web pages today are written in a ____— a coding system used to define the structure, layout,
and general appearance of the content of a Web page.
a. 4G language
b. programming language
c. scripting language
d. markup language
a. Solaris
b. UNIX
c. DOS
d. Linux
49. In addition to their full versions, some commercial software is available as a ____ or trial version.
a. sample
b. friendly version
c. demo
d. complimentary version
50. What program is used to start and shut down a computer or mobile device, provide a user interface,
manage programs and memory, and provide file management, among other functions?
a. a system utility
b. application software
c. a file utility
d. an operating system
EXAM ON INFORMATION TECHNOLOGY
1.Some touch screens recognize when you touch the screen with two fingers or two hands. If you are
looking for a device on which you can do this, what type of touch screen should you search for?
a. phase-touch
b. dual-touch
c. twin-touch
d. multi-touch
a. The user is issuing a command that is stored in the memory of the computer and then is transformed
into input data for use with a program.
b. The user is using an input device to enter input into the memory of the computer.
c. The user is employing an input device (the keyboard) to tell the computer what tasks to perform and
how to perform them.
d. The user is entering information that will be transferred to the CPU for interpretation and then to
storage so that the information will be available when needed.
3. A computer ____ is the amount of data (measured in bits or bytes) that a CPU can manipulate at one
time.
a. word
b. statement
c. unit
d. character
4. In the early 1980s, things began to change. ____ were invented and computer use increased
dramatically.
a. Computers
b. Microcomputers
c. Printers
d. Networks
6. Media that allow random access are sometimes referred to as ____ media.
a. addressable
b. identifiable
c. nonidentifiable
d. optical
EXAM ON INFORMATION TECHNOLOGY
a. It obtains data directly at the location where the transaction or event takes place.
b. Its reliability is higher than any other input device so it is more suited to high security data capture
use scenarios.
c. It collects data rather than computer input.
d. It can collect and store much more data in a shorter period of time than other input devices.
8. Smith Web Design is creating a secure Web site for a local doctor. In addition to providing basic
information about her practice, she wants her patients to be able to log on and access their records,
including images such as X-rays and MRIs.
After patients log on, they should be able to download scanned versions of their X-rays and MRIs. These
images should be provided in the ____ format.
a. BMP
b. GIF
c. TIF
d. JPEG
9. Jess is a musician who has just bought a new computer. Now she has to determine how to connect
this computer to the devices that were connected to her old computer.
To connect her external hard drive where her music files are stored to the computer, Jess needs to use
the ____ port.
a. modem
b. USB
c. network
d. serial
10. One of the most promising types of nonvolatile RAM is magnetic (or more precisely, ____) (MRAM).
a. magnetoselective
b. magnetobalanced
c. magnetocharged
d. magnetoresistive
11. Recent photos you captured are low in quality. What is one of the first things to check?
a. distance
b. lens cap
c. resolution
d. batteries
12. You need to set up a computer to store and deliver email messages for your small business. Which of
the following are you most likely to use?
a. network server
b. mail server
EXAM ON INFORMATION TECHNOLOGY
c. home server
d. file server
13. Which of the following terms is used to describe a program that hides in a computer and allows
someone from a remote location to take full control of the computer?
a. a Trojan horse
b. a worm
c. a rootkit
d. a virus
14. IF YOU RECEIVE AN EMAIL MESSAGE IN ALL CAPITAL LETTERS, WHAT DOES THIS SIGNIFY?
15. The accompanying figure shows the iGoogle ____ Web page.
a. RSS
b. social networking
c. portal
d. podcasting
16. In a 16.8-million-color (called photographic quality or ____) image, three bytes (24 bits) are used to
store the color data for each pixel in the image.
a. full color
b. real color
c. mega color
d. true color
17. When typing text in a word processing program, you should only press ____ after a short line (like a
title), at the end of a paragraph, and to leave a blank line between paragraphs.
EXAM ON INFORMATION TECHNOLOGY
a. Backspace
b. Enter
c. Insert
d. Esc
a. compiling data from multiple computer users in order to make predictions about computer trends
b. creating consumer and personal profiles by tracking website history and electronic purchases
c. gaining unauthorized access or obtaining confidential information by taking advantage of the
trusting nature or naivety of users
d. filtering Internet content to targeted users based on their personal preferences
19. ____ refers to using a PC to combine and manipulate text and images to create attractive documents
that look as if they were created by a professional printer.
a. Desktop publishing
b. Project management software
c. Personal productivity
d. Computer-aided design (CAD)
21.Stacey is the office manager for a small business and is looking for a new printer and scanner for her
office. After doing some research into printers, Stacey decides to buy a(n) ____ printer, since they are
the standard for business documents and are typically faster and have better quality output than other
types of printers.
a. ink-jet
b. digital
c. magnetic
d. laser
22. If your cousin wanted to view information from the World Wide Web, what application software
would you tell her to be sure she has on her computer?
23. What is the smallest unit of data the computer can process?
EXAM ON INFORMATION TECHNOLOGY
a. reg
b. log
c. byte
d. bit
24. Most network cards contain a port that accepts a(n) ____, which looks similar to a telephone
connector but is larger.
a. RJ-12 connector
b. RJ-45 connector
c. RJ-11 connector
d. RJ-14 connector
a. WinZip
b. StuffIt
c. Windows Explorer
d. Disk Cleanup
26. A piece of software you use is privately owned and limited to a specific vendor. What is the term for
this kind of software?
a. locked
b. incompatible
c. proprietary
d. vendor-specific
28. Wireless displays connect to a computer using a wireless networking connection such as Wi-Fi or
____.
a. 3D
b. VGA
c. Bluetooth
d. USB
29. Some personal computer manufacturers provide a hard disk configuration that connects multiple
smaller disks into a single unit that acts like a single large hard disk. What is this grouping called?
a. RPM
b. RAID
c. AXS
d. ACIS
EXAM ON INFORMATION TECHNOLOGY
29. In the example shown in the accompanying figure, ____ is being used to create an animated banner.
a. Adobe Dreamweaver
b. Adobe Fireworks
c. Adobe Contribute
d. Adobe Flash
30. An emerging type of mobile phone is the cellular/satellite ____ phone that can be used with cellular
service when it is available and then switches to satellite service when cellular service is not available.
a. duplex
b. dual-core
c. digital
d. dual-mode
a. Tape is a magnetically coated ribbon of plastic capable of storing large amounts of data and
information at a low cost.
b. A tape cartridge is small, rectangular, plastic housing for tape.
c. A benefit of tape is that it allows for nonsequential access.
d. Business users utilize tape most often for long-term storage and backup.
