2023年12月29日发(作者:)
Multiple 1
1. The keyboard, mouse, monitor, and system unit are:
hardware output devices storage devices software
2. Programs that coordinate computer resources, provide an interface, and run
applications are known as:
application programs
storage systems
operating systems
utility programs
3. A browser is an example of a:
basic application
system application
specialized program
utility program
4. Although not as powerful as a supercomputer, this type of computer is
capable of great processing speeds and data storage.
mainframe media center midrange netbook
5. The smallest type of microcomputer:
netbook handheld midrange tablet PC
6. RAM is a type of:
computer memory network secondary storage
7. Unlike memory, this type of storage holds data and programs even after
electrical power to the computer system has been turned off.
primary RAM ROM secondary
8. The type of file created by word processors to save, for example, memos, term
papers, and letters.
database document presentation worksheet
9. The change in connectivity that uses the Internet and the Web to shift many
computer activities from a user’s computer to computers on the Internet.
cloud computing high definition network USB
10. The largest network in the world is [the]:
Facbeook Internet Web USB
Multiple 2
1. The network that connects computers all over the world.
CERN Internet LAN Web
2. The rules for exchanging data between computers.
DSL protocols Web WWW
3. Client-based e-mail accounts require this special program to be installed on
your computer.
e-mail client hyperlink Java utility
4. Communities of individuals who share a common interest typically create
Facebook:
clients groups pages profiles
5. E-mail that does not require an e-mail program installed on a user's computer
is known as:
blog podcast Webmail utility
6. A very well-known microblog.
LinkedIn MySpace Twitter Wikipedia
7. These programs continually look for new information and update search
services’ database programs.
filters IM spiders wikis
8. A type of search engine that submits requests to other search engines,
organizes their responses, eliminates duplicate responses, orders hits, and then
provides an edited list.
directory search
metasearch engine
ISP
specialized search engine
9. This is the Internet’s equivalent to traditional cash.
digital cash e-commerce icash Internet dollars
10. Using file transfer utility software, you can copy files to your computer from
specially configured servers on the Internet. This is called:
downloading filtering blogging uploading
Multiple 3
1. This type of software works with end users, application software, and
computer hardware to handle the majority of technical details.
application general purpose system utility
2. A rectangular area that can contain a document, program, or message.
dialog box form frame window
3. Programs that create text-based documents.
DBMS suites spreadsheets word processors
4. Programs that organize, analyze, and graph numeric data such as budgets and
financial reports.
DBMS suites spreadsheets word processors
5. In a spreadsheet, the intersection of a row and column creates a:
cell formula function label
6. A collection of related data that is the electronic equivalent of a file cabinet.
cell database document table
7. A database tool that will quickly rearrange a table’s records according to a
selected field.
filter sort spreadsheet word processor
8. Programs that combine a variety of visual objects to create attractive, visually
interesting presentations.
DBMS presentation graphics spreadsheet word processor
9. The primary disadvantage of this type of package is that the capabilities of
each function are not as extensive as in individual programs.
integrated office software utility
10. A type of suite stored at a server on the Internet and available anywhere
through Internet access.
cloud integrated office utility
Multiple 4
1. These specialized graphics programs combine text and graphics to create
publications of professional quality.
desktop publishing programs
image galleries
image editors
illustration programs
2. Also known as drawing programs.
desktop publishing programs
image galleries
image editors
illustration programs
3. Graphics programs used to create and edit vector images.
desktop publishing programs
image galleries
image editors
illustration programs
4. An essential multimedia feature that allows user participation.
Flash interactivity immersion raster
5. Special programs used to create multimedia presentations.
desktop publishing programs
image editors
Flash editors
multimedia authoring programs
6. A widely used interactive animation application from Adobe.
ACTION Flash Fuzzy WYSIWYG
7. Programs for Web site design and HTML coding are called Web page editors
or
apps HTML editors VR programs Web editors
8. This area of artificial intelligence is also known as expert systems.
acoustics knowledge-based systems robotics virtual reality
9. A type of artificial intelligence that uses a database to provide assistance to
users.
