Professional Documents
Culture Documents
A) 1989
B) 1993
C) 1997
D) 2000
2) In which era were only the U.S. government, colleges, and universities able to access the
Internet?
A) 1960s
B) 1970s
C) 1980s
D) 1990s
5) A computer system:
A) is a collection of unrelated components that have been designed to work together.
B) refers to the operations in the information-processing cycle.
C) is a collection of related components that have been designed to work independently of each
other.
D) can be broken down into the two major components of hardware and software.
1
A) a series of commands that the computer operator performs to make the computer work.
B) the same thing as the system unit.
C) a set of instructions that tells the computer how to complete a task.
D) unnecessary for the computer to accomplish tasks.
10) Application software includes all of the following EXCEPT ________ software.
A) system
B) word-processing
C) Web browser
D) e-mail
15) A(n) ________ is a series of steps that results in the solution to a problem.
A) algorithm
B) pseudo-solution
C) module
D) object
2
16) During the processing operation, the computer:
A) transforms information into data.
B) uses complex processing actions organized into an algorithm.
C) transforms data into information.
D) follows a series of unorganized steps.
17) The most important kind of memory that a typical computer uses during the processing
operation is ________ memory.
A) read-only
B) flash
C) storage
D) random access
20) In the information-processing cycle, what event takes place during the storage operation?
A) Processed data is saved in the random access memory so that you can access it later.
B) The results of the processing operation are saved on a storage device so that you can use them
later.
C) Data is converted to information.
D) Information is converted to data.
22) Which of the following device types holds the programs and data that the computer uses?
A) Input devices
B) Storage devices
C) Communication devices
D) Output devices
23) Which of the following is often considered the fifth operation in the information-processing
3
cycle?
A) Ethics
B) E-commerce
C) Analysis
D) Communications
25) Devices that are NOT an essential part of the computer are called:
A) peripherals.
B) terminals.
C) externals.
D) processors.
26) A modem allows computers to access the Internet through all of the following types of
connections EXCEPT:
A) wireless.
B) offline.
C) cable.
D) telephone lines.
27) Which of the following high-speed access methods does NOT use an external modem?
A) Cable
B) Satellite
C) DSL
D) Dial-up
29) Approximately how much money is lost each year by U.S. companies because of digital
piracy?
A) Tens of millions of dollars
B) Hundreds of millions of dollars
C) Tens of billions of dollars
D) Hundreds of billions of dollars
30) Which of the following computers would be difficult to take on a business trip?
4
A) Tablet PC
B) PDA
C) Notebook
D) Professional workstation
31) Computers for individuals are mainly designed for how many users at a time?
A) two
B) a small work group
C) one
D) none
34) The prices of personal computers have ________ and yet they have become more ________.
A) dropped, slow
B) risen, powerful
C) dropped, powerful
D) risen, complex
35) The two most commonly used types of personal computers are:
A) Apple Macintosh and IBM-compatibles.
B) Microcomputers and network computers.
C) Apple Macintosh and minicomputers.
D) IBM-compatibles and Internet appliances.
36) Which of the following computers could be carried in your coat pocket?
A) Tablet PCs
B) Subnotebooks
C) Personal digital assistants
D) All-in-one computers
37) In an all-in-one computer, which of the following is NOT built into the computer?
A) Keyboard
B) Speakers
C) Microprocessor
D) Memory
5
38) Which of the following computers would be used in a large corporation to complete huge
processing needs, such as airline reservations?
A) Minicomputer
B) Mainframe
C) Supercomputer
D) Server
39) Which of the following computers would be used to process scientific data and show the
possible underlying patterns?
A) Internet appliance
B) Terminal
C) Server
D) Supercomputer
41) All of the following are examples of uses for PDAs EXCEPT:
A) managing contacts.
B) scheduling appointments.
C) e-mail.
D) payroll for a small firm.
42) Network computers have limited resources in all the following areas EXCEPT:
A) connectivity.
B) memory.
C) storage.
D) processing.
43) Professional workstations are used by the following types of professionals EXCEPT:
A) engineers.
B) architects.
C) casual end users.
D) financial analysts.
6
A) requesters.
B) clients.
C) resources.
D) remote users.
Organizations
46) Which type of computers are typically operated from one location?
A) Servers
B) Clients
C) Mid-range computers
D) Terminals
for Organizations
47) The use of client computers and centralized servers is called a(n) ________ network.
A) requester/provider
B) master/subordinate
C) hierarchical
D) client/server
49) The U.S Business Software Alliance reports that reducing piracy by just 10% will have all of
the following benefits EXCEPT:
A) greater software usage.
B) higher tax revenues.
C) the creation of new jobs.
D) an increase in economic growth.
?
50) What is the main reason for the high level of penetration of computers into almost every
workplace and two-thirds of U.S. households?
A) The computer's capability to work with different types of data
B) The computer's capability to store the results of processing
C) The speed with which computers are capable of processing data
D) The capability to check spelling in electronic documents
, Society, & You
7
52) Which of the following is NOT a disadvantage of using computers?
A) Information overload
B) Data inaccuracy
C) Hardware reliability
D) Software unreliability
53) Which kind of product complements the human body's best posture and functionality?
A) Ergocentric
B) Natural
C) Ergonomic
D) Esoteric
54) In regards to maintaining a safe working environment for your hardware, which of the
following statements is FALSE?
A) The use of surge protectors avoids overloads.
B) Hardware should be placed securely to prevent accidents.
C) Cables, cords, and wires do not need to be securely fastened.
D) Hardware should have plenty of space around it to prevent overheating.
55) Which of the following is NOT a name for the injury caused by prolonged keyboard use?
A) Carpal tunnel syndrome
B) Ergonomic injury
C) Repetitive strain injury
D) Cumulative trauma disorder
59) What type of systems are the ones on which human lives depend?
8
A) Safety-critical
B) Life-and-death-critical
C) Mission-critical
D) Health-dependent
60) Safety-critical systems have what type of systems that kick in if the main computer goes
down?
A) Terminal
B) Fail-safe
C) Backup
D) Active/passive standby
61) The more lines of code you add, the more ________ the program becomes.
A) accurate
B) complex
C) functional
D) marketable
62) On average, commercial programs contain ________ errors for every 1,000 lines of code.
A) between 5 and 7
B) between 14 and 17
C) between 25 and 28
D) hundreds of
63) Which of the following safety-critical airline computer systems requires the highest level of
quality standards?
A) Passenger entertainment and communication
B) Passenger list and seating assignments
C) Air traffic control
D) Reservation
64) The word bug is said to have come from a story where a(n) ________ flew into a computer,
causing a fault.
A) moth
B) bird
C) bat
D) insect
65) The recent branch of philosophy that deals with computer-related moral dilemmas is called:
A) moral beliefs.
B) ergonomics.
C) computer code of conduct.
D) computer ethics.
66) Responsible computing requires that you understand the advantages and disadvantages of
using a computer, including potential ________ from computer misuse.
9
A) criminal prosecution
B) fines
C) harm
D) limitations
67) Which of the following requires computer access to individuals with disabilities?
A) The Disabilities Act of 1985
B) The Americans with Disabilities Act of 1990
C) The Digital Access Act of 1995
D) The No Child Left Behind Act of 2001
68) When an entire job category is made obsolete by advances in technology, this is called:
A) technological replacement.
B) structural unemployment.
C) robotics.
D) automation.
70) More than ________ computers, monitors, and TVs become obsolete each year.
A) 10 million
B) 100 million
C) 10 billion
D) 100 billion
71) Which of the following items can contribute to e-waste when not properly disposed of?
A) Computer monitors
B) Cell phones
C) Televisions
D) All of the above
72) Researchers at Carnegie Mellon University found that people who spend a few hours per
week on the Internet:
A) had better social interactions than those who did not.
B) were more successful in business or education than those who did not.
C) had higher incidences of depression and loneliness than those who did not.
D) were better informed of current affairs than those who did not.
73) Which of the following is a way in which you could learn about the latest technology?
A) Reading your local newspaper
B) Visiting Web sites such as www.cnet.com
10
C) Subscribing to online newsletters
D) All of the above
74) Today, it's becoming harder and harder to find an activity that doesn't involve ________ and
technology.
75) Input, processing, output, and storage are called the ________.
76) ________ includes all of the programs that give the computer its instructions.
77) The programs that enable the computer to work properly are known as ________ software.
78) ________ software includes the programs that you can use to complete a specific task, such
as creating a database.
80) The most commonly used input devices are the keyboard and ________.
84) The central processing unit is located within the system's case. The system case is also
known as the system ________.
85) Simplified and organized data that can be used is called ________.
86) Because the CPU needs to juggle multiple requests, it uses ________ to store program
instructions and data.
87) The most commonly used output devices are monitors and ________.
89) A(n) ________ is a group of two or more computer systems that are connected.
90) A(n) ________ is a communications device that is used to enable computers to access other
computers and the Internet.
11
91) ________ devices enable computers to connect to a computer network.
93) Because notebooks emit ________, few people use notebooks on their lap .
94) A subnotebook computer is a type of a notebook computer with some of the components
omitted to reduce its ________ and weight.
95) The writing on a tablet PC can be converted to standard text with ________ software.
96) The Palm series, Apple iPhone, HP iPAQ, and Blackberry Curve are examples of ________.
97) A(n) ________ is a computer that makes programs and data available to people who are
connected to a computer network.
98) A(n) ________, or mid-range server, satisfies the computer needs for a small corporation or
organization.
99) An all-in-one computer is essentially a(n) ________ with everything else built in.
103) Handheld devices that have many of the characteristics of a PDA are ________.
104) The ________ is the disparity in computer ownership and Internet access.
105) When you buy software, you're only purchasing the right to ________ the software.
106) If you have borrowed software from a friend and installed it on your own computer, you
have engaged in digital ________.
107) Information ________ refers to the anxiety people experience when presented with more
information than they can reasonably handle.
108) ________ is a type of memory that provides very fast access but it is more expensive than
other forms of storage.
109) A(n) ________ is a hardware or software defect or error that causes a program to fail.
12
111) Using computers and computer programs to replace specified time and place learning and
teachers is ________.
113) Obsolete computer equipment, also called ________, can't just be thrown into the trash.
TRUE/FALSE type
115) The hard disk drive, CD drive, and DVD drive in a computer are usually removable.
116) A network is a group of two or more computers connected for the purpose of sharing
resources.
117) External NICs are ALWAYS plugged into a chip on the motherboard.
119) In some cases PDAs can run commercial application software such as payroll.
120) Outsourcing is the real and only reason for eliminating many jobs.
121) People who lose their jobs because of structural unemployment will eventually get them
back.
122) Hardware
123) Software
124) Program
A) Programs such as a disk cleanup tool that enable the computer to function properly
B) The programs on your computer that enable you to perform a specific task such as word
processing
C) The physical components of the computer
D) A series of instructions the computer needs to perform the basic operations in the
information-processing cycle
13
E) The programs that instruct a computer
127) Computer
128) Processing
134) Information
139) Tablet PC
14
140) Notebook computer
15