Académique Documents
Professionnel Documents
Culture Documents
True/False
Indicate whether the sentence or statement is true or false.
ARPA was created by Eisenhower as a direct response to the possible threat
1. posed by the Russian launch of Sputnik.
T
ANSWER:
NOTES:
REF:
30
15
In 1998, Netscape repudiated the open source movement, and suppressed the
3. source code for its browser.
F
ANSWER:
NOTES:
REF:
34
36
29
The Altair bus evolved into a specialized device that only a few
6. hardware/software companies could use.
F
ANSWER:
NOTES:
REF:
23
The Jacquard loom addressed a problem that was directly related to issues in
8. navigation.
F
ANSWER:
NOTES:
REF:
Application programs are geared toward an end user rather than the programmer.
9.
T
ANSWER:
NOTES:
REF:
18
The Intel 4004 was named after the number of transistors aboard.
10.
T
ANSWER:
NOTES:
REF:
20
Lotus 1-2-3 was based on entirely different spreadsheet principles than VisiCalc.
11.
F
ANSWER:
NOTES:
REF:
25
26
With the introduction of the semiconductor, both the cost and size of computers
13. were reduced while speed and reliability were improved.
T
ANSWER:
NOTES:
REF:
17
REF:
25
The Apple II gained broad acceptance due to the ease with which programmers
15. could write applications for it.
T
ANSWER:
NOTES:
REF:
24
26
Charles Babbage managed to design a machine that captured the key working
17. elements of the modern electronic computer.
T
ANSWER:
NOTES:
REF:
Only 10 percent of the software running on all the computing devices of the
18. world comes from Microsoft.
T
ANSWER:
NOTES:
REF:
35
NOTES:
REF:
32
16
31
The Xerox Alto featured graphics, menus, icons, windows, and a mouse.
22.
T
ANSWER:
NOTES:
REF:
27
22
T
ANSWER:
NOTES:
REF:
11
Multiple Choice
Identify the letter of the choice that best completes the statement or answers the question.
According to general consensus, which of the following companies won the
25. mainframe battle of the first electronic computer generation?
a. IBM
c. Honeywell
b. Remington Rand
d. RCA
A
ANSWER:
NOTES:
REF:
15
Using the Berners-Lee protocols, Marc Andreesen created the browser that had
26. the most impact beyond the walls of academia: ____.
a. Internet Explorer
c. Mosaic
b. Next
d. Impact
C
ANSWER:
NOTES:
REF:
33
ENIAC was a functioning and useful computer that could perform both
27. arithmetic and ____ operations.
a. standard
c. linguistic
b. surgical
d. logical
D
ANSWER:
NOTES:
REF:
11
10
The loose collection of networks called the Internet is the short form of which
29. of the following words?
a. internetwork
c. interarpanet
b. internexus
d. interconnect
A
ANSWER:
NOTES:
REF:
31
Based on low cost, available source code, and reputed reliability, which of the
30. following operating systems presents the greatest competitive threat to Windows?
a. Crescent
c. Linux
b. Star
d. OS/2
C
ANSWER:
NOTES:
REF:
34
REF:
In its antitrust suit with the government, Microsoft claimed which of the
32. following programs was an integral part of the operating system?
a. Mosaic
c. Navigator
b. Internet Explorer
d. MS-Word
B
ANSWER:
NOTES:
REF:
34
Both the Jacquard loom and the player piano had a ____.
c. disk drive
33. a. stored program
b. monitor
d. keyboard
A
ANSWER:
NOTES:
REF:
Which of the following war-time activities caused the U.S. Navy Board of
34. Ordinance to sponsor the development of the first modern electronic computer?
a. ship building
c. weapons development
b. aerial reconnaissance
d. map-making
C
ANSWER:
NOTES:
REF:
10
NOTES:
REF:
34
In Western society, you can probably credit the 1622 invention of the ____ as the
36. beginning of the solution of complex mathematical problems by mechanical
devices with moving parts.
a. abacus
c. logarithm
b. slide rule
d. transit
B
ANSWER:
NOTES:
REF:
Which of the following operating systems was developed jointly by IBM and
37. Microsoft?
a. NOS
c. Linux
b. OS/2
d. Unix
B
ANSWER:
NOTES:
REF:
29
14
C
ANSWER:
NOTES:
REF:
32
____ involves dividing messages into blocks that can be reassembled at their
41. destination, with each block possibly following a different path.
a. Multiplexing
c. Packet switching
b. Linking
d. Decoding
C
ANSWER:
NOTES:
REF:
30
The concept of computer design that allows for future modifications and
42. additions by members of the public is known as which of the following?
a. closed architecture
c. open architecture
b. proprietary architecture
d. licensed architecture
C
ANSWER:
NOTES:
REF:
21
Fiberoptics and wireless technologies have given rise to which of the following
43. terms?
a. WAN
b. Internet
c. WLAN
d. LAN
C
ANSWER:
NOTES:
REF:
31
In 1977, Apple released the ____ based upon the Motorola 6502 processor.
c. Macintosh
44. a. Apple I
b. Apple II
d. iPod
B
ANSWER:
NOTES:
REF:
24
The Macintosh had the first mass-produced ____ , an interface that uses
45. graphical instead of text commands.
a. ARPA
c. GUI
b. SMP
d. MPP
C
ANSWER:
NOTES:
REF:
27
Assembly language, while easier to use than machine code, has what type of
47. correspondence with machine code?
a. many-to-one
b. many-to-many
c. one-to-one
d. one-to-many
C
ANSWER:
NOTES:
REF:
16
29
30
CS-ch-2-PRACTICE
True/False
Indicate whether the sentence or statement is true or false.
There are only four ways to modify or transform a graphic.
1.
F
ANSWER:
NOTES:
REF:
61
48
Because computer scientists focus on program design, there is really no need for
3. them to acquire proficiency in performing Office tasks.
F
ANSWER:
NOTES:
REF:
48
66
FTP transmission methods are appropriate for placing files in a common location
5. so that many users can download and have access to them.
T
ANSWER:
NOTES:
REF:
76
There is no universal software tool that can be applied to the entire spectrum of
6. tasks.
T
ANSWER:
NOTES:
REF:
47
80
Given the appropriate tool, nearly any user can generate graphical content.
8.
T
ANSWER:
NOTES:
REF:
59
57
53
pcAnywhere affords remote access to all PCs, whether or not a version of this
11. software is installed in the remote device.
F
ANSWER:
NOTES:
REF:
70
75
74
51
55
Interaction with an FTP Web site is similar to interaction with a network drive.
16.
T
ANSWER:
NOTES:
REF:
77
If a user seeks a document tool with the most extensive formatting and graphics
17. capabilities, he/she is best advised to consider a word processor over a generic
text editor.
T
ANSWER:
NOTES:
REF:
50
64
REF:
65
A word processor is not the tool of choice for memo design and creation.
20.
F
ANSWER:
NOTES:
REF:
49
67
Researching the benefits and features of the various software tools involves a
22. one-time investment of time and energy.
F
ANSWER:
NOTES:
REF:
81
59
Multiple Choice
Identify the letter of the choice that best completes the statement or answers the question.