32. Images are available in many formats, such as TIF, BMP, GIF, JPEG, and ____.
a. MP3
b. MPEG
c. AVI
d. PNG
33. You want to add a new external hard disk to your computer, but you are unable to connect because
you have run out of USB ports. Which of the following can you use instead?
a. peripheral index
EXAM ON INFORMATION TECHNOLOGY
b. ExpressCard module
c. CPU center
d. USB hub
34. The ____, implemented in 2001, grants federal authorities expanded surveillance and intelligence-
gathering powers, such as broadening their ability to obtain the real identity of Internet users and to
intercept Internet communications.
35. In ____ transmission, data can move in both directions at the same time, such as with a telephone.
a. half-simplex
b. full-simplex
c. full-duplex
d. half-duplex
36. Integrated circuits incorporate many transistors and electronic circuits on a single tiny silicon chip,
allowing ____ to be even smaller and more reliable than earlier computers.
a. third-generation computers
b. fourth-generation computers
c. fifth-generation computers
d. second-generation computers
38. A ____ provides a secure private tunnel from the user’s computer through the Internet to another
destination and is most often used to provide remote employees with secure access to a company
network.
39. ____ are the standard for business documents and come in both personal and network styles.
a. Line printers
b. Laser printers
EXAM ON INFORMATION TECHNOLOGY
c. Dot-matrix printers
d. Ink-jet printers
40. Which of the following is a type of backup you can only perform at your large enterprise?
a. continuous
b. differential
c. incremental
d. full
41. To read data, the reference beam projects the hologram containing the requested data onto a ____
that reads the entire data page at one time.
a. detector
b. spacer
c. modulator
d. header
a. storage medium
b. storage device
c. storage processor
d. storage memory
a. printer
b. monitor
c. mouse
d. speaker
45. Which of the following technologies is your new mobile phone payment device most likely to use?
a. WiMax
b. NFC
c. Token ring
d. Bluetooth
46. You want to use the UMB cellular transmission standard on your new mobile phone. Which standard
will you use?
EXAM ON INFORMATION TECHNOLOGY
a. 3G
b. 5G
c. 4G
d. 2G
47. The means by which an operating system or any other program interacts with the user is called the
____.
a. programming interface
b. program front-end
c. user interface
d. user login
48. You want a form of backup that copies all program and data files. Which of the following will you
use?
a. archival backup
b. partial backup
c. selective backup
d. differential backup
49. Which of the following statements is not a safeguard against the failure of hardware?
a. device-tracking apps
b. surge protectors
c. fault-tolerant computers
d. UPS
a. net filtering
b. spam filtering
c. phishing
d. web filtering
EXAM ON INFORMATION TECHNOLOGY
a. plan the website; design the website; create the website; host the website; maintain the website
b. load plug-ins; deploy the website; maintain the website; update the website; upgrade the web server
c. plan the website; design the website; create and deploy the website; update the website; create
usage analytics for further website enhancements
d. plan, analyze, and design the website; plan and purchase servers and server software; create and
deploy the website; test the website for both commercial and consumer use; modify the website based
on analytics developed through the website use
2. Which of the following gestures would you use if you want to display a bar that contains commands
on an edge of the screen of your new tablet?
a. swipe
b. pinch
c. press and hold
d. stretch
3. To manage day-to-day interactions with customers, including phone calls and e-mails, what type of
software would a company use?
4. The ____ orders data and instructions from cache or RAM based on the task at hand.
a. control unit
b. decode unit
c. ALU
d. prefetch unit
5. Which of the following communications technologies does not use broadcast radio signals?
a. Bluetooth
b. UWB
c. IR
d. Wi-Fi
6. You are thinking about no longer using the default browser for your Mac and instead switching to a
new one. Which browser will you no longer be using if you do this?
a. Safari
b. Firefox
EXAM ON INFORMATION TECHNOLOGY
c. Opera
d. Internet Explorer
7. Dean has been using computers for some time now, but he is unfamiliar with a number of utility
programs. In order to better maintain his computer, he decides to ask his coworker Andrea for advice on
basic utility programs. Another thing that Andrea tells Dean is that it is very important for him to ____ all
of his important data on a regular basis to protect against data loss in the case of a problem with the
computer. He can use a(n) ____ utility to do this.
a. compress
b. cleanup
c. backup
d. defragment
a. Graphics art
b. Clip art
c. Drawing art
d. ASCII art
9. Some drive letters, such as the letter ____ typically used with the primary hard drive, are usually
consistent from computer to computer and do not change even if more storage devices are added to a
computer.
a. H
b. A
c. B
d. C
a. Mobile printers are barely wider than the paper on which they print.
b. Mobile printers usually connect to a FireWire port.
c. Mobile printers are battery-powered.
d. Mobile printers can use ink-jet or thermal technology.
12. Lisa is a student who regularly uses the computers at her local Internet café to listen to music, talk to
her friends and family through the Internet, and play computer games.
The Internet café provides ____ on some computers so that users can both listen and talk through the
device during a telephone call made through the computer without disturbing other users.
EXAM ON INFORMATION TECHNOLOGY
a. microphones
b. scanners
c. headsets
d. speakers
13. You are experiencing some problems with your operating system on your desktop and want to repair
some problems with your hard disk. Which of the following will you use?
a. disk defragmenter
b. backup tool
c. file compression tool
d. PC maintenance tool
14. One measurement of the speed of a CPU is the ____, which is rated in megahertz (MHz) or gigahertz
(GHz).
15. In order to safeguard your personal information, which of the following is recommended?
a. Fill out rebates and warranty forms completely to provide the manufacturer with as much information
as possible in case you need to contact them.
b. Use shopping club and buying cards when shopping to remain anonymous.
c. Clear your history file when you are finished browsing.
d. Preprint your telephone number on your personal checks so businesses can reach you quickly if they
determine there is a problem with your purchase.
