• Home
  • Ask a Question
  • About
  • Contact
  • Advertise
  • Sitemap
MENU

CSIT MCQ

  • Home
  • Translate
Archive for September 2017

A computer relies on the combination of _____ and _____ to turn input into output.

Add Comment

A computer relies on the combination of _____ and _____ to turn input into output.



Answer: Hardware, software

The most efficient way to share digital files within a home environment is to set up a(n) ____ network.

Add Comment

The most efficient way to share digital files within a home environment is to set up a(n) ____ network.



Answer: Home

As the amount of Internet ____ continue(s) to increase, streaming video and television are becoming commonplace.

Add Comment

As the amount of Internet ____ continue(s) to increase, streaming video and television are becoming commonplace.



Answer: Bandwidth

Linux is ____ software, which means users can manipulate the source code to customize their operating system to their needs.

1 Comment

Linux is ____ software, which means users can manipulate the source code to customize their operating system to their needs.



Answer: Open source

Why are LEDs used in green computing?

Add Comment

Why are LEDs used in green computing?



Answer: They reduce the energy used in displays

Google relies on ____ to relay information related to its mapped software.

Add Comment

Google relies on ____ to relay information related to its mapped software.



Answer: Satellites

Software companies rely on ____ to "fix" problems in their programs related to bugs and flaws.

Add Comment

Software companies rely on ____ to "fix" problems in their programs related to bugs and flaws.



Answer: Updates

In the URL http://www.cengage.com/index.html, cengage.com is the ____.

Add Comment

In the URL http://www.cengage.com/index.html, cengage.com is the ____.



Answer: Domain name

The Internet uses hardware, software, and ____ that allow(s) different types of networks to communicate.

Add Comment

The Internet uses hardware, software, and ____ that allow(s) different types of networks to communicate.



Answer: Protocols

Cloud computing is not possible without _____.

Add Comment

Cloud computing is not possible without _____.



Answer: An internet connection

A _____ provides content that is accessible on the World Wide Web.

Add Comment

A _____ provides content that is accessible on the World Wide Web.



Answer: Web server

Typical _____ computing providers deliver common software online that is accessed from another web service or browser.

Add Comment

Typical _____ computing providers deliver common software online that is accessed from another web service or browser.



Answer: Cloud

Thanks to _____, voice and data traveling together through our telecommunications lines will be seamless.

Add Comment

Thanks to _____, voice and data traveling together through our telecommunications lines will be seamless.



Answer: VoIP

____ communication allows participants to leave messages for each other.

Add Comment

____ communication allows participants to leave messages for each other.



Answer: Asynchronous

Which of the following is one realistic way to promote Internet security?

Add Comment

Which of the following is one realistic way to promote Internet security?



Answer: Select strong passwords and change them regularly

AI applications are ways in which AI methodologies are applied to ____ and provide services.

Add Comment

AI applications are ways in which AI methodologies are applied to ____ and provide services.



Answer: Solve problems

FBI reliance on citizen photographs to catch the Boston Marathon bombers is an example of ____.

Add Comment

FBI reliance on citizen photographs to catch the Boston Marathon bombers is an example of ____.



Answer: Web empowerment

____ favor(s) an Internet that is open, with packets unexamined and unfiltered.

Add Comment

____ favor(s) an Internet that is open, with packets unexamined and unfiltered.



Answer: Network neutrality

Thanks to ____, you can watch a movie as it is being downloaded from the Internet.

Add Comment

Thanks to ____, you can watch a movie as it is being downloaded from the Internet.



Answer: Streaming media

Each person's digital shadow is ____

Add Comment

Each person's digital shadow is ____



Answer: The digital information generated about a person by organizations

____ computing refers to the ability to access information at any time and in any place.

Add Comment

____ computing refers to the ability to access information at any time and in any place.



Answer: Pervasive

We rely on ____ as the dominant technology to provide wireless Internet access in our everyday lives.

Add Comment

We rely on ____ as the dominant technology to provide wireless Internet access in our everyday lives.



Answer: Wireless fidelity

Which of the following is an example of digital media?

