of 30 /30
CHƯƠNG TRÌNH ĐÀO TẠO CỬ NHÂN QUẢN TRỊ KINH DOANH QUỐC TẾ Website: www.griggs.edu.vn Email: INTRODUCTION TO COMPUTER TEST BANK Time allocated: 120 minutes. Chapter 6 Inside the System Unit 1) Hardware performance: A) is independent of the operating system that is installed on the computer. B) is measured as the exact speed of the processor. C) refers to how fast the computer can perform the functions of input, processing, output, and storage. D) is not affected by components that do not match each other. Answer: C Diff: 2 Reference: Chapter Introduction 2) A byte: A) is the equivalent of eight binary digits. B) represents one digit in the decimal numbering system. C) is the smallest unit of information that a computer can process. D) can be compared to the state of one light switch being either on or off. Answer: A Diff: 2 Reference: How Computers Represent Data 3) Computers count with ________ numbers. A) regular B) binary 1

nguyen-thanh-tu
• Category

Documents

• view

5.729

2

TAGS:

Embed Size (px)

Transcript of COMPUTER_mini Test Bank 6, 7, 8, 9, 14 (1)

CHƯƠNG TRÌNH ĐÀO TẠO CỬ NHÂN QUẢN TRỊ KINH DOANH QUỐC TẾWebsite: www.griggs.edu.vn Email: [email protected]

INTRODUCTION TO COMPUTER TEST BANK

Time allocated: 120 minutes.

Chapter 6 Inside the System Unit

1) Hardware performance:A) is independent of the operating system that is installed on the computer.B) is measured as the exact speed of the processor.C) refers to how fast the computer can perform the functions of input, processing, output, and storage.D) is not affected by components that do not match each other.Answer: CDiff: 2Reference: Chapter Introduction

2) A byte:A) is the equivalent of eight binary digits.B) represents one digit in the decimal numbering system.C) is the smallest unit of information that a computer can process.D) can be compared to the state of one light switch being either on or off.Answer: ADiff: 2Reference: How Computers Represent Data

3) Computers count with ________ numbers.A) regularB) binaryC) decimalD) digitalAnswer: BDiff: 2Reference: How Computers Represent Data

4) In the binary numbering system, one binary digit is called a:

1

A) byte.B) character.C) word.D) bit.Answer: DDiff: 1Reference: How Computers Represent Data

5) Which of the following components would NOT be found inside the system unit?A) MotherboardB) USB portC) Power supplyD) Cooling fanAnswer: BDiff: 1Reference: Inside the System Unit

6) In the strictest sense of the term, the ________ contains the CPU.A) system unitB) unit frameC) motherboardD) computing platformAnswer: CDiff: 1Reference: Inside the System Unit

7) The central processing unit (CPU):A) plays a minimal role in processing data.B) is different from a microprocessor.C) is a fairly simple device.D) is an integrated chip capable of processing signals.Answer: DDiff: 1Reference: The CPU: The Microprocessor

8) A CPU's word size is important because it determines which ________ the CPU can use.A) application softwareB) input devicesC) disk storageD) operating systemAnswer: DDiff: 3Reference: The CPU: The Microprocessor

9) The I/O bus extends the internal pathways beyond the boundaries of the microprocessor to

2

communicate with:A) the operating system.B) memory.C) I/O devices.D) stored files.Answer: CDiff: 2Reference: The Chipset and the Input/Output Bus

10) RAM stands for:A) rapidly accessed memory.B) random access memory.C) reliable associated memory.D) repeated auxiliary memory.Answer: BDiff: 1Reference: Memory

11) Which of the following types of memory is erased when the computer is turned off?A) RAMB) ROMC) REMD) RIMAnswer: ADiff: 1Reference: Memory

12) Which of the following types of memory is NOT erased when the computer is turned off?A) RAMB) ROMC) REMD) RIMAnswer: BDiff: 1Reference: Memory

13) The RJ-45 connector looks like a telephone jack and is used to connect to a:A) network.B) sound card.C) keyboard.D) mouse.Answer: ADiff: 1Reference: Connectors and Ports

14) A(n) ________ is the smallest piece of information with which a computer can work.Answer: bit

3

Diff: 1Reference: How Computers Represent Data

15) Because a computer uses direct current (DC) and wall outlets use alternating current (AC), a(n) ________ is needed to convert the current.Answer: power supplyDiff: 1Reference: Inside the System Unit

16) The ________ is the large printed circuit board that holds the computer's important components such as the microprocessor.Answer: motherboardDiff: 1Reference: What's on the Motherboard?

