TB - Review/Practice Flashcards

1
Q

Automated bot accounts use social media

a) responsibly.
b) to help humans who are busy.
c) to manipulate opinion by posting news stories and quotes massive numbers of times.
d) in some countries but they are illegal in the U.S.

A

c)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

The digital divide occurred because

a) the United States has the fastest Internet access.
b) not everyone has equal access to the Internet.
c) crowdfunding is increasing.
d) everyone now has a smartphone.

A

b)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Cognitive surplus means that we now find many people with

a) more money than free time.
b) limited access to the Internet.
c) mobile devices.
d) excess time and free tools for collaboration.

A

d)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Crowdfunding helps startup businesses by

a) selling stock more easily.
b) using QR codes to advertise and market products.
c) gathering financial contributions from supporters.
d) replacing Web 2.0 technology.

A

c)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Collaborative consumption is when people get together to

a) find the best prices on products.
b) increase the use of a single product by sharing access to it.
c) fight diseases of the respiratory tract.
d) exchange reviews on services and goods they have purchased.

A

b)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

__________ is a branch of computer science that focuses on creating computer systems or computer-controlled machines that have an ability to perform tasks usually associated with human intelligence.

a) Computer literacy
b) Artificial intelligence
c) Natural language
d) Information technology

A

b)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

AI systems that help people discover things they may like but may not discover on their own are known as

a) crowdsourcing systems.
b) Turing testers.
c) recommendation engines.
d) intelligent personal assistants.

A

c)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

A working definition of ethics is

a) impossible because it means different things to different people.
b) the laws of a given society.
c) the study of the general nature of morals and of the specific moral choices individuals make.
d) the rules of conduct presented in Christian religions.

A

c)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

The set of formal or informal ethical principles you use to make decisions is your

a) mindset.
b) instinct.
c) personal ethics.
d) personality.

A

c)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

The analysis of a computer system to gather potential legal evidence is

a) affective computing.
b) data mining
c) hacktivism.
d) computer forensics.

A

d)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

The crisis-mapping tool Ushahidi

a) prevents two-way dialog between people.
b) is only available in the United States.
c) shows that a free software product can have great value
d) relies on people using their desktop computing power to help others.

A

c)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

Sophisticated modeling software is helping international researchers

a) create more intricate screenplays and movie scripts.
b) analyze computer systems to gather potential legal evidence.
c) market new types of products to a wider audience.
d) increase the pace of research in finding and producing vaccines.

A

d) (pg 5)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Which of the following would not impact the digital divide

a) A decline in the price of internet access
b) Less sharing of the work we produce
c) Expansion of free wifi connectivity in major cities
d) Legislation allowing communications companies to charge per website for access

A

b)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Crowdfunding sites include

a) Citi Bike and Zipcar.
b) Bing and Google.
c) Kickstarter and GoFundMe.
d) Amazon and Netflix.

A

c)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

Bike-sharing programs like Citi Bike are an example of

a) principled psychology.
b) crowdfunding.
c) crowdsourcing.
d) a subscription-style business model made possible by technology.

A

d) (pg 7)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

Being computer literate includes being able to

a) avoid spam, adware, and spyware.
b) use the web effectively.
c) diagnose and fix hardware and software problems.
d) all of the above.

A

d)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
17
Q

All of the following are current focuses of AI research EXCEPT

a) natural language processing.
b) perception.
c) cognitive surplus.
d) knowledge representation

A

c)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
18
Q

Which of the following statements is FALSE?

a) Unethical behavior is always illegal
b) Ethical decisions are usually influenced by personal ethics.
c) Individuals who have no sense of right or wrong exhibit amoral behavior.
d) Life experience affects an individual’s personal ethics.

A

a)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
19
Q

Which of the following actions would NOT help to identify your personal ethics?

a) Describe yourself.
b) Conduct a genetic study of your extended family.
c) Identify the influences of your work environment.
d) Prepare a list of values that are most important to you.

A

b)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
20
Q

Intellectual property

a) is the result of someone’s creative work and design.
b) can be protected legally by the patent system.
c) can include works of music, film, or engineering design.
d) all of the above.

A

d)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
21
Q

Intellectual property can be legally protected even though it is not a physical object. true/false

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
22
Q

The move toward access instead of ownership is a sign of cognitive surplus.
true/false

A

false

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
23
Q

Artificial intelligence systems think exactly like human beings do. true/false

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
24
Q

Web-based databases cannot be used to help investigators solve criminal cases. true/false

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
25
Q

Hacktivism is different from cyberterrorism. true/false

A

True

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
26
Q

Which of the following is not one of the four major functions of a computer?

a) indexing
b) processing
c) storage
d) output

A

a)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
27
Q

Which of the following statements is FALSE?

a) Not all cell phones are smartphones.
b) Smartphones generally have less computing power than desktop computers.
c) Smartphones do not contain a CPU.
d) Smartphones are considered a type of computer.

A

c)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
28
Q

Which of the following can be both an input device and an output device?

a) display screen
b) keyboard
c) mouse
d) laser printer

A

a)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
29
Q

The width-to-height proportion of a monitor is known as what?

a) viewing density
b) viewing plane
c) aspect ratio
d) screen resolution

A

c)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
30
Q

What type of printer works by spraying ink onto the paper?

a) inkjet
b) laser
c) 3D
d) resolution

A

a)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
31
Q

Which of the following is NOT found on a motherboard?

a) RAM
b) hard drive
c) ROM
d) CPU

A

b)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
32
Q

Which of these is considered the “brains” of the computer?

a) CPU
b) ROM
c) RAM
d) USB

A

a)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
33
Q

Which of these has moving parts which make them more prone to malfunction?

a) thumb drive
b) SSD
c) conventional hard disk drive
d) a flash memory card

A

c)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
34
Q

Which of the following is a port?

a) HDMI
b) RAM
c) ROM
d) CPU

A

a)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
35
Q

Which power control option leads to a cold boot?

a) sleep
b) restart
c) log-off
d) shut down

A

d)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
36
Q

Which of the following functions of a computer is mostly responsible for turning data into information?

a) output
b) storage
c) input
d) processing

A

d)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
37
Q

In a computer, each __________ can represent either a 0 or a 1.

a) byte
b) bit
c) integrated circuit
d) megabyte

A

a)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
38
Q

A(n) __________ is a laptop computer that can convert into a tablet-like device.

a) 2-in-1 PC
b) chromebook
c) ultrabook
d) all-in-one PC

A

a)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
39
Q

Touch-screen devices usually feature __________ keyboards.

a) physical
b) laser-projection
c) virtual
d) optical

A

c)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
40
Q

Which of the following is a sensor found in certain smartphones?

a) RAM
b) accelerometer
c) HDMI
d) hygrometer

A

b)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
41
Q

Ergonomics is an important consideration

a) for all computing devices.
b) only for laptop computers.
c) only for laptop and desktop computers, but never for mobile devices.
d) only for desktop computers.