Add Comment

Which of the following is an example of digital media?



Answer: Blu ray movies

Through the use of a ____, users can freely express their views and opinions.

Add Comment

Through the use of a ____, users can freely express their views and opinions.



Answer: Blog

Which of the following will protect intellectual property for the life of the holder plus 70 years?

Add Comment

Which of the following will protect intellectual property for the life of the holder plus 70 years?



Answer: Copyright

The _____ computer platform provides a lot of computing power, such as for gaming, at a single location.

Add Comment

The _____ computer platform provides a lot of computing power, such as for gaming, at a single location.



Answer: Desktop

A popular term used to identify devices such as the iPad is _____

Add Comment

A popular term used to identify devices such as the iPad is _____



Answer: Tablet PC

Programs such as ____ support energy conservation for electronic devices.

Add Comment

Programs such as ____ support energy conservation for electronic devices.



Answer: ENERGY

One thing to consider when choosing a mobile device is _____.

Add Comment

One thing to consider when choosing a mobile device is _____.



Answer: Battery life

Using the web as a primary user interface to access such applications as Google Docs is an example of ____.

Add Comment

Using the web as a primary user interface to access such applications as Google Docs is an example of ____.



Answer: Cloud computing

A web ____ can also be referred to as a customized web home page.

Add Comment

A web ____ can also be referred to as a customized web home page.



Answer: Portal

A popular encryption method used to protect data that travels over a wireless network is ____.

Add Comment

A popular encryption method used to protect data that travels over a wireless network is ____.



Answer: WPA

____ technology may someday replace today's bar code system for identifying items in inventory.

Add Comment

____ technology may someday replace today's bar code system for identifying items in inventory.



Answer: RFID

Speech recognition, handwriting recognition, and face recognition all fall under the AI category of ____ recognition.

Add Comment

Speech recognition, handwriting recognition, and face recognition all fall under the AI category of ____ recognition.



Answer: Pattern

____ is an example of following good ergonomic practices.

Add Comment

____ is an example of following good ergonomic practices.



Answer: Adjusting the angle of a keyboard for comfort

The digital ____ method of writing has made plagiarism easy and ever more common.

Add Comment

The digital ____ method of writing has made plagiarism easy and ever more common.



Answer: Cut and paste

The challenge of ____ is keeping certain content from a subset of the population without encroaching upon the freedom of adults.

Add Comment

The challenge of ____ is keeping certain content from a subset of the population without encroaching upon the freedom of adults.



Answer: Censorship

A printer requires a ____ installed on the computer in order to operate.

Add Comment

A printer requires a ____ installed on the computer in order to operate.



Answer: Device driver

You can protect yourself from identity theft by using ____ when transmitting information over network connections.

Add Comment

You can protect yourself from identity theft by using ____ when transmitting information over network connections.



Answer: Encryption

Signing up for a(n) ____ will automatically provide you with web content that is updated on a regular basis.

Add Comment

Signing up for a(n) ____ will automatically provide you with web content that is updated on a regular basis.



Answer: RSS feed

____ technology enables you to connect to your cell phone through a display on your car's dashboard.

Add Comment

____ technology enables you to connect to your cell phone through a display on your car's dashboard.



Answer: Bluetooth

Government agencies have not supported cloud computing due to the lack of _____

Add Comment

Government agencies have not supported cloud computing due to the lack of _____



Answer: Data security

A computer that manages data and produces information often uses a _____ to organize and deliver it.

Add Comment

A computer that manages data and produces information often uses a _____ to organize and deliver it.



Answer: Database

It is much easier for people to remember ____ than IP addresses of websites.

Add Comment

It is much easier for people to remember ____ than IP addresses of websites.



Answer: Domain names

Personal ethics deals with ____.

Add Comment

Personal ethics deals with ____.


Answer: The choices and behaviors made by individuals

____ operating systems are lightweight operating systems designed for mobile devices such as smart phones and tablets.

Add Comment

____ operating systems are lightweight operating systems designed for mobile devices such as smart phones and tablets.



Answer: Mobile

A company called ____ provides digital certifications for web transactions.

Add Comment

A company called ____ provides digital certifications for web transactions.



Answer: VeriSign

When evaluating information provided on the web, always consider the ____.

Add Comment

When evaluating information provided on the web, always consider the ____.



Answer: Source

____ is credited with the development of the web.

Add Comment

____ is credited with the development of the web.



Answer: Tim Berners-Lee

A company may hire a ____ hacker to learn about vulnerabilities in its system.

Add Comment

A company may hire a ____ hacker to learn about vulnerabilities in its system.



Answer: White hat

In a(n) ____ relationship, multiple users are provided with access to a server at the same time.

Add Comment

In a(n) ____ relationship, multiple users are provided with access to a server at the same time.



Answer: Client/server

An area of a building where you can connect to the Internet wirelessly is often referred to as a ____.

Add Comment

An area of a building where you can connect to the Internet wirelessly is often referred to as a ____.



Answer: Hotspot

When starting a new job, you may need to sign a(n) ____ that defines acceptable and unacceptable uses of computer and network resources.

Add Comment

When starting a new job, you may need to sign a(n) ____ that defines acceptable and unacceptable uses of computer and network resources.



Answer: Network usage policy

A search engine attempts to catalog every webpage by topic through the use of a ____.

Add Comment

A search engine attempts to catalog every webpage by topic through the use of a ____.



Answer: Spider

An icon on your desktop is a component of a ____ interface.

Add Comment

An icon on your desktop is a component of a ____ interface.




Answer: Graphical user

A ____ computer is remotely controlled by a hacker to damage or corrupt a computer resource.

Add Comment

A ____ computer is remotely controlled by a hacker to damage or corrupt a computer resource.



Answer: Zombie

An email with a subject heading "Urgent Security Update" that requests a username and password followed by a link to "re-login and resolve the issue" is a good example of a ____ scam.

Add Comment

An email with a subject heading "Urgent Security Update" that requests a username and password followed by a link to "re-login and resolve the issue" is a good example of a ____ scam.



Answer: Phishing

IT Access for Everyone is an initiative for increasing access to digital technology for ____.

Add Comment

IT Access for Everyone is an initiative for increasing access to digital technology for ____.



Answer: Developing nations

___ can tell more about a person than all other kinds of electronic surveillance.

Add Comment

___ can tell more about a person than all other kinds of electronic surveillance.



Answer: Data mining

All of the following are examples of malware EXCEPT ___

Add Comment

All of the following are examples of malware EXCEPT ___



Answer: Updates (worms, viruses, spyware)

Users of iPods and iPhones are well acquainted with the process of _____ files.

Add Comment

Users of iPods and iPhones are well acquainted with the process of _____ files.



Answer: Synchronizing

Online newspapers can be delivered through _____ to news readers.

Add Comment

Online newspapers can be delivered through _____ to news readers.



Answer: RSS

Airlines take advantage of ____ technology to inform users of flight delays and itinerary changes.

Add Comment

Airlines take advantage of ____ technology to inform users of flight delays and itinerary changes.



Answer: Smart phone

Embedded systems can be found in all of the following EXCEPT _____

Add Comment

Embedded systems can be found in all of the following EXCEPT _____



Answer: Cloud computers

The most popular search engines use ____ to store information about webpages.

Add Comment

The most popular search engines use ____ to store information about webpages.



Answer: A database

An act of ____ would be posting a story to a blog saying that a neighbor is selling drugs, when you know that it's not true.

Add Comment

An act of ____ would be posting a story to a blog saying that a neighbor is selling drugs, when you know that it's not true.




Answer: Libel

In a practice called ____, someone may manipulate people into performing actions or divulging confidential information on the Internet.

Add Comment

In a practice called ____, someone may manipulate people into performing actions or divulging confidential information on the Internet.



Answer: Social engineering

Intranet content can be extended to specific individuals outside the network, such as customers, partners, or suppliers, in an arrangement called a(n) ____.

Add Comment

Intranet content can be extended to specific individuals outside the network, such as customers, partners, or suppliers, in an arrangement called a(n) ____.




