read.pudn.comread.pudn.com › downloads218 › doc › 1028202 › certifica…  · web view2....

50
1 . Results produced by a computer are known as (a) hardwa re (b) output (c) device s (d) input Correct answer is (b ) Your score on this question is: 1.00 Feedbac k: See Chapter 1, page 5, in the course textbook. 2 . Information transferred to a computer from an external source such as a mouse or keyboard is known as (a) output (b) hardwar e (c) softwar e (d) input Correct answer is (d ) Your score on this question is: 1.00 Feedbac k: See Chapter 1, page 11, in the course textbook. 3 . Which of the following is (are) true regarding computer input? I. Input can be supplied to a computer by another

Upload: others

Post on 24-Jun-2020

4 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: read.pudn.comread.pudn.com › downloads218 › doc › 1028202 › Certifica…  · Web view2. Information transferred to a computer from an external source such as a mouse or keyboard

1. Results produced by a computer are known as

 (a) hardware

 (b) output

 (c) devices

 (d) inputCorrect answer is (b)Your score on this question is:1.00Feedback:

   

See Chapter 1, page 5, in the course textbook.

   

2. Information transferred to a computer from an external source such as a mouse or keyboard is known as

 (a) output

 (b) hardware

 (c) software

 (d) inputCorrect answer is (d)Your score on this question is:1.00Feedback:

   

See Chapter 1, page 11, in the course textbook.

   

3. Which of the following is (are) true regarding computer input?

I. Input can be supplied to a computer by another computer.

II. Input can be supplied to a computer by the environment.

 (a) None

 (b) II only

 (c) I and II

 (d) I onlyCorrect answer is (c)Your score on this question is:1.00Feedback:

   

See Chapter 1, page 4, in the course textbook.

   

Page 2: read.pudn.comread.pudn.com › downloads218 › doc › 1028202 › Certifica…  · Web view2. Information transferred to a computer from an external source such as a mouse or keyboard

4. The series of instructions that cause a computer to perform processing tasks is referred to as a

 (a) device

 (b) CPU

 (c) program

 (d) byteCorrect answer is (c)Your score on this question is:1.00Feedback:    

See Chapter 1, page 4, in the course textbook.

   

5. Which of the following is (are) true about use of the terms memory and storage with regard to computers?

I. Memory generally refers to an area of a computer that temporarily holds data waiting for processing, storage, or output.

II. Storage generally refers to an area of a computer where data is held on a permanent basis.

 (a) II only

 (b) None

 (c) I and II

 (d) I onlyCorrect answer is (c)Your score on this question is:1.00Feedback:    

See Chapter 1, page 5, in the course textbook.

   

6. Which of the following is (are) true about RAM?

I. It is the kind of memory where data can be stored on a permanent basis.

II. It can store a series of instructions for a computing task.

 (a) I and II

 (b) None

 (c) I only

 (d) II onlyCorrect answer is (d)Your score on this question is:1.00

Page 3: read.pudn.comread.pudn.com › downloads218 › doc › 1028202 › Certifica…  · Web view2. Information transferred to a computer from an external source such as a mouse or keyboard

Feedback:    

See Chapter 1, page 5, in the course textbook.

   

7. Which of the following is (are) true of vacuum tubes?

I. They typically respond faster than mechanical components.II. They burn out more quickly than transistors.

III. They were replaced by transistors.

 (a) II only

 (b) I and III only

 (c) I, II, and III

 (d) II and III onlyCorrect answer is (c)Your score on this question is:0.00Feedback:    

See section 1.2.1, subsection "1940s–Vacuum Tubes" and "1950s–Transistors," in the course notes.

   

8. A degree in _____ focuses on the design of computer hardware and peripheral devices, often at the chip level.

 (a) information systems

 (b) software engineering

 (c) computer engineering

 (d) computer scienceCorrect answer is (c)Your score on this question is:1.00Feedback:    

See Chapter 8, page 416, in the course textbook.

   

9. Which of the following is a mechanical calculator invented in the 1600s that used wheels to move counters?

 (a) Jacquard loom

 (b) Hollerith's machine

 (c) Pascaline

 (d) Abacus

Page 4: read.pudn.comread.pudn.com › downloads218 › doc › 1028202 › Certifica…  · Web view2. Information transferred to a computer from an external source such as a mouse or keyboard

Correct answer is (c)Your score on this question is:1.00Feedback:

   

See section 1.2.1, subsection "1600s–Mechanical Calculators," in the course notes.

   

10. Typical functions performed by customer-relationship management software include which of the following?

I. Collecting information on customer demographicsII. Personalizing Web site content for customers

III. Tracking purchasing behavior of customers

 (a) II and III only

 (b) II only

 (c) I, II, and III

 (d) I and III onlyCorrect answer is (c)Your score on this question is:1.00Feedback:

   

See section 1.2.2, subsection "In Business," in the course notes.

   

11. In which category are IT companies that create operating systems, programming languages, and applications?

 (a) Equipment manufacturers

 (b) Software publishers

 (c) Chipmakers

 (d) RetailersCorrect answer is (b)Your score on this question is:1.00Feedback:

   

See Chapter 8, page 398, in the course textbook.

