If you have any test reviews, homeworks, guides, anything school related that you think can be posted on this website, reach out to me at makingschooleasier@gmail.com
1) Application software is used to ____.
a. facilitate communications
b. assist with graphics and multimedia projects
c. support home, personal, and educational tasks
d. all of the above
ANS: D
2)____ is mass-produced, copyrighted retail software that meets the needs of a variety of users, not just a single user or company.
a. Packaged software c. Freeware
b. Custom software d. Public-domain software
ANS: A
3)____ performs functions specific to a business or industry.
a. Freeware c. Custom software
b. Packaged software
ANS: C d. Shareware
4)Each time a user starts a computer, the operating system is ____ (copied) from the computer’s hard disk into memory.
a. printed c. loaded
b. Scrolled
ANS: C d. Saved
5)____ software serves as the interface between the user, the application software, and the computer’s hardware.
a. System c. Maintenance
b. Management d. Operational
ANS: A
6)A(n) ____ is a rectangular area of the screen that displays data and information.
a. frame c. workspace
b. box d. Window
ANS: D
7)____ software is software that allows users to organize data in rows and columns and perform calculations on the data.
a. Database c. Spreadsheet
b. PIM d. PDA
ANS: C
8)A(n) ____ is the intersection of a column and row in a worksheet.
a. link c. nexus
b. cell d. grid
ANS: B
9)A(n) ____ is a predefined formula that performs common calculations such as adding the values in a group of cells.
a. algorithm c. problem set
b. function d. label
ANS: B
10)In a database, each row, called a ____, contains data about a given person, product, object, or event.
a. record c. form
b. cell d. field
ANS: A
11)Using database software, you can ____.
a. add, change, and delete data c. create forms and reports
b. sort and retrieve data d. all of the above
ANS: D
12)Two popular ____ are Microsoft Office 2007 and Apple iWork.
a. personal information managers c. clip art/image galleries
b. software suites d. application service providers
ANS: B
13)____ is ideal for the production of high-quality color documents such as textbooks, corporate newsletters, marketing literature, product catalogs, and annual reports.
a. Professional DTP software c. Professional CAD software
b. Word processing software d. Web page authoring software
ANS: A
14)The programs within a software suite (for personal use) use a ____.
a. different interface and have completely different features
b. different interface but share some common features
c. similar interface but have completely different features
d. similar interface and share some common features
ANS: D
15)A(n) ____ protects a computer by identifying and removing any viruses found in memory, on media, or in files.
a. antivirus program c. pop-up blocker
b. anti-spam program d. Web filter
ANS: A
16)A(n) ____ utility shrinks the size of a file(s).
a. concatenation c. FTP
b. file compression d. integrated
ANS: B
17)A computer ____ is a small piece of semi-conducting material, usually silicon, on which integrated circuits are etched.
a. plug c. chip
b. port d. roster
ANS: C
18)In the machine cycle steps, ____ is the process of obtaining a program instruction or data item from memory.
a. fetching c. executing
b. decoding d. storing
ANS: A
19)____ is the most widely used coding scheme used to represent data.
a. American Standard Code for Information Interchange (ASCII)
b. Unicode
c. Extended Binary Coded Decimal Interchange Code (EBCDIC)
d. Multicode
ANS: A
20)____ is a coding scheme capable of representing almost all of the world’s current written languages, as well as classic and historical languages.
a. American Standard Code for Information Interchange (ASCII)
b. Unicode
c. Extended Binary Coded Decimal Interchange Code (EBCDIC)
d. Multicode
ANS: B
21)Each byte resides temporarily in a location in memory, called a(n) ____.
a. address c. register
b. location d. keycode
ANS: A
22)Memory stores ____.
a. the operating system and other system software
b. application programs that carry out a specific task
c. the data being processed and the resulting information
d. all of the above
ANS: D
23)____ is the most common type of volatile memory.
a. ROM c. CMOS
b. Flash memory
ANS: D
d. RAM
24)____ is built directly into a processor chip and usually has a very small capacity.
a. L1 cache c. L3 cache
b. L2 cache
ANS: A
d. L4 cache
25)____ is a cache separate from the processor chip on the motherboard.
