What is resolution of ultra extended graphic array adapter

Assignment Help Computer Engineering
Reference no: EM131113935

Computing Concepts

Part 1

1. Which of the following is NOT a basic computer operation?

a. Processing
b. Storage
c. Input
d. Throughput

2. The computer function in which raw data is received is known as:

a. processing.
b. output.
c. input.
d. storage.

3. The most important type of memory that a typical computer uses during the processing operation is ________ memory.

a. flash
b. storage
c. random access
d. read-only

4. Typing a document into the computer is an example of:

a. output.
b. processing.
c. storage.
d. input.

5. A feeling of anxiety and incapacity experienced when people are presented with more information than they can handle is known as:

a. digital distress.
b. digital anxiety.
c. computerized stress syndrome.
d. information overload.

6. Which of the following is a type of product that complements the human body's best posture and functionality?

a. Esoteric
b. Ergocentric
c. Ergonomic
d. Natural

7. ________ is a portable, wireless, paperback-sized e-book reading device that includes a text-tospeech function.

a. Kindle 2
b. Netbook
c. Wiki
d. Digital e-book

8. The most widely used pointing device is the:

a. keyboard.
b. trackball.
c. mouse.
d. joystick.

9. The ________ is a pattern of bars printed on merchandise that stores information about the item.

a. MICR
b. OMR
c. EDI
d. UPC

10. A representation of an image as a matrix of pixels is called a ________ image.

a. digit recognition
b. scanned
c. digitized
d. bit-mapped

11. What is the resolution of an Ultra Extended Graphic Array adapter?

a. 800 x 600
b. 1,280 x 1,024
c. 1,024 x 768
d. 1,600 x 1,200

12. A pie-shaped wedge of a hard disk is called which of the following?

a. Track
b. Cluster
c. Platter
d. Sector

13. The amount of time it takes a device from the request for information to that information's delivery is known as:

a. cycle time.
b. cache time.
c. read time.
d. access time.

14. Starting a computer that is already turned on is called a:

a. power on.
b. warm load.
c. cold boot.
d. warm boot.

15. System utilities:

a. have to be accessed through applications.
b. are loaded before the operating system is loaded.
c. perform functions such as protecting your computer from viruses.
d. include features such as a word-processing program.

16. Virtual memory is an enhanced way to utilize the main memory by:

a. creating pages of variable size to use when the swap file is full.
b. using a part of ROM as an extension of RAM to conserve the main memory.
c. using a hard disk swap file when memory is full.
d. dividing data and instructions into multitasking units.

17. Which of the following computer interfaces is the most popular?

a. GUI
b. Menu-driven
c. Shortcut keystrokes
d. Command-line

18. ________ is a Windows 7 feature, which enables users to instantly see a list of relevant documents, pictures, music, and e-mails on their PCs that match the entered description.

a. Snap
b. Jump list
c. Windows Search
d. Pin

19. The right way to select a computer requires all of the following EXCEPT:

a. understanding the relative value of computer system components.
b. determining your software needs.
c. understanding the terminology of computer system components.
d. buying a computer based on price.

20. With the advent of ________, users can create a virtual Windows PC on their Mac.

a. HiFD
b. VMware
c. SXGA
d. PCI Express

21. Which of the following is another term for aperture grill?

a. Dot pitch
b. LCD mask
c. Raster lattice
d. Electron mesh

22. Which of the following is a connected storage device?

a. Memory
b. Cache
c. Optic card
d. Drive

23. Which of the following techniques uses color intensity to add realism to a three-dimensional object?

a. Bitmapping
b. Ray tracing
c. Image editing
d. Lossy compression

24. ________, a new wave of office suites, makes it possible to share files with others, resulting in easier Part collaboration.

a. Web-hosted technology
b. Internet User software
c. Multimedia software
d. Web-browser technology

25. Most software licenses included with programs that you purchase give you the right to install the program on:

a. all the computers in your office.
b. any of your classmates' computers because it will be used for educational purposes.
c. one computer.
d. all the computers you have in your home.