A

a)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
42
Q

The most common output device for hard output is a

a) printer
b) scanner
c) speaker
d) display screen

A

a)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
43
Q

The most common output device for soft output is a

a) printer
b) scanner
c) speaker
d) display screen

A

d)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
44
Q

__________ printers work by spraying tiny drops of ink onto paper.

a) inkjet
b) cloud-ready
c) laser
d) large format

A

a)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
45
Q

The most common computer port is the __________ port.

a) USB
b) expansion
c) thunderbolt
d) wi-fi

A

a)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
46
Q

Which component of a computing device drains the battery the fastest?

a) hard drive
b) display screen
c) wifi adapter
d) Bluetooth adapter

A

b)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
47
Q

Data and information are interchangeable terms.

T/F

A

false

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
48
Q

RAM is non-volatile storage. T/F

A

false

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
49
Q

SSD drives are superior to conventional disk drives because they have no moving parts. T/F

A

true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
50
Q

A touchpad is a pointing device usually found in tablets. T/F

A

false

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
51
Q

The “brain” of the computer is the CPU. T/F

A

true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
52
Q

Which is NOT an event associated with the beginning of the Internet?

a) Vinton Cerf helped to develop the Internet communications protocol.
b) Amazon.com was one of the first websites on the Internet.
c) “Login” was intended to be the first network transmission
d) The U.S. Department of Defense creates ARPANET.

A

b)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
53
Q

Which of the following best describes the transmission lines with the fastest speeds?

a) internet backbone
b) main internet
c) main backbone
d) primary backbone

A

a)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
54
Q

Which category of social networking do Instagram and YouTube fit into?

a) infromation sharing
b) social commerce
c) media sharing
d) business collaboration

A

c)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
55
Q

which of the following does not describe a desktop email client?

a) the email program is installed on your computer
b) email is downloaded when the program is opened
c) sending emails is not dependent on an internet connection
d) can access email from any internet-connected device

A

d)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
56
Q

which of the following would be an example of B2B business?

a) BestBuy
b) target
c) google
d) omaha paper

A

d)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
57
Q

which feature of a browser enables you to seperate a browser tabl into as own window?

a) tabbed browsing
b) pinned tabs
c) tear-off tabs
d) tab isolaton

A

d)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
58
Q

which of the following is not an internet protocol?

a) HTTP
b) FTP
c) BitTorrent
d) ARPANET

A

d

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
59
Q

What is the navigation aid that shows users the path they have taken to get a web page located within a website?

a) favorites
b) breadcumb trail
c) bookarks
d) social boomarks

A

b)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
60
Q

Which search strategy should you use to search fo a specific phrase?

a) use quotation marks around the phrase
b) unclude boolean opertor in the pharase
c) use asterisks around the phrase
d) use a wild card around the phrase

A

a)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
61
Q

which of the following is not true when evaluating web articles for reasearch?

a) you should not use an article if thereis ot an author listed
b) you shold evaluate web articels for bias and relavance
c) you can assume everything wit an author listed is accurate and appropriate
d) you should check any links in a web sarticl to see if they are timely and releveant

A

c)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
62
Q

Which statement is not true about the web?

a) the web was based on a protocol developed by TimBerner-Lee
b) special links are used to navigate from page to page on the web
c) the web is based on the WWW protocol
d) the web is a subset of the internet

A

c)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
63
Q

Which of the following describes an IP address?

a) it is reffered to a s a dotted quad
b) it identifies any computer connecting to the internet
c) it identifise a website
d) all of the above

A

d)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
64
Q

Ordering a mocha latte and paying for it from the Starbucks smarphone app is using what type of internet commerse

a) B2B
b) C2C
c) soial commmerce
d) mobile commerce

A

d)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
65
Q

What web browser feature would be particularly useful when using public computers?

a) pinned tabs
b) privacy browsing
c) session restore
d) all of the above

A

b)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
66
Q

in the URL http:..www.whitehouse.gov/blog which part is considered the top-level domain name?

a) .gov
b) www.whitehouse.gov
c) http
d) /blog

A

a)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
67
Q

which of hte folling is not a component of search engine

a) spider
b) indexerp propram
c) search assistant
d) serach engine software

A

c)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
68
Q

Which feature in Google Chrome enables you to restric search result by Size, Color, Type, TIme, or Usage rights?

a) search tool
b) custom search
c) favorites
d) history

A

a)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
69
Q

Ensuring that sebsite content is not slanted in its poitn of view is checking for:

a) audience
b) authority
c) bias
d) relevance

A

c)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
70
Q

Which of the following is a good precaution to take when making online purchases?

a) use the same strong password for all online accounts
b) pay by debit card
c) make sure http: and an open padlock displays in the address bar
d) use a private browser when purchasing items from a public computer

A

d)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
71
Q
You want to search the web for information on the movie Captian America: Cicil War. Whta would be the bast way to enter the key terms to get the most specific results?
a ) Captain America *
b) "Captain America: Civil War"
c) *Civil War
d) Captin America Civil War
A

b)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
72
Q

Your location can be captured from yor moblie device even if app location tracking is turned off T/F

A

true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
73
Q

Podcasts can only be created by professional organizations T/F

A

Faulse

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
74
Q

The “S” in HTTPS stands for secure and indicates that the secure sockets layer protocol has been applies to website T/F

A

true

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
75
Q

Catfishing is posted infammatory remarks online to generate negative responses T/F

A

False

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
76
Q

Google Docs is an example of wiki T/F

A

false

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
77
Q

Microsoft Office is an example of which type of software?

