Skip to main content

Computer Science Basics



If you have any test reviews, homeworks, guides, anything school related that you think can be posted on this website, reach out to me at makingschooleasier@gmail.com  


1) Application software is used to ____.
a.      facilitate communications
b.      assist with graphics and multimedia projects
c.      support home, personal, and educational tasks
d.      all of the above
ANS:    D

2)____ is mass-produced, copyrighted retail software that meets the needs of a variety of users, not just a single user or company.
a.      Packaged software       c.      Freeware
b.      Custom software d.      Public-domain software
ANS:    A

3)____ performs functions specific to a business or industry.
a.      Freeware        c.      Custom software
b.      Packaged software

ANS:    C       d.      Shareware


4)Each time a user starts a computer, the operating system is ____ (copied) from the computer’s hard disk into memory.
a.      printed c.      loaded
b.      Scrolled
ANS:    C       d.      Saved


5)____ software serves as the interface between the user, the application software, and the computer’s hardware.
a.      System  c.      Maintenance
b.      Management      d.      Operational
ANS:    A
       6)A(n) ____ is a rectangular area of the screen that displays data and information.
a.      frame   c.      workspace
b.      box     d.      Window

       ANS:    D
7)____ software is software that allows users to organize data in rows and columns and perform calculations on the data.
a.      Database        c.      Spreadsheet
b.      PIM     d.      PDA
ANS:    C



8)A(n) ____ is the intersection of a column and row in a worksheet.
a.      link    c.      nexus
b.      cell    d.      grid
ANS:    B

9)A(n) ____ is a predefined formula that performs common calculations such as adding the values in a group of cells.
a.      algorithm       c.      problem set
b.      function        d.      label
ANS:    B

10)In a database, each row, called a ____, contains data about a given person, product, object, or event.
a.      record  c.      form
b.      cell    d.      field
ANS:    A

11)Using database software, you can ____.
a.      add, change, and delete data    c.      create forms and reports
b.      sort and retrieve data  d.      all of the above

ANS:    D

12)Two popular ____ are Microsoft Office 2007 and Apple iWork.
a.      personal information managers   c.      clip art/image galleries
b.      software suites d.      application service providers
 ANS:   B

13)____ is ideal for the production of high-quality color documents such as textbooks, corporate newsletters, marketing literature, product catalogs, and annual reports.
a.      Professional DTP software       c.      Professional CAD software
b.      Word processing software        d.      Web page authoring software
ANS:    A

14)The programs within a software suite (for personal use) use a ____.
a.      different interface and have completely different features
b.      different interface but share some common features
c.      similar interface but have completely different features
d.      similar interface and share some common features
ANS:    D

15)A(n) ____ protects a computer by identifying and removing any viruses found in memory, on media, or in files.
a.      antivirus program       c.      pop-up blocker
b.      anti-spam program       d.      Web filter

ANS:    A
16)A(n) ____ utility shrinks the size of a file(s).
a.      concatenation   c.      FTP
b.      file compression        d.      integrated
ANS:    B

17)A computer ____ is a small piece of semi-conducting material, usually silicon, on which integrated circuits are etched.
a.      plug    c.      chip
b.      port    d.      roster
ANS:    C

18)In the machine cycle steps, ____ is the process of obtaining a program instruction or data item from memory.
a.      fetching        c.      executing
b.      decoding        d.      storing
ANS:    A

19)____ is the most widely used coding scheme used to represent data.
a.      American Standard Code for Information Interchange (ASCII)
b.      Unicode
c.      Extended Binary Coded Decimal Interchange Code (EBCDIC)
d.      Multicode

ANS:    A

20)____ is a coding scheme capable of representing almost all of the world’s current written languages, as well as classic and historical languages.
a.      American Standard Code for Information Interchange (ASCII)
b.      Unicode
c.      Extended Binary Coded Decimal Interchange Code (EBCDIC)
d.      Multicode

ANS:    B

21)Each byte resides temporarily in a location in memory, called a(n) ____.
a.      address c.      register
b.      location        d.      keycode

