Computer Literacy Final Practice Exam

Unlock all answers in this set

Unlock answers
question
The ability to recover and read deleted or damaged files from a criminal's computer is an example of a law enforcement specialty called ________. A) computer forensics B) RFID simulation C) HALO animation D) robotics
answer
A) computer forensics
question
People who are ________ make the Internet a powerful tool and know how to find the information that they want effectively.A) technologically informed B) computer efficient C) computer literate D) computer productive
answer
C) computer literate
question
The goal of ________ is to provide solutions to physical problems, such as providing sight to the blind. A) biomedical chip research B) RFID technology C) 3D animations D) computer forensics
answer
A) biomedical chip research
question
The Microsoft Authorized Refurbisher program supports refurbishers by allowing ________ to be installed for free on refurbished systems. A) specific operating system utilities B) antivirus software C) certain Microsoft operating systems and Office software D) certain gaming software packages
answer
C) certain Microsoft operating systems and Office software
question
When a job is sent to other countries, as many programming jobs have been, it is said to have been ________.A) offshored B) exported C) resourced D) imported
answer
A) offshored
question
A crisis mapping tool such as ________ can collect information to make instantly and publicly available for use in emergencies.A) The Witness Project B) Google Earth C) Data mining D) Ushahidi
answer
D) Ushahidi
question
Many online courses are designed to use management software like ________ so that students can communicate outside of class, take quizzes online, and find their class materials easily.A) Adobe Photoshop B) Blackboard or Moodle C) CAD or Visio D) Microsoft Access
answer
B) Blackboard or Moodle
question
________ is a field of study focused on information handling and retrieval of information automatically.A) Database mining B) Information technology C) RFID D) Computer forensics
answer
B) Information technology
question
The S-video and the ________ ports on a computer facilitate connecting the computer to multimedia devices such as TVs and DVD players.A) AVI B) DVI C) parallel D) USB
answer
B) DVI
question
Which of the following is NOT one of the four major data processing functions of a computer? A) processing data into information B) storing the data or information C) gathering data D) analyzing the data or information
answer
D) analyzing the data or information
question
A ________ is approximately 1 billion bytes. A) kilobyte B) megabyte C) gigabyte D) bit
answer
C) gigabyte
question
The hard drive is a ________ storage device, meaning that it stores data permanently even when the computer is turned off.A) random B) nonvolatile C) temporary D) volatile
answer
B) nonvolatile
question
RAM is considered volatile storage, which means it is ________. A) read-only B) permanent C) random D) temporary
answer
D) temporary
question
A(n) ________ enables you to enter data (text, images, and sound) and instructions (user responses and commands) into the computer. A) output device B) system unit C) motherboard D) input device
answer
D) input device
question
________ plug into slots on the motherboard and provide additional functionality for your computer.A) USB devices B) Expansion cards C) Drive bays D) Ports
answer
B) Expansion cards
question
The agency that first began funding the Internet was called the ________. A) National Science Foundation B) Advanced Research Computing Agency C) Advanced Research Projects Agency Network D) Science Research Projects Agency
answer
A) National Science Foundation
question
Adobe Reader, Flash Player, and QuickTime Player are all examples of special software programs called ________.A) podders B) plug-ins C) browsers D) aggregators
answer
B) plug-ins
question
All of the following are parts of a URL EXCEPT: A) WWW. B) the protocol. C) hyperlinks. D) the domain name.
answer
C) hyperlinks.
question
The World Wide Web (WWW) was invented by ________. A) the same people who invented the Internet B) Apple C) Tim Berners-Lee at CERN D) Microsoft
answer
C) Tim Berners-Lee at CERN
question
The text version of a Web site's Internet address is called the ________. A) home page B) protocol C) Uniform Resource Locator (URL) D) IP address
answer
C) Uniform Resource Locator (URL)
question
The Internet backbone refers to ________. A) abroadband Internet connection B) the software that operates a Web server C) the main pathway of high-speed communications lines through which all Internet traffic flows D) a set of numbers comprising an Internet address
answer
C) the main pathway of high-speed communications lines through which all Internet traffic flows
question
In a spreadsheet, equations you build yourself using values and cell references are called ________.A) values B) functions C) formulas D) calculations
answer
B) functions
question
Adobe Photoshop and Corel PaintShop Photo Pro are examples of ________ software. A) Web page authoring B) digital image editing C) painting D) computer-aided design
answer
B) digital image editing
question
In a spreadsheet, the columns and rows form individual boxes called ________. A) addresses B) worksheets C) cells D) intersects
answer
C) cells
question
In databases, information is organized in ________. A) tables B) fields C) records D) all of the above
answer
D) all of the above
question
Microsoft Word and OpenOffice.org Writer are examples of ________. A) utility software B) graphic software C) word processing software D) system software
answer
C) word processing software
question
The ________ of the operating system allows the user to communicate with the computer system. A) modem B) network adapter card C) window D) user interface
answer
D) user interface
question
