Name:     ID: 
 
    Email: 

ITGS Semester 2 Final Exam 2013

Multiple Choice
Identify the letter of the choice that best completes the statement or answers the question.
 

 1. 

Which of the following is an example of lossless compression?
a.
JPEG
c.
MP3
b.
ZIP File
d.
All of these
 

 2. 

MP3 is a popular format for music files because
a.
they contain video as well as audio
c.
MP3 compression significantly reduces file size with minimal loss of quality
b.
work just as well for text, graphics and music
d.
MP3 compression is lossless
 

 3. 

Which of the following is a common mistake made in the use of Powerpoint?
a.
Use of bright or hot background colors
c.
Use of all the different slide animations in one presentation
b.
Large amounts of text on each slide
d.
All of these would degrade a presentation
 

 4. 

Which of the following is an advantage of vector graphics over bitmap images?
a.
uses mathematical formulas to store images
c.
the dots used to represent images can have an infinite bit depth
b.
are infinitely scalable
d.
all of these are advantages
 

 5. 

Which of the following is software designed specifically for the design and production of mechanical or architectural components?
a.
CAD/CAM
c.
Flash
b.
Presentation Software
d.
Fireworks
 

 6. 

Which of the following might an artist use to more accurately simulate drawing with a pen or paintbrush?
a.
mouse
c.
trackball
b.
joystick
d.
stylus on a pressure-sensitive pad
 

 7. 

The process of copying music files from a music CD to the computer is commonly refered to as
a.
burning
c.
ripping
b.
imaging
d.
snapping
 

 8. 

Flash animations posted on the web are .swf files and not .fla files. Why is this the case?
a.
.fla files are too complicated to post on the web
c.
.swf files can contain graphics and images while .fla files cannot
b.
.swf files are much smaller than .fla files
d.
.swf files are animation files while .fla files are not.
 

 9. 

Which of the following domains is restricted to qualified oraganizations?
a.
.com
d.
.net
b.
.org
e.
None are restricted, anyone can use these domains.
c.
.edu
 

 10. 

The Internet was originally a
a.
LAN at MIT.
d.
a small experimental research network called ARPANET.
b.
Code cracking network during World War II by the department of defense.
e.
Microsoft product that quickly grew too big for the company to control.
c.
network created by several large hardware and software companies.
 

 11. 

Which of the following Internet connections would be the slowest?
a.
T1
c.
Dial-up
b.
Cable
d.
DSL
 

 12. 

Which of the following is the protocol used to move web pages across the Internet?
a.
HTTP
c.
HTML
b.
SMTP
d.
FTP
 

 13. 

Every Internet enabled device must have which of the following?
a.
A web browser
c.
A unique IP address
b.
An email client
d.
All of these are required
 

 14. 

URLs are translated into IP addresses by
a.
the HTTP protocol
c.
HTML
b.
DNS
d.
URLs don’t require IP addresses
 

 15. 

Which of the following would be considered a “Helper Application” for your web browser?
a.
Real Player
d.
Shockwave/Flash player
b.
Windows Media Player
e.
All of these are helper applications
c.
Quick Time
 

 16. 

Napster made use of P2P communications. P2P stands for
a.
Person to person networking
c.
Portal to person computing
b.
Peer to peer computing
d.
Protocol to protocol networking
 

 17. 

The best thing about ITGS is
a.
I can surf the web during lectures
c.
I can send emails to all my friends during class
b.
It is in an air conditioned room
d.
It is intellectually stimulating and challenging
 

 18. 

A USB ___________ is portable, can store hundreds of megabytes of data, and plugs into a USB port.
a.
RAM disk
c.
flash drive
b.
hub
d.
hard disk drive
 

 19. 

Hot swap means:
a.
you can power down a computer without closing all programs first.
c.
that a user can switch among many open software windows quickly and efficiently.
b.
that hardware devices can be removed and replaced without powering down.
d.
you can change floppy disks or CDs without first allowing the previous disk to stop spinning.
 

 20. 

A megabit is approximately:
a.
1,000 kb
c.
1,000,000 bits
b.
1,000 kB
d.
Both A & C are correct
 

 21. 

What would the result be if a computer only had RAM and did not have secondary storage devices?
a.
This would be similar to a traditional IBM computer.
c.
This would be normal; most computers do not have secondary storage devices.
b.
Information input to the computer would not be permanently saved.
d.
RAM is all that is needed on a modern computer, since it is not non-volatile and can save data permanently.
 

 22. 

