No student devices needed. Know more
105 questions
A computer system is made of two parts:
hard disks, input devices
output devices, RAM
hardware, software
Examples of ________ include the central processing unit and random access memory.
software
hardware
input devices
The term software refers to ____________ that direct hardware what to do.
applications
RAM
output devices
Examples of ________ include multimedia and presentation applications.
hardware
software
RAM
Productivity programs are an example of ________.
hardware
RAM
software
output devices
Hardware refers to the _________________ of a computer.
physical components
programming instructions
information processing cycle
short-term memory
Software refers to the ______________that direct hardware to perform a task.
physical components
programming instructions
information processing cycle
short-term memory
A student types text into a word processing program.
input
output
processing
storage
The computer checks and compares all words entered to find misspellings.
input
output
processing
storage
The computer shows possible misspellings on the screen.
input
output
processing
storage
You save the revised document to the hard disk.
input
output
processing
storage
CDs and DVDs are examples of _______
input
output
processing
storage
The keyboard and mouse are examples of _____ devices
input
output
processing
storage
The part of the information processing cycle in which raw data is received is known as _____.
input
output
processing
storage
The part of the information processing cycle where raw data is converted into meaningful information is __________.
input
output
processing
storage
The type of memory used during the processing cycle is ______ ______ ______.
long-term
hard disk space
permanent
random access memory
The series of mathematical steps taken by the CPU during processing results in ______.
processing
storage
output
retrieval
How have productivity programs improved the professional lives of people? (check all that apply)
made it easier and faster to communicate with others.
made it harder to create and modify documents.
made it easier to manipulate numbers in a spreadsheet.
made it easier and less expensive to present information.
How can computers contribute toward creating a “paperless society”? (check all that apply)
by making it easier to print copies for archival purposes.
by using LMS online programs in primary and secondary education.
by increasing the scope and type of input devices.
by making information available online to a larger number of people.
The ___ ____ would not be found inside the system unit.
CPU
USB port
RAM
A very fast port used for audio/video output is called ________.
Ethernet
USB port
FireWire
A very high-speed network connection port is called ________.
Ethernet
USB port
FireWire
USB stands for _________ ______ ___.
Universal System Bus
Universal Serial Bus
United Systems Bus
Refer to the image above. Then, identify the port.
HDMI
FireWire
Ethernet
USB
Refer to the image above. Then, identify the correct printer type.
inkjet
laser
Refer to the image above. Then, identify the correct printer type.
inkjet
laser
Based on this, which component would Mr. O be most concerned with when shopping for a new computer?
RAM
internal memory
keyboard
If Mr. O wanted to save his files to a portable device that he could fit into a carry-on for his business trips, which device will provide the most memory while not being too bulky?
external hard drive
CD
thumb
Which computer is faster?
Computer A
Computer B
Which computer has more storage space?
Computer A
Computer B
Which computer has more memory?
Computer A
Computer B
For a faster laptop with good RAM and storage, which computer should Mrs. P get?
Computer A
Computer B
The main storage device inside a computer where programs and files are saved is called
the ____ _____.
hard drive
CPU
motherboard
The process of getting instructions from RAM, decoding, executing, and then storing is a process known as the _______ _____.
machine cycle
system bus transport
FireWire, Ethernet, modem, and USB are all examples of _____.
ports
bytes
hertz
0101010 is an example of ______.
binary
I/O ports
read-only memory
A display or monitor with a larger number of ______ will have a clearer, more brilliant resolution.
pixels
ports
bytes
The more _____ a thumb drive has, the more storage capability it will provide.
hertz
bytes
pixels
Choose all of the devices where an operating system can be found.
mainframe and desktop computers
display monitors
smartphones
computer mice
embedded devices controlling robots
Choose all of the items that represent functions of an operating system.
manages peripheral hardware devices
runs software applications
manages user accounts and passwords
manages network connections
generates system error messages
Choose all of the items that represent functions of the operating system kernel.
memory management
process management
user interface
system input and output (I/O) management
file creation and management
Early electronic computing devices were ________ _________.
inexpensive.
compact and lightweight.
efficient in operation.
manpower intensive.
The operation of early electronic computing devices required:
an operating system (OS).
a single human operator.
customer-produced helper program libraries.
several computers networked together.
The popularity of the graphical user interface (GUI) on personal computers was spurred by the release of which computer:
IBM PC
Commodore PET
Apple Macintosh
Apple I
The early success of Microsoft was cemented by the release of which software product?
Altair BASIC
MS-DOS for the IBM PC
IBM’s OS/360
CP/M
Choose all of the items that represent operating systems largely derived from UNIX.
GNU/Linux
Mac OS X
IBM OS/360
BSD
Windows
Compared with other PC operating systems, the Microsoft Windows operating systems:
are free or very inexpensive.
can run on a variety of hardware.
have fewer available applications.
have lower ease of use.
Compared with other PC operating systems, the Linux-based operating systems:
are free or very inexpensive.
are much less secure.
do not run on a wide variety of hardware.
have a much higher ease of use.
You prefer to use Google products such as Gmail and the Google+ social networking site. Which of the following smartphone operating systems would have the best feature integration for you?
Windows Phone
Apple iOS
Bada
Android
Which of the following represent advantages of GPL-licensed software? Check all of the boxes that apply.
It is always free of cost.
It allows the source code to be modified.
It can be redistributed by the user.
It can be included in proprietary software.
It can be modified and re-sold as proprietary software.
Which of the following represent features of high-level programming languages? Check all of the boxes that apply.
They use only zeroes and ones.
They are used to author most software today.
They are CPU-specific.
They use friendly English-like languages.
They are compiled or interpreted into machine language.
