Upload
jason-ko
View
4
Download
1
Embed Size (px)
DESCRIPTION
good
Citation preview
Chapter 5 (Input & Output) / chap.7
True/False
1. On notebook and some handheld computers, PDAs, and smart phones, the keyboard is built in the
top of the system unit.
2. An air mouse is a newer type of motion-sensing mouse that allows you to control objects, media
players, and slide shows by moving the mouse in predetermined directions through the air.
3. Resolution is the number of horizontal and vertical pixels in a display device
4. A video conference is a meeting between two or more geographically separated people who use a
network or the Internet to transmit audio and video data
5. Plasma monitors offer larger screen sizes and richer colors than LCD monitors.
6. Most photo printers are PictBridge enabled, which requires the use of a computer to print pictures
7. A line printer is a high-speed impact printer that prints one character at a time.
8. The advantage of a multifunction peripheral is that it is significantly more expensive than if you
purchase each device separately.
1. An ergonomic keyboard _______.
a. is used to enter data into a biometric device
b. has a design that reduces wrist and hand injuries
c. transmits data using wireless technology
d. is built into the top of a handheld computer
2. Two types of pen input are _______.
a. digital pen and touch screen
b. stylus and digital pen
c. trackball and stylus
d. pointing stick and digital pen
3. A _______ controls the movement and actions of
players or objects in video games or computer games.
a. control pad
b. pointing stick
c. gamepad
d. touchpad
4. A(n) _______ is a type of digital video camera that
enables a home or small business user to capture video
and still images, send e-mail messages with video
attachments, add live images to instant messages,
broadcast live images over the Internet, and make video
telephone calls.
a. PC camera
b. digital video camera
c. Web cam
d. optical mouse
5. RFID is a technology that uses _______ to
communicate with a tag placed in or attached to an
object, an animal, or a person.
a. a thin wire
b. pixels
c. light waves
d. radio signals
6. The speed of an ink-jet printer is measured by the
number of _______ it can print.
a. pages per minute (ppm)
b. dots per inch (dpi)
c. characters per second (cps)
d. lines per page (lpp)
7. Most surround sound computer speaker systems
include one or two center speakers and two or more
_______ that are positioned so sound emits from all
directions.
a. headphones
b. subwoofers
c. satellite speakers
d. none of the above
8. A(n) _______ is an output device for blind users.
a. head-mounted pointer
b. Braille printer
c. on-screen keyboard
d. all of the above
Chapter 7 (Storage) / chap.8
True/False
1. Secondary storage is the physical material on which a computer keeps data, instructions, and information.
2. Reading is the process of transferring data, instructions, and information from memory to a storage medium
3. A sector is a narrow recording band that forms a full circle on the surface of the disk.
4. A typical hard disk usually contains only one platter.
5. A removable hard disk is a separate, free-standing hard disk that connects with a cable to a port on the system unit.
6. A floppy disk is a portable storage medium.
7. A CD-ROM can be read from and written on any number of times.
8. A UMD can store up to 4.8 GB of games, movies, or music.
9. BD-RE and HD DVD-RW are competing high-capacity rewritable DVD formats.
10. Unlike PC Cards, ExpressCard modules can be used to add memory, storage, communications, multimedia, and security capabilities to a computer.
1. _______ measures the amount of time it takes a
storage device to locate an item on a storage
medium.
a. Capacity
b. Access time
c. A storage medium
d. Reading
2. A group of two or more integrated hard disks is
called a _______.
a. backup
b. platter
c. RAID
d. portable hard disk
3. A(n) _______ is a self-contained unit that you
insert in and remove from a slot or USB port in a
device or a computer.
a. RAID
b. pocket hard drive
c. online storage
d. disk controller
4. Users subscribe to an online storage service to
_______.
a. access files from any computer that has Internet
access
b. allow others to access files
c. store offsite backups of data
d. all of the above
5. _______ technology works with specially coated
optical discs to etch labels directly on the disc.
a. SCSI
b. SATA
c. LightSaber
d. LightScribe
6. _______ storage requires sequential access.
a. Hard disk
b. DVD
c. Floppy disk
d. Tape
7. A _______ is a memory storage device that
plugs in a USB port on a computer or mobile
device.
a. PC Card
b. UMD
c. USB flash drive
d. Memory Stick
8. Microfilm and microfiche _______.
a. are expensive
b. have the longest life of any storage media
c. greatly increase the amount of paper firms must
handle
d. all of the above
Chapter 8 (Operating System & Utility Software) / chap.9
True/False
1. The operating system that a computer uses sometimes is called the level
2. Booting is the process of permanently removing a computer from operation.m
3. In a command-line interface, you interact with menus and visual images such as buttons
and other graphical objects to issue commands
4. When spooling print jobs to a buffer, multiple print jobs line up in a queue in the buffer
5. A folder is a specific named location on a storage medium that contains related
documents
6. A personal firewall is a utility program that detects and protects a personal computer from
unauthorized intrusions.
7. A disk defragmenter is a utility that reorganizes the files and unused space on a
computer’s hard disk so the operating system accesses data more quickly and programs
run faster.
