Sunteți pe pagina 1din 26

Name: ________________________ Class: ___________________ Date: __________ ID: A

CIS1 - Midterm Review

Multiple Choice
Identify the choice that best completes the statement or answers the question.

____ 1. A computer system includes ____.


a. hardware c. peripheral devices
b. software d. all of the above
____ 2. Which is NOT a basic function of a computer?
a. Copy text c. Process data
b. Accept input d. Store data

____ 3. In the above figure, the item labeled ____ is the system unit.
a. 1 c. 3
b. 2 d. 4
____ 4. Which of the following is NOT true about computer files?
a. They are collections of data saved to a storage medium.
b. Every file has a filename.
c. A file extension is established by the user to indicate the file’s contents.
d. All files contain data.
____ 5. Output is the processed results produced by a computer, such as ____.
a. reports c. music
b. pictures d. all of the above
____ 6. ____ is a private version of a chat room.
a. Email c. E-commerce
b. Blogging d. Instant messaging

1
Name: ________________________ ID: A

____ 7. ____ is the process of converting text, numbers, sound, photos, and video into data that can be processed by
digital devices.
a. Digitization c. Video production
b. Digital recognition d. Conversion

____ 8. In the above figure, which number indicates the folder name?
a. 1 c. 3
b. 2 d. 4
____ 9. In the U.S., the ____ of 2000 prohibits the use of intercepted email as evidence unless a judge approves a
search warrant.
a. Patriot Act c. Safe Streets Act
b. Omnibus Crime Control Act d. Electronic Communications Privacy Act
____ 10. Basic email activities include ____.
a. writing c. replying
b. reading d. all of the above
____ 11. Once the computer has the input, it processes the information and sends the processed information to a(n)
____, such as a monitor, printer, or speakers.
a. input device c. output device
b. storage device d. processing device
____ 12. The instructions that tell a computer how to carry out the processing tasks are referred to as computer ____.
a. programs c. input devices
b. processors d. memory modules
____ 13. The primary purpose of ____ is to help the computer system monitor itself in order to function efficiently.
a. application software c. productivity software
b. system software d. monitoring software
____ 14. Two of the most important factors that define a computer’s platform are the ____.
a. application software and the OS c. OS and the interface
b. application software and the processor d. processor and the OS
____ 15. CD and DVD drives are examples of ____.
a. storage devices c. storage media
b. Zip drives d. solid stage storage
____ 16. Which of the following is NOT true about RAM?
a. RAM is a temporary storage area.
b. RAM is the same as hard disk storage.
c. RAM is volatile.
d. Information stored in RAM is gone when you turn the computer off.
____ 17. ____ storage is portable, durable, provides fast access to data, and uses very little power.
a. Optical c. ROM
b. Solid-state d. Magnetic
____ 18. A(n) ____ indicates where the characters you type will appear.
a. mouse c. insertion point
b. modifier d. pointer

2
Name: ________________________ ID: A

____ 19. A ____ is a touch-sensitive surface on which you can slide your fingers in order to move the on-screen
pointer.
a. joystick c. trackball
b. touchpad d. TrackPoint
____ 20. Which of the following is NOT one of the three technologies used by display devices?
a. HD c. LCD
b. CRT d. plasma
____ 21. Resolution of 24-bit color depth is sometimes called ____.
a. maximum dot pitch c. 800 x 600
b. bit depth d. True Color
____ 22. Printer resolution is measured by the number of dpi, which stands for ____.
a. display points per inch c. display prints per inch
b. dots per linear inch d. dots printed internally
____ 23. An expansion ____ is a connector that passes data in and out of a computer or peripheral device.
a. unit c. card
b. port d. slot
____ 24. An expansion slot is located ____.
a. on the front of the computer c. on the motherboard
b. behind the monitor d. in the USB port
____ 25. A(n) ____ slot is an external slot found on most notebook computers.
a. PCMCIA c. USB
b. ISA d. PCI-X
____ 26. A(n) ____ is software that sets up communication between your computer and a device or card.
a. application c. device driver
b. port d. operating system
____ 27. ____ determines the quality or sharpness of printed images and text.
a. Toner c. Printer resolution
b. Thermal dye d. Picture element
____ 28. A(n) ____ can print on both sides of the paper.
a. dual printer c. duplex printer
b. all-in-one d. double-sided printer
____ 29. A printer’s duty cycle is usually measured in pages per ____.
a. day c. month
b. week d. year
____ 30. ____ is the ability of a device to jump directly to the requested data.
a. Sequential access c. Access time
b. Random access d. Data transfer
____ 31. Which of the following is NOT true about software?
a. Operating systems are a type of application software.
b. Microsoft Windows is installed on the majority of the world’s personal computers.
c. You can run the Windows operating system and Windows software on a Mac if you have
an Intel Mac.
d. System software fundamentally affects how you interact with your computer.

