Sei sulla pagina 1di 5

1.

The device consisting of electronic circuitry that executes instructions to process data is called ____. a. CPU b. primary storage c. secondary storage d. RAM e. None of these A component that expands a computers input, storage, or output capabilities is referred to as a(n) ____ device. a. input b. output c. storage d. peripheral e. None of these Also called laptop computers, ____ are lightweight, portable computers with built-in monitors, keyboards, hard disk drives, batteries, and AC adapters. a. desktop computers b. microcomputers c. notebook computers d. workstations e. None of these

2.

3.

4. An input device that converts letters, numbers, and other characters into electrical signals readable by a processor is called a ____. a. keyboard b. mouse c. printer d. speaker e. None of these 5. A central computer that holds collections of data and programs for connecting PCs, workstations, and other devices is called a ____. a. client b. master c. slave d. server e. None of these 6. Tower PCs are ____ whose case or main housing sits on a desk, with the keyboard in front and the monitor on top. a. minicomputers b. nanocomputers c. microcomputers d. supercomputers e. None of these 7. The term that refers to the use of a computer or some other information device, connected through a network, to access information and services is ____. a. telecommuting b. chatting c. online d. email e. None of these 8. Users access mainframes by means of a ____, which has a display screen and a keyboard. a. client b. server c. terminal d. local area network e. None of these 9. What interconnected system of computers all over the world stores information in a multimedia form? a. internet b. World Wide Web c. wide area network d. local area network e. None of these 10. The technology that merges computing with high-speed communications links carrying data, sound, and video is ____ technology. a. information b. communications c. telecommunications d. internet

e. None of these 11 . One character of data is stored as one ____. a. byte b. bit c. kilobyte d. gigabyte e. None of these 12.Tiny, specialized microprocessors installed in smart appliances and automobiles are called ____. a. microcomputers b. microcontrollers c. servers d. workstations e. None of these 13. A system that connects, usually by special cables, a group of desktop PCs and other devices such as printers in an office or a building is called ____. a. local area network b. client c. internet d. World Wide Web e. None of these 14. The next generation of smaller, faster computers that will fit into a single human cell are known as ____. a. nanocomputers b. workstations c. supercomputers d. teleputers e. None of these 15. The process of copying software programs from secondary storage media to the systems hard disk is called ____. a. download b. installation c. upload d. configuration e. None of these 16. Technology that consists of electromagnetic devices and systems for communicating over long distances is known as ____. a. communications technology b. information technology c. internet d. networking e. None of these 17.Which of the following devices allows users to make phone calls as well as browse the World Wide Web? a. teleputers b. cell phones c. smartphones d. modems e. None of these 18. High-capacity computers with hundreds of thousands of processors that can perform more than one trillion calculations per second are called ____. a. desktop computers b. supercomputers c. laptops d. workstations e. None of these 19. Embedded computers are known as ____. a. microcomputers b. microcontrollers c. nanocomputers d. supercomputers e. None of these 20. A communications system connecting two or more computers is called a ____. a. modem b. cable c. telephone line d. network

e. None of these 21. Word enables you to do all of the following _except_: a. create documents b. edit existing documents c. format documents d. learn how to touch type e. create World Wide Web pages e. None of these 22. Which of the following is the term for a toolbar that appears in its own window, complete with a Title bar and Close button? a. Standard b. Formatted c. Docked d. Floating e. None of these 23. Which toolbar provides access to file management and editing commands, in addition to special features? a. Control Toolbox b. Formatting c. Standard d. Frames e. Reviewing 24. Word can work with all of the following types of documents _except_: a. soundtracks b. World Wide Web pages c. reports d. proposals e. cover letters 25. Which of the following is _not_ one of the ways you can create a new document? a. start with a blank document b. use a document template c. use a form letter d. use a wizard e. all of these are ways to create a new document 26. All of the following are examples of real security and privacy risks EXCEPT: A. hackers. B. spam. C. viruses. D. identity theft. 27. A process known as ____________ is used by large retailers to study trends. A. data mining B. data selection C. POS D. data conversion 28. Which of the following is NOT one of the four major data processing functions of a computer? A. gathering data B. processing data into information C. analyzing the data or information D. storing the data or information Ans : C 3. ____________terminals (formerly known as cash registers) are often connected to complex inventory and sales computer systems. A. Data B. Point-of-sale (POS) C. Sales D. Query Ans : B 4. A(n) ____________ system is a small, wireless handheld computer that scans an items tag and pulls up the current price (and any special offers) as you shop. A. PSS B. POS C. inventory D. data mining Ans : A

5. The ability to recover and read deleted or damaged files from a criminals computer is an example of a law enforcement specialty called: A. robotics. B. simulation. C. computer forensics. D. animation. Ans : C 7. ____________ tags, when placed on an animal, can be used to record and track in a database all of the animals movements. A. POS B. RFID C. PPS D. GPS Ans : B 8. Surgeons can perform delicate operations by manipulating devices through computers instead of manually. This technology is known as: A. robotics. B. computer forensics. C. simulation. D. forecasting. Ans : A 9. Technology no longer protected by copyright, available to everyone, is considered to be: A. proprietary. B. open. C. experimental. D. in the public domain. Ans : A 10. ____________ is the study of molecules and structures whose size ranges from 1 to 100 nanometers. A. Nanoscience B. Microelectrodes C. Computer forensics D. Artificial intelligence Ans : A 11. ____________ is the science that attempts to produce machines that display the same type of intelligence that humans do. A. Nanoscience B. Nanotechnology C. Simulation D. Artificial intelligence (AI) Ans : D 12. ____________ is data that has been organized or presented in a meaningful fashion. A. A process B. Software C. Storage D. Information Ans : D 13. The name for the way that computers manipulate data into information is called: A. programming. B. processing. C. storing. D. organizing. Ans : B 14. Computers gather data, which means that they allow users to ____________ data. A. present B. input C. output D. store Ans : B 16. Computers use the ____________ language to process data. A. processing B. kilobyte C. binary D. representational Ans : C 17. Computers process data into information by working exclusively with:

A. multimedia. B. words. C. characters. D. numbers. Ans : D

01. A 11. A 21. D 31. 41. 51. 61. 71. 81. 91.

02. D 12. B 22. D 32. 42. 52. 62. 72. 82. 92.

03. C 13. A 23. C 33. 43. 53. 63. 73. 83. 93.

04. A 14. A 24. A 34. 44. 54. 64. 74. 84. 94.

05. D 15. B 25. C 35. 45. 55. 65. 75. 85. 95.

06. C 16. A 26. B 36. 46. 56. 66. 76. 86. 96.

07. C 17. C 27. A 37. 47. 57. 67. 77. 87. 97.

08. C 18. B 28. 38. 48. 58. 68. 78. 88. 98.

09. B 19. B 29. 39. 49. 59. 69. 79. 89. 99.

10. A 20. D 30. 40. 50. 60. 70. 80. 90. 100.

Potrebbero piacerti anche