17) The ________ switch is used to restart your computer.Answer: resetDiff: 1Reference: The Front Panel

Chapter 7 Input/Output & Storage

18) Which of the following is still the most common method for data entry?A) MicrophoneB) StylusC) KeyboardD) ScannerAnswer: CDiff: 1Reference: Keyboards

19) Which key or key combination is typically used to cancel the current operation?A) BackspaceB) Ctrl + DeleteC) EndD) EscAnswer: DDiff: 2Reference: Keyboards

20) In a cathode-ray tube monitor, which three colors are combined to produce various shades?A) Black, white, and grayB) Blue, yellow, and greenC) Red, green, and blueD) Yellow, blue, and greenAnswer: CDiff: 2Reference: Monitors

4

21) Which of the following is NOT a flat-panel display technology?A) CRTB) gas-plasmaC) TFTD) FEDAnswer: ADiff: 2Reference: Monitors

22) Which type of printer is inexpensive and produces excellent color output?A) LaserB) InkjetC) PlotterD) Thermal transferAnswer: BDiff: 1Reference: Printers

23) Which of the following is NOT a reason for using storage rather than memory to hold data and information?A) Storage devices are nonvolatile.B) Storage devices are inexpensive compared to RAM.C) Storage devices traditionally have faster access times than RAM.D) There are limitations to the size of RAM.Answer: CDiff: 2Reference: Memory versus Storage

24) Demand for storage has:A) increased tremendously.B) decreased.C) remained flat.D) only minimally increased.Answer: ADiff: 2Reference: Storage: Holding Data for Future Use

25) A common reason for using hard disk partitions in a computer system is:A) a different partition can be used for each application software product.B) partitions enable the computer to boot different operating systems.C) hard disks over 1 GB in capacity must be partitioned due to their size.D) partitioned hard disks have a faster access time.Answer: BDiff: 2Reference: Hard Disk Drives

5

26) With magnetic storage devices, an electromagnet that moves across the surface of a disk and records information is called a:A) read/write head.B) access head.C) read/write arm.D) electromagnetic sensor.Answer: ADiff: 2Reference: Hard Disk Drives27) A flash drive is a type of storage that uses what type of circuitry?A) Solid-stateB) Liquid crystalC) SemiconductorD) VirtualAnswer: ADiff: 3Reference: Flash Drives and Storage

28) Which of the following statements best describes the storage capability of a CD-ROM disc?A) It can be written to once by the user, but then can only be read.B) It can be read many times by the user, but never written to.C) It can be written to over and over, with new data overwriting previous content.D) It can be read only once by the user, such as during a software installation.Answer: BDiff: 1Reference: CD and DVD Technologies

29) What is the maximum storage capacity for a DVD?A) 1.5 GBB) 3.7 GBC) 17 GBD) 25 GBAnswer: CDiff: 3Reference: CD and DVD Technologies

30) You enter data and instructions into computer memory by using a(n) ________ device.Answer: inputDiff: 1Reference: Input Devices: Giving Commands

31) A(n) ________ is a device that has alphabetic, numeric, punctuation, and control keys.Answer: keyboardDiff: 1Reference: Keyboards

6

32) A(n) ________ is an input device that is used to convert sound input into electronic signals for a computer.Answer: microphoneDiff: 1Reference: Additional Input Devices

33) A(n) ________ is an input device that can duplicate anything that is printed on a sheet of paper.Answer: scannerDiff: 1Reference: Additional Input Devices

