ITEC1001 Exam preparation Chapter1 to 9


Which is NOT a current use of computers in the military?
Coordinating communications across wired and wireless networks
Navigating unmanned aerial vehicles remotely
Description: Correct Answer
Using RFID tags to avert potential crises like E. coli epidemics
Studying for the standardized exam for enlisting

2)
Artists interface with technology often, but cannot yet
use computers to generate images that respond to the environment.
Description: Correct Answer
use software to suggest plot endings.
use software to create and enhance virtual performances.
use computers to create a virtual storefront.



3)
People who do not read emotion easily in others hope for new progress in the field of

patient simulators.
forensic science.
Description: Correct Answer
affective computing.
nanotechnology.

4)
A necessary ingredient for a digital home is a
radio tuner.
smartboard.
videocassette recorder.
Description: Correct Answer
network.


5)
Automotive technology requires an understanding of computers to
control computerized pneumatic tools.
properly bill customers.
Description: Correct Answer
run sensors and CPU diagnostics for a vehicle’s many computerized subsystems.
keep carburetor settings at optimal positions.

6)
A device that tracks movement is:
a PSS.
Description: Correct Answer
an RFID tag.
an MP3 device.
a patient simulator.


7)
Computer forensics uses computer systems and technology to
train law enforcement officers to be more effective.
Description: Correct Answer
gather potential legal evidence.
improve fuel injection and engine management systems.
simulate a person’s anatomical system.

8)
IT is the abbreviation for:
Description: Correct Answer
information technology.
information training.
Internet technology.
Internet training.


9)
Which allows retailers to respond to consumer buying patterns?
Description: Correct Answer
Data mining
Bluetooth technology
RFID tags
Smart labels

10)
Robotic surgery devices help physicians because

the doctor does not have to be involved in the surgery.
they monitor and make suggestions to the surgeon during the procedure.
Description: Correct Answer
they make incisions that are more accurate.
if the operation runs into complications, they can suggest creative alternatives.


11)
Researchers believe that microchips may one day restore sight to the blind.
Description: Correct Answer
True
False

12)
Anyone can become computer literate—no matter what their degree of technical expertise.
Description: Correct Answer
True
False


13)
Supercomputers can accurately forecast tornadoes within minutes.
True
Description: Correct Answer
False

14)
Criminal investigators may find evidence on a computer, but that evidence cannot be used in court.
True
Description: Correct Answer
False


15)
Many modern museums offer WiFi networks and multimedia downloads to their patrons to enrich their experience.
Description: Correct Answer
True
False

Chapter 2
1)
What controls the way in which your computer system functions?
Hardware
Description: Correct Answer
Operating system
System software
Application software

2)
Which is the most common type of monitor?
CRT monitor
LED monitor
Description: Correct Answer
LCD monitor
HD monitor


3)
What enables your computer to connect with other computers?
Adapter card
Expansion card
Description: Correct Answer
Network interface card
Video card

4)
Which is NOT another name for a flash drive?
USB
Thumb
Jump
Description: Correct Answer
Zip


5)
To add additional ports to your computer, what do you need?
A flash memory card
Description: Correct Answer
An expansion card
A digital media card reader
An external hard drive

6)
Which holds the instructions the computer needs to start up?

USB
RAM
CPU
Description: Correct Answer
ROM


7)
Which is TRUE about mainframe computers?
They excel at running a few programs quickly.
They execute many programs at a fast pace.
Description: Correct Answer
They support hundreds of users simultaneously.
They perform complex calculations rapidly.

8)
Which is NOT important to consider when buying a printer?
Cost of consumables
Resolution
Paper
Duty cycle


9)
Which is NOT a storage device?
Flash memory card
External hard drive
Description: Correct Answer
Touch screen
DVD

10)
What lets you transfer digital data between your computer and devices such as digital cameras?
Connectivity port
Flash memory card
HDMI port
Optical drive


11)
The CPU clock speed determines the performance of the CPU.
True
Description: Correct Answer
False

12)
The hard drive is an example of a nonvolatile storage device.
Description: Correct Answer
True
False


13)
Ergonomics is important only with desktop computers, not mobile devices.
True
Description: Correct Answer
False

14)
For printing photos, printing at 1,200 dpi is sufficient.
True
False


15)
Some mice include wireless USB receivers that contain flash memory to store your files.
Description: Correct Answer
True
False
Chapter 3
)
Which is NOT true about the Internet?
It is the largest computer network in the world.
It was invented as a way for all computers to communicate.
It was created to establish a secure form of military communications.
Description: Correct Answer
It was developed as a method for linking research documents.

2)
What do you need to read, send, and organize e-mail from any computer?
An e-mail server
An Internet service provider
An e-mail client program
Description: Correct Answer
A Web-based e-mail account


3)
Which is NOT an example of social networking?
Instant messaging
E-mail
Listserv
Blogging

4)
In which way is a blog different from a wiki?
Blogs include images and audio.
Blogs are written by a single author.
Blogs are used to express opinions.
Blogs are arranged as a listing of entries.


