Вы находитесь на странице: 1из 7

1.

Setting a system restore point should be done


Prior to installing new hardware or soItware

2. What enables your computer to connect with other computers?
Network interIace card

3. Which holds the instructions the computer needs to start up?
ROM

4. Ergonomics is important only with desktop computers, not mobile devices.
False

5. Some mice include wireless USB receivers that contain Ilash memory to store your Iiles
True

6. The minimum set oI recommended standards Ior a program is known as the
System requirements

7. SoItware that is Ireely distributed but comes with conditions is
Shareware

8. Which oI the Iollowing is true about open source soItware?
The program can be changed and Ireely distributed

9. What is another name Ior SoItware as a Service (SaaS)?
Web-based application

10.To remove a program you no longer want, it`s better to delete it than uninstall it
False

11.Match the Iollowing terms to their deIinitions
a. Macro-automated sequence oI commands in productivity soItware
b. 09a-prerelease version oI commercial soItware
c. $:90-package containing multiple commercial soItware products
d. r00ar0-commercial soItware available at no charge
e. $ar0ar0-commercial soItware available Ior use Ior a limited or trial period oI time

12.The language consists oI just two digits: 0 and 1
Binary

13.Computers process data into inIormation by working exclusively with
Numbers

14. soItware is the set oI programs that enables the computer`s hardware devices and application
soItware to work together
System


15. computers are specially designed computer chips that reside inside other devices such as your car
or the electronic thermostat in your home
Embedded

16.Devices such as monitors and printers that are connected to the computer are called
Peripheral devices

17.Inkjet printers and laser printers are examples oI printers
Nonimpact

18.Restarting a computer when it is already powered on is called
A warm boot

19.The hard disk drive is a storage device, meaning that it stores data permanently
Nonvolatile

20.A(n) is where a peripheral device can attach to a computer so that data can be exchanged
between it and the operating system
Port

21.The S-video and the ports on a computer Iacilitate connecting the computer to multimedia
devices such as TVs and DVD players
DVI

22.plug into slots on the motherboard and provide additional Iunctionality Ior your computer
Expansion cards

23. is a Iorm oI permanent memory that holds all the instructions the computer needs to start up
ROM

24.RAM is considered volatile storage, which means it is
Temporary

25. is the applied science concerned with designing and arranging things that people use so that the
people and things interact most eIIiciently and saIely
Ergonomics

26.Which is true about plug-ins?
Plug-ins can present security risks

27.Which is NOT part oI a search engine?
Subject directory

28.Each time you connect to the Internet, your computer is assigned the same IP address
False

29.Match the Iollowing terms to their meaning
a. !0-tiny dot that creates an image on the computer monitor
b. 0r9-unit oI measure Ior processor speed
c. #08o:9on-the clearness or sharpness oI an image
d. !52-measurement oI printing speed
e. 5-measurement oI printer resolution

30.ocated on the Start menu, the primary purpose oI is to provide access to all the soItware
available on your computer
All programs

31.Which oI the Iollowing statements about the Windows Instant Search Ieature is FASE?
The Search Ieature is located by accessing the Start menu and clicking the Accessories Iolder

32.The is the top level oI a computer`s hard drive Iilling structure
C: drive

33.Select the choice that lists the terms in order Irom smallest to largest
Byte, kilobyte, megabyte, gigabyte

34.Data that has been organized or presented in a meaningIul Iashion is called
InIormation

35.SoItware reIers to a set oI instructions that tells the computer what to do. These instruction sets are
called
Programs

36.Predesigned Iorms that provide the basic structure Ior a particular kind oI document are known as
Templates

37.Which Iile Iormat enables users to share, view and print any Iile as long as they have the appropriate
program installed?
PDF

38.A(n) soItware installation allows you to decide which Ieatures you want to install on the hard
drive
Custom

39.When available, the best way to remove an unwanted soItware application is to
Use the application`s uninstall program

40.Match the Iollowing terms to their meanings:
a. :890r8-smallest segments within disk sectors
b. %rack8-concentric circles on the hard drive
c. $0c9or8-pie-shaped wedges on the hard drive
d. !a990r8-round, thin plates oI metal that make up a hard drive

41.Match the Iollowing terms to their meanings:
a. %a8k 2anag0r-displays perIormance measures Ior processes
b. $8902 r089or0-brings system back to a previously stable state
c. 8k c0an:5-removes unnecessary Iiles Irom the hard drive
d. 8k d01rag20n90r-regroups related pieces oI Iiles on the hard disk
e. rror c0ckng-checks the hard drive Ior damaged Iiles

42.Which oI the Iollowing is a program that appears to be something useIul or desirable but does something
malicious in the background?
A Trojan horse

43. Iloods a computer with requests until it shuts down and reIuses to answer any requests Ior
inIormation
A DDoS attack

44. is an unwanted piggyback program that usually downloads with soItware you are installing Irom
the Internet
Spyware

45.Spyware programs that monitor keystrokes with the intent oI stealing passwords, login IDs or credit card
inIormation are reIerred to as
Keystroke loggers

46.A(n) virus runs a program that searches Ior common data Iiles, compresses them and makes them
unusable
Encryption

