SlideShare ist ein Scribd-Unternehmen logo
1 von 12
1) In which era were only the U.S. government, colleges, and
universities able to access the Internet?
a. 1960s b. 1970s c. 1980s d. 1990s
2) Application software includes all of the following EXCEPT
________ software.
a. word-processing b. Web browser c. system d. e-mail
3) Output refers to:
a. displaying the results of the processing operation so that
people can under stand it. b. information that needs further
computer activity in order to have meaning to people. c.
performing operations on the input data. d. sending the results
of computer processing to a permanent location.
4) Which of the following device types holds the programs and
data that the computer uses?
a. Communication devices b. Input devices c. Output
devices d. Storage devices
5) Which of the following is often considered the fi fth
operation in the informa- tion-processing cycle?
a. Communications b. E-commerce c. Ethics d. Analysis
6) Network computers have limited resources in all the
following areas EXCEPT:
a. storage. b. processing. c. memory. d. connectivity.
7) What type of systems are the ones on which human lives
depend?
a. Health-dependent b. Life-and-death-critical c. Safety-
critical d. Mission-critical
8) Which of the following safety-critical airline computer
systems requires the highest level of quality standards?
a. Reservation b. Passenger list and seating assignments c.
Passenger entertainment and communication d. Air traffi c
control
9) More than ________ computers, monitors, and TVs become
obsolete each year.
a. 10 million b. 100 million c. 10 billion d. 100 billion
10) What is a school’s code of conduct for computers users
called?
a. Computer usage agreement b. Acceptable use policy c.
Computer conduct agreement d. Associated usage principals
11) Which of the following would NOT be considered correct
netiquette?
a. Reading the Frequently Asked Questions (FAQ) document
posted on a mailing list prior to submitting a question b.
Avoiding slang and jokes in professional e-mail c. Using all
capital letters in an e-mail response d. Learning and using
Internet Relay Chat (IRC) abbreviations in the same way as
other users
12) Which of the following statements is TRUE concerning
computer games and violence?
a. The games industry has taken responsibility to minimize the
violence in their games. b. Computer games are becoming
more violent. c. Playing computer games led to the Columbine
tragedy. d. Computer games cause players to be more violent
and aggressive.
13) At the heart of every computer code of ethics is to:
a. eliminate all potential computer bugs. b. honor property
rights and individual privacy. c. avoid harm and protect human
life. d. fi ght software piracy.
14) Which of the following is NOT considered plagiarism?
a. Purchase a term paper from an Internet company and use it
as the basis of your own work for a college course. b. Paste
a paragraph of text from a Web page into an essay, but make
modifi ca- tions to it before submission as your homework
assignment. c. Use a quote from a public speech on your
history take-home exam, but cite the orator in your
bibliography. d. With his consent, copy your friend’s algebra
homework for submission to your math instructor.
15) Plagiarizing copyrighted material is also known as:
a. copyright theft. b. copyright piracy. c. unacceptable
copyright use. d. copyright infringement.
16) Which of the following activities is NOT permitted with a
shareware product?
a. Keep the software on your computer system beyond the trial
expiration date. b. Use the software during the trial period and
then delete it. c. Copy a trial version to give to your friend for
examination. d. Download the software from the Internet and
then install it on both your desk- top and laptop computers.
17) If software falls under the General Public License, it:
a. can only legally be copied on one PC. b. may be copied
and used freely. c. can be legally installed on one LAN. d.
may be copied to one PC then legally sold to another user.
18) Which of the following is NOT considered copyright
infringement with respect to a sound fi le?
a. Copying the song to a disk for your friend as encouragement
to buy the album b. Using a phrase of the music in a college
term paper as an example of a par- ticular musical style c.
Downloading the song to play at a party and then deleting it the
next day d. Using part of the song as a jingle on your company
Web site
19) Hypertext works by using:
a. objects. b. embedded commands. c. hypermedia. d.
hyperlinks.
20) The fi rst successful graphical Web browser was called:
a. Explorer. b. Netscape. c. Mozilla. d. Mosaic.
21) In a Web browser, the Refresh button is used to:
a. return to the home page. b. exit from the browser. c. go
back to the page previously viewed. d. obtain the latest content
of the page being viewed.
22) HTTP is best defi ned as a:
a. standard for the exchange of information on the Web. b.
markup language used to describe the format of Web pages. c.
programming language used to write Internet-related application
software. d. scripting language used to add dynamic content to
Web pages.
23) Which of the following is an example of a top-level domain
name?
a. www. b. ftp c. http:// d. .edu
24) What is the name of the path that houses the Web page in
the fictitious URL given below?
http://www.univ.edu/classroom/welcome.htm
a. welcome.htm b. classroom c. classroom/welcome.htm d.
www.univ.edu
25) In a URL which of the following identifi es the location of a
document on the server?
a. Domain b. Path c. Director d. Locator
26) What is the software called that goes about the Web
gathering URLs and information on their associated pages?
a. Seeker b. Searcher c. Snail d. Spider
27) Which of the following is most likely an e-mail address?
a.
http://www.mailer.com
b. Jane Doe c. mailbox.htm d.
[email protected]
28) Which type of e-commerce occurs when a business uses the
Internet to pro- vide services to another business?
a. B2B b. C2C c. B2C d. B2I
29) eBay transactions are examples of which type of e-