Which of the following operating systems is used primarily with mainframes as a network operating system?A) Mac OS B) Windows Vista C) Symbian OS D) UNIX
answer
D) UNIX
question
The combination of operating system and processor in a computer is referred to as a computer's ________.A) platform B) specifications C) firmware D) minimum requirements
answer
A) platform
question
XO is the name of the computer being provided by the ________ project. A) IT Beta B) One Laptop per Child C) DigiKid D) Computers for All
answer
B) One Laptop per Child
question
Two types of video memory are ________. A) IrDA and IDE B) SRAM and DRAM C) 4 -bit and 8-bit D) GDDR3 and GDDR5
answer
D) GDDR3 and GDDR5
question
Kernel memory is ________. A) faster than RAM B) the amount of memory in the memory modules C) RAM memory used by the operating system D) permanent memory
answer
C) RAM memory used by the operating system
question
Which is the fastest type of optical drive on the market? A) flash drives B) Blu-ray drives C) DVD drives D) CD drives
answer
B) Blu-ray drives
question
When referring to hard drives, seek time and latency are the two factors that make up ________. A) data transfer speed B) access time C) processing D) transfer rate
answer
B) access time
question
Network architectures are classified according to ________. A) the way they are controlled and the distance between their nodes B) the bandwidth supplied by the connection C) the distance between the hub and the router D) the speed at which the processor runs
answer
A) the way they are controlled and the distance between their nodes
question
Which of the following UTP cable types is the cheapest and often used in home networks? A) Cat 4 B) Cat 7 C) Cat 6 D) Cat 5E
answer
D) Cat 5E
question
The most popular transmission media option for wired Ethernet networks is ________. A) unshielded twisted-pair (UTP) cable B) coaxial cable C) power-line cable D) fiber-optic cable
answer
A) unshielded twisted-pair (UTP) cable
question
The ________ is a strategic plan to focus on the young, talented, mathematical minds of Africa. A) Next Einstein Initiative B) National Research Council C) Childhood Walk D) Future Civic Media
answer
A) Next Einstein Initiative
question
One proposed answer to close the digital divide is to promote ________ as a means for low-income families to access the Internet.A) Nintendo Wii B) affective computing C) social networking D) mobile devices
answer
D) mobile devices
question
The process of searching huge amounts of data with the hope of finding a pattern is called ________.A) data warehousing B) data retrieval C) data searching D) data mining
answer
D) data mining
question
________ microphones pick up sound from only one direction. A) Wireless B) Magnetically shielded C) Omnidirectional D) Unidirectional
answer
D) Unidirectional
question
________ computers are specially designed computer chips that reside inside other devices such as your car or the electronic thermostat in your home.A) Internal B) Desktop C) Mainframe D) Embedded
answer
D) Embedded
question
Podcasts enable you to ________. A) communicate with friends in real time B) post journal entries on the Web C) edit video files over the Web D) broadcast over the Internet using compressed audio and video files such as MP3s and MP4s
answer
D) broadcast over the Internet using compressed audio and video files such as MP3s and MP4s
question
The name of the free Internet browser from Mozilla is ________. A) Safari B) Opera C) Internet Explorer D) Firefox
answer
D) Firefox
question
Software that does "back office" operations and processing functions such as billing, production, inventory management, and human resources management is called ________.A) accounting software B) enterprise resource planning software C) customer relationship management software D) project management software
answer
B) enterprise resource planning software
question
Software refers to a set of instructions that tells the computer what to do. These instruction sets are called ________.A) devices B) databases C) peripherals D) programs
answer
D) programs
question
In Windows, a file path starts with a ________. A) backslash () B) file name C) folder D) drive letter
answer
D) drive letter
question
During the virtual memory process, the operating system moves data to a temporary storage area on the hard drive called the ________ file.A) RAM B) virtual C) swap D) memory
answer
C) swap
question
The small circuit boards that hold a series of RAM chips are called ________. A) flash memory cards B) virtual memory C) expansion cards D) memory modules
answer
D) memory modules
question
The unique number assigned to a network adapter by the manufacturer is referred to as the ________ address.A) SSID B) MAC C) network D) IP
answer
B) MAC
question
Unwanted e-mail is called ________. A) software B) adware C) spam D) spyware
answer
C) spam
question
The small, touch-sensitive area at the base of the keyboard on a notebook computer is known as a ________.A) touch pad B) trackball C) game control D) stylus
answer
A) touch pad
question
Podcasts use which of the following technologies? A) an open source software application for 3D modeling B) RSS C) Vlog D) MSN Messenger
answer
B) RSS
question
The primary benefit of a spreadsheet program is ________. A) its ability to create charts B) its ability to automatically recalculate formulas and functions C) the preprogrammed functions D) its ability to have multiple worksheets in one workbook
answer
B) its ability to automatically recalculate formulas and functions
question
Which of the following types of programs help manage system resources such as the hard drive? A) application software B) utility programs C) application programming interfaces D) productivity software
answer
B) utility programs
question
All of the following are advantages of notebook computers EXCEPT: A) they are portable. B) wireless Internet access is easy to install. C) they take up little space. D) you get more speed for a lower price.
