You are on page 1of 24

CHNG TRNH O TO C NHN QUN TR KINH DOANH QUC T Website: www.griggs.edu.vn Email: gabba@griggs.edu.

vn

INTRODUCTION TO COMPUTER TEST BANK


Time allocated: 120 minutes. Chapter 6 Inside the System Unit 1) Hardware performance: A) is independent of the operating system that is installed on the computer. B) is measured as the exact speed of the processor. C) refers to how fast the computer can perform the functions of input, processing, output, and storage. D) is not affected by components that do not match each other. Answer: C Diff: 2 Reference: Chapter Introduction 2) A byte: A) is the equivalent of eight binary digits. B) represents one digit in the decimal numbering system. C) is the smallest unit of information that a computer can process. D) can be compared to the state of one light switch being either on or off. Answer: A Diff: 2 Reference: How Computers Represent Data 3) Computers count with ________ numbers. A) regular B) binary C) decimal D) digital Answer: B Diff: 2 Reference: How Computers Represent Data

4) In the binary numbering system, one binary digit is called a:


1

A) byte. B) character. C) word. D) bit. Answer: D Diff: 1 Reference: How Computers Represent Data 5) Which of the following components would NOT be found inside the system unit? A) Motherboard B) USB port C) Power supply D) Cooling fan Answer: B Diff: 1 Reference: Inside the System Unit 6) In the strictest sense of the term, the ________ contains the CPU. A) system unit B) unit frame C) motherboard D) computing platform Answer: C Diff: 1 Reference: Inside the System Unit 7) The central processing unit (CPU): A) plays a minimal role in processing data. B) is different from a microprocessor. C) is a fairly simple device. D) is an integrated chip capable of processing signals. Answer: D Diff: 1 Reference: The CPU: The Microprocessor 8) A CPU's word size is important because it determines which ________ the CPU can use. A) application software B) input devices C) disk storage D) operating system Answer: D Diff: 3 Reference: The CPU: The Microprocessor

9) The I/O bus extends the internal pathways beyond the boundaries of the microprocessor to
2

communicate with: A) the operating system. B) memory. C) I/O devices. D) stored files. Answer: C Diff: 2 Reference: The Chipset and the Input/Output Bus 10) RAM stands for: A) rapidly accessed memory. B) random access memory. C) reliable associated memory. D) repeated auxiliary memory. Answer: B Diff: 1 Reference: Memory 11) Which of the following types of memory is erased when the computer is turned off? A) RAM B) ROM C) REM D) RIM Answer: A Diff: 1 Reference: Memory 12) Which of the following types of memory is NOT erased when the computer is turned off? A) RAM B) ROM C) REM D) RIM Answer: B Diff: 1 Reference: Memory 13) The RJ-45 connector looks like a telephone jack and is used to connect to a: A) network. B) sound card. C) keyboard. D) mouse. Answer: A Diff: 1 Reference: Connectors and Ports 14) A(n) ________ is the smallest piece of information with which a computer can work. Answer: bit
3

Diff: 1 Reference: How Computers Represent Data 15) Because a computer uses direct current (DC) and wall outlets use alternating current (AC), a(n) ________ is needed to convert the current. Answer: power supply Diff: 1 Reference: Inside the System Unit 16) The ________ is the large printed circuit board that holds the computer's important components such as the microprocessor. Answer: motherboard Diff: 1 Reference: What's on the Motherboard? 17) The ________ switch is used to restart your computer. Answer: reset Diff: 1 Reference: The Front Panel Chapter 7 Input/Output & Storage 18) Which of the following is still the most common method for data entry? A) Microphone B) Stylus C) Keyboard D) Scanner Answer: C Diff: 1 Reference: Keyboards 19) Which key or key combination is typically used to cancel the current operation? A) Backspace B) Ctrl + Delete C) End D) Esc Answer: D Diff: 2 Reference: Keyboards 20) In a cathode-ray tube monitor, which three colors are combined to produce various shades? A) Black, white, and gray B) Blue, yellow, and green C) Red, green, and blue D) Yellow, blue, and green Answer: C Diff: 2 Reference: Monitors
4

