Skip to content
Facebook Twitter Instagram
  • +1 (857) 445-0520
  • writehw@gmail.com
  • Home
  • How It Works
  • Reviews
  • FAQs
  • Contact Us
  • Blog
Menu
  • Home
  • How It Works
  • Reviews
  • FAQs
  • Contact Us
  • Blog
Order Now

Saint Com203 All Modules Quizes Latest 2016 All 8 Quizes

  • September 16, 2022
  • 4:10 am
  • No Comments

Quiz 1

Which type of service provides access to information,
applications, and storage over the Internet?

Bulletin Boards

Blogs

Cloud Computing

E-mail

FTP

Question 2. Question
: Which term refers to software
products which promote free distribution, copying, and user modification, such
as the Open Office Suite and the Firefox Web Browser?

Cloud Computing

Open Source Software

Shareware

Software as a Service (SAS)

Web Client Computing

Question 3. Question
: Which is the hardware
component inside a computer is an area which temporarily holds data to be
processed, stored, or output?

: BIOS

Data Bus

Memory/Main Memory/Primary Storage

Processor/Central Processing Unit

Storage/Secondary Storage

Question 4. Question
: Which of the following is an
example of system software?

Adobe Photoshop

AOL Instant Messanger

Microsoft Windows

Microsoft Word

World of Warcraft

Question 5. Question
: A megabyte is the same as
which of the following?

1,048,576 bits

2 to the power of 10 (= 1,024) Kilobytes

Exactly one million bytes

One half of a Gigabyte

Two Terabytes

Question 6. Question
: How many unique values may a
byte represent?

8

16

256

1,000

1,024

Question 7. Question
: Which of the following is the
Extended ASCII code for the asterisk “*”in binary (base 2)?

0000 0000

0000 0001

0011 0001

0010 1010

1111 1111

Question 8. Question
: Which type of computer program
converts and executes one statement of a program at time while the program is
running?

Complier

Database

Interpreter

Operating System

Spreadsheet

Question 9. Question
: Which part of a microprocessor
fetches each instruction of a program, interprets what needs to be done, and
makes the ALU perform the needed operation?

Arithmetic Logic Unit

Cache

Control Unit

Instruction Pointer

Registers

Question 10. Question
: Which term refers to any
method to confirm a person’s identity based upon something they know, possess,
or are?

Authentication Protocol

Authorization Protocol

Electoral College

User ID

Validation Procedure

Question 11. Question
: Who wrote the Open Access
Manifesto?

Aaron Swartz

Anne Rand

Bill Gates

EjiYoshilowa

Steve Jobs

Question 12. Question
: Which term refers to an image
on a web page which contains an advertisement, and which is typically a
clickable link to another web site?

Anchor

Banner

Dial Home Device

Smart Auto Dialer

Spam






Quiz 2

In the computer industry, which term refers to the physical
size and dimensions of a component?

Bus Speed

Clock Speed

Form Factor

Service Life

Storage Capacity

Question 2. Question
: A processor with which of the
following word sizes would be able to manipulate the largest number of bits at
one time?

1 bit

8 bit

16 bit

32 bit

64 bit

Question 3. Question
: Which term specifically refers
to a processor which contains more than one processing unit?

Advanced RISC Processor

CISC Processor

Multi-core Processor

Multi-level Cache Processor

RISC Processor

Question 4. Question
: Which term is the correct name
for the magnetic media used in hard disk drives, consisting of a flat, rigid
disk made of glass or aluminum and coated with iron oxide particles, mounted on
a common spindle, and spun under the read/write heads?

Cookies

Plates

Platters

Rims

Saucers

Question 5. Question
: What is the estimated reliable
life span of data stored on magnetic media as cited in the textbook?

: 30 day

3 months

3 years

300 years

3,000 years

Question 6. Question
: Which term refers to the
amount of data a storage device can move per second?

Bandwidth

Clock Speed

Data Transfer Rate

Instructions per Second

Jumps per Second

Question 7. Question
: Which class of printer uses
nozzle like print heads to spray ink unto the paper to from characters and
graphics?

Daisy Wheel Printer

Dot Matrix Printer

Ink Jet Printer

Laser Printer

Thermal Printer

Question 8. Question
: Which term refers to the
number of pixels across a display area horizontally followed by the number of
pixel across it vertically?

