Which term refers to a collection of inter-linked documents, graphics, and sounds that can be accessed over the Internet?
2G Network
Digital Television
Freeform Database
Visual Database
World Wide Web/Web
Question 2. Question :
The Internet was first developed for whom?
America Online (AOL)
cambridge University
Microsoft
The United States Military
Vice President Al Gore
Question 3. Question :
Which of the following is a generic term used to refer to symbols that represent facts, objects, and ideas, which a computer can manipulate?
Student Answer: CORRECT Data
Entities
Queries
Reports
Wisdom
Question 4. Question :
Which term refers a named collection of data copied unto a storage medium, such as a hard disk, CD, or flash drive?
BIOS
Cluster
File
Port
Sector
Question 5. Question :
A megabyte is the same as which of the following?
1,048,576 bits
2 to the power of 10 (= 1,024) Kilobytes
Exactly one million bytes
One half of a Gigabyte
Two Terabytes
Question 6. Question :
How many bytes are required to store a single letter in extended ASCII?
: 1
2
8
256
1,024
Question 7. Question :
Which of the following is the Extended ASCII code for an uppercase “A” in binary (base 2)?
0000 0000
0000 000A
0100 0001
A000 0000
1111 1111
Question 8. Question :
Which of type of language is typically used by programmers to create programs that control digital devices?
Command Language
Programming Language
Query Language
System Language
Teutonic Language
Question 9. Question :
Which type of computer program that translates source code of an entire program as a batch into object code which it places into a separate file?
Complier
Database
Interpreter
Operating System
Spreadsheet
Question 10. Question :
Which term refers to any method to confirm a person’s identity based upon something they know, possess, or are?
Authentication Protocol
Authorization Protocol
Electoral College
User ID
Validation Procedure
Question 11. Question :
Under which act are Sarah Palin’s e-mails and the FBI’s file on Roswell made available?
Affordable Health Care Initiative
Freedom of Information Act
No Child Left Behind
Patriot Act
Sarbanes-Oxley Act
Question 12. Question :
The first major role computers played in marketing was to do which of the following?
Creating graphics and typesetting print adds
Customizing mass market form letters
E-commerce web sites
Statistical analysis of surveys and sales data
Video and audio editing of broadcast adds
quiz 2
<pstyle=”color: rgb(0,=”” 0,=”” 0);=”” font-size:=”” 12px;”=””>Which term refers to the case which holds a computer’s main circuit boards, microprocessor, memory, power supply, and storage devices?Bus
Cache
Peripheral Device
Primary Storage
System Unit
Question 2. Question :
Which term refers to the high speed circuitry which connects the processor to the system and transports data to and from the processor?
Arithmetic Logic Unit (ALU)
Cache
Front Side Bus (FSB)
Instruction Pointer (IP)
Registers
Question 3. Question :
A processor with which of the following word sizes would be able to manipulate the largest number of bits at one time?
: 1 bit
8 bit
16 bit
32 bit
64 bit
Question 4. Question :
Which type of storage uses light reflecting areas called lands and non-reflective areas called pits to record data?
Analog Storage
Magnetic Storage
Mechanical Storage
Optical Storage
Solid State Storage
:
Question 5. Question :
Which term refers to the average time it takes a computer to locate data in a storage device, such as a hard disk, and read it?
Access Time
Latency
Seek Time
Transfer Time
Wait State Time
Question 6. Question :
Which event occurs when the read/write head of a hard disk drive mechanically hits the platter and damages some of the data on the disk?
Head Crash
Magnetic Leakage
Magnetic Decay
Platter Skip
Stack Overflow
Question 7. Question :
Which term refers to the number of colors a device can display, typically denoted as the number of bits to represent the color of each pixel?
Color Depth
Dot Pitch
Screen Resolution
Screen Size
Viewing Angle
:
Question 8. Question :
Which general term refers to a small circuit board which plugs into an expansion slot, and gives the computer the ability to control a storage, input, or output device?
Bus
Coprocessor
Ethernet Card
Expansion Card
Modem
Question 9. Question :
Which technology used in display devices/monitors produces an image by filtering light through a matrix of liquid crystal cells?
