BTM final questions PDF

Title BTM final questions
Author Gabrielle Van Aelst
Course Business Technology Management
Institution Concordia University
Pages 14
File Size 114.8 KB
File Type PDF
Total Downloads 75
Total Views 148

Summary

Sample multiple choice questions for the final exam...


Description

BTM FINAL 1) Which transmission medium transmits data the fastest? Fiber-optic cable 2) Boot-sector viruses are often transmitted by a flash drive left in a usb port. 3) Most word processing programs come with a search & replace tool that allows you to locate/replace specific text. TRUE 4) Which of the following is not a user interface? Application programming interface (API) 5) Which of the following is the most common audio compression format? MP3 6) Hyperthreading provides high speed info processing by enabling a new set of instructions to start before the previous set has been finished. 7) Each device attached to your computer has a special program called device driver that enables the device/os to communicate with eachother. 8) File names in Windows are case-sensitive. FALSE 9) A HAN network is located in your residence that connects to all your digital devices 10) Multimedia software includes all the following except utility software. 11) Starting a computer when it is powered off is called a warm boot. FALSE 12) Most computers today come with Ethernet adapters already installed. TRUE 13) A full software installation enables you to choose which program features you want installed on your hard drive. FALSE 14) All of the following are examples of software suites except Microsoft OneNote 15) An encryption virus replicates itself onto a hard drive’s master boot record. FALSE 16) The processor market for desktop/laptop computers is dominated by Intel. 17) A NAS device facilitates file sharing/data backup 18) A router acts like a traffic signal on a network. FALSE 19) Which of the following is not a wired broadband internet connection option? Dial-up 20) Each of these is a basic type of touch screen except Reflective 21) Brightness ratio is the difference in light intensity between white/darkest black produced by a monitor. FALSE 22) Which of the following optical storage media has the greatest storage capacity? BD 23) There is clear ownership of mineral rights in outer space. FALSE

24) Utilitarianism focuses on adherence to moral duties and rights. FALSE 25) If you 3D print a faulty bicycle helmet, there are clear-cut responsibilities if someone is hurt using the helmet. FALSE 26) The terms data/info can be used interchangeably. FALSE 27) When using Windows File Explorer, which view provides the most info at a glance? Details 28) Wizards are step-by-step guides for performing complicated tasks in application software. TRUE 29) Which of the following is not an example of a general productivity software application? Image editing 30) A computer network is 2 or more computers connected using software/hardware so that they can communicate with each other. 31) The unique number assigned to a network adapter by the manufacturer is referred to as the MAC address. 32) Some of the cache memory of a CPU is inside the CPU itself. 33) Which of the following does NOT determine processor power? Speed of the motherboard 34) A macro virus is a virus that is attached to a file such as a word document or excel workbook. TRUE 35) Social engineering is any technique that uses social skills to generate human interaction that entices individuals to reveal sensitive into. 36) Currently, there are no antivirus programs for mobile devise. FALSE 37) All of the following are extra precautions you can take to secure a wireless network except enable SSID broadcast. 38) Which of the following is formally defined as any criminal action perpetrated primarily through the use of a computer? Cybercrime 39) Optical discs store data using tiny pits & lands. TRUE 40) Wireless network devices use radio waves to communicate with each other. 41) A printer connected to a wireless network is considered to be a node on that network. TRUE 42) Which of the following capabilities of UNIX is false? C) It is only for fupercomputers 43) Accessing data from the hard drive to send to the CPU is faster than accessing data from RAM. FALSE 44) Creating and distributing computer viruses is one of the most widespread types of cybercrimes. 45) All of the following are types of multimedia & entertainment software except productivity software.

