Computer Science Exam #2 Test Questions – Flashcards
Unlock all answers in this set
Unlock answersquestion
The web is based on the ________ Protocol. A) Hypertext Translate B) Hypertext Transfer C) Hypertext Trade D) Hypertext Transmit
answer
B) hypertext transfer
question
The browser feature where tabs are independent of each other is known as ________. A) pinned tabs B)tab isolation C)privacy browsing D) free tabs
answer
B) tab isolation
question
Which of the following is NOT a precaution to take when shopping online? A) Avoid making online transactions on a public computer. B) Shop at well-known, reputable sites. C) Pay with a debit card, not a credit card. D) When placing an order, make sure you receive a confirmation number.
answer
C) pay with a debit card, not a credit card
question
Which of the following top-level domains identifies a degree-granting institution? A) .gov B) .info C) .net D) .edu
answer
D) .edu
question
Software that enables you to display and interact with text and other media on the web is a web ________. A) server B) agent C) client D)browser
answer
D) browser
question
All of the following are types of e-commerce business EXCEPT ________. A)B2C B) C2C C) C2B D)B2B
answer
C) C2B
question
In the URL http://www.microsoft.com/surface, the portion labeled "http" is the ________. A)top-level domain B)protocol C) domain name D) path
answer
B) protocol
question
Which of the following is NOT a feature of the most popular web browsers? A) Pinned tabs B) Tacked browsing C) Session restore D) Thumbnail preview
answer
B) tacked browsing
question
Which of the following is NOT a social networking site? A) Facebook B) iTunes C) LinkedIn D) YouTube
answer
B) iTunes
question
A(n) ________ is a navigation aid that shows the path you have taken to get to a web page or where the page is located within the website. A) navigation bar B) cookie trail C) breadcrumb trail D) index
answer
C) breadcrumb trail
question
Adobe Reader, Flash Player, and QuickTime Player are examples of software programs called ________. A) plug-ins B)browsers C) helpers D) aggregators
answer
A) plug-ins
question
In the URL http://www.microsoft.com/surface, the portion labeled "surface" is the ________. A) domain name B) top-level domain C) path D) protocol
answer
C) path
question
____________ is a professional, business-orientated social networking site A) Picasa B) Flickr C) Twitter D) LinkedIn
answer
D) Linkedin
question
A(n) ________ system requires a program, such as Microsoft Outlook, to be installed on your computer, and when the program is opened, your e-mail is downloaded to your computer. A) web-based e-mail B) business-to-consumer (B2C) C) consumer-to-consumer (C2C) D) e-mail client
answer
D) e-mail client
question
The unique address for a particular website is the ________. A) client B) domain section C) URL D) protocol
answer
C) URL
question
The Internet is ________. A) the same as the web B) a large network of networks C) an internal communication system for businesses D) a communication system for the U.S. military
answer
B) A large network of networks
question
A(n) ________ is a usually a live broadcast of audio or video content. A)Podcast B) Instant message C) Wiki D) Webcast
answer
D) webcast
question
In the URL http://www.microsoft.com/surface, the portion labeled ".com" is the ________. A) top-level domain B) domain name C) protocol D) host
answer
A) top-level domain
question
A ________ allows visitors to add, remove, or edit its content. A) wiki B) chat C) podcast D) blog
answer
A) wiki
question
A ________ is a personal journal posted on the web. A) wiki B) webcast C) blog D) podcast
answer
C) blog
question
The World Wide Web was based on a protocol developed by ________. A) Apple B) Microsoft C) the U.S. government D) Tim Berners-Lee
answer
D) Tim Berners-Lee
question
A Microsoft ________ account allows you to store and share files in the cloud. A) iCloud B) Drive C) Dropbox D) OneDrive
answer
D) OneDrive
question
The "fathers" of the Internet are Vinton Cerf and ________. A) Robert Kahn B) Bill Gates C) Robert Cailliau D) Tim Berners-Lee
answer
A) Robert Kahn
question
