We have sent an email with your new password.

Close this window

Final CIS Spring 2010

100 Questions  I  By Jrosario18
Season Quizzes & Trivia
Final quiz for computer class

  
Changes are done, please start the quiz.


Question Excerpt

Removing question excerpt is a premium feature

Upgrade and get a lot more done!
1.  Most computers store data in an ______ format as a series of 1's and 0's.
A.
B.
C.
D.
2.  The 1's and 0's that a computer works with are refereed to as ____ digits.
A.
B.
C.
D.
3.  ____ uses 16 bits and provides codes for 65,000 characters.
A.
B.
C.
D.
4.  ___ code instructions are a series of 0's and 1's that correspond to a processor's instruction set.
A.
B.
C.
D.
5.  ____ breaks a message or file into packets.
A.
B.
C.
D.
6.  The _____ is a global computer network originally developed as a military project, then handed over to the National Science Foundation for research and academic use.
7.  Software is divided into two main categories. What are they? _____
8.  An _______ is a pocket-sized digital appointment book with a small keyboard or a touch-sensitive screen.
9.  MB is the abbreviation for _____
10.  A _____ is a device that converts the signals from a computer into signals that can travel over the telephone system.
11.  What is an IP address?
12.  ___ is usually a prefix that means 1,000.
A.
B.
C.
D.
13.  ____ transfers files between local and remote host computers.
A.
B.
C.
D.
14.  A domain name ends with an extension that indicates it ____.
15.  One Gigabyte is approximately _______ byts.
16.  Name two components of a computer system _____
17.  Name the 4 steps in Information Processing Cycle.
18.  Give an example of an IP address (V4) ____
19.  URL is an abbreviation for ______
20.  Give an example of a URL _____
21.  The server that translates domain names to IP addresses called _______.
22.  HTML is an abbreviation of _____
23.  The inventor of the World Wide Web is ____
24.  The very first network was called ____ and it connected ___ computers
25.  Convert the number 6 to binary
26.  The type of network that convers a large geographical area is known as a ____.
A.
B.
C.
D.
27.  In a ____ arrangement, network nodes are connected in a closed circle.
A.
B.
C.
D.
28.  A channel is a physical path or a frequency for signal transmissions.
A.
B.
C.
D.
29.  The technology in which a message is divided into several parcels that can be routed independently ti its destination is called____.
A.
B.
C.
D.
30.  A ___ server is a computer whose primary purpose is to be a repository for files that an be accessed by network workstations.
A.
B.
C.
D.
31.  An encrypted message is referred to as ____.
A.
B.
C.
D.
32.  The Web is based on the concept of ___, a collection of documents that can be related by links.
A.
B.
C.
D.
33.  A ___ is a software program that runs on your computer and helps you access Web pages.
A.
B.
C.
D.
34.  ___ provides tools specifically designed to enter and format Web page text, graphics, and links.
A.
B.
C.
D.
35.  A ___ server handles jobs sent to network printers.
36.  The arrangement of devices in a network is referred to as its _____
37.  Transmission signals can be disrupted by interference called ____, which has the potential to corrupt data.
38.  The term ____ popularly refers to a web site that provides a variety of tools to help you find information.
39.  Programs that extend the capability of a browser are called ______.
40.  The term B2C means ________.
41.  Name two types of graphic formats you find in web pages _________.
42.  FTP is an acronym for _____.
43.  Name two different types of Physical Communication Media (wires) ______
44.  Wireless networking technology that is compatible with Ethernet is called _____.
45.  Name two boolean operators used by Search engines_____.
46.  NIC is an acronym for __________.
47.  GPS is an acronym for ______.
48.  An email based scam designed to peruade you to reveal confidential information is _____.
49.  One type of network architecture is P2P. What is the other one ______
50.  _____ is the largest network.
51.  ____ means a billion cycles per second.
A.
B.
C.
D.
52.  ____ time is the average time it takes a computer to locate data on the storage medium and read it.
A.
B.
C.
D.
53.  ___ access is the ability of a device to "jump" directly to the requested data.
A.
B.
C.
D.
54.  Notebook computers use a flat panel ___ screen that is attached to the system unit.
A.
B.
C.
D.
55.  ___ is special high speed memory that allows a microprocessor to access data more rapidly then from memory located elsewhere on the motherboard.
56.  ____ is a type of software designed to help several people collaborate on a single project using LAN or Internet connections.
A.
B.
C.
D.
