This action might not be possible to undo. Are you sure you want to continue?
2010 Fall 201 Textbook
Test: Quiz3-Review Questions Ch 1 and 9
All of the following are examples of real security and privacy risks EXCEPT a. b. c. d. spam. hackers. identity theft. viruses.
Unwanted electronic e-mail is called a. b. c. d. spyware. adware. software. spam.
A process known as ____________ is used by some retailers to study trends. a. b. c. d. POS mining data mining data selection data conversion
Which of the following is NOT necessarily part of being computer literate? a. b. c. d. avoiding hackers and viruses being able to build a computer using the Internet wisely protecting your privacy
____________ is the set of techniques used in information handling and retrieval. a. b. c. d. RFID Computer forensics Information technology Database mining
____________ refers to the programs that give commands to the computer. a. b. c. d. Hardware IT Computer forensics Software
Data mining A PSS Data retrieval A PDA __________ 8. b. c. POS technology Bluetooth technology Nanotechnology USB technology 2 . data searching. a. A _____________ is a specially designed scannable sticker that resembles an inkblot and contains all the important information about a UPS package. _______________ is a type of wireless communication that transmits data through radio waves. ____________ is a type of wireless communication used by UPS to transmit scanned data through radio waves to a terminal. d.Name: Date: Course: 2010 Fall 201 Textbook Test: Quiz3-Review Questions Ch 1 and 9 __________ 7. b. c. packing label PostCode mailing label Maxicode __________ 10. c. d. past buying history and lists of items they examined but did not purchase. a. a. b. __________ 9. __________ can keep track of the purchases customers make. d. data retrieval. d. c. data mining. Bluetooth technology POS technology RFID technology MU technology __________ 11. The process of searching huge amounts of data with the hope of finding a pattern is called a. data warehousing. a. d. c. along with customers' geographic data. b. b.
A ____________ is a small device used to enhance museum tours for visitors. a. virtual art. offshored. d. Pascal. the Internet. __________ 15. computer-simulated graphics. c. GPS player PSS PDA VeriChip 3 . you can listen to music that the artist listened to when he or she was creating the work or look at other works that reflect similar techniques or themes to the one you re viewing. HTML. b. b. c. d. exported. imported. d.Name: Date: Course: 2010 Fall 201 Textbook Test: Quiz3-Review Questions Ch 1 and 9 __________ 12. software animation tools. as many programming jobs have been. c. c. By using a _____________ in a museum. d. d. When a job is sent to other countries. A computer operator can easily create new experiences for an audience by pairing a live dancer with a(n): a. a. b. b. resourced. b. GPS PDA POS PPS __________ 16. it is said to have been a. __________ 13. nanotechnology. Game programming requires an in-depth knowledge of a. virtual dancer. __________ 14. c.
b. d. c.Name: Date: Course: 2010 Fall 201 Textbook Test: Quiz3-Review Questions Ch 1 and 9 __________ 17. RFID simulation. b. c. d. b. Which of the following do today's educators NOT need to be familiar with to create constructive computerized lessons and to interact with students? a. and throttle position. b. online learning tools PSSs PDAs software __________ 20. a. take quizzes online. c. In the automotive industry. d. 4 . The ability to recover and read deleted or damaged files from a criminal's computer is an example of a law enforcement specialty called a. d. c. a. Microsoft Access Adobe Photoshop CAD or Visio Blackboard or Moodle __________ 19. There are simulations and instructional _____________ on the Web that serve as incredible learning tools. d. motherboards cylinders engine systems sensors __________ 21. HALO animation. b. computerized ___________ measure temperature. and find their class materials easily. robotics. c. Courses are designed to use management software like ____________ so that students can communicate outside of class. computers programs like Moodle or Blackboard the Internet Web authoring software __________ 18. a. emissions. computer forensics.
b. a. ________________ are used to automatically analyze information about time and temperature and to control water pumps for cranberry crops. a. Computer forensics animations Data mining profiles VeriChips HALO images __________ 24. c. c. when placed on an animal. and the opinions of experts. RFID PSS PDA UPS __________ 26. b. Computer forensics Web-based systems VeriChips RFID technologies 5 . ____________ tags. d. can be used to record and track in a database all of the animal s movements. ___________________ is the application of computer systems and techniques to gather potential legal evidence. PPS GPS RFID POS __________ 25. a. c. b. d. d. a. b. c.Name: Date: Course: 2010 Fall 201 Textbook Test: Quiz3-Review Questions Ch 1 and 9 __________ 22. c. a. b. ___________________ are extremely detailed re-creations that are generated with computers and based on forensic evidence. _____________ tags are small versions of the roadway electronic toll system used in many states to automate paying tolls as you pass through the toll station. d. d. depositions of witnesses. Information gathering POS skills Data mining processes Computer forensics __________ 23.
