0% found this document useful (0 votes)
41 views96 pages

ITBIS105 Questions All Chapter

Uploaded by

saratareef88
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
41 views96 pages

ITBIS105 Questions All Chapter

Uploaded by

saratareef88
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 96

]Questions All Chapter[ ITBIS105

Multiple Choice Questions


Question 01:
A hard disk is an example of------------.
a) Secondary storage.
b) Optical media.
c) A solid-state drive.

Question 02:
---------are typically used to store programs and very large data files.
a) Hard disks.
b) RAM.
c) USB drives.

Question 03:
The case that contains the microprocessors and memory.
a) Communication device.
b) Primary storage.
c) Memory.
d) System unit.

Question 04:
-----------devices convert information the computer understands into a from
that humans can understand.
a) Output.
b) Storage.
c) Communication.

Question 05:
In order for a personal computer to share information with other
computers it must have---------------.
a) Storage.
b) Connectivity.
c) Processing.

Question 06:
------------is raw, unprocessed facts, including text, numbers, and sounds.
a) Data.
b) Information.

P a g e 1 | 96
]Questions All Chapter[ ITBIS105

Question 07:
While you are working on a document that you haven’t saved yet it is
temporarily held in the computer----------------.
a) Secondary storage: is permanent storage.
b) Hard disk.
c) Monitor.
d) Memory.

Question 08:
What is another name for software?
a) Programs.
b) Equipment.
c) Data.

Question 09:
The largest network in the world is the--------. It is like a giant highway that
connects you to millions of other people and organizations located
throughout the world.
a) Network.
b) WLAN.
c) Internet.

Question 10:
The largest network in the world is the--------.
a) Intranet.
b) Extranet.
c) Internet.

Question 11:
---------------computing allows people to use the internet and access more
powerful computers, software, and storage.
a) Cloud.
b) Mobile.
c) Wireless.

Question 12:
----------computing uses the internet and the web to shift many computer
activities from a user’s computer to computers on the internet.
a) Cloud.
b) Network.
c) Wireless.

P a g e 2 | 96
]Questions All Chapter[ ITBIS105

Question 13:
This type of memory would lose its contents if the electrical power to the
computer is disrupted.
a) Solid-state storage.
b) Random-access memory.
c) Read-only memory.
d) Secondary storage.

Question 14:
As part of the system unit, the----------controls and manipulates data to
produce information.
a) Memory.
b) Secondary storage.
c) Monitor.
d) Microprocessor.

Question 15:
The------------provides a multimedia interface to the numerous resources
available on the Internet.
a) Cloud.
b) Web.
c) Network.

Question 16:
------------------is the capability of your microcomputers to share information
with other computers on a network.
a) Productivity.
b) Popularity.
c) Connectivity.

Question 17:
The keyboard, mouse, monitor, system unit, and other devices are
referred to as--------.
a) Connectivity.
b) Hardware.
c) Software.

Question 18:
The-------------is the ongoing development of the internet that enables
computing devices embedded in everyday objects to send and receive data.
a) Wireless revolution.
b) Internet of things.
c) Cloud.

P a g e 3 | 96
]Questions All Chapter[ ITBIS105

Question 19:
In order for a personal computer to communicate with other computers it
uses----------devices.
a) Secondary storage.
b) Communication.
c) Output.
d) Input.

Question 20:
The rules or guidelines for people to follow when using software,
hardware, and data are---------------.
a) Procedures.
b) Competency.
c) Connectivity.

Question 21:
Utilities and operating systems are a collection of programs considered as:
a) Application software.
b) Browsers.
c) System software.

Question 22:
Windows is considered--------------------software.
a) Application.
b) System.

Question 23:
------------are small programs primarily designed for mobile devices, such
as smartphones and for tablet computers.
a) General-purpose applications.
b) Specialized applications.
c) Mobile apps.

Question 24:
The user interacts primarily with------------ software.
a) System.
b) hardware.
c) Application.

Question 25:
Operating Systems provide the following functions.
a) Boot the computer.
b) Control and manage files.

P a g e 4 | 96
]Questions All Chapter[ ITBIS105

Question 26:
The web provides a multimedia interface to the numerous resources
available on the--------------.
a) Network.
b) Internet.
c) Cloud.

Question 27:
Almost all information systems provide a way to connect to other people
and computers typically using the------------------.
a) Internet.
b) Procedures.
c) Data.

Question 28:
-------------- devices accept data an convert it into a form that the computer
understands.
a) Output.
b) Storage.
c) Communication.
d) Input.

Question 29:
Input devices are.
a) Keyboard, mouse and scanner.
b) Monitor and printer.

Question 30:
The purpose of software is to convert------------into information.
a) Data.
b) Processed facts.
c) Procedures.

Question 31:
The purpose of------------is to convert data into information.
a) Hardware.
b) Software.
c) Procedures.

P a g e 5 | 96
]Questions All Chapter[ ITBIS105

Question 32:
What part of an information system is most important?
a) Hardware.
b) People.
c) Connectivity.
d) Software.
e) Data.
f) Procedures.

Question 33:
-----------use laser technology to store data and programs.
a) Optical discs.
b) Solid state storage devices.
c) Hard disks.

Question 34:
This type of disk has a read/write head that moves across its platters.
a) Hard disk.
b) Solid-state.
c) Optical.

Question 35:
All of the devices as part of a personal computer system are referred to as
the computer---------------.
a) Hardware.
b) Storage.
c) Software.

Question 36:
MAN stands for.
a) Micro-processing Application Nod.
b) Metropolitan Area Network.

Question 37:
Windows 7 and UNIX are examples of a(n).
a) desktop PC.
b) Server farm.
c) Productivity suite.
d) Operating System.

P a g e 6 | 96
]Questions All Chapter[ ITBIS105

Question 38:
On a desktop PC, the motherboard, processor, and memory are contained
in the----------------.
a) System unit.
b) Monitor.
c) Tablet.
d) Pointing device.

Question 39:
One of the following is NOT a mobile computer or device:
a) notebook PC.
b) Tablet.
c) Smartphone.
d) Server.

Question 40:
Ram is a type of------------.
a) CPU.
b) Microprocessor.
c) Memory.
d) Hard disk.

Question 41:
The type of disk has a read/write head that moves across its platters.
a) Optical.
b) Solid-state.
c) Hard disk.

Question 42:
A kilobyte is equal to:
a) 1024 bytes.
b) 1024 megabytes.
c) 1 Gigabyte.
d) 2000 bytes.

Question 43:
A kilobyte is equal to: a. 1024 bytes
a) 1024 bytes
b) 1024 megabytes.
c) 1 Gigabyte.
d) 2000 bytes.

P a g e 7 | 96
]Questions All Chapter[ ITBIS105

Question 44:
A widely used productivity suite available from Microsoft:
a) Microsoft Word.
b) Microsoft Office.
c) Microsoft PowerPoint.
d) Microsoft Publisher.

Question 45:
The capability of your personal computer to share information with other
computers called--------------------
a) Cloud computing.
b) Connectivity.
c) Wi-Fi.
d) Database.

Question 46:
The capability of your personal computer to share information with other
computers.
a) Processing.
b) connectivity.
c) Storage.

Question 47:
The most common------------ device is the monitor.
a) Storage.
b) Output.
c) Communication.

Question 48:
---------- provides step-by-step instructions that tell computer how to
convert data into information.
a) Software.
b) Hardware.
c) Data.

Question 49:
---------are computer with processing capabilities less powerful than a
mainframe computer yet more power than a desktop computer.
a) Personal computers.
b) Midrange computers.
c) Supercomputers.

P a g e 8 | 96
]Questions All Chapter[ ITBIS105

Question 50:
-------------program perform specific tasks related to managing computer
resources.
a) Utility.
b) Resource.
c) Application.

Question 51:
-------is another name for a program or programs.
a) Procedures.
b) Hardware.
c) People.
d) Software.
e) Internet.

Question 52:
The collection of equipment that process data to create information.
a) Software.
b) Hardware.
c) Internet.

Question 53:
Monitors are examples of-------------- devices.
a) Storage.
b) Communication.
c) Output.

Question 54:
Although not nearly as powerful as supercomputers, ------------- are
capable of great processing speeds and data storge.
a) Netbook.
b) Mainframes.
c) Desktops.

Question 55:
Hard disks, solid-state storage, and optical disks are all examples of--------
storge.
a) High-definition.
b) RAM.
c) Secondary.

P a g e 9 | 96
]Questions All Chapter[ ITBIS105

Question 56:
-----------are the most powerful type of computer and are used to process
massive amounts of data.
a) PCs.
b) Mainframes.
c) Supercomputers.
d) Servers.

Question 57:
-----------is a temporary holding area for data, instructions, and information.
a) Secondary storage.
b) Solid state storage.
c) Memory.

Question 58:
------------device translate data and programs from a from that humans can
understand into a form that the computer can process.
a) Output.
b) Storage.
c) Communication.
d) Input.

Question 59:
presentation, Database, Worksheet, and Document are all example of----------.
a) Storage.
b) Files.
c) Data.

Question 60:
The difference between general-purpose application software and
specialized application software is that--------- application software is more
narrowly focused on specific disciplines and occupations.
a) Specialized.
b) General-purpose.

Question 61:
--------------, also known as servers, are most widely used to support end
users for such specific need as retrieving data from a database or
supplying access to application software.
a) Supercomputers.
b) Personal computers.
c) Midrange computers.
d) Mainframe computers

P a g e 10 | 96
]Questions All Chapter[ ITBIS105

Question 62:
A----------is a communication device that modifies audio, video, and other
types of data onto a from that can be transmitted across the internet.
a) Monitor.
b) Disk.
c) Modem.
d) System unit.

Question 63:
A-----------repair and installs computer components and systems.
a) Desktop publisher.
b) Computer trainer.
c) Webmaster.
d) Computer technician.

Question 64:
A-------------is an example of an output device.
a) Scanner.
b) Hard disk.
c) Mouse.
d) Display.

Question 65:
A-------------- is different than solid state storage in that it has moving parts.
a) USB drive.
b) Hard disk.
c) Flash memory care.

Question 66:
A----------is different than solid state storge in that it has moving parts.
a) Flash memory card.
b) Hard disk.
c) USB drive.

Question 67:
A----------repairs and installs computer components and systems.
a) Computer technician.
b) Computer trainer.
c) Desktop publisher.
d) Webmaster.

P a g e 11 | 96
]Questions All Chapter[ ITBIS105

Question 68:
A--------------is an example of a secondary storage device.
a) Printer.
b) Hard disk.
c) Microprocessor.
d) Scanner.

Question 69:
A(n)------------ is defined as communications system connecting two or
more computers.
a) Cloud.
b) Internet.
c) Network.

Question 70:
A(n)___________ manages all the computer’s activities after startup
communicating with the hardware, instructing it to take action to
accomplish tasks.
a) BIOS.
b) Operating System.
c) Software.
d) Utility software.

Question 71:
A(n)___________ manages all the computer’s activities after startup.
a) BIOS b. Operating System.
b) Operating System.
c) Software.
d) Utility software.

Question 72:
Tablets, smartphone, and wearable devices have spurred the--------------
revolution affecting the way we communicate and use computer technology.
a) Cloud computing.
b) Internet of things.
c) Wireless.

Question 73:
The-----------is the enclosure that contains most of the electronic
computers that make up a computer system.
a) Input.
b) Secondary.
c) Output storage.
d) System unit.
P a g e 12 | 96
]Questions All Chapter[ ITBIS105

Question 74:
A---------------develops and maintains Web sites and Web resources.
a) Computer trainer.
b) Computer technician.
c) Desktop publisher.
d) Webmaster.

Question 75:
The-----------is a network of devices, embedded with electronics that
enables everyday objects to connect and exchange data.
a) Local area network.
b) Cloud.
c) Internet of things.

Question 76:
Software enables the application software to interact with the computer
hardware.
a) Application.
b) System.

Question 77:
----------Software enables the application software to interact with the
computer hardware.
a) Application.
b) System.

Question 78:
---------------software work works in the background to help the computer
manage its own internet resources.
a) Application.
b) System.
c) Device driver.
Question 79:
Raw, unprocessed fact, including text, numbers, images, and sound are
called-------------.
a) Data.
b) Information.

Question 80:
Row, unprocessed facts, including text, numbers, images, and sounds are
called------------.
a) Information.
b) Data.

P a g e 13 | 96
]Questions All Chapter[ ITBIS105

Question 81:
The two main components of the system unit are the microprocessor and----.
a) Secondary storage.
b) CPU.
c) Hard disk.
d) Memory.

Question 82:
The two main components of the system unit are the--------and memory.
a) An external storage device.
b) Display.
c) Microprocessor.
d) Keyboard.

Question 83:
The two main components of the system unit are the---------and memory.
a) Microprocessor.
b) Keyboard.
c) Display.
d) An external storage device.