a. L1 cache c. L3 cache
b. L2 cache d. L4 cache
ANS: C
26)____ cache is a type of cache that helps speed the processes of a computer because it stores frequently used instructions and data.
a. Programmable c. Read-only
b. Real-time
ANS: D
d. Memory
27)____ time is the amount of time it takes the processor to read data, instructions, and information from memory.
a. Access c. Processing
b. Meter d. Connection
ANS: A
28)A(n) ____ is the point at which a peripheral attaches to or communicates with the system unit so it can send data or receive information from the computer.
a. signal receptor c. port
b. analog d. baseline
ANS: C
29)Unlike a serial port, a(n) ____ port is an interface that connects devices by transferring more than one bit at a time.
a. parallel c. IEEE
b. USB d. FireWire
ANS: A
30)Two types of system software are ____.
a. application software and utility programs c. operating systems and utility programs
b. Web browsers and application software d. operating systems and Web browsers
C
31)A(n) ____ system is a set of programs containing instructions that coordinate all the activities among computer hardware resources.
a. operating c. management
b. disk-based d. Platform
ANS: A
32)A cross-platform program is one that runs ____.
a. only on one operating system c. the same on multiple operating systems
b. differently on every operating system d. differently on one operating system
ANS: C
33)The operating system that a computer uses sometimes is called the ____.
a. base c. index
b. platform d. boot system
ANS: B
34)With Windows Vista, a warm boot can be performed by ____.
a. pressing the power button on the computer
b. clicking a button on the task bar, then a Start menu button, then a Lock menu button, then a command on the Lock button menu
c. pressing the restart button on the computer
d. all of the above
ANS: B
____
35)____ is the process of starting or restarting a computer.
a. Launching c. Booting
b. Loading d. Keying
ANS: C
36)In a ____ like the one shown in Figure, a user types commands or presses special keys on the keyboard (such as function keys or key combinations) to enter data and instructions.
a. command-line interface c. performance-monitor interface
b. menu-driven interface d. graphical user interface (GUI)
ANS: A
37)A(n) ____ drive is the drive from which a personal computer starts.
a. origin c. archive
b. initiating d. Boot
ANS: D
38)With a ____, users interact with menus and visual images such as icons, buttons, and other objects to issue commands.
a. command-line interface c. performance-monitor interface
b. menu-driven interface d. graphical user interface (GUI)
ANS: D
39)Networks, servers, mainframes, and supercomputers allow hundreds to thousands of users to connect at the same time, and thus are ____.
a. single user c. multiuser
b. single processing d. multiprocessing
ANS: C
40)A(n) ____ operating system enables two or more users to run programs simultaneously.
a. multiplied c. engaged
b. multiuser d. rasterized
ANS: B
41)A(n) ____ operating system supports two or more processors running programs at the same time.
a. virtual c. multiprocessing
b. indexed d. fault-tolerant
ANS: C
42)A(n) ____ computer is a computer that continues to operate when one of its components fails, ensuring that no data is lost.
a. failsafe c. immune
b. antivirus d. fault-tolerant
ANS: D
43)With ____ memory, the operating system allocates a portion of a storage medium, usually the hard disk, to function as additional RAM.
a. virtual c. device
b. performance d. managed
ANS: A
44) If a new device, such as a printer or scanner, is attached to a computer, its ____ must be installed before the device can be used.
a. driver c. manager
b. platform d. kernel
ANS: A
45)A(n) ____ is a small program that tells the operating system how to communicate with a specific device.
a. driver c. utility
b. monitor d. OS
ANS: A
46)A performance ____ is a program that assesses and reports information about various computer resources and devices.
a. roster c. reporter
b. monitor d. manager
ANS: B
47) A(n) ____ is a type of system software that allows a user to perform maintenance-type tasks, usually related to managing a computer, its devices, or its programs.
a. driver c. utility
b. scanner d. defragmenter
ANS: C
48)A file ____ is a utility that performs functions related to file management.
a. monitor c. scanner
b. controller d. Manager
ANS: D
49)____ a disk, or reorganizing it so the files are stored in contiguous sectors, speeds up disk access and thus the performance of the entire computer.
a. Formatting c. Spooling
b. Defragmenting d. Compressing
ANS: B
50)A disk ____ is a utility that searches for and removes unnecessary files.
