Chat with us, powered by LiveChat saint com203 all module quizes [ module 1,2,3,4,5,6,7,8 quiz ] | Writedemy

saint com203 all module quizes [ module 1,2,3,4,5,6,7,8 quiz ]

saint com203 all module quizes [ module 1,2,3,4,5,6,7,8 quiz ]

Question

Which term refers to a collection of inter-linked documents, graphics, and sounds that can be accessed over the Internet?

2G Network

Digital Television

Freeform Database

Visual Database

World Wide Web/Web

Question 2. Question :

The Internet was first developed for whom?

America Online (AOL)

cambridge University

Microsoft

The United States Military

Vice President Al Gore

Question 3. Question :

Which of the following is a generic term used to refer to symbols that represent facts, objects, and ideas, which a computer can manipulate?

Student Answer: CORRECT Data

Entities

Queries

Reports

Wisdom

Question 4. Question :

Which term refers a named collection of data copied unto a storage medium, such as a hard disk, CD, or flash drive?

BIOS

Cluster

File

Port

Sector

Question 5. Question :

A megabyte is the same as which of the following?

1,048,576 bits

2 to the power of 10 (= 1,024) Kilobytes

Exactly one million bytes

One half of a Gigabyte

Two Terabytes

Question 6. Question :

How many bytes are required to store a single letter in extended ASCII?

: 1

2

8

256

1,024

Question 7. Question :

Which of the following is the Extended ASCII code for an uppercase “A” in binary (base 2)?

0000 0000

0000 000A

0100 0001

A000 0000

1111 1111

Question 8. Question :

Which of type of language is typically used by programmers to create programs that control digital devices?

Command Language

Programming Language

Query Language

System Language

Teutonic Language

Question 9. Question :

Which type of computer program that translates source code of an entire program as a batch into object code which it places into a separate file?

Complier

Database

Interpreter

Operating System

Spreadsheet

Question 10. Question :

Which term refers to any method to confirm a person’s identity based upon something they know, possess, or are?

Authentication Protocol

Authorization Protocol

Electoral College

User ID

Validation Procedure

Question 11. Question :

Under which act are Sarah Palin’s e-mails and the FBI’s file on Roswell made available?

Affordable Health Care Initiative

Freedom of Information Act

No Child Left Behind

Patriot Act

Sarbanes-Oxley Act

Question 12. Question :

The first major role computers played in marketing was to do which of the following?

Creating graphics and typesetting print adds

Customizing mass market form letters

E-commerce web sites

Statistical analysis of surveys and sales data

Video and audio editing of broadcast adds

quiz 2

<pstyle=”color: rgb(0,=”” 0,=”” 0);=”” font-size:=”” 12px;”=””>Which term refers to the case which holds a computer’s main circuit boards, microprocessor, memory, power supply, and storage devices?Bus

Cache

Peripheral Device

Primary Storage

System Unit

Question 2. Question :

Which term refers to the high speed circuitry which connects the processor to the system and transports data to and from the processor?

Arithmetic Logic Unit (ALU)

Cache

Front Side Bus (FSB)

Instruction Pointer (IP)

Registers

Question 3. Question :

A processor with which of the following word sizes would be able to manipulate the largest number of bits at one time?

: 1 bit

8 bit

16 bit

32 bit

64 bit

Question 4. Question :

Which type of storage uses light reflecting areas called lands and non-reflective areas called pits to record data?

Analog Storage

Magnetic Storage

Mechanical Storage

Optical Storage

Solid State Storage

:

Question 5. Question :

Which term refers to the average time it takes a computer to locate data in a storage device, such as a hard disk, and read it?

Access Time

Latency

Seek Time

Transfer Time

Wait State Time

Question 6. Question :

Which event occurs when the read/write head of a hard disk drive mechanically hits the platter and damages some of the data on the disk?

Head Crash

Magnetic Leakage

Magnetic Decay

Platter Skip

Stack Overflow

Question 7. Question :

Which term refers to the number of colors a device can display, typically denoted as the number of bits to represent the color of each pixel?

Color Depth

Dot Pitch

Screen Resolution

Screen Size

Viewing Angle

:

Question 8. Question :

Which general term refers to a small circuit board which plugs into an expansion slot, and gives the computer the ability to control a storage, input, or output device?

Bus

Coprocessor

Ethernet Card

Expansion Card

Modem

Question 9. Question :

Which technology used in display devices/monitors produces an image by filtering light through a matrix of liquid crystal cells?

Cathode Ray Tube (CRT)

Light Emitting Diode (LED)

Liquid Crystal Display (LCD)

Plasma Screen

Question 10. Question :

Which term refers to a small, reinforced, oval shaped hole in a computer case into which you can insert a lock attached to a cable, which can in turn be fastened to a desk to prevent theft?

Anchor Port

Bolt Bracket

Kensington Security Slot

Surge Protector

USB Slot

Question 11. Question :

According to the Environmental Protection Agency (EPA), how much E-waste is discarded each year?

30 Tons

300 Tons

3,000 Tons

3 Million Tons

3 Billion Tons

Question 12. Question :

Which military communications project evolved into the modern Internet?

Area 51

ARPANET

Manhattan Project

Operation Overlord

Project PX

quiz 3

Which type of software alters a devices user interface to aid individuals with physical challenges, by creating as accessible environment by providing closed captions, text-to-speech, speech-to-text, or large screen text?

Adaptive Utilities

Compilers

Desktop Publishing

Groupware

Spreadsheet

Question 2. Question : Which are the two main classes of software?

Compilers and Utilities

Productivity and Games

System and Application

System and Network

Utilities and Application

Question 3. Question : Which type of application software are Microsoft Excel, Lotus 123, and OpenOffice Calc?

Database

Presentation Software

Spreadsheet

Word Processor

Web Browser

Question 4. Question : In database terminology, which term refers to all of the data for a specific, single entity – a person, place, thing or event?

Database

Field

Form

Query

Record

Question 5. Question : Which term refers to placing a program into a computer so it can be run on?

Downloading

Installation

Jail Breaking

Rooting

Uploading

Question 6. Question : Which type of file is designed to be started by the user or automatically launched by an operating system?

Assembler File

Configuration File

Data File

Executable File (Exe)

Object File

Question 7. Question : Which is the official term for software which has been illegally copied, distributed, or modified?

Cracked Software

Freeware

Highjacked Software

Gasparillaware

Pirated Software

Question 8. Question : Which type of software license allows the software to be used on all computers at a specified location?

Multiple-User License

Shrink Wrap License

Single User License

Site License

Unlimited Local License

Question 9. Question : Which software tool is used to conceal malware and backdoors that have been installed on a computer?

Bot

Rootkit

Virus

Worm

Zombie

Question 10. Question : Which term refers to a file that contains suspicious code, typically resembling a virus signature, which has been encrypted and moved so that it cannot be inadvertently opened or accessed by a hacker?

Bot File

Isolated File

Quarantined File

Root Kit

Secured Threat File

Question 11. Question : According to the textbook, what is the cash value of pirated software to date?

$53 Million

$530 Million

$5.3 Billion

$53 Billion

$530 Billion

Question 12. Question : Which reporter converted an M-88 tank into a high tech mobile news room to cover Operation Iraqi Freedom, but died during the conflict?

Arthur Miller

David Bloom

Ethel Gahwhiler

Jeff Raucher

Irving L. Levine

quiz 5

Which term refers to a 32 bit binary number, often written as four groups of decimal numbers separated by commas, which potentially changeable, and is used to identify a network device on the Internet?

DHD Coordinate

IP Address

MAC (Media Access Control) Address

Network Address Translation

IN Uniform Resource Locator

Points Received: 0 of 10

Comments:

Question 2. Question :

Which is the official term for parcels of data which are sent across a computer network and contain some data, the addresses of its sender and destination, and a sequence number?

Data Wave

Encapsulated Posted File

Packet

Pipeline

Transfer Unit

Comments:

Question 3. Question :

Which type of WI-FI configuration allows all devices to broadcast directly to each other?

WIreless Ad Hoc

Wireless Discovery Mode

Wireless Filibuster Mode

Wireless Infrastructure

Wireless Token Ring

Comments:

Question 4. Question :

Which communication media does Blue Tooth use?

Category 5 or 6 Twisted Pair Cable

Infrared Light

Optical Cable

Radio Waves

Visible Light

Question 5. Question :

Which technology makes intercepted WI-FI signals useless to eavesdroppers/interceptors?

Cyclical Redundancy Checks (CRC)

Electronic Countermeasures

Error ing Codes

Firewalls

Wireless Encryption

Question 6. Question :

Which type of network device connects two different types of networks?

