Quiz 1
Which type of service provides access to information,
applications, and storage over the Internet?
Bulletin Boards
Blogs
Cloud Computing
FTP
Question 2. Question
: Which term refers to software
products which promote free distribution, copying, and user modification, such
as the Open Office Suite and the Firefox Web Browser?
Cloud Computing
Open Source Software
Shareware
Software as a Service (SAS)
Web Client Computing
Question 3. Question
: Which is the hardware
component inside a computer is an area which temporarily holds data to be
processed, stored, or output?
: BIOS
Data Bus
Memory/Main Memory/Primary Storage
Processor/Central Processing Unit
Storage/Secondary Storage
Question 4. Question
: Which of the following is an
example of system software?
Adobe Photoshop
AOL Instant Messanger
Microsoft Windows
Microsoft Word
World of Warcraft
Question 5. Question
: A megabyte is the same as
which of the following?
1,048,576 bits
2 to the power of 10 (= 1,024) Kilobytes
Exactly one million bytes
One half of a Gigabyte
Two Terabytes
Question 6. Question
: How many unique values may a
byte represent?
8
16
256
1,000
1,024
Question 7. Question
: Which of the following is the
Extended ASCII code for the asterisk “*”in binary (base 2)?
0000 0000
0000 0001
0011 0001
0010 1010
1111 1111
Question 8. Question
: Which type of computer program
converts and executes one statement of a program at time while the program is
running?
Complier
Database
Interpreter
Operating System
Spreadsheet
Question 9. Question
: Which part of a microprocessor
fetches each instruction of a program, interprets what needs to be done, and
makes the ALU perform the needed operation?
Arithmetic Logic Unit
Cache
Control Unit
Instruction Pointer
Registers
Question 10. Question
: Which term refers to any
method to confirm a person’s identity based upon something they know, possess,
or are?
Authentication Protocol
Authorization Protocol
Electoral College
User ID
Validation Procedure
Question 11. Question
: Who wrote the Open Access
Manifesto?
Aaron Swartz
Anne Rand
Bill Gates
EjiYoshilowa
Steve Jobs
Question 12. Question
: Which term refers to an image
on a web page which contains an advertisement, and which is typically a
clickable link to another web site?
Anchor
Banner
Dial Home Device
Smart Auto Dialer
Spam
Quiz 2
In the computer industry, which term refers to the physical
size and dimensions of a component?
Bus Speed
Clock Speed
Form Factor
Service Life
Storage Capacity
Question 2. Question
: A processor with which of the
following word sizes would be able to manipulate the largest number of bits at
one time?
1 bit
8 bit
16 bit
32 bit
64 bit
Question 3. Question
: Which term specifically refers
to a processor which contains more than one processing unit?
Advanced RISC Processor
CISC Processor
Multi-core Processor
Multi-level Cache Processor
RISC Processor
Question 4. Question
: Which term is the correct name
for the magnetic media used in hard disk drives, consisting of a flat, rigid
disk made of glass or aluminum and coated with iron oxide particles, mounted on
a common spindle, and spun under the read/write heads?
Cookies
Plates
Platters
Rims
Saucers
Question 5. Question
: What is the estimated reliable
life span of data stored on magnetic media as cited in the textbook?
: 30 day
3 months
3 years
300 years
3,000 years
Question 6. Question
: Which term refers to the
amount of data a storage device can move per second?
Bandwidth
Clock Speed
Data Transfer Rate
Instructions per Second
Jumps per Second
Question 7. Question
: Which class of printer uses
nozzle like print heads to spray ink unto the paper to from characters and
graphics?
Daisy Wheel Printer
Dot Matrix Printer
Ink Jet Printer
Laser Printer
Thermal Printer
Question 8. Question
: Which term refers to the
number of pixels across a display area horizontally followed by the number of
pixel across it vertically?
Color Depth
Dot Pitch
Screen Resolution
Screen Size
Viewing Angle
Question 9. Question
: Which class of printer uses a
grid of fine wires which strike an ink soaked ribbon against the paper?
Daisy Wheel Printer
Dot Matrix Printer
Ink Jet Printer
Laser Printer
Thermal Printer
Question 10. Question
: Which term refers to a small
plate, which leaves an indelible mark on your computer equipment, and which
contains a unique ID number registered in an international database?
Anchor Plate
Kensington Security Slot
PET ID Chip
STOP (Security Tracking of Office Property)
Plate
Surge Protector
Question 11. Question
: Which term specifically refers
discarded computer hardware and storage media, some of which may contain toxic
substances?
: Downgrades
Kludges
E-waste
Kipple
Scrap
Question 12. Question
: Which military communications
project evolved into the modern Internet?
Area 51
ARPANET
Manhattan Project
Operation Overlord
Project PX
Quiz 3
Which of the following is considered systems software?
Database Management Software
Graphics Systems
Operating Software
Spreadsheet Software
Word Processing Software
Question 2. Question
: Which are the two main classes
of software?
Compilers and Utilities
Productivity and Games
System and Application
System and Network
Utilities and Application
Question 3. Question
: Which type of application
software are Microsoft PowerPoint ,andOpenOffice Impress?
Database
Presentation Software
Spreadsheet
Word Processor
Web Browser
Question 4. Question
: Which type of application
software are Microsoft Word and OpenOffice Writer?
Database
Presentation Software
Spreadsheet
Word Processor
Web Browser
Question 5. Question
: Which type of program is
specifically designed to reside on a computer hard disk?
: Cloud Computing Application
Distributed Application
Local Application
Portable Application
Web Application
Question 6. Question
: Which term refers to a program
used to guide you through the steps to install an application on a computer?
App
Rootkit
Setup Program
Utility Program
Web App
Question 7. Question
: Which type of software license
allows the software to be used on all computers at a specified location?
Multiple-User License
Shrink Wrap License
Single User License
Site License
Unlimited Local License
Question 8. Question
: Which term refers to a form of
legal protection that grants the author of an original work, such as software,
an exclusive right to copy, distribute, sell, and modify that work?
Copyright
Intellectual Property
Freedom of Expression/Speech
Piracy Act of 1820
Writ of Mandamus
Question 9. Question
: Which term refers to a
database of virus signatures and other data to help identify malware?
Defensive Target Database
Hostile Force Roster
Key Logger
Menace Registry
Virus Definitions
Question 10. Question
: Which class of software is a
program that seems to perform one function while actually doing something else?
Bot
Computer Virus
Trojan Horse
Worm
Zombie
Question 11. Question
: Which terms are web jargon for
pirated (illegally copied) software?
appz and warez
bit torrents or torrents
open source code
usenet and usenet groups
wiki apps or wiki code
Question 12. Question
: Which reporter converted an
M-88 tank into a high tech mobile news room to cover Operation Iraqi Freedom,
but died during the conflict?
Arthur Miller
David Bloom
Ethel Gahwhiler
Jeff Raucher
Irving L. Levine
Quiz 4
Which term refers to the operating system process and memory
management that allows two or more tasks, jobs, or programs to run
simultaneously?
Coordinating
Exclusivity
Logistics Control
Mutli-tasking
Non-Conflicting Allocation
Question 2. Question
: Which term refers to the time
between when the coputer is first turned on and the time it is ready to accept
commands?
: Cold Start Process
Boot Up Process
Ignition Process
Start Up Process
Wake Up Cycle
Question 3. Question
: In which year was Microsoft
Window version 1 released?
1982
1985
1991
1992
1995
Question 4. Question
: Which operating system was released
for free use under a GPL (General Public License) in 1991 and is loosely based
upon a UINX derived operating system?
Android OS
DOS (Disk Operating System)
Linux
Mac OS X
Windows 7
Question 5. Question
: Given the pathname
“C:UsersBobDocumentsThesis.Doc”, which of the following is the
name of the subdirectory of Bob?
C:
Users
Bob
Documents
.Doc
Question 6. Question
: In Windows, which file
extensions correspond to the main executable file for a computer program?
.ACCDB, .ODB
.BMP, .GIF, .JPG
.EXE, .COM
.HTM, .HTML
.WAV, .MP3
Question 7. Question
: Which is a technique for
writing an optical disc such as a CD, DVD, or BD, which only allows recording
to be done in single session?
Disc Mastering
Incremental Burning
Packet Writing
Packet Ripping
Packet Stamping
Question 8. Question
: Which type utility software helps
regain performance by rearranging files on a disk so they are stored in
contiguous clusters?
Backup Utility
Disk Defragmenter
Disk Restorer
File Sector Editor
File Unifier
Question 9. Question
: Which term refers to a
bit-by-bit copy of all data from all sectors of a hard disk?
Disk Image
Full Backup
Incremental Backup
Restore Disk
Restore Point
Question 10. Question
: Which general type of disk is
a removable storage medium that can contains enough of the operating systems
files that it be used to boot the computer without accessing the hard drive?
Boot Disk
Backup Disk
Emergency Disk
Restore Disk
Restore Point
Question 11. Question
: Robert Morris, who released a
worm which brought down the ARPANET in 1988, received which sentence for this
crime?
None
400 hours of community service and $10,000
fine
5 years probation and $10,000 fine
10 years in prison
15 years to life in prison
Question 12. Question
: Which term refers to an
irresistible or web site containing fake information that allows investigators
to monitor hackers until identification is possible?
: Bait
Bear Trap
Fly Trap
Honey Pot
Siren
Quiz 5
In the context of the technology of computer networks, which
term refers to a set of rules for efficiently transmitting data from one
network node to another?
Bus Contention Resolution
Communications Protocols
Netiquette
Rules of Order
Signaling Procedures
Question 2. Question
: Which term refers to a unique
number, permanently hardwired into a NIC (Network Interface Card) at its time
of manufacture, which uniquely identifies that NIC on the local area network?
DHD Coordinate
IP Address
MAC (Media Access Control) Address
Network Address Translation
Uniform Resource Locator
Question 3. Question
: Which device can be used to
provide a wired Ethernet connection for a device without a Network Interface
Card?
Connectivity Plug In
Data-Link Adapter
Ethernet Adapter
Video Interface Card
Wi-Fi transceiver
Question 4. Question
: Which type of WI-FI
configuration allows all devices to broadcast directly to each other?
:
WIreless Ad Hoc
Wireless Discovery Mode
Wireless Filibuster Mode
Wireless Infrastructure
Wireless Token Ring
Question 5. Question
: Which technology makes
intercepted WI-FI signals useless to eavesdroppers/interceptors?
Cyclical Redundancy Checks (CRC)
Electronic Countermeasures
Error Correcting Codes
Firewalls
Wireless Encryption
Question 6. Question
: Which type of wireless network
uses a centralized broadcasting device, such as an access point or wireless
router?
DRLN (Direct Radio Link Network)
IEEE 802.3
Wireless Ad Hoc Network
Wireless Infrastructure Network
Wormhole Network
Question 7. Question
: Which type of device can
connect a printer which does not have its own NIC to a network, without
attaching it to a workstation?
A/B Switch
Print Buffer
Print Server
Printer Network Switch
Printer Router
Question 8. Question
: Which is not cited by the
textbook as an advantage of using a local area network?
: LANs enable people to work together.
Sharing software can reduce costs.
Sharing data can increase productivity.
Sharing network hardware can reduce costs.
LANs increase security and make intrusion
more difficult.
Question 9. Question
: Which is the official term of
the encoded text of a message after it has been encrypted?
Cipher text
Clear text
Plaintext
Safetext
Transformed text
Question 10. Question
: Which is the official term of
the original text of a message before it has been encrypted?
Base text
Cipher text
Original text
Plain text
Source text
Question 11. Question
: Which brand of hand held
devices was found in 2011 to keep time stamped, triangulated position data,
essentially keeping a log of the location of the user carrying them?
Kindle E-Reader
Apple iPad
Apple iPhone
Nook E-Reader
Sportsman’s Diving Watches
Question 12. Question
: Computer Aided Instruction
(CAI) was developed in the 1960s based on the work of which educational
theorists?
Abraham Maslow and Benjamin Bloom
Alan Turing and John Von Neumann
B. F. Skinner and Ivan Pavlov
Fox Molder and Dana Scully
Fritz Pearl and William Rogers
How many bits are in a current (IPv4) IP address?
: 2
16
32
128
1,024
Question 2. Question
: Which is the official term for
a type of IP address which is intended to remain the same, so it can be used
for web or mail server?
Always On IP Address
Continuous IP Address
Dynamic IP Address
Stable IP Address
Static IP Address
Question 3. Question
: Which type of fixed Internet
Connection has the slowest maximum speed (capacity)?
Cable
Dial Up
DSL
ISDN
Satellite
Question 4. Question
: What is the theoretical
(ideal) transfer speed for a 56 kbps modem?
5 bps
560 bps
56 Kbps
5 Mbps
1 Gbps
Question 5. Question
: Which level of cell phone
service allows users to view simplified versions of some popular web pages, but
not the all pages nor full pages?
Analog
1G
2G
Mobile Broadband
WAP
Question 6. Question
: Which level of cell phone
service is needed to access the full versions of all web pages?
Analog
1G
2G
Mobile Broadband
WAP
Question 7. Question
: Which Internet service is a file
sharing protocol which distributes the role of a file server across a
collection of dispersed computers, and clients exchange parts of files with
each other?
: Bit Torrent
Instant Messenger
FTP
Telnet
Wiki
Question 8. Question
: Which term refers to the
concept of using local devices to access applications, storage, and other
computing resources supplied by Internet-based servers, rather than from their
local devices?
Cloud Computing
Distributed Computing
Net Retrieval
Parallel Processing
Remote Storage
Question 9. Question
: In the context of computer
networks, which term refers to a hardware or software device specifically
designed to filter out suspicious packets attempting to enter or leave a
computer?
: Chinese wall
Firewall
Kensington Security Shell
Router
Switch
Question 10. Question
: Which technology uses
encryption to allow you to securely access private, corporate computer assets
remotely, even passing through unsecured public computers and networks?
Anchor Port
Kensington Security Shell
STOP (Security Tracking of Office Property)
Port
Telent
Virtual Private Networks
Question 11. Question
: Wgucg country has attempted to
control internet access to suppress political communications?
Egypt
Iran
Libya
All of these
Question 12. Question
: Which computer pioneer first
suggested using mechanical computers to process check clearing in 1832?
Ada Byron Countess of Lovelace
Alan Turing
Bill Gates
Charles Babbage
Grace Murray Hopper
Quiz 7
The web address “http://www.saintleo.edu” is which
type of identification?
DHD Coordinate
IP Address
MAC (Media Access Control) Address
SSID (Service Set Identifier)
URL (Uniform Resource Locator)
Question 2. Question
: Web pages are text files,
formatted using a standard set of tags called which of the following?
FTP
HTML
INTP
LaTex
WWW
Question 3. Question
: In the context of a search
engine query, the terms “AND”, “OR”, and “NOT”
which combine or modify search criteria are called which of the following?
: Adverbial Clauses
Boolean Operators
Conditional Switches
Conjunctions
Disjunctive Modifiers
Question 4. Question
: Which term refers to a game in
which players try to come up with a two search term combination which will
cause a search engine to produce exactly one result?
Engine Tipping
Game of Kevin Bacon
Googlewhacking
Game of NIHM
Search Forcing
Question 5. Question
: Which type of e-commerce
business model are Craigslist dot Com and Ebay dot Com?
B2B (Business to Business)
B2C (Business to Consumer)
B2G (Business to Government)
C2C (Consumer to Consumer)
G2C (Government to Consumer)
Question 6. Question
: Which type of e-commerce
business model is Amazon dot Com?
B2B (Business to Business)
B2C (Business to Consumer)
B2G (Business to Government)
C2C (Consumer to Consumer)
G2C (Government to Consumer)
Question 7. Question
: Which protocol handles the
incoming e-mail and leaves message on the server even after they have been read
until the user explicitly deletes them?
: File Transfer Protocol (FTP)
Internet Message Access Protocol (IMAP)
Post Office Protocol version 3 (POP3)
Simple Mail Transfer Protocol (SMTP)
Telnet
Question 8. Question
: Which term refers to e-mail which
contains HTML tags to format the text with fonts, colors, and effects and embed
graphics?
ASCII Mail
Extended Format Mail
HTML Mail
XML Mail
Web Mail
Question 9. Question
: Which type of computer crime involves
corrupting a DNS server’s database so that URLs are mapped to cloned websites?
: Ad Serving Cookie
Pharming
Phishing
Spam
Web Bug
Question 10. Question
: Which of the following terms
refers to unwanted, form letter type e-mail, typically advertisements, that
arrive unsolicited?
Ad Serving Cookie
Pharming
Phishing
Spam
Web Bug
Question 11. Question
: Which Law prohibits the use of
intercepted e-mail from being used as evidence unless a judge issues a search
warrant?
Digital Millennium Copyright Act
Electronic Communications Privacy Act of 2000
Forth Amendment to the U. S. Constitution
Patriot Act of 2001
Piracy Act of 1820
Question 12. Question
: How many bits of data may an
RFID tag contain?
1 to 4 bits
4 to 8 bits
8 to 32 bits
64 to 128 bits
256 to 1,024 bits
What is the sampling rate for commercially produced music
CDs?
441 KHz
4.41 MHz
44.1 MHz
441 MHz
4.41 GHz
Question 2. Question
: Which sound file format is
used on commercially produced audio CDs?
:
AAC
CDDA
MP3
OggVorbis
WAV
Question 3. Question
: Which of the following is NOT
a format for storing still bitmap images?
BMP
GIF
JPEG
PNG
SVG
Question 4. Question
: Which term refers to an image
stored set of numbers that describe the contents of all of the individual
pixels in an image?
Bitmap Graphic
Codex Graphic
Holographic Image Graphic
Image Description Language Graphic
Vector Graphic Image
Question 5. Question
: Which type of graphics file
consists of a set of instructions for re-creating a picture?
Assembly Graphic
Bitmap Graphic
Mathimagical Graphic
Raster Graphic
Vector Graphic
Question 6. Question
: Which term refers to the
technique used to convert a vector graphic into a bitmap?
: Bitmapping
Pixilation
Quantization
Rasterization
Ray Tracing
Question 7. Question
: Which term refers to the
general process of converting digital video from one format to another?
: Adaptive Filtering
Barrier Synchronizing
Compression
Synchronizing
Transcoding
Question 8. Question
: Which term refers to a prototype
of a DVD which can be stored on a computer’s hard drive?
DVD Datum
DVD Image
DVD Pattern
DVD Press Template
DVD Transfer Pattern
Question 9. Question
: Which term refers to changing
contents file format to port it to a different device?
Format Shifting
Place Shifting
Porting
Reformatting
Time shifting
Question 10. Question
: Which DRM (Digital Rights
Management) technology is used on Blu-ray discs, encrypts content, using unique
cryptographic keys for each individual player, which can be revoked if the
player is compromised?
:
AACS (Advanced Access Content System)
CSS (Content Scramble System)
FairPlay
HDCP (High-bandwidth Digital Content
Protection)
Region Codes
Question 11. Question
: In which year did the landmark
Betamax decision rule that consumers could tape a television broadcast to watch
it once later?
: 1964
1974
1984
1994
2004
Question 12. Question
: Which film featured the first
30 minutes of computer generated footage?
Jazz Singer (1927)
2001: A Space Odyssey (1968)
Star Wars (1977)
Tron (1982)
Terminator 2 (1989)