Key CSI
Key CSI
Type 1
1. Name two needs of society that led to the development of more complex
mathematics.
F. The evolution of the human race [i.e.] Advancing from tents to buildings and
building structures of epic proportions and scale (i.e.) Pyramids and Greek
Parthenon’s. Navigation across both land and water also demanded the need for
more complex math.
2. What was the first mechanical device used for calculation?
F. The Slide ruler was the first mechanical device used for calculation.
3. How would you compare the early electronic computer to the player piano?
F. Both devices had a stored program and could be programmed by using the
interface.
4. What technology did Herman Hollerith borrow from the Jacquard loom?
F. The concept of PUNCH CARDS (i.e.) A set of re-usable cards. Similar to that of
the PLAYER PIANO [used at that time period.] Where a series of holes in a paper
drum had air blowing through them, determining which notes to play.
5. Who has been called the first programmer?
F. Ada Lovelace Byron
6. Name an important concept attributed to the person named Ada Lovelace Byron.
F. The "program loop."
7. What innovation does the ENIAC appear to borrow from the Atanasoff-Berry
Computer?
F. Vacuum tubes and Boolean logic were the innovations the ENIAC borrowed from
the Atanasoff-Berry Computer.
8. Name at least one computer other than ENIAC that was developed independently
and simultaneously during World War II.
F. Mark I
9. What reason is given for the invention of assembly language?
F. Writing programs in binary is long, tedious and an error-prone process. Assembly
language is easier to manage than straight binary.
10. What color can you attribute to IBM of the 1950s, and what significance did it
have for IBM's eventual dominance of the marketplace?
F. Blue was the color that could be attributed to IBM in the 1950’s. The significance it
had to IBM’s eventual dominance in the market place was the appeal it had to the
general public. Showing men in blue business suits, as well as their slogan: “You
can’t go wrong buying IBM.”
Type 2
1. In 1642 Pascal created a mechanical device with gears and levers. This device
was capable of what kind of calculation?
A. Addition
B. Addition and subtraction
C. Addition, subtraction, and multiplication
D. Addition, subtraction, multiplication, and division
2. Leibniz built on Pascal's work by creating the Leibniz Wheel. This device was
capable of what kind of calculations in addition to the ones Pascal's could do?
A. Subtraction
B. Addition and multiplication
C. Subtraction and multiplication
D. Multiplication and division
3. The Jacquard loom is important in the history of computing for what innovation?
A. It worked like a player piano.
B. Reusable cards with holes held information.
C. It used gears and wheels for calculation.
D. Paper rolls with holes held information.
5. Name the four important elements of Babbage's Engine that are components of
today's computer.
A. The stored program technique, an input device, an output device, and memory
B. Mechanical calculation equipment, human-powered mechanisms, punched cards,
and an output device
C. An input device, memory, a central processing unit, an output device
D. An input device, the stored program technique, a central processing unit, and an
output device
6. What logical elements did Charles Sanders Peirce realize electrical switches could
emulate in 1880?
A. Epistemological calculus
B. Ontological algebra
C. Boolean algebra
D. Metaphysical algebra
7. The U.S. military used the ENIAC computer for its intended purpose during World
War II.
A. True
B. False
9. What company controlled 70% or more of the computer marketplace in the '60s
and '70s?
A. Sperry-Univac
B. International Business Machines
C. Hollerith Machines
D. Microsoft
10. What features of transistors made them superior for computers, compared with
vacuum tubes?
A. They were more expensive than tubes but lasted longer and were cooler in
temperature.
B. They didn't last as long as tubes but were less expensive.
C. They were cheaper and smaller than tubes.
D. They were cheaper, smaller, and cooler than tubes and lasted longer.
11. What important pastry helped move your job up in the queue in second
generation software, and what third-generation software development made that
pastry unnecessary?
A. Donuts and integrated circuits
B. Bear claws and multitasking
C. Donuts and time-sharing
D. Donuts and virtual memory
12. In hardware, the next step up from the transistor was the transmitter.
A. True
B. False
13. What magazines can you thank for the first microcomputer?
A. Science and Wall Street Journal
B. Popular Electronics and Radio Electronics
C. Popular Electronics and Star Trek Monthly
D. New Mexico Entrepreneur and Radio Electronics
14. What important concept did the Altair use, which was borrowed by its
competition, including the IBM personal computer?
A. The computer came in kit form.
B. The computer's price was $666.
C. The machine had an open architecture.
D. The machine could be used without plugging it into a wall outlet.
15. The Apple computer became very popular. What was its largest market, and
what software made it interesting to that market?
A. The education market and the educational game Shape Up
B. The games market and the game The Big Race
C. The business market and the program Lotus 1-2-3
D. The business market and the program visicalc
16. In 1990, what software company dominated the software market, and what major
product did it sell?
A. Lotus and Lotus 1-2-3
B. Bricklin and visicalc
C. Apple and the Apple Operating System
D. Microsoft and Word
17. Today, Microsoft considers its major competition in operating systems to be what
system?
A. Control Data Corporation OS
B. Sega Games operating system
C. Linux operating system
D. Mac OS X
18. ARPA was created in response to what major event in world history?
A. World War II
B. The mccarthy hearings of the 1950s
C. The launch of Sputnik
D. The inability of computers to communicate with one another
19. Name the three most likely critical large-scale developments of the fifth
generation of software development from this list of options:
A. Parallel computing, networking, and the multiple-data-stream approach
B. The graphical user interface, networking, and computer-aided software
engineering (CASE) tools
C. Networking, the graphical user interface, and packet switching
D. ARPANET, the Internet, and CASE tools
20. Marc Andreessen released what application that made browsers widespread?
A. Netscape
B. Mosaic
C. Explorer
D. Hypertext
18. The _______________ contains instructions and data that provide the startup
program for a computer.
A. RAM
B. DRAM
C. BIOS
D. CPU
7. What numeric value in base 10 does the binary number 10101010 represent?
F. 170
8. What is the binary equivalent of the decimal number 345?
F. 101011001
9. What base 10 value is equivalent to 1C4B?
F. 7243
10. What base 16 value is equivalent to 2576?
F. A10
11. What numeric value in hexadecimal is equivalent to the binary number
1011111010101101?
F. BEAD
12. What binary value is equivalent to the hexadecimal number C43A?
F. 1100 0100 0011 1010
13. What is the binary result of adding the binary numbers 1001 + 1111?
F. 11000
14. What is the twos complement value of the binary number 01110110?
F. 10001010
15. How many unique characters does Extended ASCII allow?
F. 256
16. How many pixels is a computer monitor with a resolution of 1024 x 768 capable
of displaying?
F. 786432 Pixels
17. What is the ASCII code (in hex) for the uppercase letter A?
F. 41
18. How many different colors can be represented with a 24-bit pixel?
F. More than 16 million different colors
19. Which of these image formats BMP, JPG, GIF is not compressed?
F. BMP
20. Any number raised to the 0 power returns a value of what?
F. 1
Type 2
1. What is the positional value of the A in the hexadecimal nummber C4A6?
A. 1
B. 16
C. 160
D. 256
5. What is the largest number of items that can be represented with four
hexadecimal digits?
