Добавил:
Upload Опубликованный материал нарушает ваши авторские права? Сообщите нам.
Вуз: Предмет: Файл:

ssd2_203-100

.docx
Скачиваний:
7
Добавлен:
25.02.2016
Размер:
56.66 Кб
Скачать

Section: SSD2-20531720_Information Systems - 5B070300 IS-136

Assessment Name: Certification Exam Multiple-Choice (SSD2v4.7.0.0normal_assm-cert-exam-mc)

1.Which of the following is (are) true about use of the terms memory and storage with regard to computers?

  1. Memory generally refers to an area of a computer that temporarily holds data waiting for processing, storage, or output.

  2. Storage generally refers to an area of a computer where data is held on a permanent basis.

(a) I only

(b) II only

(c) None

(d) I and II 100%

2. Which of the following is (are) true regarding computer input?

  1. Input can be supplied to a computer by another computer.

  2. Input can be supplied to a computer by the environment.

(a) I only

(b) II only

(c) None

(d) I and II 100%

3. Which of the following is (are) true regarding computer output?

  1. Documents and reports are examples of computer output.

  2. An output device transforms the gathered input into a series of electronic signals for the computer.

(a) I and II

(b) II only

(c) None

(d) I only 100%

4. Which among the following features is the most important characteristic that distinguishes a computer from some of the simpler and less versatile calculating devices like calculators?

(a) Larger memory capacity

(b) Greater processing speeds

(c) Greater choice of input devices

(d) The stored program concept 100%

5. Which of the following is (are) true regarding mainframes?

  1. Mainframes are generally used to provide centralized storage and management of large quantities of data.

  2. In today's scenario, there is no application that warrants the use of mainframes.

(a) I and II

(b) II only

(c) None

(d) I only 100%

6. Examples of typical use for a super computer include which of the following?

  1. Modeling weather systems

  2. Generating large reports.

(a) I and II

(b) II only

(c) None

(d) I only 100%

7. Which of the following statements is (are) true?

  1. A computer stores data so that it will be available for processing.

  2. Most computers only have one location for storing data.

(a) None

(b) I and II

(c) II only

(d) I only 100%

8. Which of the following statements is (are) true?

  1. Examples of the kinds of output a computer can accept include temperatures from a thermostat, audio signals from a microphone, and instructions from a computer program.

  2. A computer can be defined by its ability to accept input, process data, store data, and produce output, all according to a set of instructions from a computer program.

(a) None

(b) I and II

(c) I only

(d) II only 100%

9. Which of the following is (are) true about RAM?

  1. It is the kind of memory where data can be stored on a permanent basis.

  2. It can store a series of instructions for a computing task.

(a) None

(b) I and II

(c) I only

(d) II only 100%

10. Which of the following statements is (are) true?

Today's videogame consoles contain microprocessors that are similar to processors found in fast personal computers.

Today, it is rare for a computer to use a microprocessor as its CPU.

(a) None

(b) I and II

(c) II only

(d) I only 100%

11. Which of the following statements is (are) true about add-ons to handheld computers?

  1. They can make it possible to send and receive email.

  2. They can make handheld computers powerful enough to handle all of the tasks that can be accomplished by desktop personal computers.

