1. In a survey of more than 500 companies and government agencies, ____________ percent detected computer security breaches.
A. 20
B. 75
C. 85
D. 99
Answer: C
A. 20
B. 75
C. 85
D. 99
Answer: C
2. The survey showed that these businesses lost more than ____________ due to security breaches.
A. $100,000 each
B. $377 million
C. five employees each
D. $1 million
Answer: B
A. $100,000 each
B. $377 million
C. five employees each
D. $1 million
Answer: B
3. The typical computer criminal is a(n):
A. young hacker.
B. trusted employee with no criminal record.
C. trusted employee with a long, but unknown criminal record.
D. overseas young cracker.
Answer: B
A. young hacker.
B. trusted employee with no criminal record.
C. trusted employee with a long, but unknown criminal record.
D. overseas young cracker.
Answer: B
4. The majority of computer crimes are committed by:
A. hackers.
B. insiders.
C. overseas criminals.
D. young teenage computer geniuses.
Answer: B
A. hackers.
B. insiders.
C. overseas criminals.
D. young teenage computer geniuses.
Answer: B
5. The common name for the crime of stealing passwords is:
A. spooling.
B. identity theft.
C. spoofing.
D. hacking.
Answer: C Reference: Theft by Computer
A. spooling.
B. identity theft.
C. spoofing.
D. hacking.
Answer: C Reference: Theft by Computer
6. Collecting personal information and effectively posing as another individual is known as the crime of:
A. spooling.
B. identity theft.
C. spoofing.
D. hacking.
Answer: B
A. spooling.
B. identity theft.
C. spoofing.
D. hacking.
Answer: B
7. Malicious software is known as:
A. badware.
B. malware.
C. maliciousware.
D. illegalware.
Answer: B
A. badware.
B. malware.
C. maliciousware.
D. illegalware.
Answer: B
8. A program that performs a useful task while simultaneously allowing destructive acts is a:
A. worm.
B. Trojan horse.
C. virus.
D. macro virus.
Answer: B Moderate
A. worm.
B. Trojan horse.
C. virus.
D. macro virus.
Answer: B Moderate
9. An intentionally disruptive program that spreads from program to program or from disk to disk is known as a:
A. Trojan horse.
B. virus.
C. time bomb.
D. time-related bomb sequence.
Answer: B
A. Trojan horse.
B. virus.
C. time bomb.
D. time-related bomb sequence.
Answer: B
10. In 1999, the Melissa virus was a widely publicized:
A. e-mail virus.
B. macro virus.
C. Trojan horse.
D. Time bomb.
Answer: A
A. e-mail virus.
B. macro virus.
C. Trojan horse.
D. Time bomb.
Answer: A
11. What type of virus uses computer hosts to reproduce itself?
A. Time bomb
B. Worm
C. Melissa virus
D. Macro virus
Answer: B
A. Time bomb
B. Worm
C. Melissa virus
D. Macro virus
Answer: B
12. The thing that eventually terminates a worm virus is a lack of:
A. memory or disk space.
B. time.
C. CD drive space.
D. CD-RW.
Answer: A
A. memory or disk space.
B. time.
C. CD drive space.
D. CD-RW.
Answer: A
13. When a logic bomb is activated by a time-related event, it is known as a:
A. time-related bomb sequence.
B. virus.
C. time bomb.
D. Trojan horse.
Answer: C
A. time-related bomb sequence.
B. virus.
C. time bomb.
D. Trojan horse.
Answer: C
14. A logic bomb that was created to erupt on Michelangelo’s birthday is an example of a:
A. time-related bomb sequence.
B. virus.
C. time bomb.
D. Trojan horse.
Answer: C
A. time-related bomb sequence.
B. virus.
C. time bomb.
D. Trojan horse.
Answer: C
15. What is the name of an application program that gathers user information and sends it to someone through the Internet?