34) Printed output is also referred to as a(n) ________.Answer: hard copyDiff: 1Reference: Monitors

35) A(n) ________ device is computer hardware that does not lose its data when the power is shut off.Answer: storageDiff: 1Reference: Storage: Holding Data for Future Use

36) ________ is another term for primary storage.Answer: Computer memoryDiff: 2Reference: Hard Disk Drives

37) ________ storage devices use tightly focused laser beams to detect microscopic data patterns.Answer: OpticalDiff: 1Reference: CD and DVD Technologies

Chapter 8 Networks: Communicating and Sharing Resources

38) Which of the following is NOT a network communications device?A) RouterB) SwitchC) LAND) NICAnswer: CDiff: 2Reference: Network Fundamentals

7

39) A small computer classroom consisting of 20 workstations and a laser printer would use a ________ area network.A) limitedB) lineC) localD) littleAnswer: CDiff: 2Reference: Network Fundamentals

40) What is the largest wide area network (WAN)?A) United States GovernmentB) NATOC) InternetD) International Banking SystemAnswer: CDiff: 2Reference: Network Fundamentals

41) When a computer is connected to a network, it is called a:A) communications device.B) router.C) peripheral.D) client.Answer: DDiff: 2Reference: Network Fundamentals

42) Which network device has the capability to determine the best path to transmit data and determine alternative pathways?A) PathfinderB) RouterC) DirectorD) SwitchAnswer: BDiff: 2Reference: Network Fundamentals

43) People use networks to share data and:A) resources.B) modems.C) routers.D) switches.

8

45) A home network is an example of:A) a WAN.B) a LAN.C) a MAN.D) All of the above.Answer: BDiff: 2Reference: Local Area Networks

46) A local area network (LAN) in which all the computers are equals is called a(n) ________ network.A) client/serverB) peer-to-peerC) equal resourceD) equal sharingAnswer: BDiff: 1Reference: Peer-to-Peer Networks

47) P2P networks are often used for what type of networks?A) Small businessesB) Educational institutionsC) CorporationsD) Government agenciesAnswer: ADiff: 1Reference: Peer-to-Peer Networks

48) The term network topology refers to the:A) type of Internet connections available to users of the network.B) type of network operating system used on the file server.C) physical layout of a local area network.D) contention-management strategy used to resolve collisions.Answer: C

9

Diff: 2Reference: LAN Topologies

49) Which protocol does Ethernet use?A) TCP/IPB) IPC) OSID) CSMA/CDAnswer: DDiff: 1Reference: LAN Protocols

50) A protocol suite specifies how the network functions, or its:A) network suite.B) network architecture.C) network package.D) network configuration.Answer: BDiff: 2Reference: LAN Protocols

51) Because of their complexity, networks use an architecture that is divided into separate network:A) modules.B) elements.C) levels.D) layers.Answer: DDiff: 2Reference: LAN Protocols

52) The protocols in each network layer define how each layer passes ________ to each other.A) dataB) acknowledgementsC) switchesD) stacksAnswer: ADiff: 2Reference: LAN Protocols

53) Which type of media is used to connect today's Ethernet computers?A) Coaxial cableB) Phone linesC) Microwave signalsD) Twisted-pair wireAnswer: D

10

Diff: 2Reference: LAN Protocols

54) Which LAN standard is widely used for both large and small businesses?A) EthernetB) BiznetC) LocalTalkD) Category 5Answer: ADiff: 2Reference: LAN Protocols55) Which type of network requires an access point?A) EthernetB) Wi-FiC) NovellD) Packet-switchingAnswer: BDiff: 1Reference: Local Area Networks

56) Which feature enables the strongest Wi-Fi encryption protection?A) WDDIB) WAPC) WEPD) WPAAnswer: DDiff: 2Reference: LAN Protocols

57) What is the name for the high-capacity transmission lines that carry WAN traffic?A) Coaxial cablesB) BackbonesC) CoresD) NegotiatorsAnswer: BDiff: 1Reference: Backbones