Cathode Ray Tube (CRT)
Light Emitting Diode (LED)
Liquid Crystal Display (LCD)
Plasma Screen
Question 10. Question :
Which term refers to a small, reinforced, oval shaped hole in a computer case into which you can insert a lock attached to a cable, which can in turn be fastened to a desk to prevent theft?
Anchor Port
Bolt Bracket
Kensington Security Slot
Surge Protector
USB Slot
Question 11. Question :
According to the Environmental Protection Agency (EPA), how much E-waste is discarded each year?
30 Tons
300 Tons
3,000 Tons
3 Million Tons
3 Billion Tons
Question 12. Question :
Which military communications project evolved into the modern Internet?
Area 51
ARPANET
Manhattan Project
Operation Overlord
Project PX
quiz 3
Which type of software alters a devices user interface to aid individuals with physical challenges, by creating as accessible environment by providing closed captions, text-to-speech, speech-to-text, or large screen text?
Adaptive Utilities
Compilers
Desktop Publishing
Groupware
Spreadsheet
Question 2. Question : Which are the two main classes of software?
Compilers and Utilities
Productivity and Games
System and Application
System and Network
Utilities and Application
Question 3. Question : Which type of application software are Microsoft Excel, Lotus 123, and OpenOffice Calc?
Database
Presentation Software
Spreadsheet
Word Processor
Web Browser
Question 4. Question : In database terminology, which term refers to all of the data for a specific, single entity – a person, place, thing or event?
Database
Field
Form
Query
Record
Question 5. Question : Which term refers to placing a program into a computer so it can be run on?
Downloading
Installation
Jail Breaking
Rooting
Uploading
Question 6. Question : Which type of file is designed to be started by the user or automatically launched by an operating system?
Assembler File
Configuration File
Data File
Executable File (Exe)
Object File
Question 7. Question : Which is the official term for software which has been illegally copied, distributed, or modified?
Cracked Software
Freeware
Highjacked Software
Gasparillaware
Pirated Software
Question 8. Question : Which type of software license allows the software to be used on all computers at a specified location?
Multiple-User License
Shrink Wrap License
Single User License
Site License
Unlimited Local License
Question 9. Question : Which software tool is used to conceal malware and backdoors that have been installed on a computer?
Bot
Rootkit
Virus
Worm
Zombie
Question 10. Question : Which term refers to a file that contains suspicious code, typically resembling a virus signature, which has been encrypted and moved so that it cannot be inadvertently opened or accessed by a hacker?
Bot File
Isolated File
Quarantined File
Root Kit
Secured Threat File
Question 11. Question : According to the textbook, what is the cash value of pirated software to date?
$53 Million
$530 Million
$5.3 Billion
$53 Billion
$530 Billion
Question 12. Question : Which reporter converted an M-88 tank into a high tech mobile news room to cover Operation Iraqi Freedom, but died during the conflict?
Arthur Miller
David Bloom
Ethel Gahwhiler
Jeff Raucher
Irving L. Levine
quiz 5
Which term refers to a 32 bit binary number, often written as four groups of decimal numbers separated by commas, which potentially changeable, and is used to identify a network device on the Internet?
DHD Coordinate
IP Address
MAC (Media Access Control) Address
Network Address Translation
IN Uniform Resource Locator
Points Received: 0 of 10
Comments:
Question 2. Question :
Which is the official term for parcels of data which are sent across a computer network and contain some data, the addresses of its sender and destination, and a sequence number?
Data Wave
Encapsulated Posted File
Packet
Pipeline
Transfer Unit
Comments:
Question 3. Question :
Which type of WI-FI configuration allows all devices to broadcast directly to each other?
WIreless Ad Hoc
Wireless Discovery Mode
Wireless Filibuster Mode
Wireless Infrastructure
Wireless Token Ring
Comments:
Question 4. Question :
Which communication media does Blue Tooth use?
Category 5 or 6 Twisted Pair Cable
Infrared Light
Optical Cable
Radio Waves
Visible Light
Question 5. Question :
Which technology makes intercepted WI-FI signals useless to eavesdroppers/interceptors?
