CSIT 105 Exam 1
1)
Being ________ means being familiar enough with computers that you understand their capabilities and limitations. (1 point)
technology literate
computer competent
computer savvy
computer literate
2)
Unwanted or junk e-mail is called ________. (1 point)
spam
spyware
adware
software
3)
The process of searching huge amounts of data with the hope of finding a pattern is called ________. (1 point)
data retrieval
data searching
data mining
data warehousing
4)
The technology called QR codes stands for ________. (1 point)
quiet reader
quick response
quiet response
quick reaction
5)
One potential application of ________ is to provide sight to the blind. (1 point)
VeriChips
biomedical chip implants
RFID tags
patient simulators
6)
Which of the following is an example of data mining? (1 point)
An Excel spreadsheet listing all employees and their annual salaries in a random order
A printout of all sales taken from the register at the end of the day
Raw data from questionnaires given at the mall
Amazon providing you with a list of books you might enjoy
7)
The difference between people with access to computers and the Internet and those without this access is known as the ________. (1 point)
digital divide
Web divide
Internet divide
broadband divide
8)
Which of the following software can best be used to help create digital art? (1 point)
Microsoft Word
Microsoft Excel
Adobe Illustrator
Adobe Acrobat
9)
________ is the gathering together of groups of people using online tools to connect and exchange ideas. (1 point)
Affective computing
Collaborative consumption
Information technology
Social networking
10)
The crisis-mapping tool ________ can collect information to make instantly and publicly available for use in emergencies. (1 point)
The Witness Project
data mining
Marahabaa
Ushahidi
11)
Analyzing computer systems to gather potential legal evidence is ________. (1 point)
computer detectives
forensics detectives
computer forensics
computer enforcement
12)
Joining together as a group to use a specific product more efficiently is called ________. (1 point)
creative surplus
collaborative consumption
social networking
affective computing
13)
Affective computing is ________. (1 point)
being able to recognize human fingerprints
speaking human language
computing that relates to emotions
performing calculations faster than humans
14)
What’s the best type of computer for a sales rep who travels extensively and often needs to take notes and show product spec pages to clients in their offices, but has no need for high-performance graphics?(1 point)
All-In-One PC
Tablet PC
PC Notebook
15)
Which of the following is the best reason why somebody might choose a Mac Book Pro? (1 point)
Needs a portable system with Internet access.
Needs access to a portable system that can be used to present PowerPoint Presentations.
Needs a portable system with high-performance graphical capabilities.
16)
Which of the following is not a computer peripheral? (1 point)
Printer
Motherboard
Keyboard and mouse
17)
Which of the following is your computer’s main memory that holds programs, data, and instructions currently in use for quick access by the processor? (1 point)
RAM
USB Flash
ROM
18)
Computers use the ________ language consisting of 0s and 1s. (1 point)
symbol
system
binary
byte
19)
Which of the following is the largest unit of measure for the size of a computer file? (1 point)
Petabyte
Megabyte
Gigabyte
Terabyte
20)
Any part of the computer that you can touch is called ________. (1 point)
software
hardware
operating system
input
21)
The term "bit" is short for ________. (1 point)
megabyte
binary digit
binary number
binary language
22)
What type of computer is the Apple iPad?(1 point)
Netbook
Tablet computer
Notebook
Tablet PC
23)
The ________ contains the central electronic components of the computer. (1 point)
system unit
peripheral unit
input unit
motherboard
24)
In binary language, each letter of the alphabet, each number, and each special character is made up of a unique combination of ________. (1 point)
eight characters
eight kilobytes
eight bits
eight bytes
25)
A keyboard and mouse are examples of ________ devices. (1 point)
storage
output
input
processing
26)
Apple developed ________ Mouse, which is the first multitouch wireless mouse. (1 point)
Taboo
Magic
Trick
Touch
27)
________ is the abbreviation for the place in the computer where the programs and data the computer is currently using are stored. (1 point)
CPU
ROM
RAM
USB
28)
RAM is a ________ storage location. (1 point)
nonvolatile
permanent
network
volatile
29)
Large, expensive computers that support many users simultaneously are called ________. (1 point)
powercomputers
mainframes
supercomputers
maxicomputers
30)
________ is the applied science concerned with designing and arranging machines and furniture so that people use so that the people using them aren't subjected to an uncomfortable or unsafe experience. (1 point)
Occupational safety
Positioning
Ergonomics
Repetitive strain prevention
31)
Which tool would you use in Internet Explorer to return to the page you just viewed? (1 point)
Refresh
Press ENTER
The Back button
32)
How would you reply to an e-mail you’ve received that has multiple recipients, all of whom you would like to see your reply? (1 point)
Click Forward
Click Reply to All
Click Reply
33)
Facebook and YouTube are considered to be ________ Web sites. (1 point)
social networking
phishing
e-commerce
business-to-business
34)
A computer connected to the Internet that asks for data is a ________.(1 point)
client
backbone
client/server network
server
35)
Podcasts enable you to ________. (1 point)
post journal entries on the Web
