Computer Literacy Practice Exam Chapters 1-3

________ is a wearable device that hangs around your neck consisting of a camera, a projector,
and a mirror that can communicate with the Internet over wireless Bluetooth technology.

A) ESP
B) Data mining
C) FastSCAN
D) SixthSense

C) FastSCAN

Unwanted e-mail is called ________.
A) software
B) adware
C) spam
D) spyware
C) spam

Children who do not have access to ________ and ________ won’t be prepared for future
employment.

A) television, video games
B) databases, data mining
C) the Internet, computers
D) information, data

C) the Internet, computers

The ability to recover and read deleted or damaged files from a criminal’s computer is an example
of a law enforcement specialty called ________.

A) RFID simulation
B) computer forensics
C) robotics
D) HALO animation

B) computer forensics

A technology named ________ lets any piece of print in the real world host a live link to online information and video content.

A) marketing response codes
B) quick response codes
C) ShopSavvy scanning barcodes
D) crowdsourcing consumer checking

B) quick response codes

The Witness Project uses the power of video and a grassroots movement to advocate for
________.

A) computer literacy
B) responsible citizenship
C) human rights
D) social networking

C) human rights

Being computer savvy means you ________.

A) use the Internet and Web wisely
B) avoid hackers and viruses
C) are able to maintain, upgrade, and troubleshoot your computer
D) do all of the above

D) do all of the above

Which of the following is NOT necessarily part of being computer literate?

A) being able to build a computer
B) protecting your privacy
C) using the Internet wisely
D) avoiding hackers and viruses

A) being able to build a computer

Joining together as a group to use a specific product more efficiently is called ________.

A) creative surplus
B) social networking
C) affective computing
D) collaborative consumption

D) collaborative consumption

_______ tags, when placed on a car, can be used to record and track in a database all of the
vehicle’s movements.

A) GPS
B) RFID
C) PPS
D) POS

B) RFID

USB ports are fast replacing traditional ________ ports because of their ability to transfer data
quickly.

A) parallel and serial
B) Ethernet and speaker
C) monitor and modem
D) video and audio

A) parallel and serial

________ plug into slots on the motherboard and provide additional functionality for your
computer.

A) USB devices
B) Expansion cards
C) Drive bays
D) Ports

B) Expansion cards

The term “bit” is short for ________.

A) binary language
B) megabyte
C) binary digit
D) binary number

C) binary digit

A (n) ________ enables you to enter data (text, images, and sound) and instructions (user responses and commands) into the computer.

A) output device
B) system unit
C) input device
D) m otherboard

C) input device

________ is a power mode that allows the computer to save an image of the desktop to the hard
drive and enter a state of reduced power consumption to save energy.

A) Cool down
B) Hibernate
C) Standby
D) Sleep

B) Hibernate

Which of the following is NOT one of the four major data processing functions of a computer?

A) processing data into information
B) storing the data or information
C) gathering data
D) analyzing the data or information

D) analyzing the data or information

HTTP is the abbreviation for ________.

A) Hyper Transmission Protocol
B) Hypertext Protocol
C) Hypertext Transmission Protocol
D) Hypertext Transfer Protocol

D) Hypertext Transfer Protocol

________ is a social networking service that enables you to exchange short text messages with
your friends or “followers.”

A) Yahoo! Text
B) Twitter
C) Facebook
D) MySpace

B) Twitter

All of the following are parts of a URL EXCEPT:

A) hyperlinks.
B) the domain name.
C) WWW.
D) the protocol.

A) hyperlinks.

A set of programs that searches the Web to find information is called a ________.

A) breadcrumb trail
B) browser
C) search engine
D) phisher

C) search engine

When a job is sent to other countries, as many programming jobs have been, it is said to have been
________.

A) imported
B) offshored
C) resourced
D) exported

B) offshored

The difference between people with access to computers and the Internet and those without this
access is known as the ________.

A) Web divide
B) broadband divide
C) Internet divide
D) digital divide

D) digital divide

________ is a field of study focused on information handling and retrieval of information
automatically.

A) RFID
B) Information technology
C) Database mining
D) Computer forensics

B) Information technology

RAM is considered volatile storage, which means it is ________.

A) temporary
B) permanent
C) read-only
D) random

A) temporary

The small, touch-sensitive area at the base of the keyboard on a notebook computer is known as a
________.

A) stylus
B) game control
C) touch pad
D) trackball

C) touch pad

Podcasts enable you to ________.

A) post journal entries on the Web
B) edit video files over the Web
C) communicate with friends in real time
D) broadcast over the Internet using compressed audio and video files such as MP3s and MP4s

D) broadcast over the Internet using compressed audio and video files such as MP3s and MP4s

One proposed answer to close the digital divide is to promote ________ as a means for low-income families to access the Internet.

A) social networking
B) mobile devices
C) affective computing
D) Nintendo Wii

B) mobile devices

Inkjet printers and laser printers are examples of ________ printers.

A) impact
B) nonimpact
C) thermal
D) dot-matrix

B) nonimpact

A webcast is ________.

A) a podcast that is updated automatically
B) another name for a podcast
C) a device needed for a podcast
D) the broadcast of audio or video content over the Internet

D) the broadcast of audio or video content over the Internet

The ________ lets information be created, distributed, and filtered by users themselves in real
time.

A) Mobile bridge
B) Childhood Walk
C) Virtual Choir
D) DYTHR project

D) DYTHR project