Question 84:
The two major classifications of software are----------------software.
a) Operating and system.
b) System and application.
c) Program and utility.
d) Program and application.

Question 85:
-------------is an example of an operating system.
a) MacOS.
b) Internet Explorer.
c) Safari.

Question 86:
-------------is an example of an operating system.
a) Internet Explorer.
b) Safari.
c) Windows.
d) Mozilla Firefox.

P a g e 14 | 96
]Questions All Chapter[ ITBIS105

Question 87:
These utility programs protect your computer system from malicious
programs that can damage software and hardware.
a) Antivirus.
b) Diagnostic.
c) Backup.

Question 88:
The--------- is the hardware that converts data into information.
a) Microprocessor.
b) Monitor.
c) Random-access memory.
d) Printer.

Question 89:
Using----------devices, a personal computer can communicate with other
computer systems using the internet.
a) Output.
b) Input.
c) Secondary storage.
d) Communicate.

Question 90:
-----------devices translate processed information from computer into a
from that humans can understand.
a) Output.
b) communication.
c) Storage.

Question 91:
In an information system, procedures are---------------.
a) Software programs.
b) Hardware specifications.
c) Rules or guidelines.

Question 92:
What are raw, unprocessed facts, including text, numbers, and sounds
called?
a) Software.
b) Data.
c) Information.
d) Procedures.

P a g e 15 | 96
]Questions All Chapter[ ITBIS105

Question 93:
Database management system, word processors and spreadsheets are
examples of--------------- applications because they are used in many
different occupations.
a) Specialized.
b) General-purpose.
c) Mobile.

Question 94:
In an information system, what describes the step-by-step instructions
that tell the computer how to do its work?
a) Hardware.
b) Guidelines.
c) Software.
d) People.

Question 95:
---Programs perform specific tasks related to managing computer resources.
a) Resource.
b) Application.
c) Utility.

Question 96:
Connectivity is the capability of your microcomputer to share information
other computers on a-----------.
a) Network.
b) Disk.
c) Flash drive.

Question 97:
Select the type of computer that would most likely be used by a large
insurance company to process information about its millions of policy
holders?
a) Mainframe computer.
b) Midrange computer.
c) Personal computer.

Question 98:
Select the part of an information system specifically intended to provide
connectivity to other people and computers.
a) Internet.
b) People.
c) Data.

P a g e 16 | 96
]Questions All Chapter[ ITBIS105

Question 99:
select the characteristics of solid-state storage.
a) It saves data electronically.
b) It contains a rotating disk.
c) It uses removable storage media.
d) The data it saves is volatile.

Question 100:
Which of the following is the most popular type of mobile app?
a) Word processing.
b) Shopping.
c) Social networking.
d) Banking.

Question 101:
which programs coordinate computer resources, provide an interface
between users and the computer, and run applications?
a) Utilities.
b) Operating systems.
c) Device drivers.

Question 102:
Which of the following is NOT located on the motherboard?
a) Processor.
b) Chipset.
c) Buses d. Touchpad.
d) Touchpad.

Question 103:
Which of the following is not a required part of an information system?
a) Hardware.
b) Procedures.
c) Software.
d) People.
e) Cloud computing.
f) Data.

Question 104:
Which of the following devices are used to store data and information?
a) Hard Drive.
b) Headphone.
c) Adaptor.
d) Router.

P a g e 17 | 96
]Questions All Chapter[ ITBIS105

Question 105:
Which of the following is an example of specialized application?
a) A browser.
b) A word processor.
c) A spreadsheet program.
d) A web authoring program.

Question 106:
Which of these is NOT one of the five parts of an information system?
a) Data.
b) Procedures.
c) People.
d) Networks.

Question 107:
Which of these is a personal computer?
a) Server.
b) tablet PC.
c) Mainframe.
d) Supercomputer.

Question 108:
Which of these is NOT one of the functions of an operating system?
a) Run applications.
b) Provide a user interface.
c) Communicate with hardware.
d) Send and receive email.

Question 109:
Processed data becomes-------------.
a) Information.
b) Raw facts.

Question 110:
--------is a type of memory that temporarily holds the program and data
that is currently being processed.
a) Read-only memory.
b) Solid-state storage.
c) Secondary storage.
d) Random-access memory.

P a g e 18 | 96
]Questions All Chapter[ ITBIS105

Question 111:
Which part of an information system consists of the rules or guidelines
for people to follow?
a) People.
b) Procedures.
c) Internet.
d) Data.

Question 111:
The equipment that processes data in order to create information is called
the _______.
a) Typology.
b) Compiler.
c) Hardware.
d) Software.

Question 111:
In most cases, the word "software" is interchangeable with the word ______.
a) Procedure.
b) Application.
c) Program.
d) Computer.

Question 111:
What are the two major software types?
a) System analysis software and data warehousing software.
b) Operating system software and utilities software.
c) System software and application software.
d) Database management software and application software.

Question 111:
Which of the following is a collection of programs rather than a single
program?
a) Procedures.
b) System software.
c) Hardware.
d) Microsoft Access.

P a g e 19 | 96
]Questions All Chapter[ ITBIS105

Question 111:
"Background" software that helps the computer manage resources is
called _______.
a) Shareware.
b) application software.
c) Desktop.
d) system software.

Question 111:
Identify the program that coordinates computer resources, provides an
interface between users and the computer, and runs applications.
a) System software.
b) Operating system.
c) Application software.
d) Device driver.

Question 111:
Antivirus programs protect your computer system from viruses or
malicious programs. This is an
example of which type of software?
a) Browser software.
b) Operating system.
c) Application software.
d) Utilities.

Question 111:
System software includes all of the following except:
a) Operating systems.
b) Device drivers.
c) Utilities.
d) Browsers.

Question 111:
Which of the following computers is also referred to as a server and is
used to support end users for things such as retrieving data from a
database or providing access to application software?
a) Midrange.
b) Mainframe.
c) Supercomputer.
d) Microcomputer.

P a g e 20 | 96
]Questions All Chapter[ ITBIS105

Question 111:
Desktop, laptop, and tablet computers, and mobile devices are classified
as _______.
a) mainframe computers.
b) Supercomputers.
c) midrange computers.
d) personal computers.

Question 111:
The most widely used handheld computers are _______.
a) Laptops.
b) Smartphones.
c) notebooks and laptops.
d) Tablets.

Question 111:
A microcomputer that is smaller, lighter, and less powerful than a
notebook, and which has a touch sensitive screen, is called a _______.
a) Laptop.
b) Desktop.
c) Subnotebook.
d) Tablet.

Question 111:
This computer component holds the program and data that is currently
being processed.
a) RAM.
b) ROM.
c) Bus.
d) Ports.

Question 111:
Which of the following will not retain data after the computer is turned off?
a) DVD.
b) RAM.
c) ROM.
d) Hard drive.

Question 111:
Identify the four basic categories of hardware in a microcomputer system.
a) Hard disk, input/output, secondary storage, and display devices.
b) System unit, input/output, secondary storage, and primary storage.
c) System unit, input/output, secondary storage, and communication.

P a g e 21 | 96
]Questions All Chapter[ ITBIS105

d) System unit, modem, RAM, and microprocessor.

Question 111:
This hardware houses most of the electronic components that make up a
computer system.
a) System unit.
b) Input/output devices.
c) Secondary storage.
d) Communication.

Question 111:
Which of the following are two important components of the system unit?
a) Microprocessor and memory.
b) Keyboard and mouse.
c) Microphone and speakers.
d) Monitor and printer.

Question 111:
Which one of the following is not considered a form of secondary
storage?
a) Solid-state storage.
b) Optical disk.
c) RAM.
d) Hard disk.

Question 111:
______ are the most important part of any information system.
a) Software applications.
b) Programs.
c) Hardware applications.
d) People.

Question 111:
The type of media that uses laser technology to store data and programs
is _______.
a) hard disk.
b) Flash.
c) solid state.
d) optical disc.

P a g e 22 | 96
]Questions All Chapter[ ITBIS105

Question 111:
Which of the following is not an example of a document file created by a
word processor?
a) Spreadsheet.
b) Memo.
c) Letter.
d) Term paper.

Question 111:
A financial budget would be created in what type of data file?
a) Database.
b) Worksheet.
c) Presentation.
d) Document.

Question 111:
Employee records, including names, social security numbers, and related
information, would typically be stored in what type of data file?
a) Document.
b) Presentation.
c) Database.
d) Worksheet.

Question 111:
The Internet is the largest _______ in the world.
a) Network.
b) system unit.
c) database program.
d) operating system.
Question 111:
Which technology allows users to shift their desktop computing activities
to computers on the Internet?
a) Distributed databases.
b) Cloud computing.
c) Handheld computers.
d) Solid-state storage.
Question 111:
Launched in 1969 as a U.S. funded project that developed a national
computer network, the Internet was initially called _______.
a) World Wide Web.
b) Intranet.
c) NSFNet.
d) ARPANET.

P a g e 23 | 96
]Questions All Chapter[ ITBIS105

Question 111:
The Web was introduced in 1991 at _______.
a) National Aeronautics and Space Administration (NASA).
b) Center for European Nuclear Research (CERN).
c) Research Center for Nuclear Physics (RCNP).
d) National Science Foundation (NSF).

Question 111:
The Internet is a(n) _______ made up of wires, cables, satellites, and rules
for exchanging information between computers connected to the network.
a) physical network.
b) virtual network.
c) multimedia interface.
d) domain name.

Question 111:
This version of the web evolved to support more dynamic content
creation and social interaction.
a) Web 1.0.
b) Web 2.0.
c) Web 3.0.
d) Web 4.0.

Question 111:
The most common way to access the Internet is through _______.
a) an Internet service provider (ISP).
b) an instant messaging (IM) service.
c) an application service provider (ASP).
d) Facebook.

Question 111:
Which of the following is not a well-known Web browser?
a) Microsoft Internet Explorer.
b) Windows Explorer.
c) Apple Safari.
d) Google Chrome.
Question 111:
A web page typically contains _______, which contains the formatting
instructions for displaying the web page.
a) uniform resource locators (URLs).
b) top-level domain (TLD).
c) Hypertext Markup Language (HTML).
d) Hyperlinks.

P a g e 24 | 96
]Questions All Chapter[ ITBIS105

Question 111:
For browsers to connect to resources on the Internet, the location of the
resources must be specified through addresses called _______.
a) uniform resource locators (URLs).
b) top-level domains (TLDs).
c) Hypertext Markup Language (HTML).
d) Hyperlinks.

Question 111:
In the URL "http://www.simnetonline.com", what is the domain name?
a) http://www.simnetonline.com
b) www.simnetonline.com
c) Simnetonline.
d) Com.

Question 111:
In the URL "http://www.simnetonline.com", ".com" is the _______.
a) top-level domain (TLD).
b) uniform resource locator (URL).
c) domain name server (DNS).
d) domain name.
Question 111:
Which programming language is used within HTML documents to trigger
interactive features?
a) CSS.
b) JavaScript.
c) HTML
d) Visual Basic.
Question 111:
Which of the following are files inserted into an HTML document that
control the appearance of Web pages including layout, colors, and fonts?
a) Javascript.
b) Applets.
c) AJAX.
d) CSS.
Question 111:
This type of e-mail account is more widely used because it frees the user
from installing and maintaining an e-mail client on every computer used
to access e-mail.
a) Client-based.
b) Web-based.
c) Cloud.
d) Mobile.

P a g e 25 | 96
]Questions All Chapter[ ITBIS105

Question 111:
This social networking site is used for professional, business-oriented
networking.
a) Google+
b) Facebook.
c) Twitter.
d) LinkedIn.

Question 111:
Twitter is an example of what type of site?
a) Wiki.
b) Blog.
c) Microblog.
d) Search.
Question 111:
_______ typically broadcast live events and use streaming technology in
which audio and video files are continuously downloaded to your
computer while you are listening to and/or viewing the content.
a) Webcasts.
b) Blogs.
c) Microblogs.
d) Twitter.
Question 111:
_______ do not use streaming technology and are used to download
media files to your computer.
a) Webcasts.
b) Podcasts.
c) Microblogs.
d) Twitter.
Question 111:
Which of the following is a website specially designed to allow visitors to
use their browser to add, edit, or delete the site's content?
a) Wiki.
b) Blog.
c) Webcast.
d) Microblog.
Question 111:
These special programs continually look for new information and update
the databases used by search services.
a) Spiders.
b) Webcrawlers.
c) Bugs.
d) Hits.

P a g e 26 | 96
]Questions All Chapter[ ITBIS105

Question 111:
When you enter a keyword or phrase into a search engine the results
display as a list of these.
a) Matches.
b) Hits.
c) Subjects.
d) Entries.

Question 111:
This type of e-commerce often resembles the electronic version of the
classified ads or an auction.
a) B2C.
b) C2C.
c) C2B.
d) B2B.

Question 111:
Online banking is an example of what type of e-commerce?
a) B2C.
b) C2C.
c) C2B.
d) B2B.