Answer: Extranet

The popularity of ____ has encouraged everyday users to share events of the day.

Add Comment

The popularity of ____ has encouraged everyday users to share events of the day.



Answer: Social media

Through the use of the ____ plug-in, a webpage can provide a user with an interactive experience.

Add Comment

Through the use of the ____ plug-in, a webpage can provide a user with an interactive experience.



Answer: Flash

Embedded operating systems are hardwired into a computer component, such as ROM or flash memory, to control a ____ computer.

Add Comment

Embedded operating systems are hardwired into a computer component, such as ROM or flash memory, to control a ____ computer.



Answer: Special purpose

An advantage of ____ software is its ability to run more than one operating system on a computer.

Add Comment

An advantage of ____ software is its ability to run more than one operating system on a computer.



Answer: Virtual machine

Criminals collect items such as credit card numbers without the user's knowledge through the use of ____.

Add Comment

Criminals collect items such as credit card numbers without the user's knowledge through the use of ____.



Answer: Spyware

Which of the following is an example of a repetitive stress injury?

Add Comment

Which of the following is an example of a repetitive stress injury?



Answer: Carpal tunnel syndrome

Personal music videos that combine user-generated photos with audio music are a good example of _____.

Add Comment

Personal music videos that combine user-generated photos with audio music are a good example of _____.



Answer: Digital convergence

A ____ network is used when a user wants to make his or her computer and others' computers available for access.

Add Comment

A ____ network is used when a user wants to make his or her computer and others' computers available for access.




Answer: Peer to peer

In the URL http://www.cengage.com/index.html, http: is the ____

Add Comment

In the URL http://www.cengage.com/index.html, http: is the ____



Answer: Domain name

Searching the Web for the best deal on an airline flight is a good example of ____ at work.

Add Comment

Searching the Web for the best deal on an airline flight is a good example of ____ at work.



Answer: Intelligent agent

The ability of people with disabilities to interact with and make use of computer resources is known as ____.

Add Comment

The ability of people with disabilities to interact with and make use of computer resources is known as ____.



Answer: Accessibility

Downloaded music may include ____ technology that prevents or limits the user's ability to make copies.

Add Comment

Downloaded music may include ____ technology that prevents or limits the user's ability to make copies.



Answer: DRM


A ____ provides everything that is accessible on the Internet.

Add Comment

A ____ provides everything that is accessible on the Internet.



A. computing platform
B. server
C. database
D. tablet



Answer: server

All of the following are models for cloud computing EXCEPT ____.

Add Comment

All of the following are models for cloud computing EXCEPT ____.



A. public
B. community
C. shared
D. hybrid



Answer: Shared

All of the following are referred to as computing platforms EXCEPT ____.

Add Comment

All of the following are referred to as computing platforms EXCEPT ____.



A. cellular networks
B. operating systems
C. personal computers
D. input devices



Answer: input devices

To connect multiple businesses from different locations, a _____ area network setup is required.

Add Comment

To connect multiple businesses from different locations, a _____ area network setup is required.



A. personal
B. home
C. local
D. wide



Answer: Wide

Local area networks designed to serve an entire city are called ____ area networks.

Add Comment

Local area networks designed to serve an entire city are called ____ area networks.



A. urban
B. metropolitan
C. city
D. major



Answer: Metropolitan

A(n) ____ expands the boundaries of a company's intranet to include networks outside of its local area network setting.

Add Comment

A(n) ____ expands the boundaries of a company's intranet to include networks outside of its local area network setting.



A. EPN
B. APN
C. EDI
D. VPN



Answer: VPN

Bluetooth is an example of a _____ area network.

1 Comment

Bluetooth is an example of a _____ area network.



A. local
B. personal
C. wide
D. metro



Answer: Personal

Global positioning system (GPS) ____ are primarily used to assist travelers in getting from one place to another.

Add Comment

Global positioning system (GPS) ____ are primarily used to assist travelers in getting from one place to another.