a. b. a. The ______________________ is a global effort in which bioengineers are creating realistic computer simulations of all systems and features of the human anatomy. Animation software A patient simulator Robotic imaging BrainGate software __________ 31. in the public domain. d. experimental. RFID Project Y2K Project BrainGate Project Physiome Project 6 . b. c. d. d. proprietary. ______________________ translates a patient s thoughts into commands to a robotic limb. a.Name: Date: Course: 2010 Fall 201 Textbook Test: Quiz3-Review Questions Ch 1 and 9 __________ 27. is considered to be a. c. simulation computer forensics forecasting robotics __________ 28. a 3D anatomical system robots patient simulators mannequins __________ 30. d. b. a. __________ 29. c. Medical students can train on _______________ and experience firsthand how a human would react to a particular treatment. b. Surgeons use ___________ to perform delicate operations by manipulating devices through computers instead of manually. d. Technology no longer protected by copyright. c. c. open. available to everyone. b.
c. VeriChips RFID tags Computers Game programming techniques 7 . b. One type of chip already being implanted in humans as a means of verifying a person s identity is called a a. c. a. d. b. __________ 34. c. RFID technology biomedical chip research 3D animations computer forensics __________ 33. By studying the data produced by _____________. a. a. GPs simulations PSSs VeriChips __________ 36. b. RFID chip. b. d. scientists hope to improve the prediction of weather phenomena. _____________ are now being used to help athletes analyze their performance and improve their game. The goal of ______________________ is to provide technological solutions to physical problems and to provide a means for positively identifying individuals. ImplantChip. d. One potential application of ______________________ is to provide sight to the blind. c. c. d. a.Name: Date: Course: 2010 Fall 201 Textbook Test: Quiz3-Review Questions Ch 1 and 9 __________ 32. DogTag. VeriChips patient simulators biomedical chip implants RFID tags __________ 35. d. b. VeriChip.
b. one-billionth. off or on. c. Artificial intelligence Microtechnology Computer forensics Nanotechnology __________ 39. a. d. Adidas is developing a soccer ball containing _____________ that sends a radio signal to the referee s watch when it crosses the goal line. d. b. b. c. a VeriChip an integrated circuit chip an RFID tag a server __________ 38. a. A(n) _________________ is found in one of two states. one-hundredth. electrical switch vacuum tube binary switch integrated circuit 8 . __________ 41. c. b. c. d. b. a. c. The prefix nano stands for a. one-millionth. ____________ is the study of molecules and structures whose sizes range from 1 to 100 nanometers. d.Name: Date: Course: 2010 Fall 201 Textbook Test: Quiz3-Review Questions Ch 1 and 9 __________ 37. d. a. one-trillionth. Artificial intelligence Microelectrodes Computer forensics Nanoscience __________ 40. ____________ is the science revolving around building devices on an extremely small scale.
The base-10 number system is also called a. decimal notation. hexadecimal notation. a. binary notation. c. semiconductor resistor transistor integrated circuit __________ 46. b. d. c. The earliest computers used ____________ as switches. IBM Blue Apple's Adam ENIAC Pentium I __________ 45. b. c.Name: Date: Course: 2010 Fall 201 Textbook Test: Quiz3-Review Questions Ch 1 and 9 __________ 42. d. a. a. c. d. d. d. b. hexadecimal numbering system binary language ASCII code Unicode system __________ 43. a. 9 . capacitor resistor vacuum tube transistor __________ 47. cathode ray tubes electrically charged plates transistors vacuum tubes __________ 44. A _________________ is an electrical switch that is built out of layers of a semiconductor material. unary notation.800 square feet of floor space. A(n) _____________________ is material that can transmit or prohibit the flow of electricity. The ____________ consists of just two numbers: 0 and 1. b. b. c. c. a. d. ________________ was put into use in 1945 and took up 1. b.
unary notation. c. Binary American Standard Code for Information Interchange Unicode Extended Binary-Coded Decimal Interchange __________ 52. unary notation. __________ 49. b. EBCDIC unary ASCII hexadecimal __________ 51. Using 8 bits. a. a. b. d. The base-16 number system is also called a. Most of today's personal computers use ____________ to represent each letter or character as an 8-bit binary code. c. c. c. hexadecimal notation. the _________________ code can represent the 26 uppercase letters and the 26 lowercase letters in the English language and punctuation symbols as well as special characters. b. decimal notation. binary notation. 16 32 8 24 10 . __________ 50. d.Name: Date: Course: 2010 Fall 201 Textbook Test: Quiz3-Review Questions Ch 1 and 9 __________ 48. hexadecimal notation. b. d. c. a. decimal notation. The base-2 number system is also called a. b. d. It takes _________________ bits to make a byte. binary notation. d.