a) open source software
b) proprietary application software
c) open source application software
d) proprietary system software

A

b)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
78
Q

Beta software is never

a) sytem software
b) the final finished versionof the software
c) open source software
d) application software

A

b)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
79
Q

Chossing which features of software yo want ot intall is what kind of installation?

a) custom installation
b) fulll installation
c) restores installation
d) single installation

A

a)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
80
Q

Which type of software is not upgraded automatically?

a) software as a service
b) mobile appls
c) locally installed
d) subscription based

A

c)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
81
Q

which best describes copyleft?

a) a single license covering a single user on a single device
b) a license that grants user the right to modify and redistribute the sotware
c) a license covering one user with mutiple installations
d) a family pack license

A

b)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
82
Q

Which type of productiivity software would you most likely use to do calcualtions and what-if analyses?

a) database
b) tax preparation
c) spreadsheet
d) word processing

A

c)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
83
Q

The software that allows you to edit digital images videos, as well as digitial audio is called?

a) multimedia software
b) encryption algorithms
c) distributed software
d) productivity software

A

a)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
84
Q

Which of the following is an uncompressed audio file format?

a) WAV
b) AAC
c) MP3
d) WMA

A

a)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
85
Q

Which of the following software packages would not be used to create mobile applications?

a) scratch
b) App engine
c) thunkable
d) app inventor

A

d)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
86
Q

Which of the following is considered a benefit of using simulation programs?

a) they allow users to experince potentially dangerous situations without risk
b) they help to prevent costly errors
c) they allow users to experience or control the software as if it were an actual event
d) all of the above

A

d)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
87
Q

Software tht is hosted by the vendor and accessed online is called?

a) application software
b) productivity software
c) SaaS
d) open source software

A

c)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
88
Q

LibreOffice is an example of which type of software

a) freeware
b) open source software
b) beta software
c) SaaS

A

b)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
89
Q

Beta software is made avaliable because

a) new programmers have been hired
b) wireless networking must be added
c) a company is making an early release to test bugs
d) the company needs more profits

A

c)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
90
Q

when yoiu install all the most comly used files and programs to your computer’s hard drive, you have completed which kind of software installation?

a) custom
b) full
c) complete
d) common

A

b)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
91
Q

The min recommended standards for the OS, processor, RAM, and storage cpacity for cetain softwares are called?

a) redistributing standards
b) system requirments
c) hardware
d) min standards

A

b)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
92
Q

Ginny downloads and modifies and open source software program, them upoads the program with a different name. Which type of software license is she most likely to be working under?

a) copyleft
b) general public license
c) open source license
d) no license needed

A

b)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
93
Q

Calendars, tasks, and email can be found in which applicatoin

a) excel
b) outlook
c) OneNote
d) Access

A

b)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
94
Q

Which of the following is an example of financial management software?

a) lumosity
b) audioAcrobat
c) Photos
d) Quicken

A

d)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
95
Q

Image-editing software allows you to

a) compute complex formulas
b) remove red eye
c) creat drafting blueprints
d) conduct product simulations

A

b)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
96
Q

Digital audio software can be used to

a) compute comlex formulas
b) compose songs or soundtracks with virtual instruments
c) create drafting blueprints
d) perform mathematical simulations

A

b)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
97
Q

google docs is an example of Software as a Service T/F

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
98
Q

App creation software includes tools like adobe Photoshop T/F

A

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
99
Q

Course management software creates a virtual learning experience for students and houses course material, tests, and discussion boards T/F

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
100
Q

When you subscribe to software, no license is necessary T/F

A

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
101
Q

a macro is a program release early to the public for testing and evaluation

A

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
102
Q
Which is NOT an example of a mobile operating system?
a) iOS
]b) Windows 10
c) Android
d) macOS
A

d)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
103
Q

You’re most likely to find an RTOS

a) on an iPad
b) in a robotic camera
c) on a supercomputer
d) on a mainframe

A

b)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
104
Q

OS’s that have windows and icons have which type of user interface?

a) comand-driven
b) menu-driven
c) graphical
d) magnetic tape-base

A

c)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
105
Q

The OS can optimize RAM storage by using

a) virtual memory
b) thrashing
c) an interrupt handler
d) a spooler

A

a)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
106
Q

BIOS stands for

a) bundled input-output software
b) billable input-output service
c) basic input-output system
d) basic in order services

A

c)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
107
Q

The process of adding a windows 10 app to the Start menu is known as

a) clipping
b) pinning
c) visualizing
d) screening

A

b)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
108
Q

what windows app used for locating files and folders is

a) disk manager
b) finder
c) library explorer
d) file explorer

A

d)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
109
Q

Which view in File explorer can you use to sort files by column heading

a) details
b) small icons
c) tiles
d) large icons

A

a)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
110
Q

Which of the following is used to reduce the file size of a file or folder

a) defragmenter
b) extraction
c) compression
d) shrinker

A

c)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
111
Q

Which utility is used to exit from a nonresponsive program

a) system refresh
b) disk cleanup
c) task manager
d) file explorer

A

c)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
112
Q

Which of the following would you NOT see on a Windows 10 start menu?

a) task view
b) power
c) apps list
d) tiles

A

a)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
113
Q

When an OS processes tasks in priority order, it is known as

a) preemptive interruption
b) interruptive multitasking
c) multitasking headling
d) preemptive multitasking

A

d)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
114
Q

An example of an open-source OS is

a) Linux
b) macOS
c) Windows
d) DOS

A

a)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
115
Q

Which of the following is not considered an accessibility utility?

a) magnifier
b) system restore
c) narrator
d) speech recognition

A

b)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
116
Q

Which of the following devices would use a real-time OS

a) iPhone
b) Roomba Vacuum
c) Microsoft Surface tablet
d) all of the above

A

b)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
117
Q

Device drivers are

a) are no longer used because of Plug and Play
b) often bundled with the OS
c) always installed from a CD
d) mapping programs to generate driving instructions

A

b)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
118
Q

a GUI user interface is special because

a) it uses a very small set of commands
b) the menus are organized well
c) there is a set of icons that represent the OS tasks
d) it uses voice commands to run tasks

