Sunteți pe pagina 1din 29

Answer all questions by choosing the best option.

Section score5/10
 
An Apple iPad and a Microsoft Surface are examples of ________
computers
1/1
tablet
 
netbook
desktop
laptop
 
Unwanted or junk e-mail is called ________.
1/1
spam
 
spyware
adware
malware
 
In binary language, each letter of the alphabet, each number, and
each special symbol is made up of a unique combination of eight
________.
0/1
bytes
 
kilobytes
characters
bits
Correct answer
bits
 
The process of searching huge amounts of data seeking a pattern
is called data ________.
0/1
mining
searching
warehousing
diving
 
Correct answer
mining
 
In medicine, 3D printing allows more stylish and less expensive
designs for ________.A) medicines
0/1
medicines
patient simulators
prosthetic limbs
clothing
 
Correct answer
prosthetic limbs
 
Using the Internet to get small donations from many people to
start a business is called ________.
0/1
kickstarting
crowdfunding
crowdsourcing
 
collaborating
Correct answer
crowdfunding
 
Apple's OS X and Microsoft Windows are examples of ________
software.
0/1
utility
application
operating system
productivity
 
Correct answer
operating system
 
________ tools gather information from sources such as e-mails,
text messages, and tweets and make the information instantly
and publicly available for use in emergencies.
1/1
Social networking
Crowdsourcing
Crisis-mapping
 
Affective computing
 
________ replaces perceived reality with a different world.
1/1
Variable reality
Augmentative reality
Virtual reality
 
Alternate reality
 
________ reality is the addition of digital information directly into
our reality, either to add more detail or to remove unwanted
visual effects.
1/1
Augmentative
 
Alternate
Assisted
Altruistic

Answer all questions by selecting the best answer.


Section score5/10
 
Software that enables you to display and interact with text and
other media on the web is a web ________.
1/1
client
server
agent
browser
 
 
Which of the following optical storage media has the greatest
storage capacity?
1/1
DVD DL
DVD
CD
BD
 
 
A Microsoft ________ account allows you to store and share files in
the cloud.
···/1
iCloud
 
Dropbox
OneDrive
Drive
No correct answers
 
________ is concerned with the design and arrangement of
machines and furniture to avoid uncomfortable or unsafe
experiences.
1/1
Ergonomics
 
Positioning
Occupational safety
Repetitive strain prevention
 
Inkjet printers and laser printers are examples of ________
printers.
0/1
nonimpact
impact
 
dot-matrix
thermal
Correct answer
nonimpact
 
________ is the abbreviation for the place in the computer where
the programs and data the computer is currently using are
temporarily stored.
1/1
ROM
CPU
RAM
 
USB
 
The web is based on the ________ Protocol.
0/1
Hypertext Transfer
Hypertext Trade
Hypertext Transmit
 
Hypertext Translate
Correct answer
Hypertext Transfer
 
A(n) ________ is installed on your computer, and when the program
is opened, your e-mail is downloaded to your computer.
0/1
web-based e-mail
e-mail client
e-mail host
e-mail server
 
Correct answer
e-mail client
 
The ________ contains the central electronic components of the
computer.
1/1
motherboard
 
arithmetic/logic unit
peripheral unit
input unit
 
A(n) ________ is usually a live broadcast of audio or video content.
0/1
Podcast
 
Wiki
Instant message
Webcast
Correct answer
Webcast

Answer all questions by selecting the best answer.


Section score3/10
 
________ software helps run the computer and coordinates
instructions between other software and the hardware devices.
0/1
Application
 
Recovery
Productivity
System
Correct answer
System
 
In the URL http://www.microsoft.com/surface, the portion labeled
".com" is the ________.
0/1
domain name
 
host
top-level domain
protocol
Correct answer
top-level domain
 
OS X is the operating system developed by ________.
1/1
Apple
 
Microsoft
Google
Linux
 
In databases, a data category is called a ________.
1/1
table
record
worksheet
field
 
 
QuickBooks is an example of ________ software.
0/1
educational
 
accounting
course management
gaming
Correct answer
accounting
 
All of the following are types of multimedia and entertainment
software EXCEPT
0/1
digital audio software
digital video software
drawing software
 
productivity software
Correct answer
productivity software
 
AND, OR, and NOT are examples of ________ operators.
0/1
Boolean
Jacobean
relational
 
keyword
Correct answer
Boolean
 
________ applications are software in which the vendor hosts the
software online over the Internet and you do not to install the
software on your computer.
1/1
Open Source as a Service
Proprietary as a Service
Software as a Service
 
Webware as a Service
 
All of the following are examples of network operating systems
EXCEPT ________.
0/1
Windows 10
Linux
OS X
 
MS-DOS
Correct answer
MS-DOS
 
All of the following are examples of database software EXCEPT
________.
0/1
Oracle
OneNote
MySQL
Microsoft Access
 
Correct answer
OneNote

Answer all questions by selecting the best answer.


Section score1/11
 
The ________ utility automatically creates duplicates of your
libraries, desktops, contacts and favorites to another storage
location.
0/1
System Restore
 
Time Capsules
File History
Carbonite
Correct answer
File History
 
Which of the following operating systems are used on most
tablets?
0/1
Windows and iOS
 
Windows and Android
Android and iOS
BlackBerry and Windows
Correct answer
Android and iOS
 
________ provides high-speed information processing by enabling a
new set of instructions to start before the previous set is
finished.
0/1
Multitasking
Cache memory
 
Hyperthreading
Overclocking
Correct answer
Hyperthreading
 
The ________ has the largest capacity of any storage device
below.
1/1
CD
SSD
DVD
mechanical hard drive
 
 
Using a network without the network owner's permission is
known as ________.
0/1
hijacking
 
spamming
piggybacking
phishing
Correct answer
piggybacking
 
Which of the following does NOT determine processor power?
0/1
Clock speed
 
Number of cores
Amount of cache memory
Speed of the motherboard
Correct answer
Speed of the motherboard
 
The basic input/output system (BIOS) is stored on a ________ chip.
0/1
ROM
CPU
RAM
 
CMOS
Correct answer
ROM
 
The rule of thumb that predicts that the number of transistors on
a CPU will double every 2 years is called ________ Law.
0/1
Charles's
Moore's
Intel's
 
Boyle's
Correct answer
Moore's
 
Some of the cache memory of a CPU is ________.
0/1
inside the CPU, itself
on the hard disk drive
on a nearby SSD
 
in cloud storage
Correct answer
inside the CPU, itself
 
When using Windows File Explorer, which view provides the most
information at a glance?
0/1
List
 
Content
Tiles
Details
Correct answer
Details
 
You can use the Windows ________ to check on a nonresponsive
program.
0/1
System Restore
Backup utility
Error-checking
 
Task Manager
Correct answer
Task Manager

Answer all questions by selecting the best answer.


Section score2/10
 
A peer-to-peer (P2P) network is an example of ________
administration.
0/1
local
wide area
 
central
corporate
Correct answer
local
 
________ is the maximum speed at which data can be transferred
between two nodes
0/1
Throughput
Bandwidth
Broadband
Through speed
 
Correct answer
Bandwidth
 
Which of the following is NOT a common network architecture
type?
0/1
local area network (LAN)
 
home area network (HAN)
intraoffice area network (IAN)
personal area network (PAN)
Correct answer
intraoffice area network (IAN)
 
Which of the following ports is NOT used to connect to a video
card?
1/1
HDMI
DVI
USB
 
DisplayPort
 
Using a network without the network owner's permission is
known as ________.
0/1
hijacking
spamming
 
piggybacking
phishing
Correct answer
piggybacking
 
Wireless network devices use ________ to communicate with each
other.
1/1
fiber optics
satellites
radio waves
 
ISDL
 
Which of the following is NOT a type of cable used in wired
networks?
0/1
Unshielded twisted-pair
 
Coaxial
Fiber-optic
Unshielded coaxial
Correct answer
Unshielded coaxial
 
The term ________ refers to the use of a single unifying device that
handles media, Internet, entertainment, and telephone needs.
0/1
multimedia message service
telephony
 
mobile switching center
digital convergence
Correct answer
digital convergence
 
What is iOS?
0/1
A specific operating system for mobile devices
A type of application software
A utility program for all mobile digital devices
A form of antivirus software
 
Correct answer
A specific operating system for mobile devices
 
Which of the following is NOT a wired broadband Internet
connection option?
0/1
Cable
Dial-up
DSL
Fiber-optic
 
Correct answer
Dial-up

Answer all questions by selecting the best answer.


Section score2/9
 
Which is true of SMS messages?
0/1
They can contain pictures and videos.
They can only contain a limited number of characters.
They are no longer used.
 
They are used in web page development.
Correct answer
They can only contain a limited number of characters.
 
You can send messages that include photos and videos between
mobile devices using ________ technology.
1/1
short message service (SMS)
multimedia message service (MMS)
 
delivery multimedia service (DMS)
multimedia delivery service (MDS)
 
________ is digital textual information that can be stored,
manipulated, and transmitted by electronic devices.
1/1
Short message service
SMTP
E-text
 
Digital rights management
 
The Internet Crime Complaint Center (IC3) is a partnership
between the ________.
0/1
FBI and local police departments
 
FBI and National Defense Department
FBI and National White Collar Crime Center
National White Collar Crime Center and U.S. Department of
Defense
Correct answer
FBI and National White Collar Crime Center
 
Which of the following digital image formats compresses the
image file?
0/1
PDF
WAV
JPEG
MPEG
 
Correct answer
JPEG
 
Which of the following is NOT a virus category?
0/1
Worm
 
Logic bomb
Macro
Pharming
Correct answer
Pharming
 
The global positioning system is a network of 21 ________ plus 3
working spares.
0/1
transponders
 
satellites
base stations
communicators
Correct answer
satellites
 
What is the easiest way to synch your phone wirelessly?
0/1
A cloud service
HDMI
 
Bluetooth
A secure digital transmission
Correct answer
A cloud service
 
Which of the following is formally defined as any criminal action
perpetrated primarily through the use of a computer?
0/1
Social networking
Cybercrime
Phishing
 
Hacking
Correct answers
Social networking
Cybercrime

Answer all questions by selecting the best answer.


Section score1/10
 
The keywords used in programming languages that use decisions
to redirect the flow of a program are called ________.
0/1
pseudocode
 
control structures
flowcharts
operators
Correct answer
control structures
 
Which of the following classifications of viruses can change its
own code to avoid detection?
0/1
Stealth
Multipartite
 
Polymorphic
Worm
Correct answer
Polymorphic
 
Translating an algorithm into a programming language is called
________.
···/1
interpreting
coding
 
compiling
executing
Option 5
No correct answers
 
________ enables users to define their own data-based tags and
facilitates exchange of information between websites.
0/1
HTML
 
XHTML
XML
PHP
Correct answer
XML
 
A ________ is a virus that is attached to documents such as Word
or Excel files.
1/1
script virus
macro virus
 
polymorphic virus
Trojan horse
 
________ is the process of translating a task into a series of
commands that a computer will use to perform the task.
0/1
Debugging
 
Programming
Analyzing
Diagramming
Correct answer
Programming
 
A packet analyzer is a program that can enable a hacker to do all
of the following EXCEPT ________.
0/1
use your debit card information to purchase items illegally
assume your identity
steal your logons and passwords for various accounts
 
launch a denial of service (DoS) attack on your computer
Correct answer
launch a denial of service (DoS) attack on your computer
 
________ floods a computer with requests until it shuts down and
refuses to answer any requests for information.
0/1
A Trojan horse
 
A polymorphic virus
A DDoS attack
Pretexting
Correct answers
A DDoS attack
Pretexting
 
________ is a combination of natural language and programming
language that is used to document an algorithm.
0/1
Flowcharting
Pseudocode
Diagramming
 
Debugging
Correct answer
Pseudocode
 
Division by zero is a ________ error that is caught when the
program executes.
0/1
compiler
runtime
syntax
logical
 
Correct answer
runtime

Answer all questions by selecting the best answer.


Section score3/10
 
A data ________ is a large-scale electronic repository of data that
contains and organizes all of an organization's data in one place.
···/1
mart
chain
warehouse
storehouse
 
No correct answers
 
A ________ is a group of related data that can be stored, sorted,
organized, and queried.A) database
0/1
database
spreadsheet
 
memo
macro
Correct answer
database
 
The computers in a lab on a floor of a building would be
connected using a ________.
1/1
WAN
LAN
 
MAN
PAN
 
A ________ is a group of two or more computers, or nodes,
designed to share information and resources.
1/1
router
bus
bridge
network
 
 
A ________ check would be used to restrict the fines for speeding
violations from $50 to $250.
0/1
completeness
 
range
consistency
numeric
Correct answer
range
 
________ involves taking data from your database and putting it
into an electronic file in a format that another external
application or database can recognize.
0/1
Exporting
Importing
Enhancing
 
Extracting
Correct answer
Exporting
 
A ________ uses the Internet communications infrastructure to
build a secure and private network.
0/1
PAN
WAN
 
VPN
HAN
Correct answer
VPN
 
If a school keeps two lists, one for student registration and one
for student financial information, both containing name and
address information, this is an example of data ________.
0/1
integrity
redundancy
completeness
 
normalization
Correct answer
redundancy
 
________ databases are the most commonly used electronic
databases.
1/1
Relational
 
Flat-file
Multidimensional
Object-oriented
 
Data in a multidimensional database is organized in a ________
format.
0/1
linear
modular
 
cube
cellular
Correct answer
cube

Answer all questions by selecting the best answer.


Section score1/10
 
Which of the following was created for the transfer of hypertext
documents across the Internet?
0/1
SSL
HTTP
FTP
HTML
 
Correct answer
HTTP
 
________ defines the content in terms of the data that is being
described rather than how it is to be displayed.
0/1
CGI
JavaScript
 
XML
HTML
Correct answer
XML
 
A ________ sends data between two networks.
···/1
repeater
switch
hub
router
 
No correct answers
 
________ is the amount of data that can be transmitted across a
transmission medium in a certain amount of time
0/1
Data capacity
 
Scalability
Bandwidth
Infusion
Correct answer
Bandwidth
 
A ________ topology uses more than one topology when building a
network.
0/1
hybrid
multiple-use
fusion
crossover
 
Correct answers
hybrid
fusion
 
A ________ keeps your computer safe by determining who is trying
to access it.
1/1
gateway
firewall
 
hub
switch
 
The main suite of protocols used on the Internet is ________.
0/1
FTP
TCP/IP
SMTP
POP
 
Correct answer
TCP/IP
 
The ________ is responsible for the Internet's domain name system
and the allocation of IP addresses.
0/1
ISOC
ICANN
W3C
 
IAB
Correct answer
ICANN
 
Individual Internet users connect to ISPs through a(n) ________.A)
User Datagram Protocol (UDP)
0/1
User Datagram Protocol (UDP)
T line
optical carrier (OC) line
 
point of presence (POP)
Correct answer
point of presence (POP)
 
In a ________ network, data collisions can occur fairly easily
because the network is essentially composed of a single cable.
0/1
Star
Bus
Hierarchical
 
Cluster
Correct answer
Bus

Answer all questions by selecting the best answer.


Section score3/10
 
Running the Disk Cleanup utility is a quick way to ________.
0/1
defrag your hard drive
remove spyware programs
 
clear out unnecessary files
clean out your Startup folder
Correct answer
clear out unnecessary files
 
________ provides the instructions that tell a computer what to do.
1/1
Software
 
Hardware
Spam
Data mining
 
________ is used to ensure that data is organized most efficiently.
0/1
Consistency checking
 
Validation
Normalization
Range checking
Correct answer
Normalization
 
________ is a professional, business-oriented social networking
site.
0/1
Flickr
Picasa
Twitter
 
LinkedIn
Correct answer
LinkedIn
 
Google ________ is an online store that delivers software for
Android devices.
0/1
Fun
 
Games
Play
Sport
Correct answer
Play
 
The ends of the cable in a bus network use a(n) ________ to absorb
signals so that they are not reflected back to network
components that have already received the signals.
1/1
endcap
terminator
 
stopper
block
 
Which protocol is used when sending files as attachments by e-
mail?
0/1
Multipurpose Internet Mail Extensions (MIME)
Post Office Protocol (POP)
Simple Mail Transfer Protocol (SMTP)
User Datagram Protocol (UDP)
 
Correct answer
Multipurpose Internet Mail Extensions (MIME)
 
________ uses a dedicated connection between two points with
the connection remaining active for the duration of the
transmission.
1/1
Packet switching
An open circuit
Circuit switching
 
A closed circuit
 
Sharing products rather than owning them individually is known
as ________.
0/1
collaborative consumption
crowdfunding
crowdsourcing
social networking
 
Correct answer
collaborative consumption
 
When using a spreadsheet, SUM in the expression
=SUM(B10:B16), is called a(n) ________.
0/1
function
operator
formula
 
operant
Correct answer
function

PROCEED BEYOND THIS POINT TO SUBMIT


This content is neither created nor endorsed by Google. - Terms of Service

 Forms

S-ar putea să vă placă și