Info 160 Exam

question

The connectivity port that uses a standard phone line connection is the modem port.
answer

True
question

Computer systems run at speeds measured in gigahertz.
answer

True
question

Processing is manipulating, calculating, or organizing data into information.
answer

True
question

The central processing unit controls all the functions performed by the computer’s other components and processes all the commands issued to it by software instructions.
answer

True
question

________ is the applied science concerned with designing and arranging machines and furniture so that the people using them aren’t subjected to an uncomfortable or unsafe experience.
answer

Ergonomics
question

A(n) ________ is a specially designed computer that can perform complex calculations extremely fast.
answer

supercomputer
question

Mainframes are used in situations where complex models requiring intensive mathematical calculations are needed.
answer

False
question

All of the following are names for a flash drive, EXCEPT ________. USB Drive Jump Drive Hard Drive Thumb Drive
answer

Hard Drive
question

RAM is a ________ storage location.
answer

volatile
question

Inkjet printers and laser printers are examples of ________ printers.
answer

nonimpact
question

New technologies pushing the boundaries of printing include ________.
answer

Inkless Printing
question

________ are shortcut keys that you press to perform special tasks; each software application has its own set of tasks assigned to these keys.
answer

Function Keys
question

Data and information are terms that can be used interchangeably
answer

False
question

The four functions of the computer include input, process, output, and ________.
answer

Storage
question

________ computers are specially designed computer chips that reside inside other devices such as your car or the electronic thermostat in your home.
answer

Embedded
question

Which of the following is the largest unit of measure for the size of a computer file?
answer

Petabyte
question

A(n) ________ is an input device that looks like a pen.
answer

Stylus
question

Modern printers feature Bluetooth connectivity technology.
answer

true
question

Podcasts enable you to ________.
answer

deliver audio/video files via RSS.
question

________ use(s) continuous audio and video feeds.
answer

Webcasts
question

The concept of the Internet was developed in response to the ________ War.
answer

Cold
question

Software that enables you to display and interact with text and other media on the Web is a ________.
answer

web browser
question

Wikipedia is a good source for a research paper.
answer

False
question

In the URL http://www.pearsonhighered.com/techinaction, the portion labeled “.com” is the ________.
answer

top-level domain
question

The Internet is the largest computer network in the world.
answer

True
question

All of the following are a type of e-commerce business, EXCEPT ________. C2B B2C C2C B2B
answer

C2B
question

Web 2.0 is classified as the ________.
answer

Social Web
question

When evaluating a Web site, testing the relevancy of a site means checking to see whether the information in the site is current.
answer

True
question

There are virtually no privacy risks in using today’s newest social networking sites.
answer

False
question

A ________ is a personal journal posted on the Web.
answer

blog
question

A list of pages within a Web site that you have visited and that usually appears at the top of a page is referred to as a(n) ________.
answer

breadcrumb trail
question

In the URL http://www.pearsonhighered.com/techinaction, the portion labeled “http” is the ________.
answer

protocol
question

E-mails are completely private.
answer

False
question

Multimedia software includes all of the following, EXCEPT ________.
answer

Utility Software
question

The type of software that is best used to create a simple budget is ________.
answer

spreadsheet software
question

A(n) ________ software installation enables you to decide which features you want to install on the hard drive.
answer

custom
question

System software does all of the following, EXCEPT ________. -coordinate instructions between application software and the computer’s hardware devices -add graphics and pictures to files -help run the computer -help manage system resources
answer

Add graphics and pictures to files
question

QuickBooks and Peachtree are examples of ________ software.
answer

accounting
question

Another way to obtain software is through ________, where a vendor hosts the software online over the Internet and you do not have to install it on your computer.
answer

open source as a service
question

Moodle and Blackboard are examples of ________.
answer

course management software
question

______ software is the software that helps run the computer and coordinate instructions between the computer and the hardware devices.
answer

System
question

The type of software that is free and available with few licensing and copyright restrictions is known as ________ software.
answer

open source
question

In a spreadsheet, equations that use addition, subtraction, multiplication, and division operators, as well as values and cell references are called ________.
answer

question

The appropriate software to use for creating research papers is ________.
answer

word processing software
question

The general software you use to do tasks at home, school, or work is known as ________ software.
answer

application
question

Adobe Photoshop and Corel PaintShop Photo Pro are examples of ________ software.
answer

image-editing
question

All of the following are examples of software suites, EXCEPT ________. -Microsoft Office 2010 -Apple iWork -Apache OpenOffice -Microsoft OneNote
answer

Microsoft OneNote
question

Web-based application software is software that ________.
answer

is stored completely on a Web server instead of your hard drive
question

In databases, information is organized in ________.
answer

tables, records, and fields
question

Software as a Service (SaaS) is a Web-based application.
answer

True
question

A wizard is a systematic guide that walks you through the steps necessary to complete a complicated task.
answer

True
question

The most common compressed digital format is MP3.
answer

True
question

OpenOffice.org is an example of open source software.
answer

True
question

Desktop publishing software enables you to create newsletters and annual reports.
answer

True
question

One of the new capabilities of PowerPoint 2010 enables you to trim video clips without a separate video-editing program.
answer