A. 4096
B. 40,960
C. 65,536
D. None of the above
7. What numeric value in base 10 does the binary number 10000001 represent?
A. 129
B. 10,000,001
C. 65
D. None of the above
13. What is the binary result of adding the binary numbers 0110 + 1101?
A. 10011
B. 1111
C. 01101101
D. 101001
14. What is the two's complement value of the binary number 010100110?
A. 101011001
B. 101011010
C. 010100111
D. None of the above
16. How many total bits are required to store 24-bit color information for a 1024 x
768 display?
A. 18,874,368
B. 786,432
C. 1024
D. 24
17. What is the ASCII code (in hex) for the lowercase letter z?
A. 7A
B. 80
C. 32
D. AB
18. What is the minimum number of bits required to represent 256 colors?
A. 4
B. 8
C. 16
D. 32
19. What color is represented if all the pixel bits are 1s?
A. Red
B. Black
C. Cyan
D. White
Chapter 5 Type 1
1. What is the first program loaded into memory when a computer is started?
F. The operating system is the first program loaded into memory when a computer is
started.
2. Special programs designed to allow the computer to communicate with peripheral
devices are called what?
F. Drivers are special programs designed to allow the computer to communicate with
peripheral devices.
3. What is the core program of an OS called?
F. The CORE program of an OS called the Kernel.
4. What is multitasking?
F. Is an operating system‘s capability to effectively support more than one process
running at a time.
5. What is multiprocessing?
F. Is the coordinated execution of a process, using two or more cpus at the same
time.
6. What are the four main categories of OS functions?
F. The four main categories of operating system functions are:
F. - Providing a user interface
F. - Managing processes
F. - Managing resources (inc memory)
F. - Providing security
7. What are the two basic types of user interfaces in an OS?
F. The two basic types of user interfaces in an operating system are:
F. - Command-Line Interface
F. - Graphical User Interface [GUI]
8. What is a process in an OS?
F. A process in an Operating System is each program you run. Processes might then
start other processes to support them.
9. What method allows multiple processes to share the CPU?
F. The method allows multiple processes to share the CPU is called Time Slicing.
10. What is the purpose of an interrupt handler?
F. The purpose of an interrupt handler is to allow processes and hardware I/O
devices to interrupt the Processors' normal executing so that it can handle specific
tasks.
11. Folders and files in an OS are organized into what type of structure?
F. Folders and files in an operating system are organized into treelike structure.
12. In Linux, how do you access information on OS commands?
F. In Linux, you access information on operating system commands by using the ls
command.
13. What is the purpose of formatting a disk?
F. The purpose of formatting a disk is to arrange the disk surface into addressable
areas and to set up the basic directory tree structure on the disk.
14. Give an example of a case-sensitive OS.
F. Linux is a case-sensitive operating system.
15. What command is used in Linux to create a folder?
F. The command that is used in Linux to create a folder is: mkdir directory name
16. What command is used in Linux to list folders and files on a drive?
F. The command is used in Linux to list folders and files on a drive is: ls
17. In an operating system, what's a wildcard?
F. A wild card is a symbol that stands for one or more characters, used in selecting
files or directories.
18. In Windows, what key is used to rename a file?
F. In Windows, the key used to rename a file is F2
19. For what task is Plug and Play used in an OS?
F. Pnp is a technology that allows the OS and hardware to work together to detect
and configure I/O devices automatically.
20. Do PDA devices require an OS?
F. PDA devices DO require an operating system.
Type 2
3. The portion of an OS remains in memory the entire time the computer is on.
A. CPU
B. Overlay
C. Interrupt
D. Kernel
10. The process of arranges the disk's surface into addressable areas and sets up
the disk's basic directory tree structure.
A. Partitioning
B. Time slicing
C. Booting
D. Formatting
14. What is the Linux command to list files and folders on a disk?
A. Ls
B. Lsdir
C. Chdir
D. List
15. Which of the following is the Linux command to rename files?
A. Rename
B. F11
C. Mv
D. Ls
17. In Windows Explorer, you can select multiple folders and files by using the left
mouse button combined with which of the following?
A. Right mouse button
B. Shift key
C. Alt key
D. Spacebar
18. The Linux wildcard _______________ can be used to match multiple characters.
A. ? (question mark)
B. - (hyphen)
C. / (forward slash)
D. * (asterisk)
20. Windows Explorer can be used to drag and drop both files and folders.
A. True
B. False
Chapter 6
Type 1
1. What are the two general types of transmission media?
F. Guided and Un-guided media.
2. What are the four ways to rate transmission media?
F. The 4 ways to rate transmission media are:
F. - Band Width.
F. - Signal-to-noise ratio.
F. - Bit error rate.
F. - Attenuation.
3. What are the two basic copper wire formats?
F. The 2 basic copper wire formats are:
F. - Twisted pair.
F. - Coaxial.
14. What frequency range are voice-grade telephone lines designed to carry?
F. The frequency range voice-grade telephone lines carry are designed to carry are:
300 to 3300Hz.
15. What is the speed range of DSL?
F. The speed range for DSL is: 256 Kbps to 1.5Mbps.
16. What is bandwidth?
F. A measurement of how much information can be carried in a given time period
over a wired or wireless communication medium usually measured in bps.
17. How does a WLAN differ from a LAN?
F. WLAN differs from LAN in that WLAN is a wireless topology that spans continents
as opposed to being confined to one building, structure or area.
18. What is the difference between AM and FM?
F. The difference between AM and FM are as follows:
F. - AM: (Amplitude Modulation) A technique of placing data on an alternating carrier
wave by varying the signal’s amplitude; this technique is often in modems.
F. - FM: (Frequency Modulation) A technique of placing data on an alternating carrier
wave by varying the signal’s frequency; this techniques is often used in modems.
19. How many standard voice lines are equivalent to a T1 line?
F. There are: 28 standard voice lines on a T1 line.
20. Which type of multiplexing combines signals on a circuit by dividing available
transmission bandwidth into narrower bands?
F. FDM: (Frequency Division Multiplexing) combines signals on a circuit by dividing
available transmission bandwidth into narrow bands.
Type 2
1. Which is a better signal-to-noise ratio?
A. High
B. Low
C. Guided
D. Unguided
2. Fiber-optic cable is made of:
A. Glass
B. Nylon
C. Braided copper
D. Copper
3. Which is a faster networking cable?
A. 10baset
B. 100baset
12. Standard voice-grade lines are designed to carry frequencies in the range of:
A. 1.5 mhz to 15 mhz
B. 500 mhz to 1 mhz
C. 56 khz to 100 khz
D. 300 Hz to 3300 Hz
16. What factor reduces the strength of an electrical signal as it travels along a
transmission medium?
A. Bandwidth
B. Signal-to-noise ratio
C. Bit error rate
D. Attenuation
17. Which of the following is the most commonly used twisted pair cable category?
A. Cat 1
B. Cat 5
C. 10Base2
D. 10Base5
18. Which type of guided medium is the least susceptible to attenuation and
inductance?