commerce?
a. C2C b. B2I c. B2C d. B2B
30) Which type of e-commerce occurs when a merchant uses the
Internet to sup- ply consumers with goods or services?
a. C2C b. C2I c. B2B d. B2C
31) Although Amazon.com now sells a variety of merchandise,
it originally:
a. sold airline tickets. b. sold books. c. rented hotel rooms.
d. conducted stock transactions.
32) Retailers that have both an online and traditional presence
are known as ________ retailers.
a. B2C b. click-and-brick c. brick-and-mortar d. brick-and-
click
33) Quicken and Microsoft Money Plus are commonly used to
assist in online:
a. auctions. b. stock trading. c. travel reservations. d.
banking.
34) E-trading began in:
a. 1996. b. 1999. c. 2002. d. 1990.
35) Online stock trading accounts for what part of all stock
trades?
a. One-tenth b. One-sixth c. Two-thirds d. Three-fourths
36) Bluetooth devices identify each other using ________ that
are unique to each device.
a. radio frequencies b. honing devices c. analog waves d.
identifi cation numbers
37) Because ________ is still NOT available in many areas,
direct broadcast satel- lite is a viable option.
a. broadband b. the public telephone system c. cabling d.
None of the above
38) Which of the following statements is NOT true about the
public switched telephone network (PSTN)?
a. PSTN uses subscriber loop carriers to link home and
business telephones. b. PSTN uses a variety of physical media,
including twisted-pair and fi ber-optic cable. c. PSTN is
exclusively an analog network. d. PSTN is a global network
used for both voice and data communications.
39) A local exchange switch of the PSTN is typically located:
a. on the side of a customer’s house. b. on a telephone pole at
the end of a block or small area. c. at a network access point
(NAP). d. in the local telephone company’s central offi ce.
40) ________ sends more than one call over a single line.
a. Splitting b. Multiplexing c. Converging d. Diverging
41) Approximately what percentage of U.S. households has
opted to disconnect their conventional landline telephones
and rely on cellular service only?
a. 10 b. 15 c. 25 d. 5
42) Which of the following is NOT a home networking
technology?
a. Wi-Fi b. Power-line c. Infrared d. Phone-line
43) What is the communications standard that specifi es how
physically connect- ed computers in a network send data?
a. Ethernet b. peer-to-peer c. RJ-45 d. Cat-5
44) Wi-Fi network access points are also referred to as:
a. points of presence. b. network interface points. c.
wireless access points. d. peer computer points.
45) Which of the following is NOT a step in setting up a home
network?
a. Confi guration b. Planning c. Maintenance and support
d. Wiring
46) A wired Ethernet network is best installed at what time?
a. After the networking equipment is purchased b. During
home construction c. Over a long weekend d. After home
construction
47) Which of the following is not a task in the confi guration
process?
a. Designating which PC s are part of the network b. Wiring
the network c. Designating how fi les, folders and peripherals
will be shared d. Installing the proper hardware and software
48) The best way to improve the performance of your computer
is to:
a. increase the size of the swap fi le so that you can use
variable pages. b. install more RAM in the computer because
the random access memory works faster than the hard disk.
c. increase the use of virtual memory because the paging
technique increases the speed of the memory. d. install a
larger hard disk in the computer so that you can store more
swap files.
49) Signals that inform the OS that something has happened are:
a. program defects. b. operating system diversions. c.
interrupts. d. drivers.
50) The following is an example of which type of user
interface? copy A:mypic.jpg c:mypic.jpg
a. Instruction-driven b. Directive-based c. Command-line
d. Menu-driven
51) Linux is an example of open source software, meaning:
a. it has to be confi gured to your computer system. b. the
software must be purchased from a vendor who markets
products on an open commercial Web site. c. the software
has not been perfected suffi ciently to be of professional value.
d. users can see and modify the source programming code.
52) Many CIOs shy away from adopting Linux because:
a. it has not been properly tested. b. it doesn’t have a stable
company behind it. c. it’s free. d. it’s powerful.
53) The UNIX operating system was developed by:
a. Apple. b. Microsoft. c. IBM. d. AT&T.
54) Folders are also known as:
a. groups. b. directories. c. repositories. d. fi les.
55) Given the fi le designator below, in which folder is the fi le
located? C:SpringComputerHomeworkAssg1.doc
a. Computer b. Homework c. Spring d. C:
56) Which of the following is NOT a storage device typically
found on desktop computers?
a. Hard drive b. Tape drive c. CD drive d. DVD drive
57) The second part of a fi le name on a PC is called the:
a. prefi x. b. domain. c. extension. d. suffi x.
58) A fi le with extension .xlsx is most likely a(n):
a. ASCII text fi le. b. Microsoft Excel fi le. c. Picture or
image fi le. d. Microsoft Access fi le.
59) Right-dragging a fi le between drives:
a. displays the task pane. b. copies the fi le. c. displays a
context-sensitive menu. d. moves the file.
60) Multimedia involves ________ or more media.
a. at least three b. ten c. four d. two
61) Which type of graphic is created by a drawing program?
a. Post Script b. bit-mapped c. raster d. Vector
62) Graphical MUDS serve which of the following purposes?
a. Compressing graphics for use in digital video b.
Decompressing graphics in preparation for displaying on the
Web c. Compressing graphics in preparation for displaying on
the Web d. Bringing the virtual environment to life in 3-D
graphical environments
63) If inserting the disk doesn’t automatically start the
installation process, you will need to click the Windows
________ button.
a. Explore b. Tools c. Start d. Install
64) Applications typically enable you to choose from a list of
________ that specify how you want the program to operate.
a. defaults b. confi gurations c. options d. packages