16. A(n) ____ instruction might look like a meaningless string of 0s and 1s, but it actually represents
specific operations and storage locations.
a. machine language
b. COBOL language
c. programming language
d. ASCII
17. As you edit some photos from your summer vacation, you decide to shrink one of your favorite
photos to produce a wallet size. Which tool will you use for this?
a. resize
b. compress
c. contrast
d. crop
Marked out of 1.00
EXAM ON INFORMATION TECHNOLOGY
18. If someone you know is purchasing word processing software, what features can she expect to find
in the software?
19. An important task that the operating system performs is ____, which keeps track of the files stored
on a computer so that they can be retrieved when needed.
a. file management
b. file listing
c. disk management
d. file recovery
20. Dean has been using computers for some time now, but he is unfamiliar with a number of utility
programs. In order to better maintain his computer, he decides to ask his coworker Andrea for advice on
basic utility programs.Andrea advises Dean to remove unnecessary programs from his computer by
using a(n) ____ utility.
a. cleanup
b. remove
c. uninstall
d. delete
21. Word processing software, spreadsheet software, database software, and presentation software are
examples of what category of computer software?
a. handheld computers
b. range computers
c. mini computers
d. frame computers
a. The magnetic bar codes are converted by a bar code reader into a form that a computer can process.
b. A laser translates the bars on the bar code into digital signals that are stored in RAM.
c. A laser scanner produces light beams that pass through a scanner filter which then translatesthe light
patterns into digital patterns that can be interpreted by the CPU.
EXAM ON INFORMATION TECHNOLOGY
24. Digital still cameras most often use ____ cards for storage.
a. RAM memory
b. laser memory
c. ROM memory
d. flash memory
25. A type of computer usually has thousands of users. Which of the following is most likely to be the
type of computer?
a. supercomputer
b. personal computer
c. game console
d. mobile computer
26. Today’s CPUs are formed using a process called ____ that imprints patterns on semiconductor
materials.
a. vectoring
b. serigraphy
c. imprintment
d. lithography
a. a file
b. software
c. a device
d. information
28. To what does the term, traffic, refer to when used in conjunction with the Internet?
29. Hollerith’s machine was used to process the 1890 U.S. Census data and was able to complete the
task in ____, instead of the decade it usually took to process the data by hand.
30. Which of the following is NOT true about caring for optical discs?
31. Which of the following may need to happen before your Bluetooth headset can communicate with
your smartphone?
33. You need a version of USB technology that will support older USB devices, of which you have many,
as well as newer ones. What word do you want to see in the specs?
a. backward compatible
b. integrated
c. Bluetooth-enabled
d. multifunctional
34. Last night, you experienced a power increase that lasted for less than one thousandth of a second.
What is the term for this?
a. hit
b. juice
c. joule
d. spike
35. What kind of communications device sends and receives data and information to and from a digital
line, such as ISDN and cable?
a. a modem
b. a switch
c. a hub
d. a router
36. What type of device reads the strip of magnetic material on the back of your credit card?
EXAM ON INFORMATION TECHNOLOGY
37. Rodney owns a computer that he uses to work, keep in touch with friends and family, watch movies,
listen to music, and use the Internet. If Rodney wants to record music files onto a CD, he needs to make
sure that his operating system has CD-____ capabilities.
a. burning
b. hybrid
c. mirroring
d. striping
38. With a ____, the user touches the screen with his or her finger to select commands or otherwise
provide input to the computer with which it is being used.
a. graphics tablet
b. touch screen
c. laser screen
d. signature capture device
39. What does each byte in the ASCII coding scheme represent?
a. single character
b. single cluster
c. multiple bits
d. multiple characters
40. Which of the following is not true of the thin client on your desk at your office?
a. word
b. bus
c. cache memory
d. lane
a. download services
b. application service providers (ASPs)
c. Internet service providers (ISPs)
EXAM ON INFORMATION TECHNOLOGY
d. running services
43. ____, the most commonly used type of possessed knowledge, are secret words or character
combinations associated with an individual.
a. Usernames
b. PINs
c. Codes
d. Passwords
44. You have received an email that is directing you to a phony website that looks like the website for
your mortgage company. What kind of message is this?
a. pop-up
b. pharming
c. phishing
d. spam
45. What involves showing users exactly how they will use the new hardware and software in the
system?
a. testing
b. training
c. acceptance
d. converting
46. A program has been placed on your smartphone without your knowledge and it is collecting
personal information about you. What kind of application is this?
a. adware
b. phishing application
c. spyware
d. filter
47. Which of the following gestures would you use if you want to run a new browser app on your new
tablet?
a. pinch
b. press and hold
c. double-tap
d. slide
48. You love to take pictures of your family. What standard do you use to print pictures directly from
your camera?
a. WBA c. USB
b. IBW d. UWB
EXAM ON INFORMATION TECHNOLOGY
49. The ____ takes instructions from the prefetch unit and translates them into a form that the control
unit can understand.
a. ALU
b. internal cache
c. register
d. decode unit
1.Some touch screens recognize when you touch the screen with two fingers or two hands. If you are
looking for a device on which you can do this, what type of touch screen should you search for?
a. phase-touch
b. dual-touch
c. twin-touch
d. multi-touch
a. The user is issuing a command that is stored in the memory of the computer and then is transformed
into input data for use with a program.
b. The user is using an input device to enter input into the memory of the computer.
c. The user is employing an input device (the keyboard) to tell the computer what tasks to perform and
how to perform them.
d. The user is entering information that will be transferred to the CPU for interpretation and then to
storage so that the information will be available when needed.
3. A computer ____ is the amount of data (measured in bits or bytes) that a CPU can manipulate at one
time.
a. word
b. statement
c. unit
d. character
4. In the early 1980s, things began to change. ____ were invented and computer use increased
dramatically.
a. Computers
b. Microcomputers
c. Printers
d. Networks
6. Media that allow random access are sometimes referred to as ____ media.
a. addressable
b. identifiable
c. nonidentifiable
EXAM ON INFORMATION TECHNOLOGY
d. optical
a. It obtains data directly at the location where the transaction or event takes place.
b. Its reliability is higher than any other input device so it is more suited to high security data capture
use scenarios.
c. It collects data rather than computer input.
d. It can collect and store much more data in a shorter period of time than other input devices.
