Which represents a major change in a software program

Assignment Help Computer Engineering
Reference no: EM131062233

1. Which of the following eras were only the U.S. government, colleges, and universities able to access the Internet?

a. 1960s
b. 1980s
c. 1990s
d. 1970s

2. Typing a document into the computer is an example of:

a. storage.
b. output.
c. input.
d. processing.

3. A server is a computer that:

a. plays a less important role in today's businesses.
b. is ultrafast and designed to handle large processing jobs.
c. makes programs and data available to people who are connected to a computer network.
d. is designed for individual use.

4. The CPU is often referred to as the of the computer.

a. brain
b. core
c. soul
d. heart

5. uses basic ethical principles to help you make the right decisions during daily computer usage.

a. Netiquette
b. ACM Conduct Code
c. Computer morality.
d. Computer ethics.

6. Which of the following is NOT a basic computer operation?

a. Throughput
b. Processing
c. Input
d. Storage

7. OS is an abbreviation for which of the following terms?

a. Outsourced system
b. Operations schedule
c. Overlay system
d. Operating system

8. NIC is an abbreviation for which of the following terms?

a. Network information card
b. Network integration card
c. Network interface card
d. Network interface capability

9. A floppy disk drive is an example of:

a. standard technology.
b. modified technology.
c. newly developed technology.
d. legacy technology.

10. The use of computers and computer programs to replace teachers and the time-place limitations of learning is called:

a. e-school
b. e-learning
c. e-class
d. e-education

11. Technology has contributed to globalization, which has led to:

a. increased domestic employment
b. outsourcing
c. lower productivity
d. higher wages

12. The number of operations per clock tick affects:

a. microprocessor performance.
b. disk drive capacity.
c. monitor resolution.
d. the bus size.

13. The ExpressCard is also known as the card.

a. SCSI
b. PS/2
c. PCMCIA
d. VGA

14. If your computer doesn't have enough USB ports, it is possible to obtain a USB .

a. router
b. hub
c. PBX
d. multiplexer

15. Which of the following keys or key combinations is typically used to display on-screen help?

a. F1
b. Esc
c. Ctrl + H
d. Enter

16. Five bits result in possibilities.

a. 32
b. 64
c. 128
d. 256

17. Hexadecimal numbers are represented using numbers 0 to 9 and letters .

a. A to F
b. A to Z
c. A to C
d. A to M

18. The contains a computer's main hardware components.

a. motherboard
b. CPU
c. master case
d. system unit

19. The central processing unit (CPU):

a. is different from a microprocessor.
b. is an integrated chip capable of processing signals.
c. is a fairly simple device.
d. plays a minimal role in processing data.

20. Which of the following subcomponents of the CPU takes instructions from memory and decodes the instructions?

a. Control unit
b. Microprocessor
c. Databus
d. Arithmetic-logic unit

21. Although introduced in 1995, the USB didn't become widely used until the release of the:

a. iMac.
b. iPod.
c. iTunes
d. Blackberry.

22. A memory is the amount of RAM a program uses when it is operational.

a. utility
b. footprint
c. stash
d. cache

23. Which of the following is NOT a factor affecting hard disk performance?

a. The existence of disk partitions
b. The drive's seek time
c. The rotating speed of the platters
d. The spacing or placement of related data on the platters

24. is the maximum storage capacity for a CD-ROM.

a. 1,500 MB
b. 950 MB
c. 250 MB
d. 700 MB

25. is the maximum storage capacity for a DVD.

a. 25 GB
b. 3.7 GB
c. 17 GB
d. 1.5 GB

26. Which of the following types of storage uses two laser beams to create a three-dimensional image?

a. Graphical
b. Holographic
c. Fiber optic
d. Integrated circuit

27. A is a copy of programs, data, and information created in one secondary storage medium and copied to another.

a. soft copy
b. duplication copy
c. backup copy
d. historical copy

28. Which of the following is NOT an example of a solid state storage device?

a. ExpressCard
b. Smart card
c. Cache memory
d. Flash memory card

29. A file provides information about the file such as its date of creation or size.

a. extension
b. property
c. name
d. setting

30. A(n) is a sequence of directories used by the operating system to locate a file on disk.

a. extension
b. path
c. subdirectory
d. folder

31. Given the file designation below, in which folder is the file located? C:\Computer\Programming\Homework\Assg1.docx

a. Programming
b. Homework
c. C:
d. Computer

32. A is a named unit of related data stored in a computer system.

a. directory
b. file
c. subfolder
d. folder

33. A file with extension .accdb is most likely a(n):

a. picture or image file.
b. Microsoft Excel file.
c. Microsoft Access file.
d. ASCII text file.

34. The set of programs designed to manage the resources of a computer is the:

a. utility set.
b. boot strap set.
c. operating system.
d. resource manager

35. The process of loading the OS to memory is which of the following?

a. booting
b. configuration
c. installing
d. authentication

36. The is the central part of the OS that consists of actions the OS uses most frequently, such as starting applications.

a. kernal
b. BIOS
c. core module
d. critical data set

37. Drivers for frequently used input and output devices are:

a. programs that enable the user to install the system utilities faster.
b. no longer needed if the computer has Plug-and-Play capability.
c. interchangeable because input and output devices can now use the same information to enable them to work.
d. often included with most operating systems.

38. Compression enables faster downloads, but then you have to the files after downloading.

a. decrypt
b. zip
c. decompress
d. encrypt

39. Signals that inform the OS that something happened are:

a. program defects
b. drivers
c. operating system diversions
d. interrupts

40. Which of the following is NOT true about open source software?

a. Devices, such as TiVo and Amazon Kindle, use Linux-based OSs.
b. The basic code is free.
c. Its popularity is declining.
d. None of the above

41. System utilities:

a. have to be accessed through applications.
b. are loaded before the operating system is loaded.
c. perform functions such as protecting your computer from viruses.
d. include features such as a word-processing program.

42. Like a traffic officer, the computer's OS works at the intersection of:

a. the user and the computer's hardware.
b. application software, the user, and the computer's hardware.
c. application software and the user.
d. application software and the computer's hardware.

43. Starting a computer that is not already turned on is called a:

a. warm boot.
b. fast load.
c. cold boot.
d. cold load.

44. Which of the following is the correct sequence for what happens when you turn on a computer?

a. Authentication, BIOS, POST, loading the OS, system configuration, and loading the system utilities
b. POST, BIOS, system configuration, loading the OS, loading the system utilities, and authentication
c. BIOS, POST, loading the OS, system configuration, loading the system utilities, and authentication
d. BIOS, POST, system configuration, loading the OS, loading the system utilities, and authentication

45. Which of the following type of graphic is created by a drawing program?

a. Vector
b. Raster
c. Post-Script
d. Bitmapped

46. Which of the following is NOT a characteristic of Web 1.0?

a. Web 1.0 sites are not interactive.
b. Web 1.0 applications are proprietary.
c. Web 1.0 did not contain hyperlinks.
d. Web 1.0 sites are static.

47. Unlike other Web-hosted technology, permits opening and editing files directly within the user's Web browser.

a. Google Docs
b. Google Live
c. Office Multimedia
d. Window Office Live

48. Which of the following represents a major change in a software program?

a. Patch
b. Whole number
c. Service release
d. Decimal number

49. Which of the following is an example of a software suite?

a. Aldus PageMaker
b. Microsoft Access
c. Internet Explorer
d. Corel WordPerfect Office

50. Validation proves that you are using a(n) copy of the software and not a pirated version.

a. up to date
b. trial
c. legal
d. group

51. Which of the following is NOT true about the reasons people like being beta testers?

a. They get paid for their time.
b. They may get the software free or at a discount.
c. They want their voices to be heard.
d. They enjoy being on the cutting edge.

52. Outlook is an example of a(n):

a. e-mail database program.
b. personal information management program.
c. rendering program.
d. high productivity program.