3
Name: ________________________ ID: A

____ 32. A ____ is a type of utility software that helps a peripheral device to establish communication with a
computer.
a. validation code c. device driver
b. resource d. widget
____ 33. A GPL allows everyone to make copies of software for personal use, to give to others, or to sell. GPL stands
for ____.
a. General Personal License c. Gemini Processing License
b. General Public License d. Graphical Public License
____ 34. ____ software is designed to run from removable storage.
a. Portable c. Application
b. System d. Productivity
____ 35. The ability to run different parts of a program simultaneously is called ____.
a. GUI c. bootstrapping
b. multithreading d. compiling
____ 36. You can use ____ to use one computer to simulate the hardware and software of another computer.
a. virtual machine technology c. utility technology
b. network technology d. video console technology
____ 37. The physical arrangement of elements on a page is referred to as a document’s ____.
a. features c. pagination
b. format d. grid
____ 38. A ____ is a collection of data that is stored electronically as a series of records in a table.
a. spreadsheet c. database
b. presentation d. Web page
____ 39. Software that combines word processing and graphic design is called ____ software.
a. document production c. page authoring
b. desktop publishing d. Office productivity

4
Name: ________________________ ID: A

____ 40. In the above figure, the document shown is an example of a(n) ____.
a. spreadsheet c. table
b. database d. HTML tag
____ 41. In the above figure, the item numbered ____ is the Formula Bar.
a. 1 c. 5
b. 4 d. 6
____ 42. Software that helps users analyze large sets of data to determine relationships and patterns is called ____
software.
a. groupware c. accounting
b. statistical d. modeling
____ 43. Media players use ____ utilities to customize the look and feel on your personal computer.
a. skins c. the Control Panel
b. system utilities d. FTP
____ 44. Utilities that can be used for backing up, securing, or recovering files are called ____ utilities.
a. hard drive c. system
b. skins d. third-party

5
Name: ________________________ ID: A

____ 45. The figure above is ____ software.


a. paint c. photo editing
b. drawing d. 3D graphics

6
Name: ________________________ ID: A

____ 46. In the figure above, you would use Item ____ to describe a field’s contents.
a. 2 c. 4
b. 3 d. 5
____ 47. In the figure above, you would use Item ____ to enter additional field specifications.
a. 2 c. 4
b. 3 d. 5
____ 48. You can use software called Boot Camp, which is a ____ program, to select either Mac OS X or Windows
when you start the computer.
a. dual-core processor c. multithreading
b. dual-boot utility d. multitasking
____ 49. Letters, symbols, and numerals are examples of ____ data.
a. numeric c. character
b. binary d. digital
____ 50. ____ data is represented using an infinite scale of values.
a. Analog c. Unicode
b. Digital d. Numeric
____ 51. ____ is the world’s largest chipmaker.
a. Apple c. AMD
b. IBM d. Intel
____ 52. Using ____ technology, a processor can begin to execute a second set of steps before it completes the
previous instruction.
a. pipelining c. CISC
b. serial processing d. cache

