COSC Exam 1

50 Questions | Attempts: 212
Share

SettingsSettingsSettings
COSC Exam 1 - Quiz

Chapters 1 and 2


Questions and Answers
  • 1. 

    A user inputs data into a computer, and then the computer processes it.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
  • 2. 

    Ultra-mobile PCs are also called ____.

    • A.

      Frame computers

    • B.

      Handheld computers

    • C.

      Mini computers

    • D.

      Range computers

    Correct Answer
    B. Handheld computers
  • 3. 

    Case-Based Critical Thinking Questions Case 1-1 Sarah is a very active real estate agent. She is looking to purchase a new computer and software so she can keep track of her client’s accounts, access the Internet from anywhere in the city, and touch-up photos of real estate properties. Sarah needs to store digital photographs of houses she is previewing. She needs to be able to copy these to the computer at her office. What type of storage device should she use?

    • A.

      Scanner

    • B.

      USB flash drive

    • C.

      Firewire port

    • D.

      Data projector

    Correct Answer
    B. USB flash drive
  • 4. 

    Computing technologies make it possible to have ____, traditional appliances with some type of built-in computer or communications technology.

    • A.

      Home computers

    • B.

      Smart appliances

    • C.

      Design appliances

    • D.

      Smart computers

    Correct Answer
    B. Smart appliances
  • 5. 

    A ____ is a collection of hardware and other devices that are connected together so that users can share hardware, software, and data, as well as electronically communicate with each other.

    • A.

      Computer bank

    • B.

      Data bank

    • C.

      Computer network

    • D.

      Database

    Correct Answer
    C. Computer network
  • 6. 

    Hollerith’s machine was used to process the 1890 U.S. Census data and was able to complete the task in ____, instead of the decade it usually took to process the data by hand.

    • A.

      Three and a half years

    • B.

      Two and a half years

    • C.

      Five and a half years

    • D.

      Four and a half years

    Correct Answer
    B. Two and a half years
  • 7. 

    In addition to the four primary computer operations, today’s computers typically also perform ____ functions.

    • A.

      Communications

    • B.

      Calculations

    • C.

      Sorting

    • D.

      Programming

    Correct Answer
    A. Communications
  • 8. 

    Case-Based Critical Thinking Questions Case 1-1 Sarah is a very active real estate agent. She is looking to purchase a new computer and software so she can keep track of her client’s accounts, access the Internet from anywhere in the city, and touch-up photos of real estate properties. Sarah has hired a programmer to create a Web page for her business. What type of programming language will the programmer use?

    • A.

      Python

    • B.

      XHTML

    • C.

      BASIC

    • D.

      COBAL

    Correct Answer
    B. XHTML
  • 9. 

    The external hardware components are located inside the main box or system unit of the computer.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
  • 10. 

    Small office networks enable workers to access company records stored on a network server.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
  • 11. 

    One online security problem is ____, in which someone else uses your identity, typically to purchase goods or services.

    • A.

      Identity theft

    • B.

      Domain theft

    • C.

      Phishing

    • D.

      Identity duplication

    Correct Answer
    A. Identity theft
  • 12. 

    ____ occurs when data is entered into the computer.

    • A.

      Processing

    • B.

      Output

    • C.

      Storage

    • D.

      Input

    Correct Answer
    D. Input
  • 13. 

    ____ refers to guidelines for online behavior.

    • A.

      Netiquette

    • B.

      Web etiquette

    • C.

      Internet Rules

    • D.

      Net rules

    Correct Answer
    A. Netiquette
  • 14. 

    To begin to use a computer, the user first turns on the power by pressing the power button, and then the computer displays a prompt for the user to decide the next course of action.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
  • 15. 

    The accompanying figure shows a notebook computer.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
  • 16. 

    Abbreviations or acronyms, such as BTW for “between the words,” are commonly used to save time in all types of communications today.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
  • 17. 

    Communications hardware includes modems, which are used to connect a computer to the Internet and network projectors, which are used to connect a computer to a computer network.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
  • 18. 

    Common input devices include the keyboard and ____.

    • A.

      Monitor

    • B.

      Speaker

    • C.

      Printer

    • D.

      Mouse

    Correct Answer
    D. Mouse
  • 19. 

    The Windows ____ shown in the figure above contains the following objects: Windows, Icons, Menus, Toolbars, Taskbar, Hyperlinks, Sizing buttons, and a Dialog box.

    • A.

      Command

    • B.

      Toolbox

    • C.

      Desktop

    • D.

      General menu

    Correct Answer
    C. Desktop
  • 20. 

    Satellite communication (more commonly called s-com) is the process of exchanging electronic messages between computers over a network—usually the Internet.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
  • 21. 

    Storage devices are hardware used to store data on or access data from storage media, such as CD discs, DVD discs, or flash memory cards.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
  • 22. 

    Notebook computers (also called laptops) are fully functioning computers that open to reveal a screen and keyboard.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
  • 23. 

    Two of the most common types of communications hardware are ____ and network adapters.

    • A.

      Slide rules

    • B.

      Ports

    • C.

      Monitors

    • D.

      Modems

    Correct Answer
    D. Modems
  • 24. 

    An e-mail address consists of a(n) username, followed by the @ symbol, followed by the domain name for the computer that will be handling that person’s e-mail (called a mail server).

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
  • 25. 

    Integrated circuits incorporate many transistors and electronic circuits on a single tiny silicon chip, allowing ____ to be even smaller and more reliable than earlier computers.

    • A.

      Second-generation computers

    • B.

      Third-generation computers

    • C.

      Fourth-generation computers

    • D.