A. Coaxial cable
B. Twisted pair cable
C. Fiber-optic cable
D. They are all the same
19. Which topology has become more popular with the advent of the Internet and
home networking?
A. Token ring
B. Star
C. Bus
D. Loop
Chapter 7
Type 1
Type 2
1. The Internet is owned by:
A. ARIN
B. The FCC
C. The United Nations
D. None of the above
10. Which Internet component is responsible for decrementing the TTL field?
A. Router
B. Switch
C. DNS
D. Packet
11. Which of the following is an example of a high-level protocol?
A. TCP
B. IP
C. DHCP
D. SMTP
16. How many IP addresses are presented to the Internet when NAT is used?
A. 1
B. 21
C. Thousands
D. Unlimited
20. Bots are used by ______________ to crawl the World Wide Web.
A. Routers
B. Search engines
C. XML
D. TCP/IP
Chapter 8
Type 1
15. Wriew a SQL SELECT statement to list a team with minimum wins (use the table
in figure Database-1).
F. SELECT TOP 1 * FROM result ORDER BY wins.
16. Wriew a SQL SELECT statement to list a team with maximum losses (use the
table in figure Database-1).
F. SELECT TOP 1 * FROM result ORDER BY losses DESC.
Type 2
D. DB2
2. A table is divided into databases.
A. True
B. False
12. When creating a table in SQL, you must specify whether the column is NULL or
NOT NULL.
A. True
B. False
13. The SQL INSERT INTO statement allows adding multiple records in one
statement.
A. True
B. False
14. By default, data returned by the SQL SELECT statement is in descending order.
A. True
B. False
15. Which of the following SQL SELECT options is used to organize the data being
returned?
A. ORDER BY
B. SORT BY
C. WHERE
D. None of the above
Chapter 9
Type 1
1. Describe the uses of an array.
F. Arrays are used for storing similar kinds of information in memory. This
information can be sorted or left in the order it was entered in the array
2. How would you define an array to keep track of five students' ID numbers (integer
value) and their final averages, rounded to the nearest whole number (integer
value)?
F. Int [ ][ ] astudentid = new int [5] [5] ;
3. Using the array to keep track of five students' ID numbers (integer value) and their
final averages , write the statements to store information for the five students' ID
numbers and final averages in each array element.
F. Int astudentid [ ] [ ] = { {32, 12, 18, 54, 22}, {10,11,12,13,14} } ;
4. Describe in your own words how a stack works.
F. Stacks are similar to an all-you-can-eat buffet. Restaurants provide plates for
customers. The plate holder is spring loaded, and as the customer removes a plate
from the stack, every plate moves up one position.
5. Describe in your own words how a queue works.
F. Similar to waiting for a ride at an amusement park. The first person in line is the
first person to get on the ride and leave the line, whereas the last person in line waits
the longest to get on the ride and leave the line.
6. Describe in your own words how a binary tree works.
F. A binary tree is like a family tree. It represents data in an orderly fashion and is
useful for list-like data speeding up searches.
7. Show each step to sort the data by using a bubble sort (use figure Data structure-
1).
F. 2, 32, 4, 7, 10, 25;
F. 2, 4, 32, 7, 10, 25;
F. 2, 4, 7, 32, 10, 25;
F. 2, 4, 7, 10, 32, 25;
F. 2, 4, 7, 10, 25, 32;
8. Show each step to sort the data by using a selection sort (use figure Data
structure-1).
F. 2, 4, 7, 32, 25, 10;
F. 2, 4, 7, 10, 25, 32;
9. Show each step to sort the data by using a bubble sort (use figure Data structure-
2).
F. 1, 5, 32, 30, 2, 20;
F. 1, 2, 5, 32, 30, 20;
F. 1, 2, 5, 20, 32, 30;
F. 1, 2, 5, 20, 30, 32;
10. Show each step to sort the data by using a selection sort (use figure Data
structure-2).
F. 1, 32, 30, 5, 2, 20;
F. 1, 2, 30, 5, 32, 20;
F. 1, 2, 5, 30, 32, 20;
F. 1, 2, 5, 20, 32, 30;
F. 1, 2, 5, 20, 30, 32;
11. What is the maximum height of the tree (use figure Data structure-3)?
F. The height of the tree is: 4
12. On what level is the node with the value 15 (use figure Data structure-3)?
F. The node with the value 15 is on level 3.
13. Show the steps to find the value 7 (use figure Data structure-3).
F. 1-Start at the root node.
F. 2-Does the value 7 = the root value (21)? No.Then is the value 7 > the root value
(21) No Move left child (19).
F. 3-Does the value 7 = the root value (19)? No. Then is the value 7 > the root value
(19) No Move left child (10).
F. 4-Does the value 7 = the root value (10)? No. Then is the value 7 > the root value
(10) No. Move left child (7).
F. 5-Does the value 7 = the root value (10)? Yes. Stop traversing the tree.
14. Show the steps to find the value 17 (use figure Data structure-3).
F. 1-Start at the root node.
F. 2-Does the value 17 = the root node 21? No.Then is the value 17 > the root value
(21)? No.Move left child (19).
F. 3-Does the value 17 = the root value 19? No.Then is the value 17 > the root value
(19)? No.Move left child (10).
F. 4-Does the value 17 = the root value 10? No.Then is the value 17 > the root value
(10)? Yes.Move right Child (15)
F. 5-Does the value 17 = the root value 15? No.Then is the value 17 > the root value
(15)? Yes.Move right Child (17)
F. 6-Does the value 17 = the root value 17? Yes.Stop traversing the tree.
Type 2
3. A single array can contain information of different data types (integers, characters,
decimals, and so on).
A. True
B. False
4. The statement char[] aanswers = new char[5] declares an array that has memory
locations of 1 through 5.
A. True
B. False
18. Given the following numbers 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, and 12.Draw a binary
search tree for these numbers.How many comparisons does it take to find the
number 11?
F. 11
19. Given the following numbers 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, and 12.Draw a binary
search tree for these numbers.What is the maximum height of the tree?
F. 11
20. Given the following numbers 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, and 12.Draw a binary
search tree for these numbers.On what level is the number 6?
F. 5
Chapter 10 Type 1
13. What are the strengths and weaknesses of sequential file access and random
file access?
F. The advantage of sequential file access is that because data is appended to the
end of the file, the writing process is fast.
F. The disadvantage is that retrieving data can be extremely slow, depending of the
data's location.
F. The advantages of random file access are getting to a particular file faster and
being able to update the record in place.
F. The disadvantage is that disk space can be wasted if data does not fill the entire
record or if some record numbers do not have data.
14. Explain how hashing works.
F. Hashing uses a hashing algorithm to generate a unique value called a hash key
for each record.
F. The hash key is then used as a key value in a list of rows or records of
information.