Question 111:
Which of the following is not one of the three basic components of cloud
computing?
a) client organizations and end-users.
b) service providers.
c) the Internet.
d) wireless connectivity.
Question 111:
Programs that automatically start and operate as a part of your browser
are called _______.
a) plug-ins.
b) Readers.
c) pop-ups.
d) ActiveX controls.
Question 111:
Parents can use this type of program to block access to selected Websites.
a) Plug-in.
b) FTP.
c) BitTorrent.
d) Filter.

P a g e 27 | 96
]Questions All Chapter[ ITBIS105

Question 111:
This method of file transfer has been used for decades and is frequently
used for uploading changes to a Website hosted by an Internet service
provider.
a) SSP.
b) FTP.
c) BitTorrent.
d) Dropbox.com.

Question 111:
This method of file transfer distributes file transfers across many different
computers.
a) SSP.
b) FTP.
c) BitTorrent.
d) Dropbox.com.

Question 111:
With these systems, input and output devices are located outside the
system unit.
a) Desktop systems.
b) Personal digital assistants.
c) Smartphones.
d) Laptop computers.
Question 111:
This type of computer is a thin slab that is almost all monitor with the
system unit located behind the monitor.
a) Laptop.
b) Tablet.
c) Desktop.
d) Smartphone.
Question 111:
A byte is formed by a group of _______.
a) 4 bits.
b) 8 bits.
c) 12 bits.
d) 16 bits.
Question 111:
Which of the following is not a character encoding standard?
a) EBCDIC.
b) ASCII.
c) CISC.
d) Unicode.

P a g e 28 | 96
]Questions All Chapter[ ITBIS105

Question 111:
This character encoding scheme allows non-English characters and
special characters to be represented.
a) ASCII.
b) Unicode.
c) EBCDIC.
d) ANSIC

Question 111:
The system board is also known as the _______.
a) expansion slot.
b) Motherboard.
c) expansion card.
d) Bus.
Question 111:
On the motherboard, the connection points for chips are referred to as
_______.
a) Slots.
b) Sockets.
c) Ports.
d) Lines.
Question 111:
Tiny circuit-boards etched onto squares of sand-like material, called
silicon, are called _______.
a) Buses.
b) Slots.
c) Sockets.
d) Chips.
Question 111:
Integrated circuits must be mounted on _______, which are then plugged
into the motherboard.
a) Slots.
b) Pins.
c) Ports.
d) chip carriers.
Question 111:
Which of the following is a function of the control unit?
a) It provides pathways that support communication among the various electronic
components.
b) It directs the movement of electronic signals between memory and the
arithmetic-logic unit.
c) It performs fundamental math operations like addition, subtraction, and so on.
d) It uses the logic to compare two pieces of data.

P a g e 29 | 96
]Questions All Chapter[ ITBIS105

Question 111:
Pathways that support communication among the various electronic
components on the system board are called _______.
a) bus lines.
b) network lines.
c) logic paths.
d) gate ways.

Question 111:
In most personal computer systems, the CPU is contained on a single
chip called the _______.
a) Semiconductor.
b) ALU.
c) Microprocessor.
d) control unit.

Question 111:
Term used to describe the number of bits that a CPU can access at one time.
a) Bitrate.
b) Word.
c) Pulse width.
d) Character.

Question 111:
A 32-bit-word computer can access _______.
a) 2 bytes at a time.
b) 16 bytes at a time.
c) 4 bytes at a time.
d) 8 bytes at a time.
Question 111:
The processing speed of a microprocessor is typically represented by its
_______.
a) bus line.
b) control unit.
c) clock speed.
d) ALU.
Question 111:
Which of the following allows a computer to run two or more operations
simultaneously?
a) Coprocessors.
b) Multiplexing.
c) Multicore chip.
d) Binary system.

P a g e 30 | 96
]Questions All Chapter[ ITBIS105

Question 111:
For multicore processors to be used effectively, computers must
understand how to divide tasks into parts that can be distributed across
each core—an operation called _______.
a) arithmetic-logic processing.
b) multiplexer processing.
c) parallel processing.
d) graphics coprocessing.

Question 111:
A type of specialty processor devoted exclusively to protecting your privacy.
a) Data cards.
b) Micro cards
c) Cryptoprocessor.
d) Embedded cards.

Question 111:
These specialty processors are designed to improve specific computing
operations such as displaying 3-D images and encrypting data.
a) Smartcards.
b) CPUs.
c) Coprocessors.
d) NIC cards.
Question 111:
Frequently-accessed information is held in _______.
a) hard drive.
b) cache memory.
c) flash memory.
d) read only memory.
Question 111:
With this type of memory, large programs are divided into parts and the
parts are stored on a secondary device, usually a hard disk.
a) Flash.
b) Cache.
c) Virtual.
d) Extended.
Question 111:
Which of the following offers a combination of the features of RAM and
ROM?
a) DRAM.
b) DDR.
c) Flash Memory.
d) Cache Memory.

P a g e 31 | 96
]Questions All Chapter[ ITBIS105

Question 111:
All of the following are commonly used units of measurement to describe
memory capacity, except _______.
a) Megabyte (MB).
b) Gigabyte (GB).
c) Terabyte (TB).
d) Nanobyte (NB).

Question 111:
When you reboot your system, the computer follows startup instructions
stored in this type of memory.
a) DRAM.
b) SDRAM.
c) Cache.
d) Flash.

Question 111:
Most personal computers allow users to expand their systems by
providing these on the system board.
a) Expansion slots.
b) Ports.
c) Sound cards.
d) Network cards.

Question 111:
Which of the following can be used to connect several devices to the
system unit and are widely used to connect keyboards, mice, printers,
storage devices, and a variety of specialty devices?
a) USB port.
b) SATA.
c) Parallel port.
d) Firewire bus.

Question 111:
These types of ports typically provide connections to specialized devices
such as camcorders and storage devices.
a) FireWire.
b) Serial.
c) Parallel.
d) AGP.

P a g e 32 | 96
]Questions All Chapter[ ITBIS105

Question 111:
Which of the following ports is used for connecting musical instruments
to a sound card?
a) MiniDP.
b) S/PDIF.
c) MIDI.
d) eSATA.

Question 111:
Which of the following ports provide high-speed connections for external
hard disk drives, optical disks, and other large secondary storage devices?
a) eSATA.
b) S/PDIF.
c) HDMI.
d) MiniDP.

Question 111:
Laptops and tablets use _______ that are typically located outside the
system unit.
a) AC adapters.
b) Batteries.
c) power supply units.
d) MiniDc.

Question 111:
_______ is any data or instructions that are used by a computer.
a) Digital.
b) Output.
c) Information.
d) Input.

Question 111:
The arrangement of keys on a keyboard, QWERTY reflects the keyboard
layout by _______.
a) representing the phonetics of the alphabets most closely associated with the keyboard
b) taking the letters of the first six alphabetic characters found on the top row of keys
c) using the alphabetic characters most frequently used on the keyboard
d) using the letters of the alphabetic characters that are closest to access while typing

P a g e 33 | 96
]Questions All Chapter[ ITBIS105

Question 111:
Keyboards that are widely used on various smartphones and other small
portable devices, and which are designed primarily for communicating via
texting and connecting to the Web.
a) Thumb.
b) Traditional.
c) Notebook.
d) Combination.

Question 111:
Type of keyboard that uses a touch screen as the input device.
a) PDA.
b) Wireless.
c) Traditional.
d) Virtual.

Question 111:
A keyboard key, like Caps Lock, that turns a feature on or off is called a
_______ key.
a) Power.
b) Toggle.
c) Function.
d) Combination.
Question 111:
This type of mouse emits and senses light to detect mouse movement.
a) Mechanical.
b) Cordless.
c) Wireless.
d) Optical.
Question 111:
The study of human factors related to things people use.
a) Headgear.
b) RSI.
c) Technical study.
d) Ergonomics.
Question 111:
These screens can be touched with more than one finger, which allows
for interactions such as rotating graphical objects on the screen with your
hand or zooming in and out by pinching and stretching your fingers.
a) Touch.
b) CRT.
c) Multitouch.
d) LCD.

P a g e 34 | 96
]Questions All Chapter[ ITBIS105

Question 111:
Which of the following is not a type of scanning device?
a) Optical scanner.
b) Bar code reader.
c) Stylus.
d) Character and mark recognition.

Question 111:
Bar code readers use _______ embedded in them to read bar codes.
a) Coprocessors.
b) magnetic cells.
c) RFID microchip.
d) photoelectric cells.

Question 111:
This reading device is used in banks to read the numbers on the bottom
of checks and deposit slips.
a) MICR.
b) OCR.
c) OMR.
d) UPC.

Question 111:
Which of the following types of character recognition systems is used for
standardized multiplechoice testing?
a) UPC.
b) MICR.
c) OMR.
d) OCR.

Question 111:
OMR, OCR, and MICR are all types of _______.
a) Radio Frequency Card Readers.
b) magnetic card readers.
c) bar code readers.
d) character and mark recognition devices.
Question 111:
_______-input devices convert sounds into a form that can be processed
by the system unit.
a) Electrolyzing.
b) Plotting.
c) Webcam.
d) Audio.

P a g e 35 | 96
]Questions All Chapter[ ITBIS105

Question 111:
The most widely used audio-input device is the _______.
a) Webcam.
b) radio frequency card reader.
c) Microphone.
d) Stylus.

Question 111:
The series of dots that form the image on a monitor are called _______.
a) Picas.
b) Bits.
c) Pixels.
d) Bytes.

Question 111:
This indicates the monitor's ability to display colors by comparing the
light intensity of the brightest white to the darkest black.
a) Contrast ratio.
b) Dot Pitch.
c) Active display area.
d) Resolution.

Question 111:
The distance between each pixel.
a) Dot pitch.
b) Refresh rate.
c) Resolution.
d) Word size.

Question 111:
The size, or _______, is measured by the diagonal length of a monitor's
viewing area.
a) Resolution.
b) active display area.
c) aspect ratio.
d) dot pitch.

Question 111:
The proportional relationship between a display's width and height.
a) Aspect ratio.
b) Resolution.
c) Dot pitch.
d) Clock speed.

P a g e 36 | 96
]Questions All Chapter[ ITBIS105

Question 111:
A dedicated, mobile device for storing and displaying e-books and other
electronic media including electronic newspapers and magazines.
a) E-book reader.
b) Interactive whiteboard.
c) HDTV.
d) Flat panel monitor.

Question 111:
Specialized devices with a large display connected to a computer
projector and are widely used in classrooms and corporate boardrooms.
a) Scanners.
b) HDTV.
c) E-books.
d) Digital or interactive whiteboards.

Question 111:
What kind of specialized monitor is especially useful for graphic artists,
designers, and publishers?
a) Flat-panel monitor.
b) CRT monitor.
c) High-definition television (HDTV).
d) E-book.
Question 111:
Which of the following statements is incorrect?
a) Printer resolution is measured in dpi (dots per inch).
b) Printer output is often called hard copy.
c) Memory within a printer is used to store printing instructions and documents waiting to
be printed.
d) Printer speed is measured in the number of words printed per minute.
Question 111:
Two categories of laser printers are _______.
a) thermal and personal.
b) personal and shared.
c) ink-jet and high-definition.
d) active-matrix and passive matrix.
Question 111:
Which of the following printer features enables you to print on both sides
of a sheet of paper?
a) Simplex.
b) Duplex.
c) Resolution.
d) Dual Matrix.

P a g e 37 | 96
]Questions All Chapter[ ITBIS105

Question 111:
Printers connected to the Internet that provide printing services to others
on the Internet are called _______.
a) dot-matrix printers.
b) thermal printers.
c) Plotters.
d) cloud printers.

Question 111:
The most widely used audio-output devices.
a) Microphones.
b) speakers and headsets.
c) cloud printers.
d) Faxes.

Question 111:
Which of the following allows the transmission of telephone calls over
computer networks?
a) Faxing.
b) Cell phones.
c) PDAs.
d) Voice over IP.
Question 111:
One of the most dramatic changes in connectivity and communications in
the past few years has been _______.
a) widespread use of mobile devices with wireless Internet connectivity.
b) chat rooms.
c) satellite uplinks.
d) running programs on remote computers.
Question 111:
In a communication system, which among the following originate and
accept messages in the form of data, information, and/or instructions?
a) Communication channel.
b) Sending and receiving devices.
c) Connection devices.
d) Data transmission specifications.
Question 111:
In a communication system, which among the following convert messages
into packets that can travel across the communication channel?
a) Connection devices.
b) Sending and receiving devices.
c) Storage devices.
d) Secondary devices.

P a g e 38 | 96
]Questions All Chapter[ ITBIS105

Question 111:
Which physical connection is the fastest?
a) Twisted pair.
b) Coaxial cable.
c) Fiber-optic cable.
d) Microwave.

