Ict
Ict
II. Multiple Choice Identify the letter of the choice that best completes the statement or answers the question.
______11. What is a system called that links together mainframes, minicomputers, and microcomputers that are in close
proximity for the purpose of communication?
a. server network b. groupware network
c. immediate network group d. local area network
______12. What is a network that uses a server to meet the needs of the other computers on the network?
a. client/server network b. groupware network
c. immediate network group d. local area network
______13. What is an internal network designed to provide and disseminate information to internal staff by using the look
and feel of the World Wide Web?
a. Intranet b. Extranet
c. Internet d. local area network
______14. A network that links computers located thousands of miles of apart is called a _______________.
a. world area network b. universal area network
c. wide area network d. local area network
______15. What network security feature prevents users on a network from using programs and information that they do
not need to access?
a. password rights b. access rights
c. protocol rights d. right of entry
______16. What is the term used to describe “data about data”?
a. data access
b. access rights
c. data integrity
d. metadata
______17. What is a prewritten plan that is put in place when things go horribly wrong?
a. emergency evacuation b. disaster recovery plan
c. disaster protocol plan d. emergency information plan
______18. What is software that is the electronic equivalent of a filing room?
a. document management b. electronic management
c. filenet d. filing Assembly Software
______19. What do we call a company that provides software through the Internet directly to the user’s computer?
a. application vendor b. software service provider
c. application service provider d. shareware
______20. What type of device represents the largest security risk?
a. desktop b. laptop
c. mobile phone d. none of the above
______21. What risk does a flash or thumb drive have?
a. it can be lost b. it can be smuggled into a secure area for the purpose of stealing files
c. a and b d. none of the above
______22. Much of the film “I Robot” revolves around a single robot which is different to all the rest. What is the name of
this robot?
a. Jimmy b. Sunny c. Sonny d. Robbie
______23. Why does Spooner get called to USR?
a. To investigate a murder b. To investigate a suicide c. To pick his own robot d. To meet Dr. Calvin
______24. Why does Spooner think robots don’t really help people?
a. They are too expensive b. They have a mind or their own c. They replace people’s job d. They beat you at chess
______25. Who is Spooner’s prime suspect in the death of Alfred Lanning?
a. VIKI b. Sonny c. Robertson d. Calvin
______26. What reason does VIKI use for disobeying the 3 laws of robotics?
a. That humans need protecting from themselves b. That the 3 laws are imperfect
c. That humans are dangers to robots d. That robots want to rule the earth
______27. Calvin visits Spooner at his home. While Spooner is changing, Calvin looks around at his apartment. Spooner
comes into the room without any shirt on and Calvin realizes something. What does she learn about the detective?
a. That he is married b. That he has tattoo c. That he is a spy d. That his left side is robotic
______28. Spooner thinks that Robertson is telling the robots to wreck destroy the city, but it really isn’t him. Who is really
controlling the robots?
a. USR b. Calvin c. Robertson d. VIKI
III. FILL IN THE BLANKS. Select your answer from the box belox.
I.
1. False
2. False
3. True
4. False
5. True
6. False
7. True
8. True
9. True
10. True
II.
11. D 16. D 21. C 26. A
12. A 17. B 22. C 27. D
13. A 18. A 23. B 28. D
14. C 19. C 24. C
15. B 20. B 25. B
III.
29. Personal Digital Assistants 40. Static Electricity
30. Analog Computers 41. Hybrid Computers
31. Bridge 42. Loopback Adapter
32. Digital Multimeter 43. Mainframe Computers
33. Minicomputers 44. Microcomputers
34. Drivers 45. Hardware
35. Ethernet switch 46. Motherboard
36. HDD 47. Network Firewall
37. Adapters 48. Smart board
38. Hazard 49. Digital Computers
39. Hub 50. Servers