Network Collective

Network Gateway

Network Hub

Network Switch

Network Router

Question 7. Question :

In Windows 7, which of the following is a collection of trusted networked computers that automatically share files and folders?

Access group

Collective group

Home group

Trust group

Work group

Comments:

Question 8. Question :

Which term refers to allowing other computers on a LAN to use the printer connected to your workstation?

Collective Printer Access

Printer Deprivatization

Printer Multiplexing

Printer Sharing

Virtual Printers

Comments:

Question 9. Question :

Which size length of cryptographic bit key would require the longest to break?

8 bits

16 bits

64 bits

256 bits

1,024 bits

Comments:

Question 10. Question :

Which is the official term of the encoded text of a message after it has been encrypted?

Cipher text

Clear text

Plaintext

Safetext

Transformed text

Points Received: 0 of 10

Comments:

Question 11. Question :

Which brand of hand held devices was found in 2011 to keep time stamped, triangulated position data, essentially keeping a log of the location of the user carrying them?

Kindle E-Reader

Apple iPad

Apple iPhone

Nook E-Reader

Sportsman’s Diving Watches

Comments:

Question 12. Question :

Which term refers to the use of Internet and Computers to deliver courses when the instructor and student are not in the same physical location?

Computer Aided Instruction (CAI)

Computer Aided Learning (CAL)

Computer Based Training (CBT)

Distance Education/Distance Learning

Learning Management Software (LMS)

Comments:

quiz 6
 
 
How many bits are in a current (IPv4) IP address?

2

16

32

128

1,024

Points Received: 10 of 10

Comments:

Question 2. Question :

Which type of Internet Access links your computer to an ISP from a stationary point, such as a wall socket or roof mounted antenna?

Fixed Access

Integrated Access

Mobil Access

Portable Access

Simplex Access

Points Received: 10 of 10

Comments:

Question 3. Question :

Which type of fixed Internet Connection has the longest latency?

Cable

Dial Up

DSL

ISDN

Satellite

Question 4. Question :

Which type of fixed Internet Connection is NOT always on?

Cable

DSL

ISDN

Satellite

WiMAX

Question 5. Question :

Which level of cell phone service allows users to view simplified versions of some popular web pages, but not the all pages nor full pages?

Analog

1G

2G

Mobile Broadband

WAP

Points Received: 0 of 10

Comments:

Question 6. Question :

Which level of cell phone service is needed to access the full versions of all web pages?

Analog

1G

2G

Mobile Broadband

WAP

Points Received: 10 of 10

Comments:

Question 7. Question :

Which type of application is specifically created to aid with the transfer of large numbers of files by FTP?

Encryption Application

FTP Client

FTP Server

Instant Messenger

Web Browser

Points Received: 10 of 10

Comments:

Question 8. Question :

Which term refers to the concept of using local devices to access applications, storage, and other computing resources supplied by Internet-based servers, rather than from their local devices?

Cloud Computing

Distributed Computing

Net Retrieval

Parallel Processing

Remote Storage

Points Received: 0 of 10

Comments:

Question 9. Question :

Which type of IP Address can be used to route packets on the Internet at large?

General IP Address

Loopback IP Address

Private IP Address

Routable IP Address

Untranslatable IP Address

Question 10. Question :

Which of the following ranges are NOT private IP Addresses?

10.0.0.0 to 10.255.255.255

42.0.0.0 to 42.255.255.255

172.16.0.0 to 172.31.255.255

192.168.0.0 to 192.168.255.255

Points Received: 10 of 10

Comments:

Question 11. Question :

The government of which country was recently overthrown through the use of Facebook, Twitter, and blogs?

Albania

Canada

Egypt

Mexico

United States

Question 12. Question :

According to the textbook, how much does it cost to purchase, install, and operate an ATM for one year?

$500

$5,000

$50,000

$500,000

$5,000,000

quoz 4

Which term refers to the operating system process and memory management that allows two or more tasks, jobs, or programs to run simultaneously?

Coordinating

Exclusivity

Logistics Control

Mutli-tasking

Non-Conflicting Allocation

Question 2. Question :

Which term refers to the time between when the coputer is first turned on and the time it is ready to accept commands?

Cold Start Process

Boot Up Process

Ignition Process

Start Up Process

Wake Up Cycle

Question 3. Question :

Which operating system was released for free use under a GPL (General Public License) in 1991 and is loosely based upon a UINX derived operating system?