Question 111:
Which among the following is considered a line-of-sight communication
medium?
a) Broadcast radio.
b) Satellite.
c) Bluetooth.
d) Microwave.

Question 111:
WiMax stands for _______.
a) Wide-area Access for Maximum Reach.
b) Wide-area Range to Maximize Access.
c) Worldwide Interoperability for Microwave Access.
d) Worldwide Access to Maximize Interoperability.

Question 111:
Microwave communication uses high-frequency _______.
a) radio waves.
b) Infrared.
c) satellite communications.
d) optic fibers.

Question 111:
LTE stands for _______.
a) Long Term Evolution.
b) Light Traffic Evolution.
c) Laser Transmission Entity.
d) Long Time Entry.

Question 111:
The GPS device in an automobile uses which communication channel?
a) Infrared.
b) Radio Frequency (RF).
c) Microwave.
d) Satellite.

P a g e 39 | 96
]Questions All Chapter[ ITBIS105

Question 111:
A service that uses existing phone lines to provide high-speed
connections is called _______.
a) WWAN.
b) 3G/4G
c) Voiceband.
d) DSL.

Question 111:
Cellular services use _______ to provide wireless connectivity to the
Internet.
a) ADSL.
b) T1 and T3 cellular networks.
c) DSL.
d) 3G and 4G cellular networks.

Question 111:
The capacity of a communication channel is measured in _______.
a) Bandwidth.
b) bit capacity.
c) band rate.
d) data flow.

Question 111:
Using this type of communications channel, several users can
simultaneously use a single connection for high-speed data transfer.
a) Voiceband.
b) Mediumband.
c) Broadband.
d) Baseband.
Question 111:
Every computer on the Internet has a unique numeric address called a(n) __.
a) domain address.
b) protocol address.
c) IP address.
d) Web address.
Question 111:
_______ is the process of breaking down information sent or transmitted
across the Internet into small parts.
a) Protocol.
b) Bandwidth.
c) Identification.
d) Packetization.

P a g e 40 | 96
]Questions All Chapter[ ITBIS105

Question 111:
The essential features of this include identifying, sending, and receiving
devices and breaking information into small parts for transmission across
the Internet.
a) DNS.
b) TCP/IP.
c) FTP.
d) HTTP.

Question 111:
The _______ is the central node that coordinates the flow of data by
sending messages directly between the sender and receiver nodes.
a) Client.
b) Server.
c) Switch.
d) Gateway.

Question 111:
In a computer network, this node that requests and uses resources
available from other nodes.
a) Client.
b) Server.
c) Directory server.
d) Host.

Question 111:
This device enables connectivity between two LANS or a LAN and a larger
network.
a) Network gateway.
b) Node.
c) Hub.
d) Router.

Question 111:
A wireless access point that provides Internet access in a public place
such as a coffee shop, library, bookstore, or university.
a) Hotspot.
b) NIC.
c) Blindspot.
d) Gateway.

P a g e 41 | 96
]Questions All Chapter[ ITBIS105

Question 111:
A network topology in which the central node is connected to two or more
subordinate nodes that, in turn, are connected to other sub-ordinate nodes.
a) Star.
b) Bus.
c) Mesh.
d) Tree.

Question 111:
This type of network strategy uses central servers to coordinate and
supply services to other nodes on the network.
a) Peer-to-peer.
b) Client/server.
c) BitTorrent.
d) Personal Area Network.

Question 111:
Organizations use the following to allow suppliers and others limited
access to their networks.
a) Intranets.
b) Extranets.
c) Firewalls.
d) Proxy servers.

Question 111:
All communications between a company's internal networks and the
outside world pass through this server.
a) Base station.
b) Node.
c) Supercomputer.
d) Proxy.

Question 111:
Remote users can connect to an organization's network through this type
of secure private connection.
a) VPN.
b) DSL.
c) WWAN.
d) P2P.

P a g e 42 | 96
]Questions All Chapter[ ITBIS105

Question 111:
This type of network topology does not use a specific physical layout.
a) Hybrid.
b) Hierarchical.
c) Mesh.
d) Tree.
Question 111:
The worldwide network of circuit-switched telephone lines is: a. PSTN
a) PSTN.
b) HTTP.
c) VPN.
d) TCP/IP.

Question 111:
A network that only consists of clients is called a(n):
a) Client only network.
b) Client/Server Network c. Peer to Peer (P2P).
c) Peer to peer (P2P).
d) Extranet.

Question 111:
The _____ address is a unique hardware address for a network adapter.
a) IP b. MAC.
b) MAC.
c) LAN.
d) Wifi.

Question 111:
A(n)__________ repeats a wireless networks signal to travel longer
distances.
a) Router.
b) Hub.
c) Switch.
d) Repeater.

P a g e 43 | 96
]Questions All Chapter[ ITBIS105

Question 111:
This is an example of which type of operating system?
a) Windows.
b) Linux.
c) Mac.
d) UNUX.

Question 112:
This is an example of a computer running what type of operating system?
a) Windows.
b) UNUX.
c) MacOS.
d) Linux.

Question 113:
The computer in this image is a--------.
a) Midrange computer.
b) Microcomputer.
c) Supercomputer.
d) Personal computer.

Question 114:
This is an example of------------------.
a) Primary storage.
b) RAM.
c) Secondary storage.

Question 115:
The------- in this image is considered to be the most widely used handheld
computer.
a) Notebook.
b) Smartphone.
c) Laptop.
d) Desktop.

Question 116:
The---------- in this image is generally less powerful than a laptop.
a) Desktop.
b) Smartphone.
c) Wearable.
d) Tablet.

P a g e 44 | 96
]Questions All Chapter[ ITBIS105

Question 117:
Match each personal computer type with its description.
Your answer is partially correct.
a) Desktop: Small enough to fit on a desk but larger than a laptop.
b) Notebook: Laptop.
c) Tablet: Like a laptop without a keyboard.
d) Smartphone: Handheld computer.
e) Wearable: An example is Apple watch.

Question 118:
Match each type of general-purpose application with its description.
Drag statements on the right to match the left.
a) Word processors: Prepare written documents.
b) Spreadsheets: Analyze and summarize numerical data.
c) Database management
Organize and manage data and information.
system:
d) Presentation software: Communicate a message.
Question 119:
Match each device with the type of operating system it uses.
Drag statements on the right to match the left.
a) Smartphone: Real-time operating system.
b) Desktop commuter: Stand-alone operating system.
c) Network: Network operating system.

Question 120:
Match each device with the type of operating system it uses.
Drag statements on the right to match the left.
a) Smartphone: embedded operating system.
b) Desktop commuter: Stand-alone operating system.
c) Network: Network operating system.

Question 121:
These are all example of----------- applications because they are used in
many different occupations.
Type description
Word processors Prepare written documents.
Spreadsheets Analyze and summarize numerical data.
Database management Organize and manage data and information.
system:
Presentation software: Communicate a message or persuade other people.

a) General-purpose.
b) Mobile.
c) Specialized.

P a g e 45 | 96
]Questions All Chapter[ ITBIS105

Question 122:
Select the four basic categories of personal computer hardware.
a) System unit.
b) Communication.
c) Operating system.
d) Input/output.
e) Secondary storage.

Question 123:
Select the four main types of computers.
a) Personal.
b) Mainframe.
c) Midrange.
d) Supercomputers.
e) Microprocessor.

Question 124:
Select the correct statements about people in an information system.
a) They may be end users.
b) They are significant only to the extent they are needed to develop the system.
c) They can use the system to become more productive.

Question 125:
Select all the examples of input devices.
a) Rom.
b) Arithmetic Logic Unit.
c) Mouse.
d) Keyboard.

Question 126:
Select all the type of application software.
a) General purpose applications.
b) Operating systems.
c) Mobile apps.
d) Specialized applications.

Question 127:
Select all the types of personal computers.
a) Laptop.
b) Mobile device.
c) Tablet.
d) Desktop.
e) mainframe

P a g e 46 | 96
]Questions All Chapter[ ITBIS105

Question 128:
Select all the categories of system software.
a) Base applications.
b) Utilities.
c) Specialized applications.
d) Operating systems.

Question 129:
Select all the correct statements about people in an information system.
a) They may be end users.
b) They are significant only to the extent they are needed to develop the system.
c) They can use the system to become more productive.

Question 130:
Which are common types of data files?
a) Worksheet files.
b) Database files.
c) Net files.
d) Document files.

Question 131:
Which of the following statements are true about modern computers?
a) They can produce information.
b) They can follow instructions.
c) They are electronic devices.
d) They accept output not input.

P a g e 47 | 96
]Questions All Chapter[ ITBIS105

True / False Questions


Question 01:
Highly structured and organized data is stored in database files.
• True.
• False.

Question 02:
Processed information becomes data.
• True.
• False.

Question 03:
people are NOT an important part of information system.
• True.
• False: people are the most important part of an information system.

Question 04:
specialized applications are more narrowly focused on specific
disciplines and occupations.
• True: Examples include graphics and web authoring programs.
• Fales: Examples include graphics, audio, and video.

Question 05:
The system unit is the main part of the computer containing the essential
components. It is used to process input data.
• True.
• False.

Question 06:
Multi-user computers are designed to be used by only one person at a time.
• True.
• False.

Question 07:
Supercomputers are the largest and most powerful type of computer
available.
• True.
• False.

P a g e 48 | 96
]Questions All Chapter[ ITBIS105

Question 08:
A suite is a group of applications that are designed to work well together
like Microsoft Office.
• True.
• False.

Question 09:
The smallest unit of data on a computer is a byte.
• True.
• False.

Question 10:
Wireless Ethernet is more often called Bluetooth.
• True.
• False.

Question 11:
Wi-Fi is a synonym for Bluetooth.
• True.
• False.

Question 12:
Buses are electrically conductive pathways located on the motherboard to
carry the data from place to place.
• True.
• False.

Question 13:
Games are a type of application software.
• True.
• False.

Question 14:
A trackball is a type of output device.
• True.
• False.

Question 15:
VPN is a software used to search for information on the internet.
• True.
• False.

P a g e 49 | 96
]Questions All Chapter[ ITBIS105

Question 16:
PAN stands for Portal Area Network.
• True.
• False.

Question 17:
(DSL) stans for Digital Subscriber Line.
• True.
• False.

Question 18:
Mainframe computers are computers are computers that hold large
databases of information.
• True.
• False.

Question 19:
Supercomputers are very powerful computers used by governments.
• True.
• False.

Question 20:
Keyboard is an input device.
• True.
• False.

Question 21:
The most largest public network is the Internet.
• True.
• False.

Question 22:
One example of a Wireless Technology is Bluetooth.
• True.
• False.

Question 23:
A Network is two or more computers connected to each others.
• True.
• False.

P a g e 50 | 96
]Questions All Chapter[ ITBIS105

Question 24:
Star Network is when devices are connected to a central network switch.
• True.
• False.

Question 25:
An example of a WAN is the Internet.
• True.
• False.

Question 26:
The system unit is the main part of the computer containing the essential
components.
• True.
• False.

Question 27:
Multi-user computers are designed to be used by only one person at a
time.
• True.
• False.

Question 28:
Supercomputers are the largest and most powerful type of computer
available.
• True.
• False.

Question 29:
A suite is a group of applications that are designed to work well together
like Microsoft Office.
• True.
• False.

Question 30:
The smallest unit of data on a computer is a byte.
• True.
• False.

P a g e 51 | 96
]Questions All Chapter[ ITBIS105

Question 31:
Wireless Ethernet is more often called Bluetooth.
• True.
• False.

Question 32:
A network is defined as communications system connecting two or more
computers.
• True.
• False.

Question 33:
Cloud computing, wireless communication and the internet of thisgs are
driving the impact of technology on our lives.
• True.
• False.

Question 34:
Solid state storge is more reliable and requires less power than a hard disk.
• True.
• False.

Question 35:
Processed data become information.
• True: software converts data into information.
• False.

Question 36:
The parts of an information system are: people, procedures, software,
hardware, data, and the Internet.
• True.
• False.

Question 37:
The purpose of software is to convert data into information.
• True.
• False.

P a g e 52 | 96
]Questions All Chapter[ ITBIS105

Question 38:
Software is another name for a program or programs.
• True.
• False.

Question 39:
To be an effective and efficient computer user, you need to recognize the
role of information technology in your personal and professional life.
• True.
• False.

Question 40:
Application software is "background" software which helps the computer
manage its own internal resources.
• True.
• False.

Question 36:
System software is a collection of programs.
• True.
• False.

Question 37:
Antivirus software is a Windows utility that is unnecessary as long as you
are careful browsing the Internet.
• True.
• False.

Question 38:
System software might be described as end-user software.
• True.
• False.

Question 39:
A browser is an example of system software.
• True.
• False.
Question 40:
Another name for a midrange computer is "server."
• True.
• False.

P a g e 53 | 96
]Questions All Chapter[ ITBIS105

Question 36:
Insurance companies are most likely to use personal computers to
process information about millions of policyholders.
• True.
• False.