a. scanner c. detective
b. doctor d. archiver
ANS: A
51)Many backup programs ____, or shrink the size of, files during the backup process.
a. restore c. fragment
b. register d. compress
ANS: D
52)A(n) ____ utility is a utility that compiles technical information about a computer’s hardware and certain system software programs and then prepares a report outlining any identified problems.
a. symbian c. diagnostic
b. operational d. analytic
ANS: C
53)The term, computer ____, describes a potentially damaging computer program that affects, or infects, a computer negatively by altering the way the computer works without the user’s knowledge or permission.
a. hotspot c. virus
b. file compression utility d. file conversion utility
ANS: C
54)____ is software that acts without a user’s knowledge and deliberately alters a computer’s operations.
a. Malware c. System software
b. A utility program d. A diagnostic program
ANS: A
55) ____ is a program placed on a computer without the user’s knowledge or consent that secretly collects information about the user, often related to Web browsing habits.
a. Spyware c. Spam
b. A pop-up ad d. A filter
ANS: A
56)____ is a program that removes or blocks certain items from being displayed.
a. Spyware c. Spam
b. A pop-up ad d. A filter
ANS: D
57)Compressed files, sometimes called ____.
a. ripped files, usually have a .rip extension
b. tipped files, usually have a .tip extension
c. slipped files, usually have a .slip extension
d. zipped files, usually have a .zip extension
ANS: D
58) ____ can serve as sending and receiving devices in a communications system.
a. Mainframe computers and servers
b. Desktop computers and notebook computers
c. Tablet PCs and PDAs
d. All of the above
ANS: D
59)A(n) ____ device is a device that accepts the transmission of data, instructions, or information.
a. sending c. initiating
b. receiving d. transceiving
ANS: B
60)A type of communications device that connects a communications channel to a sending or receiving device is a ____.
a. modem c. PDA
b. server d. all of the above
ANS: A
61)A(n) ____ is a LAN that uses no physical wires.
a. ELAN c. WLAN
b. PLAN d. MAN
ANS: C
62)A ____ is a network that connects computers and devices in a limited geographical area, such as a home, school computer laboratory, or office building.
a. local area network (LAN) c. wide area network (WAN)
b. metropolitan area network (MAN) d. variable area network (VAN)
ANS: A
63)Each computer or device on a local area network, called a ____, often shares resources such as printers, large hard disks, and programs.
a. hub c. token
b. server d. node
ANS: D
64)A ____ is a high-speed network that connects networks in an area such as a city or town and handles the bulk of communications activity across that region.
a. local area network (LAN) c. wide area network (WAN)
b. metropolitan area network (MAN) d. variable area network (VAN)
ANS: B
65)The design of computers, devices, and media in a network, sometimes called the ____, is categorized as either client/server or peer-to-peer.
a. network topology c. network standard
b. network architecture d. network protocol
ANS: B
66)The risk to a bus network is that ____.
a. devices attached or detached at any point on the bus disrupt the rest of the network
b. the failure of one device usually affects the rest of the network
c. the bus itself might become inoperable
d. all of the above
ANS: C
67)A ____ network is a network topology that consists of a single central cable, to which all computers and other devices connect.
a. bus c. ring
b. token ring d. star
A
68)On a ____, all of the computers and devices (nodes) on the network connect to a central device.
a. bus network c. star network
b. ring network d. token ring network
ANS: C
69)Computers process _____.
a. data into information c. data into instructions
b. information into data d. instructions into data
ANS: A
70)_____ is/are the steps that tell the computer how to perform a particular task.
a. Data c. Instructions
b. Information d. Documentation
ANS: C
Do you live in NYC?
Is your home starting to look a bit messy and dirty?
Have it professionally cleaned by my company!
Check us out or refer us to someone you may know that may need our services.
nationalpremiercleaning.com
If you have any test reviews, homeworks, guides, anything school related that you think can be posted on this website, reach out to me at makingschooleasier@gmail.com
Do you live in NYC?
Is your home starting to look a bit messy and dirty?
Have it professionally cleaned by my company!
Check us out or refer us to someone you may know that may need our services.
nationalpremiercleaning.com
If you have any test reviews, homeworks, guides, anything school related that you think can be posted on this website, reach out to me at makingschooleasier@gmail.com