8. Smith Web Design is creating a secure Web site for a local doctor. In addition to providing basic
information about her practice, she wants her patients to be able to log on and access their records,
including images such as X-rays and MRIs.
After patients log on, they should be able to download scanned versions of their X-rays and MRIs. These
images should be provided in the ____ format.
a. BMP
b. GIF
c. TIF
d. JPEG
9. Jess is a musician who has just bought a new computer. Now she has to determine how to connect
this computer to the devices that were connected to her old computer.
To connect her external hard drive where her music files are stored to the computer, Jess needs to use
the ____ port.
a. modem
b. USB
c. network
d. serial
10. One of the most promising types of nonvolatile RAM is magnetic (or more precisely, ____) (MRAM).
a. magnetoselective
b. magnetobalanced
c. magnetocharged
d. magnetoresistive
11. Recent photos you captured are low in quality. What is one of the first things to check?
a. distance
b. lens cap
c. resolution
d. batteries
12. You need to set up a computer to store and deliver email messages for your small business. Which of
the following are you most likely to use?
EXAM ON INFORMATION TECHNOLOGY
a. network server
b. mail server
c. home server
d. file server
13. Which of the following terms is used to describe a program that hides in a computer and allows
someone from a remote location to take full control of the computer?
a. a Trojan horse
b. a worm
c. a rootkit
d. a virus
14. IF YOU RECEIVE AN EMAIL MESSAGE IN ALL CAPITAL LETTERS, WHAT DOES THIS SIGNIFY?
15. The accompanying figure shows the iGoogle ____ Web page.
a. RSS
b. social networking
c. portal
d. podcasting
16. In a 16.8-million-color (called photographic quality or ____) image, three bytes (24 bits) are used to
store the color data for each pixel in the image.
a. full color
b. real color
c. mega color
d. true color
17. When typing text in a word processing program, you should only press ____ after a short line (like a
title), at the end of a paragraph, and to leave a blank line between paragraphs.
a. Backspace
b. Enter
c. Insert
d. Esc
a. compiling data from multiple computer users in order to make predictions about computer trends
b. creating consumer and personal profiles by tracking website history and electronic purchases
EXAM ON INFORMATION TECHNOLOGY
19. ____ refers to using a PC to combine and manipulate text and images to create attractive documents
that look as if they were created by a professional printer.
a. Desktop publishing
b. Project management software
c. Personal productivity
d. Computer-aided design (CAD)
21. Stacey is the office manager for a small business and is looking for a new printer and scanner for her
office. After doing some research into printers, Stacey decides to buy a(n) ____ printer, since they are
the standard for business documents and are typically faster and have better quality output than other
types of printers.
a. ink-jet
b. digital
c. magnetic
d. laser
22. If your cousin wanted to view information from the World Wide Web, what application software
would you tell her to be sure she has on her computer?
23. What is the smallest unit of data the computer can process?
a. reg
b. log
c. byte
d. bit
24. Most network cards contain a port that accepts a(n) ____, which looks similar to a telephone
connector but is larger.
a. RJ-12 connector
EXAM ON INFORMATION TECHNOLOGY
b. RJ-45 connector
c. RJ-11 connector
d. RJ-14 connector
a. WinZip
b. StuffIt
c. Windows Explorer
d. Disk Cleanup
26. A piece of software you use is privately owned and limited to a specific vendor. What is the term for
this kind of software?
a. locked
b. incompatible
c. proprietary
d. vendor-specific
27. Wireless displays connect to a computer using a wireless networking connection such as Wi-Fi or
____.
a. 3D
b. VGA
c. Bluetooth
d. USB
28. Some personal computer manufacturers provide a hard disk configuration that connects multiple
smaller disks into a single unit that acts like a single large hard disk. What is this grouping called?
a. RPM
b. RAID
c. AXS
d. ACIS
29. In the example shown in the accompanying figure, ____ is being used to create an animated banner.
a. Adobe Dreamweaver
b. Adobe Fireworks
c. Adobe Contribute
d. Adobe Flash
30. An emerging type of mobile phone is the cellular/satellite ____ phone that can be used with cellular
service when it is available and then switches to satellite service when cellular service is not available.
a. duplex
b. dual-core
c. digital
EXAM ON INFORMATION TECHNOLOGY
d. dual-mode
a. Tape is a magnetically coated ribbon of plastic capable of storing large amounts of data and
information at a low cost.
b. A tape cartridge is small, rectangular, plastic housing for tape.
c. A benefit of tape is that it allows for nonsequential access.
d. Business users utilize tape most often for long-term storage and backup.
32. Images are available in many formats, such as TIF, BMP, GIF, JPEG, and ____.
a. MP3
b. MPEG
c. AVI
d. PNG
33. You want to add a new external hard disk to your computer, but you are unable to connect because
you have run out of USB ports. Which of the following can you use instead?
a. peripheral index
b. ExpressCard module
c. CPU center
d. USB hub
34. The ____, implemented in 2001, grants federal authorities expanded surveillance and intelligence-
gathering powers, such as broadening their ability to obtain the real identity of Internet users and to
intercept Internet communications.
35. In ____ transmission, data can move in both directions at the same time, such as with a telephone.
Select one:
a. half-simplex
b. full-simplex
c. full-duplex
d. half-duplex
36. Integrated circuits incorporate many transistors and electronic circuits on a single tiny silicon chip,
allowing ____ to be even smaller and more reliable than earlier computers.
a. third-generation computers
b. fourth-generation computers
c. fifth-generation computers
EXAM ON INFORMATION TECHNOLOGY
d. second-generation computers
38. A ____ provides a secure private tunnel from the user’s computer through the Internet to another
destination and is most often used to provide remote employees with secure access to a company
network.