Question 37:
Smartphones are a type of handheld computer that do not need input,
output, processing, or
storage.
• True.
• False.

Question 38:
Two important components of the system unit are the keyboard and the
hard disk.
• True.
• False.

Question 39:
A system unit consists of the keyboard and the monitor.
• True.
• False.

Question 40:
RAM will retain data when the computer is turned off.
• True.
• False.

Question 36:
The most common input devices are the mouse and the keyboard.
• True.
• False.

Question 37:
Secondary storage will retain data when the computer is turned off.
• True.
• False.

P a g e 54 | 96
]Questions All Chapter[ ITBIS105

Question 38:
Solid-state storage uses rigid metallic platters to store data using the
magnetic charges of the disk's surface.
• True.
• False.

Question 39:
Four common types of files are document files, worksheet files, database
files, and presentation files.
• True.
• False.

Question 40:
Highly structured and organized data is stored in database files.
• True.
• False.

Question 36:
The Internet connects millions of computers and resources across the
world via wires, cables, and satellite.
• True.
• False.

Question 37:
The Internet and the Web are the same.
• True.
• False.

Question 38:
In addition to an Internet connection, users need browser software to
easily display web pages.
• True.
• False.

Question 39:
In order to connect to a website, the browser must know only the site's
domain name.
• True.
• False.

P a g e 55 | 96
]Questions All Chapter[ ITBIS105

Question 40:
JavaScript is a language often used within HTML documents to trigger
interactive features.
• True.
• False.

Question 36:
Cascading Style Sheets (CSS) are files inserted into an HTML document that
control the appearance of web pages including layout, colors, and fonts.
• True.
• False.

Question 37:
AJAX is an advanced use of JavaScript that is used to create interactive
websites that respond quickly.
• True.
• False.

Question 38:
Client-based e-mail accounts require a special program called an e-mail
client to be installed on your computer.
• True.
• False.

Question 39:
Attachments to e-mail messages can be a document or an image.
• True.
• False.

Question 40:
The CAN-SPAM Act has proven to be more effective than spam blockers
at preventing unwanted e-mail.
• True.
• False.

Question 38:
Instant messaging allows text only.
• True.
• False.

P a g e 56 | 96
]Questions All Chapter[ ITBIS105

Question 39:
Cloud computing is an example of a social networking site.
• True.
• False.

Question 40:
LinkedIn is a social networking site that you should visit if you are looking
for professional employment.
• True.
• False.

Question 36:
After a webcast is completed there are no files left on your computer.
• True.
• False.

Question 37:
Wikis allow many individuals to edit the site's content.
• True.
• False.

Question 38:
All information found on the web through search tools can be considered
as factual.
• True.
• False.

Question 39:
One of the biggest challenges for the growth of e-commerce is the
development of fast, secure, and reliable payment methods for buying
goods.
• True.
• False.

Question 40:
QuickTime and Acrobat Reader are classified as plug-in programs.
• True.
• False.

P a g e 57 | 96
]Questions All Chapter[ ITBIS105

Question 38:
Cloud computing has the potential to free end-users from owning,
maintaining, and storing
• True.
• False.

Question 39:
Uploading is the process of copying a file from a website to your
computer.
• True.
• False.

Question 40:
The system unit, also known as the system chassis, is a container that
houses most of the electronic components that make up a computer
system.
• True.
• False.

Question 36:
ASCII supports Chinese and Japanese.
• True.
• False.

Question 37:
The ALU tells the rest of the computer system how to carry out a
program's instructions.
• True.
• False.

Question 38:
The control unit directs the movement of electronic signals between the
memory and the ALU.
• True.
• False.
Question 39:
64-bit-word computer can access 8 bytes at a time.
• True.
• False.

P a g e 58 | 96
]Questions All Chapter[ ITBIS105

Question 40:
Parallel processing requires a computer to perform one complete task
before beginning the next task.
• True.
• False.

Question 40:
RAM is considered temporary, or volatile, storage.
• True.
• False.

Question 36:
Virtual memory is stored on a RAM chip.
• True.
• False.

Question 37:
Read-only memory (ROM) chips have information stored in them by the
manufacturer.
• True.
• False.

Question 38:
Graphics cards connect the system board to secondary storage.
• True.
• False.

Question 39:
Plug and Play has become a generic term that is associated with the
ability to plug any device into a computer and have it play or work
immediately.
• True.
• False.

Question 40:
The number of bits that can travel simultaneously down a bus is known as
the word size.
• True.
• False.

P a g e 59 | 96
]Questions All Chapter[ ITBIS105

Question 40:
A bus is a pathway for bits representing data and instructions.
• True.
• False.

Question 36:
VGA and DVI ports provide connections to monitors.
• True.
• False.

Question 37:
USB ports are used to connect keyboards, mice, printers, storage
devices, and a variety of specialty devices.
• True.
• False.

Question 38:
Firewire ports are used to connect keyboards, mice, printers, and storage
devices.
• True.
• False.

Question 39:
eSATA ports provide high-speed connections for external hard disk
drives, optical disks, and
other large secondary storage devices.
• True.
• False.

Question 40:
MiniDP ports are an audiovisual port typically used to connect large
monitors.
• True.
• False.

Question 40:
HDMI ports make it possible to use a computer as a video jukebox or an
HD video recorder.
• True.
• False.

P a g e 60 | 96
]Questions All Chapter[ ITBIS105

Question 36:
Computers require direct current (DC) to power their electronic
components and to represent data and instructions.
• True.
• False.

Question 37:
The most widely used input devices are monitors, printers, and
keyboards.
• True.
• False.

Question 38:
Function keys provide shortcuts for specific tasks.
• True.
• False.

Question 39:
An optical mouse uses light in order to detect movement.
• True.
• False.

Question 40:
A touch screen is classified as a special type of scanning device.
• True.
• False.

Question 40:
A stylus uses pressure to draw images on a screen.
• True.
• False.

Question 36:
Multitouch screens allow for interaction such as rotating graphical
objects on the screen with your hand.
• True.
• False.
Question 37:
Optical scanners recognize individual letters or images.
• True.
• False.

P a g e 61 | 96
]Questions All Chapter[ ITBIS105

Question 38:
A magnetic card reader does not require the card to actually make contact
with the reader.
• True.
• False.

Question 39:
An MICR device senses the presence or absence of a mark, such as a
pencil mark.
• True.
• False.

Question 40:
The monitor size is measured by the diagonal length of the viewing area.
• True.
• False.

Question 40:
Output devices are any hardware used to provide or to create output.
• True.
• False.

Question 36:
3-D HDTV requires special viewing glasses in order to achieve a three-
dimensional viewing experience.
• True.
• False.

Question 37:
Digital or interactive whiteboards display a computer's desktop and can
be controlled using a special pen or a finger.
• True.
• False.

Question 38:
Discarded CRTs are a serious threat to the environment, given their high
content levels of lead and other hazardous materials.
• True.
• False.

P a g e 62 | 96
]Questions All Chapter[ ITBIS105

Question 39:
Resolution for a printer is a measure of the clarity of images produced,
measured in dpi (dots per inch).
• True.
• False.

Question 40:
Shared laser printers typically support color, are more expensive, and are
used by a group of people.
• True.
• False.

Question 40:
Cloud printers provide printing services to users without access to the
Internet.
• True.
• False.

Question 40:
Thermal printers use heat elements to produce images on heat-sensitive
paper and are used at ATMs and gasoline pumps.
• True.
• False.

Question 36:
Wireless audio-output connections typically use Bluetooth technology.
• True.
• False.

Question 37:
MFDs are used to capture as well as play back recorded sounds.
• True.
• False.

Question 38:
Telephony, also known as Internet telephony, is the VoIP application that
uses the Internet rather than traditional telephone lines to support voice
communication.
• True.
• False.

P a g e 63 | 96
]Questions All Chapter[ ITBIS105

Question 39:
Skype provides audio and video service that requires the installation of
special hardware and software.
• True.
• False.

Question 40:
Connection devices are the actual connecting or transmission medium
that carries the message.
• True.
• False.

Question 40:
Telephone lines use coaxial cables.
• True.
• False.

Question 40:
Fiber-optic cable transmits data as pulses of light through tiny tubes of
glass.
• True.
• False.

Question 36:
Modulation is the name of the process of converting from digital to
analog.
• True.
• False.

Question 37:
TCP/IP protocol involves identifying, sending, and receiving devices and
breaking information into small parts for transmission across the Internet.
• True.
• False.

Question 38:
A prototype is a set of communication rules for the exchange of
information.
• True.
• False.

P a g e 64 | 96
]Questions All Chapter[ ITBIS105

Question 39:
Packetization refers to breaking information into small parts.
• True.
• False.

Question 40:
In a network environment, a client provides resources for the servers.
• True.
• False.

Question 37:
Network operating systems (NOS) control and coordinate the activities of
all computers and other devices on a network.
• True.
• False.

Question 38:
WANs are widely used by organizations to link personal computers and to
share printers and other resources.
• True.
• False.

Question 39:
A network gateway can be used to connect the LAN of one office group to
the LAN of another office group.
• True.
• False.

Question 40:
The most common standard in LANs is called Ethernet.
• True.
• False.

Question 40:
A MAN is a network that is frequently used as links between office
buildings that are located throughout a city.
• True.
• False.

P a g e 65 | 96
]Questions All Chapter[ ITBIS105

Question 40:
Network architecture describes how a computer network is configured
and what topologies and strategies are employed.
• True.
• False.

Question 36:
The client/server network strategy can handle very large networks efficiently.
• True.
• False.

Question 37:
In a peer-to-peer network, only the central host computer supplies the
resources, the other computers request resources from this host.
• True.
• False.

Question 38:
With respect to peer-to-peer network, there is an abundant amount of
powerful management software that monitors the network activities.
• True.
• False.

Question 39:
A firewall is a specialized technology designed to protect an
organization's network against external threats.
• True.
• False.

Question 40:
Intrusion detection systems can recognize signs of a network attack and
disable access before an intruder can do damage.
• True.
• False.

Question 37:
Computer networks are circuit switched networks.
• True.
• False.

P a g e 66 | 96
]Questions All Chapter[ ITBIS105

Question 40:
The Internet is the world’s largest network.
• True.
• False.

Question 38:
An intranet network allows employees of an organization to access their
files and network from any location.
• True.
• False.

Question 38:
A network adapter enables a computer to be part of the local area
network.
• True.
• False.

Question 39:
Fibre Optic cables make up the majority of the Internet’s backbone.
• True.
• False.

P a g e 67 | 96
]Questions All Chapter[ ITBIS105

Listing Questions
Question 01:
What are the five parts of an information system?
a) Data
b) People
c) Hardware
d) Software
e) Procedure

Question 02:
List four functions of operating systems?
a) Providing the user interface
b) Running applications
c) File Management
d) Communicating with hardware

Question 03:
List in order the four steps of the information process cycle?
a) Input
b) Processing
c) Output
d) Storage

Question 04:
List four input devices?
a) Keyboard
b) Mouse
c) Microphone
d) Scanner
e) Digital camera

Question 05:
List three output devices?
a) Printer
b) Speakers
c) Monitor
d) Projector

Question 06:
What are the four key functions of an operating system?
1. Provides user interface
2. Manages files
3. Runs applications
4. Communicates with hardware

P a g e 68 | 96
]Questions All Chapter[ ITBIS105

Question 07:
What are the five parts of an information system?
1. People
2. Hardware
3. Software
4. Procedures
5. Data

Question 08:
What are the four parts of the information processing cycle?
1. Input.
2. Processing.
3. Output.
4. Storage

Question 09:
List devices from each of these categories:
Input: keyboard – mouse – Microphone – Scanner – Digital camera
Processing: motherboard – processor – memory – bus – chipset
Output: monitor – printer – Speakers – Projector
Storage: hard drive – USB flash drives

Question 10:
List three utility software services.
1. Checking storage disks for errors
2. Block security and privacy threats
3. Backing up important files

Question 11:
List the four types of networks based on their geographical range
1. Personal Area Network (PAN)
2. Local Area Network (LAN)
3. Metropolitan Area Network (MAN)
4. Wide Area Network (WAN)

Question 11:
List three examples of wireless technologies
1. Wifi
2. Bluetooth
3. Infrared
4. Microwave

P a g e 69 | 96
]Questions All Chapter[ ITBIS105

Question 11:
List three types of Network Cables
1. Coaxial cables
2. Twisted Pair cables
3. Fibre Optic cables

Question 11:
List four types of Internet connections
1. Dial-up
2. Cable
3. DSL Internet
4. Satellite
5. Internet over Cell Phone Networks (3G/4G)

Question 11:
What is the purpose of the motherboard?
It controls the operations of all other components inside a computer which all plug into it.