F. Combining hash keys establishes an index.
Type 2
1. Which of the following is not a responsibility of the file system?
A. Creating files
B. Manipulating files
C. Renaming files
D. Copying files
E. None of the above
4. Which of the following FAT formats allows the largest volume size?
A. FAT12
B. FAT16
C. FAT32
D. All FAT formats have the same maximum volume size.
6. FAT32 provides the capability to assign access rights to a file and directory.
A. True
B. False
Chapter 11 Type 1
1. What is an algorithm?
F. A logically ordered set of statements used to solve a problem.
2. Write an algorithm for calculating your checkbook balance.
F. If amount is to be deposited, add it to current balance;
F. If the amount is to be withdrawn, subtract it from the current balance.
3. Write the pseudocode for a program that can calculate your checkbook balance.
F. Ask for the current balance of the chequing account;
F. Ask if deposit or withdraw;
F. Ask for amount;
F. Ask for date;
F. If deposit, then current balance = current balance + amount;
F. Else if current balance = current balance - amount;
F. Store information
Type 2
1. Which is not an example of a high-level programming language?
A. Ada
B. Boolean
C. C++
D. Java
2. Which of the following converts source code into a computer language and results
in an executable file?
A. Compiler
B. Interpreter
C. IDE
D. Algorithm
4. Pseudocode should be written after the source code to ensure that the program
was written correctly.
A. True
B. False
5. Which is not a type of programming language?
A. Low-level
B. Assembly
C. High-level
D. Machine
E. None of the above
11. The post-increment operator increments the variable and then processes the
remainder of the statement.
A. True
B. False
12. The preincrement operator increments the variable and then processes the
remainder of the statement.
A. True
B. False
Chapter 12
Type 1
1. Describe what the process of software engineering includes.
F. SE is the process of producing software application.
F. It involes not just the source code but also documentation
2. What is a design document, and how does it affect software engineering?
F. A design document details all the application’s design issues.
F. It includes its functionality, appearance and distribution.
F. Without a well-defined design document, a project is doomed to failure.
F. Creating a design document is based on good communication with end users in
determining the application's and requirements.
3. Write the pseudocode steps for a program that processes a savings deposit in an
ATM.
F. Prompt for card;
F. When card is entered, read card;
F. Ask for PIN;
F. Confirm that PIN matches card;
F. If there is a match, continue with transaction. Otherwise display an error message;
F. As for dollar amount to add to savings;
F. Add dollar amount to savings and update the account.
F. Ask if they would like to make another transaction.If so,continue by going back to
Step 6. Otherwise, display a thank you message and quit
F. Eject card.
4. Write the pseudocode steps for a program that processes a savings withdrawal
from an ATM.
F. Prompt for card.
F. When card is entered, read card.
F. Ask for PIN.
F. Confirm that PIN matches card.
F. If there is a match, continue with transaction. Otherwise display an error message.
F. As for dollar amount to remove from account.
F. Subtract dollar amount from account and update the account.
F. Ask if they would like to make another transaction.If so,continue by going back to
Step 6. Otherwise, display a thank you message and quit
F. Eject card.
5. How can UML help a developer create a program that meets an end user's
needs?
F. UML is a software modeling process that enables developers to create a blueprint
showing the overall functionality of the program
F. It provides a way for clients and developers to communicate
Type 2
1. End users need to be told what they want and how the program should work.
A. True
B. False
7. The best way to write a good program is to have an initial meeting with the end
user to find out the requirements for the project, go back to your office and write the
program, and then deliver the finished product for installation.
A. True
B. False
8. The document responsible for describing the type of data stored in the database is
called the:
A. Design document
B. Data dictionary
C. UML diagram
D. SDLC
E. None of the above
9. Including end users during the entire design process is recommended. In fact, you
can even let them help design screens and reports.
A. True
B. False
10. A ... Is used as a visual model for describing a program's logical steps.
A. Flowchart
B. Class diagram
C. Use case diagram
D. Design document
E. None of the above
11. A ... Is a standard or typical example of how something might work, but without
all the built-in functionality.
A. Flowchart
B. Prototype
C. Design document
D. Data dictionary
E. None of the above
13. Scope creep is good for a project because it's one of the software development
life cycles.
A. True
B. False
14. If end users or testers find a bug in the application, you should find out why they
insist on breaking the program and get them some training so that they will stop
making it crash.
A. True
B. False
15. The tester's role is not as critical as other team roles and should be the first role
eliminated if the project is behind the scheduled completion date.
A. True
B. False
____ involves dividing messages into blocks that can be reassembled at their
destination, with each block possibly following a different path.
Select one:
a. Multiplexing
b. Packet switching
c. Linking
d. Decoding
Which of the following operating systems was developed jointly by IBM and
Microsoft?
Select one:
a. NOS
b. Linux
c. OS/2
d. Unix
In its antitrust suit with the government, Microsoft claimed which of the following
programs was an integral part of the operating system?
Select one:
a. Internet Explorer
b. Navigator
c. Mosaic
d. MS-Word
The Macintosh had the first mass-produced ____ , an interface that uses graphical
instead of text commands.
Select one:
a. ARPA
b. GUI
c. SMP
d. MPP
The term ____ computing or ____ architectures refers to linking a number of CPUs
to work on a task simultaneously.
Select one:
a. monolithic
b. serial
c. sequential
d. parallel
ENIAC was a functioning and useful computer that could perform both arithmetic and
____ operations.
Select one:
a. linguistic
b. logical
c. surgical
d. standard
Which of the following war-time activities caused the U.S. Navy Board of Ordinance
to sponsor the development of the first modern electronic computer?
Select one:
a. map-making
b. aerial reconnaissance
c. weapons development
d. ship building
The loose collection of networks called "the Internet" is the short form of which of the
following words?
Select one:
a. internexus
b. internetwork
c. interconnect
d. interarpanet
Using the Berners-Lee protocols, Marc Andreesen created the browser that had the
most impact beyond the walls of academia: ____.
Select one:
a. Internet Explorer
b. Mosaic
c. Impact
d. Next
In Western society, you can probably credit the 1622 invention of the ____as the
beginning of the solution of complex mathematical problems by mechanical devices
with moving parts.
Select one:
a. slide rule
b. logarithm
c. transit
d. abacus
In 1977, Apple released the ____ based upon the Motorola 6502 processor.
Select one:
a. Apple I
b. iPod
c. Macintosh
d. Apple II
In 1823 ____ invented a mechanical device that did addition, subtraction,
multiplication, and division of 6-digit numbers.
Select one:
a. Gottfried Leibniz
b. Charles Babbage
c. Thomas Jefferson
d. Blaise Pascal
Based on low cost, available source code, and reputed reliability, which of the
following operating systems presents the greatest competitive threat to Windows?
Select one:
a. Star
b. Crescent
c. OS/2
d. Linux
A(n) ____ network consists of computers that independently decide how to channel
to the next computer.
Select one:
a. centralized
b. distributed
c. concentrated
d. monolithic
Fiberoptics and wireless technologies have given rise to which of the following
terms?
Select one:
a. WAN
b. WLAN
c. Internet
d. LAN
The integration of Internet Explorer with the dominant Windows operating system
was the turning point in what came to be known as the "____".