   

12. Which of the following is (are) manufactured by companies in the computer industry?

I. Personal ComputersII. High-end Workstations

III. Servers

Page 5: read.pudn.comread.pudn.com › downloads218 › doc › 1028202 › Certifica…  · Web view2. Information transferred to a computer from an external source such as a mouse or keyboard

 (a) I and III only

 (b) II and III only

 (c) I, II, and III

 (d) I and II onlyCorrect answer is (c)Your score on this question is:1.00Feedback:

   

See Chapter 8, page 397, in the course textbook.

   

13. Computers represent numeric data using the _____ number system.

 (a) ASCII

 (b) digital

 (c) binary

 (d) analogCorrect answer is (c)Your score on this question is:1.00Feedback:

   

See Chapter 2, page 59, in the course textbook.

   

14. The 1s and 0s that a digital device works with are referred to as _____ digits.

 (a) index

 (b) analog

 (c) binary

 (d) masterCorrect answer is (c)Your score on this question is:1.00Feedback:

   

See Chapter 2, page 58, in the course textbook.

   

15. The list of instructions that a microprocessor can perform is called its _____ set.

 (a) master

 (b) instruction

Page 6: read.pudn.comread.pudn.com › downloads218 › doc › 1028202 › Certifica…  · Web view2. Information transferred to a computer from an external source such as a mouse or keyboard

 (c) index

 (d) wordCorrect answer is (b)Your score on this question is:1.00Feedback:

   

See Chapter 2, page 67, in the course textbook.

   

16. The _____ speed specifications in computer ads indicate the speed of the microprocessor.

 (a) register

 (b) clock

 (c) cache

 (d) control unitCorrect answer is (b)Your score on this question is:1.00Feedback:

   

See Chapter 2, page 67, in the course textbook.

   

17. The ALU uses _____ to hold data that is being processed.

 (a) cache

 (b) registers

 (c) words

 (d) control unitsCorrect answer is (b)Your score on this question is:1.00Feedback:

   

See Chapter 2, page 67, in the course textbook.

   

18. Which of the following statements regarding microprocessors is (are) true?

I. Microprocessor word size refers to the number of bits that can be manipulated at one time.

II. A 1-gigahertz microprocessor executes 1 million cycles per second.

 (a) None

Page 7: read.pudn.comread.pudn.com › downloads218 › doc › 1028202 › Certifica…  · Web view2. Information transferred to a computer from an external source such as a mouse or keyboard

 (b) I and II

 (c) I only

 (d) II onlyCorrect answer is (c)Your score on this question is:1.00Feedback:    

See Chapter 2, page 67, in the course textbook.

   

19. Which of the following statements regarding RAM is (are) true?

I. Hard drive capacity is usually larger than RAM capacity.

II. RAM is typically a single chip or circuit board that plugs into the motherboard.

 (a) II only

 (b) I only

 (c) None

 (d) I and IICorrect answer is (b)Your score on this question is:0.00Feedback:    

See Chapter 2, page 70, in the course textbook.

   

20. Which of the following statements regarding cache memory is (are) true?

I. The capacity of an L1 cache cannot be upgraded without replacing the microprocessor.

II. Data can be retrieved more quickly from the L2 cache than the L1 cache.

 (a) II only

 (b) I only

 (c) None

 (d) I and IICorrect answer is (b)Your score on this question is:1.00Feedback:    

See Chapter 2, page 68, in the course textbook.

   

Page 8: read.pudn.comread.pudn.com › downloads218 › doc › 1028202 › Certifica…  · Web view2. Information transferred to a computer from an external source such as a mouse or keyboard

21. PS/2 and DB-9 are two types of _____ ports.

 (a) USB

 (b) parallel

 (c) PCI

 (d) serialCorrect answer is (d)Your score on this question is:1.00Feedback:    

See section 2.2.1, subsection "Ports," in the course notes.

   

22. Graphics cards, sound cards, and Ethernet cards are typically connected to a PC via

 (a) expansion slots

 (b) FireWire

 (c) USB

 (d) parallel portsCorrect answer is (a)Your score on this question is:1.00Feedback:    

See section 2.2.1, subsection "Expansion Slots and Cards," in the course notes.

   

23. Serial ports transfer data _____ bit(s) at a time, whereas parallel ports transfer data _____ bit(s) at a time.

 (a) 1, 8

 (b) 8, 1

 (c) 16, 8

 (d) 8, 16Correct answer is (a)Your score on this question is:1.00Feedback:    

See section 2.2.1, subsection "Ports," in the course notes.

   

24. The width of a computer bus is typically measured in

Page 9: read.pudn.comread.pudn.com › downloads218 › doc › 1028202 › Certifica…  · Web view2. Information transferred to a computer from an external source such as a mouse or keyboard

 (a) hertz

 (b) pixels

 (c) bytes per second

 (d) bitsCorrect answer is (d)Your score on this question is:1.00Feedback:

   

See section 2.2.2 in the course notes.