Cyclical Redundancy Checks (CRC)
Electronic Countermeasures
Error ing Codes
Firewalls
Wireless Encryption
Question 6. Question :
Which type of network device connects two different types of networks?
Network Collective
Network Gateway
Network Hub
Network Switch
Network Router
Question 7. Question :
In Windows 7, which of the following is a collection of trusted networked computers that automatically share files and folders?
Access group
Collective group
Home group
Trust group
Work group
Comments:
Question 8. Question :
Which term refers to allowing other computers on a LAN to use the printer connected to your workstation?
Collective Printer Access
Printer Deprivatization
Printer Multiplexing
Printer Sharing
Virtual Printers
Comments:
Question 9. Question :
Which size length of cryptographic bit key would require the longest to break?
8 bits
16 bits
64 bits
256 bits
1,024 bits
Comments:
Question 10. Question :
Which is the official term of the encoded text of a message after it has been encrypted?
Cipher text
Clear text
Plaintext
Safetext
Transformed text
Points Received: 0 of 10
Comments:
Question 11. Question :
Which brand of hand held devices was found in 2011 to keep time stamped, triangulated position data, essentially keeping a log of the location of the user carrying them?
Kindle E-Reader
Apple iPad
Apple iPhone
Nook E-Reader
Sportsman’s Diving Watches
Comments:
Question 12. Question :
Which term refers to the use of Internet and Computers to deliver courses when the instructor and student are not in the same physical location?
Computer Aided Instruction (CAI)
Computer Aided Learning (CAL)
Computer Based Training (CBT)
Distance Education/Distance Learning
Learning Management Software (LMS)
Comments:
quiz 6
How many bits are in a current (IPv4) IP address?
2
16
32
128
1,024
Points Received: 10 of 10
Comments:
Question 2. Question :
Which type of Internet Access links your computer to an ISP from a stationary point, such as a wall socket or roof mounted antenna?
Fixed Access
Integrated Access
Mobil Access
Portable Access
Simplex Access
Points Received: 10 of 10
Comments:
Question 3. Question :
Which type of fixed Internet Connection has the longest latency?
Cable
Dial Up
DSL
ISDN
Satellite
Question 4. Question :
Which type of fixed Internet Connection is NOT always on?
Cable
DSL
ISDN
Satellite
WiMAX
Question 5. Question :
Which level of cell phone service allows users to view simplified versions of some popular web pages, but not the all pages nor full pages?
Analog
1G
2G
Mobile Broadband
WAP
Points Received: 0 of 10
Comments:
Question 6. Question :
Which level of cell phone service is needed to access the full versions of all web pages?
Analog
1G
2G
Mobile Broadband
WAP
Points Received: 10 of 10
Comments:
Question 7. Question :
Which type of application is specifically created to aid with the transfer of large numbers of files by FTP?
Encryption Application
FTP Client
FTP Server
Instant Messenger
Web Browser
Points Received: 10 of 10
Comments:
Question 8. Question :
Which term refers to the concept of using local devices to access applications, storage, and other computing resources supplied by Internet-based servers, rather than from their local devices?
Cloud Computing
Distributed Computing
Net Retrieval
Parallel Processing
Remote Storage
Points Received: 0 of 10
Comments:
Question 9. Question :
Which type of IP Address can be used to route packets on the Internet at large?
General IP Address
Loopback IP Address
Private IP Address
Routable IP Address
Untranslatable IP Address
Question 10. Question :
Which of the following ranges are NOT private IP Addresses?
10.0.0.0 to 10.255.255.255
42.0.0.0 to 42.255.255.255
172.16.0.0 to 172.31.255.255
192.168.0.0 to 192.168.255.255
Points Received: 10 of 10
Comments:
Question 11. Question :
The government of which country was recently overthrown through the use of Facebook, Twitter, and blogs?
Albania
Canada
Egypt
Mexico
United States
Question 12. Question :
According to the textbook, how much does it cost to purchase, install, and operate an ATM for one year?
$500
$5,000
$50,000
$500,000
$5,000,000
quoz 4
Which term refers to the operating system process and memory management that allows two or more tasks, jobs, or programs to run simultaneously?
Coordinating
Exclusivity
Logistics Control
Mutli-tasking
Non-Conflicting Allocation
Question 2. Question :
Which term refers to the time between when the coputer is first turned on and the time it is ready to accept commands?
Cold Start Process
Boot Up Process
Ignition Process
Start Up Process
Wake Up Cycle
Question 3. Question :
Which operating system was released for free use under a GPL (General Public License) in 1991 and is loosely based upon a UINX derived operating system?
Android OS
DOS (Disk Operating System)
Linux
Mac OS X
Windows 7
Question 4. Question :
Which operating system was specifically designed for the Apple Macintosh line of computers and is based on the UNIX operating system?
Android OS
DOS (Disk Operating System)
Linux
Mac OS X
Windows 7
Question 5. Question :
Which term refers to the suffix at the end of a file name, following the period, which is normally used to specify the file type, in Windows?
File Class
File Extension
File Identifier
File Suffix
File Tag
Question 6. Question :
Which term refers to the top level directory on a disk or drive, such as “C:\” or “E:\” ?
Drive Directory
Mother Directory
Root Directory
Super Directory
Tree Directory
Question 7. Question :
Which technique for writing an optical disc such as a CD, DVD, or BD, allow recording to be done in multiple sessions?
Disc Mastering
Incremental Burning
Packet Writing
Disc Ripping
Stamping
Question 8. Question :
Which type utility software protects confidentiality by overwriting supposed empty disk sectors from deleted files with random 0’s and 1’s.?
Backup Utility
Disk Defragmenter
File Shredder Software
File Sector Editor
Net Nanny
Question 9. Question :
Which type of backup makes a fresh copy of all files specified to be backed up?
Differential Backup
Full Backup
Incremental Backup
Restore Disk
Restore Point
Question 10. Question :
Which term refers to a bit-by-bit copy of all data from all sectors of a hard disk?
Disk Image
Full Backup
Incremental Backup
Restore Disk
Restore Point
Question 11. Question :
Robert Morris, who released a worn which brought down the ARPANET in 1988, received which sentence for this crime?
None
400 hours of community service and $10,000 fine
5 years probation and $10,000 fine
10 years in prison
15 years to life in prison
:
Question 12. Question :
Which term refers to an irresistible or web site containing fake information that allows investigators to monitor hackers until identification is possible?
Bait
Bear Trap
Fly Trap
Honey Pot
Siren
quiz 7 </pstyle=”color:>
<pstyle=”color: rgb(0,=”” 0,=”” 0);=”” font-size:=”” 12px;”=””>
</pstyle=”color:>
<pstyle=”color: rgb(0,=”” 0,=”” 0);=”” font-size:=”” 12px;”=””>
</pstyle=”color:>
<pstyle=”color: rgb(0,=”” 0,=”” 0);=”” font-size:=”” 12px;”=””>
iven the URL, http://www.miskatonic.edu/classics/main.html, which of the following is the file name with extension?
/classics/
html
http://
main.html
www.miskatonic.edu
Question 2. Question :
Web pages are text files, formatted using a standard set of tags called which of the following?
FTP
HTML
INTP
LaTex
WWW
Question 3. Question :
Which component of a search engine pulls keywords from web pages and stores then in the database?
Comparator
Database
Search Engine Indexer
Query Processor
Web Crawler
Comments:
Question 4. Question :
Which term refers to a rating of a web page based on the quality and quantity of links it contains?
Anchor Weight
Gunning Fog Index
Link Popularity
Link Power Score
IN Link Quality Index
Comments:
Question 5. Question :
Which type of e-commerce business model is Amazon dot Com?
B2B (Business to Business)
B2C (Business to Consumer)
B2G (Business to Government)
C2C (Consumer to Consumer)
G2C (Government to Consumer)
Comments:
Question 6. Question :
Which type of e-commerce business model are Craigslist dot Com and Ebay dot Com?