A

c)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
119
Q

A feature in Windows 10 that is used to organized open windows into task-specific groups is called

a) program manager
b) virtual view
c) snap assist
d) virtual desktops

A

d)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
120
Q

When a printer receives a command it generates a unique signal to the OS, which is called a

a) interrupt
b) event
c) slice
d) non of the above

A

a)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
121
Q

The C: drive on a windows PC is like a large filling cabinet and is referred to as the

a) main directory
b) root directory
c) library directory
d) main path

A

b)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
122
Q

different versions of Linux are known as distros T/F

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
123
Q

Modern desktop operating systems are considered single-user multitasking OS T/F

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
124
Q

The power-on self-test ensures all peripheral devices are attached and operational T/F

A

T

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
125
Q

A system restore point can only be created by windows automatically on a regular schedule T/F

A

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
126
Q

Once files are placed in the Recycle Bin they cannot be recovered

A

F

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
127
Q

Moore’s law describes the pace at which ____ improve

a) RAM chips
b) clock cylces
c) CPU’s
d) cache modules

A

c)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
128
Q

Which of the following is a stage in the machine cycle?

a) fetch
b) calculate
c) decrypt
d) save

A

a)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
129
Q

CPU ____ are measurements used to compare performance between processors

a) RAM speeds
b) usage graphs
c) cache cycles
d) benchmarks

A

d)

130
Q

the limit to how much RAM you can add to your system

a) depends on the design of the motherboard
b) depends on the OS running on your system
c) depends on the amount of memory each memory card slot supports
d) all of the above

A

d)

131
Q

Adding RAM to your computer

a) won’t improve its performance
b) is not limited by the OS installed
c) is relatively easy for most people to do
d) is not limited by how much RAM the computer can accommodate

A

c)

132
Q

hard drives are classified as which type of storage?

a) volatile
b) GPU
c) nonvolatile
d) cache

A

c)

133
Q

when would you want to consider RAID 0 tech?

a) when you need the fastest solution for writing data
b) if you think that SSDs are too expensive
c) when you need an instant backup of your work
d) When you want to have only one hard disk drive

A

c)

134
Q

Your Windows computer can be brought to the state it was in before problems began occurring by using utility call Windows

a) return
b) refresh
c) reste this PC
d) reboot

A

c)

135
Q

Dolby Digital 7.1 creates

a) ultra-sharp high definition video
b) a digital signal from an audio input
c) seven-channel surround sound
d) eight-channel surround sound

A

d)

136
Q

Moore’s law refers to the

a) amount of memory on a memory chip
b) overall system processing capability
c) speed of DRAM
d) pace at which CPU’s improve

A

d)

137
Q

when the binary code is retrieved from RAM and moved to the CPU, this stage is known as

a) fetch
b) decode
c) store
d) execute

A

a)

138
Q

RAM is

a) volatile memory
b) nonvolatile memory
c) neither volatile nor nonvolatile memory
d) both volatile and nonvolatile memory

A

a)

139
Q

a good way to assess your CPU usage is to

a) check the performance tab of the task manager
b) listen for the sound of a spinning hard disk drive
c) check the number reported by the system defrag utility
d) feel the temperature of the CPU with your hand

A

a)

140
Q

______ is a set of strategies for using more than one drive in a system

a) a machine cycle
b) GPU
c) RAID
d) VPU

A

c)

141
Q

a special processing chip found on video cards is the

a) ROM
b) HDMI
c) CPU
d) GPU

A

d)

142
Q

if you want to use your computer for recording your band, you would benefit most from a

a) HDMI interface
b) MIDI interface
c) RAID interface
d) overclocking interface

A

b)

143
Q

before donating your Windows computer you should perform a windows

a) restore
b) refresh
c) reclaim
d) reset this PC

A

d)

144
Q

data can be retrieved fastest from

a) registers
b) cache memory
c) RAM
d) HDMI

A

a)

145
Q

windows create a “restore point” so that you can

a) return your system to the way it was before you installed new software
b) add additional hard disk storage space
c) extend your warrenty
d) protect your system from hackers

A

a)

146
Q

Desktop systems are invariably a better value than light, more mobile computers T/F

A

T

147
Q

conventional hard drives are preferable to SSD drives because they transfer data more quickly. T/F

A

F

148
Q

in windows, if you experience unreliable behaviour, try to system restore before doing a reset this PC T/F

A

T

149
Q

there is no limit to how much RAM you can add to a modern computer T/F

A

F

150
Q

Moore’s law describes the pace at which RAM modules improve T/F

A

F

151
Q

Which of the following transmission media is used most often for wired connections within a home

a) twisted-pair cable
b) coaxial cable
c) fiber-optic cable
d) unshielded twisted-pair cable

A

b)

152
Q

The type of network used for communication among a laptop and smartphone using Bluetooth is a

a) PAN
b) MAN
c) LAN
d) WAN

A

a)

153
Q

Which of the following is not part of a combined device that brings and distributes internet to home devices?

a) switch
b) modem
c) home network server
e) router

A

c)

154
Q

the fastest broadband internet service is usually

a) DSL
b) fiber-optic
c) cable
d) satellite

A

b)

155
Q

Which of the following needs a cellular plan to connect to the internet wirelessly?

a) wifi
b) 4G
c) DSL
d) mobile broadband

A

d)

156
Q

which is the central device to a home network?

a) modem/router
b) wired-connected PC
c) network range extender
d) network interface card

A

a)

157
Q

When planning a network, which devices should be considered?

a) only the computers that will have a wired connection
b) just the computers and printers that will have a wired connection
c) just PCs connected with a wired connection and any laptop or tablet connected wirelessly
d) all devices that will connect with a wired or wireless connection

A

d)

158
Q

which of the following might cause a potential problem on a wireless network?

a) devices too close to the router
b) interference from walls, floors, and large objects
c) a router using the wifi 5 standard
d) a unique password created for the network

A

b)

159
Q

Which of the following would help improve a wireless signal throughout a network?

a) network internet card
b) access point
c) network switch
d) wireless router

A

b)

160
Q

Which is a precaution to be taken when setting up a wireless network

a) disable the passphrase
b) keep the default network name
c) keep the default network password
d) use WPA2 encryption

A

d)

161
Q

Which of the following would not be a benefit of networking computers?

a) sharing an internet connection
b) sharing software licenses
c) sharing printers and other peripherals
d) sharing files