(a) None

(b) I and II

(c) II only

(d) I only 100%

12. Which of the following statements is (are) true about the term "workstation"?

  1. It can mean a powerful desktop computer designed for tasks that require a lot of processing speed.

  2. It can mean any computer connected to a local area network.

(a) None

(b) II only

(c) I only

(d) I and II 100%

13. Which of the following statements is (are) true?

  1. A hard disk drive is usually mounted inside the computer's system unit.

  2. A small external light indicates when a hard disk drive is reading or writing data.

(a) None

(b) II only

(c) I only

(d) I and II 100%

14. Information transferred to a computer from an external source such as a mouse or keyboard is known as

(a) output

(b) software

(c) hardware

(d) input 100%

15. The series of instructions that cause a computer to perform processing tasks is referred to as a

(a) CPU

(b) device

(c) byte

(d) program 100%

16. In a computer, most processing takes place in the

(a) RAM

(b) ROM

(c) LAN

(d) CPU 100%

17. Results produced by a computer are known as

(a) input

(b) hardware

(c) devices

(d) output 100%

18. Which of the following is (are) manufactured by companies in the computer industry?

  1. Personal Computers

  2. High-end Workstations

  3. Servers

(a) I and II only

(b) II and III only

(c) I and III only

(d) I, II, and III 100%

19. Which of the following is a sector (are sectors) in the IT industry?

  1. Retailers

  2. Chipmakers

  3. Service Companies

(a) I and II only

(b) II and III only

(c) I and III only

(d) I, II, and III 100%

20. Which of the following is not an equipment manufacturer?

(a) AMD

(b) Intel

(c) Dell

(d) EDS 100%

21. Which of the following companies offers service as its primary product?

(a) IBM

(b) Microsoft

(c) Intel

(d) AOL 100%

22. A degree in _____ focuses on the design of computer hardware and peripheral devices, often at the chip level.

(a) software engineering

(b) information systems

(c) computer science

(d) computer engineering 100%

23. A degree in _____ focuses on computer architecture and how to program computers to make them work effectively and efficiently.

(a) network administration

(b) information systems

(c) computer engineering

(d) computer science 100%

24. A degree in _____ focuses on applying computers to business problems.

(a) computer science

(b) software engineering

(c) computer engineering

(d) information systems 100%

25. In which category are IT companies that create operating systems, programming languages, and applications?

(a) Chipmakers

(b) Retailers

(c) Equipment manufacturers

(d) Software publishers 100%

26. Which of the following is (are) true regarding the abacus?

  1. It uses gears to perform calculations.

  2. It uses punched cards to store information.

  3. It has beads that represent the quantities 1, 5, 10, etc.

(a) I and II only

(b) II and III only

(c) I only

(d) III only 100%

27. Which of the following is a mechanical calculator invented in the 1600s that used wheels to move counters?

(a) Abacus

(b) Hollerith's machine

(c) Jacquard loom

(d) Pascaline 100%

28. Which of the following is (are) true of vacuum tubes?

  1. They typically respond faster than mechanical components.

  2. They burn out more quickly than transistors.

  3. They were replaced by transistors.

(a) I and III only

(b) II and III only

(c) II only

(d) I, II, and III 100%

29. Which of the following is (are) true of transistors?

  1. They are typically smaller than vacuum tubes.

  2. They are generally more expensive than vacuum tubes.

  3. They are typically more reliable than vacuum tubes.

(a) I and II only

(b) II and III only

(c) I , II, and III

(d) I and III only 100%

30. Thin slices of silicon packed with thousands of microscopic circuit elements are known as

(a) transistors

(b) vacuum tubes

(c) punched cards

(d) microchips 100%

31. Technological advances allowing more transistors to be placed on a microchip result in which of the following benefits?

  1. Faster processing speeds

  2. Greater data storage capacity

(a) I only

(b) II only

(c) None

(d) I and II 100%

32. Multimedia can include the representation of which of the following?

  1. Text

  2. Sound

  3. Video

(a) I and III only

(b) I and II only

(c) II and III only

(d) I, II, and III 100%

33. Applications that manage and track raw components, their usage in the manufacturing process, and delivery of finished products are known as _____ software.

(a) project management

(b) customer relations

(c) virtual reality

(d) supply chain management 100%

34.Applications that handle product requirements, work schedules, milestones, and budgets are known as ____ software.

(a) supply chain management

(b) virtual reality

(c) business

(d) project management 100%

35. Typical functions performed by customer-relationship management software include which of the following?

  1. Collecting information on customer demographics

  2. Personalizing Web site content for customers

  3. Tracking purchasing behavior of customers

(a) II and III only

(b) I and III only

(c) II only

(d) I, II, and III 100%

36.Systems of computer software that can simulate three-dimensional environments include which of the following?

