Multiple Choice Answers

EXAM SET ONE

Select the first step in the Information Processing Cycle.
A. Storage
B. Output
C. Input
D. Processing

Data and instructions are temporarily stored in which of the following devices?
A. ROM
B. RAM
C. CD-ROM
D. Diskettes

Which of the following types of memory contain data that cannot be modified by the user?
A. SIMM
B. DIMM
C. RAM
D. ROM

A printer, a flat panel monitor, and a speaker system are all examples of which type of device?
A. Input
B. Output
C. Processing
D. Storage

Which of the following types of computers is considered a portable computer?
A. Workstation
B. Minicomputer
C. Server
D. Notebook

Which type of mouse uses a beam of light to record the movements of the mouse?
A. Optical
B. Opto-mechanical
C. Mechanical
D. Touchpad

Activating the secondary mouse button is called:
A. pointing.
B. clicking.
C. double-clicking.
D. right-clicking.

What is the term for the study of the physical interaction between people and their tools?
A. Ergometrics
B. Form and Function studies
C. Mechametrics
D. Ergonomics

A __________ printer uses a print head composed of short pins to form letters and images by pressing an inked ribbon against the paper.
A. dot matrix
B. ink-jet
C. laser
D. non-impact

Which of the following types of printers prints fastest?
A. Wax-transfer
B. Laser
C. Ink jet
D. Dot matrix

How is image quality measured in printers?
A. PPM
B. LPH
C. DPI
D. CPS

How is the speed of an ink jet printer measured?
A. PPM
B. LPI
C. DPI
D. CPS

What is the term for the software that communicates between the OS and your printer?
A. Webware
B. Printerwar
C. Peripheral packages
D. Driver

What does the acronym RISC stand for?
A. Reduced Instruction Set Computing
B. Rapid Investigation Standard Control
C. Repeat Item Standing Count
D. Redundant Information Salvage Concept

Which of the following ports is most commonly used to connect older printers to the computer?
A. Serial
B. Network
C. Parallel
D. Modem

Which of the following ports allows daisy chaining of multiple devices but does not require any CPU cycles to move data?
A. Parallel
B. SCSI
C. Serial
D. USB

Which of these methodologies allows long file names?
A. FAT
B. FAT16
C. HPDFS
D. NTFS

CDs and DVDs belong to which family of storage types?
A. Disk
B. Magnetic
C. Optical
D. Solid-state

Flash memory is an example of which type of storage medium?
A. Magnetic
B. Optical
C. ROM
D. Solid-state

SET NUMBER TWO

Which of the following operating system types is used in medical equipment or a cash register?
A. Multi-user/multi-tasking
B. Real-time
C. Single-user/multi-tasking
D. Single-user/single-tasking

Which of the following operating system types is used in PDAs?
A. Multi-user/multi-tasking
B. Real-time
C. Single-user/multi-tasking
D. Single-user/single-tasking

The Macintosh OS and Windows are examples of which of the following types of operating systems?
A. Multi-user/multi-tasking
B. Real-time
C. Single-user/multi-tasking
D. Single-user/single-tasking

Unix and Linux are examples of which of the following types of operating systems?
A. Multi-user/multi-tasking
B. Real-time
C. Single-user/multi-tasking
D. Single-user/single-tasking

What is the small graphic found on a desktop that represents an object called?
A. Cursor
B. GUI
C. Icon
D. Shortcut

Which of the following always appears at the bottom of a Windows desktop?
A. Cursor
B. My Computer symbol
C. Recycle bin
D. Task bar

What is the name for the temporary holding area in a Windows computer that holds data being copied or moved?
A. Clipboard
B. Holding area
C. Scrap book
D. Temporary storage

Which of the following command sets will move a block of text from one place in a document to another?
A. Copy and Paste
B. Cut and Paste
C. Delete and Replace
D. Remove and Move

What software tools can you use to add functions to the operating system?
A. Windows extensions
B. Utilities
C. Updates
D. Accessory packages