7
Name: ________________________ ID: A

____ 53. Computer programs are written in a high-level programming language; however, the human-readable version
of a program is called ____.
a. cache c. source code
b. instruction set d. word size
____ 54. The pace for executing instructions is set by the ____.
a. system timer c. control unit
b. instruction set d. processor clock
____ 55. Which of the following is NOT true about cache?
a. L1 and L2 cache are located on the processor chip.
b. Cache capacity is typically measured in megabytes.
c. A processor can access data from its cache faster than from memory elsewhere on the
motherboard.
d. The amount of cache memory affects performance.
____ 56. In RAM, electronic parts called ____ hold the bits that represent data.
a. capacitors c. buffers
b. waiting rooms d. chalkboards
____ 57. Each operating system has a unique set of filenaming ____, or rules.
a. conventions c. applications
b. configurations d. executables
____ 58. In graphical file managers, folders are used to represent ____.
a. file specifications c. files
b. subdirectories d. file locations
____ 59. File size is usually measured in ____.
a. bytes c. megabytes
b. kilobytes d. any of the above
____ 60. Windows Explorer is an example of a(n) ____.
a. file management utility c. data file
b. dialog box d. application software
____ 61. A ____ is the smallest unit of time a processor can recognize.
a. cycle c. bus
b. clock d. cache

____ 62. A ____ chip package, like the one shown in the figure above, has two rows of pins.
a. DIP c. PGA
b. DIMMs d. SIMMs

8
Name: ________________________ ID: A

____ 63. A ____ converts all the statements in a program in a single batch, and the resulting collection of instructions
is placed in a new file.
a. object code c. hyper-thread
b. compiler d. interpreter
____ 64. To access the EEPROM setup program on your computer, hold down the ____ key as your computer boots.
a. F1 c. F10
b. F2 d. Esc
____ 65. A ____ shares hardware, software, and data among authorized users.
a. network c. hyperlink
b. protocol d. transmitter
____ 66. Networks that use different technologies can be connected using a(n) ____.
a. bridge c. gateway
b. node d. driver
____ 67. The unauthorized access of your wireless network outside your home is called ____.
a. pharming c. LANjacking
b. phishing d. colliding
____ 68. Which of the following is true about DSL lines?
a. DSL lines are analog.
b. DSL providers are responsible for the physical cabling.
c. DSL does not involve a phone company.
d. DSL is an example of an always-on connection.
____ 69. A DSL modem plugs into your computer ____ or Ethernet port.
a. USB c. ISDN
b. CATV d. infrared
____ 70. Which of the following is NOT true about WAP-enabled devices?
a. They have small, low-resolution screens. c. They contain a microbrowser.
b. They are portable. d. They use twisted pair cables.

____ 71. The figure above shows the organizational structure of a ____ network.
a. P2P c. client/server
b. workstation d. client-to-client
____ 72. A(n) ____ server runs application software for network workstations.
a. print c. application
b. file d. client
____ 73. An Ethernet card is also call a(n) ____.
a. CPU c. LAN
b. ISP d. NIC

9
Name: ________________________ ID: A

____ 74. The nonprofit organization, ____, is the world’s leading professional association for the advancement of
technology.
a. IEEE c. LNS
b. WCS d. ISP
____ 75. Network troubleshooting includes ____.
a. making sure your password has not expired
b. looking for sources of interference
c. checking the signal strength
d. all of the above
____ 76. ____ speed is the rate of data arriving at your computer.
a. Upstream c. Transmission
b. Downstream d. Communication
____ 77. A software utility called ____ records a packet’s path.
a. Ping c. Traceroute
b. TCP/IP d. IP
____ 78. ____ Internet access links your computer to an ISP from a stationary point, such as a wall socket or
roof-mounted antenna.
a. Fixed c. Mobile
b. Portable d. Permanent
____ 79. For ____ Internet service, a satellite dish is typically mounted on a vehicle.
a. portable satellite c. mobile broadband
b. mobile WiMAX d. fixed wireless
____ 80. ____ involves writing specific symbols on walls, sidewalks, or lampposts to signal others they can tap into a
wireless network in the area.
a. War driving c. War chalking
b. LANjacking d. GPS
____ 81. Which of the following is a common source of viruses?
a. Removable storage media c. Downloaded software
b. Email attachments d. All of the above
____ 82. A ____ is the basis for scrambling and unscrambling the data transmission between wireless devices.
a. firewall c. wireless network key
b. cookie d. wireless node
____ 83. Backup software is a set of ____ programs designed to back up and restore files.
a. security c. defrag
b. utility d. technique
____ 84. A facility that is designed to house and protect a computer system and its data is called a(n) ____ center.
a. data c. recovery
b. information d. disaster