To flip an image upside down, the user would ____ it 180 degrees.
c. crop
24. a. resize
b. rotate
d. scale
B
ANSWER:
NOTES:
REF:
62
53
When you are diagramming and creating flowcharts, you are principally engaged
26. in ____ tasks.
a. programming
c. Web
b. office
d. network repair
A
ANSWER:
NOTES:
REF:
48
60
The 16.7 million color palette of the BMP format requires ____ bits.
c. 24
28. a. 16
b. 20
d. 32
C
ANSWER:
NOTES:
REF:
59
Data ____can be used to reduce the size of a file and speed the transmission of
29. the file through e-mail.
a. collaboration
c. inlining
b. design
d. compression
D
ANSWER:
NOTES:
REF:
74
____ in the form of logos, cartoons, and maps play a large part in the world of
30. information sharing.
a. Texts
c. Databases
b. Graphics
d. Protocols
B
ANSWER:
NOTES:
REF:
59
Text editors, compilers, and debuggers are directly featured on the menu of
31. which of the following software tools?
a. Integrated Development Environment
b. word processor
c. spreadsheet
d. desktop publisher
A
ANSWER:
NOTES:
REF:
66
File ____ Protocol (or FTP) is a transmission method used to send files across
32. the Internet.
a. Task
c. Transfer
b. Test
d. Table
C
ANSWER:
NOTES:
REF:
76
The ____ extension is one of the more popular compression formats in the world
33. of Windows.
a. .bat
c. .zip
b. .car
d. .exe
C
ANSWER:
NOTES:
REF:
75
A ____ tool is the most logical choice for the development of a slide show.
c. word processing
34. a. spreadsheet
b. presentation
d. scheduling
B
ANSWER:
NOTES:
REF:
54
NOTES:
REF:
55
A ____ is a generic tool that allows you to do basic editing, although the finished
36. document wont have a professional look.
a. word processor
c. GUI
b. text editor
d. spreadsheet
B
ANSWER:
NOTES:
REF:
51
65
64
D
ANSWER:
NOTES:
REF:
48
The process of changing image format from one type to another is called ____.
c. blurring
40. a. conversion
b. rotating
d. cropping
A
ANSWER:
NOTES:
REF:
63
60
67
Grammar check and font selection are common features of which of the
43. following tools?
a. browser
c. binder
b. text editor
d. word processor
D
ANSWER:
NOTES:
REF:
50
67
64
Which of the following graphical formats should be favored for animation and
46. small file size?
a. BMP
c. JPG
b. GIF
d. TIF
B
ANSWER:
NOTES:
REF:
60
94
97
The Boolean OR operator returns a 1 only when either or both of the inputs are 1.
3.
T
ANSWER:
NOTES:
REF:
98
99
In the adder, the bits are added according to the rules of the hexadecimal
5. numbering system.
F
ANSWER:
NOTES:
REF:
103
The flip-flop circuit latches onto a bit and maintains the output until it is
6. changed.
T
ANSWER:
NOTES:
REF:
105
Control wires contain the binary data that is being read from or written to
7. memory and I/0.
F
ANSWER:
NOTES:
REF:
110
ROM (read-only memory) is not erased when the computer power goes off.
8.
T
ANSWER:
NOTES:
REF:
111
116
CRT displays are much thinner and run much cooler than LCD monitors.
10.
F
ANSWER:
NOTES:
REF:
116
Interrupt handling is a much more efficient method for processing I/0 than
11. polling.
T
ANSWER:
NOTES:
REF:
118
95
The AND operator has an output of 1 (true) only if both inputs are 0.
13.
F
ANSWER:
NOTES:
REF:
98
The combination of gates enables the computer to do all the things that it does.
14.
T
ANSWER:
NOTES:
REF:
99
104
The computer has a crystal clock called a(n) control clock that times, or
16. synchronizes, each of the steps in the fetch-execute cycle.
F
ANSWER:
NOTES:
REF:
109
Bus wires in the system category are responsible for timing signals and other
17. protocols.
F
ANSWER:
NOTES:
REF:
110
The most commonly used form of mass storage is the floppy disk drive.
18.
F
ANSWER:
NOTES:
REF:
113
REF:
115
Multiple Choice
Identify the letter of the choice that best completes the statement or answers the question.
By switching on and off, the ____ can be used to represent the 1s and 0s that are
20. the foundation of all that goes on in the computer.
a. capacitor
c. resistor
b. transistor
d. inductor
B
ANSWER:
NOTES:
REF:
95
____ algebra is concerned with the logic of the operators AND, OR, and NOT.
c. Boolean
21. a. Linear
b. Modern
d. Fibonacci
C
ANSWER:
NOTES:
REF:
96
The ____ operator works with a single input and its purpose is to reverse the
22. input.
a. XOR
c. AND
b. NOT
d. OR
B
ANSWER:
NOTES:
REF:
98
The AND circuit generates ____ output for each set of inputs.
c. three
23. a. one
b. two
d. four
A
ANSWER:
NOTES:
REF:
100
The truth table for the NOT gate shows that the output is the ____ of the input.
c. opposite
24. a. square
b. first derivative
d. same
C
ANSWER:
NOTES:
REF:
100
The truth table for the ____ gate indicates that the output is 1 only when the
25. inputs are different.
a. OR
c. AND
b. XOR
d. NAND
B
ANSWER:
NOTES:
REF:
102
A gates output for any set of inputs follows the specifications given in the ____
26. table.
a. variable
c. log
b. data
d. truth
D
ANSWER:
NOTES:
REF:
102
One of the main functions of the ____ component of the computers CPU is to
27. add numbers.
a. controller
c. memory
b. ALU
d. register
B
ANSWER:
NOTES:
REF:
103
107
107
Most computers today are still based on what has come to be called ____
30. architecture, and are sometimes still called ____ machines.
a. Hilbert
c. Von Neumann
b. Turing
d. Non Von
C
ANSWER:
NOTES:
REF:
108
At a basic level, most computers operate on what is called a(n) ____ cycle.
c. store-revise
31. a. encrypt-encapsulate
b. edit-add
d. fetch-execute
D
ANSWER:
NOTES:
REF:
109
111
111-112
Hard disks are made up of one or more metal platters with a coating consisting of
34. ____ particles.
a. magnetic
c. photonic
b. atomic
d. silicon
A
ANSWER:
NOTES:
REF:
113
Keyboards, and most other I/O devices, connect to the motherboard through a(n)
35. ____.
a. socket
c. channel
b. adapter
d. port
D
ANSWER:
NOTES:
REF:
115
116
117
When an I/O device places a voltage signal on a(n) ____ line, the associated chip
38. checks its priority before passing it on to the CPU.
a. poll
c. interrupt
b. job
d. JCL
C
ANSWER:
NOTES:
REF:
118
True/False
Indicate whether the statement is true or false.
__F_ 26. Every computer game, program, picture, or sound is stored in the computer as a series of decimal
digits.
__T_ 27. Negative powers are used to represent the fractional portion of numbers.
__F_ 28. The hexadecimal numbering system has seventeen unique digits.
_T__ 29. The hexadecimal number system uses letters to represent digits beyond nine.
_F__ 30. The term radix is synonymous with positional value.
____ 31. For any quantity, there is a number in any base to represent it.
__T__ 32. Table look-ups can be used to convert a number from one base to another.
__F__ 33. The decimal equivalent of 111112 is 31000.
__T__ 34. The conversion algorithm from base 10 to another base utilizes a sequence of remainders to
construct the new number.
__T__ 35. The difference between adding numbers in base 10 and any other base lies in the carry process.
__F__ 36. Modern computers are capable of storing hexadecimal information.
__T__ 37. Half of a byte is sometimes referred to as a nibble.
__T__ 38. Hexadecimal numbers are used as a shorthand method to represent binary values.
__F__ 39. Whole numbers or integers are internally represented by the computer as hexadecimal numbers.
__F__ 40. Signed and unsigned numbers in the computer are designed to always take up a different number
of bits.
__F__ 41. Negative fractional numbers cannot be internally represented in a computer.
__T__ 42. The Unicode character standard is compatible with the extended ASCII standard.
__T__ 43. The number of pixels in each row and column defines the resolution of a display.
__F__ 44. The Unicode method of character representation is fast becoming obsolete.
__F__ 45. In the common monitor resolution specified as 1024 X 768, the number 1024 represents rows and
768 represents dots (or pixels).
__F__ 46. As the resolution numbers get larger for a monitor, the size of each pixel gets larger.
__T__ 47. Sounds are stored in the computer in a manner very similar to images.
__F__ 48. The number of words used for each sound sample determines how many unique amplitude levels
can be represented.
__T__ 49. Raw audio samples are stored in files such as WAV files.
__F__ 50. It is not possible to learn to program or to manage a database without understanding binary and
hexadecimal number systems.
Multiple Choice
Identify the choice that best completes the statement or answers the question.
____ 76. Displays containing the contents of a computers memory or the hard disk are often referred to as
____ memory dumps.
a. error
c. decimal
b. hexadecimal
d. octal
-4
____ 77. The number 10 evaluates to which of the following?
a. 0.000001
c. 0.0001
b. 0.00001
d. 10000
____ 78. A ____ is identified by the number of digits a numbering system has, including zero.
a. root
c. determinant
b. discriminant
d. base
____ 79. The concept of ____ value is common to all modern numbering systems.
a. positional
c. deterministic
b. radical
d. random
____ 80. According to positional value, the binary number 101012 represents ____ things.
a. 3
c. 12
b. 5
d. 21
____ 81. The hexadecimal numbering system runs out of digits after ____.
a. E
c. G
b. F
d. H
____ 82. The decimal equivalent of 10016 is ____.
a. 116
c. 256
b. 160
d. 1600
____ 83. What is the result of converting the decimal number 25 to a base 16 equivalent?
a. F
c. 1A
b. 19
d. 31
____ 84. What is the result of converting the decimal number 25 to a base 2 equivalent?
a. 100012
c. 110012
b. 100112
d. 111012
____ 85. What binary number results from adding 1112 and 1112?
a. 10002
c. 11102
b. 10112
d. 11112
____ 86. A ____ is a basic unit of storage that can have a value of either 1 or 0 (on or off).
a. nibble
c. byte
b. word
d. bit
____ 87. A ____ is a group of eight bits.
a. byte
c. nibble
b. word
d. blip
____ 88. An 8-nibble word is more likely to be referred to as the equivalent ____-byte word.
a. 2
c. 8
b. 4
d. 16
____ 89. Each hexadecimal digit relates directly to a ____-bit binary pattern.
a. 2
c. 8
b. 4
d. 16
____ 90. Which of the following methods represents the most common way of storing signed numbers?
a. ones complement
c. integer complement
b. binary complement
d. twos complement
____ 91. To find the ____ of a given bit, flip it to the opposite state.
____ 92.
____ 93.
____ 94.
____ 95.
____ 96.
____ 97.
____ 98.
____ 99.
____ 100.
a. root
c. position
b. complement
d. sign
In scientific notation, the method of displaying numbers uses a(n) ____ and an exponent.
a. mantissa
c. abscissa
b. asymptote
d. ordinate
The eight bit extended ASCII (American Standard Code for Information Interchange) character
set can be used to represent ____ characters.
a. 128
c. 512
b. 256
d. 34,168
A ____ is the smallest unit that can be displayed on a computer monitor.
a. micron
c. twip
b. picon
d. pixel
____ patterns contain information about the color and brightness of a pixel.
a. Binary
c. Decimal
b. Octal
d. Hexadecimal
Unicode character representation uses a(n) ____ bit standard.
a. 4
c. 8
b. 7
d. 16
Various ____ techniques have been designed to allow the same image information to be stored in
a smaller file.
a. consolidation
c. scanning
b. compression
d. resolution
A sound consists of a waveform that has amplitude (volume) and a ____ (pitch).
a. frequency
c. phase angle
b. phase shift
d. period
The computer samples sound at fixed intervals and each sample is assigned a binary value
according to its ____.
a. frequency
c. amplitude
b. period
d. pitch
Which of the following is an example of a video compression format?
a. BMP
c. MPEG
b. GIF
d. TIF
ch5practice
True/False
Indicate whether the sentence or statement is true or false.
The MCP is the software control center of the modern computer.
1.
F
ANSWER:
NOTES:
REF:
157
When power is turned on, the CPU begins executing the instructions located in
2. the CMOS chip.
F
ANSWER:
NOTES:
REF:
159
160
162
Every multipurpose device with a CPU must also have an operating system.
5.
T
ANSWER:
NOTES:
REF:
163
165
The processes that are running under Windows may be viewed by pressing the
7. Ctrl+Alt+Del key combination.
T
ANSWER:
NOTES:
REF:
165
166
The parts of a computer system, such as the CPU, memory, keyboard, monitor,
9. and network adapter, all function at different speeds.
T
ANSWER:
NOTES:
REF:
166
168
Plug and Play technologies automatically detect and configure I/O devices.
11.
T
ANSWER:
NOTES:
REF:
168
Deadlock issues are resolved without the intervention of the operating system.
12.
F
ANSWER:
NOTES:
REF:
168
Operating systems are responsible for the protection of memory and other
13. resources.
T
ANSWER:
NOTES:
REF:
169
170
171
172
Windows and DOS use the FDISK command to partition the drives.
17.
T
ANSWER:
NOTES:
REF:
172
173
175
175
175
DOS and UNIX allow for recovery of folders and files after they have been
22. deleted.
F
ANSWER:
NOTES:
REF:
179
Multiple Choice
Identify the letter of the choice that best completes the statement or answers the question.
Interface programs that allow a computer to interact with peripheral devices are
23. called ____.
a. shell scripts
c. drivers
b. applets
d. monitors
C
ANSWER:
NOTES:
REF:
158
c. GUI
d. kernel
D
ANSWER:
NOTES:
REF:
159
The operating system running on a computer is often called its ____ and is
25. typically tied to a particular CPU.
a. support
c. intermediary
b. platform
d. driver
B
ANSWER:
NOTES:
REF:
162
Which of the following terms refers to computing with more than one CPU?
c. multileveraging
26. a. multitasking
b. multilayering
d. multiprocessing
D
ANSWER:
NOTES:
REF:
163
163
163
Console operating systems prompt users to interact through a(n) ____ line.
c. programming
29. a. operational
b. flow
d. command
D
ANSWER:
NOTES:
REF:
164
165
166
167
The operating system reallocates the CPU through a program known as a(n) ____
33. handler.
a. interrupt
c. control
b. job
d. disruption
A
ANSWER:
NOTES:
REF:
167
A situation known as ____ occurs when all active processes are tied up in a
34. circular wait for resources.
a. synchronization
c. safe mode
b. context switch
d. deadlock
D
ANSWER:
NOTES:
REF:
168
____ are simply broad divisions of the total capacity of the disk into specific OS
35. areas.
a. Segments
c. Categories
b. Portions
d. Partitions
D
ANSWER:
NOTES:
REF:
172
172
In DOS, you can enter ____ <command> to get more details concerning a
37. particular command.
a. HELP
c. ASSIST
b. AID
d. SUPPORT
A
ANSWER:
NOTES:
REF:
172
The process of ____ arranges the disk surface into addressable areas and sets up
38. the basic directory tree structure on the disk.
a. organizing
c. templating
b. formatting
d. shaping
B
ANSWER:
NOTES:
REF:
173
REF:
175
In Windows, deleted files and folders reside in the ____ Bin folder until it is
40. emptied.
a. Remainder
c. Recycle
b. Refuse
d. Recovery
C
ANSWER:
NOTES:
REF:
179
____ are characters that are used to match any character at the end of a file name
41. to a particular file extension.
a. Deuces
c. Aces
b. Jokers
d. Wildcards
D
ANSWER:
NOTES:
REF:
179
183
REF:
179
172
cs6PRACTICE
True/False
Indicate whether the sentence or statement is true or false.