   

25. Cathode-ray-tube computer monitors use _____ color mixing, whereas color printers typically use _____ color mixing.

 (a) BIV, ROY

 (b) RGB, CMYK

 (c) ROY, BIV

 (d) CMYK, RGBCorrect answer is (b)Your score on this question is:1.00Feedback:

   

See section 2.2.3 in the course notes.

   

26. Data is typically transferred between the disk controller and storage devices by the _____ bus.

 (a) memory

 (b) IDE

 (c) AGP

 (d) front sideCorrect answer is (b)Your score on this question is:1.00Feedback:

   

See section 2.2.2 in the course notes.

   

27. Which of the following is (are) true regarding data transfer rates of storage devices?

I. Sequential-access devices have faster transfer rates than random-access devices.

Page 10: read.pudn.comread.pudn.com › downloads218 › doc › 1028202 › Certifica…  · Web view2. Information transferred to a computer from an external source such as a mouse or keyboard

II. A device with 50 ms access time is faster than a device with 10 ms access time.

 (a) II only

 (b) I only

 (c) I and II

 (d) NoneCorrect answer is (d)Your score on this question is:1.00Feedback:

   

See Chapter 2, page 79, in the course textbook.

   

28. Which of the following is (are) true regarding removable optical and magnetic media?

I. Optical media are generally more durable than magnetic media.

II. Optical media generally have a lower cost per megabyte of storage when compared to magnetic media.

 (a) I and II

 (b) I only

 (c) None

 (d) II onlyCorrect answer is (a)Your score on this question is:0.00Feedback:

   

See section 2.3.2, subsection "Optical versus Magnetic," in the course notes.

   

29. Which of the following is (are) true regarding hard disks?

I. Data on hard disks is stored as volatile electric charges.II. Personal computers typically have more RAM than hard drive capacity.

III. Accessing data on a hard disk is faster than accessing data in RAM.

 (a) II and III only

 (b) I only

 (c) None

 (d) I and III onlyCorrect answer is (c)Your score on this question is:1.00Feedback:

   See section 2.3 in the course notes.   

Page 11: read.pudn.comread.pudn.com › downloads218 › doc › 1028202 › Certifica…  · Web view2. Information transferred to a computer from an external source such as a mouse or keyboard

30. If two devices are attached to the same IDE port, they must be designated as

 (a) IDE and EIDE

 (b) master and slave

 (c) primary and secondary

 (d) IDE and ATACorrect answer is (b)Your score on this question is:1.00Feedback:    

See section 2.3.1, subsection "EIDE Master/Slave," in the course notes.

   

31. Which of the following is (are) true regarding DVDs?

I. They can have tracks on both sides of the disk.

II. They can have two layers of tracks on one side of the disk.

 (a) I only

 (b) None

 (c) I and II

 (d) II onlyCorrect answer is (c)Your score on this question is:1.00Feedback:    

See section 2.3.2, subsection "Optical Media: CDs versus DVDs," in the course notes.

   

32. Examples of optical storage include which of the following?

I. CD-ROM disksII. CD-RW disks

III. DVD-ROM disks

 (a) I and III only

 (b) I and II only

 (c) II and III only

 (d) I, II, and IIICorrect answer is (d)Your score on this question is:1.00Feedback:    

Page 12: read.pudn.comread.pudn.com › downloads218 › doc › 1028202 › Certifica…  · Web view2. Information transferred to a computer from an external source such as a mouse or keyboard

See Chapter 2, page 78, in the course textbook.

   

33. Which of the following is the term for a step in a process that takes a much longer time to complete than do other steps in the process, thus reducing overall performance?

 (a) A benchmark

 (b) A bottleneck

 (c) Backup

 (d) LatencyCorrect answer is (b)Your score on this question is:1.00Feedback:    

See Section 2.5.2, subsection "Bottlenecks-Slowing a Process," in the course notes.

   

34. Use of which of the following can help identify the bottlenecks in a computer system?

 (a) Bus speed

 (b) Bandwidth

 (c) A cache

 (d) BenchmarksCorrect answer is (d)Your score on this question is:1.00Feedback:    

See Section 2.5.2, subsection "Speeding Up Bottlenecks," in the course notes.

   

35. Which Windows operating system utility can be used to see what processes are currently running?

 (a) Disk Defragmenter

 (b) Task Manager

 (c) Device Manager

 (d) Add/Remove ProgramsCorrect answer is (b)Your score on this question is:1.00Feedback:    

Page 13: read.pudn.comread.pudn.com › downloads218 › doc › 1028202 › Certifica…  · Web view2. Information transferred to a computer from an external source such as a mouse or keyboard

See Section 3.1.4, subsection "Lab: The Task Manager," in the course notes.

   

36. How many processes can be in a running state on a single CPU at any instant in time?

 (a) Four

 (b) Eight

 (c) One

 (d) TwoCorrect answer is (c)Your score on this question is:1.00Feedback:    

See Section 3.1.3, subsection "Process Control," in the course notes.

   

37. Each layer of software only needs a limited amount of information to perform its task, and none of the other layers has access to that information. This concept is known as

 (a) Abstraction

 (b) Polymorphism

 (c) Application

 (d) EncapsulationCorrect answer is (d)Your score on this question is:1.00Feedback:    

See Section 3.1.1, subsection "Encapsulation and Abstraction," in the course notes.