5)
Which is true about plug-ins?
Plugs-ins rarely require updating.
Plug-ins track the Web sites you’ve visited.
Plug-ins can present security risks.
Plug-ins are necessary for viewing most Web graphics.

6)
What feature is a list of pages you’ve visited within a Web site?
Favorites
History
Breadcrumb trail
Bookmarks


7)
Which is NOT part of a search engine?
Indexer program
Spider
Search engine software
Subject directory

8)
When using the Internet for research, you:
should use the most current sources.
can assume that everything you find is accurate and appropriate.
can assume that the links provided on the site are the only additional sources of information.
Description: Correct Answer
should evaluate sites for bias and relevance.


9)
Which connection type provides the fastest data transmission?
Cable
DSL
Description: Correct Answer
Fiber-optic
Satellite

10)
What current program funds the research and development of cutting-edge networking and wireless technologies?
Web 2.0
Internet2
ARPANET
Large scale networking


11)
The information in e-mail is no more private than a postcard.
True
False

12)
Consumers buy books, movie tickets, and games more often online than in retail stores.

Description: Correct Answer
True
False


13)
The VeriSign seal on a Web site guarantees that the Web site is secure.
True
False

14)
Each time you connect to the Internet, your computer is assigned the same IP address.
True
False


15)
Internet connection speeds vary by neighborhood, sometimes exceeding advertised rates.
True
False

Chapter 4
1)
The minimum set of recommended standards for a program is known as the
setup guide.
Description: Correct Answer
system requirements.
operating system.
installation specs.

2)
Software that is freely distributed but comes with conditions is
freeware.
proprietary software.
Description: Correct Answer
shareware.
system software.


3)
What type of software enables you to easily perform calculations and numerical analyses?
Database
Presentation
Description: Correct Answer
Spreadsheet
Word processing

4)
Which is NOT an advantage of using a software suite?
The cost is cheaper than buying programs individually.
The programs provide for better integration.
The programs share common features such as toolbar.
The programs integrate easily with programs from other software suites.


5)
The two primary types of software used with a computer are
e-mail software and word processing software.
Web browser and application software.
system software and word processing software.
Description: Correct Answer
application software and system software.

6)
What kind of software is responsible for back office operations such as billing and inventory?
Description: Correct Answer
Enterprise resource planning
Business accounting
Project management
Personal information


7)
Which of the following is true about open source software?
The program can be freely distributed as long as the program code is not changed.
Description: Correct Answer
The program can be changed and freely distributed.
The program code is subject to copyright protection.
The program code is confidential.

8)
An example of free image editing software is
iMovie.
Photoshop Elements.
Illustrator.
Description: Correct Answer
Picasa.


9)
Which program incorporates a Wiki system and is good for collaboration?
Description: Correct Answer
OneNote
EverNote
iWork
Word

10)
What is another name for Software as a Service (SaaS)?
Software suite
Description: Correct Answer
Web-based application
Apps
ERP software


11)
A macro is a small program that groups a series of commands so that they run as a single command.
Description: Correct Answer
True
False

12)
When you need help with software, you should use the program’s help features or manufacturer FAQs, not online help like podcasts or YouTube videos.
True
Description: Correct Answer
False


13)
System software includes the operating system and utility programs.
Description: Correct Answer
True
False

14)
An integrated software application is a group of programs bundled as a package.
True
Description: Correct Answer
False


15)
To remove a program you no longer want, it’s better to delete it than uninstall it.
True
Description: Correct Answer
False


Chapter 5
1) Which is not an example of a smartphone operating system?   
  Android     
  Snow Leopard     
  Symbian     
  webOS     

2) Which OS does not have a user interface that incorporates point-and-click technology?     
  Linux     
 Windows 7     
 MS-DOS     
 Mac OS X     

3) Which is the correct order of the boot process?   
 Check settings, load OS into RAM, activate BIOS, conduct POST     
 Conduct POST, load OS into RAM, activate BIOS, check settings     
 Activate BIOS, conduct POST, load OS into RAM, check settings     
 Load OS into RAM, check settings, conduct POST, activate BIOS     

4) You can determine the location of a file by its    
 name.     
 extension.     
 path.     
 type.     

5) Which is not a function of the operating system?   
 Providing a means for the user to interact with the computer     
 Carefully shutting the system down when RAM limits have been reached     
 Facilitating installation of peripheral devices with the inclusion of drivers     
 Enabling the processor to handle multiple operations, seemingly at the same time     

6) The term that defines excessive swapping of files between RAM and virtual memory is:   
multitasking.     
thrashing.     
paging.     
caching.     

7) Which term describes the pictures that represent an object such as a software application or a folder?   
Widget     
Gadget     
Icon     
Taskbar     

8) Which statement about using APIs is not true?   
APIs allow application software to interact with the OS.     
APIs make it easier for developers to respond to OS changes.     
APIs prevent redundancies in software code.     
APIs make it possible to close non-responding software and restart the computer.     