10
Name: ________________________ ID: A

____ 85. In the figure above, the worm enters the original host and other unprotected hosts using ____.
a. infected files c. e-mail
b. a backdoor d. a packet
____ 86. When referring to war driving and war chalking, war stands for ____.
a. wireless area resources c. wired access resources
b. wireless access revolution d. wireless account resources

____ 87. Item 1 in the figure above indicates ____.


a. an unencrypted network c. an encrypted network
b. an open network d. a low strength signal

11
Name: ________________________ ID: A

____ 88. The device shown in the figure above is a ____ device.
a. restore c. backup
b. registry d. Web
____ 89. UPS stands for ____.
a. uninterruptible power source c. uniform power source
b. uninterruptible power supply d. uniform power supply
____ 90. Which of the following is NOT an appliance designed to protect electrical devices from power surges and
voltage spikes?
a. surge suppressor c. surge strip
b. power strip d. surge protector
____ 91. Data security on a system that is guarded by user IDs and passwords depends on password ____.
a. protocol c. characteristics
b. secrecy d. rights
____ 92. Authentication protocols that use more than one means of identification are ____ secure than others.
a. less c. equally as
b. more d. not as
____ 93. A ____ is a set of program instructions that attaches itself to a file, reproduces itself, and spreads to other
files on the same computer.
a. computer worm c. Trojan horse
b. mass-mailing worm d. computer virus
____ 94. A ____ is a person who controls many bot-infested computers.
a. zombie c. botmaster
b. bot d. botnet
____ 95. A ____ is a computer under the control of a bad bot.
a. botmaster c. clone
b. botnet d. zombie
____ 96. The next version of HTML after HTML 4 is called ____.
a. XHTML c. HTML 5
b. DHTML d. HTML 4 is the current version
____ 97. ____ is a scam that redirects users to fake sites by poisoning a domain name server with a false IP address.
a. Java c. ActiveX
b. Pharming d. Phishing

12
Name: ________________________ ID: A

____ 98. The hr tag in the figure shown above produces a(n) ____ in the Web page.
a. graphic c. horizontal line
b. line break d. header row

____ 99. Item ____ in the figure above is a popular search engine.
a. 1 c. 3
b. 2 d. 4

13
Name: ________________________ ID: A

____ 100. Item ____ in the figure above is the search query.
a. 1 c. 3
b. 2 d. 4
____ 101. The ____ is a collection of documents that are accessed over the Internet and are related by using links.
a. Web c. network
b. Internet d. HTML
____ 102. A Web site typically contains a collection of related Web pages that can be accessed using software called
a(n) ____.
a. network c. navigator
b. URL d. browser
____ 103. A Web resource is any data file that has a URL, such as a(n) ____.
a. HTML document c. sound file
b. graphic d. all of the above
____ 104. Prefixes at the beginning of a URL, such as http://, www, and ftp, are not part of a domain name. These
prefixes correspond to ____.
a. protocols c. services
b. ports d. all of the above
____ 105. FTP stands for ____ and refers to a technology used for transferring files over any network using TCP/IP.
a. file transfer policy c. file transfer protocol
b. full-time protocol d. full transfer portal
____ 106. A(n) ____ is a Web site where people can provide commentary or news on a particular subject as well as
serve as a personal online diary.
a. server c. virtual diary
b. blog d. discussion board
____ 107. ____ refers to new and innovative ways of using the Web.
a. Web 2.0 c. Protocol
b. Wiki d. FTP
____ 108. Napster was closed down by court order in ____ because most of the freely shared music was distributed
without the permission of copyright holders.
a. 1989 c. 2001
b. 1995 d. 2007
____ 109. File sharing is often called P2P file sharing. P2P stands for ____.
a. page-to-page c. computer-to-computer
b. peer-to-peer d. pal-to-pal
____ 110. ____ is NOT a current popular Web browser.
a. Mozilla Firefox c. Arachnophilia
b. Microsoft Internet Explorer d. Netscape Navigator
____ 111. To obtain permission to use text, photos, music, videos, and other elements you find on the Web, you should
contact ____.
a. the Webmaster c. your attorney
b. the site owner d. the copyright holder
____ 112. A(n) ____ is a program designed to help people locate information on the Web by formulating simple
keyword queries.
a. search engine c. Web site
b. Web page d. Web cache