  1. Movie-making software

  2. Video-gaming software

  3. Animation-design software

(a) II and III only

(b) I and III only

(c) II only

(d) I, II, and III 100%

37. Data _____ makes it possible to convert letters, sounds, and images into electrical signals.

(a) management

(b) remastering

(c) processing

(d) representation 100%

38. A computer uses _____ electronics to manipulate simple "on" and "off" signals to perform complex tasks.

(a) analog

(b) binary

(c) CMOS

(d) digital 100%

39. The 1s and 0s that a digital device works with are referred to as _____ digits.

(a) analog

(b) master

(c) index

(d) binary 100%

40. Computers represent numeric data using the _____ number system.

(a) analog

(b) digital

(c) ASCII

(d) binary 100%

41. The ALU uses _____ to hold data that is being processed.

(a) control units

(b) words

(c) cache

(d) registers 100%

42. The list of instructions that a microprocessor can perform is called its _____ set.

(a) index

(b) word

(c) master

(d) instruction 100%

43. The _____ speed specifications in computer ads indicate the speed of the microprocessor.

(a) control unit

(b) register

(c) cache

(d) clock 100%

44. The number of bits that a microprocessor can manipulate at one time is its _____ size.

(a) processor

(b) register

(c) ALU

(d) word 100%

45. Which of the following statements regarding microprocessors is (are) true?

  1. A modern microprocessor is about the size of a finger nail.

  2. A microprocessor is easy to identify inside a personal computer, as it is the only chip on the motherboard.

(a) I and II

(b) II only

(c) None

(d) I only 100%

46. Which of the following statements regarding microprocessors is (are) true?

  1. Microprocessor word size refers to the number of bits that can be manipulated at one time.

  2. A 1-gigahertz microprocessor executes 1 million cycles per second.

(a) None

(b) II only

(c) I and II

(d) I only 100%

47. Which of the following statements regarding cache memory is (are) true?

  1. The capacity of an L1 cache cannot be upgraded without replacing the microprocessor.

  2. Data can be retrieved more quickly from the L2 cache than the L1 cache.

(a) II only

(b) I and II

(c) None

(d) I only 100%

48. Which of the following statements regarding RAM is (are) true?

  1. Hard drive capacity is usually larger than RAM capacity.

  2. RAM is typically a single chip or circuit board that plugs into the motherboard.

(a) I and II

(b) II only

(c) None

(d) I only 100%

49. A laser printer uses the same technology as a(n)_____ to paint dots of light on a light-sensitive drum.

(a) CRT monitor

(b) LCD monitor

(c) active matrix screen

(d) photocopier 100%

50. Which of the following specifies the maximum number of horizontal and vertical pixels displayed on a computer monitor?

