1. All of the following are examples of real security and privacy risks EXCEPT:
A. hackers
B. spam
C. viruses
D. identity theft
Answer: B
2. A process known as ___ is used by large retailers to study trends.
A. data mining
B. data selection
C. POS
D. data conversion
Answer: A
3. ___ terminals (formerly known as cash registers) are often connected to complex inventory and sales computer systems.
A. Data
B. Point-of-sale (POS)
C. Sales
D. Query
Answer: B
4. A hybrid computer
a. Resembles digital computer
b. Resembles analog computer
c. Resembles both a digital and analog computer
d. None of the above
Answer: C
5. The networking becomes ___ through networking.
a. very difficult
b. dull
c. easy
d. has no role in marketing
Ans: (C)
6. Which of the following is NOT one of the four major data processing functions of a computer?
A. gathering data
B. processing data into information
C. analyzing the data or information
D. storing the data or information
Answer: C
7. ___ tags, when placed on an animal, can be used to record and track in a database all of the animal’s movements.
A. POS
B. RFID
C. PPS
D. GPS
Answer: B
8. Surgeons can perform delicate operations by manipulating devices through computers instead of manually. This technology is known as:
A. robotics
B. computer forensics
C. simulation
D. forecasting
Answer: A
9. Technology no longer protected by copyright, available to everyone, is considered to be:
A. proprietary
B. open
C. experimental
D. in the public domain
Answer: A
10. ___ is the study of molecules and structures whose size ranges from 1 to 100 nanometers.
A. Nano science
B. Microelectrodes
C. Computer forensics
D. Artificial intelligence
Answer: A
11. ___ is the science that attempts to produce machines that display the same type of intelligence that humans do.
A. Nanoscience
B. Nanotechnology
C. Simulation
D. Artificial intelligence (AI)
Answer: D
12. ___ is data that has been organized or presented in a meaningful fashion.
A. A process
B. Software
C. Storage
D. Information
Answer: D
13. The name for the way that computers manipulate data into information is called:
A. programming.
B. processing.
C. storing.
D. organizing.
Answer: B
14. Computers gather data, which means that they allow users to ___ data.
A. present
B. input
C. output
D. store
Answer: B
15. After a picture has been taken with a digital camera and processed appropriately, the actual print of the picture is considered:
A. data.
B. output.
C. input.
D. the process.
Answer: B
16. Computers use the ___ language to process data.
A. processing
B. kilobyte
C. binary
D. representational
Answer: C
17. Computers process data into information by working exclusively with:
A. multimedia
B. words
C. characters
D. numbers
Answer: D
18. In the binary language each letter of the alphabet, each number and each special character is made up of a unique combination of:
A. eight bytes
B. eight kilobytes
C. eight characters
D. eight bits
Answer: D
19. The term bit is short for:
A. megabyte
B. binary language
C. binary digit
D. binary number
Answer: C
20. A string of eight 0s and 1s is called a:
A. megabyte
B. byte
C. kilobyte
D. gigabyte
Answer: B
21. A ___ is approximately one billion bytes.
A. kilobyte
B. bit
C. gigabyte
D. megabyte
Answer: C
22. A ___ is approximately a million bytes.
A. gigabyte
B. kilobyte
C. megabyte
D. terabyte
Answer: C
23. ___ is any part of the computer that you can physically touch.
A. Hardware
B. A device
C. A peripheral
D. An application
Answer: A
24. The components that process data are located in the:
A. input devices
B. output devices
C. system unit
D. storage component
Answer: C
25. All of the following are examples of input devices EXCEPT a:
A. scanner
B. mouse
C. keyboard
D. printer
Answer: D
0 Comments