Practice Test 1 Questions
Practice Test 1 Questions
b) Parallel processor
c) Co-processor
d) Ultraprocessor
e) Perpendicular processor
n2 0
Which of the following is NOT considered an input device?
a) Keyboard
b) Mouse
c) Scanner
d) Monitor
e) Microphone
n3 1
Within database programs, fields are generally grouped
together to form which of the following?
a) Records
b) Files
c) Fragments
d) Hierarchies
e) Valleys
n4 0
A monitor that displays a higher resolution will use
a) a smaller number of pixels, and thus provide a smoother image
n5 1
Fiber optic lines that use digital signals and telephone lines
that sometimes use analog signals are known as
a) communications channels
b) communications hardware
c) sending devices
d) receiving devices
e) communications software
n6 0
A file that is accessed in a serial manner from its beginning to
its end is known as a
a) hash file
b) sequential file
c) indexed file
d) sentinel
e) binary file
n7 0
Which of the following is (are) considered advantages of fiber-
optic cables over cables that use wire?
a) I only
b) III only
c) I and II only
n8 0
In a communications system, data and information travel over
a communications channel. For best performance, a
communications channel's
a) bandwidth and latency should be low
b) bandwidth should be low and latency high
n9 1
In a relational database, which of the following fields would
most likely be used to define the relationship between a table
containing customer contact information and a table
containing customer purchases?
a) Customer identification number
c) Purchase date
n 10 0
A bit (binary digit) is the smallest unit of data a computer can
process. When 8 bits are grouped together as a unit, they
form which of the following, which can represent 256
individual characters?
a) Chip
b) Byte
c) Code
d) Field
e) Record
n 11 0
Which of the following is a coding scheme implemented in
several operating systems and can represent almost all of the
world's current written languages as well as classic and
historical languages?
a) Morse code
c) Unicode
e) Multicode
n 12 0
Graphics and audio files exist in a variety of formats. Which of
the following formats compresses digital audio signals to
reduce the amount of data required to represent it?
a) MP3
b) GIF
c) BMP
d) PNG
e) TIFF
n 13 0
A network that extends or “tunnels” through a public network
to create a secure sharing of data between two private
networks as if they were directly connected is known as a
a) Local Area Network (LAN)
n 14 0
The design of computers, devices, and media in a network is
known as which of the following?
a) Network coverage
b) Network architecture
c) Network technology
d) Network protocol
e) Network channel
n 15 0
Which of the following terms is commonly used to refer to a
collection of related data or files pertaining to a particular
subject?
a) Network
b) Field
c) Record
d) SQL database
e) Workbook
n 16 0
On a star network, all computers and devices (nodes) attach
to a central device that provides a common connection point
known as a
a) hub
b) bus
c) printer
d) modem
e) ring
n 17 0
On a network, the major difference between the server and
client computers is that the server ordinarily has
a) less power, less storage space, and is less reliable
n 18 0
In a client/server network, a network server is a dedicated
server that
a) stores and manages files
n 19 0
Which of the following is a unique value that allows a
database to access information regarding an individual
record?
a) Match
b) Storage property
c) Tree
d) Index
e) Identity map
n 20 0
On a peer-to-peer network, each computer
a) has equal responsibilities and capabilities
c) utilizes a single computer that holds the operating system and application software necessary to handle netw
n 21 0
The operating system on a computer sometimes is called the
platform. A cross-platform application program is one that
a) includes an operating system
n 22 0
Which of the following features of a word processing program
automatically handles the end of a typed line for the user,
eliminating the need to press Enter or Return when the end of
the line is reached?
a) Font
b) Margins
c) Cursor
d) Word-wrap
e) Page Down
n 23 0
Word processed texts that are aligned at both the left and
right margins are referred to as
a) centered
b) ragged right
c) justified
d) right-aligned
e) left-aligned
n 24 0
Which of the following steps of the programming development
cycle consists of three major tasks: (1) review the
requirements, (2) meet with the systems analysts and users,
and (3) identify input, output, processing, and data
components?
a) Analysis
b) Design
c) Test
d) Implementation
e) Maintenance
n 25 0
Structured design breaks down a program's original set of
requirements into smaller, more manageable sections. In
structured design, a section of a program that performs a
single function is known as a
a) main routine
b) bug
c) macro generator
d) module
e) style sheet
n 26 0
Which of the following is a design tool that programmers use
to help document a solution algorithm and graphically show a
program's logic?
a) Hierarchy chart
b) Pseudocode
c) Flowchart
d) Assembler
e) Class diagram
n 27 0
Which of the following is language instructions that uses a
series of binary digits (1s and 0s) or a combination of numbers
and letters that represent binary digits?