58) A(n) ________ is comprised of several linked computer systems exchanging and sharing data and resources.Answer: networkDiff: 1Reference: Network Fundamentals

59) Network ________ are essential to the efficient management of networks.Answer: administrators

11

Diff: 2Reference: Network Fundamentals

12

60) ________ area networks use cables, radio waves, or infrared transmissions to connect computers and peripherals devices.Answer: LocalDiff: 1Reference: Network Fundamentals

61) ________ area networks use long-distance transmission media to connect computers and peripheral devices that are separated by a few or thousands of miles.Answer: WideDiff: 1Reference: Network Fundamentals

62) A networked computer is called a(n) ________.Answer: client or nodeDiff: 2Reference: Network Fundamentals

63) A(n) ________ is used to connect two or more networks.Answer: routerDiff: 2Reference: Network Fundamentals

64) A(n) ________ LAN uses radio waves so that users can remain connected to the network as they move about in the building.Answer: wirelessDiff: 1Reference: Local Area Networks

65) A typical corporate or educational LAN is called a(n) ________ network.Answer: client/serverDiff: 1Reference: Client/Server Networks

66) The standards that allow network-connected components to communicate with each other are called ________.Answer: protocolsDiff: 1Reference: LAN Protocols

67) Network protocols are fixed, formalized exchanges that specify how dissimilar network components can establish ________.Answer: communicationDiff: 2Reference: LAN Protocols

13

68) A(n) ________ is a unit of data with a fixed size.Answer: packetDiff: 1Reference: LAN Protocols

69) The wireless LAN standard is referred to as ________.Answer: Wi-FiDiff: 1Reference: LAN Protocols

70) The Internet protocol suite is referred to as ________.Answer: TCP/IPDiff: 1Reference: WAN Protocols

71) Every computer on the Internet must have a(n) ________.Answer: Internet address or IP addressDiff: 2Reference: WAN Protocols

72) When ________ switching is used, data is transmitted over a physical end-to-end circuit between the sending and receiving computers.Answer: circuitDiff: 2

Chapter 9 Privacy, Crime, & Security

73) An individual's ability to restrict or eliminate the collection, use, and sale of confidential personal information is known asA) basic rights.B) privacy.C) confidentiality.D) cyber-trust.Answer: BDiff: 2Reference: Privacy in Cyberspace

74) The ability to convey a message without disclosing your name or identity is known as:A) privacy.B) confidentiality.C) anonymity.D) cyber-blocking.Answer: CDiff: 2Reference: Technology and Anonymity

14

75) What is the best definition of a cookie?A) It is a plain-text file written to your hard disk by a Web site you visit.B) It is a virus appended to an online shopping transaction.C) It is a file containing consumer information sold by an online store to a marketing company.D) It is an unsolicited advertisement that pops up on your computer.Answer: ADiff: 2Reference: Cookies

76) ________ allows an employer to observe employee phone calls, e-mails, and Web browsing.A) Employee watchingB) Employee monitoringC) Worker watchingD) Worker monitoringAnswer: BDiff: 1Reference: Protecting Your Privacy

77) In which type of attack does the attacker poses as a legitimate company in an e-mail or Web site?A) PhishingB) PhreakingC) SpiffingD) SpyingAnswer: ADiff: 1Reference: Types of Computer Crime

78) This type of software collects your personal information, monitors your Web surfing habits, and distributes this information to a third party.A) Popup-wareB) Advertisement softwareC) SpywareD) MalwareAnswer: CDiff: 1Reference: Types of Computer Crime

79) Many computer viruses are spread by:A) CDs and DVDs.B) e-mail attachments.C) LAN and WAN connected computers.D) software downloaded from the Internet.Answer: B

15

Diff: 1Reference: Types of Computer Crime

80) Which type of rogue program is disguised as a useful program but contains hidden instructions to perform a malicious task?A) Trojan horseB) AdwareC) Spartan horseD) Mal-wormAnswer: ADiff: 1Reference: Types of Computer Crime