A. A virus
B. Spybot
C. Logic bomb
D. Security patch
Answer: B
A. A virus
B. Spybot
C. Logic bomb
D. Security patch
Answer: B
16. Standardization of Microsoft programs and the Windows operating system has made the spread of viruses:
A. more complicated.
B. more difficult.
C. easier.
D. slower.
Answer: C
A. more complicated.
B. more difficult.
C. easier.
D. slower.
Answer: C
17. HTML viruses infect:
A. your computer.
B. a Web page in the HTML code.
C. both a Web page and the computer that is viewing it.
D. No
Answer: B
A. your computer.
B. a Web page in the HTML code.
C. both a Web page and the computer that is viewing it.
D. No
Answer: B
18. Software programs that close potential security breaches in an operating system are known as:
A. security breach fixes.
B. refresh patches.
C. security repairs.
D. security patches.
Answer: D
A. security breach fixes.
B. refresh patches.
C. security repairs.
D. security patches.
Answer: D
19. When customers of a Web site are unable to access it due to a bombardment of fake traffic, it is known as:
A. a virus.
B. a Trojan horse.
C. cracking.
D. a denial of service attack.
Answer: D
A. a virus.
B. a Trojan horse.
C. cracking.
D. a denial of service attack.
Answer: D
20. ___________ is the measurement of things such as fingerprints and retinal scans used for security access.
A. Biometrics
B. Biomeasurement
C. Computer security
D. Smart weapon machinery
Answer: A
A. Biometrics
B. Biomeasurement
C. Computer security
D. Smart weapon machinery
Answer: A
21. What is the most common tool used to restrict access to a computer system?
A. User logins
B. Passwords
C. Computer keys
D. Access-control software
Answer: B
A. User logins
B. Passwords
C. Computer keys
D. Access-control software
Answer: B
22. The most common passwords in the U.S. or Britain include all EXCEPT:
A. love.
B. Fred.
C. God.
D. 123.
Answer: D
A. love.
B. Fred.
C. God.
D. 123.
Answer: D
23. Hardware or software designed to guard against unauthorized access to a computer network is known as a(n):
A. hacker-proof program.
B. firewall.
C. hacker-resistant server.
D. encryption safe wall.
Answer: B
A. hacker-proof program.
B. firewall.
C. hacker-resistant server.
D. encryption safe wall.
Answer: B
24. The scrambling of code is known as:
A. encryption.
B. a firewall.
C. scrambling.
D. password-proofing.
Answer: A
A. encryption.
B. a firewall.
C. scrambling.
D. password-proofing.
Answer: A
25. If you want to secure a message, use a(n):
A. cryptology source.
B. encryption key.
C. encryption software package.
D. cryptosystem.
Answer: D Reference: How It Works: 10.2 Cryptography
A. cryptology source.
B. encryption key.
C. encryption software package.
D. cryptosystem.
Answer: D Reference: How It Works: 10.2 Cryptography
26. To prevent the loss of data during power failures, use a(n):
A. encryption program.
B. surge protector.
C. firewall.
D. UPS.
Answer: D
A. encryption program.
B. surge protector.
C. firewall.
D. UPS.
Answer: D
27. A(n) ____________ can shield electronic equipment from power spikes.
A. encryption program
B. surge protector
C. firewall
D. UPS
Answer: B
A. encryption program
B. surge protector
C. firewall
D. UPS
Answer: B
28. All of these are suggestions for safe computing EXCEPT:
A. don’t borrow disks from other people.
B. open all e-mail messages but open them slowly.
C. download shareware and freeware with caution.
D. disinfect your system.
Answer: B
A. don’t borrow disks from other people.
B. open all e-mail messages but open them slowly.
C. download shareware and freeware with caution.
D. disinfect your system.
Answer: B
29. Freeware ___________ encrypts data.
A. encryption
B. firewall software
C. PGP
D. private and public keys
Answer: C
A. encryption
B. firewall software
C. PGP
D. private and public keys
Answer: C
30. ____________ is defined as any crime completed through the use of computer technology.
A. Computer forensics
B. Computer crime
C. Hacking
D. Cracking
Answer: B
A. Computer forensics
B. Computer crime
C. Hacking
D. Cracking
Answer: B
31. Most computer systems rely solely on ___________ for authentication.
A. logins
B. passwords
C. encryption
D. lock and key
Answer: B
A. logins
B. passwords
C. encryption
D. lock and key
Answer: B
32. Creating strong computer security to prevent computer crime usually simultaneously helps protect :
A. privacy rights.
B. personal ethics.
C. the number of cookies downloaded to your personal computer.
D. personal space.
Answer: A
A. privacy rights.
B. personal ethics.
C. the number of cookies downloaded to your personal computer.
D. personal space.
Answer: A
33. Over ___________ was spent by businesses and government to repair problems in regard to Y2K.
A. 20 million dollars
B. 100 million dollars
C. 1 billion dollars
D. 100 billion dollars
Answer: D
A. 20 million dollars
B. 100 million dollars
C. 1 billion dollars
D. 100 billion dollars
Answer: D
34. What is a complex system that takes on nearly complete responsibility for a task eliminating the need for people, verification, or decision making?