A

b)

162
Q

Bethany is in her home, watching a video she took on vacation, while her brother is playing FIFA soccer on his Xbox and her dad is checking stock quotes on his iPad. What kind of network does this family most likely have?

a) client/server network
b) P2P network
c) both a and b
d) neither a nor b

A

b)

163
Q

What two devices are often combined into one device to connect the network to the internet and to share the connection between devices on the network?

a) router hub and switch
b) switch and hub
c) router and switch
d) modem and router

A

d)

164
Q

Which of the following does NOT describe mobile broadband?

a) 4G or 5G
b) a cellular service that brings internet access to mobile devices
c) a wireless hotspot
d) requires a wireless ISP

A

d)

165
Q

Which of the following should you NOT do to secure a wireless network?

a) implement media access control
b) disable SSID broadcasting
c) create a security encryption passphrase
d) keep the default network name and router password

A

d)

166
Q

Which type of broadband internet offers connections nearing the speed of light?

a) cable
b) satellite
c) DSL
d) Fiber-optic

A

d)

167
Q

What is the type of broadband Internet in which the connection is degraded by adding multiple users?

a) DSL
b) fiber-optic
c) cable
d) satellite

A

c)

168
Q

Which of the following would NOT cause interference or poor connectivity between nodes on a wireless network?

a) concrete walls
b) a wireless extender
c) some appliances
d) nodes that are too far apart

A

b)

169
Q

Which of the following is the most secure security protocol used with routers?

a) WPA2
b) WPA
c) WEP2
d) WEP

A

a)

170
Q

The type of network that would be necessary to connect the networks of two college campuses would be

a) LAN
b) MAN
c) WAN
d) PAN

A

c)

171
Q

Which of the following describes fiber-optic broadband?

a) it uses strands of pure glass or plastic
b) it connects via an orbiting satellite
c) it connects with coaxial cable
d) speed drops as the distance from the main signal source increases

A

a)

172
Q

You can attach more than four wired devices to a network by using a switch T/F

A

F

173
Q

P2P networks require specialized network OS software T/F

A

T

174
Q

Actual data throughput is usually higher on wireless networks than on wired networks T/F

A

F

175
Q

A network-attached storage device is like a network-connected hard drive T/F

A

T

176
Q

Cat 5e and Cat 6 are types of twisted-pair cable

A

T

177
Q

An analog signal is different from a digital signal because it

a) is easier to transmit
b) has only specific discrete values
c) is easier to duplicate
d) is continuous

A

d)

178
Q

____ are specialized devices designed for reading e-books

a) e-tablets
b) e-readers
c) DBDs (digital book devices)
d) digitized readers

A

b)

179
Q

the number of times the analog wave is measured each second when digitized music is the

a) MP3 rate
b) bit rate
c) sampling rate
d) DRM rate

A

c)

180
Q

Digital cameras capture images using

a) digital film
b) DRM sensors
c) LEDs
d) charge-coupled devices arrays (CCD)

A

d)

181
Q

Which of the following is TRUE about the Deep web and the dark web

a) the two terms mean the same thing
b) the dark web is part of the deep web
c) the deep web is part of the dark web
d) they are both dangerous places you should avoid

A

b)

182
Q

Which of the following is considered intellectual property?

a) a song
b) a sculpture
c) a movie
d) all

A

d)

183
Q

Copyright

a) protects you from having others use your work
b) is a term for a set of licensing plans
c) legalizes unlimited copying of digital music
d) all of the above

A

a)

184
Q

When is posting a picture on social media considered copyright infringement

a) when you don’t own the copyright to the photo
b) when you don’t have permission from the copyright holder to post the photo
c) neither A nor B
d) both A and B

A

d)

185
Q

Fake news is?

a) illegal under US civil law
b) a type of hoax
c) not unethical
d) not a big problem on social media

A

b)

186
Q

altering a picture so that it doesn’t reflect the reality of what is being shown is known as

a) digital interpretation
b) pixel manipulation
c) digital manipulation
d) digital intervention

A

c)

187
Q

the combination of media, internet, entertainment, and phone services into a single device illustrates the principle of

a) digital collusion
b) digital cohesion
c) digital combination
d) digital convergence

A

d)

188
Q

which of the following is an OPEN electronic publishing format

a) PDF
b) azw
c) ePub
d) SMS

A

c)

189
Q

When analog data is measured and converted to a stream of numerical values, this is referred to as ____ the data

a) compressing
b) streamlining
c) digitizing
d) upstreaming

A

c)

190
Q

Reducing the sampling rate when digitizing a file has which effect on the file

a) it increases the file size
b) it decreases the file size
c) it neither increases no decreases file size
d) it depends on the codec used to digitize the file

A

b)

191
Q

which of the following does NOT determine the quality of a digital image

a) resolution of the camera
b) image sensor size
c) file format and compression used
d) the number of pixels in the camera lens

A

d)

192
Q

which of the following is NOT a digital video file format

a) MPEG-4
b) PDF
c) AVI
d) WMV

A

b)

193
Q

Which of the following is NOT a category of intellectual property?

a) Copyright
b) Imprint
c) Patent
d) Trade dress

A

b)

194
Q

Using copyrighted works without permission of the copyright holder

a) is never possible
b) is possible under the “fair use” doctrine
c) only applies to proprietary software
d) is only possible for photographs of public places

A

b)

195
Q

A type of journalism where stories are invented and intended to spread misinformation rather than being factual is known as

a) a public domain tale
b) a persistence of information story
c) fake news
d) an urban legend

A

c)

196
Q

it is important to maintain your online reputation

a) because of the persistence of information
b) because employers often review social media before hiring employees
c) to ensure information about you is accurate
d) all of the above

A

d)

197
Q

analog signals are continuous T/F

A

T

198
Q

plagiarism is technically not illegal in the united states T/F

A

F

199
Q

Digital rights management (DRM) is a system of access control that allows only limited use of material T/F

A

T

200
Q

copyright lasts for only 50 years in the united states T/F

A

F

201
Q

Copying a music CD and giving it to a friend is “fair use” T/F

A

F

202
Q

when a hacker steals personal info with the intent of impersonating another individual to commit fraud, it is known as

a) impersonation theft
b) identity theft
c) scareware theft
d) malware theft

A

b)