Select one:
a. network nightmare
b. Internet affair
c. code conflict
d. browser wars
Assembly language, while easier to use than machine code, has what type of
correspondence with machine code?
Select one:
a. one-to-one
b. many-to-many
c. one-to-many
d. many-to-one
Both the Jacquard loom and the player piano had a "____".
Select one:
a. disk drive
b. keyboard
c. monitor
d. stored program
The concept of computer design that allows for future modifications and additions by
members of the public is known as which of the following?
Select one:
a. licensed architecture
b. closed architecture
c. proprietary architecture
d. open architecture
When you are diagramming and creating flowcharts, you are principally engaged in
____ tasks.
Select one:
a. Web
b. network repair
c. office
d. programming
Grammar check and font selection are common features of which of the following
tools?
Select one:
a. text editor
b. browser
c. word processor
d. binder
Graphics software available in the form of ____ is generally free of charge during a
trial period.
Select one:
a. adware
b. malware
c. shareware
d. middleware
Data ____can be used to reduce the sizeof a file and speed thetransmission ofthe
file through e-mail.
Select one:
a. collaboration
b. inlining
c. design
d. compression
Text editors, compilers, and debuggers are directly featured on the menu of which of
the following software tools?
Select one:
a. spreadsheet
b. word processor
c. Integrated Development Environment
d. desktop publisher
File ____ Protocol (or FTP) is a transmission method used to send files across the
Internet.
Select one:
a. Table
b. Transfer
c. Task
d. Test
To flip an image upside down, the user would ____ it 180 degrees.
Select one:
a. rotate
b. scale
c. crop
d. resize
The process of changing image format from one type to another is called ____.
Select one:
a. blurring
b. cropping
c. rotating
d. conversion
Which of the following graphical formats should be favored for animation and small
file size?
Select one:
a. TIF
b. GIF
c. JPG
d. BMP
The ____ extension is one of the more popular compression formats in the world of
Windows.
Select one:
a. .zip
b. .car
c. .exe
d. .bat
A ____ is a generic tool that allows you to do basic editing, although the finished
document won't have a professional look.
Select one:
a. text editor
b. GUI
c. spreadsheet
d. word processor
____ is a graphics tool popular with Web designers.
Select one:
a. Tron
b. Redux
c. Macromedia Fireworks
d. Starry Messenger
A ____ tool is the most logical choice for the development of a slide show.
Select one:
a. word processing
b. spreadsheet
c. scheduling
d. presentation
____ in the form of logos, cartoons, and maps play a large part in the world of
information sharing.
Select one:
a. Graphics
b. Databases
c. Texts
d. Protocols
Which of the following tools has the primary focus of enhancing a Web site?
Select one:
a. Microsoft Project
b. Microsoft PowerPoint
c. Borland Delphi
d. Macromedia Flash MX
Which of the following e-mail software brands is widely used in the UNIX and Linux
world?
Select one:
a. Pine
b. Redwood
c. Oak
d. Maple
The computer samples sound at fixed intervals and each sample is assigned a
binary value according to its ____.
Select one:
a. period
b. pitch
c. frequency
d. amplitude
A ____ is a basic unit of storage that can have a value of either 1 or 0 (on or off).
Select one:
a. nibble
b. word
c. bit
d. byte
In scientific notation, the method of displaying numbers uses a(n) ____ and an
exponent.
Select one:
a. ordinate
b. asymptote
c. abscissa
d. mantissa
Various ____ techniques have been designed to allow the same image information
to be stored in a smaller file.
Select one:
a. resolution
b. compression
c. consolidation
d. scanning
The eight bit extended ASCII (American Standard Code for Information Interchange)
character set can be used to represent ____ characters.
Select one:
a. 512
b. 34,168
c. 256
d. 128
Which of the following methods represents the most common way of storing signed
numbers?
Select one:
a. two's complement
b. one's complement
c. integer complement
d. binary complement
According to positional value, the binary number 10101(2) represents ____ things.
Select one:
a. 12
b. 5
c. 21
d. 3
Displays containing the contents of a computer's memory or the hard disk are often
referred to as ____ memory dumps.
Select one:
a. decimal
b. error
c. hexadecimal
d. octal
A ____ is identified by the number of digits a numbering system has, including zero.
Select one:
a. base
b. root
c. discriminant
d. determinant
What is the result of converting the decimal number 25 to a base 2 equivalent?
Select one:
a. 10001(2)
b. 11101(2)
c. 10011(2)
d. 11001(2)
A sound consists of a waveform that has amplitude (volume) and a ____ (pitch).
Select one:
a. frequency
b. phase shift
c. phase angle
d. period
Interface programs that allow a computer to interact with peripheral devices are
called ____.
Select one:
a. applets
b. monitors
c. shell scripts
d. drivers
Which of the following terms refers to computing with more than one CPU?
Select one:
a. multilayering
b. multiprocessing
c. multitasking
d. multileveraging
In DOS, you can enter ____ <command> to get more details concerning a particular
command.
Select one:
a. ASSIST
b. SUPPORT
c. HELP
d. AID
The process of ____ arranges the disk surface into addressable areas and sets up
the basic directory tree structure on the disk.
Select one:
a. shaping
b. templating
c. organizing
d. formatting
____ are simply broad divisions of the total capacity of the disk into specific OS
areas.
Select one:
a. Partitions
b. Portions
c. Categories
d. Segments
In Unix or Linux, entering ____<command> gives you the manual on the command
that you specify.
Select one:
a. help
b. man
c. HELP
d. MAN
Which of the following commands enables UNIX to partition a disk drive?
Select one:
a. FDISK
b. pdisk
c. PDISK
d. fdisk
Console operating systems prompt users to interact through a(n) ____ line.
Select one:
a. flow
b. command
c. programming
d. operational
A situation known as ____ occurs when all active processes are tied up in a circular
wait for resources.
Select one:
a. context switch
b. safe mode
c. synchronization
d. deadlock
Partitioning, ____, and folder creation are all done to prepare a disk to receive files.
Select one:
a. signaling
b. formatting
c. scanning
d. rebooting
In Windows, deleted files and folders reside in the ____ Bin folder until it is emptied.
Select one:
a. Refuse
b. Remainder
c. Recovery
d. Recycle
The operating system reallocates the CPU through a program known as a(n) ____
handler.
Select one:
a. disruption
b. interrupt
c. job
d. control
Operating systems allow you to organize files into structures called folders or ____.
Select one:
a. arrays
b. directories
c. vectors
d. stacks
In a _____ topology, one of the computers or a network device serves as a hub for
all messages.
Select one:
a. bus
b. grid
c. star
d. ring
Normal telephone voice-grade lines use what is called _____-division multiplexing to
divide up the bandwidth among the subscribers.
Select one:
a. wave
b. phase
c. frequency
d. amplitude
Twisting copper wires nearly eliminates the electromagnetic effect known as _____.
Select one:
a. resonance
b. impedance
c. resistance
d. inductance
Each layer in the OSI model is defined in terms of a(n) _____ and a protocol data
unit.