21) Which of the following is NOT a flat-panel display technology? A) CRT B) gas-plasma C) TFT D) FED Answer: A Diff: 2 Reference: Monitors 22) Which type of printer is inexpensive and produces excellent color output? A) Laser B) Inkjet C) Plotter D) Thermal transfer Answer: B Diff: 1 Reference: Printers 23) Which of the following is NOT a reason for using storage rather than memory to hold data and information? A) Storage devices are nonvolatile. B) Storage devices are inexpensive compared to RAM. C) Storage devices traditionally have faster access times than RAM. D) There are limitations to the size of RAM. Answer: C Diff: 2 Reference: Memory versus Storage 24) Demand for storage has: A) increased tremendously. B) decreased. C) remained flat. D) only minimally increased. Answer: A Diff: 2 Reference: Storage: Holding Data for Future Use 25) A common reason for using hard disk partitions in a computer system is: A) a different partition can be used for each application software product. B) partitions enable the computer to boot different operating systems. C) hard disks over 1 GB in capacity must be partitioned due to their size. D) partitioned hard disks have a faster access time. Answer: B Diff: 2 Reference: Hard Disk Drives

26) With magnetic storage devices, an electromagnet that moves across the surface of a disk and records information is called a: A) read/write head. B) access head. C) read/write arm. D) electromagnetic sensor. Answer: A Diff: 2 Reference: Hard Disk Drives 27) A flash drive is a type of storage that uses what type of circuitry? A) Solid-state B) Liquid crystal C) Semiconductor D) Virtual Answer: A Diff: 3 Reference: Flash Drives and Storage 28) Which of the following statements best describes the storage capability of a CD-ROM disc? A) It can be written to once by the user, but then can only be read. B) It can be read many times by the user, but never written to. C) It can be written to over and over, with new data overwriting previous content. D) It can be read only once by the user, such as during a software installation. Answer: B Diff: 1 Reference: CD and DVD Technologies 29) What is the maximum storage capacity for a DVD? A) 1.5 GB B) 3.7 GB C) 17 GB D) 25 GB Answer: C Diff: 3 Reference: CD and DVD Technologies 30) You enter data and instructions into computer memory by using a(n) ________ device. Answer: input Diff: 1 Reference: Input Devices: Giving Commands 31) A(n) ________ is a device that has alphabetic, numeric, punctuation, and control keys. Answer: keyboard Diff: 1 Reference: Keyboards

32) A(n) ________ is an input device that is used to convert sound input into electronic signals for a computer. Answer: microphone Diff: 1 Reference: Additional Input Devices 33) A(n) ________ is an input device that can duplicate anything that is printed on a sheet of paper. Answer: scanner Diff: 1 Reference: Additional Input Devices 34) Printed output is also referred to as a(n) ________. Answer: hard copy Diff: 1 Reference: Monitors 35) A(n) ________ device is computer hardware that does not lose its data when the power is shut off. Answer: storage Diff: 1 Reference: Storage: Holding Data for Future Use 36) ________ is another term for primary storage. Answer: Computer memory Diff: 2 Reference: Hard Disk Drives 37) ________ storage devices use tightly focused laser beams to detect microscopic data patterns. Answer: Optical Diff: 1 Reference: CD and DVD Technologies Chapter 8 Networks: Communicating and Sharing Resources 38) Which of the following is NOT a network communications device? A) Router B) Switch C) LAN D) NIC Answer: C Diff: 2 Reference: Network Fundamentals

39) A small computer classroom consisting of 20 workstations and a laser printer would use a ________ area network. A) limited B) line C) local D) little Answer: C Diff: 2 Reference: Network Fundamentals 40) What is the largest wide area network (WAN)? A) United States Government B) NATO C) Internet D) International Banking System Answer: C Diff: 2 Reference: Network Fundamentals 41) When a computer is connected to a network, it is called a: A) communications device. B) router. C) peripheral. D) client. Answer: D Diff: 2 Reference: Network Fundamentals 42) Which network device has the capability to determine the best path to transmit data and determine alternative pathways? A) Pathfinder B) Router C) Director D) Switch Answer: B Diff: 2 Reference: Network Fundamentals 43) People use networks to share data and: A) resources. B) modems. C) routers. D) switches. Answer: A
8

