Sei sulla pagina 1di 5

Computer QUIZ

1. All of the following are examples of real security and 8. Surgeons can perform delicate operations by
privacy risks EXCEPT: manipulating devices through computers instead of
A. hackers. manually. This technology is known as:
B. spam. A. robotics.
C. viruses. B. computer forensics.
D. identity theft. C. simulation.
Answer: B D. forecasting.
2. A process known as ____________ is used by large Answer: A
retailers to study trends.
A. data mining 9. Technology no longer protected by copyright,
B. data selection available to everyone, is considered to be:
C. POS A. proprietary.
D. data conversion B. open.
Answer: A C. experimental.
D. in the public domain.
3. ____________terminals (formerly known as cash Answer: A
registers) are often connected to complex inventory and
sales computer systems. 10. ____________ is the study of molecules and
A. Data structures whose size ranges from 1 to 100 nanometers.
B. Point-of-sale (POS) A. Nanoscience
C. Sales B. Microelectrodes
D. Query C. Computer forensics
Answer: B D. Artificial intelligence
Answer: A
4. A(n) ____________ system is a small, wireless 11. ____________ is the science that attempts to
handheld computer that scans an items tag and pulls produce machines that display the same type of
up the current price (and any special offers) as you shop. intelligence that humans do.
A. PSS A. Nanoscience
B. POS B. Nanotechnology
C. inventory C. Simulation
D. data mining D. Artificial intelligence (AI)
Answer: A Answer: D