65) Which of the following programs is NOT included with the
Home and Student version of Microsoft Offi ce?
a. Access b. Excel c. PowerPoint d. Word
66) Which part of a Microsoft Offi ce application window
includes the Maximize, Minimize, and Close buttons?
a. Toolbar b. Status bar c. Task bar d. Title bar
67) Which part of a Microsoft Offi ce application window
includes information about the current document, such as a
page number or edit mode?
a. Toolbar b. Task pane c. Status bar d. Title bar
68) Which of the following is NOT a tab name found in the
Ribbon?
a. Insert b. Print c. Home d. View
69) Which type of Microsoft Access object would be useful if
you needed to de- sign an input screen through which a clerk
might enter data?
a. Query b. Table c. Form d. Report
70) Floating-point notation:
a. allows the computer to work with very large, but not very
small, numbers. b. uses no fi xed number of digits before or
after the decimal point. c. requires newer computers to have a
special chip called a math coprocessor. d. has no advantage if
used with numbers containing fractional points.
71) Which of the following would NOT be found on the
motherboard?
a. Microprocessor b. Drive bays c. Input/output buses d.
System clock
72) At the most granular level, the CPU interprets and
processes:
a. mathematical equations. b. comparisons. c. instructions.
d. Boolean operators.
73) Which subcomponent of the CPU takes instructions from
memory and de- codes and executes the instructions?
a. Data bus b. Microprocessor c. Control unit d.
Arithmetic-logic unit
74) Video circuitry that is built into the motherboard is called:
a. on-board video. b. a VGA connector. c. a video adapter.
d. a video card.
75) A(n) ________ can store more data than a CD and yet is
compatible with com- pact discs.
a. HiFD b. DVD c. RD d. BD
76) The quality and resolution of the display on the monitor is
determined by which component?
a. RAM b. Video card c. ROM d. Hard drive
77) What is another term for aperture grill?
a. Dot pitch b. LCD mask c. Electron mesh d. Raster
lattice
78) Which of the following is NOT true?
a. A laser printer is faster than an inkjet printer. b. The print
quality of a laser printer is better than an inkjet printer. c. The
operating cost of a laser printer is more than an inkjet printer.
d. The purchase price of a laser printer is more than an inkjet
printer.
79) What is the purpose of a UPS?
a. It provides a power source if electricity fails. b. It is the
primary power source for a notebook computer. c. It is an
alternate hard disk backup unit in case of hard disk failure. d.
It is a theft-protection system that disables your computer if
stolen.
80) Early speech recognition systems used what type of speech
recognition?
a. Expansive b. Limited c. Continuous d. Discrete
81) The ________ is a pattern of bars printed on merchandise
that stores informa- tion about the item.
a. EDI b. OMR c. MICR d. UPC
82) Which of the following is NOT a reason for using storage
rather than memory to hold data and information?
a. There are limitations to the size of RAM. b. Storage
devices traditionally have faster access times than RAM. c.
Storage devices are nonvolatile. d. Storage devices are
inexpensive compared to RAM.
83) Which of the following is NOT an example of a solid state
storage device?
a. Smart card b. Cache memory c. PC card d. Flash
memory card
84) What type of storage uses two laser beams to create a three-
dimensional im- age?
a. Graphical b. Integrated circuit c. Fiber optic d.
Holographic
85) The term MP3 is derived from the acronym:
a. MPAVI. b. MPEG. c. MPPP. d. MPJG.
86) Music on a CD is high quality because the music is sampled
________ times per second.
a. 11,025 b. 22,050 c. 44,100 d. 88,200
87) An MP3 fi le is about ________ the size of an uncompressed
fi le.
a. one-tenth b. one-fi fth c. one-fourth d. one-half
88) Which of the following is NOT a video codec?
a. MP3 b. QuickTime c. AVI d. MPEG
89) All of the following provide similar functions in a network
EXCEPT:
a. network operating systems. b. switches. c. routers. d.
wireless access points.
90) Some of the biggest P2P threats are from:
a. insuffi cient capacity. b. malware. c. poor confi guration.
d. NOS defects.
91) To carry computer data over the long haul, WANs need to
have a(n) ________ in multiple towns and cities.
a. router b. hub c. ISP d. POP
92) Which switching method is used by the public switched
telephone network (PSTN)?
a. Distributed b. Packet c. Parcel d. Circuit
93) Moore’s Law predicts that microprocessors and circuits will
double in circuit density every:
a. 6 months. b. 18 to 24 months. c. 5 years. d. decade.
94) According to Metcalfe’s Law, a network connecting fi ve
people has a value of:
a. 5. b. 10. c. 15. d. 25.
95) When considering the human brain as a CPU, in which area
is it the weakest?
a. Visual input b. Storage c. Mathematical calculations d.
Pattern matching
96) Machine translation programs are used to:
a. convert spoken words to text. b. convert text from one
language to another. c. translate code written in a high-level
language into machine language. d. convert scanned pictures
to graphic fi les.
97) Which organization has reported that many color laser
printers embed printer tracking dots on nearly every page at
the urging of the U.S. government?
a. Electronic Frontier Foundation b. National Printer Alliance
c. Patriot Organization d. National Counterfeit Tracking
Organization
98) The new emerging legal fi eld that tracks and combats
computer-related crimes is called:
a. Web law. b. cyberlaw. c. Web policing. d. Internet
crime fi ghting.
99) Many computer viruses are spread by:
a. LAN and WAN connected computers. b. CDs and DVDs.
c. e-mail attachments. d. software downloaded from the
Internet.
100) When Internet data appears to come from one place when
it’s really coming from another, this is known as:
a. forgery. b. blackmail. c. salami shaving. d. data
diddling.
1)   In which era were only the U.S. government, colleges, and unive.docx