True
question

Application software helps run the computer and coordinates instructions.
answer

False
question

Microsoft’s spreadsheet software is called Calc.
answer

False
question

The location of a file is specified by its ________.
answer

file path
question

C:DocumentsSpring 2012CIS 101Term PaperComputer Technology is an example of a ________.
answer

file path
question

Each device attached to your computer comes with a special program called a ________ that facilitates communication between the device and the OS.
answer

device driver
question

Which utility takes out redundancies in a file to reduce the file size?
answer

File Compression
question

The process of optimizing RAM storage by borrowing hard drive space is called ________.
answer

virtual memory
question

Mac OS X includes a backup utility called ________.
answer

Time Machine
question

Windows 8 is the operating system developed by ________.
answer

Microsoft
question

A(n) ________ is a small program that performs general housekeeping tasks for your computer.
answer

utility program
question

Which of the following was the first widely used operating system installed in personal computers?
answer

MS-DOS
question

The most essential software in your computer system is the ________.
answer

operating system
question

Which of the following is an open source operating system for personal computers?
answer

Linux
question

The ________ is(are) the group of programs that controls how your computer functions.
answer

user interface
question

Errors in computer software are called ________.
answer

bugs
question

If Microsoft Word 2010 is used to create a file, which file extension is added automatically?
answer

.docx
question

The OS enables you to organize the contents of your computer in a hierarchical structure of ________.
answer

question

You can use the Windows ________ to check on a nonresponsive program.
answer

Task Manager
question

Match the following terms to their meanings: 1.Task Manager 2.System Restore 3.Disk Cleanup 4.Disk Defragmenter 5.Error-Checking
answer

1.lists all the programs being used and indicated their status. 2.brings system back to a previously stable state. 3.removes unnecessary files from the hard drive. 4.regroups related pieces of files on the hard disk. 5.checks the hard drive for damaged files.
question

Match the following terms to their meanings: 1.open source 2.source code 3.Mac OS 4.platform 5.Windows 8
answer

1.a program that is freely available for developers. 2.lines of instructional computer code 3.Apple operating system 4.combination of processor and operating system. 5.the newest Microsoft OS
question

A ________ is a virus that is triggered on a certain date.
answer

time bomb
question

With regard to computer protection, quarantining is defined as ________.
answer

placing a found virus in a secure area on the hard drive
question

Rules for creating passwords include all of the following, EXCEPT ________. -keep your password a secret -create a hard-to-guess password, with a combination of letters, numbers, and symbols -keep your password written down and stored in any easy-to-remember location -change your password frequently
answer

keep your password written down and stored in any easy-to-remember location
question

Adware and spyware are referred to collectively as ________.
answer

grayware
question

________ floods a computer with requests until it shuts down and refuses to answer any requests for information.
answer

DDoS attack
question

A(n) ________ is the portion of virus code that is unique to a particular computer virus.
answer

Virus signature
question

Which of the following statements about cookies is NOT true? -Some companies sell the personal information found in cookies to other companies. -Cookies are text files. -Cookies help companies determine the traffic flow through their Web site. -Cookies obtain your personal information by searching your hard drive.
answer

Cookies obtain your personal information by searching your hard drive.
question

All of the following are the main functions of antivirus software, EXCEPT ________. -inoculating key files -looking for virus signatures -quarantining viruses -assassinating all viruses
answer

assassinating all viruses
question

________ hackers break into systems for non-malicious reasons such as to test system security vulnerabilities.
answer

White-hat
question

A ________ is a virus that is attached to documents such as Word or Excel files.
answer

macro virus
question

Antivirus software will stop all viruses.
answer

False
question

A worm infects a host file and waits for that file to be executed on another computer to replicate.
answer

False
question

A denial-of-service attack can be used to deny hackers access to a computer system.
answer

False
question

The terms “virus” and “worm” actually mean the same thing.
answer

False
question

Identity theft does NOT cause financial harm to individuals.
answer

False
question

A virus signature is a portion of virus code that is unique to a particular computer virus.
answer

True
question

A time bomb is a virus that is triggered when certain conditions are met such as opening a file.
answer

False
question

Match the following terms to their meaning: 1.CPU 2.RAM 3.ROM 4.LCD 5.QWERTY
answer

1. processes all commands issued by software instructions 2. stores programs and data the computer is currently using 3. holds instructions needed to start up when the computer is powered on 4. type of technology used on flat-screen monitors 5. standard keyboard layout
question

Match the following terms to their definition: 1.WWW 2.browser 3.e-mail 4.Internet 5.search engine
answer

1. the means of accessing information over the Internet 2. an application program used to view the Web 3. electronic communication 4. a large network of networks 5. a tool used to locate information on the Web
question

Match the following terms to their definitions: 1. worm 2. computer virus 3. encryption virus 4. polymorphic virus
answer

1. Attempts to travel between systems through network connections to spread an infection 2. A program that renders your computer files unusable by compressing them 3. A program that attaches itself to another program and attempts to spread itself to other computers through the exchange of files 4. A virus that changes its own code to avoid detection
question

Match the following terms to their definitions: 1.grey-hat hacker 2.black-hat hacker 3.phishing 4.social engineering 5.white-hat hacker
answer

1. flaunts expertise to the administrator of a system 2. An unethical hacker 3. sending an e-mail containing false information to obtain personal information 4. techniques used to manipulate people into performing actions or divulging confidential information 5. an “ethical” hacker
question

What is the free antivirus software available to all VCU students?
answer

Sophos

Get instant access to
all materials

Become a Member