5. The ability to recover and read deleted or damaged 12. ____________ is data that has been organized or
files from a criminals computer is an example of a presented in a meaningful fashion.
law enforcement specialty called: A. A process
A. robotics. B. Software
B. simulation. C. Storage
C. computer forensics. D. Information
D. animation. Answer: D
Answer: C
13. The name for the way that computers manipulate
6. Which of the following is NOT one of the four major data into information is called:
data processing functions of a computer? A. programming.
A. gathering data B. processing.
B. processing data into information C. storing.
C. analyzing the data or information D. organizing.
D. storing the data or information Answer: B
Answer: C
14. Computers gather data, which means that they allow
7. ____________ tags, when placed on an animal, can be users to ____________ data.
used to record and track in a database all of the A. present
animals movements. B. input
A. POS C. output
B. RFID D. store
C. PPS Answer: B
D. GPS
Answer: B 15. After a picture has been taken with a digital camera
and processed appropriately, the actual print of the D. terabyte
picture is considered: Answer: C
A. data.
B. output. 23. ____________ is any part of the computer that you
C. input. can physically touch.
D. the process. A. Hardware
Answer: B B. A device
C. A peripheral
16. Computers use the ____________ language to D. An application
process data. Answer: A
A. processing
B. kilobyte
C. binary 24. The components that process data are located in the:
D. representational A. input devices.
Answer: C B. output devices.
C. system unit.
17. Computers process data into information by working D. storage component.
exclusively with: Answer: C
A. multimedia.
B. words. 25. All of the following are examples of input devices
C. characters. EXCEPT a:
D. numbers. A. scanner.
Answer: D B. mouse.
C. keyboard.
18. In the binary language each letter of the alphabet, D. printer.
each number and each special character is made up of a Answer: D
unique combination of:
A. eight bytes. 26. Which of the following is an example of an input
B. eight kilobytes. device?
C. eight characters. A. scanner
D. eight bits. B. speaker
Answer: D C. CD
D. printer
19. The term bit is short for: Answer: A
A. megabyte.
B. binary language. 27. All of the following are examples of storage devices
C. binary digit. EXCEPT:
D. binary number. A. hard disk drives.
Answer: C B. printers.
C. floppy disk drives.
D. CD drives.
20. A string of eight 0s and 1s is called a: Answer: B
A. megabyte.
B. byte. 28. The ____________, also called the brains of
C. kilobyte. the computer, is responsible for processing data.
D. gigabyte. A. motherboard
Answer: B B. memory
C. RAM
21. A ____________ is approximately one billion bytes. D. central processing unit (CPU)
A. kilobyte Answer: D
B. bit
C. gigabyte 29. The CPU and memory are located on the:
D. megabyte A. expansion board.
Answer: C B. motherboard.
C. storage device.
22. A ____________ is approximately a million bytes. D. output device.
A. gigabyte Answer: B
B. kilobyte
C. megabyte 30. Word processing, spreadsheet, and photo-editing are
examples of: C. Laptops
A. application software. D. Mainframes
B. system software. Answer: B
C. operating system software.
D. platform software. 38. DSL is an example of a(n) ____________
Answer: A connection.
A. network
31. ____________ is a set of computer programs used B. wireless
on a computer to help perform tasks. C. slow
A. An instruction D. broadband
B. Software Answer: D
C. Memory 39. The difference between people with access to
D. A processor computers and the Internet and those without this access
Answer: B is known as the:
A. digital divide.
32. System software is the set of programs that enables B. Internet divide.
your computers hardware devices and ____________ C. Web divide.
software to work together. D. broadband divide.
A. management Answer: A
B. processing 40. ____________ is the science revolving around the
C. utility use of nano structures to build devices on an extremely
D. application small scale.
Answer: D A. Nanotechnology
B. Micro-technology
33. The PC (personal computer) and the Apple C. Computer forensics
Macintosh are examples of two different: D. Artificial intelligence
A. platforms. Answer: A
B. applications. 41. Which of the following is the correct order of the
C. programs. four major functions of a computer?
D. storage devices. A. Process Output Input Storage
Answer: A B. Input Output Process Storage
C. Process Storage Input Output
34. Apple Macintoshes (Macs) and PCs use different D. Input Process Output Storage
____________ to process data and different operating Answer: D
systems.
A. languages 42. ____________ bits equal one byte.
B. methods A. Eight
C. CPUs B. Two
D. storage devices C. One thousand
Answer: C D. One million
35. Servers are computers that provide resources to other Answer: A
computers connected to a:
A. network. 43. The binary language consists of ____________
B. mainframe. digit(s).
C. supercomputer. A. 8
D. client. B. 2
Answer: A C. 1,000
D. 1
36. Smaller and less expensive PC-based servers are Answer: B
replacing ____________ in many businesses.
A. supercomputers 44. A byte can hold one ____________ of data.
B. clients A. bit
C. laptops B. binary digit
D. mainframes C. character
Answer: D D. kilobyte
37. ____________ are specially designed computers that Answer: C
perform complex calculations extremely rapidly.
A. Servers
B. Supercomputers
devices.Answer: operating system
45. ____________ controls the way in which the
computer system functions and provides a means by 53. The type of operating system software you use
which users can interact with the computer. depends on your computerss
A. The platform ____________.Answer: platform
B. The operating system
C. Application software 54. ____________software helps you carry out tasks,
D. The motherboard such as typing a document or creating a
Answer: B spreadsheet.Answer: Application

46. The operating system is the most common type of 55. ____________are the fastest and most expensive
____________ software. computers.Answer: Supercomputers
A. communication
B. application 56. A ____________ is approximately 1,000
C. system bytes.Answer: kilobyte
D. word-processing software
Answer: C 57. Input devices are used to provide the steps and
tasks the computer needs to process data, and these
47. ____________ are specially designed computer steps and tasks are called ____________.Answer:
chips that reside inside other devices, such as your car or instructions
your electronic thermostat.
A. Servers 58. A computer gathers data, processes it, outputs the
B. Embedded computers data or information, and ____________ the data or
C. Robotic computers information.Answer: stores
D. Mainframes
Answer: B 59. The binary language consists of two digits:
____________ and ____________.Answer: 0 and 1
48. The steps and tasks needed to process data, such as
responses to questions or clicking an icon, are called: 60. A string of ____________ 0s and 1s is called a
A. instructions. byte.Answer: eight (8)
B. the operating system.
C. application software. 61. The devices you use to enter data into a computer
D. the system unit. system are known as ____________ devices.Answer:
Answer: A input

