Cosc Exam 1

50 Questions  I  By Soccer_chick_4evr
nar001-1.jpg
Chapters 1 and 2

  
Changes are done, please start the quiz.


Question Excerpt

Removing question excerpt is a premium feature

Upgrade and get a lot more done!
1.  Because of its large size, when audio data is transmitted over the Internet it is often encrypted to shorten the download time.
A.
B.
2.  Most recent software programs, including the latest versions of Microsoft Windows, Mac OS, and Microsoft Office, use ASCII.
A.
B.
3.  Two of the most common types of communications hardware are ____ and network adapters.
A.
B.
C.
D.
4.  Case-Based Critical Thinking Questions Case 1-1 Sarah is a very active real estate agent. She is looking to purchase a new computer and software so she can keep track of her client’s accounts, access the Internet from anywhere in the city, and touch-up photos of real estate properties. Sarah has hired a programmer to create a Web page for her business. What type of programming language will the programmer use?
A.
B.
C.
D.
5.  The ____ takes instructions from the prefetch unit and translates them into a form that the control unit can understand.
A.
B.
C.
D.
6.  Each location in memory has an address.
A.
B.
7.  Common input devices include the keyboard and ____.
A.
B.
C.
D.
8.  The control unit takes the instructions fetched by the prefetch unit and translates them into a form that can be understood by the control unit, ALU, and FPU.
A.
B.
9.  Abbreviations or acronyms, such as BTW for “between the words,” are commonly used to save time in all types of communications today.
A.
B.
10.  The process of representing data in digital form so it can be used by a digital computer is called decimal byte representation.
A.
B.
11.  Notebook computers (also called laptops) are fully functioning computers that open to reveal a screen and keyboard.
A.
B.
12.  Computing technologies make it possible to have ____, traditional appliances with some type of built-in computer or communications technology.
A.
B.
C.
D.
13.  One online security problem is ____, in which someone else uses your identity, typically to purchase goods or services.
A.
B.
C.
D.
14.  ____ occurs when data is entered into the computer.
A.
B.
C.
D.
15.  Early computers required programs to be written in machine language.
A.
B.
16.  A(n) ____ instruction might look like a meaningless string of 0s and 1s, but it actually represents specific operations and storage locations.
A.
B.
C.
D.
17.  A ____ is a collection of hardware and other devices that are connected together so that users can share hardware, software, and data, as well as electronically communicate with each other.
A.
B.
C.
D.
18.  In addition to the four primary computer operations, today’s computers typically also perform ____ functions.
A.
B.
C.
D.
19.  Satellite communication (more commonly called s-com) is the process of exchanging electronic messages between computers over a network—usually the Internet.
A.
B.
20.  The external hardware components are located inside the main box or system unit of the computer.
A.
B.
21.  Like graphics data, ____—such as a song or the sound of someone speaking—must be in digital form in order to be stored on a storage medium or processed by a PC.
A.
B.
C.
D.
22.  The binary numbering system uses only two symbols—the digits 0 and 1—to represent all possible numbers.
A.
B.
23.  MIDI ports are used to receive wireless transmissions from devices.
A.
B.
24.  The ____ enables up to 127 devices to be connected to a computer through a single port on the computer’s system unit.
A.
B.
C.
D.
25.  A user inputs data into a computer, and then the computer processes it.
A.
B.
26.  ____ refers to guidelines for online behavior.
A.
B.
C.
D.
27.  Case-Based Critical Thinking Questions Case 2-1 Jess is a musician who has just bought a new computer. Now she has to determine how to connect this computer to the devices that were connected to her old computer. Jess has pictures from her old computer saved on a flash drive. To transfer these to her new computer, she would use a(n) ____ port.
A.
B.
C.
D.
28.  An e-mail address consists of a(n) username, followed by the @ symbol, followed by the domain name for the computer that will be handling that person’s e-mail (called a mail server).
A.
B.
29.  The system unit is the main case of a computer.
A.
B.
30.  Case-Based Critical Thinking Questions Case 1-1 Sarah is a very active real estate agent. She is looking to purchase a new computer and software so she can keep track of her client’s accounts, access the Internet from anywhere in the city, and touch-up photos of real estate properties. Sarah needs to store digital photographs of houses she is previewing. She needs to be able to copy these to the computer at her office. What type of storage device should she use?
A.
B.
C.
D.
31.  Ultra-mobile PCs are also called ____.
A.
B.
C.
D.
32.  The ____ orders data and instructions from cache or RAM based on the task at hand.
A.
B.
C.
D.
33.  Storage devices are hardware used to store data on or access data from storage media, such as CD discs, DVD discs, or flash memory cards.
A.
B.
34.  Small office networks enable workers to access company records stored on a network server.
A.
B.
35.  nar002-1.jpg The Windows ____ shown in the figure above contains the following objects: Windows, Icons, Menus, Toolbars, Taskbar, Hyperlinks, Sizing buttons, and a Dialog box.
A.
B.
C.
D.
36.  The buses used to connect peripheral (typically input and output) devices to the motherboard are usually referred to as expansion buses.
A.
B.
37.  Integrated circuits incorporate many transistors and electronic circuits on a single tiny silicon chip, allowing ____ to be even smaller and more reliable than earlier computers.
A.
B.
C.
D.
38.  One nanometer (nm) is ____ of a meter.
A.
B.
C.
D.
39.  Case-Based Critical Thinking Questions Case 2-2 Jack has a computer at home that he uses to access the Internet, store and edit personal photos, and create and edit documents. Recently, he has come to realize that in order to keep the computer performing at its best, he needs to carry out regular system maintenance on the computer. Jack can use the ____ program to locate and delete temporary files, such as installation files, Web browsing history, and files in the Recycle Bin.
A.
B.
C.
D.
40.  Hollerith’s machine was used to process the 1890 U.S. Census data and was able to complete the task in ____, instead of the decade it usually took to process the data by hand.
A.
B.
C.
D.
41.  To begin to use a computer, the user first turns on the power by pressing the power button, and then the computer displays a prompt for the user to decide the next course of action.
A.
B.
42.  Communications hardware includes modems, which are used to connect a computer to the Internet and network projectors, which are used to connect a computer to a computer network.
A.
B.
43.  Some ____ must be added in pairs for optimal performance.
A.
B.
C.
D.
44.  A ____ is equal to 1,024 bytes.
A.
B.
C.
D.
45.  With bitmapped images, the color of each ____ is represented by bits; the more bits used, the better the image quality.
A.
B.
C.
D.
46.  The key element of the microprocessor is the ____—a device made of semiconductor material that acts like a switch controlling the flow of electrons inside a chip.
A.
B.
C.
D.
47.  Memory refers to the amount of long-term storage available to a PC.
A.
B.
48.  nar001-1.jpg The accompanying figure shows a DIMM RAM microprocessor.
A.
B.
49.  nar001-1.jpg The accompanying figure shows a notebook computer.
A.
B.
50.  Pipelining increases the number of machine cycles completed per second.
A.
B.
Back to top


to post comments.

Removing ad is a premium feature

Upgrade and get a lot more done!
Take Another Quiz