Question 12:
What is the dominant standard for local area networking devices?
Ethernet Networking (can be wired or wireless)

Question 13:
What types of connections are most suitable for Bluetooth networking?
Limited Range wireless connection (within 10 meters)

P a g e 70 | 96
]Questions All Chapter[ ITBIS105

Matching Questions
bit Server Internet Service Server Farm desktop
Provider (ISP)
mainframe notebook supercomputer motherboard tablet
Productivity GPS Processor Application Monitor
Personal netbook Software Software Software
computer
Hardware

Question 01:
A(n) desktop PC is a personal computer with input and output devices
separate from the system unit

Question 02:
A(n) tablet is a touchscreen computer with no separate keyboard and mouse

Question 03:
A(n) notebook is a portable PC that folds for transport, containing a built-in
keyboard and built-in display screen

Question 04:
A(n) supercomputer is the largest and most powerful type of computer used in
research and academics

Question 05:
A(n) mainframe is a large and powerful computer capable of serving many
users and processing large amounts of data.

Question 06:
The motherboard is the large circuit board inside the computer that everything
else plugs into.

Question 07:
A(n) Internet Service Provider (ISP) is a company that provides a connection
to the Internet for a monthly subscription.

Question 08:
A single binary digit, with a value of either 1(on) or 0 (off) is called a(n) bit
Productivity software are applications that help users accomplish practical
tasks such as writing documents, creating presentations, or creating
spreadsheets.
P a g e 71 | 96
]Questions All Chapter[ ITBIS105

Question 09:
Hardware is the physical parts of the computer system

Question 10:
A group of servers located together is a single room is called a server farm.

Question 11:
A(n) Server is a computer that is dedicated to performing network tasks such
as managing files, printers, or email for multiple users

Question 12:
Excel is an application that helps a user to perform one or more personal tasks

Question 13:
Software is a program that tells the hardware what to do

Question 14:
A computer designed to be used by only one person at a time is called A(n)
personal computer

Question 15:
Application software helps a human perform a useful task for work or play

Productivity Mainframe bit Motherboard Internet Service


Provider (ISP)
Global Positioning Server Farm Smartphone Pointing Device System Unit
System (GPS)

Question 16:
A(n) Mainframe is a large and powerful computer capable of serving many
users and processing large amounts of data.

Question 17:
A single binary digit, with a value of either 1(on) or 0 (off) is called a(n) bit.

Question 18:
The motherboard is the large circuit board inside the computer that everything
else plugs into.

P a g e 72 | 96
]Questions All Chapter[ ITBIS105

Question 19:
A(n) Internet Service Provider (ISP) is a company that provides a connection
to the Internet for a monthly subscription.

Question 20:
Productivity software are applications that help users accomplish practical
tasks such as writing documents, creating presentations, or creating
spreadsheets.

Question 22:
A group of servers located together is a single room is called a server farm.

Fill in the Blank Questions


___ Personal computers___ are all about making people (end users) more
productive.

Question 23:
In an information system, the rules or guidelines for people to follow are called
___ procedures____.

Question 24:
___ Hardware____ is the component of the information system that is
described as the equipment that processes data to create information.

Question 25:
The component of the information system that is described as raw, unprocessed
facts, including text, numbers, images, and sounds, is called ___ data____.

Question 26:
___ System software____ is a collection of programs that helps the computer
manage its own resources and enables application software to interact with
computer hardware.

P a g e 73 | 96
]Questions All Chapter[ ITBIS105

Question 27:
___ Device drivers____ are classified under system software and are
specialized programs designed to allow input or output devices to communicate
with the rest of the computer system.

Question 28:
Application software can be categorized as either general-purpose, specialized,
or ___ mobile____ apps.

Question 29:
Software is another name for ____ programs___.

Question 30:
___ Mainframe____ computers are not nearly as powerful as supercomputers,
but are capable of great processing speeds and data storage.

Question 28:
The four types of personal computers are: ___ desktop____ computers, laptop,
tablets, and mobile devices.

Question 29:
Mobile devices, also known as ___ handheld____ computers, are the smallest
type of microcomputers and are designed to fit into the palm of one hand.

Question 30:
___ Smartphones____ are cell phones with wireless connections to the Internet.

Question 28:
____ Secondary___ storage devices do not lose data or programs after the
electrical power is turned off.

Question 29:
___ Hard disks____ use rigid metallic platters to store programs and very large
data files.

Question 30:
___ Optical discs____ are secondary storage devices that use laser technology.

P a g e 74 | 96
]Questions All Chapter[ ITBIS105

Question 28:
A(n) ___ presentation____ file might contain audience handouts and speaker
notes in addition to electronic slides.

Question 29:
Increased use of mobile or wireless communication devices and cloud
computing has been termed the ___ wireless____ revolution.

Question 30:
A(n) ___ network____ is a communications system connecting two or more
computers.

Question 28:
The ___ web____ provides a multimedia interface to the numerous resources
available on the Internet.

Question 29:
___ Cloud____ computing uses the Internet and the web to shift many
computer activities from a user's computer to computers on the Internet.

Question 30:
Google Chrome is an example of a web ___ browser____.

Question 28:
The ___ http____ protocol is used for web traffic and is the most widely used
Internet protocol.

Question 29:
In the URL "http://www.simnetonline.com", "www.simnetonline.com" is the
___ domain____ name.

Question 30:
HTML stands for ___ Hypertext Markup Language____.

Question 28:
A(n) ___ hyperlink____ is a link on a web page that connects to another web
page.

P a g e 75 | 96
]Questions All Chapter[ ITBIS105

Question 29:
Special web browsers, called ___ mobile____ browsers, are designed to run
on portable devices such as smartphones and tablets.

Question 30:
___ Web-based____ e-mail accounts do not require an e-mail program to be
installed on your computer.

Question 28:
Unsolicited e-mail is called ___ spam____.

Question 29:
___ Text____ messaging is the process of sending short electronic messages
using a wireless network.

Question 30:
A(n) ___ microblog____ publishes short sentences that only take a few
seconds to write, rather than long stories or posts.

Question 30:
The most popular microblogging site is ___ Twitter____.

Question 28:
A(n) ___ wiki____ is a website specially designed to allow visitors to use their
browser to add, edit, or delete the site's content.

Question 29:
"Wiki" comes from the Hawaiian word for ___ fast____.

Question 30:
A(n) ___ search____ engine is a specialized program that assists you in
locating information on the web and the Internet.

Question 28:
___ Specialized____ search engines focus on subject-specific websites and
can save time by narrowing your search.

Question 29:
When evaluating a website's content, whether or not the information is up to
date is considered part of the ___ currency____ element.
P a g e 76 | 96
]Questions All Chapter[ ITBIS105

Question 30:
___ Digital____ cash is the Internet's equivalent to traditional cash.

Question 28:
___ Cloud____ computing provides access to software, programs, and data
from anywhere through an Internet connection.

Question 29:
A(n) ___ Internet security suite____ is a collection of utility programs
designed to maintain your security and privacy while you are on the web.

Question 30:
Knowledge of HTML and CSS is considered essential for the job of a(n)
___ webmaster____.

Question 30:
The ____ system unit___, also known as the system chassis, is a container that
houses most of the electronic components that make up a computer system.

Question 28:
____ Tablets___ are effectively a thin slab that is almost all monitor with the
system unit located behind the monitor.

Question 29:
The most widely used character encoding standard today is ___ Unicode___.

Question 30:
The ___ binary____ system consists of only two digits—0 and 1.

Question 28:
The system board is also known as the ___ motherboard____.

Question 29:
A(n) ___ word____ is the number of bits that can be accessed at one time by
the CPU.

Question 30:
___ Logical____ operations consist of making comparisons.

P a g e 77 | 96
]Questions All Chapter[ ITBIS105

Question 28:
A(n) ___64____-bit-word computer can access eight bytes of information at a
time.

Question 29:
___ Multicore____ processors allow a single computer to run two or more
operations at the same time.

Question 30:
____ Cache___ memory improves processing by acting as a temporary high-
speed holding area between the memory and the CPU.

Question 30:
___ Virtual____ memory uses the hard drive to substitute for RAM.

Question 28:
The processing speed of a microprocessor is typically represented by its
____ clock___ speed.

Question 29:
___ Sound____ cards accept audio input from a microphone and convert it into
a form that can be processed by the computer.

Question 30:
___ Wireless____ network cards allow computers to be connected without cables.

Question 28:
Network interface cards (NIC) are connected through ___ expansion____ slots
on the motherboard.

Question 29:
___ System____ buses connect the CPU to memory on the system board.

Question 30:
The number of bits that can travel simultaneously down a bus is known as the
bus ____ width___.

P a g e 78 | 96
]Questions All Chapter[ ITBIS105

Question 28:
___ Ethernet____ ports are the standard high-speed networking ports for many
of today's computers.

Question 29:
___ MIDI(musical instrument digital interface)____ ports are a special type
of port for connecting musical instruments to a sound card.

Question 30:
___ eSATA(external serial advanced technology attachment)____ ports
provide high-speed connections for external disk drives, optical disks, and other
large secondary storage devices.

Question 30:
____ Thunderbolt___ ports provide high-speed connections can connect
up to seven separate devices connected one to another.

Question 28:
___ mDP(Mini DisplayPort)____ ports are an audiovisual port typically
used to connect large monitors.

Question 29:
Desktop computers have a(n) ___ power supply unit____, located within the
system unit, that plugs into a standard wall outlet, converts AC to DC, and
provides the power to drive all of the system unit components.

Question 30:
___ Thumb____ keyboards are used on smartphones and other small portable
devices.

Question 28:
The mouse, joysticks, touch screens, and styluses are all types of
___ pointing____ devices.

Question 29:
Flatbed, document, and portable are types of ____ scanners___ that accept
documents and convert them into machine-readable form.

P a g e 79 | 96
]Questions All Chapter[ ITBIS105

Question 30:
Supermarkets use ___ bar____ code readers to scan codes printed on product
containers.

Question 28:
The most common card reader is the ___ magnetic____ card reader which
reads encoded information stored on a thin magnetic strip located on the back
of the card.

Question 29:
___ RFID____ tags are tiny chips that can be embedded into almost anything
and contain information used to track and locate lost pets; to monitor production
and update inventory; to record prices, product descriptions, and locations of
retail items.

Question 30:
Character and ___ mark____ recognition devices are scanners that are able to
recognize special characters and marks.

Question 30:
____ Webcams___ are specialized digital video cameras that capture images.

Question 28:
Digital ___ whiteboards____ connect to computers and project computer
output and can control the computer with the use of a special pen.

Question 29:
____ Laser___ printers use a technology similar to that used in a photocopy
machine.

Question 30:
___ Thermal____ printers are widely used with ATMs.

Question 28:
____ Cloud___ printers are printers connected to the Internet that provide
printing services to others on the Internet.

P a g e 80 | 96
]Questions All Chapter[ ITBIS105

Question 29:
____ Plotters___ are special-purpose printers typically found in architectural
and engineering environments.

Question 30:
____ Internet___ telephones are specialized input and output devices for
receiving and sending voice communication.

Question 28:
___ Multifunctional devices(MFDs)____ combine the capabilities of a
scanner, printer, fax, and copy machine.

Question 29:
Voice over ___ IP____ is the transmission of telephone calls over computer
networks.

Question 30:
___ Dot____ pitch is the distance between pixels on a monitor.

Question 28:
____ Contrast___ ratio indicates a monitor's ability to display colors by
comparing the light intensity of the brightest white to the darkest black.

Question 29:
____ Aspect___ ratio indicates the proportional relationship between a
display's width and height.

Question 30:
____ Repetitive strain injury(RSI)___ is any injury that is caused by fast,
repetitive work that can generate neck, wrist, hand, and arm pain.

Question 28:
actual connecting or transmission medium that carries the message in a
communication system is called the communication ___ channel____.

Question 29:
____ Coaxial___ cable is a high-frequency transmission medium that has a
single solid copper core.

P a g e 81 | 96
]Questions All Chapter[ ITBIS105

Question 30:
___ Demodulation____ is the name of the process of converting from analog
to digital.

Question 28:
____ Digital subscriber line (DSL)___ uses standard telephone lines to
provide high-speed connections.

Question 29:
The range of Wi-Fi networks using microwave connections is being extended
over greater distances using a new technology known as ___ WiMax____.

Question 30:
___ Fiber-optic____ cable transmits data as pulses of light through tiny tubes
of glass.

Question 28:
A(n) ___ local____ area network is a network where the nodes are in close
physical proximity to each other.

Question 29:
A network ____ gateway___ is a device that allows one LAN to be linked to
other LANs or to larger networks.

Question 30:
A LAN set up for a household's personal use is called a(n) ___ home____
network.

Question 28:
___ Wide____ area networks are countrywide and worldwide networks.

Question 29:
A(n) ____ personal___ area network is a type of tiny, self-configuring wireless
network that works within your immediate surroundings to connect cell phones
to headsets, PDAs to other PDAs, and so on.