The most popular transmission medium has been silicon.
1.
F
ANSWER:
NOTES:
REF:
196
Wireless networking uses the same technology as the radio in your car and the
2. cell phone in your pocket.
T
ANSWER:
NOTES:
REF:
201
204
Fiber-optic cables are much more susceptible to attenuation than copper cables.
4.
F
ANSWER:
NOTES:
REF:
199
Each physical device connected to a network must have a network interface card
5. (NIC).
T
ANSWER:
NOTES:
REF:
211
Repeaters alter the content of the data in the signals that they boost.
6.
F
ANSWER:
NOTES:
REF:
211
195
The Data Link layer of the OSI model uses routing protocols to select optimal
8. paths between two end systems.
F
ANSWER:
NOTES:
REF:
205
214
F
ANSWER:
NOTES:
REF:
197
196
210
213
212
The bit error rate usually increases as the transfer rate decreases.
15.
F
ANSWER:
NOTES:
REF:
196
The normal copper wire that comes into your home is capable of speeds up to 1.5
16. Mbps.
T
ANSWER:
NOTES:
REF:
215
207
Impedance makes the electrical signals weaken as they travel along the wire.
18.
T
ANSWER:
NOTES:
REF:
198
208
The distinction between LANs and WANs is clear and well defined.
20.
F
ANSWER:
NOTES:
REF:
207
Multiple Choice
Identify the letter of the choice that best completes the statement or answers the question.
The Transport layer of the OSI model uses data units called _____.
c. bitgrams
21. a. words
b. datagrams
d. bytegrams
B
ANSWER:
NOTES:
REF:
205
202
196
The _____ layer of the OSI model is responsible for translation, formatting, and
24. syntax selection.
a. Presentation
b. Session
c. Application
d. Data Link
A
ANSWER:
NOTES:
REF:
205
Fiber-optic cables use _____ fibers to guide light pulses along a cable.
c. plastic
25. a. ceramic
b. glass
d. tungsten
B
ANSWER:
NOTES:
REF:
199
217
_____ direct network traffic based on the logical (IP) addresses assigned at the
27. third layer of the OSI stack.
a. Bridges
c. Hubs
b. Routers
d. Gateways
B
ANSWER:
NOTES:
REF:
212
a. gate
b. barricade
c. firewall
d. fence
C
ANSWER:
NOTES:
REF:
212
_____ media are physical media such as copper wire or fiber-optic cable.
c. Undirected
29. a. Directed
b. Guided
d. Oriented
B
ANSWER:
NOTES:
REF:
197
209
A(n) _____ diagram shows the protocol interactions between two entities.
c. timing
31. a. flow
b. assignment
d. hierarchy
C
ANSWER:
NOTES:
REF:
203
a. inductance
b. resistance
c. resonance
d. impedance
A
ANSWER:
NOTES:
REF:
198
Which of the following WAN technologies use the same unguided media as
33. television?
a. DSL
c. cable
b. dial-up
d. satellite
D
ANSWER:
NOTES:
REF:
217
202
195
_____ measures the speed a transmission medium is able to handle in bits per
36. second.
a. Bandwidth
b. Byte capacity
c. Bit capacity
d. Broadwidth
A
ANSWER:
NOTES:
REF:
196
216
The OSI conceptual model for the communication process has _____ discrete
38. layers.
a. four
c. seven
b. five
d. nine
C
ANSWER:
NOTES:
REF:
205
207
215
229
You can directly connect to a National Backbone Provider from your home
2. computer.
F
ANSWER:
NOTES:
REF:
230
SMTP and FTP are two protocols involved with the Internet.
3.
T
ANSWER:
NOTES:
REF:
231
The TCP protocol has provisions for addressing the packets to ensure that they
4. get to the correct place.
F
ANSWER:
NOTES:
REF:
232
The middle part of the IP address identifies the host on the network.
5.
T
ANSWER:
NOTES:
REF:
234
236
Routers check that the data received in the packet is identical to the data that was
7. sent.
F
ANSWER:
NOTES:
REF:
237
High-level protocols such as HTTP and FTP can only be used in the Internet
8. environment.
F
ANSWER:
NOTES:
REF:
239
240
FTP is the protocol that allows Web browsers and Web servers to talk to each
10. other.
F
ANSWER:
NOTES:
REF:
241
241
242
The standard port number for HTTP is 21, and for FTP it is 80.
13.
F
ANSWER:
NOTES:
REF:
243
244
248
250
Normally, HTML pages are dynamic; they change from one request to another.
17.
F
ANSWER:
NOTES:
REF:
250
HTML deals with both the form and content of a Web page.
18.
F
ANSWER:
NOTES:
REF:
252
REF:
252
Search engines use one main method to build a database of Web sites.
20.
F
ANSWER:
NOTES:
REF:
255
Multiple Choice
Identify the letter of the choice that best completes the statement or answers the question.
Your Internet provider maintains a switching center called a _____.
c. cusp
21. a. nexus
b. point-of-presence
d. receive-and-send
B
ANSWER:
NOTES:
REF:
230
231
The _____ protocol establishes a virtual circuit with the destination computer to
23. transmit packets.
a. TCP
c. HTTP
b. IP
d. FTP
A
ANSWER:
NOTES:
REF:
232
Central to the operation of the IP protocol is the IP _____ of both the source and
24. destination.
a. name
c. signifier
b. location
d. address
D
ANSWER:
NOTES:
REF:
233
The total pool of IPv4 addresses is separated into groups, called _____.
c. aggregations
25. a. classes
b. entities
d. clusters
A
ANSWER:
NOTES:
REF:
234
235
Using _____, a packet can just be sent on an alternate line if the desired line is
27. damaged or busy.
a. hubs
c. switches
b. routers
d. linkers
B
ANSWER:
NOTES:
REF:
236
So that packets do not keep bouncing from router to router forever, one of the
28. fields in the IP header is the _____ field.
a. time to live
c. lifetime
b. time to expire
d. expiration
A
ANSWER:
NOTES:
REF:
237
TCP and IP protocols map to Transport, Network, and _____ layers of the OSI
29. model.
a. Presentation
c. Data Link
b. Application
d. Session
D
ANSWER:
NOTES:
REF:
238
The _____ protocol establishes a link from an e-mail client to a mail server.
c. IMAP
30. a. SMTP
b. POP3
d. HTTP
A
ANSWER:
NOTES:
REF:
239
The _____ protocol is used to provide the reliable and efficient transmission of
31. data files.
a. UDP
c. FTP
b. TCP
d. IP
C
ANSWER:
NOTES:
REF:
239
Which of the following computer scientists invented the World Wide Web?
