You are on page 1of 24

Chapter 1

Incorrect answers are marked with an below.

(1) Computer ___ refers to acquiring computer related skills.

a) competency

b) aware

c) connectivity

d) networked

e) active

(2) The ___ consist(s) of the equipment: keyboard, mouse, monitor, system unit, and other devices.

a) people

b) procedures

c) hardware

d) system unit

e) information

(3) The ___ is one of the system software programs

a) word processor

b) database management system

c) operating system

d) application software

e) information system

(4) Browsers, word processors, and spreadsheets are ___ applications.

a) special-purpose

b) general-purpose

c) advanced

d) artificial intelligence

e) multimedia

(5) A ___computer is another name for a notebook computer.

a) PDA

b) laptop

c) midrange

d) DVD

e) handheld

(6) ___ is sometimes referred to as temporary storage.

a) PDA

b) CD

c) RAM
d) DVD

e) Secondary storage

(7) The type of disk that uses laser technology:

a) concentric

b) layered

c) hard

d) floppy

e) optical

(8) A ___ file might contain audience handouts, speaker notes, and electronic slides.

a) document

b) database

c) worksheet

d) presentation

e) floppy disk

(9) The term ___ refers to the widespread use of mobile communication devices.

a) IT

b) wireless revolution

c) PDA

d) RAM

e) WWW

(10) The largest network in the world is called the ___

a) Internet

b) WWW

c) World Wide Web

d) Web

e) all of the above


(1) The Internet was launched in 1969 when the United States funded a project to develop a national computer
network called ___.

a) ARPANET

b) CERN

c) the Web

d) WWW

e) IRC

(2) ___ use telephone lines and service an area limited to several states.

a) Wireless service providers

b) National service providers

c) Local service providers

d) Regional service providers

e) Commercial ISPs
(3) ___ connect(s) to remote computers, open(s) and transfer(s) files, display(s) text and images, and provide(s) in one
tool an uncomplicated interface to the Internet and Web.

a) Bots

b) Browsers

c) Java

d) Web utilities

e) Wizards

(4) The computer that stores and shares Web page resources is called a ___.

a) Web Portal

b) Web Server

c) Telnet

d) ISP

e) Applet

(5) ___ are often attached to unsolicited e-mail.

a) Spam e-mails

b) Addresses

c) Web pages

d) Computer viruses

e) Applets

(6) ___ programs identify and elliminate unwanted and unsolicited email.

a) Media

b) Anti-spam

c) Search

d) DSL

e) Meta

(7) To participate in a chat group, select a ___ and communicate live with others.

a) signal

b) index

c) engine

d) list

e) channel

(8) In a directory or ___ search, you select a category that fits the information you want.

a) packet

b) keyword

c) index

d) specialized

e) subject

(9) In ___ commerce, individuals typically sell to other individuals without ever meeting face-to-face.
a) C2C

b) B2C

c) B2B

d) C2I

e) I2I

(10) ___ are programs that are automatically loaded and operate as part of a browser.

a) Plug-ins

b) Add-ons

c) Providers

d) Agents

e) Applets

Chapter 3
(1) General-purpose applications are also known as ___.

a) software suites

b) advanced applications

c) basic applications

d) special-purpose applications

e) integrated applications

(2) Graphics, multimedia, Web authoring, and virtual reality programs are examples of ___.

a) special-purpose applications

b) general-purpose applications

c) basic applications

d) occupational applications

e) system software

(3) ___ are prewritten formulas that perform calculations automatically.

a) Functions

b) Macros

c) Templates

d) Calculators

e) none of the above

(4) In a relational database, data is organized into ___.

a) fields

b) columns

c) records

d) tables

e) rows

(5) ___ is a DBMS tool that arranges records according to a selected field.
a) Align

b) Arrange

c) Report

d) Form

e) Sort

(6) Most presentation graphics programs have design ___ that provide color schemes, slide layout, and special effects.

a) layout files

b) templates

c) samples

d) records

e) formatting

(7) With object linking, the object is contained in the ___.

a) destination file

b) origin file

c) layout file

d) support file

e) source file

(8) To have an object automatically updated in a destination file when a change is made to the source file, the object
must be ___.

a) embedded

b) linked

c) replaced

d) resolved

e) amended

(9) A(n) ___ is a single program that provides the functionality of a word processor, spreadsheet, database manager,
and more.