All of the following are tips for professional e-mail etiquette EXCEPT ________. A) be concise and to the point B) include a meaningful subject line C) use abbreviations such as "u," "r," and "BRB" to keep the e-mail message shorter D) use spell-checker and proofread before sending
answer
C) use abbreviations such as "u," "r," and "BRB" to keep the e-mail message shorter
question
The "s" in "https" stands for for ________ socket layer. A) server B) semantic C) social D) secure
answer
D) secure
question
The unique identification number assigned to your computer when you connect to the Internet is known as all of the following EXCEPT ________. A) IP address B) dotted decimal C) dotted quad D) path
answer
D) path
question
Which of the following is NOT a proprietary instant messaging (IM) service? A) Google Chat B) Yahoo! Messenger C) AIM D) LinkedIn Messenger
answer
D) LinkedIn messenger
question
Which of the following are personal video journal entries posted on the web? A) Newsgroups B) Podcasts C) Blogs D) Vlogs
answer
D) Vlogs
question
The concept of the Internet was developed in response to the ________ War. A) Cold B) Gulf C) Vietnam D) Korean
answer
A) cold
question
________ media are continuously fed to your browser so you do not have to wait for the entire file to completely download before listening to or watching it. A) Tagged B) Streaming C) Hyperlinked D) Top-level
answer
B) Streaming
question
AND, OR, and NOT are examples of ________ operators. A) keyword B) relational C) Jacobian D) Boolean
answer
D) boolean
question
Which of the following Windows utility programs arranges pieces of files on your hard drive to allow for faster access? A) Disk Cleanup B) Error-checking C) Disk Defragmenter D)Task Manager
answer
C) Disk Defragmenter
question
The latest version of the Mac OS X is ________. A) Snow Leopard B) Tiger C) Mavericks D)Mountain Lion
answer
D) Mountain Loin
question
Deleted files on a Mac computer are moved to the ________. A) Trash B) Garbage Can C) Recycle Bin D) Wastepaper Basket
answer
A) trash
question
Mac OS X includes a backup utility called ________. A) System Restore B) Carbonite C) Time Capsules D) Time Machine
answer
D) Time machine
question
UNIX was developed by Ken Thompson and Dennis Richie, who worked at ________. A) Xerox B) Microsoft C) AT&T's Bell Labs D) IBM
answer
C) AT&T's Bell Labs
question
C: denotes a ________ directory that is at the top of the filing structure of a computer. A) cluster B) top-level C) root D) upper-level
answer
C) root
question
Errors in computer software are called ________. A) beetles B) spiders C) worms D) bugs
answer
D) bugs
question
Which of the following is NOT a Windows utility program? A) System Restore B) Desktop C) Disk Defragmenter D) Disk Cleanup
answer
B) desktop
question
OS X is the operating system developed by ________. A) Linux B) Microsoft C) Google D) Apple
answer
D) Apple
question
The ________ of the operating system enables users to communicate with the computer system. A) network adapter card B) modem C) user interface D) window
answer
C) user interface
question
All of the following can be used in an OS X file name EXCEPT ________. A) : B) % C)# D) $
answer
A) :
question
All of the following are examples of network operating systems EXCEPT ________. A) MS-DOS B) Linux C) Windows 8 D) OS X
answer
D)OS X
question
C:WindowsSystem32driversetcprotocol is an example of a file ________. A) extension B) path C) type D) list
answer
B) path
question
The location of a file is specified by its ________. A) file extension B) drive identifier C) file path D) file
answer
C) file path
question
You can use the Windows ________ to check on a nonresponsive program. A) System Restore B) Error-checking C) Backup utility D) Task Manager
answer
D) task manager
question
Each device attached to your computer comes with a special program called a(n) ________ that enables the device and operating system to communicate with each other. A) translator B) device driver C) device configurator D) interpreter
answer
B) device driver
question
Which of the following is the first step in the boot process? A) The BIOS checks that all devices are in place. B) The OS is loaded into RAM. C) The BIOS is activated by turning on the computer. D) Configuration and customization settings are checked.
answer
C) The BIOS is activated by turning on the computer.
