computer science exam #2

The web is based on the ________ Protocol.

A) Hypertext Translate
B) Hypertext Transfer
C) Hypertext Trade
D) Hypertext Transmit

B) hypertext transfer
The browser feature where tabs are independent of each other is known as ________.

A) pinned tabs
B)tab isolation
C)privacy browsing
D) free tabs

B) tab isolation
Which of the following is NOT a precaution to take when shopping online?

A) Avoid making online transactions on a public computer.

B) Shop at well-known, reputable sites.

C) Pay with a debit card, not a credit card.

D) When placing an order, make sure you receive a confirmation number.

C) pay with a debit card, not a credit card
Which of the following top-level domains identifies a degree-granting institution?
A) .gov
B) .info
C) .net
D) .edu
D) .edu
Software that enables you to display and interact with text and other media on the web is a web ________.

A) server
B) agent
C) client
D)browser

D) browser
All of the following are types of e-commerce business EXCEPT ________.

A)B2C
B) C2C
C) C2B
D)B2B

C) C2B
In the URL http://www.microsoft.com/surface, the portion labeled “http” is the ________.

A)top-level domain
B)protocol
C) domain name
D) path

B) protocol
Which of the following is NOT a feature of the most popular web browsers?

A) Pinned tabs
B) Tacked browsing
C) Session restore
D) Thumbnail preview

B) tacked browsing
Which of the following is NOT a social networking site?

A) Facebook
B) iTunes
C) LinkedIn
D) YouTube

B) iTunes
A(n) ________ is a navigation aid that shows the path you have taken to get to a web page or where the page is located within the website.

A) navigation bar
B) cookie trail
C) breadcrumb trail
D) index

C) breadcrumb trail
Adobe Reader, Flash Player, and QuickTime Player are examples of software programs called ________.

A) plug-ins
B)browsers
C) helpers
D) aggregators

A) plug-ins
In the URL http://www.microsoft.com/surface, the portion labeled “surface” is the ________.

A) domain name
B) top-level domain
C) path
D) protocol

C) path
____________ is a professional, business-orientated social networking site

A) Picasa
B) Flickr
C) Twitter
D) LinkedIn

D) Linkedin
A(n) ________ system requires a program, such as Microsoft Outlook, to be installed on your computer, and when the program is opened, your e-mail is downloaded to your computer.

A) web-based e-mail
B) business-to-consumer (B2C)
C) consumer-to-consumer (C2C)
D) e-mail client

D) e-mail client
The unique address for a particular website is the ________.

A) client
B) domain section
C) URL
D) protocol

C) URL
The Internet is ________.

A) the same as the web
B) a large network of networks
C) an internal communication system for businesses
D) a communication system for the U.S. military

B) A large network of networks
A(n) ________ is a usually a live broadcast of audio or video content.
A)Podcast
B) Instant message
C) Wiki
D) Webcast
D) webcast
In the URL http://www.microsoft.com/surface, the portion labeled “.com” is the ________.

A) top-level domain
B) domain name
C) protocol
D) host

A) top-level domain
A ________ allows visitors to add, remove, or edit its content.

A) wiki
B) chat
C) podcast
D) blog

A) wiki
A ________ is a personal journal posted on the web.

A) wiki
B) webcast
C) blog
D) podcast

C) blog
The World Wide Web was based on a protocol developed by ________.

A)

Apple

B)

Microsoft

C)

the U.S. government

D)

Tim Berners-Lee

D) Tim Berners-Lee
A Microsoft ________ account allows you to store and share files in the cloud.

A)

iCloud

B)

Drive

C)

Dropbox

D)

OneDrive

D) OneDrive
The “fathers” of the Internet are Vinton Cerf and ________.

A)

Robert Kahn

B)

Bill Gates

C)

Robert Cailliau

D)

Tim Berners-Lee

A) Robert Kahn
All of the following are tips for professional e-mail etiquette EXCEPT ________.

A)

be concise and to the point

B)

include a meaningful subject line

C)

use abbreviations such as “u,” “r,” and “BRB” to keep the e-mail message shorter

D)

use spell-checker and proofread before sending

C) use abbreviations such as “u,” “r,” and “BRB” to keep the e-mail message shorter
The “s” in “https” stands for for ________ socket layer.