47.Social is any technique that uses social skills to generate human interaction that entices
individual to reveal sensitive inIormation
Engineering

48.Which oI the Iollowing operating systems is used primarily with mainIrames as a network operating
system?
UNIX

49.MicrosoIt Windows and Mac OS use a interIace
Graphical user

50.The contains all oI the diIIerent conIigurations used by the OS and by other applications
Registry

51.BeIore upgrading your OS, you should back up your
Data Iiles

52.The OS allows you to organize the contents oI your computer in a hierarchical structure oI
Directories

53.The location oI a Iile is speciIied by its
File path

54.C:\Documents\Spring2012\CIS101\TermPaper\ComputerTechnology is an example oI a
File path

55.The process oI replacing repeated patterns oI letters in a Iile with a shorter placeholder is called
File compression

56.You can use the Windows to check on a nonresponsive program
Task Manager

57.Which oI the Iollowing ways oI connecting a device to your computer does NOT need a cable?
Bluetooth

58.Which statement about USB ports is TRUE?
One port can connect diIIerent types oI devices

59.Match the Iollowing views to their descriptions:
a. 89 v0-view the maximum number oI Iolders or Iiles at one time
b. $2a con8 v0-displays additional inIormation in ScreenTips when pointed to
c. %08 v0-displays icons with Iile name, application and Iile size
d. 09a8 v0-displays in list Iorm with additional inIormation displayed in columns

60.The concept oI the Internet developed Irom
The Cold War crisis

61.Web 2.0 describes
A trend oI new Web applications that combine the Iunctionality oI multiple applications

62.RSS stands Ior
Really Simple Syndiction

63.Webcasts diIIer Irom podcasts in that webcasts
Are not updated automatically

64.Adobe Reader, Flash Player and Quicktime player are all examples oI special soItware programs
called
Plug-ins

65.E-commerce that involved business buying and selling goods and services to other businesses is
called
B2B

66.The 's in https stands Ior
Secure socket layer

67.The text version oI a Web site`s Internet address is called the
UniIorm Resource ocator (UR)

68.HTTP is the abbreviation Ior
Hypertext transIer protocol

69.In the UR http://www.prenhall.com, the portion labeled http is the
Protocol

70.In the UR http://www.prenhall.com, the portion labeled .com is the
Top-level domain

71.Search engines have which three parts?
A spider, an indexer, and search engine soItware

72.The large scale networking (SN) project is
A U.S government Internet research project

73.The Internet and the World Wide Web are the same thing
False

74.The Internet protocol used to upload and download Iiles is HTTP
False

75.A subject directory is a set oI programs that searches the Web Ior speciIic keywords you wish to query
and returns to a list oI Web sites on which these keywords are Iound.
False

76.A(n) organizes the data in search engine programs into a large database
Indexer

77.A(n) actually searches other search engines rather than individual Web sites
Metasearch engine

78.A is a structured outline oI Web sites organized by topics and subtopics
Subject directory

79.The individual words you search Ior when using a search engine are reIerred to as
Keywords

80.A(n) is the part oI the search engine responsible Ior collecting data on the Web
Spider

81.Photocopiers do not present any vulnerability Ior potential hackers
False

82.VCU oIIers students server space Ior personal websites at ramsites.net
True

83.What is the Iree antivirus soItware all VCU students can use?
Sophos

84.Even a properly installed surge protector may Iail to protect a computer Irom all power surges
True

85.Antivirus soItware segregates inIected Iiles to prevent Iurther spread in a process known as
Quarantine

86.Match the Iollowing terms to their meanings:
a. :08nar1ng-exploiting a Ilaw in the Bluetooth access soItware with malicious intent
b. !r0909ng-creating a scenario that sounds legitimate enough that someone will trust you
c. ook0-a text Iile Ior storing personal preIerences pertaining to Web sites
d. o9n09-programs that run on a large number oI zombie computers
e. ogca 5or9-virtual communication gateway Ior a speciIic service, such as HTTP or FTP

87.Match the Iollowing terms to their deIinitions:
a. $cr59 kdd0-a teenage hacker who reuses hacking tools written by someone else
b. ack-a9 ack0r-an unethical hacker
c. !8ng-sending an e-mail containing Ialse inIormation to obtain personal inIormation
d. $oca 0ngn00rng-techniques used to manipulate people into perIorming actions or divulging
conIidential inIormation
e. 90-a9 ack0r-an 'ethical hacker

88.Match the Iollowing terms to their deIinitions:
a. !ack09 190rng-method Ior selectively allowing certain requests to access ports
b. ! addr088-a computer`s identity on the Internet
c. r0a-hardware or soItware Ior protecting computers Irom hackers
d. 09ork addr088 9ran8a9on-the technique oI assigning hidden internal IP addresses protected
Irom hackers

89.Which is the correct order oI the boot process?
Activate BIOS, conduct POST, load OS into RAM, check settings

90.You can determine the location oI a Iile by its
Path

91.The term that deIines excessive swapping oI Iiles between RAM and virtual memory is:
Thrashing

Вам также может понравиться