question
Most smartphones use operating systems developed by ________. A) Symbian and Apple B) Microsoft and Google C) Google and Apple D) Apple and Microsoft
answer
C) Google and Apple
question
Most supercomputers use the ________ operating system. A) iOS B) Windows C) Linux D) UNIX
answer
C) Linux
question
Which of the following operating systems are used on most tablets? A) Android and iOS B) Windows and iOS C) Windows and Android D) BlackBerry and Windows
answer
A or B
question
Which of the following is NOT a user interface? A) graphical user interface (GUI) B) menu-driven C) application programming interface (API) D) command-driven
answer
C) application programming interface (API)
question
Which operating system is used by most desktop and laptop computers? A) Linux B) UNIX C) OS X D) Windows
answer
D)Windows
question
Using hard disk space to temporarily store data or instructions from RAM is referred to as ________. A) compressing B) spooling C) interrupting D) virtual memory
answer
D) virtual memory
question
Running the Disk Cleanup utility is a quick way to ________. A) clean out your Startup folder B) remove spyware programs C) clear out unnecessary files D) defrag your hard
answer
C) clear out unnecessary files
question
The rule of thumb that predicts that CPU capacity will double every 2 years is called ________ Law. A) Intel's B) Moore's C) Boyle's D) Charles's
answer
B) Moore's
question
To remove all the changes made to your system, the Windows ________ utility returns your computer to the state it was in when it came from the factory. A) Refresh B) Backup C) Erase D) Restore
answer
D) restore
question
Which statement pertaining to system reliability is FALSE? A) You can clean out unnecessary programs from your Startup folder. B) Having the latest version of software products can make your system more reliable. C) An accumulation of temporary Internet files has no effect on your computer's overall performance. D) When you defrag your hard drive, it works more efficiently
answer
C) An accumulation of temporary Internet files has no effect on your computer's overall performance.
question
A ________ uses electronic memory and has no motors or moving parts. A) solid-state drive B) Blu-ray disc C) digital video disc D) mechanical hard drive
answer
A) solid-state drive
question
Which of the follow ports is NOT used to connect to a video card? A) DVI B) USB C) HDMI D) DisplayPort
answer
B) USB
question
All of the following are part of the machine cycle EXCEPT ________. A) encode B) store C) fetch D) execute
answer
A) encode
question
Running the Disk Defragmenter utility will ________. A) mark bad memory cells B) make the hard drive work more efficiently C) detect and remove spyware D) clean out your Startup folder
answer
B) make the hard drive work more efficiently
question
In Dolby Digital 7.1, the 1 indicates a ________ speaker. A) tweeter B) digital C) cross-over D) subwoofer
answer
B) digital
question
The amount of RAM storage is measured in ________. A) GHz B) GB C) Hz D) MHz
answer
B) GB
question
Running the CPU at a faster speed than the manufacturer recommends is called ________. A) overclocking B) hyperthreading C) fetching D) latency
answer
A) overclocking
question
________ provides high-speed information processing by enabling a new set of instructions to start before the previous set is finished. A) Cache memory B) Multitasking C) Overclocking D) Hyperthreading
answer
D) hyperthreading
question
The CPU consists of which two parts? A) The control unit and the front side bus B) The control unit and cache memory C) The arithmetic logic unit and the front side bus D) The control unit and the arithmetic logic unit
answer
D) The control unit and the arithmetic logic unit
question
Which of the following does NOT determine processor power? A) Use of multiple cores B) Clock speed C) Speed of the motherboard D) Amount of cache memory
answer
B) Clock Speed
question
There are ________ levels of cache memory. A) five B) four C) three D) two
answer
C) three
question
Which of the following is the lightest computer? A) Desktop B) Laptop C) Ultrabook D) Tablet
answer
C) Ultrabook
question
A ________ enables the computer to drive the speaker system. A) PCI bus B) sound card C) display port D) HDMI
answer
B) sound card
question
The most popular transmission media option for wired home Ethernet networks is ________ cable. A) coaxial B) power-line C) fiber-optic D) unshielded twisted-pair (UTP)
answer
D) unshielded twisted- pair
question
