MULTIPLE CHOICE. Choose the one alternative that best completes the statement or answers the question. 1) ________ include word processing, spreadsheet, database, presentation graphics, and personal information management applications. 1) _______ A) Applications that work through and run from the Internet B) Personal productivity programs C) Home and educational programs D) Multimedia and graphics software 2) Codecs use two different approaches to compression: lossless and ________. 2) _______ A) bitmapped B) lossy C) rendered D) decompression 3) Multimedia involves ________ or more media. 3) _______ A) four B) ten C) three D) two 4) The system requirements for a software program indicate the: 4) _______ A) number of peripheral devices that must be attached to your computer. B) maximum level of power the computer needs to run the software. C) average level of power needed for the computer to run the software. D) minimum level of equipment needed for the computer to run the software. 5) Applications typically enable you to choose from a list of ________ that specify how you want the program to operate. 5) _______ A) options B) packages C) configurations D) defaults 6) Which type of software would you install if you want full-functioning word processing and spreadsheet capabilities, and you want the programs to share resources? 6) _______ A) An integrated program containing word processing, spreadsheet, and other programs B) A software suite containing word processing, spreadsheet, and other programs C) Standalone programs for word processing and spreadsheets D) A network-integrated program that includes modules that share the same interface 7) Programs that enable users to manage, track, report, and share information are known as ________ software. 7) _______ A) personal information manager B) graphics C) operating system D) multimedia 8) Which of the following does gMUD stand for? 8) _______ A) Graphical multiuser dungeons B) Graphical multiuser dimensions C) Both A and B D) None of the above 9) Outlook is an example of a(n): 9) _______ A) rendering program. B) e-mail database program. C) high productivity program. D) personal information management program. 10) To revise a file from Microsoft Office Live, it must be downloaded and edited using ________ and then uploaded again. 10) ______ A) Microsoft Office B) Microsoft Works C) Microsoft WordPad D) any word processor 11) Unlike other Web-hosted technology, ________ permits opening and editing files directly within the user's Web browser. 11) ______ A) Google Docs B) Office Multimedia C) Google Live D) Window Office Live 12) Which of the following type of graphic is created by a drawing program? 12) ______ A) Bitmapped B) Vector C) Post-Script D) Raster 13) PowerPoint is an example of a: 13) ______ A) presentation graphics program. B) database application. C) spreadsheet application. D) personal information manager. 14) Instead of looking up information in a printed manual, you can use a program's ________ feature to read documentation right on the computer. 14) ______ A) Question B) Help C) View D) About 15) Which of the following is the common term for a link to a document that has disappeared? 15) ______ A) Visited link B) Obsolete link C) Broken link D) Defunct link 16) ________, which was originally an Apple browser, is now available for PCs. 16) ______ A) Safari B) Internet Explorer C) Mozilla Firefox D) Mosaic 17) ________ involves businesses that use the Internet to supply consumers with services, information, or products. 17) ______ A) B2B B) B2C C) C2B D) C2C 18) The information on a web page is in ________ or XHTML format. 18) ______ A) JAD B) GML C) OOP D) HTML 19) In order from slowest to fastest, the correct order of the types of Internet access is as follows: 19) ______ A) dial-up, cable, DSL, satellite, FiOS. B) dial-up, DSL, cable, satellite, FiOS. C) FiOS, satellite, cable, DSL, dial-up. D) DSL, dial-up, FiOS, cable, satellite. 20) ________ acts as a secure intermediary, offering users the ability to make payments from their bank account or credit card without revealing personal financial information to the seller. 20) ______ A) PurchasePal B) BuyerPal C) CommercePal D) PayPal 21) Cyberspace is defined as: 21) ______ A) the location where all the Internet servers are housed. B) the collection of Internet service providers. C) territory that isn't an actual physical space and that is accessible only with computers. D) the overarching network of networks. 22) A ________ controls a set of computers by infecting them with a malicious program. 22) ______ A) blog B) wiki C) thread D) bot herder 23) The TCP layer of communication design: 23) ______ A) ensures the security of information being transmitted from unauthorized parties. B) handles the address part of each packet so that it gets to the right destination on the Internet. C) manages the assembling of a message or file into smaller packets that are transmitted over the Internet. D) None of the above. 24) Which of the following Internet services is threatened by spimming? 24) ______ A) E-mail B) Internet Relay Chat (IRC) C) Instant messaging (IM) D) Voice over Internet Protocol (VoIP) 25) Another name for a home page is a(n): 25) ______ A) hypertext page. B) URL. C) index page. D) Web site. 26) Because of their complexity, networks use an architecture that is divided into separate network: 26) ______ A) elements. B) layers. C) modules. D) levels. 27) Which of the following is NOT a function of communication devices? 27) ______ A) Facilitate digital communication B) Encryption C) Determine efficient data-transfer pathways D) Boost signal strength 28) Which of the following is the largest wide area network (WAN)? 28) ______ A) NATO B) Internet C) United States Government D) International Banking System 29) Which of the following is NOT an advantage of the bus topology? 29) ______ A) Simple B) Reliable C) Easy to expand D) Length 30) In a(n) ________ topology, the network nodes are connected to a central hub or switch. 30) ______ A) hierarchical B) layered C) star D) ring 31) Limitations of the bus topology include all of the following EXCEPT: 31) ______ A) length restrictions. B) loss of signal strength. C) number of nodes. D) breakage in the ring. 32) Which of the following protocols use Ethernet? 32) ______ A) OSI B) CSMA/CD C) TCP/IP D) IP 33) Another term for a network administrator is a network: 33) ______ A) operator. B) engineer. C) manager. D) supervisor. 34) Which of the following types of networks require an access point? 34) ______ A) WiFi B) Packet switching C) Novell D) Ethernet 35) Which of the following devices do NOT use radio waves to transmit its signal? 35) ______ A) PDAs B) Pager C) Flash drive D) Bluetooth-enabled desktop computer 36) ________ sends more than one call over a single line. 36) ______ A) Diverging B) Splitting C) Multiplexing D) Converging 37) Which of the following wireless communications medium transmits data via beams of light through the air? 37) ______ A) Ultraviolet B) Infrared C) Microwave D) Sealed-beam 38) Approximately what percentage of U.S. households has opted to disconnect their conventional landline telephones and rely on cellular service only? 38) ______ A) 30 B) 20 C) 15 D) 25 39) WAP-enabled devices require a ________, a special Web browser that has all the features of computer-based browsers but is simplified to meet handheld device limitations. 39) ______ A) demibrowser B) minibrowser C) modified browser D) microbrowser 40) Which of the following is NOT true about digital telephony? 40) ______ A) Most telephones in the local loop use digital telephony. B) The audio signal is clearer, with less electronic noise than is found in analog systems. C) The telephone transmits human voices with digital versus analog signals. D) Digital telephony is often implemented as an in-house company telephone system. 41) Which of the following statements is NOT true about the public switched telephone network (PSTN)? 41) ______ A) PSTN is a global telephone system used for both voice and data communications. B) PSTN is exclusively an analog network. C) PSTN uses a variety of physical media, including twisted-pair and fiber-optic cable. D) PSTN uses subscriber loop carriers to link home and business telephones. 42) Which of the following is the best definition of a computer hacker? 42) ______ A) A hacker is a person who is highly skilled in computer programming but has had no formal education. B) A hacker is a criminal who tries to discover computer capabilities not mentioned in software manuals, as well as modify them to obtain maximum performance. C) A hacker is creates bogus work-at-home opportunities, chain letters, get-rich-quick scams via email, chat rooms, and websites. D) A hacker is a slang term for a professional programmer. 43) Of the currently employed access control methods, ________ is the most secure because it involves identification of the user's body, such as his or her eyes or fingerprints. 43) ______ A) callback B) smart card C) biometric authentication D) "know and have" authentication 44) Which of the following is NOT a technique you can effectively use to reduce the amount of unauthorized e-mail on your computer? 44) ______ A) Use a "throwaway" e-mail address when visiting a chat room B) Disable cookies on your Web browser C) Reply to spam and ask to be removed from the mailing list D) Avoid giving your name and e-mail address on marketing questionnaires 45) Vacation hackers, one of the newest trends in Internet fraud, involve all of the following EXCEPT: 45) ______ A) travelers being targeted by Cybercriminals. B) phony WiFi hot spots, called evil twins, are used to obtain data from unsuspecting individuals. C) in addition to the information reaching the intended destination, such as an airport or hotel, the cybercriminal also obtains the user's data. D) users believe they are using a valid WiFi access point. 46) To hinder corporate espionage, all of the following should be done EXCEPT: 46) ______ A) force password changes every 20 days if data within the organization is highly secure. B) protect against data deletion and loss by write and password protecting documents. C) create regular backups. D) make employees aware of security policies and the consequences of violating them. 47) Application software: 47) ______ A) is used to find the source of computer malfunctions. B) provides the environment in which the operating system functions. C) refers to background programs that prepare the computer to start up. D) includes programs that you use to complete a specific task such as letters and presentations. 48) Software that you can use on a "try before you buy" basis is known as: 48) ______ A) freeware. B) groupware. C) shareware. D) commercial software. 49) An efficient way to reduce the chance of losing all of the work in your file as a result of a power failure is to: 49) ______ A) activate the Autosave option and set it to save automatically every 10 minutes. B) save your file for the first time after you have completed entering the content. C) save your file for the first time before you enter any text on the document screen. D) save your file with a new filename every 10 minutes. 50) ________ include desktop publishing and multimedia authoring programs, animation programs, image-editing programs, and 3-D rendering programs. 50) ______ A) Multimedia and graphics software B) Applications that work through and run from the Internet C) Home and educational programs D) Personal productivity programs 51) A ________ is a computer program used by search engines to roam the World Wide Web via the Internet, visit sites and databases, and keep the databases of the Web search engines pages up-to-date. 51) ______ A) searcher B) seeker C) snail D) spider 52) A ________ is a location that is accessible from the Internet and makes Web pages available. 52) ______ A) Web page B) Web site C) Web browser D) URL 53) A Web site's domain name correlates to the: 53) ______ A) Web server IP address. B) path name. C) network identifier. D) type of organization it belongs to. 54) How does a Web search service that offers a subject guide differ from a general-purpose search engine? 54) ______ A) It searches every Web page currently available across the world and reports results only when an exhaustive search has been completed. B) It employs multiple commercial search engines to find the maximum set of Web pages related to the query. C) It uses a wizard with a series of questions to help you refine your search. D) It offers a smaller selection of quality pages related to a set of the more useful Web pages in a given category. 55) A VPN operates as a private network over which larger type of network? 55) ______ A) Governmental network B) LAN C) Internet D) WAN 56) How do most wireless LANs ensure security with radio transmission? 56) ______ A) By splitting the signals B) By using a random series of frequencies C) By scrambling the signals D) All of the above 57) Which of the following features enable the strongest WiFi encryption protection? 57) ______ A) WEP B) WPA C) WDDI D) WAP 58) Which of the following is NOT true about piggybacking? 58) ______ A) At present, it is not considered a crime in most jurisdictions in the United States. B) It can refer to using another person's network without permission. C) Some people can inadvertently connect to another's wireless network instead of their own. D) It can refer to using free Internet connection designated for customers of an establishment when you are not a customer. 59) Analog cellular services are being replaced by digital cellular technologies called ________. 59) ______ A) DAC B) DBS C) PCS D) PSTN 60) Which of the following is NOT an example of a credit reporting agency? 60) ______ A) InfoUSA B) Experian C) TransUnion D) Equifax 61) When a virus self-modifies itself, the new copy is known as a: 61) ______ A) beta. B) m-virus. C) macro virus. D) variant. 62) Programs that are designed for specialized fields or the business market are known as ________ applications. 62) ______ A) single-market B) dedicated services C) tailor-made D) horizontal 63) In newer browsers, if a Web site requires a plug-in to function: 63) ______ A) the plug-in will automatically install behind the scenes. B) the user will be asked to pay for the plug-in first. C) the user cannot proceed further. D) a pop-up will appear indicating which plug-in is needed. 64) Which of the following network devices has the capability to determine the best path to transmit data and determine alternative pathways? 64) ______ A) Switch B) Director C) Pathfinder D) Router 65) ________ transmit data by sending and receiving microwave signals to and from Earth-based stations. 65) ______ A) Satellites B) Bluetooth technologies C) Infrared technologies D) Broadband technologies 66) The new emerging legal field that tracks and combats computer-related crimes is called: 66) ______ A) cyberlaw. B) Web law. C) Web policing. D) Internet crime fighting. 67) Which of the following software is NOT copyrighted software? 67) ______ A) Shareware B) Public domain C) Freeware D) Commercial 68) Which of the following Boolean search operators is most similar in meaning to the inclusion operator? 68) ______ A) OR B) NOT C) AND D) LIKE 69) The scope of a backbone can be all of the following EXCEPT: 69) ______ A) continental. B) regional. C) atmospheric. D) transcontinental. 70) Bluetooth devices identify each other using ________ that are unique to each device. 70) ______ A) honing devices B) analog waves C) radio frequencies D) identification numbers 1) B 2) B 3) D 4) D 5) A 6) B 7) A 8) C 9) D 10) A 11) A 12) B 13) A 14) B 15) C 16) A 17) B 18) D 19) B 20) D 21) C 22) D 23) C 24) C 25) C 26) B 27) B 28) B 29) D 30) C 31) D 32) B 33) B 34) A 35) C 36) C 37) B 38) D 39) D 40) A 41) B 42) B 43) C 44) C 45) C 46) A 47) D 48) C 49) A 50) A 51) D 52) B 53) A 54) D 55) C 56) B 57) B 58) A 59) C 60) A 61) D 62) C 63) D 64) D 65) A 66) A 67) B 68) C 69) C 70) D