Multiple Choice
Identify the
letter of the choice that best completes the statement or answers the question.
|
|
1.
|
Which
of the following is an example of lossless compression? a. | JPEG | c. | MP3 | b. | ZIP File | d. | All of these | | | | |
|
|
2.
|
MP3
is a popular format for music files because a. | they contain video as well as
audio | c. | MP3 compression
significantly reduces file size with minimal loss of quality | b. | work just as
well for text, graphics and music | d. | MP3 compression is lossless | | | | |
|
|
3.
|
Which
of the following is a common mistake made in the use of Powerpoint? a. | Use of bright or
hot background colors | c. | Use of all the
different slide animations in one presentation | b. | Large amounts of
text on each slide | d. | All of these
would degrade a presentation | | | | |
|
|
4.
|
Which
of the following is an advantage of vector graphics over bitmap images? a. | uses
mathematical formulas to store images | c. | the dots used to represent images can have an infinite bit
depth | b. | are infinitely scalable | d. | all of these are advantages | | | | |
|
|
5.
|
Which
of the following is software designed specifically for the design and production of mechanical or
architectural components? a. | CAD/CAM | c. | Flash | b. | Presentation
Software | d. | Fireworks | | | | |
|
|
6.
|
Which
of the following might an artist use to more accurately simulate drawing with a pen or
paintbrush? a. | mouse | c. | trackball | b. | joystick | d. | stylus on a pressure-sensitive pad | | | | |
|
|
7.
|
The
process of copying music files from a music CD to the computer is commonly refered to
as a. | burning | c. | ripping | b. | imaging | d. | snapping | | | | |
|
|
8.
|
Flash
animations posted on the web are .swf files and not .fla files. Why is this the
case? a. | .fla files are
too complicated to post on the web | c. | .swf files can contain graphics and images while .fla files
cannot | b. | .swf files are much smaller than .fla
files | d. | .swf files are
animation files while .fla files are not. | | | | |
|
|
9.
|
Which
of the following domains is restricted to qualified oraganizations? a. | .com | d. | .net | b. | .org | e. | None are restricted, anyone can use these
domains. | c. | .edu | | | | |
|
|
10.
|
The
Internet was originally a a. | LAN at MIT. | d. | a small experimental research network called
ARPANET. | b. | Code cracking network during World War II by the department of
defense. | e. | Microsoft
product that quickly grew too big for the company to control. | c. | network created
by several large hardware and software companies. | | | | |
|
|
11.
|
Which
of the following Internet connections would be the slowest? a. | T1 | c. | Dial-up | b. | Cable | d. | DSL | | | | |
|
|
12.
|
Which
of the following is the protocol used to move web pages across the Internet?
|
|
13.
|
Every
Internet enabled device must have which of the following? a. | A web
browser | c. | A unique IP
address | b. | An email client | d. | All of these are required | | | | |
|
|
14.
|
URLs
are translated into IP addresses by a. | the HTTP protocol | c. | HTML | b. | DNS | d. | URLs dont require IP addresses | | | | |
|
|
15.
|
Which
of the following would be considered a Helper Application for your web
browser? a. | Real
Player | d. | Shockwave/Flash
player | b. | Windows Media Player | e. | All of these are helper applications | c. | Quick
Time | | | | |
|
|
16.
|
Napster made use of P2P communications. P2P stands for a. | Person to person
networking | c. | Portal to person
computing | b. | Peer to peer computing | d. | Protocol to protocol networking | | | | |
|
|
17.
|
The
best thing about ITGS is a. | I can surf the web during
lectures | c. | I can send
emails to all my friends during class | b. | It is in an air conditioned
room | d. | It is
intellectually stimulating and challenging
| | | | |
|
|
18.
|
A USB
___________ is portable, can store hundreds of megabytes of data, and plugs into a USB
port. a. | RAM disk
| c. | flash drive
| b. | hub | d. | hard disk
drive | | | | |
|
|
19.
|
Hot
swap means: a. | you can power
down a computer without closing all programs first. | c. | that a user can switch among many open software windows quickly
and efficiently. | b. | that hardware devices can be removed and replaced without
powering down. | d. | you can change
floppy disks or CDs without first allowing the previous disk to stop
spinning. | | | | |
|
|
20.
|
A
megabit is approximately: a. | 1,000 kb | c. | 1,000,000 bits | b. | 1,000
kB | d. | Both A & C
are correct | | | | |
|
|
21.
|
What
would the result be if a computer only had RAM and did not have secondary storage
devices? a. | This would be
similar to a traditional IBM computer. | c. | This would be normal; most computers do not have secondary
storage devices. | b. | Information input to the computer would not be permanently
saved. | d. | RAM is all that
is needed on a modern computer, since it is not non-volatile and can save data
permanently. | | | | |
|
|
22.
|
The
binary value of 1111 is equal to a decimal value of
|
|
23.