Weitere ähnliche Inhalte

Ähnlich wie 1)   In which era were only the U.S. government, colleges, and unive.docx

Bis 219 final exam 1 2 3
Bis 219 final exam 1 2 3Bis 219 final exam 1 2 3
Bis 219 final exam 1 2 3
enersivard
 
1) Which of the following are Penetration testing methodology .docx
1) Which of the following are Penetration testing methodology  .docx1) Which of the following are Penetration testing methodology  .docx
1) Which of the following are Penetration testing methodology .docx
SONU61709
 
Bis 220 final exam university of phoenix final exams study guide 1 two info...
Bis 220 final exam  university of phoenix final exams study guide  1 two info...Bis 220 final exam  university of phoenix final exams study guide  1 two info...
Bis 220 final exam university of phoenix final exams study guide 1 two info...
Ninna Basley
 
1)Which of the following are Penetration testing methodology
1)Which of the following are Penetration testing methodology1)Which of the following are Penetration testing methodology
1)Which of the following are Penetration testing methodology
sandibabcock
 
Bis 220 final exam
Bis 220 final examBis 220 final exam
Bis 220 final exam
giquickly
 
Bis 220 final exam
Bis 220 final examBis 220 final exam
Bis 220 final exam
bubyslyke
 
Bis 220 final exam
Bis 220 final examBis 220 final exam
Bis 220 final exam
ginistays
 
Joji ilagan career center foundation8pre2
Joji ilagan career center foundation8pre2Joji ilagan career center foundation8pre2
Joji ilagan career center foundation8pre2
bluejayjunior
 
Bis 220 bis220 final exam correct 100%
Bis 220 bis220 final exam correct 100%Bis 220 bis220 final exam correct 100%
Bis 220 bis220 final exam correct 100%
sharing3444
 
Bis 220 bis220 final exam correct 100%
Bis 220 bis220 final exam correct 100%Bis 220 bis220 final exam correct 100%
Bis 220 bis220 final exam correct 100%
singup22
 
Bis 220 bis220 final exam correct 100%
Bis 220 bis220 final exam correct 100%Bis 220 bis220 final exam correct 100%
Bis 220 bis220 final exam correct 100%
largest433
 
Bis 220 bis220 final exam correct 100%
Bis 220 bis220 final exam correct 100%Bis 220 bis220 final exam correct 100%
Bis 220 bis220 final exam correct 100%
flyperhan
 
Mcq+questions+cxc+it
Mcq+questions+cxc+itMcq+questions+cxc+it
Mcq+questions+cxc+it
jimkana13
 

Ähnlich wie 1)   In which era were only the U.S. government, colleges, and unive.docx (20)

100 Computer MCQ.pdf
100 Computer MCQ.pdf100 Computer MCQ.pdf
100 Computer MCQ.pdf
 
Bis 219 final exam 1 2 3
Bis 219 final exam 1 2 3Bis 219 final exam 1 2 3
Bis 219 final exam 1 2 3
 
ICT MCQ.pptx
ICT MCQ.pptxICT MCQ.pptx
ICT MCQ.pptx
 
ICT MCQ.pptx
ICT MCQ.pptxICT MCQ.pptx
ICT MCQ.pptx
 
computer fundamental of_computer
computer fundamental  of_computercomputer fundamental  of_computer
computer fundamental of_computer
 
1) Which of the following are Penetration testing methodology .docx
1) Which of the following are Penetration testing methodology  .docx1) Which of the following are Penetration testing methodology  .docx
1) Which of the following are Penetration testing methodology .docx
 
Ictl t2 akhir tahun
Ictl t2   akhir tahunIctl t2   akhir tahun
Ictl t2 akhir tahun
 
Bis 220 final exam university of phoenix final exams study guide 1 two info...
Bis 220 final exam  university of phoenix final exams study guide  1 two info...Bis 220 final exam  university of phoenix final exams study guide  1 two info...
Bis 220 final exam university of phoenix final exams study guide 1 two info...
 
ICT 2nd QUARTER summative.pptx
ICT  2nd QUARTER summative.pptxICT  2nd QUARTER summative.pptx
ICT 2nd QUARTER summative.pptx
 
Com Ed 8 Prelim
Com Ed 8 PrelimCom Ed 8 Prelim
Com Ed 8 Prelim
 
1)Which of the following are Penetration testing methodology
1)Which of the following are Penetration testing methodology1)Which of the following are Penetration testing methodology
1)Which of the following are Penetration testing methodology
 
Bis 220 final exam
Bis 220 final examBis 220 final exam
Bis 220 final exam
 
Bis 220 final exam
Bis 220 final examBis 220 final exam
Bis 220 final exam
 
Bis 220 final exam
Bis 220 final examBis 220 final exam
Bis 220 final exam
 
Joji ilagan career center foundation8pre2
Joji ilagan career center foundation8pre2Joji ilagan career center foundation8pre2
Joji ilagan career center foundation8pre2
 
Bis 220 bis220 final exam correct 100%
Bis 220 bis220 final exam correct 100%Bis 220 bis220 final exam correct 100%
Bis 220 bis220 final exam correct 100%
 
Bis 220 bis220 final exam correct 100%
Bis 220 bis220 final exam correct 100%Bis 220 bis220 final exam correct 100%
Bis 220 bis220 final exam correct 100%
 
Bis 220 bis220 final exam correct 100%
Bis 220 bis220 final exam correct 100%Bis 220 bis220 final exam correct 100%
Bis 220 bis220 final exam correct 100%
 
Bis 220 bis220 final exam correct 100%
Bis 220 bis220 final exam correct 100%Bis 220 bis220 final exam correct 100%
Bis 220 bis220 final exam correct 100%
 
Mcq+questions+cxc+it
Mcq+questions+cxc+itMcq+questions+cxc+it
Mcq+questions+cxc+it
 

Mehr von corbing9ttj

1. Is a smile a universal nonverbal form of communication Why or wh.docx
1. Is a smile a universal nonverbal form of communication Why or wh.docx1. Is a smile a universal nonverbal form of communication Why or wh.docx
1. Is a smile a universal nonverbal form of communication Why or wh.docx
corbing9ttj
 
1. IntroductionWritten and Narrated by Professor Deni ElliottThe.docx
1. IntroductionWritten and Narrated by Professor Deni ElliottThe.docx1. IntroductionWritten and Narrated by Professor Deni ElliottThe.docx
1. IntroductionWritten and Narrated by Professor Deni ElliottThe.docx
corbing9ttj
 
1. IntroductionThe objective of this video is to introduce studen.docx
1. IntroductionThe objective of this video is to introduce studen.docx1. IntroductionThe objective of this video is to introduce studen.docx
1. IntroductionThe objective of this video is to introduce studen.docx
corbing9ttj
 
1. In the following sentence, which words are used as adjectivesT.docx
1. In the following sentence, which words are used as adjectivesT.docx1. In the following sentence, which words are used as adjectivesT.docx
1. In the following sentence, which words are used as adjectivesT.docx
corbing9ttj
 