14
Name: ________________________ ID: A

____ 113. One of the most popular activities on the Web is shopping, as shown in the figure above. Which of the
following is NOT a benefit of e-commerce?
a. Enhances traditional business models.
b. Increases profit margin by cutting costs.
c. Allows the owner to keep track of competitor prices.
d. Allows the owner to sell to a smaller audience.

15
Name: ________________________ ID: A

____ 114. In the above figure, Item ____ refers to a common browser feature which allows you to display your home
page.
a. 1 c. 5
b. 4 d. 6
____ 115. An image that has a flat, cartoon-like quality is most likely a(n) ____ graphic.
a. vector c. rasterized
b. bitmap d. monochrome

16
Name: ________________________ ID: A

____ 116. In the figure above, the item labeled 2 represents the ____.
a. rendered portion c. ray
b. gradient d. wireframe
____ 117. In the figure above, the item labeled 1 represents the ____.
a. rendered portion c. ray
b. gradient d. wireframe
____ 118. If you intend to output your digital video to DVDs, you should maintain a high ____.
a. codec c. compression ratio
b. frame rate d. bitrate

____ 119. The above figure is an example of ____ an image.


a. interpolating c. rasterizing
b. cropping d. resizing
____ 120. ____ refers to the number of times per second that a sound is collected or measured during the recording
process.
a. Audio rate c. Sampling rate
b. Wave rate d. Clip rate
____ 121. ____ is a music notation system that allows computers to communicate with music synthesizers.
a. MIDI c. Analog
b. Wavetable d. Composition

17
Name: ________________________ ID: A

____ 122. ____ refers to the ability of a computer to understand the spoken word.
a. Voice recognition c. Wave recognition
b. Speech recognition d. Either A or B
____ 123. A ____ palette displays an image using shades of gray.
a. color c. system
b. Web d. grayscale

____ 124. The technique used in the figure shown above adds light and shadows to a 3D image and is called ____.
a. rendering c. ray tracing
b. editing d. light tracking
____ 125. Digital video is sometimes classified by its ____.
a. hardware c. platform
b. software d. footage
____ 126. The term ____ refers to videos that are constructed and displayed using a personal computer.
a. Web-based video c. PDA video
b. desktop video d. DVD-Video
____ 127. YouTube automatically converts all submitted files into ____ format.
a. AVI c. Flash Video
b. MPEG d. QuickTime Movie
____ 128. Compression can be measured by the number of bits required to display one second of video, which is called
____.
a. bit size c. bitrate
b. bus size d. video byte
____ 129. ____ compression is a technique that can be applied to video footage to eliminate redundant or unnecessary
data.
a. Linear c. Premiere
b. Temporal d. Studio
____ 130. Digital media includes ____.
a. sound c. images
b. video d. all of the above
____ 131. Most historians consider the ____ computer to be the first commercially successful digital computer.
a. Schickard c. Pascaline
b. UNIVAC d. Arithmometer
____ 132. Computer historians believe that the ____ design uses many of the concepts that define the modern computer.
a. Difference Engine c. Abacus
b. UNIVAC d. Analytical Engine

18
Name: ________________________ ID: A

____ 133. Compiling data from the 1880 census took ____ years.
a. 2 c. 20
b. 7 d. 30
____ 134. Which of the following is NOT true when comparing transistors to vacuum tubes?
a. Transistors are much smaller. c. Vacuum tubes are more expensive.
b. Transistors use more power. d. Transistors are more reliable.
____ 135. The computer industry includes companies that manufacture ____.
a. handheld and personal computers c. supercomputers
b. high-end workstations and servers d. all of the above
____ 136. ____ is a company’s percentage of the total market pie.
a. Market tier c. Market distribution
b. Market channel d. Market share
____ 137. Microsoft is located near Seattle, Washington and Dell is just outside ____.
a. San Francisco, CA c. Austin, TX
b. Denver, Colorado d. Philadelphia, PA
____ 138. The ____ focuses on protecting the intellectual property of members and lobbies for a legal and regulatory
environment that benefits the entire IT industry.
a. Federal Trade Commission
b. Software and Information Industry Association
c. Department of Justice
d. Federal Communications Commission