A. Autonomous system
B. Missile defense auto-system
C. Smart weapon
D. Independent system
Answer: D
A. Autonomous system
B. Missile defense auto-system
C. Smart weapon
D. Independent system
Answer: D
35. Security procedures can:
A. will eliminate all computer security risk.
B. reduce but not eliminate risks.
C. are prohibitively expensive.
D. are inaccessible for the average home user.
Answer: B
A. will eliminate all computer security risk.
B. reduce but not eliminate risks.
C. are prohibitively expensive.
D. are inaccessible for the average home user.
Answer: B
Fill in the Blank:
36. The field of computer ____________ uses special software to scan hard drives of potential criminal suspects.
Answer: forensics Reference: Online Outlaws: Computer Crime Difficulty: Challenging
37. Computer ____________ often goes unreported because businesses fear negative publicity.
Answer: crime
Answer: forensics Reference: Online Outlaws: Computer Crime Difficulty: Challenging
37. Computer ____________ often goes unreported because businesses fear negative publicity.
Answer: crime
38. ____________ connections are the most frequent point of attack for Internet commerce.
Answer: Internet
Answer: Internet
39. ____________ is the most common form of computer crime.
Answer: Theft
Answer: Theft
40. A survey by eMarketer.com found that ____________ are the most often cited online fraud cases.
Answer: online auctions Reference: Identity Theft
Answer: online auctions Reference: Identity Theft
41. Theft of computers is most common for PDAs and ____________ computers.
Answer: notebook
Answer: notebook
42. When you use a disk in several different computers within the same day, you are taking the chance of contracting a(n) ____________.
Answer: virus Reference: Viruses Difficulty: Easy
Answer: virus Reference: Viruses Difficulty: Easy
43. A(n) ____________ attaches itself to documents that contain embedded programs that automate tasks.
Answer: macro virus
Answer: macro virus
44. Both viruses and ____________ use computer hosts to replicate.
Answer: worms
Answer: worms
45. ____________ programs search for and eliminate viruses.
Answer: Antivirus
Answer: Antivirus
46. A security patch is a software program that closes possible security breaches in the operating system. The cost to the consumer is ____________.
Answer: nothing or free
Answer: nothing or free
47. ____________ was once the word used for malicious computer wizardry.
Answer: Hackers or hacking
Answer: Hackers or hacking
48. ____________ refers to electronic trespassing or criminal hacking.
Answer: Cracking
Answer: Cracking
49. DoS stands for ___________.
Answer: denial of service
Answer: denial of service
50. DDoS stands for ___________.
Answer: distributed denial of service
Answer: distributed denial of service
51. ____________ hijack Web pages and redirect users to other sites.
Answer: Webjackers
Answer: Webjackers
52. ___________ software monitors and records computer transactions.
Answer: Audit-control
Answer: Audit-control
53. Each individual who uses a public key cryptosystem has ___________ keys.
Answer: two Reference: How It Works: 10.2 Cryptography
Answer: two Reference: How It Works: 10.2 Cryptography
54. PGP stands for ___________.
Answer: Pretty Good Privacy
Answer: Pretty Good Privacy
55. Most operating systems, including Windows XP, assign each user a unique ___________.
Answer: user identifier or user ID
Answer: user identifier or user ID
56. It should now be common knowledge that users should not open ___________ from e-mail recipients that the user does not know.