acoustics expert systems robotics virtual reality
10. Another name for the database used in expert systems that contains specific
facts and rules.
access table expert table knowledge base rule base
Multiple 5
1. What type of software works with users, application software, and computer
hardware to handle the majority of technical details?
dapplication desktop Linux system
2. The programs that convert programming instructions written by programmers
into a language that computers understand and process are language:
converters linguists managers translators
3. The ability to switch between different applications stored in memory is called:
diversion multitasking operational interference programming
4. Graphic representations for a program, type of file, or function:
app icon image software
5. This operating system feature is controlled by a mouse and changes shape
depending on its current function.
dialog box menu mouse pointer
6. The operating system based on Linux, designed for Netbook computers, and
focused on Internet connectivity through cloud computing:
Chrome Mac Unix Windows
7. The mobile operating system developed by Apple and originally called iPhone
OS:
Android BlackBerry OS IOS Mac OS
8. A utility program that makes copies of files to be used in case the originals are
lost or damaged:
Backup and Restore Disk Cleanup Disk Defragmenter Compactor
9. A troubleshooting utility that identifies and eliminates nonessential files, frees
up valuable disk space, and improves system performance:
Backup and Restore Disk Cleanup Disk Defragmenter Compactor
10. Windows makes it easy to update drivers with Windows:
Backup Restore Driver Update
Multiple 6
1. This container houses most of the electrical components for a computer
system.
carrier package system board system unit TV tuner
2. Similar to notebooks, this system unit specializes in on-the-go Web browsing
and e-mail access.
chassis desktop media center netbook
3. Computers can only recognize this type of electronic signal.
analog bus digital maximum
4. The main or motherboard is also known as the:
computer board processor mobile system system board
5. How many bytes can a 32-bit-word computer access at one time?
1 4 8 16
6. In a microcomputer system, the central processing unit is contained on a
single:
bus chip module RAM
7. This type of memory divides large programs into parts and stores the parts on
a secondary storage device.
direct expanded random-access virtual
8. Also known as NIC, this adapter card is used to connect a computer to a:
AIA expansion graphics network
9. This provides a pathway to connect parts of the CPU to each other.
bus Plug and Play wired wireless
10. Older ports that have largely been replaced by faster, more flexible ports are
called:
buses expandable legacy rendered
Multiple 7
1. Most keyboards use an arrangement of keys known as:
Alpha Daisy OptiKey QWERTY
2. The device that controls a pointer displayed on the monitor.
cord mouse printer scanner
3. Also known as a roller ball, this device controls the pointer by rotating a ball
with your thumb.
trackball joystick cordless mouse stylus
4. The type of screen that can be touched with more than one finger and
supports zooming in and out by pinching and stretching your fingers.
digital dynamic multitouch OLED
5. Flatbed and document are types of:
headsets HDTVs monitors scanners
6. Device used by banks to automatically read those unusual numbers on the
bottom of checks and deposit slips.
MICR FDIC OMR UPC
7. The most widely used audio-input device.
mouse VR microphone TFT
8. The monitor feature that specifies how often a displayed image is updated.
aspect ratio dot pitch refresh rate resolution rate
9. Handheld, book-sized devices that display text and graphics.
e-book readers HDTV lasers whiteboards
10. This technology allows television stations to broadcast their programming
directly to smartphones, computers, and digital media players.
CRT HDTV LED Mobile DTV
Multiple 8
1. RAM is sometimes referred to as:
primary storage
read only memory
ratio active memory
secondary storage
2. The actual physical material that holds the data and programs.
primary storage media disk access
3. Measures how tightly these charges can be packed next to one another on the
disk.
density cylinders tracks sectors
4. When a read/write head makes contact with the hard disk’s surface, it causes a
head:
crash land pit scratch
5. This hard-disk performance enhancement anticipates data needs.
disk caching file compression file decompression RAID
6. This type of storage uses pits and lands to represent 1s and 0s.
cloud hard disk optical solid state
7. DVD stands for:
digital versatile disc
dynamic versatile disc
digital video data
dynamic video disc
8. USB drives are also known as:
flash drives optical drives ports universal state bus
9. An organizational strategy to promote efficient and safe use of data across the
networks.
cloud dynamic
enterprise storage system
data mission statement
RAID
10. A mass storage device that provides access to data archived on tapes.
file system NAS RAID system tape library
Multiple 9
1. The concept related to using computer networks to link people and resources.
connectivity GPS TCP/IP Wi-Fi
2. A high-frequency transmission cable that delivers television signals as well as
connects computers in a network.
coaxial hi def 3-D twisted pair
3. A short-range radio communication standard that transmits data over short
distances of up to approximately 30 feet.