81) An Internet ________ attack occurs when an Internet server is purposely overloaded so that it cannot process legitimate transmissions.A) denial of serviceB) mailing listC) Trojan horseD) wormAnswer: ADiff: 1Reference: Types of Computer Crime

82) A ________ is a program that does NOT have to be executed in order to propagate over a network.A) time bombB) macro virusC) Trojan horseD) wormAnswer: DDiff: 1Reference: Types of Computer Crime

83) What is the best definition of a computer hacker?A) A hacker is a person who investigates a computer system to understand both its full capabilities and vulnerabilities.B) A hacker is a criminal who invades computer systems to obtain information or money.C) A hacker is a slang term for a professional programmer.D) A hacker is a person who is highly skilled in computer programming but has had no formal education.Answer: ADiff: 2Reference: Meet the Attackers

84) Firewalls are used to:A) check for viruses on a company's network.B) eavesdrop on employee e-mail.

16

C) restrict outsiders from accessing internal data.D) prevent employees from sending e-mail beyond the confines of the network.Answer: CDiff: 2Reference: Protecting Your Computer System

85) What is the study of converting information into encoded or scrambled formats called?A) PaleontologyB) CryptographyC) EpistemologyD) NumerologyAnswer: BDiff: 1Reference: The Encryption Debate

86) ________ refers to the capability of sending a message without disclosing your identity.Answer: AnonymityDiff: 1Reference: Technology and Anonymity

87) Spector is a software application that is used for ________.Answer: employee monitoringDiff: 2Reference: Protecting Your Privacy

88) The term malware is short for ________.Answer: malicious softwareDiff: 2Reference: Types of Computer Crime

89) Code hidden within a program that damages or destroys files is called a computer ________.Answer: virusDiff: 1Reference: Types of Computer Crime

90) If you play a game downloaded from the Internet and find out that it harmed your computer system, you may have been the victim of a destructive program called a(n) ________.Answer: Trojan horseDiff: 1Reference: Types of Computer Crime

91) A DoS attack is a denial of ________ attack.Answer: serviceDiff: 2Reference: Types of Computer Crime

92) DDoS is an acronym for ________.Answer: distributed denial of service

17

Diff: 2Reference: Types of Computer Crime

93) A DoS attack is also called ________.Answer: syn floodingDiff: 2Reference: Types of Computer Cri

94) ________ are devices the size of a credit card with their own internal memories.Answer: Smart cardsDiff: 2Reference: Protecting Your Computer System

95) A(n) ________ is a computer program that permits a user on the internal network to access the Internet but severely restricts transmissions from the outside.Answer: firewallDiff: 2Reference: Protecting Your Computer System

Chapter 14 Enterprise Computing

96) Using technology, information systems, and computers within an organization or business is called ________ computing.A) enterpriseB) integratedC) large-scaleD) massively integratedAnswer: ADiff: 1Reference: Introduction

97) A(n) ________ is a business or any large organization.A) enterpriseB) integrated firmC) large-scale firmD) corporate firmAnswer: ADiff: 1Reference: Introduction

98) Business processes are activities that:A) determine the financial health of a company.B) have definable output and value to customers.C) use the company information system.D) are monitored by management as they supervise employees.

18

19

99) Which of the following is NOT an internally focused system?A) AccountingB) FinanceC) SalesD) Human resourcesAnswer: CDiff: 2Reference: Business Processes and Activities

101) Which of the following is NOT a feature of an enterprise system?A) It stores company data in a central repository.B) It offers users a common interface to the system.C) It allows data to be shared by company personnel.D) It requires all employees to use the same type of computer and operating system.Answer: DDiff: 2Reference: Enterprise Systems

102) Which is NOT a benefit of enterprise systems?A) Accurate and on-time shipmentsB) Minimize costsC) Interconnect all suppliersD) Increase profitabilityAnswer: CDiff: 2Reference: Enterprise Systems

20

106) A(n) ________ is a written plan that specifies steps to be taken in the event of an emergency.A) emergency planB) backup planC) disaster recovery planD) contingency planAnswer: CDiff: 2Reference: Applying Technology in the Enterprise