Color Depth

Dot Pitch

Screen Resolution

Screen Size

Viewing Angle

Question 9. Question
: Which class of printer uses a
grid of fine wires which strike an ink soaked ribbon against the paper?

Daisy Wheel Printer

Dot Matrix Printer

Ink Jet Printer

Laser Printer

Thermal Printer

Question 10. Question
: Which term refers to a small
plate, which leaves an indelible mark on your computer equipment, and which
contains a unique ID number registered in an international database?

Anchor Plate

Kensington Security Slot

PET ID Chip

STOP (Security Tracking of Office Property)
Plate

Surge Protector

Question 11. Question
: Which term specifically refers
discarded computer hardware and storage media, some of which may contain toxic
substances?

: Downgrades

Kludges

E-waste

Kipple

Scrap

Question 12. Question
: Which military communications
project evolved into the modern Internet?

Area 51

ARPANET

Manhattan Project

Operation Overlord

Project PX




Quiz 3

 

Which of the following is considered systems software?

Database Management Software

Graphics Systems

Operating Software

Spreadsheet Software

Word Processing Software

Question 2. Question
: Which are the two main classes
of software?

Compilers and Utilities

Productivity and Games

System and Application

System and Network

Utilities and Application

Question 3. Question
: Which type of application
software are Microsoft PowerPoint ,andOpenOffice Impress?

Database

Presentation Software

Spreadsheet

Word Processor

Web Browser

Question 4. Question
: Which type of application
software are Microsoft Word and OpenOffice Writer?

Database

Presentation Software

Spreadsheet

Word Processor

Web Browser

Question 5. Question
: Which type of program is
specifically designed to reside on a computer hard disk?

: Cloud Computing Application

Distributed Application

Local Application

Portable Application

Web Application

Question 6. Question
: Which term refers to a program
used to guide you through the steps to install an application on a computer?

App

Rootkit

Setup Program

Utility Program

Web App

Question 7. Question
: Which type of software license
allows the software to be used on all computers at a specified location?

Multiple-User License

Shrink Wrap License

Single User License

Site License

Unlimited Local License

Question 8. Question
: Which term refers to a form of
legal protection that grants the author of an original work, such as software,
an exclusive right to copy, distribute, sell, and modify that work?

Copyright

Intellectual Property

Freedom of Expression/Speech

Piracy Act of 1820

Writ of Mandamus

Question 9. Question
: Which term refers to a
database of virus signatures and other data to help identify malware?

Defensive Target Database

Hostile Force Roster

Key Logger

Menace Registry

Virus Definitions

Question 10. Question
: Which class of software is a
program that seems to perform one function while actually doing something else?

Bot

Computer Virus

Trojan Horse

Worm

Zombie

Question 11. Question
: Which terms are web jargon for
pirated (illegally copied) software?

appz and warez

bit torrents or torrents

open source code

usenet and usenet groups

wiki apps or wiki code

Question 12. Question
: Which reporter converted an
M-88 tank into a high tech mobile news room to cover Operation Iraqi Freedom,
but died during the conflict?

Arthur Miller

David Bloom

Ethel Gahwhiler

Jeff Raucher

Irving L. Levine






Quiz 4

Which term refers to the operating system process and memory
management that allows two or more tasks, jobs, or programs to run
simultaneously?

Coordinating

Exclusivity

Logistics Control

Mutli-tasking

Non-Conflicting Allocation

Question 2. Question
: Which term refers to the time
between when the coputer is first turned on and the time it is ready to accept
commands?

: Cold Start Process

Boot Up Process

Ignition Process

Start Up Process

Wake Up Cycle

Question 3. Question
: In which year was Microsoft
Window version 1 released?

1982

1985

1991

1992

1995

Question 4. Question
: Which operating system was released
for free use under a GPL (General Public License) in 1991 and is loosely based
upon a UINX derived operating system?

Android OS

DOS (Disk Operating System)

Linux

Mac OS X

Windows 7

Question 5. Question
: Given the pathname
“C:UsersBobDocumentsThesis.Doc”, which of the following is the
name of the subdirectory of Bob?

C:

Users

Bob

Documents

.Doc

Question 6. Question
: In Windows, which file
extensions correspond to the main executable file for a computer program?