(a) Dot pitch

(b) Color depth

(c) Bit depth

(d) Resolution 100%

51. Graphics cards, sound cards, and Ethernet cards are typically connected to a PC via

(a) USB

(b) FireWire

(c) parallel ports

(d) expansion slots 100%

52. PS/2 and DB-9 are two types of _____ ports.

(a) parallel

(b) USB

(c) PCI

(d) serial 100%

53. Serial ports transfer data _____ bit(s) at a time, whereas parallel ports transfer data _____ bit(s) at a time.

(a) 8, 1

(b) 8, 16

(c) 16, 8

(d) 1, 8 100%

54. The width of a computer bus is typically measured in

(a) hertz

(b) bytes per second

(c) pixels

(d) bits 100%

55. Data is typically transferred between the disk controller and storage devices by the _____ bus.

(a) AGP

(b) memory

(c) front side

(d) IDE 100%

56. Printer resolution is measured in terms of

(a) dot pitch

(b) pixels

(c) millimeters

(d) dots per inch 100%

57. Cathode-ray-tube computer monitors use _____ color mixing, whereas color printers typically use _____ color mixing.

(a) CMYK, RGB

(b) ROY, BIV

(c) BIV, ROY

(d) RGB, CMYK 100%

58. Examples of magnetic storage include which of the following?

  1. Hard disks

  2. Floppy disks

  3. Zip disks

(a) I and II only

(b) II and III only

(c) I and III only

(d) I, II, and III 100%

59. Examples of optical storage include which of the following?

  1. CD-ROM disks

  2. CD-RW disks

  3. DVD-ROM disks

(a) I and II only

(b) II and III only

(c) I and III only

(d) I, II, and III 100%

60. Which of the following is (are) true regarding data transfer rates of storage devices?

  1. Sequential-access devices have faster transfer rates than random-access devices.

  2. A device with 50 ms access time is faster than a device with 10 ms access time.

(a) I and II

(b) I only

(c) II only

(d) None 100%

61. Advantages of floppy disks over hard disks include which of the following?

  1. Faster access times

  2. Easy to carry from one computer to another

  3. Lower cost per byte of storage

(a) I and II only

(b) II and III only

(c) I, II, and III

(d) II only 100%

62. Which of the following is (are) true regarding tape drives?

  1. Tape drives are random-access devices.

  2. Tape drives are generally very useful as back-up devices.

(a) I and II

(b) I only

(c) None

(d) II only 100%

63. Which of the following is (are) true regarding hard disks?

  1. Data on hard disks is stored as volatile electric charges.

  2. Personal computers typically have more RAM than hard drive capacity.

  3. Accessing data on a hard disk is faster than accessing data in RAM.

(a) I only

(b) II and III only

(c) I and III only

(d) None 100%

64. If two devices are attached to the same IDE port, they must be designated as

(a) primary and secondary

(b) IDE and ATA

(c) IDE and EIDE

(d) master and slave 100%

65. Which of the following is (are) true regarding DVDs?

  1. They can have tracks on both sides of the disk.

  2. They can have two layers of tracks on one side of the disk.

(a) I only

(b) II only

(c) None

(d) I and II 100%

66. Which of the following is (are) true regarding removable optical and magnetic media?

  1. Optical media are generally more durable than magnetic media.

  2. Optical media generally have a lower cost per megabyte of storage when compared to magnetic media.

(a) I only

(b) II only

(c) None

(d) I and II 100%

67. Which of the following is the term for a step in a process that takes a much longer time to complete than do other steps in the process, thus reducing overall performance?

(a) A benchmark

(b) Latency

(c) Backup

(d) A bottleneck 100%

68. Which of the following can be a bottleneck in a computer?

  1. Bus speed

  2. Cache speed

  3. Amount of RAM

(a) I and II only

(b) II and III only

(c) I and III only

(d) I, II, and III 100%

69. Use of which of the following can help identify the bottlenecks in a computer system?

(a) Bandwidth

(b) A cache

(c) Bus speed

(d) Benchmarks 100%

70. Each layer of software only needs a limited amount of information to perform its task, and none of the other layers has access to that information. This concept is known as

(a) Abstraction

(b) Polymorphism

(c) Application

(d) Encapsulation 100%

71. Which of the following terms characterizes the use of an interface as the only medium through which a layer of software can be accessed?

(a) Encapsulation

(b) Polymorphism

(c) Application

(d) Abstraction 100%

72. The helper program that the operating system uses to communicate with a specific model of a device is known as the

(a) BIOS

(b) user interface

(c) kernel

(d) device driver 100%

73. The heart of the operating system that performs the functions that are most crucial for keeping everything running is the

(a) BIOS

(b) API

(c) user interface

(d) kernel 100%

74. The BIOS resides in a _____ chip on the motherboard.

(a) RAM

(b) CMOS

(c) SDRAM

(d) ROM 100%

75. How many processes can be in a running state on a single CPU at any instant in time?

(a) Four

(b) Two

(c) Eight

(d) One 100%

76. Which Windows operating system utility can be used to see what processes are currently running?

(a) Device Manager

(b) Add/Remove Programs

(c) Disk Defragmenter

(d) Task Manager 100%

77. Which of the following is a signal to the processor that some event has occurred that requires immediate attention?

(a) A process

(b) A kernel

(c) A driver

(d) An interrupt 100%

78. The notion that some interrupts, such as a disk interrupt, must be handled before other interrupts, such as a keyboard interrupt, is known as

(a) nested interrupts

(b) traps

(c) faults

(d) interrupt priority 100%

79. The notion that the processing of one interrupt can be temporarily suspended in order to process another interrupt is known as

(a) interrupt priority

(b) traps

(c) faults

(d) nested interrupts 100%

80.Which of the following is an event similar to an interrupt, except that instead of being triggered by an external signal, it is generated by the execution of processor instructions?

(a) A fault

(b) A nested interrupt

(c) An IRQ

(d) A trap 100%

81. Which of the following occurs when the computer's hardware is requested to do something that it cannot do, such as access a nonexistent memory location?

(a) A trap

(b) A nested interrupt

(c) An IRQ

(d) A fault 100%

82. In Windows, to adjust display properties such as resolution or color scheme, the user right-clicks on an empty spot of the desktop and clicks _____ on the shortcut menu.

(a) Configure

(b) Refresh

(c) New

(d) Properties 100%

83. A Windows utility called _____ can be used to view information on the drivers and resources that pieces of hardware are using.

(a) Task Manager

(b) Disk Defragmenter

(c) Driver Manager

(d) Device Manager 100%

84. In a virtual memory system, memory is divided into chunks called

(a) segments

(b) clusters

(c) blocks

(d) pages 100%

85. For a program running in _____ mode, addresses are translated into physical memory locations by means of a lookup table.

(a) real

(b) physical

(c) logical

(d) virtual 100%

86. In a virtual-memory system, if a program tries to access a page of memory that is not loaded into RAM, a(n) _____ occurs.

(a) trap

(b) illegal exception

(c) arithmetic error

(d) page fault 100%

87. In a file-sharing system, access to files by various users is controlled by

(a) virtual memory

(b) spooling

(c) page tables

(d) ACLs 100%

88. Even though a print server may be busy processing a job, incoming jobs are accepted and stored on disk via a process known as

(a) virtual printing

(b) printer sharing

(c) relocation

(d) spooling 100%

89. To select multiple files that are listed consecutively, click the first file, and then hold down the _____ key as you click the last file.

(a) Ctrl

(b) Alt

(c) F1

(d) Shift 100%

90. The formatting process creates the equivalent of electronic storage bins by dividing a disk into

(a) pits

(b) pods

(c) valleys

(d) tracks 100%

91. The operating system uses a _____ system to keep track of the names and locations of files that reside on a storage medium, such as a hard disk.

(a) storage

(b) tracking

(c) naming

(d) file 100%

92. Which of the following statements regarding subdirectories is (are) true?

  1. Windows subdirectories are depicted as folders because they operate similar to folders in a filing cabinet, storing an assortment of related items.

  2. Rather than storing them in subdirectories, data files should be stored in the root directory.

(a) II only

(b) I and II

(c) None

(d) I only 100%

93. Which of the following statements regarding file sizes is (are) true?

  1. The more bits used by a file the smaller the file size.

  2. Operating systems typically keep track of file size information.

(a) I only

(b) I and II

(c) None

(d) II only 100%

94. A file that is opened in order to begin execution of a computer program is a(n) _____ file.

(a) compiler

(b) interpreter

(c) active

(d) executable 100%

95. High-level computer languages include which of the following?

  1. Machine language

  2. C++

  3. Java

(a) I only

(b) II only

(c) I, II, and III

(d) II and III only 100%

96. A file of machine-language instructions that is executable is called _____ code.

(a) source

(b) assembly

(c) interpreted

(d) object 100%

97. The primary purpose of _____ software is to help the computer carry out its basic operating functions.

(a) application

(b) reference

(c) network

(d) system 100%

98. The method of using an interpreter to convert high-level instructions into machine language while the program is running is common with Web-based programs called

(a) Javadocs

(b) batch codes

(c) modules

(d) scripts 100%

99. System software that acts as the master controller for all of the activities that take place within a given computer system is called the _____ for the computer.

(a) compiler

(b) execution system

(c) organizer

(d) operating system 100%

100. The mechanism used by a computer to ensure that all keyboard strokes are properly recorded, regardless of how fast a user may type, is a keyboard

(a) GUI

(b) index

(c) interpreter

(d) buffer 100%

101. The combination of hardware and software that enables computer users to provide input to and receive output from their computers is called a

(a) computer montage

(b) computer reference facility

(c) user control panel

(d) user interface 100%

102. An interface that features menus and icons that can be manipulated with a mouse is a(n) _____ interface.

(a) command line

(b) workstation

(c) button

(d) graphical 100%

103. A program that is stored in ROM and contains the instructions needed by the operating system to load the kernel into memory is called the _____ program.

(a) core

(b) loader

(c) energizer

(d) bootstrap 100%

104. Which of the following is the one part of the operating system that stays in main memory throughout the time that the computer is running?

(a) The motherboard

(b) The control panel

(c) The pipeline

(d) The kernel 100%

105. Consider the following DOS command.

dir /w c:\

The /w is known as a(n)

(a) argument

(b) parameter

(c) wildcard

(d) switch 100%

106. Consider the following DOS command.

dir /w c:\

The c:\ is known as a(n)

(a) switch

(b) wildcard

(c) pipe

(d) argument 100%

107. Which of the following filenames would be listed by the DOS command dir c*.txt?

  1. cat.txt

  2. c.txt

  3. cat.doc

(a) I only

(b) I, II, and III

(c) II only

(d) I and II only 100%

108. Consider the following DOS command.

dir | more

Linking the output of the dir command to the input of the more command as shown above is known as

(a) redirection

(b) argument

(c) batching

(d) piping 100%

109. Consider the following DOS Help entry.

DEL [drive:][path]filename [/P]

The items enclosed within square brackets are _____ parts of the command.

