0% found this document useful (0 votes)
22 views32 pages

CISC (All)

Uploaded by

tristia0321
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views32 pages

CISC (All)

Uploaded by

tristia0321
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 32

目錄

TOPIC 01 Introduction To Information Technology...........................................................................................2

TOPIC 02 The Internet, the Web, and Electronic Commerce............................................................................4

TOPIC 03 Privacy, Security, and Ethics..............................................................................................................6

TOPIC 04 Information Technology and You...................................................................................................... 8

TOPIC 05 Application software.......................................................................................................................11

TOPIC 06 System Software............................................................................................................................. 13

TOPIC 07 Information Systems.......................................................................................................................15

TOPIC 08 Systems Analysis and Design.......................................................................................................... 17

TOPIC 09-1 Computer Hardware – System Unit.............................................................................................19

TOPIC 09-2 Computer Hardware - Input and Output.....................................................................................21

TOPIC 09-3 Computer Hardware – Secondary............................................................................................... 24

TOPIC 10 Communication and Networking....................................................................................................25

TOPIC 11 Programming and Languages..........................................................................................................27

TOPIC 12 Databases....................................................................................................................................... 30
TOPIC 01 Introduction To Information Technology
1.A type of a file that might contain, for example, audience handouts, speaker notes, and electronic slides.
→ Presentation
2.Devices that translate the processed information from the computer into a form that humans can
understand. → Output
3.A container that houses most of the electronic components that make up a computer system. → System
unit
4.The most widely used communication device. → Modem
5.Another name for a program. → Software
6.Consists of the step-by-step instructions that tell the computer how to do its work. → Program
7.Enables the application software to interact with the computer hardware. → System software
8.Type of computer that is small enough to fit on top of or alongside a desk yet is too big to carry around. →
Desktop
9.A communications system connecting two or more computers. → Network
10.Unlike hard disks, this type of storage does not have any moving parts, is more reliable, and requires less
power. → Solid-state

CH0101 The keyboard, mouse, display, and system unit are:


a. output devices
b. software
c. storage devices
d. hardware
The correct answer is: hardware

CH0102 Programs that coordinate computer resources, provide an interface, and run applications are
known as:
a. storage systems
b. utility programs
c. operating systems
d. application programs
The correct answer is: operating systems

CH0103 A browser is an example of a:


a. general-purpose application
b. system application
c. utility program
d. specialized program
The correct answer is: general-purpose application
CH0104 Although not as powerful as a supercomputer, this type of computer is capable of great processing
speeds and data storage.
a. mainframe
b. midrange
c. laptop
d. tablet
The correct answer is: mainframe

CH0105 Apple’s Watch is what type of computer?


a. smartphone
b. wearable
c. laptop
d. tablet
The correct answer is: wearable

CH0106 RAM is a type of:


a. secondary storage
b. network
c. computer
d. memory
The correct answer is: memory

CH0107 Unlike memory, this type of storage holds data and programs even after electric power to the
computer system has been turned off.
a. primary
b. RAM
c. ROM
d. secondary
The correct answer is: secondary

CH0108 The type of file created by word processors, for example, memos, term papers, and letters.
a. worksheet
b. document
c. presentation
d. database
The correct answer is: document

CH0109 Uses the Internet and the web to shift many computer activities from a user’s computer to
computers on the Internet.
a. high definition
b. cloud computing
c. network
d. solid-state storage
The correct answer is: cloud computing

CH0110 The largest network in the world is [the]:


a. supercomputer
b. Internet
c. web
d. Facebook
The correct answer is: Internet

TOPIC 02 The Internet, the Web, and Electronic Commerce


1. The correct answer is: A business-oriented social networking site. → LinkedIn
2. The basic components of cloud computing are clients, service providers, and the _____. → Internet
3. Electronic commerce involving individuals selling to individuals. → C2C
4. Another name for a blog. → Web log
5. Publishes short sentences that take only a few seconds to write. → Microblog.

6. Two popular instant messaging services are Google Talk and Facebook _____. →Chat
7. Maintain huge databases relating to information provided on the web and the Internet. → Search
services
8. Transmission of electronic messages over the Internet. → E-mail
9. The most popular Internet activity. → Communicating
10. The most common way to access the Internet is through a _____ → ISP

CH0201 The network that connects computers all over the world.
Select one:
a. web
b. LAN
c. Internet
d. ARPANET

CH0202 The rules for exchanging data between computers.


Select one:
a. WWW
b. DSL
c. web
d. protocols

CH0203 Using file transfer utility software, you can copy files to your computer from specially configured
servers on the Internet. This is called:
Select one:
a. filtering
b. downloading
c. blogging
d. uploading

CH0204 Communities of individuals who share a common interest typically create Facebook:
Select one:
a. Profiles
b. clients
c. groups
d. Pages

CH0205 Type of e-mail account that does not require an e-mail program to be installed on a user’s
computer is:
Select one:
a. web-based
b. utility-based
c. blog-based
d. client-based

CH0206 The most popular microblogging site:


Select one:
a. Google+
b. LinkedIn
c. Wikipedia
d. Twitter

CH0207 Using a keyword, a search engine returns a list of related sites known as:
Select one:
a. hits
b. strikes
c. blogs
d. podcasts

CH0208 This is the Internet’s equivalent to traditional cash.


Select one:
a. digital cash
b. e-commerce
c. Internet dollars
d. ftp
CH0209 The continuing Internet development that allows objects to send and receive data over the
Internet.
Select one:
a. Web 2.0
b. HTML
c. IoT
d. search engines

CH0210 Three basic components to cloud computing are clients, Internet, and _____.
Select one:
a. CSS
b. Web 3.0
c. streaming
d. service providers

TOPIC 03 Privacy, Security, and Ethics


The correct answer is: Infected computers that can be remotely controlled. → Zombies
Privacy concern that relates to the responsibility to ensure correct data collection. → Accuracy
Individuals who collect and sell personal data. → Information brokers
A type of scanning device such as fingerprint and iris (eye) scanner. → Biometric
Wide range of programs that secretly record and report an individual’s activities on the Internet. →
Spyware
Used by scammers to trick Internet users with official-looking websites. → Phishing
An ethical issue relating to using another person’s work and ideas as your own without giving credit to the
original source. → Plagiarism
Process of coding information to make it unreadable except to those who have a key. → Encryption
Small data files deposited on your hard disk from websites you have visited. → Cookies
Malicious programs that damage or disrupt a computer system. → Malware

CH0901 The three primary privacy issues are accuracy, property, and:
a. access
b. security
c. ethics
d. ownership
The correct answer is: access

CH0902 Highly detailed and personalized descriptions of individuals are electronic:


a. profiles
b. histories
c. web bugs
d. cookies
The correct answer is: profiles

CH0903 Browsers store the locations of sites visited in a:


a. tool bar
b. history file
c. firewall
d. menu
The correct answer is: history file

CH0904 The browser mode that ensures your browsing activity is not recorded.
a. insert
b. detect
c. sleep
d. privacy
The correct answer is: privacy

CH0905 The information that people voluntarily post in social networking sites, blogs, and photo- and video-
sharing sites is used to create their:
a. phish
b. access approval
c. online identity
d. firewall
The correct answer is: online identity

CH0906 Computer criminals who create and distribute malicious programs.


a. identity thieves
b. crackers
c. cyber traders
d. antispies
The correct answer is: crackers

CH0907 Programs that come into a computer system disguised as something else are called:
a. web bugs
b. Trojan horses
c. viruses
d. zombies
The correct answer is: Trojan horses

CH0908 The use of the Internet, cell phones, or other devices to send or post content intended to hurt or
embarrass another person is known as:
a. online harassment
b. social networking discrimination
c. cyberbullying
d. unethical communication
The correct answer is: cyberbullying

CH0909 Special hardware and software used to control access to a corporation’s private network is known as
a(an):

a. antivirus program
b. communication gate
c. firewall
d. spyware removal program
The correct answer is: firewall

CH0910 To prevent copyright violations, corporations often use:


a. ACT
b. VPN
c. WPA2
d. DRM
The correct answer is: DRM

TOPIC 04 Information Technology and You


1.In an information system, the rules or guidelines for people to follow are called _______ [procedures].

2.The component of the information system that is described as raw, unprocessed facts, including text,
numbers, images, and sounds, is called _______ [data].

3.Application software can be categorized as either general-purpose, specialized, or [mobile] _______


apps.

4.The five types of personal computers are: desktops, laptops, tablets, smartphones, and _____
[wearables].

5.Increased use of mobile or wireless communication devices and cloud computing has been termed "the
_______ [wireless] revolution.
6.Which part of an information system consists of the rules or guidelines for people to follow?
Select one:
a. Internet
b. Data
c. Procedures
d. People
7.The equipment that processes data in order to create information is called the _______.
Select one:
a. hardware
b. software
c. typology
d. compiler

8.In most cases, the word "software" is interchangeable with the word _______.
Select one:
a. program
b. application
c. procedure
d. computer

9.Which of the following is a collection of programs rather than a single program?


Select one:
a. Hardware
b. Microsoft Access
c. System software
d. Procedures

10.Identify the program that coordinates computer resources, provides an interface between users and
the computer, and runs applications.
Select one:
a. System software
b. Operating system
c. Application software
d. Device driver

11.Antivirus programs protect your computer system from viruses or malicious programs. This is an
example of which type of software?
Select one:
a. Operating system
b. Utilities
c. Browser software
d. Application software

12.Which of the following computers is also referred to as a server and is used to support end users for
things such as retrieving data from a database or providing access to application software?
Select one:
a. Mainframe
b. Midrange
c. Microcomputer
d. Supercomputer

13.Desktop, laptop, and tablet computers, and mobile devices are classified as _______.
Select one:
a. supercomputers
b. mainframe computers
c. personal computers
d. midrange computers

14.The most widely used handheld computers are _______.


Select one:
a. smartphones
b. tablets
c. laptops
d. notebooks and laptops

15.A microcomputer that is smaller, lighter, and less powerful than a notebook, and that has a touch
sensitive screen, is called a _______.
Select one:
a. subnotebook
b. desktop
c. tablet
d. laptop

16.This computer component holds the program and data that is currently being processed.
Select one:
a. Ports
b. RAM
c. ROM
d. Bus

17.Which of the following will not retain data after the computer is turned off?
Select one:
a. ROM
b. Hard drive
c. DVD
d. RAM

18.Identify the four basic categories of hardware in a personal computer system.


Select one:
a. System unit, input/output, secondary storage, and communication
b. System unit, input/output, secondary storage, and primary storage
c. System unit, modem, RAM, and microprocessor
d. Hard disk, input/output, secondary storage, and display devices

19.A financial budget would be created in what type of data file?


Select one:
a. Database
b. Worksheet
c. Presentation
d. Document

20.Employee records, including names, social security numbers, and related information, would typically
be stored in what type of data file?
Select one:
a. Worksheet
b. Presentation
c. Database
d. Document

TOPIC 05 Application software


The correct answer is: Toolbars typically appear below the menu bar and include small graphic elements called
_____. → Buttons
Program that organizes, analyzes, and graphs numerical data. → Spreadsheet
A general-purpose program that creates text-based documents. → Word processor
A type of specialized suite that includes a variety of programs designed to make computing easier and safer. →
Utility
Also known as a photo editor, this specialized graphics program edits or modifies digital photographs. → Image
editor
Image editors create images made up of thousands of dots known as _____. → Pixels
A collection of related data. → Database
Simplifies the process of making a selection from a list of alternatives by graphically displaying the effect of
alternatives before being selected. → Galleries
A website that provides access to specific mobile apps is known as an app _____. → Store
A type of suite that is stored at a server on the Internet and is available anywhere you can access the Internet.
→ Cloud

CH0301 This type of software works with end users, application software, and computer hardware to handle the
majority of technical details.
a. application
b. utility
c. specialized
d. system
The correct answer is: system

CH0302 A rectangular area that can contain a document, program, or message.


a. dialog box
b. form
c. window
d. frame
The correct answer is: window

CH0303 Programs that create text-based documents.


a. DBMS
b. word processors
c. spreadsheets
d. suites
The correct answer is: word processors

CH0304 Programs that organize, analyze, and graph numerical data such as budgets and financial reports.
a. spreadsheets
b. suites
c. word processors
d. DBMS
The correct answer is: spreadsheets

CH0305 Program that allows you to mix text and graphics to create publications of professional quality.
a. productivity
b. database
c. desktop publishing
d. presentation
The correct answer is: desktop publishing

CH0306 The type of image that consists of geometric shapes.


a. ribbon
b. vector
c. bitmap
d. raster
The correct answer is: vector

CH0307 An online diary or commentary.


a. vector
b. bitmap
c. HTML
d. blog
The correct answer is: blog

CH0308 Programs that combine a variety of visual objects to create attractive, visually interesting presentations.
a. word processor
b. presentation graphics
c. spreadsheet
d. DBMS
The correct answer is: presentation graphics

CH0309 Programs typically used to create sophisticated commercial websites.


a. video editors
b. web authoring programs
c. illustration programs
d. game design programs
The correct answer is: web authoring programs

CH0310 Also known as an online suite.


a. office
b. cloud
c. integrated
d. utility
The correct answer is: cloud

TOPIC 06 System Software


Program that works with the operating system to allow communication between a device and the rest of a
computer system is called a device _______. → Driver,
A type of software that allows a single physical computer to operate as though it were two or more
separate and independent computers. → Virtualization,
An operating system is often referred to as the software environment or software _______. → Platform,
Switching between different applications. → Multitasking,
Type of program that guards computer systems from viruses and other damaging programs. → Antivirus,
Mobile operating system that is owned by Google and is widely used in many smartphones. → Android,
If a file cannot be saved on a single track, it has to be _______. → Fragmented,
Restarting a running computer without turning off the power. → Warm boot,
Type of operating system that controls and coordinates networked computers. → NOS,
Programs that perform specific tasks related to managing computer resources. → Utilities

CH0110 BitDefender, Kaspersky, and Norton are examples of:


a. utility suites
b. operating systems
c. apps
d. application packages
The correct answer is: utility suites

CH0401 What type of software works with users, application software, and computer hardware to handle
the majority of technical details?
a. Linux
b. system
c. application
d. desktop
The correct answer is: system

CH0402 The programs that convert programming instructions written by programmers into a language that
computers understand and process are language:
a. linguists
b. managers
c. converters
d. translators
The correct answer is: translators

CH0403 The ability to switch between different applications stored in memory is called:
a. diversion
b. multitasking
c. operational interference
d. programming
The correct answer is: multitasking

CH0404 Graphic representation for a program, type of file, or function:


a. icon
b. software
c. image
d. app
The correct answer is: icon

CH0405 This operating system feature is controlled by a mouse and changes shape depending on its current
function.
a. mouse
b. dialog box
c. menu
d. pointer
The correct answer is: pointer

CH0406 The operating system based on Linux, designed for notebook computers that use cloud computing
and cloud storage:
a. UNIX
b. Mac
c. Windows
d. Chrome
The correct answer is: Chrome

CH0407 The mobile operating system developed by Apple and originally called iPhone OS:
a. iOS
b. Android
c. Mac OS
d. Phone OS
The correct answer is: iOS

CH0408 A utility program that copies all files in the libraries, contacts, favorites, and on the desktop:
Select one:
a. Optimize Drives
b. File History
c. Compactor
d. Disk Cleanup
The correct answer is: File History

CH0409 A troubleshooting utility that identifies and eliminates nonessential files, frees up valuable disk
space, and improves system performance:
a. Optimize Drives
b. Compactor
c. File History
d. Disk Cleanup
The correct answer is: Disk Cleanup

TOPIC 07 Information Systems


1.Function that plans, prices, promotes, sells, and distributes the organization’s goods and services. →
Marketing
2.MIS produces this type of report. → Standardized
3.Type of software that works behind the scenes to handle detailed operating procedures. → System
4.Type of worker who is involved with the distribution and communication of information. → Data
5.The accounting activity that records the customer requests for the company’s products or services is
sales order _____. → Processing
6.A type of report that calls attention to unusual events. → Exception
7.Managerial level where information flow is vertical and horizontal. → Middle
8.Computer system that allows people located at various geographic locations to communicate and have in-
person meetings. → Videoconferencing
9.Computer-based information system that uses data from TPS to support middle-level managers. → MIS
10.The accounting activity concerned with calculating employee paychecks. → Payroll

CH1001 Which of the basic organizational functions records all financial activity from billing customers to
paying employees?
Select one:
a. marketing
b. production
c. accounting
d. research
The correct answer is: accounting

CH1002 What managerial level has information flow that is vertical, horizontal, and external?
Select one:
a. middle
b. supervisory
c. top
d. foreman
The correct answer is: top

CH1003 Which computer-based information system uses data from TPS and analytical tools to support
middle managers?
a. MIS
b. TPS
c. DSS
d. ESS
The correct answer is: DSS

CH1004 Accounts payable refers to money the company owes its suppliers for materials and services it has:
a. created
b. received
c. exported
d. inventoried
The correct answer is: received

CH1005 What accounting activity keeps track of all summaries of all transactions?
a. inventory control
b. general ledger
c. balance sheet
d. income statement
The correct answer is: general ledger
CH1006 What accounting statement lists the overall financial condition of an organization?
a. income statement
b. general ledger
c. balance sheet
d. inventory control

The correct answer is: balance sheet

CH1007 What type of report is produced at regular intervals?


a. inventory
b. exception
c. periodic
d. demand
The correct answer is: periodic

CH1008 A DSS consists of four parts: user, system software, decision models, and:
a. spreadsheets
b. application software
c. data
d. operating system
The correct answer is: data

CH1009 What type of worker is involved with the distribution, communication, and creation of
information?
a. knowledge
b. information
c. executive
d. foreman
The correct answer is: information

CH1010 What type of program is designed to schedule, plan, and control project resources?
a. schedulers
b. auditing
c. project managers
d. dtp
The correct answer is: project managers

TOPIC 08 Systems Analysis and Design


1.The last and ongoing phase of the systems life cycle is systems _____. → Maintenance
2.The document that shows the levels of management and formal lines of authority is an _____. →
Organization chart
3.Another name for systems implementation. → Conversion
4.The approach in which the new system is implemented gradually over a period of time. → Phased
5.Systems life cycle phase that studies the present system in depth. → Analysis
6.The phase in which the old system is replaced and training begins. → Implementation
7.Systems analysis involves suggesting alternative _____. → Solutions
8.Systems analysis and design is a six-phase problem solving procedure for examining and improving an
information _____. → System
9.The four approaches to conversion are parallel, pilot, phased, and _____. → Direct
10.This phase begins with designing alternative systems. → Systems design

CH1201 An information system is a collection of hardware, software, people, procedures, the Internet,
and:
a. DBMS
b. data
c. systems analysts
d. specialists

CH1202 What is the first phase in the systems life cycle?


a. preliminary investigation
b. systems analysis
c. systems design
d. needs analysis

CH1203 Which phase involves installing the new system and training people?
a. systems implementation
b. systems design
c. systems analysis
d. preliminary investigation

CH1204 This phase is concerned about determining system requirements not in design.
a. systems implementation
b. systems analysis
c. preliminary investigation
d. systems design

CH1205 Which systems analysis tool shows the relationship between input and output documents?
a. system flow chart
b. data flow diagram
c. grid chart
d. automated design tool

CH1206 These tools relieve the systems analysts of many repetitive tasks, develop clear documentation,
and, for larger projects, coordinate team member activities.
a. data flow analyzers
b. CASE
c. flowcharts
d. automated systems life cycle

CH1207 Which phase is concerned with economic, technical, and operational feasibility?
a. systems implementation
b. preliminary investigation
c. systems analysis
d. systems design

CH1208 What type of feasibility evaluates whether the people within the organization will embrace or
resist a new system?
a. operational
b. economic
c. technical
d. behavioral

CH1209 Which approach to conversion begins by trying out a new system in only one part of an
organization?
a. phased
b. direct
c. pilot
d. parallel

CH1210 An alternative to the systems life cycle approach using powerful development software, small
specialized teams, and highly trained personnel.
a. RAD
b. CASE
c. AAD
d. prototyping
TOPIC 09-1 Computer Hardware – System Unit
A type of memory that is volatile or loses its contents when power is turned off. → Flash
A type of multiprocessor chip that provides two or more separate and independent CPUs. → Multicore
System board component that provides a connection point for specialized cards or circuit boards. → Slots
Another name for a network adapter card. → NIC
Provide connection points for chips. → Sockets
A type of memory that improves processing by acting as a temporary high-speed holding area between the
memory and the CPU. → Cache
This bus connects the CPU to memory on the system board. → System
A socket for external devices to connect to the system unit. → Port
A type of memory that provides a combination of features of RAM and ROM. → Flash
This port can be used to connect many USB devices to the system. → USB

CH0501 This container houses most of the electrical components for a computer system.
a. chip carrier
b. Unicode
c. system board
d. system unit
The correct answer is: system unit

CH0502 The most popular mobile device.


a. smartphone
b. ultrabook
c. desktop
d. all-in-one
The correct answer is: smartphone

CH0503 The mainboard or motherboard is also known as the:


a. board processor
b. system board
c. mobile system
d. computer
The correct answer is: system board

CH0504 How many bytes can a 32-bit-word computer access at one time?
a. 4
b. 8
c. 1
d. 16
The correct answer is: 4

CH0505 In a personal computer system, the central processing unit is typically contained on a single:
a. chip
b. RAM
c. module
d. bus
The correct answer is: chip

CH0506 This type of memory divides large programs into parts and stores the parts on a secondary storage
device.
a. random-access
b. direct
c. virtual
d. expanded
The correct answer is: virtual

CH0507 Also known as NIC, this adapter card is used to connect a computer to a(an):
a. expansion
b. network
c. AIA
d. graphics
The correct answer is: network

CH0508 This provides a pathway to connect parts of the CPU to each other.
a. cable
b. wired
c. wireless
d. bus
The correct answer is: bus

CH0509 The specialized port that connects musical instruments like an electronic keyboard to a sound card.
a. Thunderbolt
b. eSATA
c. MIDI
d. HDMI
The correct answer is: MIDI

CH0510 Computers can only recognize this type of electronic signal.


a. maximum
b. digital
c. analog
d. bus
The correct answer is: digital

CH0511 Which one of the following coding systems can be used to represent the Thai language?
a. CJK
b. ASCII
c. EBCDIC
d. Unicode
The correct answer is: Unicode

CH0512 One gigabyte is approximately equal to


a. one billion bytes
b. one thousand bytes
c. one million bytes
d. one trillion bytes
The correct answer is: one billion bytes

TOPIC 09-2 Computer Hardware - Input and Output


1.Bar code system used by many electronic cash registers. → UPC
2.A pen like device commonly used with tablet PCs and PDAs. → Stylus
3.Input device that controls a pointer that is displayed on the monitor. → Mouse
4.Records images digitally on a memory card or in its memory. → Digital camera
5.A provider of lower-cost options for telephony → Skype
6.Bar code readers use either handheld wand readers or platform _____. → Scanners
7.The distance between each pixel. → Dot pitch
8.Special-purpose printers for creating maps, images, and architectural and engineering drawings. →
Plotters
9.A monitor feature that is measured by the diagonal length of the viewing area. → Active display area
10.Pressing this key turns a feature on or off → Toggle key

CH0601 Most keyboards use an arrangement of keys known as:


a. Alpha
b. QWERTY
c. Daisy
d. OptiKey
The correct answer is: QWERTY

CH0602 The device that controls a pointer displayed on the monitor.


a. cord
b. printer
c. mouse
d. scanner
The correct answer is: mouse

CH0603 The type of screen that can be touched with more than one finger and supports zooming in and
out by pinching and stretching your fingers.
a. digital
b. dynamic
c. multitouch
d. OLED
The correct answer is: multitouch
CH0604 Flatbed and document are types of:
a. MaxiCode
b. headsets
c. monitors
d. scanners
The correct answer is: scanners

CH0605 Device used by banks to automatically read those unusual numbers on the bottom of checks and
deposit slips.
a. MICR
b. UPC
c. FDIC
d. OMR
The correct answer is: MICR

CH0606 The most widely used audio-input device.


a. RFID
b. mouse
c. VR
d. microphone
The correct answer is: microphone

CH0607 The monitor feature that indicates the ability to display colors.
a. dot pitch
b. contrast ratio
c. aspect ratio
d. resolution rate
The correct answer is: contrast ratio

CH0608 Mobile devices able to store and display electronic media.


a. HDTV
b. e-book readers
c. lasers
d. whiteboards
The correct answer is: e-book readers

CH0609 Virtual reality strives to create this type of experience.


a. electronic
b. VoIP
c. immersive
d. LCD
The correct answer is: immersive
CH0610 The study of human factors related to things people use is:
a. RFID
b. RSI
c. telephony
d. ergonomics
The correct answer is: ergonomics

TOPIC 09-3 Computer Hardware – Secondary


1.Each track is divided into invisible wedge-shaped sections called _____ . → Sectors
2.Similar to internal hard-disk drives except they use solid-state memory. → Solid-state drives
3.Optical disc most common on today’s personal computers. → DVD
4.Increases storage capacity by reducing the amount of space required to store data and programs. → File
compression
5.Concentric rings on a hard-disk platter. → Tracks
6.Architecture to link remote storage devices to computers such that the devices are as available as locally
attached drives. → Storage area network
7.Mass storage device widely used for home and small business storage. → Network attached storage
8.Hardware that reads data and programs from storage media. → Storage devices
9.Provides permanent or nonvolatile storage. → Secondary storage
10.The next generation of optical discs. → Hi def

CH0701 RAM is sometimes referred to as:


a. ratio active memory
b. secondary storage
c. read-only memory
d. primary storage

CH0702 The actual physical material that holds the data and programs.
a. access
b. media
c. primary storage
d. capacity

CH0703 Measures how tightly the magnetic charges can be packed next to one another on the disk.
a. cylinders
b. sectors
c. tracks
d. density

CH0704 When a read-write head makes contact with the hard disk’s surface, it causes a head:
a. crash
b. pit
c. land
d. scratch

CH0705 This hard-disk performance enhancement anticipates data needs.


a. disk caching
b. RAID
c. file compression
d. file decompression

CH0706 This type of storage uses pits and lands to represent 1s and 0s.
a. cloud
b. hard disk
c. solid state
d. optical

CH0707 DVD stands for:


a. dynamic video disc
b. digital video data
c. digital versatile disc
d. dynamic versatile disc

CH0708 USB drives are also known as:


a. universal state bus
b. ports
c. flash drives
d. optical drives

CH0709 An organizational strategy to promote efficient and safe use of data across the networks.
a. data mission statement
b. RAID
c. enterprise storage system
d. cloud dynamic

H0710 Specialized high-capacity secondary storage devices designed to meet organizational demands.
a. flash drives
b. mass storage devices
c. platters
d. CD devices
TOPIC 10 Communication and Networking
Signals that are continuous electronic waves. → Analog
2.Rules for exchanging data between computers. → Protocols
3.Work with firewalls to protect an organization’s network. → Intrusion detection systems
4.A widely used Internet protocol. → TCP/IP
5.Type of network topology in which each device is connected to a common cable called a backbone. → Bus
6.In this network, nodes have equal authority and can act as both clients and servers. → Peer-to-peer
7.Uses high-frequency radio waves. → Microwave
8.A computer specialist responsible for efficient network operations and implementation of new networks.
→ Network administrator
9.This network, also known as a hierarchical network, is often used to share corporatewide data. → Tree
10.Any device that is connected to a network. → Node

CH0801 The concept related to using computer networks to link people and resources.
a. Wi-Fi
b. connectivity
c. TCP/IP
d. GPS
正確答案:connectivity

CH0802 A high-frequency transmission cable that delivers television signals as well as connects computers
in a network.
a. hi def
b. 3D
c. twisted pair
d. coaxial
正確答案:coaxial

CH0803 A short-range radio communication standard that transmits data over short distances of up to
approximately 33 feet.
a. broadband
b. Bluetooth
c. DSL
d. TCP/IP
正確答案:Bluetooth

CH0804 The speed with which a modem transmits data is called its:
a. transfer rate
b. digital velocity
c. dynamic rate
d. modular rating
正確答案:transfer rate

CH0805 The bandwidth typically used for DSL, cable, and satellite connections to the Internet.
a. broadband
b. voiceband
c. medium band
d. baseband
正確答案:broadband

CH0806 Every computer on the Internet has a unique numeric address called a(an):
a. packet
b. DNS
c. IP address
d. broadcast
正確答案:IP address

CH0807 Sometimes referred to as a LAN adapter, these expansion cards connect a computer to a network.
單選:
a. server
b. NIC
c. VPN
d. PCMCIA
正確答案:NIC

CH0808 A device that allows one LAN to be linked to other LANs or to larger networks.
a. network gateway
b. switch
c. PAN
d. IDS
正確答案:network gateway

CH0809 Typically using Wi-Fi technology, these wireless access points are available from public places such
as coffee shops, libraries, bookstores, colleges, and universities.
a. hotspots
b. PANs
c. extranets
d. LANs
正確答案:hotspots

CH0810 Bus, ring, star, tree, and mesh are five types of network:
a. strategies
b. devices
c. protocols
d. topologies
正確答案:topologies

TOPIC 11 Programming and Languages


The process of testing and then eliminating program errors. → Debugging
Converts a procedural language one statement at a time into machine code just before it is to be executed.
→ Interpreter
Program step that involves creating descriptions and procedures about a program and how to use it. →
Documentation
An outline of the logic of the program to be written. → Pseudocode
The first-generation language consisting of 1s and 0s. → Machine
Programming languages that are closer to the language of humans. → Higher level
Six-step procedure also known as software development. → Programming
5GL that allows more direct human communication with a program. → Natural language
Logic structure, also known as IF-THEN-ELSE, that controls program flow based on a decision. → Selection
Generation of computer languages that allows a person to provide a system with a problem and some
constraints, and then request a solution. → 5GL

CH1301 A program is a list of instructions for the computer to follow to process:


a. software
b. data
c. direct logic
d. hardware
Feedback
The correct answer is: data

CH1302 The major processing steps identified in a top-down program design are called:
a. assembly
b. logic
c. modules
d. instructions
The correct answer is: modules

CH1303 The programming logic structure in which one program statement follows another.
a. repetition
b. selection
c. loop
d. sequential
The correct answer is: sequential

CH1304 One of the best ways to code effective programs is to use the three basic logic structures to create:
a. code reviews
b. pseudocode
c. structured programs
d. modular languages
The correct answer is: structured programs

CH1305 Which step in the six-step programming procedure involves desk checking and searching for syntax
and logic errors?
a. program documentation
b. program maintenance
c. program test
d. program design
The correct answer is: program test

CH1306 Which step in the six-step programming procedure is the final step?
a. program design
b. program maintenance
c. program documentation
d. program test
The correct answer is: program maintenance

CH1307 Unlike traditional systems development, this software development approach focuses less on the
procedures and more on defining the relationships between previously defined procedures.
a. object-oriented
b. 2GL
c. context-markup
d. module
The correct answer is: object-oriented

CH1308 Natural languages are considered to be a:


a. midlevel language
b. low-level language
c. high-level language
d. procedural language
The correct answer is: high-level language

CH1309 A compiler converts the programmer’s procedural language program, called the source code, into a
machine language code, called the:
a. structured code
b. object code
c. interpreter code
d. top-down code
The correct answer is: object code

CH1310 The 4GL languages that enable nonprogrammers to use certain easily understood commands to
search and generate reports from a database.
a. query
b. application generator
c. COBOL
d. C++
The correct answer is: query

TOPIC 12 Databases
1.Group of related characters. → Field
2.Type of processing in which data is collected over several hours, days, or even weeks and then
processed all at once. → Batch
3.Type of database structure where fields or records are structured in nodes that are connected like
the branches of an upside-down tree. → Hierarchical
4.View that focuses on the actual format and location of the data. → Physical
5.Two of the most significant advantages of multidimensional databases are conceptualization
and processing _____. → Speed
6.Type of database structure where the data elements are stored in different tables. → Relational
7.A data problem that often occurs when individual departments create and maintain their own data. →
Redundancy
8.Another name for a data dictionary. → Schema
9.Type of database that uses communication networks to link data stored in different locations. →
Distributed
10.Object-oriented databases organize data by classes, objects, methods, and. → Attributes

CH1101 Facts or observations about people, places, things, and events are:
a. records
b. occurrences
c. data
d. tables
正確答案:data

CH1102 The most basic logical data element such as a single letter, number, or special character is known
as a(an):
a. element
b. phrase
c. character
d. record
回饋
正確答案:character
CH1103 Each record in a database has at least one distinctive field, called the:
a. type
b. key field
c. view
d. structure
正確答案:key field

CH1104 One element of database security is to provide only authorized users with:
a. passwords
b. classes
c. nodes
d. relations
正確答案:passwords

CH1105 The bridge between the logical and physical views of the data is provided by:
a. records
b. SQL
c. tables
d. DBMS
正確答案:DBMS

CH1106 Highly trained computer specialists who interact with the data administration subsystem are
known as:
a. DBMS
b. data modelers
c. relational specialists
d. database administrators
正確答案:database administrators

CH1107 In a network database, each child node may have more than one parent node; this is known as a:
a. parent relationship
b. relational relationship
c. hierarchy
d. many-to-many relationship
正確答案:many-to-many relationship

nections between parent nodes and child nodes are provided by:
a. DBA
b. pointers
c. characters
d. objects
正確答案:pointers

CH1109 Two of the most significant advantages of multidimensional databases over relational databases
are processing speed and:
a. conceptualization
b. control
c. format
d. objectification
正確答案:conceptualization

CH1110 Object-oriented databases organize data by classes, attributes, methods, and:


a. time
b. space
c. objects
d. relations
正確答案:objects

You might also like