____ 139. The punch cards shown in the above figure were designed by ____.
a. Herman Hollerith c. Benjamin Jacquard
b. Charles Babbage d. Wilhelm Schickard

19
Name: ________________________ ID: A

____ 140. The key advantage of using a(n) ____, like the one shown in the figure above, is that you do not have to be
online while it works.
a. online job bank c. personal agent
b. online job database d. job search agent
____ 141. Most information systems (IS) departments are headed by a ____.
a. CEO c. COO
b. CIO d. CFO
____ 142. A ____ designs and tests new hardware products, such as computer chips, circuit boards, computers, and
peripheral devices.
a. computer salesperson c. manufacturing technician
b. computer engineer d. quality assurance specialist
____ 143. A ____ analyzes a company’s data to determine the most effective way to collect and store it.
a. computer programmer c. technical writer
b. security specialist d. database administrator
____ 144. ____ focuses on computer architecture and how to program computers to make them work effectively and
efficiently. With this degree, you might get a job as a programmer.
a. Computer science c. Information systems
b. Computer engineering d. Information technology
____ 145. ____ degree programs focus on the computer equipment and software that businesses and organizations use.
Graduates often work as help desk technicians.
a. Computer science c. Information systems
b. Computer engineering d. Information technology
____ 146. Graduates of two-year programs usually find employment as entry-level ____.
a. technicians c. support personnel
b. programmers d. all of the above
____ 147. Computer companies often use ____, which is getting parts and labor from outside suppliers.
a. offshoring c. outsourcing
b. drafting d. globalizing

20
Name: ________________________ ID: A

____ 148. When attaching your resume to an email message, it is best to use the ____ format that can be read by a
variety of word processing programs.
a. .doc c. .wps
b. .docx d. .rtf
____ 149. Behind every calculation is a(n) ____, a step-by-step process by which numbers are manipulated.
a. operator c. algorithm
b. operand d. abacus
____ 150. ____, the prototype for first-generation computers, contained about 18,000 tubes.
a. Analytical Engine c. RCA Spectra
b. ENIAC d. IBM 360

Completion
Complete each statement.

151. A ____________________ can be built into a PC and is used to establish an Internet connection using a
standard telephone line.
152. A computer is categorized as a(n) ____________________ if, at the time it is built, it is one of the fastest
computers in the world.
153. In the computer industry, ____________________ is a general term that refers to the physical attributes, such
as size and dimensions, and intended use of a component.
154. The primary storage device on a personal computer is the ____________________.
155. Today, most operating systems use a GUI, which stands for ____________________.
156. The Web is a collection of Web pages that are interconnected through the use of ____________________ or
links.
157. A(n) ____________________ device is hardware that can be added to a computer system to expand what a
computer can do and might be an input, output or storage device.
158. A(n) ____________________ allows you to manipulate an on-screen pointer and other screen-based
graphical controls.
159. A(n) ____________________ contains special video memory, which stores screen images as they are
processed but before they are displayed.
160. ____________________ is the maximum number of horizontal and vertical pixels that are displayed on the
screen.
161. DVD stands for ____________________.

21
Name: ________________________ ID: A

162. A(n) ____________________, like the one shown in the above figure, is a portable storage device featuring a
built-in connector that plugs directly into a computer’s USB port.
163. Within a computer, data travels from one component to another over circuits called a(n)
____________________.

164. Item 2 in the figure above indicates the location where you would key your____________________ notes.
165. You can use ____________________ software, such as Adobe Photoshop and Corel PaintShop Pro, which
includes features designed to improve the quality of photos.
166. ____________________ is a collection of pictures and drawings.
167. You can use ____________________ software to learn and practice new skills like arithmetic and reading.
168. Purchasing a software suite is usually much ____________________ expensive than purchasing each
application in the suite separately.
169. The DIMMs chip package is long and slim. DIMM stands for ____________________.