   

38. The heart of the operating system that performs the functions that are most crucial for keeping everything running is the

 (a) user interface

 (b) kernel

 (c) BIOS

 (d) APICorrect answer is (b)Your score on this question is:1.00Feedback:    

Page 14: read.pudn.comread.pudn.com › downloads218 › doc › 1028202 › Certifica…  · Web view2. Information transferred to a computer from an external source such as a mouse or keyboard

See Section 3.1.1, subsection "Layers of Software," in the course notes.

   

39. Which of the following occurs when the computer's hardware is requested to do something that it cannot do, such as access a nonexistent memory location?

 (a) A trap

 (b) A nested interrupt

 (c) A fault

 (d) An IRQCorrect answer is (c)Your score on this question is:1.00Feedback:    

See section 3.2.1, subsection "Traps and Faults," in the course notes.

   

40. A Windows utility called _____ can be used to view information on the drivers and resources that pieces of hardware are using.

 (a) Device Manager

 (b) Task Manager

 (c) Driver Manager

 (d) Disk DefragmenterCorrect answer is (a)Your score on this question is:1.00Feedback:    

See section 3.2.4, subsection "Lab: Device Management," in the course notes.

   

41. Which of the following is an event similar to an interrupt, except that instead of being triggered by an external signal, it is generated by the execution of processor instructions?

 (a) An IRQ

 (b) A fault

 (c) A nested interrupt

 (d) A trapCorrect answer is (d)Your score on this question is:1.00Feedback:    

Page 15: read.pudn.comread.pudn.com › downloads218 › doc › 1028202 › Certifica…  · Web view2. Information transferred to a computer from an external source such as a mouse or keyboard

See section 3.2.1, subsection "Traps and Faults," in the course notes.

   

42. In Windows, to adjust display properties such as resolution or color scheme, the user right-clicks on an empty spot of the desktop and clicks _____ on the shortcut menu.

 (a) Properties

 (b) Configure

 (c) New

 (d) RefreshCorrect answer is (a)Your score on this question is:1.00Feedback:    

See section 3.2.3, subsection "Configuration," in the course notes.

   

43. In a file-sharing system, access to files by various users is controlled by

 (a) spooling

 (b) ACLs

 (c) page tables

 (d) virtual memoryCorrect answer is (b)Your score on this question is:1.00Feedback:    

See Section 3.3.2, subsection "Files," in the course notes.

   

44. In a virtual-memory system, if a program tries to access a page of memory that is not loaded into RAM, a(n) _____ occurs.

 (a) illegal exception

 (b) trap

 (c) page fault

 (d) arithmetic errorCorrect answer is (c)Your score on this question is:1.00Feedback:    

Page 16: read.pudn.comread.pudn.com › downloads218 › doc › 1028202 › Certifica…  · Web view2. Information transferred to a computer from an external source such as a mouse or keyboard

See Section 3.3.1, subsection "Virtual Memory," in the course notes.

   

45. Which of the following statements regarding file sizes is (are) true?

I. The more bits used by a file the smaller the file size.

II. Operating systems typically keep track of file size information.

 (a) I and II

 (b) None

 (c) I only

 (d) II onlyCorrect answer is (d)Your score on this question is:1.00Feedback:    

See Chapter 4, page 173, in the course textbook.

   

46. The operating system uses a _____ system to keep track of the names and locations of files that reside on a storage medium, such as a hard disk.

 (a) tracking

 (b) naming

 (c) storage

 (d) fileCorrect answer is (d)Your score on this question is:1.00Feedback:    

See Chapter 4, page 181, in the course textbook.

   

47. To select multiple files that are listed consecutively, click the first file, and then hold down the _____ key as you click the last file.

 (a) F1

 (b) Alt

 (c) Shift

 (d) CtrlCorrect answer is (c)Your score on this question is:1.00

Page 17: read.pudn.comread.pudn.com › downloads218 › doc › 1028202 › Certifica…  · Web view2. Information transferred to a computer from an external source such as a mouse or keyboard

Feedback:    

See Chapter 4, page 179, in the course textbook.

   

48. The formatting process creates the equivalent of electronic storage bins by dividing a disk into

 (a) valleys

 (b) tracks

 (c) pits

 (d) podsCorrect answer is (b)Your score on this question is:1.00Feedback:    

See Chapter 4, page 180, in the course textbook.

   

49. High-level computer languages include which of the following?

I. Machine languageII. C++

III. Java

 (a) II only

 (b) I only

 (c) II and III only

 (d) I, II, and IIICorrect answer is (c)Your score on this question is:1.00Feedback:    

See Chapter 3, page 115, in the course textbook.

   

50. The primary purpose of _____ software is to help the computer carry out its basic operating functions.

 (a) reference

 (b) network

 (c) application

 (d) systemCorrect answer is (d)

Page 18: read.pudn.comread.pudn.com › downloads218 › doc › 1028202 › Certifica…  · Web view2. Information transferred to a computer from an external source such as a mouse or keyboard

Your score on this question is:1.00Feedback:

   

See Chapter 3, page 117, in the course textbook.