c. Marc Andreesen
32. a. E.F. Codd
b. Tim Berners-Lee
d. Donald Knuth
B
ANSWER:
NOTES:
REF:
241
241
When you type in a URL in the address bar of your browser, you send a _____
34. lookup request to the _____ server at your ISP.
a. POP
c. SND
b. DNS
d. NET
B
ANSWER:
NOTES:
REF:
243
b. city
d. apartment number
D
ANSWER:
NOTES:
REF:
243
244
You can check the network configuration of your computer in Windows by using
37. the _____ command.
a. IPSETUP
c. NETWORK
b. IPCONFIG
d. NETDESIGN
B
ANSWER:
NOTES:
REF:
245
246
HTML and the Web connect one page to another through _____.
c. hyperlinks
39. a. overlinks
b. higherjoins
d. cyberbridges
C
ANSWER:
NOTES:
REF:
250
251
_____ formats content for display in a browser and transfers information via the
41. Web.
a. SGML
c. HTML
b. XML
d. PHP
B
ANSWER:
NOTES:
REF:
253
255
267
A DBMS delegates the task of ensuring data integrity to the operating system.
2.
F
ANSWER:
NOTES:
REF:
271
271
272
NOTES:
REF:
273
274
From a database point of view, first normal form is better than second normal
7. form.
F
ANSWER:
NOTES:
REF:
276
279
281
The third normal form creates columns that are independent of the primary key.
10.
F
ANSWER:
NOTES:
REF:
283
Once a table is in the second normal form, it has for the most part been
11. accurately defined.
F
ANSWER:
NOTES:
REF:
286
288
289
291
T
ANSWER:
NOTES:
REF:
291
291
293
The order of the fields does not have to match that of the defined table structure.
18.
T
ANSWER:
NOTES:
REF:
297
SQL syntax requires the WHERE clause to precede the keyword FROM.
19.
F
ANSWER:
NOTES:
REF:
296-297
In relation to refining searches, the keyword AND indicates that all criteria must
20. be met.
T
ANSWER:
NOTES:
REF:
298
299
Multiple Choice
Identify the letter of the choice that best completes the statement or answers the question.
Data that has been organized and logically related to allow access, retrieval, and
22. use of that data is called a _____.
a. store
c. field
b. database
d. record
B
ANSWER:
NOTES:
REF:
267
269
269
271
271
The set of possible values for each column is called the _____ of that column.
c. image
27. a. domain
b. range
d. codomain
A
ANSWER:
NOTES:
REF:
272
A(n) _____ is a special type of file that occupies its own space and specifies one
28. or more columns that determine how the information stored in a table is
organized.
a. field
c. tab
b. identifier
d. index
D
ANSWER:
NOTES:
REF:
273
When the columns are used to determine the sort order of information they are
29. called _____.
a. markers
c. flags
b. keys
d. tokens
B
ANSWER:
NOTES:
REF:
274
The set of rules that dictates how databases are designed is called _____.
c. customization
30. a. normalization
b. standardization
d. invocation
A
ANSWER:
NOTES:
REF:
276
To put the table into the _____ normal form, a separate row needs to be created
31. for each row-column intersection with more than one value.
a. first
c. third
b. second
d. fourth
A
ANSWER:
NOTES:
REF:
279
A key that is made up of more than one column is called which of the following?
c. aggregate
32. a. joined
b. union
d. composite
D
ANSWER:
NOTES:
REF:
281
A(n) _____ dependency exists when one column is dependent upon another
33. column that is not the primary key.
a. transitive
c. relational
b. dysfunctional
d. associative
A
ANSWER:
NOTES:
REF:
283
A(n) _____ defines how one entity works with or relates to another.
c. relationship
34. a. connection
b. arrangement
d. union
C
ANSWER:
NOTES:
REF:
287
A(n) _____ key is defined as a column in one table that is part of the primary key
35. in another.
a. composite
c. auxiliary
b. secondary
d. foreign
D
ANSWER:
NOTES:
REF:
287
289
292
Which of the following SQL key words indicates that data is not required for a
38. specified column?
a. NULL
c. NOT
b. NOTHING
d. VOID
A
ANSWER:
NOTES:
REF:
293
REF:
293
Which of the following commands can be used to add new rows of data to a
40. table?
a. INCREASE
c. INSERT
b. ADD
d. INCLUDE
C
ANSWER:
NOTES:
REF:
294
296
Which of the following is a valid SQL word used to return data in descending
42. order?
a. BOTTOM
c. DESC
b. OPP
d. REV
C
ANSWER:
NOTES:
REF:
302
T
ANSWER:
NOTES:
REF:
313
314
316
The first address or position in an array starts with the number one (1).
4.
F
ANSWER:
NOTES:
REF:
317
The upper bound of an array initialized to a size of five (5) is position number
5. four (4).
T
ANSWER:
NOTES:
REF:
318
The statement anArray [2] = 5; assigns the number five (5) to the third
6. component of anArray.
T
ANSWER:
NOTES:
REF:
318
319
324
326
A stack is a special form of a list that allows operations such as push and
10. pop.
T
ANSWER:
NOTES:
REF:
328
329
Stacks, like linked lists and arrays, are just memory locations organized into
12. process friendly structures.
T
ANSWER:
NOTES:
REF:
330
A queue is another type of linked list that implements a LIFO storage system.
13.
F
ANSWER:
NOTES:
REF:
331
331
331
333
In a binary tree, the left node always has a value greater than the right node.
17.
F
ANSWER:
NOTES:
REF:
336
340
344
345
The insertion sort is modeled after the manual process of sorting cards.
21.
T
ANSWER:
NOTES:
REF:
345
Multiple Choice
Identify the letter of the choice that best completes the statement or answers the question.
Which of the following can be classified as a data structure?
c. character
22. a. integer
b. array
d. float
B
ANSWER:
NOTES:
REF:
313
In the context of the Java programming language, the _____ keyword tells the
23. computer that a new array is being created.
a. invoke
c. new
b. allocate
d. make
C
ANSWER:
NOTES:
REF:
315
What type of data can be stored in an array generated by the statement, int[ ]
24. aGrades = new int [5]?
a. strings
c. floats
b. doubles
d. integers
D
ANSWER:
NOTES:
REF:
315
With arrays, the _____ is used to specify the distance between memory locations.
c. length
25. a. offset
b. width
d. address
A
ANSWER:
NOTES:
REF:
317
The index or _____ tells the computer which memory cell to access in the array.
c. pointer
26. a. superscript
b. subscript
d. arrow
B
ANSWER:
NOTES:
REF:
318
324
A(n) _____ is a memory cell that contains the address of another memory cell as
28. its data.
a. index
c. pointer
b. token
d. element
C
ANSWER:
NOTES:
REF:
325
330
330
331
331
In order to remove an item from a queue, you would use a _____ operation.
c. requeue
33. a. enqueue
b. dequeue
d. delete
B
ANSWER:
NOTES:
REF:
331
333
334
335
In order to sort data you first need to create a(n) _____ that defines the process
37. for sorting.
a. list
c. stack
b. queue
d. algorithm
D
ANSWER:
NOTES:
REF:
339
The _____ sort starts at the first value in the list and then processes each element
38. looking for the smallest value.
a. merge
c. selection
b. counting
d. radix
C
ANSWER:
NOTES:
REF:
339
The _____ sort starts with the last element in the list and compares its value to
39. that of the item just above it in the list order.
a. bubble
c. heap
b. insertion
d. quick
A
ANSWER:
NOTES:
REF:
340
345
345
Which of the following routines implements two list structures to perform sorting
42. operations?
a. merge sort
c. bubble
b. selection sort
d. quicksort
A
ANSWER:
NOTES:
REF:
345
357
358
The NTFS file management system is used to locate files on a storage medium.
