COSC Exam 1

50 Questions | Attempts: 212
Please wait...
Question 1 / 51
🏆 Rank #--
Score 0/100

1. An e-mail address consists of a(n) username, followed by the @ symbol, followed by the domain name for the computer that will be handling that person's e-mail (called a mail server).

Submit
Please wait...
About This Quiz
COSC Exam 1 - Quiz

Chapters 1 and 2

2.

What first name or nickname would you like us to use?

You may optionally provide this to label your report, leaderboard, or certificate.

2. A user inputs data into a computer, and then the computer processes it.

Submit

3. Storage devices are hardware used to store data on or access data from storage media, such as CD discs, DVD discs, or flash memory cards.

Submit

4. Notebook computers (also called laptops) are fully functioning computers that open to reveal a screen and keyboard.

Submit

5. The binary numbering system uses only two symbols—the digits 0 and 1—to represent all possible numbers.

Submit

6. Small office networks enable workers to access company records stored on a network server.

Submit

7. Each location in memory has an address.

Submit

8. Early computers required programs to be written in machine language.

Submit

9. The system unit is the main case of a computer.

Submit

10. The buses used to connect peripheral (typically input and output) devices to the motherboard are usually referred to as expansion buses.

Submit

11. Pipelining increases the number of machine cycles completed per second.

Submit

12. One online security problem is ____, in which someone else uses your identity, typically to purchase goods or services.

Submit

13. Common input devices include the keyboard and ____.

Submit

14. Case-Based Critical Thinking Questions Case 2-1 Jess is a musician who has just bought a new computer. Now she has to determine how to connect this computer to the devices that were connected to her old computer. Jess has pictures from her old computer saved on a flash drive. To transfer these to her new computer, she would use a(n) ____ port.

Submit

15. With bitmapped images, the color of each ____ is represented by bits; the more bits used, the better the image quality.

Submit

16. Case-Based Critical Thinking Questions Case 1-1 Sarah is a very active real estate agent. She is looking to purchase a new computer and software so she can keep track of her client's accounts, access the Internet from anywhere in the city, and touch-up photos of real estate properties. Sarah needs to store digital photographs of houses she is previewing. She needs to be able to copy these to the computer at her office. What type of storage device should she use?

Submit

17. Hollerith's machine was used to process the 1890 U.S. Census data and was able to complete the task in ____, instead of the decade it usually took to process the data by hand.

Submit

18. ____ occurs when data is entered into the computer.

Submit

19. nar002-1.jpg The Windows ____ shown in the figure above contains the following objects: Windows, Icons, Menus, Toolbars, Taskbar, Hyperlinks, Sizing buttons, and a Dialog box.

Submit

20. The external hardware components are located inside the main box or system unit of the computer.

Submit

21. A ____ is equal to 1,024 bytes.

Submit

22. Case-Based Critical Thinking Questions Case 2-2 Jack has a computer at home that he uses to access the Internet, store and edit personal photos, and create and edit documents. Recently, he has come to realize that in order to keep the computer performing at its best, he needs to carry out regular system maintenance on the computer. Jack can use the ____ program to locate and delete temporary files, such as installation files, Web browsing history, and files in the Recycle Bin.

Submit

23. MIDI ports are used to receive wireless transmissions from devices.

Submit

24. The ____ takes instructions from the prefetch unit and translates them into a form that the control unit can understand.

Submit

25. In addition to the four primary computer operations, today's computers typically also perform ____ functions.

Submit

26. Computing technologies make it possible to have ____, traditional appliances with some type of built-in computer or communications technology.

Submit

27. A ____ is a collection of hardware and other devices that are connected together so that users can share hardware, software, and data, as well as electronically communicate with each other.

Submit

28. Case-Based Critical Thinking Questions Case 1-1 Sarah is a very active real estate agent. She is looking to purchase a new computer and software so she can keep track of her client's accounts, access the Internet from anywhere in the city, and touch-up photos of real estate properties. Sarah has hired a programmer to create a Web page for her business. What type of programming language will the programmer use?

Submit

29. The ____ enables up to 127 devices to be connected to a computer through a single port on the computer's system unit.

Submit

30. ____ refers to guidelines for online behavior.

Submit

31. Two of the most common types of communications hardware are ____ and network adapters.

Submit

32. Like graphics data, ____—such as a song or the sound of someone speaking—must be in digital form in order to be stored on a storage medium or processed by a PC.

Submit

33. Memory refers to the amount of long-term storage available to a PC.

Submit

34. Ultra-mobile PCs are also called ____.

Submit

35. Because of its large size, when audio data is transmitted over the Internet it is often encrypted to shorten the download time.