Bluetooth broadband DSL TCP/IP
4. The speed with which a modem transmits data is called its:
digital velocity dynamic rate modular rating transfer rate
5. The bandwidth typically used for DSL, cable, and satellite connections to the
Internet.
baseband broadband medium band voiceband
6. Every computer on the Internet has a unique numeric address called a(n):
IP address DNS broadcast packet
7. Sometimes referred to as a LAN adapter, these expansion cards connect a
computer to a network.
PCMCIA NIC server VPN
8. A device that allows one LAN to be linked to other LANs or to larger networks.
IDS network gateway PAN switch
9. Typically using Wi-Fi technology, these wireless access points are typically
available from public places such as coffee shops, libraries, bookstores,
colleges, and universities.
hotspots extranets PANs LANs
10. Star, tree, and mesh are three types of network:
topologies protocols strategies devices
Multiple 10
1. The three primary privacy issues are accuracy, property, and:
access ethics ownership security
2. To easily get names, addresses, and other details about a person using only
his or her telephone number, government authorities and others use a(n):
adware cookie keystroke logger reverse directory worm
3. Browsers store the locations of sites visited in a:
history menu tool bar firewall
4. The browser mode that eliminates history files and blocks most cookies.
detect insert privacy sleep
5. The information that people voluntarily post in social networking sites, blogs,
and photo- and video-sharing sites is used to create their:
access approval firewall online identity phish
6. Computer criminals who specialize in stealing, trading, and using stolen credit
cards over the Internet are known as:
carders card scammers cyber traders identity thieves
7. Programs that come into a computer system disguised as something else are
called:
Trojan horses viruses Web bugs zombies
8. The use of the Internet, cell phones, or other devices to send or post content
intended to hurt or embarrass another person is known as:
cyber-bullying
social media discrimination
online harassment
unethical communication
9. Special hardware and software used to control access to a corporation’s
private network is known as a(n):
antivirus program
firewall
communication gate
spyware removal program
10. To prevent copyright violations, corporations often use:
ACT DRM VPN WPA
Multiple 11
1. Which of the basic organizational functions records all financial activity from
billing customers to paying employees?
accounting marketing production research
2. What managerial level has information flow that is vertical, horizontal, and
external?
top supervisory middle foreman
3. Which computer-based information system uses data from TPS and analytical
tools to support middle managers?
ESS MIS DSS TPS
4. Accounts payable refers to money the company owes its suppliers for
materials and services it has:
created exported inventoried received
5. What accounting activity keeps track of all summaries of all transactions?
balance sheet
income statement
general ledger
inventory control
6. What accounting statement lists the overall financial condition of an
organization?
balance sheet
income statement
general ledger
inventory control
7. What type of report is produced at regular intervals?
demand exception inventory periodic
8. A DSS consists of four parts: user, system software, decision models, and:
application software
spreadsheets
data operating system
9. What type of worker is involved with the distribution, communication, and
creation of information?
executive foreman information knowledge
10. What type of program is designed to schedule, plan, and control project
resources?