a) general-purpose application

b) software suite

c) integrated package

d) program manager

e) OLE

(10) A ___ suite is also known as a productivity suite.

a) personal

b) utility

c) specialized

d) home

e) business
(1) A(n) ___ is typically organized as a series of related pages with links to related information.

a) graphical map

b) story board
c) multimedia presentation

d) image editor

e) virtual environment

(2) ___ allows you to reorganize, add effects, and more to your digital video footage.

a) Video editing software

b) Audio editing software

c) Paint program

d) Browsers

e) Animation

(3) ___ focus on page design and layout and provide greater flexibility than word processors.

a) Desktop publishers

b) Graphics editors

c) Web page editors

d) Multimedia authoring programs

e) PERT

(4) ___ can be simple moving text or complicated interactive features.

a) VR

b) Graphics editors

c) Graphics suites

d) Animation

e) Vector images

(5) Expert systems use ___ that contain specific facts, rules to relate these facts, and user input to formulate
decisions.

a) robots

b) fuzzy logic

c) story boards

d) knowledge bases

e) interactivity

(6) Many expert systems use ___, to allow human-like responses.

a) packets

b) fuzzy logic

c) robots

d) story boards

e) vector images

(7) Police and military use ___ to locate and disarm explosive devices.

a) mobile robots

b) OSI

c) industrial robots
d) perception systems

e) fuzzy logic

(8) ___ connect related pages in a multimedia presentation.

a) Robots

b) Links

c) Slides

d) Pixels

e) Vectors

(9) Intuition, memory, and reasoning are used to solve ___.

a) structured problems

b) unstructured problems

c) knowledge bases

d) organization problems

e) complex circuits

(10) Draw programs are used to modify vector images, while image editors are used to modify ___.

a) bitmap images

b) buttons

c) links

d) HTML code

e) VRML

Chapter 5
(1) Service programs are another name for ___.

a) operating systems

b) utilities

c) device drivers

d) language translators

e) interfaces

(2) The process of starting or restarting a computer is called ___.

a) booting

b) docking

c) embedding

d) fragmenting

e) tracking

(3) Language translators convert human language into ___.

a) machine language

b) UNIX

c) service programs
d) operating systems

e) EBCDIC

(4) Desktop operating systems are also called ___ operating systems.

a) network

b) embedded

c) server

d) Mac

e) stand-alone

(5) ___ provides online assistance for operating system functions.

a) Menu

b) The platform

c) Explorer

d) Utility

e) Help

(6) The ___ operating system was originally designed to run on minicomputers in network environments.

a) Windows

b) Mac OS

c) UNIX

d) Sherlock

e) Norton

(7) To remove unneeded programs and related files from a hard disk you would use a(n) ___ program.

a) backup

b) trouble-shooting

c) file compression

d) antivirus

e) uninstall

(8) Files that are broken into small parts and stored wherever space is available are said to be ___.

a) compressed

b) fragmented

c) lost

d) uninstalled

e) sectored

(9) ___ is a Windows program that locates and eliminates unnecessary fragments and rearranges files and unused disk
space to optimize operations.

a) Disk CleanUp

b) Active Desktop

c) Sherlock
d) Disk Defragmenter

e) Resource Locator

(10) Norton SystemWorks is a ___.

a) Web service

b) troubleshooting program

c) utility

d) utility suite

e) none of the above

Chapter 6
(1) The system unit is also called the ___.

a) PDA

b) system board

c) MICR

d) chassis or system cabinet

e) mother board

(2) ___ are the most widely used handheld computer.

a) RAMs

b) Notebooks

c) PDAs

d) CPUs

e) Tower units

(3) ASCII, EBCDIC, and Unicode are examples of ___.

a) analog system

b) integrated circuits

c) binary coding schemes

d) adapter cards

e) slots

(4) ___ connect special cards or circuit boards to the system board.

a) Slots

b) Carrier packages

c) Unicodes

d) PC cards

e) Ports

(5) Random-access memory (RAM) is a kind of ___ storage.

a) permanent

b) temporary

c) flash
d) smart

e) expansion

(6) ___ is a temporary high-speed holding area between memory and the CPU.

a) Flash

b) ALU

c) ASCII

d) Cache

e) CMOS

(7) ROM is also known as ___.

a) semiconductor

b) slot

c) adapter

d) network

e) firmware

(8) ___is a set of hardware and software standards that allows expansion boards and other devices to install
themselves.