Which of the following security tools can prevent your computer from being infected by hostile software included in an e-mail?
A. Antivirus
B. Anti-email
C. Intrusion detection
D. Malicious software detection

Which of the following security tools will scan incoming connections from the Internet to keep out hackers?
A. Antivirus
B. Anti-user
C. Firewall
D. Malicious user detection

What software package can you use to prevent damage to an older CRT when it is left on too long on the same page?
A. Firewall tool
B. Refreshing package
C. Screen saver
D. Screen wiper software

Which of these operating systems is the ideal choice for artists and multimedia developers?
A. Unix
B. Windows 2000
C. Mac OS
D. Linux

Which of the following is very popular due to its low cost and excellent support?
A. Linux
B. Mac OS
C. Windows
D. Unix

Which of the following server systems is considered most stable?
A. Netware
B. Linux
C. Windows 2000
D. Unix

What technique can a company use to keep data sent over the Internet secure?
A. Archival
B. Compression
C. Syllabification
D. Tunneling

What technique uses a network access server to allow employees to connect to a corporate network from remote geographical locations?
A. Active matrix network
B. Geographical distribution network
C. Overland corporate network
D. Remote access VPN

What technology allows two different companies to transmit data using a standardized format?
A. EDI
B. ROI
C. VPN
D. WBM

Which RAID technology stores parts of each file on different disks?
A. RAID 0
B. RAID 1
C. RAID 2
D. RAID 4

What is the general term for using networked devices to store data?
A. Ancillary storage technology
B. Data warehouse
C. Network storage
D. Web based storage

EXAM SET THREE +++++++++++++++++++++++++++++

__________ is applications software designed to help users be more efficient.
A. Assistance software
B. Efficiency software
C. Productivity software
D. Software suites

What type of software is provided with the expectation that the users will change it to meet their particular needs?
A. Commercial Software
B. Open Source Software
C. Public Domain Software
D. Shareware

A collection of integrated software is called a software:
A. congregation.
B. family.
C. office.
D. suite.

What type of application is designed to create text documents?
A. Authoring package
B. Document processor
C. Text processor
D. Word processor

When using an application to create a text document, where do you view and modify the text?
A. Document area
B. Rulers
C. Scroll bars
D. Toolbars

When using an application to create a text document, what tool do you use to see areas of the screen that are not initially visible?
A. Document area
B. Rulers
C. Scroll bars
D. Toolbars

When using an application to create a text document, where are the margins, indents, and tabs shown?
A. Document area
B. Rulers
C. Scroll bars
D. Toolbars

The __________ is the insertion point in a word processing document.
A. cursor
B. icon
C. inserter
D. text entry bar

The process called __________ marks a particular part of the document for special processing.
A. blocking
B. editing
C. identifying
D. selecting

What is the name for a set of characters like Arial or Courier?
A. Font
B. Points
C. Style
D. Type

How large is a 10 point font?
A. 1/720 of an inch
B. 1/72 of an inch
C. 10/72 of an inch
D. 7/10 of an inch

What is the area of the screen in which you interact with a spreadsheet called?
A. Cell
B. Cell address
C. Formula bar
D. Worksheet

What is the intersection of a row and a column in a spreadsheet called?
A. Cell
B. Cell address
C. Formula bar
D. Worksheet

__________ are the text areas in a spreadsheet.
A. Cells
B. Labels
C. Text boxes
D. Values

When you buy software, what are you buying?
A. The rights to use, copy, and distribute the software
B. The right to use the software on one of your computers, and make one backup copy
C. The right to use the software on all of your computers, and make backup copies
D. The right to copy, modify, and share your version of the software

Most presentation packages have pre-built formats you can use; these are called:
A. cells.
B. frames.
C. monitors.
D. templates.

