You are on page 1of 15

Name: Date: Course: 2010 Fall 201 Test: Quiz3-Review

Textbook Questions Ch 1 and 9

__________ 1. All of the following are examples of real security and privacy risks EXCEPT
a. spam.
b. hackers.
c. identity theft.
d. viruses.

__________ 2. Unwanted electronic e-mail is called


a. spyware.
b. adware.
c. software.
d. spam.

__________ 3. A process known as ____________ is used by some retailers to study trends.


a. POS mining
b. data mining
c. data selection
d. data conversion

__________ 4. Which of the following is NOT necessarily part of being computer literate?
a. avoiding hackers and viruses
b. being able to build a computer
c. using the Internet wisely
d. protecting your privacy

__________ 5. ____________ is the set of techniques used in information handling and retrieval.
a. RFID
b. Computer forensics
c. Information technology
d. Database mining

__________ 6. ____________ refers to the programs that give commands to the computer.
a. Hardware
b. IT
c. Computer forensics
d. Software

1
Name: Date: Course: 2010 Fall 201 Test: Quiz3-Review
Textbook Questions Ch 1 and 9

__________ 7. __________ can keep track of the purchases customers make, along with customers'
geographic data, past buying history and lists of items they examined but did not purchase.
a. Data mining
b. A PSS
c. Data retrieval
d. A PDA

__________ 8. The process of searching huge amounts of data with the hope of finding a pattern is called
a. data mining.
b. data searching.
c. data warehousing.
d. data retrieval.

__________ 9. A _____________ is a specially designed scannable sticker that resembles an inkblot and
contains all the important information about a UPS package.
a. packing label
b. PostCode
c. mailing label
d. Maxicode

__________ 10. ____________ is a type of wireless communication used by UPS to transmit scanned data
through radio waves to a terminal.
a. Bluetooth technology
b. POS technology
c. RFID technology
d. MU technology

__________ 11. _______________ is a type of wireless communication that transmits data through radio
waves.
a. POS technology
b. Bluetooth technology
c. Nanotechnology
d. USB technology

2
Name: Date: Course: 2010 Fall 201 Test: Quiz3-Review
Textbook Questions Ch 1 and 9

__________ 12. A computer operator can easily create new experiences for an audience by pairing a live
dancer with a(n):
a. virtual art.
b. computer-simulated graphics.
c. virtual dancer.
d. nanotechnology.

__________ 13. When a job is sent to other countries, as many programming jobs have been, it is said to
have been
a. offshored.
b. imported.
c. resourced.
d. exported.

__________ 14. Game programming requires an in-depth knowledge of


a. software animation tools.
b. Pascal.
c. HTML.
d. the Internet.

__________ 15. A ____________ is a small device used to enhance museum tours for visitors.
a. GPS
b. PDA
c. POS
d. PPS

__________ 16. By using a _____________ in a museum, you can listen to music that the artist listened to
when he or she was creating the work or look at other works that reflect similar techniques
or themes to the one you re viewing.
a. GPS player
b. PSS
c. PDA
d. VeriChip

3
Name: Date: Course: 2010 Fall 201 Test: Quiz3-Review
Textbook Questions Ch 1 and 9

__________ 17. Which of the following do today's educators NOT need to be familiar with to create
constructive computerized lessons and to interact with students?
a. computers
b. programs like Moodle or Blackboard
c. the Internet
d. Web authoring software

__________ 18. Courses are designed to use management software like ____________ so that students can
communicate outside of class, take quizzes online, and find their class materials easily.
a. Microsoft Access
b. Adobe Photoshop
c. CAD or Visio
d. Blackboard or Moodle

__________ 19. There are simulations and instructional _____________ on the Web that serve as incredible
learning tools.
a. online learning tools
b. PSSs
c. PDAs
d. software

__________ 20. In the automotive industry, computerized ___________ measure temperature, emissions,
and throttle position.
a. motherboards
b. cylinders
c. engine systems
d. sensors

__________ 21. The ability to recover and read deleted or damaged files from a criminal's computer is an
example of a law enforcement specialty called
a. computer forensics.
b. robotics.
c. HALO animation.
d. RFID simulation.

4
Name: Date: Course: 2010 Fall 201 Test: Quiz3-Review
Textbook Questions Ch 1 and 9

__________ 22. ___________________ is the application of computer systems and techniques to gather
potential legal evidence.
a. Information gathering
b. POS skills
c. Data mining processes
d. Computer forensics

__________ 23. ___________________ are extremely detailed re-creations that are generated with
computers and based on forensic evidence, depositions of witnesses, and the opinions of
experts.
a. Computer forensics animations
b. Data mining profiles
c. VeriChips
d. HALO images

__________ 24. ____________ tags, when placed on an animal, can be used to record and track in a
database all of the animal s movements.
a. PPS
b. GPS
c. RFID
d. POS

__________ 25. _____________ tags are small versions of the roadway electronic toll system used in many
states to automate paying tolls as you pass through the toll station.
a. RFID
b. PSS
c. PDA
d. UPS

__________ 26. ________________ are used to automatically analyze information about time and
temperature and to control water pumps for cranberry crops.
a. Computer forensics
b. Web-based systems
c. VeriChips
d. RFID technologies

5
Name: Date: Course: 2010 Fall 201 Test: Quiz3-Review
Textbook Questions Ch 1 and 9

__________ 27. Surgeons use ___________ to perform delicate operations by manipulating devices through
computers instead of manually.
a. simulation
b. computer forensics
c. forecasting
d. robotics

__________ 28. Technology no longer protected by copyright, available to everyone, is considered to be


a. experimental.
b. in the public domain.
c. open.
d. proprietary.