.ACCDB, .ODB

.BMP, .GIF, .JPG

.EXE, .COM

.HTM, .HTML

.WAV, .MP3

Question 7. Question
: Which is a technique for
writing an optical disc such as a CD, DVD, or BD, which only allows recording
to be done in single session?

Disc Mastering

Incremental Burning

Packet Writing

Packet Ripping

Packet Stamping

Question 8. Question
: Which type utility software helps
regain performance by rearranging files on a disk so they are stored in
contiguous clusters?

Backup Utility

Disk Defragmenter

Disk Restorer

File Sector Editor

File Unifier

Question 9. Question
: Which term refers to a
bit-by-bit copy of all data from all sectors of a hard disk?

Disk Image

Full Backup

Incremental Backup

Restore Disk

Restore Point

Question 10. Question
: Which general type of disk is
a removable storage medium that can contains enough of the operating systems
files that it be used to boot the computer without accessing the hard drive?

Boot Disk

Backup Disk

Emergency Disk

Restore Disk

Restore Point

Question 11. Question
: Robert Morris, who released a
worm which brought down the ARPANET in 1988, received which sentence for this
crime?

None

400 hours of community service and $10,000
fine

5 years probation and $10,000 fine

10 years in prison

15 years to life in prison

Question 12. Question
: Which term refers to an
irresistible or web site containing fake information that allows investigators
to monitor hackers until identification is possible?

: Bait

Bear Trap

Fly Trap

Honey Pot

Siren






Quiz 5

In the context of the technology of computer networks, which
term refers to a set of rules for efficiently transmitting data from one
network node to another?

Bus Contention Resolution

Communications Protocols

Netiquette

Rules of Order

Signaling Procedures

Question 2. Question
: Which term refers to a unique
number, permanently hardwired into a NIC (Network Interface Card) at its time
of manufacture, which uniquely identifies that NIC on the local area network?

DHD Coordinate

IP Address

MAC (Media Access Control) Address

Network Address Translation

Uniform Resource Locator

Question 3. Question
: Which device can be used to
provide a wired Ethernet connection for a device without a Network Interface
Card?

Connectivity Plug In

Data-Link Adapter

Ethernet Adapter

Video Interface Card

Wi-Fi transceiver

Question 4. Question
: Which type of WI-FI
configuration allows all devices to broadcast directly to each other?

:
WIreless Ad Hoc

Wireless Discovery Mode

Wireless Filibuster Mode

Wireless Infrastructure

Wireless Token Ring

Question 5. Question
: Which technology makes
intercepted WI-FI signals useless to eavesdroppers/interceptors?

Cyclical Redundancy Checks (CRC)

Electronic Countermeasures

Error Correcting Codes

Firewalls

Wireless Encryption

Question 6. Question
: Which type of wireless network
uses a centralized broadcasting device, such as an access point or wireless
router?

DRLN (Direct Radio Link Network)

IEEE 802.3

Wireless Ad Hoc Network

Wireless Infrastructure Network

Wormhole Network

Question 7. Question
: Which type of device can
connect a printer which does not have its own NIC to a network, without
attaching it to a workstation?

A/B Switch

Print Buffer

Print Server

Printer Network Switch

Printer Router

Question 8. Question
: Which is not cited by the
textbook as an advantage of using a local area network?

: LANs enable people to work together.

Sharing software can reduce costs.

Sharing data can increase productivity.

Sharing network hardware can reduce costs.

LANs increase security and make intrusion
more difficult.

Question 9. Question
: Which is the official term of
the encoded text of a message after it has been encrypted?

Cipher text

Clear text

Plaintext

Safetext

Transformed text

Question 10. Question
: Which is the official term of
the original text of a message before it has been encrypted?

Base text

Cipher text

Original text

Plain text

Source text

Question 11. Question
: Which brand of hand held
devices was found in 2011 to keep time stamped, triangulated position data,
essentially keeping a log of the location of the user carrying them?

Kindle E-Reader

Apple iPad

Apple iPhone

Nook E-Reader

Sportsman’s Diving Watches

Question 12. Question
: Computer Aided Instruction
(CAI) was developed in the 1960s based on the work of which educational
theorists?