      Fifth-generation computers

    Correct Answer
    B. Third-generation computers
  • 26. 

    Most recent software programs, including the latest versions of Microsoft Windows, Mac OS, and Microsoft Office, use ASCII.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
  • 27. 

    Some ____ must be added in pairs for optimal performance.

    • A.

      USB ports

    • B.

      Memory modules

    • C.

      Hard drives

    • D.

      Interfaces

    Correct Answer
    B. Memory modules
  • 28. 

    Case-Based Critical Thinking Questions Case 2-1 Jess is a musician who has just bought a new computer. Now she has to determine how to connect this computer to the devices that were connected to her old computer. Jess has pictures from her old computer saved on a flash drive. To transfer these to her new computer, she would use a(n) ____ port.

    • A.

      SCSI

    • B.

      Modem

    • C.

      FireWire

    • D.

      USB

    Correct Answer
    D. USB
  • 29. 

    With bitmapped images, the color of each ____ is represented by bits; the more bits used, the better the image quality.

    • A.

      Byte

    • B.

      Map

    • C.

      Vector

    • D.

      Pixel

    Correct Answer
    D. Pixel
  • 30. 

    Each location in memory has an address.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
  • 31. 

    The ____ orders data and instructions from cache or RAM based on the task at hand.

    • A.

      Decode unit

    • B.

      Prefetch unit

    • C.

      ALU

    • D.

      Control unit

    Correct Answer
    B. Prefetch unit
  • 32. 

    Pipelining increases the number of machine cycles completed per second.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
  • 33. 

    The accompanying figure shows a DIMM RAM microprocessor.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
  • 34. 

    The key element of the microprocessor is the ____—a device made of semiconductor material that acts like a switch controlling the flow of electrons inside a chip.

    • A.

      Transistor

    • B.

      Chipbus

    • C.

      S-card

    • D.

      Processor

    Correct Answer
    A. Transistor
  • 35. 

    One nanometer (nm) is ____ of a meter.

    • A.

      One-millionth

    • B.

      One-tenth

    • C.

      One-thousandth

    • D.

      One-billionth

    Correct Answer
    D. One-billionth
  • 36. 

    Early computers required programs to be written in machine language.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
  • 37. 

    A ____ is equal to 1,024 bytes.

    • A.

      Gigabyte (GB)

    • B.

      Terabyte (TB)

    • C.

      Kilobyte (KB)

    • D.

      Megabyte (MB)

    Correct Answer
    C. Kilobyte (KB)
  • 38. 

    Case-Based Critical Thinking Questions Case 2-2 Jack has a computer at home that he uses to access the Internet, store and edit personal photos, and create and edit documents. Recently, he has come to realize that in order to keep the computer performing at its best, he needs to carry out regular system maintenance on the computer. Jack can use the ____ program to locate and delete temporary files, such as installation files, Web browsing history, and files in the Recycle Bin.

    • A.

      Windows Disk Cleanup

    • B.

      Disk Defragmenter

    • C.

      Windows Registry

    • D.

      Temporary Files

    Correct Answer
    A. Windows Disk Cleanup
  • 39. 

    Like graphics data, ____—such as a song or the sound of someone speaking—must be in digital form in order to be stored on a storage medium or processed by a PC.

    • A.

      Giga data

    • B.

      Audio data

    • C.

      Audio programs

    • D.

      Pixel data

    Correct Answer
    B. Audio data
  • 40. 

    MIDI ports are used to receive wireless transmissions from devices.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
  • 41. 

    The ____ takes instructions from the prefetch unit and translates them into a form that the control unit can understand.

    • A.

      Decode unit

    • B.

      Register

    • C.

      ALU

    • D.

      Internal cache

    Correct Answer
    A. Decode unit
  • 42. 

    The control unit takes the instructions fetched by the prefetch unit and translates them into a form that can be understood by the control unit, ALU, and FPU.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
  • 43. 

    A(n) ____ instruction might look like a meaningless string of 0s and 1s, but it actually represents specific operations and storage locations.

    • A.

      COBOL language

    • B.

      Machine language

    • C.

      ASCII

    • D.

      Programming language

    Correct Answer
    B. Machine language
  • 44. 

    The process of representing data in digital form so it can be used by a digital computer is called decimal byte representation.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
  • 45. 

    Because of its large size, when audio data is transmitted over the Internet it is often encrypted to shorten the download time.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False
  • 46. 

    The ____ enables up to 127 devices to be connected to a computer through a single port on the computer’s system unit.

    • A.

      HyperTransport bus

    • B.

      AGP (Accelerated Graphics Port) bus

    • C.

      USB standard

    • D.

      PCI Express Bus

    Correct Answer
    C. USB standard
  • 47. 

    The binary numbering system uses only two symbols—the digits 0 and 1—to represent all possible numbers.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
  • 48. 

    The system unit is the main case of a computer.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
  • 49. 

    The buses used to connect peripheral (typically input and output) devices to the motherboard are usually referred to as expansion buses.

    • A.

      True

    • B.

      False

    Correct Answer
    A. True
  • 50. 

    Memory refers to the amount of long-term storage available to a PC.

    • A.

      True

    • B.

      False

    Correct Answer
    B. False

Quiz Review Timeline +

Our quizzes are rigorously reviewed, monitored and continuously updated by our expert board to maintain accuracy, relevance, and timeliness.

  • Current Version
  • Dec 23, 2016
    Quiz Edited by
    ProProfs Editorial Team
  • Oct 04, 2012
    Quiz Created by
    Soccer_chick_4ev
Back to Top Back to top
Advertisement
×

Wait!
Here's an interesting quiz for you.

We have other quizzes matching your interest.