8. Linux is open source software, which means its code cannot be modified or redistributed.
9. Web filtering software is a program that secretly collects information about a user, often
related to the user’s Web browsing habits
10. Compressed files sometimes are called utility files
1. In the Windows Vista operating system, the _____
interface provides an enhanced visual look, additional
navigation options, and animation.
a. Plug and Play
b. Windows Vista Basic
c. Mac OS X
d. Windows Aero
2. A _____ is a small program that tells the operating
system how to communicate with a specific device.
a. buffer
b. driver
c. performance monitor
d. device
3. A _____ is a program that attempts to locate a file on
your computer based on criteria you specify.
a. file manager
b. search utility
c. Startup folder
d. worm
4. Defragmenting reorganizes the files on a disk so they
are located in _____ access time.
a. noncontiguous sectors, which slows
b. noncontiguous sectors, which speeds
c. contiguous sectors, which slows
d. contiguous sectors, which speeds
5. The operating system on most PDAs and small
devices, called a(n) _____, resides on a ROM chip.
a. network operating system
b. embedded operating system
c. stand-alone operating system
d. stand-alone utility program
6. Personal firewalls, backup utilities, and screen savers
are examples of _____.
a. antivirus programs
b. network operating systems
c. stand-alone operating systems
d. stand-alone utility programs
7. _____ software is a program that restricts access to
certain material on the Web.
a. Antivirus
b. Spyware remover
c. Web filtering
d. Adware
8. A _____ is a program that allows you to view images
and animation, listen to audio, and watch video files on
your computer.
a. file manager
b. media player
c. service pack d. Media Center PC
Chapter 9 (Communication & Network) / chap.10
True/False
1. Computer communications describes a process in which two or more computers or devices transfer
data, instructions, and information
2. E-mail is the transmission of messages and files via a computer network.
3. A 3G network uses infrared technology to provide users with high-speed wireless Internet
connections
4. A network is a collection of computers and devices connected together via communications devices
and transmission media.
5. A metropolitan area network (MAN) is a network that covers a small geographic area using a
communications channel that uses a single type of media
6. Ethernet is a network standard that specifies no central computer or device on the network (nodes)
should control when data can be transmitted
7. A dial-up line is a temporary connection that uses one or more analog telephone lines for
communications.
8. Fiber to the Home (FTTH) refers to small businesses that use fiber-optic cables to access the
Internet.
9. A cable modem is a digital modem that sends and receives digital data over the cable television
network.
10. Routers along the Internet backbone forward data packets to their destination using the fastest
available path
11. Noise is an electrical disturbance that can degrade communications
1. A_____ is a coffeehouse, restaurant, or other location
that provides personal computers with Internet access to
its customers.
a. hot spot
b. cybercafé
c. wireless Internet access point
d. none of the above
2. _____ includes tools that enable users to share
documents via online meetings and communicate with
other connected users.
a. A document management system
b. Electronic data exchange
c. Collaborative software
d. A file sharing network
3. A _____ network is a third-party business that
provides networking services for a fee.
a. star
b. client/server
c. value-added
d. file sharing
4. _____ is a newer network standard developed by IEEE
that specifies how wireless devices communicate over
the air in a wide area.
a. Wi-Fi
b. WiMAX
c. 802.16
d. Both b and c
5. Communications software consists of programs that do
all of the following, except _____.
a. help users establish a connection to another computer
or network
b. manage the transmission of data, instructions, and
information
c. provide an interface for users to communicate with one
another
d. convert a computer’s analog signals into digital signals
for transmission
6. The most popular T-carrier line is the _____.
a. T1 line
b. ATM
c. T3 line
d. DSL
7. DSL, cable television Internet service, and satellites
offer_____ transmission.
a. baseband
b. IrDA
c. microwave
d. broadband
8. _____ consists of a single copper wire surrounded by
at least three layers.
a. Fiber-optic cable
b. Infrared
c. Twisted-pair cable d. Coaxial cable
Chapter 10 (Security, Ethics, Privacy) / chap.5
True/False
1. Any illegal act involving a computer generally is referred to as a cybercrime.
2. Hackers often claim the intent of their security breaches is to improve security.
3. A firewall is hardware and/or software that allows users to bypass security controls when accessing
a program, computer, or network
4. In order to safeguard against unauthorized access and use of its computers, a company should have
a digital certificate
5. Biometric payment involves a customer's fingerprint being read by a fingerprint scanner that is
linked to a payment method such as a checking account or credit card
6. Digital signatures often are used to ensure that an impostor is not participating in an Internet
transaction
7. A digital certificate warns a user that software has been pirated.
8. Digital rights management (DRM) is a strategy designed to prevent illegal distribution of computer
viruses, worms, and Trojan horses
9. Spam is an unsolicited e-mail message or newsgroup posting sent to multiple recipients or
newsgroups at once.
10. Green computing involves reducing the electricity while using a computer, but the practice
increases environmental waste.
1. Malware is a term that can be used to describe _____.
a. viruses
b. worms
c. Trojan horses
d. all of the above
2. The _____ is the destructive event or prank that
malware is intended to deliver.
a. hash
b. payload
c. cookie
d. spam
3. A _____ is a compromised computer whose owner is
completely unaware the computer is being controlled
remotely by an outsider.
a. ghost
b. Trojan horse
c. back door
d. zombie
4. Physical access controls, such as locked doors and
windows, usually are adequate to protect against_____.
a. software piracy
b. unauthorized access
c. hardware theft
d. all of the above
5. Unencrypted, readable data is called _____.
a. hypertext
b. ciphertext
c. subtext
d. plaintext
6. A _____ gives authors and artists exclusive rights to
duplicate, publish, and sell their materials.
a. password
b. license
c. copyright
d. firewall
7. As related to the use of computers, ______ is defined
as gaining unauthorized access or obtaining confidential
information by taking advantage of the trusting human
nature of some victims and the naivety of others.
a. phishing
b. a virus hoax
c. social engineering
d. pharming
8. _____ involves the examination of computer media,
programs, data and log files on computers, servers, and
networks.
a. Encryption key
b. E-mail filtering
c. Forensics analysis
d. Trusted source