Part 2

1. AOL is an example of an online service provider and is considered a(n) ________ organization that provides a proprietary network offering services to subscribers.

a. educational
b. for-profit
c. governmental
d. non-profit

2. In order from slowest to fastest, the correct order of the types of Internet access is as follows:

a. FiOS, satellite, cable, DSL, dial-up.
b. DSL, dial-up, FiOS, cable, satellite.
c. dial-up, DSL, cable, satellite, FiOS.
d. dial-up, cable, DSL, satellite, FiOS.

3. The Internet is a(n) ________ whereas the Web is a(n) ________.

a. collection of servers; network connections
b. network of hardware; Internet information resource
c. information resource; physical connection
d. physical resources, URLs

4. Which of the following is the common term for a link to a document that has disappeared?

a. Visited link
b. Defunct link
c. Broken link
d. Obsolete link

5. The first graphical Web browsers were developed in which of the following years?

a. 1988
b. 1970
c. 2005
d. 1993

6. As of April 2010, Mozilla Firefox had ________ percent of the browser market.

a. 33
b. 54
c. 7
d. 4

7. A complete URL has four parts: protocol, ________, path, and resource name.

a. domain name
b. network id
c. server name
d. IP address

8. Which of the following names is the path that houses the Web page in the fictitious URL given below? https://www.univ.edu/classroom/welcome.htm

a. classroom
b. classroom/welcome.htm
c. welcome.htm
d. www.univ.edu

9. A Web site's domain name correlates to the:

a. path name.
b. Web server IP address.
c. type of organization it belongs to.
d. network identifier.

10. Which of the following is the term for a gateway that provides a structured guide to Internet material such as news, weather, sports, or e-mail?

a. Search engine
b. Portal
c. Network access point
d. Extranet

11. ________ are gaining in popularity -web sites that provide quick access to information from many sources in one location.

a. Aggregators
b. Search engines
c. Browsers
d. URLs

12. Which of the following Internet services is threatened by spimming?

a. Internet Relay Chat (IRC)
b. Instant messaging (IM)
c. Voice over Internet Protocol (VoIP)
d. E-mail

13. Which of the following is NOT true about Web hosting services?

a. It makes the site available to the public.
b. It provides server space.
c. It provides e-advertising to increase sales.
d. It offers site management utilities.

14. ________ acts as a secure intermediary, offering users the ability to make payments from their bank account or credit card without revealing personal financial information to the seller.

a. CommercePal
b. BuyerPal
c. PayPal
d. PurchasePal

15. Social networking is a way to:

a. subscribe to "birds of a feather" newsletters.
b. expand your list of electronic contacts.
c. build expanding online communities.
d. All of the above.

16. ________ involves businesses that use the Internet to supply consumers with services, information, or products.

a. B2B
b. C2C
c. B2C
d. C2B

17. A VPN operates as a private network over which larger type of network?

a. Internet
b. Governmental network
c. LAN
d. WAN

18. Contention sometimes results in:

a. collisions.
b. parity errors.
c. multiplexing.
d. terminators.

19. Which of the following is NOT an issue addressed by modulation protocols?

a. Data compression standards
b. Error checking standards
c. Routing paths
d. Data transfer rate

20. Which of the following protocols do NOT use twisted-pair cabling?

a. 10Base-T
b. 10Base-5
c. IBM Token Ring
d. 100Base-T

21. Which of the following is a wireless specification?

a. 803.11x
b. 800.11a
c. 802.11g
d. 801.11d

22. Which of the following features enable the strongest WiFi encryption protection?

a. WDDI
b. WAP
c. WEP
d. WPA

23. The scope of a backbone can be all of the following EXCEPT:

a. transcontinental.
b. regional.
c. continental.
d. atmospheric.

24. Which of the following switching methods is used by the Internet?

a. Distributed
b. Packet
c. Circuit
d. Token

25. Which of the following is the maximum transfer speed for all digital line protocols such as switched multimegabit data service (SMDS)?

a. 1 Gbps
b. 56 Kbps
c. 155 Mbps
d. 11 Mbps

Part 3

1. The computer function in which processed data is displayed is known as:

a. storage.
b. output.
c. processing.
d. input.