Using a network without the network owner's permission is known as ________. A) phishing B) spamming C) hijacking D) piggybacking
answer
D) piggybacking
question
Which of the following is NOT used to classify network architectures? A) Communication medium B) Speed of the network C) Protocol used to exchange data D) Distance between nodes
answer
B) speed of the network
question
A ________ is a device connected to a network such as a printer or a game console. A) NIC B) node C) NOS D) packet
answer
B) node
question
Wireless network devices use ________ to communicate with each other. A) DSL B) satellites C) radio waves D) fiber optics
answer
C) Radio waves
question
Normal telephone cable is a type of ________. A) coaxial cable B) fiber-optic cable C) twisted-pair cable D) Ethernet cable
answer
C) twisted- pair cable
question
Which transmission medium transmits data the fastest? A) Twisted-pair cable B) Wireless C) Coaxial cable D) Fiber-optic cable
answer
D) Fiber-optic cable
question
On a network, a(n) ________ helps prevent data packets from colliding with each other. A) hub B) router C) adapter D) switch
answer
D) Switch
question
Client/server networks are controlled by a central server that runs specialized software called a(n) ________. A) digital subscriber line (DSL) B) service set identifier (SSID) C) network operating system (NOS) D) information management system (ISM)
answer
C) network operating system (NOS)
question
________ is the actual speed of data transfer that is achieved and is always less than or equal to the data transfer rate A) Benchmark B) Throughput C) Broadband D) Bandwidth
answer
B) throughput
question
________ is the maximum speed at which data can be transferred between two nodes. A) Through speed B) Bandwidth C) Broadband D) Throughput
answer
B) bandwith
question
Which of the following is NOT a wired broadband Internet connection option? A) Cable B) DSL C) Fiber-optic D) Dial-up
answer
D) Dial Up
question
A peer-to-peer (P2P) network is an example of ________ administration. A) local B) corporate C) central D) wide area
answer
A) local
question
A computer connected to the Internet that asks for data is a ________. A) surrogate B) aggregator C) server D) client
answer
D) client
question
A subset of e-commerce that uses social networks to assist in marketing and purchasing products is known as social ________. A) enterprise B) business C) shopping D) commerce
answer
D) Commerce
question
Podcasts enable you to ________. A) edit video files over the web B) deliver audio/video files via RSS C) post journal entries on the web D) communicate with friends in real time
answer
B) deliver audio/video files via RSS
question
Which of the following is a feature of Live bookmarks? A) Adds RSS technology to bookmarks B) Streams live television programs C) Enables you to pin your favorite website images D) Broadcasts webinars
answer
A) Adds RSS technology to bookmarks
question
The basic input/output system (BIOS) is stored on a ________ chip. A) CMOS B) CPU C) RAM D) ROM
answer
D) ROM
question
Windows 8 uses a(n) ________ account for easy access and storage of online files. A) Chrome B) eye OS C) OneDrive D) iCloud
answer
C) OneDrive
question
All of the following are terms related to part of the boot process EXCEPT ________. A) USB B) RAM C) ROM D) CMOS
answer
A) USB
question
Which of the following is the name of a Microsoft Excel file? A) inventory.wpd B) inventory.pdf C) inventory.xlsx D) inventory.accdb
answer
D) inventory.accdb
question
Which utility removes redundancies in a file to reduce the file size? A) Disk Cleanup B) Disk Defragmenter C) File Compression D) Error-checking
answer
C) File Compression
question
When using Windows 8 File Explorer, which view provides the most information at a glance? A) Content B) List C) Tiles D) Details
answer
D) Details
question
The two major types of system software programs are utility programs and the ________. A) operating system B) charms C) user interface D) application software
answer
A) operating system
question
The control unit is one component of the ________. A) CPU B) cache C) clock D) front side bus
answer
A) CPU
question
RAM is an example of ________ storage. A) volatile B) mobile C) permanent D) nonvolatile
answer
D) nonvolatile
question
The speed of a level of cache memory is impacted by ________. A) the amount of storage space on the chip B) the chip's proximity to the CPU C) the physical size of the chip D) the size of the hard drive
answer
B) the chip's proximity to the CPU