a) Machine
b) Assembly
c) Object-oriented
d) Procedural
e) Nonprocedural
n 28 0
Programmers typically use either a compiler or interpreter to
translate a program into machine language instructions that a
computer can execute. Which of the following is considered an
advantage of an interpreter?
a) When an interpreter finds errors, it displays feedback immediately.
n 29 0
Which of the following are complete object-oriented
programming (OOP) languages that programmers can use to
implement an object-oriented design?
a) BASIC and C
c) Node.js and C
n 30 0
To configure devices and troubleshoot network connections,
network administrators and other advanced users work with
which of the following interfaces in which they type
commands or press special keys on the keyboard (such as
function keys or key combinations) to enter data and
instructions?
a) Command-line interface
b) Menu-driven interface
c) Performance-monitor interface
e) Multimedia interface
n 31 0
Which interface allows users to interact with menus and visual
images, such as icons, buttons, and other objects, to issue
commands?
a) Command-line interface
b) Menu-driven interface
c) Performance-monitor interface
e) Multimedia interface
n 32 0
In a graphical user interface (GUI), a small image displayed on
the computer screen that represents a program, an
instruction, or some other object is known as a
a) menu
b) command
c) window
d) utility
e) icon
n 33 0
Sometimes a company cannot find software that meets its
unique requirements. In this case, the company may need
which of the following software to perform functions specific to
its business or industry?
a) Packaged software
b) Freeware
c) Custom software
d) Shareware
e) Public-domain software
n 34 0
Which of the following is copyrighted software that is
distributed free for a trial period, after which a payment
should be sent to the person or company who developed the
program?
a) Shareware
b) Custom software
c) Packaged software
d) Public-domain software
e) Freeware
n 35 0
Which of the following are basic categories of operating
systems that exist today?
a) MacOS X 10.12, MacOS X 10.13, and MacOS X 10.14
n 36 0
Data integrity identifies the quality of data. Which of the
following is a computer phrase that means users cannot
create correct information from data that is incorrect?
a) Nothing ventured, nothing gained (NVNG)
n 37 0
A database uses a variety of characteristics to define each
field. An important consideration is the data type, which
a) uniquely identifies each field
n 38 0
The lowest monthly fee at a fitness center is $20.25 and the
highest is $55.50. What type of check on the data file's
Monthly Fee field will ensure the monthly fee is a value
between $20.25 and $55.50?
a) Range check
b) Completeness check
c) Consistency check
d) Alphabetic check
e) Numeric check
n 39 0
Which of the following ensures that information being
transmitted over the internet is routed to its proper
destination?
a) Spoof
b) TCP/IP
c) Point of Presence
d) 802.11b
e) WLAN
n 40 0
More complex data management systems maintain a log,
which is a listing of activities that change the database. In the
log, a Database Management System (DBMS) will NOT
a) keep a copy of a record prior to a change
d) state who made a change, when it was made, and from which computer it was made
n 41 0
An object-oriented database (OODB) stores data in objects,
which contain data as well as the actions that read or process
the data. Compared with relational databases, object-oriented
databases do NOT
a) store more types of data
n 42 0
An example of an application appropriate for an object-
oriented database is a hypertext database, which
a) stores data about engineering and scientific designs
n 43 0
Which of the following is the major database type that totes
the ability to easily search unrelated data housed within it?
a) A NoSQL database
b) A relational database
c) A hierarchical database
d) A network database
e) An object-oriented database
n 44 0
Which of the following is the process of converting paper
documents into electronic form and storing the converted
document graphically in a database on a computer?
a) Editing
b) Formatting
c) Imaging
d) Charting
e) Authoring
n 45 0
Document imaging reduces the costs associated with storing
paper-based documents. Other advantages of document
imaging include all of the following EXCEPT
a) document images are centrally available
n 46 0
A systems analyst is responsible for designing and developing
an information system. During the system development cycle,
the systems analyst is the liaison between the
a) project team and the project leader
n 47 0
Which of the following stages of the software life cycle focuses
on how a software program will accomplish its goals?
a) Documentation
b) Testing
c) Design
d) Maintenance
e) Development
n 48 0
How can a sender ensure confidentiality when replying to one
person within a group email?
a) Reply to all.
c) Reply to the user only but carbon copy (cc) all others.
d) Reply to the user only and blind carbon copy (bcc) all the others.
n 49 0
Which of the following is a protocol that allows a user to
establish a remote connection with a computer that is linked
to the internet?