39. ____ are the standard for business documents and come in both personal and network styles.
a. Line printers
b. Laser printers
c. Dot-matrix printers
d. Ink-jet printers
40. Which of the following is a type of backup you can only perform at your large enterprise?
a. continuous
b. differential
c. incremental
d. full
41. To read data, the reference beam projects the hologram containing the requested data onto a ____
that reads the entire data page at one time.
a. detector
b. spacer
c. modulator
d. header
a. storage medium
b. storage device
c. storage processor
d. storage memory
a. printer
b. monitor
c. mouse
d. speaker
45. Which of the following technologies is your new mobile phone payment device most likely to use?
a. WiMax
b. NFC
c. Token ring
d. Bluetooth
46. You want to use the UMB cellular transmission standard on your new mobile phone. Which standard
will you use?
a. 3G c. 4G
b. 5G d. 2G
47. The means by which an operating system or any other program interacts with the user is called the
____.
48. You want a form of backup that copies all program and data files. Which of the following will you
use?
49. Which of the following statements is not a safeguard against the failure of hardware?
1.Which type of software has no restrictions from the copyright holder regarding modifications of the
software’s internal instructions and its redistribution?
a. custom software
b. system software
c. shareware
d. open source software
2. You are using a Linux-based operating system designed by Google to work primarily with web apps.
What is it called?
a. Symbian OS
b. Chrome OS
c. iOS
d. BlackBerry OS
3. What is the core of an operating system that manages memory and devices, maintains the internal
clock, starts programs, and assigns the computer’s resources?
a. the cylinder
b. the kernel
c. the core
d. the BIOS
a. scripts
b. databases
c. documents
d. sheets
5. If your cousin asks you what devices can be used to record and retrieve data, instructions, and/or
information for future use on a computer, which of the following would you tell her?
6. You are looking for a backup that copies only the files that have changes since the last full backup.
Which of the following will you use?
a. selective backup
b. differential backup
c. archival backup
d. incremental backup
EXAM ON INFORMATION TECHNOLOGY
a. binary
b. analog
c. electronic
d. manual
10. You have just written a new app to intercept documents from the operating system that are to be
printed and place them in the queue. What is this app called?
a. print spooler
b. job manager
c. page interceptor
d. printer task handler
a. Windows Phone 9
b. Windows Server 2011
c. Windows Phone 5
d. Windows Phone 7
12. A standard CD-ROM is called a single-session disc. Why are they called single-session discs?
13. An organization to which you belong is joining the W3C. What is the mission of the work you will
undertake as a member?
14. Which of the following does your daughter's daycare use to verify the identity of parents who pick
up their children?
EXAM ON INFORMATION TECHNOLOGY
14. Most operating systems have security features available, such as an integrated ____ to protect
against unauthorized access via the Internet.
a. modem
b. router
c. firewall
d. hub
15. Robert is a medical writer for a pharmaceutical company. The company allows Robert to work from
home. Every day, Robert uses ____ to have a real-time, face-to-face meeting with his boss.
a. telemarketing
b. virtual networks
c. videoconferencing
d. intranets
16. A ____ is an optical code that represents data with bars of varying widths or heights.
a. character code
b. digital code
c. barcode
d. bar table
17. You are looking for a browser that will run on your computer, which uses the Linux operating
system. Which of the following is an option for you?
a. Chrome
b. Safari
c. Internet Explorer
d. Firefox
19. ____ is a wireless standard that is designed for very short-range (10 meters, approximately 33 feet,
or less) connections.
a. xMax c. Bluetooth
b. IrDA d. Wi-Fi
EXAM ON INFORMATION TECHNOLOGY
20. In a printer, the print ____ affects the quality of the printed output.
a. palette
b. size
c. resolution
d. depth
21. Which of the following gestures would you use if you want to move an item around the screen on
your new tablet?
a. swipe
b. stretch
c. slide
d. pinch
22. Your business is looking to rely on cloud computing services to create applications using web-based
development platforms. What is the term for this?
a. Software as a Service
b. Data as a Service
c. Infrastructure as a Service
d. Platform as a Service
23. Most computers and many mobile devices, such as smartphones and portable media players, can
connect to which kind of network?
a. Bluetooth
b. Wi-Fi
c. cellular radio
d. all of the above
24. The bus width and bus speed together determine the bus’s ____ or bandwidth; that is, the amount
of data that can be transferred via the bus in a given period of time.
a. memory
b. throughput
c. clock speed
d. machine cycle
25. Common online investing services include the ability to set up a(n) ____ that displays the status of
the stocks you specify.
a. stock account
b. e-tailer
c. online portfolio
d. online recorder
EXAM ON INFORMATION TECHNOLOGY
26. ___ provide(s) a method of storing data on two or more hard drives that work in combination to do
the job of a larger drive.
27. What is another term for the operating system a computer uses?
a. file manager
b. system utility
c. platform
d. application
28. Which of the following gestures would you use if you want to activate a mode that enables you to
move an item with one finger to a new location on your new tablet?
29. Jack has a computer at home that he uses to access the Internet, store and edit personal photos, and
create and edit documents. Recently, he has come to realize that in order to keep the computer
performing at its best, he needs to carry out regular system maintenance on the computer.
Jack can use the ____ program to locate and delete temporary files, such as installation files, Web
browsing history, and files in the Recycle Bin.
a. Windows Registry
b. Windows Disk Cleanup
c. Disk Defragmenter
d. Temporary Files
30. Fernando has been having problems with his computer. He takes it to his local computer repair shop
to be checked and finds out that his computer has a number of malware that he was not even aware of.
The technician tells Fernando that his computer has a ____, which might have gotten into Fernando’s
computer when he downloaded a free computer game from the Internet.
a. virus
b. spider
c. bot
d. spam
31. ____ refers to organizing the content to be transferred to DVD, such as importing video clips,
creating the desired menu structure, and so forth.
a. DVD ripping
EXAM ON INFORMATION TECHNOLOGY
b. DVD authoring
c. Video editing
d. Video ripping
32. Which of the following terms is used to describe a small text file that a web server stores on your
computer?
a. a cookie
b. a breadcrumb
c. a cracker
d. a nugget
33. Which of the following technologies is your new inventory tracking system at your small business
most likely to use?
a. TCP/IP
b. Bluetooth
c. UWB
d. IrDA
35. Which of the following mouse operations would you use if you want to start a program feature?
a. double-click
b. drag
c. point
d. click
36. Which of the following statements is not true about intellectual property rights?
a. Intellectual property refers to unique and original works such as ideas, inventions, company logos,
and more.
b. A copyright protects any tangible form of expression.
c. The term fair use refers to the rights which creators are entitled for their work.
d. Digital rights management is a strategy designed to prevent illegal distribution of digital content.
a. a series of digital devices embedded within computers that interprets commands from computer
users and remembers them for future reference in order to increase the processing power of a
computer
EXAM ON INFORMATION TECHNOLOGY
b. chips stored on the computer processor board that interact with both the system unit and the
processor in order to extract the data required for processing
c. electronic components that store, among other things, instructions waiting to be executed by the
processor
d. manufactured devices that store a single digital address at a time in order to facilitate an orderly
transfer of data within a computer
39. Melissa is the network administrator for a small publishing company. As network administrator, she
is in charge of maintaining the security of all the computers that are part of the company’s network.
Melissa has set up procedures so that every user using a computer connected to the network needs to
enter his or her ____, which appears as asterisks on the screen as it is being entered.
a. password
b. e-mail address
c. public key
d. private key
40. ____ are illustrations of faces showing smiles, frowns, and other expressions that are created with
keyboard symbols.
a. Phishes
b. Spams
c. Emoticons
d. Trojan horses
41. Although labels and constant values will be copied exactly to the new location, the way formulas
behave when they are copied depends on whether they use relative cell referencing or ____.
42. Melissa is the network administrator for a small publishing company. As network administrator, she
is in charge of maintaining the security of all the computers that are part of the company’s network.
Melissa also decided to use a(n) ____, which continuously monitors and analyzes the traffic allowed to
and from the network to detect possible attacks as they are occurring and block them.
a. RAM
EXAM ON INFORMATION TECHNOLOGY
b. IPS
c. antivirus software
d. firewall
43. When a software program is purchased, the buyer is acquiring a(n) ____ that permits him or her to
use the software.
a. software key
b. copyright
c. software license
d. ownership right
44. What is the general term for programs that act without a user’s knowledge and deliberately alter the
computer’s operations?
a. malware
b. evilapp
c. viralware
d. cybersoft
45. Rearranging the data on the hard drive so all files are stored in contiguous locations is called ____.
a. file compression
b. disk defragmentation
c. disk cleanup
d. disk backup
46. What is the term used to connect a device to a network that has an IP address?
a. core
b. link
c. node
d. bus
47. What is a feature that has a graphical user interface to assist users with retrieving data?
a. DBE
b. SQL
c. NoSQL
d. QBE
48. A ____ transmits all data received to all network devices connected to it, regardless of which device
the data is being sent to.
a. gateway
b. bridge
c. router
d. hub
EXAM ON INFORMATION TECHNOLOGY
49. Smith Web Design is creating a secure Web site for a local doctor. In addition to providing basic
information about her practice, she wants her patients to be able to log on and access their records,
including images such as X-rays and MRIs.
Smith Web Design has decided to place all navigation buttons in a column on the left hand side of the
page. They should create these in the ____ format.
a. TIF
b. GIF
c. BMP
d. JPEG
50. Which of the following rests below a laptop and protects the computer from overheating and also
your lap from excessive heat?
a. cooling pad
b. lap pad
c. heat sink
d. heat blanket
EXAM ON INFORMATION TECHNOLOGY
1. Creating a(n) ____ means making a duplicate copy of important files so that when a problem occurs,
you can restore those files using the backup copy.
a. backup
b. mirror
c. index
d. hidden file
2. When you break a large document apart, consider including a link to view or download the entire
document intact either as a Web page or in a common format, such as Word or ____.
a. XML
b. MDF
c. XHTML
d. PDF
3. Your roommate is a graphic artist. She buys a large-format printer that creates photo-realistic-quality
color prints. What printer technology does her printer use?
a. plotter printer
b. impact printer
c. dye-sublimation
d. ink-jet printer
4. If your instructor turns on his computer and then starts a web browser, what contents are in RAM?
5. ____ are the most common type of flat-panel technology used for small- to medium-sized computer
monitors.
a. FOLEDs
b. LCDs
c. Gas plasmas
d. OLEDs
6. External hard drives today typically connect to a computer via a USB or ____ port.
a. Firewall
b. FireWire
c. Bluetooth
d. IrDA
EXAM ON INFORMATION TECHNOLOGY
7. ____ are table of contents pages that contain links to all main pages on the sites.
a. Site maps
b. Frames
c. Search boxes
d. Drop-down menus
8. A type of computer usually has only one user. Which of the following is most likely to be the type of
computer?
a. personal computer
b. SSD
c. supercomputer
d. server
10Which of the following gestures would you use if you want to get immediate access to allowable
actions on your new tablet?
11. Which of the following identifies pointing devices that can be used instead of a mouse?
12. Andrea is an aspiring songwriter and musician. She is creating a Web site that would allow her to
showcase her talent and gain exposure.
Andrea does not yet have any CDs of her music, but she can still create audio files to put on her Web site
using a microphone or ____ instrument.
a. XML
b. WAV
c. WML
d. MIDI
13. ____ keys on a keyboard are used for issuing commands in some programs.
EXAM ON INFORMATION TECHNOLOGY
a. Alphanumeric
b. Arrow
c. Function
d. Number
14. If you are running a check that applies a formula to the primary key, what kind of check are you
running?
a. alphabetic
b. range
c. check digit
d. completeness
15. One of the most common 2D barcodes, the ____ code represents data with a matrix of small
squares.
a. Code 39
b. UPC
c. QR
d. ISBN
16. An application you own will run on a new version of your operating system. What is the term for this
kind of application?
a. upgrade compatible
b. upward compatible
c. upgrade compliant
d. Plug and Play
17. At your local supermarket there is a kiosk that allows you to rent your favorite movie on DVD. Of
which of the following is this an example?
a. film kiosk
b. photo kiosk
c. vending kiosk
d. media kiosk
18. Regardless of how storage devices are connected to a computer, ____ and/or names are typically
assigned to each storage device.
a. single-digit numbers
b. letters of the alphabet
c. vowels
d. special characters
19. What term is used to describe the discovery, collection, and analysis of evidence found on
computers and networks?
EXAM ON INFORMATION TECHNOLOGY
a. cybersleuthing
b. data mining
c. digital forensics
d. system analysis
20. ____ uses a single secret key to both encrypt and decrypt the file or message.