Answer: attachments
Answer: attachments
Matching:
57. Match the acts and centers with their purposes:
I. Computer Fraud and Abuse Act A. created by Attorney General Janet Reno in 1998
II. USA Patriot Act B. defines what kinds of communications are legal online
III. Digital Millennium Copyright Act C. created in 2001 as a response to the terrorist attacks of September 11, 2001
IV. Telecommunications Act of 1996 D. provides instant information on crimes and criminals
V. Communications Decency Act E. declared unconstitutional by the Supreme Court
VI. National Infrastructure Protection Center F. created as a result of the first headline-making worm
VII. National Crime Information Center G. used to arrest a student for writing to crack an Adobe product
Answers: F, C, G, B, E, A, D
I. Computer Fraud and Abuse Act A. created by Attorney General Janet Reno in 1998
II. USA Patriot Act B. defines what kinds of communications are legal online
III. Digital Millennium Copyright Act C. created in 2001 as a response to the terrorist attacks of September 11, 2001
IV. Telecommunications Act of 1996 D. provides instant information on crimes and criminals
V. Communications Decency Act E. declared unconstitutional by the Supreme Court
VI. National Infrastructure Protection Center F. created as a result of the first headline-making worm
VII. National Crime Information Center G. used to arrest a student for writing to crack an Adobe product
Answers: F, C, G, B, E, A, D
58. Match the following rules of thumb about safe computing with the proper descriptions:
I. share with care A. be aware of e-mail from what appear to be legitimate companies
II. handle e-mail carefully B. don’t choose a dictionary word
III. disinfect regularly C. keep your disks in your own computer
IV. take your password seriously D. copy, copy, copy
V. if it’s important, back it up E. encrypt
VI. sensitive info over the Internet? F. use antivirus software
Answers: C, A, F, B, D, E
I. share with care A. be aware of e-mail from what appear to be legitimate companies
II. handle e-mail carefully B. don’t choose a dictionary word
III. disinfect regularly C. keep your disks in your own computer
IV. take your password seriously D. copy, copy, copy
V. if it’s important, back it up E. encrypt
VI. sensitive info over the Internet? F. use antivirus software
Answers: C, A, F, B, D, E
1. All of the following are examples of real security and privacy risks EXCEPT:
A. hackers.
B. spam.
C. viruses.
D. identity theft.
Answer: B
A. hackers.
B. spam.
C. viruses.
D. identity theft.
Answer: B
2. A process known as ____________ is used by large retailers to study trends.
A. data mining
B. data selection
C. POS
D. data conversion
Answer: A
A. data mining
B. data selection
C. POS
D. data conversion
Answer: A
3. ____________terminals (formerly known as cash registers) are often connected to complex inventory and sales computer systems.
A. Data
B. Point-of-sale (POS)
C. Sales
D. Query
Answer: B
A. Data
B. Point-of-sale (POS)
C. Sales
D. Query
Answer: B
4. A(n) ____________ system is a small, wireless handheld computer that scans an item’s tag and pulls up the current price (and any special offers) as you shop.
A. PSS
B. POS
C. inventory
D. data mining
Answer: A
A. PSS
B. POS
C. inventory
D. data mining
Answer: A
5. The ability to recover and read deleted or damaged files from a criminal’s computer is an example of a law enforcement specialty called:
A. robotics.
B. simulation.
C. computer forensics.
D. animation.
Answer: C
A. robotics.
B. simulation.
C. computer forensics.
D. animation.
Answer: C
6. Which of the following is NOT one of the four major data processing functions of a computer?
A. gathering data
B. processing data into information
C. analyzing the data or information
D. storing the data or information
Answer: C
A. gathering data
B. processing data into information
C. analyzing the data or information
D. storing the data or information
Answer: C
7. ____________ tags, when placed on an animal, can be used to record and track in a database all of the animal’s movements.
A. POS
B. RFID
C. PPS
D. GPS
Answer: B
A. POS
B. RFID
C. PPS
D. GPS
Answer: B
8. Surgeons can perform delicate operations by manipulating devices through computers instead of manually. This technology is known as:
A. robotics.
B. computer forensics.
C. simulation.
D. forecasting.
Answer: A
A. robotics.
B. computer forensics.
C. simulation.
D. forecasting.
Answer: A
9. Technology no longer protected by copyright, available to everyone, is considered to be:
A. proprietary.
B. open.
C. experimental.
D. in the public domain.
Answer: A
A. proprietary.
B. open.
C. experimental.
D. in the public domain.
Answer: A
10. ____________ is the study of molecules and structures whose size ranges from 1 to 100 nanometers.
A. Nanoscience
B. Microelectrodes
C. Computer forensics
D. Artificial intelligence
Answer: A
A. Nanoscience
B. Microelectrodes
C. Computer forensics
D. Artificial intelligence
Answer: A
11. ____________ is the science that attempts to produce machines that display the same type of intelligence that humans do.
A. Nanoscience
B. Nanotechnology
C. Simulation
D. Artificial intelligence (AI)
Answer: D
A. Nanoscience
B. Nanotechnology
C. Simulation
D. Artificial intelligence (AI)
Answer: D
12. ____________ is data that has been organized or presented in a meaningful fashion.