edit video files over the Web
communicate with friends in real time
deliver audio/video files via RSS
36)
The unique identification number assigned to your computer when you connect to the Internet is known by all of the following, EXCEPT ________. (1 point)
dotted period
dotted decimal
dotted quad
IP address
37)
Using the Web to communicate and share information with our friends and others is known as ________. (1 point)
friend networking
e-mailing
instant messaging
social networking
38)
All of the following are examples of multimedia, EXCEPT ________. (1 point)
graphics
text
MP3 music files
streaming video
39)
All of the following are tips for professional e-mail etiquette, EXCEPT ________. (1 point)
include a meaningful subject line
use abbreviations such as "u", "r", and "BRB" to keep the e-mail message shorter
be concise and to the point
use spell-checker and proofread before sending
40)
The "s" in "https" stands for ________. (1 point)
secure socket line
secure socket lock
secure socket link
secure socket layer
41)
A ________ is a Web site where anyone can add, remove, or edit its content. (1 point)
wiki
blog
webcast
podcast
42)
The unique address for a particular Web site is the ________. (1 point)
protocol
domain name
URL
path
43)
Podcasts deliver their content using ________. (1 point)
Google Reader
iTunes
Aggregator
Really Simple Syndication
44)
A subset of e-commerce that uses social networks to assist in marketing and purchasing products is known as ________. (1 point)
social business
social shopping
social commerce
social enterprise
45)
Match the following terms to their definition: (5 points)
Terms
Definitions
WWW
an application program used to view the Web
browser
electronic communication
Internet
a tool used to locate information on the Web
search engine
a large network of networks
e-mail
the means of accessing information over the Internet
46)
Which tool would you use if you wanted to trim a half-inch from the left side of a digital photograph? (1 point)
Crop
Resize
Trim
47)
Where would you find answers to common questions about a product? (1 point)
About
FAQs
Sitemap
48)
Where would you go to see how much RAM is installed on your computer? (1 point)
Right-click the C: drive in Windows Explorer and click Properties.
In the System section of the Control Panel.
In the Help and Support window.
49)
Software refers to a set of instructions that tells the computer what to do. These instruction sets are called ________. (1 point)
databases
devices
programs
peripherals
50)
The general software you use to do tasks at home, school, or work is known as ________ software.(1 point)
commercial
application
open source
system
51)
______ software is the software that helps run the computer and coordinate instructions between the computer and the hardware devices. (1 point)
Application
System
Backup
Recovery
52)
The cell address C5 indicates that the cell ________. (1 point)
contains a label value of "C5"
is at column C, row 5 of the worksheet
is used in a formula involving the value "C5"
is at row C, column 5 of the worksheet
53)
In a spreadsheet, equations that use addition, subtraction, multiplication, and division operators, as well as values and cell references are called ________. (1 point)
functions
calculations
formulas
values
54)
The appropriate software to use for creating research papers is ________. (1 point)
database software
spreadsheet software
word processing software
presentation software
55)
The type of software that is best used to create a simple budget is ________. (1 point)
spreadsheet software
database software
word processing software
presentation software
56)
________ software helps you manage e-mail, contacts, calendars, and tasks in one place. (1 point)
Personal information manager
Spreadsheet
Database
Word processing
57)
QuickBooks and Peachtree are examples of ________ software.(1 point)
accounting
course management
gaming
educational
58)
Software that does "back office" operations and processing functions such as billing, production, inventory management, and human resources management is called ________. (1 point)
enterprise resource planning software
accounting software
customer relationship management software
project management software
59)
All of the following are types of multimedia and entertainment software, EXCEPT ________. (1 point)
digital audio software
productivity software
gaming software
drawing software
60)
Computer-aided design software is used primarily by ________. (1 point)
airline pilots to navigate
project managers to track tasks
game makers to create games
engineers to create models
61)
The ________ is(are) the group of programs that controls how your computer functions. (1 point)
application software
utility programs
operating system
user interface
62)
The ________ of the operating system enables the user to communicate with the computer system.(1 point)
window
user interface
network adapter card
modem
63)
Which of the following was the first widely used operating system installed in personal computers? (1 point)
Symbian OS
Microsoft Windows
MS-DOS
Linux
64)
Robotic cameras used by television stations for sports events require a ________ operating system. (1 point)
multiuser
real-time
single-user, multitask
single-user, single-task
65)
Which of the following operating systems is used primarily with mainframes as a network operating system? (1 point)
Symbian OS
Windows Vista
Mac OS
UNIX
66)
More than 50% of smartphones use an operating system developed by ________. (1 point)
Google
Apple
Symbian
Microsoft
67)
Which of the following is the first step in the boot process? (1 point)
The OS is loaded into RAM.
