Mid-Term #1 Solutions



Similar documents
CMPE 003: Computer Concepts Exam #1 Review of Chapters 1-3, 8, and the appendix

Kernel. What is an Operating System? Systems Software and Application Software. The core of an OS is called kernel, which. Module 9: Operating Systems

Test 1 Review Chapter 1 What is a computer? 1. Definition of computer 2. Data and information. Emphasize that data is processed into information. 3.

Computers: Tools for an Information Age

CHAPTER 11: COMPUTERS AT WORK, SCHOOL, AND HOME

Lecture 6: Operating Systems and Utility Programs

Chapter 3. Operating Systems

Why your own server space? Why should you set it up?

Lab Configuring Access Policies and DMZ Settings

Kerio Control. Step-by-Step Guide. Kerio Technologies

Applications Software: Getting the Work Done. Chapter 2

Oct 15, Internet : the vast collection of interconnected networks that all use the TCP/IP protocols

Network Configuration Settings

How To Connect To Bloomerg.Com With A Network Card From A Powerline To A Powerpoint Terminal On A Microsoft Powerbook (Powerline) On A Blackberry Or Ipnet (Powerbook) On An Ipnet Box On

EUCIP - IT Administrator. Module 2 Operating Systems. Version 2.0

Lab Developing ACLs to Implement Firewall Rule Sets

Click to view Web Link, click Chapter 8, Click Web Link from left navigation, then click BIOS below Chapter 8 p. 395 Fig. 8-4.

Protecting the Home Network (Firewall)

Chapter 8 Objectives. Chapter 8 Operating Systems and Utility Programs. Operating Systems. Operating Systems. Operating Systems.

Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding

Montgomery College Course Designator/Course Number: CS 110 Course Title: Computer Literacy

Chapter Contents. Operating System Activities. Operating System Basics. Operating System Activities. Operating System Activities 25/03/2014

Quick Note 026. Using the firewall of a Digi TransPort to redirect HTTP Traffic to a proxy server. Digi International Technical Support December 2011

lesson 19 Internet Basics

Figure 41-1 IP Filter Rules

CHAPTER 15: Operating Systems: An Overview

Accessing Remote Devices via the LAN-Cell 2

Chapter 8 Router and Network Management

FI8910W Quick Installation Guide. Indoor MJPEG Pan/Tilt Wireless IP Camera

Chapter 2 Preparing Your Network

3.1 TELECOMMUNICATIONS, NETWORKS AND THE INTERNET

Course Description and Outline. IT Essential II: Network Operating Systems V2.0

Windows Server 2003 default services

OPERATING SYSTEMS Software in the Background. Chapter 2

Internet and Intranet Calling with Polycom PVX 8.0.1

CISC 1600 Introduction to Multi-media Computing

Outline. TIM 50 - Business Information Systems. Lecture 10. Instructor: Terry Allen UC Santa Cruz 10/28/2011

Firewall VPN Router. Quick Installation Guide M73-APO09-380

The Internet, Intranets, and Extranets. What is the Internet. What is the Internet cont d.

The Internet and Network Technologies

Multi-Homing Dual WAN Firewall Router

Chapter 6 Using Network Monitoring Tools

M3-R3: INTERNET AND WEB DESIGN

CA106 Web Design. Dr. Dónal Fitzpatrick, School of Computing Room l2.48, Extension 8929,

Bandwidth Aggregation, Teaming and Bonding

Introduction to Web Technology. Content of the course. What is the Internet? Diana Inkpen

Chapter 3. Outline the hardware and software technologies used to build an e business. its partners. access to the Internet and hosting of

How To Configure SSL VPN in Cyberoam

Chapter 5. Data Communication And Internet Technology

Chapter 6 Using Network Monitoring Tools

Chapter 10 Troubleshooting

Quick Installation Guide

Basic IPv6 WAN and LAN Configuration

4.1 Introduction 4.2 Explain the purpose of an operating system Describe characteristics of modern operating systems Control Hardware Access

Option nv, Gaston Geenslaan 14, B-3001 Leuven Tel Fax Page 1 of 14

PowerLink Bandwidth Aggregation Redundant WAN Link and VPN Fail-Over Solutions

The Internet. Chapter 10. Learning Objectives. Chapter Outline. After reading this chapter, you should be able to:

Lectures 9 Advanced Operating Systems Fundamental Security. Computer Systems Administration TE2003

NETWORK SET UP GUIDE FOR

Bitten by The NAS Bug

The following multiple-choice post-course assessment will evaluate your knowledge of the skills and concepts taught in Internet Business Associate.