a) Plug and Play

b) Unicode

c) System Unit

d) Industry Standard Architecture

e) EBCDIC

(9) A(n) ___, also called a bus, connects the parts of the CPU together.

a) adapter card

b) parallel port

c) serial port

d) ISA

e) bus line

(10) A(n) ___ chip provides flexibility and expandability for a computer system; it contains essential information that
is required every time the computer system is turned on.

a) ROM

b) RAM

c) TCP/IP

d) CMOS

e) ALU

Chapter 8
(1) ___ is permanent storage used to preserve data and programs.

a) Internal storage

b) Volatile storage
c) Nonvolatile storage

d) File compression

e) Read only memory

(2) ___ is the process of accessing files from a disk.

a) Reading

b) Writing

c) Printing

d) Spanning

e) Caching

(3) ___ measures the amount of time required by a storage device to retrieve data and programs.

a) Capacity

b) Media

c) Reading

d) Access time

e) Primary storage

(4) Another name for floppy disks is ___.

a) diskettes

b) disks

c) flexible disks

d) floppies

e) all of the above

(5) ___ refers to how tightly bits can be packed.

a) Density

b) Pit

c) Multithread

d) Sector

e) Zip

(6) Files cannot be written onto a floppy disk when the write-protection notch is ___.

a) zipped

b) open

c) closed

d) sealed

e) crossed

(7) The internal hard disk is typically referred to as the ___ drive.

a) A

b) B

c) C
d) alternate

e) main

(8) An internal hard disk is also known as a ___ because it is located inside the system unit.

a) hard-disk pack

b) PC Card hard disk

c) fixed disk

d) removable disk

e) hard disk cartridge

(9) ___ can provide over two hours of high-quality video and sound comparable to that found in theaters.

a) CD-RW

b) CD

c) Photo CD

d) DVD-R

e) DVD-ROM

(10) ___ is exclusively a sequential-access storage media.

a) A floppy disk

b) A hard disk

c) Magnetic tape

d) CD-ROM

e) WORM

Chapter 9
(1) Modulation and demodulation are the processes of a(n) ___.

a) connection device

b) node

c) modulator

d) modem

e) OSI

(2) Standard telephone lines and conventional modems provide what is called ___.

a) network architecture

b) broadband

c) dial-up service

d) data transmission

e) channels

(3) ___ use wireless receivers as a hub.

a) LANs

b) Microwaves

c) WLANs
d) MANs

e) Satellites

(4) Gnutella uses a ___ network strategy.

a) terminal

b) peer-to-peer

c) client-server

d) wireless

e) NIC

(5) ___ is a measurement of the capacity of the communication channel.

a) Protocol

b) Packet

c) Network architecture

d) IP address

e) Bandwidth

(6) Every computer on the Internet has a unique numeric address called a(n) ___.

a) packet

b) protocol

c) IP address

d) bandwidth

e) network bridge

(7) ___ use satellites to determine geographic locations.

a) TCP/IP

b) OSI

c) GPS

d) DSL

e) NOS

(8) ___ describes how the network is arranged and how the resources are coordinated and shared.

a) Topology

b) Communication channel

c) Sharing system

d) Network architecture

e) Domain name system

(9) ___ controls and coordinates the activities of all computers and devices on a network.

a) TCP/IP

b) NOS

c) DNS

d) OSI

e) DSL
(10) In a ___ network, each device in the network handles its own communications control.

a) host

b) client

c) bus

d) sharing

e) polling

Chapter 10
(1) The ethical issue that relates to the responsibility of those who collect data to ensure that the data is correct is
___.

a) privacy

b) accuracy

c) property

d) access

e) ethics

(2) The ethical issue that concerns the collection and use of data about individuals is ___.

a) privacy

b) accuracy

c) property

d) access

e) ethics

(3) ___ is a term used to describe a wide range of programs that secretly record and report an individual’s activities
on the Internet.

a) Worm

b) Utility

c) Virus

d) Spyware

e) Suite

(4) The largest category of computer criminals is ___.

a) crackers

b) hackers

c) agents

d) organized criminals

e) employees

(5) ___ is/are concerned with protecting information, hardware, and software.

a) Users

b) FBI agents

c) Security
d) The Department of Defense

e) Protection programs

(6) ___ is concerned with protecting hardware from possible human and natural disasters.

a) Physical security

b) Data security

c) The FBI

d) Encryption

e) Energy Star

(7) ___ is concerned with fitting the job to the worker rather than forcing the worker to contort to fit a job.