ANS:    A







22)Memory stores ____.
a.      the operating system and other system software
b.      application programs that carry out a specific task
c.      the data being processed and the resulting information
d.      all of the above

ANS:    D

23)____ is the most common type of volatile memory.
a.      ROM     c.      CMOS
b.      Flash memory


ANS:    D
       d.      RAM


24)____ is built directly into a processor chip and usually has a very small capacity.
a.      L1 cache        c.      L3 cache
b.      L2 cache

ANS:    A
       d.      L4 cache



25)____ is a cache separate from the processor chip on the motherboard.
a.      L1 cache        c.      L3 cache
b.      L2 cache        d.      L4 cache

ANS:    C

26)____ cache is a type of cache that helps speed the processes of a computer because it stores frequently used instructions and data.
a.      Programmable    c.      Read-only
b.      Real-time

       ANS:    D
       d.      Memory


27)____ time is the amount of time it takes the processor to read data, instructions, and information from memory.
a.      Access  c.      Processing
b.      Meter   d.      Connection
ANS:    A

28)A(n) ____ is the point at which a peripheral attaches to or communicates with the system unit so it can send data or receive information from the computer.
a.      signal receptor c.      port
b.      analog  d.      baseline


ANS:    C

29)Unlike a serial port, a(n) ____ port is an interface that connects devices by transferring more than one bit at a time.
a.      parallel        c.      IEEE
b.      USB     d.      FireWire

ANS:    A

30)Two types of system software are ____.
a.      application software and utility programs       c.      operating systems and utility programs
b.      Web browsers and application software   d.      operating systems and Web browsers

C


31)A(n) ____ system is a set of programs containing instructions that coordinate all the activities among computer hardware resources.
a.      operating       c.      management
b.      disk-based      d.      Platform
ANS:    A

32)A cross-platform program is one that runs ____.
a.      only on one operating system    c.      the same on multiple operating systems
b.      differently on every operating system   d.      differently on one operating system
ANS:    C

33)The operating system that a computer uses sometimes is called the ____.
a.      base    c.      index
b.      platform        d.      boot system
ANS:    B

34)With Windows Vista, a warm boot can be performed by ____.
a.      pressing the power button on the computer
b.      clicking a button on the task bar, then a Start menu button, then a Lock menu button, then a command on the Lock button menu
c.      pressing the restart button on the computer
d.      all of the above
ANS:    B

____

35)____ is the process of starting or restarting a computer.
a.      Launching       c.      Booting
b.      Loading d.      Keying
ANS:    C



36)In a ____ like the one shown in Figure, a user types commands or presses special keys on the keyboard (such as function keys or key combinations) to enter data and instructions.
a.      command-line interface  c.      performance-monitor interface
b.      menu-driven interface   d.      graphical user interface (GUI)
ANS:    A

37)A(n) ____ drive is the drive from which a personal computer starts.
a.      origin  c.      archive
b.      initiating      d.      Boot
ANS:    D

38)With a ____, users interact with menus and visual images such as icons, buttons, and other objects to issue commands.
a.      command-line interface  c.      performance-monitor interface
b.      menu-driven interface   d.      graphical user interface (GUI)
ANS:    D

39)Networks, servers, mainframes, and supercomputers allow hundreds to thousands of users to connect at the same time, and thus are ____.
a.      single user     c.      multiuser
b.      single processing       d.      multiprocessing
ANS:    C

40)A(n) ____ operating system enables two or more users to run programs simultaneously.
a.      multiplied      c.      engaged
b.      multiuser       d.      rasterized
ANS:    B
41)A(n) ____ operating system supports two or more processors running programs at the same time.
a.      virtual c.      multiprocessing
b.      indexed d.      fault-tolerant
ANS:    C

42)A(n) ____ computer is a computer that continues to operate when one of its components fails, ensuring that no data is lost.
a.      failsafe        c.      immune
b.      antivirus       d.      fault-tolerant
ANS:    D