auditing dtp project managers schedulers
Multiple 12
1. Facts or observations about people, places, things, and events are:
data occurrences records tables
2. The most basic logical data element such as a single letter, number, or special
character is known as a:
character element phrase record
3. Each record in a database has at least one distinctive field, called the:
key field structure type view
4. One element of database security is to provide only authorized users with:
classes nodes passwords relations
5. The bridge between the logical and physical views of the data is provided by:
DBMS records SQL tables
6. Highly trained computer specialists who interact with the data administration
subsystem are known as:
DBMS data modelers database administrators relational specialists
7. In a network database, each child node may have more than one parent node;
this is known as a:
hierarchy
parent relationship
many-to-many relationship
relational relationship
8. Connections between parent nodes and child nodes are provided by:
characters DBA objects pointers
9. Two of the most significant advantages of multidimensional databases over
relational databases are processing speed and:
conceptualization control format objectification
10. Object-oriented databases organize data by classes, attributes, methods,
and:
objects relations space time
Multiple 13
1. An information system is a collection of hardware, software, people,
procedures, and:
data DBMS specialists system analysts
2. What is the first phase in the systems life cycle?
needs analysis
systems analysis
preliminary investigation
systems design
3. Which phase in the systems life cycle involves installing the new system and
training people?
preliminary investigation
system design
systems analysis
systems implementation
4. This phase in the systems life cycle is concerned about determining system
requirements not in design.
preliminary investigation
system design
systems analysis
systems implementation
5. Which systems analysis tool shows the relationship between input and output
documents?
checklist data flow decision table grid chart
6. These tools relieve the systems analysts of many repetitive tasks, develop
clear documentation, and, for larger projects, coordinate team member
activities.
automated systems life cycle
data flow analyzers
CASE
flow charts
7. Which systems life cycle phase is concerned with economic, technical, and
operational feasibility?
preliminary investigation
systems design
systems analysis
systems implementation
8. What type of feasibility evaluates whether the people within the organization
will embrace or resist a new system?
behavioral economic operational techinical
9. Which approach to conversion begins by trying out a new system in only one
part of an organization?
direct pilot parallel phased
10. An alternative to the systems life cycle approach using powerful
development software, small specialized teams, and highly trained personnel.
AAD CASE prototyping RAD
Multiple 14
1. A program is a list of instructions for the computer to follow to process:
data direct logic hardware software
2. The major processing steps identified in a top-down program design are
called:
assembly instructions modules logic
3. The programming logic structure in which one program statement follows
another.
concatenation loop repetition selection
4. One of the best ways to code effective programs is to use the three basic logic
structures to create:
content-markup programs
pseudocode
modular languages
structured programs
5. Which step in the six-step programming procedure involves desk checking
and searching for syntax and logic errors?
program design
program maintenance
program documentation
program test
6. Which step in the six-step programming procedure is the final step?
program design
program test
program documentation
program maintenance
7. Unlike traditional systems development, this software development approach
focuses less on the procedures and more on defining the relationships between
previously defined procedures.
2GL context-markup module object-oriented
8. Natural languages are considered to be a:
high-level language
mid-level language
low-level language
procedural language
9. A compiler converts the programmer’s procedural language program, called
the source code, into a machine language code, called the:
interpreter code
structured code
object code
top-down code
10. The 4GL languages that enable nonprogrammers to use certain easily
understood commands to search and generate reports from a database.
query application generator C11 COBOL
Multiple 15
1. People who react to technology by thinking computers are magic boxes
capable of solving all kinds of problems that computers really can’t handle are:
cynics frustrated naïve proactive
2. The type of person that looks at technology in a positive realistic way is:
cynical proactive naïve frustrated
3. Books, journals, and trade associations are the best sources to help you:
develop personal contacts
look for innovative opportunities
develop specialties
maintain your computer competency
4. If your career is in marketing, it makes sense to develop a specialty in:
database
programming
desktop publishing
systems analysis and design
5. What computer professional repairs and installs computer components and
systems?
computer technician
desktop publisher
data entry worker
software engineer
6. What computer professional designs, tests, and researches encryption
procedures?
cryptographer
programmer
network administrator
software engineer
7. What computer professional uses database management software to
determine the most efficient ways to organize and access data?
cryptographer
programmer
database administrator
software engineer
8. What computer professional oversees the work of programmers, computer
specialists, systems analysts, and other computer professionals?
information systems manager
software engineer
network manager
technical writer
9. What computer professional creates, tests, and troubleshoots computer
programs?
network manager
software engineer
programmer
technical writer
10. What computer professional plans and designs information systems?
network manager
software engineer
programmer
systems analyst


发布评论