MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question. 1) The computer function in which raw data is converted into meaningful information is known as: 1) _______ A) input. B) storage. C) output. D) processing. 2) A server is a computer that: 2) _______ A) is designed for individual use. B) is ultrafast and designed to handle large processing jobs. C) makes programs and data available to people who are connected to a computer network. D) plays a less important role in today's businesses. 3) The most important type of memory that a typical computer uses during the processing operation is ________ memory. 3) _______ A) storage B) read-only C) random access D) flash 4) ________ is a portable, wireless, paperback-sized e-book reading device that includes a text-to-speech function. 4) _______ A) Kindle 2 B) Netbook C) Digital e-book D) Wiki 5) Users connect to networks on PCs called: 5) _______ A) clients. B) remote users. C) resources. D) requesters. 6) When an entire job category is made obsolete by advances in technology, it is called: 6) _______ A) robotics. B) technological replacement. C) structural unemployment. D) automation. 7) CPU is an abbreviation for ________ processing unit. 7) _______ A) calculation B) common C) central D) complex 8) Which of the following is NOT an example of an input device? 8) _______ A) Digital cameras B) Microphones C) Scanners D) Speakers 9) The type of software that sits on top of the operating system and utilizes the computer's capabilities to perform a user task is called: 9) _______ A) application software. B) internal software. C) system software. D) utility software. 10) The computer function where output is saved for later use is known as: 10) ______ A) input. B) storage. C) processing. D) None of the above 11) Technology has contributed to globalization, which has led to: 11) ______ A) outsourcing. B) lower productivity. C) increased domestic employment. D) higher wages. 12) OS is an abbreviation for which of the following terms? 12) ______ A) Outsourced System B) Operating System C) Overlay System D) Operations Schedule 13) A(n) ________ is a series of steps that results in the solution to a problem. 13) ______ A) object B) module C) algorithm D) pseudo-solution 14) The Business Software Alliance reports that reducing U.S. piracy by just 10 percent will have all of the following benefits EXCEPT: 14) ______ A) greater software usage. B) an increase in economic growth. C) higher tax revenues. D) the creation of new jobs. 15) Which of the following years did the World Wide Web begin? 15) ______ A) 1997 B) 1993 C) 1989 D) 2000 16) Which of the following requires computer access to individuals with disabilities? 16) ______ A) The Americans with Disabilities Act of 1990 B) The No Child Left Behind Act of 2001 C) The Digital Access Act of 1995 D) The Disabilities Act of 1985 17) The Institute for Certification of Computing Professionals identified essential elements related to conduct that include all of the following EXCEPT: 17) ______ A) the observance of an ethical code. B) reporting violating companies by whistle-blowing. C) a high standard of skill and knowledge. D) a confidential relationship with people served. 18) All of the following are included in the ACM Code of Conduct regarding a computer professional EXCEPT: 18) ______ A) contributes to society and human well-being. B) ensures cost effective measures are taken with respect to computer related issues. C) honors confidentiality. D) gives credit when using the intellectual property of others. 19) Acceptable use policies may be found in: 19) ______ A) an employment contract. B) the organization's Web site. C) the college or employee handbook. D) All of the above. 20) When someone sues for libel, the plaintiff must prove that: 20) ______ A) the information was published in a well-read journal and was completely incorrect. B) negative information was maliciously and intentionally spread for the purpose of offending the plaintiff. C) incorrect information or lies have caused damage. D) the offender has lied. 21) A friend gives you a disk containing software, but when you try to install it on your computer, the installation fails. What might cause this problem? 21) ______ A) The software is machine dependent and has already been installed elsewhere. B) The software registration fee has not yet been paid. C) The software is shareware, but the trial period has expired. D) The software belongs to the public domain and cannot be installed on a personal computer. 22) ________ is a set of behavioral guidelines relating to computer and Internet usage that provides tips and pointers on how to show respect for others and yourself while online. 22) ______ A) The Acceptable-Use Policy B) The ACM Code of Conduct C) Netiquette D) Computer ethics 23) Protecting data from loss or change is often simply a matter of following proper ________ procedures. 23) ______ A) code of conduct B) backup C) acceptable-use D) safety 24) Which of the following is the school's code of conduct for computers users called? 24) ______ A) Acceptable-use policy B) Associated usage principals C) Computer conduct agreement D) Computer usage agreement 25) Software auditing programs are being used in schools and organizations to: 25) ______ A) identify unauthorized users. B) monitor software usage. C) prevent software piracy. D) None of the above. 26) Turnitin is one of the popular software packages used to identify: 26) ______ A) plagiarism. B) the last backup date. C) unethical copies of software residing on a computer. D) violence rating checks prior to permitting the installation of computer games. 27) Which of the following is NOT considered plagiarism? 27) ______ A) Purchase a term paper from an Internet company and use it as the basis of your own work for a college course. B) Paste a paragraph of text from a Web page into an essay, but make modifications to it before submission as your homework assignment. C) With his consent, copy your friend's algebra homework for submission to your math instructor. D) Use a quote from a public speech on your history take-home exam, but cite the orator in your bibliography. 28) Which of the following defines the justification for considering an act to be morally right or wrong? 28) ______ A) Netiquette B) Ethical principles C) Security policies D) ACM Conduct Code 29) Plagiarizing copyrighted material is also known as: 29) ______ A) copyright piracy. B) copyright infringement. C) copyright theft. D) unacceptable copyright use. 30) If software falls under the General Public License, it: 30) ______ A) can be legally installed on one LAN. B) may be copied and used freely. C) may be copied to one PC then legally sold to another user. D) only can legally be copied on one PC. 31) Each memory address is stored in ________ form. 31) ______ A) binary B) serial C) parallel D) compressed 32) If your computer doesn't have enough USB ports, it is possible to obtain a USB ________. 32) ______ A) router B) multiplexer C) hub D) PBX 33) A ________ is the smallest unit of information that a computer can work with. 33) ______ A) register B) byte C) bit D) hex 34) On non-Apple systems, the FireWire port is called a ________ port. 34) ______ A) 1439 B) 2008 C) 1394 D) 1995 35) Which of the following components would NOT be found inside the system unit? 35) ______ A) USB port B) Cooling fan C) Power supply D) Motherboard 36) Which of the following types of memory has L1, L2, and L3 levels of storage? 36) ______ A) ROM B) flash C) RAM D) cache 37) Although introduced in 1995, the USB didn't become widely used until the release of the: 37) ______ A) iMac. B) Blackberry. C) iTunes. D) iPod. 38) Of the following, which represents the largest amount of data? 38) ______ A) Terabyte B) Kilobyte C) Petabyte D) Megabyte 39) Which of the following would NOT be found on the motherboard? 39) ______ A) Microprocessor B) Drive bays C) Input/output buses D) System clock 40) A byte: 40) ______ A) is the smallest unit of information that a computer can process. B) is the equivalent of eight binary digits. C) can be compared to the state of one light switch being either on or off. D) represents one digit in the decimal numbering system. 41) The number of operations per clock tick affects: 41) ______ A) microprocessor performance. B) the bus size. C) monitor resolution. D) disk drive capacity. 42) What is the resolution of an Ultra Extended Graphic Array adapter? 42) ______ A) 1,024 x 768 B) 1,280 x 1,024 C) 1,600 x 1,200 D) 800 x 600 43) The most widely used pointing device is the: 43) ______ A) trackball. B) keyboard. C) mouse. D) joystick. 44) The ________ is a pattern of bars printed on merchandise that stores information about the item. 44) ______ A) EDI B) MICR C) UPC D) OMR 45) Which of the following is NOT one of the three types of speech recognition systems? 45) ______ A) Command B) NaturallySpeaking C) Discrete Voice D) Continuous Voice 46) In a cathode-ray tube monitor, which of the following three colors are combined to produce various shades? 46) ______ A) Blue, yellow, and green B) Yellow, blue, and green C) Red, green, and blue D) Black, white, and gray 47) ________ is the maximum storage capacity for a CD-ROM. 47) ______ A) 950 MB B) 1,500 MB C) 700 MB D) 250 MB 48) A comparison chart or lookup table, known as a ________, tells the processor what key is being pressed. 48) ______ A) character map B) bus C) switch D) key matrix 49) ________ is the maximum storage capacity for a DVD. 49) ______ A) 1.5 GB B) 25 GB C) 3.7 GB D) 17 GB 50) Keyboard shortcuts are performed by pressing a(n) ________ key in conjunction with another key. 50) ______ A) function B) toggle C) arrow D) modifier 51) The BIOS: 51) ______ A) displays input and output information on a graphical screen. B) is temporarily written in the computer's ROM. C) equips the computer with the instructions needed to accept keyboard input and display information on the screen. D) is permanently written in the computer's RAM. 52) All of the following are true about embedded operating systems EXCEPT: 52) ______ A) they are used in PDAs and cell phones. B) they are designed to be used as a supplement to traditional operating systems. C) examples currently in use include Windows CE and Symbian OS. D) they are very compact and efficient. 53) ________ includes all the programs that provide the infrastructure and hardware control needed for a computer, its peripheral devices, and other programs to function smoothly. 53) ______ A) Network software B) System software C) Application software D) Open source software 54) Signals that inform the OS that something happened are: 54) ______ A) operating system diversions. B) drivers. C) interrupts. D) program defects. 55) Virtual memory is an enhanced way to utilize the main memory by: 55) ______ A) using a hard disk swap file when memory is full. B) dividing data and instructions into multitasking units. C) using a part of ROM as an extension of RAM to conserve the main memory. D) creating pages of variable size to use when the swap file is full. 56) A utility program that contains the instructions to make peripheral devices function correctly is a: 56) ______ A) driver. B) specialized OS. C) standalone program. D) peripheral OS. 57) System utilities are used for all of the following purposes EXCEPT to: 57) ______ A) serve as an Internet interface with your Internet browser. B) create backups of system and application files. C) organize and find files on your computer. D) protect your computer from viruses. 58) Starting a computer that is already turned on is called a: 58) ______ A) warm load. B) power on. C) warm boot. D) cold boot. 59) Unlike other Web-hosted technology, ________ permits opening and editing files directly within the user's Web browser. 59) ______ A) Google Live B) Office Multimedia C) Window Office Live D) Google Docs 60) ________ include word processing, spreadsheet, database, presentation graphics, and personal information management applications. 60) ______ A) Personal productivity programs B) Multimedia and graphics software C) Applications that work through and run from the Internet D) Home and educational programs 61) Which of the following does gMUD stand for? 61) ______ A) Graphical multiuser dimensions B) Graphical multiuser dungeons C) Both A and B D) None of the above 62) Programs that enable users to manage, track, report, and share information are known as ________ software. 62) ______ A) graphics B) operating system C) personal information manager D) multimedia 63) Which of the following is the lossy file format used on the Web? 63) ______ A) BMP B) PNG C) GIF D) JPEG 64) Which of the following represents a major change in a software program? 64) ______ A) Patch B) Decimal number C) Whole number D) Service release 65) Outlook is an example of a(n): 65) ______ A) personal information management program. B) e-mail database program. C) high productivity program. D) rendering program. 66) The two main categories of software are: 66) ______ A) internal software and external software. B) user software and computer software. C) task software and instructional software. D) system software and application software. 67) The computer function in which raw data is received is known as: 67) ______ A) processing. B) input. C) output. D) storage. 68) Which of the following statements is TRUE? 68) ______ A) Most commercial computer programs are free of programming errors. B) Most errors cause programs to run slowly or perform needless tasks. C) Most commercial computer programs average between two and four errors per 1,000 lines of code. D) Most errors in programs cause serious miscalculations. 69) Typing a document into the computer is an example of: 69) ______ A) storage. B) input. C) output. D) processing. 70) Output refers to: 70) ______ A) information that needs further computer activity to provide meaning to people. B) sending the results of computer processing to a permanent location. C) performing operations on the input data. D) displaying the results of the processing operation so that people can understand it. 71) Microsoft checks your computer for a valid copy of its software before it will allow you to do all of the following EXCEPT: 71) ______ A) permit you to make updates. B) copy documents to another computer. C) download add-ons. D) access templates. 72) ________ uses basic ethical principles to help you make the right decisions during daily computer usage. 72) ______ A) Computer morality B) ACM Conduct Code C) Netiquette D) Computer ethics 73) At the heart of every computer code of ethics, there is the intention to: 73) ______ A) fight software piracy. B) eliminate all potential computer bugs. C) avoid harm and protect human life. D) honor property rights. 74) ________ games emphasize all-out violence of an especially bloody sort. 74) ______ A) Slaughter B) Blood and guts C) Splatter D) Combat 75) Most complex programs have many possible combinations of ________ making it not feasible to test for every combination. 75) ______ A) outcomes B) viruses C) bugs D) worms 76) The greater the number of ________ on a microprocessor, and proximity to each other, the faster the processing speed. 76) ______ A) registers B) transistors C) disks D) buses 77) A memory ________ is the amount of RAM a program uses when it is operational. 77) ______ A) footprint B) cache C) utility D) stash 78) The most widely used character code is: 78) ______ A) ASCII. B) EBCDIC. C) HTML. D) Unicode. 79) The four-step process of fetch, decode, execute, and store is called a(n): 79) ______ A) machine cycle. B) logical operation. C) arithmetic operation. D) instruction cycle. 80) The two components storage relies on include storage devices and ________. 80) ______ A) output devices B) synthesizers C) input devices D) recording media 81) Which of the following type of device gives you control over the movement of the on-screen pointer? 81) ______ A) Output B) Insertion C) Cursor D) Pointing 82) A pie-shaped wedge of a hard disk is called which of the following? 82) ______ A) Cluster B) Track C) Platter D) Sector 83) All of the following are needed to access your computer in a multiuser environment EXCEPT a(n): 83) ______ A) password. B) user name. C) home directory. D) Internet address. 84) Which of the following is the correct sequence for what happens when you turn on a computer? 84) ______ A) POST, BIOS, system configuration, loading the OS, loading the system utilities, and authentication B) BIOS, POST, loading the OS, system configuration, loading the system utilities, and authentication C) BIOS, POST, system configuration, loading the OS, loading the system utilities, and authentication D) Authentication, BIOS, POST, loading the OS, system configuration, and loading the system utilities 85) Like a traffic officer, the computer's OS works at the intersection of: 85) ______ A) application software and the user. B) application software and the computer's hardware. C) the user and the computer's hardware. D) application software, the user, and the computer's hardware. 86) To revise a file from Microsoft Office Live, it must be downloaded and edited using ________ and then uploaded again. 86) ______ A) Microsoft Works B) Microsoft Office C) any word processor D) Microsoft WordPad 87) Which type of software would you install if you want full-functioning word processing and spreadsheet capabilities, and you want the programs to share resources? 87) ______ A) A software suite containing word processing, spreadsheet, and other programs B) A network-integrated program that includes modules that share the same interface C) An integrated program containing word processing, spreadsheet, and other programs D) Standalone programs for word processing and spreadsheets 88) Which of the following computers would be used in a large corporation to complete huge processing needs, such as airline reservations? 88) ______ A) Supercomputer B) Mainframe C) Minicomputer D) Server 89) The disparity in computer ownership and Internet access is known as the ________. 89) ______ A) disparity ratio B) digital divide C) non-computerized syndrome D) None of the above 90) According to the U.S. Department of Health, Education, and Welfare, which of the following describes an unethical act? 90) ______ A) One in which were everyone to act the same way, society as a whole would benefit. B) One in which people are treated as an end in themselves, not a means to an end. C) One in which impartial observers judge that the act is fair to all parties concerned. D) One in which most people will benefit over the detriment of a few. 91) ________ is becoming more popular than previously used character codes due to its ability to represent most, if not all, of the world's languages. 91) ______ A) EDCDIC B) Unicode C) ASCII D) Extended ASCII 92) ________ was developed to enable recording, rewriting, and playing back high-definition video and large amounts of data storage. 92) ______ A) Blu-ray disc B) Hybrid technology C) New Technology File System (NTFS) D) Virtual technology 93) Starting a computer that is not already turned on is called a: 93) ______ A) warm boot. B) fast load. C) cold load. D) cold boot. 94) Applications typically enable you to choose from a list of ________ that specify how you want the program to operate. 94) ______ A) defaults B) configurations C) options D) packages 95) Spell checking a document is an example of the computer's ability to perform the ________ function. 95) ______ A) output B) input C) processing D) storage 96) A technique that uses more than one processor to execute a program is called: 96) ______ A) parallel processing. B) megaprocessing. C) co-processing. D) serial processing. 97) Which of the following keys or key combinations is typically used to display on-screen help? 97) ______ A) Esc B) F1 C) Ctrl + H D) Enter 98) Compression enables faster downloads, but then you have to ________ the files after downloading. 98) ______ A) zip B) decrypt C) encrypt D) decompress 99) Application software: 99) ______ A) is used to find the source of computer malfunctions. B) includes programs that you use to complete a specific task such as letters and presentations. C) refers to background programs that prepare the computer to start up. D) provides the environment in which the operating system functions. 100) Which of the following is a type of product that complements the human body's best posture and functionality? 100) _____ A) Ergonomic B) Ergocentric C) Esoteric D) Natural 1) D 2) C 3) C 4) A 5) A 6) C 7) C 8) D 9) A 10) B 11) A 12) B 13) C 14) A 15) B 16) A 17) B 18) B 19) D 20) C 21) A 22) C 23) B 24) A 25) B 26) A 27) D 28) B 29) B 30) B 31) A 32) C 33) C 34) C 35) A 36) D 37) A 38) C 39) B 40) B 41) A 42) C 43) C 44) C 45) B 46) C 47) C 48) A 49) D 50) D 51) C 52) B 53) B 54) C 55) A 56) A 57) A 58) C 59) D 60) A 61) C 62) C 63) D 64) C 65) A 66) D 67) B 68) B 69) B 70) D 71) B 72) D 73) C 74) C 75) C 76) B 77) A 78) A 79) A 80) D 81) D 82) D 83) D 84) B 85) D 86) B 87) A 88) B 89) B 90) D 91) B 92) A 93) D 94) C 95) C 96) A 97) B 98) D 99) B 100) A