Diff: 2 Reference: Network Fundamentals 44) Which is NOT a disadvantage of networks? A) Sharing important information B) Loss of autonomy C) Lack of privacy D) Security issues Answer: A Diff: 2 Reference: Advantages & Disadvantages of Networking 45) A home network is an example of: A) a WAN. B) a LAN. C) a MAN. D) All of the above. Answer: B Diff: 2 Reference: Local Area Networks 46) A local area network (LAN) in which all the computers are equals is called a(n) ________ network. A) client/server B) peer-to-peer C) equal resource D) equal sharing Answer: B Diff: 1 Reference: Peer-to-Peer Networks 47) P2P networks are often used for what type of networks? A) Small businesses B) Educational institutions C) Corporations D) Government agencies Answer: A Diff: 1 Reference: Peer-to-Peer Networks 48) The term network topology refers to the: A) type of Internet connections available to users of the network. B) type of network operating system used on the file server. C) physical layout of a local area network. D) contention-management strategy used to resolve collisions. Answer: C Diff: 2
9

Reference: LAN Topologies

49) Which protocol does Ethernet use? A) TCP/IP B) IP C) OSI D) CSMA/CD Answer: D Diff: 1 Reference: LAN Protocols 50) A protocol suite specifies how the network functions, or its: A) network suite. B) network architecture. C) network package. D) network configuration. Answer: B Diff: 2 Reference: LAN Protocols 51) Because of their complexity, networks use an architecture that is divided into separate network: A) modules. B) elements. C) levels. D) layers. Answer: D Diff: 2 Reference: LAN Protocols 52) The protocols in each network layer define how each layer passes ________ to each other. A) data B) acknowledgements C) switches D) stacks Answer: A Diff: 2 Reference: LAN Protocols 53) Which type of media is used to connect today's Ethernet computers? A) Coaxial cable B) Phone lines C) Microwave signals D) Twisted-pair wire Answer: D Diff: 2 Reference: LAN Protocols
10

54) Which LAN standard is widely used for both large and small businesses? A) Ethernet B) Biznet C) LocalTalk D) Category 5 Answer: A Diff: 2 Reference: LAN Protocols 55) Which type of network requires an access point? A) Ethernet B) Wi-Fi C) Novell D) Packet-switching Answer: B Diff: 1 Reference: Local Area Networks 56) Which feature enables the strongest Wi-Fi encryption protection? A) WDDI B) WAP C) WEP D) WPA Answer: D Diff: 2 Reference: LAN Protocols 57) What is the name for the high-capacity transmission lines that carry WAN traffic? A) Coaxial cables B) Backbones C) Cores D) Negotiators Answer: B Diff: 1 Reference: Backbones 58) A(n) ________ is comprised of several linked computer systems exchanging and sharing data and resources. Answer: network Diff: 1 Reference: Network Fundamentals 59) Network ________ are essential to the efficient management of networks. Answer: administrators Diff: 2 Reference: Network Fundamentals
11

12

60) ________ area networks use cables, radio waves, or infrared transmissions to connect computers and peripherals devices. Answer: Local Diff: 1 Reference: Network Fundamentals 61) ________ area networks use long-distance transmission media to connect computers and peripheral devices that are separated by a few or thousands of miles. Answer: Wide Diff: 1 Reference: Network Fundamentals 62) A networked computer is called a(n) ________. Answer: client or node Diff: 2 Reference: Network Fundamentals 63) A(n) ________ is used to connect two or more networks. Answer: router Diff: 2 Reference: Network Fundamentals 64) A(n) ________ LAN uses radio waves so that users can remain connected to the network as they move about in the building. Answer: wireless Diff: 1 Reference: Local Area Networks 65) A typical corporate or educational LAN is called a(n) ________ network. Answer: client/server Diff: 1 Reference: Client/Server Networks 66) The standards that allow network-connected components to communicate with each other are called ________. Answer: protocols Diff: 1 Reference: LAN Protocols 67) Network protocols are fixed, formalized exchanges that specify how dissimilar network components can establish ________. Answer: communication Diff: 2 Reference: LAN Protocols

