Professional Documents
Culture Documents
__________ 1. All of the following are examples of real security and privacy risks EXCEPT
a. spam.
b. hackers.
c. identity theft.
d. viruses.
__________ 4. Which of the following is NOT necessarily part of being computer literate?
a. avoiding hackers and viruses
b. being able to build a computer
c. using the Internet wisely
d. protecting your privacy
__________ 5. ____________ is the set of techniques used in information handling and retrieval.
a. RFID
b. Computer forensics
c. Information technology
d. Database mining
__________ 6. ____________ refers to the programs that give commands to the computer.
a. Hardware
b. IT
c. Computer forensics
d. Software
1
Name: Date: Course: 2010 Fall 201 Test: Quiz3-Review
Textbook Questions Ch 1 and 9
__________ 7. __________ can keep track of the purchases customers make, along with customers'
geographic data, past buying history and lists of items they examined but did not purchase.
a. Data mining
b. A PSS
c. Data retrieval
d. A PDA
__________ 8. The process of searching huge amounts of data with the hope of finding a pattern is called
a. data mining.
b. data searching.
c. data warehousing.
d. data retrieval.
__________ 9. A _____________ is a specially designed scannable sticker that resembles an inkblot and
contains all the important information about a UPS package.
a. packing label
b. PostCode
c. mailing label
d. Maxicode
__________ 10. ____________ is a type of wireless communication used by UPS to transmit scanned data
through radio waves to a terminal.
a. Bluetooth technology
b. POS technology
c. RFID technology
d. MU technology
__________ 11. _______________ is a type of wireless communication that transmits data through radio
waves.
a. POS technology
b. Bluetooth technology
c. Nanotechnology
d. USB technology
2
Name: Date: Course: 2010 Fall 201 Test: Quiz3-Review
Textbook Questions Ch 1 and 9
__________ 12. A computer operator can easily create new experiences for an audience by pairing a live
dancer with a(n):
a. virtual art.
b. computer-simulated graphics.
c. virtual dancer.
d. nanotechnology.
__________ 13. When a job is sent to other countries, as many programming jobs have been, it is said to
have been
a. offshored.
b. imported.
c. resourced.
d. exported.
__________ 15. A ____________ is a small device used to enhance museum tours for visitors.
a. GPS
b. PDA
c. POS
d. PPS
__________ 16. By using a _____________ in a museum, you can listen to music that the artist listened to
when he or she was creating the work or look at other works that reflect similar techniques
or themes to the one you re viewing.
a. GPS player
b. PSS
c. PDA
d. VeriChip
3
Name: Date: Course: 2010 Fall 201 Test: Quiz3-Review
Textbook Questions Ch 1 and 9
__________ 17. Which of the following do today's educators NOT need to be familiar with to create
constructive computerized lessons and to interact with students?
a. computers
b. programs like Moodle or Blackboard
c. the Internet
d. Web authoring software
__________ 18. Courses are designed to use management software like ____________ so that students can
communicate outside of class, take quizzes online, and find their class materials easily.
a. Microsoft Access
b. Adobe Photoshop
c. CAD or Visio
d. Blackboard or Moodle
__________ 19. There are simulations and instructional _____________ on the Web that serve as incredible
learning tools.
a. online learning tools
b. PSSs
c. PDAs
d. software
__________ 20. In the automotive industry, computerized ___________ measure temperature, emissions,
and throttle position.
a. motherboards
b. cylinders
c. engine systems
d. sensors
__________ 21. The ability to recover and read deleted or damaged files from a criminal's computer is an
example of a law enforcement specialty called
a. computer forensics.
b. robotics.
c. HALO animation.
d. RFID simulation.
4
Name: Date: Course: 2010 Fall 201 Test: Quiz3-Review
Textbook Questions Ch 1 and 9
__________ 22. ___________________ is the application of computer systems and techniques to gather
potential legal evidence.
a. Information gathering
b. POS skills
c. Data mining processes
d. Computer forensics
__________ 23. ___________________ are extremely detailed re-creations that are generated with
computers and based on forensic evidence, depositions of witnesses, and the opinions of
experts.
a. Computer forensics animations
b. Data mining profiles
c. VeriChips
d. HALO images
__________ 24. ____________ tags, when placed on an animal, can be used to record and track in a
database all of the animal s movements.
a. PPS
b. GPS
c. RFID
d. POS
__________ 25. _____________ tags are small versions of the roadway electronic toll system used in many
states to automate paying tolls as you pass through the toll station.
a. RFID
b. PSS
c. PDA
d. UPS
__________ 26. ________________ are used to automatically analyze information about time and
temperature and to control water pumps for cranberry crops.
a. Computer forensics
b. Web-based systems
c. VeriChips
d. RFID technologies
5
Name: Date: Course: 2010 Fall 201 Test: Quiz3-Review
Textbook Questions Ch 1 and 9
__________ 27. Surgeons use ___________ to perform delicate operations by manipulating devices through
computers instead of manually.
a. simulation
b. computer forensics
c. forecasting
d. robotics
__________ 29. Medical students can train on _______________ and experience firsthand how a human
would react to a particular treatment.
a. a 3D anatomical system
b. robots
c. patient simulators
d. mannequins
__________ 30. ______________________ translates a patient s thoughts into commands to a robotic limb.
a. Animation software
b. A patient simulator
c. Robotic imaging
d. BrainGate software
__________ 31. The ______________________ is a global effort in which bioengineers are creating realistic
computer simulations of all systems and features of the human anatomy.
a. RFID Project
b. Y2K Project
c. BrainGate Project
d. Physiome Project
6
Name: Date: Course: 2010 Fall 201 Test: Quiz3-Review
Textbook Questions Ch 1 and 9
__________ 33. One type of chip already being implanted in humans as a means of verifying a person s
identity is called a
a. ImplantChip.
b. VeriChip.
c. RFID chip.
d. DogTag.