answer
D) you get more speed for a lower price.
question
Which of the following is NOT an example of a WAN? A) LANs connected in a single building B) A computer at a bank's main branch connected with a LAN at the bank's branch office across town C) A computer at a military base in Georgia connected with a computer at a military base in Florida D) A LAN at the main university campus connected with a LAN at the university extension site
answer
A) LANs connected in a single building
question
One potential application of ________ is to provide sight to the blind. A) biomedical chip implants B) VeriChips C) RFID tags D) patient simulators
answer
A) biomedical chip implants
question
________ software is the set of programs that enables the computer's hardware devices and application software to work together. A) Application B) System C) Binary D) Utility
answer
B) System
question
Boolean operators include such words as ________. A) NOT B) OR C) AND D) all of the above
answer
D) all of the above
question
Dancers can be wired with light electronic sensors so that their movements can be digitized for computer analysis.True/False
answer
True
question
SixthSense is a wearable device that consists of a camera, projector, and a mirror that can communicate with the Internet over wireless Bluetooth via a computer. True/False
answer
False, 6th sense is a supposed intuitive faculty giving awareness not explicable in terms of normal perception:
question
The for-profit Khan Academy contains over 2,200 videos, and over 1 million students a month use the site.True/False
answer
True
question
Data mining is the process of searching huge amounts of data with the hope of finding a pattern. True/False
answer
True
question
The menuboard of the Khan Academy shows exactly which topic a student has mastered and where they are failing to progress. True/False
answer
True
question
Light-emitting diode technology uses organic compounds that produce light when exposed to an electric current. True/False
answer
True
question
The operating system provides the means for users to interact with a computer. True/False
answer
True
question
Modern printers feature Bluetooth connectivity technology. True/False
answer
True
question
An alternative to the QWERTY keyboard is the virtual keyboard. True/False
answer
False
question
The four main functions of a computer are inputting data, processing data, outputting the data or information, and communicating the data or information. True/False
answer
False
question
Webcasts can be used to initiate a response from a viewing audience. True/False
answer
True
question
If you post a picture on your own social networking site, it could become available to the public via search engines. True/False
answer
True
question
The Internet was developed to ensure faster delivery of communications such as mail. True/False
answer
False
question
The Internet is the largest computer network in the world. True/False
answer
True
question
Macros are forms included in many productivity applications that provide the basic structure for a particular kind of document, spreadsheet, or presentation. True/False
answer
False, Templates not Macros
question
There are financial planning software applications available, such as Quicken, that integrate with tax preparation software. True/False
answer
True
question
Windows 7 is operating system software. True/False
answer
True
question
When your computer runs out of RAM, the operating system borrows space from the CPU. True/False
answer
False
question
A common-driven-interface is one in which you enter commands to communicate with the computer system.True/False
answer
True
question
The type of processor in the computer dictates which operating system a desktop uses. True/False
answer
True
question
3D sound is the same as surround sound. True/False
answer
False
question
Every computer is designed with a maximum limit on the amount of RAM it can support. True/False
answer
True
question
WEP is a stronger form of security than WPA. True/False
answer
False, WPA is stronger than WEP
question
All desktop and notebook systems sold today are network ready. True/False
answer
True
question
Biomedical chip implants are being used to provide sight to the blind. True/False
answer
True
question
Purpose is the freedom to work without constant direction and control. True/False
answer
False, The answer is "Autonomy" instead of "Purpose"
question
Speakers connect to the VGA port. True/False
answer
False, Speakers connect to audio out socket, headphones.
question
When performing data entry, you cannot use the numeric keypad on your keyboard to enter numeric values.True/False
answer
False
question
A universal chat client allows you to chat with users who are using a different IM service than you are. True/False
answer
True
question
Shareware is software that is distributed as trial software for a limited time. True/False
answer
True
question
When using Windows, you should create a restore point before installing new software. True/False
answer
True
question
RAM is your computer's permanent storage space for data that is entered from the keyboard. True/False
answer
False
question
Ethernet networks are always connected using twisted-pair cable technology. True/False
answer
False
question
Multimedia tours using mobile devices and wireless technology are not common in museums and galleries at this time.True/False
answer
False
question
When using Windows 7 power management tools, you really only need to shut down your computer when you need to repair the system, install hardware, or move the system. True/False
answer
True
question
Instant messaging is available only from AOL. True/False
answer
False
question
Many spreadsheet applications have the ability to sort, filter, and group data. True/False
answer
True
question
If you install a device that is not PnP, you will be prompted to install a driver. True/False
answer
True
question
Video cards often include their own RAM. True/False
answer
True
question
A P2P network needs network operating system software installed on every node. True/False
answer
False, In P2P network network is only set up once, other computer just have to connect to it.
Get an explanation on any task
Get unstuck with the help of our AI assistant in seconds
New