A) server
B) semantic
C) social
D) secure

D) secure
The unique identification number assigned to your computer when you connect to the Internet is known as all of the following EXCEPT ________.

A)

IP address

B)

dotted decimal

C)

dotted quad

D)

path

D) path
Which of the following is NOT a proprietary instant messaging (IM) service?

A)

Google Chat

B)

Yahoo! Messenger

C)

AIM

D)

LinkedIn Messenger

D) LinkedIn messenger
Which of the following are personal video journal entries posted on the web?

A)

Newsgroups

B)

Podcasts

C)

Blogs

D)

Vlogs

D) Vlogs
The concept of the Internet was developed in response to the ________ War.

A)

Cold

B)

Gulf

C)

Vietnam

D)

Korean

A) cold
________ media are continuously fed to your browser so you do not have to wait for the entire file to completely download before listening to or watching it.

A)

Tagged

B)

Streaming

C)

Hyperlinked

D)

Top-level

B) Streaming
AND, OR, and NOT are examples of ________ operators.

A)

keyword

B)

relational

C)

Jacobian

D)

Boolean

D) boolean
Which of the following Windows utility programs arranges pieces of files on your hard drive to allow for faster access?

A) Disk Cleanup
B) Error-checking
C) Disk Defragmenter
D)Task Manager

C) Disk Defragmenter
The latest version of the Mac OS X is ________.

A) Snow Leopard
B) Tiger
C) Mavericks
D)Mountain Lion

D) Mountain Loin
Deleted files on a Mac computer are moved to the ________.

A)

Trash

B)

Garbage Can

C)

Recycle Bin

D)

Wastepaper Basket

A) trash
Mac OS X includes a backup utility called ________.

A)

System Restore

B)

Carbonite

C)

Time Capsules

D)

Time Machine

D) Time machine
UNIX was developed by Ken Thompson and Dennis Richie, who worked at ________.

A)

Xerox

B)

Microsoft

C)

AT&T’s Bell Labs

D)

IBM

C) AT&T’s Bell Labs
C: denotes a ________ directory that is at the top of the filing structure of a computer.

A)

cluster

B)

top-level

C)

root

D)

upper-level

C) root
Errors in computer software are called ________.

A)

beetles

B)

spiders

C)

worms

D)

bugs

D) bugs
Which of the following is NOT a Windows utility program?
A)

System Restore

B)

Desktop

C)

Disk Defragmenter

D)

Disk Cleanup

B) desktop
OS X is the operating system developed by ________.

A)

Linux

B)

Microsoft

C)

Google

D)

Apple

D) Apple
The ________ of the operating system enables users to communicate with the computer system.

A)

network adapter card

B)

modem

C)

user interface

D)

window

C) user interface
All of the following can be used in an OS X file name EXCEPT ________.

A) :
B) %
C)#
D) $

A) :
All of the following are examples of network operating systems EXCEPT ________.

A)

MS-DOS

B)

Linux

C)

Windows 8

D)

OS X

D)OS X
C:WindowsSystem32driversetcprotocol is an example of a file ________.

A)

extension

B)

path

C)

type

D)

list

B) path
The location of a file is specified by its ________.

A)

file extension

B)

drive identifier

C)

file path

D)

file

C) file path
You can use the Windows ________ to check on a nonresponsive program.

A)

System Restore

B)

Error-checking

C)

Backup utility

D)

Task Manager

D) task manager
Each device attached to your computer comes with a special program called a(n) ________ that enables the device and operating system to communicate with each other.

A)

translator

B)

device driver

C)

device configurator

D)

interpreter

B) device driver
Which of the following is the first step in the boot process?

A)

The BIOS checks that all devices are in place.

B)

The OS is loaded into RAM.

C)

The BIOS is activated by turning on the computer.

D)

Configuration and customization settings are checked.

C) The BIOS is activated by turning on the computer.
Most smartphones use operating systems developed by ________.

A)

Symbian and Apple

B)

Microsoft and Google

C)

Google and Apple

D)

Apple and Microsoft

C) Google and Apple
Most supercomputers use the ________ operating system.

A)

iOS

B)

Windows

C)

Linux

D)

UNIX

C) Linux
Which of the following operating systems are used on most tablets?