Question 30:
A(n) ____ client/server___ network system uses central servers to coordinate
and supply services to other nodes on the network.

P a g e 82 | 96
]Questions All Chapter[ ITBIS105

Question 28:
A(n) ____ intranet___ is a private network within an organization that is
designed to resemble the Internet.

Question 29:
A(n) ____ extranet___ is a private network that connects more than one
organization.

Question 30:
In a client/server network, the ___ server____ provides access to resources
and services.

Question 28:
A(n) ___ mesh____ network topology does not use a specific physical layout
but requires that each node have more than one connection to the other nodes.

Question 29:
A hierarchical network topology in which each device is connected to a central
node, either directly or through one or more other devices, is also called a(n)
___ tree____ network.

Question 30:
In a wireless LAN, all communications pass through the network's centrally
located wireless access point or ___ base station____.

Question 28:
Network ____ architecture___ describes how a network is arranged and how
resources are coordinated and shared, encompassing network topologies and
strategies.

Question 29:
Most firewalls include a special computer called a(n) ____ proxy___ server to
manage communications between the internal networks and the outside world.

P a g e 83 | 96
]Questions All Chapter[ ITBIS105

Question 30:
A(n) ___protocol___ is a rule or custom that governs how data is transferred in
a network.

Question 31:
___VPN___ technology creates a secure, tamper resistant data tunnel between
two points on the Internet.

Question 31:
Smartphone owners can ___tether___ their smartphone with their computer,
using the phone as a modem to connect to the Internet.

Question 31:
A(n) ___switch___ is a gathering point for the computers in a LAN to connect
and participate in the network and sending messages only to the correct port.

Question 31:
The Internet is a ___mesh___ of routers and servers connected to one
another st multiple points

Question 31:
Question 32:
Question 33:
Question 30:
Question 31:
Question 32:
Question 33:
Question 30:
Question 31:
Question 32:
Question 33:

P a g e 84 | 96
]Questions All Chapter[ ITBIS105

Essay Questions
Question 28:
Describe all the parts of an information system.
An information system typically consists of: people, procedures, software, hardware, data,
and connectivity. Information systems are used by people in order to increase productivity.
Procedures are rules or guidelines for people to follow when using software, hardware, and
data. Software is a program that contains the step-by-step instructions that tell the computer
how to do its work. Hardware consists of the physical equipment that processes the data to
create information. Data consists of raw unprocessed facts, including text, numbers, images,
and sounds. Almost all of today's computer systems add an additional part to the information
system. This part, called connectivity, typically uses the Internet and allows users to greatly
expand the capability and usefulness of their information systems.

Question 29:
Where would it be most relevant to use the term "data" and the term
"information?" Give an example of each.
Data are unprocessed facts, including text, numbers, images and sounds. An example might
be a listing of all customer purchases at a bookstore over the last year. Information is
processed data that has been rendered usable with the help of various types of software.
From the previous example, you could derive information such as the addresses of
customers who bought more than $500 worth of books or the year's top ten horror novels.

Question 30:
What is an operating system? Give two examples.
Operating systems are programs that coordinate computer resources, provide an interface
between users and the computer, and run applications. Microsoft's Windows 8 and Apple's
Mac OS X are two of the best-known operating systems for today's microcomputer users.

Question 28:
What is application software? Describe the two categories of application
software.
Application software might be described as end user software. Three types of application
software are general-purpose, specialized, and mobile apps. General-purpose applications
are widely used in a large number of careers. Some of the best-known general-purpose
application programs are Microsoft's Word, Excel, Access, and PowerPoint. Specialized
applications include thousands of other programs that are more narrowly focused on specific
disciplines and occupations. Two of the best known are graphics and web authoring
programs. Mobile apps (or mobile applications or apps) are small programs designed for
mobile devices such as smartphones, tablet computers, and other mobile devices. There are
over half a millions apps. The most popular mobile apps are for social networking, playing
games, and downloading music and videos.

Question 29:

P a g e 85 | 96
]Questions All Chapter[ ITBIS105

Differentiate between a supercomputer and a mainframe computer?


Supercomputers are the most powerful type of computer. These machines are special
highcapacity computers used by very large organizations. Although mainframe computers
are not as powerful as supercomputers, mainframe computers are capable of great
processing speeds and data storage. For example, insurance companies use mainframes to
process information about millions of policyholders.

Question 30:
Differentiate between midrange and personal computers.
Midrange computers, also referred to as servers, are computers with processing capabilities
less powerful than a mainframe computer yet more powerful that a microcomputer. Originally
used by medium-sized companies or departments of large companies to support their
processing needs, today midrange computers are most widely used to support or serve end
users for specific needs such as retrieving data from a database or supplying access to
application software. Personal computers are the least powerful, yet the most widely used,
type of computer. There are four types of personal computers: desktop computers, laptops,
tablets, and mobile devices.

Question 28:
Describe the different types of personal computers and provide relevant
examples of each.
There are four types of personal computers: desktop computers, laptops, tablets, and mobile
devices. Desktop computers are small enough to fit on top of or alongside a desk yet are too
big to carry around. Laptop computers, also called notebook computers, are portable,
lightweight, and fit into most briefcases. Tablets, also known as tablet computers, are
smaller, lighter, and generally less powerful than laptops. Like a laptop, tablets have a flat
screen but typically do not have a standard keyboard. Instead tablets typically use a virtual
keyboard that appears on the screen and is touch sensitive. The best know tablet is Apple's
iPad. Mobile devices, also known as handheld computers, are the smallest microcomputers
and are designed to fit into the palm of one hand. These systems contain an entire computer
system, including the electronic components, secondary storage, and input and output
devices. Smartphones are the most widely used handheld computers.

Question 29:
In reference to personal computer hardware, explain the system unit.
The system unit is a container that houses most of the electronic components that make up a
computer system. Two important components of the system unit are the microprocessor and
memory. The microprocessor controls and manipulates data to produce information. Memory
is a holding area for data, instructions, and information. One type of memory, random-access
memory (RAM), holds the program and data that is currently being processed. This type of
memory is sometimes referred to as temporary storage because its contents will typically be
lost if the electrical power to the computer is disrupted.

P a g e 86 | 96
]Questions All Chapter[ ITBIS105

Question 30:
Describe secondary storage? Compare and contrast hard disks and solid-
state storage.
Unlike memory, secondary storage holds data and programs even after electrical power to
the computer system has been turned off. Hard disks are typically used to store programs
and very large data files. Using rigid metallic platters and read/write heads that move across
the platters, hard disks store and retrieve data using magnetic charges. In contrast, solid-
state storage does not have any moving parts. It is more reliable and requires less power
than hard disks. Solidstate storage saves data electronically in a manner similar to RAM
except that its contents will not be lost if electrical power is disrupted.

Question 28:
Describe the four types of files.
Document files are created by word processors. They include such things as memos, term
papers, and letters. Worksheet files are created by electronic spreadsheets and are typically
used to analyze things like budgets and to predict sales. Database files are created by
database management programs to contain highly structured and organized data.
Presentation files are created by presentation graphics programs to save presentation
materials, including audience handouts, speaker notes, and electronic slides.

Question 29:
Describe the evolution of the Internet and web.
The Internet was launched in 1969 when the United States funded a project to develop a
national computer network called Advanced Research Project Agency Network (ARPANET).
The Internet is a large network that connects together smaller networks all over the globe.
Initially, the Internet was all text—no graphics, animations, sound, or video. The web was
introduced in 1991 at the Center for European Nuclear Research (CERN) in Switzerland and
added a multimedia interface to the resources available on the Internet.

Question 30:
Define the parts of a URL.
For browsers to connect to resources on the Internet, the address of the resources must be
specified. These addresses are called uniform resource locators or URLs. All URLs have at
least two basic parts. The protocol is the first part of the address and specifies which protocol
(set of rules for exchanging data) to use when connecting to the Internet resources. In the
example, http://www.espn.com, the protocol is http. The protocol http is used for web traffic
and is the most widely used Internet protocol. The second part of the URL is the domain
name, for example www.espn.com. This indicates the specific address where the resource is
located. The part of the domain name following the dot (.) is the top-level domain. It identifies
the type of organization. A ".com" top-level domain indicates a commercial site.

P a g e 87 | 96
]Questions All Chapter[ ITBIS105

Question 28:
Describe the various technologies used to provide highly interactive and
animated websites. Cascading Style Sheets (CSS) are files inserted into an HTML document
that control the appearance of web pages including layout, colors, and fonts. CSS helps to
ensure that related web pages have a consistent presentation or look. JavaScriptis a
language often used within HTML documents to trigger interactive features, such as opening
new browser windows and checking information entered in online forms. AJAX, an advanced
use of JavaScript, is used to create interactive websites that respond quickly. Applets are
programs that can be downloaded quickly and run by most browsers. They are used to
present animation, display graphics, provide interactive games, and much more.
Question 29:
Briefly explain how instant messaging works.
Instant messaging (IM) is an extension of e-mail that allows two or more people to contact
each other via direct, live communication. To use instant messaging, you specify a list of
friends and register with an instant messaging server. Whenever you connect to the Internet,
special software informs your messaging server that you are online. In response, the server
will notify you if any of your contacts are online. At the same time, it notifies your friends that
you are online. You can then send messages directly back and forth to one another.

Question 30:
Describe a wiki and explain how a wiki differs from a blog.
A wiki is a website designed to allow visitors to use their browser to add, edit, or delete that
site's content. Wikis support collaborative writing in which there is not a single expert author,
but rather a community of interested people that builds knowledge over time. Although blogs
may have multiple authors, community feedback is limited to adding comments to the site.
Blogs are not a collaborative effort like wikis.

Question 28:
Explain how a search engine works.
To use a search website, you enter a keyword or phrase reflecting the information you want.
The search engine compares your entry against its database and returns a list of hits, or sites
that contain the keywords. Each hit includes a link to the referenced web page (or other
resource) along with a brief discussion of the information contained at that location. Many
searches result in a large number of hits. For example, if you were to enter the keyword
music, you would get billions of hits. Search engines order the hits according to those sites
that most likely contain the information requested and present the list to you in that order,
usually in groups of 10.

Question 29:
Discuss the four elements to consider when evaluating the content and
accuracy of information on the web.
There are four elements to consider when evaluating the accuracy of information on the web:
authority, accuracy, objectivity, and currency. Authority refers to the author's expertise on the
subject. Is the site an official site for the information presented, or is the site an individual's

P a g e 88 | 96
]Questions All Chapter[ ITBIS105

personal website? In order to determine the accuracy of a website, consider whether or not
the information has been critically reviewed for correctness prior to posting on the web. Does
the website provide a method to report inaccurate information to the authors? Objectivity is
reached when the information is factually reported without an author bias. Finally, currency is
the timeliness of the website. Is the information up to date? Does the site specify the date
when the site was last updated?

Question 30:
Describe both the advantages, and the disadvantages associated with
electronic commerce.
Electronic commerce, also known as e-commerce, is the buying and selling of goods over
the Internet. The underlying reason for the rapid growth in e-commerce is that it provides
incentives for both buyers and sellers. From the buyer's perspective, goods and services can
be purchased at any time of day or night. Traditional commerce is typically limited to
standard business hours when the seller is open. Additionally, buyers no longer have to
physically travel to the seller's location. From the seller's perspective, the costs associated
with owning and operating a retail outlet can be eliminated. Another advantage is reduced
inventory. Some of the disadvantages include the inability to provide immediate delivery of
goods, the inability to "try on" prospective purchases, and questions relating to the security of
online payments.

Question 28:
Describe the two greatest challenges for e-commerce.
The two greatest challenges for e-commerce is the development of (1) fast, secure, and
reliable payment methods for purchased goods and (2) providing convenient ways to provide
required information such as mailing addresses and credit card information.

Question 29:
Compare and contrast the four most common types of system units.
The four most common types of system units are: desktop, laptop, tablet, and mobile
devices. The desktop system unit can be placed horizontally (desktop) or vertically (tower).
All input and output devices are located outside the system unit. Laptops are portable and
much smaller. Their system units are housed with selected secondary storage devices and
input devices. Located outside the system unit, the monitor is attached by hinges. Laptops
are often called notebooks. Tablets, also known as tablet computers, are the newest and one
of the most popular types of computer. They are effectively a thin slab that is all monitor with
the system unit located behind the monitor. Tablets are smaller, lighter, and generally less
powerful than laptop computers. Like a laptop, tablets have a flat screen but typically do not
have a standard keyboard. Instead tablets typically use a virtual keyboard that appears on
the screen and is touch-sensitive. Mobile devices, also known as handheld computers, are
the smallest and are designed to comfortably fit into the palm of one hand. These systems

P a g e 89 | 96
]Questions All Chapter[ ITBIS105

contain an entire computer system, including the electronic components, secondary storage,
and input and output devices. By far the most popular mobile device is the smartphone. It
greatly extends the capabilities of a cell phone by providing computing power. In addition to
capturing and sending audio and video, smartphones run apps, connect to the Internet, and
more.