43)With ____ memory, the operating system allocates a portion of a storage medium, usually the hard disk, to function as additional RAM.
a.      virtual c.      device
b.      performance     d.      managed
ANS:    A

44)     If a new device, such as a printer or scanner, is attached to a computer, its ____ must be installed before the device can be used.
a.      driver  c.      manager
b.      platform        d.      kernel
ANS:    A

       45)A(n) ____ is a small program that tells the operating system how to communicate with a specific device.
a.      driver  c.      utility
b.      monitor d.      OS
ANS:    A

46)A performance ____ is a program that assesses and reports information about various computer resources and devices.
a.      roster  c.      reporter
b.      monitor d.      manager
ANS:    B

47)     A(n) ____ is a type of system software that allows a user to perform maintenance-type tasks, usually related to managing a computer, its devices, or its programs.
a.      driver  c.      utility
b.      scanner d.      defragmenter
ANS:    C

48)A file ____ is a utility that performs functions related to file management.
a.      monitor c.      scanner
b.      controller      d.      Manager
ANS:    D
49)____ a disk, or reorganizing it so the files are stored in contiguous sectors, speeds up disk access and thus the performance of the entire computer.
a.      Formatting      c.      Spooling
b.      Defragmenting   d.      Compressing
ANS:    B

50)A disk ____ is a utility that searches for and removes unnecessary files.
a.      scanner c.      detective
b.      doctor  d.      archiver
ANS:    A

51)Many backup programs ____, or shrink the size of, files during the backup process.
a.      restore c.      fragment
b.      register        d.      compress
ANS:    D

52)A(n) ____ utility is a utility that compiles technical information about a computer’s hardware and certain system software programs and then prepares a report outlining any identified problems.
a.      symbian c.      diagnostic
b.      operational     d.      analytic

ANS:    C
53)The term, computer ____, describes a potentially damaging computer program that affects, or infects, a computer negatively by altering the way the computer works without the user’s knowledge or permission.
a.      hotspot c.      virus
b.      file compression utility        d.      file conversion utility

ANS:    C


54)____ is software that acts without a user’s knowledge and deliberately alters a computer’s operations.
a.      Malware c.      System software
b.      A utility program       d.      A diagnostic program
ANS:    A

55)     ____ is a program placed on a computer without the user’s knowledge or consent that secretly collects information about the user, often related to Web browsing habits.
a.      Spyware c.      Spam
b.      A pop-up ad     d.      A filter
ANS:    A

       56)____ is a program that removes or blocks certain items from being displayed.
a.      Spyware c.      Spam
b.      A pop-up ad     d.      A filter
ANS:    D
57)Compressed files, sometimes called ____.
a.      ripped files, usually have a .rip extension
b.      tipped files, usually have a .tip extension
c.      slipped files, usually have a .slip extension
d.      zipped files, usually have a .zip extension

ANS:    D

58)  ____ can serve as sending and receiving devices in a communications system.
a.      Mainframe computers and servers
b.      Desktop computers and notebook computers
c.      Tablet PCs and PDAs
d.      All of the above
ANS:    D

59)A(n) ____ device is a device that accepts the transmission of data, instructions, or information.
a.      sending c.      initiating
b.      receiving       d.      transceiving
ANS:    B

60)A type of communications device that connects a communications channel to a sending or receiving device is a ____.
a.      modem   c.      PDA
b.      server  d.      all of the above

ANS:    A

61)A(n) ____ is a LAN that uses no physical wires.
a.      ELAN    c.      WLAN
b.      PLAN    d.      MAN
ANS:    C

62)A ____ is a network that connects computers and devices in a limited geographical area, such as a home, school computer laboratory, or office building.
a.      local area network (LAN)        c.      wide area network (WAN)
b.      metropolitan area network (MAN) d.      variable area network (VAN)

 ANS:   A

63)Each computer or device on a local area network, called a ____, often shares resources such as printers, large hard disks, and programs.
a.      hub     c.      token
b.      server  d.      node