Abraham Maslow and Benjamin Bloom

Alan Turing and John Von Neumann

B. F. Skinner and Ivan Pavlov

Fox Molder and Dana Scully

Fritz Pearl and William Rogers

quiz 6

How many bits are in a current (IPv4) IP address?

: 2

16

32

128

1,024

Question 2. Question
: Which is the official term for
a type of IP address which is intended to remain the same, so it can be used
for web or mail server?

Always On IP Address

Continuous IP Address

Dynamic IP Address

Stable IP Address

Static IP Address

Question 3. Question
: Which type of fixed Internet
Connection has the slowest maximum speed (capacity)?

Cable

Dial Up

DSL

ISDN

Satellite

Question 4. Question
: What is the theoretical
(ideal) transfer speed for a 56 kbps modem?

5 bps

560 bps

56 Kbps

5 Mbps

1 Gbps

Question 5. Question
: Which level of cell phone
service allows users to view simplified versions of some popular web pages, but
not the all pages nor full pages?

Analog

1G

2G

Mobile Broadband

WAP

Question 6. Question
: Which level of cell phone
service is needed to access the full versions of all web pages?

Analog

1G

2G

Mobile Broadband

WAP

Question 7. Question
: Which Internet service is a file
sharing protocol which distributes the role of a file server across a
collection of dispersed computers, and clients exchange parts of files with
each other?

: Bit Torrent

Instant Messenger

FTP

Telnet

Wiki

Question 8. Question
: Which term refers to the
concept of using local devices to access applications, storage, and other
computing resources supplied by Internet-based servers, rather than from their
local devices?

Cloud Computing

Distributed Computing

Net Retrieval

Parallel Processing

Remote Storage

Question 9. Question
: In the context of computer
networks, which term refers to a hardware or software device specifically
designed to filter out suspicious packets attempting to enter or leave a
computer?

: Chinese wall

Firewall

Kensington Security Shell

Router

Switch

Question 10. Question
: Which technology uses
encryption to allow you to securely access private, corporate computer assets
remotely, even passing through unsecured public computers and networks?

Anchor Port

Kensington Security Shell

STOP (Security Tracking of Office Property)
Port

Telent

Virtual Private Networks

Question 11. Question
: Wgucg country has attempted to
control internet access to suppress political communications?

Egypt

Iran

Libya

All of these

Question 12. Question
: Which computer pioneer first
suggested using mechanical computers to process check clearing in 1832?

Ada Byron Countess of Lovelace

Alan Turing

Bill Gates

Charles Babbage

Grace Murray Hopper



Quiz 7

The web address “http://www.saintleo.edu” is which
type of identification?

DHD Coordinate

IP Address

MAC (Media Access Control) Address

SSID (Service Set Identifier)

URL (Uniform Resource Locator)

Question 2. Question
: Web pages are text files,
formatted using a standard set of tags called which of the following?

FTP

HTML

INTP

LaTex

WWW

Question 3. Question
: In the context of a search
engine query, the terms “AND”, “OR”, and “NOT”
which combine or modify search criteria are called which of the following?

: Adverbial Clauses

Boolean Operators

Conditional Switches

Conjunctions

Disjunctive Modifiers

Question 4. Question
: Which term refers to a game in
which players try to come up with a two search term combination which will
cause a search engine to produce exactly one result?

Engine Tipping

Game of Kevin Bacon

Googlewhacking

Game of NIHM

Search Forcing

Question 5. Question
: Which type of e-commerce
business model are Craigslist dot Com and Ebay dot Com?

B2B (Business to Business)

B2C (Business to Consumer)

B2G (Business to Government)

C2C (Consumer to Consumer)

G2C (Government to Consumer)

Question 6. Question
: Which type of e-commerce
business model is Amazon dot Com?

B2B (Business to Business)

B2C (Business to Consumer)

B2G (Business to Government)

C2C (Consumer to Consumer)

G2C (Government to Consumer)

Question 7. Question
: Which protocol handles the
incoming e-mail and leaves message on the server even after they have been read
until the user explicitly deletes them?

: File Transfer Protocol (FTP)

Internet Message Access Protocol (IMAP)

Post Office Protocol version 3 (POP3)

Simple Mail Transfer Protocol (SMTP)

Telnet

Question 8. Question
: Which term refers to e-mail which
contains HTML tags to format the text with fonts, colors, and effects and embed
graphics?

ASCII Mail

Extended Format Mail

HTML Mail

XML Mail

Web Mail

Question 9. Question
: Which type of computer crime involves
corrupting a DNS server’s database so that URLs are mapped to cloned websites?

: Ad Serving Cookie

Pharming

Phishing

Spam

Web Bug

Question 10. Question
: Which of the following terms
refers to unwanted, form letter type e-mail, typically advertisements, that
arrive unsolicited?

Ad Serving Cookie

Pharming

Phishing

Spam

Web Bug

Question 11. Question
: Which Law prohibits the use of
intercepted e-mail from being used as evidence unless a judge issues a search
warrant?

Digital Millennium Copyright Act

Electronic Communications Privacy Act of 2000

Forth Amendment to the U. S. Constitution

Patriot Act of 2001

Piracy Act of 1820

Question 12. Question
: How many bits of data may an
RFID tag contain?

1 to 4 bits

4 to 8 bits

8 to 32 bits

64 to 128 bits

256 to 1,024 bits

Quiz 8

What is the sampling rate for commercially produced music
CDs?

441 KHz

4.41 MHz

44.1 MHz

441 MHz

4.41 GHz

Question 2. Question
: Which sound file format is
used on commercially produced audio CDs?

:
AAC

CDDA

MP3

OggVorbis

WAV

Question 3. Question
: Which of the following is NOT
a format for storing still bitmap images?

BMP

GIF

JPEG

PNG

SVG

Question 4. Question
: Which term refers to an image
stored set of numbers that describe the contents of all of the individual
pixels in an image?

Bitmap Graphic

Codex Graphic

Holographic Image Graphic

Image Description Language Graphic

Vector Graphic Image

Question 5. Question
: Which type of graphics file
consists of a set of instructions for re-creating a picture?

Assembly Graphic

Bitmap Graphic

Mathimagical Graphic

Raster Graphic

Vector Graphic

Question 6. Question
: Which term refers to the
technique used to convert a vector graphic into a bitmap?

: Bitmapping

Pixilation

Quantization

Rasterization

Ray Tracing

Question 7. Question
: Which term refers to the
general process of converting digital video from one format to another?

: Adaptive Filtering

Barrier Synchronizing

Compression

Synchronizing

Transcoding

Question 8. Question
: Which term refers to a prototype
of a DVD which can be stored on a computer’s hard drive?

DVD Datum

DVD Image

DVD Pattern

DVD Press Template

DVD Transfer Pattern

Question 9. Question
: Which term refers to changing
contents file format to port it to a different device?

Format Shifting

Place Shifting

Porting

Reformatting

Time shifting

Question 10. Question
: Which DRM (Digital Rights
Management) technology is used on Blu-ray discs, encrypts content, using unique
cryptographic keys for each individual player, which can be revoked if the
player is compromised?

:
AACS (Advanced Access Content System)

CSS (Content Scramble System)

FairPlay

HDCP (High-bandwidth Digital Content
Protection)

Region Codes

Question 11. Question
: In which year did the landmark
Betamax decision rule that consumers could tape a television broadcast to watch
it once later?

: 1964

1974

1984

1994

2004

Question 12. Question
: Which film featured the first
30 minutes of computer generated footage?

Jazz Singer (1927)

2001: A Space Odyssey (1968)

Star Wars (1977)

Tron (1982)

Terminator 2 (1989)

Share on facebook
Facebook
Share on google
Google+
Share on twitter
Twitter
Share on linkedin
LinkedIn
Share on pinterest
Pinterest

All Posts »
PrevPreviousTrident Log302 Module 1 Case 2
NextSaint Com203 Quize 2 Latest 2016Next

Leave a Reply Cancel reply

You must be logged in to post a comment.

Homework Due?

Place Your Order Today

Place Order
Providing custom academic papers covers any academic levels, paper formats, and subjects.

Courses

  • English
  • History
  • Biology
  • Literature
  • Business
  • Mathematics

Quick Links

  • Home
  • How it Works
  • Reviews
  • FAQs
  • Contact
  • Blog

Legal & Payments

IntaSend Secure Payments (PCI-DSS Compliant) Secured by IntaSend Payments

© All rights reserved

Made with ❤ by Academic Websites