1. In the song Tonight from the musical West Side Story, the compo.docx
1. In the song Tonight from the musical West Side Story, the compo.docx1. In the song Tonight from the musical West Side Story, the compo.docx
1. In the song Tonight from the musical West Side Story, the compo.docx
corbing9ttj
 
1. In many ways the underworld was considered dangerous, but there w.docx
1. In many ways the underworld was considered dangerous, but there w.docx1. In many ways the underworld was considered dangerous, but there w.docx
1. In many ways the underworld was considered dangerous, but there w.docx
corbing9ttj
 
1. In Jules Henry’s view, how are values and drives related to e.docx
1. In Jules Henry’s view, how are values and drives related to e.docx1. In Jules Henry’s view, how are values and drives related to e.docx
1. In Jules Henry’s view, how are values and drives related to e.docx
corbing9ttj
 
1. If I wanted to test a certain chemical to see if it made mice run.docx
1. If I wanted to test a certain chemical to see if it made mice run.docx1. If I wanted to test a certain chemical to see if it made mice run.docx
1. If I wanted to test a certain chemical to see if it made mice run.docx
corbing9ttj
 
1. Identify a community or aggregate you are currently involved wi.docx
1. Identify a community or aggregate you are currently involved wi.docx1. Identify a community or aggregate you are currently involved wi.docx
1. Identify a community or aggregate you are currently involved wi.docx
corbing9ttj
 
1. How many time zones are there across the world2. Which map wou.docx
1. How many time zones are there across the world2. Which map wou.docx1. How many time zones are there across the world2. Which map wou.docx
1. How many time zones are there across the world2. Which map wou.docx
corbing9ttj
 
1. How has the economic geography of this region changed over the .docx
1. How has the economic geography of this region changed over the .docx1. How has the economic geography of this region changed over the .docx
1. How has the economic geography of this region changed over the .docx
corbing9ttj
 
1. If you adopt the _______ perspective, youll reject an emphasis o.docx
1. If you adopt the _______ perspective, youll reject an emphasis o.docx1. If you adopt the _______ perspective, youll reject an emphasis o.docx
1. If you adopt the _______ perspective, youll reject an emphasis o.docx
corbing9ttj
 

Mehr von corbing9ttj (20)

1. Is a smile a universal nonverbal form of communication Why or wh.docx
1. Is a smile a universal nonverbal form of communication Why or wh.docx1. Is a smile a universal nonverbal form of communication Why or wh.docx
1. Is a smile a universal nonverbal form of communication Why or wh.docx
 
1. IntroductionWritten and Narrated by Professor Deni ElliottThe.docx
1. IntroductionWritten and Narrated by Professor Deni ElliottThe.docx1. IntroductionWritten and Narrated by Professor Deni ElliottThe.docx
1. IntroductionWritten and Narrated by Professor Deni ElliottThe.docx
 
1. IntroductionThe objective of this video is to introduce studen.docx
1. IntroductionThe objective of this video is to introduce studen.docx1. IntroductionThe objective of this video is to introduce studen.docx
1. IntroductionThe objective of this video is to introduce studen.docx
 
1. In the following sentence, which words are used as adjectivesT.docx
1. In the following sentence, which words are used as adjectivesT.docx1. In the following sentence, which words are used as adjectivesT.docx
1. In the following sentence, which words are used as adjectivesT.docx
 
1. In the song Tonight from the musical West Side Story, the compo.docx
1. In the song Tonight from the musical West Side Story, the compo.docx1. In the song Tonight from the musical West Side Story, the compo.docx
1. In the song Tonight from the musical West Side Story, the compo.docx
 
1. IT Diffusion Models Please respond to the followingReview th.docx
1. IT Diffusion Models Please respond to the followingReview th.docx1. IT Diffusion Models Please respond to the followingReview th.docx
1. IT Diffusion Models Please respond to the followingReview th.docx
 
1. In many ways the underworld was considered dangerous, but there w.docx
1. In many ways the underworld was considered dangerous, but there w.docx1. In many ways the underworld was considered dangerous, but there w.docx
1. In many ways the underworld was considered dangerous, but there w.docx
 
1. In Jules Henry’s view, how are values and drives related to e.docx
1. In Jules Henry’s view, how are values and drives related to e.docx1. In Jules Henry’s view, how are values and drives related to e.docx
1. In Jules Henry’s view, how are values and drives related to e.docx
 
1. If I wanted to test a certain chemical to see if it made mice run.docx
1. If I wanted to test a certain chemical to see if it made mice run.docx1. If I wanted to test a certain chemical to see if it made mice run.docx
1. If I wanted to test a certain chemical to see if it made mice run.docx
 
1. Identify a community or aggregate you are currently involved wi.docx
1. Identify a community or aggregate you are currently involved wi.docx1. Identify a community or aggregate you are currently involved wi.docx
1. Identify a community or aggregate you are currently involved wi.docx
 
1. Identify and describe the steps of the scientific method. Which o.docx
1. Identify and describe the steps of the scientific method. Which o.docx1. Identify and describe the steps of the scientific method. Which o.docx
1. Identify and describe the steps of the scientific method. Which o.docx
 
1. How many time zones are there across the world2. Which map wou.docx
1. How many time zones are there across the world2. Which map wou.docx1. How many time zones are there across the world2. Which map wou.docx
1. How many time zones are there across the world2. Which map wou.docx
 
1. How has society responded to coastal changes initiated by sand tr.docx
1. How has society responded to coastal changes initiated by sand tr.docx1. How has society responded to coastal changes initiated by sand tr.docx
1. How has society responded to coastal changes initiated by sand tr.docx
 
1. How has the economic geography of this region changed over the .docx
1. How has the economic geography of this region changed over the .docx1. How has the economic geography of this region changed over the .docx
1. How has the economic geography of this region changed over the .docx
 
1. Important nurses of the 19th century are often overshadowed by Ni.docx
1. Important nurses of the 19th century are often overshadowed by Ni.docx1. Important nurses of the 19th century are often overshadowed by Ni.docx
1. Important nurses of the 19th century are often overshadowed by Ni.docx
 