What part of a presentation enables you to add graphics?
A. Animations
B. Frames
C. Text boxes
D. Video areas

What part of a presentation allows you to add character data?
A. Animations
B. Frames
C. Text boxes
D. Video areas

What is the term for an application that handles your contacts, to-do lists, etc.?
A. Address Manager
B. Contact-handler
C. Personal Information Manager
D. World Database Manager

When using a spreadsheet or word processor, you use __________ to store and then replay a set of keystrokes.
A. macros
B. formulas
C. compound commands
D. automation tools

TEST SET FOUR

What part of a presentation allows you to add character data?
A. Animations
B. Frames
C. Text boxes
D. Video areas

What part of a presentation enables you to add graphics?
A. Animations
B. Frames
C. Text boxes
D. Video areas

Most presentation packages have pre-built formats you can use; what are they called?
A. Cells
B. Frames
C. Monitors
D. Templates

Which of the following is the primary disadvantage of using a large-format monitor to show a presentation?
A. Compatibility may be a problem.
B. These are typically large and expensive.
C. The monitor will not display high resolution graphics.
D. It will only work for small audiences.

Which of the following statements is a true statement about presenting slide shows to a large audience?
A. The only reasonable way to present a slide show is to use a projector and screen.
B. The best way to present to a large audience is to simply use your laptop.
C. It is possible to use presentation software to show a slide show on a TV screen.
D. LCD monitors are not big enough for large audiences to view.

Which of the following types of bitmap graphics is most commonly used on the World Wide Web?
A. BMP
B. PICT
C. JPEG
D. TIFF

Which type of graphics file format keeps track of each individual point in the image?
A. Bitmap
B. Detailed image
C. Pointilated
D. Vector

What are the individual parts of a bit mapped image called?
A. Bits
B. Bytes
C. Pixels
D. Rasters

If you want to create images that can be easily resized, or one that looks like it was created with a pencil or pen, you should choose a __________ graphics package.
A. bitmap-based
B. colorized
C. raster-based
D. vector-based

Which graphical input source acts like a copy machine but copies the image to the computer instead of paper?
A. Clip art
B. Digital camera
C. Digital video camera
D. Scanner

Which graphical input source started in the print medium and moved to digital?
A. Clip art
B. Digital Camera
C. Digital Video Camera
D. Scanner

Which graphical input source captures and stores images in a bitmap form for transfer to a computer?
A. Clip art
B. Digital Camera
C. Digital Video Camera
D. Scanner

What graphics program would you use to create a vector-based graphic that is easily resizable?
A. CAD
B. Draw
C. Paint
D. Photo-editing

What graphics program would you use to create an image that resembles a traditional artist’s work?
A. CAD
B. Draw
C. Paint
D. Photo-editing

What graphics program would you use to repair damage to a scanned image or a poorly taken picture?
A. CAD
B. Draw
C. Paint
D. Photo-editing

What graphics program would you use to create a blueprint of a house or the design for a new windmill?
A. CAD
B. Draw
C. Paint   D. Photo-editing

What type of software application can create multi-dimensional images using tools much like wood working tools?
A. Animation
B. CAD
C. 3-D modeling
D. Tool based imagery

What is a single image from an animation called?
A. Animatron
B. Frame
C. Pict
D. Window

How does a computer generated animation work?
A. The computer creates constant movement in the characters.
B. The computer, along with human workers, moves the characters on the screen.
C. The computer creates a set of continuous movements, one character at a time.
D. The computer creates a set of still images that are then projected one at a time, like conventional animation.

