Multiple Choice Identify the
choice that best completes the statement or answers the question.
|
|
1.
|
Computing technologies make it possible to have ____, traditional appliances
with some type of built-in computer or communications technology.
a. | design appliances | c. | home computers | b. | smart computers | d. | smart
appliances |
|
|
2.
|
In addition to the four primary computer operations, today’s computers
typically also perform ____ functions.
a. | calculations | c. | sorting | b. | communications | d. | programming |
|
|
3.
|
The most common input devices today are the keyboard and ____.
a. | printer | c. | speaker | b. | mouse | d. | monitor |
|
|
4.
|
A ____ is loosely defined as a very small device that has some built-in
computing or Internet capability.
a. | mainframe computer | c. | mobile device | b. | midrange server | d. | personal
computer |
|
|
5.
|
Conventional PCs are often referred to as ____ because the complete computer
system fits on or next to a desk.
a. | desktop PCs | c. | super PCs | b. | laptop PCs | d. | processor PCs |
|
|
6.
|
Most notebooks follow the traditional ____ design in which the monitor is on the
inside top half of the PC, and the keyboard and touch pad are on the inside bottom half.
a. | clamshell | c. | IBM | b. | Microsoft | d. | book |
|
|
7.
|
Similar to the way an IP address or domain name uniquely identifies a computer
on the Internet, a ____ uniquely identifies a Web page.
a. | universal resource identifier (URI) | c. | uniform resource locator
(URL) | b. | Web ID (WID) | d. | Web resource identifier (WRI) |
|
|
8.
|
There are independent Web sites (such as the ____ Web site) that report
on the validity of current online rumors and stories.
a. | Spammer | c. | Phisher | b. | Snopes | d. | Identifier |
|
|
9.
|
Eight bits grouped together are collectively referred to as a ____.
a. | kilobit | c. | pixel | b. | byte | d. | binary |
|
|
10.
|
With bitmapped images, the color of each ____ is represented by bits; the more
bits used, the better the image quality.
a. | pixel | c. | map | b. | vector | d. | byte |
|
|
11.
|
One measurement of the speed of a CPU is the ____, which is rated in megahertz
(MHz) or gigahertz (GHz).
a. | system speed | c. | system rpm | b. | CPU clock speed | d. | CPU rpm |
|
|
12.
|
____ have begun to replace ROM for storing system information, such as a
PC’s BIOS.
a. | Motherboards | c. | Adapter cards | b. | Microprocessors | d. | Flash memory
chips |
|
|
13.
|
The ____ takes instructions from the prefetch unit and translates them into a
form that the control unit can understand.
a. | register | c. | ALU | b. | decode unit | d. | internal cache |
|
|
|
Case-Based Critical Thinking Questions
Case 2-1 Jess is a
musician who has just bought a new computer. Now she has to determine how to connect this computer to
the devices that were connected to her old computer.
|
|
14.
|
To connect her external hard drive where her music files are stored to the
computer, Jess needs to use the ____ port.
a. | serial | c. | network | b. | USB | d. | modem |
|
|
|
Case-Based Critical Thinking Questions
Case 2-2 Jack has a
computer at home that he uses to access the Internet, store and edit personal photos, and create and
edit documents. Recently, he has come to realize that in order to keep the computer performing at its
best, he needs to carry out regular system maintenance on the computer.
|
|
15.
|
Jack can use the ____ program to locate and delete temporary files, such as
installation files, Web browsing history, and files in the Recycle Bin.
a. | Windows Registry | c. | Temporary Files | b. | Disk Defragmenter | d. | Windows Disk
Cleanup |
|
|
16.
|
Usually the storage device and storage medium are two separate pieces of
hardware (that is, the storage medium is ____).
a. | procurable | c. | removable | b. | static | d. | configurable |
|
|
17.
|
Some drive letters, such as the letter ____ typically used with the primary hard
drive, are usually consistent from computer to computer and do not change even if more storage
devices are added to a computer.
|
|
18.
|
External hard drives today typically connect to a computer via a USB or ____
port.
a. | IrDA | c. | Bluetooth | b. | Firewall | d. | FireWire |
|
|
19.
|
One technology for 3D storage systems that, after many years of research and
development, is now a reality is ____.