Question 30:
Describe the character encoding schemes.
The three character encoding schemes are ASCII, EBCDIC, and Unicode. Historically,
personal computers used the ASCII to represent characters, while mainframe computers
used EBCDIC. These schemes were quite effective; however, they are limited. ASCII, for
example, only uses 7 bits to represent each character, which means that only 128 total
characters could be represented. This was fine for most characters in the English language
but was not large enough to support other languages such as Chinese and Japanese. These
languages have too many characters to be represented by the 7-bit ASCII code.

Question 28:
How is the multicore chip useful for personal computers?
At one time, personal computers were limited by microprocessors that could support a single
CPU that controlled operations. These computers were limited to processing one program at
a time. Now, many personal computers have multicore processors that can provide two or
more separate and independent CPUs. More significantly, however, is the potential for
personal computers to run very large, complex programs that previously required expensive
and specialized hardware.

Question 29:
Explain expansion slots and cards.
Many personal computers allow users to expand their systems by providing expansion slots
on the system board. Users can insert optional devices known as expansion cards into these
slots. Ports on the cards allow cables to be connected from the expansion cards to devices
outside the system unit. Some of the most commonly used expansion cards include graphics
cards, sound cards, network interface cards, and wireless network cards.

Question 30:
Explain Plug and Play.
Plug and Play was originally a set of specific hardware and software standards
developed by Intel, Microsoft, and others. As hardware and software has
evolved, however, Plug and Play has become a generic term that is associated
with the ability to plug any device into a computer and have it play or work
immediately.

P a g e 90 | 96
]Questions All Chapter[ ITBIS105

Question 29:
Describe the three principal types of expansion buses.
The principal types of expansion buses are: USB, FireWire, and PCIe. Universal Serial Bus
(USB) is widely used today. External USB devices are connected from one to another or to a
common point or hub and then onto the USB bus. The USB bus then connects to the PCI
bus on the system board. The current USB standard is USB 3.0. The FireWire bus is similar
to USB buses and is used primarily to connect audio and video equipment to the system
board. PCI Express (PCIe) is widely used in many of today's most powerful computers.
Unlike most other buses that share a single bus line or path with several devices, the PCIe
bus provides a single dedicated path for each connected device.

Question 30:
Describe specialty ports including eSATA, HDMI, MIDI, MiniDP, and
Thunderbolt.
External Serial Advanced Technology Attachment (eSATA) ports provide high-speed
connections for external hard disk drives, optical disks, and other large secondary storage
devices. High Definition Multimedia Interface (HDMI) ports provide high-definition video and
audio, making it possible to use a computer as a video jukebox or an HD video recorder.
Musical instrument digital interface (MIDI) ports are a special type of serial port for
connecting musical instruments
like an electronic keyboard to a sound card. The sound card converts the music into a series
of digital instructions. These instructions can be processed immediately to reproduce the
music or saved to a file for later processing. Mini DisplayPort (MiniDP or mDP) ports are an
audiovisual port typically used to connect large monitors. These ports are used with many
Apple Macintosh computers. Thunderbolt ports, first introduced in Apple's MacBook Pro
computer, provide highspeed connections. A single port can connect up to seven separate
devices connected one to another. Thunderbolt ports promise to replace a number of
different types of ports including Mini DisplayPorts.

Question 28:
Describe some recommendations to avoid health risks associated with
computer use.
Computer users can alleviate problems by taking frequent rest breaks and by using well-
designed computer furniture. To make the computer easier on the eyes, take a 15-minute
break every hour or two. To help avoid back and neck problems, make sure your equipment
is adjustable. Use ergonomically correct keyboards to help prevent injury from heavy
computer use.

Question 29:
How does an optical scanner work?
Often called a scanner, an optical scanner scans image or text documents and converts
them to machine-readable form. These devices do not recognize individual letters or images.
Rather, they recognize light, dark, and colored areas that make up individual letters or

P a g e 91 | 96
]Questions All Chapter[ ITBIS105

images. Typically, scanned documents are saved in files that can be further processed,
displayed, printed, or stored for later use.

Question 30:
How does a bar code reader work?
Bar code readers are used extensively in almost all supermarkets. At the checkout counter,
electronic cash registers use a bar code reader that contains photoelectric cells that scan each or
read each product's bar code. The codes are sent to the supermarket's computer, which has a
description, the latest price, and an inventory level for each product. The computer processes this
input to update the inventory level and to provide the electronic cash register with the description and
price for each product.

Question 29:
What are character and mark recognition devices? Describe their uses.
Character and mark recognition devices are scanners that can recognize special characters
and marks. Magnetic-ink character recognition (MICR) devices are used by banks to
automatically read numbers on the bottom of checks and deposit slips. Optical-character
recognition (OCR) uses special pre-printed characters that can be read by a light source and
changed into machine-readable code. They are used in department stores to read retail price
tags. Optical-mark recognition (OMR) senses the presence or absence of a mark, such as a
pencil mark. OMR is often used to score standardized multiple-choice tests.

Question 30:
How is voice recognition technology being used today?
Voice-recognition systems use a microphone, a sound card, and special software. These
systems allow users to operate computers and other devices as well as to create documents
using voice commands. Examples include voice-controlled dialing features on mobile
phones, navigation on GPS devices, and control of car audio systems. Specialized portable
devices are used by doctors, lawyers, and others to record dictation.

Question 28:
Describe the basic distinguishing features of monitors that affect clarity
including resolution, dot pitch, contrast ratio, size, and aspect ratio.
Resolution is one of the most important features. Images are formed on a monitor by a series
of dots or pixels (picture elements). Resolution is expressed as a matrix of these dots or
pixels. For example, many monitors today have a resolution of 1,600 pixel columns by 1,200
pixel rows for a total of 1,920,000 pixels. The higher a monitor's resolution (the more pixels),
the clearer the image produced. Dot (pixel) pitch is the distance between each pixel. Most
monitors have a dot pitch of .31 mm (31/100th of a millimeter) or less. The lower the dot pitch
(the shorter the distance between pixels), the clearer the images produced. Contrast ratio
indicate a monitor's ability to display colors. It compares the light intensity of the brightest

P a g e 92 | 96
]Questions All Chapter[ ITBIS105

white to the darkest black. Good monitors typically have contrast ratios between 500:1 to
2000:1. Size, or active display area, is measured by the diagonal length of a monitor's
viewing area. Common sizes are 15, 17, 19, 21, and 24 inches. Aspect ratio indicates the
proportional relationship between a display's width and height. Almost all newer monitors
have a 16:9 aspect ratio designed to display widescreen content.

Question 29:
What is HDTV? What is 3D HDTV?
High-definition television (HDTV) delivers a much clearer and more detailed wide-screen
picture than regular television. Because the output is digital, users can readily freeze video
sequences to create high-quality still images. The video and still images can then be
digitized, edited, and stored on disk for later use. This technology is very useful to graphic
artists, designers, and publishers. One of the most recent and dramatic advances is 3D HDTV.
Using special viewing glasses, 3D HDTV provides theater-quality three-dimensional viewing.

Question 30:
What is a multifunctional device? What are the advantages/disadvantages
of such a device?
A multifunctional device (MFD) typically combines the capabilities of a scanner, printer, fax,
and copy machine. They cost about the same as a good printer or copy machine but require
much less space than the single-function devices they replace. Their disadvantage is that the
quality and functionality are not quite as good as those of the separate single-purpose
devices. The output quality for any one function is often not quite as good as that of the
separate singlepurpose devices. The reliability of multifunctional devices suffers because
problems with one of the functional parts can make the entire device inoperable.

Question 29:
What is VoIP and how does it work?
Voice over IP (VoIP) is a set of standards or technologies that support voice and other types
of communication over the Internet. Telephony, also known as Internet telephony, is the VoIP
application that uses the Internet rather than traditional telephone lines to support voice
communication. To place telephone calls using Internet telephony requires a high-speed
Internet connection and a service provider. Many cable service providers offer bundles
including Internet, telephone, and television. While these bundles offer a price break, there
are other lower-cost options for telephony from a variety of providers including PhonePower,
Phone.com and Skype.

P a g e 93 | 96
]Questions All Chapter[ ITBIS105

Question 30:
Describe the four basic elements of most communication systems.
Whether wired or wireless, every communication system has four basic elements. 1. Sending
and receiving devices, which are either computers or specialized communication devices. They
accept and send messages. 2. Connection devices act as an interface between the sending and
receiving devices and the communication channel. They convert outgoing messages into packets
that can travel across the communication channel. 3. Data transmission specifications are the
rules and procedures that coordinate the sending and receiving devices by precisely defining
how the message will be sent across the communications channel. 4. A communication channel
is the actual connecting or transmission medium that carries the message (physical wire or cable,
or wireless connection).

Question 28:
Describe the differences between the three major physical connection
mediums: twisted-pair cable, coaxial cable, and fiber-optic cable.
Twisted-pair cable is made up of hundreds of copper wires that are twisted together. Both
telephone lines and ethernet cables use twisted-pair. Coaxial cable is a high-frequency
transmission cable made up of a single solid-copper core. Coaxial cable has over 80 times
the transmission capacity of twisted pair and is used to deliver television signals as well as to
connect computers in a network. Fiber-optic cable transmits data as pulses of light through
tiny tubes of glass. Fiber-optic cable has over 26,000 times the transmission capacity of
twisted pair. It is lighter and more reliable than coaxial cable.

Question 29:
Explain how global positioning functions.
One of the most interesting applications of satellite communications is for global positioning.
A network of satellites owned and managed by the Department of Defense continuously
sends location information to earth. Global positioning system (GPS) devices use that
information to uniquely determine the geographic location of the device. Available in many
automobiles to provide navigational support, these systems are often mounted into the dash
with a monitor to display maps and speakers to provide spoken directions. Many of today's
smartphones and tablets use GPS technology for handheld navigation.

Question 30:
Differentiate between analog and digital signals.
Analog signals are continuous electronic waves. Telephones send and receive data in the
form of analog signals. Digital signals represent the presence or absence of an electronic
pulse. Computers send and receive data in the form of digital signals.

P a g e 94 | 96
]Questions All Chapter[ ITBIS105

Question 30:
Compare the high speed connection services: DSL, cable, satellite, and
cellular services.
Digital subscriber lines (DSL) use existing telephone lines to provide high-speed connections.
Cable service uses existing television cables to provide high-speed connections that are
faster than DSL. Satellite connection services use satellites to provide wireless connections.
These can be slower than DSL and cable modems, but are available almost anywhere using
a satellitereceiving disk. Cellular service providers, including Verizon, AT&T, Sprint, and T-
Mobile, support voice and data transmission to wireless devices.

Question 28:
Describe the four categories of bandwidth.
The four categories of bandwidth are voiceband, mediumband, broadband, and baseband.
Voiceband, also known as low bandwidth, is used for standard telephone communication.
Personal computers with standard telephone modems and dial-up service use this
bandwidth. While effective for transmitting text documents, it is too slow for many types of
transmission, including high-quality audio and video. Mediumband is the bandwidth used in
special leased lines to connect midrange computers and mainframes as well as to transmit
data over long distances. This bandwidth is capable of very high speed data transfer.
Broadband is widely used for DSL, cable, and satellite connections to the Internet. Several
users can simultaneously use a single broadband connection for high-speed data transfer.
Baseband is widely used to connect individual computers that are located close to one
another. Like broadband, baseband is able to support high-speed transmission. Unlike
broadband, baseband can only carry a single signal at one time.

Question 29:
What is a WLAN? How does it work?
A wireless local area network is typically referred to as a wireless LAN (WLAN). It uses radio
frequencies to connect computers and other devices. All communications pass through the
network's centrally located wireless access point or base station. This access point interprets
incoming radio frequencies and routes communications to the appropriate devices.

Question 30:
Differentiate between a client/server network and a peer-to-peer network.
In a client/server network, each node connects to the server. The server is in charge of
distributing resources among the clients. In a peer-to-peer network, any computer in the
network can be either a client or a server.

Question 30:
What are the advantages and disadvantages of using a peer-to-peer
system?
The primary advantage of P2P networks is that they are easy and inexpensive (often free) to
setup and use. One disadvantage is the lack of security controls or other common
management functions.

P a g e 95 | 96
]Questions All Chapter[ ITBIS105

Question 28:
Explain how intranets and extranets are useful in supporting
communication in an organization?
An intranet is a private network within an organization that resembles the Internet. Typical
applications include electronic telephone directories, e-mail addresses, employee benefit
information, internal job openings, and much more. Employees find surfing their
organizational intranets to be as easy and as intuitive as surfing the Internet. An extranet is a
private network that connects more than one organization. Many organizations use Internet
technologies to allow suppliers and others limited access to their networks. The purpose is to
increase efficiency and reduce costs.

P a g e 96 | 96

You might also like