13

68) A(n) ________ is a unit of data with a fixed size. Answer: packet Diff: 1 Reference: LAN Protocols 69) The wireless LAN standard is referred to as ________. Answer: Wi-Fi Diff: 1 Reference: LAN Protocols 70) The Internet protocol suite is referred to as ________. Answer: TCP/IP Diff: 1 Reference: WAN Protocols 71) Every computer on the Internet must have a(n) ________. Answer: Internet address or IP address Diff: 2 Reference: WAN Protocols 72) When ________ switching is used, data is transmitted over a physical end-to-end circuit between the sending and receiving computers. Answer: circuit
Diff: 2

Chapter 9 Privacy, Crime, & Security 73) An individual's ability to restrict or eliminate the collection, use, and sale of confidential personal information is known as A) basic rights. B) privacy. C) confidentiality. D) cyber-trust. Answer: B Diff: 2 Reference: Privacy in Cyberspace 74) The ability to convey a message without disclosing your name or identity is known as: A) privacy. B) confidentiality. C) anonymity. D) cyber-blocking. Answer: C Diff: 2 Reference: Technology and Anonymity
14

75) What is the best definition of a cookie? A) It is a plain-text file written to your hard disk by a Web site you visit. B) It is a virus appended to an online shopping transaction. C) It is a file containing consumer information sold by an online store to a marketing company. D) It is an unsolicited advertisement that pops up on your computer. Answer: A Diff: 2 Reference: Cookies 76) ________ allows an employer to observe employee phone calls, e-mails, and Web browsing. A) Employee watching B) Employee monitoring C) Worker watching D) Worker monitoring Answer: B Diff: 1 Reference: Protecting Your Privacy 77) In which type of attack does the attacker poses as a legitimate company in an e-mail or Web site? A) Phishing B) Phreaking C) Spiffing D) Spying Answer: A Diff: 1 Reference: Types of Computer Crime 78) This type of software collects your personal information, monitors your Web surfing habits, and distributes this information to a third party. A) Popup-ware B) Advertisement software C) Spyware D) Malware Answer: C Diff: 1 Reference: Types of Computer Crime 79) Many computer viruses are spread by: A) CDs and DVDs. B) e-mail attachments. C) LAN and WAN connected computers. D) software downloaded from the Internet. Answer: B
15

Diff: 1 Reference: Types of Computer Crime 80) Which type of rogue program is disguised as a useful program but contains hidden instructions to perform a malicious task? A) Trojan horse B) Adware C) Spartan horse D) Mal-worm Answer: A Diff: 1 Reference: Types of Computer Crime 81) An Internet ________ attack occurs when an Internet server is purposely overloaded so that it cannot process legitimate transmissions. A) denial of service B) mailing list C) Trojan horse D) worm Answer: A Diff: 1 Reference: Types of Computer Crime 82) A ________ is a program that does NOT have to be executed in order to propagate over a network. A) time bomb B) macro virus C) Trojan horse D) worm Answer: D Diff: 1 Reference: Types of Computer Crime 83) What is the best definition of a computer hacker? A) A hacker is a person who investigates a computer system to understand both its full capabilities and vulnerabilities. B) A hacker is a criminal who invades computer systems to obtain information or money. C) A hacker is a slang term for a professional programmer. D) A hacker is a person who is highly skilled in computer programming but has had no formal education. Answer: A Diff: 2 Reference: Meet the Attackers 84) Firewalls are used to: A) check for viruses on a company's network. B) eavesdrop on employee e-mail.
16

