Find study materials for any course. Check these out:
Browse by school
Make your own
To login with Google, please enable popups
To login with Google, please enable popups
Don’t have an account?
To signup with Google, please enable popups
To signup with Google, please enable popups
Sign up withor
Which of the following input technologies has been historically used for entering text and numbers on computers?
B) QWERTY keyboard
Which of the following selecting and pointing devices is used to simulate the process of drawing or sketching on a sheet of paper?
D) graphics tablet
The ________ is an innovative pointing device developed primarily for the disabled for help with computer pointing.
A) eye-tracking device
Which of the following pointing devices works by moving a small lever that sits in a holder?
Entering a large number of separate forms or documents into a computer system and manipulating this data at a single time is referred to as ________.
C) batch processing
Which of the following types of specialized scanners is used to scan questionnaires and test answer forms where answer choices are indicated by filling in circles using pencils or pens?
A) optical mark recognition
________ is a scanning technology used to read and digitize typewritten, computer-printed, and even handwritten characters such as those on sales tags on department store merchandise, patient information in hospitals, or the address information on a piece of postal mail.
D) Optical character recognition
Which of the following scanning technologies is used by the banking industry to read data, account numbers, bank codes, and check numbers on preprinted checks?
C) magnetic ink character recognition
Which of the following specialized scanners is used to scan human body characteristics for identification and security purposes?
A) biometric scanner
Which of the following speech recognition-based technologies is used for telephone surveys and to guide customers through the various menu options when calling a company's customer service line?
D) interactive voice response
Which of the following statements accurately describes the difference between digital and film-based cameras?
C) Digital cameras record still images or short video clips in digital form on small, removable memory cards rather than on film.
________ are represented as a series of ones and zeros and are used to relay data and instructions to and from the central processing unit (CPU) of a computer.
A) Binary codes
Which of the following character encoding formats, based on the English alphabet, represents symbols in binary form?
Which of the following encoding formats is the standard coding for e-mail over the Internet?
Which of the following encoding formats has become an industry standard that was designed to allow symbols from all languages, including Arabic and Chinese?
Which of the following is considered as the heart of a computer's system unit?
The electronic circuit that generates pulses at a rapid rate to set the pace for processing events to take place within a computer is known as the ________.
C) system clock
A ________ is a small block of memory used by processors to store those instructions most recently or most often used.
________ is used to store programs and instructions that are automatically loaded when the computer is turned on.
C) Read-only memory
Which of the following is an example of secondary storage?
C) hard disk drives
________ is a technology in which extra copies of data are stored on two or more hard drives to ensure that critical data is not lost.
A(n) ________ occurs if a read/write head for some reason touches one of the disks in a hard drive, leading to a loss of data.
A) head crash
Which of the following is a secondary storage technology that uses microchips to store information?
D) solid state drive
Which of the following is a valid observation regarding the difference between solid state drives and hard disk-based drives?
B) Solid state drives have no moving parts, while hard disk drives have both electronic and mechanical parts.
Data stored on disks is easier and faster to locate than data on magnetic tapes because ________.
E) computers do not have to scan an entire tape to find a specific data file
A(n) ________ provides a hardware interface, such as plugs and sockets, for connecting to computers.
Which of the following types of ports is used to transfer one bit at a time and hence, has the slowest data transfer rates?
D) serial port
Which of the following types of ports used to connect networks, is the most common standard for local area networks?
A) ethernet port
Which of the following types of ports is used to connect printers to computers?
C) parallel ports
Which of the following types of ports is used to connect digital disks and camcorders to computers?
A) IEEE 1394 port
Which of the following is a multiuser, multitasking operating system that is available for a wide variety of computer platforms, and is commonly used because of its superior security?
Which of the following operating systems was the first commercial graphical-based operating system, which made its debut in 1984?
A) Mac OS
Google's Linux-based operating system for mobile devices is known as ________.
Which of the following is an operating system designed for mobile devices, jointly developed by Nokia, Ericsson, and Psion?
C) Symbian OS
Which of the following types of computer software utilities is used to archive files from hard disks to tapes, flash drives, or other storage devices?
Which of the following types of computer software utilities allows more data to be stored on a disk by substituting short code for frequently repeated patterns of data, allowing more data to be stored on a disk?
B) data compression
Which of the following types of computer software utilities monitors users' incoming e-mail messages and filters unwanted messages from arriving?
A) spam blockers
Which of the following types of computer software utilities transfers a file from one format to another so that it can be used by an application other than the one used to create it?
A) file conversion
E) OpenOffice Writer
D) Apple Keynote
Microsoft Access is an example of ________.
B) database management software
A(n) ________ is a type of program that translates a program's source code into machine language and executes one statement at a time.
Which of the following statements accurately reflects a difference between compilers and interpreters?
B) Compilers convert a program's entire source code into an executable, while interpreters translate source code one statement at a time.
Which of the following is the most widely used language for developing Web pages?
LISP is a programming language that finds application in ________.
C) artificial intelligence
Which of the following object-oriented programming concepts uses modules that allow programmers to group properties and behavior together?
Which of the following object-oriented programming concepts is reflected by a word processor that reacts to a user's typing and clicking?
B) event-driven program execution
Which of the following programming languages allows programmers to easily add a command button to a screen with a few clicks of a mouse instead of programming the button pixel by pixel and using many lines of code?
C) visual programming languages
Which of the following is an example of a visual programming language?
Which of the following HTML tags sets off the visible portion of the HTML document?
C) <body> . . . </body>
Which of the following HTML tags is used to create a hyperlink?
E) <a href="URL"> . . . </a>
What is the function of markup languages such as HTML?
E) laying out or formatting Web pages
________, a programming language developed by Sun Microsystems in the early 1990s, is used to add dynamic content to Web pages.
________ is a programming platform that is used to develop applications that are highly interoperable across a variety of platforms and devices.
Which of the following is used by Web services to support the interoperability between machines?
Which of the following purposes was XML designed to serve?
B) building database queries
C) checking the accuracy of user-entered information on Web pages
Which of the following software tools allows developers to create animation and video that can be compressed small enough for fast download speeds?
A) Adobe Flash
Which of the following computer-aided software engineering (CASE) tools enable system process, data, and control structures to be represented diagrammatically?
C) diagramming tools
Which of the following matches the description of screen and report generators?
D) tools that make it easier for the systems analyst to identify data requirements and relationships and also help model how systems look and feel to users
________ are CASE tools that enable the integrated storage of specifications, diagrams, reports, and project management information.
Which of the following is an example of an open source Web server software that provides access to Web sites?
MySQL is a(n) ________.
B) open source software for accessing and maintaining data in a database
1) ________ are used to enter information into a computer using devices such as a keyboard and mouse on your personal computer, a biometric fingerprint reader to authenticate a person entering a secure laboratory, or RFID scanners to track valuable inventory in a warehouse.
C) Input technologies
Which of the following statements is true about processing technologies?
D) They transform inputs into outputs.
) ________ deliver information to you in a usable format.
4) A(n) ________ is also referred to as the computer's brain.
E) microprocessor or CPU
5) The ________ is responsible for performing all the operations of the computer.
B) central processing unit
6) Any input your computer receives is digitized and then is processed by the CPU. Which of the following explains the meaning of the word "digitized" in the preceding sentence?
D) translated into binary code
7) The primary storage is also known as ________.
A) volatile memory
8) Which of the following statements is true about secondary storage?
B) It retains the data when the power to the computer is shut off.
9) The CPU interacts with ________ for permanently storing data.
E) secondary storage
10) ________ is the collection of programs that control the basic operations of computer hardware.
C) Systems software
11) The operating system of a computer is an example of a(n) ________ software.
12) Operating systems are often written in ________, a very low level computer programming language that allows the computer to operate quickly and efficiently.
C) assembly language
13) Which of the following tasks is performed by the systems software?
D) printing documents
14) Which of the following tasks is performed by the application software?
B) writing a business letter
15) The customer relationship management system and personal productivity software are examples of ________.
A) application software
16) Which of the following statements is true about open source software?
E) These programs' source code is freely available for use and/or modification.
17) A ________ is the most expensive and most powerful kind of computer, which is used primarily to assist in solving massive scientific problems.
18) A ________ is used primarily as the main, central computing system for major corporations.
19) A ________ is any computer on a network that makes access to files, printing, communications, and other services available to users of the network.
20) Designed for medical, engineering, or animation and graphics design uses, ________ are optimized for visualization and rendering of three-dimensional models.
21) A ________ is used for personal computing and small business computing.
22) Which of the following statements is true about servers?
A) They are used to provide services to users within large organizations or to Web users.
23) ________ define the procedures that different computers follow when they transmit and receive data.
24) ________ is the transmission capacity of a computer or communications channel.
25) Bandwidth is measured in ________.
D) bits per second
26) A ________ is any computer on the network, or any software application that uses only the services provided by the server.
27) A ________ is any computer that requests and provides services.
28) In ________ networks, servers and clients have defined roles.
29) ________ networks enable any computer or device on the network to provide and request services. All members of the network have equivalent capabilities and responsibilities.
30) The Internet relies on ________ technology to deliver data and information across networks.
31) ________ is based on the concept of turn taking and enables millions of users to send large and small chunks of data across the Internet concurrently.
A) Packet switching
32) Which of the following is mandatory for packet switching to work?
B) Each packet being sent across a network must be labeled with a header.
33) Which of the following statements is true about packet-switching systems?
D) These systems adapt instantly to changes in network traffic.
34) Which of the following occurs if only one computer needs to use the network in a packet-switching system?
A) Data is sent continuously.
35) Internet protocol or the protocol used by the Internet is called the ________.