The binary value of 1111 is equal to a decimal value of
a.
  16
c.
15
b.
  32
d.
33
 

 23. 

Which of the following is NOT an advantage of integrated circuits?
a.
Easier to make
c.
Faster
b.
Smaller in size
d.
More Reliable
 

 24. 

One way computers avoid bottlenecks is to put the next likely instruction or data into:
a.
ROM
c.
Cache
b.
RAM
d.
CPU
 

 25. 

Which of the following would be considered a legacy device?
a.
Floppy Drive
c.
Flash Drive
b.
DVD ROM Drive
d.
LCD Screen
 

 26. 

A hard drive stores bits in the form of
a.
electrical impulses
c.
high and low voltages
b.
pits on an optical surface
d.
North and South magnetic poles
 

 27. 

A monitor is a typical output device. The dots of color that make up an image on the screen are known as
a.
pitch
c.
resolution
b.
pixels
d.
color depth
 

 28. 

The serial port found on most computers is considered a legacy port. This means that the port
a.
no longer works
c.
is capable of running legacy devices
b.
is outdated
d.
is capable of running many devices
 

 29. 

The firmware that is responsible for starting up your computer and making sure all the hardware is working properly is known as the
a.
BASIC
c.
RAM
b.
BIOS
d.
CACHE
 

 30. 

Moore’s law predicted that
a.
The price of a computer would double every 18 months
c.
If something could go wrong with a computer it would at the worst possible time.
b.
The computing power of a computer would double every 18 months
d.
The size of a computer would decrease by 1/2 every 18 months
 

 31. 

One of the primary purpose of copyright laws is to:
a.
lessen the need for written contracts
c.
prevent the wide use of new ideas
b.
allow intellectual property to be shared freely
d.
encourage and reward innovation.
 

 32. 

Which of the following is not a typical database object?
a.
Tables
d.
Records
b.
Reports
e.
Queries
c.
Forms
 

 33. 

Which of the following is an underlying rule when creating tables?
a.
Data redundancy should be avoided
c.
Always store as much information as possible in a single table
b.
Empty values should never be entered
d.
Only text information can be stored in a table
 

 34. 

Which of these is the correct hierarchy for a standard database?
a.
Database, field, record, table
c.
Database, table, record, field
b.
Database, record, table, field
d.
Database, record, field, table
 

 35. 

A college’s database administrator writes a program to examine the records of all students over the past decade, looking for patterns that might explain why some students drop out. This type of program is an example of
a.
Browsing
d.
Data Mining
b.
Interactive programming
e.
Data Importing
c.
Data Exporting
 

 36. 

Tables are related through common
a.
Primary keys
c.
Records
b.
Primary - Foreign keys
d.
Forms
 

 37. 

Placing department data in a separate table from the employees data results in
a.
making it easier to update the data because it is only found in one place
c.
data redundancy which could result in problems
b.
more work because a separate table needs to be created, one table would be easier
d.
problems for the DBMS because of the multiple tables with information
 

 38. 

Vital to any database program is the DBMS, which stands for
a.
Database Migration Structure
c.
Database Management System
b.
Database Menu System
d.
Database Monitoring Structure
 

 39. 

One of the problems with databases is
a.
there is so much data they are hard to organize
c.
information is contained in many related tables
b.
data errors can hard to correct when the data is shared among several databases
d.
they can be accessed by multiple users simultaneously
 

 40. 

The amount of data that can be transmitted in a given period of time is referred to as
a.
Bandwidth
c.
a Modem
b.
MBs
d.
NIC
 

 41. 

Which of the following is an advantage of using fiber in a network?
a.
Can transfer vast amounts of data
c.
Can carry signals for long distances
b.
Is immune to interference
d.
All of these are advantages of fiber
 

 42. 

The common protocol for LANs and the Internet is
a.
FTP
c.
HTTP
b.
TCP/IP
d.
SMTP
 

 43. 

When viewing web information it is wise to evaluate the information based on all of the following except
a.
Who the author is
c.
The accuracy of the information
b.
The objectivity of the author
d.
The attractiveness of the web site
 

 44. 

Web pages can be easily created by using a simple text editor if you know
a.
HTTP
c.
HTML
b.
TCP/IP
d.
FTP
 

 45. 

Web servers provide vast amounts of information to user computers. The user computer is known as a
a.
Web Browser
c.
Web Recipient
b.
Client
d.
Node
 

 46. 

Wireless networks are not used by banks because
a.
They are prone to interferrence
c.
They pose a security risk
b.
They are slower than other networks
d.
They are expensive to setup
 

 47. 