What is the term for computer generated images that appear to be pictures of real objects?
A. Hyper-real
B. Photorealistic
C. Reality
D. Virtual reality

TEST SET FIVE

What is the term for the technology of using the Internet to take the place of the standard telephone service?
A. Audio-conferencing
B. Data-conferencing
C. Phone Phreaking
D. Voice over IP

Which type of data communication system is composed of a group of devices in close proximity?
A. CAN
B. LAN
C. MAN
D. WAN

What type of network shares the processing and storage between the centralized server and the individual PCs?
A. Application server
B. Client/server
C. File server
D. Peer-to-peer

What type of network is a collection of devices that equally share the processing and storage without having a centralized server?
A. Client/server
B. File server
C. Peer-to-peer
D. Web-based

Which type of network configuration uses a central hub with each device connected only to that hub?
A. Bus
B. Mesh
C. Ring
D. Star

In which type of network configuration is each device connected to exactly two other devices?
A. Bus
B. Mesh
C. Ring
D. Star

Which of the following connection devices is composed of eight wires in a bundle?
A. Coaxial cable
B. Fiber optics
C. Twisted-pair
D. Wireless

Which of the following connection methodologies uses either infrared or radio signals to transmit data?
A. Coaxial cable
B. Fiber optics
C. Twisted-pair
D. Wireless

Which of the following connection methodologies is NOT affected by electromagnetic interference?
A. Coaxial cable
B. Fiber optics
C. Twisted-pair
D. Wireless

Which of the following devices is used to connect two or more networks together, sending traffic only to the network to which it is addressed?
A. Bridge
B. Hub
C. Router
D. Switch

Which set of rules defines the way data is transmitted over the Internet?
A. IPX/SPX
B. NetBIOS/NetBEUI
C. TCP/IP
D. VDX/RDX

Which of the following has the greatest bandwidth?
A. BRI
B. ISDN
C. T1
D. T3

Which modem uses the same medium used to transmit video signals?
A. ADSL
B. BRI
C. Cable
D. DIGITAL

Which is the fastest wireless standard?
A. 802.11b
B. 802.11G
C. WAP
D. WI-PRO

How fast can a telephone modem transmit data?
A. 1 Mbps
B. 32 Bps
C. 56 Kbps
D. 128 Mbps

What encryption method can you use to secure a wireless network?
A. Automated port blocking
B. Encrypted Wireless Transmission
C. Roaming Prevention Protocol
D. Wire Equivalent Privacy

What hardware device do you need to share a high-speed Internet connection among several computers in a single location?
A. Hub/Router
B. Splitter
C. Transceiver
D. Winsock

A private network that is accessible only to employees of the company that created it is called:
a business-net.
an extranet.
an intranet.
the Internet.

A private network, created by a company and available to its employees and trusted users outside the company is called:
A. a business-net.
B. an extranet.
C. an intranet.
D. the Internet.

How can you tell if a Web site is using secure technology to protect your information?
A. They tell you so on the Web page.
B. The URL starts with https://.
C. The URL contains the acronym SSL for Secure Socket Layer.
D. A small dollar sign appears on the location bar indicating a secure transaction.

TEST SET SIX

What is the Internet?
A. A network connecting many other networks
B. Another name for the World Wide Web
C. The combination of the ARPANET and NSFnet
D. The network invented by Tim Bruners Lee

What is the name for software designed to find and open Web documents?
A. Grazer
B. Sniffer
C. Spider
D. Browser

What does the acronym URL stand for?
A. United Reference Limit
B. Unicode Reporting Language
C. Uniform Resource Locater
D. Universal Reference Language

In the following URL, which part indicates the address:http://underhill.greendoor.com/bilbo/tour.html?
A. http:
B. underhill.greendoor.com
C. bilbo
D. tour.html

What is another name for a helper application?
A. Streamer
B. Clunker
C. Plug-in
D. Add-on

Some audio and video applications use __________ technology which buffers, displays, and then deletes the content.
A. streaming
B. ripping
C. pushing
D. compression

You are creating a document in which you want the reader to be able to access a URL to visit to obtain more information on the topic. How do you accomplish this?
A. Insert an FTP path to the site
B. Insert a hyperlink to the site
C. Insert an IRC connector to the site
D. Insert a web based IRC to the site

You use the Internet as your primary news source and often visit a particular Web site every morning. Because you frequent the site so much, you would like to be able to visit this site without having to type the URL in every day. How could you accomplish this?
A. Save the Web page in your My Documents folder
B. Save the URL in your My Documents folder
C. Close your Web browser immediately after visiting the Web site
D. Bookmark the site in your Web browser