__________ 29. Medical students can train on _______________ and experience firsthand how a human
would react to a particular treatment.
a. a 3D anatomical system
b. robots
c. patient simulators
d. mannequins

__________ 30. ______________________ translates a patient s thoughts into commands to a robotic limb.
a. Animation software
b. A patient simulator
c. Robotic imaging
d. BrainGate software

__________ 31. The ______________________ is a global effort in which bioengineers are creating realistic
computer simulations of all systems and features of the human anatomy.
a. RFID Project
b. Y2K Project
c. BrainGate Project
d. Physiome Project

6
Name: Date: Course: 2010 Fall 201 Test: Quiz3-Review
Textbook Questions Ch 1 and 9

__________ 32. The goal of ______________________ is to provide technological solutions to physical


problems and to provide a means for positively identifying individuals.
a. RFID technology
b. biomedical chip research
c. 3D animations
d. computer forensics

__________ 33. One type of chip already being implanted in humans as a means of verifying a person s
identity is called a
a. ImplantChip.
b. VeriChip.
c. RFID chip.
d. DogTag.

__________ 34. One potential application of ______________________ is to provide sight to the blind.
a. VeriChips
b. patient simulators
c. biomedical chip implants
d. RFID tags

__________ 35. By studying the data produced by _____________, scientists hope to improve the prediction
of weather phenomena.
a. GPs
b. simulations
c. PSSs
d. VeriChips

__________ 36. _____________ are now being used to help athletes analyze their performance and improve
their game.
a. VeriChips
b. RFID tags
c. Computers
d. Game programming techniques

7
Name: Date: Course: 2010 Fall 201 Test: Quiz3-Review
Textbook Questions Ch 1 and 9

__________ 37. Adidas is developing a soccer ball containing _____________ that sends a radio signal to
the referee s watch when it crosses the goal line.
a. a VeriChip
b. an integrated circuit chip
c. an RFID tag
d. a server

__________ 38. ____________ is the science revolving around building devices on an extremely small scale.
a. Artificial intelligence
b. Microtechnology
c. Computer forensics
d. Nanotechnology

__________ 39. ____________ is the study of molecules and structures whose sizes range from 1 to 100
nanometers.
a. Artificial intelligence
b. Microelectrodes
c. Computer forensics
d. Nanoscience

__________ 40. The prefix nano stands for


a. one-hundredth.
b. one-billionth.
c. one-trillionth.
d. one-millionth.

__________ 41. A(n) _________________ is found in one of two states, off or on.
a. electrical switch
b. vacuum tube
c. binary switch
d. integrated circuit

8
Name: Date: Course: 2010 Fall 201 Test: Quiz3-Review
Textbook Questions Ch 1 and 9

__________ 42. The ____________ consists of just two numbers: 0 and 1.


a. hexadecimal numbering system
b. binary language
c. ASCII code
d. Unicode system

__________ 43. The earliest computers used ____________ as switches.


a. cathode ray tubes
b. electrically charged plates
c. transistors
d. vacuum tubes

__________ 44. ________________ was put into use in 1945 and took up 1,800 square feet of floor space.
a. IBM Blue
b. Apple's Adam
c. ENIAC
d. Pentium I

__________ 45. A(n) _____________________ is material that can transmit or prohibit the flow of electricity.
a. semiconductor
b. resistor
c. transistor
d. integrated circuit

__________ 46. A _________________ is an electrical switch that is built out of layers of a semiconductor
material.
a. capacitor
b. resistor
c. vacuum tube
d. transistor

__________ 47. The base-10 number system is also called


a. binary notation.
b. decimal notation.
c. hexadecimal notation.
d. unary notation.

9
Name: Date: Course: 2010 Fall 201 Test: Quiz3-Review
Textbook Questions Ch 1 and 9

__________ 48. The base-2 number system is also called


a. decimal notation.
b. hexadecimal notation.
c. binary notation.
d. unary notation.

__________ 49. The base-16 number system is also called


a. hexadecimal notation.
b. unary notation.
c. binary notation.
d. decimal notation.