1. In what ways did the Columbian Exchange impact the Americas, .docx
1. In what ways did the Columbian Exchange impact the Americas, .docx1. In what ways did the Columbian Exchange impact the Americas, .docx
1. In what ways did the Columbian Exchange impact the Americas, .docx
 
1. How did the conditions of life among descendants of African Slave.docx
1. How did the conditions of life among descendants of African Slave.docx1. How did the conditions of life among descendants of African Slave.docx
1. How did the conditions of life among descendants of African Slave.docx
 
1. If you adopt the _______ perspective, youll reject an emphasis o.docx
1. If you adopt the _______ perspective, youll reject an emphasis o.docx1. If you adopt the _______ perspective, youll reject an emphasis o.docx
1. If you adopt the _______ perspective, youll reject an emphasis o.docx
 
1. How are information systems transforming business and what is the.docx
1. How are information systems transforming business and what is the.docx1. How are information systems transforming business and what is the.docx
1. How are information systems transforming business and what is the.docx
 
1. How can Fiedlers theory of the least preferred coworker help man.docx
1. How can Fiedlers theory of the least preferred coworker help man.docx1. How can Fiedlers theory of the least preferred coworker help man.docx
1. How can Fiedlers theory of the least preferred coworker help man.docx
 

Kürzlich hochgeladen

Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
PECB
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
MateoGardella
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
kauryashika82
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 

Kürzlich hochgeladen (20)

Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
PROCESS RECORDING FORMAT.docx
PROCESS      RECORDING        FORMAT.docxPROCESS      RECORDING        FORMAT.docx
PROCESS RECORDING FORMAT.docx
 