Which of the following search terms would direct a search engine to find pages about the Pontiac GTO?
A. “Pontiac GTO”
B. Pontiac GTO
C. “Pontiac” “GTO”
D. “Pontiac” GTO

The special words “AND,” “OR,” and “NOT” are called __________ operators.
A. Einstienian
B. Newtonian
C. Boolean
D. Nortonian

What type of search engine will submit the selected phrase to many different search engines at the same time?
A. Monster search engines
B. Megasearch engines
C. Sponsored engines
D. Metasearch engines

What type of software is typified by Outlook Express, Eudora, and Netscape messenger?
A. An e-mail client
B. A POP
C. An e-mail server
D. A listserv

Which of the following is a correctly formed e-mail address?
A. Jonnie Walker at AOL . Com
B. XXXXX@XXXXXX.XXX
C. JONNIE WALKER @ AOL . COM
D. Jwalker at AOL.com

Which part of an e-mail message tells the recipient what the message is about?
A. Signature
B. Feature
C. Heading
D. Subject

What is one advantage of using a Web-based e-mail service?
A. You can retrieve your e-mail from any computer connected to the Internet.
B. They use different, more powerful, e-mail tools.
C. Because they are expensive, they do not have large user populations.
D. They offer enhanced protection for your messages using strong encryption.

What is the name of the file, frequently provided on the Net, that contains the answers to common issues and problems for the users?
A. answers.com
B. threads
C. FAQ
D. PDA

Which Internet tool do you use to move files from one computer to another?
A. PDF
B. WWW
C. FTP
D. ICQ

Which Internet service allows you to communicate in real time, in a public discussion area?
A. FTP
B. IRC
C. IM
D. PDF

What Internet service allows you to have private, one-on-one conversations with another user?
A. FTP
B. IRC
C. IM
D. PDF

What type of network would you use to share files without using a centralized server like a Web server?
A. FTP
B. IRC
C. P2P
D. B3B

TEST SET SEVEN

What is the term for eight contiguous bits of data?
A. Bit
B. Byte
C. Chomp
D. Nibble

What unit of measure is used to determine the performance of a CPU?
A. Bits per second
B. Cycles per second
C. Hertz
D. Instructions per second

When the computer seems to be running more than one program at the same time, it is said to be:
A. warping.
B. streaming.
C. multitasking.
D. divergent processing.

What is the term for memory that loses its contents when power is removed?
A. Fragile
B. Non-volatile
C. Temporary
D. Volatile

Which type of memory can only be read and not written to?
A. Volatile
B. RAM
C. PROM
D. FLASH

What is the set of instructions the computer uses to boot up called?
A. BIOS
B. BOOT
C. POST
D. SETUP

What type of memory is used to store images in a digital camera?
Volatile
RAM
PROM
FLASH

Which of the following is an example of common computer memory?
A. DIMM
B. FLASH
C. PROM
D. ROM

What is the technique of using some of the hard drive space to extend memory called?
A. Dynamic memory
B. Extensionary memory
C. Virtual memory
D. Xterm memory

What is the term for very fast memory used to store data or instructions between the CPU and regular memory?
A. Bi-directional memory
B. Cache memory
C. Dynamic storage
D. Super ram

Which of the following is the slowest device for data transfer?
A. CD-ROM drive
B. Hard drive
C. External SCSI drive
D. Solid-state drive

What is the term that describes maintaining a hard disk to get better performance?
A. Archiving
B. Cleaning
C. Optimizing
D. Re-formatting

What type of files is Windows notorious for creating in large numbers when building documents and printing?
A. Accessory
B. Defragmented
C. Redundant
D. Temporary

What is the term for removing programs you no longer need?
A. Compressing
B. Defragmenting
C. Resetting
D. Uninstalling

