Related Topics
Take Another Quiz

Final CIS Spring 2010

100 Questions
Professional Certification Quizzes & Trivia

Final quiz for computer class

Questions and Answers
  • 1. 
    Most computers store data in an ______ format as a series of 1's and 0's.
    • A. 

      Analog

    • B. 

      Digital

    • C. 

      Logical

    • D. 

      Compiler

  • 2. 
    The 1's and 0's that a computer works with are refereed to as ____ digits.
    • A. 

      Binary

    • B. 

      Analog

    • C. 

      Master

    • D. 

      Indexed

  • 3. 
    ____ uses 16 bits and provides codes for 65,000 characters.
    • A. 

      Unicode

    • B. 

      EBCDIC

    • C. 

      ASCII

    • D. 

      Extended ASCII

  • 4. 
    ___ code instructions are a series of 0's and 1's that correspond to a processor's instruction set.
    • A. 

      Machine

    • B. 

      Control

    • C. 

      Unit

    • D. 

      Register

  • 5. 
    ____ breaks a message or file into packets.
    • A. 

      IP( internet protocol)

    • B. 

      TCP(transmission control Protocol)

    • C. 

      FTP (file transfer Protocol)

    • D. 

      Telnet (telecommunication network)

  • 6. 
    The _____ is a global computer network originally developed as a military project, then handed over to the National Science Foundation for research and academic use.
  • 7. 
    Software is divided into two main categories. What are they? _____
  • 8. 
    An _______ is a pocket-sized digital appointment book with a small keyboard or a touch-sensitive screen.
  • 9. 
    MB is the abbreviation for _____
  • 10. 
    A _____ is a device that converts the signals from a computer into signals that can travel over the telephone system.
  • 11. 
    What is an IP address?
  • 12. 
    ___ is usually a prefix that means 1,000.
    • A. 

      Kilo

    • B. 

      Mega

    • C. 

      Exa

    • D. 

      Giga

  • 13. 
    ____ transfers files between local and remote host computers.
    • A. 

      IP(internet Protocol)

    • B. 

      TCP( transmission control protocol)

    • C. 

      FTP(file transfer protocol)

    • D. 

      Telnet( Telecommunication Network)

  • 14. 
    A domain name ends with an extension that indicates it ____.
  • 15. 
    One Gigabyte is approximately _______ byts.
  • 16. 
    Name two components of a computer system _____
  • 17. 
    Name the 4 steps in Information Processing Cycle.
  • 18. 
    Give an example of an IP address (V4) ____
  • 19. 
    URL is an abbreviation for ______
  • 20. 
    Give an example of a URL _____
  • 21. 
    The server that translates domain names to IP addresses called _______.
  • 22. 
    HTML is an abbreviation of _____
  • 23. 
    The inventor of the World Wide Web is ____
  • 24. 
    The very first network was called ____ and it connected ___ computers
  • 25. 
    Convert the number 6 to binary
  • 26. 
    The type of network that convers a large geographical area is known as a ____.
    • A. 

      LAN

    • B. 

      WAN

    • C. 

      GAN

    • D. 

      PAN

  • 27. 
    In a ____ arrangement, network nodes are connected in a closed circle.
    • A. 

      Circle

    • B. 

      Closed

    • C. 

      Ring

    • D. 

      Star

  • 28. 
    A channel is a physical path or a frequency for signal transmissions.
    • A. 

      Logical

    • B. 

      Communications

    • C. 

      Connecting

    • D. 

      Node

  • 29. 
    The technology in which a message is divided into several parcels that can be routed independently ti its destination is called____.
    • A. 

      Packet switching

    • B. 

      Handshaking

    • C. 

      Circuit switching

    • D. 

      Protocol

  • 30. 
    A ___ server is a computer whose primary purpose is to be a repository for files that an be accessed by network workstations.
    • A. 

      File

    • B. 

      Print

    • C. 

      Document

    • D. 

      Backup

  • 31. 
    An encrypted message is referred to as ____.
    • A. 

      Keytext

    • B. 

      Strong text

    • C. 

      Ciphertext

    • D. 

      Plaintext

  • 32. 
    The Web is based on the concept of ___, a collection of documents that can be related by links.
    • A. 

      Hypertext

    • B. 

      Cookies

    • C. 

      Ports

    • D. 