A. receivers
B. infrared waves
C. transponders
D. tags



Answer: Receivers

___ technology may someday replace today's bar code system for identifying items in inventory.

Add Comment

___ technology may someday replace today's bar code system for identifying items in inventory.



A. VPN
B. RFID
C. SIM
D. WAP



Answer: RFID

____ technology enables you to connect to your cell phone through a display on your car's dashboard.

Add Comment

____ technology enables you to connect to your cell phone through a display on your car's dashboard. 



A. Global positioning
B. Bluetooth
C. Narrowband
D. Fiber-optic


Answer: Bluetooth

An area of a building where you can connect to the Internet wirelessly is often referred to as a ____.

Add Comment

An area of a building where you can connect to the Internet wirelessly is often referred to as a ____.



A. GPS spot
B. hotspot
C. cell tower
D. signal



Answer: Hotspot

Many cities have adopted______ technology to provide faster Internet speed to their users.

Add Comment

Many cities have adopted______ technology to provide faster Internet speed to their users.




A. DSL
B. WiMAX
C. Wi-Fi
D. Bluetooth



Answer: WiMax

WIth the advent of _____ technology, broadband Internet services over cellular networks were made available.

Add Comment

WIth the advent of _____ technology, broadband Internet services over cellular networks were made available.




A. first-generation(1G)
B. second-generation(2G)
C. third-generation(3G)
D. fourth-generation(4G)



Answer: Fourth- generation (4G)

A(n) ____ network includes transmission towers that connect to area handsets.

Add Comment

A(n) ____ network includes transmission towers that connect to area handsets.



A. Ethernet
B. local
C. metro
D. cellular


Answer: Cellular

The internet has adopted the _____ set of protocols to define its format of communications between devices.

Add Comment

The internet has adopted the _____ set of protocols to define its format of communications between devices. 



A. HTTP
B. FTP
C. TCP/IP
D. DNS


Answer: TCP/IP

With the help of a _____, devices can modulate signals from one form to another to allow them to connect to the Internet.

Add Comment

With the help of a _____, devices can modulate signals from one form to another to allow them to connect to the Internet.



A. twisted-pair cable
B. spectrum
C. Radio wave
D. modem



Answer: Modem

____ is a popular cable type used as network backbone by major telecommunications companies.

Add Comment

____ is a popular cable type used as network backbone by major telecommunications companies.




A. twisted pair
B. fiber optic
C. coaxial
D. FCC



Answer: Fiber Optic

In a ____ portal, a user can access information related to his or her specific company, including communications tools for collaboration.

Add Comment

In a ____ portal, a user can access information related to his or her specific company, including communications tools for collaboration.



A. vertical
B. horizontal
C. corporate
D. system



Answer: Corporate

A search engine attempts to catalog every Web page by topic through the use of a _____.

Add Comment

A search engine attempts to catalog every Web page by topic through the use of a _____.



A. spider
B. petabyte
C. shield
D. tracker



Answer: Spider

Signing up for a(n) ____ will automatically provide you with Web content that is updated on a regular basis.

Add Comment

Signing up for a(n) ____ will automatically provide you with Web content that is updated on a regular basis.



A. RSS feed
B. blog
C. XML tag
D. push feed



Answer: RSS feed

Through the use of the plug-in, ____, a Web Page can provide a use with an interactive experience.

Add Comment

Through the use of the plug-in, ____, a Web Page can provide a use with an interactive experience.




A. Microsoft Word
B. Flash
C. internet Explorer
D. Apache



Answer: Flash

Thanks to _____ files, a Web site can recognize you and cater to your individual tastes each time you visit.

Add Comment

Thanks to _____ files, a Web site can recognize you and cater to your individual tastes each time you visit.



A. FTP
B. Cookie
C. Server
D. protocol



Answer: Cookie

Web developers use ____ to categorize and classify content when creating a Web page.

Add Comment

Web developers use ____ to categorize and classify content when creating a Web page.



A. HTML
B. Java
C. XML
D. Ajax


Answer: XML

In the URL http://www.cengage.com/index.html, cengage.com is the _____.

Add Comment

In the URL http://www.cengage.com/index.html, cengage.com is the _____.



A. protocol
B. domain name
C. Web server
D. location on the server



Answer: domain name

___ is commonly used to enable Web browsers to communicate with Web servers.

Add Comment

____ is commonly used to enable Web browsers to communicate with Web servers. 



A. TCP
B. SMTP
C. HTTP
D. IP


Answer: HTTP

A well-known range of ____ is reserved by convention to identify specific service types provided by host computers.

Add Comment

A well-known range of ____ is reserved by convention to identify specific service types provided by host computers.



A. IP addresses
B. sockets
C. URLs
D. Port numbers



Answer: Port numbers

A _____ network is used when a user wants to make his or her computer and others' computers available for access.

Add Comment

A _____ network is used when a user wants to make his or her computer and others' computers available for access.



A. peer-to-peer
B. client-to-server
C. peer-to-server
D. client-to-peer


Answer: Peer-to-peer

In a(n) _____ relationship, multiple users are provided with access to multiple Web sites at the same time.

Add Comment

In a(n) _____ relationship, multiple users are provided with access to multiple Web sites at the same time.



A. NSP
B. Client/server
C. ISP
D. protocol



Answer: client/server

A(n) ____ is a company that provides a subscriber with access to the Internet.

Add Comment

A(n) ____ is a company that provides a subscriber with access to the Internet. 




A. ISP
B. ASP
C. TCP
D. IP



Answer: ISP

___ defines how information travels across the Internet.

Add Comment

___ defines how information travels across the Internet.




A. POP
B. TCP/IP
C. SMTP
D. NP


Answer: TCP/IP

Updates are provided by software companies in order to ____.

Add Comment

Updates are provided by software companies in order to ____. 



A. fix bugs
B. improve functionality
C. Patch security holes
D. All of the above


Answer: All of the above

A _____ license can be used anywhere on a college campus.

Add Comment

A _____ license can be used anywhere on a college campus. 



A. multiuser
B. site
C. concurrent user
D. campus user



Answer: Site

Personal Software can assist you in accomplishing all of the following task EXCEPT _____.

Add Comment

Personal Software can assist you in accomplishing all of the following task EXCEPT _____.



A. balancing your budget
B. monitoring your diet
C. finding today's weather
D. installing a printer



Answer: Installing a printer

Typing the word "DEL" on a prompt line to remove unwanted files on your computer is an example of a ______ user interface.

Add Comment

Typing the word "DEL" on a prompt line to remove unwanted files on your computer is an example of a ______ user interface. 



A. prompt
B. command-based
C. graphical
D. type driven


Answer: command-based

Performing a system ____ utility rearranges your files on disk in an orderly fashion resulting in faster access.

Add Comment

Performing a system ____ utility rearranges your files on disk in an orderly fashion resulting in faster access.



A. defragmentation
B. diagnostic
C. security
D. File Management



Answer: Defragmentation

Embedded operating systems are hardwired into a computer component, such as ROM or flash memory, to control a ____ computer.

Add Comment

Embedded operating systems are hardwired into a computer component, such as ROM or flash memory, to control a ____ computer.



A. Laptop
B. server-based
C. special-purpose
D. mainframe


Answer: Special-purpose

An advantage of _____ software is ability to run more than one operating system on a computer.

Add Comment

An advantage of _____ software is ability to run more than one operating system on a computer.



A. BIOS
B. RAM
C. POST
D. VM



Answer: VM

Linux is ____ software, which means users can manipulate the source code to customize their operating system to their needs.

Add Comment

Linux is ____ software, which means users can manipulate the source code to customize their operating system to their needs.



A. Concurrent
B. licensed
C. Sourceware
D. open-source


Answer: Open-source

A recent version of the Windows operating system is ____.

Add Comment

A recent version of the Windows operating system is ____.



A. WIndows Me
B. WIndows NT
C. Windows 10
D. Windows Vista


Answer: Windows 10

An icon on your desktop represents a ____ interface.

Add Comment

An icon on your desktop represents a ____ interface.



A. command-based
B. BIOS
C. Task-based
D. graphical



Answer: graphical

The purpose of the ____ is to store the boot process instructions for the computer to start up.

Add Comment

The purpose of the ____ is to store the boot process instructions for the computer to start up. 




A. FIOS
B. POST
C. BIOS
D. I/O



Answer: BIOS

When you combine a system's hardware configuration and operating system, it is defined as the computer's ____.

Add Comment

When you combine a system's hardware configuration and operating system, it is defined as the computer's ____. 




A. system
B. platform
C. interface
D. dynamic



Answer: Platform

Each programming language has a particular ____-the rules that guide how programming statements are constructed.

Add Comment

Each programming language has a particular ____-the rules that guide how programming statements are constructed.




A. Syntax
B. vocabulary
C. toolbox
D. object set



Answer: Syntax

Making changes to a software program after it has been released is referred to as the ____ stage of the development cycle.

Add Comment

Making changes to a software program after it has been released is referred to as the ____ stage of the development cycle.



A. implementation
B. verification
C. design
D. maintenance



Answer: Maintenance

A ____ is a set of instructions or statements to the computer.

Add Comment

A ____ is a set of instructions or statements to the computer.




A. filename
B. Computer program
C. supportive tool
D. Programming Language



Answer: Computer Program

Through the use of ____, pilots can simulate flights without ever leaving the ground.

Add Comment

Through the use of ____, pilots can simulate flights without ever leaving the ground.




A. haptic output
B. screen readers
C. mobile devices
D. virtual reality



Answer: Virtual reality

All of the following are examples of special-purpose input devices EXCEPT _____.

Add Comment

All of the following are examples of special-purpose input devices EXCEPT _____.



A. MICR
B. OMR
C. OCR
D. CRT



Answer: CRT

Music speakers are classified as ____ devices.

Add Comment

Music speakers are classified as ____ devices.



A. external
B. internal
C. output
D. input


Answer: Output

Two types of ____ are voice commands and marks on paper.

Add Comment

Two types of ____ are voice commands and marks on paper.



A. software
B. output
C. input
D. flash



Answer: Input

On political storage media, a ____ in a specified location represents a 0 (zero).

Add Comment

On political storage media, a ____ in a specified location represents a 0 (zero).




A. bit
B. Land
C. pit
D. charge



Answer: Pit

Magnetic disks are a _____ access storage medium.

Add Comment

Magnetic disks are a _____ access storage medium.




A. direct
B. consecutive
C. volatile
D. sequential



Answer: direct

Random access memory is considered _____ storage.

Add Comment

Random access memory is considered _____ storage.



A. flash
B. solid-state
C. primary
D. secondary



Answer: Primary

Which of the following is NOT an example of solid-state technology?

Add Comment

Which of the following is NOT an example of solid-state technology?



A. Blu-ray disc
B. flash drive
C. media card
D. USB drive



Answer: Blu-ray disc

With____memory, data is stored permanently with no moving parts or the need for electricity.

Add Comment

With____memory, data is stored permanently with no moving parts or the need for electricity.




A. flash
B. optical
C. magnetic
D. compact disc



Answer: Flash

All of the following are examples of optical storage EXCEPT

Add Comment

All of the following are examples of optical storage EXCEPT




A. DVD
B. CD
C. Blu-ray
D. USB drive



Answer: USB drive

ROM is used for important programs like the ____, which tells the computer how to start.

Add Comment

ROM is used for important programs like the ____, which tells the computer how to start.



A. RAM
B. Magnetic field
C. firmware
D. BIOS



Answer: BIOS

All of the following sequences are part of the machine cycle EXCEPT

Add Comment

All of the following sequences are part of the machine cycle EXCEPT



A. fetch
B. decode
C. merge
D. store



Answer: merge

The size and shape of the ____ influences what a system component may look like.

Add Comment

The size and shape of the ____ influences what a system component may look like.



A. bus
B. motherboard
C. microprocessor
D. transistor



Answer: Motherboard

The ____ is the key, active component in practically all modern electronics.

Add Comment

The ____ is the key, active component in practically all modern electronics. 



A. automator
B. concatenator
C. transistor
D. amplifier



Answer: Transistor

Moore's Law states that the number of transistors on a chip will double about every ____ months.

Add Comment

Moore's Law states that the number of transistors on a chip will double about every ____ months.




A. 10
B. 12
C. 16
D. 24



Answer: 24

A multiprocessor system may combine a ___ with a graphics processor to accomplish a particular type of function.

Add Comment

A multiprocessor system may combine a ___ with a graphics processor to accomplish a particular type of function.




A. CPU
B. teraflop
C.cache
D. register



Answer: CPU

The speed of the ___ dictates how fast the processor can process data.

Add Comment

The speed of the ___ dictates how fast the processor can process data.



A. FSB bus
B. ALU
C. cache
D. internal clock



Answer: Internal clock

A CPU component known as ___ carries out the instructions used for all mathematical and logical operations.

Add Comment

A CPU component known as ___ carries out the instructions used for all mathematical and logical operations.




A. control unit
B. ALU
C. register
D. system clock



Answer: ALU

Digitizing our media and information has raised serious concerns about all of the following EXCEPT____

Add Comment

Digitizing our media and information has raised serious concerns about all of the following EXCEPT____




A. productivity
B. Privacy
C. Information security
D. intellectual property rights



Answer: Productivity

What two digits represent the binary number system.

Add Comment

What two digits represent the binary number system.




A. 1 and 2
B. 0 and -1
C. 0 and 1
D. A and B



Answer: 0 and 1

ASCII is the standard used to represent ___ in digital form.

Add Comment

ASCII is the standard used to represent ___ in digital form.




A. video
B. audio
C. keyboard characters
D. signals


Answer: Keyboard characters

Personal music videos that combine user-generated photos with audio music is a good example of___.

Add Comment

Personal music videos that combine user-generated photos with audio music is a good example of___.



A. digitization
B. digital convergence
C. computer literacy
D. ASCII



Answer: Digital convergence

A computer uses___to display an image after it has been digitized.

Add Comment

A computer uses___to display an image after it has been digitized.



A. icons
B. bytes
C. bits
D. pixels



Answer: Pixels

A___ can represent either a letter or a color.

Add Comment

A___ can represent either a letter or a color.



A. byte
B. decimal
C. digitization
D. information



Answer: Byte

The term computer ____ best describes the level of technology skills needed in today's business.

Add Comment

The term computer ____ best describes the level of technology skills needed in today's business.




A. Knowledge
B.Fluency
C.Digitization
D. information


Answer: Fluency
Subscribe to: Posts (Atom)

Search your questions here...

Trending Questions

  • Which network device makes forwarding decisions based on the destination MAC address that is contained in the frame?
    Which network device makes forwarding decisions based on the destination MAC address that is contained in the frame? repeater hub ...
  • A line includes a _________ that identifies which particular block is currently being stored.
    A line includes a _________ that identifies which particular block is currently being stored. a. cache b. hit c. tag d. locality ...
  • A device has an IPv6 address listed as 2001:0DB8:75a3:0214:0607:1234:aa10:ba01. What is the interface ID of the device?
    A device has an IPv6 address listed as 2001:0DB8:75a3:0214:0607:1234:aa10:ba01. What is the interface ID of the device? ba01 0607:...

Blog Archive

  • July 2020 (202)
  • July 2019 (32)
  • May 2019 (151)
  • March 2019 (150)
  • February 2019 (150)
  • November 2018 (118)
  • October 2018 (217)
  • September 2018 (24)
  • July 2018 (51)
  • November 2017 (30)
  • October 2017 (222)
  • September 2017 (150)

Label

Artificial Intelligence Chapter 10 Artificial Intelligence ORAL DEFENSE Assembly CGS Compiler Design CS CS 2160 CSIT Graphic Design INFO 370 Information Security Chapter 2 IT Essentials LIS4369 MIST Mobile App Programming Security and Risk Management Web Graphics Web Technologies
Powered by Blogger.
Copyright © 2015 CSIT MCQ | Term Of Service | Disclaimer | Privacy Policy | DMCA