Final CIS Spring 2010

100 Questions  I  By Jrosario18
Please take the quiz to rate it.

Professional Certification Quizzes & Trivia
Final quiz for computer class

  
or Create Online Exam
Changes are done, please start the quiz.


Questions and Answers

Removing question excerpt is a premium feature

Upgrade and get a lot more done!
  • 1. 
    Most computers store data in an ______ format as a series of 1's and 0's.
    • A. 

      Analog

    • B. 

      Digital

    • C. 

      Logical

    • D. 

      Compiler


  • 2. 
    The 1's and 0's that a computer works with are refereed to as ____ digits.
    • A. 

      Binary

    • B. 

      Analog

    • C. 

      Master

    • D. 

      Indexed


  • 3. 
    ____ uses 16 bits and provides codes for 65,000 characters.
    • A. 

      Unicode

    • B. 

      EBCDIC

    • C. 

      ASCII

    • D. 

      Extended ASCII


  • 4. 
    ___ code instructions are a series of 0's and 1's that correspond to a processor's instruction set.
    • A. 

      Machine

    • B. 

      Control

    • C. 

      Unit

    • D. 

      Register


  • 5. 
    ____ breaks a message or file into packets.
    • A. 

      IP( internet protocol)

    • B. 

      TCP(transmission control Protocol)

    • C. 

      FTP (file transfer Protocol)

    • D. 

      Telnet (telecommunication network)


  • 6. 
    The _____ is a global computer network originally developed as a military project, then handed over to the National Science Foundation for research and academic use.

  • 7. 
    Software is divided into two main categories. What are they? _____

  • 8. 
    An _______ is a pocket-sized digital appointment book with a small keyboard or a touch-sensitive screen.

  • 9. 
    MB is the abbreviation for _____

  • 10. 
    A _____ is a device that converts the signals from a computer into signals that can travel over the telephone system.

  • 11. 
    What is an IP address?

  • 12. 
    ___ is usually a prefix that means 1,000.
    • A. 

      Kilo

    • B. 

      Mega

    • C. 

      Exa

    • D. 

      Giga


  • 13. 
    ____ transfers files between local and remote host computers.
    • A. 

      IP(internet Protocol)

    • B. 

      TCP( transmission control protocol)

    • C. 

      FTP(file transfer protocol)

    • D. 

      Telnet( Telecommunication Network)


  • 14. 
    A domain name ends with an extension that indicates it ____.

  • 15. 
    One Gigabyte is approximately _______ byts.

  • 16. 
    Name two components of a computer system _____

  • 17. 
    Name the 4 steps in Information Processing Cycle.

  • 18. 
    Give an example of an IP address (V4) ____

  • 19. 
    URL is an abbreviation for ______

  • 20. 
    Give an example of a URL _____

  • 21. 
    The server that translates domain names to IP addresses called _______.

  • 22. 
    HTML is an abbreviation of _____

  • 23. 
    The inventor of the World Wide Web is ____

  • 24. 
    The very first network was called ____ and it connected ___ computers

  • 25. 
    Convert the number 6 to binary

  • 26. 
    The type of network that convers a large geographical area is known as a ____.
    • A. 

      LAN

    • B. 

      WAN

    • C. 

      GAN

    • D. 

      PAN


  • 27. 
    In a ____ arrangement, network nodes are connected in a closed circle.
    • A. 

      Circle

    • B. 

      Closed

    • C. 

      Ring

    • D. 

      Star


  • 28. 
    A channel is a physical path or a frequency for signal transmissions.
    • A. 

      Logical

    • B. 

      Communications

    • C. 

      Connecting

    • D. 

      Node


  • 29. 
    The technology in which a message is divided into several parcels that can be routed independently ti its destination is called____.
    • A. 

      Packet switching

    • B. 

      Handshaking

    • C. 

      Circuit switching

    • D. 

      Protocol


  • 30. 
    A ___ server is a computer whose primary purpose is to be a repository for files that an be accessed by network workstations.
    • A. 

      File

    • B. 

      Print

    • C. 

      Document

    • D. 

      Backup


  • 31. 
    An encrypted message is referred to as ____.
    • A. 

      Keytext

    • B. 

      Strong text

    • C. 

      Ciphertext

    • D. 

      Plaintext


  • 32. 
    The Web is based on the concept of ___, a collection of documents that can be related by links.
    • A. 

      Hypertext

    • B. 

      Cookies

    • C. 