      Tags

  • 33. 
    A ___ is a software program that runs on your computer and helps you access Web pages.
    • A. 

      Explorer

    • B. 

      Browser

    • C. 

      Sever

    • D. 

      Manager

  • 34. 
    ___ provides tools specifically designed to enter and format Web page text, graphics, and links.
    • A. 

      A Web browser

    • B. 

      Web authoring software

    • C. 

      Web creator

    • D. 

      W3C

  • 35. 
    A ___ server handles jobs sent to network printers.
  • 36. 
    The arrangement of devices in a network is referred to as its _____
  • 37. 
    Transmission signals can be disrupted by interference called ____, which has the potential to corrupt data.
  • 38. 
    The term ____ popularly refers to a web site that provides a variety of tools to help you find information.
  • 39. 
    Programs that extend the capability of a browser are called ______.
  • 40. 
    The term B2C means ________.
  • 41. 
    Name two types of graphic formats you find in web pages _________.
  • 42. 
    FTP is an acronym for _____.
  • 43. 
    Name two different types of Physical Communication Media (wires) ______
  • 44. 
    Wireless networking technology that is compatible with Ethernet is called _____.
  • 45. 
    Name two boolean operators used by Search engines_____.
  • 46. 
    NIC is an acronym for __________.
  • 47. 
    GPS is an acronym for ______.
  • 48. 
    An email based scam designed to peruade you to reveal confidential information is _____.
  • 49. 
    One type of network architecture is P2P. What is the other one ______
  • 50. 
    _____ is the largest network.
  • 51. 
    ____ means a billion cycles per second.
    • A. 

      Gigahertz

    • B. 

      Megahertz

    • C. 

      Exahertz

    • D. 

      Nanohertz

  • 52. 
    ____ time is the average time it takes a computer to locate data on the storage medium and read it.
    • A. 

      Identification

    • B. 

      Isolation

    • C. 

      Access

    • D. 

      Find

  • 53. 
    ___ access is the ability of a device to "jump" directly to the requested data.
    • A. 

      Sequential

    • B. 

      Jump

    • C. 

      Random

    • D. 

      Quick

  • 54. 
    Notebook computers use a flat panel ___ screen that is attached to the system unit.
    • A. 

      PDA

    • B. 

      HTML

    • C. 

      LCD

    • D. 

      URL

  • 55. 
    ___ is special high speed memory that allows a microprocessor to access data more rapidly then from memory located elsewhere on the motherboard.
  • 56. 
    ____ is a type of software designed to help several people collaborate on a single project using LAN or Internet connections.
    • A. 

      Groupware

    • B. 

      Suiteware

    • C. 

      Clubware

    • D. 

      Workwave

  • 57. 
    Microsoft Word is a type of _____ market software.
    • A. 

      Development

    • B. 

      Primary

    • C. 

      Horizontal

    • D. 

      Vertical

  • 58. 
    A software ____ is a collection of application software sold as a single package.
    • A. 

      Club

    • B. 

      Group

    • C. 

      Collection

    • D. 

      Suite

  • 59. 
    _____ is not protected by copyright because the copyright has expired, or the author has made the program available without restriction.
    • A. 

      Shareware

    • B. 

      Freeware

    • C. 

      Open source software

    • D. 

      Public domain software

  • 60. 
    RAM is ______, which means that it requires electrical power to hold data.
  • 61. 
    The instruction that your computer performs when it is first turned on are permanently stored in _____.
  • 62. 
    A storage _____ is the disk, CD, Tape, paper, or other substance that contains data.
  • 63. 
    A storage _____ is the mechanical apparatus that records and retrieves data from a storage medium.
  • 64. 
    Cd's and Dvd's are types of ______ storage.
  • 65. 
    A _______ is a type of optical disc that users can write but not erase.
  • 66. 
    ROM is acronym for _______ and its volatile/non volatile.
  • 67. 
    A ________ application is software that is accessed with a Web browsers.
  • 68. 
    The ____ is the component of the processor that performs aritmetic, comparison, and other operations.
  • 69. 
    CPU is an acronym for ____________.
  • 70. 
    Using a technology called _________, a processor can begin executing an instruction before it completes the previous instruction.
  • 71. 
    The four parts of machine cycle are (in order) __________
  • 72. 
    The speed of a computer is measured in ___________
  • 73. 
    The ______ process, prepares disk for use and marks bad sectors as unusable.
  • 74. 
    Name 4 input devices_________
  • 75. 
    Name 2 high level programing languages ________________.
  • 76. 
    ___ is the process of starting or restarting a computer.
    • A. 