question
Which of the following is NOT an optical disc format? A) Rewritable (RW) B) Read-erasable (RE) C) Read-only (ROM) D) Recordable (R)
answer
B) read-erasable
question
Which optical disc has the greatest storage capacity? A) DVD B) CD C) Blu-ray D) Flash
answer
C) blu-ray
question
In most current systems, ________ is the type of RAM used. A) DDR2 B)SDRAM C) DDR3 D) DRAM
answer
C)DDR3
question
Windows uses a memory-management technique known as ________ to monitor which applications you frequently use and preloads them into your system memory. A) SuperRetrieve B) SuperFetch C) SuperTake D) SuperGet
answer
B) SuperFetch
question
A large network designed to provide access to a specific geographic area, such as a large city, is a ________. A) MAN B) LAN C) PAN D) WAN
answer
A) MAN
question
A client/server network is an example of ________ administration A) wide area B) central C) remote D) local
answer
B) central
question
All of the following are extra precautions you can take to secure a wireless network EXCEPT ________. A) change your network name (SSID) B) turn on security protocols C) create a passphrase D) enable SSID broadcast
answer
D) enable SSID broadcast
question
A computer ________ is two or more computers connected using software and hardware so that they can communicate with each other. A) node B) switch C) network D) broadband
answer
C) network
question
The unique number assigned to a network adapter by the manufacturer is referred to as the ________ address. A) IP B) network C) MAC D) SSID
answer
A) IP
question
The processor market for desktop and laptop computers is dominated by ________. A) IBM B) Apple C) Intel D)Microsoft
answer
...
question
To speed up the display of graphics, a(n) ________ is installed on some video cards. A) CPU B) GPU C) ALU D) SSD
answer
GPU
question
To securely erase data, the U.S. Department of Defense suggests that the data be overwritten ________ times. A) ten B) five C) two D) seven
answer
D) Seven
question
Which of the following activities is carried out by the ALU? A) Move read/write heads. B) Render video images. C) Perform arithmetic calculations. D) Create virtual memory.
answer
C) perform arithmetic calculations
question
The fastest version of wireless Ethernet is ________. A) 802.11g B) 802.11ab C) 802.11ac D) 802.11n
answer
C) 802.11ac
question
Data are sent through a network in bundles called ________. A) nodes B) packages C) packets D) pouches
answer
C) packets
question
A(n) ________ device facilitates file sharing and data backup. A) UTP B) NOS C) WAN D) NAS
answer
D) NAS
question
The ________ has the largest capacity of any storage device. A) SSD B) DVD C) mechanical hard drive D) CD
answer
C) mechanical hard drive
question
When referring to hard drives, access time is measured in ________. A) milliseconds B) bps C) kilobytes D) megahertz
answer
A) milliseconds
question
Sophisticated networks generally use which of the following hardware devices to ease the flow of data through the network? A) USB ports B) Firewalls C) Firmware D) Routers and switches
answer
D) routers and switches
question
Which of the following is NOT a type of UTP cable you would use in a wired Ethernet network? A) Cat 6 B) Cat 6A C) Cat 7B D) Cat 5E
answer
C) Cat7B
question
For the nodes on a network to communicate with each other and access the network, each node needs a ________. A) DSL modem B) hub C) network adapter D) router
answer
C) network adapter
question
All of the following are tasks for network administration of a large organization EXCEPT ________. A) monitoring network performance B) updating and installing new software on the network C) installing new computers and devices on the network D) purchasing initial equipment for the network
answer
D) purchasing initial equipment for the network
question
To transfer data packets between two or more networks, a ________ is used. A) hub B) firewall C) router D) switch
answer
C) router
question
A ________ is a network located in your residence that connects to all your digital devices. A) MAN B) WAN C) LAN D) HAN
answer
D) HAN
question
Which of the following is NOT a type of cable used in wired networks? A) Unshielded twisted-pair B) Fiber-optic C) Coaxial D) Unshielded coaxial
answer
D) Unshielded coaxial
question
All of the following operating systems support P2P networking EXCEPT ________. A) Unix B) OS X C) Windows D) Linux
answer
A) UNIX
question
A network that spans a large physical distance is called a ________. A) WAN B) LAN C) MAN D) PAN
answer
WAN