21. When you examine a computer chip under a microscope, what will you see?
a. circuit boards
b. silicon molecules
c. integrated circuits
d. quad cores
22. The original first-generation cell phones were ____ and designed for voice data only.
a. discrete
b. magnetic
c. analog
d. digital
23. ____ is a new alternative for homes and businesses today in areas where there is fiber optic cabling
available all the way to the building.
a. T1
b. ISDN
c. BoF
d. DSL
24 You are investigating a problem with the motherboard, what are the two main components to check
out?
a. firefighter
b. doctor
c. photographer
EXAM ON INFORMATION TECHNOLOGY
d. traffic officer
26. A data dictionary contains details about data. What term is used to describe this characteristic?
a. maxidata
b. omnidata
c. metadata
d. duplidata
27. If you are looking for an online social network that allows you to stay current with the daily activities
of those you are following, which of the following is the best match for you?
a. LinkedIn
b. Facebook
c. Twitter
d. Digg
28. If your instructor advises you to use the keys at the top of your keyboard that are identified by the
letter F and then a number to perform certain activities, what kind of keys is she advising you to use?
a. facilitating keys
b. function keys
c. finger keys
d. feature keys
29. If a computer advertisement states a computer operates at 5 GHz, what does that mean?
30. Your sister just started a company that provides individuals and organizations access to the Internet
for a small fee.
a. access provider
b. broadband network gateway administrator
c. regional broadband domain monitor
d. wireless Internet technology disseminator
31. Your instructor has asked you to perform some research regarding a computer’s capability of
distinguishing spoken words. What is the best search term to use for your research?
32. What is the term for a narrow recording band that forms a full circle on the surface of a hard disk?
a. track
b. sector
c. platter
d. cluster
33. ____ is a Linux-based operating system developed by the Open Handset Alliance.
a. Android
b. UNIX
c. Vista
d. Mac OS X
34. The ____ boots the computer, launches application software programs, and ensures that all actions
requested by a user are valid and processed in an orderly fashion.
a. registry
b. startup
c. driver
d. operating system
35. One of the most straightforward ways to improve the quality of the hits returned in a search is to
use ____—essentially typing more than one keyword in a keyword search.
a. code searching
b. index searching
c. phrase searching
d. character searching
36. Which term describes a huge database that stores and manages data required to analyze historical
and current transactions?
a. data warehouse
b. data mine
c. data market
d. data archive
37. If your computer or printer does not have a built-in slot for memory cards, you can purchase a
device that can access the data stored on the memory card. What is that device called?
a. a transfer port
b. a memory stick
c. a read/write head
d. a card reader/writer
38. Which of the following technologies is your new remote control most likely to use?
EXAM ON INFORMATION TECHNOLOGY
a. IrDA
b. TCP/IP
c. Bluetooth
d. RFID
39. A computer that is controlled by a hacker or other computer criminal is referred to as a ____.
a. client
b. spider
c. bot
d. server
40. You want to run another operating system on your computer in addition to the one already installed.
Which of the following will let you do that?
a. warm boot
b. single-tasking operating system
c. secondary install
d. virtual machine
41. Which of the following does your new smartphone use to unlock the device?
42. When a word processing program user formats a document, what does the user change?
43. Computer memory and computer storage are available in varying sizes. Which of the following is the
largest amount of memory or storage?
a. gigabyte (GB)
b. terabyte (TB)
c. megabyte (MB)
d. kilobyte (KB)
44. A computer ____ spreads by creating copies of its code and sending those copies to other computers
via a network.
a. software
b. virus
c. worm
EXAM ON INFORMATION TECHNOLOGY
d. hacker
45. Today, the standard term for placing telephone calls over any type of data network (including the
Internet, as well as a LAN, WAN, or other type of data network) is ____.
a. DSL
b. BoF
c. ISDN
d. VoIP
a. SmallGraph
b. thumbnail
c. Compressed Bit Form (CBF)
d. podgraph
48. You want a storage medium that allows you to locate a particular data item immediately, without
having to move consecutively through items stored in front of the desired data item or file. What kind of
access will this storage medium use?
a. direct
b. indexed
c. sequential
d. preconfigured
49. A ____ is an image designed to enhance a presentation (such as an electronic slide show or a printed
report) visually, typically to convey information more easily to people.
a. presentation graphic
b. projector
c. Trojan horse
d. phish
50. Which of the following is not one of the reasons that a mobile device can be categorized as a
computer?
a. A fragmented disk contains temporary Internet files and unused program files that need to be
deleted.
b. A fragmented disk has many files stored in noncontiguous sectors.
c. A fragmented disk contains programs that were deleted using Windows Explorer.
d. A fragmented disk has no index.
2. Conventional PCs are often referred to as ____ because the complete computer system fits on or next
to a desk.
a. processor computers
b. laptop computers
c. super computers
d. desktop computers
3. Smith Web Design is creating a secure Web site for a local doctor. In addition to providing basic
information about her practice, she wants her patients to be able to log on and access their records,
including images such as X-rays and MRIs.
In the “About Us” section of the Web site, the doctor wants to include a photo of her office. The best
format to save the photo in is ____.
a. JPEG
b. GIF
c. BMP
d. TIF
a. The computer locates operating system in storage and loads it into RAM.
b. The computer accesses the memory and loads a program such as a word processing program.
c. The computer opens application software from ROM.
d. The computer searches for instructions in RAM.
5. With ____, data is sent one bit at a time, one after the other along a single path.
a. digital transmission
b. serial transmission
c. parallel transmission
d. wireless transmission
6. A ____ is a question, or, in database terms, a request for specific information from the database.
a. report
b. cell
c. query
d. form
EXAM ON INFORMATION TECHNOLOGY
7. Monitoring systems may also use ____, which are devices that respond to a stimulus (such as heat,
light, or pressure) and generate an electrical signal that can be measured or interpreted.
a. IAs
b. interpreters
c. transmitters
d. sensors
8. What is the term for an electrical channel within the circuitry of a computer than can transfer 8 bytes
of data at a time?
11. Lisa is a student who regularly uses the computers at her local Internet café to listen to music, talk to
her friends and family through the Internet, and play computer games.
Lisa needs to make sure that the computer that she is using has a ____ attached to it for her to be able
to hear music and the sounds of a computer game.
a. touch screen
b. speaker
c. scanner
d. microphone
12. You want to place a video from the Internet to your desktop. What process do you use?
a. Downloading
b. Wireless accessing
c. Surfing
d. VoIP
EXAM ON INFORMATION TECHNOLOGY
13. Which of the following will you use if you are looking to perform backups in between full backups?
a. differential backup
b. archival backup
c. partial backup
d. selective backup
14. The term ____ refers to chip-based storage used by the computer.
a. Zip drive
b. hard drive
c. storage media
d. memory
15. When Mary started college, her parents bought her a new computer that came with minimal
software. She is now looking into purchasing additional software.
Mary needs word processing software for her classes, but she has to budget her resources carefully this
semester. She might consider using ____, which is available as a free download via the Internet.
a. SmartSuite.org
b. OpenOffice.org
c. WordPerfect Office
d. Microsoft Office
16. In your school’s database, in which of the following is all of the information about a particular
student stored?
Select one:
a. a report
b. a field
c. a record
d. a character
17. You received a new portable media player for your birthday. It is less than ideal as a gift, however,
because you were hoping to do something with it, and it is not something you can do with the player.
What is that thing you were hoping to do?
a. play games
b. watch television shows
c. take photos
d. manage a server
18. ____ optical discs can be recorded on, erased, and overwritten just like magnetic disks.
a. Recordable
b. Rereadable
c. Rewritable
d. Erasable
EXAM ON INFORMATION TECHNOLOGY
a. conware
b. criminalware
c. cyberware
d. crimeware
20. When an instrument in the dashboard of your car informs you the air pressure in the right rear tire is
low, what type of computer determines the air pressure is low?
Select one:
a. server
b. embedded computer
c. online linked computer
d. analog computer
21. ____ is a family of operating systems based on Windows that is designed primarily for consumer and
industrial devices that are not personal computers.
a. Windows Vista
b. Windows Embedded
c. Windows Server 2003
d. Windows Mobile
22. If a manufacturer is looking for memory that is very durable and shock resistant, which kind of
technology might it use in its laptops?
a. SSDs
b. DVD drives
c. hard disks
d. platters
23. A(n) ____ keyboard folds or rolls up and connects to a device via a wired or wireless connection
when needed.
a. MIDI
b. slide-out
c. on-screen
d. portable
25. ____ sites allow you to generate map and driving directions and provide access to specific types of
useful information.
a. Reference
b. Product information
c. Educational
d. News
26. Commercial Linux distributions, such as those available from ____ and Novell, come with
maintenance and support materials.
a. Adobe
b. Cisco
c. .NET Framework
d. Red Hat
29. Slides can be advanced at predetermined intervals or by clicking the mouse or ____.
30. If your friend is enjoying a cup of coffee in a trendy coffee shop and at the same time is surfing the
web, which of the following is she using?
a. SIS
b. Fixed Limited Online Access Transport (FLOAT)
c. a hot spot
d. FFT
31. Smart cards and holographic drives are examples of ____ systems.
a.storage
EXAM ON INFORMATION TECHNOLOGY
b. Wi-Fi
c.satellite
d. artificial intelligence
32. What is a more user-friendly interface some users use instead of interacting directly with a DBMS?
a. data file
b. user environment
c. front end
d. home page
a. e-commerce
b. online merchandising
c. online marketing
d. e-trade
34. A(n) ____ is used to display output from a computer to a wall or projection screen
a. scanner
b. SED
c. IMOD
d. data projector
35. Which of the following is a huge database that stores and manages the data required to analyze
historical and current transactions?
a. data marketing
b. data distribution
c. data analysis
d. data warehouse
a. information
b. code
c. a database
d. a program
37. System software is usually divided into two categories: operating system software and ____
programs.
a. planning system
b. background
c. FAT system
d. utility
EXAM ON INFORMATION TECHNOLOGY
38. Which of the following terms is used to describe a scam in which a website includes a button, image
or link that contains a malicious program?
a. war driving
b. spitting
c. clickjacking
d. spimming
39. A computer salesman refers to the shape and size of your new computer by a specific term. What
term does he use?
a. resolution
b. aggregator
c. form factor
d. base index
40. Fernando has been having problems with his computer. He takes it to his local computer repair shop
to be checked and finds out that his computer has a number of malware that he was not even aware of.
The technician also found a ____ on the computer, which is designed to find sensitive information about
the user located on the PC and then send it to the malware creator. The technician explains that this
type of malware cannot replicate itself.
a. bot
b. worm
c. virus
d. Trojan horse
a. a series of distorted characters that a user is required to enter correctly to continue using a website
b. a digital image used to help decipher a faded or blurry word in digitized news archives
c. the average time it takes a computer to discover a password based on the number of characters
d. a private combination of words associated with a user name that allows access to computer resources
a. Replace Internet1.
b. Ensure telemedicine, digital libraries, high-definition video, and Internet fraud detection all can be
available over the Internet.
c. Develop and test advanced Internet technologies.
d. It is the same as Internet; it has no particular goal.
44. You are creating a database for your computer club. Most of the students live in your town, Durham.
How can you make Durham appear initially in the field to make data entry easier?
45. After a power failure, you instruct the DBMS to use the log to reenter any changes made to the
database since the last save or backup. What term is used to describe this backup technique?
a. restoration principle
b. rollback
c. continuous backup
d. forward recovery
46. You own a third-party business that provides networking services such as EDI, secure data and
information transfer, storage, and email. Into what category of business does this business fall?
a. CIN
b. VAN
c. EAN
d. NIC
47. You are outside in a public park with your friend. Both of you have Wi-Fi devices. For the devices to
communicate with each other, what is the maximum distance they can be apart?
a. 300 feet
b. 200 feet
c. 500 feet
d. 100 feet
49. One type of storage device that is sometimes used with computers and that uses sequential access is
a ____.
a. flash drive
b. compact card
c. hard drive
d. magnetic tape drive
50. Which of the following items in your pocket uses NFC technology?
a. credit card
b. postage stamp
c. coin purse
d. wallet