      Launching

    • B. 

      Loading

    • C. 

      Booting

    • D. 

      Keying

  • 77. 
    A ___ computer is a computer that continues to operate when one of its components fails, ensuring that no data is lost.
    • A. 

      Failsafe

    • B. 

      Antivirus

    • C. 

      Immune

    • D. 

      Fault-tolerant

  • 78. 
    With ___ memory, the operating system allocates a portion of a storage medium, usually the hard disk, to function as additional RAM.
    • A. 

      Virtual

    • B. 

      Performance

    • C. 

      Deice

    • D. 

      Managed

  • 79. 
    A ____ is a small program that tells the operating system how to communicate with a specific device.
    • A. 

      Driver

    • B. 

      Monitor

    • C. 

      Utility

    • D. 

      OS

  • 80. 
    A disk ____ is a utility that reorganizes the files and unused space on a computer's hard disk so the operating system accesses data more quickly and programs run faster. 
    • A. 

      Manager

    • B. 

      Defragmenter

    • C. 

      Organizer

    • D. 

      OS

  • 81. 
    __ is a program placed on a computer without the users knowledge or consent that secretly collects information about the users, often related to Web browsing habits.
    • A. 

      Spyware

    • B. 

      A Pop-up ad

    • C. 

      Spam

    • D. 

      A Fliter

  • 82. 
    The _____ is the destructive event or prank a malicious- logic program is intended to deliver.
    • A. 

      Zombie

    • B. 

      Hash

    • C. 

      Cracker

    • D. 

      Payload

  • 83. 
    Some virus are hidden in ___, which are instructions saved in an application such as a word processing or spreadsheet program.
    • A. 

      Macros

    • B. 

      Logs

    • C. 

      Cookies

    • D. 

      Spikes

  • 84. 
    A virus ___ is a known speciic pattern of virus code.
    • A. 

      Index

    • B. 

      Signature

    • C. 

      Glossary

    • D. 

      Master

  • 85. 
    Ownership and use of intellectual property such as software, music, movies, data, and information is called ___.
    • A. 

      Intellectual property rights

    • B. 

      Content license

    • C. 

      Access right

    • D. 

      None of the above

  • 86. 
    A ___ is a small text file that a web server stores on users computer/
    • A. 

      Worm

    • B. 

      Spike

    • C. 

      Cookie

    • D. 

      Payload

  • 87. 
    Computer __ is the discovery, collection, and analysis of evidence found on computers and networks.
    • A. 

      Anthropology

    • B. 

      Epistemology

    • C. 

      Forensics

    • D. 

      Reduction

  • 88. 
    ___ is an applied science devoted to incorporating confort, efficiency, and safety into design of items in the workplace.
    • A. 

      Ergonomics

    • B. 

      Eurhythmics

    • C. 

      Epidemics

    • D. 

      Econometrics

  • 89. 
    A ___ operating system allows a single user to work on 2 or more programs that reside in memory at the same time.
  • 90. 
    ___ means the operating system automatically configures new devices as users install them.
  • 91. 
    A _____ is and operating system that organizes and coordinates how multiple users access and share resources on a network.
  • 92. 
    A ___ is someone who tries to access a computer or network illegally.
  • 93. 
    Linux is ____ which means its code is provided for use, modification and redistribution.
  • 94. 
    A ___ is a utility that protects a computer against viruses by identifying and removing any computer virus found in memory on storage media or on incoming files.
  • 95. 
    A ____ is an e-mail message that warns users of nonexistent virus, worm, or torjan horse.
  • 96. 
    ____ is a scam in which a perpetrator sends an official looking e-mail that attempts obtain a user's personal and financial information/
  • 97. 
    A ___ is malware that copies itself repeatedly, for example in memory or over a network, using up system resources and possibly shutting the system down.
  • 98. 
    Web addresses beginning with ____ indicate secure connections.
  • 99. 
    A _____ system is a set of programs containing instructions that coordinate all the activites among computer hardware resources.
  • 100. 
    The Bios executes a series of texts, collectively called the ____ which check the various system components including the buses, system clock, adapter cards, RAM chips, mouse, keyboard, and drives.
Related Topics