53. Which of the following is the default Microsoft Windows sound file format?

a. MP3
b. WAV
c. SND
d. AU

54. Software that you can use on a "try before you buy" basis is know as:

a. commercial software.
b. groupware.
c. shareware.
d. freeware.

55. Which of the following happens when you launch an application?

a. Program files are copied from the hard disk to the memory.
b. Data files are copied from the memory to the hard disk.
c. The program changes the registry so the computer knows what kind of application you are using.
d. A dialog box displays asking you to verify that you do want the program to appear onscreen.

56. Cyberspace is defined as:

a. the overarching network of networks.
b. the collection of Internet service providers.
c. territory that isn't an actual physical space and that is accessible only with computers.
d. the location where all the Internet servers are housed.

57. AOL is an example of an online service provider and is considered a(n) organization that provides a proprietary network offering services to subscribers.

a. educational
b. for-profit
c. government
d. non-profit

58. refers to software programs designed and written to damage a computer system such as deleting files from a hard drive.

a. Malware
b. Botware
c. Flameware
d. Spyware e.

59. In addition to being a hypertext system, the Web is a(n) system.

a. meta-linked
b. centralized repository
c. distributed hypermedia
d. active/passive link

60. As of April 2010, Mozilla Firefox had percent of the browser market.

a. 54
b. 7
c. 33
d. 4

61. URL is an abbreviation for which of the following terms?

a. Unified Record Locator
b. Unique Resource Label
c. Uniform Resource Locator
d. Unified Record Label

62. Web site's domain name correlates to the:

a. network identifier.
b. path name
c. type of organization it belongs to.
d. Web server IP address.

63. How does a Web search service that offers a subject guide differ from a general-purpose search engine?

a. It uses a wizard with a series of questions to help you refine your search.
b. It searches every Web page currently available across the world and reports results only when an exhaustive search has been completed.Post-Script
c. It employs multiple commercial search engines to find the maximum set of Web pages related to the query.
d. It offers a smaller selection of quality pages related to a set of the more useful Web pages in a given category.

64. , which was originally an Apple browser, is now available for PCs.

a. Safari
b. Internet Explorer
c. Mosaic
d. Mozilla Firefox

65. Which of the following Boolean search operators is most similar in meaning to the inclusion operator?

a. AND
b. NOT
c. LIKE
d. OR

66. Which of the following is NOT an example of a Web search tool?

a. Yahoo!
b. Ask
c. Google
d. Listmaker

67. Another term for a network administrator is a network:

a. operator.
b. engineer.
c. supervisor.
d. manager.

68. Each node on a network has a unique logical address, which is:

a. assigned by the software in use.
b. assigned by the network administrator when the node is installed.
c. built into the hardware.
d. None of the above

69. Which of the following is NOT a disadvantage of networks?

a. Loss of autonomy.
b. Loss of privacy.
c. Security issues.
d. Sharing important information

70. In a(n) topology, the network nodes are connected to a central hub or switch.

a. layered
b. ring
c. hierarchical
d. star

71. Which of the following protocols do NOT use twisted-pair cabling?

a. 10Base-T
b. 10Base-5
c. IBM Token Ring
d. 100Base-T

72. An IP address is composed of:

a. four sets of numbers separated by commas.
b. five sets of numbers separated by commas.
c. four sets of numbers separated by periods.
d. five sets of numbers separated by periods.

73. When a computer is connected to a network, it is called a:

a. peripheral.
b. communications device.
c. router.
d. node.

74. A protocol suite specifies how the network functions, or its:

a. network configuration.
b. network architecture.
c. network suite.
d. network package.

75. Because a network's layers are arranged vertically similar to the floors in a building, with each "floor" having its own protocols, the layers are known as a:

a. top-down protocols.
b. protocol suite.
c. modulation protocols.
d. protocol stack.

76. A local area network (LAN) in which all the computers are equals is called a(n) net work.

a. equal resource
b. peer-to-peer
c. equal sharing
d. client/server

77. The term network topology refers to the:

a. type of Internet connections available to users of the network.
b. physical layout of a local area network.
c. type of network operating system used on the file server.
d. contention-management strategy used to resolve collisions.

