Cosc Exam 1

50 Questions  I  By Soccer_chick_4evr
Please take the quiz to rate it.

COSC Exam 1
Chapters 1 and 2

  
Changes are done, please start the quiz.


Question Excerpt

Removing question excerpt is a premium feature

Upgrade and get a lot more done!
1.  Pipelining increases the number of machine cycles completed per second.
A.
B.
2.  The ____ takes instructions from the prefetch unit and translates them into a form that the control unit can understand.
A.
B.
C.
D.
3.  In addition to the four primary computer operations, today’s computers typically also perform ____ functions.
A.
B.
C.
D.
4.  The buses used to connect peripheral (typically input and output) devices to the motherboard are usually referred to as expansion buses.
A.
B.
5.  Case-Based Critical Thinking Questions Case 1-1 Sarah is a very active real estate agent. She is looking to purchase a new computer and software so she can keep track of her client’s accounts, access the Internet from anywhere in the city, and touch-up photos of real estate properties. Sarah has hired a programmer to create a Web page for her business. What type of programming language will the programmer use?
A.
B.
C.
D.
6.  Case-Based Critical Thinking Questions Case 1-1 Sarah is a very active real estate agent. She is looking to purchase a new computer and software so she can keep track of her client’s accounts, access the Internet from anywhere in the city, and touch-up photos of real estate properties. Sarah needs to store digital photographs of houses she is previewing. She needs to be able to copy these to the computer at her office. What type of storage device should she use?
A.
B.
C.
D.
7.  Because of its large size, when audio data is transmitted over the Internet it is often encrypted to shorten the download time.
A.
B.
8.  Memory refers to the amount of long-term storage available to a PC.
A.
B.
9.  Like graphics data, ____—such as a song or the sound of someone speaking—must be in digital form in order to be stored on a storage medium or processed by a PC.
A.
B.
C.
D.
10.  Common input devices include the keyboard and ____.
A.
B.
C.
D.
11.  Notebook computers (also called laptops) are fully functioning computers that open to reveal a screen and keyboard.
A.
B.
12.  Communications hardware includes modems, which are used to connect a computer to the Internet and network projectors, which are used to connect a computer to a computer network.
A.
B.
13. 
The Windows ____ shown in the figure above contains the following objects: Windows, Icons, Menus, Toolbars, Taskbar, Hyperlinks, Sizing buttons, and a Dialog box.
A.
B.
C.
D.
14.  The ____ orders data and instructions from cache or RAM based on the task at hand.
A.
B.
C.
D.
15.  A user inputs data into a computer, and then the computer processes it.
A.
B.
16.  One nanometer (nm) is ____ of a meter.
A.
B.
C.
D.
17.  The key element of the microprocessor is the ____—a device made of semiconductor material that acts like a switch controlling the flow of electrons inside a chip.
A.
B.
C.
D.
18.  Some ____ must be added in pairs for optimal performance.
A.
B.
C.
D.
19.  Computing technologies make it possible to have ____, traditional appliances with some type of built-in computer or communications technology.
A.
B.
C.
D.
20.  The external hardware components are located inside the main box or system unit of the computer.
A.
B.
21.  Ultra-mobile PCs are also called ____.
A.
B.
C.
D.
22.  Integrated circuits incorporate many transistors and electronic circuits on a single tiny silicon chip, allowing ____ to be even smaller and more reliable than earlier computers.
A.
B.
C.
D.
23.  Case-Based Critical Thinking Questions Case 2-2 Jack has a computer at home that he uses to access the Internet, store and edit personal photos, and create and edit documents. Recently, he has come to realize that in order to keep the computer performing at its best, he needs to carry out regular system maintenance on the computer. Jack can use the ____ program to locate and delete temporary files, such as installation files, Web browsing history, and files in the Recycle Bin.
A.
B.
C.
D.
24. 
The accompanying figure shows a notebook computer.
A.
B.
25.  With bitmapped images, the color of each ____ is represented by bits; the more bits used, the better the image quality.
A.
B.
C.
D.
26.  A ____ is a collection of hardware and other devices that are connected together so that users can share hardware, software, and data, as well as electronically communicate with each other.
A.
B.
C.
D.
27.  Each location in memory has an address.
A.
B.
28.  ____ occurs when data is entered into the computer.
A.
B.
C.
D.
29.  The process of representing data in digital form so it can be used by a digital computer is called decimal byte representation.
A.
B.
30.  The system unit is the main case of a computer.
A.
B.
31.  MIDI ports are used to receive wireless transmissions from devices.
A.
B.
32.  Case-Based Critical Thinking Questions Case 2-1 Jess is a musician who has just bought a new computer. Now she has to determine how to connect this computer to the devices that were connected to her old computer. Jess has pictures from her old computer saved on a flash drive. To transfer these to her new computer, she would use a(n) ____ port.
A.
B.
C.
D.
33.  Most recent software programs, including the latest versions of Microsoft Windows, Mac OS, and Microsoft Office, use ASCII.
A.
B.
34.  The control unit takes the instructions fetched by the prefetch unit and translates them into a form that can be understood by the control unit, ALU, and FPU.
A.
B.
35.  Hollerith’s machine was used to process the 1890 U.S. Census data and was able to complete the task in ____, instead of the decade it usually took to process the data by hand.
A.
B.
C.
D.
36.  A ____ is equal to 1,024 bytes.
A.
B.
C.
D.
37.  ____ refers to guidelines for online behavior.
A.
B.
C.
D.
38.  Abbreviations or acronyms, such as BTW for “between the words,” are commonly used to save time in all types of communications today.
A.
B.
39.  Early computers required programs to be written in machine language.
A.
B.
40.  A(n) ____ instruction might look like a meaningless string of 0s and 1s, but it actually represents specific operations and storage locations.
A.
B.
C.
D.
41.  One online security problem is ____, in which someone else uses your identity, typically to purchase goods or services.
A.
B.
C.
D.
42.  Small office networks enable workers to access company records stored on a network server.
A.
B.
43.  Storage devices are hardware used to store data on or access data from storage media, such as CD discs, DVD discs, or flash memory cards.
A.
B.
44.  An e-mail address consists of a(n) username, followed by the @ symbol, followed by the domain name for the computer that will be handling that person’s e-mail (called a mail server).
A.
B.
45. 
The accompanying figure shows a DIMM RAM microprocessor.
A.
B.
46.  The binary numbering system uses only two symbols—the digits 0 and 1—to represent all possible numbers.
A.
B.
47.  The ____ enables up to 127 devices to be connected to a computer through a single port on the computer’s system unit.
A.
B.
C.
D.
48.  Two of the most common types of communications hardware are ____ and network adapters.
A.
B.
C.
D.
49.  Satellite communication (more commonly called s-com) is the process of exchanging electronic messages between computers over a network—usually the Internet.
A.
B.
50.  To begin to use a computer, the user first turns on the power by pressing the power button, and then the computer displays a prompt for the user to decide the next course of action.
A.
B.
Back to top

Removing ad is a premium feature

Upgrade and get a lot more done!
Take Another Quiz
We have sent an email with your new password.