1)   In which era were only the U.S. government, colleges, and unive.docx

  • 1. 1) In which era were only the U.S. government, colleges, and universities able to access the Internet? a. 1960s b. 1970s c. 1980s d. 1990s 2) Application software includes all of the following EXCEPT ________ software. a. word-processing b. Web browser c. system d. e-mail 3) Output refers to: a. displaying the results of the processing operation so that people can under stand it. b. information that needs further computer activity in order to have meaning to people. c. performing operations on the input data. d. sending the results of computer processing to a permanent location. 4) Which of the following device types holds the programs and data that the computer uses? a. Communication devices b. Input devices c. Output devices d. Storage devices 5) Which of the following is often considered the fi fth operation in the informa- tion-processing cycle? a. Communications b. E-commerce c. Ethics d. Analysis 6) Network computers have limited resources in all the following areas EXCEPT: a. storage. b. processing. c. memory. d. connectivity. 7) What type of systems are the ones on which human lives depend? a. Health-dependent b. Life-and-death-critical c. Safety- critical d. Mission-critical 8) Which of the following safety-critical airline computer systems requires the highest level of quality standards? a. Reservation b. Passenger list and seating assignments c. Passenger entertainment and communication d. Air traffi c control 9) More than ________ computers, monitors, and TVs become obsolete each year. a. 10 million b. 100 million c. 10 billion d. 100 billion
  • 2. 10) What is a school’s code of conduct for computers users called? a. Computer usage agreement b. Acceptable use policy c. Computer conduct agreement d. Associated usage principals 11) Which of the following would NOT be considered correct netiquette? a. Reading the Frequently Asked Questions (FAQ) document posted on a mailing list prior to submitting a question b. Avoiding slang and jokes in professional e-mail c. Using all capital letters in an e-mail response d. Learning and using Internet Relay Chat (IRC) abbreviations in the same way as other users 12) Which of the following statements is TRUE concerning computer games and violence? a. The games industry has taken responsibility to minimize the violence in their games. b. Computer games are becoming more violent. c. Playing computer games led to the Columbine tragedy. d. Computer games cause players to be more violent and aggressive. 13) At the heart of every computer code of ethics is to: a. eliminate all potential computer bugs. b. honor property rights and individual privacy. c. avoid harm and protect human life. d. fi ght software piracy. 14) Which of the following is NOT considered plagiarism? a. Purchase a term paper from an Internet company and use it as the basis of your own work for a college course. b. Paste a paragraph of text from a Web page into an essay, but make modifi ca- tions to it before submission as your homework assignment. c. Use a quote from a public speech on your history take-home exam, but cite the orator in your bibliography. d. With his consent, copy your friend’s algebra homework for submission to your math instructor. 15) Plagiarizing copyrighted material is also known as: a. copyright theft. b. copyright piracy. c. unacceptable copyright use. d. copyright infringement.
  • 3. 16) Which of the following activities is NOT permitted with a shareware product? a. Keep the software on your computer system beyond the trial expiration date. b. Use the software during the trial period and then delete it. c. Copy a trial version to give to your friend for examination. d. Download the software from the Internet and then install it on both your desk- top and laptop computers. 17) If software falls under the General Public License, it: a. can only legally be copied on one PC. b. may be copied and used freely. c. can be legally installed on one LAN. d. may be copied to one PC then legally sold to another user. 18) Which of the following is NOT considered copyright infringement with respect to a sound fi le? a. Copying the song to a disk for your friend as encouragement to buy the album b. Using a phrase of the music in a college term paper as an example of a par- ticular musical style c. Downloading the song to play at a party and then deleting it the next day d. Using part of the song as a jingle on your company Web site 19) Hypertext works by using: a. objects. b. embedded commands. c. hypermedia. d. hyperlinks. 20) The fi rst successful graphical Web browser was called: a. Explorer. b. Netscape. c. Mozilla. d. Mosaic. 21) In a Web browser, the Refresh button is used to: a. return to the home page. b. exit from the browser. c. go back to the page previously viewed. d. obtain the latest content of the page being viewed. 22) HTTP is best defi ned as a: a. standard for the exchange of information on the Web. b. markup language used to describe the format of Web pages. c. programming language used to write Internet-related application software. d. scripting language used to add dynamic content to Web pages. 23) Which of the following is an example of a top-level domain name?
  • 4. a. www. b. ftp c. http:// d. .edu 24) What is the name of the path that houses the Web page in the fictitious URL given below? http://www.univ.edu/classroom/welcome.htm a. welcome.htm b. classroom c. classroom/welcome.htm d. www.univ.edu 25) In a URL which of the following identifi es the location of a document on the server? a. Domain b. Path c. Director d. Locator 26) What is the software called that goes about the Web gathering URLs and information on their associated pages? a. Seeker b. Searcher c. Snail d. Spider 27) Which of the following is most likely an e-mail address? a. http://www.mailer.com b. Jane Doe c. mailbox.htm d. [email protected] 28) Which type of e-commerce occurs when a business uses the Internet to pro- vide services to another business? a. B2B b. C2C c. B2C d. B2I 29) eBay transactions are examples of which type of e- commerce? a. C2C b. B2I c. B2C d. B2B 30) Which type of e-commerce occurs when a merchant uses the Internet to sup- ply consumers with goods or services? a. C2C b. C2I c. B2B d. B2C 31) Although Amazon.com now sells a variety of merchandise, it originally: a. sold airline tickets. b. sold books. c. rented hotel rooms. d. conducted stock transactions. 32) Retailers that have both an online and traditional presence are known as ________ retailers. a. B2C b. click-and-brick c. brick-and-mortar d. brick-and- click 33) Quicken and Microsoft Money Plus are commonly used to
  • 5. assist in online: a. auctions. b. stock trading. c. travel reservations. d. banking. 34) E-trading began in: a. 1996. b. 1999. c. 2002. d. 1990. 35) Online stock trading accounts for what part of all stock trades? a. One-tenth b. One-sixth c. Two-thirds d. Three-fourths 36) Bluetooth devices identify each other using ________ that are unique to each device. a. radio frequencies b. honing devices c. analog waves d. identifi cation numbers 37) Because ________ is still NOT available in many areas, direct broadcast satel- lite is a viable option. a. broadband b. the public telephone system c. cabling d. None of the above 38) Which of the following statements is NOT true about the public switched telephone network (PSTN)? a. PSTN uses subscriber loop carriers to link home and business telephones. b. PSTN uses a variety of physical media, including twisted-pair and fi ber-optic cable. c. PSTN is exclusively an analog network. d. PSTN is a global network used for both voice and data communications. 39) A local exchange switch of the PSTN is typically located: a. on the side of a customer’s house. b. on a telephone pole at the end of a block or small area. c. at a network access point (NAP). d. in the local telephone company’s central offi ce. 40) ________ sends more than one call over a single line. a. Splitting b. Multiplexing c. Converging d. Diverging 41) Approximately what percentage of U.S. households has opted to disconnect their conventional landline telephones and rely on cellular service only? a. 10 b. 15 c. 25 d. 5 42) Which of the following is NOT a home networking technology? a. Wi-Fi b. Power-line c. Infrared d. Phone-line