__________ 56.Name: Date: Course: 2010 Fall 201 Textbook Test: Quiz3-Review Questions Ch 1 and 9 __________ 53. Xbox. c. b. and electrical paths that connect these components. d. d. A kernel cycle ROM speed Clock speed Register speed __________ 57. The ________________ connects all of a system's electric components: the CPU. Mega Random Access Memory. Magnetoresistive Random Access Memory. brains heart liver lungs __________ 55. Windows operating system. b. d. c. a. carbon nanotubes electrical charges magnetic plates titanium plates 11 . d. MRAM uses ____________ to store data. memory. c. __________ 58. The PowerPC G5 processor was originally designed for the a. c. d. Apple computer. expansion slots. b. a. a. b. __________________ is measured in hertz and refers to how quickly a processor can work. b. b. d. Magnetic Read Access Memory. adapter board microprocessor board transistor board motherboard __________ 54. c. The CPU is considered to be the _________________ of the computer. Metallic Random Access Memory. MRAM stands for a. c. a. Nintendo Wii.
b. d. c. is better at multitasking uses a smaller chip is faster is slower __________ 61. more intensive calculations than a CPU. A graphics processing unit is specialized to handle a. b. only processes for gaming consoles. d. a. 3D graphics. All of the following are steps in the CPU machine cycle EXCEPT a. d. It usese two or more processors on the same chip. __________ 63. b. d. c. It is an improvement on hyperthreading. b. d. NRAM uses ___________ to store data. d. c. decode. Which of the folliowing statements is FALSE concerning multi-core technology? a. b. neutron platelettes magnetic plates carbon nanotubes electrical charges __________ 60. It uses its own resources It is slower than hyperthreading. b. the CPU cycle. the processor cycle. 12 . The multistep process that a CPU follows for each instruction it encounters is called a. c. store. __________ 64. the machine cycle. Hyperthreading _____________ than multi-core technology. fetch. a.Name: Date: Course: 2010 Fall 201 Textbook Test: Quiz3-Review Questions Ch 1 and 9 __________ 59. c. the instruction cycle. c. __________ 62. processes when the CPU is overworked. generate.
d. expansion card. motherboard. store. hertz. d. fetch. The ___________________ of the CPU manages the on/off switches inside the CPU. very fast memory. d. Which of the following types of memory is optional on most computers? a. seconds. easy to add to an existing computer system. d. 2. b. bus. __________ 67. c. level 2 cache level 3 cache RAM level 1 cache 13 . Cache memory is all of the following EXCEPT a. and 3. d. hard drive. transistors microprocessor control unit ALU __________ 68. c. c. a. bits per second (bps). decode fetch fetch execute fetch execute decode decode execute decode store execute store. A system clock is built into the a. store. located close to the CPU. minutes. __________ 69. d.Name: Date: Course: 2010 Fall 201 Textbook Test: Quiz3-Review Questions Ch 1 and 9 __________ 65. b. c. __________ 66. The proper sequence of actions in a machine cycle is a. b. categorized by levels 1. c. b. b. c. Clock speed is measured in a. __________ 70. b.
b. clock cycle. instruction code. d. program instructions. processing set instruction set rules set CPU set __________ 75.Name: Date: Course: 2010 Fall 201 Textbook Test: Quiz3-Review Questions Ch 1 and 9 __________ 71. the ___________________ refers to the commands that a CPU knows how to complete. In a 64-bit processor. c. called a. b. d. d. b. a. All of the commands in an instruction set are written in a language that is easier for humans to work with. In a CPU. d. processor RAM word letter 14 . A specific set of commands understandable by the CPU is called the a. b. c. C++ ADA assembly language machine language __________ 72. ADA machine language C++ assembly language __________ 74. d. b. a. the 64 refers to the _______________ size. instruction set. c. __________ 73. c. Which programming language uses a string of 1s and 0s? a. c.
ROM buses expansion buses local buses RAM buses 15 . GDDR-4. b. __________ 79. ______________________ refers to the time it takes to locate instructions and make them available to the CPU. direct the flow of instructions. d. or a. d. microseconds. c. Access time is measured in billionths of a second. __________ 80. a. DDR2 RAM. DRAM. a. Process time Location time Fetch time Access time __________ 78. b. c. the purpose of the ALU is to: a.Name: Date: Course: 2010 Fall 201 Textbook Test: Quiz3-Review Questions Ch 1 and 9 __________ 76. __________ 77. store information to the cache. calculate and perform logical operations. b. d. The least expensive and most simplistic type of RAM is a. seconds. nanoseconds. In a CPU. c. milliseconds. DDR SRAM. b. d. fetch the initial instruction. c. d. The __________________ are on the motherboard and run between the CPU and the main system memory. b. c.
This action might not be possible to undo. Are you sure you want to continue?
We've moved you to where you read on your other device.
Get the full title to continue listening from where you left off, or restart the preview.