Select one:
a. abstract
b. comment
c. header
d. brief
A widely used technology that has become an industry standard for LANs is _____.
Select one:
a. FDDI
b. Ethernet
c. token ring
d. ATM
The Transport layer of the OSI model uses data units called _____.
Select one:
a. bytegrams
b. words
c. bitgrams
d. datagrams
Cable is theoretically capable of speeds up to _____.
Select one:
a. 42 Mbps
b. 420 Mbps
c. 4.2 Mbps
d. 42 Gbps
A(n) _____ diagram shows the protocol interactions between two entities.
Select one:
a. assignment
b. hierarchy
c. timing
d. flow
_____ measures the speed a transmission medium is able to handle in bits per
second.
Select one:
a. Byte capacity
b. Bandwidth
c. Bit capacity
d. Broadwidth
Which of the following WAN technologies use the same unguided media as
television?
Select one:
a. satellite
b. cable
c. dial-up
d. DSL
The _____ layer of the OSI model is responsible for translation, formatting, and
syntax selection.
Select one:
a. Data Link
b. Application
c. Session
d. Presentation
Fiber-optic cables use _____ fibers to guide light pulses along a cable.
Select one:
a. tungsten
b. glass
c. plastic
d. ceramic
The OSI conceptual model for the communication process has _____ discrete
layers.
Select one:
a. nine
b. seven
c. four
d. five
_____ direct network traffic based on the logical (IP) addresses assigned at the third
layer of the OSI stack.
Select one:
a. Hubs
b. Bridges
c. Routers
d. Gateways
_____ formats content for display in a browser and transfers information via the
Web.
Select one:
a. SGML
b. PHP
c. XML
d. HTML
You can check the network configuration of your computer in Windows by using the
_____ command.
Select one:
a. IPCONFIG
b. IPSETUP
c. NETWORK
d. NETDESIGN
Which of the following computer scientists invented the World Wide Web?
Select one:
a. Donald Knuth
b. E.F. Codd
c. Marc Andreesen
d. Tim Berners-Lee
HTML and the Web connect one page to another through _____.
Select one:
a. higherjoins
b. hyperlinks
c. overlinks
d. cyberbridges
The _____ protocol is used to provide the reliable and efficient transmission of data
files.
Select one:
a. FTP
b. TCP
c. IP
d. UDP
The _____ protocol establishes a virtual circuit with the destination computer to
transmit packets.
Select one:
a. IP
b. FTP
c. HTTP
d. TCP
The total pool of IPv4 addresses is separated into groups, called _____.
Select one:
a. clusters
b. classes
c. entities
d. aggregations
So that packets do not keep bouncing from router to router forever, one of the fields
in the IP header is the _____ field.
Select one:
a. time to live
b. expiration
c. time to expire
d. lifetime
Central to the operation of the IP protocol is the IP _____ of both the source and
destination.
Select one:
a. name
b. address
c. signifier
d. location
The _____ protocol allows each computer to automatically be assigned an IP
address each time it is started up.
Select one:
a. HTTP
b. FTP
c. DHCP
d. TCP
Using _____, a packet can just be sent on an alternate line if the desired line is
damaged or busy.
Select one:
a. linkers
b. switches
c. routers
d. hubs
When you type in a URL in the address bar of your browser, you send a _____
lookup request to the _____ server at your ISP.
Select one:
a. NET
b. SND
c. POP
d. DNS
The port number can be analogized to which of the following address components?
Select one:
a. street address
b. apartment number
c. zip code
d. city
TCP and IP protocols map to Transport, Network, and _____ layers of the OSI
model.
Select one:
a. Session
b. Data Link
c. Presentation
d. Application
The _____ protocol establishes a link from an e-mail client to a mail server.
Select one:
a. POP3
b. SMTP
c. IMAP
d. HTTP
A DBMS must provide or interface with a(n) _____ language to extract information
from the database.
Select one:
a. machine
b. natural
c. query
d. assembly
The set of rules that dictates how databases are designed is called _____.
Select one:
a. normalization
b. invocation
c. standardization
d. customization
The set of possible values for each column is called the _____ of that column.
Select one:
a. range
b. codomain
c. image
d. domain
Data that has been organized and logically related to allow access, retrieval, and use
of that data is called a _____.
Select one:
a. store
b. field
c. database
d. record
Which of the following is a valid SQL clause for sorting returned rows of data?
Select one:
a. CLASS BY
b. SORT BY
c. ARRANGE BY
d. ORDER BY
Which of the following commands can be used to add new rows of data to a table?
Select one:
a. INCREASE
b. ADD
c. INCLUDE
d. INSERT
Which of the following SQL key words indicates that data is not required for a
specified column?
Select one:
a. NOT
b. VOID
c. NULL
d. NOTHING
Which of the following is a valid SQL word used to return data in descending order?
Select one:
a. DESC
b. REV
c. BOTTOM
d. OPP
A visual representation of how all the tables or entities interact to each other in a
database is called a(n) _____ relationship model.
Select one:
a. transitive
b. functional
c. cardinal
d. entity
When the columns are used to determine the sort order of information they are
called _____.
Select one:
a. markers
b. flags
c. tokens
d. keys
A(n) _____ is a special type of file that occupies its own space and specifies one or
more columns that determine how the information stored in a table is organized.
Select one:
a. tab
b. identifier
c. field
d. index
A(n) _____ defines how one entity works with or relates to another.
Select one:
a. relationship
b. connection
c. union
d. arrangement
A key that is made up of more than one column is called which of the following?
Select one:
a. aggregate
b. union
c. composite
d. joined
A(n) _____ key is defined as a column in one table that is part of the primary key in
another.
Select one:
a. secondary
b. composite
c. auxiliary
d. foreign
With arrays, the _____ is used to specify the distance between memory locations.
Select one:
a. width
b. length
c. address
d. offset
In order to remove an item from a queue, you would use a _____ operation.
Select one:
a. enqueue
b. dequeue
c. requeue
d. delete
Which of the following routines implements two list structures to perform sorting
operations?
Select one:
a. bubble
b. merge sort
c. quicksort
d. selection sort
The computer logically organizes source code into _____ or groups of related
computer commands that perform a task.
Select one:
a. routines
b. functions
c. methods
d. procedures
In the context of the Java programming language, the "_____" keyword tells the
computer that a new array is being created.
Select one:
a. allocate
b. invoke
c. make
d. new
A two dimensional array declared with size [3] [3] may contain how many elements?
Select one:
a. three
b. sixteen
c. six
d. nine
The _____ sort starts with the last element in the list and compares its value to that
of the item just above it in the list order.
Select one:
a. insertion
b. quick
c. bubble
d. heap
What type of data can be stored in an array generated by the statement, "int[ ]
aGrades = new int [5]"?
Select one:
a. integers
b. floats
c. doubles
d. strings
Looking at the top item to inspect it without removing it from the stack is called
_____.
Select one:
a. scanning
b. snooping
c. viewing
d. peeking
The index or _____ tells the computer which memory cell to access in the array.