49. The two broad categories of software are: 62. The devices on a computer system that let you see
A. word processing and spreadsheet. the processed information are known as
B. transaction and application. ____________ devices.Answer: output
C. Windows and Mac OS.
D. system and application. 63. ____________ is the set of computer instructions
Answer: D or programs that enables the hardware to perform
different tasks.Answer: Software
50. The metal or plastic case that holds all the physical
parts of the computer is the: 64. When you connect to the ____________, your
A. system unit. computer is communicating with a server at your
B. CPU. Internet service provider (ISP).Answer: Internet
C. mainframe.
D. platform. 65. ____________ are computers that excel at
Answer: A executing many different computer programs at the
same time.Answer: Mainframes
Fill in the Blanks:
66. ____________is the application of computer
51. Between PCs and Macs, the ____________ is the systems and techniques to gather legal
platform of choice for graphic design and evidence.Answer: Computer forensics
animation.Answer: Mac
67. ____________ is the science that attempts to
52. The ____________ is the program that manages create machines that will emulate the human thought
the hardware of the computer system, including the process.Answer: Artificial intelligence (AI)
CPU, memory, storage devices, and input/output
68. Macintosh computers use the Macintosh work.Answer: False
operating system (Mac OS), whereas PCs generally
run ____________ as an operating system.Answer: 83. Clicking on an icon with the mouse is a form of
Microsoft Windows giving an instruction to the computer.Answer: True

69. A process known as ____________ tracks trends 84. Output devices store instructions or data that the
and allows retailers to respond to consumer buying CPU processes.Answer: False (memory)
patterns.Answer: data mining
85. The CPU and memory are located on a special
70. Hard disk drives and CD drives are examples of circuit board in the system unit called the
____________ devices.Answer: storage motherboard.Answer: True

71. You would use ____________ software to create 86. Nanostructures represent the smallest human-
spreadsheets, type documents, and edit made structures that can be built.Answer: True
photos.Answer: application
87. The main difference between a supercomputer
72. ____________ are computers that support and a mainframe is that supercomputers are
hundreds or thousands of users designed to execute a few programs as quickly as
simultaneously.Answer: Mainframes possible,whereas mainframes are designed to handle
many programs running at the same time (but at a
73. ____________ is the term given to the act of slower pace).
stealing someones identity and ruining their Answer: True
credit rating.Answer: Identity theft
88. Being computer fluent means that you should be
74. Surgeons are using ____________ to guide robots able to build a computer yourself.Answer: False
to perform delicate surgery.Answer: computers
89. Embedded computers are self-contained
75. Patient ____________ are life-sized mannequins computer devices that have their own programming
that have a pulse and a heartbeat and respond to and do not receive input.Answer: True
procedures just like humans.Answer: simulators
90. A Web browser is a special device that is installed
True and False in your computer that allows it to communicate with
other devices on a network.Answer: False (network
76. Currently, the performance of tasks by robots is adapter)
based on pre programmed algorithms.Answer: True
91. With a wireless network, it is easier to relocate
77. Data can be a number, a word, a picture, or a devices.Answer: True
sound.Answer: True
92. The most common type of memory that the
78. Strictly defined, a computer is a data processing computer uses to process data is ROM.Answer: False
device.Answer: True (RAM)

79. The discrepancy between the haves and


have-nots with regard to computer technology
is commonly referred to as the digital society.Answer:
False (digital divide)

80. One of the benefits of becoming computer fluent


is being a savvy computer user and consumer and
knowing how to avoid viruses, the programs that
pose threats to computer security.
Answer: True

81. Trend-spotting programs, developed for business,


have been used to predict criminal activity.Answer:
True

82. Employers do not have the right to monitor e-


mail and network traffic on employee systems used at

Potrebbero piacerti anche