203
Q

an attack that renders a computer unable to respond to the legitimate user because it is being bombarded with data requests is known as a ____ attack

a) stealth
b) backdoor
c) denial-of-service
d) scareware

A

c)

204
Q

some spyware catches your private information by using

a) a spam filter
b) botnets
c) a keystroke logger
d) a data breach

A

c)

205
Q

a series of commands that are executed without our knowledge is a typical attribute of a ____ virus

a) script
b) boot-sector
c) time bomb
d) encryption

A

a)

206
Q

software that pretends your computer is infected with a virus to entice you into spending money on a solution is known as

a) trackingware
b) spyware
c) adware
d) scareware

A

d)

207
Q

firewalls work by closing ____ in your computer

a) software gap
b) logical ports
c) logical doors
d) backdoors

A

b)

208
Q

antivirus software looks for ____ to detect viruses in files

a) virus signature
b) virus artifacts
c) virus bots
d) virus CPNs

A

a)

209
Q

____ involve using a physical attribute such as a fingerprint for authentication

a) backdoors
b) biometrics
c) rootkits
d) trojan horses

A

b)

210
Q

when you are surfing the web anonymously

a) the sites you visit are not stored in the browser history
b) temporary files created are immediately deleted
c) you are using a browser that has privacy tools
d) all of the above

A

d)

211
Q

once you encrypt your SD card, those files

a) are illegal
b) are compressed and can be stored in less space
c) cannot be read if the SD card is put in another phone
d) are backed up

A

c)

212
Q

when someone uses your personal info to pose as you this is

a) identity theft
b) white-hat hacking
c) cybersecurity
d) a backdoor rootkit

A

a)

213
Q

viruses that load from USB drives left connected to computers when computers are turned on are known as

a) script viruses
b) polymorphic viruses
c) encryption viruses
d) boot-sector viruses

A

d)

214
Q

a packet analyzer is called a sniffer because

a) it filters out spam
b) it starts a denial-of-service attack
c) it captures and reads data inside each packet
d) it detects high-speed transmissions

A

c)

215
Q

computer viruses can be spread by

a) sharing the flash drive
b) downloading and running a file attached to an email
c) downloading a song from a peer-to-peer sharing site
d) all of the above

A

d)

216
Q

A ___ is a program that takes complete control of your computer without your knowledge

a) botnet
b) rootkit
c) VPN
d) sniffer

A

b)

217
Q

a backup of all the data files on your computer can be managed easily using the windows 10 ____ utility

a) windows defender
b) file history
c) windows update
d) recovery

A

b)

218
Q

authentication techniques that rely on personal biological traits are called

a) trojan horses
b) scanner
c) botnets
d) biometrics

A

d)

219
Q

a surge protector may look like just another power strip but it also can

a) detect viruses
b) prevent theft
c) save your device if a voltage spike is sent through the electrical system
d) help manage heat

A

c)

220
Q

firewalls use a process of _____ to assign IP addresses to the devices internal to the network so hackers will not know what they are

a) packet filtering
b) port blocking
c) VPN
d) network address translation (NAT)

A

d)

221
Q

a 32-character password is an example of using biometrics T/F

A

F

222
Q

your social security number should never be shared on a website, in an email, or through messaging T/F

A

T

223
Q

Sending emails to lure people into revealing personal info is a technique known as phishing T/F

A

T

224
Q

encrypting data is not an appropriate measure for mobile devices such as smartphones T/F

A

F

225
Q

virtual private networks make it just as secure to send info across a public network as it is on a secure private network T/F

A

T

226
Q

custom-built mini-programs that can execute a complicated series of commands in a tool like Microsoft Word or excel are called

a) executables
b) compilers
c) macros
d) debuggers

A

c)

227
Q

a flow chart is used for

a) visually documenting an algorithm
b) locating runtime errors in code
c) developing the relationships between classes
d) compiling source code

A

a)

228
Q

the life cycle of a program begins with describing a problem and making a plan. Then PDLC requires

a) an algorithm
b) process, input, and output
c) data, info, and method
d) coding, debugging, and testing

A

c)

229
Q

in object-oriented analysis, classes are defined by

a) objects and data
b) operators and objects
c) data and methods
d) behaviors and keywords

A

c)

230
Q

compiling a program turns

a) top-down design into object-oriented design
b) source code into an executable program
c) a first-generation; language into a fourth-generation language
d) none of the above

A

b)

231
Q

Rapid application development (RAD) encourages developers to

a) use an integrated debugging environment
b) write code in visual programming languages
c) create code that executes as fast as possible
d) create a prototype first during the development of a system

A

d)

232
Q

selecting the right programming language for a project depends on

a) who you have working for you and what they know
b) the final requirement for performance and space used
c) the environment of the finished project
d) all of the above

A

d)

233
Q

which is NOT an advantage of Java?

a) Java is architecture neutral
b) Java needs to compile only once prior to distribution
c) Java performs faster than C++
d) Java supports network communication

A

c)

234
Q

Which is TRUE about XML?

a) XML supports the development of rich multimedia
b) XML enables designers to define their own data-based tags
c) XML makes it possible to update web pages without refreshing
d) XML has classes that represent drop-down lists and other web elements

A

b)

235
Q

There is no one “perfect” language for programming because

a) visual programming is more elegant
b) programmers enjoy learning many different languages
c) it’s easier to maintain a software system if it uses many different languages
d) forcing a language to be general-purpose also forces it to become inefficient

A

d)

236
Q

You need to know how to program to

a) create animations in PowerPoint
b) create unique software solutions for specialized problems
c) use Microsoft Word to type text and select various fonts
d) open a template file for budgeting in Microsoft Excel

A

b)

237
Q

What is the first step of the SDLC?

a) design
b) analysis
c) development
d) problem identification

A

d)

238
Q

The steps of the program development life cycle start with

a) algorithm development
b) coding
c) describing the problem
d) testing

A

c)

239
Q

The first step when using the object-oriented design is to

a) identify all of the categories of inputs that are part of the problem
b) break down the problem into a series of high-level tasks
c) identify which control structures are needed
d) select the data types that need to be used to solve the problem

A

a)

240
Q

An IDE is a tool that has support for

a) editing and debugging
b) flowcharting and creating the project specification
c) releasing updates to the public
d) scope creep