78. Which of the following is the path through which messages are sent from one location to another?

a. Bandwidth markers
b. Multiplexers
c. Communications channels
d. Digital endpoints

79. Which of the following terms is used to describe the transformation of analog signals into digital signals?

a. Multiplexing
b. Encapsulation
c. Demodulation
d. Modulation

80. Approximately what percentage of U.S. households has opted to disconnect their conventional landline telephones and rely on cellular service only?

a. 20
b. 15
c. 30
d. 25

81. A is a handheld device that integrates mobile phone capabilities, computing power, and Web access.

a. terminal
b. PDA
c. workstation
d. smartphone

82. To work over wireless networks, Web-enabled devices require:

a. Bluetooth.
b. G4.
c. WAP.
d. DSL

83. Wired technologies are:

a. buried underground.
b. connected through the air.
c. connected by a physical medium.
d. connected end to end.

84. Which of the following devices do NOT use radio waves to transmit its signal?

a. Bluetooth-enabled desktop computera
b. Pager
c. PDAs
d. Flash drive

85. Which of the following statements is NOT true about the public switched telephone network (PSTN)?

a. PSTN is exclusively an analog network.
b. PSTN uses subscriber loop carriers to link home and business telephones.
c. PSTN uses a variety of physical media, including twisted-pair and fiber-optic cable.
d. PSTN is a global telephone system used for both voice and data communications.

86. DSL is than dial-up but is often than other broadband access options.

a. more expensive; less reliable
b. more expensive; less expensive
c. more reliable; more expensive
d. less reliable; more expensive

87. Which of the following is NOT true about piggybacking?

a. Some people can inadvertently connect to another's wireless network instead of their own.
b. At present, it is not considered a crime in most jurisdictions in the United States.
c. It can refer to using free Internet connection designated for customers of an establishment when you are not a customer.
d. It can refer to using another person's network without permission.

88. The basic advantage of Internet telephony is that:

a. webcams can be used.
b. you don't pay-long distance charges.
c. there is only one provider of this service.
d. it is a new and experimental technology.

89. Complaints of Web crimes rose with an increase of percent between 2008 and 2009.

a. 22.3
b. 31.4
c. 19.6
d. 22.9

90. When a virus self-modifies itself, the new copy is known as a:

a. beta
b. macro virus
c. m-virus
d. variant.

91. phishing is a type of phishing intended to target specific people and trick them into providing personal information, which would enable identity theft.

a. Selected
b. Aimed
c. Spear
d. Targeted

92. key encryption requires that the receiver obtain the key to decrypt the message.

a. Digital signature
b. Asymmetric
c. Digital certificate
d. Symmetric

93. Which of the following is NOT an example of a credit reporting agency?

a. Equifax
b. InfoUSA
c. Experian
d. TransUnion

94. Which of the following is NOT a technology that threatens online anonymity?

a. Phreaking
b. Cookies
c. Ubiquitous computing
d. Radio frequency identification

95. An individual's ability to restrict or elimanate the collection, use, and sale of confidential personal information is known as:

a. cyber trust.
b. basic rights.
c. privacy.
d. confidentiality.

96. The ability to convey a message without disclosing your name or identity is known as:

a. privacy.
b. anonymity.
c. confidentiality.
d. cyber blocking.

97. Which of the following organizations have reported that many color laser printers embed printer tracking dots on nearly every page at the urging of the US government?

a. Patriot Organization
b. National Printer Alliance
c. Electronic Frontier Foundation
d. National Counterfeit Tracking Organization

98. Which of the following is the best definition of a cookie?

a. It is a plain-text file written to your hard disk by a Web site you visit.
b. It is a virus appended to an online shopping transaction.
c. It is a file containing consumer information sold by an online store to a marketing company.
d. It is an unsolicited advertisement that pops up on your computer.

99. An emerging trend where individuals interact with multiple networked devices that are often embedded in everyday objects is called:

a. ubiquitous computing.
b. internetworked computing.
c. wide area networked computing.
d. None of the above.

100. can be compromised when smaller computer tools are lost or stolen.

a. Data accuracy
b. Security
c. Privacy
d. Timely communication.

Reference no: EM131062233

Questions Cloud

Liver case study liver and alcohol : Steve Q. is a 52-yr-old Caucasian male with a family history of alcoholism.  He is 6 feet 1 inch tall and weighs 238 pounds, with much of his excess weight around his middle.  He considers himself a social drinker although he has had two arrests f..
At what value of the strain should the operators take action : At what value of the strain should the operators take action to reduce the pressure in the tank? (Data for the steel are as follows: modulus of elasticity E = 205 GPa and Poisson's ratio 0.30.)
What long-term objectives are discussed in the 3m article : The 3M article identifies McNerney's micromanaging of the various departments as a risk to the firm. Which of the company's grand strategies would this threaten? How so?
How can netflix generate the cash it needs to pay the studio : If other studio executives think this, Netflix will not acquire the video content it needs to satisfy its customers. Planning involves determining organizational goals and a means for achieving them. So, how can Netflix generate the cash it needs ..
Which represents a major change in a software program : Which of the following represents a major change in a software program? Unlike other Web-hosted technology, permits opening and editing files directly within the user's Web browser.
How brand love and loyalties are linked : 304MKT - Contemporary Marketing Issues How corporate social responsibility is linked to brand love and how brand love and loyalties are linked
The total market value of bhp assets : The total market value of BHP's assets is $60,000,000. These assets are financed by $30,000,000 worth of issued bonds and $30,000,000 worth of issued ordinary shares. The bonds have an 8% annual coupon and are currently selling at their face value..
What are the perspectives of older adults of barriers : What are the perspectives of older adults of the discharge process and discharge planning following hospitalization in an acute care hospital?
Population of forest dwellers : Suppose that a population of forest dwellers is predominantly green, but about 25% of each new generation of children are a lighter color - yellow or pale green. The lighter colored beings have to be careful, as they are more easily seen and eaten..

Reviews

Write a Review

Computer Engineering Questions & Answers

  Ethics and professional code of conduct due week 3 and

ethics and professional code of conduct due week 3 and worth 120 points before writing your position statement on

  Web search engine

Utilizing a Web search engine, determine an article from the reputable source published in the past six months which reports on relative risk that comes.

  Code for addition of new product and delete existing code

Implement the AJAX Programming based solutions in order to write a code to: 1) Add a new product to database. 2) Delete an existing product from database

  Describe how you would use defect data to drive process

explain how you would use defect data to drive process improvement. specifically explain what data you would collect

  Questionfirewalls are able to be implemented in different

questionfirewalls are able to be implemented in different ways. consider a devoted firewall device. what is its key

  Make a program display a sports related image of your choice

design a document that contains four short paragraphs of text, stacked on top of each other, with only enough of each showing so that the mouse cursor can always be placed over some part of them.

  Compute the total capacity of the ram chips in bits

Summarise the address space by drawing a memory map of the computer system. Indicate the starting and ending addresses in hexadecimal for each ROM and RAM chips and any unused space. Show how the memory addresses are obtained - Compute the total c..

  Using the sentinel controlled while loop develop an

using the sentinel controlled while loop develop an algorithm using pseudocode for computing cosx and sin x for the

  Compare the resulting postfix expression

For every postfix expression there exists a corresponding and uniquely express infix expression that evaluates to the same number. The converse is not true.

  Make a visual rendering depicting your design via the use

as the lead software engineer for a medium-sized hospital you have been asked to spearhead an effort to improve the

  How proposed business is a lawnmower business

Main function, this will provide the menu interface to get to all the rest of them, it will basically be the switch statement that calls the other functions and returns their values.

  Questionfollowing narrative summarizes an interview with an

questionfollowing narrative summarizes an interview with an accounts clerk working for eyetunes club. members of club

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd