CSCI 1201 exasm multiple choice

Created by assuminations 

Upgrade to
remove ads

transtors and integrated circuits

Key factors in making electronic devices increasingly smaller and less expensive include ____

code breaking

The first digital computers were built during World War II for ____.

lack of software

Initially sales were slow for the personal computer because of ____.

10

In 1982, the percentage of households that had a computer was fewer than ____

online social networks

____ provide a space for interacting with friends or friends of those friends

cyberspace

____ is a term that refers to entities that exist largely within computer networks

convergence

Technology ____ is a process by which several different technologies with distinct functionality evolve to form a single product.

Anonymizer

____ tools cloak a person's identity online

think independently

A computer is a multiple purpose device that can do all of the following EXCEPT ____.

the CPU

In a computer, most processing takes place in ____.

micoprocessor

An electronic component that can be programmed to perform tasks is a ____.

file

named collection of data that exists on a storage medium is known as (a) ____.

memory

An area of a computer that temporarily holds data waiting to be processed is ____.

application software

A set of computer programs that helps a person carry out a task is ____.

personal computer

A(n) ____ is a microprocessor-based computing device designed to meet the computing needs of an individual

workstation

An ordinary personal computer that is connected to a network is a ____.

workstation

powerful desktop computer used for high-performance tasks is a ____.

supercomputer

A compute-intensive problem runs on a ____.

digital

The type of data where text, numbers, graphics, sound, and video have been converted into discrete digits as
represented in the accompanying figure is ____.

2

The binary number 10 represents ____ in the decimal number system.

ASCII

The type of code that uses only seven bits for each character is ____.

all of the above

Digital devices can use ____ as a code to represent character data.

bytes

Storage is typically expressed as ____.

kilobyte

1,024 bytes is a ____.

gigabyte

1,073,741,824 bytes is a ____.

DIP

The accompanying figure represents two types of chip carriers. The one on the left is a ____.

system board

The ____ houses all essential chips and provides connecting circuitry between them

instruction set

A collection of preprogrammed activities such as addition, subtraction, counting and comparison is called a(n) ____.

op code

The ____ is a command word for an operation such as add, compare, or jump.

fetch instruction

The accompanying figure represents the instruction cycle. The first step is Box A and represents the ____.

interpret instruction

The accompanying figure represents the instruction cycle. The second step is Box B and represents the ____.

execute instruction

The accompanying figure represents the instruction cycle. The third step is Box C and represents the ____.

increment pointer

The accompanying figure represents the instruction cycle. The fourth step is Box D and represents the ____.

a password

In terms of an authentication protocol, the phrase 'something a person knows' refers to ____

all of the above

A term which can refer to a person who manipulates computers with malicious intent is a ____.

PDA

Karen is trying to get organized and one of her issues is that she doesn't know what kind of devices correspond toher needs.
Karen needs an appointment book and is considering one that is digital. For this one piece of equipment, she does not
want the device to do anything except maintain her calendar. You suggest she consider a ____.

handheld computer

Karen is trying to get organized and one of her issues is that she doesn't know what kind of devices correspond toher needs.
After you and Karen talk a little longer, she recognizes that she might need a device that in addition to her appointment
book will have features such as e-mail, Web access, a built-in camera, and GPS. You suggest she consider a(n) ____.

clock radio

Mike and Andre are discussing how quickly technology changes. They are discussing how it seems devices are
merging to create new products especially in the technology field. They understand this is a process called convergence.
An example of an old form of convergence is a ____.

cell phones

Mike and Andre are discussing how quickly technology changes. They are discussing how it seems devices are
merging to create new products especially in the technology field. They understand this is a process called convergence.
A great example of convergence in modern technology is ____.

the code is ready to execute

Jim has just purchased a new computer and it has made him think about how it works. He is particularly interested in how information is processed and stored in his computer. He has come to you for help.
Jim wants to know why a compiler converts all statements in a program at one time and places them into an object code. You tell him it is so that ____.

a series of 0s and 1s

Jim has just purchased a new computer and it has made him think about how it works. He is particularly interested in how information is processed and stored in his computer. He has come to you for help.
Jim wants to know what machine language instructions look like to the machine. You tell him they appear as ____.