a) Port
b) Ping
c) Telnet
d) VT100
e) HTTP
n 50 0
Which of these records characters typed by a computer user
and enables strangers to learn passwords?
a) Keylogger
b) Browser hijacker
c) Pop-up generator
d) Search hijacker
e) Password generator
n 51 0
Transaction processing systems can use either batch
processing or real-time (online transaction) processing. In
class registration at a local college, batch process would be
best used for
a) entering a desired schedule
n 52 0
Management information systems, which generate accurate,
organized, and timely information for managers, evolved from
a) office information systems
e) expert systems
n 53 0
A management information system (MIS) can create several
types of reports. Which of the following reports identifies data
outside of a normal condition?
a) External report
b) Detailed report
c) Outline report
d) Exception report
e) Summary report
n 54 0
Which of the following is a measure of how well a computer
system, software applications, or information system can grow
to meet increasing performance demands?
a) Availability
b) Scalability
c) Interoperability
d) Probability
e) Marketability
n 55 0
A security system consisting of hardware and/or software that
prevents unauthorized access to data, information, and
storage media on a network is known as a
a) partition
b) query
c) boot drive
d) cache
e) firewall
n 56 0
Businesses and home computer users can perform several
types of backups. Which of the following is also known as an
archival backup that copies all the files in a computer?
a) Full backup
b) Incremental backup
c) Differential backup
d) Selective backup
e) Partial backup
n 57 0
A disaster recovery plan describes what will be done to restore
computer operations in the event of a disaster. In a disaster
recovery plan, the emergency plan specifies
a) information for simulating various levels of disasters and recording an organization's ability to recover.
d) how backup files and equipment will be used to resume information processing.
n 58 0
In which of the following computer industries would you find
job titles such as project developer, programmer, software
engineer, and computer scientist?
a) Equipment
b) Software
d) Sales
n 59 0
Job titles in the system development and programming area of
an information technology (IT) department include all of the
following EXCEPT:
a) Database administrator
b) Application programmer
c) Systems analyst
e) Software engineer
n 60 0
Which of the following areas in an information technology (IT)
department evaluates and integrates new technologies,
administers an organization's data resources, and supports
the centralized computer operating system or servers?
a) Operations
b) End-user computing
c) Technical services
e) Management
n 61 0
Besides being trusted with the physical security of a
company's property and people, which of the following people
is trusted with securing computing resources?
a) Chief operations officer (COO)
n 62 0
Developers follow established guidelines during the entire
system development process. Which of the following is a
general guideline that system development should NOT
follow?
a) Arrange tasks into phases.
b) Exclude the users.
d) Define standards.
e) Produce documentation.
n 63 0
A LAN can generally extend up to how many kilometers?
a) 50
b) 150
c) 200
d) 1,000
e) 1,500
n 64 0
What does the abbreviation RAD stand for?
a) Right Analysis Data
c) Random-Access Device
n 65 0
When would using the RAD methodology be appropriate?
a) When the system or application needs to be made in 2-3 months.
b) When client and end user input on the system is required.
n 66 0
What does the abbreviation JAD stand for?
a) Joint Architecture Design
n 67 0
Which of the following is considered by some to be office
automation because it enables employees to perform tasks
using computers and other electronic devices instead of doing
them manually?
a) OIS
b) TPS
c) DSS
d) MIS
e) EIS
n 68 0
A decision support system (DSS) helps users analyze data and
make decisions. Internal sources of data might include
a) sales orders
b) interest rates
c) population trends
e) product reviews
n 69 0
Which of the following is a special type of DSS that supports
the strategic information needs of the highest management
positions in a company?
a) Transaction processing system (TPS)
n 70 0
An information system that captures and stores the
knowledge of human specialists and then imitates human
reasoning and decision making is known as a(n)
a) office information system
b) transaction processing system
c) expert system
n 71 0
Artificial intelligence (AI) will mathematically mimic the human
brain using a series of algorithms known as
a) strong AI
b) weak AI
c) expert systems
d) neural networks
e) AI framework
n 72 0
The Digital Millennium Copyright Act (DMCA) prohibits
production and/or dissemination of copyrighted technology,
services, and creative works. Which of the following is NOT
protected by the DCMA?
a) Software
b) Web pages
c) Logos
d) Videos
e) Digital images
n 73 0
When a new computer software is invented to operate in a
new, more efficient way when compared to other related
software, it can be granted a
a) copyright
b) patent
c) trademark
d) trade secret
e) certification mark
n 74 0
ROM units perform which of the following functions?
a) Neither writing nor reading memory content
n 75 0
Where is L2 cache located?
a) Within the computer processor
c) On a memory card
d) In a computer's program register
e) On the clipboard
n 76 0
A computer's secondary storage is also referred to by which of
the following terms?
a) Mass storage
b) Output devices
c) CD-ROM
d) Sectors
e) Backup storage
n 77 0
An example of a computer peripheral that is both an input and
output device would be a(n)
a) external SSD
b) webcam
c) scanner
d) speakers
e) game controller
n 78 0
Which of the following functions is performed by a video card?
a) It converts the processor's output information into a video signal.
b) It allows individual computers to share peripheral devices.
n 79 0
What is intellectual property?
a) An idea of a new computer system.
n 80 0
Which of the following was one of the original services on the
internet that today is a primary communications method for
both personal and business users?
a) E-commerce
b) FTP
c) Social media
d) Email
e) Browsing the internet
n 81 0
An internet email address is a combination of a username and
a domain name. In an email address, what symbol separates
the username from the domain name?
a) & (ampersand)
b) @ (at)
c) * (asterisk)
d) ~ (tilde)
e) % (percent)
n 82 0
Which of the following is a generally unacceptable means of
communication in which an unsolicited email message or
posting is sent to many recipients at once?
a) An emoji
b) Spam
c) A flame
d) FAQs
e) A link
n 83 0
Which of the following can be used in a less formal setting to
convey emotion in an email or posting?
a) Spam
b) FAQs
c) Emojis
d) Flames
e) Spoilers
n 84 0
Which of the following is NOT a rule included in proper
netiquette?
a) Be polite and avoid offensive language
n 85 0
Which of the following is NOT an intellectual property mark in
the United States?
a) Trademark
b) Service mark
c) Certification mark
d) Collective mark
e) Approved mark
n 86 0
An organization has created a logo that associates their
company with their products. However, they wish to have a
phrase put on a shirt so that their members can be recognized
as being related to the organization. What mark should the
organization use to achieve this?
a) A collective mark
b) A trademark
c) A certification mark
d) A group mark
e) An organization mark
n 87 0
Which of the following is found before the colon in a web
address that is a protocol defining how a web browser
communicates with the web server whenever sending or
receiving pages or documents?
a) HTML
b) HTTP
c) WWW
d) URL
e) NET
n 88 0
Which of the following is a keyboard shortcut that can be used
to go to the address bar of a web browser without needing to
click on the address bar?
a) Ctrl + L
b) Ctrl + Tab
c) Space
d) Ctrl + D
e) Ctrl + Shift + T
n 89 0
Many businesses and companies utilize social media platforms
to increase all of the following EXCEPT
a) brand awareness
b) website traffic
n 90 0
Some examples of different types of websites are news,
informational, business/marketing, educational, advocacy, and
personal sites. A business/marketing website
a) contains content that promotes or sells products or services
b) offers exciting and challenging avenues for formal and informal teaching and learning
n 92 0
The process of transferring documents, graphics, and other
objects from a computer to a server on the internet is known
as
a) uploading
b) streaming
c) downloading
d) flowing
e) spamming
n 93 0
FTP (File Transfer Protocol) was once the standard protocol for
protecting against data breaches, but has been replaced by
other protocols today. Which of the following is NOT a secure
alternative to FTP?
a) SFTP (SSH File Transfer Protocol)
b) AS2 (Applicability Statement 2)
n 94 0
EDI is a set of standards that controls the transfer of business
data and information among computers both within and
among enterprises. Which of the following is becoming a more
reliable and preferred upgrade?
a) FTP (file transfer protocol)
n 95 0
To evaluate the value of a website, users should consider all of
the following criteria EXCEPT the
a) site's affiliation
b) author's credentials
c) site's content
d) internet overseer
b) a website or application for interacting with professionals within the similar fields of work
n 97 0
Some companies and individuals collect and use personal
information without authorization. To make personal data
more private, users should do all of the following when
shopping online EXCEPT
a) limit the amount of information provided to websites
n 98 0
A single-user license agreement allows the purchaser to
a) install the software on a network
n 99 0
Repetitive strain injuries are a major problem in the United
States. Which of the following is NOT a recommended
precaution a computer user should take to prevent a
repetitive strain injury?
a) Take frequent breaks.
b) Place a wrist rest between the keyboard and the edge of the desk.
c) Use the heel of the hand as a pivot point while typing or using the mouse.
d) Place the mouse at least six inches from the edge of the desk.
e) Minimize the number of switches between the mouse and the keyboard.
n 100 0
When creating a privacy policy for a website that interacts
with user data all of the following should be addressed EXCEPT
a) third party service providers
e) cookies