A. A process
B. Software
C. Storage
D. Information
Answer: D
A. A process
B. Software
C. Storage
D. Information
Answer: D
13. The name for the way that computers manipulate data into information is called:
A. programming.
B. processing.
C. storing.
D. organizing.
Answer: B
A. programming.
B. processing.
C. storing.
D. organizing.
Answer: B
14. Computers gather data, which means that they allow users to ____________ data.
A. present
B. input
C. output
D. store
Answer: B
A. present
B. input
C. output
D. store
Answer: B
15. After a picture has been taken with a digital camera and processed appropriately, the actual print of the picture is considered:
A. data.
B. output.
C. input.
D. the process.
Answer: B
A. data.
B. output.
C. input.
D. the process.
Answer: B
16. Computers use the ____________ language to process data.
A. processing
B. kilobyte
C. binary
D. representational
Answer: C
A. processing
B. kilobyte
C. binary
D. representational
Answer: C
17. Computers process data into information by working exclusively with:
A. multimedia.
B. words.
C. characters.
D. numbers.
Answer: D
A. multimedia.
B. words.
C. characters.
D. numbers.
Answer: D
18. In the binary language each letter of the alphabet, each number and each special character is made up of a unique combination of:
A. eight bytes.
B. eight kilobytes.
C. eight characters.
D. eight bits.
Answer: D
A. eight bytes.
B. eight kilobytes.
C. eight characters.
D. eight bits.
Answer: D
19. The term bit is short for:
A. megabyte.
B. binary language.
C. binary digit.
D. binary number.
Answer: C
A. megabyte.
B. binary language.
C. binary digit.
D. binary number.
Answer: C
20. A string of eight 0s and 1s is called a:
A. megabyte.
B. byte.
C. kilobyte.
D. gigabyte.
Answer: B
A. megabyte.
B. byte.
C. kilobyte.
D. gigabyte.
Answer: B
21. A ____________ is approximately one billion bytes.
A. kilobyte
B. bit
C. gigabyte
D. megabyte
Answer: C
A. kilobyte
B. bit
C. gigabyte
D. megabyte
Answer: C
22. A ____________ is approximately a million bytes.
A. gigabyte
B. kilobyte
C. megabyte
D. terabyte
Answer: C
A. gigabyte
B. kilobyte
C. megabyte
D. terabyte
Answer: C
23. ____________ is any part of the computer that you can physically touch.
A. Hardware
B. A device
C. A peripheral
D. An application
Answer: A
A. Hardware
B. A device
C. A peripheral
D. An application
Answer: A
24. The components that process data are located in the:
A. input devices.
B. output devices.
C. system unit.
D. storage component.
Answer: C
A. input devices.
B. output devices.
C. system unit.
D. storage component.
Answer: C
25. All of the following are examples of input devices EXCEPT a:
A. scanner.
B. mouse.
C. keyboard.
D. printer.
Answer: D
A. scanner.
B. mouse.
C. keyboard.
D. printer.
Answer: D
26. Which of the following is an example of an input device?
A. scanner
B. speaker
C. CD
D. printer
Answer: A
A. scanner
B. speaker
C. CD
D. printer
Answer: A
27. All of the following are examples of storage devices EXCEPT:
A. hard disk drives.
B. printers.
C. floppy disk drives.
D. CD drives.
Answer: B
A. hard disk drives.
B. printers.
C. floppy disk drives.
D. CD drives.
Answer: B
28. The ____________, also called the “brains†of the computer, is responsible for processing data.
A. motherboard
B. memory
C. RAM
D. central processing unit (CPU)
Answer: D
A. motherboard
B. memory
C. RAM
D. central processing unit (CPU)
Answer: D
29. The CPU and memory are located on the:
A. expansion board.
B. motherboard.
C. storage device.
D. output device.
Answer: B
A. expansion board.
B. motherboard.
C. storage device.
D. output device.
Answer: B
30. Word processing, spreadsheet, and photo-editing are examples of:
A. application software.
B. system software.
C. operating system software.
D. platform software.
Answer: A
A. application software.
B. system software.
C. operating system software.
D. platform software.
Answer: A
31. ____________ is a set of computer programs used on a computer to help perform tasks.
A. An instruction
B. Software
C. Memory
D. A processor
Answer: B
A. An instruction
B. Software
C. Memory
D. A processor
Answer: B
32. System software is the set of programs that enables your computer’s hardware devices and ____________ software to work together.