__________ 50. Using 8 bits, the _________________ code can represent the 26 uppercase letters and the
26 lowercase letters in the English language and punctuation symbols as well as special
characters.
a. EBCDIC
b. unary
c. ASCII
d. hexadecimal

__________ 51. Most of today's personal computers use ____________ to represent each letter or character
as an 8-bit binary code.
a. Binary
b. American Standard Code for Information Interchange
c. Unicode
d. Extended Binary-Coded Decimal Interchange

__________ 52. It takes _________________ bits to make a byte.


a. 16
b. 32
c. 8
d. 24

10
Name: Date: Course: 2010 Fall 201 Test: Quiz3-Review
Textbook Questions Ch 1 and 9

__________ 53. The ________________ connects all of a system's electric components: the CPU, memory,
expansion slots, and electrical paths that connect these components.
a. adapter board
b. microprocessor board
c. transistor board
d. motherboard

__________ 54. The CPU is considered to be the _________________ of the computer.


a. brains
b. heart
c. liver
d. lungs

__________ 55. The PowerPC G5 processor was originally designed for the
a. Windows operating system.
b. Xbox.
c. Apple computer.
d. Nintendo Wii.

__________ 56. __________________ is measured in hertz and refers to how quickly a processor can work.
a. A kernel cycle
b. ROM speed
c. Clock speed
d. Register speed

__________ 57. MRAM stands for


a. Mega Random Access Memory.
b. Magnetic Read Access Memory.
c. Magnetoresistive Random Access Memory.
d. Metallic Random Access Memory.

__________ 58. MRAM uses ____________ to store data.


a. carbon nanotubes
b. electrical charges
c. magnetic plates
d. titanium plates

11
Name: Date: Course: 2010 Fall 201 Test: Quiz3-Review
Textbook Questions Ch 1 and 9

__________ 59. NRAM uses ___________ to store data.


a. neutron platelettes
b. magnetic plates
c. carbon nanotubes
d. electrical charges

__________ 60. Hyperthreading _____________ than multi-core technology.


a. is better at multitasking
b. uses a smaller chip
c. is faster
d. is slower

__________ 61. A graphics processing unit is specialized to handle


a. more intensive calculations than a CPU.
b. processes when the CPU is overworked.
c. 3D graphics.
d. only processes for gaming consoles.

__________ 62. Which of the folliowing statements is FALSE concerning multi-core technology?
a. It usese two or more processors on the same chip.
b. It is an improvement on hyperthreading.
c. It uses its own resources
d. It is slower than hyperthreading.

__________ 63. The multistep process that a CPU follows for each instruction it encounters is called
a. the instruction cycle.
b. the machine cycle.
c. the processor cycle.
d. the CPU cycle.

__________ 64. All of the following are steps in the CPU machine cycle EXCEPT
a. decode.
b. store.
c. generate.
d. fetch.

12
Name: Date: Course: 2010 Fall 201 Test: Quiz3-Review
Textbook Questions Ch 1 and 9

__________ 65. A system clock is built into the


a. expansion card.
b. bus.
c. motherboard.
d. hard drive.

__________ 66. The proper sequence of actions in a machine cycle is


a. decode fetch execute store.
b. fetch execute decode store.
c. execute decode store fetch.
d. fetch decode execute store.

__________ 67. The ___________________ of the CPU manages the on/off switches inside the CPU.
a. transistors
b. microprocessor
c. control unit
d. ALU

__________ 68. Clock speed is measured in


a. seconds.
b. hertz.
c. minutes.
d. bits per second (bps).

__________ 69. Cache memory is all of the following EXCEPT


a. categorized by levels 1, 2, and 3.
b. located close to the CPU.
c. easy to add to an existing computer system.
d. very fast memory.

__________ 70. Which of the following types of memory is optional on most computers?
a. level 2 cache
b. level 3 cache
c. RAM
d. level 1 cache

13
Name: Date: Course: 2010 Fall 201 Test: Quiz3-Review
Textbook Questions Ch 1 and 9

__________ 71. Which programming language uses a string of 1s and 0s?


a. C++
b. ADA
c. assembly language
d. machine language

__________ 72. A specific set of commands understandable by the CPU is called the
a. instruction set.
b. clock cycle.
c. program instructions.
d. instruction code.

__________ 73. All of the commands in an instruction set are written in a language that is easier for humans
to work with, called
a. ADA
b. machine language
c. C++
d. assembly language

__________ 74. In a CPU, the ___________________ refers to the commands that a CPU knows how to
complete.
a. processing set
b. instruction set
c. rules set
d. CPU set

__________ 75. In a 64-bit processor, the 64 refers to the _______________ size.


a. processor
b. RAM
c. word
d. letter

14
Name: Date: Course: 2010 Fall 201 Test: Quiz3-Review
Textbook Questions Ch 1 and 9

__________ 76. In a CPU, the purpose of the ALU is to:


a. store information to the cache.
b. calculate and perform logical operations.
c. fetch the initial instruction.
d. direct the flow of instructions.

__________ 77. ______________________ refers to the time it takes to locate instructions and make them
available to the CPU.
a. Process time
b. Location time
c. Fetch time
d. Access time

__________ 78. Access time is measured in billionths of a second, or


a. nanoseconds.
b. microseconds.
c. seconds.
d. milliseconds.

__________ 79. The least expensive and most simplistic type of RAM is
a. GDDR-4.
b. DDR SRAM.
c. DRAM.
d. DDR2 RAM.

__________ 80. The __________________ are on the motherboard and run between the CPU and the main
system memory.
a. ROM buses
b. expansion buses
c. local buses
d. RAM buses

15

You might also like