9) Which utility eliminates the inefficiencies of the computer hard drive?   
File Compression     
Disk Cleanup     
Disk Defragmenter     
System Restore     

10) Which utility is not a system tools utility?   
System Restore     
Windows Explorer     
Disk Defragmenter     
File Compression     

11) Only personal computers need some form of operating system software.   
True   
False   

12) Symbian OS is a common OS for netbooks.   
True   
False   

13) The type of processor helps to determine which OS a computer uses.   
True   
False   

14) Paging is the process of optimizing RAM storage by borrowing hard drive space.   
True   
False   

15) Windows 7 includes a compatibility feature that allows you to run software that is not compatible with Windows 7.   
True   
False   

Chapter 7

1) All of the following are advantages of installing a home network except sharing
 an Internet connection.     
 files.     
 MAC addresses.     
 peripherals.     
2) Which of the following is not a reason client/server networks are generally not installed in homes?   
 Client/server networks can’t handle streaming media, which is often required in home networks.     
 Peer-to-peer networks are less expensive to install than client/server networks.     
 Client/server networks are more difficult to install than peer-to-peer networks.     
 Client/server networks provide more security than is needed for home networks.     

3) Which of the following is not required on some simple networks?   
 Network navigation devices     
 Networking software     
 Transmission media     
 Network adapters     

4) Which network navigation device is required to move data between two networks?   
Switch     
 Router     
 Hub     
 Repeater     

5) If you need very fast throughput in a home network, you should use   
a wired Gigabit Ethernet connection.     
an 802.11n wireless Ethernet connection.     
a client/server network.     
a wired power-line network.     

6) Wireless range expanders:
turn devices with wired connections into wireless nodes.     
are not needed with 802.11n networks.     
are used to improve connectivity in remote areas of a home.     
are never used for home networks.     

7) Two or more networks connected over long geographic distances to form a single network is usually referred to as a:   
LAN.     
WAN.     
HAN.     
MAN.     

8) The throughput of a network:   
is usually higher on wireless networks.     
is the same in all areas covered by a wireless network.     
can vary depending upon the transmission media used.     
is the same on all Ethernet networks.     

9) The “name” of a particular wireless network is known as the   
HAN-ID.     
SSID.     
NetID.     
Wifi-ID.     

10) The device used to move data around a single network is called a:   
switch.     
repeater.     
router.     
gateway.     

11) Actual data throughput is usually higher on wireless networks.   
True   
False   
12) Ethernet networks require each node on the network to be equipped with its own network adapter.   
True   
False   

13) WEP and WPA are popular wired network security protocols.   
True   
False   

14) MANs cover a larger geographic area than HANs.   
True   
False   

15) 802.11n wireless networks provide faster throughput than wired gigabit Ethernet networks.   
True   
False   

Chapter 9

1) Computer viruses that hide in memory to escape detection are known as     
  logic bombs.     
 Trojan horses.     
 multipartite viruses.     
 stealth viruses.     

2) Viruses that feature a series of commands hidden on a web site are called   
 time bombs.     
 script viruses.     
 boot-sector viruses.     
 polymorphic viruses.     

3) Antivirus software segregates infected files to prevent further spread in a process known as     
  disinfection.     
 inoculation.     
 eradication.     
 quarantine.     

4) Hackers without sophisticated computer knowledge who use tools developed by others to break into systems are called   
 white-hat hackers.     
 script kiddies.     
 black-hat hackers.     
 amateur hackers.     

5) Which are programs that pretend to be a useful program but do something malicious on your computer?   
 Trojan horses     
 Spyware     
 Zombies     
 Backdoor programs     

6) Large groups of software programs that run automatically on many computers at the same time often to perpetrate DoS attacks are known as   
 Trojan horses.     
 botnets.     
 backdoor programs.     
 zombie webs.     

7) When hackers use zombie computers to launch an attack on another computer or Web site, the attack is known as a   
 distributed denial-of-service attack.     
 phishing attack.     
 zombie infestation.     
 pharming plague.     

8) Which are the virtual pathways into a computer that firewalls close?   
 Packet gateways     
 Logical ports     
 Data paths     
 IP addresses     

9) Programs that download to your computer, usually without your knowledge, for the purpose of collecting information, is a type of cyber annoyance known as:   
 adware.     
 spyware.     
 bloatware.     
 pharmware.     

10) A backup of the entire contents of your hard drive is known as a(n):   
 incremental backup.     
 differential backup.     
 normal backup.     
 system backup.     

11) An incremental backup backs up all files on your computer in a specified location.   
 True   
 False   

12) Even a properly installed surge protector may fail to protect a computer from all power surges.   
 True   
 False   

13) Phishing is a form of social engineering.   
 True   
 False   

14) When malicious code is planted on your computer that interferes with your browser’s ability to find Web addresses, this is known as phishing.   
True   
False   

15) If a password includes numbers, symbols, and upper- and lowercase letters, it is considered to be a strong password.   
True   
False



1 comment:

  1. Hello there! This is the fourth time visiting now and I personally just wanted to say I truley enjoy
    reading your site. I've decided to bookmark it at stumbleupon.com with the title: Blogger: College Brighten and your Website address: http://www.blogger.com/comment.g?blogID=2003111782156970541&postID=628568734787432547. I hope this is okay with you, I'm making an attempt
    to give your fantastic blog a bit more publicity. Be back soon.



    My homepage; linked web site

    ReplyDelete