46) Sharing files is a benefit of a network. TRUE 47) Real-time operating systems can be found in scientific instruments. 48) Which of the following is necessary if you want your Ethernet network to connect to the internet through a DSL or cable modem? DSL/cable router 49) The process of inoculation occurs when antivirus software finds an infected file and moves it to a secure place on your hard drive. FALSE 50) A network-ready device is a device that might be attached to a network but still has to connect to a networked computer first. FALSE 51) Software that is distributed for free but often with the condition that you pay for it if you like & intend to use it is called shareware. 52) Which type of virus was the famous Michelangelo virus? Time bomb 53) Monitor screen grids are make up of millions of pixels, with each pixel containing three sub pixels of colors. 54) Accessing data from the hard drive to send to the CPU is faster than accessing data from RAM. FALSE 55) ROM is a form of permanent memory that holds all the instructions the computer needs to start up. 56) The CPU is connected to the system memory by the front side bus. 57) Which of the statements about protecting against power surges is false? Printers do not require power surge protection. 58) Notebook & desktop processors are basically the same and therefore interchangeable. FALSE 59) Twisted-pair cable is made up of plastic or glass fibers that transmit data at extremely fast speeds. FALSE 60) Which of the following is a file compression utility? Winzip 61) Expansion cards plug into slots on the motherboard & provide additional functionality for your computer. 62) A gigabyte is approx. 1 billion bytes. 63) Which type of software is used to keep track of appts, to do lists & telephone numbers? Personal information manager (PIM) software. 64) Instant messaging programs are susceptible to virus attacks. TRUE 65) A Blu-ray burner will most likely record both CDs and DVDs. TRUE 66) A stylus is a device that looks like a skinny pen buy has no ink. 67) Which of the following statements concerning the wondpws recycle bin is true? You can restore files that have been moved to the recycle bin. 68) Predesigned forms that provide the basic structure for a particular kind of document are known as templates. 69) Which of the following would be a name of a Microsoft Access document? Inventory.accdb

70) Bluebugging occurs when a hacker takes control of a Bluetooth-enabled device to make phone calls, read phonebook entries, send/receive text messages & more. 71) Which Microsoft program is used to create technical drawings, map basic black diagrams? Visio 72) When a network is created to provide internet access to a specific geographic area, that network will generally be designated as a MAN. TRUE 73) When referring to hard drives, access time is measured in miliseconds. 74) 2P2 networks are more commonly used in small businesses than in homes. FALSE 75) A virus signature is a portion of a virus code that is unique to a particular computer virus. TRUE 76) Notebooks are often equipped with a express card slot that allows you to read flash memory cards such as compact flash, memory sticks and secure digital cards. 77) Which of the following was the first widelt used os installed in personal computers? MS-DOS 78) Ram is considered a volatile storage, which means it is temporary. 79) You are more vulnerable to a hacker attack on a windows system than you are on a Linux system. TRUE 80) System software does all the following except add graphics & pics to files. 81) Which of the following statements is true about optical media? A blu-ray burner will most likely burn both CDs & DVDs 82) Which of the following is software that you can use for an unlimited time at no charge. Freeware 83) Function keys are shortcut keys that you press to perform special tasks; each software application has its own set of tasks assigned to these keys. 84) Custom software, developed to address the needs of a specific company, is known as proprietary software. 85) Which type of software lets you dictate letters, emails & voice commands? Speech recognition 86) Running the Disk clean-up utility is a quick way to clear out unnecessary files. 87) QuartXpress & Adobe InDesign are examples of desktop publishing software. 88) Windows 7 incorporates windows easy transfer, which enables you to migrate files & settings from a Windows Vista system to a Windows 7 system via a network connection.

89) The type of monitor that looks like a traditional television set is called a Cathode ray tube (CRT) monitor. 90) Spyware is an unwanted piggyback program that usually downloads with software you are installing from the internet. 91) The CPU consists of which 2 parts? The control unit and the arithmetic logic unit. 92) Throughput, the actual speed of data transfer that is achieved in a network, is usually less than or equal to the data transfer rate. 93) Modre’s Law predicts that the # of transistors inside a CPU will triple every 18 months. FALSE 94) Which of the following network adapters is most likely to be preinstalled in a typical notebook computer today? Both a wireless/wired network adapter. 95) A zombie is another persons’ computer controlled by a hacker. TRUE 96) Theft of a computer is considered cybercrime. FALSE 97) CPU speed, also called clock speed, is measured in Gigahertz. 98) Which of the following devices is neede to share an internet connection on a wireless network? Wireless router. 99) Software refers to a set of instructions that tells the computer what to do. These instruction sets are called programs. 100) Bootcamp is a utility that allows you to run Windows & Mac Os X at the same time. FALSE 101) An expansion card that translates binary data into images is a video card. 102) The powersupply housed inside the system unit, regulates the wall voltage to the voltages required by the computer chips. 103) A single computer can function as both a client & a server, but performance will be degraded. TRUE 104) Level 1 cache memory always contains more storage area than Level 2 cache. FALSE 105) A denial of service attack can be used to deny hacker access to a computer system. FALSE 106) Devices such as monitors & printers that are connected to the computer are called peripheral devices. 107) Computer-aided design software is used primarily by engineers to create models. 108) Front side bus speed is measured in Megahertz.

109) Cybercriminals are usually security individuals who work in large corporations with a vast knowledge base of computing & networking. FALSE 110) A router allows sharing of a broadband internet connection. 111) Running the Disk Defragmenter utility will make the harddrive work more efficiently. 112) Which of the following is NOT one of the four major data processing functions of a computer? Analyzing the data/info. 113) A P2P network needs network os software installed on every node. FALSE 114) Spyware programs that monitor keystrokes with the intent of stealing passwords, login IDs or credit card info are referred to as keystroke loggers. 115) Impact printers have tiny hammer-like keys that strike the paper through an inked ribbon 116) CMOS is a special kind of memory that uses a great deal of power. FALSE 117) A Network interface card (NIC) enables your computer to connect to other computers or to the internet. 118) Cyberloafing is doing non-work related activities with a computer while you are being paid to do your job. 119) A VPN is a secure internet pathway that large corporations use to protect sensitive data. 120) A switch is a network navigation device that merely retransmits a signal to all other nodes attached to it. FALSE 121) Which of the following is a file compression utility? Winzip 122) In Windows, you can create restore points to reset your system in the case of a malfunction. 123) A network-ready device is a device that might be attached to a network but still has to connect to a networked computer first. FALSE 124) A network that has 10 or more nodes is usually configured as a client/server network. 125) Notebook & desktop processors are basically the same & therefore interchangeable. FALSE 126) A encryption virus runs a program that searches for common data files, compress them and make them unusable. 127) The registry contains all of the different configurations used by the os & by the other applications.

128) DDOS attack floods a computer with requests until it shuts down and refuses to answer any requests for info. 129) Quickbooks & Peachtree are examples of accounting software. 130) ROM is a form of permanent memory that holds all the instructions the computer needs to start up. 131) A wireless network uses which of the following as its transmission medium? Radio waves 132) Which of the following about cookies is not true? Cookies obtain your personal info by searching your hard drive. 133) You can download a version of Linux from the internet for free. FALSE 134) Presentation software includes all of the following features except formulas. 135) PnP stands for plug and play. TRUE 136) Any computer parts that you can actually touch are considered to be hardware. 137) A multiuser os is also described as a network os. TRUE 138) Creating & spreading online viruses is a cybercrime. TRUE 139) Software that is distributed for free, but often with the condition that you pay for it if you like & intend to use it is called shareware. 140) Wireless networks are more vulnerable to attack than wired networks. TRUE 141) The most recent version of the Mac Os X is snow leopard. TRUE 142) Every computer is designed with a max limit on the amount of RAM it can support. TRUE 143) Hackers most often obtain access to someone’s computer via direct access. FALSE 144) In binary language, each letter of the alphabet, each # and each special character is made up of a unique combination of 8 bits. 145) On a windows system, you can determine the amount of RAM by looking in the system properties window. 146) USB ports are now the most common poAS for connecting input and output devices to the computer. 147) In a windows folder, to display files and folders as icons in list form we use tiles view. 148) Which of the following is not a function of os? It manages the removal of spyware. 149) When an os receives an interrupt from the printer & pauses the CPU, it is performing which of the following functions? Processor management

150) It is generally better to extend your wired network using wireless technology than to use repeaters or splice cable. TRUE 160) Computers process data into info by working exclusively with numbers. 161) The cell address F7 indicates that the cell is at column F, row 7 of the worksheet. 167) RAM is the place in a computer where the programs & data the computer is currently using are stored. 168) Sophisticated networks generally use which of the following hardware devices to ease the flow of data packets throughout the network? Routers/switches 169) The use of multiple cons on one CPU chip allows the execution of 2 or more sets of instructions at the exact same time. TRUE 170) A optical mouse uses an internal sensor/laser to detect the mouse’s movement. 171) The CPU is located on the motherboard. TRUE 172) With windows explorer, you can perform all of the following file management actions except editing files. 173) During the virtual memory process, the os moves data to a temporary storage area on the hard drive call the swap file. 174) The windows backup and restore utility allows you to make a duplicate copy of all data on your hard drive. TRUE 175) Which of the following devices translates electronic data into radio waves? Transceiver 176) It is not possible to configure a client/server network for home use. FALSE 177) The type of processor in the computer dictates which os a desktop uses. FALSE 178) A cyberspace hoax is an attempt to make someone believe something that is untrue. 179) Software you can use to create a budget is called spreadsheet software. 180) Which file format enables users to share, view, and print any file as long as they have the appropriate program installed? PDF 181) Due to the expansion of media files on home computers, home network server options are now being marketed; however, they are not as full featured as their business world counterparts.

182) Which of the following is a program that appears to be something useful/desirable but does something malicious in the background? Trojan horse 183) Current wireless Ethernet networks in the US are based on the IEEE 802.3 standard. FALSE 184) You can bkock logical ports to invaders and make your computer invisible to others on the internet by installing firewall. 185) External hard drives are an ideal solution when you need more storage than a flash drive can provide. TRUE 186) All of the following are examples of input devices except a printer. 187) The unique # assigned to a netowkr adapter by the manufacturer is referred to as the MAC address. 188) Photocopies do not present any vulnerability fot potential hackers. FALSE 189) The most common type of home network is P2P network. 190) Phishing encourages internt uses to reveal sensitive info that could lead to identity theft by sending e-mails that look like they are from legitimate companies but are, in fact, fake. 191) The motherboard contains the central electronic components of the computer. 192) A macro virus is a virus that is attached to docs such as word or excel files. 193) When your computer is in safe mode you can use the device manager to view/change the properties of all devices attached to the computer. 194) When available, the best way to remove an unwanted software application is to use the app’s uninstall program. 195) The s-video and the DVI ports on a computer facilitate connecting the computer to multimedia devices such as tvs/dvd players. 196) Which of the following is an example of an input device? Scanner 197) The most popular transmission media option for wires Ethernet networks is unshielded twisted pair (UTP) cable. 198) Which of the statements about protecting against power surges is false? Printers do not require power surge protection 199) Instant messaging programs are susceptible to virus attacks. TRUE 200) RAM is stored directly on the CPU. FALSE 201) A video card is an expansion card installed inside your system unit. 202) The CPU is connected to the system memory by the front side bus. 203) C:/DOC/Spring 2012…is an example of a file path

204) Which of the following classifications of viruses can change its own code to avoid detection? Polymorphic 205) Rules for creating passwords include all except keep your password written down and stored in any easy-to-remember location. 206) The process of replacing repeated patterns of letters in a file with a shorter placeholder is called file compression. 207) Which of the following activities is carried out by the ALU? Completion of all arithmetic calculations. 208) Which of the following is not an example of a network node? Mouse 209) Software that does “back office” operations/processing functions such as billing production, inventory management, and human resources management is called enterprise resource planning software. 210) A computer virus normally attaches itself to another computer program known as host program. 211) Many photocopies have hard drives just as computers do, which moves them a potential target for identity thieves. TRUE 212) In windows, which character is used as a path separator? Backslash (1) 213) A person with malicious intent can take almost complete control of your computer by using a backdoor program. TRUE 214) One way to increase security on a network is by installing a firewall. 215) Every software program has a set of system requirements that specify the minimum recommended standards for the os, processor, RAM, hard drive capacity. 216) Before upgrading your os, you should back up your data files. 217) Video files cannot transmit viruses. FALSE 218) Cache memory is a form of ROM. FALSE 219) Installing a device driver can sometimes cause system instability. TRUE 220) The % of the time that y...


Similar Free PDFs