1. The
“brain” of your computer is called the:
a. microchip.
b. microprocessor.
c. memory chip.
d. hard drive.
1
2. A
computer’s operating system is responsible for which of the following?
a. Running
application software
b. Manipulating files
on storage devices
c. Transferring data
to and from printers
d. All of the choices
apply
1
3. When the
computer is busy, the mouse pointer arrow shape turns into a(n):
a. hourglass.
b. square.
c. circle.
d. both a and c.
1
4. Which of
the following mouse actions allows you to manipulate on-screen objects?
a. Click
b. Double-click
c. Right-click
d. All of the choices
apply
1
5. Function
keys on the keyboard activate all of the following, except:
a. Save.
b. Help.
c. Print.
d. Delete.
0
6. Which of
the following keyboard keys displays previous screen information?
a. Page down key
b. End key
c. Page up key
d. Delete key
1
7. Which of
the following keyboard keys capitalizes all the letters you type when it is
engaged?
a. End key
b. Caps lock key
c. Tab key
d. Home key
1
8. Which of
the following is used to delete one character to the left of the insertion
point?
a. Esc key
b. Ctrl key
c. Backspace key
d. None of the
choices apply
1
9. The
__________ displays a series of tools for accomplishing various tasks.
a. scroll bar
b. toolbar
c. menu bar
d. title bar
1
10. Which of
the following shrinks the window to a button at the bottom of the screen?
a. Minimize button
b. Maximize button
c. Close button
d. None of the
choices apply
1
11. Which of
the following is needed to send and receive e-mail?
a. Internet
connection
b. E-mail account
c. Software
d. All of the choices
apply
1
12. To create
a secure password, do all of the following, except:
a. use at least five
characters, mixing numbers and letters.
b. use your family
name or name of family member.
c. do not use a word
from the dictionary.
d. do not forget your
password.
1
13. Another
name for computer virus is:
a. spyware.
b. shareware.
c. software.
d. malware.
1
14. Internet
scams in the form of spam messages try to get you to do all of the following,
except:
a. download a virus.
b. divulge your bank
account numbers.
c. subscribe to
weekly newsletters.
d. send in money for
products you will never receive.
1
15. An e-mail
scam that arrives in your e-mailbox looking like an official correspondence
from a major company is called:
a. phishing.
b. fishing.
c. flushing.
d. none of the
choices apply.
1
16. The
digital revolution became a significant factor in the 1980s but ended in the
1990s with the dot com bubble burst.
a. True
b. False
1
17. Digital
electronics use electronic __________ to represent data.
a. circuits
b. switches
c. transistors
d. components
1
18. __________
is the process of converting text, numbers, sound, photos, and video into data
that can be processed by digital devices.
a. Digitization
b. Digital conversion
c. Scanning
d. Rasterization
1
19. Symbols
that represent facts, objects, and ideas are:
a. data.
b. programming.
c. processing.
d. globalization.
1
20. A(n)
__________ is a microprocessor-based computing device designed to meet the
computing needs of an individual.
a. personal computer
b. mainframe
c. ALU
d. server
0
21. The
purpose of a server is to serve computers on a network.
a. True
b. False
1
22. A(n)
__________ is a large and expensive computer capable of simultaneously
processing data for hundreds or thousands of users.
a. mainframe
b. minicomputer
c. supercomputer
d. workstation
0
23. A
compute-intensive problem runs on a:
a. server.
b. mainframe.
c. supercomputer.
d. super PC
1
24. A
special-purpose microprocessor that is built into the machine it controls is
a(n):
a. supercomputer.
b. mainframe.
c. microcontroller.
d. workstation.
1
25. Data
becomes __________ when it is presented in a format that people can understand
and use.
a. information
b. processed
c. graphs
d. presentation
1
26. The type
of data where text, numbers, graphics, sound, and video have been converted
into discrete digits is:
a. information.
b. analog.
c. digital.
d. ASCII.
1
27. The type
of data that is represented using an infinite scale of values is:
a. information.
b. analog.
c. digital.
d. ASCII.
1
28. Data
transmission speeds are typically expressed as __________ and storage is
typically expressed as __________.
a. bits/bytes
b. bytes/hertz
c. hertz/bits
d. mites/bytes
1
29. 1,024
bytes is a __________; 1,048,576 bytes is a __________; and 1,073,741,824 bytes
is a __________.
a.
kilobyte/megabyte/gigabyte
b.
megabyte/gigabyte/kilobyte
c.
gigabyte/megabyte/terabyte
d.
terabyte/gigabyte/megabyte
1
30. A
super-thin slice of semiconducting material packed with microscopic circuit
elements is a(n):
a. integrated
circuit.
b. computer chip.
c. microchip.
d. all of the choices
apply.
1