   

51. A file that is opened in order to begin execution of a computer program is a(n) _____ file.

 (a) executable

 (b) interpreter

 (c) compiler

 (d) activeCorrect answer is (a)Your score on this question is:1.00Feedback:

   

See Chapter 3, page 112, in the course textbook.

   

52. A program that is stored in ROM and contains the instructions needed by the operating system to load the kernel into memory is called the _____ program.

 (a) bootstrap

 (b) core

 (c) loader

 (d) energizerCorrect answer is (a)Your score on this question is:1.00Feedback:

   

See Chapter 3, page121, in the course textbook.

   

53. System software that acts as the master controller for all of the activities that take place within a given computer system is called the _____ for the computer.

 (a) organizer

 (b) execution system

 (c) compiler

 (d) operating systemCorrect answer is (d)Your score on this question is:1.00Feedback:

Page 19: read.pudn.comread.pudn.com › downloads218 › doc › 1028202 › Certifica…  · Web view2. Information transferred to a computer from an external source such as a mouse or keyboard

   

See Chapter 3, pages 118–122, in the course textbook.

   

54. Which of the following is the one part of the operating system that stays in main memory throughout the time that the computer is running?

 (a) The motherboard

 (b) The pipeline

 (c) The control panel

 (d) The kernelCorrect answer is (d)Your score on this question is:1.00Feedback:    

See Chapter 3, page121, in the course textbook.

   

55. The mechanism used by a computer to ensure that all keyboard strokes are properly recorded, regardless of how fast a user may type, is a keyboard

 (a) interpreter

 (b) GUI

 (c) buffer

 (d) indexCorrect answer is (c)Your score on this question is:1.00Feedback:    

See Chapter 3, page120, in the course textbook.

   

56. What DOS command displays the contents of a text file?

 (a) type

 (b) del

 (c) dir

 (d) rdCorrect answer is (a)Your score on this question is:1.00Feedback:    

Page 20: read.pudn.comread.pudn.com › downloads218 › doc › 1028202 › Certifica…  · Web view2. Information transferred to a computer from an external source such as a mouse or keyboard

See Section 4.3.1, subsection "Review of File System Commands," in the course notes.

   

57. Consider the following DOS Help entry.

DEL [drive:][path]filename [/P]

The items enclosed within square brackets are _____ parts of the command.

 (a) optional

 (b) repeatable

 (c) required

 (d) literalCorrect answer is (a)Your score on this question is:1.00Feedback:

   

See Section 4.3.1, subsection "DOS Command Syntax," in the course notes.

   

58. Which of the following filenames would be listed by the DOS command dir c*.txt?

I. cat.txtII. c.txt

III. cat.doc

 (a) I, II, and III

 (b) I and II only

 (c) I only

 (d) II onlyCorrect answer is (b)Your score on this question is:1.00Feedback:    

See Section 4.3.1, subsection "Wildcard Characters," in the course notes.

   

59. Which of the following DOS batch file commands can be used to display a message to Standard Output?

 (a) goto

 (b) @echo off

 (c) rem

 (d) echo

Page 21: read.pudn.comread.pudn.com › downloads218 › doc › 1028202 › Certifica…  · Web view2. Information transferred to a computer from an external source such as a mouse or keyboard

Correct answer is (d)Your score on this question is:1.00Feedback:

   

See Section 4.3.2, subsection "Commands," in the course notes.

   

60. Database models that have been used successfully include which of the following?

I. HierarchicalII. Network

III. Relational

 (a) I and II only

 (b) II and III only

 (c) I and III only

 (d) I, II, and IIICorrect answer is (d)Your score on this question is:1.00Feedback:

   

See Chapter 10, pages 498–500, in the course textbook.

   

61. Of the following database models, which is simplest?

 (a) Hierarchical

 (b) Relational

 (c) Network

 (d) Object-orientedCorrect answer is (a)Your score on this question is:1.00Feedback:

   

See Chapter 10, page 499, in the course textbook.

   

62. In a relational database, a row of a table is called a(n)

 (a) index

 (b) multiple

 (c) tuple

Page 22: read.pudn.comread.pudn.com › downloads218 › doc › 1028202 › Certifica…  · Web view2. Information transferred to a computer from an external source such as a mouse or keyboard

 (d) attributeCorrect answer is (c)Your score on this question is:1.00Feedback:    

See Chapter 10, page 500, in the course textbook.

   

63. In a software engineering project, the people who focus on the software components of the system to be constructed are called the software

 (a) managers

 (b) engineers

 (c) coders

 (d) analystsCorrect answer is (b)Your score on this question is:1.00Feedback:    

See Chapter 11, page 548, in the course textbook.   

64. A good problem statement for a computing project specifies which of the following?

I. All assumptions that define the scope of the problemII. The information that is known about the problem

III. Criteria for determining when the problem has been solved

 (a) I, II, and III

 (b) I and III only

 (c) I and II only

 (d) III onlyCorrect answer is (a)Your score on this question is:1.00Feedback:    

See Chapter 11, page 549, in the course textbook.

   

65. A series of steps performed manually that mimic the steps the computer would perform in executing an algorithm, using realistic data, is called a(n) _____ of the algorithm.