BROADBAND FIREWALL ROUTER WITH 1-USB + 1-PARALLEL PRINT SERVER PORT

Basic Network Configuration

Appendix C Network Planning for Dual WAN Ports

Step-by-Step Configuration

lesson 1 An Overview of the Computer System

Working Together - Your Apple Mac and Microsoft Windows

802.11n Wireless Broadband Router WNRT-625

Addonics T E C H N O L O G I E S. NAS Adapter. Model: NASU Key Features

Course/Program Credential(s): Credential Certificate Postsecondary Degree University Degree Other:

Niagara IT Manager s Guide

Connecting with Computer Science, 2e. Chapter 5 The Internet

Chapter 4 Managing Your Network

Prestige 202H Plus. Quick Start Guide. ISDN Internet Access Router. Version /2004

iphone Softphone App for the Opera IP System Installation and user guide

Delphi 2015 SP1-AP1 System Requirements

WEB CONFIGURATION. Configuring and monitoring your VIP-101T from web browser. PLANET VIP-101T Web Configuration Guide

AS/400 System Overview

How To Check If Your Router Is Working Properly

Yale Software Library

CMSI 182 Intro to Computer Science. Week 13 Tuesday B.J. Johnson Doolan :25 10:40

Connecting to the Internet. LAN Hardware Requirements. Computer Requirements. LAN Configuration Requirements

Chapter 15: Advanced Networks

CMS Central Monitoring System

1 Getting Started. Before you can connect to a network

1/5/2013. Technology in Action

Intranet, Extranet, Firewall

Chapter 8 Operating Systems and Utility Programs

Program: Systems Engineering Certificate. Prerequisite: None. Hardware/Software required:

Lesson 1 Quiz Certification Partners, LLC. All Rights Reserved. Version 2.0

Lab Configuring Access Policies and DMZ Settings

Cloud Attached Storage 5.0

LotWan Appliance User Guide USER GUIDE

Citrix Access Gateway Plug-in for Windows User Guide

ICAI4099A Build an intranet

800xA Smart Client Frequently Asked Questions

Configuring Security for FTP Traffic

Transcription:

Mid-Term #1 Solutions Chapter #1: Computers: Tools for an Information Age 1. Computers introduce the element into the modern economy. A. labor B. information C. capital D. land 2. Pie charts are an example of computer applications in: A. cooking. B. robotics. C. graphics. D. connectivity. 3. The set of instructions that tell a computer what to do is called a: A. instruction set. B. programmer. C. program. D. system. 4. Which of the following is not a secondary storage device? A. CD-ROM B. hard disk C. DVD-ROM D. central processing unit 5. The term that refers to all input, output, and secondary storage devices is: A. peripheral B. central C. attached D. network 6. Which of the following is not considered to be a peripheral device? A. disk drive B. keyboard C. monitor D. memory

7. The Internet is owned by: A. the U.S. government. B. a private business. C. an international consortium of universities. D. nobody. 8. A computer that operates as a connection point in a network for other computers to connect to is called a(n): A. server. B. browser. C. modem. D. ISP. 9. The protocol describing standard rules for Internet communication is: A. ISP. B. Web browser. C. TCP/IP. D. LAN. 10. The term Internet Service Provider refers to: A. a computer that contains shared software. B. a company that provides Internet connectivity for users. C. software that enables communications between computers. D. a Web site containing a home page. 11. The type of software you will typically use to explore the Web is a(n): A. ISP. B. home page. C. browser. D. Web site. 12. Which type of computer is least likely to have its own secondary storage? A. PDA B. workstation C. mainframe D. thin client Chapter 2: Applications Software: Getting the Work Done 13. The general term used for describing software that helps solve everyday personal or business tasks is: A. custom software. B. system software. C. application software.

D. vertical software. 14. Software that a company s computer programmers write specifically for the company s own use is: A. custom software. B. system software. C. application software. D. vertical software. 15. A program that includes the opportunity for programmers to modify or enhance its code is called: A. open source. B. public domain. C. freeware. D. custom software. 16. Database management software is most appropriate for: A. performing complex mathematical calculations. B. keeping a catalog of all inventory in stock. C. preparing high-quality advertisements and informational brochures. D. downloading important data files from the Internet. 17. If you wanted to calculate your budget and play what-if games based on different assumptions of income and expenditures, you would be most likely to use: A. database management software. B. spreadsheet software. C. communications software. D. graphics software. 18. Communications software is most appropriate for: A. performing complex mathematical calculations. B. storing a list of important phone numbers. C. preparing high-quality advertisements and informational brochures. D. downloading important data files from the Internet. 19. The term vertical market software refers to: A. business software that is primarily used by marketing companies. B. software used primarily in tower computers. C. business software geared to a particular industry of business function. D. volume discount software licenses with steadily declining costs. 20. Another term for groupware is: A. integrated application. B. vertical market software.

C. collaborative software. D. help desk software. 21. A help desk is a(n): A. ergonomically designed workspace for doing computer work. B. online documentation file that comes with software. C. instructor s manual. D. company s information and support center. 22. Which of the following would not be considered to be software piracy? A. A company buys a single-user copy of software and distributes it to all its employees. B. A student copies software from the school s computer lab in order to install it on his own computer at home. C. A person buys a copy of software and copies it to another CD for backup purposes. D. A person buys a CD, installs it on her own computer, and then gives the CD to her friend to install on the friend s computer. 23. Which of the following people is responsible for ensuring that computers in an organization can connect with and communicate effectively with each other? A. Computer programmer B. CIO C. Data entry operator D. Network manager 24. Which of the following people plans, oversees, and manages all the information technology functions for an organization? A. Computer programmer B. Systems analyst C. Computer operator D. CIO Chapter 3: Operating Systems: Software in the Background 25. An operating system is considered to be: A. computer hardware. B. application software. C. system software. D. memory. 26. Which of the following types of software would not be considered to be system software? A. operating system. B. utility programs.

C. program language translators. D. spreadsheet software. 27. The main part of an operating system is called a(n): A. computer operator. B. kernel. C. utility program. D. operations manager. 28. When we refer to software as resident, this means: A. it is installed on the hard drive. B. it controls the hardware. C. it resides in the home of the user. D. it remains in memory. 29. The term that refers to allocation of resources to programs for limited amounts of time is called: A. time events. B. response timing. C. time-sharing. D. time allocation. 30. Which is the most likely cause of degradation in a system s performance? A. Queueing B. Interruptions C. Thrashing D. Time slicing 31. Which of the following would not be considered to be a utility program? A. A file manager B. A defragmenter C. A device driver D. An operating system 32. What will the operating system do if a file needs to be saved to disk, but there is not enough contiguous space on the disk to accommodate the file s size? A. The operating system will display an error message to the user. B. The system will freeze up. C. The file will be fragmented and placed in noncontiguous locations. D. The file will be loaded into virtual storage. 33. Manufacturers of peripheral hardware devices include special software utilities to help the operating system send commands to the hardware devices. This software is referred to as:

A. managers B. directories C. drivers D. compressors Chapter 8: The Internet at Home and in the Workplace 34. The precursor to the Internet, which connected four university computer systems, was called: A. Intranet. B. ARPANET. C. NSFNet. D. CERNNet. 35. Navigation in the World Wide Web is accomplished by clicking on: A. Windows menus. B. hyperlinks. C. TCP packets. D. browsers. 36. The type of software that provides users with the capability to navigate through the Web is called: A. navigation software. B. a browser. C. an ISP. D. a hyperlink. 37. A message sent over the Internet is composed of uniformly sized: A. packets. B. browsers. C. links. D. protocols. 38. A plug-in is: A. a computer program that plugs into an expansion card or port. B. a special Web site that allows users to gain additional services. C. a software component that enhances the browser s functionality. D. a small program embedded in a Web page that runs when the browser loads the page.

39. An applet is: A. a special feature of Web site activation provided by Apple Corporation. B. a small WAP-enabled device for providing mobile access to the Web. C. a software component that enhances the browser s functionality. D. a small program embedded in a Web page that runs when the browser loads the page. 40. If you want to log onto a computer over the Internet and allow your PC to emulate a terminal on that computer, you would use: A. Usenet. B. FTP. C. Telnet. D. e-mail. 41. You will use FTP to: A. send email attachments to other users over the Internet. B. upload or download files over the Internet. C. remotely log into a host computer via the Internet. D. post and read newsgroup messages via the Internet. 42. Which type of address will include an @ symbol before the domain? A. IP address. B. e-mail address. C. http Web address. D. intranet portal address. 43. The category of e-commerce that takes place between a construction company and its materials supplier is called: A. bricks-and-clicks. B. B2C. C. intranets. D. B2B. 44. The term portal refers to: A. a special form of banner ad that links to the Web site for the company being advertised. B. a personalized Web page that provides access to Web sites of interest and presents customized advertisements to the user. C. a dedicated Internet connection between a company and its suppliers. D. a secure firewall, which is like a doorway that needs a special key in order to open.

45. The most intrusive and distracting form of Internet advertisement is: A. banner. B. pop-over. C. context-sensitive. D. portal. 46. A(n) is a private network typically used internally by a single company, that utilizes tunneling technology to create private channels of communication through the Internet. A. WAN B. intranet C. VPN D. extranet 47. What was the first computer bug? A. A burned out tube B. A broken wire C. A moth caught in a relay D. A misplaced punch card 48. The first commercially successful GUI was part of the Mac OS and was introduced in A. 1978 B. 1984 C. 1987 D. 1990 49. The three fundamental characteristics of computers are: A. speed, storage capability, variety of applications. B. reliability, speed, storage capability. C. cost effectiveness, speed, variety of applications. D. cost effectiveness, reliability, storage capability. 50. The most important program in the operating system, that manages the operating system, is called A. the kernel. B. DOS. C. systems software. D. bootstrapping.