Which of the following are examples of software? Check all of the boxes that apply.
operating system
web browser
word processor
device driver
the clipboard
Which of the following best describes application software?
coordinates hardware components
provides system utilities like the clipboard
performs useful tasks like word processing for the user
enables the operating system to work with attached hardware devices
maintains a system’s disk drives
Which of the following represent emerging classes of application software? Check all of the boxes that apply.
medical robotics
databases
machine translation
mobile phone apps
Software licensed as proprietary...
is usually free of cost.
often has lower quality than other types.
does not permit source code changes.
is rare in today’s marketplace.
can be redistributed by the user at will.
A software EULA is an agreement related to which of the following?
the process of installing the software
the way the software is used
the way the source code is modified
the terms of use of the software
the cost of the software
One disadvantage of using proprietary licensed software is that...
it cannot be upgraded.
the software company may decide to discontinue support for the product.
training, help, and support are weak.
it is not as user friendly as other types of software.
Software licensed using the Open Software Initiative (OSI) definition
does not allow developers to include it in proprietary software.
never restricts software modifications in any way.
can be modified and re-licensed as proprietary software.
is always free of cost.
A disadvantage to using open source software is...
it may restrict your ability to customize the software to suit your needs.
a higher level of technical skill may be required to install, use, or modify it.
you will need to find the developers who created the software to request their permission to reuse the source code.
you can use the software only if you make a donation to an open-source nonprofit organization.
Which of the following represent features of free software licensing? Check all of the boxes that apply.
is concerned with defending users’ freedom of use
is always free of cost
makes source code available for editing
allows users to redistribute modified software as proprietary
is an idea that was developed by the Open Source Initiative (OSI)
What changes to software are usually included in version upgrades?
bug fixes
new features
security fixes
malfunction repairs
A software update is also referred to as what?
a major version
a minor version
a feature enhancement
a patch
Which of the following best defines software migration?
using open-source code to create a new software product
replacing one software product with a product from another vendor
moving software from one computer to another
fixing software security issues
.avi
.rtf
.txt
.doc
.iBooks
.msg
.psd
Which of the following types of content are often saved in a binary format? Check all of the boxes that apply.
text
images
voice
video
Which of the following are examples of binary format files? Check all of the boxes that apply.
PDF files
Plain text files
Word files
Which of the following is an advantage to using plain text format? Check all of the boxes that apply.
It provides many options for formatting text for emphasis and readability.
It is easily read by most software and hardware because it requires little processing.
It can be used by programmers for source code files.
It ensures that files will never be corrupted.
A ____ format is not bound by copyrights, trademarks, patents, or restrictions.
free
proprietary
legal
illegal
A ___________ format is considered to be intellectual property, which means it is owned by an individual or organization.
free
proprietary
closed
binary
An open file format
is always free
can be free or proprietary
is not standardized
is rarely documented
A closed file format
is only open to US citizens
is illegal
is unpublished
can be free or proprietary
Which of the following should you consider when choosing a file format? Check all of the boxes that apply.
the need for future access
the need for privacy
the location of the file author
the need for digital preservation
Which of the following are common file naming conventions? Check all of the boxes that apply.
Avoid characters that have special meaning to operating systems.
Use more numerals than letters in file names.
Use descriptive and concise file names.
Include the file size in the file name.
Which of the following is another term for a subfolder?
root folder
tree folder
parent folder
child folder
Which of the following is the term for the topmost folder in a directory?
root folder
tree folder
start folder
seed folder
Which of the following statements is true of directory paths?
They reflect the way files are stored on a computer hard disk.
They are linear representations of a hierarchical file directory.
They are identical for all operating systems.
Which of the following is an example of a directory path? Check all of the boxes that apply.
A: + B: + summary.doc
C:\user\docs\summary.doc
/home/user/docs/summary.doc
In the Documents dialog box, click Open Summary.
Which of the following are best practices for managing folders? Check all of the boxes that apply.
Avoid using subfolders.
Use a consistent naming scheme.
Rename the root folder to your user name.
Take advantage of the hierarchical structure of the file system.
Set folder access permissions.
Which of the following are best practices for managing files? Check all of the boxes that apply.
Follow file naming conventions.
Keep file names brief and meaningful.
Place the files you access most frequently in the root folder.
Set file access permissions.
What can file managers be used for? Check all of the boxes that apply.
delete files
view files
address computer threats
manipulate files
create folders
In Windows, deleted files go to the _______ ___.
Recycle Bin
shared folder
Event Viewer
external storage device
If you want to see the most information about a file, you can view them in _______ ____.
details view
icon view
list view
A file manager can help you ____ _ ____.
move a file
view events
back up files
protect against viruses
Which of the following are examples of security threats? Select all of the boxes that apply.
antivirus software
bugs
power surges
theft of hardware
Which of the following are computer safety techniques? Check all of the boxes that apply.
Keep reinstalling operating system software.
Avoid using questionable software.
Protect the system with a password.
Keep food and beverages away from the computer.
Use spam protection.
What are some reasons that system management tools are used? Check all of the boxes that apply.
copy files
view events
find out more about security events
manage shared folders
find software, hardware, and system problems
The manipulation of data files on a computer using a file browser is ____ __________.
file management
file organization
system management
file copying
A ____ _______ is a computer program that allows a user to manipulate files.
file manager
virus
system management tool
security threat
A ________ ______ is anything that puts computer information at risk.
security threat
file management system
system management tool
Errors, flaws, mistakes, failures, or problems in a software program are called ____.
bugs
viruses
internal security threats
file management tools
Software programs that can spread from one computer to another are called _______.
viruses
internal security threats
system management tools
bugs
Explore all questions with a free account