|
Which
of the following is NOT an advantage of integrated circuits? a. | Easier to
make | c. | Faster | b. | Smaller in size | d. | More Reliable | | | | |
|
|
24.
|
One
way computers avoid bottlenecks is to put the next likely instruction or data into:
|
|
25.
|
Which
of the following would be considered a legacy device? a. | Floppy
Drive | c. | Flash
Drive | b. | DVD ROM Drive | d. | LCD Screen | | | | |
|
|
26.
|
A
hard drive stores bits in the form of a. | electrical impulses | c. | high and low voltages | b. | pits on an
optical surface | d. | North and South
magnetic poles | | | | |
|
|
27.
|
A
monitor is a typical output device. The dots of color that make up an image on the screen are known
as a. | pitch | c. | resolution | b. | pixels | d. | color depth | | | | |
|
|
28.
|
The
serial port found on most computers is considered a legacy port. This means that the
port a. | no longer
works | c. | is capable of
running legacy devices | b. | is outdated | d. | is capable of running many devices | | | | |
|
|
29.
|
The
firmware that is responsible for starting up your computer and making sure all the hardware is
working properly is known as the a. | BASIC | c. | RAM | b. | BIOS | d. | CACHE | | | | |
|
|
30.
|
Moores law predicted that a. | The price of a computer would double every 18
months | c. | If something
could go wrong with a computer it would at the worst possible time. | b. | The computing
power of a computer would double every 18 months | d. | The size of a computer would decrease by 1/2 every 18
months | | | | |
|
|
31.
|
One
of the primary purpose of copyright laws is to: a. | lessen the need for written
contracts | c. | prevent the wide
use of new ideas | b. | allow intellectual property to be shared
freely | d. | encourage and
reward innovation. | | | | |
|
|
32.
|
Which
of the following is not a typical database object? a. | Tables | d. | Records | b. | Reports | e. | Queries | c. | Forms | | | | |
|
|
33.
|
Which
of the following is an underlying rule when creating tables? a. | Data redundancy
should be avoided | c. | Always store as
much information as possible in a single table | b. | Empty values
should never be entered | d. | Only text
information can be stored in a table | | | | |
|
|
34.
|
Which
of these is the correct hierarchy for a standard database? a. | Database, field,
record, table | c. | Database, table,
record, field | b. | Database, record, table, field | d. | Database, record, field, table | | | | |
|
|
35.
|
A
colleges database administrator writes a program to examine the records of all students over
the past decade, looking for patterns that might explain why some students drop out. This type of
program is an example of a. | Browsing | d. | Data Mining | b. | Interactive
programming | e. | Data
Importing | c. | Data Exporting | | | | |
|
|
36.
|
Tables are related through common a. | Primary keys | c. | Records | b. | Primary -
Foreign keys | d. | Forms | | | | |
|
|
37.
|
Placing department data in a separate table from the employees data results in
a. | making it easier
to update the data because it is only found in one place | c. | data redundancy which could result in
problems | b. | more work because a separate table needs to be created, one
table would be easier | d. | problems for the
DBMS because of the multiple tables with information | | | | |
|
|
38.
|
Vital
to any database program is the DBMS, which stands for a. | Database
Migration Structure | c. | Database
Management System | b. | Database Menu System | d. | Database Monitoring Structure | | | | |
|
|
39.
|
One
of the problems with databases is a. | there is so much data they are hard to
organize | c. | information is
contained in many related tables | b. | data errors can hard to correct when the data is shared among
several databases | d. | they can be
accessed by multiple users simultaneously | | | | |
|
|
40.
|
The
amount of data that can be transmitted in a given period of time is referred to as a. | Bandwidth | c. | a
Modem | b. | MBs | d. | NIC | | | | |
|
|
41.
|
Which
of the following is an advantage of using fiber in a network? a. | Can transfer
vast amounts of data | c. | Can carry
signals for long distances | b. | Is immune to interference | d. | All of these are advantages of fiber | | | | |
|
|
42.
|
The
common protocol for LANs and the Internet is a. | FTP | c. | HTTP | b. | TCP/IP | d. | SMTP | | | | |
|
|
43.
|
When
viewing web information it is wise to evaluate the information based on all of the following
except a. | Who the author
is | c. | The accuracy of
the information | b. | The objectivity of the author | d. | The attractiveness of the web site | | | | |
|
|
44.
|
Web
pages can be easily created by using a simple text editor if you know a. | HTTP | c. | HTML | b. | TCP/IP | d. | FTP | | | | |
|
|
45.
|
Web
servers provide vast amounts of information to user computers. The user computer is known as a
a. | Web
Browser | c. | Web
Recipient | b. | Client | d. | Node | | | | |
|
|
46.
|
Wireless networks are not used by banks because a. | They are prone
to interferrence | c. | They pose a
security risk | b. | They are slower than other
networks | d. | They are
expensive to setup | | | | |
|
|
47.