      Ports

    • D. 

      Tags


  • 33. 
    A ___ is a software program that runs on your computer and helps you access Web pages.
    • A. 

      Explorer

    • B. 

      Browser

    • C. 

      Sever

    • D. 

      Manager


  • 34. 
    ___ provides tools specifically designed to enter and format Web page text, graphics, and links.
    • A. 

      A Web browser

    • B. 

      Web authoring software

    • C. 

      Web creator

    • D. 

      W3C


  • 35. 
    A ___ server handles jobs sent to network printers.

  • 36. 
    The arrangement of devices in a network is referred to as its _____

  • 37. 
    Transmission signals can be disrupted by interference called ____, which has the potential to corrupt data.

  • 38. 
    The term ____ popularly refers to a web site that provides a variety of tools to help you find information.

  • 39. 
    Programs that extend the capability of a browser are called ______.

  • 40. 
    The term B2C means ________.

  • 41. 
    Name two types of graphic formats you find in web pages _________.

  • 42. 
    FTP is an acronym for _____.

  • 43. 
    Name two different types of Physical Communication Media (wires) ______

  • 44. 
    Wireless networking technology that is compatible with Ethernet is called _____.

  • 45. 
    Name two boolean operators used by Search engines_____.

  • 46. 
    NIC is an acronym for __________.

  • 47. 
    GPS is an acronym for ______.

  • 48. 
    An email based scam designed to peruade you to reveal confidential information is _____.

  • 49. 
    One type of network architecture is P2P. What is the other one ______

  • 50. 
    _____ is the largest network.

  • 51. 
    ____ means a billion cycles per second.
    • A. 

      Gigahertz

    • B. 

      Megahertz

    • C. 

      Exahertz

    • D. 

      Nanohertz


  • 52. 
    ____ time is the average time it takes a computer to locate data on the storage medium and read it.
    • A. 

      Identification

    • B. 

      Isolation

    • C. 

      Access

    • D. 

      Find


  • 53. 
    ___ access is the ability of a device to "jump" directly to the requested data.
    • A. 

      Sequential

    • B. 

      Jump

    • C. 

      Random

    • D. 

      Quick


  • 54. 
    Notebook computers use a flat panel ___ screen that is attached to the system unit.
    • A. 

      PDA

    • B. 

      HTML

    • C. 

      LCD

    • D. 

      URL


  • 55. 
    ___ is special high speed memory that allows a microprocessor to access data more rapidly then from memory located elsewhere on the motherboard.

  • 56. 
    ____ is a type of software designed to help several people collaborate on a single project using LAN or Internet connections.
    • A. 

      Groupware

    • B. 

      Suiteware

    • C. 

      Clubware

    • D. 

      Workwave


  • 57. 
    Microsoft Word is a type of _____ market software.
    • A. 

      Development

    • B. 

      Primary

    • C. 

      Horizontal

    • D. 

      Vertical


  • 58. 
    A software ____ is a collection of application software sold as a single package.
    • A. 

      Club

    • B. 

      Group

    • C. 

      Collection

    • D. 

      Suite


  • 59. 
    _____ is not protected by copyright because the copyright has expired, or the author has made the program available without restriction.
    • A. 

      Shareware

    • B. 

      Freeware

    • C. 

      Open source software

    • D. 

      Public domain software


  • 60. 
    RAM is ______, which means that it requires electrical power to hold data.

  • 61. 
    The instruction that your computer performs when it is first turned on are permanently stored in _____.

  • 62. 
    A storage _____ is the disk, CD, Tape, paper, or other substance that contains data.

  • 63. 
    A storage _____ is the mechanical apparatus that records and retrieves data from a storage medium.

  • 64. 
    Cd's and Dvd's are types of ______ storage.

  • 65. 
    A _______ is a type of optical disc that users can write but not erase.

  • 66. 
    ROM is acronym for _______ and its volatile/non volatile.

  • 67. 
    A ________ application is software that is accessed with a Web browsers.

  • 68. 
    The ____ is the component of the processor that performs aritmetic, comparison, and other operations.

  • 69. 
    CPU is an acronym for ____________.

  • 70. 
    Using a technology called _________, a processor can begin executing an instruction before it completes the previous instruction.

  • 71. 
    The four parts of machine cycle are (in order) __________

  • 72. 
    The speed of a computer is measured in ___________

  • 73. 
    The ______ process, prepares disk for use and marks bad sectors as unusable.

  • 74. 
    Name 4 input devices_________

  • 75. 
    Name 2 high level programing languages ________________.

  • 76. 
    ___ is the process of starting or restarting a computer.
    • A. 

      Launching

    • B. 

      Loading

    • C. 

      Booting

    • D. 

      Keying


  • 77. 
    A ___ computer is a computer that continues to operate when one of its components fails, ensuring that no data is lost.
    • A. 

      Failsafe

    • B. 

      Antivirus

    • C. 

      Immune

    • D. 

      Fault-tolerant


  • 78. 
    With ___ memory, the operating system allocates a portion of a storage medium, usually the hard disk, to function as additional RAM.
    • A. 

      Virtual

    • B. 

      Performance

    • C. 

      Deice

    • D. 

      Managed


  • 79. 
    A ____ is a small program that tells the operating system how to communicate with a specific device.
    • A. 

      Driver

    • B. 

      Monitor

    • C. 

      Utility

    • D. 

      OS


  • 80. 
    A disk ____ is a utility that reorganizes the files and unused space on a computer's hard disk so the operating system accesses data more quickly and programs run faster. 
    • A. 

      Manager

    • B. 

      Defragmenter

    • C. 

      Organizer

    • D. 

      OS


  • 81. 
    __ is a program placed on a computer without the users knowledge or consent that secretly collects information about the users, often related to Web browsing habits.
    • A. 

      Spyware

    • B. 

      A Pop-up ad

    • C. 

      Spam

    • D. 

      A Fliter


  • 82. 
    The _____ is the destructive event or prank a malicious- logic program is intended to deliver.
    • A. 

      Zombie

    • B. 

      Hash

    • C. 

      Cracker

    • D. 

      Payload


  • 83. 
    Some virus are hidden in ___, which are instructions saved in an application such as a word processing or spreadsheet program.
    • A. 

      Macros

    • B. 

      Logs

    • C. 

      Cookies

    • D. 

      Spikes


  • 84. 
    A virus ___ is a known speciic pattern of virus code.
    • A. 

      Index

    • B. 

      Signature

    • C. 

      Glossary

    • D. 

      Master


  • 85. 
    Ownership and use of intellectual property such as software, music, movies, data, and information is called ___.
    • A. 

      Intellectual property rights

    • B. 

      Content license

    • C. 

      Access right

    • D. 

      None of the above


  • 86. 
    A ___ is a small text file that a web server stores on users computer/
    • A. 

      Worm

    • B. 

      Spike

    • C. 

      Cookie

    • D. 

      Payload


  • 87. 
    Computer __ is the discovery, collection, and analysis of evidence found on computers and networks.
    • A. 

      Anthropology

    • B. 

      Epistemology

    • C. 

      Forensics

    • D. 

      Reduction


  • 88. 
    ___ is an applied science devoted to incorporating confort, efficiency, and safety into design of items in the workplace.
    • A. 

      Ergonomics

    • B. 

      Eurhythmics

    • C. 

      Epidemics

    • D. 

      Econometrics


  • 89. 
    A ___ operating system allows a single user to work on 2 or more programs that reside in memory at the same time.

  • 90. 
    ___ means the operating system automatically configures new devices as users install them.

  • 91. 
    A _____ is and operating system that organizes and coordinates how multiple users access and share resources on a network.

  • 92. 
    A ___ is someone who tries to access a computer or network illegally.

  • 93. 
    Linux is ____ which means its code is provided for use, modification and redistribution.

  • 94. 
    A ___ is a utility that protects a computer against viruses by identifying and removing any computer virus found in memory on storage media or on incoming files.

  • 95. 
    A ____ is an e-mail message that warns users of nonexistent virus, worm, or torjan horse.

  • 96. 
    ____ is a scam in which a perpetrator sends an official looking e-mail that attempts obtain a user's personal and financial information/

  • 97. 
    A ___ is malware that copies itself repeatedly, for example in memory or over a network, using up system resources and possibly shutting the system down.

  • 98. 
    Web addresses beginning with ____ indicate secure connections.

  • 99. 
    A _____ system is a set of programs containing instructions that coordinate all the activites among computer hardware resources.

  • 100. 
    The Bios executes a series of texts, collectively called the ____ which check the various system components including the buses, system clock, adapter cards, RAM chips, mouse, keyboard, and drives.

Back to top

Removing ad is a premium feature

Upgrade and get a lot more done!
Take Another Quiz
We have sent an email with your new password.