A)

Android and iOS

B)

Windows and iOS

C)

Windows and Android

D)

BlackBerry and Windows

A or B
Which of the following is NOT a user interface?

A)

graphical user interface (GUI)

B)

menu-driven

C)

application programming interface (API)

D)

command-driven

C) application programming interface (API)
Which operating system is used by most desktop and laptop computers?

A)

Linux

B)

UNIX

C)

OS X

D)

Windows

D)Windows
Using hard disk space to temporarily store data or instructions from RAM is referred to as ________.

A)

compressing

B)

spooling

C)

interrupting

D)

virtual memory

D) virtual memory
Running the Disk Cleanup utility is a quick way to ________.

A)

clean out your Startup folder

B)

remove spyware programs

C)

clear out unnecessary files

D)

defrag your hard

C) clear out unnecessary files
The rule of thumb that predicts that CPU capacity will double every 2 years is called ________ Law.

A)

Intel’s

B)

Moore’s

C)

Boyle’s

D)

Charles’s

B) Moore’s
To remove all the changes made to your system, the Windows ________ utility returns your computer to the state it was in when it came from the factory.

A)

Refresh

B)

Backup

C)

Erase

D)

Restore

D) restore
Which statement pertaining to system reliability is FALSE?

A)

You can clean out unnecessary programs from your Startup folder.

B)

Having the latest version of software products can make your system more reliable.

C)

An accumulation of temporary Internet files has no effect on your computer’s overall performance.
D)

When you defrag your hard drive, it works more efficiently

C) An accumulation of temporary Internet files has no effect on your computer’s overall performance.
A ________ uses electronic memory and has no motors or moving parts.

A)

solid-state drive

B)

Blu-ray disc

C)

digital video disc

D)

mechanical hard drive

A) solid-state drive
Which of the follow ports is NOT used to connect to a video card?

A)

DVI

B)

USB

C)

HDMI

D)

DisplayPort

B) USB
All of the following are part of the machine cycle EXCEPT ________.

A)

encode

B)

store

C)

fetch

D)

execute

A) encode
Running the Disk Defragmenter utility will ________.

A)

mark bad memory cells

B)

make the hard drive work more efficiently

C)

detect and remove spyware

D)

clean out your Startup folder

B) make the hard drive work more efficiently
In Dolby Digital 7.1, the 1 indicates a ________ speaker.

A)

tweeter

B)

digital

C)

cross-over

D)

subwoofer

B) digital
The amount of RAM storage is measured in ________.

A)

GHz

B)

GB

C)

Hz

D)

MHz

B) GB
Running the CPU at a faster speed than the manufacturer recommends is called ________.

A)

overclocking

B)

hyperthreading

C)

fetching

D)

latency

A) overclocking
________ provides high-speed information processing by enabling a new set of instructions to start before the previous set is finished.

A)

Cache memory

B)

Multitasking

C)

Overclocking

D)

Hyperthreading

D) hyperthreading
The CPU consists of which two parts?

A)

The control unit and the front side bus

B)

The control unit and cache memory

C)

The arithmetic logic unit and the front side bus

D)

The control unit and the arithmetic logic unit

D) The control unit and the arithmetic logic unit
Which of the following does NOT determine processor power?

A)

Use of multiple cores

B)

Clock speed

C)

Speed of the motherboard

D)

Amount of cache memory

B) Clock Speed
There are ________ levels of cache memory.

A)

five

B)

four

C)

three

D)

two

C) three
Which of the following is the lightest computer?

A)

Desktop

B)

Laptop

C)

Ultrabook

D)

Tablet

C) Ultrabook
A ________ enables the computer to drive the speaker system.

A)

PCI bus

B)

sound card

C)

display port

D)

HDMI

B) sound card
The most popular transmission media option for wired home Ethernet networks is ________ cable.

A)

coaxial

B)

power-line

C)

fiber-optic

D)

unshielded twisted-pair (UTP)

D) unshielded twisted- pair
Using a network without the network owner’s permission is known as ________.

A)

phishing

B)

spamming

C)

hijacking

D)

piggybacking

D) piggybacking
Which of the following is NOT used to classify network architectures?