ANS:    D
64)A ____ is a high-speed network that connects networks in an area such as a city or town and handles the bulk of communications activity across that region.
a.      local area network (LAN)        c.      wide area network (WAN)
b.      metropolitan area network (MAN) d.      variable area network (VAN)
ANS:    B

65)The design of computers, devices, and media in a network, sometimes called the ____, is categorized as either client/server or peer-to-peer.
a.      network topology        c.      network standard
b.      network architecture    d.      network protocol
ANS:    B

66)The risk to a bus network is that ____.
a.      devices attached or detached at any point on the bus disrupt the rest of the network
b.      the failure of one device usually affects the rest of the network
c.      the bus itself might become inoperable
d.      all of the above

ANS:    C

67)A ____ network is a network topology that consists of a single central cable, to which all computers and other devices connect.
a.      bus     c.      ring
b.      token ring      d.      star

A

68)On a ____,  all of the computers and devices (nodes) on the network connect to a central device.
a.      bus network     c.      star network
b.      ring network    d.      token ring network

ANS:    C




69)Computers process _____.
a.      data into information   c.      data into instructions
b.      information into data   d.      instructions into data

ANS:    A




70)_____ is/are the steps that tell the computer how to perform a particular task.
a.      Data    c.      Instructions
b.      Information     d.      Documentation
ANS:    C

Do you live in NYC?
Is your home starting to look a bit messy and dirty?
Have it professionally cleaned by my company!
Check us out or refer us to someone you may know that may need our services.
nationalpremiercleaning.com


If you have any test reviews, homeworks, guides, anything school related that you think can be posted on this website, reach out to me at makingschooleasier@gmail.com  

Popular posts from this blog

Setting The Stage For Learning About The Earth

If you have any test reviews, homeworks, guides, anything school related that you think can be posted on this website, reach out to me at makingschooleasier@gmail.com   (These Answers Should Be Used as a Basis For Yours) Exercise 1.1 Submergence Rate Along the Maine Coast The rate of submergence is the total change in elevation of the pier 2 meters divided by the total amount of time involved 300 years and is therefore .67 cm/yr Exercise 1.4  Sources of Heat for Earth Processes A. The sand should be hot since the sun has been heating up the sand throughout the day. i. When you dig your feet into the sand you should feel cooler sand since the sun's penetration into the earth is limited. ii. This suggests that the Sun can only penetrate into the Earth up until a certain depth. iii.Based on this conclusion, one can assume that the Sun is not responsible for the Earth's internal heat since, we have heat hundreds of kilometers within the Earth and thi...

The Romantics: John Keats and Samuel T. Coleridge

If you have any test reviews, homeworks, guides, anything school related that you think can be posted on this website, reach out to me at makingschooleasier@gmail.com   PART OF THIS ESSAY HAS BEEN  OMITTED  FOR FULL ESSAY COMMENT,EMAIL, LIKE, FOLLOW US                                    The Romantics: John Keats and Samuel T. Coleridge         The Romantic Period in England had six major poets, William Wordsworth, Lord Byron, Percy Shelley, William Blake, John Keats, and Samuel Coleridge. For the purpose of this essay, the focus will only be on Keats and Coleridge. Although they were contemporaries, they each have very different styles of writing as is evident in their poetry. In “This Lime Tree Bower My Prison” an exemplary e...

history outline

If you have any test reviews, homeworks, guides, anything school related that you think can be posted on this website, reach out to me at makingschooleasier@gmail.com   Preface   On page 10, the author suggests that the roots of western Eurasian dominance in the modern world lie in what?             On page10, the author suggests that the roots of western Eurasian dominance in the modern world lie in the preliterate past before 3,000 B.C.  By western  Eurasian dominance , the author means the dominance of western Eurasian societies themselves and of the societies that they spawned on other continents. Why has the author chosen to write this book in this style and manner?             In order to study western Eurasian societies the reader must also understand the differences among other societies.  As in th...