107) Which of the following types of software is used to integrate all facets of a business into a single computer system?A) Customer Relationship Management (CRM)B) Enterprise Resource Planning (ERP)C) Microsoft Office XPD) Sales Force Automation (SFA)Answer: BDiff: 2Reference: Enterprise Resource Planning

108) The purpose of customer relationship management (CRM) software is to:A) provide a secure online shopping experience.B) automate billing and collection services.C) pursue a new customer base by analyzing national consumer behavior.D) retain and satisfy current customers.Answer: DDiff: 2Reference: Customer Relationship Management

21

109) Which of the following is NOT a CRM phase?A) Customer acquisitionB) Customer retentionC) Customer enhancementD) Customer releaseAnswer: DDiff: 2Reference: Customer Relationship Management

110) Which tool is used interchangeably with CRM?A) Supply chain managementB) Call center marketingC) Sales force automationD) Human resource managementAnswer: CDiff: 2Reference: Sales Force Automation

111) The storage capacity of network-attached storage (NAS) devices ranges up to:A) hundreds of megabytes.B) tens of petabytes.C) millions of bytes.D) thousands of kilobytes.Answer: BDiff: 3Reference: Network-Attached Storage

112) Which of the following is NOT true about company intranets?A) Intranet Web sites look similar to traditional Internet sites.B) Firewalls control access to intranets from the outside.C) Intranets can only be accessed by authorized users within an organization.D) Intranets cannot use TCP/IP protocols.Answer: DDiff: 2Reference: Intranets and Extranets

113) A Virtual Private Network (VPN) uses:A) a company extranet with limited external access for authorized users.B) a public network to lease transmission lines.C) leased lines to provide security.D) a virtual reality network simulator.Answer: CDiff: 3Reference: Virtual Private Networks

22

114) SOHO stands for:A) small office/home office.B) separate office/home office.C) standard operation/hierarchical output.D) sequential output/homogeneous operation.Answer: ADiff: 2Reference: Teleconferencing

115) What is carrying out business activities by using telecommunications and computer equipment by two or more people at distant locations called?A) MultiplexingB) TeleconferencingC) InterfacingD) NetworkingAnswer: BDiff: 1Reference: Teleconferencing

116) The greatest drawback to using video teleconferencing is the:A) need for high bandwidth.B) lack of quality video cameras.C) poor quality of the monitors.D) poor audio component of the video signal.Answer: ADiff: 2Reference: Teleconferencing

117) What is the process in which documents and data are sent to the next person who needs them?A) Facsimile transmissionB) Group dynamicsC) Workgroup relayingD) Workflow automationAnswer: DDiff: 1Reference: Workgroup Computing

118) A(n) ________ refers to a business or any other large organizationAnswer: enterpriseDiff: 1Reference: Introduction

119) A(n) ________ is a situation in which an organization has a superior position over the companies with which it competes.Answer: competitive advantageDiff: 2Reference: Business Processes and Activities

23

120) ________ are activities that have an identifiable output and value to the organization's customers.Answer: Business processesDiff: 2Reference: Business Processes and Activities

121) ________ systems are information systems that enable companies to integrate information and applications across operations on a company-wide basis.Answer: EnterpriseDiff: 2Reference: Enterprise Systems

122) In a(n) ________ structure, a company's IT department manages all technology and employees use the same standardized information systems.Answer: centralizedDiff: 2Reference: Centralized versus Distributed Structures

123) ________ uses information technology to bring about major organization changes as well as cost savings.Answer: Business process reengineering or BPRDiff: 3Reference: Business Process Reengineering

124) Improving existing processes and optimizing assets by managing the entire life cycle of business processes is called ________ .Answer: business process management or BPMDiff: 3Reference: Business Process Management

125) A(n) ________ plan contains detailed instructions that identify alternative emergency computing facilities.Answer: disaster recoveryDiff: 1Reference: Applying Technology in the Enterprise

126) Using telecommunications and computer equipment to work from home and still connect to the office is called ________.Answer: telecommutingDiff: 1Reference: Telecommuting

24