A. management
B. processing
C. utility
D. application
Answer: D
A. management
B. processing
C. utility
D. application
Answer: D
33. The PC (personal computer) and the Apple Macintosh are examples of two different:
A. platforms.
B. applications.
C. programs.
D. storage devices.
Answer: A
A. platforms.
B. applications.
C. programs.
D. storage devices.
Answer: A
34. Apple Macintoshes (Macs) and PCs use different ____________ to process data and different operating systems.
A. languages
B. methods
C. CPUs
D. storage devices
Answer: C
A. languages
B. methods
C. CPUs
D. storage devices
Answer: C
35. Servers are computers that provide resources to other computers connected to a:
A. network.
B. mainframe.
C. supercomputer.
D. client.
Answer: A
A. network.
B. mainframe.
C. supercomputer.
D. client.
Answer: A
36. Smaller and less expensive PC-based servers are replacing ____________ in many businesses.
A. supercomputers
B. clients
C. laptops
D. mainframes
Answer: D
A. supercomputers
B. clients
C. laptops
D. mainframes
Answer: D
37. ____________ are specially designed computers that perform complex calculations extremely rapidly.
A. Servers
B. Supercomputers
C. Laptops
D. Mainframes
Answer: B
A. Servers
B. Supercomputers
C. Laptops
D. Mainframes
Answer: B
38. DSL is an example of a(n) ____________ connection.
A. network
B. wireless
C. slow
D. broadband
Answer: D
A. network
B. wireless
C. slow
D. broadband
Answer: D
39. The difference between people with access to computers and the Internet and those without this access is known as the:
A. digital divide.
B. Internet divide.
C. Web divide.
D. broadband divide.
Answer: A
A. digital divide.
B. Internet divide.
C. Web divide.
D. broadband divide.
Answer: A
40. ____________ is the science revolving around the use of nanostructures to build devices on an extremely small scale.
A. Nanotechnology
B. Micro-technology
C. Computer forensics
D. Artificial intelligence
Answer: A
A. Nanotechnology
B. Micro-technology
C. Computer forensics
D. Artificial intelligence
Answer: A
41. Which of the following is the correct order of the four major functions of a computer?
A. Process à Output à Input à Storage
B. Input à Outputà Process à Storage
C. Process à Storage à Input à Output
D. Input à Process à Output à Storage
Answer: D
A. Process à Output à Input à Storage
B. Input à Outputà Process à Storage
C. Process à Storage à Input à Output
D. Input à Process à Output à Storage
Answer: D
42. ____________ bits equal one byte.
A. Eight
B. Two
C. One thousand
D. One million
Answer: A
A. Eight
B. Two
C. One thousand
D. One million
Answer: A
43. The binary language consists of ____________ digit(s).
A. 8
B. 2
C. 1,000
D. 1
Answer: B
A. 8
B. 2
C. 1,000
D. 1
Answer: B
44. A byte can hold one ____________ of data.
A. bit
B. binary digit
C. character
D. kilobyte
Answer: C
A. bit
B. binary digit
C. character
D. kilobyte
Answer: C
45. ____________ controls the way in which the computer system functions and provides a means by which users can interact with the computer.
A. The platform
B. The operating system
C. Application software
D. The motherboard
Answer: B
A. The platform
B. The operating system
C. Application software
D. The motherboard
Answer: B
46. The operating system is the most common type of ____________ software.
A. communication
B. application
C. system
D. word-processing software
Answer: C
A. communication
B. application
C. system
D. word-processing software
Answer: C
47. ____________ are specially designed computer chips that reside inside other devices, such as your car or your electronic thermostat.