57.  Microsoft Word is a type of _____ market software.
A.
B.
C.
D.
58.  A software ____ is a collection of application software sold as a single package.
A.
B.
C.
D.
59.  _____ is not protected by copyright because the copyright has expired, or the author has made the program available without restriction.
A.
B.
C.
D.
60.  RAM is ______, which means that it requires electrical power to hold data.
61.  The instruction that your computer performs when it is first turned on are permanently stored in _____.
62.  A storage _____ is the disk, CD, Tape, paper, or other substance that contains data.
63.  A storage _____ is the mechanical apparatus that records and retrieves data from a storage medium.
64.  Cd's and Dvd's are types of ______ storage.
65.  A _______ is a type of optical disc that users can write but not erase.
66.  ROM is acronym for _______ and its volatile/non volatile.
67.  A ________ application is software that is accessed with a Web browsers.
68.  The ____ is the component of the processor that performs aritmetic, comparison, and other operations.
69.  CPU is an acronym for ____________.
70.  Using a technology called _________, a processor can begin executing an instruction before it completes the previous instruction.
71.  The four parts of machine cycle are (in order) __________
72.  The speed of a computer is measured in ___________
73.  The ______ process, prepares disk for use and marks bad sectors as unusable.
74.  Name 4 input devices_________
75.  Name 2 high level programing languages ________________.
76.  ___ is the process of starting or restarting a computer.
A.
B.
C.
D.
77.  A ___ computer is a computer that continues to operate when one of its components fails, ensuring that no data is lost.
A.
B.
C.
D.
78.  With ___ memory, the operating system allocates a portion of a storage medium, usually the hard disk, to function as additional RAM.
A.
B.
C.
D.
79.  A ____ is a small program that tells the operating system how to communicate with a specific device.
A.
B.
C.
D.
80.  A disk ____ is a utility that reorganizes the files and unused space on a computer's hard disk so the operating system accesses data more quickly and programs run faster. 
A.
B.
C.
D.
81.  __ is a program placed on a computer without the users knowledge or consent that secretly collects information about the users, often related to Web browsing habits.
A.
B.
C.
D.
82.  The _____ is the destructive event or prank a malicious- logic program is intended to deliver.
A.
B.
C.
D.
83.  Some virus are hidden in ___, which are instructions saved in an application such as a word processing or spreadsheet program.
A.
B.
C.
D.
84.  A virus ___ is a known speciic pattern of virus code.
A.
B.
C.
D.
85.  Ownership and use of intellectual property such as software, music, movies, data, and information is called ___.
A.
B.
C.
D.
86.  A ___ is a small text file that a web server stores on users computer/
A.
B.
C.
D.
87.  Computer __ is the discovery, collection, and analysis of evidence found on computers and networks.
A.
B.
C.
D.
88.  ___ is an applied science devoted to incorporating confort, efficiency, and safety into design of items in the workplace.
A.
B.
C.
D.
89.  A ___ operating system allows a single user to work on 2 or more programs that reside in memory at the same time.
90.  ___ means the operating system automatically configures new devices as users install them.
91.  A _____ is and operating system that organizes and coordinates how multiple users access and share resources on a network.
92.  A ___ is someone who tries to access a computer or network illegally.
93.  Linux is ____ which means its code is provided for use, modification and redistribution.
94.  A ___ is a utility that protects a computer against viruses by identifying and removing any computer virus found in memory on storage media or on incoming files.
95.  A ____ is an e-mail message that warns users of nonexistent virus, worm, or torjan horse.
96.  ____ is a scam in which a perpetrator sends an official looking e-mail that attempts obtain a user's personal and financial information/
97.  A ___ is malware that copies itself repeatedly, for example in memory or over a network, using up system resources and possibly shutting the system down.
98.  Web addresses beginning with ____ indicate secure connections.
99.  A _____ system is a set of programs containing instructions that coordinate all the activites among computer hardware resources.
100.  The Bios executes a series of texts, collectively called the ____ which check the various system components including the buses, system clock, adapter cards, RAM chips, mouse, keyboard, and drives.
Back to top

Removing ad is a premium feature

Upgrade and get a lot more done!
Take Another Quiz