22
Name: ________________________ ID: A

170. The FSB refers to the circuitry that transports data to and from the processor. FSB stands for
____________________.
171. ____________________ is a type of memory circuitry that holds the computer’s startup routine.
172. A(n) ____________________ is a unique set of characters and numbers that identifies a file and should
describe its contents.
173. ____________________ is the transmission capacity of a communications channel.
174. In a(n) ____________________/server network, the network must have at least one server and one or more
workstations.
175. Each connection point on a network is called a(n) ____________________.
176. A(n) ____________________ server stores files and supplies them to workstations on request.
177. The most commonly used gateway is a(n) ____________________, which is an electronic device that
provides an access point from one network to another.
178. High-bandwidth communications systems, such as cable TV and DSL, are referred to as
____________________.
179. ____________________ service is faster than dial-up, but not classified as a high-speed Internet connection.
180. To access the Internet, you connect your computer to an ISP, which stands for ____________________.
181. Most computers are assigned a temporary IP address called a(n) ____________________ IP address.
182. Human error, also called ____________________ error, includes entering inaccurate data or not following
procedures.
183. ____________________ authentication verifies identity using two independent elements of confirmation.
184. A(n) ____________________ attack helps hackers guess your password by stepping through a list of
thousands of the most common passwords.
185. ____________________ are rules that limit the directories and files that each user can access.
186. A(n) ____________________ is an audio file that is distributed through downloads or the use of a feed.
187. ____________________ is software bundled with a program that automatically displays or downloads
advertising material to a computer after the program is installed or while the program is being used.
188. ____________________ is the term used to describe financial transactions conducted over a computer
network.

23
Name: ________________________ ID: A

189. A ____________________, such as the figure shown above, is a collaborative Web site that can be accessed
and edited by anyone in the world who wants to contribute.
190. A(n) ____________________ is a saved link to a Web site.
191. A(n) ____________________ encrypts the data transmitted between your computer and a Web site.

192. The process of covering a wireframe with surface color and texture in a 3-D image, as shown in the figure
above, is called ____________________.
193. TiVo is a DVR device, which stands for ____________________.
194. ____________________ video retains image quality no matter how many times it is copied.

24
Name: ________________________ ID: A

195. A(n) ____________________ is a small device designed to read data contained in a solid state memory card.
196. Sound units called ____________________ are strung together by speech synthesizers.

197. A(n) ____________________, like the one pictured above, remained in use as an essential tool for students,
engineers, and scientists through the 1960s.
198. A(n) ____________________ is an experimental device that designers must further develop before mass
production and distribution.
199. A second testing phase for a new product, called a(n) ____________________ test, is conducted by off-site
testers, such as a professional testing company.
200. A(n) ____________________ is a recruitment firm that seeks employees for firms looking to fill positions.

Essay

201. Compare and give examples of the three types of storage technologies: magnetic, optical, and solid state.
202. Describe the uses and benefits of solid state storage and how you might use one.

203. In the figure above, what do the initials ESRB stand for, and what is its purpose?
204. Describe the differences in the following: (1) single-user license, (2) site license, (3) multiple-user license,
and (4) concurrent-use license.
205. Describe the different memory types: Cache, RAM, ROM, EEPROM, and virtual memory.
206. List at least five of the rules you should follow when managing files on your computer effectively.
207. Explain how benchmarking is used to gauge the overall speed of a processor.
208. There are many types of networks, classified by the geographic area they cover. Choose three network types
and describe the scope of their access.
209. Define the following network devices and explain their differences: network hub, network switch, and
network router.
210. Describe at least five tips for keeping your computer system in good working condition.

25
Name: ________________________ ID: A

211. Explain helper applications and describe at least one common helper you might need.
212. Describe at least five of these top-level domains: biz, com, edu, gob, info, int, mil, net, and org.
213. Describe data compression and explain zipping and unzipping.
214. Explain the term “information technology (IT) industry.”
215. Define ethics and explain the term “professional ethics.”

26

S-ar putea să vă placă și