Select one:
a. arrow
b. pointer
c. subscript
d. superscript
The _____ sort starts at the first value in the list and then processes each element
looking for the smallest value.
Select one:
a. counting
b. selection
c. merge
d. radix
In Java, which punctuation mark tells the computer that the end of the statement has
been reached?
Select one:
a. colon
b. comma
c. period
d. semicolon
A(n) _____ is a memory cell that contains the address of another memory cell as its
data.
Select one:
a. index
b. element
c. token
d. pointer
____ file access allows you to mimic the look of a database table by storing
information in the file row by row, similar to a database record.
Select one:
a. Sequential
b. Random
c. Binary
d. Hash
The ____ contains the information needed for the system to be able to know how to
access the volume.
Select one:
a. overflow area
b. file system
c. directory
d. partition boot sector
A(n) ____ is the part of the operating system responsible for creating, manipulating,
renaming, copying, and removing files to and from storage devices.
Select one:
a. overflow area
b. cluster
c. hash key
d. file system
____ occurs when files have clusters scattered in different locations on the storage
medium rather than in contiguous locations.
Select one:
a. Disk fragmentation
b. Hashing
c. Clusterization
d. Disk striping
____ is a common method used for accessing data either in a file or a database
table through the use of a unique value.
Select one:
a. Hashing
b. Disk fragmenting
c. Clustering
d. File compression
The term ____ implies reading and writing data in order, from the beginning.
Select one:
a. random access
b. sequential access
c. collision
d. hashing
____ occur when the hashing algorithm generates the same relative key for more
than one original key value.
Select one:
a. Clusters
b. Collisions
c. Compressions
d. Directories
A(n) ____ contains a group of the smallest units that can be accessed on a disk.
Select one:
a. cluster
b. NTFS
c. file system
d. FAT
The ____ keeps track of which files are using which clusters.
Select one:
a. random area
b. hash key
c. file allocation table
d. directory
____ implies that data is directly read or written anywhere on the disk.
Select one:
a. Collision
b. Hashing
c. Sequential access
d. Random access
A(n) ____ is a storage location that contains data that is treated as either binary or
text.
Select one:
a. overflow area
b. file
c. hash key
d. cluster
The ____ is used in NTFS to store data about every file and directory on the volume.
Select one:
a. overflow area
b. cluster
c. directory
d. master file table
____ are more compact and faster to access because the system does not have to
convert the data.
Select one:
a. Binary files
b. Random files
c. Sequential files
d. Hash files
A(n) ____ is a routine of logic used for determining how hash values are created.
Select one:
a. cluster
b. MFT
c. file system
d. hashing algorithm
____ provides the ability to assign access rights to files and directories.
Select one:
a. FAT32
b. FAT12
c. NTFS
d. FAT24
____ is the encryption technology that converts the data within a file using an
encryption algorithm and key value to nonreadable information.
Select one:
a. Encrypting File System
b. FAT
c. MFT
d. NTFS
A(n) ____ is a drive or partition on a drive that is formatted with a file system.
Select one:
a. volume
b. hash key
c. hash algorithm
d. CPU
A(n) ____ is a self-contained entity that consists of both data and procedures.
Select one:
a. parameter
b. method
c. constructor
d. object
A(n) ____ is a program that reads all statements from a program and converts them
into a computer language.
Select one:
a. control structure
b. object
c. compiler
d. event
A(n) ____ is a collection of statements or steps that solve a problem and need to be
converted into a language that the computer understands in order to perform one or
more tasks.
Select one:
a. program
b. algorithm
c. identifier
d. parameter
A(n) ____ reads assembly language code and converts it into machine language.
Select one:
a. identifier
b. control structure
c. assembler
d. event handler
The storage requirement for the int data type in Java is ____.
Select one:
a. 4 bytes
b. 8 bytes
c. 2 bytes
d. 6 bytes
A(n) ____ is a template or mold used for defining new object types along with their
properties and behavior.
Select one:
a. class
b. event
c. method
d. compiler
A(n) ____ is a programming language that resembles more what a computer can
understand rather than a human
Select one:
a. high-level language
b. event handler
c. postcondition loop
d. low-level language
A(n) ____ resides between the lowest-level language and a higher-level language; it
assigns letter codes to each machine language instruction.
Select one:
a. constructor
b. class
c. assembly language
d. machine language
A(n) ____ is used to identify a certain location and value in the computer memory.
Select one:
a. control structure
b. variable
c. constructor
d. event
The process of combining or joining strings into one value is known as ____.
Select one:
a. instantiation
b. concatenation
c. nesting
d. inheritance
____ is the process of providing more class functionality by creating more specific
classes based on generic classes.
Select one:
a. Variable initialization
b. Inheritance
c. Polymorphism
d. Encapsulation
____ is a style of programming that involves representing items, things, and people
as objects rather than basing the logic around actions.
Select one:
a. Object-oriented programming
b. Variable initialization
c. Assembly programming
d. Polymorphism
The term ____ refers to the spelling and grammar used within a programming
language.
Select one:
a. interpreter
b. event
c. declaration
d. syntax
Testing software to ensure that it meets the software specifications is called ____.
Select one:
a. scope creep
b. software validation
c. rapid prototype
d. incremental development
____ occurs when new changes are continually added to a project thus changing the
proposed completion date so that the project is never completed, but is instead in
constant improvement mode.
Select one:
a. Testing
b. SDLC
c. Scope creep
d. Prototyping
The UML ____ diagram shows how one class communicates with another by
sending messages back and forth.
Select one:
a. collaboration
b. class
c. state
d. sequence
With ____ the application is developed and released in a series of software releases.
Select one:
a. rapid prototyping
b. waterfall prototyping
c. incremental development
d. build and fix prototyping
With ____ tools are available that allow end users to work with prototypes of the
screens and other interfaces.
Select one:
a. incremental development
b. build and fix
c. rapid prototyping
d. waterfall
A(n) ____ is a combination of symbols and text that provide a visual description of a
process.
Select one:
a. component
b. flowchart
c. class
d. object
____ is the process of producing software applications.
Select one:
a. Database administration
b. UML
c. SDLC
d. Software engineering
In the ____ model of software development, the developer writes a program and
continues to modify it until the system is functional.
Select one:
a. incremental
b. build and fix
c. rapid prototype
d. waterfall
____ determines whether the project is worth doing, and specifying the advantages
and disadvantages of this application.
Select one:
a. Scope creep
b. Project feasibility
c. Software specification
d. Project collaboration
A(n) ____ diagram shows the events that occur within a use case or within an
object's behavior.
Select one:
a. use case
b. collaboration
c. class
d. activity
____ determine the functions of the software and any constraints or requirements.
Select one:
a. UMLs
b. Use cases
c. Software specifications
d. Data dictionaries
A(n) ____ is a document describing the type of data being utilized within the
program, showing the table definitions, indexes, and other data relationships.
Select one:
a. design document
b. use case
c. data dictionary
d. flow chart
The UML ____ diagram shows how the different object classes relate to each other.