Android OS

DOS (Disk Operating System)

Linux

Mac OS X

Windows 7

Question 4. Question :

Which operating system was specifically designed for the Apple Macintosh line of computers and is based on the UNIX operating system?

Android OS

DOS (Disk Operating System)

Linux

Mac OS X

Windows 7

Question 5. Question :

Which term refers to the suffix at the end of a file name, following the period, which is normally used to specify the file type, in Windows?

File Class

File Extension

File Identifier

File Suffix

File Tag

Question 6. Question :

Which term refers to the top level directory on a disk or drive, such as “C:\” or “E:\” ?

Drive Directory

Mother Directory

Root Directory

Super Directory

Tree Directory

Question 7. Question :

Which technique for writing an optical disc such as a CD, DVD, or BD, allow recording to be done in multiple sessions?

Disc Mastering

Incremental Burning

Packet Writing

Disc Ripping

Stamping

Question 8. Question :

Which type utility software protects confidentiality by overwriting supposed empty disk sectors from deleted files with random 0’s and 1’s.?

Backup Utility

Disk Defragmenter

File Shredder Software

File Sector Editor

Net Nanny

Question 9. Question :

Which type of backup makes a fresh copy of all files specified to be backed up?

Differential Backup

Full Backup

Incremental Backup

Restore Disk

Restore Point

Question 10. Question :

Which term refers to a bit-by-bit copy of all data from all sectors of a hard disk?

Disk Image

Full Backup

Incremental Backup

Restore Disk

Restore Point

Question 11. Question :

Robert Morris, who released a worn which brought down the ARPANET in 1988, received which sentence for this crime?

None

400 hours of community service and $10,000 fine

5 years probation and $10,000 fine

10 years in prison

15 years to life in prison

:

Question 12. Question :

Which term refers to an irresistible or web site containing fake information that allows investigators to monitor hackers until identification is possible?

Bait

Bear Trap

Fly Trap

Honey Pot

Siren

quiz 7</pstyle=”color:>

<pstyle=”color: rgb(0,=”” 0,=”” 0);=”” font-size:=”” 12px;”=””>
</pstyle=”color:>
<pstyle=”color: rgb(0,=”” 0,=”” 0);=”” font-size:=”” 12px;”=””>
</pstyle=”color:>
<pstyle=”color: rgb(0,=”” 0,=”” 0);=”” font-size:=”” 12px;”=””>

iven the URL, http://www.miskatonic.edu/classics/main.html, which of the following is the file name with extension?

/classics/

html

http://

main.html

www.miskatonic.edu

Question 2. Question :

Web pages are text files, formatted using a standard set of tags called which of the following?

FTP

HTML

INTP

LaTex

WWW

Question 3. Question :

Which component of a search engine pulls keywords from web pages and stores then in the database?

Comparator

Database

Search Engine Indexer

Query Processor

Web Crawler

Comments:

Question 4. Question :

Which term refers to a rating of a web page based on the quality and quantity of links it contains?

Anchor Weight

Gunning Fog Index

Link Popularity

Link Power Score

IN Link Quality Index

Comments:

Question 5. Question :

Which type of e-commerce business model is Amazon dot Com?

B2B (Business to Business)

B2C (Business to Consumer)

B2G (Business to Government)

C2C (Consumer to Consumer)

G2C (Government to Consumer)

Comments:

Question 6. Question :

Which type of e-commerce business model are Craigslist dot Com and Ebay dot Com?

B2B (Business to Business)

B2C (Business to Consumer)

B2G (Business to Government)

C2C (Consumer to Consumer)

G2C (Government to Consumer)

Comments:

Question 7. Question :

Which process converts binary files, such as digital photos and sound files, into ASCII code based text which can be sent as an e-mail attachment and travel over the Internet with text based data?

ASCII Encoding

B2A Conversion

Multi-Purpose Internet Mail Extensions (MIME)

Text Representing Binary Data (TRBD)

ZA Encoding

Comments:

Question 8. Question :

Which term refers to e-mail which contains HTML tags to format the text with fonts, colors, and effects and embed graphics?

ASCII Mail

Extended Format Mail

HTML Mail

XML Mail

Web Mail

Comments:

Question 9. Question :

Which type of cookie tracks a user’s browsing pattern and uses it to pick targeted, custom advertisements?