Submit

36. Some ____ must be added in pairs for optimal performance.

Submit

37. Communications hardware includes modems, which are used to connect a computer to the Internet and network projectors, which are used to connect a computer to a computer network.

Submit

38. Most recent software programs, including the latest versions of Microsoft Windows, Mac OS, and Microsoft Office, use ASCII.

Submit

39. Abbreviations or acronyms, such as BTW for "between the words," are commonly used to save time in all types of communications today.

Submit

40. Integrated circuits incorporate many transistors and electronic circuits on a single tiny silicon chip, allowing ____ to be even smaller and more reliable than earlier computers.

Submit

41. nar001-1.jpg The accompanying figure shows a DIMM RAM microprocessor.

Submit

42. A(n) ____ instruction might look like a meaningless string of 0s and 1s, but it actually represents specific operations and storage locations.

Submit

43. To begin to use a computer, the user first turns on the power by pressing the power button, and then the computer displays a prompt for the user to decide the next course of action.

Submit

44. Satellite communication (more commonly called s-com) is the process of exchanging electronic messages between computers over a network—usually the Internet.

Submit

45. The key element of the microprocessor is the ____—a device made of semiconductor material that acts like a switch controlling the flow of electrons inside a chip.

Submit

46. nar001-1.jpg The accompanying figure shows a notebook computer.

Submit

47. The control unit takes the instructions fetched by the prefetch unit and translates them into a form that can be understood by the control unit, ALU, and FPU.

Submit

48. One nanometer (nm) is ____ of a meter.

Submit

49. The ____ orders data and instructions from cache or RAM based on the task at hand.

Submit

50. The process of representing data in digital form so it can be used by a digital computer is called decimal byte representation.

Submit
×
Saved
Thank you for your feedback!
View My Results
Cancel
  • All
    All (50)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
An e-mail address consists of a(n) username, followed by the @ symbol,...
A user inputs data into a computer, and then the computer processes...
Storage devices are hardware used to store data on or access data from...
Notebook computers (also called laptops) are fully functioning...
The binary numbering system uses only two symbols—the digits 0...
Small office networks enable workers to access company records stored...
Each location in memory has an address.
Early computers required programs to be written in machine language.
The system unit is the main case of a computer.
The buses used to connect peripheral (typically input and output)...
Pipelining increases the number of machine cycles completed per...
One online security problem is ____, in which someone else uses your...
Common input devices include the keyboard and ____.
Case-Based Critical Thinking Questions...
With bitmapped images, the color of each ____ is represented by bits;...
Case-Based Critical Thinking Questions...
Hollerith's machine was used to process the 1890 U.S. Census data and...
____ occurs when data is entered into the computer.
The Windows ____ shown in the figure above contains the following...
The external hardware components are located inside the main box or...
A ____ is equal to 1,024 bytes.
Case-Based Critical Thinking Questions...
MIDI ports are used to receive wireless transmissions from devices.
The ____ takes instructions from the prefetch unit and translates them...
In addition to the four primary computer operations, today's computers...
Computing technologies make it possible to have ____, traditional...
A ____ is a collection of hardware and other devices that are...
Case-Based Critical Thinking Questions...
The ____ enables up to 127 devices to be connected to a computer...
____ refers to guidelines for online behavior.
Two of the most common types of communications hardware are ____ and...
Like graphics data, ____—such as a song or the sound of someone...
Memory refers to the amount of long-term storage available to a PC.
Ultra-mobile PCs are also called ____.
Because of its large size, when audio data is transmitted over the...
Some ____ must be added in pairs for optimal performance.
Communications hardware includes modems, which are used to connect a...
Most recent software programs, including the latest versions of...
Abbreviations or acronyms, such as BTW for "between the words," are...
Integrated circuits incorporate many transistors and electronic...
The accompanying figure shows a DIMM RAM microprocessor.
A(n) ____ instruction might look like a meaningless string of 0s and...
To begin to use a computer, the user first turns on the power by...
Satellite communication (more commonly called s-com) is the process of...
The key element of the microprocessor is the ____—a device made...
The accompanying figure shows a notebook computer.
The control unit takes the instructions fetched by the prefetch unit...
One nanometer (nm) is ____ of a meter.
The ____ orders data and instructions from cache or RAM based on the...
The process of representing data in digital form so it can be used by...
play-Mute sad happy unanswered_answer up-hover down-hover success oval cancel Check box square blue
Alert!