A)

Communication medium

B)

Speed of the network

C)

Protocol used to exchange data

D)

Distance between nodes

B) speed of the network
A ________ is a device connected to a network such as a printer or a game console.

A)

NIC

B)

node

C)

NOS

D)

packet

B) node
Wireless network devices use ________ to communicate with each other.

A)

DSL

B)

satellites

C)

radio waves

D)

fiber optics

C) Radio waves
Normal telephone cable is a type of ________.

A)

coaxial cable

B)

fiber-optic cable

C)

twisted-pair cable

D)

Ethernet cable

C) twisted- pair cable
Which transmission medium transmits data the fastest?

A)

Twisted-pair cable

B)

Wireless

C)

Coaxial cable

D)

Fiber-optic cable

D) Fiber-optic cable
On a network, a(n) ________ helps prevent data packets from colliding with each other.

A)

hub

B)

router

C)

adapter

D)

switch

D) Switch
Client/server networks are controlled by a central server that runs specialized software called a(n) ________.

A)

digital subscriber line (DSL)

B)

service set identifier (SSID)

C)

network operating system (NOS)

D)

information management system (ISM)

C) network operating system (NOS)
________ is the actual speed of data transfer that is achieved and is always less than or equal to the data transfer rate
A)

Benchmark

B)

Throughput

C)

Broadband

D)

Bandwidth

B) throughput
________ is the maximum speed at which data can be transferred between two nodes.

A)

Through speed

B)

Bandwidth

C)

Broadband

D)

Throughput

B) bandwith
Which of the following is NOT a wired broadband Internet connection option?

A)

Cable

B)

DSL

C)

Fiber-optic

D)

Dial-up

D) Dial Up
A peer-to-peer (P2P) network is an example of ________ administration.

A)

local

B)

corporate

C)

central

D)

wide area

A) local
A computer connected to the Internet that asks for data is a ________.

A)

surrogate

B)

aggregator

C)

server

D)

client

D) client
A subset of e-commerce that uses social networks to assist in marketing and purchasing products is known as social ________.

A)

enterprise

B)

business

C)

shopping

D) commerce

D) Commerce
Podcasts enable you to ________.

A)

edit video files over the web

B)

deliver audio/video files via RSS

C)

post journal entries on the web

D)

communicate with friends in real time

B) deliver audio/video files via RSS
Which of the following is a feature of Live bookmarks?

A)

Adds RSS technology to bookmarks

B)

Streams live television programs

C)

Enables you to pin your favorite website images

D)

Broadcasts webinars

A) Adds RSS technology to bookmarks
The basic input/output system (BIOS) is stored on a ________ chip.

A)

CMOS

B)

CPU

C)

RAM

D)

ROM

D) ROM
Windows 8 uses a(n) ________ account for easy access and storage of online files.

A)

Chrome

B)

eye OS

C)

OneDrive

D)

iCloud

C) OneDrive
All of the following are terms related to part of the boot process EXCEPT ________.

A)

USB

B)

RAM

C)

ROM

D)

CMOS

A) USB
Which of the following is the name of a Microsoft Excel file?

A)

inventory.wpd

B)

inventory.pdf

C)

inventory.xlsx

D)

inventory.accdb

D) inventory.accdb
Which utility removes redundancies in a file to reduce the file size?

A)

Disk Cleanup

B)

Disk Defragmenter

C)

File Compression

D)

Error-checking

C) File Compression
When using Windows 8 File Explorer, which view provides the most information at a glance?

A)

Content

B)

List

C)

Tiles

D)

Details

D) Details
The two major types of system software programs are utility programs and the ________.

A)

operating system

B)

charms

C)

user interface

D)

application software

A) operating system
The control unit is one component of the ________.

A)

CPU

B)

cache

C)

clock

D)

front side bus

A) CPU
RAM is an example of ________ storage.

A)

volatile

B)

mobile

C)

permanent

D) nonvolatile

D) nonvolatile
The speed of a level of cache memory is impacted by ________.

A)

the amount of storage space on the chip

B)

the chip’s proximity to the CPU

C)

the physical size of the chip

D)

the size of the hard drive

B) the chip’s proximity to the CPU
Which of the following is NOT an optical disc format?

A)

Rewritable (RW)

B)

Read-erasable (RE)

C)

Read-only (ROM)

D)

Recordable (R)

B) read-erasable
Which optical disc has the greatest storage capacity?