  • 6. 43) What is the communications standard that specifi es how physically connect- ed computers in a network send data? a. Ethernet b. peer-to-peer c. RJ-45 d. Cat-5 44) Wi-Fi network access points are also referred to as: a. points of presence. b. network interface points. c. wireless access points. d. peer computer points. 45) Which of the following is NOT a step in setting up a home network? a. Confi guration b. Planning c. Maintenance and support d. Wiring 46) A wired Ethernet network is best installed at what time? a. After the networking equipment is purchased b. During home construction c. Over a long weekend d. After home construction 47) Which of the following is not a task in the confi guration process? a. Designating which PC s are part of the network b. Wiring the network c. Designating how fi les, folders and peripherals will be shared d. Installing the proper hardware and software 48) The best way to improve the performance of your computer is to: a. increase the size of the swap fi le so that you can use variable pages. b. install more RAM in the computer because the random access memory works faster than the hard disk. c. increase the use of virtual memory because the paging technique increases the speed of the memory. d. install a larger hard disk in the computer so that you can store more swap files. 49) Signals that inform the OS that something has happened are: a. program defects. b. operating system diversions. c. interrupts. d. drivers. 50) The following is an example of which type of user interface? copy A:mypic.jpg c:mypic.jpg a. Instruction-driven b. Directive-based c. Command-line d. Menu-driven 51) Linux is an example of open source software, meaning:
  • 7. a. it has to be confi gured to your computer system. b. the software must be purchased from a vendor who markets products on an open commercial Web site. c. the software has not been perfected suffi ciently to be of professional value. d. users can see and modify the source programming code. 52) Many CIOs shy away from adopting Linux because: a. it has not been properly tested. b. it doesn’t have a stable company behind it. c. it’s free. d. it’s powerful. 53) The UNIX operating system was developed by: a. Apple. b. Microsoft. c. IBM. d. AT&T. 54) Folders are also known as: a. groups. b. directories. c. repositories. d. fi les. 55) Given the fi le designator below, in which folder is the fi le located? C:SpringComputerHomeworkAssg1.doc a. Computer b. Homework c. Spring d. C: 56) Which of the following is NOT a storage device typically found on desktop computers? a. Hard drive b. Tape drive c. CD drive d. DVD drive 57) The second part of a fi le name on a PC is called the: a. prefi x. b. domain. c. extension. d. suffi x. 58) A fi le with extension .xlsx is most likely a(n): a. ASCII text fi le. b. Microsoft Excel fi le. c. Picture or image fi le. d. Microsoft Access fi le. 59) Right-dragging a fi le between drives: a. displays the task pane. b. copies the fi le. c. displays a context-sensitive menu. d. moves the file. 60) Multimedia involves ________ or more media. a. at least three b. ten c. four d. two 61) Which type of graphic is created by a drawing program? a. Post Script b. bit-mapped c. raster d. Vector 62) Graphical MUDS serve which of the following purposes? a. Compressing graphics for use in digital video b. Decompressing graphics in preparation for displaying on the Web c. Compressing graphics in preparation for displaying on the Web d. Bringing the virtual environment to life in 3-D graphical environments
  • 8. 63) If inserting the disk doesn’t automatically start the installation process, you will need to click the Windows ________ button. a. Explore b. Tools c. Start d. Install 64) Applications typically enable you to choose from a list of ________ that specify how you want the program to operate. a. defaults b. confi gurations c. options d. packages 65) Which of the following programs is NOT included with the Home and Student version of Microsoft Offi ce? a. Access b. Excel c. PowerPoint d. Word 66) Which part of a Microsoft Offi ce application window includes the Maximize, Minimize, and Close buttons? a. Toolbar b. Status bar c. Task bar d. Title bar 67) Which part of a Microsoft Offi ce application window includes information about the current document, such as a page number or edit mode? a. Toolbar b. Task pane c. Status bar d. Title bar 68) Which of the following is NOT a tab name found in the Ribbon? a. Insert b. Print c. Home d. View 69) Which type of Microsoft Access object would be useful if you needed to de- sign an input screen through which a clerk might enter data? a. Query b. Table c. Form d. Report 70) Floating-point notation: a. allows the computer to work with very large, but not very small, numbers. b. uses no fi xed number of digits before or after the decimal point. c. requires newer computers to have a special chip called a math coprocessor. d. has no advantage if used with numbers containing fractional points. 71) Which of the following would NOT be found on the motherboard? a. Microprocessor b. Drive bays c. Input/output buses d. System clock 72) At the most granular level, the CPU interprets and processes:
  • 9. a. mathematical equations. b. comparisons. c. instructions. d. Boolean operators. 73) Which subcomponent of the CPU takes instructions from memory and de- codes and executes the instructions? a. Data bus b. Microprocessor c. Control unit d. Arithmetic-logic unit 74) Video circuitry that is built into the motherboard is called: a. on-board video. b. a VGA connector. c. a video adapter. d. a video card. 75) A(n) ________ can store more data than a CD and yet is compatible with com- pact discs. a. HiFD b. DVD c. RD d. BD 76) The quality and resolution of the display on the monitor is determined by which component? a. RAM b. Video card c. ROM d. Hard drive 77) What is another term for aperture grill? a. Dot pitch b. LCD mask c. Electron mesh d. Raster lattice 78) Which of the following is NOT true? a. A laser printer is faster than an inkjet printer. b. The print quality of a laser printer is better than an inkjet printer. c. The operating cost of a laser printer is more than an inkjet printer. d. The purchase price of a laser printer is more than an inkjet printer. 79) What is the purpose of a UPS? a. It provides a power source if electricity fails. b. It is the primary power source for a notebook computer. c. It is an alternate hard disk backup unit in case of hard disk failure. d. It is a theft-protection system that disables your computer if stolen. 80) Early speech recognition systems used what type of speech recognition? a. Expansive b. Limited c. Continuous d. Discrete 81) The ________ is a pattern of bars printed on merchandise that stores informa- tion about the item. a. EDI b. OMR c. MICR d. UPC
  • 10. 82) Which of the following is NOT a reason for using storage rather than memory to hold data and information? a. There are limitations to the size of RAM. b. Storage devices traditionally have faster access times than RAM. c. Storage devices are nonvolatile. d. Storage devices are inexpensive compared to RAM. 83) Which of the following is NOT an example of a solid state storage device? a. Smart card b. Cache memory c. PC card d. Flash memory card 84) What type of storage uses two laser beams to create a three- dimensional im- age? a. Graphical b. Integrated circuit c. Fiber optic d. Holographic 85) The term MP3 is derived from the acronym: a. MPAVI. b. MPEG. c. MPPP. d. MPJG. 86) Music on a CD is high quality because the music is sampled ________ times per second. a. 11,025 b. 22,050 c. 44,100 d. 88,200 87) An MP3 fi le is about ________ the size of an uncompressed fi le. a. one-tenth b. one-fi fth c. one-fourth d. one-half 88) Which of the following is NOT a video codec? a. MP3 b. QuickTime c. AVI d. MPEG 89) All of the following provide similar functions in a network EXCEPT: a. network operating systems. b. switches. c. routers. d. wireless access points. 90) Some of the biggest P2P threats are from: a. insuffi cient capacity. b. malware. c. poor confi guration. d. NOS defects. 91) To carry computer data over the long haul, WANs need to have a(n) ________ in multiple towns and cities. a. router b. hub c. ISP d. POP 92) Which switching method is used by the public switched telephone network (PSTN)?
  • 11. a. Distributed b. Packet c. Parcel d. Circuit 93) Moore’s Law predicts that microprocessors and circuits will double in circuit density every: a. 6 months. b. 18 to 24 months. c. 5 years. d. decade. 94) According to Metcalfe’s Law, a network connecting fi ve people has a value of: a. 5. b. 10. c. 15. d. 25. 95) When considering the human brain as a CPU, in which area is it the weakest? a. Visual input b. Storage c. Mathematical calculations d. Pattern matching 96) Machine translation programs are used to: a. convert spoken words to text. b. convert text from one language to another. c. translate code written in a high-level language into machine language. d. convert scanned pictures to graphic fi les. 97) Which organization has reported that many color laser printers embed printer tracking dots on nearly every page at the urging of the U.S. government? a. Electronic Frontier Foundation b. National Printer Alliance c. Patriot Organization d. National Counterfeit Tracking Organization 98) The new emerging legal fi eld that tracks and combats computer-related crimes is called: a. Web law. b. cyberlaw. c. Web policing. d. Internet crime fi ghting. 99) Many computer viruses are spread by: a. LAN and WAN connected computers. b. CDs and DVDs. c. e-mail attachments. d. software downloaded from the Internet. 100) When Internet data appears to come from one place when it’s really coming from another, this is known as: a. forgery. b. blackmail. c. salami shaving. d. data diddling.