 (a) codification

 (b) walkthrough

 (c) assessment

Page 23: read.pudn.comread.pudn.com › downloads218 › doc › 1028202 › Certifica…  · Web view2. Information transferred to a computer from an external source such as a mouse or keyboard

 (d) objectificationCorrect answer is (b)Your score on this question is:1.00Feedback:    

See Chapter 11, page 556, in the course textbook.

   

66. In a software engineering project, the people who plan the entire system to be constructed are called the system

 (a) engineers

 (b) managers

 (c) programmers

 (d) analystsCorrect answer is (d)Your score on this question is:1.00Feedback:    

See Chapter 11, page 548, in the course textbook.

   

67. Some search engines use _____ instead of the word AND to indicate that a search term must appear on a Web page for the page to be included in the search results.

 (a) %

 (b) +

 (c) $

 (d) *Correct answer is (b)Your score on this question is:1.00Feedback:

   

See Chapter 1, page 32, in the course textbook.

   

68. Most Web pages contain _____ to related documents and media files.

 (a) links

 (b) passages

 (c) keys

 (d) icons

Page 24: read.pudn.comread.pudn.com › downloads218 › doc › 1028202 › Certifica…  · Web view2. Information transferred to a computer from an external source such as a mouse or keyboard

Correct answer is (a)Your score on this question is:1.00Feedback:

   

See Chapter 1, page 26, in the course textbook.

   

69. Consider the following URL.

http://www.carnegietech.org/about/index.html

In the URL, "about" is the

 (a) filename

 (b) Web server name

 (c) protocol standard

 (d) folder nameCorrect answer is (d)Your score on this question is:1.00Feedback:    

See Chapter 1, page 27, in the course textbook.

   

70. Consider the following URL.

http://www.carnegietech.org

In the URL, "http" is the

 (a) protocol standard

 (b) folder name

 (c) Web server name

 (d) filenameCorrect answer is (a)Your score on this question is:1.00Feedback:

   

See Chapter 1, page 27, in the course textbook.

   

71. Which of the following is (are) true regarding protocols used over the Internet?

I. The Post Office Protocol transfers mail from an e-mail server to a client inbox.

II. The Internet Mail Access Protocol transfers e-mail messages from client computers to an e-mail server.

Page 25: read.pudn.comread.pudn.com › downloads218 › doc › 1028202 › Certifica…  · Web view2. Information transferred to a computer from an external source such as a mouse or keyboard

 (a) I only

 (b) None

 (c) II only

 (d) I and IICorrect answer is (a)Your score on this question is:1.00Feedback:

   

See Chapter 5, page 234, in the course textbook.

   

72. A multi-player network game where each player's computer communicates directly with all of the other players' computers is an example of a _____ network.

 (a) client-server

 (b) broadband

 (c) client

 (d) peer-to-peerCorrect answer is (d)Your score on this question is:1.00Feedback:

   

See Section 5.3.2, subsection "Peer-to-Peer Connectivity," in the course notes.

   

73. Which of the following statements about thick and thin clients is (are) true?

I. A thick client does less work than a thin client does.

II. A Web browser can act as either a thick or a thin client.

 (a) None

 (b) II only

 (c) I only

 (d) I and IICorrect answer is (b)Your score on this question is:1.00Feedback:

   

See Section 5.3.1, subsection "Client-Server Framework," in the course notes.

   

Page 26: read.pudn.comread.pudn.com › downloads218 › doc › 1028202 › Certifica…  · Web view2. Information transferred to a computer from an external source such as a mouse or keyboard

74. Which of the following statements about client-server systems is (are) true?

I. Both the client and the server can be software programs.

II. The client runs on the user's computer and interacts with both the user and the server.

 (a) I only

 (b) None

 (c) II only

 (d) I and IICorrect answer is (d)Your score on this question is:1.00Feedback:

   

See Section 5.3.1, subsection "Client-Server Framework," in the course notes.

   

75. What is the maximum number of units of information that can be conveyed using 10 bits?

 (a) 20

 (b) 10

 (c) 1024

 (d) 100Correct answer is (c)Your score on this question is:1.00Feedback:

   

See Chapter 5, page 219, in the course textbook.

   

76. Which of the following is (are) true regarding analog signals?

I. Analog signals typically represent an unlimited range of values.

II. Analog signals typically have a smooth and curved waveform.

 (a) None

 (b) I and II

 (c) II only

 (d) I onlyCorrect answer is (b)Your score on this question is:1.00Feedback:

   

See Chapter 5, page 220, in the course textbook.

Page 27: read.pudn.comread.pudn.com › downloads218 › doc › 1028202 › Certifica…  · Web view2. Information transferred to a computer from an external source such as a mouse or keyboard

   

77. Which of the following is (are) true regarding fiber-optic cables?

I. Fiber-optic cables can be used to transmit electric signals.

II. Fiber-optic cable is a bundle of extremely thin tubes of glass called optical fibers.

 (a) None

 (b) I and II

 (c) II only

 (d) I onlyCorrect answer is (c)Your score on this question is:1.00Feedback:    

See Chapter 5, page 221, in the course textbook.