a. | lithographic storage | c. | serigraphic storage | b. | holographic storage | d. | laser-graphic
storage |
|
|
|
Case-Based Critical Thinking Questions
Case 3-1 Dan is a small
business owner who depends on his computer to keep track of customer and sales data. He is
investigating storage options because it is critical for him to ensure that his data is safe in the
event of a computer failure.
|
|
20.
|
As Dan is very concerned about maintaining the security of his business data, he
should look for an external hard drive that comes with built-in ____.
a. | zipping | c. | encryption | b. | sequential access | d. | holographic
technology |
|
|
21.
|
A ____ is an optical code that represents data with bars of varying widths or
heights.
a. | digital code | c. | bar table | b. | character code | d. | barcode |
|
|
22.
|
____ input data from special forms to score or tally exams, questionnaires,
ballots, and so forth.
a. | Optical character recognition (OCR) Devices | b. | Optical mark readers
(OMRs) | c. | Magnetic ink character recognition (MICR) Readers | d. | Biometric
readers |
|
|
23.
|
Digital camcorders are similar to conventional ____ camcorders.
a. | electronic | c. | analog | b. | manual | d. | binary |
|
|
24.
|
The display device for a desktop computer is formally called a ____.
a. | touch screen | c. | video input | b. | video reader | d. | monitor |
|
|
25.
|
In a printer, the print ____ affects the quality of the printed output.
a. | depth | c. | palette | b. | size | d. | resolution |
|
|
26.
|
System software is usually divided into two categories: operating system
software and ____ programs.
a. | planning system | c. | FAT system | b. | utility | d. | background |
|
|
27.
|
Small programs called ____ are used to communicate with peripheral devices, such
as monitors, printers, and scanners.
a. | interfaces | c. | drivers | b. | utilities | d. | managers |
|
|
28.
|
Most operating systems have security features available, such as an integrated
____ to protect against unauthorized access via the Internet.
a. | router | c. | hub | b. | firewall | d. | modem |
|
|
|
|
|
29.
|
With a ____, as shown in the accompanying figure, icons, buttons, menus, and
other objects are selected with the mouse to issue commands to the PC.
a. | graphical user interface | c. | desktop | b. | command line
interface | d. | command-driven
interface |
|
|
30.
|
One of the most obvious initial changes in Windows Vista is the ____
interface.
a. | Leopard | c. | Aero | b. | Android | d. | Symbian |
|
|
31.
|
The most recent version of Windows is Windows ____.
|
|
32.
|
____ are utility programs that search for documents and other files on a
user’s hard drives.
a. | Search tools | c. | Search engines | b. | Tool boxes | d. | Tool programs |
|
|
|
Case-Based Critical Thinking Questions
Case 5-1 Janet is
studying operating systems as part of her Understanding Computers 101 class. After learning about the
different types of operating systems, she realizes that she uses a number of them in her daily
life.
|
|
33.
|
Janet has an Apple computer at home. The operating system of that computer is
____.
a. | Windows Vista | c. | Windows Embedded | b. | Solaris | d. | Mac OS |
|
|
34.
|
____ is freeware software.
a. | Norton AntiVirus (antivirus program) | c. | Internet Explorer (Web
browser) | b. | Image Shrinker (image optimizer) | d. | Lynx (text-based Web
browser) |
|
|
35.
|
Companies that deliver SaaS are sometimes referred to as ____.
a. | download services | c. | Internet service providers (ISPs) | b. | application service
providers (ASPs) | d. | running
services |
|
|
36.
|
Related software programs are sometimes sold bundled together as a ____, such as
a group of graphics programs, utility programs, or office-related software.
a. | software suite | c. | software bank | b. | software thread | d. | software base |
|
|
37.
|
Businesses and many individuals often use office suites, sometimes called ____,
to produce written documents.
a. | integral suites | c. | mid-range suites | b. | productivity software
suites | d. | corporate
suites |
|
|
38.
|
The ____ is a new feature in versions of Microsoft Office, starting with Office
2007; it consists of tabs, which contain groups of related commands for the program being
used.
a. | shortcut menu | c. | Ribbon | b. | menu bar | d. | Wizard |
|
|
39.
|
Most application programs have a built-in help feature, typically available
through a(n) ____ button.
a. | Tool | c. | Help | b. | Window | d. | Advanced |
|
|
|
Case-Based Critical Thinking Questions
Case 6-2 Bryan has just
started an internship in which he uses a database frequently. The database contains information about
the company’s employees. Bryan’s supervisor senses that he is anxious about using the
database and drops by to give him a short tutorial.
|
|
40.
|
The supervisor explains that each employee’s information forms a separate
____.
a. | field | c. | table | b. | record | d. | file |
|
|
41.
|
A global positioning system (GPS) consists of ____ and a group of GPS
satellites.
a. | GPS transmitters | c. | GPS amplifiers | b. | Wi-Fi receivers | d. | GPS receivers |
|
|
42.
|
Some wireless ____ are created by cities or large organizations to provide free
or low-cost Internet access to residents of a particular area.
|
|
43.
|
With ____, data is sent one bit at a time, one after the other along a single
path.
a. | serial transmission | c. | digital transmission | b. | parallel transmission | d. | wireless
transmission |
|
|
44.
|
In ____ transmission, data is sent at the same time as other related data to
support certain types of real-time applications that require the different types of data to be
delivered at the proper speed for that application.
a. | synchronous | c. | asynchronous | b. | isochronous | d. | endrosynchronous |
|
|
45.
|
____ transmission is relatively uncommon in data transmissions since most
devices that are mainly one-directional, such as a printer, can still transmit error messages and
other data back to the computer.
a. | Half-duplex | c. | Full-duplex | b. | Simplex | d. | Asynchronous |
|
|
|
Case-Based Critical Thinking Questions
Case 7-2 Gabrielle is
the network administrator at a medium-sized company. One of her responsibilities is to purchase
network devices to maintain the company network.
|
|
46.
|
Gabrielle would like to purchase a new ____, which would be used to connect the
company’s LAN and the Internet.
a. | hub | c. | router | b. | USB port | d. | bridge |
|
|
47.
|
Gabrielle is planning to connect selected devices to the network wirelessly with
a wireless ____.
a. | hotspot | c. | hub | b. | access point | d. | data point |
|
|
48.
|
____ generally refers to applications and services that use the Web as a
platform to deliver rich applications that enable people to collaborate, socialize, and share
information online.
a. | Web X | c. | Web 1.0 | b. | Web Y | d. | Web 2.0 |
|
|
49.
|
____ is a consortium of researchers, educators, and technology leaders from
industry, government, and the international community that is dedicated to the development of
revolutionary Internet technologies.
a. | P2P | c. | ICANN2 | b. | Internet2 | d. | ISP |
|
|
50.
|
____ are companies that manage and distribute Web-based software services to
customers over the Internet.
a. | Internet service providers (ISPs) | b. | Internet content providers | c. | Online conferencing
service providers | d. | Application service providers
(ASPs) |
|
|
51.
|
____ is the most widely used type of home broadband connection, with over half
of the home broadband market.
a. | DSL (Digital Subscriber Line) Internet access | b. | Fixed wireless
Internet access | c. | Mobile wireless Internet access | d. | Cable Internet
access |
|
|
52.
|
____ is a new alternative for homes and businesses today in areas where there is
fiber optic cabling available all the way to the building.
|
|
53.
|
The ____ is the most commonly used Internet search type.
a. | keyword search | c. | directory search | b. | character search | d. | distributed
search |
|
|
54.
|
Common online investing services include the ability to set up a(n) ____ that
displays the status of the stocks you specify.
a. | online portfolio | c. | online recorder | b. | stock account | d. | e-tailer |
|
|
55.
|
Video content delivered at the user’s request is called ____.
a. | video channel | c. | video-on-demand | b. | video networking | d. | Video over Internet
Protocol |
|
|
56.
|
____ sites allow you to generate map and driving directions and provide access
to specific types of useful information.
a. | Educational | c. | News | b. | Reference | d. | Product
information |
|
|
|
|
|
57.
|
The accompanying figure shows the iGoogle ____ Web page.
a. | portal | c. | social networking | b. | RSS | d. | podcasting |
|
|
58.
|
Both businesses and schools are utilizing ____ for employee training or course
materials.
a. | Web-based training (WBT) | c. | distance
lessons | b. | Web-based teaching (WBT) | d. | e-training |
|
|
59.
|
In a nutshell, blogs are designed for primarily one-way running communications,
while ____ are intended to be modified by others.
a. | e-portfolios | c. | e-blogs | b. | wikis | d. | e-diaries |
|
|
60.
|
____, as it relates to the Internet, encompasses what information about
individuals is available, how it is used, and by whom.
a. | Security | c. | Filtering | b. | Privacy | d. | Control |
|