B2B (Business to Business)
B2C (Business to Consumer)
B2G (Business to Government)
C2C (Consumer to Consumer)
G2C (Government to Consumer)
Comments:
Question 7. Question :
Which process converts binary files, such as digital photos and sound files, into ASCII code based text which can be sent as an e-mail attachment and travel over the Internet with text based data?
ASCII Encoding
B2A Conversion
Multi-Purpose Internet Mail Extensions (MIME)
Text Representing Binary Data (TRBD)
ZA Encoding
Comments:
Question 8. Question :
Which term refers to e-mail which contains HTML tags to format the text with fonts, colors, and effects and embed graphics?
ASCII Mail
Extended Format Mail
HTML Mail
XML Mail
Web Mail
Comments:
Question 9. Question :
Which type of cookie tracks a user’s browsing pattern and uses it to pick targeted, custom advertisements?
Ad Serving Cookie
Bread Crumb
Chart Cookie
Tolle Haus Cookie
Web Bug
Comments:
Question 10. Question :
Which type of computer crime is the “Nigerian political refugee letter”?
Ad Serving Cookie
Pharming
Phishing
Spam
Web Bug
Comments:
Question 11. Question :
Which event has been cited to justify the erosion Fourth Amendment rights mandating judicial oversight for law enforcement to access for email or place wiretraps?
Iran Contra Affair
Roswell Incident
Teapot Dome Scandal
Terrorist Attacks of September 11, 2001
Watergate Scandal
Comments:
Question 12. Question :
How many bits of data may an RFID tag contain?
1 to 4 bits
4 to 8 bits
8 to 32 bits
64 to 128 bits
256 to 1,024 bits
Comments:
quiz 8
Which sound file format is used on commercially produced audio CDs?
AAC
CDDA
IN MP3
Ogg Vorbis
WAV
Comments:
Question 2. Question :
Which term specifically refers to online audio that plays as the file downloads?
IN Advanced Audio Coding
CDDA
Compressed Audio
Podcast Audio
Streaming Audio
Comments:
Question 3. Question :
Which is the official term that refers to an individual cell of an image on a display surface?
Datum
Dot
Element
Pixel
Point
Points Received: 10 of 10
Comments:
Question 4. Question :
Which is the official term for a type of bitmap which stores only one bit per pixel?
Binary
Monochrome
Polar
Simple
True Color
:
Question 5. Question :
Which of the following is NOT drawing software (which is application software intended for creating vector graphics)?
Adobe Illustrator
Adobe Photoshop
Corel Designer
InkScape
Open Office Draw
Question 6. Question :
Which type of software converts a bitmap into a vector graphics file?
Filtering Software
Melding Software
Rasterizing Software
Rendering Software
Tracing Software
:
Question 7. Question :
Which term refers to the general process of converting digital video from one format to another?
Adaptive Filtering
Barrier Synchronizing
Compression
Synchronizing
Transcoding
Question 8. Question :
Which digital video file format is native for DVD players?
ASF
BDMV
FLV
IN MOV
VOB
Question 9. Question :
Which DRM (Digital Rights Management) technology includes a code number to specify a region of the world in which DVD players, may play which discs?
Broadcast Flag
IN Copy Generation Management
CSS (Content Scramble System)
FairPlay
HDCP (High-bandwidth Digital Content Protection
Question 10. Question :
Which term refers to a collection of technologies used by copyright holders to limit access to and use of digital content?
Authentication and Authorization
Copyright Enforcement Technology (CET)
Confidentiality, Integrity, and Accessibility (CIA) Criteria
Digital Rights Management (DRM)
Secure Digital Vaults (SDV)
:
Question 11. Question :
Which law makes it illegal to circumvent any technological measure that controls access to a work?
Antitrust Act of 1923
Digital Millennium Copyright Act
Forth Amendment to the U.S. Constitution
Patriot Act of 2001
Piracy Act of 1820
Question 12. Question :
Which computer program was used to render the over two million blue hairs on the character Sully in the 2002 film, Monsters Inc.?
Bullet Time
Fizt
Houdini
MASSIVE
Renderman
</pstyle=”color:>