A)

DVD

B)

CD

C)

Blu-ray

D)

Flash

C) blu-ray
In most current systems, ________ is the type of RAM used.

A) DDR2
B)SDRAM
C) DDR3
D) DRAM

C)DDR3
Windows uses a memory-management technique known as ________ to monitor which applications you frequently use and preloads them into your system memory.

A)

SuperRetrieve

B)

SuperFetch

C)

SuperTake

D)

SuperGet

B) SuperFetch
A large network designed to provide access to a specific geographic area, such as a large city, is a ________.

A)

MAN

B)

LAN

C)

PAN

D)

WAN

A) MAN
A client/server network is an example of ________ administration

A)

wide area

B)

central

C)

remote

D)

local

B) central
All of the following are extra precautions you can take to secure a wireless network EXCEPT ________.

A)

change your network name (SSID)

B)

turn on security protocols

C)

create a passphrase

D)

enable SSID broadcast

D) enable SSID broadcast
A computer ________ is two or more computers connected using software and hardware so that they can communicate with each other.

A)

node

B)

switch

C)

network

D)

broadband

C) network
The unique number assigned to a network adapter by the manufacturer is referred to as the ________ address.

A)

IP

B)

network

C)

MAC

D)

SSID

A) IP
The processor market for desktop and laptop computers is dominated by ________.

A)

IBM

B)

Apple

C)

Intel

D)Microsoft

To speed up the display of graphics, a(n) ________ is installed on some video cards.

A)

CPU

B)

GPU

C)

ALU

D) SSD

GPU
To securely erase data, the U.S. Department of Defense suggests that the data be overwritten ________ times.

A)

ten

B)

five

C)

two

D)

seven

D) Seven
Which of the following activities is carried out by the ALU?

A)

Move read/write heads.

B)

Render video images.

C)

Perform arithmetic calculations.

D)

Create virtual memory.

C) perform arithmetic calculations
The fastest version of wireless Ethernet is ________.

A)

802.11g

B)

802.11ab

C)

802.11ac

D)

802.11n

C) 802.11ac
Data are sent through a network in bundles called ________.

A)

nodes

B)

packages

C)

packets

D)

pouches

C) packets
A(n) ________ device facilitates file sharing and data backup.

A)

UTP

B)

NOS

C)

WAN

D)

NAS

D) NAS
The ________ has the largest capacity of any storage device.

A)

SSD

B)

DVD

C)

mechanical hard drive

D)

CD

C) mechanical hard drive
When referring to hard drives, access time is measured in ________.

A)

milliseconds

B)

bps

C)

kilobytes

D)

megahertz

A) milliseconds
Sophisticated networks generally use which of the following hardware devices to ease the flow of data through the network?

A)

USB ports

B)

Firewalls

C)

Firmware

D)

Routers and switches

D) routers and switches
Which of the following is NOT a type of UTP cable you would use in a wired Ethernet network?

A)

Cat 6

B)

Cat 6A

C)

Cat 7B

D)

Cat 5E

C) Cat7B
For the nodes on a network to communicate with each other and access the network, each node needs a ________.

A)

DSL modem

B)

hub

C)

network adapter

D)

router

C) network adapter
All of the following are tasks for network administration of a large organization EXCEPT ________.

A)

monitoring network performance

B)

updating and installing new software on the network

C)

installing new computers and devices on the network

D)

purchasing initial equipment for the network

D) purchasing initial equipment for the network
To transfer data packets between two or more networks, a ________ is used.

A)

hub

B)

firewall

C)

router

D)

switch

C) router
A ________ is a network located in your residence that connects to all your digital devices.

A)

MAN

B)

WAN

C)

LAN

D)

HAN

D) HAN
Which of the following is NOT a type of cable used in wired networks?

A)

Unshielded twisted-pair

B)

Fiber-optic

C)

Coaxial

D)

Unshielded coaxial

D) Unshielded coaxial
All of the following operating systems support P2P networking EXCEPT ________.

A)

Unix

B)

OS X

C)

Windows

D)

Linux

A) UNIX
A network that spans a large physical distance is called a ________.

A)

WAN

B)

LAN

C)

MAN

D)

PAN

WAN