A

a)

241
Q

Which of the following are common to all programming languages?

a) Architecture neutrality
b) Syntax, keywords, and operators
c) SDLC and PDLC
d) JSON and APIs

A

b)

242
Q

In selecting the most appropriate language it is useful to know

a) how quickly the final code must run
b) how much space the final cod delivered can occupy
c) if there is a specific target environment (say, a specific OS)
d) all of the above

A

d)

243
Q

Java is considered to be ARCHITECTURE NEUTRAL because it

a) can be recompiled to run on many CPUs
b) can run on many different generations of Windows
c) only needs to be compiled once and can run on many different CPUs
d) can run in any browser

A

c)

244
Q

The database programming language SQL stands for

a) Structured question Lingo
b) Structured Query Language
c) Selected Query Launch
d) Simple Quick Language

A

b)

245
Q

A logical error can be detected and repaired by the compiler T/F

A

F

246
Q

An RTM version of the software is often released so users can help debug it T/F

A

F

247
Q

AJAX allows you to create websites that can refresh without the user taking an action T/F

A

T

248
Q

Their-generation programming languages include Java, C, and FORTRAN T/F

A

F

249
Q

many programming languages are moving away from the object-oriented paradigm T/F

A

F

250
Q

two lists showing different values for the same data in different places of a database is an example of

a) data redundancy
b) data disparity
c) data irregularity
d) data inconsistency

A

d)

251
Q

which of the following is a TRUE statement when considering using relational databases instead of flat databases

a) data can be easily shared among users
b) data-entry errors can be minimized with databases
c) data integrity can be ensured with a database
d) all of the above

A

d)

252
Q

Which type of relationship should be used to connect a password table to a user account table?

a) one-to-many relationship
b) one-to-one relationship
c) many-to-many relationship
d) one-to-noe relationship

A

b)

253
Q

Which type of database organizes data by measure and feature attributes?

a) multidimensional database
b) relational database
c) object-oriented database
d) all of the above

A

a)

254
Q

The field that has a unique entry for each record in a database table is called

a) foreign key
b) logical key
c) primary key
d) master field

A

c)

255
Q

Which best describes a data warehouse?

a) a building that stores computer servers
b) a collection of all the data from an organization’s database
c) a software program that assists with file management
d) a database that organizes data from multiple organizations

A

d)

256
Q

After data has been extracted and transformed it is held in an intermediate storage area called

a) a transaction processing center
b) an online analytical processing area
c) data staging
d) a data scrubbing area

A

c)

257
Q

The process by which great amounts of data are analyzed and investigated is known as

a) clustering
b) data staging
c) online analytical processing
d) data mining

A

d)

258
Q

a system that is designed to help keep track of everyday business activities is a

a) transaction-processing system
b) management information system
c) decision support system
d) enterprise resource planning system

A

a)

259
Q

Natural language processing systems, artificial intelligence, and expert systems are all types of which larger type of database system

a) business intelligence system
b) decision support system
c) knowledge-base system
d) voice management system

A

c)

260
Q

When is a flat database sufficient to use when organizing data?

a) When the data needs to be organized into two or more tables
b) When the data is simple and can be organized in one table
c) When more than one person needs to access the data
d) When the data includes video and audio

A

b)

261
Q

A customer information table linked to a password table in a business database reflects which type of relationship?

a) one-to-many
b) many-to-one
c) many-to-many
d) one-to-one

A

a) customer can have more than one password

262
Q

A process to ensure that data in a database is organized most efficiently is called

a) centralization
b) data staging
c) normalization
d) integration

A

c)

263
Q

which of the following is NOT considered metadata?

a) data type
b) database name
c) field name
d) field size

A

b)

264
Q

Data captured as users navigate through a website is called

a) staged data
b) web-user data
c) time-variant data
d) clickstream data

A

d)

265
Q

The type of database that would be best to store and organize data with feature and measure attributes is which of the follows

a) object-oriented database
b) relational database
c) multidimensional database
d) knowledge-based database

A

a)

266
Q

Which of the following is used to create a subset of data that matches certain criteria and that can be saved for future reference or use?

a) relationship
b) query
c) request
d) filter

A

d)

267
Q

Unnecessary duplication of data in a database is referred to as

a) data redundancy
b) normalized data
c) validated data
d) data inconsistency

A

a)

268
Q

Which of the following is a method of inputting data into a transaction-processing system while the transaction is taking place?

a) batch processing
b) input processing
c) real-time processing
d) click data processing

A

c)

269
Q

a field labeled PHONE that accepts data such as (610) 555-1212 would use the Number of data types T/F

A

F

270
Q

A filter is used to create a temporary subset of data from a database T/F

A

T

271
Q

A small slice of a data warehouse is called a data mine T/F

A

F

272
Q

Data warehouses capture data only form one time period T/F

A

F

273
Q

A primary key is used to uniquely identify records T/F

A

T

274
Q

which of the following is NOT an advantage of installing a network in a business?

a) enables peripheral sharing
b) decentralization of files and data
c) enables software sharing
d) centralization of files and data

A

b)

275
Q

Why aren’t the client/server network usually installed in the home?

a) security is weaker on client/server networks than on P2P networks
b) Client/server networks aren’t scalable enough for home networks
c) client/server networks are too complex for most home networks
d) client/server networks can’t share peripherals

A

c)

276
Q

A network consisting of nodes covering a small geographic area is a

a) PAN
b) WAN
c) MAN
d) LAN

A

d)

277
Q

A ____ server is a repository for shared computer programs accessed by client computers

a) authentication
b) database
c) communications
d) application

A

d)

278
Q

A ____ is a set of rules for exchanging communications

a) blueprint
b) domain
c) topology
d) protocol

A

d)

279
Q

Fiber-optic cable most likely would be used in a business network when

a) saving money is more important than speed
b) the installation budget is very limited
c) very short cable runs are required
d) electrical or magnetic interference is present

A

d)

280
Q

Network adapters use ___ addresses to route data on an internal network

a) IP
b) authentication
c) MAC
d) data collision

A

c)

281
Q

On client/server networks, routers

a) transfer data between two networks
b) move data efficiently from node to node on the internal network
c) route data between two collision domain on a single network
d) are necessary only in networks using the ring topology

