1. All of the following are examples of real security and privacy risks EXCEPT:
Correct : B. spam.
2. A process known as ____________ is used by large retailers to study trends.
Correct : A. data mining
3. ____________terminals (formerly known as cash registers) are often connected to complex inventory and sales computer systems.
Correct : B. point-of-sale (pos)
4. A(n) ____________ system is a small, wireless handheld computer that scans an item’s tag and pulls up the current price (and any special offers) as you shop.
Correct : A. pss
5. The ability to recover and read deleted or damaged files from a criminal’s computer is an example of a law enforcement specialty called:
Correct : C. computer forensics.
6. Which of the following is NOT one of the four major data processing functions of a computer?
Correct : C. analyzing the data or information
7. ____________ tags, when placed on an animal, can be used to record and track in a database all of the animal’s movements.
Correct : B. rfid
8. Surgeons can perform delicate operations by manipulating devices through computers instead of manually. This technology is known as:
Correct : A. robotics.
9. Technology no longer protected by copyright, available to everyone, is considered to be:
Correct : A. proprietary.
10. ____________ is the study of molecules and structures whose size ranges from 1 to 100 nanometers.
Correct : A. nanoscience
11. ____________ is the science that attempts to produce machines that display the same type of intelligence that humans do.
Correct : D. artificial intelligence (ai)
12. ____________ is data that has been organized or presented in a meaningful fashion.
Correct : D. information
13. The name for the way that computers manipulate data into information is called:
Correct : B. processing.
14. Computers gather data, which means that they allow users to ____________ data.
Correct : B. input
15. After a picture has been taken with a digital camera and processed appropriately, the actual print of the picture is considered:
Correct : B. output.
16. Computers use the ____________ language to process data.
Correct : C. binary
17. Computers process data into information by working exclusively with:
Correct : D. numbers.
18. In the binary language each letter of the alphabet, each number and each special character is made up of a unique combination of:
Correct : D. eight bits.
19. The term bit is short for:
Correct : C. binary digit.
20. A string of eight 0s and 1s is called a:
Correct : B. byte.
21. A ____________ is approximately one billion bytes.
Correct : C. gigabyte
22. A ____________ is approximately a million bytes.
Correct : C. megabyte
23. ____________ is any part of the computer that you can physically touch.
Correct : A. hardware
24. The components that process data are located in the:
Correct : C. system unit.
25. All of the following are examples of input devices EXCEPT a:
Correct : D. printer.
26. Which of the following is an example of an input device?
Correct : A. scanner
27. All of the following are examples of storage devices EXCEPT:
Correct : B. printers.
28. The ____________, also called the “brains†of the computer, is responsible for processing data.
Correct : D. central processing unit (cpu)
29. The CPU and memory are located on the:
Correct : B. motherboard.
30. Word processing, spreadsheet, and photo-editing are examples of:
Correct : A. application software.
31. ____________ is a set of computer programs used on a computer to help perform tasks.
Correct : B. software
32. System software is the set of programs that enables your computers hardware devices and ____________ software to work together.
Correct : D. application
33. The PC (personal computer) and the Apple Macintosh are examples of two different:
Correct : A. platforms.
34. Apple Macintoshes (Macs) and PCs use different ____________ to process data and different operating systems.
Correct : C. cpus
35. Servers are computers that provide resources to other computers connected to a:
Correct : A. network.
36. Smaller and less expensive PC-based servers are replacing ____________ in many businesses.
Correct : D. mainframes
37. ____________ are specially designed computers that perform complex calculations extremely rapidly.
Correct : B. supercomputers
38. DSL is an example of a(n) ____________ connection.
Correct : D. broadband
39. The difference between people with access to computers and the Internet and those without this access is known as the:
Correct : A. digital divide.
40. ____________ is the science revolving around the use of nano structures to build devices on an extremely small scale.
Correct : A. nanotechnology
41. Which of the following is the correct order of the four major functions of a computer?
Correct : D. input ?? process ?? output ?? storage
42. ____________ bits equal one byte.
Correct : A. eight
43. The binary language consists of ____________ digit(s).
Correct : B. 2
44. A byte can hold one ____________ of data.
Correct : C. character
45. ____________ controls the way in which the computer system functions and provides a means by which users can interact with the computer.
Correct : B. the operating system
46. The operating system is the most common type of ____________ software.
Correct : C. system
47. ____________ are specially designed computer chips that reside inside other devices, such as your car or your electronic thermostat.
Correct : B. embedded computers
48. The steps and tasks needed to process data, such as responses to questions or clicking an icon, are called:
Correct : A. instructions.
49. The two broad categories of software are:
Correct : D. system and application.
50. The metal or plastic case that holds all the physical parts of the computer is the: