CISC (All)
CISC (All)
TOPIC 12 Databases....................................................................................................................................... 30
TOPIC 01 Introduction To Information Technology
1.A type of a file that might contain, for example, audience handouts, speaker notes, and electronic slides.
→ Presentation
2.Devices that translate the processed information from the computer into a form that humans can
understand. → Output
3.A container that houses most of the electronic components that make up a computer system. → System
unit
4.The most widely used communication device. → Modem
5.Another name for a program. → Software
6.Consists of the step-by-step instructions that tell the computer how to do its work. → Program
7.Enables the application software to interact with the computer hardware. → System software
8.Type of computer that is small enough to fit on top of or alongside a desk yet is too big to carry around. →
Desktop
9.A communications system connecting two or more computers. → Network
10.Unlike hard disks, this type of storage does not have any moving parts, is more reliable, and requires less
power. → Solid-state
CH0102 Programs that coordinate computer resources, provide an interface, and run applications are
known as:
a. storage systems
b. utility programs
c. operating systems
d. application programs
The correct answer is: operating systems
CH0107 Unlike memory, this type of storage holds data and programs even after electric power to the
computer system has been turned off.
a. primary
b. RAM
c. ROM
d. secondary
The correct answer is: secondary
CH0108 The type of file created by word processors, for example, memos, term papers, and letters.
a. worksheet
b. document
c. presentation
d. database
The correct answer is: document
CH0109 Uses the Internet and the web to shift many computer activities from a user’s computer to
computers on the Internet.
a. high definition
b. cloud computing
c. network
d. solid-state storage
The correct answer is: cloud computing
6. Two popular instant messaging services are Google Talk and Facebook _____. →Chat
7. Maintain huge databases relating to information provided on the web and the Internet. → Search
services
8. Transmission of electronic messages over the Internet. → E-mail
9. The most popular Internet activity. → Communicating
10. The most common way to access the Internet is through a _____ → ISP
CH0201 The network that connects computers all over the world.
Select one:
a. web
b. LAN
c. Internet
d. ARPANET
CH0203 Using file transfer utility software, you can copy files to your computer from specially configured
servers on the Internet. This is called:
Select one:
a. filtering
b. downloading
c. blogging
d. uploading
CH0204 Communities of individuals who share a common interest typically create Facebook:
Select one:
a. Profiles
b. clients
c. groups
d. Pages
CH0205 Type of e-mail account that does not require an e-mail program to be installed on a user’s
computer is:
Select one:
a. web-based
b. utility-based
c. blog-based
d. client-based
CH0207 Using a keyword, a search engine returns a list of related sites known as:
Select one:
a. hits
b. strikes
c. blogs
d. podcasts
CH0210 Three basic components to cloud computing are clients, Internet, and _____.
Select one:
a. CSS
b. Web 3.0
c. streaming
d. service providers
CH0901 The three primary privacy issues are accuracy, property, and:
a. access
b. security
c. ethics
d. ownership
The correct answer is: access
CH0904 The browser mode that ensures your browsing activity is not recorded.
a. insert
b. detect
c. sleep
d. privacy
The correct answer is: privacy
CH0905 The information that people voluntarily post in social networking sites, blogs, and photo- and video-
sharing sites is used to create their:
a. phish
b. access approval
c. online identity
d. firewall
The correct answer is: online identity
CH0907 Programs that come into a computer system disguised as something else are called:
a. web bugs
b. Trojan horses
c. viruses
d. zombies
The correct answer is: Trojan horses
CH0908 The use of the Internet, cell phones, or other devices to send or post content intended to hurt or
embarrass another person is known as:
a. online harassment
b. social networking discrimination
c. cyberbullying
d. unethical communication
The correct answer is: cyberbullying
CH0909 Special hardware and software used to control access to a corporation’s private network is known as
a(an):
a. antivirus program
b. communication gate
c. firewall
d. spyware removal program
The correct answer is: firewall
2.The component of the information system that is described as raw, unprocessed facts, including text,
numbers, images, and sounds, is called _______ [data].
4.The five types of personal computers are: desktops, laptops, tablets, smartphones, and _____
[wearables].
5.Increased use of mobile or wireless communication devices and cloud computing has been termed "the
_______ [wireless] revolution.
6.Which part of an information system consists of the rules or guidelines for people to follow?
Select one:
a. Internet
b. Data
c. Procedures
d. People
7.The equipment that processes data in order to create information is called the _______.
Select one:
a. hardware
b. software
c. typology
d. compiler
8.In most cases, the word "software" is interchangeable with the word _______.
Select one:
a. program
b. application
c. procedure
d. computer
10.Identify the program that coordinates computer resources, provides an interface between users and
the computer, and runs applications.
Select one:
a. System software
b. Operating system
c. Application software
d. Device driver
11.Antivirus programs protect your computer system from viruses or malicious programs. This is an
example of which type of software?
Select one:
a. Operating system
b. Utilities
c. Browser software
d. Application software
12.Which of the following computers is also referred to as a server and is used to support end users for
things such as retrieving data from a database or providing access to application software?
Select one:
a. Mainframe
b. Midrange
c. Microcomputer
d. Supercomputer
13.Desktop, laptop, and tablet computers, and mobile devices are classified as _______.
Select one:
a. supercomputers
b. mainframe computers
c. personal computers
d. midrange computers
15.A microcomputer that is smaller, lighter, and less powerful than a notebook, and that has a touch
sensitive screen, is called a _______.
Select one:
a. subnotebook
b. desktop
c. tablet
d. laptop
16.This computer component holds the program and data that is currently being processed.
Select one:
a. Ports
b. RAM
c. ROM
d. Bus
17.Which of the following will not retain data after the computer is turned off?
Select one:
a. ROM
b. Hard drive
c. DVD
d. RAM
20.Employee records, including names, social security numbers, and related information, would typically
be stored in what type of data file?
Select one:
a. Worksheet
b. Presentation
c. Database
d. Document
CH0301 This type of software works with end users, application software, and computer hardware to handle the
majority of technical details.
a. application
b. utility
c. specialized
d. system
The correct answer is: system
CH0304 Programs that organize, analyze, and graph numerical data such as budgets and financial reports.
a. spreadsheets
b. suites
c. word processors
d. DBMS
The correct answer is: spreadsheets
CH0305 Program that allows you to mix text and graphics to create publications of professional quality.
a. productivity
b. database
c. desktop publishing
d. presentation
The correct answer is: desktop publishing
CH0308 Programs that combine a variety of visual objects to create attractive, visually interesting presentations.
a. word processor
b. presentation graphics
c. spreadsheet
d. DBMS
The correct answer is: presentation graphics
CH0401 What type of software works with users, application software, and computer hardware to handle
the majority of technical details?
a. Linux
b. system
c. application
d. desktop
The correct answer is: system
CH0402 The programs that convert programming instructions written by programmers into a language that
computers understand and process are language:
a. linguists
b. managers
c. converters
d. translators
The correct answer is: translators
CH0403 The ability to switch between different applications stored in memory is called:
a. diversion
b. multitasking
c. operational interference
d. programming
The correct answer is: multitasking
CH0405 This operating system feature is controlled by a mouse and changes shape depending on its current
function.
a. mouse
b. dialog box
c. menu
d. pointer
The correct answer is: pointer
CH0406 The operating system based on Linux, designed for notebook computers that use cloud computing
and cloud storage:
a. UNIX
b. Mac
c. Windows
d. Chrome
The correct answer is: Chrome
CH0407 The mobile operating system developed by Apple and originally called iPhone OS:
a. iOS
b. Android
c. Mac OS
d. Phone OS
The correct answer is: iOS
CH0408 A utility program that copies all files in the libraries, contacts, favorites, and on the desktop:
Select one:
a. Optimize Drives
b. File History
c. Compactor
d. Disk Cleanup
The correct answer is: File History
CH0409 A troubleshooting utility that identifies and eliminates nonessential files, frees up valuable disk
space, and improves system performance:
a. Optimize Drives
b. Compactor
c. File History
d. Disk Cleanup
The correct answer is: Disk Cleanup
CH1001 Which of the basic organizational functions records all financial activity from billing customers to
paying employees?
Select one:
a. marketing
b. production
c. accounting
d. research
The correct answer is: accounting
CH1002 What managerial level has information flow that is vertical, horizontal, and external?
Select one:
a. middle
b. supervisory
c. top
d. foreman
The correct answer is: top
CH1003 Which computer-based information system uses data from TPS and analytical tools to support
middle managers?
a. MIS
b. TPS
c. DSS
d. ESS
The correct answer is: DSS
CH1004 Accounts payable refers to money the company owes its suppliers for materials and services it has:
a. created
b. received
c. exported
d. inventoried
The correct answer is: received
CH1005 What accounting activity keeps track of all summaries of all transactions?
a. inventory control
b. general ledger
c. balance sheet
d. income statement
The correct answer is: general ledger
CH1006 What accounting statement lists the overall financial condition of an organization?
a. income statement
b. general ledger
c. balance sheet
d. inventory control
CH1008 A DSS consists of four parts: user, system software, decision models, and:
a. spreadsheets
b. application software
c. data
d. operating system
The correct answer is: data
CH1009 What type of worker is involved with the distribution, communication, and creation of
information?
a. knowledge
b. information
c. executive
d. foreman
The correct answer is: information
CH1010 What type of program is designed to schedule, plan, and control project resources?
a. schedulers
b. auditing
c. project managers
d. dtp
The correct answer is: project managers
CH1201 An information system is a collection of hardware, software, people, procedures, the Internet,
and:
a. DBMS
b. data
c. systems analysts
d. specialists
CH1203 Which phase involves installing the new system and training people?
a. systems implementation
b. systems design
c. systems analysis
d. preliminary investigation
CH1204 This phase is concerned about determining system requirements not in design.
a. systems implementation
b. systems analysis
c. preliminary investigation
d. systems design
CH1205 Which systems analysis tool shows the relationship between input and output documents?
a. system flow chart
b. data flow diagram
c. grid chart
d. automated design tool
CH1206 These tools relieve the systems analysts of many repetitive tasks, develop clear documentation,
and, for larger projects, coordinate team member activities.
a. data flow analyzers
b. CASE
c. flowcharts
d. automated systems life cycle
CH1207 Which phase is concerned with economic, technical, and operational feasibility?
a. systems implementation
b. preliminary investigation
c. systems analysis
d. systems design
CH1208 What type of feasibility evaluates whether the people within the organization will embrace or
resist a new system?
a. operational
b. economic
c. technical
d. behavioral
CH1209 Which approach to conversion begins by trying out a new system in only one part of an
organization?
a. phased
b. direct
c. pilot
d. parallel
CH1210 An alternative to the systems life cycle approach using powerful development software, small
specialized teams, and highly trained personnel.
a. RAD
b. CASE
c. AAD
d. prototyping
TOPIC 09-1 Computer Hardware – System Unit
A type of memory that is volatile or loses its contents when power is turned off. → Flash
A type of multiprocessor chip that provides two or more separate and independent CPUs. → Multicore
System board component that provides a connection point for specialized cards or circuit boards. → Slots
Another name for a network adapter card. → NIC
Provide connection points for chips. → Sockets
A type of memory that improves processing by acting as a temporary high-speed holding area between the
memory and the CPU. → Cache
This bus connects the CPU to memory on the system board. → System
A socket for external devices to connect to the system unit. → Port
A type of memory that provides a combination of features of RAM and ROM. → Flash
This port can be used to connect many USB devices to the system. → USB
CH0501 This container houses most of the electrical components for a computer system.
a. chip carrier
b. Unicode
c. system board
d. system unit
The correct answer is: system unit
CH0504 How many bytes can a 32-bit-word computer access at one time?
a. 4
b. 8
c. 1
d. 16
The correct answer is: 4
CH0505 In a personal computer system, the central processing unit is typically contained on a single:
a. chip
b. RAM
c. module
d. bus
The correct answer is: chip
CH0506 This type of memory divides large programs into parts and stores the parts on a secondary storage
device.
a. random-access
b. direct
c. virtual
d. expanded
The correct answer is: virtual
CH0507 Also known as NIC, this adapter card is used to connect a computer to a(an):
a. expansion
b. network
c. AIA
d. graphics
The correct answer is: network
CH0508 This provides a pathway to connect parts of the CPU to each other.
a. cable
b. wired
c. wireless
d. bus
The correct answer is: bus
CH0509 The specialized port that connects musical instruments like an electronic keyboard to a sound card.
a. Thunderbolt
b. eSATA
c. MIDI
d. HDMI
The correct answer is: MIDI
CH0511 Which one of the following coding systems can be used to represent the Thai language?
a. CJK
b. ASCII
c. EBCDIC
d. Unicode
The correct answer is: Unicode
CH0603 The type of screen that can be touched with more than one finger and supports zooming in and
out by pinching and stretching your fingers.
a. digital
b. dynamic
c. multitouch
d. OLED
The correct answer is: multitouch
CH0604 Flatbed and document are types of:
a. MaxiCode
b. headsets
c. monitors
d. scanners
The correct answer is: scanners
CH0605 Device used by banks to automatically read those unusual numbers on the bottom of checks and
deposit slips.
a. MICR
b. UPC
c. FDIC
d. OMR
The correct answer is: MICR
CH0607 The monitor feature that indicates the ability to display colors.
a. dot pitch
b. contrast ratio
c. aspect ratio
d. resolution rate
The correct answer is: contrast ratio
CH0702 The actual physical material that holds the data and programs.
a. access
b. media
c. primary storage
d. capacity
CH0703 Measures how tightly the magnetic charges can be packed next to one another on the disk.
a. cylinders
b. sectors
c. tracks
d. density
CH0704 When a read-write head makes contact with the hard disk’s surface, it causes a head:
a. crash
b. pit
c. land
d. scratch
CH0706 This type of storage uses pits and lands to represent 1s and 0s.
a. cloud
b. hard disk
c. solid state
d. optical
CH0709 An organizational strategy to promote efficient and safe use of data across the networks.
a. data mission statement
b. RAID
c. enterprise storage system
d. cloud dynamic
H0710 Specialized high-capacity secondary storage devices designed to meet organizational demands.
a. flash drives
b. mass storage devices
c. platters
d. CD devices
TOPIC 10 Communication and Networking
Signals that are continuous electronic waves. → Analog
2.Rules for exchanging data between computers. → Protocols
3.Work with firewalls to protect an organization’s network. → Intrusion detection systems
4.A widely used Internet protocol. → TCP/IP
5.Type of network topology in which each device is connected to a common cable called a backbone. → Bus
6.In this network, nodes have equal authority and can act as both clients and servers. → Peer-to-peer
7.Uses high-frequency radio waves. → Microwave
8.A computer specialist responsible for efficient network operations and implementation of new networks.
→ Network administrator
9.This network, also known as a hierarchical network, is often used to share corporatewide data. → Tree
10.Any device that is connected to a network. → Node
CH0801 The concept related to using computer networks to link people and resources.
a. Wi-Fi
b. connectivity
c. TCP/IP
d. GPS
正確答案:connectivity
CH0802 A high-frequency transmission cable that delivers television signals as well as connects computers
in a network.
a. hi def
b. 3D
c. twisted pair
d. coaxial
正確答案:coaxial
CH0803 A short-range radio communication standard that transmits data over short distances of up to
approximately 33 feet.
a. broadband
b. Bluetooth
c. DSL
d. TCP/IP
正確答案:Bluetooth
CH0804 The speed with which a modem transmits data is called its:
a. transfer rate
b. digital velocity
c. dynamic rate
d. modular rating
正確答案:transfer rate
CH0805 The bandwidth typically used for DSL, cable, and satellite connections to the Internet.
a. broadband
b. voiceband
c. medium band
d. baseband
正確答案:broadband
CH0806 Every computer on the Internet has a unique numeric address called a(an):
a. packet
b. DNS
c. IP address
d. broadcast
正確答案:IP address
CH0807 Sometimes referred to as a LAN adapter, these expansion cards connect a computer to a network.
單選:
a. server
b. NIC
c. VPN
d. PCMCIA
正確答案:NIC
CH0808 A device that allows one LAN to be linked to other LANs or to larger networks.
a. network gateway
b. switch
c. PAN
d. IDS
正確答案:network gateway
CH0809 Typically using Wi-Fi technology, these wireless access points are available from public places such
as coffee shops, libraries, bookstores, colleges, and universities.
a. hotspots
b. PANs
c. extranets
d. LANs
正確答案:hotspots
CH0810 Bus, ring, star, tree, and mesh are five types of network:
a. strategies
b. devices
c. protocols
d. topologies
正確答案:topologies
CH1302 The major processing steps identified in a top-down program design are called:
a. assembly
b. logic
c. modules
d. instructions
The correct answer is: modules
CH1303 The programming logic structure in which one program statement follows another.
a. repetition
b. selection
c. loop
d. sequential
The correct answer is: sequential
CH1304 One of the best ways to code effective programs is to use the three basic logic structures to create:
a. code reviews
b. pseudocode
c. structured programs
d. modular languages
The correct answer is: structured programs
CH1305 Which step in the six-step programming procedure involves desk checking and searching for syntax
and logic errors?
a. program documentation
b. program maintenance
c. program test
d. program design
The correct answer is: program test
CH1306 Which step in the six-step programming procedure is the final step?
a. program design
b. program maintenance
c. program documentation
d. program test
The correct answer is: program maintenance
CH1307 Unlike traditional systems development, this software development approach focuses less on the
procedures and more on defining the relationships between previously defined procedures.
a. object-oriented
b. 2GL
c. context-markup
d. module
The correct answer is: object-oriented
CH1309 A compiler converts the programmer’s procedural language program, called the source code, into a
machine language code, called the:
a. structured code
b. object code
c. interpreter code
d. top-down code
The correct answer is: object code
CH1310 The 4GL languages that enable nonprogrammers to use certain easily understood commands to
search and generate reports from a database.
a. query
b. application generator
c. COBOL
d. C++
The correct answer is: query
TOPIC 12 Databases
1.Group of related characters. → Field
2.Type of processing in which data is collected over several hours, days, or even weeks and then
processed all at once. → Batch
3.Type of database structure where fields or records are structured in nodes that are connected like
the branches of an upside-down tree. → Hierarchical
4.View that focuses on the actual format and location of the data. → Physical
5.Two of the most significant advantages of multidimensional databases are conceptualization
and processing _____. → Speed
6.Type of database structure where the data elements are stored in different tables. → Relational
7.A data problem that often occurs when individual departments create and maintain their own data. →
Redundancy
8.Another name for a data dictionary. → Schema
9.Type of database that uses communication networks to link data stored in different locations. →
Distributed
10.Object-oriented databases organize data by classes, objects, methods, and. → Attributes
CH1101 Facts or observations about people, places, things, and events are:
a. records
b. occurrences
c. data
d. tables
正確答案:data
CH1102 The most basic logical data element such as a single letter, number, or special character is known
as a(an):
a. element
b. phrase
c. character
d. record
回饋
正確答案:character
CH1103 Each record in a database has at least one distinctive field, called the:
a. type
b. key field
c. view
d. structure
正確答案:key field
CH1104 One element of database security is to provide only authorized users with:
a. passwords
b. classes
c. nodes
d. relations
正確答案:passwords
CH1105 The bridge between the logical and physical views of the data is provided by:
a. records
b. SQL
c. tables
d. DBMS
正確答案:DBMS
CH1106 Highly trained computer specialists who interact with the data administration subsystem are
known as:
a. DBMS
b. data modelers
c. relational specialists
d. database administrators
正確答案:database administrators
CH1107 In a network database, each child node may have more than one parent node; this is known as a:
a. parent relationship
b. relational relationship
c. hierarchy
d. many-to-many relationship
正確答案:many-to-many relationship
nections between parent nodes and child nodes are provided by:
a. DBA
b. pointers
c. characters
d. objects
正確答案:pointers
CH1109 Two of the most significant advantages of multidimensional databases over relational databases
are processing speed and:
a. conceptualization
b. control
c. format
d. objectification
正確答案:conceptualization