A

a)

282
Q

NOS software is needed

a) only if a communications server is deployed on a client/server network
b) only on the servers in a client/server network
c) on all computers in a client/server network
d) only when configuration a network in a star topology

A

c)

283
Q

Which of the following is NOT used to increase security on a client/server network?

a) firewall
b) bastion host
c) switch
d) screening router

A

c)

284
Q

Which of the following is an advantage of installing a client/server network in a business?

a) centralization of network adapters
b) decentralization of peripherals
c) decentralization of files and data
d) sharing of peripherals

A

a)

285
Q

on client/server networks, more users can be added without affecting the performance of other nodes. This is known as network

a) scalability
b) decentralization
c) topology
d) flexibility

A

a)

286
Q

Which server would a client/server network include to ensure only authorized users are logging onto the network?

a) cloud
b) communications
c) authentication
d) application

A

c)

287
Q

Which of the following is a private network set up by a business that’s used exclusively by a select group of employees and suppliers?

a) WAN
b) VPN
c) PAN
d) intranet

A

d)

288
Q

Sometimes groups of data packets are sent together in a package called a

a) protocol
b) bridge
c) MAC
d) frame

A

d)

289
Q

Which of the following is NOT one of the factors used in multi-factor authentication?

a) inherence
b) identity
c) possession
d) knowledge

A

b)

290
Q

Which network cable type is most susceptible to signal interference?

a) UTP
b) STP
c) Coaxial
d) Fiber-optic

A

a)

291
Q

The process whereby users prove they have the authorization to use a computer network is known as

a) authentication
b) decentralization
c) proxy control
d) repudiation

A

a)

292
Q

Which is NOT a key component of a typical client/server network?

a) transmission media
b) network navigation devices
c) network interface card
d) bastion host

A

d)

293
Q

Routers are used to send data on a specific route through an internal network T/F

A

F

294
Q

An authentication server is used to host websites on a client/server network T/F

A

F

295
Q

Network adapters perform specific tasks to enable nodes to communicate on a network T/F

A

T

296
Q

most modern OS includes some type of NOS functionality T/F

A

T

297
Q

star topologies are the most widely used topology

A

T

298
Q

The internet is managed by

a) the US government
b) one one
c) the national science foundation
d) several nonprofit organizations

A

d)

299
Q

In the client/server model, clients are phones or computers and servers are computers

a) with software allowing you to make purchases
b) hosting web pages
c) that are storehouses for files
d) any of the above

A

d)

300
Q

Packet switching sends information between two points

a) by finding one route between the two points and sending the data
b) by breaking it into small chunks and sending the chunks across different routes
c) by encrypting the data, then sending it
d) differently for each company using it

A

b)

301
Q

the rise of the internet of things has meant

a) we need longer IP addresses than are available in IPv4
b) there are more machines with wireless network adapters
c) light bulbs can join your wifi network at home
d) all of the above

A

d)

302
Q

the section of your hard drive that stores frequently accessed web pages and IP addresses is the

a) internet cache
b) DNS
c) XML
d) root directory

A

a)

303
Q

JSON, JavaScript Object Notions, is useful because it

a) allows web services to exchange information
b) uses OpenPGP to encrypt data
c) makes the document Object Model usable in HTML
d) in hexadecimal codes that execute quickly on computers

A

a)

304
Q

Cascading style sheets allow you to quickly change

a) from server-side processing to client-side processing
b) the rules for applying formatting to an HTML document
c) to a more secure transport protocol
d) from HTML to XML

A

b)

305
Q

JavaScript

a) is the same language as Java
b) is commonly used to make HTML documents more dynamic
c) is obsolete
d) provides high-level security for email

A

b)

306
Q

A server-side program

a) lives on the user’s computer
b) is a combination of HTML and secure sockets layer (SSL)
c) can require many different communication sessions between client-server
d) defines every item on a web page

A

b)

307
Q

a key pair is a set of two keys you use to

a) encrypt and decrypt an email message
b) open doors into websites so you can pass through a firewall
c) execute a CSS script
d) attach a photo to an email message

A

a)

308
Q

the internet is primarily funded by

a) your state income taxes
b) voluntary contributions
c) your federal income taxes
d) google

A

c)

309
Q

The collection of large national and international networks used to establish the internet is called the

a) internet backbone
b) highway system
c) OC
d) T1

A

a)

310
Q

The info in a data packet includes

a) the data and circuit identifier
b) the data and the destination
c) just the data
d) different types of info depending on the type of message being sent

A

b) just like an amazon package

311
Q

IPv6 uses 128 bits to assign a

a) data packet to each transmission
b) memory address to the CPU
c) destination internet address to each email
d) address to every device connected to the internet

A

d)

312
Q

HTTPS is different than HTTP because

a) of how it transforms or reformates the data
b) it extracts data from the source database
c) it is a combination of HTTP and the Secure Sockets Layer (SSL)
d) it stores data in the data warehouse

A

c)

313
Q

A private key is important

a) to reboot system hardware
b) to reset your public key if you lose a password
c) because it enables you to use MIME
d) to decode an encrypted message

A

d)

314
Q

Encryption is used to

a) shrink the amounts of space it takes to store email
b) code your email so only one person can decipher it
c) transfer email more quickly
d) make shopping on the internet more available

A

b)

315
Q

An applet is

a) a program distributed by Apple Inc
b) a small app located on a server computer
c) a hardware device that encrypts email messages
d) a programming language used to help create a dynamic web page

A

b)

316
Q

SMTP is the set of rules used to

a) shrink the amount of space it takes to store email
b) send an email along the internet to its destination
c) encrypt email messages
d) make shopping on the internet more avaliable

A

b)

317
Q

the set of instructions that define how to display the HTML elements in your site is

a) XML
b) CSS
c) AJAX
d) PHP

A

b)

318
Q

If you use an internet cache, then the info displayed in your browser is automatically refreshed T/F

A

F

319
Q

Your internet service provider has a default DNS server to translate a URL into an IP address

A

T

320
Q

IM is secure because of the type of encryption used

A

F

321
Q

MIME is the protocol that supports sending files as email attachments T/F

A

T

322
Q

The term ‘dotted quad’ means you have four dots in a row in your Java Source code T/F

A

F