__________ 34. One potential application of ______________________ is to provide sight to the blind.
a. VeriChips
b. patient simulators
c. biomedical chip implants
d. RFID tags
__________ 35. By studying the data produced by _____________, scientists hope to improve the prediction
of weather phenomena.
a. GPs
b. simulations
c. PSSs
d. VeriChips
__________ 36. _____________ are now being used to help athletes analyze their performance and improve
their game.
a. VeriChips
b. RFID tags
c. Computers
d. Game programming techniques
7
Name: Date: Course: 2010 Fall 201 Test: Quiz3-Review
Textbook Questions Ch 1 and 9
__________ 37. Adidas is developing a soccer ball containing _____________ that sends a radio signal to
the referee s watch when it crosses the goal line.
a. a VeriChip
b. an integrated circuit chip
c. an RFID tag
d. a server
__________ 38. ____________ is the science revolving around building devices on an extremely small scale.
a. Artificial intelligence
b. Microtechnology
c. Computer forensics
d. Nanotechnology
__________ 39. ____________ is the study of molecules and structures whose sizes range from 1 to 100
nanometers.
a. Artificial intelligence
b. Microelectrodes
c. Computer forensics
d. Nanoscience
__________ 41. A(n) _________________ is found in one of two states, off or on.
a. electrical switch
b. vacuum tube
c. binary switch
d. integrated circuit
8
Name: Date: Course: 2010 Fall 201 Test: Quiz3-Review
Textbook Questions Ch 1 and 9
__________ 44. ________________ was put into use in 1945 and took up 1,800 square feet of floor space.
a. IBM Blue
b. Apple's Adam
c. ENIAC
d. Pentium I
__________ 45. A(n) _____________________ is material that can transmit or prohibit the flow of electricity.
a. semiconductor
b. resistor
c. transistor
d. integrated circuit
__________ 46. A _________________ is an electrical switch that is built out of layers of a semiconductor
material.
a. capacitor
b. resistor
c. vacuum tube
d. transistor
9
Name: Date: Course: 2010 Fall 201 Test: Quiz3-Review
Textbook Questions Ch 1 and 9
__________ 50. Using 8 bits, the _________________ code can represent the 26 uppercase letters and the
26 lowercase letters in the English language and punctuation symbols as well as special
characters.
a. EBCDIC
b. unary
c. ASCII
d. hexadecimal
__________ 51. Most of today's personal computers use ____________ to represent each letter or character
as an 8-bit binary code.
a. Binary
b. American Standard Code for Information Interchange
c. Unicode
d. Extended Binary-Coded Decimal Interchange
10
Name: Date: Course: 2010 Fall 201 Test: Quiz3-Review
Textbook Questions Ch 1 and 9
__________ 53. The ________________ connects all of a system's electric components: the CPU, memory,
expansion slots, and electrical paths that connect these components.
a. adapter board
b. microprocessor board
c. transistor board
d. motherboard
__________ 55. The PowerPC G5 processor was originally designed for the
a. Windows operating system.
b. Xbox.
c. Apple computer.
d. Nintendo Wii.
__________ 56. __________________ is measured in hertz and refers to how quickly a processor can work.
a. A kernel cycle
b. ROM speed
c. Clock speed
d. Register speed
11
Name: Date: Course: 2010 Fall 201 Test: Quiz3-Review
Textbook Questions Ch 1 and 9
__________ 62. Which of the folliowing statements is FALSE concerning multi-core technology?
a. It usese two or more processors on the same chip.
b. It is an improvement on hyperthreading.
c. It uses its own resources
d. It is slower than hyperthreading.
__________ 63. The multistep process that a CPU follows for each instruction it encounters is called
a. the instruction cycle.
b. the machine cycle.
c. the processor cycle.
d. the CPU cycle.
__________ 64. All of the following are steps in the CPU machine cycle EXCEPT
a. decode.
b. store.
c. generate.
d. fetch.
12
Name: Date: Course: 2010 Fall 201 Test: Quiz3-Review
Textbook Questions Ch 1 and 9
__________ 67. The ___________________ of the CPU manages the on/off switches inside the CPU.
a. transistors
b. microprocessor
c. control unit
d. ALU
__________ 70. Which of the following types of memory is optional on most computers?
a. level 2 cache
b. level 3 cache
c. RAM
d. level 1 cache
13
Name: Date: Course: 2010 Fall 201 Test: Quiz3-Review
Textbook Questions Ch 1 and 9
__________ 72. A specific set of commands understandable by the CPU is called the
a. instruction set.
b. clock cycle.
c. program instructions.
d. instruction code.
__________ 73. All of the commands in an instruction set are written in a language that is easier for humans
to work with, called
a. ADA
b. machine language
c. C++
d. assembly language
__________ 74. In a CPU, the ___________________ refers to the commands that a CPU knows how to
complete.
a. processing set
b. instruction set
c. rules set
d. CPU set
14
Name: Date: Course: 2010 Fall 201 Test: Quiz3-Review
Textbook Questions Ch 1 and 9
__________ 77. ______________________ refers to the time it takes to locate instructions and make them
available to the CPU.
a. Process time
b. Location time
c. Fetch time
d. Access time
__________ 79. The least expensive and most simplistic type of RAM is
a. GDDR-4.
b. DDR SRAM.
c. DRAM.
d. DDR2 RAM.
__________ 80. The __________________ are on the motherboard and run between the CPU and the main
system memory.
a. ROM buses
b. expansion buses
c. local buses
d. RAM buses
15