C) restrict outsiders from accessing internal data. D) prevent employees from sending e-mail beyond the confines of the network. Answer: C Diff: 2 Reference: Protecting Your Computer System 85) What is the study of converting information into encoded or scrambled formats called? A) Paleontology B) Cryptography C) Epistemology D) Numerology Answer: B Diff: 1 Reference: The Encryption Debate 86) ________ refers to the capability of sending a message without disclosing your identity. Answer: Anonymity Diff: 1 Reference: Technology and Anonymity 87) Spector is a software application that is used for ________. Answer: employee monitoring Diff: 2 Reference: Protecting Your Privacy 88) The term malware is short for ________. Answer: malicious software Diff: 2 Reference: Types of Computer Crime 89) Code hidden within a program that damages or destroys files is called a computer ________. Answer: virus Diff: 1 Reference: Types of Computer Crime 90) If you play a game downloaded from the Internet and find out that it harmed your computer system, you may have been the victim of a destructive program called a(n) ________. Answer: Trojan horse Diff: 1 Reference: Types of Computer Crime 91) A DoS attack is a denial of ________ attack. Answer: service Diff: 2 Reference: Types of Computer Crime 92) DDoS is an acronym for ________. Answer: distributed denial of service
17

Diff: 2 Reference: Types of Computer Crime 93) A DoS attack is also called ________. Answer: syn flooding Diff: 2 Reference: Types of Computer Cri 94) ________ are devices the size of a credit card with their own internal memories. Answer: Smart cards Diff: 2 Reference: Protecting Your Computer System 95) A(n) ________ is a computer program that permits a user on the internal network to access the Internet but severely restricts transmissions from the outside. Answer: firewall Diff: 2 Reference: Protecting Your Computer System Chapter 14 Enterprise Computing

96) Using technology, information systems, and computers within an organization or business is called ________ computing. A) enterprise B) integrated C) large-scale D) massively integrated Answer: A Diff: 1 Reference: Introduction 97) A(n) ________ is a business or any large organization. A) enterprise B) integrated firm C) large-scale firm D) corporate firm Answer: A Diff: 1 Reference: Introduction 98) Business processes are activities that: A) determine the financial health of a company. B) have definable output and value to customers. C) use the company information system. D) are monitored by management as they supervise employees.
18

Answer: B Diff: 2 Reference: Business Processes and Activities

19

99) Which of the following is NOT an internally focused system? A) Accounting B) Finance C) Sales D) Human resources Answer: C Diff: 2 Reference: Business Processes and Activities 100) What is the best definition of e-business? A) E-business is the use of e-mail for business correspondence. B) E-business is the verification of credit cards over the Internet. C) E-business is a company where all employees telecommute. D) E-business is the conducting of business on the Internet. Answer: D Diff: 1 Reference: E-Business Techtalk 101) Which of the following is NOT a feature of an enterprise system? A) It stores company data in a central repository. B) It offers users a common interface to the system. C) It allows data to be shared by company personnel. D) It requires all employees to use the same type of computer and operating system. Answer: D Diff: 2 Reference: Enterprise Systems 102) Which is NOT a benefit of enterprise systems? A) Accurate and on-time shipments B) Minimize costs C) Interconnect all suppliers D) Increase profitability Answer: C Diff: 2 Reference: Enterprise Systems 103) BPR is an acronym for: A) Business Program Reengineering B) Business Process Relevance C) Business Process Reengineering D) Business Projects and Reengineering Answer: C Diff: 2 Reference: Business Process Reengineering

20

104) Business Process Management evolved from: A) Six Sigma B) The Project Management Institute C) Business Process Reengineering D) Just-In-Time Answer: C Diff: 2 Reference: Business Process Management 105) Typically, what type of person is selected to lead Business Process Management initiatives? A) Systems analyst B) Project leader C) Technical architect D) Business analyst Answer: D Diff: 2 Reference: Business Process Management 106) A(n) ________ is a written plan that specifies steps to be taken in the event of an emergency. A) emergency plan B) backup plan C) disaster recovery plan D) contingency plan Answer: C Diff: 2 Reference: Applying Technology in the Enterprise 107) Which of the following types of software is used to integrate all facets of a business into a single computer system? A) Customer Relationship Management (CRM) B) Enterprise Resource Planning (ERP) C) Microsoft Office XP D) Sales Force Automation (SFA) Answer: B Diff: 2 Reference: Enterprise Resource Planning 108) The purpose of customer relationship management (CRM) software is to: A) provide a secure online shopping experience. B) automate billing and collection services. C) pursue a new customer base by analyzing national consumer behavior. D) retain and satisfy current customers. Answer: D Diff: 2 Reference: Customer Relationship Management 109) Which of the following is NOT a CRM phase?
21

