Understanding Computer (Ch9-14.5)

55 Questions | Attempts: 105
Please wait...
Question 1 / 56
🏆 Rank #--
Score 0/100

1. Hacking is an example of unauthorized access.

Submit
Please wait...
About This Quiz
Computer Quizzes & Trivia

We are very much in the digital age with regards to human civilisation right now, but how much do you actually know about the computers our worlds are slowly beginning to revolve around? Let’s find out!

2.

What first name or nickname would you like us to use?

You may optionally provide this to label your report, leaderboard, or certificate.

2. Good data validation techniques can help improve data integrity.

Submit

3. A Trojan horse is a type of malware that masquerades as another type of program

Submit

4. Digital certificates can be used to authenticate Web sites.

Submit

5. Storyboards are more appropriate for designing multimedia components of a Web site, rather than the entire Web site.

Submit

6. Operational managers tend to make highly structured decisions.

Submit

7. The structure of a database table contains the actual data in the database, such as the customers’ names, addresses, and telephone numbers.

Submit

8. A database table consists of fields and records.

Submit

9. Machine language is an example of a low-level language.

Submit

10. The term “e-tailer” refers to an online retailer.

Submit

11. The first step in the program development life cycle (PDLC) is problem analysis.

Submit

12. With phased system conversion, only one piece of the system is implemented at one time.

Submit

13. Document processing is a type of office system.

Submit

14. Which of the following types of system is used to process Web site orders?

Submit

15. Interlaced images display faster than noninterlaced images.

Submit

16. The file format most often used for Web page photographs.

Submit

17. A person who does the coding during the system development process.

Submit

18. A password is a type of possessed object.

Submit

19. Once a Web site has been created and thoroughly tested, it no longer requires any further testing.

Submit

20.             Where an individual receives threats or harassing behavior via the Internet.  

Submit

21. Which of the following is not related to Web site promotion?

Submit

22. Which of the following can be used as a navigational tool?

Submit

23. The business model used by an online clothing store.

Submit

24. Which of the following is used to convert a computer program into machine language?

Submit

25. Another name for registering a domain name for a new Web site is “cybersquatting.”

Submit

26. An Internet-only store with no physical presence.

Submit

27. With public key encryption, both the sender and receiver need to agree on a single password.

Submit

28. When someone sends a spoofed e-mail message in hopes of obtaining personal information that can be used in fraudulent activities.

Submit

29. A brick-and-mortar store is a store that has both a physical store and an online store.

Submit

30. When someone impersonates another individual to buy goods or services.

Submit

31. ERP is a type of design system.

Submit

32. Which of the following is an example of a biometric device?

Submit

33. The amount of compression of a GIF image is selected by the user when the image is saved.

Submit

34. Which of the following is not a form of digital cash, although it can be used to facilitate a digital cash transaction?

Submit

35. A type of system that combines geographic information with other types of data.

Submit

36. To ensure that an e-mail message or file came from the designated individual and was not tampered during transmission, you should use which of the following?

Submit

37. Which of the following in NOT an audio file format?

Submit

38. With the B2B business model, consumers sell directly to other consumers, such as via an online auction site.

Submit

39. A model of a new system is created during the feasibility study.

Submit

40. FORTRAN was designed for business transaction processing.

Submit

41. A design tool that uses English-like statement to illustrate the steps in a computer program.

Submit

42. An index is used to relate two tables together via a common field.

Submit

43. Banner ads are ads that appear at the top of a magazine page or other printed medium.

Submit

44. The use of structured programming typically produces spaghetti code.

Submit

45.                 A Web site that brings buyers and sellers together to facilitate transactions.

Submit

46. An infinite loop is an example of a syntax error.

Submit

47. The appearance of text (such as font face and style) incorporated into a Web page graphic will appear as it was when it was created, regardless of the users installed fonts and browser settings.

Submit

48. Which of the following is NOT an example of an artificial intelligence system application?

Submit

49. A markup language.

Submit

50. A design tool that uses geographic symbols to illustrate the steps in a computer program.

Submit

51. The most widely used type of database today is the multidimensional database.

Submit

52. A type of system that provides middle managers with pre-selected information.

Submit

53.                 Which of the following contains the actions that may be taken with an object in an OOP?

Submit

54. The file format most often used for Web page line art images.

Submit

55. A type of system used to design products.

Submit
×
Saved
Thank you for your feedback!
View My Results
Cancel
  • All
    All (55)
  • Unanswered
    Unanswered ()
  • Answered
    Answered ()
Hacking is an example of unauthorized access.
Good data validation techniques can help improve data integrity.
A ...
Digital certificates can be used to authenticate Web sites.
Storyboards ...
Operational managers tend to make highly structured decisions.
The ...
A database table consists of fields and records.
Machine language is an example of a low-level language.
The term “e-tailer” refers to an online retailer.
The ...
With ...
Document processing is a type of office system.
Which of the following types of system is ...
Interlaced images display faster than noninterlaced images.
The file format most often used for Web page photographs.
A person who does the coding during the system development process.
A password is a type of possessed object.
Once ...
           ...
Which of the following is not related to Web site promotion?
Which of the following can be used as a navigational tool?
The business model used by an online clothing store.
Which ...
Another ...
An Internet-only store with no physical presence.
With public key ...
When someone sends a ...
A brick-and-mortar store is a ...
When someone impersonates another individual to ...
ERP is a type of design system.
Which of the following is an example of a biometric device?
The amount of compression of a GIF image is selected by the ...
Which of the following is not a form of ...
A ...
To ensure that an e-mail ...
Which of the following in NOT an audio file format?
With ...
A model of a new system is created during the feasibility study.
FORTRAN was designed for business transaction processing.
A ...
An index is used to relate two tables together via a common field.
Banner ads are ads that ...
The use of structured programming typically produces spaghetti code.
               ...
An infinite loop is an example of a syntax error.
The ...
Which ...
A markup language.
A design tool that uses geographic ...
The most widely used type of ...
A ...
               ...
The file format most often used for Web page line art images.
A type of system used to design products.
play-Mute sad happy unanswered_answer up-hover down-hover success oval cancel Check box square blue
Alert!