   

78. Which of the following is (are) true regarding network devices?

I. A hub is a device that connects several nodes of a local area network.II. A router is a device that is connected to more than one network and makes decisions

regarding the best route for data.

III. A repeater is a device that amplifies and regenerates signals so that they can retain the necessary strength to reach their destinations.

 (a) II and III only

 (b) I, II, and III

 (c) I and II only

 (d) I and III onlyCorrect answer is (b)Your score on this question is:1.00Feedback:    

See Chapter 5, page 223, in the course textbook.

   

79. A device to connect two or more networks is known as a(n)

 (a) domain

 (b) NIC

 (c) DNS server

 (d) routerCorrect answer is (d)

Page 28: read.pudn.comread.pudn.com › downloads218 › doc › 1028202 › Certifica…  · Web view2. Information transferred to a computer from an external source such as a mouse or keyboard

Your score on this question is:1.00Feedback:

   

See Section 5.5.1, subsection "Routers," in the course notes.

   

80. How many bytes long is an IP address?

 (a) Six

 (b) Two

 (c) Four

 (d) EightCorrect answer is (c)Your score on this question is:1.00Feedback:

   

See Section 5.5.1, subsection "Internet Protocol," in the course notes.

   

81. Which of the following means of connecting to the Internet uses (use) standard copper telephone lines?

I. 56 Kbps modemsII. Cable modems

III. xDSL

 (a) I, II, and III

 (b) I and II only

 (c) I and III only

 (d) III onlyCorrect answer is (c)Your score on this question is:1.00Feedback:

   

See Section 5.5.3, subsection "Connectivity," in the course notes.

   

82. Computers that use a dial-up connection to the Internet are typically assigned a _____ IP address.

 (a) dynamic

 (b) backbone

 (c) permanent

Page 29: read.pudn.comread.pudn.com › downloads218 › doc › 1028202 › Certifica…  · Web view2. Information transferred to a computer from an external source such as a mouse or keyboard

 (d) staticCorrect answer is (a)Your score on this question is:1.00Feedback:    

See Section 5.5.4, subsection "Internet Service Providers," in the course notes.

   

83. What system is used to translate domain names to IP addresses?

 (a) Routers

 (b) DNS

 (c) TCP

 (d) ISPCorrect answer is (b)Your score on this question is:1.00Feedback:    

See Section 5.5.2, subsection "Domain Name Service," in the course notes.

   

84. An intruder pretending to be an employee of a company asking the company's network administrator for sensitive information is an example of a _____ attack.

 (a) brute force

 (b) cracking

 (c) spoofing

 (d) social engineeringCorrect answer is (d)Your score on this question is:1.00Feedback:    

See section 6.1.2, subsection "Social Engineering/Fraud," in the course notes.

   

85. The dictionary attack against a computer system involves

 (a) trying to guess a password by using various alphanumeric combinations

 (b) using complicated words to trick users into providing information

 (c) trying to guess a password by using every word in the dictionary

 (d) infecting the spell-checker dictionary with macro virusesCorrect answer is (c)

Page 30: read.pudn.comread.pudn.com › downloads218 › doc › 1028202 › Certifica…  · Web view2. Information transferred to a computer from an external source such as a mouse or keyboard

Your score on this question is:1.00Feedback:

   

See section 6.1.2, subsection "Password Cracking," in the course notes.

   

86. Which of the following is (are) true regarding boot sector viruses?

I. Boot sector viruses are capable of infecting the system files used by a computer every time the computer is turned on.

II. Boot sector viruses are capable of causing widespread damage and problems that reoccur.

 (a) I only

 (b) II only

 (c) None

 (d) I and IICorrect answer is (d)Your score on this question is:1.00Feedback:

   

See Chapter 4, page 186, in the course textbook.

   

87. Which of the following is (are) true regarding computer viruses?

I. When a computer executes a program that is infected with a computer virus, it also executes the attached virus instructions.

II. In a computer infected with a virus, the virus instructions that are executed generally remain in RAM and are capable of infecting the next program that runs on that computer.

 (a) None

 (b) I and II

 (c) I only

 (d) II onlyCorrect answer is (b)Your score on this question is:1.00Feedback:

   

See Chapter 4, page 185, in the course textbook.

   

88. Which of the following means of providing password information to Internet Service Providers is

Page 31: read.pudn.comread.pudn.com › downloads218 › doc › 1028202 › Certifica…  · Web view2. Information transferred to a computer from an external source such as a mouse or keyboard

(are) considered safe?

I. Phone

II. Email

 (a) None

 (b) II only

 (c) I only

 (d) I and IICorrect answer is (a)Your score on this question is:1.00Feedback:

   

See section 6.1.2, subsection "Spoofing," in the course notes.

   

89. Capabilities of computer viruses include which of the following?

I. The ability to remain in a computer for long periods without showing any external symptoms and quietly replicating themselves during this period

II. The ability to perform trigger events that are keyed to a specific date

III. The ability to spread from one computer to another by itself

 (a) I, II, and III

 (b) II and III only

 (c) I and II only

 (d) I onlyCorrect answer is (c)Your score on this question is:1.00Feedback:

   

See Chapter 4, page 185, in the course textbook.

