Quiznetik

PC Maintenance | Set 1

1. All of the following are examples of real security and privacy risks EXCEPT:

Correct : B. spam.

2. A process known as ____________ is used by large retailers to study trends.

Correct : A. data mining

3. ____________terminals (formerly known as cash registers) are often connected to complex inventory and sales computer systems.

Correct : B. point-of-sale (pos)

4. A(n) ____________ system is a small, wireless handheld computer that scans an item’s tag and pulls up the current price (and any special offers) as you shop.

Correct : A. pss

5. The ability to recover and read deleted or damaged files from a criminal’s computer is an example of a law enforcement specialty called:

Correct : C. computer forensics.

6. Which of the following is NOT one of the four major data processing functions of a computer?

Correct : C. analyzing the data or information

7. ____________ tags, when placed on an animal, can be used to record and track in a database all of the animal’s movements.

Correct : B. rfid

8. Surgeons can perform delicate operations by manipulating devices through computers instead of manually. This technology is known as:

Correct : A. robotics.

9. Technology no longer protected by copyright, available to everyone, is considered to be:

Correct : A. proprietary.

10. ____________ is the study of molecules and structures whose size ranges from 1 to 100 nanometers.

Correct : A. nanoscience

11. ____________ is the science that attempts to produce machines that display the same type of intelligence that humans do.

Correct : D. artificial intelligence (ai)

12. ____________ is data that has been organized or presented in a meaningful fashion.

Correct : D. information

13. The name for the way that computers manipulate data into information is called:

Correct : B. processing.

14. Computers gather data, which means that they allow users to ____________ data.

Correct : B. input

15. After a picture has been taken with a digital camera and processed appropriately, the actual print of the picture is considered:

Correct : B. output.

16. Computers use the ____________ language to process data.

Correct : C. binary

17. Computers process data into information by working exclusively with:

Correct : D. numbers.

18. In the binary language each letter of the alphabet, each number and each special character is made up of a unique combination of:

Correct : D. eight bits.

19. The term bit is short for:

Correct : C. binary digit.

20. A string of eight 0s and 1s is called a:

Correct : B. byte.

21. A ____________ is approximately one billion bytes.

Correct : C. gigabyte

22. A ____________ is approximately a million bytes.

Correct : C. megabyte

23. ____________ is any part of the computer that you can physically touch.

Correct : A. hardware

24. The components that process data are located in the:

Correct : C. system unit.

25. All of the following are examples of input devices EXCEPT a:

Correct : D. printer.

26. Which of the following is an example of an input device?

Correct : A. scanner

27. All of the following are examples of storage devices EXCEPT:

Correct : B. printers.

28. The ____________, also called the “brains†of the computer, is responsible for processing data.

Correct : D. central processing unit (cpu)

29. The CPU and memory are located on the:

Correct : B. motherboard.

30. Word processing, spreadsheet, and photo-editing are examples of:

Correct : A. application software.

31. ____________ is a set of computer programs used on a computer to help perform tasks.

Correct : B. software

32. System software is the set of programs that enables your computers hardware devices and ____________ software to work together.

Correct : D. application

33. The PC (personal computer) and the Apple Macintosh are examples of two different:

Correct : A. platforms.

34. Apple Macintoshes (Macs) and PCs use different ____________ to process data and different operating systems.

Correct : C. cpus

35. Servers are computers that provide resources to other computers connected to a:

Correct : A. network.

36. Smaller and less expensive PC-based servers are replacing ____________ in many businesses.

Correct : D. mainframes

37. ____________ are specially designed computers that perform complex calculations extremely rapidly.

Correct : B. supercomputers

38. DSL is an example of a(n) ____________ connection.

Correct : D. broadband

39. The difference between people with access to computers and the Internet and those without this access is known as the:

Correct : A. digital divide.

40. ____________ is the science revolving around the use of nano structures to build devices on an extremely small scale.

Correct : A. nanotechnology

41. Which of the following is the correct order of the four major functions of a computer?

Correct : D. input ?? process ?? output ?? storage

42. ____________ bits equal one byte.

Correct : A. eight

43. The binary language consists of ____________ digit(s).

Correct : B. 2

44. A byte can hold one ____________ of data.

Correct : C. character

45. ____________ controls the way in which the computer system functions and provides a means by which users can interact with the computer.

Correct : B. the operating system

46. The operating system is the most common type of ____________ software.

Correct : C. system

47. ____________ are specially designed computer chips that reside inside other devices, such as your car or your electronic thermostat.

Correct : B. embedded computers

48. The steps and tasks needed to process data, such as responses to questions or clicking an icon, are called:

Correct : A. instructions.

49. The two broad categories of software are:

Correct : D. system and application.

50. The metal or plastic case that holds all the physical parts of the computer is the:

Correct : A. system unit.