A) Transmission Control Protocol (TCP)
36) A ________ is a device used to connect two or more individual networks.
37) Datagram routing and delivery are possible because every computer and router connected to the Internet is assigned an ________.
D) IP address
38) Prior to the invention of the Web, content posted on the Internet could be accessed through the Internet tool Gopher. The Web took Gopher one step further by introducing ________.
39) The standard method of specifying the format of Web pages is called ________.
E) Hypertext Markup Language (HTML)
40) Web servers process user requests for pages using the ________.
A) Hypertext Transfer Protocol
41) Which of the following statements is true about the Information Infrastructure Act?
C) It opened the Web for commercial purposes.
42) Which of the following is true about the graphical Web browser Mosaic?
C) It is the basis of popular browsers such as Internet Explorer and Mozilla Firefox.
43) Which of the following statements is true about a uniform resource locator?
B) It is used to identify and locate a particular Web page.
44) The suffix ".org" is reserved for ________.
E) nonprofit organizations
45) Which of the following is likely to have the suffix ".com" after the domain name in its URL?
46) Which of the following is likely to have the suffix ".org" after the domain name in its URL?
A) the Red Cross Society
47) Which of the following is likely to have the suffix ".edu" after the domain name in its URL?
D) Harvard Business School
48) In a URL, the ________ is the particular Web server or group of Web servers (if it is a larger Web site) that will respond to the Web request.
B) host name
49) Which of the following is the host name in the URL "labs.google.co.in/jack carver?"
50) Which of the following statements is true about an IP address?
D) It can be used to navigate to particular Web addresses.
51) The prediction that the number of transistors on a chip would double about every two years is known as ________.
E) Moore's law
52) The first CPU had 2,200 transistors, whereas the newest models have broken the 2-billion-transistor mark. Take for example, the Intel Core i7 Extreme CPU which can complete hundreds of millions of operations every second. Which of the following is the most similar to this scenario?
C) New generation digital cameras have a higher number and size of pixels than older digital camera models.
53) Which of the following occurred in the 1964-1990s generation of computing?
C) The mainframe era ended and the personal computer era began.
54) Which of the following occurred in the 1990s-2000 generation of computing?
B) The personal computer era ended and interpersonal computing began.
55) Manufacturers of hardware and software often apply the concept of planned obsolescence, meaning that ________.
C) the product is designed to last only for a certain life span
56) Data centers managed by a third party that rents out space to multiple organizational customers are known as ________.
A) collocation facilities
57) Under the ________ model, organizations "rent" resources such as processing, data storage, or networking from an external provider on an as-needed basis and pay only for the services used.
D) utility computing
58) Utility computing offers tremendous benefits in terms of ________ for companies operating in the digital world.
59) The ability to adapt to increases or decreases in demand for processing or data storage is known as ________.
60) Using ________, multiple machines located at different locations and each with its own applications can be configured to run on one single computer, enabling the IT service providers to better utilize their resources.
61) Which of the following statements is true about the software as a service model?
A) The customer has no knowledge or control over the underlying infrastructure and has only limited ability to control or configure application-specific settings.
62) Which of the following statements is true about the platform as a service model?
C) The customer can run his or her own applications that are typically designed using tools provided by the service provider.
63) Which of the following statements is true about the infrastructure as a service model?
A) The customer has to manage the licenses for the operating systems being used.
64) Which of the following statements is true about a public cloud?
B) It can be used by any interested party on a pay-per-use basis.
65) EasyQuery is a knowledge management company that is contemplating a partnership with Kasko, a cloud service provider. The management of EasyQuery is particularly concerned about Kasko's viability and will start a partnership only when it is sure that Kasko meets this criteria. Assume that viability is the only criteria that a cloud service provider needs to meet. If EasyQuery enters into a partnership with Kasko, it means that ________.
B) Kasko has long-term sustainability
66) ________ is used to solve large-scale computing problems.
D) Grid computing
67) ________ is used to increase Web application performance.
C) Edge computing
68) ________ is used to transmit voice and video communication over the Internet.
B) IP convergence
69) ImmuneEarth, a research and development company, has a motto to "eradicate all diseases." It has numerous departments that research the cure of various diseases. One of its largest departments include the AIDS department where more than 500 scientists are researching the cure for AIDS. ImmuneEarth has numerous computers that have been grouped into a cohesive system for this purpose. Recently, one of its computers was updated because it had low performance which had slowed the entire system. Which of the following is ImmuneEarth using to research the cure for AIDS?
A) grid computing
70) Which of the following differentiates grid computing from cloud computing?
A) Grid computing uses a large number of computers.
71) In grid computing, the slowest computer creates a bottleneck and slows down the entire grid. A ________ can help overcome these problems.
D) dedicated grid
72) ________ has allowed enterprises to make use of new forms of communication and collaboration, as well as traditional forms of communication, at much lower costs.
C) IP convergence
Sign up for free and study better.
Get started today!