|
The
process of sending out fake email messages that look like they are from legitimate companies or banks
in order to obtain personal information is known as a. | Pharming | c. | Spyware | b. | Phishing | d. | Phreaking | | | | |
|
|
48.
|
Which
of the following could result in the inadvertent installation of a trojan horse on your
computer? a. | Downloading and
installing a shareware game. | c. | Opening a Word
document | b. | Opening an email | d. | All of these are correct | | | | |
|
|
49.
|
Which
of the following exploits a security hole in major software programs in order to obtain access to
your computer? a. | Phishing | c. | Worm | b. | Virus | d. | Trojan Horse | | | | |
|
|
50.
|
Overwhelming a web site with simultaneous phony requests from hundreds of computers in
order to prevent legitimate web requests from getting through is known as a. | Spyware
Attack | c. | Phishing | b. | Pharming | d. | Denial of Service (DoS) attack | | | | |
|
|
51.
|
A
person who accesses a computer system without authorization is known as a a. | Cuckoo | c. | Slammer | b. | Hacker | d. | System Administrator | | | | |
|
|
52.
|
Which
of the following would indicate that an email warning of a new virus is probably a
hoax? a. | It includes a
hook to get your attention | c. | It has a request
that you send the email to all of your friends | b. | It has a
technical sounding threat | d. | All of these are
associated with hoaxes. | | | | |
|
|
53.
|
Biometrics are often used to a. | measure a virus strength | c. | access the power of a trojan horse | b. | measure the
speed of a spreading worm | d. | authenticate
personnel before granting access to a computer system | | | | |
|
|
54.
|
A bug
is a. | code written by
a hacker to invade a system | c. | an undetected
flaw in a software program or operating system | b. | a program that
secretly sends user information over the Internet | d. | a program that searches out and destroys
viruses. | | | | |
|
|
55.
|
An
automaker connects to the web site of a supplier of auto arts to order more alternators for the
production line. This type of transaction is an example of:
|
|
56.
|
Which
of the following is false in regard to telecommuting? a. | there is a
reduction of commuters on the road | c. | flexibility in work schedules results | b. | time savings
results from a lack of commuting | d. | studies suggest that productivity
decreases | | | | |
|
|
57.
|
Technology has provided assistance to students with special needs. Which of the
following would NOT be an example of this type of assistance? a. | track
balls | c. | ergonomic
keyboards | b. | headsticks | d. | eyegaze systems | | | | |
|
|
58.
|
All
of the following are characteristics of a well designed B2C web site except a. | Speedy
transactions | c. | Flashy
technology | b. | Secure transactions | d. | Up-to-date product selection | | | | |
|
|
59.
|
The
Turing Test is used to test a computers a. | speed | c. | ability to behave intelligently | b. | ability to
perform calculations | d. | all of
these | | | | |
|
|
60.
|
Which
of the following is true of expert systems? a. | they deal with a narrow domain | c. | they use OCR to recognize patterns | b. | they are created
by a wide variety of experts | d. | all of these are
true | | | | |
|
|
61.
|
Which
of the following would you expect in a robot? a. | a variety of input devices | c. | a processor | b. | output devices
that move | d. | all of these
would be found in a robot | | | | |
|
|
62.
|
WYSIWYG refers to which of the following? a. | the ability to
apply images and text on a page | c. | the ability to
use templates to quickly produce complete documents | b. | the printed page
is the same as what is seen on the screen | d. | all of these are a part of WYSIWYG | | | | |
|
|
63.
|
A
formula was typed in a cell but after the enter key was hit a row of ########### appeared. To correct
this problem you would a. | resize the cell to fit the new calculated
value | c. | change the
format of the cell into a general number | b. | retype the formula because it contains an
error | d. | change the
format of the cell into a dollar format | | | | |
|
|
64.
|
A
formula used the following equation: (B6*$F$9)/.034 When the formula is filled to the cell
right of the current cell the formula will read a. | (B7*$F$9)/.034 | c. | (C6*$F$9)/.034 | b. | (B7*$F$10)/.034 | d. | (C6*$G$9)/.034 | | | | |
|
|
65.
|
A
wizard that is part of a computer application is a simple example of a. | an intelligent
agent | c. | a scientific
simulation | b. | a spreadsheet program | d. | a computer virus | | | | |
|
Matching
|
|
|
a. | RAM | d. | Motherboard | b. | CPU | e. | Hard Drive | c. | Adapter
Slot | f. | CD
ROM | | | | |
|
|
66.
|
Use
the diagram and key to match the part with correct term.
|
|
67.
|
Use
the diagram and key to match the part with correct term.
|
|
68.
|
Use
the diagram and key to match the part with correct term.
|
|
69.
|
Use
the diagram and key to match the part with correct term.
|
|
70.
|
Use
the diagram and key to match the part with correct term.
|