The BIOS is activated by turning on the computer.
The BIOS checks that all devices are in place.
Configuration and customization settings are checked.
68)
The basic input/output system is stored on a ________ chip. (1 point)
CMOS
CPU
ROM
RAM
69)
Which of the following does NOT occur during the power-on self-test?(1 point)
The video card and video memory are tested.
The BIOS is identified.
Memory is tested.
The OS is moved into RAM.
70)
Errors in computer software are called ________. (1 point)
spiders
bugs
insects
ants
71)
The location of a file is specified by its ________. (1 point)
file type
file extension
drive letter
file path
72)
The process of optimizing RAM storage by borrowing hard drive space is called ________. (1 point)
page file
thrashing
virtual memory
swap file
73)
Which of the following types of programs help manage system resources such as the hard drive? (1 point)
Productivity software
Application software
Utility programs
Application programming interfaces
74)
You can use the Windows ________ to check on a nonresponsive program. (1 point)
System Restore
Explorer
Task Manager
Backup utility
75)
Which utility takes out redundancies in a file to reduce the file size? (1 point)
File Compression
Error-Checking
Disk Cleanup
System Restore
76)
The rule of thumb that predicts that CPU capacity will double every two years is called ________. (1 point)
Intel's Law
Express Rule
Moore's Law
CPU Rule
77)
The dominant system processors on the market are made by ________. (1 point)
Apple
Intel
Microsoft
AMD
78)
Which of the following activities is carried out by the arithmetic logic unit (ALU)? (1 point)
Movement of read/write heads
Creation of virtual memory
Completion of all arithmetic calculations
Coordination of all other computer components
79)
All of the following are part of the machine cycle, EXCEPT ________.(1 point)
fetch
encode
store
execute
80)
The CPU consists of which two parts? (1 point)
The control unit and the arithmetic logic unit
The control unit and the front side bus
The arithmetic logic unit and the front side bus
The control unit and cache memory
81)
Running the CPU at a faster speed than the manufacturer recommends is called ________. (1 point)
fetching
clock speed
overclocking
hyperthreading
82)
The amount of RAM recommended for most systems today is measured in ________. (1 point)
KB
gigahertz
megahertz
GB
83)
RAM is an example of ________ storage. (1 point)
permanent
nonvolatile
volatile
mobile
84)
A ________ uses electronic memory and has no motors or moving parts. (1 point)
mechanical hard drive
solid state drive
digital video disc
Blu-ray disc
85)
Running the Disk Defragmenter utility will ________. (1 point)
detect and remove spyware
make the hard drive work more efficiently
clear out temporary Internet files
clean out your Startup folder
86)
Running the Disk Cleanup utility is a quick way to ________. (1 point)
clean out your Startup folder
defrag your hard drive
remove spyware programs
clear out unnecessary files
87)
Video cards include their own RAM. (1 point)
true
false
88)
You can add unlimited RAM to any computer. (1 point)
false
true
89)
Accessing data from the hard drive to send to the CPU is faster than accessing data from RAM. (1 point)
false
true
90)
Solid state drives have no platters or motors. (1 point)
false
true
91)
The ________ computer had no keyboard or monitor and used switches on the front of it to enter data using 0s and 1s. (1 point)
TRS-80
Apple II
Commodore PET
Altair
92)
The ________ was the first portable computer. (1 point)
IBM PC
Osborne
Apple Macintosh
Commodore PET
93)
What programming language revolutionized the software industry because beginning students could learn it easily?(1 point)
ALGOL
COBOL
FORTRAN
BASIC
94)
Released in 1984, the Apple Macintosh was the first computer brought to market that used a graphical user interface (GUI). (1 point)
false
true
95)
A compiler is a program that translates computer language instructions into English language. (1 point)
false
true
96)
Match the following issues with the appropriate example: (5 points)
Issues
Examples
cyberbullying
protection afforded to creators of intellectual property
amoral behavior
the study of the general nature of morals and the specific moral choices made by individuals
copyright
not conforming to a set of approved behavioral standards
unethical behavior
having no sense of right and wrong and no interest in the moral consequences
ethics
harassing people by electronic means