3.
T
ANSWER:
NOTES:
REF:
359
361
With respect to FAT, data is stored in 512-byte sectors on the hard drive and
5. depending on the size of the file, the data might occupy one or more sectors.
T
ANSWER:
NOTES:
REF:
361
With the FAT file management system, deleting a file does not actually remove it
6. from the hard drive. Instead, a hex value of E5h is placed in the first position of
the file name.
T
ANSWER:
NOTES:
REF:
364
364
365
If your hard disk is 10GB or less then you may want to use NTFS because it is
9. more efficient in handling smaller volumes of data.
F
ANSWER:
NOTES:
REF:
367
368
371
364
365
366
368
369
Updating a sequential file requires the entire file to be copied to a new file,
17. modifying the record as it is written to the new file.
T
ANSWER:
NOTES:
REF:
371
The disadvantage of relative file access is that disk space can be wasted if data
18. does not fill the entire record if some of the relative records do not have data.
T
ANSWER:
NOTES:
REF:
371-372
REF:
358
The first Microsoft file system was called the file allocation table.
20.
T
ANSWER:
NOTES:
REF:
359
Multiple Choice
Identify the letter of the choice that best completes the statement or answers the question.
A(n) ____ is the part of the operating system responsible for creating,
21. manipulating, renaming, copying, and removing files to and from storage
devices.
a. cluster
c. overflow area
b. file system
d. hash key
B
ANSWER:
NOTES:
REF:
357
358
____ implies that data is directly read or written anywhere on the disk.
c. Random access
23. a. Sequential access
b. Hashing
d. Collision
C
ANSWER:
NOTES:
REF:
358
The term ____ implies reading and writing data in order, from the beginning.
c. collision
24. a. random access
b. hashing
d. sequential access
D
ANSWER:
NOTES:
REF:
358
A(n) ____ contains a group of the smallest units that can be accessed on a disk.
c. NTFS
25. a. cluster
b. file system
d. FAT
A
ANSWER:
NOTES:
REF:
361
A(n) ____ is a drive or partition on a drive that is formatted with a file system.
c. hash key
26. a. hash algorithm
b. CPU
d. volume
D
ANSWER:
NOTES:
REF:
362
____ occurs when files have clusters scattered in different locations on the
27. storage medium rather than in contiguous locations.
a. Clusterization
c. Hashing
b. Disk fragmentation
d. Disk striping
B
ANSWER:
NOTES:
REF:
363
363
The ____ is used in NTFS to store data about every file and directory on the
29. volume.
a. directory
c. cluster
b. master file table
d. overflow area
B
ANSWER:
NOTES:
REF:
364
A(n) ____ is a storage location that contains data that is treated as either binary
30. or text.
a. cluster
c. file
b. overflow area
d. hash key
C
ANSWER:
NOTES:
REF:
368
____ are more compact and faster to access because the system does not have to
31. convert the data.
a. Binary files
c. Hash files
b. Sequential files
d. Random files
A
ANSWER:
NOTES:
REF:
369
____ file access allows you to mimic the look of a database table by storing
32. information in the file row by row, similar to a database record.
a. Hash
c. Sequential
b. Binary
d. Random
C
ANSWER:
NOTES:
REF:
370
____ is a common method used for accessing data either in a file or a database
33. table through the use of a unique value.
a. Clustering
c. Hashing
b. Disk fragmenting
d. File compression
C
ANSWER:
NOTES:
REF:
372
372
____ occur when the hashing algorithm generates the same relative key for more
35. than one original key value.
a. Clusters
b. Directories
c. Compressions
d. Collisions
D
ANSWER:
NOTES:
REF:
373
An area in a file that is used in case a collision occurs during the hashing
36. algorithm is called a(n) ____.
a. cluster
c. reserved area
b. overflow area
d. random area
B
ANSWER:
NOTES:
REF:
373
The ____ keeps track of which files are using which clusters.
c. hash key
37. a. file allocation table
b. directory
d. random area
A
ANSWER:
NOTES:
REF:
361
____ provides the ability to assign access rights to files and directories.
c. NTFS
38. a. FAT12
b. FAT24
d. FAT32
C
ANSWER:
NOTES:
REF:
365
a. FAT
b. NTFS
c. MFT
d. EFS
B
ANSWER:
NOTES:
REF:
364
361
c. algorithms
d. overflow areas
392
393
The assembly language instruction jnz tests the value of the zero flag maintained
3. by the system.
T
ANSWER:
NOTES:
REF:
394
Variable names in Java can begin with letters, underscores, and numbers.
4.
F
ANSWER:
NOTES:
REF:
404
T
ANSWER:
NOTES:
REF:
407
The term attribute is used to describe the symbols used to manipulate the data
6. contained in variables.
F
ANSWER:
NOTES:
REF:
410
411
415
NOTES:
REF:
416
420
Java implements the selection control structure through the use of the if, if-else,
11. if-else-if, and switch statements.
T
ANSWER:
NOTES:
REF:
430
It is always a good idea to use the switch statement when comparing string data
12. types.
F
ANSWER:
NOTES:
REF:
434
REF:
441
441
441
Typing the following statement at the command prompt will compile the
16. MyProg1.Java file.
java MyProg1.java
F
ANSWER:
NOTES:
REF:
445
A parent class is a generic class from which other classes can be created through
17. the process of inheritance.
T
ANSWER:
NOTES:
REF:
450
NOTES:
REF:
451
The term polymorphism is used to describe an objects ability to use the same
19. expression to denote different operations.
T
ANSWER:
NOTES:
REF:
452
404
448
The Hungarian notation is a variable naming method that gives each variable an
22. identifier at the beginning of the variable name describing the data type contents.
T
ANSWER:
NOTES:
REF:
408
Multiple Choice
Identify the letter of the choice that best completes the statement or answers the question.
A(n) ____ is a collection of statements or steps that solve a problem and need to
23. be converted into a language that the computer understands in order to perform
one or more tasks.
a. algorithm
c. program
b. identifier
d. parameter
C
ANSWER:
NOTES:
REF:
384
384
A(n) ____ is a program included with an executable application that acts as the
25. translator between the program and the computer by converting program
statements one by one into a language the computer understands.
a. IDE
c. constructor
b. interpreter
d. endless loop
B
ANSWER:
NOTES:
REF:
384
A(n) ____ is a program that reads all statements from a program and converts
26. them into a computer language.
a. event
c. compiler
b. object
d. control structure
C
ANSWER:
NOTES:
REF:
384
A(n) ____ is a programming language that resembles more what a computer can
27. understand rather than a human
a. low-level language
c. event handler
b. high-level language
d. postcondition loop
A
ANSWER:
NOTES:
REF:
389
389
389
A(n) ____ reads assembly language code and converts it into machine language.
c. event handler
30. a. control structure
b. assembler
d. identifier
B
ANSWER:
NOTES:
REF:
389
389
The term ____ refers to the spelling and grammar used within a programming
32. language.
a. interpreter
c. declaration
b. syntax
d. event
B
ANSWER:
NOTES:
REF:
392
395
b. endless loop
d. declaration
D
ANSWER:
NOTES:
REF:
404
The storage requirement for the int data type in Java is ____.
c. 6 bytes
35. a. 2 bytes
b. 4 bytes
d. 8 bytes
B
ANSWER:
NOTES:
REF:
406
The process of combining or joining strings into one value is known as ____.
c. nesting
36. a. concatenation
b. instantiation
d. inheritance
A
ANSWER:
NOTES:
REF:
408
409
A
ANSWER:
NOTES:
REF:
445
A(n) ____ is a template or mold used for defining new object types along with
39. their properties and behavior.
a. compiler
c. method
b. event
d. class
D
ANSWER:
NOTES:
REF:
448
A(n) ____ is a self-contained entity that consists of both data and procedures.
c. object
40. a. constructor
b. method
d. parameter
C
ANSWER:
NOTES:
REF:
448
448
B
ANSWER:
NOTES:
REF:
448
448
450
469
One of the main rules of software engineering is that you should document the
2. information that clients give you.
T
ANSWER:
NOTES:
REF:
472
474
User-phobia is the fear that if you include the end user in the design process, the
4. application will be a failure.
T
ANSWER:
NOTES:
REF:
485
486
The project manager is assigned the role of creating and maintaining the database
6. structure.
F
ANSWER:
NOTES:
REF:
487
The database administrator is responsible for writing source code to meet the
7. functional needs of the end user.
F
ANSWER:
NOTES:
REF:
488
The software engineer is responsible for making sure programs function correctly
8. and meet the specified functional requirements set forth in the design document.
F
ANSWER:
NOTES:
REF:
489
Software can be modified to meet the changing needs of the end user.
9.
T
ANSWER:
NOTES:
REF:
470
470
Once you have determined that a database is needed, you should create a data
11. dictionary.
T
ANSWER:
NOTES:
REF:
477
In order to get a head start, you should always begin writing source code while
12. seeking project specification approval.
F
ANSWER:
NOTES:
REF:
482
One of the rules of software engineering is that you should let the user help you
13. design the screens.
T
ANSWER:
NOTES:
REF:
483
One rule of software engineering is that you should be realistic when defining
14. project completion dates.
T
ANSWER:
NOTES:
REF:
483
You should have at least three people in charge of creating and maintaining the
15. databases.
F
ANSWER:
NOTES:
REF:
488
When testing, you should keep a log of the errors encountered during testing and
16. after the release of the application.
T
ANSWER:
NOTES:
REF:
489
Having a signature in the design document does not mean that it can be used as a
17. contract.
F
ANSWER:
NOTES:
REF:
484
The software engineer is responsible for pulling together all the pieces of the
18. project and incorporating them into the design document.
F
ANSWER:
NOTES:
REF:
487
488
473
Multiple Choice
Identify the letter of the choice that best completes the statement or answers the question.
____ is the process of producing software applications.
c. UML
21. a. Database administration
b. Software engineering
d. SDLC
B
ANSWER:
NOTES:
REF:
468
The ____ describes the life of the application, including all of the stages involved
22. in the development, testing, installation, and maintenance of a program.
a. SDLC
c. SLC
b. UML
d. DBA
A
ANSWER:
NOTES:
REF:
468
____ determines whether the project is worth doing, and specifying the
23. advantages and disadvantages of this application.
a. Software specification
c. Scope creep
b. Project collaboration
d. Project feasibility
D
ANSWER:
NOTES:
REF:
468
Testing software to ensure that it meets the software specifications is called ____.
c. rapid prototype
24. a. scope creep
b. software validation
d. incremental development
B
ANSWER:
NOTES:
REF:
468
468
A(n) ____ is a standard or typical example that gives the end user a good idea of
26. what they will see when their application is completed.
a. flowchart
c. data dictionary
b. prototype
d. design document
B
ANSWER:
NOTES:
REF:
469
469
In the ____ model of software development, the developer writes a program and
28. continues to modify it until the system is functional.
a. rapid prototype
c. waterfall
b. incremental
d. build and fix
D
ANSWER:
NOTES:
REF:
469
With ____ tools are available that allow end users to work with prototypes of the
29. screens and other interfaces.
a. incremental development
c. build and fix
b. rapid prototyping
d. waterfall
B
ANSWER:
NOTES:
REF:
469
NOTES:
REF:
472
473
The UML ____ diagram shows how one class communicates with another by
32. sending messages back and forth.
a. class
c. collaboration
b. sequence
d. sequence
D
ANSWER:
NOTES:
REF:
473
A(n) ____ diagram shows the events that occur within a use case or within an
33. objects behavior.
a. class
c. collaboration
b. activity
d. use case
B
ANSWER:
NOTES:
REF:
474
A(n) ____ is a combination of symbols and text that provide a visual description
34. of a process.
a. class
c. object
b. flowchart
d. component
B
ANSWER:
NOTES:
REF:
480
____ occurs when new changes are continually added to a project thus changing
35. the proposed completion date so that the project is never completed, but is
instead in constant improvement mode.
a. SDLC
c. Scope creep
b. Prototyping
d. Testing
C
ANSWER:
NOTES:
REF:
486
The ____ is the leader of the team and is responsible for choosing the right
36. players for the right positions.
a. database administrator
c. client
b. project manager
d. programmer
B
ANSWER:
NOTES:
REF:
486
The ____ is created by reviewing the screens and reports the end user would like
37. included in the application and determining which fields are essential to the
application.
a. use case
c. class diagram
b. data dictionary
d. sequence diagram
B
ANSWER:
NOTES:
REF:
487
The ____ is the interface between the testers, developers, and end users during
38. the creation and early release cycles of the product.
a. project manager
c. database administrator
b. programmer
d. customer relations
representative
D
ANSWER:
NOTES:
REF:
490
The ____ diagram shows how system elements work together to accomplish the
39. systems objectives.
a. activity
c. collaboration
b. component
d. deployment
C
ANSWER:
NOTES:
REF:
474
Software engineers and end users can both use the ____ to achieve a clearer
40. understanding of the data available for use in reports, screens, file transfers, and
other data operations.
a. data dictionary
c. sequence diagram
b. class diagram
d. use case
A
ANSWER:
NOTES:
REF:
477
504
The social interaction that preys on human gullibility, sympathy, or fear to take
2. advantage of the target is known as hacktivism.
F
ANSWER:
NOTES:
REF:
506
The term dumpster diving refers to an attack on a system that can include
3. snooping, eavesdropping, and interception.
F
ANSWER:
NOTES:
REF:
507
508
The term vulnerability refers to the sensitivity of information and the skill level
5. needed by the attacker to threaten that information.
T
ANSWER:
NOTES:
REF:
508
510
518
521
REF:
523
Copyright protects the expression of the idea and not the idea itself.
10.
T
ANSWER:
NOTES:
REF:
525
A trade secret is a government grant that gives the sole right to make, use, and
11. sell an invention for a specified period of time.
F
ANSWER:
NOTES:
REF:
526
Reverse engineering occurs when someone tries to figure out the design of a
12. program or device by taking it apart and analyzing individual components.
T
ANSWER:
NOTES:
REF:
526
Repudiation is the science that studies the relationship between people and
13. machines.
F
ANSWER:
NOTES:
REF:
536
NOTES:
REF:
538
Cookies are related to and sometimes used in conjunction with spyware, but
15. considered different because the user is assumed to be aware of their use.
T
ANSWER:
NOTES:
REF:
539
A modification attack denies legitimate users from using the system or from
16. gaining access to information.
F
ANSWER:
NOTES:
REF:
508
An Acceptable Use Policy defines who can use the company computers and
17. networks, when, and how.
T
ANSWER:
NOTES:
REF:
513
514
Bits of code that uniquely identify a particular virus is called a virus signature.
19.
T
ANSWER:
NOTES:
REF:
517
517
Multiple Choice
Identify the letter of the choice that best completes the statement or answers the question.
A(n) ____ is an unwelcome system intruder with malicious intent.
c. cracker
21. a. honey pot
b. software engineer
d. spammer
C
ANSWER:
NOTES:
REF:
502
The term ____ is used to describe the process of subverting the phone system in
22. order to get free service.
a. phreaking
c. biometrics
b. honey pot
d. callback
A
ANSWER:
NOTES:
REF:
502
b. Trojan horse
d. directed hacker
C
ANSWER:
NOTES:
REF:
502
502
A(n) ____ is an amateur hacker that simply uses the hacking tools that have been
25. developed by others.
a. cracker
c. script kiddie
b. reverse engineer
d. Trojan horse
C
ANSWER:
NOTES:
REF:
503
503
d. Phreakers Way
B
ANSWER:
NOTES:
REF:
503
____ are shortcuts into programs created by system designers to facilitate system
28. maintenance but used and abused by crackers.
a. Checksums
c. Backdoors
b. Heuristics
d. Bots
C
ANSWER:
NOTES:
REF:
504
A(n) ____ occurs when a program tries to place more information into a memory
29. location than it can handle.
a. access attack
c. virus attack
b. buffer overflow
d. modification attack
B
ANSWER:
NOTES:
REF:
504
Code designed to breach your system security and threaten your digital
30. information is known as ____.
a. malicious code
c. honey pots
b. digital certificates
d. patents
A
ANSWER:
NOTES:
REF:
505
A(n) ____ is an uninvited guest program on your computer with the potential to
31. damage files and the operating system.
a. proxy firewall
c. virus
b. sniffer
d. DMZ
C
ANSWER:
NOTES:
REF:
505
A(n) ____ is a software program that can roam the Internet autonomously.
c. honey pot
32. a. cookie
b. digital certificate
d. bot
D
ANSWER:
NOTES:
REF:
505
A(n) ____ is a software program that allows the user to listen in on network
33. traffic.
a. Trojan horse
c. worm
b. sniffer
d. honey pot
B
ANSWER:
NOTES:
REF:
508
Transforming original data into coded data so that only authorized parties can
34. interpret it is known as ____.
a. authentication
c. piracy
b. packet filtering
d. encryption
D
ANSWER:
NOTES:
REF:
510
516
A(n) ____ firewall establishes a new link between each packet of information
36. and its destination.
a. proxy
c. biometric
b. digital
d. packet-filtering
A
ANSWER:
NOTES:
REF:
522
____ are the moral principles for judging right or wrong behavior held by an
37. individual or group.
a. Digital certificates
c. Ethics
b. Laws
d. Ergonomics
C
ANSWER:
NOTES:
REF:
531
REF:
532
____ is a catchall phrase for programs that sit on your computer, with or without
39. your knowledge, observing your computer activities.
a. Cookie
c. Spyware
b. Encryption
d. Social engineering
C
ANSWER:
NOTES:
REF:
539
A(n) ____ is characterized by three things: targets that might be attacked, agents
40. or attackers, and events.
a. risk
c. copyright
b. callback
d. threat
D
ANSWER:
NOTES:
REF:
509
CS14-practice
True/False
Indicate whether the sentence or statement is true or false.
With the Von Neumann machine, instruction execution is carried out by a central
1. processing unit that contains a control unit, an arithmetic logic unit, and registers.
T
ANSWER:
NOTES:
REF:
554
The CPU has the ability to accept input from and provide output to external
2. devices.
T
ANSWER:
NOTES:
REF:
554
554
556
556
556
557
561
Optical storage is more stable than magnetic storage and is unaffected by outside
9. magnetic influences.
T
ANSWER:
NOTES:
REF:
561
DVDs have high densities and can store information in multiple layers and on
10. multiple sides of the platter.
T
ANSWER:
NOTES:
REF:
561
561
Current hard disk technology allows for hard drives with over 500 GB of
12. capacity.
T
ANSWER:
NOTES:
REF:
562
562
NOTES:
REF:
562
One of the problems with MRAM is its high power requirement to read and write
15. data.
F
ANSWER:
NOTES:
REF:
564
564
Some types of polymer memory can only be written once, while others can be
17. rewritten many thousands of times.
T
ANSWER:
NOTES:
REF:
565
565
Input and output devices increase the speed of the typical computer.
19.
F
ANSWER:
NOTES:
REF:
554
557
Multiple Choice
Identify the letter of the choice that best completes the statement or answers the question.
____ instructions are processed sequentially by fetching an instruction from
21. memory, and then executing that instruction.
a. Binary
c. DRAM
b. MRAM
d. USB
A
ANSWER:
NOTES:
REF:
554
555
D
ANSWER:
NOTES:
REF:
556
A specialized computer designed to record and play back video content from
24. cable and satellite sources is called a(n) ____.
a. expert system
c. quantum computer
b. digital video recorder
d. robot
B
ANSWER:
NOTES:
REF:
559
____ is a method of splitting a laser beam and using a device called a spatial light
25. modulator to store full pages of information in layers on a crystal material.
a. Fuzzy logic
c. Holographic storage
b. Pattern recognition
d. Speech recognition
C
ANSWER:
NOTES:
REF:
561
562
a. USB cache
b. USB port
c. USB disk
d. USB drive
D
ANSWER:
NOTES:
REF:
563
Which of the following terms describes memory that uses the polarization of
28. microscopic magnetic layers to store ones and zeros that remain after the power
source is removed?
a. DRAM
c. ROM
b. MRAM
d. SRAM
B
ANSWER:
NOTES:
REF:
564
568
____ is a superset of conventional logic that has been extended to handle the
30. concept of partial truth.
a. Neural networks
c. Fuzzy logic
b. Robotics
d. Speech recognition
C
ANSWER:
NOTES:
REF:
568
____ are well suited for applications such as visual speech recognition
31. applications.
a. DVRs
c. Turing tests
b. Quantum computers
d. Neural networks
D
ANSWER:
NOTES:
REF:
569
A(n) ____ is a computer program that simulates the judgement and behavior of a
32. human or an organization that has expert knowledge and experience in a
particular field.
a. flash memory
c. expert system
b. neural network
d. USB drive
C
ANSWER:
NOTES:
REF:
572
Telephone support and hot lines, such as a poison control center, can make use of
33. ____.
a. expert systems
c. SDRAM
b. MRAM
d. ROM
A
ANSWER:
NOTES:
REF:
572
____ processing involves computer applications that can recognize and interact
34. with natural language text.
a. Assembly language
c. High-level language
b. Machine language
d. Natural language
D
ANSWER:
NOTES:
REF:
573
The science of ____ is primarily concerned with the mechanics and electronics
35. that are used to carry out the results of the other areas of artificial intelligence.
a. fuzzy logic
c. pattern recognition
b. robotics
d. natural language processing
B
ANSWER:
NOTES:
REF:
573
It is thought that each neuron in the brain may have as many as connections to
36. adjacent neurons.
a. 10
c. 10,000
b. 100
d. 1,000,000
C
ANSWER:
NOTES:
REF:
569
571
NOTES:
REF:
559
559
562