a) Human Resources

b) Ergonomics

c) Energy Star

d) RSI

e) An HMO

(8) ___ is also called repetitive motion injury and cumulative trauma disorder.

a) RSI

b) ARD

c) TVT

d) EMI

e) BRM

(9) ___ describes the stress that is associated with computers.

a) RSI

b) EMI

c) Technostress

d) Computer Use Distress

e) Cumulative TechStress

(10) Environmentally friendly system units, display, and manufacturing are the basic elements of the ___.

a) Energy Star

b) Green PC

c) Standard System

d) Millennium Plan

e) EarthTech Program

Chapter 11
(1) A(n) ___ is a collection of people, procedures, software, hardware, and data.

a) corporation

b) information system

c) knowledge work system


d) office automation system

e) data processing system

(2) A typical general ledger can produce income statements and ___.

a) balance sheets

b) accounts receivable

c) purchasing forms

d) payroll records

e) DSS

(3) People involved in distribution and communication of information are called ___.

a) knowledge workers

b) users

c) data workers

d) managers

e) secretaries

(4) Because it helps an organization keep track of routine operations and records these events in a database, some
firms call a TPS a(n) ___.

a) decision support system

b) executive support system

c) executive information system

d) data processing system

e) management information system

(5) Purchasing, accounts receivable, and inventory are examples of ___ activities.

a) executive

b) managerial

c) clerical

d) accounting

e) human resources

(6) The ___ department focuses on hiring, training, and promoting.

a) marketing

b) production

c) research

d) accounting

e) human resources

(7) ___ help lower-level managers accomplish the organization’s day-to-day activities, such as evaluating and
maintaining quality control.

a) Tactical models

b) Operational models

c) Strategic models
d) Exception reports

e) Periodic reports

(8) ___ are designed primarily to support data workers.

a) Office automation systems

b) Knowledge work systems

c) CAD/CAM systems

d) Decision support systems

e) Management information systems

(9) Information workers are also known as ___.

a) supervisors

b) managers

c) data workers

d) knowledge workers

e) executives

(10) The level of manager whose information flow is primarily vertical is ___.

a) vice president

b) executive

c) top level manager

d) supervisor

e) data worker

Chapter 12
(1) A ___ is a collection of related fields.

a) field

b) class

c) file

d) record

e) character

(2) In ___ processing data is collected over time and then processed later all at one time.

a) real-time

b) relational

c) batch

d) database

e) direct

(3) ___ provide(s) tools for maintaining and analyzing data.

a) Child nodes

b) Data redundancy

c) Data manipulation subsystem


d) DBMS

e) Security

(4) The person responsible for determining processing rights and which people have access to data is called a ___.

a) database manager

b) database administrator

c) database operator

d) pointer

e) hasher

(5) The arrangement used in a network database is an example of a ___.

a) one-to-one relationship

b) one-to-many relationship

c) many-to-many relationship

d) many-to-one relationship

e) none of the above

(6) A common data item is also known as a ___.

a) field

b) transaction file

c) pointer

d) node

e) key field

(7) ___ are persons, places, things, or events that are to be described in an object-oriented database.

a) Methods

b) Fields

c) Classes

d) Entities

e) Attributes

(8) A collection of integrated records useful mainly to one person is a(n) ___.

a) common user database

b) individual database

c) company database

d) common operational database

e) distributed database

(9) An enormous database an organization develops to cover certain objects is called a ___.

a) proprietary database

b) company database

c) common operational database

d) distributed database

e) data warehouse
(10) ___ are special hardware and software designed to control access to internal networks.

a) Firewalls

b) Data models

c) DBMS

d) Relations

e) Pointers

Chapter 13
(1) Preliminary investigation, systems analysis, systems design, systems development, systems implementation, and
systems maintenance are elements of the ___.

a) systems checklist

b) systems life cycle

c) technical feasibility chart

d) parallel approach

e) pilot approach

(2) A ___ studies an organization’s systems to determine what actions to take and how to use technology to assist
them.

a) RAD

b) data worker

c) CASE

d) systems analyst

e) data flow diagram

(3) A(n) ___ is usually requested by an end user or manager who wants something done.

a) prototype

b) systems audit

c) top-down analysis

d) organization chart

e) preliminary investigation

(4) Defining the problem, suggesting alternative systems, and preparing a report are part of the ___ phase.