It is volatile

In the accompanying figure, which of the following is NOT true of the component in picture C?

form factor

The term ____ refers to the size and dimensions of a computer component.

slate

A(n) ____ tablet configuration resembles a high-tech clipboard and lacks a built-in keyboard.

Gigahertz

____ means a billion cycles per second.

Word size

____ refers to the number of bits that a microprocessor can manipulate at one time.

piplining

A technology called ____ allows the processor to begin executing another instruction before it completes the previous
instruction.

RISC

A microprocessor whose instruction set includes a limited set of simple instructions uses ____ technology.

parallel processing

Many of today's microprocessors perform ____, in which multiple instructions are executed at the same time.

Benchmarks

____ are the results of a series of tests used to gauge overall microprocessor speed and are useful in comparing
microprocessor performance

all of the above

Overclocking is a technique for increasing the speed of a computer component, such as ____. It can be very risky

waiting room

RAM can be thought of as the ____ for the computer's processor.

nanoseconds

RAM speed is often expressed in ____.

ROM (read only memory)

____ is a type of memory circuitry that holds the computer's startup routine.

all of the above

ROM BIOS is a small set of instructions that tells the computer ____.

EEPROM

A(n) ____ chip is a type of non-volatile memory chip that does not require power to hold data.

Acess

____ time is the average time it takes a computer to locate and read data on the storage medium.

data transfer rate

The ____ is the amount of data that a storage device can move from the storage medium to the computer per second.

2 TB

Personal computer hard disk platters typically have storage capacities ranging from 40 GB to ____.

all of the above

Which of the following is an example of a rerecordable optical storage medium?

card reader

A built-in ____ in your personal computer can make it simpler to transfer photos from a solid state memory card used
in your digital camera.

USB flash drive

The accompanying figure shows us a ____. sick woith a lid. given.

all of the above

____ is an example of a pointing device.

trackpad

A ____ is a touch-sensitive surface on which you can slide your fingers to move the on-screen pointer

PDA

A(n) ____ is standard equipment on notebook computers.

pixels

Dot pitch is the distance in millimeters between like-colored ____ —the small dots of light that form an image.

OLEDs

____ have a faster response rate than standard LCD screens.

color depth

The number of colors a monitor can display is referred to as ____.

WQXGA

Which is the highest resolution?

USB port

In the accompanying figure, the item marked A is a ____.

serial port

In the accompanying figure, the item marked B is a ____.

USB and FireWire

Hot plugging is allowed with what kind of devices?

power surge

A ____ is a sudden increase or spike in electrical energy, affecting the current that flows to electrical outlets

STOP

It takes 800 pounds of force to remove a ____ plate, which contains a unique ID number, a warning message, and
an 800 number to report a stolen computer.

Lojack for laptops

Which of the following is tracking and recovery software?

all of the above

A good computer maintenance routine would include regularly ____.

US$600 to $2000

Perry is looking at his budget alongside his requirements for a new computer. He does not have a lot to spend but
he wants to get as much for his money as he possibly can, and he wants to be very confident that the choice he is
making is well-informed.

If Perry decides that he does not need the computer equivalent of a luxury automobile and that his needs are more
in line with those of the average user, what can he expect to pay?

Amount of RAM

Laura plans to buy a new computer. She is interested in the technical features of the different types of memory she
will find in her computer system - RAM, ROM, and EEPROM. She works with documents, edits and creates
graphics, and likes to play 3D virtual reality games.

Laura wants to make sure her computer is fast enough for her everyday use. Which of the listed features is the most
important?

USB flash drive

An important part of a computer system is storage. James works with computers both at home and at work. He needs
to move his spreadsheet and database files between the computers he uses at home and at work. He also enjoys
downloading MP3 music files and takes lots of digital photos.

What is the best storage medium for storing James' three databases, each of which is approximately 500 MB?

external drive bay

Paul decided to upgrade his computer system. He purchased a new optical disc drive to replace his old CD-ROM
drive. He has decided to replace his old CRT display device and already upgraded his graphics card to support a more
modern display device. He also plans to purchase a new printer to replace his old dot-matrix printer.

Paul has just purchased a new Blu-ray disc drive. Where would he install this drive?

computer- centric

System software is designed to accomplish ____ tasks.

real-world

Application software is designed to accomplish ____ tasks.

statistical software

Application software includes ____.

setup wizard

Software considered utility software is ____.

utility

The type of system software designed to help you monitor and configure settings for your computer system
equipment is ____ software.

icons

Desktop widgets include all of the following EXCEPT ____.

readability formula

When using word processing software to analyze the reading level of your document you should use a ____.

what-if analysis

Spreadsheets are particularly useful for ____.

data

In the accompanying figure, the item marked A represents ____.

a record

In the accompanying figure, the item marked B represents ____

Movie Maker

Popular presentation software products includes all of the following EXCEPT ____.

ear training

The type of software that targets musicians and music students who want to develop musical skills is ____.

notation

Software that is the musician's equivalent to a word processor is ____.

computer- aided music

Software designed to generate unique musical compositions simply by selecting the musical style, instrument, key,
and tempo is ____.

all of the above

You can purchase software at a variety of locations such as ____.

software license

As shown in the accompanying figure, a ____ is a legal contract that defines the ways in which you may use a
computer program

open it

A shrink-wrap license goes into effect as soon as you ____.

commercial software

____ is typically sold in a store or online

Shareware

____ is typically commercial software that is marketed under try-before-you buy policy

data files

In the accompanying figure, the files marked A are ____.

support program files

In the accompanying figure, the files marked C are ____.

.hlp

Data files supplied with a software package support ____ file extensions.

Local

____ applications are software that is designed to reside on a computer's hard disk.

product activation

A protection of software from illegal copying is ____.

hash value

Product validation can create a(n) ____ based on your validation code and your computer's internal serial number

bot

A ____ is any software that can automate a task or autonomously execute a task when commanded to do so.

all of the above

Security suites can be ____.

unique

A virus signature is a(n) ____.

virus

At the ACME Widget Company the computers have started behaving weirdly. Chris noticed that his directory had
some files that he didn't remember putting on his computer. Lesley noticed their computer was beginning to run very
slow and Kim realized she was getting replies to emails she had not sent. The owner of the ACME Widget Company
has contacted you to see if their company might have a computer security problem.

You think that the computers at ACME Widget Company may be infected with a ____. You explain that it is a set of
program instructions that attaches itself to a file and spreads to other files.

trojan horse

At the ACME Widget Company the computers have started behaving weirdly. Chris noticed that his directory had
some files that he didn't remember putting on his computer. Lesley noticed their computer was beginning to run very
slow and Kim realized she was getting replies to emails she had not sent. The owner of the ACME Widget Company
has contacted you to see if their company might have a computer security problem

Another possibility is that ACME Widget Company has a ____ that seems to perform one function while actually
doing something else.

Please allow access to your computer’s microphone to use Voice Recording.

Having trouble? Click here for help.

We can’t access your microphone!

Click the icon above to update your browser permissions above and try again

Example:

Reload the page to try again!

Reload

Press Cmd-0 to reset your zoom

Press Ctrl-0 to reset your zoom

It looks like your browser might be zoomed in or out. Your browser needs to be zoomed to a normal size to record audio.

Please upgrade Flash or install Chrome
to use Voice Recording.

For more help, see our troubleshooting page.

Your microphone is muted

For help fixing this issue, see this FAQ.

Star this term

You can study starred terms together

NEW! Voice Recording

Create Set