Free Essay

Wertewrterterw

In: Business and Management

Submitted By garlin104300
Words 769
Pages 4
Chapter : Basic Computer Concepts
Multiple Choice:

Specialized computers that manage network resources and allow computers access to the network are called: A. supercomputers. B. mainframe computers. C. servers. D. embedded computers. Answer: C Reference: Objective 2: Identify the Different Types of Computers Difficulty: Moderate
The computer and any equipment that connects to it are called the: E. hardware. F. software. G. motherboard. H. control unit Answer: A Reference: Objective 3: Describe Hardware Devices and Their Uses Difficulty: Easy
The nonvolatile, permanent memory that remains in the computer even when it is turned off is called: I. CPU. J. ALU. K. RAM. L. ROM. Answer: D Reference: Objective 3: Describe Hardware Devices and Their Uses Difficulty: Easy

Input, process, output, and storage are the four basic computer functions known as the: M. central processing system. N. information processing cycle. O. memory processing. P. logical data processing. Answer: B Reference: Objective 1: Define Computer and Identify the Four Basic Computing Functions Difficulty: Moderate
A(n) ____________ computer is one that is capable of running more than one operating system. Q. open-source R. wide area network S. local area network T. dual-boot Answer: D Reference: Objective 4: Identify Types of Software and Their Uses Difficulty: Challenging
Connecting one computer to another creates a(n): U. network. V. control unit. W. sector. X. track. Answer: A Reference: Objective 5: Describe Networks and Define Network Terms Difficulty: Easy
The utility called __________, located in the System Tools folder, allows you to choose when and how often maintenance tasks are performed. Y. Disk Cleanup Z. Disk Defragmenter [. Scheduled Tasks \. System Restore Answer: C Reference: Objective 6: Identify Safe Computing Practices Difficulty: Challenging

____________ software is designed to seize your personal information stored on your computer and send it elsewhere. ]. Adware ^. Spyware _. Firewall `. Antivirus Answer: B Reference: Objective 6: Identify Safe Computing Practices Difficulty: Moderate
True and False:

The Apple Macintosh computer, known as Mac, is very popular in the graphic design industry. Answer: True Reference: Objective 2: Identify the Different Types of Computers
Difficulty: Moderate
The ROM chip CAN be modified, removed, or rewritten by the computer user. Answer: False Reference: Objective 3: Describe Hardware Devices and Their Uses
Difficulty: Moderate
Because of its read/write capabilities, magnetic media allows you to delete existing data and save new data. Answer: True Reference: Objective 3: Describe Hardware Devices and Their Uses
Difficulty: Challenging
Starting the computer is known as the boot process. Answer: True Reference: Objective 4: Identify Types of Software and Their Uses
Difficulty: Easy
Worms have the ability to burrow into your e-mail address book and send themselves without any assistance. Answer: True Reference: Objective 6: Identify Safe Computing Practices
Difficulty: Moderate
Fill in the Blank:

A(n) ____________ is a programmable electronic device that can input, process, output, and store data. Answer: computer Reference: Objective 1: Define Computer and Identify the Four Basic Computing Functions Difficulty: Easy

A(n) ____________ is a small stick-like device used to input information into a tablet computer. Answer: stylus Reference: Objective 2: Identify the Different Types of Computers
Difficulty: Moderate
The computer monitor’s sharpness or clarity is referred to as its ____________. Answer: resolution Reference: Objective 3: Describe Hardware Devices and Their Uses
Difficulty: Challenging
The ____________ manages the hardware components including the CPU, memory, storage, and peripheral devices. Answer: operating system Reference: Objective 4: Identify Types of Software and Their Uses
Difficulty: Moderate
The ____________ scans the hard drive and allocates file space more efficiently so the computer will run faster. Answer: Disk Defragmenter Reference: Objective 6: Identify Safe Computing Practices
Difficulty: Challenging
Matching:

Match the following five terms to their meanings. I. serial port A. transmits data wirelessly II. parallel port B. resembles a telephone jack and is used for network access III. IrDA port C. sends data in groups of bits IV. Ethernet port D. connects electronic musical devices V. MIDI port E. send data one bit at a time Answer: E, C, A, B, D Reference: Objective 3: Describe Hardware Devices and Their Uses
Difficulty: Moderate

Match the following five terms to their meanings. I. local area network A. connects each node to a switch II. wide area network B. found in peer-to-peer networks containing no servers III. bus topology C. connects each node to the next, forming a loop IV. ring topology D. refers to a network contained within a small geographic area V. star topology E. refers to a network contained over a large geographic region
Answer: D, E, B, C, A Reference: Objective 5: Describe Networks and Define Network Terms
Difficulty: Moderate

Similar Documents