Computer Literacy Final Practice Exam

The ability to recover and read deleted or damaged files from a criminal’s computer is an example of a law enforcement specialty called ________.

A) computer forensics
B) RFID simulation
C) HALO animation
D) robotics

A) computer forensics
People who are ________ make the Internet a powerful tool and know how to find the
information that they want effectively.

A) technologically informed
B) computer efficient
C) computer literate
D) computer productive

C) computer literate
The goal of ________ is to provide solutions to physical problems, such as providing sight to the blind.

A) biomedical chip research
B) RFID technology
C) 3D animations
D) computer forensics

A) biomedical chip research
The Microsoft Authorized Refurbisher program supports refurbishers by allowing ________ to be installed for free on refurbished systems.

A) specific operating system utilities
B) antivirus software
C) certain Microsoft operating systems and Office software
D) certain gaming software packages

C) certain Microsoft operating systems and Office software
When a job is sent to other countries, as many programming jobs have been, it is said to have been
________.

A) offshored
B) exported
C) resourced
D) imported

A) offshored
A crisis mapping tool such as ________ can collect information to make instantly and publicly
available for use in emergencies.

A) The Witness Project
B) Google Earth
C) Data mining
D) Ushahidi

D) Ushahidi
Many online courses are designed to use management software like ________ so that students can
communicate outside of class, take quizzes online, and find their class materials easily.

A) Adobe Photoshop
B) Blackboard or Moodle
C) CAD or Visio
D) Microsoft Access

B) Blackboard or Moodle
________ is a field of study focused on information handling and retrieval of information
automatically.

A) Database mining
B) Information technology
C) RFID
D) Computer forensics

B) Information technology
The S-video and the ________ ports on a computer facilitate connecting the computer to
multimedia devices such as TVs and DVD players.

A) AVI
B) DVI
C) parallel
D) USB

B) DVI
Which of the following is NOT one of the four major data processing functions of a computer?

A) processing data into information
B) storing the data or information
C) gathering data
D) analyzing the data or information

D) analyzing the data or information
A ________ is approximately 1 billion bytes.

A) kilobyte
B) megabyte
C) gigabyte
D) bit

C) gigabyte
The hard drive is a ________ storage device, meaning that it stores data permanently even when
the computer is turned off.

A) random
B) nonvolatile
C) temporary
D) volatile

B) nonvolatile
RAM is considered volatile storage, which means it is ________.

A) read-only
B) permanent
C) random
D) temporary

D) temporary
A(n) ________ enables you to enter data (text, images, and sound) and instructions (user responses and commands) into the computer.

A) output device
B) system unit
C) motherboard
D) input device

D) input device
________ plug into slots on the motherboard and provide additional functionality for your
computer.

A) USB devices
B) Expansion cards
C) Drive bays
D) Ports

B) Expansion cards
The agency that first began funding the Internet was called the ________.

A) National Science Foundation
B) Advanced Research Computing Agency
C) Advanced Research Projects Agency Network
D) Science Research Projects Agency

A) National Science Foundation
Adobe Reader, Flash Player, and QuickTime Player are all examples of special software programs
called ________.

A) podders
B) plug-ins
C) browsers
D) aggregators

B) plug-ins
All of the following are parts of a URL EXCEPT:

A) WWW.
B) the protocol.
C) hyperlinks.
D) the domain name.

C) hyperlinks.
The World Wide Web (WWW) was invented by ________.

A) the same people who invented the Internet
B) Apple
C) Tim Berners-Lee at CERN
D) Microsoft

C) Tim Berners-Lee at CERN
The text version of a Web site’s Internet address is called the ________.

A) home page
B) protocol
C) Uniform Resource Locator (URL)
D) IP address

C) Uniform Resource Locator (URL)
The Internet backbone refers to ________.

A) abroadband Internet connection
B) the software that operates a Web server
C) the main pathway of high-speed communications lines through which all Internet traffic
flows
D) a set of numbers comprising an Internet address

C) the main pathway of high-speed communications lines through which all Internet traffic
flows
In a spreadsheet, equations you build yourself using values and cell references are called
________.

A) values
B) functions
C) formulas
D) calculations

B) functions
Adobe Photoshop and Corel PaintShop Photo Pro are examples of ________ software.

A) Web page authoring
B) digital image editing
C) painting
D) computer-aided design

B) digital image editing
In a spreadsheet, the columns and rows form individual boxes called ________.

A) addresses
B) worksheets
C) cells
D) intersects

C) cells
In databases, information is organized in ________.

A) tables
B) fields
C) records
D) all of the above

D) all of the above
Microsoft Word and OpenOffice.org Writer are examples of ________.

A) utility software
B) graphic software
C) word processing software
D) system software

C) word processing software
The ________ of the operating system allows the user to communicate with the computer system.

A) modem
B) network adapter card
C) window
D) user interface

D) user interface
Which of the following operating systems is used primarily with mainframes as a network
operating system?

A) Mac OS
B) Windows Vista
C) Symbian OS
D) UNIX

D) UNIX
The combination of operating system and processor in a computer is referred to as a computer’s
________.

A) platform
B) specifications
C) firmware
D) minimum requirements

A) platform
XO is the name of the computer being provided by the ________ project.

A) IT Beta
B) One Laptop per Child
C) DigiKid
D) Computers for All

B) One Laptop per Child
Two types of video memory are ________.

A) IrDA and IDE
B) SRAM and DRAM
C) 4 -bit and 8-bit
D) GDDR3 and GDDR5

D) GDDR3 and GDDR5
Kernel memory is ________.

A) faster than RAM
B) the amount of memory in the memory modules
C) RAM memory used by the operating system
D) permanent memory

C) RAM memory used by the operating system
Which is the fastest type of optical drive on the market?

A) flash drives
B) Blu-ray drives
C) DVD drives
D) CD drives

B) Blu-ray drives
When referring to hard drives, seek time and latency are the two factors that make up ________.

A) data transfer speed
B) access time
C) processing
D) transfer rate

B) access time
Network architectures are classified according to ________.

A) the way they are controlled and the distance between their nodes
B) the bandwidth supplied by the connection
C) the distance between the hub and the router
D) the speed at which the processor runs

A) the way they are controlled and the distance between their nodes
Which of the following UTP cable types is the cheapest and often used in home networks?

A) Cat 4
B) Cat 7
C) Cat 6
D) Cat 5E

D) Cat 5E
The most popular transmission media option for wired Ethernet networks is ________.

A) unshielded twisted-pair (UTP) cable
B) coaxial cable
C) power-line cable
D) fiber-optic cable

A) unshielded twisted-pair (UTP) cable
The ________ is a strategic plan to focus on the young, talented, mathematical minds of Africa.

A) Next Einstein Initiative
B) National Research Council
C) Childhood Walk
D) Future Civic Media

A) Next Einstein Initiative
One proposed answer to close the digital divide is to promote ________ as a means for
low-income families to access the Internet.

A) Nintendo Wii
B) affective computing
C) social networking
D) mobile devices

D) mobile devices
The process of searching huge amounts of data with the hope of finding a pattern is called
________.

A) data warehousing
B) data retrieval
C) data searching
D) data mining

D) data mining
________ microphones pick up sound from only one direction.

A) Wireless
B) Magnetically shielded
C) Omnidirectional
D) Unidirectional

D) Unidirectional
________ computers are specially designed computer chips that reside inside other devices such
as your car or the electronic thermostat in your home.

A) Internal
B) Desktop
C) Mainframe
D) Embedded

D) Embedded
Podcasts enable you to ________.

A) communicate with friends in real time
B) post journal entries on the Web
C) edit video files over the Web
D) broadcast over the Internet using compressed audio and video files such as MP3s and MP4s

D) broadcast over the Internet using compressed audio and video files such as MP3s and MP4s
The name of the free Internet browser from Mozilla is ________.
A) Safari
B) Opera
C) Internet Explorer
D) Firefox
D) Firefox
Software that does “back office” operations and processing functions such as billing, production,
inventory management, and human resources management is called ________.

A) accounting software
B) enterprise resource planning software
C) customer relationship management software
D) project management software

B) enterprise resource planning software
Software refers to a set of instructions that tells the computer what to do. These instruction sets
are called ________.

A) devices
B) databases
C) peripherals
D) programs

D) programs
In Windows, a file path starts with a ________.

A) backslash ()
B) file name
C) folder
D) drive letter

D) drive letter
During the virtual memory process, the operating system moves data to a temporary storage area
on the hard drive called the ________ file.

A) RAM
B) virtual
C) swap
D) memory

C) swap
The small circuit boards that hold a series of RAM chips are called ________.

A) flash memory cards
B) virtual memory
C) expansion cards
D) memory modules

D) memory modules
The unique number assigned to a network adapter by the manufacturer is referred to as the
________ address.

A) SSID
B) MAC
C) network
D) IP

B) MAC
Unwanted e-mail is called ________.

A) software
B) adware
C) spam
D) spyware

C) spam
The small, touch-sensitive area at the base of the keyboard on a notebook computer is known as a
________.

A) touch pad
B) trackball
C) game control
D) stylus

A) touch pad
Podcasts use which of the following technologies?

A) an open source software application for 3D modeling
B) RSS
C) Vlog
D) MSN Messenger

B) RSS
The primary benefit of a spreadsheet program is ________.

A) its ability to create charts
B) its ability to automatically recalculate formulas and functions
C) the preprogrammed functions
D) its ability to have multiple worksheets in one workbook

B) its ability to automatically recalculate formulas and functions
Which of the following types of programs help manage system resources such as the hard drive?

A) application software
B) utility programs
C) application programming interfaces
D) productivity software

B) utility programs
All of the following are advantages of notebook computers EXCEPT:

A) they are portable.
B) wireless Internet access is easy to install.
C) they take up little space.
D) you get more speed for a lower price.

D) you get more speed for a lower price.
Which of the following is NOT an example of a WAN?

A) LANs connected in a single building
B) A computer at a bank’s main branch connected with a LAN at the bank’s branch office
across town
C) A computer at a military base in Georgia connected with a computer at a military base in
Florida
D) A LAN at the main university campus connected with a LAN at the university extension site

A) LANs connected in a single building
One potential application of ________ is to provide sight to the blind.

A) biomedical chip implants
B) VeriChips
C) RFID tags
D) patient simulators

A) biomedical chip implants
________ software is the set of programs that enables the computer’s hardware devices and application software to work together.

A) Application
B) System
C) Binary
D) Utility

B) System
Boolean operators include such words as ________.

A) NOT
B) OR
C) AND
D) all of the above

D) all of the above
Dancers can be wired with light electronic sensors so that their movements can be digitized for
computer analysis.

True/False

True
SixthSense is a wearable device that consists of a camera, projector, and a mirror that can communicate with the Internet over wireless Bluetooth via a computer.

True/False

False, 6th sense is a supposed intuitive faculty giving awareness not explicable in terms of normal perception:
The for-profit Khan Academy contains over 2,200 videos, and over 1 million students a month
use the site.

True/False

True
Data mining is the process of searching huge amounts of data with the hope of finding a pattern.

True/False

True
The menuboard of the Khan Academy shows exactly which topic a student has mastered and where they are failing to progress.

True/False

True
Light-emitting diode technology uses organic compounds that produce light when exposed to an electric current.

True/False

True
The operating system provides the means for users to interact with a computer.

True/False

True
Modern printers feature Bluetooth connectivity technology.

True/False

True
An alternative to the QWERTY keyboard is the virtual keyboard.

True/False

False
The four main functions of a computer are inputting data, processing data, outputting the data or information, and communicating the data or information.

True/False

False
Webcasts can be used to initiate a response from a viewing audience.

True/False

True
If you post a picture on your own social networking site, it could become available to the public via search engines.

True/False

True
The Internet was developed to ensure faster delivery of communications such as mail.

True/False

False
The Internet is the largest computer network in the world.

True/False

True
Macros are forms included in many productivity applications that provide the basic structure for a particular kind of document, spreadsheet, or presentation.

True/False

False, Templates not Macros
There are financial planning software applications available, such as Quicken, that integrate with tax preparation software.

True/False

True
Windows 7 is operating system software.

True/False

True
When your computer runs out of RAM, the operating system borrows space from the CPU.

True/False

False
A common-driven-interface is one in which you enter commands to communicate with the
computer system.

True/False

True
The type of processor in the computer dictates which operating system a desktop uses.

True/False

True
3D sound is the same as surround sound.

True/False

False
Every computer is designed with a maximum limit on the amount of RAM it can support.

True/False

True
WEP is a stronger form of security than WPA.

True/False

False, WPA is stronger than WEP
All desktop and notebook systems sold today are network ready.

True/False

True
Biomedical chip implants are being used to provide sight to the blind.

True/False

True
Purpose is the freedom to work without constant direction and control.

True/False

False, The answer is “Autonomy” instead of “Purpose”
Speakers connect to the VGA port.

True/False

False, Speakers connect to audio out socket, headphones.
When performing data entry, you cannot use the numeric keypad on your keyboard to enter
numeric values.

True/False

False
A universal chat client allows you to chat with users who are using a different IM service than you are.

True/False

True
Shareware is software that is distributed as trial software for a limited time.

True/False

True
When using Windows, you should create a restore point before installing new software.

True/False

True
RAM is your computer’s permanent storage space for data that is entered from the keyboard.

True/False

False
Ethernet networks are always connected using twisted-pair cable technology.

True/False

False
Multimedia tours using mobile devices and wireless technology are not common in museums
and galleries at this time.

True/False

False
When using Windows 7 power management tools, you really only need to shut down your computer when you need to repair the system, install hardware, or move the system.

True/False

True
Instant messaging is available only from AOL.

True/False

False
Many spreadsheet applications have the ability to sort, filter, and group data.

True/False

True
If you install a device that is not PnP, you will be prompted to install a driver.

True/False

True
Video cards often include their own RAM.

True/False

True
A P2P network needs network operating system software installed on every node.

True/False

False, In P2P network network is only set up once, other computer just have to connect to it.