(a) required

(b) literal

(c) repeatable

(d) optional 100%

110. What DOS command displays the contents of a text file?

(a) del

(b) dir

(c) rd

(d) type 100%

111. Which of the following DOS batch file commands can be used to display a message to Standard Output?

(a) rem

(b) goto

(c) @echo off

(d) echo 100%

112. The smallest unit of meaningful information in a database is a

(a) record

(b) structure

(c) definition

(d) field 100%

113. A data file that contains records each of which has the same type is called a _____ file.

(a) cardinal

(b) fundamental

(c) level

(d) flat 100%

114. Database models that have been used successfully include which of the following?

  1. Hierarchical

  2. Network

  3. Relational

(a) I and II only

(b) I and III only

(c) II and III only

(d) I, II, and III 100%

115. Of the following database models, which is simplest?

(a) Network

(b) Relational

(c) Object-oriented

(d) Hierarchical 100%

116. In a relational database, a row of a table is called a(n)

(a) attribute

(b) multiple

(c) index

(d) tuple 100%

117. A systematic approach to the development, operation, maintenance, and retirement of a software system is called software

(a) programming

(b) analysis

(c) management

(d) engineering 100%

118. In a software engineering project, the people who plan the entire system to be constructed are called the system

(a) engineers

(b) programmers

(c) managers

(d) analysts 100%

119. In a software engineering project, the people who focus on the software components of the system to be constructed are called the software

(a) analysts

(b) managers

(c) coders

(d) engineers 100%

120. A good problem statement for a computing project specifies which of the following?

  1. All assumptions that define the scope of the problem

  2. The information that is known about the problem

  3. Criteria for determining when the problem has been solved

(a) III only

(b) I and II only

(c) I and III only

(d) I, II, and III 100%

121. A series of steps performed manually that mimic the steps the computer would perform in executing an algorithm, using realistic data, is called a(n) _____ of the algorithm.

(a) codification

(b) assessment

(c) objectification

(d) walkthrough 100%

122. A programming language that allows the programmer to use instructions that resemble human language is said to be a(n) _____ language.

(a) low-level

(b) fundamental

(c) ordinary

(d) high-level 100%

123. Most Web pages contain _____ to related documents and media files.

(a) keys

(b) passages

(c) icons

(d) links 100%

124. Consider the following URL.

http://www.carnegietech.org

In the URL, "http" is the

(a) Web server name

(b) folder name

(c) filename

(d) protocol standard 100%

125. Consider the following URL.

http://www.carnegietech.org

In the URL, "www.carnegietech.org" is the

(a) protocol standard

(b) folder name

(c) filename

(d) Web server name 100%

126. Consider the following URL.

http://www.carnegietech.org/about/index.html

In the URL, "about" is the

(a) Web server name

(b) protocol standard

(c) filename

(d) folder name 100%

127. Consider the following URL.

http://www.carnegietech.org/about/index.html

In the URL, "index.html" is the

(a) Web server name

(b) protocol standard

(c) folder name

(d) filename 100%

128. Some search engines use _____ instead of the word AND to indicate that a search term must appear on a Web page for the page to be included in the search results.

(a) *

(b) $

(c) %

(d) + 100%

129. A conversion system called _____ enables digital photos, sounds, and other media to be represented as ASCII text that can travel over the Internet as email attachments.

