Understanding Computers (Ch. 14.5-16)

25 Questions | Total Attempts: 287

SettingsSettingsSettings
Please wait...
Computer Quizzes & Trivia

IFSM 201


Questions and Answers
  • 1. 
    Which of the following is NOT related to data security?
    • A. 

      Passwords

    • B. 

      Hot site

    • C. 

      Disaster-recovery plan

    • D. 

      User names

    • E. 

      Row-level locking

  • 2. 
    Which of the following refers to software used to connect two otherwise separate applications?
    • A. 

      Query

    • B. 

      SQL

    • C. 

      DBMS

    • D. 

      Middleware

    • E. 

      RDBMS

  • 3. 
    A request for information from a database.
    • A. 

      Record

    • B. 

      Middleware

    • C. 

      Query

    • D. 

      Field

    • E. 

      RDBMS

  • 4. 
    A type of database software.
    • A. 

      Record

    • B. 

      Middleware

    • C. 

      Query

    • D. 

      Field

    • E. 

      RDBMS

  • 5. 
    A column in a database table.
    • A. 

      Record

    • B. 

      Middlware

    • C. 

      Query

    • D. 

      Field

    • E. 

      RDBMS

  • 6. 
    Hardware theft includes the theft of portable computers as well as desktop computers.
    • A. 

      True

    • B. 

      False

  • 7. 
    A surge suppressor can be used to protect a computer against theft.
    • A. 

      True

    • B. 

      False

  • 8. 
    A good disaster-recovery plan includes information about where backup media is located.
    • A. 

      True

    • B. 

      False

  • 9. 
    Only data fro Only data from online purchases end up in marketing databases.
    • A. 

      True

    • B. 

      False

  • 10. 
    An e-mail filter is used to keep track of the e-mail addresses of people you write frequently.
    • A. 

      True

    • B. 

      False

  • 11. 
    Which of the following allows your computer to be used when the power goes out?
    • A. 

      UPS

    • B. 

      Encryption

    • C. 

      Cable lock

    • D. 

      Surge protector

    • E. 

      Computer tracking software

  • 12. 
    Having control over how information about you is collected and used is referred to as
    • A. 

      Presence technology

    • B. 

      Employee monitoring

    • C. 

      Opting out

    • D. 

      Privacy policy

    • E. 

      Information privacy

  • 13. 
    Used to prevent spam.
    • A. 

      Privacy policy

    • B. 

      Software piracy

    • C. 

      Backup

    • D. 

      Throw-away e-mail address

    • E. 

      Digital counterfeiting

  • 14. 
    Used to restore data when the original data is lost or damaged.
    • A. 

      Privacy policy

    • B. 

      Software piracy

    • C. 

      Backup

    • D. 

      Throw-away e-mail address

    • E. 

      Digital counterfeiting

  • 15. 
    The unauthorized copying of a computer program.
    • A. 

      Privacy policy

    • B. 

      Software piracy

    • C. 

      Backup

    • D. 

      Throw-away e-mail address

    • E. 

      Digital counterfeiting

  • 16. 
    To protect a newly created logo, the company should apply for a patent.
    • A. 

      True

    • B. 

      False

  • 17. 
    Computer hoaxes are commonly spread via e-mail.
    • A. 

      True

    • B. 

      False

  • 18. 
    Using a computer to remove red eye from a photograph would be considered digital manipulation.
    • A. 

      True

    • B. 

      False

  • 19. 
    To be ergonomically correct, the top of a computer monitor should be even with the user’s chin.
    • A. 

      True

    • B. 

      False

  • 20. 
    Products that are ENERGY STAR compliant exceed the minimum federal standards for reduced energy consumption.
    • A. 

      True

    • B. 

      False

  • 21. 
    A software program’s _________ indicates what can legally be done with that program.
    • A. 

      Trademark

    • B. 

      Code of ethics

    • C. 

      Code of conduct

    • D. 

      Patent

    • E. 

      Licensing agreement

  • 22. 
    The term _________ describes the gap between those with access to technology and those without.
    • A. 

      Digital divide

    • B. 

      Computer addiction

    • C. 

      E-trash

    • D. 

      Eco-label

    • E. 

      Burnout

  • 23. 
                    A word, phrase, symbol, or design that identifies a good or service and uses the symbol ®.
    • A. 

      Patent

    • B. 

      Docking station

    • C. 

      Copyright

    • D. 

      Trademark

    • E. 

      Head-pointing system

  • 24. 
    What is used to protect an invention.
    • A. 

      Patent

    • B. 

      Docking station

    • C. 

      Copyright

    • D. 

      Trademark

    • E. 

      Head-pointing system

  • 25. 
    What is used by computer users who wish to utilize conventional hardware with their notebook computers.
    • A. 

      Patent

    • B. 

      Docking station

    • C. 

      Copyright

    • D. 

      Trademark

    • E. 

      Head-pointing system

Back to Top Back to top