a) preliminary investigation

b) analysis

c) design

d) development

e) implementation

(5) Checklists, grid charts, decision tables, and system flowcharts are part of the ___ phase.

a) preliminary investigation

b) analysis

c) design
d) development

e) implementation

(6) Automated design tools are also called ___.

a) data flow diagrams

b) decision tables

c) grid charts

d) CASE tools

e) system flowcharts

(7) The ___ describes the current information system, the requirements for a new system, and a possible
development schedule.

a) systems analysis report

b) systems design report

c) system flowchart

d) systems implementation report

e) operational feasibility report

(8) A(n) ___ shows the formal lines of authority.

a) systems audit

b) organization chart

c) grid chart

d) decision table

e) RAD

(9) ___ determines whether or not reliable hardware, software, and training are available to make a new system
work.

a) Economic feasibility

b) Operational feasibility

c) Technical feasibility

d) Systems audit

e) Top-down analysis

(10) In the ___, conversion to a new system is done simply by abandoning the old and starting up the new.

a) parallel approach

b) direct approach

c) pilot approach

d) phased approach

e) pilot and direct approaches

Chapter 14
(1) Only the ___ step of software development involves keying statements into a computer.

a) program specification

b) program design
c) program code

d) program test

e) program documentation

(2) In the ___ step a solution is created using programming techniques such as top-down program design, pseudocode,
flowcharts, and logic structures.

a) program specification

b) program design

c) program code

d) program test

e) program documentation

(3) Program specification is also called ___.

a) program definition

b) program charting

c) program coding

d) program design

e) program modeling

(4) Under the rules of top-down design each module should have ___ function(s).

a) multiple

b) two

c) one

d) three

e) ten

(5) The two variations of loop structure are ___ and ___.

a) DO NOW, DO LATER

b) DO WHILE, DO PARALLEL

c) DO WHILE, DO UNTIL

d) DO NOW, DO DURING

e) DO LATER, DO UNTIL

(6) The best way to code effective programs is to write ___.

a) top-down programs

b) structured programs

c) coded programs

d) loop structured programs

e) selection structured programs

(7) The omission of a semicolon at the end of a statement in C++ is an example of a ___ error.

a) loop

b) direct

c) calculation
d) design

e) syntax

(8) ___ is carried on throughout all the programming steps.

a) Coding

b) Design

c) Beta testing

d) Documentation

e) Desk checking

(9) Languages that can run on more than one kind of computer are called ___.

a) machine languages

b) portable languages

c) assembly languages

d) problem-oriented languages

e) query languages

(10) A(n) ___ contains a number of modules that have been preprogrammed to accomplish various tasks.

a) application generator

b) natural language program

c) translator

d) interpreter

e) compiler

Chapter 15
(1) The real issue with technology is ___.

a) finding qualified individuals

b) making it better

c) integrating it with people

d) teaching it to students

e) summarizing it for the general society

(2) The principal changes technology brings to business are ___, new enterprises, and new customer and supplier
relationships.

a) new computers

b) new problems

c) new agencies

d) new laws

e) new products

(3) The ___ user believes that learning and using computers take time away from their real jobs.

a) cynical

b) proactive

c) frustrated
d) confused

e) naive

(4) The ___ user believes all problems can be solved by computers.

a) proactive

b) optimistic

c) frustrated

d) naive

e) cynical

(5) The ___ user does not easily become frustrated and give up using technology.

a) proactive

b) cynical

c) naive

d) inexperienced

e) advanced

(6) The best advice in regard to specializing is ___.

a) don’t do it

b) it is a necessity in today’s business world

c) learn one program and learn it well

d) learn a little about every program

e) do so to some extent

(7) ___ instruct users on the latest software or hardware.

a) Computer support specialists

b) Computer technicians

c) Computer trainers

d) Database administrators

e) Data entry workers

(8) ___ oversee work of programmers, computer specialists, systems analysts and other computer professionals.

a) Data entry workers

b) Desktop publishers

c) Information systems managers

d) Network administrators

e) Programmers

(9) ___ prepare instruction manuals, technical reports, and other scientific or technical documents.

a) Programmers

b) Software engineers

c) Systems analysts

d) Technical writers

e) Webmasters
(10) ___ input customer information, lists, and other types of data.

a) Data entry workers

b) Desktop publisher

c) Information systems managers

d) Network administrators

e) Programmers create

You might also like