Select one:
a. use case
b. activity
c. class
d. sequence
A(n) ____ is a standard or typical example that gives the end user a good idea of
what they will see when their application is completed.
Select one:
a. prototype
b. design document
c. flowchart
d. data dictionary
The ____ describes the life of the application, including all of the stages involved in
the development, testing, installation, and maintenance of a program.
Select one:
a. SDLC
b. UML
c. DBA
d. SLC
The ____ is the leader of the team and is responsible for choosing the right players
for the right positions.
Select one:
a. database administrator
b. programmer
c. client
d. project manager
A(n) ____ is someone or something that needs the program to perform a function or
meet a need, and who determines the required functionality of the program.
Select one:
a. project manager
b. database administrator
c. tester
d. end user
The ____ diagram shows how system elements work together to accomplish the
system's objectives.
Select one:
a. component
b. deployment
c. collaboration
d. activity
Modifying or changing the software to meet changing customer needs is called ____.
Select one:
a. incremental development
b. software modification
c. software evolution
d. rapid prototyping
The ____ is created by reviewing the screens and reports the end user would like
included in the application and determining which fields are essential to the
application.
Select one:
a. class diagram
b. sequence diagram
c. data dictionary
d. use case
Software engineers and end users can both use the ____ to achieve a clearer
understanding of the data available for use in reports, screens, file transfers, and
other data operations.
Select one:
a. use case
b. class diagram
c. data dictionary
d. sequence diagram
The ____ is the interface between the testers, developers, and end users during the
creation and early release cycles of the product.
Select one:
a. programmer
b. project manager
c. customer relations representative
d. database administrator
Transforming original data into coded data so that only authorized parties can
interpret it is known as ____.
Select one:
a. authentication
b. encryption
c. packet filtering
d. piracy
A(n) ____ is a software program that can roam the Internet autonomously.
Select one:
a. honey pot
b. cookie
c. bot
d. digital certificate
A(n) ____ is an uninvited guest program on your computer with the potential to
damage files and the operating system.
Select one:
a. sniffer
b. DMZ
c. proxy firewall
d. virus
A(n) ____ is an amateur hacker that simply uses the hacking tools that have been
developed by others.
Select one:
a. cracker
b. script kiddie
c. Trojan horse
d. reverse engineer
____ is a catchall phrase for programs that sit on your computer, with or without your
knowledge, observing your computer activities.
Select one:
a. Spyware
b. Cookie
c. Social engineering
d. Encryption
A(n) ____ firewall inspects each packet and moves it along an established link to its
destination.
Select one:
a. proxy
b. digital
c. packet-filtering
d. biometric
____ attacks seek to create a false impression that an event did not occur when it
did, or did occur when it did not.
Select one:
a. DMZ
b. Repudiation
c. Modification
d. DoS
The term ____ is used to describe the process of subverting the phone system in
order to get free service.
Select one:
a. biometrics
b. callback
c. honey pot
d. phreaking
____ are the moral principles for judging right or wrong behavior held by an
individual or group.
Select one:
a. Ergonomics
b. Ethics
c. Digital certificates
d. Laws
The term ____ is used to describe biological identification, such as fingerprints, voice
dynamics, or retinal scans.
Select one:
a. biometrics
b. ergonomics
c. hacktivism
d. cookie
A(n) ____ is characterized by three things: targets that might be attacked, agents or
attackers, and events.
Select one:
a. threat
b. risk
c. callback
d. copyright
A(n) ____ occurs when a program tries to place more information into a memory
location than it can handle.
Select one:
a. modification attack
b. buffer overflow
c. access attack
d. virus attack
The term ____ is used to describe a type of bot that can roam a network looking for
vulnerable systems to replicate itself onto those systems.
Select one:
a. proxy firewall
b. Trojan horse
c. reverse engineer
d. worm
A(n) ____ firewall establishes a new link between each packet of information and its
destination.
Select one:
a. biometric
b. digital
c. proxy
d. packet-filtering
A(n) ____ is a program that poses as an innocent program; some action or the
passage of time triggers it to do its dirty work.
Select one:
a. worm
b. Trojan horse
c. firewall
d. virus
A(n) ____ is a software program that allows the user to listen in on network traffic.
Select one:
a. Trojan horse
b. sniffer
c. worm
d. honey pot
____ processing involves computer applications that can recognize and interact with
natural language text.
Select one:
a. High-level language
b. Assembly language
c. Natural language
d. Machine language
The science of ____ is primarily concerned with the mechanics and electronics that
are used to carry out the results of the other areas of artificial intelligence.
Select one:
a. fuzzy logic
b. pattern recognition
c. robotics
d. natural language processing
A(n) ____ is a computer program that simulates the judgement and behavior of a
human or an organization that has expert knowledge and experience in a particular
field.
Select one:
a. flash memory
b. neural network
c. USB drive
d. expert system
It is thought that each neuron in the brain may have as many as connections to
adjacent neurons.
Select one:
a. 10,000
b. 100
c. 10
d. 1,000,000
Which of the following terms describes flash memory in a small, durable portable
case that can be plugged into a USB port of a computer and used in the same
manner as a disk drive?
Select one:
a. USB drive
b. USB disk
c. USB port
d. USB cache
____ is the branch of engineering that deals with things smaller that 100 nanometers
and especially the manipulation of individual molecules or atoms.
Select one:
a. Quantum mechanics
b. Holographic storage
c. Nanotechnology
d. Fuzzy logic
In order for a computer to emulate human behavior and reasoning, it needs to have
the ability to ____.
Select one:
a. learn
b. hear
c. talk
d. walk
A specialized computer designed to record and play back video content from cable
and satellite sources is called a(n) ____.
Select one:
a. robot
b. digital video recorder
c. quantum computer
d. expert system
Which of the following terms describes memory that uses the polarization of
microscopic magnetic layers to store ones and zeros that remain after the power
source is removed?
Select one:
a. ROM
b. DRAM
c. SRAM
d. MRAM
d
A(n) ____ is a theoretical framework, or a way of doing things.
Select one:
a. expert system
b. MRAM
c. polymer
d. paradigm
____ is a superset of conventional logic that has been extended to handle the
concept of partial truth.
Select one:
a. Speech recognition
b. Robotics
c. Fuzzy logic
d. Neural networks
____ are well suited for applications such as visual speech recognition applications.
Select one:
a. Turing tests
b. DVRs
c. Quantum computers
d. Neural networks
The concept of each person interacting with many, sometimes invisible computers
has been named "____" by computer scientist Mark Weiser.
Select one:
a. massive parallelism
b. 1984
c. ubiquitous computing
d. nanotechnology
____ is a method of splitting a laser beam and using a device called a spatial light
modulator to store full pages of information in layers on a crystal material.
Select one:
a. Speech recognition
b. Fuzzy logic
c. Holographic storage
d. Pattern recognition
Telephone support and hot lines, such as a poison control center, can make use of
____.
Select one:
a. SDRAM
b. MRAM
c. expert systems
d. ROM