Ad Serving Cookie

Bread Crumb

Chart Cookie

Tolle Haus Cookie

Web Bug

Comments:

Question 10. Question :

Which type of computer crime is the “Nigerian political refugee letter”?

Ad Serving Cookie

Pharming

Phishing

Spam

Web Bug

Comments:

Question 11. Question :

Which event has been cited to justify the erosion Fourth Amendment rights mandating judicial oversight for law enforcement to access for email or place wiretraps?

Iran Contra Affair

Roswell Incident

Teapot Dome Scandal

Terrorist Attacks of September 11, 2001

Watergate Scandal

Comments:

Question 12. Question :

How many bits of data may an RFID tag contain?

1 to 4 bits

4 to 8 bits

8 to 32 bits

64 to 128 bits

256 to 1,024 bits

Comments:

quiz 8

Which sound file format is used on commercially produced audio CDs?

AAC

CDDA

IN MP3

Ogg Vorbis

WAV

Comments:

Question 2. Question :

Which term specifically refers to online audio that plays as the file downloads?

IN Advanced Audio Coding

CDDA

Compressed Audio

Podcast Audio

Streaming Audio

Comments:

Question 3. Question :

Which is the official term that refers to an individual cell of an image on a display surface?

Datum

Dot

Element

Pixel

Point

Points Received: 10 of 10

Comments:

Question 4. Question :

Which is the official term for a type of bitmap which stores only one bit per pixel?

Binary

Monochrome

Polar

Simple

True Color

:

Question 5. Question :

Which of the following is NOT drawing software (which is application software intended for creating vector graphics)?

Adobe Illustrator

Adobe Photoshop

Corel Designer

InkScape

Open Office Draw

Question 6. Question :

Which type of software converts a bitmap into a vector graphics file?

Filtering Software

Melding Software

Rasterizing Software

Rendering Software

Tracing Software

:

Question 7. Question :

Which term refers to the general process of converting digital video from one format to another?

Adaptive Filtering

Barrier Synchronizing

Compression

Synchronizing

Transcoding

Question 8. Question :

Which digital video file format is native for DVD players?

ASF

BDMV

FLV

IN MOV

VOB

Question 9. Question :

Which DRM (Digital Rights Management) technology includes a code number to specify a region of the world in which DVD players, may play which discs?

Broadcast Flag

IN Copy Generation Management

CSS (Content Scramble System)

FairPlay

HDCP (High-bandwidth Digital Content Protection

Question 10. Question :

Which term refers to a collection of technologies used by copyright holders to limit access to and use of digital content?

Authentication and Authorization

Copyright Enforcement Technology (CET)

Confidentiality, Integrity, and Accessibility (CIA) Criteria

Digital Rights Management (DRM)

Secure Digital Vaults (SDV)

:

Question 11. Question :

Which law makes it illegal to circumvent any technological measure that controls access to a work?

Antitrust Act of 1923

Digital Millennium Copyright Act

Forth Amendment to the U.S. Constitution

Patriot Act of 2001

Piracy Act of 1820

Question 12. Question :

Which computer program was used to render the over two million blue hairs on the character Sully in the 2002 film, Monsters Inc.?

Bullet Time

Fizt

Houdini

MASSIVE

Renderman

</pstyle=”color:>

Our website has a team of professional writers who can help you write any of your homework. They will write your papers from scratch. We also have a team of editors just to make sure all papers are of HIGH QUALITY & PLAGIARISM FREE. To make an Order you only need to click Ask A Question and we will direct you to our Order Page at WriteDemy. Then fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.

Fill in all the assignment paper details that are required in the order form with the standard information being the page count, deadline, academic level and type of paper. It is advisable to have this information at hand so that you can quickly fill in the necessary information needed in the form for the essay writer to be immediately assigned to your writing project. Make payment for the custom essay order to enable us to assign a suitable writer to your order. Payments are made through Paypal on a secured billing page. Finally, sit back and relax.

Do you need an answer to this or any other questions?

About Writedemy

We are a professional paper writing website. If you have searched a question and bumped into our website just know you are in the right place to get help in your coursework. We offer HIGH QUALITY & PLAGIARISM FREE Papers.

How It Works

To make an Order you only need to click on “Order Now” and we will direct you to our Order Page. Fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.

Are there Discounts?

All new clients are eligible for 20% off in their first Order. Our payment method is safe and secure.

Hire a tutor today CLICK HERE to make your first order