   

90. The set of standards and services that govern the use of public-key cryptography and the system of certificates is called

 (a) the digital certificate

 (b) SSL protocols

 (c) PKI

 (d) the certificate authorityCorrect answer is (c)Your score on this question is:1.00Feedback:

   

Page 32: read.pudn.comread.pudn.com › downloads218 › doc › 1028202 › Certifica…  · Web view2. Information transferred to a computer from an external source such as a mouse or keyboard

See section 6.2.3, subsection "Digital Certificates and Certificate Authorities," in the course notes.

   

91. The set of all possible keys for an encryption algorithm is known as its

 (a) keyspace

 (b) cryptography factor

 (c) cipher count

 (d) brute forceCorrect answer is (a)Your score on this question is:1.00Feedback:    

See section 6.2.1, subsection "Substitution Cipher," in the course notes.

   

92. Features used for identification in biometrics include which of the following?

I. FingerprintsII. Name

III. Voice

 (a) II and III only

 (b) I, II, and III

 (c) I and II only

 (d) I and III onlyCorrect answer is (d)Your score on this question is:1.00Feedback:    

See section 6.2.3, subsection "Biometrics," in the course notes.

   

93. Which of the following is (are) true regarding digital signatures?

I. Digitally signing a message automatically encrypts the message.

II. Senders use their private key to create the digital signature, while receivers use the sender's public key to decrypt the digital signature.

 (a) None

 (b) I and II

 (c) I only

Page 33: read.pudn.comread.pudn.com › downloads218 › doc › 1028202 › Certifica…  · Web view2. Information transferred to a computer from an external source such as a mouse or keyboard

 (d) II onlyCorrect answer is (d)Your score on this question is:0.00Feedback:    

See section 6.2.3, subsection "Digital Signatures," in the course notes.

   

94. The identification of individuals based on their physiological or behavioral characteristics is known as _____ identification.

 (a) SSL

 (b) biometric

 (c) digital-signature

 (d) digital-identifierCorrect answer is (b)Your score on this question is:1.00Feedback:    

See section 6.2.3, subsection "Biometrics," in the course notes.

   

95. A backup that makes a fresh copy of every file that exists in the folder specified for backup is known as a(n)

 (a) entire backup

 (b) full backup

 (c) total backup

 (d) complete backupCorrect answer is (b)Your score on this question is:1.00Feedback:    

See Chapter 4, page 196, in the course textbook.

   

96. Which of the following precautions can users take to avoid executing malicious code?

I. Avoid opening unexpected email attachments.II. Generate secure passwords.

III. Expose hidden filename extensions.

 (a) I, II, and III

Page 34: read.pudn.comread.pudn.com › downloads218 › doc › 1028202 › Certifica…  · Web view2. Information transferred to a computer from an external source such as a mouse or keyboard

 (b) I and II only

 (c) II and III only

 (d) I and III onlyCorrect answer is (d)Your score on this question is:1.00Feedback:    

See section 6.3.4 in the course notes.

   

97. Which of the following is (are) true regarding computer security?

I. Extreme computer security measures may adversely affect the functionality of the computer.

II. Using antivirus software and installing a firewall can keep a computer safe from all intrusions.

III. Most intrusions result from virus attacks or known vulnerabilities that could be prevented by keeping the operating system and applications updated.

 (a) I, II, and III

 (b) II and III only

 (c) I and II only

 (d) I and III onlyCorrect answer is (d)Your score on this question is:1.00Feedback:    

See section 6.3.4 in the course notes.

   

98. Which of the following is (are) true regarding the use of backup software?

I. The type of backup software that is needed depends on the backup plan.

II. Backup software is available that can enable the scheduling of automatic backups of predetermined files and folders at predetermined times.

 (a) II only

 (b) I only

 (c) I and II

 (d) NoneCorrect answer is (c)Your score on this question is:1.00Feedback:    

Page 35: read.pudn.comread.pudn.com › downloads218 › doc › 1028202 › Certifica…  · Web view2. Information transferred to a computer from an external source such as a mouse or keyboard

See Chapter 4, pages 200–201, in the course textbook.

   

99. Assume that a full backup is taken on Saturdays and an incremental backup is taken on all other days of the week. If a disk crash occurs on Thursday, which of the following backup disks would be needed for restoration?

I. The full backup disk taken the last Saturday before the crashII. The incremental backup disk taken on Wednesday (the day before the crash)

III. The incremental backup disks taken on Sunday, Monday, and Tuesday

 (a) I only

 (b) I, II, and III

 (c) II and III only

 (d) I and II onlyCorrect answer is (b)Your score on this question is:0.00Feedback:    

See Chapter 4, page 196, in the course textbook.

   

100. Functions of network monitoring systems include which of the following?

I. Analyzing network packets and decoding the analyzed dataII. Testing the availability of network services

III. Notifying system administrators regarding network problems

 (a) I, II, and III

 (b) I and III only

 (c) I and II only

 (d) II and III onlyCorrect answer is (a)Your score on this question is:1.00Feedback:    

See section 6.3.2, subsection "Network Monitoring Tools," in the course notes.