1. All of the following are examples of real security and privacy risks EXCEPT:
Answer: spam.
2. Between PCs and Macs, the ____________ is the platform of choice for graphic design
and animation.
Answer: Mac
3. ____________terminals (formerly known as cash registers) are often connected to complex inventory and sales computer systems.
Answer: Point-of-sale (POS)
4. The type of operating system software you use depends on your computer’s
____________.
Answer: platform
5. The ability to recover and read deleted or damaged files from a criminal’s computer is an
example of a law enforcement specialty called:
Answer: computer forensics.
6. ____________are the fastest and most expensive computers.
Answer: Supercomputers
7. ____________ tags, when placed on an animal, can be used to record and track in a database all of the animal’s movements.
Answer: RFID
8. Input devices are used to provide the steps and tasks the computer needs to process
data, and these steps and tasks are called ____________.
Answer: instructions
9. Technology no longer protected by copyright, available to everyone, is considered to be:
Answer: proprietary.
10. The binary language consists of two digits: ____________ and ____________.
Answer: 0 and 1
11. ____________ is the science that attempts to produce machines that display the same type of
intelligence that humans do.
Answer: Artificial intelligence (AI)
12. The devices you use to enter data into a computer system are known as ____________
devices.
Answer: input
13. The name for the way that computers manipulate data into information is called:
Answer: processing.
14. ____________ is the set of computer instructions or programs that enables the
hardware to perform different tasks.
Answer: Software
15. After a picture has been taken with a digital camera and processed appropriately, the actual
print of the picture is considered:
Answer: output.
16. ____________ are computers that excel at executing many different computer programs
at the same time.
Answer: Mainframes
17. Computers process data into information by working exclusively with:
Answer: numbers.
18. ____________ is the science that attempts to create machines that will emulate the
human thought process.
Answer: Artificial intelligence (AI)
19. The term bit is short for:
Answer: binary digit.
20. A process known as ____________ tracks trends and allows retailers to respond to
consumer buying patterns.
Answer: data mining
21. A ____________ is approximately one billion bytes.
Answer: gigabyte
22. You would use ____________ software to create spreadsheets, type documents, and edit
photos.
Answer: application
23. ____________ is any part of the computer that you can physically touch.
Answer: Hardware
24. ____________ is the term given to the act of stealing someone’s identity and ruining
their credit rating.
Answer: Identity theft
25. All of the following are examples of input devices EXCEPT a:
A. scanner.
B. mouse.
C. keyboard.
D. printer.
Answer: D
26. Patient ____________ are life-sized mannequins that have a pulse and a heartbeat and
respond to procedures just like humans.
Answer: simulators
27. All of the following are examples of storage devices EXCEPT:
A. hard disk drives.
B. printers.
C. floppy disk drives.
D. CD drives.
Answer: B
28. Word processing, spreadsheet, and photo-editing are examples of:
Answer: application software.
True and False
29. Currently, the performance of tasks by robots is based on preprogrammed algorithms.
Answer: True
30. The most common type of memory that the computer uses to process data is ROM.
Answer: False (RAM)
31. With a wireless network, it is easier to relocate devices.
Answer: True
32. A Web browser is a special device that is installed in your computer that allows it to
communicate with other devices on a network.
Answer: False (network adapter)
33. Clicking on an icon with the mouse is a form of giving an instruction to the computer.
Answer: True
34. Trend-spotting programs, developed for business, have been used to predict criminal
activity.
Answer: True
35. Data can be a number, a word, a picture, or a sound.
Answer: True
36. Currently, the performance of tasks by robots is based on preprogrammed algorithms.
Answer: True
Question :
37. The ______________ tells the computer how to use its components.
Answer: operating system
38. What is the largest unit of storage ?
Answer: TB ( Tera byte = 1000 GB )
39. Changing an existing document is called _________ the document.
Answer: modifying
40. The _________ key will launch the start button.
Answer: Windows
41. To move to the beginning of a line of text, press the __________ key .
Answer: home
42. _________ is the process of finding errors in software code.
Answer: Debugging
43. A word in a web page that, when clicked, opens another document is called ______
Answer: hyperlink
44. 7.Which of the following is the storage area whit in the computer itself which Holds data only Temporarily as the computer processes instructions?
Answer : Read Only Memory
45. A _________ contains specific rules and words that express the logical steps of an algorithm.
Answer : Syntax
46. _______ is a set of Keywords, s symbols, and a system of rules for constructing statements by which humans can communicate the instructions to be executed by a computer.
Answer : A Programming Language
47. The general term 'peripheral equipment' is used for ________
Answer : any device that is attached to a computer system
48. If a memory chip is volatile, it will_________
Answer : Lose its Contents if current is turned off
49. Codes consisting or Bars or lines of varying widths or lengths that are computer-readable are known as_______
Answer : A bar code
50. Every Component of your computer is either__________
Answer : Input Devices and Output Devices.
No comments:
Post a Comment