A) Customer acquisition B) Customer retention C) Customer enhancement D) Customer release Answer: D Diff: 2 Reference: Customer Relationship Management 110) Which tool is used interchangeably with CRM? A) Supply chain management B) Call center marketing C) Sales force automation D) Human resource management Answer: C Diff: 2 Reference: Sales Force Automation 111) The storage capacity of network-attached storage (NAS) devices ranges up to: A) hundreds of megabytes. B) tens of petabytes. C) millions of bytes. D) thousands of kilobytes. Answer: B Diff: 3 Reference: Network-Attached Storage 112) Which of the following is NOT true about company intranets? A) Intranet Web sites look similar to traditional Internet sites. B) Firewalls control access to intranets from the outside. C) Intranets can only be accessed by authorized users within an organization. D) Intranets cannot use TCP/IP protocols. Answer: D Diff: 2 Reference: Intranets and Extranets 113) A Virtual Private Network (VPN) uses: A) a company extranet with limited external access for authorized users. B) a public network to lease transmission lines. C) leased lines to provide security. D) a virtual reality network simulator. Answer: C Diff: 3 Reference: Virtual Private Networks

114) SOHO stands for:


22

A) small office/home office. B) separate office/home office. C) standard operation/hierarchical output. D) sequential output/homogeneous operation. Answer: A Diff: 2 Reference: Teleconferencing 115) What is carrying out business activities by using telecommunications and computer equipment by two or more people at distant locations called? A) Multiplexing B) Teleconferencing C) Interfacing D) Networking Answer: B Diff: 1 Reference: Teleconferencing 116) The greatest drawback to using video teleconferencing is the: A) need for high bandwidth. B) lack of quality video cameras. C) poor quality of the monitors. D) poor audio component of the video signal. Answer: A Diff: 2 Reference: Teleconferencing 117) What is the process in which documents and data are sent to the next person who needs them? A) Facsimile transmission B) Group dynamics C) Workgroup relaying D) Workflow automation Answer: D Diff: 1 Reference: Workgroup Computing 118) A(n) ________ refers to a business or any other large organization Answer: enterprise Diff: 1 Reference: Introduction 119) A(n) ________ is a situation in which an organization has a superior position over the companies with which it competes. Answer: competitive advantage Diff: 2 Reference: Business Processes and Activities 120) ________ are activities that have an identifiable output and value to the organization's
23

customers. Answer: Business processes Diff: 2 Reference: Business Processes and Activities 121) ________ systems are information systems that enable companies to integrate information and applications across operations on a company-wide basis. Answer: Enterprise Diff: 2 Reference: Enterprise Systems 122) In a(n) ________ structure, a company's IT department manages all technology and employees use the same standardized information systems. Answer: centralized Diff: 2 Reference: Centralized versus Distributed Structures 123) ________ uses information technology to bring about major organization changes as well as cost savings. Answer: Business process reengineering or BPR Diff: 3 Reference: Business Process Reengineering 124) Improving existing processes and optimizing assets by managing the entire life cycle of business processes is called ________ . Answer: business process management or BPM Diff: 3 Reference: Business Process Management 125) A(n) ________ plan contains detailed instructions that identify alternative emergency computing facilities. Answer: disaster recovery Diff: 1 Reference: Applying Technology in the Enterprise 126) Using telecommunications and computer equipment to work from home and still connect to the office is called ________. Answer: telecommuting Diff: 1 Reference: Telecommuting

24

You might also like