A. Servers
B. Embedded computers
C. Robotic computers
D. Mainframes
Answer: B
A. Servers
B. Embedded computers
C. Robotic computers
D. Mainframes
Answer: B
48. The steps and tasks needed to process data, such as responses to questions or clicking an icon, are called:
A. instructions.
B. the operating system.
C. application software.
D. the system unit.
Answer: A
A. instructions.
B. the operating system.
C. application software.
D. the system unit.
Answer: A
49. The two broad categories of software are:
A. word processing and spreadsheet.
B. transaction and application.
C. Windows and Mac OS.
D. system and application.
Answer: D
A. word processing and spreadsheet.
B. transaction and application.
C. Windows and Mac OS.
D. system and application.
Answer: D
50. The metal or plastic case that holds all the physical parts of the computer is the:
A. system unit.
B. CPU.
C. mainframe.
D. platform.
Answer: A
A. system unit.
B. CPU.
C. mainframe.
D. platform.
Answer: A
Fill in the Blank:-
51. Between PCs and Macs, the ____________ is the platform of choice for graphic design and animation.Answer: Mac
52. The ____________ is the program that manages the hardware of the computer system, including the CPU, memory, storage devices, and input/output devices.Answer: operating system
53. The type of operating system software you use depends on your computer’s ____________.Answer: platform
54. ____________software helps you carry out tasks, such as typing a document or creating a spreadsheet.Answer: Application
55. ____________are the fastest and most expensive computers.Answer: Supercomputers
56. A ____________ is approximately 1,000 bytes.Answer: kilobyte
57. Input devices are used to provide the steps and tasks the computer needs to process data, and these steps and tasks are called ____________.Answer: instructions
58. A computer gathers data, processes it, outputs the data or information, and ____________ the data or information.Answer: stores
59. The binary language consists of two digits: ____________ and ____________.Answer: 0 and 1
60. A string of ____________ 0s and 1s is called a byte.Answer: eight (8)
61. The devices you use to enter data into a computer system are known as ____________ devices.Answer: input
62. The devices on a computer system that let you see the processed information are known as ____________ devices.Answer: output
63. ____________ is the set of computer instructions or programs that enables the hardware to perform different tasks.Answer: Software
64. When you connect to the ____________, your computer is communicating with a server at your Internet service provider (ISP).Answer: Internet
65. ____________ are computers that excel at executing many different computer programs at the same time.Answer: Mainframes
66. ____________is the application of computer systems and techniques to gather legal evidence.Answer: Computer forensics
67. ____________ is the science that attempts to create machines that will emulate the human thought process.Answer: Artificial intelligence (AI)
68. Macintosh computers use the Macintosh operating system (Mac OS), whereas PCs generally run ____________ as an operating system.Answer: Microsoft Windows
69. A process known as ____________ tracks trends and allows retailers to respond to consumer buying patterns.Answer: data mining
70. Hard disk drives and CD drives are examples of ____________ devices.Answer: storage
71. You would use ____________ software to create spreadsheets, type documents, and edit photos.Answer: application
72. ____________ are computers that support hundreds or thousands of users simultaneously.Answer: Mainframes
73. ____________ is the term given to the act of stealing someone’s identity and ruining their credit rating.Answer: Identity theft
74. Surgeons are using ____________ to guide robots to perform delicate surgery.Answer: computers
75. Patient ____________ are life-sized mannequins that have a pulse and a heartbeat and respond to procedures just like humans.Answer: simulators
True and False
True and False
76. Currently, the performance of tasks by robots is based on preprogrammed algorithms.Answer: True
77. Data can be a number, a word, a picture, or a sound.Answer: True
78. Strictly defined, a computer is a data processing device.Answer: True
79. The discrepancy between the “haves†and “have-nots†with regard to computer technology is commonly referred to as the digital society.Answer: False (digital divide)
80. One of the benefits of becoming computer fluent is being a savvy computer user and consumer and knowing how to avoid viruses, the programs that posethreats to computer security.
Answer: True
Answer: True
81. Trend-spotting programs, developed for business, have been used to predict criminal activity.Answer: True
82. Employers do not have the right to monitor e-mail and network traffic on employee systems used at work.Answer: False
83. Clicking on an icon with the mouse is a form of giving an instruction to the computer.Answer: True
84. Output devices store instructions or data that the CPU processes.Answer: False (memory)
85. The CPU and memory are located on a special circuit board in the system unit called the motherboard.Answer: True
86. Nanostructures represent the smallest human-made structures that can be built.Answer: True
87. The main difference between a supercomputer and a mainframe is that supercomputers are designed to execute a few programs as quickly as possible,whereas mainframes are designed to handle many programs running at the same time (but at a slower pace).