(a) SMTP

(b) POP

(c) IMAP

(d) MIME 100%

130. Accessing email from a POP server requires email _____ software.

(a) resource

(b) management

(c) forwarding

(d) client 100%

131. Which of the following is (are) true regarding protocols used over the Internet?

  1. The Post Office Protocol transfers mail from an e-mail server to a client inbox.

  2. The Internet Mail Access Protocol transfers e-mail messages from client computers to an e-mail server.

(a) I and II

(b) II only

(c) None

(d) I only 100%

132. Which of the following is (are) true regarding IP addresses?

  1. IP addresses can be represented using twelve bits.

  2. A static IP address is required for computers acting as servers on the Internet.

(a) I and II

(b) I only

(c) None

(d) II only 100%

133. Activities that can be engaged in using dynamic IP addresses include which of the following?

  1. Browsing the web

  2. Sending e-mails

  3. Receiving e-mails

(a) I and II only

(b) I only

(c) II and III only

(d) I, II, and III 100%

134. Which of the following is an example (are examples) of a client-server system?

  1. The World Wide Web

  2. Email

  3. Usenet News

(a) I and II only

(b) II and III only

(c) I and III only

(d) I, II, and III 100%

135. A widely used Web server program is

(a) Internet Explorer

(b) Exchange

(c) Outlook

(d) Apache 100%

136. A widely used email client program is

(a) Apache

(b) Access

(c) Excel

(d) Outlook 100%

137. Which of the following statements about client-server systems is (are) true?

  1. Both the client and the server can be software programs.

  2. The client runs on the user's computer and interacts with both the user and the server.

(a) I only

(b) II only

(c) None

(d) I and II 100%

138. Which of the following statements about thick and thin clients is (are) true?

  1. A thick client does less work than a thin client does.

  2. A Web browser can act as either a thick or a thin client.

(a) I only

(b) None

(c) I and II

(d) II only 100%

139. A multi-player network game where each player's computer communicates directly with all of the other players' computers is an example of a _____ network.

(a) client-server

(b) broadband

(c) client

(d) peer-to-peer 100%

140. What is the maximum number of units of information that can be conveyed using 10 bits?

(a) 20

(b) 10

(c) 100

(d) 1024 100%

141. Which of the following is (are) true regarding analog signals?

  1. Analog signals typically represent an unlimited range of values.

  2. Analog signals typically have a smooth and curved waveform.

(a) I only

(b) II only

(c) None

(d) I and II 100%

142. Which of the following is (are) true regarding STP and UTP cables?

  1. Twisted pairs of STP cables are encased with a foil shield, while twisted pairs of UTP cables contain no such shielding.

  2. UTP is more expensive than STP, but offers greater protection against noise interference.

(a) I and II

(b) II only

(c) None

(d) I only 100%

143. Which of the following is (are) true regarding fiber-optic cables?

  1. Fiber-optic cables can be used to transmit electric signals.

  2. Fiber-optic cable is a bundle of extremely thin tubes of glass called optical fibers.

(a) I and II

(b) I only

(c) None

(d) II only 100%

144. Which of the following is (are) true regarding network devices?

  1. A hub is a device that connects several nodes of a local area network.

  2. A router is a device that is connected to more than one network and makes decisions regarding the best route for data.

  3. A repeater is a device that amplifies and regenerates signals so that they can retain the necessary strength to reach their destinations.

(a) I and II only

(b) I and III only

(c) II and III only

(d) I, II, and III 100%

145. Which of the following is (are) true regarding dial-up connections?

  1. Dial-up connections use the telephone service to transport data between the computer and an ISP.

  2. When a dial-up connection is used, a dedicated link is established between the computer and the ISP.

(a) I only

(b) II only

(c) None

(d) I and II 100%

146. Which of the following is (are) true regarding the use of cable television connections to provide Internet access?

  1. An Ethernet card and a cable modem are required to access the Internet over a cable television system.

  2. The connection speed of a cable television connection depends on the current amount of traffic over the CATV cables.

(a) I only

(b) II only

(c) None

(d) I and II 100%

147. Which of the following is (are) true regarding Internet access?

  1. In ADSL connections, the upstream speed of data transfer is faster than the downstream speed.

  2. In DSL connections, the digital-to-analog and analog-to-digital conversions are avoided.

  3. DSL runs over standard telephone lines.

(a) I and II only

(b) I and III only

(c) I, II, and III

(d) II and III only 100%

148. How many bytes long is an IP address?

(a) Six

(b) Eight

(c) Two

(d) Four 100%

149. A device to connect two or more networks is known as a(n)

(a) NIC

(b) DNS server

(c) domain

(d) router 100%

150. Which of the following is a layer of protocol on top of IP that guarantees that packets will be received in the same order they were sent and that none will be lost?

(a) DNS

(b) TRACERT

(c) Ethernet

(d) TCP 100%

151. What system is used to translate domain names to IP addresses?

(a) TCP

(b) Routers

(c) ISP

(d) DNS 100%

152. Computers that use a dial-up connection to the Internet are typically assigned a _____ IP address.

(a) static

(b) backbone

(c) permanent

(d) dynamic 100%

153. Which of the following means of connecting to the Internet uses (use) standard copper telephone lines?

  1. 56 Kbps modems

  2. Cable modems

  3. xDSL

(a) I, II, and III

(b) I and II only

(c) III only

(d) I and III only 100%

154. Which of the following is (are) true regarding computer viruses?

  1. A computer virus is a set of program instructions that attaches itself to a file, reproduces itself, and spreads to other files.

  2. A computer virus contains self-executing program code to spread itself from one computer to another.

(a) I and II

(b) II only

(c) None

(d) I only 100%

155. Which of the following is (are) true regarding computer viruses?

  1. When a computer executes a program that is infected with a computer virus, it also executes the attached virus instructions.

  2. In a computer infected with a virus, the virus instructions that are executed generally remain in RAM and are capable of infecting the next program that runs on that computer.

(a) I only

(b) II only

(c) None

(d) I and II 100%

156. Capabilities of computer viruses include which of the following?

  1. The ability to remain in a computer for long periods without showing any external symptoms and quietly replicating themselves during this period

  2. The ability to perform trigger events that are keyed to a specific date

  3. The ability to spread from one computer to another by itself

(a) I only

(b) II and III only

(c) I, II, and III

(d) I and II only 100%

157. Which of the following is (are) true regarding file viruses?

  1. A virus that attaches to an application program is known as a file virus.

  2. The Melissa virus is a well-known file virus.

(a) I and II

(b) II only

(c) None

(d) I only 100%

158. Which of the following is (are) true regarding boot sector viruses?

  1. Boot sector viruses are capable of infecting the system files used by a computer every time the computer is turned on.

  2. Boot sector viruses are capable of causing widespread damage and problems that reoccur.

(a) I only

(b) II only

(c) None

(d) I and II 100%

159. A miniature program that contains legitimate instructions to automate document and spreadsheet production is known as a(n)

(a) automator

(b) instruction set

(c) dynamic program

(d) macro 100%

160. Which of the following is (are) true regarding Trojan horses?

  1. A Trojan horse is a computer program that seems to be performing one function while actually doing something else.

  2. Trojan horses are designed to make copies of themselves.

(a) I and II

(b) II only

(c) None

(d) I only 100%

161. Which of the following is (are) true regarding worms in the context of computer attacks?

  1. Worms are designed to spread from computer to computer, taking advantage of communications networks.

  2. Worms can deliver malicious payloads that cause damage to data stored on a computer.

(a) I only

(b) II only

(c) None

(d) I and II 100%

162. Symptoms that indicate virus infection in a computer include which of the following?

  1. Unusual visual or sound effects emanating from the computer

  2. An unaccountable increase in the size of executable files

  3. The computer sending out e-mail messages on its own

(a) I and II only

(b) II and III only

(c) I and III only

(d) I, II, and III 100%

163. Which of the following is (are) true regarding the use of checksums for virus detection?

  1. A checksum is a number that is calculated by combining the binary values of all bytes in a file.

  2. This technique helps detect viruses that insert themselves into unused portions of a program.

  3. This technique can be used even when there is no virus-free copy of the program when the checksum is first taken.

(a) I, II, and III

(b) I and III only

(c) II and III only

(d) I and II only 100%

164. Which of the following is (are) true regarding the use of the signature-search technique for virus detection?

  1. This is the technique used by most of today's anti-virus software.

  2. This technique can even detect viruses whose signature is unknown when the technique is first applied.

(a) I and II

(b) II only

(c) None

(d) I only 100%

165. Home computers are generally vulnerable to security threats for which of the following reasons?

  1. Cable modem networks and wireless networks can be eavesdropped on.

  2. Many home computers are not securely configured.

  3. Many home users would not detect that their computer's security has been breached.

(a) I and II only

(b) II and III only

(c) I and III only

(d) I, II, and III 100%

166. Motivations for computer system attackers include which of the following?

  1. Fun

  2. Revenge

  3. Profit

(a) I and II only

(b) II and III only

(c) I and III only

(d) I, II, and III 100%

167. Intruders can gain information about a computer system by which of the following means?

  1. Creating an excessive amount of network traffic

  2. Capturing network packets

  3. Asking users for information

(a) I, II, and III

(b) I and II only

(c) II only

(d) II and III only 100%

Соседние файлы в предмете [НЕСОРТИРОВАННОЕ]