click below
click below
Normal Size Small Size show me how
AIT131
Essentials of Information Technology
Question | Answer |
---|---|
Which one of the following converts computer output into displayed images? A. Printer B. Monitor C. Floppy Disk d. Processor | monitor |
Which one of the following computer types is the smalllest? a. mainframe b. microcomputer c. workstation d. microcontroller | microcontroller |
which of the following is a secondary storage device? | floppy disk |
a central computer holding collections of data and programs for connecting to other computers or devices is known as a(n) | server |
Kbps means a speed of how many bits per second? | 1 thousand |
which of the following is an example of hardcopy outputs? | printed spreadsheet |
a location on the internet is called a | Domain |
what are the 3 components of a URL | Web Protocol Name of directory on the web server file name and extension |
in the email address John_Smith@happygoluck.net.us , John_Smith is the | userid |
Which one of the following is the fastest means of data transmission? | T1 line |
All of the following are netiquette rules | Consult FAQs. Don't Shout. Avoid huge file attachments. |
The components that make up the internet are owned and shared by | Thousands of public and private entities |
ICANN stands for | Internet Corporation for Assigned Names and Numbers |
All of the following are features of word processing software | spell check. Cut and Paste. Formatting |
In a word processing program, the default settings are | Used automatically unless the user specifies otherwise |
Which of the following is true regarding commercial software | a new version is a major upgrade; a new release is a minor upgrade |
The part of the operating system that allows the user to communicate with it is called the | user interface |
All of the following are examples of computer operating systems | Windows XP. DOS. Unix. |
All of the following are examples of application software | Corel WordPerfect Adobe Illustrator Microsoft Word |
A collection of interrelated files in a computer system is a | Database |
A group of adjacent cells in a spreadsheet, a range, is important because | it helps sort data for calculation or reports |
All of the following are undesirable results of using pirated software | Copyright owners do not get paid for their creative work. risk of computer virus. risk of getting inferior software product. |
What is the value of a macro (keyboard shortcut) | users can consolidate several activities into one or two keystrokes |
All of the following are part of the microcomputer boot process | Diagnostic routines. Copying BIOS programs to main memory Loading Operating System to main memory |
The software that permits a computer system to communicate with input and output devices is collectively known as | Device Drivers |
Which Operating System was designed primarily for network use in business | Windows NT |
Processing Speed is expressed in terms of | Megahertz |
All of the following are types of secondary storage | Hard Disk. Optical Disk Magnetic Tape |
Each of the following is a microcomputer expansion bus | AGP PCI ISA |
The High Speed memory area on a chip that temporarily stores instructions and data is the | Cache |
All of the following are common microcomputer expansion cards | Graphic Card Sound Card Network Card |
Which one of the following is a measure of microcomputer processing speed? | Megahertz |
All of the following are examples of pointing devices | Touch Screen JoyStick Pen Computer |
Which of the following is a common health problem caused by the use of computers | Carpal Tunnel Syndrome |
A screen in which each pixel is controlled by its own transistor is called | Active Matrix Display |
Biometrics Measure | Individual Body Characteristics |
A Technology used by banks in which ink is magnetized for check-sorting purposes is | MICR |
A program with hidden instructions that are buried within an application program and that cause damage is called a | Trojan Horse |
Which of the following best describes the telephone line that is used in most homes today | Twisted-Pair Wire |
The benefits of which one of the following include sharing peripheral devices, programs, and data; better communications; and database access? | Local Area Networks |
In Communications, the term "packet" is used to describe | Data that are fragmented to permit high-volume network traffic |
A Signal that is continuous and varying in strength and/or quality is | Analog |
Which one of the following is a short-range wireless digital standard aimed at linking cellphones, PDAs, computers, and peripherals? | Bluetooth |
A network in which computers communicate directly without relying on a server or hub is known as a | Peer to Peer LAN |
Data is transmitted using fiber-optic cables by | Pulsating light beams |
Crackers are persons who | Break into computers for malicious purposes |
One of the downsides of portability is | lack of personal time |
One potential drawback of using MP3 Players is | Hearing Loss |
A distinguishing feature of high-definition (HD) radio is | the ability to provide digital and analog stations on the same frequency |
Which one of the following Statements is true regarding digital cameras | People take more photos, but print fewer, and sometimes forget about them |
A smartphone can include all of the following features | Text Messaging capability. Internet Access. Email capability |
All of the following are data compression standards or methods | Lossless. JPEG. MPEG. |
All of the following are disadvantages of databases, | They are costly to install and maintain. Privacy of the data is a concern. People must be trained to use them properly. |
A file that contains recorded events, including everything concerning the organization's products or services, is called a | Transaction File |
Which of the following types of databases arranges records in related groups resembling a family tree in which each child record may have only one parent record? | Hierarchical |
Relevant facts, information, beliefs, assumptions, and procedures for solving problems are contained in a(n) | Knowledge base |
All of the following are components of the Turing test | Human Judge, Computer terminal, Software Program |
Summarized, structured reports such as budget summaries and production schedules are examples of the output from | Management Information Systems |
The leading compression standard for still images is | JPEG |
File Extensions | are part of the microcomputer file naming convention |
Software that controls the search of an expert system's knowledge base and produces conclusions is known as | An Interface Engine |
which one of the following poses the greatest threat to a computer system? | Employees |
Which of the following is a crime against computers and communications? | Software Theft |
Which one of the following is a method of safeguarding computers | Screening job applicants |
Crimes against computers and communication include all of the following | Theft of software and data. Theft of hardware. Vandalizing telecommunication systems. |
When preparing a database of use, what should you do with "dirty data?" | "Scrub" it to create metadata |
A programmer must follow the rules for coding a particular programming language. These rules are called | Syntax |
which one of the following is the lowest of the five generations of programming languages? | Machine Language |
A list of instructions that the computer must follow to process data into information using statements in a special language is a | Program |
The step in the programming procedure that includes the use of pseudocode and/or flowcharts is | Design a Solution |
Debugging the program is completed in which step of the programming procedure? | Test the program |
A language translator program that converts each procedural language statement into machine language and executes it immediately, statement by statement is | An Interpreter |
A Third-Generation programming language that is used pricipally to construct artificial intelligence programs is | LISP |