The process of sending out fake email messages that look like they are from legitimate companies or banks in order to obtain personal information is known as
a.
Pharming
c.
Spyware
b.
Phishing
d.
Phreaking
 

 48. 

Which of the following could result in the inadvertent installation of a trojan horse on your computer?
a.
Downloading and installing a shareware game.
c.
Opening a Word document
b.
Opening an email
d.
All of these are correct
 

 49. 

Which of the following exploits a security hole in major software programs in order to obtain access to your computer?
a.
Phishing
c.
Worm
b.
Virus
d.
Trojan Horse
 

 50. 

Overwhelming a web site with simultaneous phony requests from hundreds of computers in order to prevent legitimate web requests from getting through is known as
a.
Spyware Attack
c.
Phishing
b.
Pharming
d.
Denial of Service (DoS) attack
 

 51. 

A person who accesses a computer system without authorization is known as a
a.
Cuckoo
c.
Slammer
b.
Hacker
d.
System Administrator
 

 52. 

Which of the following would indicate that an email warning of a new virus is probably a hoax?
a.
It includes a hook to get your attention
c.
It has a request that you send the email to all of your friends
b.
It has a technical sounding threat
d.
All of these are associated with hoaxes.
 

 53. 

Biometrics are often used to
a.
measure a virus’ strength
c.
access the power of a trojan horse
b.
measure the speed of a spreading worm
d.
authenticate personnel before granting access to a computer system
 

 54. 

A bug is
a.
code written by a hacker to invade a system
c.
an undetected flaw in a software program or operating system
b.
a program that secretly sends user information over the Internet
d.
a program that searches out and destroys viruses.
 

 55. 

An automaker connects to the web site of a supplier of auto arts to order more alternators for the production line. This type of transaction is an example of: 
a.
B2C
c.
2BRNT2B
b.
B2B
d.
C2C
 

 56. 

Which of the following is false in regard to telecommuting?
a.
there is a reduction of commuters on the road
c.
flexibility in work schedules results
b.
time savings results from a lack of commuting
d.
studies suggest that productivity decreases
 

 57. 

Technology has provided assistance to students with special needs. Which of the following would NOT be an example of this type of assistance?
a.
track balls
c.
ergonomic keyboards
b.
headsticks
d.
eyegaze systems
 

 58. 

All of the following are characteristics of a well designed B2C web site except
a.
Speedy transactions
c.
Flashy technology
b.
Secure transactions
d.
Up-to-date product selection
 

 59. 

The Turing Test is used to test a computer’s
a.
speed
c.
ability to behave intelligently
b.
ability to perform calculations
d.
all of these
 

 60. 

Which of the following is true of expert systems?
a.
they deal with a narrow domain
c.
they use OCR to recognize patterns
b.
they are created by a wide variety of experts
d.
all of these are true
 

 61. 

Which of the following would you expect in a robot?
a.
a variety of input devices
c.
a processor
b.
output devices that move
d.
all of these would be found in a robot
 

 62. 

WYSIWYG refers to which of the following?
a.
the ability to apply images and text on a page
c.
the ability to use templates to quickly produce complete documents
b.
the printed page is the same as what is seen on the screen
d.
all of these are a part of WYSIWYG
 

 63. 

A formula was typed in a cell but after the enter key was hit a row of ########### appeared. To correct this problem you would
a.
resize the cell to fit the new calculated value
c.
change the format of the cell into a general number
b.
retype the formula because it contains an error
d.
change the format of the cell into a dollar format
 

 64. 

A formula used the following equation:  (B6*$F$9)/.034 When the formula is filled to the cell right of the current cell the formula will read
a.
(B7*$F$9)/.034
c.
(C6*$F$9)/.034
b.
(B7*$F$10)/.034
d.
(C6*$G$9)/.034
 

 65. 

A wizard that is part of a computer application is a simple example of
a.
an intelligent agent
c.
a scientific simulation
b.
a spreadsheet program
d.
a computer virus
 

Matching
 
 
itgs_sem2_final_201_files/i0680000.jpg
a.
RAM
d.
Motherboard
b.
CPU
e.
Hard Drive
c.
Adapter Slot
f.
CD ROM
 

 66. 

Use the diagram and key to match the part with correct term.
 

 67. 

Use the diagram and key to match the part with correct term.
 

 68. 

Use the diagram and key to match the part with correct term.
 

 69. 

Use the diagram and key to match the part with correct term.
 

 70. 

Use the diagram and key to match the part with correct term.
 



 
Submit          Reset Help