What is the term used to describe a file that is stored on several, non-contiguous areas on a disk?
A. Compressed
B. Fractured
C. Fragmented
D. Split

What is the process you would use to reduce the size of a file by removing unnecessary data?
A. Booting
B. Compressing
C. Re-formatting
D. Squashing

What is the interface between a hard disk and the CPU?
A. BIOS filter
B. Controller
C. Interface mechanism
D. Small Computer Interface

Which of the following is a common standard interface for hard drives?
A. API
B. EIDE
C. SCSI
D. USB

Which of the following hard drive interfaces is found in high-end workstations?
A. API
B. EIDE
SCSI
D. USB

Which of the following interfaces can support daisy chaining of up to 127 hot-swappable devices?
A. API
B. EIDE
C. SCSI
D. USB

A __________ is the term for something that has not been protected and
so is open to harm.
A. concern
B. danger
C. threat
D. vulnerability

What is the term that describes someone impersonating you by using
your personal information?
A. Anonymous activity
B. Cheating
C. Identity theft
D. Personal replacement

__________ describes the cross referencing of personal data like
shopping preferences to target an individual for specific
advertisements.
A. Automated buying profiling
B. Data mining
C. Personal profiles
D. Transaction tracking

What is the name of the small text file that is stored on your computer to save Web site information?
A. Brownie
B. Cookie
C. Data mine
D. Web bug

What is the term for any of the several different kinds of software that can track your computer use and report it to someone?
A. Cookie
B. Data mine
C. Spyware
D. Web bug

__________ describes the trick of changing the “from” address of an e-mail to make the recipient think it is from a trusted source.
A. Misdirecting
B. Re-branding
C. Sniffing
D. Spoofing

Which of these devices will protect against both electrical spikes and sags?
A. Line conditioner
B. Surge protector
C. UPS
D. Wide spectrum protector

What is the term for software that is designed to damage your data or
your system?
A. Badware
B. Evilware
C. Malware
D. Terrorware

Which of these threats will self-replicate across a network?
A. Attack script
B. Virus
C. Web bug
D. Worm

What technique do software manufactures use to prevent unauthorized sharing of their programs?
A. Copy protection
B. Copy refusal
C. Random checking
D. Hardware blocking

What is the author’s recommendation about using e-mail for business?
A. Send only credit card data, not passwords via e-mail.
B. Use e-mail for cash but not credit card transactions.
C. Only reply to your bank or other financial institution if they
send you an email first.
D. Use e-mail only for impersonal information.

__________ describes the option to ask a company not to share your data with anyone.
A. No-tell
B. No-way
C. Opt-out
D. Privacy lock

Which of the following laws is the basis for prohibiting the government from reading your e-mails or watching your Internet activity?
A. Electronic Communications Privacy Act
B. Fair Credit Reporting Act
C. Freedom of Information Act
D. Privacy Act

Which of the following laws requires companies to inform their users of their privacy policies?
A. Electronic Communications Privacy Act
B. Freedom of Information Act
C. Privacy Act
D. Right to Financial Privacy Act

Which type of cookie is removed from your browser when you close the session?
A. First-party cookie
B. Persistent cookie
C. Session cookie
D. Third-party cookie

What type of software do you need to remove programs that record and report your activities to a third party?
A. Anti-cookie
B. Anti-session
C. Anti-spyware
D. Anti-webware

What is a good technique for avoiding spam?
A. Have a second e-mail account you register with
B. Reply to each spam message, telling the sender to stop sending it to you
C. Turn off spam-blocking in your mail program
D. Use one account but never give out your address

If your PC is in a semi-public place and you want to prevent other users from using it, what can you do?
A. Put a sign on it
B. Set privileges on it
C. Turn it off
D. Use a password

What tool provides protection from unauthorized Internet access to your computer?
A. Anti-access software
B. DSL connection limiter
C. Firewall
D. Passwords

__________ is a significant cause of overheating for computers.
A. Air conditioning
B. Canned air
C. Dust
D. Moisture