Answer: True
Answer: True
88. Being computer fluent means that you should be able to build a computer yourself.Answer: False
89. Embedded computers are self-contained computer devices that have their own programming and do not receive input.Answer: True
90. A Web browser is a special device that is installed in your computer that allows it to communicate with other devices on a network.Answer: False (network adapter)
91. With a wireless network, it is easier to relocate devices.Answer: True
92. The most common type of memory that the computer uses to process data is ROM.Answer: False (RAM)
Matching:
93. Match the following terms with their approximate size:I. kilobyte A. one million bytes
II. byte B. eight bits
III. gigabyte C. one thousand bytes
IV. megabyte D. one billion bytes
V. terabyte E. one trillion bytes
Answer: C, B, D, A, E
II. byte B. eight bits
III. gigabyte C. one thousand bytes
IV. megabyte D. one billion bytes
V. terabyte E. one trillion bytes
Answer: C, B, D, A, E
94. Match the following terms with their meanings:I. printer A. storage device
II. scanner B. output device
III. RAM C. input device
IV. CPU D. a type of memory
V. CD drive E. processor
Answer: B, C, D, E, A
II. scanner B. output device
III. RAM C. input device
IV. CPU D. a type of memory
V. CD drive E. processor
Answer: B, C, D, E, A
95. Match the following terms with their meanings:I. mainframe A. the most expensive computers that perform complex calculations extremely rapidly
II. supercomputer B. a computer that provides resources to other computers connected to a network
III. embedded computer C. a large, expensive computer that supports hundreds or thousands of users simultaneously
IV. PDA D. a self-contained computer device that usually performs preprogrammed functions such as temperature control
V. server E. a small mobile computing device
Answer: C, A, D, E, B
II. supercomputer B. a computer that provides resources to other computers connected to a network
III. embedded computer C. a large, expensive computer that supports hundreds or thousands of users simultaneously
IV. PDA D. a self-contained computer device that usually performs preprogrammed functions such as temperature control
V. server E. a small mobile computing device
Answer: C, A, D, E, B
96. Match the following terms with their meanings:I. software A. transforming data into information
II. hardware B. data that has been organized or presented in a meaningful fashion
III. operating system C. any part of the computer that you can physically touch
IV. processing D. a set of computer programs that enables hardware to perform different tasks
V. information E. the most common type of system software, it controls the way in which the computer system functions
Answer: D, C, E, A, B
II. hardware B. data that has been organized or presented in a meaningful fashion
III. operating system C. any part of the computer that you can physically touch
IV. processing D. a set of computer programs that enables hardware to perform different tasks
V. information E. the most common type of system software, it controls the way in which the computer system functions
Answer: D, C, E, A, B
97. Match the following terms with their meanings:I. system software A. the set of programs that enables computer hardware devices and application software to work together
II. application software B. the kind of operating system software you will use depends on this
III. platform C. operating system software generally used on PCs
IV. Microsoft Windows D. a set of programs used to accomplish a specific task
V. Mac OS E. operating system software used on the Apple Macintosh
Answer: A, D, B, C, E
II. application software B. the kind of operating system software you will use depends on this
III. platform C. operating system software generally used on PCs
IV. Microsoft Windows D. a set of programs used to accomplish a specific task
V. Mac OS E. operating system software used on the Apple Macintosh
Answer: A, D, B, C, E
98. Match the following terms with their meanings:I. data A. the main circuit board in the system unit
II. memory B. the representation of a fact or idea (unprocessed information)
III. output C. processed data or information
IV. storage D. holds instructions or data that the CPU processes
V. motherboard E. data or information that can be accessed again
Answer: B, D, C, E, A
II. memory B. the representation of a fact or idea (unprocessed information)
III. output C. processed data or information
IV. storage D. holds instructions or data that the CPU processes
V. motherboard E. data or information that can be accessed again
Answer: B, D, C, E, A
99. Match the following terms with their meanings:I. bit A. the science revolving around the use of nanostructures to build devices on an extremely small scale
II. binary language B. the case that contains the system components
III. instructions C. consists of 0s and 1s
IV. system unit D. short for binary digit
V. nanotechnology E. steps and tasks necessary to process data into usable information
Answer: D, C, E, B, A
II. binary language B. the case that contains the system components
III. instructions C. consists of 0s and 1s
IV. system unit D. short for binary digit
V. nanotechnology E. steps and tasks necessary to process data into usable information
Answer: D, C, E, B, A
100. Match the following fields to the related computer technology:I. medicine A. Internet research and virtual tours
II. business B. data mining
III. law enforcement C. robotics and simulation
IV. education D. computer forensics
V. archeology E. digital recreations of ruins
Answer: C, B, D, A, E
II. business B. data mining
III. law enforcement C. robotics and simulation
IV. education D. computer forensics
V. archeology E. digital recreations of ruins
Answer: C, B, D, A, E
source : http://theonlinegk.wordpress.com
0 comments:
Post a Comment