2. OS is an abbreviation for which of the following terms?

a. Outsourced System
b. Overlay System
c. Operations Schedule
d. Operating System

3. A floppy disk drive is an example of:

a. standard technology.
b. newly developed technology.
c. modified technology.
d. legacy technology.

4. The device that combines the capabilities of a handheld computer with mobile phone capabilities and Web access is known as a ________.

a. minicomputer
b. mobile computer
c. multiphone
d. smartphone

5. A ________ is a client that relies on the server for its processing ability.

a. limited client
b. minimal client
c. thin client
d. terminal client

6. A ________ is a collection of Web pages designed to enable collaborative or community Web sites.

a. communal web
b. Google Docs
c. wiki
d. Google Parts

7. Which of the following is a type of product that complements the human body's best posture and functionality?

a. Ergocentric
b. Natural
c. Esoteric
d. Ergonomic

8. The disparity in computer ownership and Internet access is known as the ________.

a. non-computerized syndrome
b. disparity ratio
c. digital divide
d. None of the above

9. Which of the following requires computer access to individuals with disabilities?

a. The No Child Left Behind Act of 2001
b. The Disabilities Act of 1985
c. The Americans with Disabilities Act of 1990
d. The Digital Access Act of 1995

10. When an entire job category is made obsolete by advances in technology, it is called:

a. robotics.
b. automation.
c. structural unemployment.
d. technological replacement.

11. The use of computers and computer programs to replace teachers and the time-place limitations of learning is called:

a. e-school.
b. e-learning.
c. e-education.
d. e-class.

12. Which of the following is the path through which messages are sent from one location to another?

a. Multiplexers
b. Bandwidth markers
c. Communications channels
d. Digital endpoints

13. Which of the following is NOT true about baud?

a. It can be less than bps.
b. It is the rate at which two modems can exchange data.
c. It is the number of signaling elements per second.
d. It can be equal to bps.

14. Which of the following wireless communications medium transmits data via beams of light through the air?

a. Ultraviolet
b. Infrared
c. Sealed-beam
d. Microwave

15. Bluetooth is a(n) ________ radio transmission technology.

a. long-range
b. short-range
c. experimental
d. fiber-optic

16. Which of the following is NOT considered a last-mile technology geared at increasing transmission speeds for consumers?

a. ISDN
b. Coaxial cable
c. DSL
d. PSTN

17. ISDN is an abbreviation for which of the following terms?

a. Immediate synchronous digital network
b. Improved speed digital network
c. Integrated services digital network
d. Internet service digital network

18. WAP-enabled devices require a ________, a special Web browser that has all the features of computer-based browsers but is simplified to meet handheld device limitations.

a. demibrowser
b. microbrowser
c. minibrowser
d. modified browser

19. The cell phone application that uses GPS-enabled chips is called:

a. location awareness.
b. OnStar.
c. WhereRU.
d. positional reference systems.

20. The ability to convey a message without disclosing your name or identity is known as:

a. confidentiality.
b. cyberblocking.
c. privacy.
d. anonymity.

21. In the European Union, a basic human rights declaration grants citizens all of the following privacy rights EXCEPT the right to:

a. be informed of the sale of personal information from one marketing company to another.
b. know what information is being collected and how it will be used.
c. request personal information be removed from a marketing database.
d. choose whether or not to divulge requested information.

22. Which of the following statements about the issue of privacy is TRUE?

a. There is no comprehensive federal law governing the overall privacy rights of U.S. citizens.
b. Little exists to stop people and companies from acquiring and selling an individual's personal information.
c. The privacy of individuals is protected by a patchwork of limited federal and state laws and regulations.
d. All of the above.

23. Which of the following is the best definition of a computer hacker?

a. A hacker is creates bogus work-at-home opportunities, chain letters, get-rich-quick scams via email, chat rooms, and websites.
b. A hacker is a person who is highly skilled in computer programming but has had no formal education.
c. A hacker is a criminal who tries to discover computer capabilities not mentioned in software manuals, as well as modify them to obtain maximum performance.
d. A hacker is a slang term for a professional programmer.

24. Firewalls are used to:

a. prevent employees from sending e-mail beyond the confines of the network.
b. eavesdrop on employee e-mail.
c. check for viruses on a company's network.
d. restrict outsiders from accessing internal data.

25. Which of the following is the study of converting information into encoded or scrambled formats?

a. Numerology
b. Epistemology
c. Cartography
d. Cryptography.

Reference no: EM131113935

Questions Cloud

What is the general role of the us court system : What is the general role of the U.S. court system in influencing society. What is your opinion on whether or not you believe that mass media influences court decisions. Provide a rationale for your response
What forces are driving japanese investments in this region : Japanese MNCs, such as Toyota, Toshiba, and Matsushita, made extensive investments in Southeast Asian countries like Thailand, Malaysia, and Indonesia. In your opinion, what forces are driving Japanese investments in this region?
Convertible bond of bunky burgers : Today you purchase a $1,000 par value convertible bond of Bunky's Burgers. The bond matures in 30 years and has an annual coupon of 10%, payable semiannually. The yield to the maturity on the bond is 12% a year, compounded semiannually.
How can individual choice be promoted : How can individual choice be promoted and protected when members of society have different views of how things should be organized and how their own interests can be preserved
What is resolution of ultra extended graphic array adapter : What is the resolution of an Ultra Extended Graphic Array adapter? Which of the following is a type of product that complements the human body's best posture and functionality?
Tax strategies and capital budgeting : Consider what you know about global tax strategies and capital budgeting (NPV) analysis.  The current U.S. marginal corporate tax rate is 35%.
Find the line-to-line voltage at the substation bus : A three-phase, 60-Hz substation bus supplies two wye-connected loads that are connected in parallel through a three-phase feeder that has a per phase impedance of 0.5 + j2 Ω. Load 1 draws 50 kW at 0.866 lagging PF, and load 2 draws 36 kVA at 0.9 l..
History of prison development : Write a 700- to 1,050-word, double spaced, paper that examines the purpose and history of penitentiaries. Include the following: History of punishment and History of prison development
Appropriate financing worldwide : Your firm is deciding to raise capital. BRIEFLY describe issues to consider to get the most appropriate financing worldwide and the lowest WACC for your company on a worldwide basis.

Reviews

Write a Review

 

Computer Engineering Questions & Answers

  Imagine you are an experienced dos programmer

suppose you are an experienced DOS programmer and you want to write UNIX shell scripts using DOS commands

  The signal propagates 250 million meters per second along

two stations exchange packets of 100 bits using a link with 2800 bps transfer rate. the signal propagates 250 million

  Draw the final binary search tree

Read the author's question above, and examine the following write-up to answer this question: is it true as stated; if not, why not?

  Who are the stakeholders in the scenario

You prepare a plan to minimise the impact of the buggy code but this would involve a delay in distribution of the software.

  Show output from the amazon web service

make Use of Visual Studio.NET 2005 to create an ASP.NET application that displays output from the Amazon web service. Add good documentation to the code. Furthermore, create a user-friendly interface.

  Emphasizing values in a column that satisfy some criterion

1. a presents specific data in an organized format this can be printed.formreportcontroldatabase2. the report creates

  What is difference between colorname0 byte and db

What is the difference between ColorName0 BYTE "New is Blue ", 0 and ColorName0 db "New is Blue ",  0 ?

  Workplace communication a

Your major project is related to an on-line book/CD/DVD seller. Research a number of currently available website offerings. Keep links and notes related to the websites, as you will be required to write a brief report on your findings.

  Assignment- virtualization and cloud computing world

Assignment: Virtualization and Cloud Computing World, The popularity and rapid adoption of Software as a Service (SaaS), Platform as a Service (PaaS), and Infrastructure as a Service (IaaS) by a number of organizations has impacted internal IT / IS..

  Define the benefits of network segmentation

describe each mechanism's approach for connections establishment and termination.define the benefits of network segmentation.

  Createnbspa table with the following four column headings

understanding object-oriented methodologies is often difficult. you already understand that object-oriented analysis

  Create a document retention policy for your college

Create a document retention policy for your College that complies with all state and Federal regulations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd